@better-auth/core 1.3.26 → 1.3.28

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (130) hide show
  1. package/.turbo/turbo-build.log +60 -9
  2. package/build.config.ts +7 -0
  3. package/dist/db/adapter/index.cjs +2 -0
  4. package/dist/db/adapter/index.d.cts +14 -0
  5. package/dist/db/adapter/index.d.mts +14 -0
  6. package/dist/db/adapter/index.d.ts +14 -0
  7. package/dist/db/adapter/index.mjs +1 -0
  8. package/dist/db/index.cjs +89 -0
  9. package/dist/db/index.d.cts +16 -107
  10. package/dist/db/index.d.mts +16 -107
  11. package/dist/db/index.d.ts +16 -107
  12. package/dist/db/index.mjs +69 -0
  13. package/dist/env/index.cjs +312 -0
  14. package/dist/env/index.d.cts +36 -0
  15. package/dist/env/index.d.mts +36 -0
  16. package/dist/env/index.d.ts +36 -0
  17. package/dist/env/index.mjs +297 -0
  18. package/dist/error/index.cjs +44 -0
  19. package/dist/error/index.d.cts +33 -0
  20. package/dist/error/index.d.mts +33 -0
  21. package/dist/error/index.d.ts +33 -0
  22. package/dist/error/index.mjs +41 -0
  23. package/dist/index.d.cts +179 -1
  24. package/dist/index.d.mts +179 -1
  25. package/dist/index.d.ts +179 -1
  26. package/dist/middleware/index.cjs +25 -0
  27. package/dist/middleware/index.d.cts +14 -0
  28. package/dist/middleware/index.d.mts +14 -0
  29. package/dist/middleware/index.d.ts +14 -0
  30. package/dist/middleware/index.mjs +21 -0
  31. package/dist/oauth2/index.cjs +368 -0
  32. package/dist/oauth2/index.d.cts +100 -0
  33. package/dist/oauth2/index.d.mts +100 -0
  34. package/dist/oauth2/index.d.ts +100 -0
  35. package/dist/oauth2/index.mjs +357 -0
  36. package/dist/shared/core.BJPBStdk.d.ts +1693 -0
  37. package/dist/shared/core.Bl6TpxyD.d.mts +181 -0
  38. package/dist/shared/core.Bqe5IGAi.d.ts +13 -0
  39. package/dist/shared/core.BwoNUcJQ.d.cts +53 -0
  40. package/dist/shared/core.BwoNUcJQ.d.mts +53 -0
  41. package/dist/shared/core.BwoNUcJQ.d.ts +53 -0
  42. package/dist/shared/core.CajxAutx.d.cts +143 -0
  43. package/dist/shared/core.CajxAutx.d.mts +143 -0
  44. package/dist/shared/core.CajxAutx.d.ts +143 -0
  45. package/dist/shared/core.CkkLHQWc.d.mts +1693 -0
  46. package/dist/shared/core.DkdZ1o38.d.ts +181 -0
  47. package/dist/shared/core.Dl-70uns.d.cts +84 -0
  48. package/dist/shared/core.Dl-70uns.d.mts +84 -0
  49. package/dist/shared/core.Dl-70uns.d.ts +84 -0
  50. package/dist/shared/core.DyEdx0m7.d.cts +181 -0
  51. package/dist/shared/core.E9DfzGLz.d.mts +13 -0
  52. package/dist/shared/core.HqYn20Fi.d.cts +13 -0
  53. package/dist/shared/core.gYIBmdi1.d.cts +1693 -0
  54. package/dist/social-providers/index.cjs +2793 -0
  55. package/dist/social-providers/index.d.cts +3903 -0
  56. package/dist/social-providers/index.d.mts +3903 -0
  57. package/dist/social-providers/index.d.ts +3903 -0
  58. package/dist/social-providers/index.mjs +2743 -0
  59. package/dist/utils/index.cjs +7 -0
  60. package/dist/utils/index.d.cts +10 -0
  61. package/dist/utils/index.d.mts +10 -0
  62. package/dist/utils/index.d.ts +10 -0
  63. package/dist/utils/index.mjs +5 -0
  64. package/package.json +109 -2
  65. package/src/db/adapter/index.ts +448 -0
  66. package/src/db/index.ts +13 -0
  67. package/src/db/plugin.ts +11 -0
  68. package/src/db/schema/account.ts +34 -0
  69. package/src/db/schema/rate-limit.ts +21 -0
  70. package/src/db/schema/session.ts +17 -0
  71. package/src/db/schema/shared.ts +7 -0
  72. package/src/db/schema/user.ts +16 -0
  73. package/src/db/schema/verification.ts +15 -0
  74. package/src/db/type.ts +50 -0
  75. package/src/env/color-depth.ts +172 -0
