@better-auth/core 1.3.27 → 1.3.29

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (121) hide show
  1. package/.turbo/turbo-build.log +54 -4
  2. package/build.config.ts +6 -0
  3. package/dist/db/adapter/index.d.cts +13 -23
  4. package/dist/db/adapter/index.d.mts +13 -23
  5. package/dist/db/adapter/index.d.ts +13 -23
  6. package/dist/db/index.cjs +16 -0
  7. package/dist/db/index.d.cts +6 -83
  8. package/dist/db/index.d.mts +6 -83
  9. package/dist/db/index.d.ts +6 -83
  10. package/dist/db/index.mjs +16 -1
  11. package/dist/env/index.cjs +312 -0
  12. package/dist/env/index.d.cts +36 -0
  13. package/dist/env/index.d.mts +36 -0
  14. package/dist/env/index.d.ts +36 -0
  15. package/dist/env/index.mjs +297 -0
  16. package/dist/error/index.cjs +44 -0
  17. package/dist/error/index.d.cts +33 -0
  18. package/dist/error/index.d.mts +33 -0
  19. package/dist/error/index.d.ts +33 -0
  20. package/dist/error/index.mjs +41 -0
  21. package/dist/index.d.cts +156 -101
  22. package/dist/index.d.mts +156 -101
  23. package/dist/index.d.ts +156 -101
  24. package/dist/middleware/index.cjs +25 -0
  25. package/dist/middleware/index.d.cts +13 -0
  26. package/dist/middleware/index.d.mts +13 -0
  27. package/dist/middleware/index.d.ts +13 -0
  28. package/dist/middleware/index.mjs +21 -0
  29. package/dist/oauth2/index.cjs +368 -0
  30. package/dist/oauth2/index.d.cts +100 -0
  31. package/dist/oauth2/index.d.mts +100 -0
  32. package/dist/oauth2/index.d.ts +100 -0
  33. package/dist/oauth2/index.mjs +357 -0
  34. package/dist/shared/core.Bl6TpxyD.d.mts +181 -0
  35. package/dist/shared/core.Bqe5IGAi.d.ts +13 -0
  36. package/dist/shared/core.Bshk2o_x.d.ts +1721 -0
  37. package/dist/shared/core.BwoNUcJQ.d.cts +53 -0
  38. package/dist/shared/core.BwoNUcJQ.d.mts +53 -0
  39. package/dist/shared/core.BwoNUcJQ.d.ts +53 -0
  40. package/dist/shared/core.C6_2xGyf.d.mts +1721 -0
  41. package/dist/shared/{core.CnvFgghY.d.cts → core.CajxAutx.d.cts} +27 -1
  42. package/dist/shared/{core.CnvFgghY.d.mts → core.CajxAutx.d.mts} +27 -1
  43. package/dist/shared/{core.CnvFgghY.d.ts → core.CajxAutx.d.ts} +27 -1
  44. package/dist/shared/core.CfqdiZTu.d.cts +1721 -0
  45. package/dist/shared/core.DkdZ1o38.d.ts +181 -0
  46. package/dist/shared/core.Dl-70uns.d.cts +84 -0
  47. package/dist/shared/core.Dl-70uns.d.mts +84 -0
  48. package/dist/shared/core.Dl-70uns.d.ts +84 -0
  49. package/dist/shared/core.DyEdx0m7.d.cts +181 -0
  50. package/dist/shared/core.E9DfzGLz.d.mts +13 -0
  51. package/dist/shared/core.HqYn20Fi.d.cts +13 -0
  52. package/dist/social-providers/index.cjs +2793 -0
  53. package/dist/social-providers/index.d.cts +3903 -0
  54. package/dist/social-providers/index.d.mts +3903 -0
  55. package/dist/social-providers/index.d.ts +3903 -0
  56. package/dist/social-providers/index.mjs +2743 -0
  57. package/dist/utils/index.cjs +7 -0
  58. package/dist/utils/index.d.cts +10 -0
  59. package/dist/utils/index.d.mts +10 -0
  60. package/dist/utils/index.d.ts +10 -0
  61. package/dist/utils/index.mjs +5 -0
  62. package/package.json +98 -2
  63. package/src/db/adapter/index.ts +424 -0
  64. package/src/db/index.ts +2 -0
  65. package/src/db/schema/rate-limit.ts +21 -0
  66. package/src/db/type.ts +28 -0
  67. package/src/env/color-depth.ts +172 -0
  68. package/src/env/env-impl.ts +124 -0
  69. package/src/env/index.ts +23 -0
  70. package/src/env/logger.test.ts +33 -0
  71. package/src/env/logger.ts +145 -0
  72. package/src/error/codes.ts +31 -0
  73. package/src/error/index.ts +11 -0
  74. package/src/index.ts +0 -2
  75. package/src/middleware/index.ts +33 -0
  76. package/src/oauth2/client-credentials-token.ts +102 -0
  77. package/src/oauth2/create-authorization-url.ts +85 -0
