@dynamic-labs/stellar 4.69.0 → 4.71.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +34 -0
- package/package.cjs +1 -1
- package/package.js +1 -1
- package/package.json +9 -9
- package/src/connectors/DynamicWaasStellarConnector/DynamicWaasStellarConnector.cjs +12 -4
- package/src/connectors/DynamicWaasStellarConnector/DynamicWaasStellarConnector.d.ts +8 -4
- package/src/connectors/DynamicWaasStellarConnector/DynamicWaasStellarConnector.js +13 -5
package/CHANGELOG.md
CHANGED
|
@@ -1,4 +1,38 @@
|
|
|
1
1
|
|
|
2
|
+
## [4.71.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.70.0...v4.71.0) (2026-03-24)
|
|
3
|
+
|
|
4
|
+
|
|
5
|
+
### Features
|
|
6
|
+
|
|
7
|
+
* add Tempo chain connector and core type definitions ([#10672](https://github.com/dynamic-labs/dynamic-auth/issues/10672)) ([0439c15](https://github.com/dynamic-labs/dynamic-auth/commit/0439c153238359083b9f226dcd2ebf6d83e26519))
|
|
8
|
+
* add verifySocial method to demo site step-up auth methods ([#10721](https://github.com/dynamic-labs/dynamic-auth/issues/10721)) ([b9ef517](https://github.com/dynamic-labs/dynamic-auth/commit/b9ef5173df3e3ed08f718de49b036ea899dc1832))
|
|
9
|
+
* **demo:** add Tempo chain support to demo app ([#10674](https://github.com/dynamic-labs/dynamic-auth/issues/10674)) ([a5918fc](https://github.com/dynamic-labs/dynamic-auth/commit/a5918fc2ab0821e7f025aa470573129f71de33cc))
|
|
10
|
+
* repurpose verifyWithExternalJwt for elevated access token requests ([#10743](https://github.com/dynamic-labs/dynamic-auth/issues/10743)) ([d1abda0](https://github.com/dynamic-labs/dynamic-auth/commit/d1abda0111d68c78226d30bd0630e6e341dedad9))
|
|
11
|
+
* **sdk:** add Tempo chain support to UI components ([#10673](https://github.com/dynamic-labs/dynamic-auth/issues/10673)) ([aec9fbb](https://github.com/dynamic-labs/dynamic-auth/commit/aec9fbb20754a2935bffe106e7e8715f46be3de7))
|
|
12
|
+
* support multi-chain wallet creation in createWallet ([#10694](https://github.com/dynamic-labs/dynamic-auth/issues/10694)) ([0b6b57f](https://github.com/dynamic-labs/dynamic-auth/commit/0b6b57f4179c35d1f86d1c8c9c40f52cb307c849))
|
|
13
|
+
* wire up elevatedAccessToken for sign, reshare, and refresh operations ([#10737](https://github.com/dynamic-labs/dynamic-auth/issues/10737)) ([f9d5c76](https://github.com/dynamic-labs/dynamic-auth/commit/f9d5c768037aff4f5d7994b6bc6c338621a6ee6b))
|
|
14
|
+
|
|
15
|
+
## [4.70.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.69.0...v4.70.0) (2026-03-23)
|
|
16
|
+
|
|
17
|
+
|
|
18
|
+
### Features
|
|
19
|
+
|
|
20
|
+
* add step-up auth for passkey and TOTP device deletion ([#10688](https://github.com/dynamic-labs/dynamic-auth/issues/10688)) ([aeae325](https://github.com/dynamic-labs/dynamic-auth/commit/aeae32551d3e29c59a1d183984f1d9f00f1df2cb))
|
|
21
|
+
* add stepup authMode to useSocialAuth for OAuth step-up authentication ([#10701](https://github.com/dynamic-labs/dynamic-auth/issues/10701)) ([f8ac0e4](https://github.com/dynamic-labs/dynamic-auth/commit/f8ac0e4a6a039e61d1c83e434e2f678981ff3911))
|
|
22
|
+
* add StepUpReauthSocialView and wire social option in step-up reauth UI ([#10703](https://github.com/dynamic-labs/dynamic-auth/issues/10703)) ([a49393f](https://github.com/dynamic-labs/dynamic-auth/commit/a49393f54a8f210f9cbca892339c3012d38cc5c2))
|
|
23
|
+