  76. package/src/env/env-impl.ts +123 -0
  77. package/src/env/index.ts +23 -0
  78. package/src/env/logger.test.ts +33 -0
  79. package/src/env/logger.ts +145 -0
  80. package/src/error/codes.ts +31 -0
  81. package/src/error/index.ts +11 -0
  82. package/src/index.ts +1 -1
  83. package/src/middleware/index.ts +33 -0
  84. package/src/oauth2/client-credentials-token.ts +102 -0
  85. package/src/oauth2/create-authorization-url.ts +85 -0
  86. package/src/oauth2/index.ts +22 -0
  87. package/src/oauth2/oauth-provider.ts +194 -0
  88. package/src/oauth2/refresh-access-token.ts +124 -0
  89. package/src/oauth2/utils.ts +36 -0
  90. package/src/oauth2/validate-authorization-code.ts +156 -0
  91. package/src/social-providers/apple.ts +213 -0
  92. package/src/social-providers/atlassian.ts +130 -0
  93. package/src/social-providers/cognito.ts +269 -0
  94. package/src/social-providers/discord.ts +172 -0
  95. package/src/social-providers/dropbox.ts +112 -0
  96. package/src/social-providers/facebook.ts +204 -0
  97. package/src/social-providers/figma.ts +115 -0
  98. package/src/social-providers/github.ts +154 -0
  99. package/src/social-providers/gitlab.ts +152 -0
  100. package/src/social-providers/google.ts +171 -0
  101. package/src/social-providers/huggingface.ts +116 -0
  102. package/src/social-providers/index.ts +118 -0
  103. package/src/social-providers/kakao.ts +178 -0
  104. package/src/social-providers/kick.ts +95 -0
  105. package/src/social-providers/line.ts +169 -0
  106. package/src/social-providers/linear.ts +120 -0
  107. package/src/social-providers/linkedin.ts +110 -0
  108. package/src/social-providers/microsoft-entra-id.ts +243 -0
  109. package/src/social-providers/naver.ts +112 -0
  110. package/src/social-providers/notion.ts +106 -0
  111. package/src/social-providers/paypal.ts +261 -0
  112. package/src/social-providers/reddit.ts +122 -0
  113. package/src/social-providers/roblox.ts +110 -0
  114. package/src/social-providers/salesforce.ts +157 -0
  115. package/src/social-providers/slack.ts +114 -0
  116. package/src/social-providers/spotify.ts +93 -0
  117. package/src/social-providers/tiktok.ts +211 -0
  118. package/src/social-providers/twitch.ts +111 -0
  119. package/src/social-providers/twitter.ts +194 -0
  120. package/src/social-providers/vk.ts +128 -0
  121. package/src/social-providers/zoom.ts +218 -0
  122. package/src/types/context.ts +313 -0
  123. package/src/types/cookie.ts +7 -0
  124. package/src/types/helper.ts +5 -0
  125. package/src/types/index.ts +20 -1
  126. package/src/types/init-options.ts +1161 -0
  127. package/src/types/plugin-client.ts +69 -0
  128. package/src/types/plugin.ts +134 -0
  129. package/src/utils/error-codes.ts +51 -0
  130. package/src/utils/index.ts +1 -0
@@ -0,0 +1,204 @@
1
+ import { betterFetch } from "@better-fetch/fetch";
2
+ import type { OAuthProvider, ProviderOptions } from "@better-auth/core/oauth2";
3
+ import {
4
+ createAuthorizationURL,
5
+ validateAuthorizationCode,
6
+ } from "@better-auth/core/oauth2";
7
+ import { createRemoteJWKSet, jwtVerify, decodeJwt } from "jose";
8
+ import { refreshAccessToken } from "@better-auth/core/oauth2";
9
+ export interface FacebookProfile {
10
+ id: string;
11
+ name: string;
12
+ email: string;
13
+ email_verified: boolean;
14
+ picture: {
15
+ data: {
16
+ height: number;
17
+ is_silhouette: boolean;
18
+ url: string;
19
+ width: number;
20
+ };
21
+ };
22
+ }
23
+
24
+ export interface FacebookOptions extends ProviderOptions<FacebookProfile> {
25
+ clientId: string;
26
+ /**
27
+ * Extend list of fields to retrieve from the Facebook user profile.
