@web3auth/no-modal 9.0.0-alpha.0 → 9.0.0-alpha.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/dist/lib.cjs/noModal.js +15 -15
- package/dist/lib.esm/noModal.js +14 -14
- package/dist/noModal.cjs.js +16 -16
- package/dist/noModal.esm.js +14 -14
- package/dist/noModal.umd.min.js +1 -1
- package/package.json +9 -9
package/README.md
CHANGED
|
@@ -62,7 +62,7 @@ await web3auth.init();
|
|
|
62
62
|
Once you're done initialising, just create a button that triggers login for your preferred social channel for the user on their request. You can further use the returned provider for making RPC calls to the blockchain.
|
|
63
63
|
|
|
64
64
|
```js
|
|
65
|
-
const web3authProvider = await web3auth.connectTo("
|
|
65
|
+
const web3authProvider = await web3auth.connectTo("auth", {
|
|
66
66
|
loginProvider: "google",
|
|
67
67
|
});
|
|
68
68
|
```
|
package/dist/lib.cjs/noModal.js
CHANGED
|
@@ -3,9 +3,9 @@
|
|
|
3
3
|
var _objectSpread = require('@babel/runtime/helpers/objectSpread2');
|
|
4
4
|
var _defineProperty = require('@babel/runtime/helpers/defineProperty');
|
|
5
5
|
var auth = require('@web3auth/auth');
|
|
6
|
+
var authAdapter = require('@web3auth/auth-adapter');
|
|
6
7
|
var base = require('@web3auth/base');
|
|
7
8
|
var baseProvider = require('@web3auth/base-provider');
|
|
8
|
-
var openloginAdapter = require('@web3auth/openlogin-adapter');
|
|
9
9
|
var deepmerge = require('deepmerge');
|
|
10
10
|
|
|
11
11
|
const ADAPTER_CACHE_KEY = "Web3Auth-cachedAdapter";
|
|
@@ -80,8 +80,8 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
|
|
|
80
80
|
useCoreKitKey: this.coreOptions.useCoreKitKey
|
|
81
81
|
});
|
|
82
82
|
}
|
|
83
|
-
if (adapterName === base.WALLET_ADAPTERS.
|
|
84
|
-
const
|
|
83
|
+
if (adapterName === base.WALLET_ADAPTERS.AUTH) {
|
|
84
|
+
const authAdapter$1 = this.walletAdapters[adapterName];
|
|
85
85
|
const {
|
|
86
86
|
whitelabel
|
|
87
87
|
} = projectConfig;
|
|
@@ -93,9 +93,9 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
|
|
|
93
93
|
key_export_enabled: keyExportEnabled
|
|
94
94
|
} = projectConfig;
|
|
95
95
|
if (smsOtpEnabled !== undefined) {
|
|
96
|
-
|
|
96
|
+
authAdapter$1.setAdapterSettings({
|
|
97
97
|
loginConfig: {
|
|
98
|
-
[
|
|
98
|
+
[authAdapter.LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
|
|
99
99
|
showOnModal: smsOtpEnabled,
|
|
100
100
|
showOnDesktop: smsOtpEnabled,
|
|
101
101
|
showOnMobile: smsOtpEnabled,
|
|
@@ -105,7 +105,7 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
|
|
|
105
105
|
});
|
|
106
106
|
}
|
|
107
107
|
if (whitelist) {
|
|
108
|
-
|
|
108
|
+
authAdapter$1.setAdapterSettings({
|
|
109
109
|
originData: whitelist.signed_urls
|
|
110
110
|
});
|
|
111
111
|
}
|
|
@@ -115,18 +115,18 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
|
|
|
115
115
|
this.commonJRPCProvider.setKeyExportFlag(keyExportEnabled);
|
|
116
116
|
}
|
|
117
117
|
if (this.coreOptions.privateKeyProvider) {
|
|
118
|
-
if (
|
|
119
|
-
throw base.WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for
|
|
118
|
+
if (authAdapter$1.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
|
|
119
|
+
throw base.WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for auth adapter");
|
|
120
120
|
}
|
|
121
|
-
|
|
121
|
+
authAdapter$1.setAdapterSettings({
|
|
122
122
|
privateKeyProvider: this.coreOptions.privateKeyProvider
|
|
123
123
|
});
|
|
124
124
|
}
|
|
125
|
-
|
|
125
|
+
authAdapter$1.setAdapterSettings({
|
|
126
126
|
whiteLabel: this.coreOptions.uiConfig
|
|
127
127
|
});
|
|
128
|
-
if (!
