@better-auth/expo 1.5.0-beta.8 → 1.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/client.d.mts CHANGED
@@ -1,3 +1,4 @@
1
+ import { parseSetCookieHeader } from "better-auth/cookies";
1
2
  import { FocusManager, OnlineManager } from "better-auth/client";
2
3
  import * as expo_web_browser0 from "expo-web-browser";
3
4
  import * as _better_fetch_fetch0 from "@better-fetch/fetch";
@@ -10,17 +11,6 @@ declare function setupExpoFocusManager(): FocusManager;
10
11
  declare function setupExpoOnlineManager(): OnlineManager;
11
12
  //#endregion
12
13
  //#region src/client.d.ts
13
- interface CookieAttributes {
14
- value: string;
15
- expires?: Date | undefined;
16
- "max-age"?: number | undefined;
17
- domain?: string | undefined;
18
- path?: string | undefined;
19
- secure?: boolean | undefined;
20
- httpOnly?: boolean | undefined;
21
- sameSite?: ("Strict" | "Lax" | "None") | undefined;
22
- }
23
- declare function parseSetCookieHeader(header: string): Map<string, CookieAttributes>;
24
14
  interface ExpoClientOptions {
25
15
  scheme?: string | undefined;
26
16
  storage: {
@@ -126,6 +116,7 @@ declare const expoClient: (opts: ExpoClientOptions) => {
126
116
  onSuccess(context: _better_fetch_fetch0.SuccessContext<any>): Promise<void>;
127
117
  };
128
118
  init(url: string, options: ({
119
+ priority?: RequestPriority | undefined;
129
120
  method?: string | undefined;
130
121
  headers?: (HeadersInit & (HeadersInit | {
131
122
  accept: "application/json" | "text/plain" | "application/octet-stream";
@@ -139,7 +130,6 @@ declare const expoClient: (opts: ExpoClientOptions) => {
139
130
  integrity?: string | undefined;
140
131
  keepalive?: boolean | undefined;
141
132
  mode?: RequestMode | undefined;
142
- priority?: RequestPriority | undefined;
143
133
  referrer?: string | undefined;
144
134
  referrerPolicy?: ReferrerPolicy | undefined;
145
135
  signal?: (AbortSignal | null) | undefined;
@@ -185,4 +175,5 @@ declare const expoClient: (opts: ExpoClientOptions) => {
185
175
  }[];
186
176
  };
187
177
  //#endregion
188
- export { expoClient, getCookie, getSetCookie, hasBetterAuthCookies, normalizeCookieName, parseSetCookieHeader, setupExpoFocusManager, setupExpoOnlineManager, storageAdapter };
178
+ export { expoClient, getCookie, getSetCookie, hasBetterAuthCookies, normalizeCookieName, parseSetCookieHeader, setupExpoFocusManager, setupExpoOnlineManager, storageAdapter };
179
+ //# sourceMappingURL=client.d.mts.map
package/dist/client.mjs CHANGED
@@ -1,14 +1,20 @@
1
+ import { createRequire } from "node:module";
1
2
  import { safeJSONParse } from "@better-auth/core/utils/json";
2
- import { SECURE_COOKIE_PREFIX, stripSecureCookiePrefix } from "better-auth/cookies";
3
+ import { SECURE_COOKIE_PREFIX, parseSetCookieHeader, parseSetCookieHeader as parseSetCookieHeader$1, stripSecureCookiePrefix } from "better-auth/cookies";
3
4
  import Constants from "expo-constants";
4
5
  import * as Linking from "expo-linking";
5
6
  import { AppState, Platform } from "react-native";
6
7
  import { kFocusManager, kOnlineManager } from "better-auth/client";
7
8
 
9
+ //#region \0rolldown/runtime.js
10
+ var __require = /* @__PURE__ */ createRequire(import.meta.url);
11
+
12
+ //#endregion
8
13
  //#region src/focus-manager.ts
9
14
  var ExpoFocusManager = class {
10
15
  listeners = /* @__PURE__ */ new Set();
11
16
  subscription;
17
+ isFocused;
12
18
  subscribe(listener) {
13
19
  this.listeners.add(listener);
14
20
  return () => {
@@ -16,6 +22,8 @@ var ExpoFocusManager = class {
16
22
  };
17
23
  }
18
24
  setFocused(focused) {
25
+ if (this.isFocused === focused) return;
26
+ this.isFocused = focused;
19
27
  this.listeners.forEach((listener) => listener(focused));
20
28
  }
21
29
  setup() {
@@ -45,6 +53,7 @@ var ExpoOnlineManager = class {
45
53
  };
46
54
  }
47
55
  setOnline(online) {
56
+ if (this.isOnline === online) return;
48
57
  this.isOnline = online;
49
58
  this.listeners.forEach((listener) => listener(online));
50
59
  }
@@ -73,72 +82,26 @@ if (Platform.OS !== "web") {
73
82
  setupExpoFocusManager();
74
83
  setupExpoOnlineManager();
75
84
  }
76
- function parseSetCookieHeader(header) {
77
- const cookieMap = /* @__PURE__ */ new Map();
78
- splitSetCookieHeader(header).forEach((cookie) => {
79
- const [nameValue, ...attributes] = cookie.split(";").map((p) => p.trim());
80
- const [name, ...valueParts] = (nameValue || "").split("=");
81
- const value = valueParts.join("=");
82
- if (!name || value === void 0) return;
83
- const attrObj = { value };
84
- attributes.forEach((attr) => {
85
- const [attrName, ...attrValueParts] = attr.split("=");
86
- if (!attrName?.trim()) return;
87
- const attrValue = attrValueParts.join("=");
88
- const normalizedAttrName = attrName.trim().toLowerCase();
89
- attrObj[normalizedAttrName] = attrValue;
90
- });
91
- cookieMap.set(name, attrObj);
92
- });
93
- return cookieMap;
94
- }
95
- function splitSetCookieHeader(setCookie) {
96
- const parts = [];
97
- let buffer = "";
98
- let i = 0;
99
- while (i < setCookie.length) {
100
- const char = setCookie[i];
101
- if (char === ",") {
102
- const recent = buffer.toLowerCase();
103
- const hasExpires = recent.includes("expires=");
104
- const hasGmt = /gmt/i.test(recent);
105
- if (hasExpires && !hasGmt) {
106
- buffer += char;
107
- i += 1;
108
- continue;
109
- }
110
- if (buffer.trim().length > 0) {
111
- parts.push(buffer.trim());
112
- buffer = "";
113
- }
114
- i += 1;
115
- if (setCookie[i] === " ") i += 1;
116
- continue;
117
- }
118
- buffer += char;
119
- i += 1;
120
- }
121
- if (buffer.trim().length > 0) parts.push(buffer.trim());
122
- return parts;
123
- }
124
85
  function getSetCookie(header, prevCookie) {
125
- const parsed = parseSetCookieHeader(header);
126
- let toSetCookie = {};
86
+ const parsed = parseSetCookieHeader$1(header);
87
+ const toSetCookie = safeJSONParse(prevCookie) ?? {};
127
88
  parsed.forEach((cookie, key) => {
128
89
  const expiresAt = cookie["expires"];
129
90
  const maxAge = cookie["max-age"];
91
+ if (maxAge !== void 0 && Number(maxAge) <= 0) {
92
+ delete toSetCookie[key];
93
+ return;
94
+ }
130
95
  const expires = maxAge ? new Date(Date.now() + Number(maxAge) * 1e3) : expiresAt ? new Date(String(expiresAt)) : null;
96
+ if (expires && expires.getTime() <= Date.now()) {
97
+ delete toSetCookie[key];
98
+ return;
99
+ }
131
100
  toSetCookie[key] = {
132
101
  value: cookie["value"],
133
102
  expires: expires ? expires.toISOString() : null
134
103
  };
135
104
  });
136
- if (prevCookie) try {
137
- toSetCookie = {
138
- ...JSON.parse(prevCookie),
139
- ...toSetCookie
140
- };
141
- } catch {}
142
105
  return JSON.stringify(toSetCookie);
143
106
  }
144
107
  function getCookie(cookie) {
@@ -148,7 +111,7 @@ function getCookie(cookie) {
148
111
  } catch {}
149
112
  return Object.entries(parsed).reduce((acc, [key, value]) => {
150
113
  if (value.expires && new Date(value.expires) < /* @__PURE__ */ new Date()) return acc;
151
- return `${acc}; ${key}=${value.value}`;
114