28
+ *
29
+ * @default ["id", "name", "email", "picture"]
30
+ */
31
+ fields?: string[];
32
+
33
+ /**
34
+ * The config id to use when undergoing oauth
35
+ */
36
+ configId?: string;
37
+ }
38
+
39
+ export const facebook = (options: FacebookOptions) => {
40
+ return {
41
+ id: "facebook",
42
+ name: "Facebook",
43
+ async createAuthorizationURL({ state, scopes, redirectURI, loginHint }) {
44
+ const _scopes = options.disableDefaultScope
45
+ ? []
46
+ : ["email", "public_profile"];
47
+ options.scope && _scopes.push(...options.scope);
48
+ scopes && _scopes.push(...scopes);
49
+ return await createAuthorizationURL({
50
+ id: "facebook",
51
+ options,
52
+ authorizationEndpoint: "https://www.facebook.com/v21.0/dialog/oauth",
53
+ scopes: _scopes,
54
+ state,
55
+ redirectURI,
56
+ loginHint,
57
+ additionalParams: options.configId
58
+ ? {
59
+ config_id: options.configId,
60
+ }
61
+ : {},
62
+ });
63
+ },
64
+ validateAuthorizationCode: async ({ code, redirectURI }) => {
65
+ return validateAuthorizationCode({
66
+ code,
67
+ redirectURI,
68
+ options,
69
+ tokenEndpoint: "https://graph.facebook.com/oauth/access_token",
70
+ });
71
+ },
72
+ async verifyIdToken(token, nonce) {
73
+ if (options.disableIdTokenSignIn) {
74
+ return false;
75
+ }
76
+
77
+ if (options.verifyIdToken) {
78
+ return options.verifyIdToken(token, nonce);
79
+ }
80
+
81
+ /* limited login */
82
+ // check is limited token
83
+ if (token.split(".").length === 3) {
84
+ try {
85
+ const { payload: jwtClaims } = await jwtVerify(
86
+ token,
87
+ createRemoteJWKSet(
88
+ // https://developers.facebook.com/docs/facebook-login/limited-login/token/#jwks
89
+ new URL(
90
+ "https://limited.facebook.com/.well-known/oauth/openid/jwks/",
91
+ ),
92
+ ),
93
+ {
94
+ algorithms: ["RS256"],
95
+ audience: options.clientId,
96
+ issuer: "https://www.facebook.com",
97
+ },
98
+ );
99
+
100
+ if (nonce && jwtClaims.nonce !== nonce) {
101
+ return false;
102
+ }
103
+
104
+ return !!jwtClaims;
105
+ } catch (error) {
106
+ return false;
107
+ }
108
+ }
109
+
110
+ /* access_token */
111
+ return true;
112
+ },
113
+ refreshAccessToken: options.refreshAccessToken
114
+ ? options.refreshAccessToken
115
+ : async (refreshToken) => {
116
+ return refreshAccessToken({
117
+ refreshToken,
118
+ options: {
119
+ clientId: options.clientId,
120
+ clientKey: options.clientKey,
121
+ clientSecret: options.clientSecret,
122
+ },
123
+ tokenEndpoint:
124
+ "https://graph.facebook.com/v18.0/oauth/access_token",
125
+ });
126
+ },
127
+ async getUserInfo(token) {
128
+ if (options.getUserInfo) {
129
+ return options.getUserInfo(token);
130
+ }
131
+
132
+ if (token.idToken && token.idToken.split(".").length === 3) {
133
+ const profile = decodeJwt(token.idToken) as {
134
+ sub: string;
135
+ email: string;
136
+ name: string;
137
+ picture: string;
138
+ };
139
+
140
+ const user = {
141
+ id: profile.sub,
142
+ name: profile.name,
143
+ email: profile.email,
144
+ picture: {
145
+ data: {
146
+ url: profile.picture,
147
+ height: 100,
148
+ width: 100,
149
+ is_silhouette: false,
150
+ },
151
+ },
152
+ };
153
+
154
+ // https://developers.facebook.com/docs/facebook-login/limited-login/permissions
