@better-auth/core 1.4.0-beta.7 → 1.4.0-beta.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.turbo/turbo-build.log +54 -4
- package/build.config.ts +6 -0
- package/dist/db/adapter/index.d.cts +14 -23
- package/dist/db/adapter/index.d.mts +14 -23
- package/dist/db/adapter/index.d.ts +14 -23
- package/dist/db/index.cjs +16 -0
- package/dist/db/index.d.cts +6 -83
- package/dist/db/index.d.mts +6 -83
- package/dist/db/index.d.ts +6 -83
- package/dist/db/index.mjs +16 -1
- package/dist/env/index.cjs +315 -0
- package/dist/env/index.d.cts +36 -0
- package/dist/env/index.d.mts +36 -0
- package/dist/env/index.d.ts +36 -0
- package/dist/env/index.mjs +300 -0
- package/dist/error/index.cjs +44 -0
- package/dist/error/index.d.cts +33 -0
- package/dist/error/index.d.mts +33 -0
- package/dist/error/index.d.ts +33 -0
- package/dist/error/index.mjs +41 -0
- package/dist/index.d.cts +159 -94
- package/dist/index.d.mts +159 -94
- package/dist/index.d.ts +159 -94
- package/dist/middleware/index.cjs +25 -0
- package/dist/middleware/index.d.cts +14 -0
- package/dist/middleware/index.d.mts +14 -0
- package/dist/middleware/index.d.ts +14 -0
- package/dist/middleware/index.mjs +21 -0
- package/dist/oauth2/index.cjs +368 -0
- package/dist/oauth2/index.d.cts +99 -0
- package/dist/oauth2/index.d.mts +99 -0
- package/dist/oauth2/index.d.ts +99 -0
- package/dist/oauth2/index.mjs +357 -0
- package/dist/shared/core.2rWMW9q9.d.ts +13 -0
- package/dist/shared/core.40VTWh-p.d.cts +217 -0
- package/dist/shared/core.BfcVdsSf.d.cts +181 -0
- package/dist/shared/core.Bisb2Bdk.d.mts +181 -0
- package/dist/shared/core.BwoNUcJQ.d.cts +53 -0
- package/dist/shared/core.BwoNUcJQ.d.mts +53 -0
- package/dist/shared/core.BwoNUcJQ.d.ts +53 -0
- package/dist/shared/core.CErFRCOZ.d.mts +1684 -0
- package/dist/shared/core.CGN6D-Mh.d.ts +181 -0
- package/dist/shared/core.CPuIItYE.d.ts +217 -0
- package/dist/shared/core.CftpHMDz.d.cts +13 -0
- package/dist/shared/core.Db7zJyxf.d.ts +1684 -0
- package/dist/shared/core.DqaxObkf.d.cts +1684 -0
- package/dist/shared/core.MjcDoj7R.d.cts +5 -0
- package/dist/shared/core.MjcDoj7R.d.mts +5 -0
- package/dist/shared/core.MjcDoj7R.d.ts +5 -0
- package/dist/shared/core.g2ZbxAEV.d.mts +217 -0
- package/dist/shared/core.g9ACQ8v2.d.mts +13 -0
- package/dist/social-providers/index.cjs +2793 -0
- package/dist/social-providers/index.d.cts +3903 -0
- package/dist/social-providers/index.d.mts +3903 -0
- package/dist/social-providers/index.d.ts +3903 -0
- package/dist/social-providers/index.mjs +2743 -0
- package/dist/utils/index.cjs +7 -0
- package/dist/utils/index.d.cts +10 -0
- package/dist/utils/index.d.mts +10 -0
- package/dist/utils/index.d.ts +10 -0
- package/dist/utils/index.mjs +5 -0
- package/package.json +99 -2
- package/src/db/adapter/index.ts +424 -0
- package/src/db/index.ts +4 -0
- package/src/db/schema/rate-limit.ts +21 -0
- package/src/db/type.ts +29 -10
- package/src/env/color-depth.ts +171 -0
- package/src/env/env-impl.ts +123 -0
- package/src/env/index.ts +23 -0
- package/src/env/logger.test.ts +33 -0
- package/src/env/logger.ts +145 -0
- package/src/error/codes.ts +31 -0
- package/src/error/index.ts +11 -0
- package/src/index.ts +0 -2
- package/src/middleware/index.ts +33 -0
- package/src/oauth2/client-credentials-token.ts +102 -0
- package/src/oauth2/create-authorization-url.ts +85 -0
- package/src/oauth2/index.ts +22 -0
- package/src/oauth2/oauth-provider.ts +194 -0
- package/src/oauth2/refresh-access-token.ts +124 -0
