@dynamic-labs/ton 4.69.0 → 4.71.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md
CHANGED
|
@@ -1,4 +1,38 @@
|
|
|
1
1
|
|
|
2
|
+
## [4.71.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.70.0...v4.71.0) (2026-03-24)
|
|
3
|
+
|
|
4
|
+
|
|
5
|
+
### Features
|
|
6
|
+
|
|
7
|
+
* add Tempo chain connector and core type definitions ([#10672](https://github.com/dynamic-labs/dynamic-auth/issues/10672)) ([0439c15](https://github.com/dynamic-labs/dynamic-auth/commit/0439c153238359083b9f226dcd2ebf6d83e26519))
|
|
8
|
+
* add verifySocial method to demo site step-up auth methods ([#10721](https://github.com/dynamic-labs/dynamic-auth/issues/10721)) ([b9ef517](https://github.com/dynamic-labs/dynamic-auth/commit/b9ef5173df3e3ed08f718de49b036ea899dc1832))
|
|
9
|
+
* **demo:** add Tempo chain support to demo app ([#10674](https://github.com/dynamic-labs/dynamic-auth/issues/10674)) ([a5918fc](https://github.com/dynamic-labs/dynamic-auth/commit/a5918fc2ab0821e7f025aa470573129f71de33cc))
|
|
10
|
+
* repurpose verifyWithExternalJwt for elevated access token requests ([#10743](https://github.com/dynamic-labs/dynamic-auth/issues/10743)) ([d1abda0](https://github.com/dynamic-labs/dynamic-auth/commit/d1abda0111d68c78226d30bd0630e6e341dedad9))
|
|
11
|
+
* **sdk:** add Tempo chain support to UI components ([#10673](https://github.com/dynamic-labs/dynamic-auth/issues/10673)) ([aec9fbb](https://github.com/dynamic-labs/dynamic-auth/commit/aec9fbb20754a2935bffe106e7e8715f46be3de7))
|
|
12
|
+
* support multi-chain wallet creation in createWallet ([#10694](https://github.com/dynamic-labs/dynamic-auth/issues/10694)) ([0b6b57f](https://github.com/dynamic-labs/dynamic-auth/commit/0b6b57f4179c35d1f86d1c8c9c40f52cb307c849))
|
|
13
|
+
* wire up elevatedAccessToken for sign, reshare, and refresh operations ([#10737](https://github.com/dynamic-labs/dynamic-auth/issues/10737)) ([f9d5c76](https://github.com/dynamic-labs/dynamic-auth/commit/f9d5c768037aff4f5d7994b6bc6c338621a6ee6b))
|
|
14
|
+
|
|
15
|
+
## [4.70.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.69.0...v4.70.0) (2026-03-23)
|
|
16
|
+
|
|
17
|
+
|
|
18
|
+
### Features
|
|
19
|
+
|
|
20
|
+
* add step-up auth for passkey and TOTP device deletion ([#10688](https://github.com/dynamic-labs/dynamic-auth/issues/10688)) ([aeae325](https://github.com/dynamic-labs/dynamic-auth/commit/aeae32551d3e29c59a1d183984f1d9f00f1df2cb))
|
|
21
|
+
* add stepup authMode to useSocialAuth for OAuth step-up authentication ([#10701](https://github.com/dynamic-labs/dynamic-auth/issues/10701)) ([f8ac0e4](https://github.com/dynamic-labs/dynamic-auth/commit/f8ac0e4a6a039e61d1c83e434e2f678981ff3911))
|
|
22
|
+
* add StepUpReauthSocialView and wire social option in step-up reauth UI ([#10703](https://github.com/dynamic-labs/dynamic-auth/issues/10703)) ([a49393f](https://github.com/dynamic-labs/dynamic-auth/commit/a49393f54a8f210f9cbca892339c3012d38cc5c2))
|
|
23
|
+