* add useStepUpSocial and extend step-up auth for OAuth reauthentication ([#10702](https://github.com/dynamic-labs/dynamic-auth/issues/10702)) ([fb7e21d](https://github.com/dynamic-labs/dynamic-auth/commit/fb7e21d47b3e40659ae3b8ca9321efe1d4401e60))
|
|
24
|
+
|
|
25
|
+
|
|
26
|
+
### Bug Fixes
|
|
27
|
+
|
|
28
|
+
* aleo defaulting to testnet when connecting ([#10726](https://github.com/dynamic-labs/dynamic-auth/issues/10726)) ([24b0378](https://github.com/dynamic-labs/dynamic-auth/commit/24b0378a25902f5a134940aeeadc9846058d6fb1))
|
|
29
|
+
* override basic-ftp to >=5.2.0 (CVE-2026-27699) ([#10715](https://github.com/dynamic-labs/dynamic-auth/issues/10715)) ([b68a405](https://github.com/dynamic-labs/dynamic-auth/commit/b68a405453f0ea7e04c14492c195b46fbf25b47e))
|
|
30
|
+
* override minimatch to patched versions (CVE-2026-26996) ([#10718](https://github.com/dynamic-labs/dynamic-auth/issues/10718)) ([a69aaee](https://github.com/dynamic-labs/dynamic-auth/commit/a69aaee0859b7e1292a244abde7084f7c4cfdb72))
|
|
31
|
+
* override simple-git to >=3.32.3 (CVE-2026-28292) ([#10717](https://github.com/dynamic-labs/dynamic-auth/issues/10717)) ([8b86545](https://github.com/dynamic-labs/dynamic-auth/commit/8b865453737e4ff0ef9e8d0fbb99ea5f0359af3b))
|
|
32
|
+
* revert session chaining PR to fix IndexedDB webview crash ([#10710](https://github.com/dynamic-labs/dynamic-auth/issues/10710)) ([c4dfe66](https://github.com/dynamic-labs/dynamic-auth/commit/c4dfe66f73e6b9b7115260b06fd90fc0a167e139)), closes [#10706](https://github.com/dynamic-labs/dynamic-auth/issues/10706) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423) [#10706](https://github.com/dynamic-labs/dynamic-auth/issues/10706) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423)
|
|
33
|
+
* update tar, serialize-javascript, svgo overrides ([#10727](https://github.com/dynamic-labs/dynamic-auth/issues/10727)) ([3c764f7](https://github.com/dynamic-labs/dynamic-auth/commit/3c764f71ce2870075eaa800389719a46d8dac233))
|
|
34
|
+
* upgrade rollup to patched versions (CVE-2026-27606) ([#10724](https://github.com/dynamic-labs/dynamic-auth/issues/10724)) ([735133e](https://github.com/dynamic-labs/dynamic-auth/commit/735133e6d4129cad20ae82b86f9507ab9227b36e))
|
|
35
|
+
|
|
2
36
|
## [4.69.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.68.0...v4.69.0) (2026-03-19)
|
|
3
37
|
|
|
4
38
|
|
package/package.cjs
CHANGED
package/package.js
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs/stellar",
|
|
3
|
-
"version": "4.
|
|
3
|
+
"version": "4.71.0",
|
|
4
4
|
"description": "A React SDK for implementing Stellar wallet web3 authentication and authorization to your website.",
|
|
5
5
|
"author": "Dynamic Labs, Inc.",
|
|
6
6
|
"license": "MIT",
|
|
@@ -18,17 +18,17 @@
|
|
|
18
18
|
},
|
|
19
19
|
"homepage": "https://www.dynamic.xyz/",
|
|
20
20
|
"dependencies": {
|
|
21
|
-
"@dynamic-labs/sdk-api-core": "0.0.
|
|
21
|
+
"@dynamic-labs/sdk-api-core": "0.0.909",
|
|
22
22
|
"@stellar/stellar-sdk": "14.4.3",
|
|
23
|
-
"@dynamic-labs/wallet-connector-core": "4.
|
|
24
|
-
"@dynamic-labs/assert-package-version": "4.
|
|
23
|
+
"@dynamic-labs/wallet-connector-core": "4.71.0",
|
|
24
|
+
"@dynamic-labs/assert-package-version": "4.71.0",
|
|
25
25
|
"@lobstrco/signer-extension-api": "2.0.0",
|
|
26
26
|
"@stellar/freighter-api": "6.0.1",
|
|
27
|
-
"@dynamic-labs/logger": "4.
|
|
28
|
-
"@dynamic-labs/types": "4.
|
|
29
|
-
"@dynamic-labs/utils": "4.
|
|
30
|
-
"@dynamic-labs/waas": "4.
|
|
31
|
-
"@dynamic-labs/wallet-book": "4.