|
|
129
|
-
throw base.WalletInitializationError.invalidParams("privateKeyProvider is required for
|
|
128
|
+
if (!authAdapter$1.privateKeyProvider) {
|
|
129
|
+
throw base.WalletInitializationError.invalidParams("privateKeyProvider is required for auth adapter");
|
|
130
130
|
}
|
|
131
131
|
} else if (adapterName === base.WALLET_ADAPTERS.WALLET_CONNECT_V2) {
|
|
132
132
|
const walletConnectAdapter = this.walletAdapters[adapterName];
|
|
@@ -218,7 +218,7 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
|
|
|
218
218
|
}
|
|
219
219
|
async enableMFA(loginParams) {
|
|
220
220
|
if (this.status !== base.ADAPTER_STATUS.CONNECTED || !this.connectedAdapterName) throw base.WalletLoginError.notConnectedError(`No wallet is connected`);
|
|
221
|
-
if (this.connectedAdapterName !== base.WALLET_ADAPTERS.
|
|
221
|
+
if (this.connectedAdapterName !== base.WALLET_ADAPTERS.AUTH) throw base.WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
|
|
222
222
|
return this.walletAdapters[this.connectedAdapterName].enableMFA(loginParams);
|
|
223
223
|
}
|
|
224
224
|
async authenticateUser() {
|
|
@@ -317,13 +317,13 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
|
|
|
317
317
|
}
|
|
318
318
|
if (plugin.status === base.PLUGIN_STATUS.CONNECTED) return;
|
|
319
319
|
const {
|
|
320
|
-
|
|
320
|
+
authInstance
|
|
321
321
|
} = this.walletAdapters[this.connectedAdapterName];
|
|
322
322
|
const {
|
|
323
323
|
options,
|
|
324
324
|
sessionId,
|
|
325
325
|
sessionNamespace
|
|
326
|
-
} =
|
|
326
|
+
} = authInstance || {};
|
|
327
327
|
await plugin.initWithWeb3Auth(this, options.whiteLabel);
|
|
328
328
|
await plugin.connect({
|
|
329
329
|
sessionId,
|
package/dist/lib.esm/noModal.js
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import _objectSpread from '@babel/runtime/helpers/objectSpread2';
|
|
2
2
|
import _defineProperty from '@babel/runtime/helpers/defineProperty';
|
|
3
3
|
import { SafeEventEmitter } from '@web3auth/auth';
|
|
4
|
+
import { LOGIN_PROVIDER } from '@web3auth/auth-adapter';
|
|
4
5
|
import { ADAPTER_STATUS, WalletInitializationError, log, CHAIN_NAMESPACES, storageAvailable, getChainConfig, fetchProjectConfig, WALLET_ADAPTERS, cloneDeep, ADAPTER_EVENTS, ADAPTER_NAMESPACES, WalletLoginError, PLUGIN_NAMESPACES, PLUGIN_STATUS } from '@web3auth/base';
|
|
5
6
|
import { CommonJRPCProvider } from '@web3auth/base-provider';
|
|
6
|
-
import { LOGIN_PROVIDER } from '@web3auth/openlogin-adapter';
|
|
7
7
|
import deepmerge from 'deepmerge';
|
|
8
8
|
|
|
9
9
|
const ADAPTER_CACHE_KEY = "Web3Auth-cachedAdapter";
|
|
@@ -78,8 +78,8 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
78
78
|
useCoreKitKey: this.coreOptions.useCoreKitKey
|
|
79
79
|
});
|
|
80
80
|
}
|
|
81
|
-
if (adapterName === WALLET_ADAPTERS.