+ return acc ? `${acc}; ${key}=${value.value}` : `${key}=${value.value}`;
152
115
  }, "");
153
116
  }
154
117
  function getOAuthStateValue(cookieJson, cookiePrefix) {
@@ -210,7 +173,7 @@ function hasSessionCookieChanged(prevCookie, newCookie) {
210
173
  * @returns true if the header contains better-auth cookies, false otherwise
211
174
  */
212
175
  function hasBetterAuthCookies(setCookieHeader, cookiePrefix) {
213
- const cookies = parseSetCookieHeader(setCookieHeader);
176
+ const cookies = parseSetCookieHeader$1(setCookieHeader);
214
177
  const cookieSuffixes = ["session_token", "session_data"];
215
178
  const prefixes = Array.isArray(cookiePrefix) ? cookiePrefix : [cookiePrefix];
216
179
  for (const name of cookies.keys()) {
@@ -270,12 +233,12 @@ const expoClient = (opts) => {
270
233
  const setCookie = context.response.headers.get("set-cookie");
271
234
  if (setCookie) {
272
235
  if (hasBetterAuthCookies(setCookie, cookiePrefix)) {
273
- const prevCookie = await storage.getItem(cookieName);
236
+ const prevCookie = storage.getItem(cookieName);
274
237
  const toSetCookie = getSetCookie(setCookie || "", prevCookie ?? void 0);
275
238
  if (hasSessionCookieChanged(prevCookie, toSetCookie)) {
276
239
  storage.setItem(cookieName, toSetCookie);
277
240
  store?.notify("$sessionSignal");
278
- } else await storage.setItem(cookieName, toSetCookie);
241
+ } else storage.setItem(cookieName, toSetCookie);
279
242
  }
280
243
  }
281
244
  if (context.request.url.toString().includes("/get-session") && !opts?.disableCache) {
@@ -288,22 +251,25 @@ const expoClient = (opts) => {
288
251
  let Browser = void 0;
289
252
  try {
290
253
  Browser = await import("expo-web-browser");
291
- } catch (error) {
292
- throw new Error("\"expo-web-browser\" is not installed as a dependency!", { cause: error });
254
+ } catch {
255
+ try {
256
+ Browser = __require("expo-web-browser");
257
+ } catch (error) {
258
+ throw new Error("\"expo-web-browser\" is not installed as a dependency!", { cause: error });
259
+ }
293
260
  }
294
261
  if (Platform.OS === "android") try {
295
262
  Browser.dismissAuthSession();
296
263
  } catch {}
297
- const oauthStateValue = getOAuthStateValue(await storage.getItem(cookieName), cookiePrefix);
264
+ const oauthStateValue = getOAuthStateValue(storage.getItem(cookieName), cookiePrefix);
298
265
  const params = new URLSearchParams({ authorizationURL: signInURL });
299
266
  if (oauthStateValue) params.append("oauthState", oauthStateValue);
300
267
  const proxyURL = `${context.request.baseURL}/expo-authorization-proxy?${params.toString()}`;
301
268
  const result = await Browser.openAuthSessionAsync(proxyURL, to, opts?.webBrowserOptions);
302
269
  if (result.type !== "success") return;
303
- const url = new URL(result.url);
304
- const cookie = String(url.searchParams.get("cookie"));
270
+ const cookie = new URL(result.url).searchParams.get("cookie");
305
271
  if (!cookie) return;
306
- const toSetCookie = getSetCookie(cookie, await storage.getItem(cookieName) ?? void 0);
272
+ const toSetCookie = getSetCookie(cookie, storage.getItem(cookieName) ?? void 0);
307
273
  storage.setItem(cookieName, toSetCookie);
308
274
  store?.notify("$sessionSignal");
309
275
  }
@@ -314,41 +280,47 @@ const expoClient = (opts) => {
314
280
  options
315
281
  };
316
282
  options = options || {};
317
- const cookie = getCookie(storage.getItem(cookieName) || "{}");
318
283
  options.credentials = "omit";
319
- options.headers = {
284
+ if (options.body?.idToken !== void 0) options.headers = {
320
285
  ...options.headers,
321
- cookie,
322
- "expo-origin": getOrigin(scheme),
323
286
  "x-skip-oauth-proxy": "true"
324
287
  };
325
- if (options.body?.callbackURL) {
326
- if (options.body.callbackURL.startsWith("/")) {
327
- const url$1 = Linking.createURL(options.body.callbackURL, { scheme });
328
- options.body.callbackURL = url$1;
288
+ else {
289
+ const cookie = getCookie(storage.getItem(cookieName) || "{}");
290
+ options.headers = {
291
+ ...options.headers,
292
+ ...cookie ? { cookie } : {},
293
+ "expo-origin": getOrigin(scheme),
294
+ "x-skip-oauth-proxy": "true"
295
+ };
296
+ if (options.body?.callbackURL) {
297
+ if (options.body.callbackURL.startsWith("/")) {
298
+ const url = Linking.createURL(options.body.callbackURL);
299
+ options.body.callbackURL = url;
300
+ }
329
301
  }
330
- }
331
- if (options.body?.newUserCallbackURL) {
332
- if (options.body.newUserCallbackURL.startsWith("/")) {
333
- const url$1 = Linking.createURL(options.body.newUserCallbackURL, { scheme });
334
- options.body.newUserCallbackURL = url$1;
302
+ if (options.body?.newUserCallbackURL) {
303
+ if (options.body.newUserCallbackURL.startsWith("/")) {
304
+ const url = Linking.createURL(options.body.newUserCallbackURL);
305
+ options.body.newUserCallbackURL = url;
306
+ }
335
307
  }
336
- }
337
- if (options.body?.errorCallbackURL) {
338
- if (options.body.errorCallbackURL.startsWith("/")) {
339
- const url$1 = Linking.createURL(options.body.errorCallbackURL, { scheme });
340
- options.body.errorCallbackURL = url$1;
308
+ if (options.body?.errorCallbackURL) {
309
+ if (options.body.errorCallbackURL.startsWith("/")) {
310
+ const url = Linking.createURL(options.body.errorCallbackURL);
311
+ options.body.errorCallbackURL = url;
312
+ }
313
+ }
314
+ if (url.includes("/sign-out")) {
315
+ storage.setItem(cookieName, "{}");
316
+ store?.atoms.session?.set({
317
+ ...store.atoms.session.get(),
318
+ data: null,
319
+ error: null,
320
+ isPending: false
321
+ });
322
+ storage.setItem(localCacheName, "{}");
341
323
  }
342
- }
343
- if (url.includes("/sign-out")) {
344
- await storage.setItem(cookieName, "{}");
345
- store?.atoms.session?.set({
346
- ...store.atoms.session.get(),
347
- data: null,
348
- error: null,
349
- isPending: false
350
- });
351
- storage.setItem(localCacheName, "{}");
352
324
  }
353
325
  return {
354
326
  url,
@@ -360,4 +332,5 @@ const expoClient = (opts) => {
360
332
  };
361
333
 
362
334
  //#endregion
363
- export { expoClient, getCookie, getSetCookie, hasBetterAuthCookies, normalizeCookieName, parseSetCookieHeader, setupExpoFocusManager, setupExpoOnlineManager, storageAdapter };
335
+ export { expoClient, getCookie, getSetCookie, hasBetterAuthCookies, normalizeCookieName, parseSetCookieHeader, setupExpoFocusManager, setupExpoOnlineManager, storageAdapter };
336