|
|
27
|
+
"@dynamic-labs/logger": "4.71.0",
|
|
28
|
+
"@dynamic-labs/types": "4.71.0",
|
|
29
|
+
"@dynamic-labs/utils": "4.71.0",
|
|
30
|
+
"@dynamic-labs/waas": "4.71.0",
|
|
31
|
+
"@dynamic-labs/wallet-book": "4.71.0",
|
|
32
32
|
"eventemitter3": "5.0.1"
|
|
33
33
|
},
|
|
34
34
|
"peerDependencies": {}
|
|
@@ -185,7 +185,7 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
|
|
|
185
185
|
*/
|
|
186
186
|
internalSignMessage(message) {
|
|
187
187
|
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
188
|
-
var _a, _b;
|
|
188
|
+
var _a, _b, _c;
|
|
189
189
|
this.ensureActiveAccountFromVerifiedCredentials();
|
|
190
190
|
const walletClient = yield this.getWaasWalletClient();
|
|
191
191
|
if (!this.activeAccountAddress) {
|
|
@@ -195,12 +195,16 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
|
|
|
195
195
|
const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
|
|
196
196
|
mfaAction: sdkApiCore.MFAAction.WalletWaasSign,
|
|
197
197
|
}));
|
|
198
|
+
const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
|
|
199
|
+
scope: sdkApiCore.TokenScope.Walletsign,
|
|
200
|
+
}));
|
|
198
201
|
const password = yield this.getPasswordIfNeeded({
|
|
199
202
|
accountAddress: this.activeAccountAddress,
|
|
200
203
|
});
|
|
201
204
|
const signedMessage = yield walletClient.signMessage({
|
|
202
205
|
accountAddress: this.activeAccountAddress,
|
|
203
|
-
authToken: (
|
|
206
|
+
authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
|
|
207
|
+
elevatedAccessToken,
|
|
204
208
|
message,
|
|
205
209
|
mfaToken,
|
|
206
210
|
password,
|
|
@@ -242,7 +246,7 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
|
|
|
242
246
|
*/
|
|
243
247
|
signTransaction(transactionXdr) {
|
|
244
248
|
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
245
|
-
var _a, _b;
|
|
249
|
+
var _a, _b, _c;
|
|
246
250
|
if (!this.activeAccountAddress) {
|
|
247
251
|
throw new utils.DynamicError('Active account address is required');
|
|
248
252
|
}
|
|
@@ -251,6 +255,9 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
|
|
|
251
255
|
const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
|
|
252
256
|
mfaAction: sdkApiCore.MFAAction.WalletWaasSign,
|
|
253
257
|
}));
|
|
258
|
+
const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
|
|
259
|
+
scope: sdkApiCore.TokenScope.Walletsign,
|
|
260
|
+
}));
|
|
254
261
|
const password = yield this.getPasswordIfNeeded({
|
|
255
262
|
accountAddress: this.activeAccountAddress,
|
|
256
263
|
});
|
|
@@ -260,8 +267,9 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
|
|
|
260
267
|
// Sign the transaction XDR using MPC
|
|
261
268
|
// The SDK will compute the hash internally and build the context for policy validation
|
|
262
269
|
const signature = yield walletClient.signTransaction({
|
|
263
|
-
authToken: (
|
|
270
|
+
authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
|
|
264
271
|
chainId,
|
|
272
|
+
elevatedAccessToken,
|
|
265
273
|
mfaToken,
|
|
266
274
|
password,
|
|
267
275
|
senderAddress: this.activeAccountAddress,
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import { JwtVerifiedCredential, MFAAction, SignMessageContext } from '@dynamic-labs/sdk-api-core';
|
|
1
|
+
import { JwtVerifiedCredential, MFAAction, SignMessageContext, TokenScope } from '@dynamic-labs/sdk-api-core';
|
|
2
2
|
import { IUITransaction, WalletUiUtils } from '@dynamic-labs/types';
|
|
3
3
|
import { IDynamicWaasConnector, InternalWalletConnector } from '@dynamic-labs/wallet-connector-core';
|
|
4
4
|
import { Logger } from '@dynamic-labs/logger';
|
|
@@ -20,7 +20,7 @@ declare const DynamicWaasStellarConnector_base: (abstract new (...args: any[]) =
|
|
|
20
20
|
getWalletPassword?: import("@dynamic-labs/wallet-connector-core").GetWalletPasswordFn | undefined;
|
|
21
21
|
getAuthToken?: (() => string) | undefined;
|
|
22
22
|
getElevatedAccessToken?: ((props: {
|
|
23
|
-
scope:
|
|
23
|
+
scope: TokenScope;
|
|
24
24
|
}) => Promise<string | undefined>) | undefined;
|
|
25
25
|
environmentId?: string | undefined;
|
|
26
26
|
baseApiUrl?: string | undefined;
|
|
@@ -38,7 +38,7 @@ declare const DynamicWaasStellarConnector_base: (abstract new (...args: any[]) =
|
|
|
38
38
|
mfaAction?: MFAAction | undefined;
|
|
39
39
|
} | undefined) => Promise<string | undefined>): void;
