Proposal 138377 for an Internet Identity release-2025-09-05 for commit fe188b51952dc0be24d2c7ed654d029670b082ca.
This release enables the new landing page. Additionally, the popup that was blocked in Safari is fixed and an internal migration is added to improve the robustness of the backend (not visible to the users).
The sha256 of production asset internet_identity_production.wasm.gz is b34b15698385c6f3ec3fd217a44de7d247751379c996f8987cf08dd761032af2.
What’s Changed
- Bump tracing-subscriber from 0.3.19 to 0.3.20 by @dependabot[bot] in Bump tracing-subscriber from 0.3.19 to 0.3.20 by dependabot[bot] · Pull Request #3333 · dfinity/internet-identity · GitHub
- Fix popup blocked by Safari when linking openID accounts by @lmuntaner in Fix popup blocked by Safari when linking openID accounts by lmuntaner · Pull Request #3334 · dfinity/internet-identity · GitHub
- feat: Extend memory layout to support
lookup_application_with_origin
keyed by full SHA-256 sums by @aterga in feat: Extend memory layout to support `lookup_application_with_origin` keyed by full SHA-256 sums by aterga · Pull Request #3329 · dfinity/internet-identity · GitHub - Add sign up with OIDC e2e tests. by @sea-snake in Add sign up with OIDC e2e tests. by sea-snake · Pull Request #3335 · dfinity/internet-identity · GitHub
- Remove unused options param to AddAccessMethodFlow by @lmuntaner in Remove unused options param to AddAccessMethodFlow by lmuntaner · Pull Request #3336 · dfinity/internet-identity · GitHub
- chore: Implement data migration for
lookup_application_with_origin_map
by @aterga in chore: Implement data migration for `lookup_application_with_origin_map` by aterga · Pull Request #3337 · dfinity/internet-identity · GitHub - first by @aterga in first by aterga · Pull Request #3343 · dfinity/internet-identity · GitHub
- Landing Page by @danblackadder in Landing Page by danblackadder · Pull Request #3341 · dfinity/internet-identity · GitHub
New Contributors
- @danblackadder made their first contribution in Landing Page by danblackadder · Pull Request #3341 · dfinity/internet-identity · GitHub
Full Changelog: Comparing release-2025-08-29...release-2025-09-05 · dfinity/internet-identity · GitHub
Build flavors
For more information please see the Build flavors section of the README.
Wasm Verification
To build the wasm modules yourself and verify their hashes, run the following commands from the root of the Internet Identity repository:
git pull # to ensure you have the latest changes.
git checkout fe188b51952dc0be24d2c7ed654d029670b082ca
./scripts/verify-hash --ii-hash b34b15698385c6f3ec3fd217a44de7d247751379c996f8987cf08dd761032af2 --archive-hash e4ff848a8a3dfb7ee1c2708fc2df982928b0023ec2a777a7ccae52594db3679f
Make sure to compare the hashes also with the proposal payload when verifying canister upgrade proposals.
Argument Verification
Run the following command to verify the upgrade argument hash:
didc encode '(
opt record {
fetch_root_key = null;
openid_google = null;
is_production = null;
enable_dapps_explorer = null;
assigned_user_number_range = null;
new_flow_origins = null;
archive_config = opt record {
polling_interval_ns = 15_000_000_000 : nat64;
entries_buffer_limit = 10_000 : nat64;
module_hash = blob "\e4\ff\84\8a\8a\3d\fb\7e\e1\c2\70\8f\c2\df\98\29\28\b0\02\3e\c2\a7\77\a7\cc\ae\52\59\4d\b3\67\9f";
entries_fetch_limit = 1_000 : nat16;
};
canister_creation_cycles_cost = null;
analytics_config = null;
feature_flag_enable_generic_open_id_fe = null;
related_origins = null;
feature_flag_continue_from_another_device = null;
openid_configs = null;
captcha_config = null;
dummy_auth = null;
register_rate_limit = null;
},
)' | xxd -r -p | sha256sum
The output should match the argument hash.