+ //# sourceMappingURL=client.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"client.mjs","names":["parseSetCookieHeader"],"sources":["../src/focus-manager.ts","../src/online-manager.ts","../src/client.ts"],"sourcesContent":["import type { FocusListener, FocusManager } from \"better-auth/client\";\nimport { kFocusManager } from \"better-auth/client\";\nimport type { AppStateStatus } from \"react-native\";\nimport { AppState } from \"react-native\";\n\nclass ExpoFocusManager implements FocusManager {\n\tlisteners = new Set<FocusListener>();\n\tsubscription?: ReturnType<typeof AppState.addEventListener>;\n\tisFocused: boolean | undefined;\n\n\tsubscribe(listener: FocusListener) {\n\t\tthis.listeners.add(listener);\n\t\treturn () => {\n\t\t\tthis.listeners.delete(listener);\n\t\t};\n\t}\n\n\tsetFocused(focused: boolean) {\n\t\tif (this.isFocused === focused) return;\n\t\tthis.isFocused = focused;\n\t\tthis.listeners.forEach((listener) => listener(focused));\n\t}\n\n\tsetup() {\n\t\tthis.subscription = AppState.addEventListener(\n\t\t\t\"change\",\n\t\t\t(state: AppStateStatus) => {\n\t\t\t\tthis.setFocused(state === \"active\");\n\t\t\t},\n\t\t);\n\n\t\treturn () => {\n\t\t\tthis.subscription?.remove();\n\t\t};\n\t}\n}\n\nexport function setupExpoFocusManager() {\n\tif (!(globalThis as any)[kFocusManager]) {\n\t\t(globalThis as any)[kFocusManager] = new ExpoFocusManager();\n\t}\n\treturn (globalThis as any)[kFocusManager] as FocusManager;\n}\n","import type { OnlineListener, OnlineManager } from \"better-auth/client\";\nimport { kOnlineManager } from \"better-auth/client\";\n\nclass ExpoOnlineManager implements OnlineManager {\n\tlisteners = new Set<OnlineListener>();\n\tisOnline = true;\n\tunsubscribe?: () => void;\n\n\tsubscribe(listener: OnlineListener) {\n\t\tthis.listeners.add(listener);\n\t\treturn () => {\n\t\t\tthis.listeners.delete(listener);\n\t\t};\n\t}\n\n\tsetOnline(online: boolean) {\n\t\tif (this.isOnline === online) return;\n\t\tthis.isOnline = online;\n\t\tthis.listeners.forEach((listener) => listener(online));\n\t}\n\n\tsetup() {\n\t\timport(\"expo-network\")\n\t\t\t.then(({ addNetworkStateListener }) => {\n\t\t\t\tconst subscription = addNetworkStateListener((state) => {\n\t\t\t\t\tthis.setOnline(!!state.isInternetReachable);\n\t\t\t\t});\n\t\t\t\tthis.unsubscribe = () => subscription.remove();\n\t\t\t})\n\t\t\t.catch(() => {\n\t\t\t\t// fallback to always online\n\t\t\t\tthis.setOnline(true);\n\t\t\t});\n\n\t\treturn () => {\n\t\t\tthis.unsubscribe?.();\n\t\t};\n\t}\n}\n\nexport function setupExpoOnlineManager() {\n\tif (!(globalThis as any)[kOnlineManager]) {\n\t\t(globalThis as any)[kOnlineManager] = new ExpoOnlineManager();\n\t}\n\treturn (globalThis as any)[kOnlineManager] as OnlineManager;\n}\n","import type {\n\tBetterAuthClientPlugin,\n\tClientFetchOption,\n\tClientStore,\n} from \"@better-auth/core\";\nimport { safeJSONParse } from \"@better-auth/core/utils/json\";\nimport {\n\tparseSetCookieHeader,\n\tSECURE_COOKIE_PREFIX,\n\tstripSecureCookiePrefix,\n} from \"better-auth/cookies\";\nimport Constants from \"expo-constants\";\nimport * as Linking from \"expo-linking\";\nimport { Platform } from \"react-native\";\nimport { setupExpoFocusManager } from \"./focus-manager\";\nimport { setupExpoOnlineManager } from \"./online-manager\";\n\nif (Platform.OS !== \"web\") {\n\tsetupExpoFocusManager();\n\tsetupExpoOnlineManager();\n}\n\ninterface ExpoClientOptions {\n\tscheme?: string | undefined;\n\tstorage: {\n\t\tsetItem: (key: string, value: string) => any;\n\t\tgetItem: (key: string) => string | null;\n\t};\n\t/**\n\t * Prefix for local storage keys (e.g., \"my-app_cookie\", \"my-app_session_data\")\n\t * @default \"better-auth\"\n\t */\n\tstoragePrefix?: string | undefined;\n\t/**\n\t * Prefix(es) for server cookie names to filter (e.g., \"better-auth.session_token\")\n\t * This is used to identify which cookies belong to better-auth to prevent\n\t * infinite refetching when third-party cookies are set.\n\t * Can be a single string or an array of strings to match multiple prefixes.\n\t * @default \"better-auth\"\n\t * @example \"better-auth\"\n\t * @example [\"better-auth\", \"my-app\"]\n\t */\n\tcookiePrefix?: string | string[] | undefined;\n\tdisableCache?: boolean | undefined;\n\t/**\n\t * Options to customize the Expo web browser behavior when opening authentication\n\t * sessions. These are passed directly to `expo-web-browser`'s\n\t * `Browser.openBrowserAsync`.\n\t *\n\t * For example, on iOS you can use `{ preferEphemeralSession: true }` to prevent\n\t * the authentication session from sharing cookies with the user's default\n\t * browser session:\n\t *\n\t * ```ts\n\t * const client = createClient({\n\t * expo: {\n\t * webBrowserOptions: {\n\t * preferEphemeralSession: true,\n\t * },\n\t * },\n\t * });\n\t * ```\n\t */\n\twebBrowserOptions?: import(\"expo-web-browser\").AuthSessionOpenOptions;\n}\n\ninterface StoredCookie {\n\tvalue: string;\n\texpires: string | null;\n}\n\nexport function getSetCookie(header: string, prevCookie?: string | undefined) {\n\tconst parsed = parseSetCookieHeader(header);\n\tconst toSetCookie =\n\t\tsafeJSONParse<Record<string, StoredCookie>>(prevCookie) ?? {};\n\tparsed.forEach((cookie, key) => {\n\t\tconst expiresAt = cookie[\"expires\"];\n\t\tconst maxAge = cookie[\"max-age\"];\n\t\tif (maxAge !== undefined && Number(maxAge) <= 0) {\n\t\t\tdelete toSetCookie[key];\n\t\t\treturn;\n\t\t}\n\t\tconst expires = maxAge\n\t\t\t? new Date(Date.now() + Number(maxAge) * 1000)\n\t\t\t: expiresAt\n\t\t\t\t? new Date(String(expiresAt))\n\t\t\t\t: null;\n\t\tif (expires && expires.getTime() <= Date.now()) {\n\t\t\tdelete toSetCookie[key];\n\t\t\treturn;\n\t\t}\n\t\ttoSetCookie[key] = {\n\t\t\tvalue: cookie[\"value\"],\n\t\t\texpires: expires ? expires.toISOString() : null,\n\t\t};\n\t});\n\treturn JSON.stringify(toSetCookie);\n}\n\nexport function getCookie(cookie: string) {\n\tlet parsed = {} as Record<string, StoredCookie>;\n\ttry {\n\t\tparsed = JSON.parse(cookie) as Record<string, StoredCookie>;\n\t} catch {}\n\tconst toSend = Object.entries(parsed).reduce((acc, [key, value]) => {\n\t\tif (value.expires && new Date(value.expires) < new Date()) {\n\t\t\treturn acc;\n\t\t}\n\t\treturn acc ? `${acc}; ${key}=${value.value}` : `${key}=${value.value}`;\n\t}, \"\");\n\treturn toSend;\n}\n\nfunction getOAuthStateValue(\n\tcookieJson: string | null,\n\tcookiePrefix: string | string[],\n): string | null {\n\tif (!cookieJson) return null;\n\n\tconst parsed = safeJSONParse<Record<string, StoredCookie>>(cookieJson);\n\tif (!parsed) return null;\n\n\tconst prefixes = Array.isArray(cookiePrefix) ? cookiePrefix : [cookiePrefix];\n\n\tfor (const prefix of prefixes) {\n\t\t// cookie strategy uses: <prefix>.oauth_state\n\t\tconst candidates = [\n\t\t\t`${SECURE_COOKIE_PREFIX}${prefix}.oauth_state`,\n\t\t\t`${prefix}.oauth_state`,\n\t\t];\n\n\t\tfor (const name of candidates) {\n\t\t\tconst value = parsed?.[name]?.value;\n\t\t\tif (value) return value;\n\t\t}\n\t}\n\n\treturn null;\n}\n\nfunction getOrigin(scheme: string) {\n\tconst schemeURI = Linking.createURL(\"\", { scheme });\n\treturn schemeURI;\n}\n\n/**\n * Compare if session cookies have actually changed by comparing their values.\n * Ignores expiry timestamps that naturally change on each request.