@dynamic-labs/stellar 4.69.0 → 4.71.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,4 +1,38 @@
1
1
 
2
+ ## [4.71.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.70.0...v4.71.0) (2026-03-24)
3
+
4
+
5
+ ### Features
6
+
7
+ * add Tempo chain connector and core type definitions ([#10672](https://github.com/dynamic-labs/dynamic-auth/issues/10672)) ([0439c15](https://github.com/dynamic-labs/dynamic-auth/commit/0439c153238359083b9f226dcd2ebf6d83e26519))
8
+ * add verifySocial method to demo site step-up auth methods ([#10721](https://github.com/dynamic-labs/dynamic-auth/issues/10721)) ([b9ef517](https://github.com/dynamic-labs/dynamic-auth/commit/b9ef5173df3e3ed08f718de49b036ea899dc1832))
9
+ * **demo:** add Tempo chain support to demo app ([#10674](https://github.com/dynamic-labs/dynamic-auth/issues/10674)) ([a5918fc](https://github.com/dynamic-labs/dynamic-auth/commit/a5918fc2ab0821e7f025aa470573129f71de33cc))
10
+ * repurpose verifyWithExternalJwt for elevated access token requests ([#10743](https://github.com/dynamic-labs/dynamic-auth/issues/10743)) ([d1abda0](https://github.com/dynamic-labs/dynamic-auth/commit/d1abda0111d68c78226d30bd0630e6e341dedad9))
11
+ * **sdk:** add Tempo chain support to UI components ([#10673](https://github.com/dynamic-labs/dynamic-auth/issues/10673)) ([aec9fbb](https://github.com/dynamic-labs/dynamic-auth/commit/aec9fbb20754a2935bffe106e7e8715f46be3de7))
12
+ * support multi-chain wallet creation in createWallet ([#10694](https://github.com/dynamic-labs/dynamic-auth/issues/10694)) ([0b6b57f](https://github.com/dynamic-labs/dynamic-auth/commit/0b6b57f4179c35d1f86d1c8c9c40f52cb307c849))
13
+ * wire up elevatedAccessToken for sign, reshare, and refresh operations ([#10737](https://github.com/dynamic-labs/dynamic-auth/issues/10737)) ([f9d5c76](https://github.com/dynamic-labs/dynamic-auth/commit/f9d5c768037aff4f5d7994b6bc6c338621a6ee6b))
14
+
15
+ ## [4.70.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.69.0...v4.70.0) (2026-03-23)
16
+
17
+
18
+ ### Features
19
+
20
+ * add step-up auth for passkey and TOTP device deletion ([#10688](https://github.com/dynamic-labs/dynamic-auth/issues/10688)) ([aeae325](https://github.com/dynamic-labs/dynamic-auth/commit/aeae32551d3e29c59a1d183984f1d9f00f1df2cb))
21
+ * add stepup authMode to useSocialAuth for OAuth step-up authentication ([#10701](https://github.com/dynamic-labs/dynamic-auth/issues/10701)) ([f8ac0e4](https://github.com/dynamic-labs/dynamic-auth/commit/f8ac0e4a6a039e61d1c83e434e2f678981ff3911))
22