  78. package/src/oauth2/index.ts +22 -0
  79. package/src/oauth2/oauth-provider.ts +194 -0
  80. package/src/oauth2/refresh-access-token.ts +124 -0
  81. package/src/oauth2/utils.ts +36 -0
  82. package/src/oauth2/validate-authorization-code.ts +156 -0
  83. package/src/social-providers/apple.ts +213 -0
  84. package/src/social-providers/atlassian.ts +130 -0
  85. package/src/social-providers/cognito.ts +269 -0
  86. package/src/social-providers/discord.ts +172 -0
  87. package/src/social-providers/dropbox.ts +112 -0
  88. package/src/social-providers/facebook.ts +204 -0
  89. package/src/social-providers/figma.ts +115 -0
  90. package/src/social-providers/github.ts +154 -0
  91. package/src/social-providers/gitlab.ts +152 -0
  92. package/src/social-providers/google.ts +171 -0
  93. package/src/social-providers/huggingface.ts +116 -0
  94. package/src/social-providers/index.ts +118 -0
  95. package/src/social-providers/kakao.ts +178 -0
  96. package/src/social-providers/kick.ts +95 -0
  97. package/src/social-providers/line.ts +169 -0
  98. package/src/social-providers/linear.ts +120 -0
  99. package/src/social-providers/linkedin.ts +110 -0
  100. package/src/social-providers/microsoft-entra-id.ts +243 -0
  101. package/src/social-providers/naver.ts +112 -0
  102. package/src/social-providers/notion.ts +106 -0
  103. package/src/social-providers/paypal.ts +261 -0
  104. package/src/social-providers/reddit.ts +122 -0
  105. package/src/social-providers/roblox.ts +110 -0
  106. package/src/social-providers/salesforce.ts +157 -0
  107. package/src/social-providers/slack.ts +114 -0
  108. package/src/social-providers/spotify.ts +93 -0
  109. package/src/social-providers/tiktok.ts +211 -0
  110. package/src/social-providers/twitch.ts +111 -0
  111. package/src/social-providers/twitter.ts +194 -0
  112. package/src/social-providers/vk.ts +128 -0
  113. package/src/social-providers/zoom.ts +218 -0
  114. package/src/types/context.ts +334 -0
  115. package/src/types/cookie.ts +7 -0
  116. package/src/types/index.ts +19 -1
  117. package/src/types/init-options.ts +1048 -2
  118. package/src/types/plugin-client.ts +69 -0
  119. package/src/types/plugin.ts +134 -0
  120. package/src/utils/error-codes.ts +51 -0
  121. package/src/utils/index.ts +1 -0
@@ -0,0 +1,357 @@
1
+ import { base64Url, base64 } from '@better-auth/utils/base64';
2
+ import { betterFetch } from '@better-fetch/fetch';
3
+ import { jwtVerify } from 'jose';
4
+
5
+ function getOAuth2Tokens(data) {
6
+ const getDate = (seconds) => {
7
+ const now = /* @__PURE__ */ new Date();
8
+ return new Date(now.getTime() + seconds * 1e3);
9
+ };
10
+ return {
11
+ tokenType: data.token_type,
12
+ accessToken: data.access_token,
13
+ refreshToken: data.refresh_token,
14
+ accessTokenExpiresAt: data.expires_in ? getDate(data.expires_in) : void 0,
15
+ refreshTokenExpiresAt: data.refresh_token_expires_in ? getDate(data.refresh_token_expires_in) : void 0,
16
+ scopes: data?.scope ? typeof data.scope === "string" ? data.scope.split(" ") : data.scope : [],
17
+ idToken: data.id_token
18
+ };
19
+ }
20
+ async function generateCodeChallenge(codeVerifier) {
21
+ const encoder = new TextEncoder();
22
+ const data = encoder.encode(codeVerifier);
23
+ const hash = await crypto.subtle.digest("SHA-256", data);
24
+ return base64Url.encode(new Uint8Array(hash), {
25
+ padding: false
26
+ });
27
+ }
28
+
29
+ async function createAuthorizationURL({
30
+ id,
31
+ options,
32
+ authorizationEndpoint,
33
+ state,
34
+ codeVerifier,
35
+ scopes,
36
+ claims,
37
+ redirectURI,
38
+ duration,
39
+ prompt,
40
+ accessType,
41
+ responseType,
42
+ display,
43
+ loginHint,
44
+ hd,
45
+ responseMode,
46
+ additionalParams,
47
+ scopeJoiner
