@dynamic-labs/waas 4.69.0 → 4.71.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +34 -0
- package/package.cjs +1 -1
- package/package.js +1 -1
- package/package.json +11 -11
- package/src/DynamicWaasMixin.cjs +27 -6
- package/src/DynamicWaasMixin.js +27 -6
package/CHANGELOG.md
CHANGED
|
@@ -1,4 +1,38 @@
|
|
|
1
1
|
|
|
2
|
+
## [4.71.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.70.0...v4.71.0) (2026-03-24)
|
|
3
|
+
|
|
4
|
+
|
|
5
|
+
### Features
|
|
6
|
+
|
|
7
|
+
* add Tempo chain connector and core type definitions ([#10672](https://github.com/dynamic-labs/dynamic-auth/issues/10672)) ([0439c15](https://github.com/dynamic-labs/dynamic-auth/commit/0439c153238359083b9f226dcd2ebf6d83e26519))
|
|
8
|
+
* add verifySocial method to demo site step-up auth methods ([#10721](https://github.com/dynamic-labs/dynamic-auth/issues/10721)) ([b9ef517](https://github.com/dynamic-labs/dynamic-auth/commit/b9ef5173df3e3ed08f718de49b036ea899dc1832))
|
|
9
|
+
* **demo:** add Tempo chain support to demo app ([#10674](https://github.com/dynamic-labs/dynamic-auth/issues/10674)) ([a5918fc](https://github.com/dynamic-labs/dynamic-auth/commit/a5918fc2ab0821e7f025aa470573129f71de33cc))
|
|
10
|
+
* repurpose verifyWithExternalJwt for elevated access token requests ([#10743](https://github.com/dynamic-labs/dynamic-auth/issues/10743)) ([d1abda0](https://github.com/dynamic-labs/dynamic-auth/commit/d1abda0111d68c78226d30bd0630e6e341dedad9))
|
|
11
|
+
* **sdk:** add Tempo chain support to UI components ([#10673](https://github.com/dynamic-labs/dynamic-auth/issues/10673)) ([aec9fbb](https://github.com/dynamic-labs/dynamic-auth/commit/aec9fbb20754a2935bffe106e7e8715f46be3de7))
|
|
12
|
+
* support multi-chain wallet creation in createWallet ([#10694](https://github.com/dynamic-labs/dynamic-auth/issues/10694)) ([0b6b57f](https://github.com/dynamic-labs/dynamic-auth/commit/0b6b57f4179c35d1f86d1c8c9c40f52cb307c849))
|
|
13
|
+
* wire up elevatedAccessToken for sign, reshare, and refresh operations ([#10737](https://github.com/dynamic-labs/dynamic-auth/issues/10737)) ([f9d5c76](https://github.com/dynamic-labs/dynamic-auth/commit/f9d5c768037aff4f5d7994b6bc6c338621a6ee6b))
|
|
14
|
+
|
|
15
|
+
## [4.70.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.69.0...v4.70.0) (2026-03-23)
|
|
16
|
+
|
|
17
|
+
|
|
18
|
+
### Features
|
|
19
|
+
|
|
20
|
+
* add step-up auth for passkey and TOTP device deletion ([#10688](https://github.com/dynamic-labs/dynamic-auth/issues/10688)) ([aeae325](https://github.com/dynamic-labs/dynamic-auth/commit/aeae32551d3e29c59a1d183984f1d9f00f1df2cb))
|
|
21
|
+
* add stepup authMode to useSocialAuth for OAuth step-up authentication ([#10701](https://github.com/dynamic-labs/dynamic-auth/issues/10701)) ([f8ac0e4](https://github.com/dynamic-labs/dynamic-auth/commit/f8ac0e4a6a039e61d1c83e434e2f678981ff3911))
|
|
22
|
+
* add StepUpReauthSocialView and wire social option in step-up reauth UI ([#10703](https://github.com/dynamic-labs/dynamic-auth/issues/10703)) ([a49393f](https://github.com/dynamic-labs/dynamic-auth/commit/a49393f54a8f210f9cbca892339c3012d38cc5c2))