* add useStepUpSocial and extend step-up auth for OAuth reauthentication ([#10702](https://github.com/dynamic-labs/dynamic-auth/issues/10702)) ([fb7e21d](https://github.com/dynamic-labs/dynamic-auth/commit/fb7e21d47b3e40659ae3b8ca9321efe1d4401e60))
|
|
24
|
+
|
|
25
|
+
|
|
26
|
+
### Bug Fixes
|
|
27
|
+
|
|
28
|
+
* aleo defaulting to testnet when connecting ([#10726](https://github.com/dynamic-labs/dynamic-auth/issues/10726)) ([24b0378](https://github.com/dynamic-labs/dynamic-auth/commit/24b0378a25902f5a134940aeeadc9846058d6fb1))
|
|
29
|
+
* override basic-ftp to >=5.2.0 (CVE-2026-27699) ([#10715](https://github.com/dynamic-labs/dynamic-auth/issues/10715)) ([b68a405](https://github.com/dynamic-labs/dynamic-auth/commit/b68a405453f0ea7e04c14492c195b46fbf25b47e))
|
|
30
|
+
* override minimatch to patched versions (CVE-2026-26996) ([#10718](https://github.com/dynamic-labs/dynamic-auth/issues/10718)) ([a69aaee](https://github.com/dynamic-labs/dynamic-auth/commit/a69aaee0859b7e1292a244abde7084f7c4cfdb72))
|
|
31
|
+
* override simple-git to >=3.32.3 (CVE-2026-28292) ([#10717](https://github.com/dynamic-labs/dynamic-auth/issues/10717)) ([8b86545](https://github.com/dynamic-labs/dynamic-auth/commit/8b865453737e4ff0ef9e8d0fbb99ea5f0359af3b))
|
|
32
|
+
* revert session chaining PR to fix IndexedDB webview crash ([#10710](https://github.com/dynamic-labs/dynamic-auth/issues/10710)) ([c4dfe66](https://github.com/dynamic-labs/dynamic-auth/commit/c4dfe66f73e6b9b7115260b06fd90fc0a167e139)), closes [#10706](https://github.com/dynamic-labs/dynamic-auth/issues/10706) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423) [#10706](https://github.com/dynamic-labs/dynamic-auth/issues/10706) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423)
|
|
33
|
+
* update tar, serialize-javascript, svgo overrides ([#10727](https://github.com/dynamic-labs/dynamic-auth/issues/10727)) ([3c764f7](https://github.com/dynamic-labs/dynamic-auth/commit/3c764f71ce2870075eaa800389719a46d8dac233))
|
|
34
|
+
* upgrade rollup to patched versions (CVE-2026-27606) ([#10724](https://github.com/dynamic-labs/dynamic-auth/issues/10724)) ([735133e](https://github.com/dynamic-labs/dynamic-auth/commit/735133e6d4129cad20ae82b86f9507ab9227b36e))
|
|
35
|
+
|
|
2
36
|
## [4.69.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.68.0...v4.69.0) (2026-03-19)
|
|
3
37
|
|
|
4
38
|
|
package/package.cjs
CHANGED
package/package.js
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs/ton",
|
|
3
|
-
"version": "4.
|
|
3
|
+
"version": "4.71.0",
|
|
4
4
|
"description": "A React SDK for implementing wallet web3 authentication and authorization to your website.",
|
|
5
5
|
"author": "Dynamic Labs, Inc.",
|
|
6
6
|
"license": "MIT",
|
|
@@ -18,14 +18,14 @@
|
|
|
18
18
|
},
|
|
19
19
|
"homepage": "https://www.dynamic.xyz/",
|
|
20
20
|
"dependencies": {
|
|
21
|
-
"@dynamic-labs/assert-package-version": "4.
|
|
22
|
-
"@dynamic-labs/logger": "4.
|
|
23
|
-
"@dynamic-labs/sdk-api-core": "0.0.
|
|
24
|
-
"@dynamic-labs/types": "4.