|
|
82
|
-
const
|
|
81
|
+
if (adapterName === WALLET_ADAPTERS.AUTH) {
|
|
82
|
+
const authAdapter = this.walletAdapters[adapterName];
|
|
83
83
|
const {
|
|
84
84
|
whitelabel
|
|
85
85
|
} = projectConfig;
|
|
@@ -91,7 +91,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
91
91
|
key_export_enabled: keyExportEnabled
|
|
92
92
|
} = projectConfig;
|
|
93
93
|
if (smsOtpEnabled !== undefined) {
|
|
94
|
-
|
|
94
|
+
authAdapter.setAdapterSettings({
|
|
95
95
|
loginConfig: {
|
|
96
96
|
[LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
|
|
97
97
|
showOnModal: smsOtpEnabled,
|
|
@@ -103,7 +103,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
103
103
|
});
|
|
104
104
|
}
|
|
105
105
|
if (whitelist) {
|
|
106
|
-
|
|
106
|
+
authAdapter.setAdapterSettings({
|
|
107
107
|
originData: whitelist.signed_urls
|
|
108
108
|
});
|
|
109
109
|
}
|
|
@@ -113,18 +113,18 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
113
113
|
this.commonJRPCProvider.setKeyExportFlag(keyExportEnabled);
|
|
114
114
|
}
|
|
115
115
|
if (this.coreOptions.privateKeyProvider) {
|
|
116
|
-
if (
|
|
117
|
-
throw WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for
|
|
116
|
+
if (authAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
|
|
117
|
+
throw WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for auth adapter");
|
|
118
118
|
}
|
|
119
|
-
|
|
119
|
+
authAdapter.setAdapterSettings({
|
|
120
120
|
privateKeyProvider: this.coreOptions.privateKeyProvider
|
|
121
121
|
});
|
|
122
122
|
}
|
|
123
|
-
|
|
123
|
+
authAdapter.setAdapterSettings({
|
|
124
124
|
whiteLabel: this.coreOptions.uiConfig
|
|
125
125
|
});
|
|
126
|
-
if (!
|
|
127
|
-
throw WalletInitializationError.invalidParams("privateKeyProvider is required for
|
|
126
|
+
if (!authAdapter.privateKeyProvider) {
|
|
127
|
+
throw WalletInitializationError.invalidParams("privateKeyProvider is required for auth adapter");
|
|
128
128
|
}
|
|
129
129
|
} else if (adapterName === WALLET_ADAPTERS.WALLET_CONNECT_V2) {
|
|
130
130
|
const walletConnectAdapter = this.walletAdapters[adapterName];
|
|
@@ -216,7 +216,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
216
216
|
}
|
|
217
217
|
async enableMFA(loginParams) {
|
|
218
218
|
if (this.status !== ADAPTER_STATUS.CONNECTED || !this.connectedAdapterName) throw WalletLoginError.notConnectedError(`No wallet is connected`);
|
|
219
|
-
if (this.connectedAdapterName !== WALLET_ADAPTERS.