|
|
23
|
+
* add useStepUpSocial and extend step-up auth for OAuth reauthentication ([#10702](https://github.com/dynamic-labs/dynamic-auth/issues/10702)) ([fb7e21d](https://github.com/dynamic-labs/dynamic-auth/commit/fb7e21d47b3e40659ae3b8ca9321efe1d4401e60))
|
|
24
|
+
|
|
25
|
+
|
|
26
|
+
### Bug Fixes
|
|
27
|
+
|
|
28
|
+
* aleo defaulting to testnet when connecting ([#10726](https://github.com/dynamic-labs/dynamic-auth/issues/10726)) ([24b0378](https://github.com/dynamic-labs/dynamic-auth/commit/24b0378a25902f5a134940aeeadc9846058d6fb1))
|
|
29
|
+
* override basic-ftp to >=5.2.0 (CVE-2026-27699) ([#10715](https://github.com/dynamic-labs/dynamic-auth/issues/10715)) ([b68a405](https://github.com/dynamic-labs/dynamic-auth/commit/b68a405453f0ea7e04c14492c195b46fbf25b47e))
|
|
30
|
+
* override minimatch to patched versions (CVE-2026-26996) ([#10718](https://github.com/dynamic-labs/dynamic-auth/issues/10718)) ([a69aaee](https://github.com/dynamic-labs/dynamic-auth/commit/a69aaee0859b7e1292a244abde7084f7c4cfdb72))
|
|
31
|
+
* override simple-git to >=3.32.3 (CVE-2026-28292) ([#10717](https://github.com/dynamic-labs/dynamic-auth/issues/10717)) ([8b86545](https://github.com/dynamic-labs/dynamic-auth/commit/8b865453737e4ff0ef9e8d0fbb99ea5f0359af3b))
|
|
32
|
+
* revert session chaining PR to fix IndexedDB webview crash ([#10710](https://github.com/dynamic-labs/dynamic-auth/issues/10710)) ([c4dfe66](https://github.com/dynamic-labs/dynamic-auth/commit/c4dfe66f73e6b9b7115260b06fd90fc0a167e139)), closes [#10706](https://github.com/dynamic-labs/dynamic-auth/issues/10706) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423) [#10706](https://github.com/dynamic-labs/dynamic-auth/issues/10706) [#10423](https://github.com/dynamic-labs/dynamic-auth/issues/10423)
|
|
33
|
+
* update tar, serialize-javascript, svgo overrides ([#10727](https://github.com/dynamic-labs/dynamic-auth/issues/10727)) ([3c764f7](https://github.com/dynamic-labs/dynamic-auth/commit/3c764f71ce2870075eaa800389719a46d8dac233))
|
|
34
|
+
* upgrade rollup to patched versions (CVE-2026-27606) ([#10724](https://github.com/dynamic-labs/dynamic-auth/issues/10724)) ([735133e](https://github.com/dynamic-labs/dynamic-auth/commit/735133e6d4129cad20ae82b86f9507ab9227b36e))
|
|
35
|
+
|
|
2
36
|
## [4.69.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.68.0...v4.69.0) (2026-03-19)
|
|
3
37
|
|
|
4
38
|
|
package/package.cjs
CHANGED
package/package.js
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@dynamic-labs/waas",
|
|
3
|
-
"version": "4.
|
|
3
|
+
"version": "4.71.0",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"author": "Dynamic Labs, Inc.",
|
|
6
6
|
"license": "MIT",
|
|
@@ -16,16 +16,16 @@
|
|
|
16
16
|
"./package.json": "./package.json"
|
|
17
17
|
},
|
|
18
18
|
"dependencies": {
|
|
19
|
-
"@dynamic-labs/assert-package-version": "4.
|
|
20
|
-
"@dynamic-labs/sdk-api-core": "0.0.
|
|
21
|
-
"@dynamic-labs-wallet/browser-wallet-client": "0.0.
|
|
22
|
-
"@dynamic-labs/ethereum-core": "4.
|
|
23
|
-
"@dynamic-labs/logger": "4.
|
|
24
|
-
"@dynamic-labs/solana-core": "4.