48
+ }) {
49
+ const url = new URL(authorizationEndpoint);
50
+ url.searchParams.set("response_type", responseType || "code");
51
+ const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
52
+ url.searchParams.set("client_id", primaryClientId);
53
+ url.searchParams.set("state", state);
54
+ url.searchParams.set("scope", scopes.join(scopeJoiner || " "));
55
+ url.searchParams.set("redirect_uri", options.redirectURI || redirectURI);
56
+ duration && url.searchParams.set("duration", duration);
57
+ display && url.searchParams.set("display", display);
58
+ loginHint && url.searchParams.set("login_hint", loginHint);
59
+ prompt && url.searchParams.set("prompt", prompt);
60
+ hd && url.searchParams.set("hd", hd);
61
+ accessType && url.searchParams.set("access_type", accessType);
62
+ responseMode && url.searchParams.set("response_mode", responseMode);
63
+ if (codeVerifier) {
64
+ const codeChallenge = await generateCodeChallenge(codeVerifier);
65
+ url.searchParams.set("code_challenge_method", "S256");
66
+ url.searchParams.set("code_challenge", codeChallenge);
67
+ }
68
+ if (claims) {
69
+ const claimsObj = claims.reduce(
70
+ (acc, claim) => {
71
+ acc[claim] = null;
72
+ return acc;
73
+ },
74
+ {}
75
+ );
76
+ url.searchParams.set(
77
+ "claims",
78
+ JSON.stringify({
79
+ id_token: { email: null, email_verified: null, ...claimsObj }
80
+ })
81
+ );
82
+ }
83
+ if (additionalParams) {
84
+ Object.entries(additionalParams).forEach(([key, value]) => {
85
+ url.searchParams.set(key, value);
86
+ });
87
+ }
88
+ return url;
89
+ }
90
+
91
+ function createAuthorizationCodeRequest({
92
+ code,
93
+ codeVerifier,
94
+ redirectURI,
95
+ options,
96
+ authentication,
97
+ deviceId,
98
+ headers,
99
+ additionalParams = {},
100
+ resource
101
+ }) {
102
+ const body = new URLSearchParams();
103
+ const requestHeaders = {
104
+ "content-type": "application/x-www-form-urlencoded",
105
+ accept: "application/json",
106
+ "user-agent": "better-auth",
107
+ ...headers
108
+ };
109
+ body.set("grant_type", "authorization_code");
110
+ body.set("code", code);
111
+ codeVerifier && body.set("code_verifier", codeVerifier);
112
+ options.clientKey && body.set("client_key", options.clientKey);
113
+ deviceId && body.set("device_id", deviceId);
114
+ body.set("redirect_uri", options.redirectURI || redirectURI);
115
+ if (resource) {
116
+ if (typeof resource === "string") {
117
+ body.append("resource", resource);
118
+ } else {
119
+ for (const _resource of resource) {
120
+ body.append("resource", _resource);
121
+ }
122
+ }
123
+ }
124
+ if (authentication === "basic") {
125
+ const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
126
+ const encodedCredentials = base64.encode(
127
+ `${primaryClientId}:${options.clientSecret ?? ""}`
128
+ );
129
+ requestHeaders["authorization"] = `Basic ${encodedCredentials}`;
130
+ } else {
131
+ const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
132
+ body.set("client_id", primaryClientId);
133
+ if (options.clientSecret) {
134
+ body.set("client_secret", options.clientSecret);
135
+ }
136
+ }
137
+ for (const [key, value] of Object.entries(additionalParams)) {
138
+ if (!body.has(key)) body.append(key, value);
139
+ }
140
+ return {
141
+ body,
142
+ headers: requestHeaders
143
+ };
144
+ }
145
+ async function validateAuthorizationCode({
146
+ code,
147
+ codeVerifier,
148
+ redirectURI,
149
+ options,
150
+ tokenEndpoint,
151
+ authentication,
152
+ deviceId,
153
+ headers,
154
+ additionalParams = {},
155
+ resource
156
+ }) {
157
+ const { body, headers: requestHeaders } = createAuthorizationCodeRequest({
158
+ code,
159
+ codeVerifier,
160
+ redirectURI,
161
+ options,
162
+ authentication,
163
+ deviceId,
164
+ headers,