- package/src/oauth2/utils.ts +36 -0
- package/src/oauth2/validate-authorization-code.ts +156 -0
- package/src/social-providers/apple.ts +213 -0
- package/src/social-providers/atlassian.ts +130 -0
- package/src/social-providers/cognito.ts +269 -0
- package/src/social-providers/discord.ts +172 -0
- package/src/social-providers/dropbox.ts +112 -0
- package/src/social-providers/facebook.ts +204 -0
- package/src/social-providers/figma.ts +115 -0
- package/src/social-providers/github.ts +154 -0
- package/src/social-providers/gitlab.ts +152 -0
- package/src/social-providers/google.ts +171 -0
- package/src/social-providers/huggingface.ts +116 -0
- package/src/social-providers/index.ts +118 -0
- package/src/social-providers/kakao.ts +178 -0
- package/src/social-providers/kick.ts +95 -0
- package/src/social-providers/line.ts +169 -0
- package/src/social-providers/linear.ts +120 -0
- package/src/social-providers/linkedin.ts +110 -0
- package/src/social-providers/microsoft-entra-id.ts +243 -0
- package/src/social-providers/naver.ts +112 -0
- package/src/social-providers/notion.ts +106 -0
- package/src/social-providers/paypal.ts +261 -0
- package/src/social-providers/reddit.ts +122 -0
- package/src/social-providers/roblox.ts +110 -0
- package/src/social-providers/salesforce.ts +157 -0
- package/src/social-providers/slack.ts +114 -0
- package/src/social-providers/spotify.ts +93 -0
- package/src/social-providers/tiktok.ts +211 -0
- package/src/social-providers/twitch.ts +111 -0
- package/src/social-providers/twitter.ts +194 -0
- package/src/social-providers/vk.ts +128 -0
- package/src/social-providers/zoom.ts +218 -0
- package/src/types/context.ts +270 -0
- package/src/types/cookie.ts +7 -0
- package/src/types/index.ts +19 -1
- package/src/types/init-options.ts +1039 -2
- package/src/types/plugin-client.ts +69 -0
- package/src/types/plugin.ts +134 -0
- package/src/utils/error-codes.ts +51 -0
- package/src/utils/index.ts +1 -0
- package/dist/shared/core.CnvFgghY.d.cts +0 -117
- package/dist/shared/core.CnvFgghY.d.mts +0 -117
- package/dist/shared/core.CnvFgghY.d.ts +0 -117
|
@@ -0,0 +1,357 @@
|
|
|
1
|
+
import { base64Url, base64 } from '@better-auth/utils/base64';
|
|
2
|
+
import { betterFetch } from '@better-fetch/fetch';
|
|
3
|
+
import { jwtVerify } from 'jose';
|
|
4
|
+
|
|
5
|
+
function getOAuth2Tokens(data) {
|
|
6
|
+
const getDate = (seconds) => {
|
|
7
|
+
const now = /* @__PURE__ */ new Date();
|
|
8
|
+
return new Date(now.getTime() + seconds * 1e3);
|
|
9
|
+
};
|
|
10
|
+
return {
|
|
11
|
+
tokenType: data.token_type,
|
|
12
|
+
accessToken: data.access_token,
|
|
13
|
+
refreshToken: data.refresh_token,
|
|
14
|
+
accessTokenExpiresAt: data.expires_in ? getDate(data.expires_in) : void 0,
|
|
15
|
+
refreshTokenExpiresAt: data.refresh_token_expires_in ? getDate(data.refresh_token_expires_in) : void 0,
|
|
16
|
+
scopes: data?.scope ? typeof data.scope === "string" ? data.scope.split(" ") : data.scope : [],
|
|
17
|
+
idToken: data.id_token
|
|
18
|
+
};
|
|
19
|
+
}
|
|
20
|
+
async function generateCodeChallenge(codeVerifier) {
|
|
21
|
+
const encoder = new TextEncoder();
|
|
22
|
+
const data = encoder.encode(codeVerifier);
|
|
23
|
+
const hash = await crypto.subtle.digest("SHA-256", data);
|
|
24
|
+
return base64Url.encode(new Uint8Array(hash), {
|
|
25
|
+
padding: false
|
|
26
|
+
});
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
async function createAuthorizationURL({
|
|
30
|
+