|
|
25
|
-
"@dynamic-labs/utils": "4.
|
|
26
|
-
"@dynamic-labs/waas": "4.
|
|
27
|
-
"@dynamic-labs/wallet-book": "4.
|
|
28
|
-
"@dynamic-labs/wallet-connector-core": "4.
|
|
21
|
+
"@dynamic-labs/assert-package-version": "4.71.0",
|
|
22
|
+
"@dynamic-labs/logger": "4.71.0",
|
|
23
|
+
"@dynamic-labs/sdk-api-core": "0.0.909",
|
|
24
|
+
"@dynamic-labs/types": "4.71.0",
|
|
25
|
+
"@dynamic-labs/utils": "4.71.0",
|
|
26
|
+
"@dynamic-labs/waas": "4.71.0",
|
|
27
|
+
"@dynamic-labs/wallet-book": "4.71.0",
|
|
28
|
+
"@dynamic-labs/wallet-connector-core": "4.71.0",
|
|
29
29
|
"@ton/core": "0.62.0",
|
|
30
30
|
"@ton/crypto": "3.3.0",
|
|
31
31
|
"@ton/ton": "16.0.0",
|
|
@@ -156,7 +156,7 @@ class DynamicWaasTonConnector extends waas.withDynamicWaas(TonWalletConnector.To
|
|
|
156
156
|
}
|
|
157
157
|
internalSignMessage(message) {
|
|
158
158
|
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
159
|
-
var _a, _b;
|
|
159
|
+
var _a, _b, _c;
|
|
160
160
|
const walletClient = yield this.getWaasWalletClient();
|
|
161
161
|
if (!this.activeAccountAddress) {
|
|
162
162
|
throw new Error('Active account address is required');
|
|
@@ -165,12 +165,16 @@ class DynamicWaasTonConnector extends waas.withDynamicWaas(TonWalletConnector.To
|
|
|
165
165
|
const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
|
|
166
166
|
mfaAction: sdkApiCore.MFAAction.WalletWaasSign,
|
|
167
167
|
}));
|
|
168
|
+
const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
|
|
169
|
+
scope: sdkApiCore.TokenScope.Walletsign,
|
|
170
|
+
}));
|
|
168
171
|
const password = yield this.getPasswordIfNeeded({
|
|
169
172
|
accountAddress: this.activeAccountAddress,
|
|
170
173
|
});
|
|
171
174
|
const signedMessage = yield walletClient.signMessage({
|
|
172
175
|
accountAddress: this.activeAccountAddress,
|
|
173
|
-
authToken: (
|
|
176
|
+
authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
|
|
177
|
+
elevatedAccessToken,
|
|
174
178
|
message,
|
|
175
179
|
mfaToken,
|
|
176
180
|
password,
|
|
@@ -223,7 +227,7 @@ class DynamicWaasTonConnector extends waas.withDynamicWaas(TonWalletConnector.To
|
|
|
223
227
|
}
|
|
224
228
|
internalSendTransaction(request) {
|
|
225
229
|
return _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
226
|
-
var _a, _b;
|
|
230
|
+
var _a, _b, _c;
|
|
227
231
|
if (!this.activeAccountAddress) {
|
|
228
232
|
throw new utils.DynamicError('Active account address is required');
|
|
229
233
|
}
|
|
@@ -252,11 +256,15 @@ class DynamicWaasTonConnector extends waas.withDynamicWaas(TonWalletConnector.To
|
|
|
252
256
|
const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
|
|
253
257
|
mfaAction: sdkApiCore.MFAAction.WalletWaasSign,