|
|
25
|
-
"@dynamic-labs/sui-core": "4.
|
|
26
|
-
"@dynamic-labs/utils": "4.
|
|
27
|
-
"@dynamic-labs/wallet-book": "4.
|
|
28
|
-
"@dynamic-labs/wallet-connector-core": "4.
|
|
19
|
+
"@dynamic-labs/assert-package-version": "4.71.0",
|
|
20
|
+
"@dynamic-labs/sdk-api-core": "0.0.909",
|
|
21
|
+
"@dynamic-labs-wallet/browser-wallet-client": "0.0.314",
|
|
22
|
+
"@dynamic-labs/ethereum-core": "4.71.0",
|
|
23
|
+
"@dynamic-labs/logger": "4.71.0",
|
|
24
|
+
"@dynamic-labs/solana-core": "4.71.0",
|
|
25
|
+
"@dynamic-labs/sui-core": "4.71.0",
|
|
26
|
+
"@dynamic-labs/utils": "4.71.0",
|
|
27
|
+
"@dynamic-labs/wallet-book": "4.71.0",
|
|
28
|
+
"@dynamic-labs/wallet-connector-core": "4.71.0"
|
|
29
29
|
},
|
|
30
30
|
"peerDependencies": {}
|
|
31
31
|
}
|
package/src/DynamicWaasMixin.cjs
CHANGED
|
@@ -128,6 +128,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
128
128
|
SOL: 'SVM',
|
|
129
129
|
STELLAR: 'STELLAR',
|
|
130
130
|
SUI: 'SUI',
|
|
131
|
+
TEMPO: 'TEMPO',
|
|
131
132
|
TON: 'TON',
|
|
132
133
|
};
|
|
133
134
|
const chainName = chainNameMap[connectedChain];
|
|
@@ -362,7 +363,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
362
363
|
}
|
|
363
364
|
refreshWalletAccountShares(_a) {
|
|
364
365
|
return _tslib.__awaiter(this, arguments, void 0, function* ({ accountAddress, password, }) {
|
|
365
|
-
var _b, _c, _d, _e, _f;
|
|
366
|
+
var _b, _c, _d, _e, _f, _g;
|
|
366
367
|
if (!accountAddress) {
|
|
367
368
|
throw new utils.DynamicError('Account address is required');
|
|
368
369
|
}
|
|
@@ -381,9 +382,13 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
381
382
|
const mfaToken = yield ((_e = this.getMfaToken) === null || _e === void 0 ? void 0 : _e.call(this, {
|
|
382
383
|
mfaAction: sdkApiCore.MFAAction.WalletWaasRefresh,
|
|
383
384
|
}));
|
|
385
|
+
const elevatedAccessToken = yield ((_f = this.getElevatedAccessToken) === null || _f === void 0 ? void 0 : _f.call(this, {
|
|
386
|
+
scope: sdkApiCore.TokenScope.Walletdelegate,
|
|
387
|
+
}));
|
|
384
388
|
return walletClient.refreshWalletAccountShares({
|
|
385
389
|
accountAddress,
|
|
386
|
-
authToken: (
|
|
390
|
+
authToken: (_g = this.getAuthToken) === null || _g === void 0 ? void 0 : _g.call(this),
|
|
391
|
+
elevatedAccessToken,
|
|
387
392
|
mfaToken,
|
|
388
393
|
password: resolvedPassword,
|
|
389
394
|
signedSessionId: backupSignedSessionId,
|
|
@@ -392,7 +397,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
392
397
|
}
|
|
393
398
|
reshareWalletAccountShares(_a) {
|
|
394
399
|
return _tslib.__awaiter(this, arguments, void 0, function* ({ accountAddress, thresholdSignatureScheme, password, }) {
|
|
395
|
-
var _b, _c;
|
|
400
|
+
var _b, _c, _d, _e;
|
|
396
401
|
if (!accountAddress) {
|
|
397
402
|
throw new utils.DynamicError('Account address is required');
|
|
398
403
|
}
|
|
@@ -408,9 +413,17 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
408
413
|
throw new utils.DynamicError('Wallet not found');
|
|
409
414
|
}
|
|
410
415
|
const oldThresholdSignatureScheme = wallet.thresholdSignatureScheme;
|
|
416
|
+
const mfaToken = yield ((_c = this.getMfaToken) === null || _c === void 0 ? void 0 : _c.call(this, {
|
|
417
|
+
