@dynamic-labs/waas 4.70.0 → 4.72.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,4 +1,32 @@
1
1
 
2
+ ## [4.72.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.71.0...v4.72.0) (2026-03-26)
3
+
4
+
5
+ ### Features
6
+
7
+ * add action-based MFA check to wallet export ([#10774](https://github.com/dynamic-labs/dynamic-auth/issues/10774)) ([06aae8a](https://github.com/dynamic-labs/dynamic-auth/commit/06aae8a6365adde1658b8632c8caa11df409c646))
8
+ * integrate checkStepUpAuth into React SDK ([#10751](https://github.com/dynamic-labs/dynamic-auth/issues/10751)) ([7907557](https://github.com/dynamic-labs/dynamic-auth/commit/79075575086b89b9bfb405d75e7c6b3d573cc25d))
9
+ * **react-native:** expose setup auth state ([#10779](https://github.com/dynamic-labs/dynamic-auth/issues/10779)) ([9600e46](https://github.com/dynamic-labs/dynamic-auth/commit/9600e46028b446c88e682e7d842e65d691230b14))
10
+
11
+
12
+ ### Bug Fixes
13
+
14
+ * allow for connectors to inject icons into bridge view ([#10752](https://github.com/dynamic-labs/dynamic-auth/issues/10752)) ([94b5c3e](https://github.com/dynamic-labs/dynamic-auth/commit/94b5c3e78a1d92558ef316d9ca6761fdc4b788d5))
15
+ * react-native-extension build on iOS ([#10764](https://github.com/dynamic-labs/dynamic-auth/issues/10764)) ([b5eca2a](https://github.com/dynamic-labs/dynamic-auth/commit/b5eca2aa012e3da74361e28b4a41414710fdfa9c))
16
+
17
+ ## [4.71.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.70.0...v4.71.0) (2026-03-24)
18
+
19
+
20
+ ### Features
21
+
22
+ * add Tempo chain connector and core type definitions ([#10672](https://github.com/dynamic-labs/dynamic-auth/issues/10672)) ([0439c15](https://github.com/dynamic-labs/dynamic-auth/commit/0439c153238359083b9f226dcd2ebf6d83e26519))
23
+ * add verifySocial method to demo site step-up auth methods ([#10721](https://github.com/dynamic-labs/dynamic-auth/issues/10721)) ([b9ef517](https://github.com/dynamic-labs/dynamic-auth/commit/b9ef5173df3e3ed08f718de49b036ea899dc1832))
24
+ * **demo:** add Tempo chain support to demo app ([#10674](https://github.com/dynamic-labs/dynamic-auth/issues/10674)) ([a5918fc](https://github.com/dynamic-labs/dynamic-auth/commit/a5918fc2ab0821e7f025aa470573129f71de33cc))
25
+ * repurpose verifyWithExternalJwt for elevated access token requests ([#10743](https://github.com/dynamic-labs/dynamic-auth/issues/10743)) ([d1abda0](https://github.com/dynamic-labs/dynamic-auth/commit/d1abda0111d68c78226d30bd0630e6e341dedad9))
26
+ * **sdk:** add Tempo chain support to UI components ([#10673](https://github.com/dynamic-labs/dynamic-auth/issues/10673)) ([aec9fbb](https://github.com/dynamic-labs/dynamic-auth/commit/aec9fbb20754a2935bffe106e7e8715f46be3de7))
27
+ * support multi-chain wallet creation in createWallet ([#10694](https://github.com/dynamic-labs/dynamic-auth/issues/10694)) ([0b6b57f](https://github.com/dynamic-labs/dynamic-auth/commit/0b6b57f4179c35d1f86d1c8c9c40f52cb307c849))
28
+ * wire up elevatedAccessToken for sign, reshare, and refresh operations ([#10737](https://github.com/dynamic-labs/dynamic-auth/issues/10737)) ([f9d5c76](https://github.com/dynamic-labs/dynamic-auth/commit/f9d5c768037aff4f5d7994b6bc6c338621a6ee6b))
29
+
2
30