155
+ const userMap = await options.mapProfileToUser?.({
156
+ ...user,
157
+ email_verified: true,
158
+ });
159
+
160
+ return {
161
+ user: {
162
+ ...user,
163
+ emailVerified: true,
164
+ ...userMap,
165
+ },
166
+ data: profile,
167
+ };
168
+ }
169
+
170
+ const fields = [
171
+ "id",
172
+ "name",
173
+ "email",
174
+ "picture",
175
+ ...(options?.fields || []),
176
+ ];
177
+ const { data: profile, error } = await betterFetch<FacebookProfile>(
178
+ "https://graph.facebook.com/me?fields=" + fields.join(","),
179
+ {
180
+ auth: {
181
+ type: "Bearer",
182
+ token: token.accessToken,
183
+ },
184
+ },
185
+ );
186
+ if (error) {
187
+ return null;
188
+ }
189
+ const userMap = await options.mapProfileToUser?.(profile);
190
+ return {
191
+ user: {
192
+ id: profile.id,
193
+ name: profile.name,
194
+ email: profile.email,
195
+ image: profile.picture.data.url,
196
+ emailVerified: profile.email_verified,
197
+ ...userMap,
198
+ },
199
+ data: profile,
200
+ };
201
+ },
202
+ options,
203
+ } satisfies OAuthProvider<FacebookProfile>;
204
+ };
@@ -0,0 +1,115 @@
1
+ import { betterFetch } from "@better-fetch/fetch";
2
+ import { BetterAuthError } from "../error";
3
+ import type { OAuthProvider, ProviderOptions } from "@better-auth/core/oauth2";
4
+ import {
5
+ createAuthorizationURL,
6
+ validateAuthorizationCode,
7
+ } from "@better-auth/core/oauth2";
8
+ import { logger } from "@better-auth/core/env";
9
+ import { refreshAccessToken } from "@better-auth/core/oauth2";
10
+
11
+ export interface FigmaProfile {
12
+ id: string;
13
+ email: string;
14
+ handle: string;
15
+ img_url: string;
16
+ }
17
+
18
+ export interface FigmaOptions extends ProviderOptions<FigmaProfile> {
19
+ clientId: string;
20
+ }
21
+
22
+ export const figma = (options: FigmaOptions) => {
23
+ return {
24
+ id: "figma",
25
+ name: "Figma",
26
+ async createAuthorizationURL({ state, scopes, codeVerifier, redirectURI }) {
27
+ if (!options.clientId || !options.clientSecret) {
28
+ logger.error(
29
+ "Client Id and Client Secret are required for Figma. Make sure to provide them in the options.",
30
+ );
31
+ throw new BetterAuthError("CLIENT_ID_AND_SECRET_REQUIRED");
32
+ }
33
+ if (!codeVerifier) {
34
+ throw new BetterAuthError("codeVerifier is required for Figma");
35
+ }
36
+
37
+ const _scopes = options.disableDefaultScope ? [] : ["file_read"];
38
+ options.scope && _scopes.push(...options.scope);
39
+ scopes && _scopes.push(...scopes);
40
+
41
+ const url = await createAuthorizationURL({
42
+ id: "figma",
43
+ options,
44
+ authorizationEndpoint: "https://www.figma.com/oauth",
45
+ scopes: _scopes,
46
+ state,
47
+ codeVerifier,
48
+ redirectURI,
49
+ });
50
+
51
+ return url;
52
+ },
53
+ validateAuthorizationCode: async ({ code, codeVerifier, redirectURI }) => {
54
+ return validateAuthorizationCode({
55
+ code,
56
+ codeVerifier,
57
+ redirectURI,
58
+ options,
59
+ tokenEndpoint: "https://www.figma.com/api/oauth/token",
60
+ });
61
+ },
62
+ refreshAccessToken: options.refreshAccessToken
63
+ ? options.refreshAccessToken
64
+ : async (refreshToken) => {
65
+ return refreshAccessToken({
66
+ refreshToken,
67
+ options: {
68
+ clientId: options.clientId,