mfaAction: sdkApiCore.MFAAction.WalletWaasReshare,
|
|
418
|
+
}));
|
|
419
|
+
const elevatedAccessToken = yield ((_d = this.getElevatedAccessToken) === null || _d === void 0 ? void 0 : _d.call(this, {
|
|
420
|
+
scope: sdkApiCore.TokenScope.Walletdelegate,
|
|
421
|
+
}));
|
|
411
422
|
return walletClient.reshare({
|
|
412
423
|
accountAddress,
|
|
413
|
-
authToken: (
|
|
424
|
+
authToken: (_e = this.getAuthToken) === null || _e === void 0 ? void 0 : _e.call(this),
|
|
425
|
+
elevatedAccessToken,
|
|
426
|
+
mfaToken,
|
|
414
427
|
newThresholdSignatureScheme: thresholdSignatureScheme,
|
|
415
428
|
oldThresholdSignatureScheme,
|
|
416
429
|
password: resolvedPassword,
|
|
@@ -453,6 +466,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
453
466
|
}
|
|
454
467
|
const wallets = yield walletClient.getAllWallets();
|
|
455
468
|
const encryptedWallets = wallets.filter((w) => { var _a; return (_a = w.clientKeySharesBackupInfo) === null || _a === void 0 ? void 0 : _a.passwordEncrypted; });
|
|
469
|
+
const passwordUpdateBatchId = crypto.randomUUID();
|
|
456
470
|
yield Promise.all(encryptedWallets.map((wallet) => _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
457
471
|
var _b;
|
|
458
472
|
const signedSessionId = yield this.getSignedSessionId();
|
|
@@ -461,6 +475,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
461
475
|
authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
|
|
462
476
|
existingPassword: resolvedExistingPassword,
|
|
463
477
|
newPassword,
|
|
478
|
+
passwordUpdateBatchId,
|
|
464
479
|
signedSessionId,
|
|
465
480
|
});
|
|
466
481
|
})));
|
|
@@ -476,6 +491,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
476
491
|
throw new utils.DynamicError('Signed session ID is required');
|
|
477
492
|
}
|
|
478
493
|
const wallets = yield walletClient.getAllWallets();
|
|
494
|
+
const passwordUpdateBatchId = crypto.randomUUID();
|
|
479
495
|
yield Promise.all(wallets.map((wallet) => _tslib.__awaiter(this, void 0, void 0, function* () {
|
|
480
496
|
var _b;
|
|
481
497
|
const signedSessionId = yield this.getSignedSessionId();
|
|
@@ -483,6 +499,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
483
499
|
accountAddress: wallet.accountAddress,
|
|
484
500
|
authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
|
|
485
501
|
newPassword,
|
|
502
|
+
passwordUpdateBatchId,
|
|
486
503
|
signedSessionId,
|
|
487
504
|
});
|
|
488
505
|
})));
|
|
@@ -490,7 +507,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
490
507
|
}
|
|
491
508
|
signRawMessage(_a) {
|
|
492
509
|
return _tslib.__awaiter(this, arguments, void 0, function* ({ accountAddress, message, password, }) {
|
|
493
|
-
var _b, _c, _d;
|
|
510
|
+
var _b, _c, _d, _e;
|
|
494
511
|
if (!accountAddress) {
|
|
495
512
|
throw new utils.DynamicError('Account address is required');
|
|
496
513
|
}
|
|
@@ -506,9 +523,13 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
506
523
|
const mfaToken = yield ((_c = this.getMfaToken) === null || _c === void 0 ? void 0 : _c.call(this, {
|
|
507
524
|
mfaAction: sdkApiCore.MFAAction.WalletWaasSign,
|
|
508
525
|
}));
|
|
526
|
+
const elevatedAccessToken = yield ((_d = this.getElevatedAccessToken) === null || _d === void 0 ? void 0 : _d.call(this, {