  ## [4.70.0](https://github.com/dynamic-labs/dynamic-auth/compare/v4.69.0...v4.70.0) (2026-03-23)
3
31
 
4
32
 
package/package.cjs CHANGED
@@ -3,6 +3,6 @@
3
3
 
4
4
  Object.defineProperty(exports, '__esModule', { value: true });
5
5
 
6
- var version = "4.70.0";
6
+ var version = "4.72.0";
7
7
 
8
8
  exports.version = version;
package/package.js CHANGED
@@ -1,4 +1,4 @@
1
1
  'use client'
2
- var version = "4.70.0";
2
+ var version = "4.72.0";
3
3
 
4
4
  export { version };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@dynamic-labs/waas",
3
- "version": "4.70.0",
3
+ "version": "4.72.0",
4
4
  "type": "module",
5
5
  "author": "Dynamic Labs, Inc.",
6
6
  "license": "MIT",
@@ -16,16 +16,16 @@
16
16
  "./package.json": "./package.json"
17
17
  },
18
18
  "dependencies": {
19
- "@dynamic-labs/assert-package-version": "4.70.0",
19
+ "@dynamic-labs/assert-package-version": "4.72.0",
20
20
  "@dynamic-labs/sdk-api-core": "0.0.909",
21
- "@dynamic-labs-wallet/browser-wallet-client": "0.0.309",
22
- "@dynamic-labs/ethereum-core": "4.70.0",
23
- "@dynamic-labs/logger": "4.70.0",
24
- "@dynamic-labs/solana-core": "4.70.0",
25
- "@dynamic-labs/sui-core": "4.70.0",
26
- "@dynamic-labs/utils": "4.70.0",
27
- "@dynamic-labs/wallet-book": "4.70.0",
28
- "@dynamic-labs/wallet-connector-core": "4.70.0"
21
+ "@dynamic-labs-wallet/browser-wallet-client": "0.0.314",
22
+ "@dynamic-labs/ethereum-core": "4.72.0",
23
+ "@dynamic-labs/logger": "4.72.0",
24
+ "@dynamic-labs/solana-core": "4.72.0",
25
+ "@dynamic-labs/sui-core": "4.72.0",
26
+ "@dynamic-labs/utils": "4.72.0",
27
+ "@dynamic-labs/wallet-book": "4.72.0",
28
+ "@dynamic-labs/wallet-connector-core": "4.72.0"
29
29
  },
30
30
  "peerDependencies": {}
31
31
  }
@@ -128,6 +128,7 @@ const withDynamicWaas = (BaseClass) => {
128
128
  SOL: 'SVM',
129
129
  STELLAR: 'STELLAR',
130
130
  SUI: 'SUI',
131
+ TEMPO: 'TEMPO',
131
132
  TON: 'TON',
132
133
  };
133
134
  const chainName = chainNameMap[connectedChain];
@@ -362,7 +363,7 @@ const withDynamicWaas = (BaseClass) => {
362
363
  }
363
364
  refreshWalletAccountShares(_a) {
364
365
  return _tslib.__awaiter(this, arguments, void 0, function* ({ accountAddress, password, }) {
365
- var _b, _c, _d, _e, _f;
366
+ var _b, _c, _d, _e, _f, _g;
366
367
  if (!accountAddress) {
367
368
  throw new utils.DynamicError('Account address is required');
368
369
  }
@@ -381,9 +382,13 @@ const withDynamicWaas = (BaseClass) => {
381
382
  const mfaToken = yield ((_e = this.getMfaToken) === null || _e === void 0 ? void 0 : _e.call(this, {
382
383
  mfaAction: sdkApiCore.MFAAction.WalletWaasRefresh,
383
384
  }));
385
+ const elevatedAccessToken = yield ((_f = this.getElevatedAccessToken) === null || _f === void 0 ? void 0 : _f.call(this, {
386
+ scope: sdkApiCore.TokenScope.Walletdelegate,
387
+ }));
384
388
  return walletClient.refreshWalletAccountShares({
385
389
  accountAddress,
386
- authToken: (_f = this.getAuthToken) === null || _f === void 0 ? void 0 : _f.call(this),
390
+ authToken: (_g = this.getAuthToken) === null || _g === void 0 ? void 0 : _g.call(this),
391
+ elevatedAccessToken,
387
392
  mfaToken,
388
393
  password: resolvedPassword,
389
394
  signedSessionId: backupSignedSessionId,
@@ -392,7 +397,7 @@ const withDynamicWaas = (BaseClass) => {