id,
|
|
31
|
+
options,
|
|
32
|
+
authorizationEndpoint,
|
|
33
|
+
state,
|
|
34
|
+
codeVerifier,
|
|
35
|
+
scopes,
|
|
36
|
+
claims,
|
|
37
|
+
redirectURI,
|
|
38
|
+
duration,
|
|
39
|
+
prompt,
|
|
40
|
+
accessType,
|
|
41
|
+
responseType,
|
|
42
|
+
display,
|
|
43
|
+
loginHint,
|
|
44
|
+
hd,
|
|
45
|
+
responseMode,
|
|
46
|
+
additionalParams,
|
|
47
|
+
scopeJoiner
|
|
48
|
+
}) {
|
|
49
|
+
const url = new URL(authorizationEndpoint);
|
|
50
|
+
url.searchParams.set("response_type", responseType || "code");
|
|
51
|
+
const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
|
|
52
|
+
url.searchParams.set("client_id", primaryClientId);
|
|
53
|
+
url.searchParams.set("state", state);
|
|
54
|
+
url.searchParams.set("scope", scopes.join(scopeJoiner || " "));
|
|
55
|
+
url.searchParams.set("redirect_uri", options.redirectURI || redirectURI);
|
|
56
|
+
duration && url.searchParams.set("duration", duration);
|
|
57
|
+
display && url.searchParams.set("display", display);
|
|
58
|
+
loginHint && url.searchParams.set("login_hint", loginHint);
|
|
59
|
+
prompt && url.searchParams.set("prompt", prompt);
|
|
60
|
+
hd && url.searchParams.set("hd", hd);
|
|
61
|
+
accessType && url.searchParams.set("access_type", accessType);
|
|
62
|
+
responseMode && url.searchParams.set("response_mode", responseMode);
|
|
63
|
+
if (codeVerifier) {
|
|
64
|
+
const codeChallenge = await generateCodeChallenge(codeVerifier);
|
|
65
|
+
url.searchParams.set("code_challenge_method", "S256");
|
|
66
|
+
url.searchParams.set("code_challenge", codeChallenge);
|
|
67
|
+
}
|
|
68
|
+
if (claims) {
|
|
69
|
+
const claimsObj = claims.reduce(
|
|
70
|
+
(acc, claim) => {
|
|
71
|
+
acc[claim] = null;
|
|
72
|
+
return acc;
|
|
73
|
+
},
|
|
74
|
+
{}
|
|
75
|
+
);
|
|
76
|
+
url.searchParams.set(
|
|
77
|
+
"claims",
|
|
78
|
+
JSON.stringify({
|
|
79
|
+
id_token: { email: null, email_verified: null, ...claimsObj }
|
|
80
|
+
})
|
|
81
|
+
);
|
|
82
|
+
}
|
|
83
|
+
if (additionalParams) {
|
|
84
|
+
Object.entries(additionalParams).forEach(([key, value]) => {
|
|
85
|
+
url.searchParams.set(key, value);
|
|
86
|
+
});
|
|
87
|
+
}
|
|
88
|
+
return url;
|
|
89
|
+
}
|
|
90
|
+
|
|
91
|
+
function createAuthorizationCodeRequest({
|
|
92
|
+
code,
|
|
93
|
+
codeVerifier,
|
|
94
|
+
redirectURI,
|
|
95
|
+
options,
|
|
96
|
+
authentication,
|
|
97
|
+
deviceId,
|
|
98
|
+
headers,
|
|
99
|
+
additionalParams = {},
|
|
100
|
+
resource
|
|
101
|
+
}) {
|
|
102
|
+
const body = new URLSearchParams();
|
|
103
|
+
const requestHeaders = {
|
|
104
|
+
"content-type": "application/x-www-form-urlencoded",
|
|
105
|
+
accept: "application/json",
|
|
106
|
+
"user-agent": "better-auth",
|
|
107
|
+
...headers
|
|
108
|
+
};
|
|
109
|
+
body.set("grant_type", "authorization_code");
|
|
110
|
+
body.set("code", code);
|
|
111
|
+
codeVerifier && body.set("code_verifier", codeVerifier);
|
|
112
|
+
options.clientKey && body.set("client_key", options.clientKey);
|
|
113
|
+
deviceId && body.set("device_id", deviceId);
|
|
114
|
+
body.set("redirect_uri", options.redirectURI || redirectURI);
|
|
115
|
+
if (resource) {
|
|
116
|
+
if (typeof resource === "string") {
|
|
117
|
+
body.append("resource", resource);
|
|
118
|
+
} else {
|
|
119
|
+
for (const _resource of resource) {
|
|
120
|
+
body.append("resource", _resource);
|
|
121
|
+
}
|
|
122
|
+
}
|
|
123
|
+
}
|
|
124
|
+
if (authentication === "basic") {
|
|
125
|
+