|
|
527
|
+
scope: sdkApiCore.TokenScope.Walletsign,
|
|
528
|
+
}));
|
|
509
529
|
return walletClient.signRawMessage({
|
|
510
530
|
accountAddress,
|
|
511
|
-
authToken: (
|
|
531
|
+
authToken: (_e = this.getAuthToken) === null || _e === void 0 ? void 0 : _e.call(this),
|
|
532
|
+
elevatedAccessToken,
|
|
512
533
|
message,
|
|
513
534
|
mfaToken,
|
|
514
535
|
password: resolvedPassword,
|
package/src/DynamicWaasMixin.js
CHANGED
|
@@ -124,6 +124,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
124
124
|
SOL: 'SVM',
|
|
125
125
|
STELLAR: 'STELLAR',
|
|
126
126
|
SUI: 'SUI',
|
|
127
|
+
TEMPO: 'TEMPO',
|
|
127
128
|
TON: 'TON',
|
|
128
129
|
};
|
|
129
130
|
const chainName = chainNameMap[connectedChain];
|
|
@@ -358,7 +359,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
358
359
|
}
|
|
359
360
|
refreshWalletAccountShares(_a) {
|
|
360
361
|
return __awaiter(this, arguments, void 0, function* ({ accountAddress, password, }) {
|
|
361
|
-
var _b, _c, _d, _e, _f;
|
|
362
|
+
var _b, _c, _d, _e, _f, _g;
|
|
362
363
|
if (!accountAddress) {
|
|
363
364
|
throw new DynamicError('Account address is required');
|
|
364
365
|
}
|
|
@@ -377,9 +378,13 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
377
378
|
const mfaToken = yield ((_e = this.getMfaToken) === null || _e === void 0 ? void 0 : _e.call(this, {
|
|
378
379
|
mfaAction: MFAAction.WalletWaasRefresh,
|
|
379
380
|
}));
|
|
381
|
+
const elevatedAccessToken = yield ((_f = this.getElevatedAccessToken) === null || _f === void 0 ? void 0 : _f.call(this, {
|
|
382
|
+
scope: TokenScope.Walletdelegate,
|
|
383
|
+
}));
|
|
380
384
|
return walletClient.refreshWalletAccountShares({
|
|
381
385
|
accountAddress,
|
|
382
|
-
authToken: (
|
|
386
|
+
authToken: (_g = this.getAuthToken) === null || _g === void 0 ? void 0 : _g.call(this),
|
|
387
|
+
elevatedAccessToken,
|
|
383
388
|
mfaToken,
|
|
384
389
|
password: resolvedPassword,
|
|
385
390
|
signedSessionId: backupSignedSessionId,
|
|
@@ -388,7 +393,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
388
393
|
}
|
|
389
394
|
reshareWalletAccountShares(_a) {
|
|
390
395
|
return __awaiter(this, arguments, void 0, function* ({ accountAddress, thresholdSignatureScheme, password, }) {
|
|
391
|
-
var _b, _c;
|
|
396
|
+
var _b, _c, _d, _e;
|
|
392
397
|
if (!accountAddress) {
|
|
393
398
|
throw new DynamicError('Account address is required');
|
|
394
399
|
}
|
|
@@ -404,9 +409,17 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
404
409
|
throw new DynamicError('Wallet not found');
|
|
405
410
|
}
|
|
406
411
|
const oldThresholdSignatureScheme = wallet.thresholdSignatureScheme;
|
|
412
|
+
const mfaToken = yield ((_c = this.getMfaToken) === null || _c === void 0 ? void 0 : _c.call(this, {
|
|
413
|
+
mfaAction: MFAAction.WalletWaasReshare,
|
|
414
|
+
}));
|
|
415
|
+
const elevatedAccessToken = yield ((_d = this.getElevatedAccessToken) === null || _d === void 0 ? void 0 : _d.call(this, {
|
|
416
|
+
scope: TokenScope.Walletdelegate,
|
|
417
|
+
}));
|
|
407
418
|
return walletClient.reshare({
|
|
408
419
|
accountAddress,
|
|
409
|
-
authToken: (
|
|
420
|
+