69
+ clientKey: options.clientKey,
70
+ clientSecret: options.clientSecret,
71
+ },
72
+ tokenEndpoint: "https://www.figma.com/api/oauth/token",
73
+ });
74
+ },
75
+ async getUserInfo(token) {
76
+ if (options.getUserInfo) {
77
+ return options.getUserInfo(token);
78
+ }
79
+
80
+ try {
81
+ const { data: profile } = await betterFetch<FigmaProfile>(
82
+ "https://api.figma.com/v1/me",
83
+ {
84
+ headers: {
85
+ Authorization: `Bearer ${token.accessToken}`,
86
+ },
87
+ },
88
+ );
89
+
90
+ if (!profile) {
91
+ logger.error("Failed to fetch user from Figma");
92
+ return null;
93
+ }
94
+
95
+ const userMap = await options.mapProfileToUser?.(profile);
96
+
97
+ return {
98
+ user: {
99
+ id: profile.id,
100
+ name: profile.handle,
101
+ email: profile.email,
102
+ image: profile.img_url,
103
+ emailVerified: !!profile.email,
104
+ ...userMap,
105
+ },
106
+ data: profile,
107
+ };
108
+ } catch (error) {
109
+ logger.error("Failed to fetch user info from Figma:", error);
110
+ return null;
111
+ }
112
+ },
113
+ options,
114
+ } satisfies OAuthProvider<FigmaProfile>;
115
+ };
@@ -0,0 +1,154 @@
1
+ import { betterFetch } from "@better-fetch/fetch";
2
+ import type { OAuthProvider, ProviderOptions } from "@better-auth/core/oauth2";
3
+ import {
4
+ createAuthorizationURL,
5
+ refreshAccessToken,
6
+ validateAuthorizationCode,
7
+ } from "@better-auth/core/oauth2";
8
+
9
+ export interface GithubProfile {
10
+ login: string;
11
+ id: string;
12
+ node_id: string;
13
+ avatar_url: string;
14
+ gravatar_id: string;
15
+ url: string;
16
+ html_url: string;
17
+ followers_url: string;
18
+ following_url: string;
19
+ gists_url: string;
20
+ starred_url: string;
21
+ subscriptions_url: string;
22
+ organizations_url: string;
23
+ repos_url: string;
24
+ events_url: string;
25
+ received_events_url: string;
26
+ type: string;
27
+ site_admin: boolean;
28
+ name: string;
29
+ company: string;
30
+ blog: string;
31
+ location: string;
32
+ email: string;
33
+ hireable: boolean;
34
+ bio: string;
35
+ twitter_username: string;
36
+ public_repos: string;
37
+ public_gists: string;
38
+ followers: string;
39
+ following: string;
40
+ created_at: string;
41
+ updated_at: string;
42
+ private_gists: string;
43
+ total_private_repos: string;
44
+ owned_private_repos: string;
45
+ disk_usage: string;
46
+ collaborators: string;
47
+ two_factor_authentication: boolean;
48
+ plan: {
49
+ name: string;
50
+ space: string;
51
+ private_repos: string;
52
+ collaborators: string;
53
+ };
54
+ }
55
+
56
+ export interface GithubOptions extends ProviderOptions<GithubProfile> {
57
+ clientId: string;
58
+ }
59
+ export const github = (options: GithubOptions) => {
60
+ const tokenEndpoint = "https://github.com/login/oauth/access_token";
61
+ return {
62
+ id: "github",
63
+ name: "GitHub",
64
+ createAuthorizationURL({ state, scopes, loginHint, redirectURI }) {
65
+ const _scopes = options.disableDefaultScope
66
+ ? []
67
+ : ["read:user", "user:email"];
68
+ options.scope && _scopes.push(...options.scope);
69
+ scopes && _scopes.push(...scopes);
70
+ return createAuthorizationURL({
71
+ id: "github",
72
+ options,
73
+ authorizationEndpoint: "https://github.com/login/oauth/authorize",