392
397
  }
393
398
  reshareWalletAccountShares(_a) {
394
399
  return _tslib.__awaiter(this, arguments, void 0, function* ({ accountAddress, thresholdSignatureScheme, password, }) {
395
- var _b, _c;
400
+ var _b, _c, _d, _e;
396
401
  if (!accountAddress) {
397
402
  throw new utils.DynamicError('Account address is required');
398
403
  }
@@ -408,9 +413,17 @@ const withDynamicWaas = (BaseClass) => {
408
413
  throw new utils.DynamicError('Wallet not found');
409
414
  }
410
415
  const oldThresholdSignatureScheme = wallet.thresholdSignatureScheme;
416
+ const mfaToken = yield ((_c = this.getMfaToken) === null || _c === void 0 ? void 0 : _c.call(this, {
417
+ mfaAction: sdkApiCore.MFAAction.WalletWaasReshare,
418
+ }));
419
+ const elevatedAccessToken = yield ((_d = this.getElevatedAccessToken) === null || _d === void 0 ? void 0 : _d.call(this, {
420
+ scope: sdkApiCore.TokenScope.Walletdelegate,
421
+ }));
411
422
  return walletClient.reshare({
412
423
  accountAddress,
413
- authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
424
+ authToken: (_e = this.getAuthToken) === null || _e === void 0 ? void 0 : _e.call(this),
425
+ elevatedAccessToken,
426
+ mfaToken,
414
427
  newThresholdSignatureScheme: thresholdSignatureScheme,
415
428
  oldThresholdSignatureScheme,
416
429
  password: resolvedPassword,
@@ -453,6 +466,7 @@ const withDynamicWaas = (BaseClass) => {
453
466
  }
454
467
  const wallets = yield walletClient.getAllWallets();
455
468
  const encryptedWallets = wallets.filter((w) => { var _a; return (_a = w.clientKeySharesBackupInfo) === null || _a === void 0 ? void 0 : _a.passwordEncrypted; });
469
+ const passwordUpdateBatchId = crypto.randomUUID();
456
470
  yield Promise.all(encryptedWallets.map((wallet) => _tslib.__awaiter(this, void 0, void 0, function* () {
457
471
  var _b;
458
472
  const signedSessionId = yield this.getSignedSessionId();
@@ -461,6 +475,7 @@ const withDynamicWaas = (BaseClass) => {
461
475
  authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
462
476
  existingPassword: resolvedExistingPassword,
463
477
  newPassword,
478
+ passwordUpdateBatchId,
464
479
  signedSessionId,
465
480
  });
466
481
  })));
@@ -476,6 +491,7 @@ const withDynamicWaas = (BaseClass) => {
476
491
  throw new utils.DynamicError('Signed session ID is required');
477
492
  }
478
493
  const wallets = yield walletClient.getAllWallets();
494
+ const passwordUpdateBatchId = crypto.randomUUID();
479
495
  yield Promise.all(wallets.map((wallet) => _tslib.__awaiter(this, void 0, void 0, function* () {
480
496
  var _b;
481
497
  const signedSessionId = yield this.getSignedSessionId();
@@ -483,6 +499,7 @@ const withDynamicWaas = (BaseClass) => {
483
499
  accountAddress: wallet.accountAddress,
484
500
  authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
485
501
  newPassword,
502
+ passwordUpdateBatchId,
486
503
  signedSessionId,
487
504
  });
488
505
  })));
@@ -490,7 +507,7 @@ const withDynamicWaas = (BaseClass) => {
490
507
  }
491
508
  signRawMessage(_a) {
492
509
  return _tslib.__awaiter(this, arguments, void 0, function* ({ accountAddress, message, password, }) {
493
- var _b, _c, _d;
510
+ var _b, _c, _d, _e;
494
511
  if (!accountAddress) {