authToken: (_e = this.getAuthToken) === null || _e === void 0 ? void 0 : _e.call(this),
|
|
421
|
+
elevatedAccessToken,
|
|
422
|
+
mfaToken,
|
|
410
423
|
newThresholdSignatureScheme: thresholdSignatureScheme,
|
|
411
424
|
oldThresholdSignatureScheme,
|
|
412
425
|
password: resolvedPassword,
|
|
@@ -449,6 +462,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
449
462
|
}
|
|
450
463
|
const wallets = yield walletClient.getAllWallets();
|
|
451
464
|
const encryptedWallets = wallets.filter((w) => { var _a; return (_a = w.clientKeySharesBackupInfo) === null || _a === void 0 ? void 0 : _a.passwordEncrypted; });
|
|
465
|
+
const passwordUpdateBatchId = crypto.randomUUID();
|
|
452
466
|
yield Promise.all(encryptedWallets.map((wallet) => __awaiter(this, void 0, void 0, function* () {
|
|
453
467
|
var _b;
|
|
454
468
|
const signedSessionId = yield this.getSignedSessionId();
|
|
@@ -457,6 +471,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
457
471
|
authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
|
|
458
472
|
existingPassword: resolvedExistingPassword,
|
|
459
473
|
newPassword,
|
|
474
|
+
passwordUpdateBatchId,
|
|
460
475
|
signedSessionId,
|
|
461
476
|
});
|
|
462
477
|
})));
|
|
@@ -472,6 +487,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
472
487
|
throw new DynamicError('Signed session ID is required');
|
|
473
488
|
}
|
|
474
489
|
const wallets = yield walletClient.getAllWallets();
|
|
490
|
+
const passwordUpdateBatchId = crypto.randomUUID();
|
|
475
491
|
yield Promise.all(wallets.map((wallet) => __awaiter(this, void 0, void 0, function* () {
|
|
476
492
|
var _b;
|
|
477
493
|
const signedSessionId = yield this.getSignedSessionId();
|
|
@@ -479,6 +495,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
479
495
|
accountAddress: wallet.accountAddress,
|
|
480
496
|
authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
|
|
481
497
|
newPassword,
|
|
498
|
+
passwordUpdateBatchId,
|
|
482
499
|
signedSessionId,
|
|
483
500
|
});
|
|
484
501
|
})));
|
|
@@ -486,7 +503,7 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
486
503
|
}
|
|
487
504
|
signRawMessage(_a) {
|
|
488
505
|
return __awaiter(this, arguments, void 0, function* ({ accountAddress, message, password, }) {
|
|
489
|
-
var _b, _c, _d;
|
|
506
|
+
var _b, _c, _d, _e;
|
|
490
507
|
if (!accountAddress) {
|
|
491
508
|
throw new DynamicError('Account address is required');
|
|
492
509
|
}
|
|
@@ -502,9 +519,13 @@ const withDynamicWaas = (BaseClass) => {
|
|
|
502
519
|
const mfaToken = yield ((_c = this.getMfaToken) === null || _c === void 0 ? void 0 : _c.call(this, {
|
|
503
520
|
mfaAction: MFAAction.WalletWaasSign,
|
|
504
521
|
}));
|
|
522
|
+
const elevatedAccessToken = yield ((_d = this.getElevatedAccessToken) === null || _d === void 0 ? void 0 : _d.call(this, {
|
|
523
|
+
scope: TokenScope.Walletsign,
|
|
524
|
+
}));
|
|
505
525
|
return walletClient.signRawMessage({
|
|
506
526
|
accountAddress,
|
|
507
|
-
authToken: (
|
|
527
|
+
authToken: (_e = this.getAuthToken) === null || _e === void 0 ? void 0 : _e.call(this),
|
|
528
|
+
elevatedAccessToken,
|
|
508
529
|
message,
|
|
509
530
|
mfaToken,
|
|
510
531
|
password: resolvedPassword,
|