\n *\n * @param prevCookie - Previous cookie JSON string\n * @param newCookie - New cookie JSON string\n * @returns true if session cookies have changed, false otherwise\n */\nfunction hasSessionCookieChanged(\n\tprevCookie: string | null,\n\tnewCookie: string,\n): boolean {\n\tif (!prevCookie) return true;\n\n\ttry {\n\t\tconst prev = JSON.parse(prevCookie) as Record<string, StoredCookie>;\n\t\tconst next = JSON.parse(newCookie) as Record<string, StoredCookie>;\n\n\t\t// Get all session-related cookie keys (session_token, session_data)\n\t\tconst sessionKeys = new Set<string>();\n\t\tObject.keys(prev).forEach((key) => {\n\t\t\tif (key.includes(\"session_token\") || key.includes(\"session_data\")) {\n\t\t\t\tsessionKeys.add(key);\n\t\t\t}\n\t\t});\n\t\tObject.keys(next).forEach((key) => {\n\t\t\tif (key.includes(\"session_token\") || key.includes(\"session_data\")) {\n\t\t\t\tsessionKeys.add(key);\n\t\t\t}\n\t\t});\n\n\t\t// Compare the values of session cookies (ignore expires timestamps)\n\t\tfor (const key of sessionKeys) {\n\t\t\tconst prevValue = prev[key]?.value;\n\t\t\tconst nextValue = next[key]?.value;\n\t\t\tif (prevValue !== nextValue) {\n\t\t\t\treturn true;\n\t\t\t}\n\t\t}\n\n\t\treturn false;\n\t} catch {\n\t\t// If parsing fails, assume cookie changed\n\t\treturn true;\n\t}\n}\n\n/**\n * Check if the Set-Cookie header contains better-auth cookies.\n * This prevents infinite refetching when non-better-auth cookies (like third-party cookies) change.\n *\n * Supports multiple cookie naming patterns:\n * - Default: \"better-auth.session_token\", \"better-auth-passkey\", \"__Secure-better-auth.session_token\"\n * - Custom prefix: \"myapp.session_token\", \"myapp-passkey\", \"__Secure-myapp.session_token\"\n * - Custom full names: \"my_custom_session_token\", \"custom_session_data\"\n * - No prefix (cookiePrefix=\"\"): matches any cookie with known suffixes\n * - Multiple prefixes: [\"better-auth\", \"my-app\"] matches cookies starting with any of the prefixes\n *\n * @param setCookieHeader - The Set-Cookie header value\n * @param cookiePrefix - The cookie prefix(es) to check for. Can be a string, array of strings, or empty string.\n * @returns true if the header contains better-auth cookies, false otherwise\n */\nexport function hasBetterAuthCookies(\n\tsetCookieHeader: string,\n\tcookiePrefix: string | string[],\n): boolean {\n\tconst cookies = parseSetCookieHeader(setCookieHeader);\n\tconst cookieSuffixes = [\"session_token\", \"session_data\"];\n\tconst prefixes = Array.isArray(cookiePrefix) ? cookiePrefix : [cookiePrefix];\n\n\t// Check if any cookie is a better-auth cookie\n\tfor (const name of cookies.keys()) {\n\t\t// Remove __Secure- prefix if present for comparison\n\t\tconst nameWithoutSecure = stripSecureCookiePrefix(name);\n\n\t\t// Check against all provided prefixes\n\t\tfor (const prefix of prefixes) {\n\t\t\tif (prefix) {\n\t\t\t\t// When prefix is provided, check if cookie starts with the prefix\n\t\t\t\t// This matches all better-auth cookies including session cookies, passkey cookies, etc.\n\t\t\t\tif (nameWithoutSecure.startsWith(prefix)) {\n\t\t\t\t\treturn true;\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\t// When prefix is empty, check for common better-auth cookie patterns\n\t\t\t\tfor (const suffix of cookieSuffixes) {\n\t\t\t\t\tif (nameWithoutSecure.endsWith(suffix)) {\n\t\t\t\t\t\treturn true;\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn false;\n}\n\n/**\n * Expo secure store does not support colons in the keys.\n * This function replaces colons with underscores.\n *\n * @see https://github.com/better-auth/better-auth/issues/5426\n *\n * @param name cookie name to be saved in the storage\n * @returns normalized cookie name\n */\nexport function normalizeCookieName(name: string) {\n\treturn name.replace(/:/g, \"_\");\n}\n\nexport function storageAdapter(storage: {\n\tgetItem: (name: string) => string | null;\n\tsetItem: (name: string, value: string) => void;\n}) {\n\treturn {\n\t\tgetItem: (name: string) => {\n\t\t\treturn storage.getItem(normalizeCookieName(name));\n\t\t},\n\t\tsetItem: (name: string, value: string) => {\n\t\t\treturn storage.setItem(normalizeCookieName(name), value);\n\t\t},\n\t};\n}\n\nexport const expoClient = (opts: ExpoClientOptions) => {\n\tlet store: ClientStore | null = null;\n\tconst storagePrefix = opts?.storagePrefix || \"better-auth\";\n\tconst cookieName = `${storagePrefix}_cookie`;\n\tconst localCacheName = `${storagePrefix}_session_data`;\n\tconst storage = storageAdapter(opts?.storage);\n\tconst isWeb = Platform.OS === \"web\";\n\tconst cookiePrefix = opts?.cookiePrefix || \"better-auth\";\n\n\tconst rawScheme =\n\t\topts?.scheme || Constants.expoConfig?.scheme || Constants.platform?.scheme;\n\tconst scheme = Array.isArray(rawScheme) ? rawScheme[0] : rawScheme;\n\n\tif (!scheme && !isWeb) {\n\t\tthrow new Error(\n\t\t\t\"Scheme not found in app.json. Please provide a scheme in the options.\",\n\t\t);\n\t}\n\treturn {\n\t\tid: \"expo\",\n\t\tgetActions(_, $store) {\n\t\t\tstore = $store;\n\t\t\treturn {\n\t\t\t\t/**\n\t\t\t\t * Get the stored cookie.\n\t\t\t\t *\n\t\t\t\t * You can use this to get the cookie stored in the device and use it in your fetch\n\t\t\t\t * requests.\n\t\t\t\t *\n\t\t\t\t * @example\n\t\t\t\t * ```ts\n\t\t\t\t * const cookie = client.getCookie();\n\t\t\t\t * fetch(\"https://api.example.com\", {\n\t\t\t\t * \theaders: {\n\t\t\t\t * \t\tcookie,\n\t\t\t\t * \t},\n\t\t\t\t * });\n\t\t\t\t */\n\t\t\t\tgetCookie: () => {\n\t\t\t\t\tconst cookie = storage.getItem(cookieName);\n\t\t\t\t\treturn getCookie(cookie || \"{}\");\n\t\t\t\t},\n\t\t\t};\n\t\t},\n\t\tfetchPlugins: [\n\t\t\t{\n\t\t\t\tid: \"expo\",\n\t\t\t\tname: \"Expo\",\n\t\t\t\thooks: {\n\t\t\t\t\tasync onSuccess(context) {\n\t\t\t\t\t\tif (isWeb) return;\n\t\t\t\t\t\tconst setCookie = context.response.headers.get(\"set-cookie\");\n\t\t\t\t\t\tif (setCookie) {\n\t\t\t\t\t\t\t// Only process and notify if the Set-Cookie header contains better-auth cookies\n\t\t\t\t\t\t\t// This prevents infinite refetching when other cookies (like Cloudflare's __cf_bm) are present\n\t\t\t\t\t\t\tif (hasBetterAuthCookies(setCookie, cookiePrefix)) {\n\t\t\t\t\t\t\t\tconst prevCookie = storage.getItem(cookieName);\n\t\t\t\t\t\t\t\tconst toSetCookie = getSetCookie(\n\t\t\t\t\t\t\t\t\tsetCookie || \"\",\n\t\t\t\t\t\t\t\t\tprevCookie ?? undefined,\n\t\t\t\t\t\t\t\t);\n\t\t\t\t\t\t\t\t// Only notify $sessionSignal if the session cookie values actually changed\n\t\t\t\t\t\t\t\t// This prevents infinite refetching when the server sends the same cookie with updated expiry\n\t\t\t\t\t\t\t\tif (hasSessionCookieChanged(prevCookie, toSetCookie)) {\n\t\t\t\t\t\t\t\t\tstorage.setItem(cookieName, toSetCookie);\n\t\t\t\t\t\t\t\t\tstore?.notify(\"$sessionSignal\");\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t// Still update the storage to refresh expiry times, but don't trigger refetch\n\t\t\t\t\t\t\t\t\tstorage.setItem(cookieName, toSetCookie);\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tif (\n\t\t\t\t\t\t\tcontext.request.url.toString().includes(\"/get-session\") &&\n\t\t\t\t\t\t\t!opts?.disableCache\n\t\t\t\t\t\t) {\n\t\t\t\t\t\t\tconst data = context.data;\n\t\t\t\t\t\t\tstorage.setItem(localCacheName, JSON.stringify(data));\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tif (\n\t\t\t\t\t\t\tcontext.data?.redirect &&\n\t\t\t\t\t\t\t(context.request.url.toString().includes(\"/sign-in\") ||\n\t\t\t\t\t\t\t\tcontext.request.url.toString().includes(\"/link-social\")) &&\n\t\t\t\t\t\t\t!context.request?.body.includes(\"idToken\") // id token is used for silent sign-in\n\t\t\t\t\t\t) {\n\t\t\t\t\t\t\tconst callbackURL = JSON.parse(context.request.body)?.callbackURL;\n\t\t\t\t\t\t\tconst to = callbackURL;\n\t\t\t\t\t\t\tconst signInURL = context.data?.url;\n\t\t\t\t\t\t\tlet Browser: typeof import(\"expo-web-browser\") | undefined =\n\t\t\t\t\t\t\t\tundefined;\n\t\t\t\t\t\t\ttry {\n\t\t\t\t\t\t\t\tBrowser = await import(\"expo-web-browser\");\n\t\t\t\t\t\t\t} catch {\n\t\t\t\t\t\t\t\ttry {\n\t\t\t\t\t\t\t\t\tBrowser = require(\"expo-web-browser\");\n\t\t\t\t\t\t\t\t} catch (error) {\n\t\t\t\t\t\t\t\t\tthrow new Error(\n\t\t\t\t\t\t\t\t\t\t'\"expo-web-browser\" is not installed as a dependency!',\n\t\t\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\t\t\tcause: error,\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t);\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tif (Platform.OS === \"android\") {\n\t\t\t\t\t\t\t\ttry {\n\t\t\t\t\t\t\t\t\tBrowser!.dismissAuthSession();\n\t\t\t\t\t\t\t\t} catch {}\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tconst storedCookieJson = storage.getItem(cookieName);\n\t\t\t\t\t\t\tconst oauthStateValue = getOAuthStateValue(\n\t\t\t\t\t\t\t\tstoredCookieJson,\n\t\t\t\t\t\t\t\tcookiePrefix,\n\t\t\t\t\t\t\t);\n\t\t\t\t\t\t\tconst params = new URLSearchParams({\n\t\t\t\t\t\t\t\tauthorizationURL: signInURL,\n\t\t\t\t\t\t\t});\n\t\t\t\t\t\t\tif (oauthStateValue) {\n\t\t\t\t\t\t\t\tparams.append(\"oauthState\", oauthStateValue);\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tconst proxyURL = `${context.request.baseURL}/expo-authorization-proxy?${params.toString()}`;\n\t\t\t\t\t\t\tconst result = await Browser!.openAuthSessionAsync(\n\t\t\t\t\t\t\t\tproxyURL,\n\t\t\t\t\t\t\t\tto,\n\t\t\t\t\t\t\t\topts?.webBrowserOptions,\n\t\t\t\t\t\t\t);\n\t\t\t\t\t\t\tif (result.type !== \"success\") return;\n\t\t\t\t\t\t\tconst url = new URL(result.url);\n\t\t\t\t\t\t\tconst cookie = url.searchParams.get(\"cookie\");\n\t\t\t\t\t\t\tif (!cookie) return;\n\t\t\t\t\t\t\tconst prevCookie = storage.getItem(cookieName);\n\t\t\t\t\t\t\tconst toSetCookie = getSetCookie(cookie, prevCookie ?? undefined);\n\t\t\t\t\t\t\tstorage.setItem(cookieName, toSetCookie);\n\t\t\t\t\t\t\tstore?.notify(\"$sessionSignal\");\n\t\t\t\t\t\t}\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tasync init(url, options) {\n\t\t\t\t\tif (isWeb) {\n\t\t\t\t\t\treturn {\n\t\t\t\t\t\t\turl,\n\t\t\t\t\t\t\toptions: options as ClientFetchOption,\n\t\t\t\t\t\t};\n\t\t\t\t\t}\n\t\t\t\t\toptions = options || {};\n\t\t\t\t\toptions.credentials = \"omit\";\n\t\t\t\t\t/**\n\t\t\t\t\t * ID token flow (native sign-in) doesn't need cookie-based auth.\n\t\t\t\t\t * The ID token itself is cryptographically signed by the provider\n\t\t\t\t\t * and validated server-side, so no session cookies or origin\n\t\t\t\t\t * validation is required.\n\t\t\t\t\t *\n\t\t\t\t\t * Sending cookie/expo-origin headers for ID token requests triggers\n\t\t\t\t\t * unnecessary origin checks that fail for custom URL schemes.\n\t\t\t\t\t */\n\t\t\t\t\tconst isIdTokenRequest = options.body?.idToken !== undefined;\n\n\t\t\t\t\tif (isIdTokenRequest) {\n\t\t\t\t\t\toptions.headers = {\n\t\t\t\t\t\t\t...options.headers,\n\t\t\t\t\t\t\t\"x-skip-oauth-proxy\": \"true\",\n\t\t\t\t\t\t};\n\t\t\t\t\t} else {\n\t\t\t\t\t\tconst storedCookie = storage.getItem(cookieName);\n\t\t\t\t\t\tconst cookie = getCookie(storedCookie || \"{}\");\n\t\t\t\t\t\toptions.headers = {\n\t\t\t\t\t\t\t...options.headers,\n\t\t\t\t\t\t\t...(cookie ? { cookie } : {}),\n\t\t\t\t\t\t\t\"expo-origin\": getOrigin(scheme!),\n\t\t\t\t\t\t\t\"x-skip-oauth-proxy\": \"true\",\n\t\t\t\t\t\t};\n\t\t\t\t\t\tif (options.body?.callbackURL) {\n\t\t\t\t\t\t\tif (options.body.callbackURL.startsWith(\"/\")) {\n\t\t\t\t\t\t\t\tconst url = Linking.createURL(options.body.callbackURL);\n\t\t\t\t\t\t\t\toptions.body.callbackURL = url;\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif (options.body?.newUserCallbackURL) {\n\t\t\t\t\t\t\tif (options.body.newUserCallbackURL.startsWith(\"/\")) {\n\t\t\t\t\t\t\t\tconst url = Linking.createURL(options.body.newUserCallbackURL);\n\t\t\t\t\t\t\t\toptions.body.newUserCallbackURL = url;\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif (options.body?.errorCallbackURL) {\n\t\t\t\t\t\t\tif (options.body.errorCallbackURL.startsWith(\"/\")) {\n\t\t\t\t\t\t\t\tconst url = Linking.createURL(options.body.errorCallbackURL);\n\t\t\t\t\t\t\t\toptions.body.errorCallbackURL = url;\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tif (url.includes(\"/sign-out\")) {\n\t\t\t\t\t\t\tstorage.setItem(cookieName, \"{}\");\n\t\t\t\t\t\t\tstore?.atoms.session?.set({\n\t\t\t\t\t\t\t\t...store.atoms.session.get(),\n\t\t\t\t\t\t\t\tdata: null,\n\t\t\t\t\t\t\t\terror: null,\n\t\t\t\t\t\t\t\tisPending: false,\n\t\t\t\t\t\t\t});\n\t\t\t\t\t\t\tstorage.setItem(localCacheName, \"{}\");\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\treturn {\n\t\t\t\t\t\turl,\n\t\t\t\t\t\toptions: options as ClientFetchOption,\n\t\t\t\t\t};\n\t\t\t\t},\n\t\t\t},\n\t\t],\n\t} satisfies BetterAuthClientPlugin;\n};\n\nexport { parseSetCookieHeader } from \"better-auth/cookies\";\nexport * from \"./focus-manager\";\nexport * from \"./online-manager\";\n"],"mappings":";;;;;;;;;;;;;AAKA,IAAM,mBAAN,MAA+C;CAC9C,4BAAY,IAAI,KAAoB;CACpC;CACA;CAEA,UAAU,UAAyB;AAClC,OAAK,UAAU,IAAI,SAAS;AAC5B,eAAa;AACZ,QAAK,UAAU,OAAO,SAAS;;;CAIjC,WAAW,SAAkB;AAC5B,MAAI,KAAK,cAAc,QAAS;AAChC,OAAK,YAAY;AACjB,OAAK,UAAU,SAAS,aAAa,SAAS,QAAQ,CAAC;;CAGxD,QAAQ;AACP,OAAK,eAAe,SAAS,iBAC5B,WACC,UAA0B;AAC1B,QAAK,WAAW,UAAU,SAAS;IAEpC;AAED,eAAa;AACZ,QAAK,cAAc,QAAQ;;;;AAK9B,SAAgB,wBAAwB;AACvC,KAAI,CAAE,WAAmB,eACxB,CAAC,WAAmB,iBAAiB,IAAI,kBAAkB;AAE5D,QAAQ,WAAmB;;;;;ACtC5B,IAAM,oBAAN,MAAiD;CAChD,4BAAY,IAAI,KAAqB;CACrC,WAAW;CACX;CAEA,UAAU,UAA0B;AACnC,OAAK,UAAU,IAAI,SAAS;AAC5B,eAAa;AACZ,QAAK,UAAU,OAAO,SAAS;;;CAIjC,UAAU,QAAiB;AAC1B,MAAI,KAAK,aAAa,OAAQ;AAC9B,OAAK,WAAW;AAChB,OAAK,UAAU,SAAS,aAAa,SAAS,OAAO,CAAC;;CAGvD,QAAQ;AACP,SAAO,gBACL,MAAM,EAAE,8BAA8B;GACtC,MAAM,eAAe,yBAAyB,UAAU;AACvD,SAAK,UAAU,CAAC,CAAC,MAAM,oBAAoB;KAC1C;AACF,QAAK,oBAAoB,aAAa,QAAQ;IAC7C,CACD,YAAY;AAEZ,QAAK,UAAU,KAAK;IACnB;AAEH,eAAa;AACZ,QAAK,eAAe;;;;AAKvB,SAAgB,yBAAyB;AACxC,KAAI,CAAE,WAAmB,gBACxB,CAAC,WAAmB,kBAAkB,IAAI,mBAAmB;AAE9D,QAAQ,WAAmB;;;;;AC3B5B,IAAI,SAAS,OAAO,OAAO;AAC1B,wBAAuB;AACvB,yBAAwB;;AAoDzB,SAAgB,aAAa,QAAgB,YAAiC;CAC7E,MAAM,SAASA,uBAAqB,OAAO;CAC3C,MAAM,cACL,cAA4C,WAAW,IAAI,EAAE;AAC9D,QAAO,SAAS,QAAQ,QAAQ;EAC/B,MAAM,YAAY,OAAO;EACzB,MAAM,SAAS,OAAO;AACtB,MAAI,WAAW,UAAa,OAAO,OAAO,IAAI,GAAG;AAChD,UAAO,YAAY;AACnB;;EAED,MAAM,UAAU,SACb,IAAI,KAAK,KAAK,KAAK,GAAG,OAAO,OAAO,GAAG,IAAK,GAC5C,YACC,IAAI,KAAK,OAAO,UAAU,CAAC,GAC3B;AACJ,MAAI,WAAW,QAAQ,SAAS,IAAI,KAAK,KAAK,EAAE;AAC/C,UAAO,YAAY;AACnB;;AAED,cAAY,OAAO;GAClB,OAAO,OAAO;GACd,SAAS,UAAU,QAAQ,aAAa,GAAG;GAC3C;GACA;AACF,QAAO,KAAK,UAAU,YAAY;;AAGnC,SAAgB,UAAU,QAAgB;CACzC,IAAI