165
+ additionalParams,
166
+ resource
167
+ });
168
+ const { data, error } = await betterFetch(tokenEndpoint, {
169
+ method: "POST",
170
+ body,
171
+ headers: requestHeaders
172
+ });
173
+ if (error) {
174
+ throw error;
175
+ }
176
+ const tokens = getOAuth2Tokens(data);
177
+ return tokens;
178
+ }
179
+ async function validateToken(token, jwksEndpoint) {
180
+ const { data, error } = await betterFetch(jwksEndpoint, {
181
+ method: "GET",
182
+ headers: {
183
+ accept: "application/json",
184
+ "user-agent": "better-auth"
185
+ }
186
+ });
187
+ if (error) {
188
+ throw error;
189
+ }
190
+ const keys = data["keys"];
191
+ const header = JSON.parse(atob(token.split(".")[0]));
192
+ const key = keys.find((key2) => key2.kid === header.kid);
193
+ if (!key) {
194
+ throw new Error("Key not found");
195
+ }
196
+ const verified = await jwtVerify(token, key);
197
+ return verified;
198
+ }
199
+
200
+ function createRefreshAccessTokenRequest({
201
+ refreshToken,
202
+ options,
203
+ authentication,
204
+ extraParams,
205
+ resource
206
+ }) {
207
+ const body = new URLSearchParams();
208
+ const headers = {
209
+ "content-type": "application/x-www-form-urlencoded",
210
+ accept: "application/json"
211
+ };
212
+ body.set("grant_type", "refresh_token");
213
+ body.set("refresh_token", refreshToken);
214
+ if (authentication === "basic") {
215
+ const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
216
+ if (primaryClientId) {
217
+ headers["authorization"] = "Basic " + base64.encode(`${primaryClientId}:${options.clientSecret ?? ""}`);
218
+ } else {
219
+ headers["authorization"] = "Basic " + base64.encode(`:${options.clientSecret ?? ""}`);
220
+ }
221
+ } else {
222
+ const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
223
+ body.set("client_id", primaryClientId);
224
+ if (options.clientSecret) {
225
+ body.set("client_secret", options.clientSecret);
226
+ }
227
+ }
228
+ if (resource) {
229
+ if (typeof resource === "string") {
230
+ body.append("resource", resource);
231
+ } else {
232
+ for (const _resource of resource) {
233
+ body.append("resource", _resource);
234
+ }
235
+ }
236
+ }
237
+ if (extraParams) {
238
+ for (const [key, value] of Object.entries(extraParams)) {
239
+ body.set(key, value);
240
+ }
241
+ }
242
+ return {
243
+ body,
244
+ headers
245
+ };
246
+ }
247
+ async function refreshAccessToken({
248
+ refreshToken,
249
+ options,
250
+ tokenEndpoint,
251
+ authentication,
252
+ extraParams
253
+ }) {
254
+ const { body, headers } = createRefreshAccessTokenRequest({
255
+ refreshToken,
256
+ options,
257
+ authentication,
258
+ extraParams
259
+ });
260
+ const { data, error } = await betterFetch(tokenEndpoint, {
261
+ method: "POST",
262
+ body,
263
+ headers
264
+ });
265
+ if (error) {
266
+ throw error;
267
+ }
268
+ const tokens = {
269
+ accessToken: data.access_token,
270
+ refreshToken: data.refresh_token,
271
+ tokenType: data.token_type,
272
+ scopes: data.scope?.split(" "),
273
+ idToken: data.id_token
274
+ };
275
+ if (data.expires_in) {
276
+ const now = /* @__PURE__ */ new Date();
277
+ tokens.accessTokenExpiresAt = new Date(
278
+ now.getTime() + data.expires_in * 1e3
279
+ );
280
+ }
281
+ return tokens;
282
+ }
283
+
284
+ function createClientCredentialsTokenRequest({
285
+ options,
286
+ scope,
287
+ authentication,
288
+ resource
289
+ }) {
290
+ const body = new URLSearchParams();
291
+ const headers = {
292
+ "content-type": "application/x-www-form-urlencoded",
293
+ accept: "application/json"
294
+ };
295
+ body.set("grant_type", "client_credentials");
296
+ scope && body.set("scope", scope);
297
+ if (resource) {
298
+ if (typeof resource === "string") {
299
+ body.append("resource", resource);
300