+ * add StepUpReauthSocialView and wire social option in step-up reauth UI ([#10703](https://github.com/dynamic-labs/dynamic-auth/issues/10703)) ([a49393f](https://github.com/dynamic-labs/dynamic-auth/commit/a49393f54a8f210f9cbca892339c3012d38cc5c2))
23
+ * add useStepUpSocial and extend step-up auth for OAuth reauthentication ([#10702](https://github.com/dynamic-labs/dynamic-auth/issues/10702)) ([fb7e21d](https://github.com/dynamic-labs/dynamic-auth/commit/fb7e21d47b3e40659ae3b8ca9321efe1d4401e60))
24
+
25
+
26
+ ### Bug Fixes
27
+
28
+ * aleo defaulting to testnet when connecting ([#10726](https://github.com/dynamic-labs/dynamic-auth/issues/10726)) ([24b0378](https://github.com/dynamic-labs/dynamic-auth/commit/24b0378a25902f5a134940aeeadc9846058d6fb1))
29
+ * override basic-ftp to >=5.2.0 (CVE-2026-27699) ([#10715](https://github.com/dynamic-labs/dynamic-auth/issues/10715)) ([b68a405](https://github.com/dynamic-labs/dynamic-auth/commit/b68a405453f0ea7e04c14492c195b46fbf25b47e))
30
+ * override minimatch to patched versions (CVE-2026-26996) ([#10718](https://github.com/dynamic-labs/dynamic-auth/issues/10718)) ([a69aaee](https://github.com/dynamic-labs/dynamic-auth/commit/a69aaee0859b7e1292a244abde7084f7c4cfdb72))
31
+ * override simple-git to >=3.32.3 (CVE-2026-28292) ([#10717](https://github.com/dynamic-labs/dynamic-auth/issues/10717)) ([8b86545](https://github.com/dynamic-labs/dynamic-auth/commit/8b865453737e4ff0ef9e8d0fbb99ea5f0359af3b))
32
+ * revert session chaining PR to fix IndexedDB webview crash ([#10710](https://github.com/dynamic-labs/dynamic-auth/issues/10710)) ([c4dfe66](https://github.com/dynamic-labs/dynamic-auth/commit/c4dfe66f73e6b9b7115260b06fd90fc0a167e139)), closes [#10706](https://github.com/dynamic-labs/dynamic-auth/issues/10706) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423) [#10706](https://github.com/dynamic-labs/dynamic-auth/issues/10706) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423)
33
+ * update tar, serialize-javascript, svgo overrides ([#10727](https://github.com/dynamic-labs/dynamic-auth/issues/10727)) ([3c764f7](https://github.com/dynamic-labs/dynamic-auth/commit/3c764f71ce2870075eaa800389719a46d8dac233))
34
+ * upgrade rollup to patched versions (CVE-2026-27606) ([#10724](https://github.com/dynamic-labs/dynamic-auth/issues/10724)) ([735133e](https://github.com/dynamic-labs/dynamic-auth/commit/735133e6d4129cad20ae82b86f9507ab9227b36e))
35
+
2
36
  ## [4.69.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.68.0...v4.69.0) (2026-03-19)
3
37
 