74
+ scopes: _scopes,
75
+ state,
76
+ redirectURI,
77
+ loginHint,
78
+ prompt: options.prompt,
79
+ });
80
+ },
81
+ validateAuthorizationCode: async ({ code, redirectURI }) => {
82
+ return validateAuthorizationCode({
83
+ code,
84
+ redirectURI,
85
+ options,
86
+ tokenEndpoint,
87
+ });
88
+ },
89
+ refreshAccessToken: options.refreshAccessToken
90
+ ? options.refreshAccessToken
91
+ : async (refreshToken) => {
92
+ return refreshAccessToken({
93
+ refreshToken,
94
+ options: {
95
+ clientId: options.clientId,
96
+ clientKey: options.clientKey,
97
+ clientSecret: options.clientSecret,
98
+ },
99
+ tokenEndpoint: "https://github.com/login/oauth/access_token",
100
+ });
101
+ },
102
+ async getUserInfo(token) {
103
+ if (options.getUserInfo) {
104
+ return options.getUserInfo(token);
105
+ }
106
+ const { data: profile, error } = await betterFetch<GithubProfile>(
107
+ "https://api.github.com/user",
108
+ {
109
+ headers: {
110
+ "User-Agent": "better-auth",
111
+ authorization: `Bearer ${token.accessToken}`,
112
+ },
113
+ },
114
+ );
115
+ if (error) {
116
+ return null;
117
+ }
118
+ const { data: emails } = await betterFetch<
119
+ {
120
+ email: string;
121
+ primary: boolean;
122
+ verified: boolean;
123
+ visibility: "public" | "private";
124
+ }[]
125
+ >("https://api.github.com/user/emails", {
126
+ headers: {
127
+ Authorization: `Bearer ${token.accessToken}`,
128
+ "User-Agent": "better-auth",
129
+ },
130
+ });
131
+
132
+ if (!profile.email && emails) {
133
+ profile.email = (emails.find((e) => e.primary) ?? emails[0])
134
+ ?.email as string;
135
+ }
136
+ const emailVerified =
137
+ emails?.find((e) => e.email === profile.email)?.verified ?? false;
138
+
139
+ const userMap = await options.mapProfileToUser?.(profile);
140
+ return {
141
+ user: {
142
+ id: profile.id,
143
+ name: profile.name || profile.login,
144
+ email: profile.email,
145
+ image: profile.avatar_url,
146
+ emailVerified,
147
+ ...userMap,
148
+ },
149
+ data: profile,
150
+ };
151
+ },
152
+ options,
153
+ } satisfies OAuthProvider<GithubProfile>;
154
+ };
@@ -0,0 +1,152 @@
1
+ import { betterFetch } from "@better-fetch/fetch";
2
+ import type { OAuthProvider, ProviderOptions } from "@better-auth/core/oauth2";
3
+ import {
4
+ createAuthorizationURL,
5
+ validateAuthorizationCode,
6
+ refreshAccessToken,
7
+ } from "@better-auth/core/oauth2";
8
+
9
+ export interface GitlabProfile extends Record<string, any> {
10
+ id: number;
11
+ username: string;
12
+ email: string;
13
+ name: string;
14
+ state: string;
15
+ avatar_url: string;
16
+ web_url: string;
17
+ created_at: string;
18
+ bio: string;
19
+ location?: string;
20
+ public_email: string;
21
+ skype: string;
22
+ linkedin: string;
23
+ twitter: string;
24
+ website_url: string;
25
+ organization: string;
26
+ job_title: string;
27
+ pronouns: string;
28
+ bot: boolean;
29
+ work_information?: string;
30
+ followers: number;
31
+ following: number;
32
+ local_time: string;
33
+ last_sign_in_at: string;
34
+ confirmed_at: string;
35
+ theme_id: number;
36
+ last_activity_on: string;
37
+ color_scheme_id: number;
38
+ projects_limit: number;
39
+ current_sign_in_at: string;