|
|
219
|
+
if (this.connectedAdapterName !== WALLET_ADAPTERS.AUTH) throw WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
|
|
220
220
|
return this.walletAdapters[this.connectedAdapterName].enableMFA(loginParams);
|
|
221
221
|
}
|
|
222
222
|
async authenticateUser() {
|
|
@@ -315,13 +315,13 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
315
315
|
}
|
|
316
316
|
if (plugin.status === PLUGIN_STATUS.CONNECTED) return;
|
|
317
317
|
const {
|
|
318
|
-
|
|
318
|
+
authInstance
|
|
319
319
|
} = this.walletAdapters[this.connectedAdapterName];
|
|
320
320
|
const {
|
|
321
321
|
options,
|
|
322
322
|
sessionId,
|
|
323
323
|
sessionNamespace
|
|
324
|
-
} =
|
|
324
|
+
} = authInstance || {};
|
|
325
325
|
await plugin.initWithWeb3Auth(this, options.whiteLabel);
|
|
326
326
|
await plugin.connect({
|
|
327
327
|
sessionId,
|
package/dist/noModal.cjs.js
CHANGED
|
@@ -62,12 +62,12 @@ const defineProperty_namespaceObject = require("@babel/runtime/helpers/definePro
|
|
|
62
62
|
var defineProperty_default = /*#__PURE__*/__webpack_require__.n(defineProperty_namespaceObject);
|
|
63
63
|
;// CONCATENATED MODULE: external "@web3auth/auth"
|
|
64
64
|
const auth_namespaceObject = require("@web3auth/auth");
|
|
65
|
+
;// CONCATENATED MODULE: external "@web3auth/auth-adapter"
|
|
66
|
+
const auth_adapter_namespaceObject = require("@web3auth/auth-adapter");
|
|
65
67
|
;// CONCATENATED MODULE: external "@web3auth/base"
|
|
66
68
|
const base_namespaceObject = require("@web3auth/base");
|
|
67
69
|
;// CONCATENATED MODULE: external "@web3auth/base-provider"
|
|
68
70
|
const base_provider_namespaceObject = require("@web3auth/base-provider");
|
|
69
|
-
;// CONCATENATED MODULE: external "@web3auth/openlogin-adapter"
|
|
70
|
-
const openlogin_adapter_namespaceObject = require("@web3auth/openlogin-adapter");
|
|
71
71
|
;// CONCATENATED MODULE: external "deepmerge"
|
|
72
72
|
const external_deepmerge_namespaceObject = require("deepmerge");
|
|
73
73
|
var external_deepmerge_default = /*#__PURE__*/__webpack_require__.n(external_deepmerge_namespaceObject);
|
|
@@ -151,8 +151,8 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
|
|
|
151
151
|
useCoreKitKey: this.coreOptions.useCoreKitKey
|
|
152
152
|
});
|
|
153
153
|
}
|
|
154
|
-
if (adapterName === base_namespaceObject.WALLET_ADAPTERS.
|
|
155
|
-
const
|
|
154
|
+
if (adapterName === base_namespaceObject.WALLET_ADAPTERS.AUTH) {
|
|
155
|
+
const authAdapter = this.walletAdapters[adapterName];
|
|
156
156
|
const {
|
|
157
157
|
whitelabel
|
|
158
158
|
} = projectConfig;
|
|
@@ -164,9 +164,9 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
|
|
|
164
164
|
key_export_enabled: keyExportEnabled
|
|
165
165
|
} = projectConfig;
|
|
166
166
|
if (smsOtpEnabled !== undefined) {
|
|
167
|
-
|
|
167
|
+
authAdapter.setAdapterSettings({
|
|
168
168
|
loginConfig: {
|
|
169
|
-
[
|
|
169
|
+
[auth_adapter_namespaceObject.LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
|
|
170
170
|
showOnModal: smsOtpEnabled,
|
|
171
171
|
showOnDesktop: smsOtpEnabled,
|
|
172
172
|
showOnMobile: smsOtpEnabled,
|
|
@@ -176,7 +176,7 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
|
|
|
176
176
|
});
|
|
177
177
|
}
|
|
178
178
|
if (whitelist) {
|
|
179
|
-
|
|
179
|
+
authAdapter.setAdapterSettings({
|
|
180
180
|
originData: whitelist.signed_urls
|
|
181
181
|
});
|
|
182
182
|
}
|
|
@@ -186,18 +186,18 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
|
|
|
186
186
|
this.commonJRPCProvider.setKeyExportFlag(keyExportEnabled);
|
|
187
187
|
}
|
|
188
188
|
if (this.coreOptions.privateKeyProvider) {
|
|
189
|
-
if (
|
|
190
|
-
throw base_namespaceObject.WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for
|
|
189
|
+
if (authAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
|
|
190
|
+
throw base_namespaceObject.WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for auth adapter");
|
|
191
191
|
}
|
|
192
|
-
|
|
192
|
+
authAdapter.setAdapterSettings({
|
|
193
193
|
privateKeyProvider: this.coreOptions.privateKeyProvider
|
|
194
194
|
});
|
|
195
195
|
}
|
|
196
|
-
|
|
196
|
+
authAdapter.setAdapterSettings({
|
|
197
197
|
whiteLabel: this.coreOptions.uiConfig
|
|
198
198
|
});
|
|
199
|
-
if (!