const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
|
|
126
|
+
const encodedCredentials = base64.encode(
|
|
127
|
+
`${primaryClientId}:${options.clientSecret ?? ""}`
|
|
128
|
+
);
|
|
129
|
+
requestHeaders["authorization"] = `Basic ${encodedCredentials}`;
|
|
130
|
+
} else {
|
|
131
|
+
const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
|
|
132
|
+
body.set("client_id", primaryClientId);
|
|
133
|
+
if (options.clientSecret) {
|
|
134
|
+
body.set("client_secret", options.clientSecret);
|
|
135
|
+
}
|
|
136
|
+
}
|
|
137
|
+
for (const [key, value] of Object.entries(additionalParams)) {
|
|
138
|
+
if (!body.has(key)) body.append(key, value);
|
|
139
|
+
}
|
|
140
|
+
return {
|
|
141
|
+
body,
|
|
142
|
+
headers: requestHeaders
|
|
143
|
+
};
|
|
144
|
+
}
|
|
145
|
+
async function validateAuthorizationCode({
|
|
146
|
+
code,
|
|
147
|
+
codeVerifier,
|
|
148
|
+
redirectURI,
|
|
149
|
+
options,
|
|
150
|
+
tokenEndpoint,
|
|
151
|
+
authentication,
|
|
152
|
+
deviceId,
|
|
153
|
+
headers,
|
|
154
|
+
additionalParams = {},
|
|
155
|
+
resource
|
|
156
|
+
}) {
|
|
157
|
+
const { body, headers: requestHeaders } = createAuthorizationCodeRequest({
|
|
158
|
+
code,
|
|
159
|
+
codeVerifier,
|
|
160
|
+
redirectURI,
|
|
161
|
+
options,
|
|
162
|
+
authentication,
|
|
163
|
+
deviceId,
|
|
164
|
+
headers,
|
|
165
|
+
additionalParams,
|
|
166
|
+
resource
|
|
167
|
+
});
|
|
168
|
+
const { data, error } = await betterFetch(tokenEndpoint, {
|
|
169
|
+
method: "POST",
|
|
170
|
+
body,
|
|
171
|
+
headers: requestHeaders
|
|
172
|
+
});
|
|
173
|
+
if (error) {
|
|
174
|
+
throw error;
|
|
175
|
+
}
|
|
176
|
+
const tokens = getOAuth2Tokens(data);
|
|
177
|
+
return tokens;
|
|
178
|
+
}
|
|
179
|
+
async function validateToken(token, jwksEndpoint) {
|
|
180
|
+
const { data, error } = await betterFetch(jwksEndpoint, {
|
|
181
|
+
method: "GET",
|
|
182
|
+
headers: {
|
|
183
|
+
accept: "application/json",
|
|
184
|
+
"user-agent": "better-auth"
|
|
185
|
+
}
|
|
186
|
+
});
|
|
187
|
+
if (error) {
|
|
188
|
+
throw error;
|
|
189
|
+
}
|
|
190
|
+
const keys = data["keys"];
|
|
191
|
+
const header = JSON.parse(atob(token.split(".")[0]));
|
|
192
|
+
const key = keys.find((key2) => key2.kid === header.kid);
|
|
193
|
+
if (!key) {
|
|
194
|
+
throw new Error("Key not found");
|
|
195
|
+
}
|
|
196
|
+
const verified = await jwtVerify(token, key);
|
|
197
|
+
return verified;
|
|
198
|
+
}
|
|
199
|
+
|
|
200
|
+
function createRefreshAccessTokenRequest({
|
|
201
|
+
refreshToken,
|
|
202
|
+
options,
|
|
203
|
+
authentication,
|
|
204
|
+
extraParams,
|
|
205
|
+
resource
|
|
206
|
+
}) {
|
|
207
|
+
const body = new URLSearchParams();
|
|
208
|
+
const headers = {
|
|
209
|
+
"content-type": "application/x-www-form-urlencoded",
|
|
210
|
+
accept: "application/json"
|
|
211
|
+
};
|
|
212
|
+
body.set("grant_type", "refresh_token");
|
|
213
|
+
body.set("refresh_token", refreshToken);
|
|
214
|
+
if (authentication === "basic") {
|
|
215
|
+
const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
|
|
216
|
+
if (primaryClientId) {
|
|
217
|
+
headers["authorization"] = "Basic " + base64.encode(`${primaryClientId}:${options.clientSecret ?? ""}`);
|
|
218
|
+
} else {
|
|
219
|
+
headers["authorization"] = "Basic " + base64.encode(`:${options.clientSecret ?? ""}`);
|
|
220
|
+
}
|
|
221
|
+
} else {
|
|
222
|
+
const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
|
|
223
|
+