40
+ identities: Array<{
41
+ provider: string;
42
+ extern_uid: string;
43
+ }>;
44
+ can_create_group: boolean;
45
+ can_create_project: boolean;
46
+ two_factor_enabled: boolean;
47
+ external: boolean;
48
+ private_profile: boolean;
49
+ commit_email: string;
50
+ shared_runners_minutes_limit: number;
51
+ extra_shared_runners_minutes_limit: number;
52
+ }
53
+
54
+ export interface GitlabOptions extends ProviderOptions<GitlabProfile> {
55
+ clientId: string;
56
+ issuer?: string;
57
+ }
58
+
59
+ const cleanDoubleSlashes = (input: string = "") => {
60
+ return input
61
+ .split("://")
62
+ .map((str) => str.replace(/\/{2,}/g, "/"))
63
+ .join("://");
64
+ };
65
+
66
+ const issuerToEndpoints = (issuer?: string) => {
67
+ let baseUrl = issuer || "https://gitlab.com";
68
+ return {
69
+ authorizationEndpoint: cleanDoubleSlashes(`${baseUrl}/oauth/authorize`),
70
+ tokenEndpoint: cleanDoubleSlashes(`${baseUrl}/oauth/token`),
71
+ userinfoEndpoint: cleanDoubleSlashes(`${baseUrl}/api/v4/user`),
72
+ };
73
+ };
74
+
75
+ export const gitlab = (options: GitlabOptions) => {
76
+ const { authorizationEndpoint, tokenEndpoint, userinfoEndpoint } =
77
+ issuerToEndpoints(options.issuer);
78
+ const issuerId = "gitlab";
79
+ const issuerName = "Gitlab";
80
+ return {
81
+ id: issuerId,
82
+ name: issuerName,
83
+ createAuthorizationURL: async ({
84
+ state,
85
+ scopes,
86
+ codeVerifier,
87
+ loginHint,
88
+ redirectURI,
89
+ }) => {
90
+ const _scopes = options.disableDefaultScope ? [] : ["read_user"];
91
+ options.scope && _scopes.push(...options.scope);
92
+ scopes && _scopes.push(...scopes);
93
+ return await createAuthorizationURL({
94
+ id: issuerId,
95
+ options,
96
+ authorizationEndpoint,
97
+ scopes: _scopes,
98
+ state,
99
+ redirectURI,
100
+ codeVerifier,
101
+ loginHint,
102
+ });
103
+ },
104
+ validateAuthorizationCode: async ({ code, redirectURI, codeVerifier }) => {
105
+ return validateAuthorizationCode({
106
+ code,
107
+ redirectURI,
108
+ options,
109
+ codeVerifier,
110
+ tokenEndpoint,
111
+ });
112
+ },
113
+ refreshAccessToken: options.refreshAccessToken
114
+ ? options.refreshAccessToken
115
+ : async (refreshToken) => {
116
+ return refreshAccessToken({
117
+ refreshToken,
118
+ options: {
119
+ clientId: options.clientId,
120
+ clientKey: options.clientKey,
121
+ clientSecret: options.clientSecret,
122
+ },
123
+ tokenEndpoint: tokenEndpoint,
124
+ });
125
+ },
126
+ async getUserInfo(token) {
127
+ if (options.getUserInfo) {
128
+ return options.getUserInfo(token);
129
+ }
130
+ const { data: profile, error } = await betterFetch<GitlabProfile>(
131
+ userinfoEndpoint,
132
+ { headers: { authorization: `Bearer ${token.accessToken}` } },
133
+ );
134
+ if (error || profile.state !== "active" || profile.locked) {
135
+ return null;
136
+ }
137
+ const userMap = await options.mapProfileToUser?.(profile);
138
+ return {
139
+ user: {
140
+ id: profile.id,
141
+ name: profile.name ?? profile.username,
142
+ email: profile.email,
143
+ image: profile.avatar_url,
144
+ emailVerified: true,
145
+ ...userMap,
146
+ },
147
+ data: profile,
148
+ };
149
+ },
150
+ options,
151
+ } satisfies OAuthProvider<GitlabProfile>;
152
+ };