+ } else {
301
+ for (const _resource of resource) {
302
+ body.append("resource", _resource);
303
+ }
304
+ }
305
+ }
306
+ if (authentication === "basic") {
307
+ const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
308
+ const encodedCredentials = base64Url.encode(
309
+ `${primaryClientId}:${options.clientSecret}`
310
+ );
311
+ headers["authorization"] = `Basic ${encodedCredentials}`;
312
+ } else {
313
+ const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
314
+ body.set("client_id", primaryClientId);
315
+ body.set("client_secret", options.clientSecret);
316
+ }
317
+ return {
318
+ body,
319
+ headers
320
+ };
321
+ }
322
+ async function clientCredentialsToken({
323
+ options,
324
+ tokenEndpoint,
325
+ scope,
326
+ authentication,
327
+ resource
328
+ }) {
329
+ const { body, headers } = createClientCredentialsTokenRequest({
330
+ options,
331
+ scope,
332
+ authentication,
333
+ resource
334
+ });
335
+ const { data, error } = await betterFetch(tokenEndpoint, {
336
+ method: "POST",
337
+ body,
338
+ headers
339
+ });
340
+ if (error) {
341
+ throw error;
342
+ }
343
+ const tokens = {
344
+ accessToken: data.access_token,
345
+ tokenType: data.token_type,
346
+ scopes: data.scope?.split(" ")
347
+ };
348
+ if (data.expires_in) {
349
+ const now = /* @__PURE__ */ new Date();
350
+ tokens.accessTokenExpiresAt = new Date(
351
+ now.getTime() + data.expires_in * 1e3
352
+ );
353
+ }
354
+ return tokens;
355
+ }
356
+
357
+ export { clientCredentialsToken, createAuthorizationCodeRequest, createAuthorizationURL, createClientCredentialsTokenRequest, createRefreshAccessTokenRequest, generateCodeChallenge, getOAuth2Tokens, refreshAccessToken, validateAuthorizationCode, validateToken };
@@ -0,0 +1,181 @@
1
+ import { L as LiteralString } from './core.CajxAutx.mjs';
2
+
3
+ interface OAuth2Tokens {
4
+ tokenType?: string;
5
+ accessToken?: string;
6
+ refreshToken?: string;
7
+ accessTokenExpiresAt?: Date;
8
+ refreshTokenExpiresAt?: Date;
9
+ scopes?: string[];
10
+ idToken?: string;
11
+ }
12
+ type OAuth2UserInfo = {
13
+ id: string | number;
14
+ name?: string;
15
+ email?: string | null;
16
+ image?: string;
17
+ emailVerified: boolean;
18
+ };
19
+ interface OAuthProvider<T extends Record<string, any> = Record<string, any>, O extends Record<string, any> = Partial<ProviderOptions>> {
20
+ id: LiteralString;
21
+ createAuthorizationURL: (data: {
22
+ state: string;
23
+ codeVerifier: string;
24
+ scopes?: string[];
25
+ redirectURI: string;
26
+ display?: string;
27
+ loginHint?: string;
28
+ }) => Promise<URL> | URL;
29
+ name: string;
30
+ validateAuthorizationCode: (data: {
31
+ code: string;
32
+ redirectURI: string;
33
+ codeVerifier?: string;
34
+ deviceId?: string;
35
+ }) => Promise<OAuth2Tokens>;
36
+ getUserInfo: (token: OAuth2Tokens & {
37
+ /**
38
+ * The user object from the provider
39
+ * This is only available for some providers like Apple
40
+ */
41
+ user?: {
42
+ name?: {
43
+ firstName?: string;
44
+ lastName?: string;
45
+ };
46
+ email?: string;
47
+ };
48
+ }) => Promise<{
49
+ user: OAuth2UserInfo;
50
+ data: T;
51
+ } | null>;
52
+ /**
53
+ * Custom function to refresh a token
54
+ */
55
+ refreshAccessToken?: (refreshToken: string) => Promise<OAuth2Tokens>;
56
+ revokeToken?: (token: string) => Promise<void>;
57
+ /**
58
+ * Verify the id token
59
+ * @param token - The id token
60
+ * @param nonce - The nonce
61
+ * @returns True if the id token is valid, false otherwise
62
+ */
63
+ verifyIdToken?: (token: string, nonce?: string) => Promise<boolean>;
64
+ /**
65
+ * Disable implicit sign up for new users. When set to true for the provider,
66
+ * sign-in need to be called with with requestSignUp as true to create new users.