body.set("client_id", primaryClientId);
|
|
224
|
+
if (options.clientSecret) {
|
|
225
|
+
body.set("client_secret", options.clientSecret);
|
|
226
|
+
}
|
|
227
|
+
}
|
|
228
|
+
if (resource) {
|
|
229
|
+
if (typeof resource === "string") {
|
|
230
|
+
body.append("resource", resource);
|
|
231
|
+
} else {
|
|
232
|
+
for (const _resource of resource) {
|
|
233
|
+
body.append("resource", _resource);
|
|
234
|
+
}
|
|
235
|
+
}
|
|
236
|
+
}
|
|
237
|
+
if (extraParams) {
|
|
238
|
+
for (const [key, value] of Object.entries(extraParams)) {
|
|
239
|
+
body.set(key, value);
|
|
240
|
+
}
|
|
241
|
+
}
|
|
242
|
+
return {
|
|
243
|
+
body,
|
|
244
|
+
headers
|
|
245
|
+
};
|
|
246
|
+
}
|
|
247
|
+
async function refreshAccessToken({
|
|
248
|
+
refreshToken,
|
|
249
|
+
options,
|
|
250
|
+
tokenEndpoint,
|
|
251
|
+
authentication,
|
|
252
|
+
extraParams
|
|
253
|
+
}) {
|
|
254
|
+
const { body, headers } = createRefreshAccessTokenRequest({
|
|
255
|
+
refreshToken,
|
|
256
|
+
options,
|
|
257
|
+
authentication,
|
|
258
|
+
extraParams
|
|
259
|
+
});
|
|
260
|
+
const { data, error } = await betterFetch(tokenEndpoint, {
|
|
261
|
+
method: "POST",
|
|
262
|
+
body,
|
|
263
|
+
headers
|
|
264
|
+
});
|
|
265
|
+
if (error) {
|
|
266
|
+
throw error;
|
|
267
|
+
}
|
|
268
|
+
const tokens = {
|
|
269
|
+
accessToken: data.access_token,
|
|
270
|
+
refreshToken: data.refresh_token,
|
|
271
|
+
tokenType: data.token_type,
|
|
272
|
+
scopes: data.scope?.split(" "),
|
|
273
|
+
idToken: data.id_token
|
|
274
|
+
};
|
|
275
|
+
if (data.expires_in) {
|
|
276
|
+
const now = /* @__PURE__ */ new Date();
|
|
277
|
+
tokens.accessTokenExpiresAt = new Date(
|
|
278
|
+
now.getTime() + data.expires_in * 1e3
|
|
279
|
+
);
|
|
280
|
+
}
|
|
281
|
+
return tokens;
|
|
282
|
+
}
|
|
283
|
+
|
|
284
|
+
function createClientCredentialsTokenRequest({
|
|
285
|
+
options,
|
|
286
|
+
scope,
|
|
287
|
+
authentication,
|
|
288
|
+
resource
|
|
289
|
+
}) {
|
|
290
|
+
const body = new URLSearchParams();
|
|
291
|
+
const headers = {
|
|
292
|
+
"content-type": "application/x-www-form-urlencoded",
|
|
293
|
+
accept: "application/json"
|
|
294
|
+
};
|
|
295
|
+
body.set("grant_type", "client_credentials");
|
|
296
|
+
scope && body.set("scope", scope);
|
|
297
|
+
if (resource) {
|
|
298
|
+
if (typeof resource === "string") {
|
|
299
|
+
body.append("resource", resource);
|
|
300
|
+
} else {
|
|
301
|
+
for (const _resource of resource) {
|
|
302
|
+
body.append("resource", _resource);
|
|
303
|
+
}
|
|
304
|
+
}
|
|
305
|
+
}
|
|
306
|
+
if (authentication === "basic") {
|
|
307
|
+
const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
|
|
308
|
+
const encodedCredentials = base64Url.encode(
|
|
309
|
+
`${primaryClientId}:${options.clientSecret}`
|
|
310
|
+
);
|
|
311
|
+
headers["authorization"] = `Basic ${encodedCredentials}`;
|
|
312
|
+
} else {
|
|
313
|
+
const primaryClientId = Array.isArray(options.clientId) ? options.clientId[0] : options.clientId;
|
|
314
|
+
body.set("client_id", primaryClientId);
|
|
315
|
+
body.set("client_secret", options.clientSecret);
|
|
316
|
+
}
|
|
317
|
+
return {
|
|
318
|
+
body,
|
|
319
|
+
headers
|
|
320
|
+
};
|
|
321
|
+
}
|
|
322
|
+
async function clientCredentialsToken({
|
|
323
|
+
options,
|
|
324
|
+
tokenEndpoint,
|
|
325
|
+
scope,
|
|
326
|
+
authentication,
|
|
327
|
+
resource
|
|
328
|
+
}) {
|
|
329
|
+
const { body, headers } = createClientCredentialsTokenRequest({