|
|
40
40
|
setGetElevatedAccessTokenFunction(getElevatedAccessToken: (params: {
|
|
41
|
-
scope:
|
|
41
|
+
scope: TokenScope;
|
|
42
42
|
}) => Promise<string | undefined>): void;
|
|
43
43
|
setGetWalletPasswordFunction(getWalletPassword: import("@dynamic-labs/wallet-connector-core").GetWalletPasswordFn): void;
|
|
44
44
|
getPasswordIfNeeded({ accountAddress, }: {
|
|
@@ -87,7 +87,11 @@ declare const DynamicWaasStellarConnector_base: (abstract new (...args: any[]) =
|
|
|
87
87
|
}): Promise<void>;
|
|
88
88
|
backupKeySharesToGoogleDrive({ accountAddress, password, }: {
|
|
89
89
|
accountAddress: string;
|
|
90
|
-
password?: string | undefined;
|
|
90
|
+
password?: string | undefined; /**
|
|
91
|
+
* Requires and returns the signed session ID
|
|
92
|
+
* @returns The signed session ID
|
|
93
|
+
* @throws {DynamicError} If signed session ID is not available
|
|
94
|
+
*/
|
|
91
95
|
}): Promise<void>;
|
|
92
96
|
exportClientKeysharesFromGoogleDrive({ accountAddress, password, }: {
|
|
93
97
|
accountAddress: string;
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'use client'
|
|
2
2
|
import { __awaiter } from '../../../_virtual/_tslib.js';
|
|
3
3
|
import { TransactionBuilder } from '@stellar/stellar-sdk';
|
|
4
|
-
import { MFAAction } from '@dynamic-labs/sdk-api-core';
|
|
4
|
+
import { MFAAction, TokenScope } from '@dynamic-labs/sdk-api-core';
|
|
5
5
|
import { DynamicError } from '@dynamic-labs/utils';
|
|
6
6
|
import { withDynamicWaas } from '@dynamic-labs/waas';
|
|
7
7
|
import { isSameAddress } from '@dynamic-labs/wallet-connector-core';
|
|
@@ -181,7 +181,7 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
|
|
|
181
181
|
*/
|
|
182
182
|
internalSignMessage(message) {
|
|
183
183
|
return __awaiter(this, void 0, void 0, function* () {
|
|
184
|
-
var _a, _b;
|
|
184
|
+
var _a, _b, _c;
|
|
185
185
|
this.ensureActiveAccountFromVerifiedCredentials();
|
|
186
186
|
const walletClient = yield this.getWaasWalletClient();
|
|
187
187
|
if (!this.activeAccountAddress) {
|
|
@@ -191,12 +191,16 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
|
|
|
191
191
|
const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
|
|
192
192
|
mfaAction: MFAAction.WalletWaasSign,
|
|
193
193
|
}));
|
|
194
|
+
const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
|
|
195
|
+
scope: TokenScope.Walletsign,
|
|
196
|
+
}));
|
|
194
197
|
const password = yield this.getPasswordIfNeeded({
|
|
195
198
|
accountAddress: this.activeAccountAddress,
|
|
196
199
|
});
|
|
197
200
|
const signedMessage = yield walletClient.signMessage({
|
|
198
201
|
accountAddress: this.activeAccountAddress,
|
|
199
|
-
authToken: (
|
|
202
|
+
authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
|
|
203
|
+
elevatedAccessToken,
|
|
200
204
|
message,
|
|
201
205
|
mfaToken,
|
|
202
206
|
password,
|
|
@@ -238,7 +242,7 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
|
|
|
238
242
|
*/
|
|
239
243
|
signTransaction(transactionXdr) {
|
|
240
244
|
return __awaiter(this, void 0, void 0, function* () {
|
|
241
|
-
var _a, _b;
|
|
245
|
+
var _a, _b, _c;
|
|
242
246
|
if (!this.activeAccountAddress) {
|
|
243
247
|
throw new DynamicError('Active account address is required');
|
|
244
248
|
}
|
|
@@ -247,6 +251,9 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
|
|
|
247
251
|
const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
|
|
248
252
|
mfaAction: MFAAction.WalletWaasSign,
|
|
249
253
|
}));
|
|
254
|
+
const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
|
|
255
|
+
scope: TokenScope.Walletsign,
|
|
256
|
+
}));
|
|
250
257
|
const password = yield this.getPasswordIfNeeded({
|
|
251
258
|
accountAddress: this.activeAccountAddress,
|
|
252
259
|
});
|
|
@@ -256,8 +263,9 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
|
|
|
256
263
|
// Sign the transaction XDR using MPC
|
|
257
264
|
// The SDK will compute the hash internally and build the context for policy validation
|
|
258
265
|
const signature = yield walletClient.signTransaction({
|
|
259
|
-
authToken: (
|
|
266
|
+
authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
|
|
260
267
|
chainId,
|
|
268
|
+
elevatedAccessToken,
|
|
261
269
|
mfaToken,
|
|
262
270
|
password,
|
|
263
271
|
senderAddress: this.activeAccountAddress,
|