4
38
 
package/package.cjs CHANGED
@@ -3,6 +3,6 @@
3
3
 
4
4
  Object.defineProperty(exports, '__esModule', { value: true });
5
5
 
6
- var version = "4.69.0";
6
+ var version = "4.71.0";
7
7
 
8
8
  exports.version = version;
package/package.js CHANGED
@@ -1,4 +1,4 @@
1
1
  'use client'
2
- var version = "4.69.0";
2
+ var version = "4.71.0";
3
3
 
4
4
  export { version };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dynamic-labs/stellar",
3
- "version": "4.69.0",
3
+ "version": "4.71.0",
4
4
  "description": "A React SDK for implementing Stellar wallet web3 authentication and authorization to your website.",
5
5
  "author": "Dynamic Labs, Inc.",
6
6
  "license": "MIT",
@@ -18,17 +18,17 @@
18
18
  },
19
19
  "homepage": "https://www.dynamic.xyz/",
20
20
  "dependencies": {
21
- "@dynamic-labs/sdk-api-core": "0.0.907",
21
+ "@dynamic-labs/sdk-api-core": "0.0.909",
22
22
  "@stellar/stellar-sdk": "14.4.3",
23
- "@dynamic-labs/wallet-connector-core": "4.69.0",
24
- "@dynamic-labs/assert-package-version": "4.69.0",
23
+ "@dynamic-labs/wallet-connector-core": "4.71.0",
24
+ "@dynamic-labs/assert-package-version": "4.71.0",
25
25
  "@lobstrco/signer-extension-api": "2.0.0",
26
26
  "@stellar/freighter-api": "6.0.1",
27
- "@dynamic-labs/logger": "4.69.0",
28
- "@dynamic-labs/types": "4.69.0",
29
- "@dynamic-labs/utils": "4.69.0",
30
- "@dynamic-labs/waas": "4.69.0",
31
- "@dynamic-labs/wallet-book": "4.69.0",
27
+ "@dynamic-labs/logger": "4.71.0",
28
+ "@dynamic-labs/types": "4.71.0",
29
+ "@dynamic-labs/utils": "4.71.0",
30
+ "@dynamic-labs/waas": "4.71.0",
31
+ "@dynamic-labs/wallet-book": "4.71.0",
32
32
  "eventemitter3": "5.0.1"
33
33
  },
34
34
  "peerDependencies": {}
@@ -185,7 +185,7 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
185
185
  */
186
186
  internalSignMessage(message) {
187
187
  return _tslib.__awaiter(this, void 0, void 0, function* () {
188
- var _a, _b;
188
+ var _a, _b, _c;
189
189
  this.ensureActiveAccountFromVerifiedCredentials();
190
190
  const walletClient = yield this.getWaasWalletClient();
191
191
  if (!this.activeAccountAddress) {
@@ -195,12 +195,16 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
195
195
  const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
196
196
  mfaAction: sdkApiCore.MFAAction.WalletWaasSign,
197
197
  }));
198
+ const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
199
+ scope: sdkApiCore.TokenScope.Walletsign,
200
+ }));
198
201
  const password = yield this.getPasswordIfNeeded({
199
202
  accountAddress: this.activeAccountAddress,
200
203
  });
201
204
  const signedMessage = yield walletClient.signMessage({
202
205
  accountAddress: this.activeAccountAddress,
203
- authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
206
+ authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
207
+ elevatedAccessToken,
204
208
  message,
205
209
  mfaToken,
206
210
  password,
@@ -242,7 +246,7 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
242
246
  */
243
247
  signTransaction(transactionXdr) {
244
248
  return _tslib.__awaiter(this, void 0, void 0, function* () {
245
- var _a, _b;
249
+ var _a, _b, _c;
246
250
  if (!this.activeAccountAddress) {
247
251
  throw new utils.DynamicError('Active account address is required');
248
252
  }
@@ -251,6 +255,9 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
251
255
  const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
252
256
  mfaAction: sdkApiCore.MFAAction.WalletWaasSign,
253
257
  }));
258
+ const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
259
+ scope: sdkApiCore.TokenScope.Walletsign,
260
+ }));
254
261
  const password = yield this.getPasswordIfNeeded({
255
262
  accountAddress: this.activeAccountAddress,
256
263
  });
@@ -260,8 +267,9 @@ class DynamicWaasStellarConnector extends waas.withDynamicWaas(StellarWalletConn
260
267
  // Sign the transaction XDR using MPC
261
268
  // The SDK will compute the hash internally and build the context for policy validation
262
269
  const signature = yield walletClient.signTransaction({
263
- authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
270
+ authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
264
271
  chainId,
272
+ elevatedAccessToken,
265
273
  mfaToken,
266
274
  password,
267
275
  senderAddress: this.activeAccountAddress,
@@ -1,4 +1,4 @@
1
- import { JwtVerifiedCredential, MFAAction, SignMessageContext } from '@dynamic-labs/sdk-api-core';
1
+ import { JwtVerifiedCredential, MFAAction, SignMessageContext, TokenScope } from '@dynamic-labs/sdk-api-core';
2
2
  import { IUITransaction, WalletUiUtils } from '@dynamic-labs/types';
3
3
  import { IDynamicWaasConnector, InternalWalletConnector } from '@dynamic-labs/wallet-connector-core';
4
4
  import { Logger } from '@dynamic-labs/logger';