|
|
330
|
+
options,
|
|
331
|
+
scope,
|
|
332
|
+
authentication,
|
|
333
|
+
resource
|
|
334
|
+
});
|
|
335
|
+
const { data, error } = await betterFetch(tokenEndpoint, {
|
|
336
|
+
method: "POST",
|
|
337
|
+
body,
|
|
338
|
+
headers
|
|
339
|
+
});
|
|
340
|
+
if (error) {
|
|
341
|
+
throw error;
|
|
342
|
+
}
|
|
343
|
+
const tokens = {
|
|
344
|
+
accessToken: data.access_token,
|
|
345
|
+
tokenType: data.token_type,
|
|
346
|
+
scopes: data.scope?.split(" ")
|
|
347
|
+
};
|
|
348
|
+
if (data.expires_in) {
|
|
349
|
+
const now = /* @__PURE__ */ new Date();
|
|
350
|
+
tokens.accessTokenExpiresAt = new Date(
|
|
351
|
+
now.getTime() + data.expires_in * 1e3
|
|
352
|
+
);
|
|
353
|
+
}
|
|
354
|
+
return tokens;
|
|
355
|
+
}
|
|
356
|
+
|
|
357
|
+
export { clientCredentialsToken, createAuthorizationCodeRequest, createAuthorizationURL, createClientCredentialsTokenRequest, createRefreshAccessTokenRequest, generateCodeChallenge, getOAuth2Tokens, refreshAccessToken, validateAuthorizationCode, validateToken };
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
import { D as DBFieldAttribute } from './core.CPuIItYE.js';
|
|
2
|
+
|
|
3
|
+
type BetterAuthPluginDBSchema = {
|
|
4
|
+
[table in string]: {
|
|
5
|
+
fields: {
|
|
6
|
+
[field in string]: DBFieldAttribute;
|
|
7
|
+
};
|
|
8
|
+
disableMigration?: boolean;
|
|
9
|
+
modelName?: string;
|
|
10
|
+
};
|
|
11
|
+
};
|
|
12
|
+
|
|
13
|
+
export type { BetterAuthPluginDBSchema as B };
|
|
@@ -0,0 +1,217 @@
|
|
|
1
|
+
import * as z from 'zod';
|
|
2
|
+
import { ZodType } from 'zod';
|
|
3
|
+
import { L as LiteralString } from './core.MjcDoj7R.cjs';
|
|
4
|
+
|
|
5
|
+
type DBPreservedModels = "user" | "account" | "session" | "verification" | "rate-limit" | "organization" | "member" | "invitation" | "jwks" | "passkey" | "two-factor";
|
|
6
|
+
type DBFieldType = "string" | "number" | "boolean" | "date" | "json" | `${"string" | "number"}[]` | Array<LiteralString>;
|
|
7
|
+
type DBPrimitive = string | number | boolean | Date | null | undefined | string[] | number[];
|
|
8
|
+
type DBFieldAttributeConfig = {
|
|
9
|
+
/**
|
|
10
|
+
* If the field should be required on a new record.
|
|
11
|
+
* @default true
|
|
12
|
+
*/
|
|
13
|
+
required?: boolean;
|
|
14
|
+
/**
|
|
15
|
+
* If the value should be returned on a response body.
|
|
16
|
+
* @default true
|
|
17
|
+
*/
|
|
18
|
+
returned?: boolean;
|
|
19
|
+
/**
|
|
20
|
+
* If a value should be provided when creating a new record.
|
|
21
|
+
* @default true
|
|
22
|
+
*/
|
|
23
|
+
input?: boolean;
|
|
24
|
+
/**
|
|
25
|
+
* Default value for the field
|
|
26
|
+
*
|
|
27
|
+
* Note: This will not create a default value on the database level. It will only
|
|
28
|
+
* be used when creating a new record.
|
|
29
|
+
*/
|
|
30
|
+
defaultValue?: DBPrimitive | (() => DBPrimitive);
|
|
31
|
+
/**
|
|
32
|
+
* Update value for the field
|
|
33
|
+
*
|
|
34
|
+
* Note: This will create an onUpdate trigger on the database level for supported adapters.
|
|
35
|
+
* It will be called when updating a record.
|
|
36
|
+
*/
|
|
37
|
+
onUpdate?: () => DBPrimitive;
|
|
38
|
+
/**
|
|
39
|
+
* transform the value before storing it.
|
|
40
|
+
*/
|
|
41
|
+
transform?: {
|
|
42
|
+
input?: (value: DBPrimitive) => DBPrimitive | Promise<DBPrimitive>;
|
|
43
|
+
output?: (value: DBPrimitive) => DBPrimitive | Promise<DBPrimitive>;
|
|
44
|
+
};
|
|
45
|
+
/**
|
|
46
|
+
* Reference to another model.