|
|
200
|
-
throw base_namespaceObject.WalletInitializationError.invalidParams("privateKeyProvider is required for
|
|
199
|
+
if (!authAdapter.privateKeyProvider) {
|
|
200
|
+
throw base_namespaceObject.WalletInitializationError.invalidParams("privateKeyProvider is required for auth adapter");
|
|
201
201
|
}
|
|
202
202
|
} else if (adapterName === base_namespaceObject.WALLET_ADAPTERS.WALLET_CONNECT_V2) {
|
|
203
203
|
const walletConnectAdapter = this.walletAdapters[adapterName];
|
|
@@ -289,7 +289,7 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
|
|
|
289
289
|
}
|
|
290
290
|
async enableMFA(loginParams) {
|
|
291
291
|
if (this.status !== base_namespaceObject.ADAPTER_STATUS.CONNECTED || !this.connectedAdapterName) throw base_namespaceObject.WalletLoginError.notConnectedError(`No wallet is connected`);
|
|
292
|
-
if (this.connectedAdapterName !== base_namespaceObject.WALLET_ADAPTERS.
|
|
292
|
+
if (this.connectedAdapterName !== base_namespaceObject.WALLET_ADAPTERS.AUTH) throw base_namespaceObject.WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
|
|
293
293
|
return this.walletAdapters[this.connectedAdapterName].enableMFA(loginParams);
|
|
294
294
|
}
|
|
295
295
|
async authenticateUser() {
|
|
@@ -388,13 +388,13 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
|
|
|
388
388
|
}
|
|
389
389
|
if (plugin.status === base_namespaceObject.PLUGIN_STATUS.CONNECTED) return;
|
|
390
390
|
const {
|
|
391
|
-
|
|
391
|
+
authInstance
|
|
392
392
|
} = this.walletAdapters[this.connectedAdapterName];
|
|
393
393
|
const {
|
|
394
394
|
options,
|
|
395
395
|
sessionId,
|
|
396
396
|
sessionNamespace
|
|
397
|
-
} =
|
|
397
|
+
} = authInstance || {};
|
|
398
398
|
await plugin.initWithWeb3Auth(this, options.whiteLabel);
|
|
399
399
|
await plugin.connect({
|
|
400
400
|
sessionId,
|
package/dist/noModal.esm.js
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import _objectSpread from '@babel/runtime/helpers/objectSpread2';
|
|
2
2
|
import _defineProperty from '@babel/runtime/helpers/defineProperty';
|
|
3
3
|
import { SafeEventEmitter } from '@web3auth/auth';
|
|
4
|
+
import { LOGIN_PROVIDER } from '@web3auth/auth-adapter';
|
|
4
5
|
import { ADAPTER_STATUS, WalletInitializationError, log, CHAIN_NAMESPACES, storageAvailable, getChainConfig, fetchProjectConfig, WALLET_ADAPTERS, cloneDeep, ADAPTER_EVENTS, ADAPTER_NAMESPACES, WalletLoginError, PLUGIN_NAMESPACES, PLUGIN_STATUS } from '@web3auth/base';
|
|
5
6
|
import { CommonJRPCProvider } from '@web3auth/base-provider';
|
|
6
|
-
import { LOGIN_PROVIDER } from '@web3auth/openlogin-adapter';
|
|
7
7
|
import deepmerge from 'deepmerge';
|
|
8
8
|
|
|
9
9
|
const ADAPTER_CACHE_KEY = "Web3Auth-cachedAdapter";
|
|
@@ -78,8 +78,8 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
78
78
|
useCoreKitKey: this.coreOptions.useCoreKitKey
|
|
79
79
|
});
|
|
80
80
|
}
|
|
81
|
-
if (adapterName === WALLET_ADAPTERS.