495
512
  throw new utils.DynamicError('Account address is required');
496
513
  }
@@ -506,9 +523,13 @@ const withDynamicWaas = (BaseClass) => {
506
523
  const mfaToken = yield ((_c = this.getMfaToken) === null || _c === void 0 ? void 0 : _c.call(this, {
507
524
  mfaAction: sdkApiCore.MFAAction.WalletWaasSign,
508
525
  }));
526
+ const elevatedAccessToken = yield ((_d = this.getElevatedAccessToken) === null || _d === void 0 ? void 0 : _d.call(this, {
527
+ scope: sdkApiCore.TokenScope.Walletsign,
528
+ }));
509
529
  return walletClient.signRawMessage({
510
530
  accountAddress,
511
- authToken: (_d = this.getAuthToken) === null || _d === void 0 ? void 0 : _d.call(this),
531
+ authToken: (_e = this.getAuthToken) === null || _e === void 0 ? void 0 : _e.call(this),
532
+ elevatedAccessToken,
512
533
  message,
513
534
  mfaToken,
514
535
  password: resolvedPassword,
@@ -124,6 +124,7 @@ const withDynamicWaas = (BaseClass) => {
124
124
  SOL: 'SVM',
125
125
  STELLAR: 'STELLAR',
126
126
  SUI: 'SUI',
127
+ TEMPO: 'TEMPO',
127
128
  TON: 'TON',
128
129
  };
129
130
  const chainName = chainNameMap[connectedChain];
@@ -358,7 +359,7 @@ const withDynamicWaas = (BaseClass) => {
358
359
  }
359
360
  refreshWalletAccountShares(_a) {
360
361
  return __awaiter(this, arguments, void 0, function* ({ accountAddress, password, }) {
361
- var _b, _c, _d, _e, _f;
362
+ var _b, _c, _d, _e, _f, _g;
362
363
  if (!accountAddress) {
363
364
  throw new DynamicError('Account address is required');
364
365
  }
@@ -377,9 +378,13 @@ const withDynamicWaas = (BaseClass) => {
377
378
  const mfaToken = yield ((_e = this.getMfaToken) === null || _e === void 0 ? void 0 : _e.call(this, {
378
379
  mfaAction: MFAAction.WalletWaasRefresh,
379
380
  }));
381
+ const elevatedAccessToken = yield ((_f = this.getElevatedAccessToken) === null || _f === void 0 ? void 0 : _f.call(this, {
382
+ scope: TokenScope.Walletdelegate,
383
+ }));
380
384
  return walletClient.refreshWalletAccountShares({
381
385
  accountAddress,
382
- authToken: (_f = this.getAuthToken) === null || _f === void 0 ? void 0 : _f.call(this),
386
+ authToken: (_g = this.getAuthToken) === null || _g === void 0 ? void 0 : _g.call(this),
387
+ elevatedAccessToken,
383
388
  mfaToken,
384
389
  password: resolvedPassword,
385
390
  signedSessionId: backupSignedSessionId,
@@ -388,7 +393,7 @@ const withDynamicWaas = (BaseClass) => {
388
393
  }
389
394
  reshareWalletAccountShares(_a) {
390
395
  return __awaiter(this, arguments, void 0, function* ({ accountAddress, thresholdSignatureScheme, password, }) {
391
- var _b, _c;
396
+ var _b, _c, _d, _e;
392
397
  if (!accountAddress) {
393
398
  throw new DynamicError('Account address is required');
394
399
  }
@@ -404,9 +409,17 @@ const withDynamicWaas = (BaseClass) => {
404
409
  throw new DynamicError('Wallet not found');
405
410
  }
406
411
  const oldThresholdSignatureScheme = wallet.thresholdSignatureScheme;
412
+ const mfaToken = yield ((_c = this.getMfaToken) === null || _c === void 0 ? void 0 : _c.call(this, {
413
+ mfaAction: MFAAction.WalletWaasReshare,
414
+ }));
415
+ const elevatedAccessToken = yield ((_d = this.getElevatedAccessToken) === null || _d === void 0 ? void 0 : _d.call(this, {