,SAAS,EAAE;AACf,KAAI;AACH,WAAS,KAAK,MAAM,OAAO;SACpB;AAOR,QANe,OAAO,QAAQ,OAAO,CAAC,QAAQ,KAAK,CAAC,KAAK,WAAW;AACnE,MAAI,MAAM,WAAW,IAAI,KAAK,MAAM,QAAQ,mBAAG,IAAI,MAAM,CACxD,QAAO;AAER,SAAO,MAAM,GAAG,IAAI,IAAI,IAAI,GAAG,MAAM,UAAU,GAAG,IAAI,GAAG,MAAM;IAC7D,GAAG;;AAIP,SAAS,mBACR,YACA,cACgB;AAChB,KAAI,CAAC,WAAY,QAAO;CAExB,MAAM,SAAS,cAA4C,WAAW;AACtE,KAAI,CAAC,OAAQ,QAAO;CAEpB,MAAM,WAAW,MAAM,QAAQ,aAAa,GAAG,eAAe,CAAC,aAAa;AAE5E,MAAK,MAAM,UAAU,UAAU;EAE9B,MAAM,aAAa,CAClB,GAAG,uBAAuB,OAAO,eACjC,GAAG,OAAO,cACV;AAED,OAAK,MAAM,QAAQ,YAAY;GAC9B,MAAM,QAAQ,SAAS,OAAO;AAC9B,OAAI,MAAO,QAAO;;;AAIpB,QAAO;;AAGR,SAAS,UAAU,QAAgB;AAElC,QADkB,QAAQ,UAAU,IAAI,EAAE,QAAQ,CAAC;;;;;;;;;;AAYpD,SAAS,wBACR,YACA,WACU;AACV,KAAI,CAAC,WAAY,QAAO;AAExB,KAAI;EACH,MAAM,OAAO,KAAK,MAAM,WAAW;EACnC,MAAM,OAAO,KAAK,MAAM,UAAU;EAGlC,MAAM,8BAAc,IAAI,KAAa;AACrC,SAAO,KAAK,KAAK,CAAC,SAAS,QAAQ;AAClC,OAAI,IAAI,SAAS,gBAAgB,IAAI,IAAI,SAAS,eAAe,CAChE,aAAY,IAAI,IAAI;IAEpB;AACF,SAAO,KAAK,KAAK,CAAC,SAAS,QAAQ;AAClC,OAAI,IAAI,SAAS,gBAAgB,IAAI,IAAI,SAAS,eAAe,CAChE,aAAY,IAAI,IAAI;IAEpB;AAGF,OAAK,MAAM,OAAO,YAGjB,KAFkB,KAAK,MAAM,UACX,KAAK,MAAM,MAE5B,QAAO;AAIT,SAAO;SACA;AAEP,SAAO;;;;;;;;;;;;;;;;;;AAmBT,SAAgB,qBACf,iBACA,cACU;CACV,MAAM,UAAUA,uBAAqB,gBAAgB;CACrD,MAAM,iBAAiB,CAAC,iBAAiB,eAAe;CACxD,MAAM,WAAW,MAAM,QAAQ,aAAa,GAAG,eAAe,CAAC,aAAa;AAG5E,MAAK,MAAM,QAAQ,QAAQ,MAAM,EAAE;EAElC,MAAM,oBAAoB,wBAAwB,KAAK;AAGvD,OAAK,MAAM,UAAU,SACpB,KAAI,QAGH;OAAI,kBAAkB,WAAW,OAAO,CACvC,QAAO;QAIR,MAAK,MAAM,UAAU,eACpB,KAAI,kBAAkB,SAAS,OAAO,CACrC,QAAO;;AAMZ,QAAO;;;;;;;;;;;AAYR,SAAgB,oBAAoB,MAAc;AACjD,QAAO,KAAK,QAAQ,MAAM,IAAI;;AAG/B,SAAgB,eAAe,SAG5B;AACF,QAAO;EACN,UAAU,SAAiB;AAC1B,UAAO,QAAQ,QAAQ,oBAAoB,KAAK,CAAC;;EAElD,UAAU,MAAc,UAAkB;AACzC,UAAO,QAAQ,QAAQ,oBAAoB,KAAK,EAAE,MAAM;;EAEzD;;AAGF,MAAa,cAAc,SAA4B;CACtD,IAAI,QAA4B;CAChC,MAAM,gBAAgB,MAAM,iBAAiB;CAC7C,MAAM,aAAa,GAAG,cAAc;CACpC,MAAM,iBAAiB,GAAG,cAAc;CACxC,MAAM,UAAU,eAAe,MAAM,QAAQ;CAC7C,MAAM,QAAQ,SAAS,OAAO;CAC9B,MAAM,eAAe,MAAM,gBAAgB;CAE3C,MAAM,YACL,MAAM,UAAU,UAAU,YAAY,UAAU,UAAU,UAAU;CACrE,MAAM,SAAS,MAAM,QAAQ,UAAU,GAAG,UAAU,KAAK;AAEzD,KAAI,CAAC,UAAU,CAAC,MACf,OAAM,IAAI,MACT,wEACA;AAEF,QAAO;EACN,IAAI;EACJ,WAAW,GAAG,QAAQ;AACrB,WAAQ;AACR,UAAO,EAgBN,iBAAiB;AAEhB,WAAO,UADQ,QAAQ,QAAQ,WAAW,IACf,KAAK;MAEjC;;EAEF,cAAc,CACb;GACC,IAAI;GACJ,MAAM;GACN,OAAO,EACN,MAAM,UAAU,SAAS;AACxB,QAAI,MAAO;IACX,MAAM,YAAY,QAAQ,SAAS,QAAQ,IAAI,aAAa;AAC5D,QAAI,WAGH;SAAI,qBAAqB,WAAW,aAAa,EAAE;MAClD,MAAM,aAAa,QAAQ,QAAQ,WAAW;MAC9C,MAAM,cAAc,aACnB,aAAa,IACb,cAAc,OACd;AAGD,UAAI,wBAAwB,YAAY,YAAY,EAAE;AACrD,eAAQ,QAAQ,YAAY,YAAY;AACxC,cAAO,OAAO,iBAAiB;YAG/B,SAAQ,QAAQ,YAAY,YAAY;;;AAK3C,QACC,QAAQ,QAAQ,IAAI,UAAU,CAAC,SAAS,eAAe,IACvD,CAAC,MAAM,cACN;KACD,MAAM,OAAO,QAAQ;AACrB,aAAQ,QAAQ,gBAAgB,KAAK,UAAU,KAAK,CAAC;;AAGtD,QACC,QAAQ,MAAM,aACb,QAAQ,QAAQ,IAAI,UAAU,CAAC,SAAS,WAAW,IACnD,QAAQ,QAAQ,IAAI,UAAU,CAAC,SAAS,eAAe,KACxD,CAAC,QAAQ,SAAS,KAAK,SAAS,UAAU,EACzC;KAED,MAAM,KADc,KAAK,MAAM,QAAQ,QAAQ,KAAK,EAAE;KAEtD,MAAM,YAAY,QAAQ,MAAM;KAChC,IAAI,UACH;AACD,SAAI;AACH,gBAAU,MAAM,OAAO;aAChB;AACP,UAAI;AACH,2BAAkB,mBAAmB;eAC7B,OAAO;AACf,aAAM,IAAI,MACT,0DACA,EACC,OAAO,OACP,CACD;;;AAIH,SAAI,SAAS,OAAO,UACnB,KAAI;AACH,cAAS,oBAAoB;aACtB;KAIT,MAAM,kBAAkB,mBADC,QAAQ,QAAQ,WAAW,EAGnD,aACA;KACD,MAAM,SAAS,IAAI,gBAAgB,EAClC,kBAAkB,WAClB,CAAC;AACF,SAAI,gBACH,QAAO,OAAO,cAAc,gBAAgB;KAE7C,MAAM,WAAW,GAAG,QAAQ,QAAQ,QAAQ,4BAA4B,OAAO,UAAU;KACzF,MAAM,SAAS,MAAM,QAAS,qBAC7B,UACA,IACA,MAAM,kBACN;AACD,SAAI,OAAO,SAAS,UAAW;KAE/B,MAAM,SADM,IAAI,IAAI,OAAO,IAAI,CACZ,aAAa,IAAI,SAAS;AAC7C,SAAI,CAAC,OAAQ;KAEb,MAAM,cAAc,aAAa,QADd,QAAQ,QAAQ,WAAW,IACS,OAAU;AACjE,aAAQ,QAAQ,YAAY,YAAY;AACxC,YAAO,OAAO,iBAAiB;;MAGjC;GACD,MAAM,KAAK,KAAK,SAAS;AACxB,QAAI,MACH,QAAO;KACN;KACS;KACT;AAEF,cAAU,WAAW,EAAE;AACvB,YAAQ,cAAc;AAYtB,QAFyB,QAAQ,MAAM,YAAY,OAGlD,SAAQ,UAAU;KACjB,GAAG,QAAQ;KACX,sBAAsB;KACtB;SACK;KAEN,MAAM,SAAS,UADM,QAAQ,QAAQ,WAAW,IACP,KAAK;AAC9C,aAAQ,UAAU;MACjB,GAAG,QAAQ;MACX,GAAI,SAAS,EAAE,QAAQ,GAAG,EAAE;MAC5B,eAAe,UAAU,OAAQ;MACjC,sBAAsB;MACtB;AACD,SAAI,QAAQ,MAAM,aACjB;UAAI,QAAQ,KAAK,YAAY,WAAW,IAAI,EAAE;OAC7C,MAAM,MAAM,QAAQ,UAAU,QAAQ,KAAK,YAAY;AACvD,eAAQ,KAAK,cAAc;;;AAG7B,SAAI,QAAQ,MAAM,oBACjB;UAAI,QAAQ,KAAK,mBAAmB,WAAW,IAAI,EAAE;OACpD,MAAM,MAAM,QAAQ,UAAU,QAAQ,KAAK,mBAAmB;AAC9D,eAAQ,KAAK,qBAAqB;;;AAGpC,SAAI,QAAQ,MAAM,kBACjB;UAAI,QAAQ,KAAK,iBAAiB,WAAW,IAAI,EAAE;OAClD,MAAM,MAAM,QAAQ,UAAU,QAAQ,KAAK,iBAAiB;AAC5D,eAAQ,KAAK,mBAAmB;;;AAGlC,SAAI,IAAI,SAAS,YAAY,EAAE;AAC9B,cAAQ,QAAQ,YAAY,KAAK;AACjC,aAAO,MAAM,SAAS,IAAI;OACzB,GAAG,MAAM,MAAM,QAAQ,KAAK;OAC5B,MAAM;OACN,OAAO;OACP,WAAW;OACX,CAAC;AACF,cAAQ,QAAQ,gBAAgB,KAAK;;;AAGvC,WAAO;KACN;KACS;KACT;;GAEF,CACD;EACD"}
package/dist/index.d.mts CHANGED
@@ -1,5 +1,5 @@
1
1
  import * as better_auth0 from "better-auth";
2
- import * as zod0 from "zod";
2
+ import * as zod from "zod";
3
3
  import * as better_call0 from "better-call";
4
4
 
5
5
  //#region src/index.d.ts
@@ -11,7 +11,7 @@ interface ExpoOptions {
11
11
  disableOriginOverride?: boolean | undefined;
12
12
  }
13
13
  declare module "@better-auth/core" {
14
- interface BetterAuthPluginRegistry<Auth, Context> {
14
+ interface BetterAuthPluginRegistry<AuthOptions, Options> {
15
15
  expo: {
16
16
  creator: typeof expo;
17
17
  };
@@ -36,9 +36,9 @@ declare const expo: (options?: ExpoOptions | undefined) => {
36
36
  endpoints: {
37
37
  expoAuthorizationProxy: better_call0.StrictEndpoint<"/expo-authorization-proxy", {
38
38
  method: "GET";
39
- query: zod0.ZodObject<{
40
- authorizationURL: zod0.ZodString;
41
- oauthState: zod0.ZodOptional<zod0.ZodString>;
39
+ query: zod.ZodObject<{
40
+ authorizationURL: zod.ZodString;
41
+ oauthState: zod.ZodOptional<zod.ZodString>;
42
42
  }, better_auth0.$strip>;
43
43
  metadata: {
44
44
  readonly scope: "server";
@@ -61,4 +61,5 @@ declare const expo: (options?: ExpoOptions | undefined) => {
61
61
  options: ExpoOptions | undefined;
62
62
  };
63
63
  //#endregion
64
- export { ExpoOptions, expo };
64
+ export { ExpoOptions, expo };
65
+ //# sourceMappingURL=index.d.mts.map
package/dist/index.mjs CHANGED
@@ -14,14 +14,14 @@ const expoAuthorizationProxy = createAuthEndpoint("/expo-authorization-proxy", {
14
14
  }, async (ctx) => {
15
15
  const { oauthState } = ctx.query;
16
16
  if (oauthState) {
17
- const oauthStateCookie = ctx.context.createAuthCookie("oauth_state", { maxAge: 600 * 1e3 });
17
+ const oauthStateCookie = ctx.context.createAuthCookie("oauth_state", { maxAge: 600 });
18
18
  ctx.setCookie(oauthStateCookie.name, oauthState, oauthStateCookie.attributes);
19
19
  return ctx.redirect(ctx.query.authorizationURL);
20
20
  }
21
21
  const { authorizationURL } = ctx.query;
22
22
  const state = new URL(authorizationURL).searchParams.get("state");
23
23
  if (!state) throw new APIError("BAD_REQUEST", { message: "Unexpected error" });
24
- const stateCookie = ctx.context.createAuthCookie("state", { maxAge: 300 * 1e3 });
24
+ const stateCookie = ctx.context.createAuthCookie("state", { maxAge: 300 });
25
25
  await ctx.setSignedCookie(stateCookie.name, state, ctx.context.secret, stateCookie.attributes);
26
26
  return ctx.redirect(ctx.query.authorizationURL);
27
27
  });
@@ -42,9 +42,9 @@ const expo = (options) => {
42
42
  */
43
43