|
|
82
|
-
const
|
|
81
|
+
if (adapterName === WALLET_ADAPTERS.AUTH) {
|
|
82
|
+
const authAdapter = this.walletAdapters[adapterName];
|
|
83
83
|
const {
|
|
84
84
|
whitelabel
|
|
85
85
|
} = projectConfig;
|
|
@@ -91,7 +91,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
91
91
|
key_export_enabled: keyExportEnabled
|
|
92
92
|
} = projectConfig;
|
|
93
93
|
if (smsOtpEnabled !== undefined) {
|
|
94
|
-
|
|
94
|
+
authAdapter.setAdapterSettings({
|
|
95
95
|
loginConfig: {
|
|
96
96
|
[LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
|
|
97
97
|
showOnModal: smsOtpEnabled,
|
|
@@ -103,7 +103,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
103
103
|
});
|
|
104
104
|
}
|
|
105
105
|
if (whitelist) {
|
|
106
|
-
|
|
106
|
+
authAdapter.setAdapterSettings({
|
|
107
107
|
originData: whitelist.signed_urls
|
|
108
108
|
});
|
|
109
109
|
}
|
|
@@ -113,18 +113,18 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
113
113
|
this.commonJRPCProvider.setKeyExportFlag(keyExportEnabled);
|
|
114
114
|
}
|
|
115
115
|
if (this.coreOptions.privateKeyProvider) {
|
|
116
|
-
if (
|
|
117
|
-
throw WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for
|
|
116
|
+
if (authAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
|
|
117
|
+
throw WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for auth adapter");
|
|
118
118
|
}
|
|
119
|
-
|
|
119
|
+
authAdapter.setAdapterSettings({
|
|
120
120
|
privateKeyProvider: this.coreOptions.privateKeyProvider
|
|
121
121
|
});
|
|
122
122
|
}
|
|
123
|
-
|
|
123
|
+
authAdapter.setAdapterSettings({
|
|
124
124
|
whiteLabel: this.coreOptions.uiConfig
|
|
125
125
|
});
|
|
126
|
-
if (!
|
|
127
|
-
throw WalletInitializationError.invalidParams("privateKeyProvider is required for
|
|
126
|
+
if (!authAdapter.privateKeyProvider) {
|
|
127
|
+
throw WalletInitializationError.invalidParams("privateKeyProvider is required for auth adapter");
|
|
128
128
|
}
|
|
129
129
|
} else if (adapterName === WALLET_ADAPTERS.WALLET_CONNECT_V2) {
|
|
130
130
|
const walletConnectAdapter = this.walletAdapters[adapterName];
|
|
@@ -216,7 +216,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
216
216
|
}
|
|
217
217
|
async enableMFA(loginParams) {
|
|
218
218
|
if (this.status !== ADAPTER_STATUS.CONNECTED || !this.connectedAdapterName) throw WalletLoginError.notConnectedError(`No wallet is connected`);
|
|
219
|
-
if (this.connectedAdapterName !== WALLET_ADAPTERS.
|
|
219
|
+
if (this.connectedAdapterName !== WALLET_ADAPTERS.AUTH) throw WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
|
|
220
220
|
return this.walletAdapters[this.connectedAdapterName].enableMFA(loginParams);
|
|
221
221
|
}
|
|
222
222
|
async authenticateUser() {
|
|
@@ -315,13 +315,13 @@ class Web3AuthNoModal extends SafeEventEmitter {
|
|
|
315
315
|
}
|
|
316
316
|
if (plugin.status === PLUGIN_STATUS.CONNECTED) return;
|
|
317
317
|
const {
|
|
318
|
-
|
|
318
|
+
authInstance
|
|
319
319
|
} = this.walletAdapters[this.connectedAdapterName];
|
|
320
320
|
const {
|
|
321
321
|
options,
|
|
322
322
|
sessionId,
|
|
323
323
|
sessionNamespace
|
|
324
|
-
} =
|
|
324
|
+
} = authInstance || {};
|
|
325
325
|
await plugin.initWithWeb3Auth(this, options.whiteLabel);
|
|
326
326
|
await plugin.connect({
|
|
327
327
|
sessionId,
|