Skip to content
This repository has been archived by the owner on Apr 13, 2023. It is now read-only.

Commit

Permalink
release 0.15.0 with sep-10
Browse files Browse the repository at this point in the history
  • Loading branch information
Synesso committed Aug 27, 2020
1 parent b68a0d4 commit 042fe90
Show file tree
Hide file tree
Showing 3 changed files with 17 additions and 1 deletion.
6 changes: 6 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,12 @@ As this project is pre 1.0, breaking changes may happen for minor version bumps.

## Next version

## 0.15.0

- [SEP-10 Transaction-based Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md#preamble):
Create and verify authentication challenges encoded into transactions. This feature allows two parties to perform
account-based authentication via existing transaction schemes & standard SDK functionality.

## 0.14.0

- [SEP-7 web+stellar:tx Transaction Signging Requests](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0007.md)
Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Add the JitPack & jcenter resolvers and the [latest dependency](https://jitpack.
```scala
resolvers += "jitpack" at "https://jitpack.io"
resolvers += Resolver.jcenterRepo
libraryDependencies += "com.github.synesso" %% "scala-stellar-sdk" % "0.14.0"
libraryDependencies += "com.github.synesso" %% "scala-stellar-sdk" % "0.15.0"
```

From there, it is a simple affair to create and fund a new account on the test network.
Expand Down
10 changes: 10 additions & 0 deletions src/main/scala/stellar/sdk/auth/AuthChallenger.scala
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,21 @@ import stellar.sdk.{KeyPair, Network}

import scala.concurrent.duration._

/**
* Factory for creating authentication challenges.
* @param serverKey This must be the keypair associated with the SIGNING_KEY as defined in your service's stellar.toml
*/
class AuthChallenger(
serverKey: KeyPair,
clock: Clock = Clock.systemUTC()
)(implicit network: Network) {

/**
* Generates a Challenge for the given account.
* @param accountId The stellar account that the wallet wishes to authenticate with the server
* @param homeDomain The fully qualified domain name of the service requiring authentication.
* @param timeout The period that during which valid responses to this challenge will be accepted.
*/
def challenge(
accountId: AccountId,
homeDomain: String,
Expand Down

0 comments on commit 042fe90

Please sign in to comment.