  const expoOrigin = request.headers.get("expo-origin");
44
44
  if (!expoOrigin) return;
45
- const req = request.clone();
46
- req.headers.set("origin", expoOrigin);
47
- return { request: req };
45
+ const newHeaders = new Headers(request.headers);
46
+ newHeaders.set("origin", expoOrigin);
47
+ return { request: new Request(request, { headers: newHeaders }) };
48
48
  },
49
49
  hooks: { after: [{
50
50
  matcher(context) {
@@ -55,12 +55,18 @@ const expo = (options) => {
55
55
  const location = headers?.get("location");
56
56
  if (!location) return;
57
57
  if (location.includes("/oauth-proxy-callback")) return;
58
- if (!ctx.context.trustedOrigins.filter((origin) => !origin.startsWith("http")).some((origin) => location?.startsWith(origin))) return;
58
+ let redirectURL;
59
+ try {
60
+ redirectURL = new URL(location);
61
+ } catch {
62
+ return;
63
+ }
64
+ if (redirectURL.protocol === "http:" || redirectURL.protocol === "https:") return;
65
+ if (!ctx.context.isTrustedOrigin(location)) return;
59
66
  const cookie = headers?.get("set-cookie");
60
67
  if (!cookie) return;
61
- const url = new URL(location);
62
- url.searchParams.set("cookie", cookie);
63
- ctx.setHeader("location", url.toString());
68
+ redirectURL.searchParams.set("cookie", cookie);
69
+ ctx.setHeader("location", redirectURL.toString());
64
70
  })
65
71
  }] },
66
72
  endpoints: { expoAuthorizationProxy },
@@ -69,4 +75,5 @@ const expo = (options) => {
69
75
  };
70
76
 
71
77
  //#endregion
72
- export { expo };
78
+ export { expo };
79
+ //# sourceMappingURL=index.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.mjs","names":[],"sources":["../src/routes.ts","../src/index.ts"],"sourcesContent":["import { HIDE_METADATA } from \"better-auth\";\nimport { APIError, createAuthEndpoint } from \"better-auth/api\";\nimport * as z from \"zod\";\n\nexport const expoAuthorizationProxy = createAuthEndpoint(\n\t\"/expo-authorization-proxy\",\n\t{\n\t\tmethod: \"GET\",\n\t\tquery: z.object({\n\t\t\tauthorizationURL: z.string(),\n\t\t\toauthState: z.string().optional(),\n\t\t}),\n\t\tmetadata: HIDE_METADATA,\n\t},\n\tasync (ctx) => {\n\t\tconst { oauthState } = ctx.query;\n\t\tif (oauthState) {\n\t\t\tconst oauthStateCookie = ctx.context.createAuthCookie(\"oauth_state\", {\n\t\t\t\tmaxAge: 10 * 60, // 10 minutes\n\t\t\t});\n\t\t\tctx.setCookie(\n\t\t\t\toauthStateCookie.name,\n\t\t\t\toauthState,\n\t\t\t\toauthStateCookie.attributes,\n\t\t\t);\n\t\t\treturn ctx.redirect(ctx.query.authorizationURL);\n\t\t}\n\n\t\tconst { authorizationURL } = ctx.query;\n\t\tconst url = new URL(authorizationURL);\n\t\tconst state = url.searchParams.get(\"state\");\n\t\tif (!state) {\n\t\t\tthrow new APIError(\"BAD_REQUEST\", {\n\t\t\t\tmessage: \"Unexpected error\",\n\t\t\t});\n\t\t}\n\t\tconst stateCookie = ctx.context.createAuthCookie(\"state\", {\n\t\t\tmaxAge: 5 * 60, // 5 minutes\n\t\t});\n\t\tawait ctx.setSignedCookie(\n\t\t\tstateCookie.name,\n\t\t\tstate,\n\t\t\tctx.context.secret,\n\t\t\tstateCookie.attributes,\n\t\t);\n\t\treturn ctx.redirect(ctx.query.authorizationURL);\n\t},\n);\n","import type { BetterAuthPlugin } from \"@better-auth/core\";\nimport { createAuthMiddleware } from \"@better-auth/core/api\";\nimport { expoAuthorizationProxy } from \"./routes\";\n\nexport interface ExpoOptions {\n\t/**\n\t * Disable origin override for expo API routes\n\t * When set to true, the origin header will not be overridden for expo API routes\n\t */\n\tdisableOriginOverride?: boolean | undefined;\n}\n\ndeclare module \"@better-auth/core\" {\n\tinterface BetterAuthPluginRegistry<AuthOptions, Options> {\n\t\texpo: {\n\t\t\tcreator: typeof expo;\n\t\t};\n\t}\n}\n\nexport const expo = (options?: ExpoOptions | undefined) => {\n\treturn {\n\t\tid: \"expo\",\n\t\tinit: (ctx) => {\n\t\t\tconst trustedOrigins =\n\t\t\t\tprocess.env.NODE_ENV === \"development\" ? [\"exp://\"] : [];\n\n\t\t\treturn {\n\t\t\t\toptions: {\n\t\t\t\t\ttrustedOrigins,\n\t\t\t\t},\n\t\t\t};\n\t\t},\n\t\tasync onRequest(request, ctx) {\n\t\t\tif (options?.disableOriginOverride || request.headers.get(\"origin\")) {\n\t\t\t\treturn;\n\t\t\t}\n\t\t\t/**\n\t\t\t * To bypass origin check from expo, we need to set the origin\n\t\t\t * header to the expo-origin header\n\t\t\t */\n\t\t\tconst expoOrigin = request.headers.get(\"expo-origin\");\n\t\t\tif (!expoOrigin) {\n\t\t\t\treturn;\n\t\t\t}\n\n\t\t\t// Construct new Headers with new Request to avoid mutating the original request\n\t\t\tconst newHeaders = new Headers(request.headers);\n\t\t\tnewHeaders.set(\"origin\", expoOrigin);\n\t\t\tconst req = new Request(request, { headers: newHeaders });\n\n\t\t\treturn {\n\t\t\t\trequest: req,\n\t\t\t};\n\t\t},\n\t\thooks: {\n\t\t\tafter: [\n\t\t\t\t{\n\t\t\t\t\tmatcher(context) {\n\t\t\t\t\t\treturn !!(\n\t\t\t\t\t\t\tcontext.path?.startsWith(\"/callback\") ||\n\t\t\t\t\t\t\tcontext.path?.startsWith(\"/oauth2/callback\") ||\n\t\t\t\t\t\t\tcontext.path?.startsWith(\"/magic-link/verify\") ||\n\t\t\t\t\t\t\tcontext.path?.startsWith(\"/verify-email\")\n\t\t\t\t\t\t);\n\t\t\t\t\t},\n\t\t\t\t\thandler: createAuthMiddleware(async (ctx) => {\n\t\t\t\t\t\tconst headers = ctx.context.responseHeaders;\n\t\t\t\t\t\tconst location = headers?.get(\"location\");\n\t\t\t\t\t\tif (!location) {\n\t\t\t\t\t\t\treturn;\n\t\t\t\t\t\t}\n\t\t\t\t\t\tconst isProxyURL = location.includes(\"/oauth-proxy-callback\");\n\t\t\t\t\t\tif (isProxyURL) {\n\t\t\t\t\t\t\treturn;\n\t\t\t\t\t\t}\n\t\t\t\t\t\tlet redirectURL: URL;\n\t\t\t\t\t\ttry {\n\t\t\t\t\t\t\tredirectURL = new URL(location);\n\t\t\t\t\t\t} catch {\n\t\t\t\t\t\t\treturn;\n\t\t\t\t\t\t}\n\t\t\t\t\t\tconst isHttpRedirect =\n\t\t\t\t\t\t\tredirectURL.protocol === \"http:\" ||\n\t\t\t\t\t\t\tredirectURL.protocol === \"https:\";\n\t\t\t\t\t\tif (isHttpRedirect) {\n\t\t\t\t\t\t\treturn;\n\t\t\t\t\t\t}\n\t\t\t\t\t\tconst isTrustedOrigin = ctx.context.isTrustedOrigin(location);\n\t\t\t\t\t\tif (!isTrustedOrigin) {\n\t\t\t\t\t\t\treturn;\n\t\t\t\t\t\t}\n\t\t\t\t\t\tconst cookie = headers?.get(\"set-cookie\");\n\t\t\t\t\t\tif (!cookie) {\n\t\t\t\t\t\t\treturn;\n\t\t\t\t\t\t}\n\t\t\t\t\t\tredirectURL.searchParams.set(\"cookie\", cookie);\n\t\t\t\t\t\tctx.setHeader(\"location\", redirectURL.toString());\n\t\t\t\t\t}),\n\t\t\t\t},\n\t\t\t],\n\t\t},\n\t\tendpoints: {\n\t\t\texpoAuthorizationProxy,\n\t\t},\n\t\toptions,\n\t} satisfies BetterAuthPlugin;\n};\n"],"mappings":";;;;;;AAIA,MAAa,yBAAyB,mBACrC,6BACA;CACC,QAAQ;CACR,OAAO,EAAE,OAAO;EACf,kBAAkB,EAAE,QAAQ;EAC5B,YAAY,EAAE,QAAQ,CAAC,UAAU;EACjC,CAAC;CACF,UAAU;CACV,EACD,OAAO,QAAQ;CACd,MAAM,EAAE,eAAe,IAAI;AAC3B,KAAI,YAAY;EACf,MAAM,mBAAmB,IAAI,QAAQ,iBAAiB,eAAe,EACpE,QAAQ,KACR,CAAC;AACF,MAAI,UACH,iBAAiB,MACjB,YACA,iBAAiB,WACjB;AACD,SAAO,IAAI,SAAS,IAAI,MAAM,iBAAiB;;CAGhD,MAAM,EAAE,qBAAqB,IAAI;CAEjC,MAAM,QADM,IAAI,IAAI,iBAAiB,CACnB,aAAa,IAAI,QAAQ;AAC3C,KAAI,CAAC,MACJ,OAAM,IAAI,SAAS,eAAe,EACjC,SAAS,oBACT,CAAC;CAEH,MAAM,cAAc,IAAI,QAAQ,iBAAiB,SAAS,EACzD,QAAQ,KACR,CAAC;AACF,OAAM,IAAI,gBACT,YAAY,MACZ,OACA,IAAI,QAAQ,QACZ,YAAY,WACZ;AACD,QAAO,IAAI,SAAS,IAAI,MAAM,iBAAiB;EAEhD;;;;AC3BD,MAAa,QAAQ,YAAsC;AAC1D,QAAO;EACN,IAAI;EACJ,OAAO,QAAQ;AAId,UAAO,EACN,SAAS,EACR,gBAJD,QAAQ,IAAI,aAAa,gBAAgB,CAAC,SAAS,GAAG,EAAE,EAKvD,EACD;;EAEF,MAAM,UAAU,SAAS,KAAK;AAC7B,OAAI,SAAS,yBAAyB,QAAQ,QAAQ,IAAI,SAAS,CAClE;;;;;GAMD,MAAM,aAAa,QAAQ,QAAQ,IAAI,cAAc;AACrD,OAAI,CAAC,WACJ;GAID,MAAM,aAAa,IAAI,QAAQ,QAAQ,QAAQ;AAC/C,cAAW,IAAI,UAAU,WAAW;AAGpC,UAAO,EACN,SAHW,IAAI,QAAQ,SAAS,EAAE,SAAS,YAAY,CAAC,EAIxD;;EAEF,OAAO,EACN,OAAO,CACN;GACC,QAAQ,SAAS;AAChB,WAAO,CAAC,EACP,QAAQ,MAAM,WAAW,YAAY,IACrC,QAAQ,MAAM,WAAW,mBAAmB,IAC5C,QAAQ,MAAM,WAAW,qBAAqB,IAC9C,QAAQ,MAAM,WAAW,gBAAgB;;GAG3C,SAAS,qBAAqB,OAAO,QAAQ;IAC5C,MAAM,UAAU,IAAI,QAAQ;IAC5B,MAAM,WAAW,SAAS,IAAI,WAAW;AACzC,QAAI,CAAC,SACJ;AAGD,QADmB,SAAS,SAAS,wBAAwB,CAE5D;IAED,IAAI;AACJ,QAAI;AACH,mBAAc,IAAI,IAAI,SAAS;YACxB;AACP;;AAKD,QAFC,YAAY,aAAa,WACzB,YAAY,aAAa,SAEzB;AAGD,QAAI,CADoB,IAAI,QAAQ,gBAAgB,SAAS,CAE5D;IAED,MAAM,SAAS,SAAS,IAAI,aAAa;AACzC,QAAI,CAAC,OACJ;AAED,gBAAY,aAAa,IAAI,UAAU,OAAO;AAC9C,QAAI,UAAU,YAAY,YAAY,UAAU,CAAC;KAChD;GACF,CACD,EACD;EACD,WAAW,EACV,wBACA;EACD;EACA"}