416
+ scope: TokenScope.Walletdelegate,
417
+ }));
407
418
  return walletClient.reshare({
408
419
  accountAddress,
409
- authToken: (_c = this.getAuthToken) === null || _c === void 0 ? void 0 : _c.call(this),
420
+ authToken: (_e = this.getAuthToken) === null || _e === void 0 ? void 0 : _e.call(this),
421
+ elevatedAccessToken,
422
+ mfaToken,
410
423
  newThresholdSignatureScheme: thresholdSignatureScheme,
411
424
  oldThresholdSignatureScheme,
412
425
  password: resolvedPassword,
@@ -449,6 +462,7 @@ const withDynamicWaas = (BaseClass) => {
449
462
  }
450
463
  const wallets = yield walletClient.getAllWallets();
451
464
  const encryptedWallets = wallets.filter((w) => { var _a; return (_a = w.clientKeySharesBackupInfo) === null || _a === void 0 ? void 0 : _a.passwordEncrypted; });
465
+ const passwordUpdateBatchId = crypto.randomUUID();
452
466
  yield Promise.all(encryptedWallets.map((wallet) => __awaiter(this, void 0, void 0, function* () {
453
467
  var _b;
454
468
  const signedSessionId = yield this.getSignedSessionId();
@@ -457,6 +471,7 @@ const withDynamicWaas = (BaseClass) => {
457
471
  authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
458
472
  existingPassword: resolvedExistingPassword,
459
473
  newPassword,
474
+ passwordUpdateBatchId,
460
475
  signedSessionId,
461
476
  });
462
477
  })));
@@ -472,6 +487,7 @@ const withDynamicWaas = (BaseClass) => {
472
487
  throw new DynamicError('Signed session ID is required');
473
488
  }
474
489
  const wallets = yield walletClient.getAllWallets();
490
+ const passwordUpdateBatchId = crypto.randomUUID();
475
491
  yield Promise.all(wallets.map((wallet) => __awaiter(this, void 0, void 0, function* () {
476
492
  var _b;
477
493
  const signedSessionId = yield this.getSignedSessionId();
@@ -479,6 +495,7 @@ const withDynamicWaas = (BaseClass) => {
479
495
  accountAddress: wallet.accountAddress,
480
496
  authToken: (_b = this.getAuthToken) === null || _b === void 0 ? void 0 : _b.call(this),
481
497
  newPassword,
498
+ passwordUpdateBatchId,
482
499
  signedSessionId,
483
500
  });
484
501
  })));
@@ -486,7 +503,7 @@ const withDynamicWaas = (BaseClass) => {
486
503
  }
487
504
  signRawMessage(_a) {
488
505
  return __awaiter(this, arguments, void 0, function* ({ accountAddress, message, password, }) {
489
- var _b, _c, _d;
506
+ var _b, _c, _d, _e;
490
507
  if (!accountAddress) {
491
508
  throw new DynamicError('Account address is required');
492
509
  }
@@ -502,9 +519,13 @@ const withDynamicWaas = (BaseClass) => {
502
519
  const mfaToken = yield ((_c = this.getMfaToken) === null || _c === void 0 ? void 0 : _c.call(this, {
503
520
  mfaAction: MFAAction.WalletWaasSign,
504
521
  }));
522
+ const elevatedAccessToken = yield ((_d = this.getElevatedAccessToken) === null || _d === void 0 ? void 0 : _d.call(this, {
523
+ scope: TokenScope.Walletsign,
524
+ }));
505
525
  return walletClient.signRawMessage({
506
526
  accountAddress,
507
- authToken: (_d = this.getAuthToken) === null || _d === void 0 ? void 0 : _d.call(this),
527
+ authToken: (_e = this.getAuthToken) === null || _e === void 0 ? void 0 : _e.call(this),
528
+ elevatedAccessToken,
508
529
  message,
509
530
  mfaToken,
510
531
  password: resolvedPassword,