|
|
47
|
+
*/
|
|
48
|
+
references?: {
|
|
49
|
+
/**
|
|
50
|
+
* The model to reference.
|
|
51
|
+
*/
|
|
52
|
+
model: string;
|
|
53
|
+
/**
|
|
54
|
+
* The field on the referenced model.
|
|
55
|
+
*/
|
|
56
|
+
field: string;
|
|
57
|
+
/**
|
|
58
|
+
* The action to perform when the reference is deleted.
|
|
59
|
+
* @default "cascade"
|
|
60
|
+
*/
|
|
61
|
+
onDelete?: "no action" | "restrict" | "cascade" | "set null" | "set default";
|
|
62
|
+
};
|
|
63
|
+
unique?: boolean;
|
|
64
|
+
/**
|
|
65
|
+
* If the field should be a bigint on the database instead of integer.
|
|
66
|
+
*/
|
|
67
|
+
bigint?: boolean;
|
|
68
|
+
/**
|
|
69
|
+
* A zod schema to validate the value.
|
|
70
|
+
*/
|
|
71
|
+
validator?: {
|
|
72
|
+
input?: ZodType;
|
|
73
|
+
output?: ZodType;
|
|
74
|
+
};
|
|
75
|
+
/**
|
|
76
|
+
* The name of the field on the database.
|
|
77
|
+
*/
|
|
78
|
+
fieldName?: string;
|
|
79
|
+
/**
|
|
80
|
+
* If the field should be sortable.
|
|
81
|
+
*
|
|
82
|
+
* applicable only for `text` type.
|
|
83
|
+
* It's useful to mark fields varchar instead of text.
|
|
84
|
+
*/
|
|
85
|
+
sortable?: boolean;
|
|
86
|
+
};
|
|
87
|
+
type DBFieldAttribute<T extends DBFieldType = DBFieldType> = {
|
|
88
|
+
type: T;
|
|
89
|
+
} & DBFieldAttributeConfig;
|
|
90
|
+
type BetterAuthDBSchema = Record<string, {
|
|
91
|
+
/**
|
|
92
|
+
* The name of the table in the database
|
|
93
|
+
*/
|
|
94
|
+
modelName: string;
|
|
95
|
+
/**
|
|
96
|
+
* The fields of the table
|
|
97
|
+
*/
|
|
98
|
+
fields: Record<string, DBFieldAttribute>;
|
|
99
|
+
/**
|
|
100
|
+
* Whether to disable migrations for this table
|
|
101
|
+
* @default false
|
|
102
|
+
*/
|
|
103
|
+
disableMigrations?: boolean;
|
|
104
|
+
/**
|
|
105
|
+
* The order of the table
|
|
106
|
+
*/
|
|
107
|
+
order?: number;
|
|
108
|
+
}>;
|
|
109
|
+
interface SecondaryStorage {
|
|
110
|
+
/**
|
|
111
|
+
*
|
|
112
|
+
* @param key - Key to get
|
|
113
|
+
* @returns - Value of the key
|
|
114
|
+
*/
|
|
115
|
+
get: (key: string) => Promise<unknown> | unknown;
|
|
116
|
+
set: (
|
|
117
|
+
/**
|
|
118
|
+
* Key to store
|
|
119
|
+
*/
|
|
120
|
+
key: string,
|
|
121
|
+
/**
|
|
122
|
+
* Value to store
|
|
123
|
+
*/
|
|
124
|
+
value: string,
|
|
125
|
+
/**
|
|
126
|
+
* Time to live in seconds
|
|
127
|
+
*/
|
|
128
|
+
ttl?: number) => Promise<void | null | unknown> | void;
|
|
129
|
+
/**
|
|
130
|
+
*
|
|
131
|
+
* @param key - Key to delete
|
|
132
|
+
*/
|
|
133
|
+
delete: (key: string) => Promise<void | null | string> | void;
|
|
134
|
+
}
|
|
135
|
+
|
|
136
|
+
declare const userSchema: z.ZodObject<{
|
|
137
|
+
id: z.ZodString;
|
|
138
|
+
createdAt: z.ZodDefault<z.ZodDate>;
|
|
139
|
+
updatedAt: z.ZodDefault<z.ZodDate>;
|
|
140
|
+
email: z.ZodPipe<z.ZodString, z.ZodTransform<string, string>>;
|
|
141
|
+
emailVerified: z.ZodDefault<z.ZodBoolean>;
|
|
142
|
+
name: z.ZodString;
|
|
143
|
+
image: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
144
|
+
}, z.core.$strip>;
|
|
145
|
+
/**
|
|
146
|
+
* User schema type used by better-auth, note that it's possible that user could have additional fields
|
|
147
|
+
*
|
|
148
|
+
* todo: we should use generics to extend this type with additional fields from plugins and options in the future
|
|
149
|
+
*/
|
|
150
|
+
type User = z.infer<typeof userSchema>;
|
|
151
|
+
|
|
152
|
+
declare const accountSchema: z.ZodObject<{
|