@@ -20,7 +20,7 @@ declare const DynamicWaasStellarConnector_base: (abstract new (...args: any[]) =
20
20
  getWalletPassword?: import("@dynamic-labs/wallet-connector-core").GetWalletPasswordFn | undefined;
21
21
  getAuthToken?: (() => string) | undefined;
22
22
  getElevatedAccessToken?: ((props: {
23
- scope: import("@dynamic-labs/sdk-api-core").TokenScope;
23
+ scope: TokenScope;
24
24
  }) => Promise<string | undefined>) | undefined;
25
25
  environmentId?: string | undefined;
26
26
  baseApiUrl?: string | undefined;
@@ -38,7 +38,7 @@ declare const DynamicWaasStellarConnector_base: (abstract new (...args: any[]) =
38
38
  mfaAction?: MFAAction | undefined;
39
39
  } | undefined) => Promise<string | undefined>): void;
40
40
  setGetElevatedAccessTokenFunction(getElevatedAccessToken: (params: {
41
- scope: import("@dynamic-labs/sdk-api-core").TokenScope;
41
+ scope: TokenScope;
42
42
  }) => Promise<string | undefined>): void;
43
43
  setGetWalletPasswordFunction(getWalletPassword: import("@dynamic-labs/wallet-connector-core").GetWalletPasswordFn): void;
44
44
  getPasswordIfNeeded({ accountAddress, }: {
@@ -87,7 +87,11 @@ declare const DynamicWaasStellarConnector_base: (abstract new (...args: any[]) =
87
87
  }): Promise<void>;
88
88
  backupKeySharesToGoogleDrive({ accountAddress, password, }: {
89
89
  accountAddress: string;
90
- password?: string | undefined;
90
+ password?: string | undefined; /**
91
+ * Requires and returns the signed session ID
92
+ * @returns The signed session ID
93
+ * @throws {DynamicError} If signed session ID is not available
94
+ */
91
95
  }): Promise<void>;
92
96
  exportClientKeysharesFromGoogleDrive({ accountAddress, password, }: {
93
97
  accountAddress: string;
@@ -1,7 +1,7 @@
1
1
  'use client'
2
2
  import { __awaiter } from '../../../_virtual/_tslib.js';
3
3
  import { TransactionBuilder } from '@stellar/stellar-sdk';
4
- import { MFAAction } from '@dynamic-labs/sdk-api-core';
4
+ import { MFAAction, TokenScope } from '@dynamic-labs/sdk-api-core';
5
5
  import { DynamicError } from '@dynamic-labs/utils';
6
6
  import { withDynamicWaas } from '@dynamic-labs/waas';
7
7
  import { isSameAddress } from '@dynamic-labs/wallet-connector-core';
@@ -181,7 +181,7 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
181
181
  */
182
182
  internalSignMessage(message) {
183
183
  return __awaiter(this, void 0, void 0, function* () {
184
- var _a, _b;
184
+ var _a, _b, _c;
185
185
  this.ensureActiveAccountFromVerifiedCredentials();
186
186
  const walletClient = yield this.getWaasWalletClient();
187
187
  if (!this.activeAccountAddress) {
@@ -191,12 +191,16 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
191
191
  const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
192
192
  mfaAction: MFAAction.WalletWaasSign,
193
193
  }));
194
+ const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
195
+ scope: TokenScope.Walletsign,
196
+ }));
194
197
  const password = yield this.getPasswordIfNeeded({
195
198
  accountAddress: this.activeAccountAddress,
196
199
  });
197
200
  const signedMessage = yield walletClient.signMessage({
198
201
  accountAddress: this.activeAccountAddress,
199
- authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
202
+ authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
203
+ elevatedAccessToken,
200
204
  message,
201
205
  mfaToken,
202
206
  password,
@@ -238,7 +242,7 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
238
242
  */
239
243
  signTransaction(transactionXdr) {
240
244
  return __awaiter(this, void 0, void 0, function* () {
241
- var _a, _b;
245
+ var _a, _b, _c;
242
246
  if (!this.activeAccountAddress) {
243
247
  throw new DynamicError('Active account address is required');
244
248
  }
@@ -247,6 +251,9 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
247
251
  const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
248
252
  mfaAction: MFAAction.WalletWaasSign,
249
253
  }));
254
+ const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
255
+ scope: TokenScope.Walletsign,
256
+ }));
250
257
  const password = yield this.getPasswordIfNeeded({
251
258
  accountAddress: this.activeAccountAddress,
252
259
  });
@@ -256,8 +263,9 @@ class DynamicWaasStellarConnector extends withDynamicWaas(StellarWalletConnector
256
263
  // Sign the transaction XDR using MPC
257
264
  // The SDK will compute the hash internally and build the context for policy validation
258
265
  const signature = yield walletClient.signTransaction({
259
- authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
266
+ authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
260
267
  chainId,
268
+ elevatedAccessToken,
261
269
  mfaToken,
262
270
  password,
263
271
  senderAddress: this.activeAccountAddress,