67
+ */
68
+ disableImplicitSignUp?: boolean;
69
+ /**
70
+ * Disable sign up for new users.
71
+ */
72
+ disableSignUp?: boolean;
73
+ /**
74
+ * Options for the provider
75
+ */
76
+ options?: O;
77
+ }
78
+ type ProviderOptions<Profile extends Record<string, any> = any> = {
79
+ /**
80
+ * The client ID of your application.
81
+ *
82
+ * This is usually a string but can be any type depending on the provider.
83
+ */
84
+ clientId?: unknown;
85
+ /**
86
+ * The client secret of your application
87
+ */
88
+ clientSecret?: string;
89
+ /**
90
+ * The scopes you want to request from the provider
91
+ */
92
+ scope?: string[];
93
+ /**
94
+ * Remove default scopes of the provider
95
+ */
96
+ disableDefaultScope?: boolean;
97
+ /**
98
+ * The redirect URL for your application. This is where the provider will
99
+ * redirect the user after the sign in process. Make sure this URL is
100
+ * whitelisted in the provider's dashboard.
101
+ */
102
+ redirectURI?: string;
103
+ /**
104
+ * The client key of your application
105
+ * Tiktok Social Provider uses this field instead of clientId
106
+ */
107
+ clientKey?: string;
108
+ /**
109
+ * Disable provider from allowing users to sign in
110
+ * with this provider with an id token sent from the
111
+ * client.
112
+ */
113
+ disableIdTokenSignIn?: boolean;
114
+ /**
115
+ * verifyIdToken function to verify the id token
116
+ */
117
+ verifyIdToken?: (token: string, nonce?: string) => Promise<boolean>;
118
+ /**
119
+ * Custom function to get user info from the provider
120
+ */
121
+ getUserInfo?: (token: OAuth2Tokens) => Promise<{
122
+ user: {
123
+ id: string;
124
+ name?: string;
125
+ email?: string | null;
126
+ image?: string;
127
+ emailVerified: boolean;
128
+ [key: string]: any;
129
+ };
130
+ data: any;
131
+ }>;
132
+ /**
133
+ * Custom function to refresh a token
134
+ */
135
+ refreshAccessToken?: (refreshToken: string) => Promise<OAuth2Tokens>;
136
+ /**
137
+ * Custom function to map the provider profile to a
138
+ * user.
139
+ */
140
+ mapProfileToUser?: (profile: Profile) => {
141
+ id?: string;
142
+ name?: string;
143
+ email?: string | null;
144
+ image?: string;
145
+ emailVerified?: boolean;
146
+ [key: string]: any;
147
+ } | Promise<{
148
+ id?: string;
149
+ name?: string;
150
+ email?: string | null;
151
+ image?: string;
152
+ emailVerified?: boolean;
153
+ [key: string]: any;
154
+ }>;
155
+ /**
156
+ * Disable implicit sign up for new users. When set to true for the provider,
157
+ * sign-in need to be called with with requestSignUp as true to create new users.
158
+ */
159
+ disableImplicitSignUp?: boolean;
160
+ /**
161
+ * Disable sign up for new users.
162
+ */
163
+ disableSignUp?: boolean;
164
+ /**
165
+ * The prompt to use for the authorization code request
166
+ */
167
+ prompt?: "select_account" | "consent" | "login" | "none" | "select_account consent";
168
+ /**
169
+ * The response mode to use for the authorization code request
170
+ */
171
+ responseMode?: "query" | "form_post";
172
+ /**
173
+ * If enabled, the user info will be overridden with the provider user info
174
+ * This is useful if you want to use the provider user info to update the user info
175
+ *
176
+ * @default false
177
+ */
178
+ overrideUserInfoOnSignIn?: boolean;
179
+ };
180
+
181
+ export type { OAuth2Tokens as O, ProviderOptions as P, OAuthProvider as a, OAuth2UserInfo as b };
@@ -0,0 +1,13 @@
1
+ import { D as DBFieldAttribute } from './core.CajxAutx.js';
2
+
3
+ type BetterAuthPluginDBSchema = {
4
+ [table in string]: {
5
+ fields: {
6
+ [field in string]: DBFieldAttribute;
7
+ };
8
+ disableMigration?: boolean;
9
+ modelName?: string;
10
+ };
11
+ };
12
+
13
+ export type { BetterAuthPluginDBSchema as B };