|
153
|
+
id: z.ZodString;
|
|
154
|
+
createdAt: z.ZodDefault<z.ZodDate>;
|
|
155
|
+
updatedAt: z.ZodDefault<z.ZodDate>;
|
|
156
|
+
providerId: z.ZodString;
|
|
157
|
+
accountId: z.ZodString;
|
|
158
|
+
userId: z.ZodCoercedString<unknown>;
|
|
159
|
+
accessToken: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
160
|
+
refreshToken: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
161
|
+
idToken: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
162
|
+
accessTokenExpiresAt: z.ZodOptional<z.ZodNullable<z.ZodDate>>;
|
|
163
|
+
refreshTokenExpiresAt: z.ZodOptional<z.ZodNullable<z.ZodDate>>;
|
|
164
|
+
scope: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
165
|
+
password: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
166
|
+
}, z.core.$strip>;
|
|
167
|
+
/**
|
|
168
|
+
* Account schema type used by better-auth, note that it's possible that account could have additional fields
|
|
169
|
+
*
|
|
170
|
+
* todo: we should use generics to extend this type with additional fields from plugins and options in the future
|
|
171
|
+
*/
|
|
172
|
+
type Account = z.infer<typeof accountSchema>;
|
|
173
|
+
|
|
174
|
+
declare const sessionSchema: z.ZodObject<{
|
|
175
|
+
id: z.ZodString;
|
|
176
|
+
createdAt: z.ZodDefault<z.ZodDate>;
|
|
177
|
+
updatedAt: z.ZodDefault<z.ZodDate>;
|
|
178
|
+
userId: z.ZodCoercedString<unknown>;
|
|
179
|
+
expiresAt: z.ZodDate;
|
|
180
|
+
token: z.ZodString;
|
|
181
|
+
ipAddress: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
182
|
+
userAgent: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
183
|
+
}, z.core.$strip>;
|
|
184
|
+
/**
|
|
185
|
+
* Session schema type used by better-auth, note that it's possible that session could have additional fields
|
|
186
|
+
*
|
|
187
|
+
* todo: we should use generics to extend this type with additional fields from plugins and options in the future
|
|
188
|
+
*/
|
|
189
|
+
type Session = z.infer<typeof sessionSchema>;
|
|
190
|
+
|
|
191
|
+
declare const verificationSchema: z.ZodObject<{
|
|
192
|
+
id: z.ZodString;
|
|
193
|
+
createdAt: z.ZodDefault<z.ZodDate>;
|
|
194
|
+
updatedAt: z.ZodDefault<z.ZodDate>;
|
|
195
|
+
value: z.ZodString;
|
|
196
|
+
expiresAt: z.ZodDate;
|
|
197
|
+
identifier: z.ZodString;
|
|
198
|
+
}, z.core.$strip>;
|
|
199
|
+
/**
|
|
200
|
+
* Verification schema type used by better-auth, note that it's possible that verification could have additional fields
|
|
201
|
+
*
|
|
202
|
+
* todo: we should use generics to extend this type with additional fields from plugins and options in the future
|
|
203
|
+
*/
|
|
204
|
+
type Verification = z.infer<typeof verificationSchema>;
|
|
205
|
+
|
|
206
|
+
declare const rateLimitSchema: z.ZodObject<{
|
|
207
|
+
key: z.ZodString;
|
|
208
|
+
count: z.ZodNumber;
|
|
209
|
+
lastRequest: z.ZodNumber;
|
|
210
|
+
}, z.core.$strip>;
|
|
211
|
+
/**
|
|
212
|
+
* Rate limit schema type used by better-auth for rate limiting
|
|
213
|
+
*/
|
|
214
|
+
type RateLimit = z.infer<typeof rateLimitSchema>;
|
|
215
|
+
|
|
216
|
+
export { accountSchema as e, rateLimitSchema as r, sessionSchema as s, userSchema as u, verificationSchema as v };
|
|
217
|
+
export type { Account as A, BetterAuthDBSchema as B, DBFieldAttribute as D, RateLimit as R, SecondaryStorage as S, User as U, Verification as V, DBFieldAttributeConfig as a, DBFieldType as b, DBPrimitive as c, DBPreservedModels as d, Session as f };
|