|
|
254
258
|
}));
|
|
259
|
+
const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
|
|
260
|
+
scope: sdkApiCore.TokenScope.Walletsign,
|
|
261
|
+
}));
|
|
255
262
|
const password = yield this.getPasswordIfNeeded({
|
|
256
263
|
accountAddress: this.activeAccountAddress,
|
|
257
264
|
});
|
|
258
265
|
const signature = yield walletClient.signTransaction({
|
|
259
|
-
authToken: (
|
|
266
|
+
authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
|
|
267
|
+
elevatedAccessToken,
|
|
260
268
|
mfaToken,
|
|
261
269
|
password,
|
|
262
270
|
senderAddress: this.activeAccountAddress,
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/// <reference types="node" />
|
|
2
|
-
import { JwtVerifiedCredential, MFAAction, SignMessageContext } from '@dynamic-labs/sdk-api-core';
|
|
2
|
+
import { JwtVerifiedCredential, MFAAction, SignMessageContext, TokenScope } from '@dynamic-labs/sdk-api-core';
|
|
3
3
|
import { IUITransaction, WalletUiUtils } from '@dynamic-labs/types';
|
|
4
4
|
import { IDynamicWaasConnector, InternalWalletConnector } from '@dynamic-labs/wallet-connector-core';
|
|
5
5
|
import { TonWalletConnector } from '../../TonWalletConnector';
|
|
@@ -21,7 +21,7 @@ declare const DynamicWaasTonConnector_base: (abstract new (...args: any[]) => {
|
|
|
21
21
|
getWalletPassword?: import("@dynamic-labs/wallet-connector-core").GetWalletPasswordFn | undefined;
|
|
22
22
|
getAuthToken?: (() => string) | undefined;
|
|
23
23
|
getElevatedAccessToken?: ((props: {
|
|
24
|
-
scope:
|
|
24
|
+
scope: TokenScope;
|
|
25
25
|
}) => Promise<string | undefined>) | undefined;
|
|
26
26
|
environmentId?: string | undefined;
|
|
27
27
|
baseApiUrl?: string | undefined;
|
|
@@ -39,7 +39,7 @@ declare const DynamicWaasTonConnector_base: (abstract new (...args: any[]) => {
|
|
|
39
39
|
mfaAction?: MFAAction | undefined;
|
|
40
40
|
} | undefined) => Promise<string | undefined>): void;
|
|
41
41
|
setGetElevatedAccessTokenFunction(getElevatedAccessToken: (params: {
|
|
42
|
-
scope:
|
|
42
|
+
scope: TokenScope;
|
|
43
43
|
}) => Promise<string | undefined>): void;
|
|
44
44
|
setGetWalletPasswordFunction(getWalletPassword: import("@dynamic-labs/wallet-connector-core").GetWalletPasswordFn): void;
|
|
45
45
|
getPasswordIfNeeded({ accountAddress, }: {
|
|
@@ -53,7 +53,11 @@ declare const DynamicWaasTonConnector_base: (abstract new (...args: any[]) => {
|
|
|
53
53
|
delegateKeyShares({ accountAddress, password, }: {
|
|
54
54
|
accountAddress: string;
|
|
55
55
|
password?: string | undefined;
|
|
56
|
-
}): Promise<void>;
|
|
56
|
+
}): Promise<void>; /**
|
|
57
|
+
* Generates a TON Connect proof for authentication.
|
|
58
|
+
* @param payload - The payload string to include in the proof
|
|
59
|
+
* @returns Complete TON Connect proof object
|
|
60
|
+
*/
|
|
57
61
|
createDynamicWaasClient(traceContext?: import("dist/packages/waas/utils/instrumentation").TraceContext | undefined): Promise<import("@dynamic-labs-wallet/browser-wallet-client").DynamicWalletClient>;
|
|
58
62
|
getWaasWalletClient(traceContext?: import("dist/packages/waas/utils/instrumentation").TraceContext | undefined): Promise<import("@dynamic-labs-wallet/browser-wallet-client").DynamicWalletClient>;
|
|
59
63
|
createWalletAccount({ thresholdSignatureScheme, password, bitcoinConfig, }?: {
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'use client'
|
|
2
2
|
import { __awaiter } from '../../../_virtual/_tslib.js';
|
|
3
3
|
import { CHAIN } from '@tonconnect/sdk';
|
|
4
|
-
import { MFAAction } from '@dynamic-labs/sdk-api-core';
|
|
4
|
+
import { MFAAction, TokenScope } from '@dynamic-labs/sdk-api-core';
|
|
5
5
|
import { DynamicError, PlatformService } from '@dynamic-labs/utils';
|
|
6
6
|
import { withDynamicWaas } from '@dynamic-labs/waas';
|
|
7
7
|
import { isSameAddress } from '@dynamic-labs/wallet-connector-core';
|
|
@@ -152,7 +152,7 @@ class DynamicWaasTonConnector extends withDynamicWaas(TonWalletConnector) {
|
|
|
152
152
|
}
|
|
153
153
|
internalSignMessage(message) {
|
|
154
154
|
return __awaiter(this, void 0, void 0, function* () {
|
|
155
|
-
var _a, _b;
|
|
155
|
+
var _a, _b, _c;
|
|
156
156
|
const walletClient = yield this.getWaasWalletClient();
|
|
157
157
|
if (!this.activeAccountAddress) {
|
|
158
158
|
throw new Error('Active account address is required');
|
|
@@ -161,12 +161,16 @@ class DynamicWaasTonConnector extends withDynamicWaas(TonWalletConnector) {
|
|
|
161
161
|
const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
|
|
162
162
|
mfaAction: MFAAction.WalletWaasSign,
|
|
163
163
|
}));
|
|
164
|
+
const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
|
|
165
|
+
scope: TokenScope.Walletsign,
|
|
166
|
+
}));
|
|
164
167
|
const password = yield this.getPasswordIfNeeded({
|
|
165
168
|
accountAddress: this.activeAccountAddress,
|
|
166
169
|
});
|
|
167
170
|
const signedMessage = yield walletClient.signMessage({
|
|
168
171
|
accountAddress: this.activeAccountAddress,
|
|
169
|
-
authToken: (
|
|
172
|
+
authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
|
|
173
|
+
elevatedAccessToken,
|
|
170
174
|
message,
|
|
171
175
|
mfaToken,
|
|
172
176
|
password,
|
|
@@ -219,7 +223,7 @@ class DynamicWaasTonConnector extends withDynamicWaas(TonWalletConnector) {
|
|
|
219
223
|
}
|
|
220
224
|
internalSendTransaction(request) {
|
|
221
225
|
return __awaiter(this, void 0, void 0, function* () {
|
|
222
|
-
var _a, _b;
|
|
226
|
+
var _a, _b, _c;
|
|
223
227
|
if (!this.activeAccountAddress) {
|
|
224
228
|
throw new DynamicError('Active account address is required');
|
|
225
229
|
}
|
|
@@ -248,11 +252,15 @@ class DynamicWaasTonConnector extends withDynamicWaas(TonWalletConnector) {
|
|
|
248
252
|
const mfaToken = yield ((_a = this.getMfaToken) === null || _a === void 0 ? void 0 : _a.call(this, {
|
|
249
253
|
mfaAction: MFAAction.WalletWaasSign,
|
|
250
254
|
}));
|
|
255
|
+
const elevatedAccessToken = yield ((_b = this.getElevatedAccessToken) === null || _b === void 0 ? void 0 : _b.call(this, {
|
|
256
|
+
scope: TokenScope.Walletsign,
|
|
257
|
+
}));
|
|
251
258
|
const password = yield this.getPasswordIfNeeded({
|
|
252
259
|
accountAddress: this.activeAccountAddress,
|
|
253
260
|
});
|
|
254
261
|
const signature = yield walletClient.signTransaction({
|
|
255
|
-
authToken: (
|
|
262
|
+
authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
|
|
263
|
+
elevatedAccessToken,
|
|
256
264
|
mfaToken,
|
|
257
265
|
password,
|
|
258
266
|
senderAddress: this.activeAccountAddress,
|