@@ -1,4 +1,4 @@
1
- import * as _better_fetch_fetch15 from "@better-fetch/fetch";
1
+ import * as _better_fetch_fetch0 from "@better-fetch/fetch";
2
2
  import { Awaitable } from "@better-auth/core";
3
3
 
4
4
  //#region src/plugins/last-login-method.d.ts
@@ -24,7 +24,7 @@ declare const lastLoginMethodClient: (config: LastLoginMethodClientConfig) => {
24
24
  id: string;
25
25
  name: string;
26
26
  hooks: {
27
- onResponse: (ctx: _better_fetch_fetch15.ResponseContext) => Promise<void>;
27
+ onResponse: (ctx: _better_fetch_fetch0.ResponseContext) => Promise<void>;
28
28
  };
29
29
  }[];
30
30
  getActions(): {
@@ -47,4 +47,5 @@ declare const lastLoginMethodClient: (config: LastLoginMethodClientConfig) => {
47
47
  };
48
48
  };
49
49
  //#endregion
50
- export { LastLoginMethodClientConfig, lastLoginMethodClient };
50
+ export { LastLoginMethodClientConfig, lastLoginMethodClient };
51
+ //# sourceMappingURL=index.d.mts.map
@@ -43,4 +43,5 @@ const lastLoginMethodClient = (config) => {
43
43
  };
44
44
 
45
45
  //#endregion
46
- export { lastLoginMethodClient };
46
+ export { lastLoginMethodClient };
47
+ //# sourceMappingURL=index.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.mjs","names":[],"sources":["../../src/plugins/last-login-method.ts"],"sourcesContent":["import type { Awaitable, BetterAuthClientPlugin } from \"@better-auth/core\";\n\nexport interface LastLoginMethodClientConfig {\n\tstorage: {\n\t\tsetItem: (key: string, value: string) => any;\n\t\tgetItem: (key: string) => string | null;\n\t\tdeleteItemAsync: (key: string) => Awaitable<void>;\n\t};\n\t/**\n\t * Prefix for local storage keys (e.g., \"my-app_last_login_method\")\n\t * @default \"better-auth\"\n\t */\n\tstoragePrefix?: string | undefined;\n\t/**\n\t * Custom resolve method for retrieving the last login method\n\t */\n\tcustomResolveMethod?:\n\t\t| ((url: string | URL) => Awaitable<string | undefined | null>)\n\t\t| undefined;\n}\n\nconst paths = [\n\t\"/callback/\",\n\t\"/oauth2/callback/\",\n\t\"/sign-in/email\",\n\t\"/sign-up/email\",\n];\nconst defaultResolveMethod = (url: string | URL) => {\n\tconst { pathname } = new URL(url.toString(), \"http://localhost\");\n\n\tif (paths.some((p) => pathname.includes(p))) {\n\t\treturn pathname.split(\"/\").pop();\n\t}\n\tif (pathname.includes(\"siwe\")) return \"siwe\";\n\tif (pathname.includes(\"/passkey/verify-authentication\")) {\n\t\treturn \"passkey\";\n\t}\n\n\treturn;\n};\n\nexport const lastLoginMethodClient = (config: LastLoginMethodClientConfig) => {\n\tconst resolveMethod = config.customResolveMethod || defaultResolveMethod;\n\tconst storagePrefix = config.storagePrefix || \"better-auth\";\n\tconst lastLoginMethodName = `${storagePrefix}_last_login_method`;\n\tconst storage = config.storage;\n\n\treturn {\n\t\tid: \"last-login-method-expo\",\n\t\tfetchPlugins: [\n\t\t\t{\n\t\t\t\tid: \"last-login-method-expo\",\n\t\t\t\tname: \"Last Login Method\",\n\t\t\t\thooks: {\n\t\t\t\t\tonResponse: async (ctx) => {\n\t\t\t\t\t\tconst lastMethod = await resolveMethod(ctx.request.url);\n\t\t\t\t\t\tif (!lastMethod) {\n\t\t\t\t\t\t\treturn;\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tawait storage.setItem(lastLoginMethodName, lastMethod);\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t],\n\t\tgetActions() {\n\t\t\treturn {\n\t\t\t\t/**\n\t\t\t\t * Get the last used login method from storage\n\t\t\t\t *\n\t\t\t\t * @returns The last used login method or null if not found\n\t\t\t\t */\n\t\t\t\tgetLastUsedLoginMethod: (): string | null => {\n\t\t\t\t\treturn storage.getItem(lastLoginMethodName);\n\t\t\t\t},\n\t\t\t\t/**\n\t\t\t\t * Clear the last used login method from storage\n\t\t\t\t */\n\t\t\t\tclearLastUsedLoginMethod: async () => {\n\t\t\t\t\tawait storage.deleteItemAsync(lastLoginMethodName);\n\t\t\t\t},\n\t\t\t\t/**\n\t\t\t\t * Check if a specific login method was the last used\n\t\t\t\t * @param method The method to check\n\t\t\t\t * @returns True if the method was the last used, false otherwise\n\t\t\t\t */\n\t\t\t\tisLastUsedLoginMethod: (method: string): boolean => {\n\t\t\t\t\tconst lastMethod = storage.getItem(lastLoginMethodName);\n\t\t\t\t\treturn lastMethod === method;\n\t\t\t\t},\n\t\t\t};\n\t\t},\n\t} satisfies BetterAuthClientPlugin;\n};\n"],"mappings":";AAqBA,MAAM,QAAQ;CACb;CACA;CACA;CACA;CACA;AACD,MAAM,wBAAwB,QAAsB;CACnD,MAAM,EAAE,aAAa,IAAI,IAAI,IAAI,UAAU,EAAE,mBAAmB;AAEhE,KAAI,MAAM,MAAM,MAAM,SAAS,SAAS,EAAE,CAAC,CAC1C,QAAO,SAAS,MAAM,IAAI,CAAC,KAAK;AAEjC,KAAI,SAAS,SAAS,OAAO,CAAE,QAAO;AACtC,KAAI,SAAS,SAAS,iCAAiC,CACtD,QAAO;;AAMT,MAAa,yBAAyB,WAAwC;CAC7E,MAAM,gBAAgB,OAAO,uBAAuB;CAEpD,MAAM,sBAAsB,GADN,OAAO,iBAAiB,cACD;CAC7C,MAAM,UAAU,OAAO;AAEvB,QAAO;EACN,IAAI;EACJ,cAAc,CACb;GACC,IAAI;GACJ,MAAM;GACN,OAAO,EACN,YAAY,OAAO,QAAQ;IAC1B,MAAM,aAAa,MAAM,cAAc,IAAI,QAAQ,IAAI;AACvD,QAAI,CAAC,WACJ;AAGD,UAAM,QAAQ,QAAQ,qBAAqB,WAAW;MAEvD;GACD,CACD;EACD,aAAa;AACZ,UAAO;IAMN,8BAA6C;AAC5C,YAAO,QAAQ,QAAQ,oBAAoB;;IAK5C,0BAA0B,YAAY;AACrC,WAAM,QAAQ,gBAAgB,oBAAoB;;IAOnD,wBAAwB,WAA4B;AAEnD,YADmB,QAAQ,QAAQ,oBAAoB,KACjC;;IAEvB;;EAEF"}
package/package.json CHANGED
@@ -1,17 +1,31 @@
1
1
  {
2
2
  "name": "@better-auth/expo",
3
- "version": "1.5.0-beta.8",
4
- "type": "module",
3
+ "version": "1.5.0",
5
4
  "description": "Better Auth integration for Expo and React Native applications.",
6
- "main": "dist/index.mjs",
7
- "module": "dist/index.mjs",
8
- "types": "dist/index.d.mts",
5
+ "type": "module",
6
+ "license": "MIT",
7
+ "homepage": "https://www.better-auth.com/docs/integrations/expo",
9
8
  "repository": {
10
9
  "type": "git",
11
10
  "url": "git+https://github.com/better-auth/better-auth.git",
12
11
  "directory": "packages/expo"
13
12
  },
14
- "homepage": "https://www.better-auth.com/docs/integrations/expo",
13
+ "keywords": [
14
+ "auth",
15
+ "expo",
16
+ "react-native",
17
+ "typescript",
18
+ "better-auth"
19
+ ],
20
+ "publishConfig": {
21
+ "access": "public"
22
+ },
23
+ "files": [
24
+ "dist"
25
+ ],
26
+ "main": "./dist/index.mjs",
27
+ "module": "./dist/index.mjs",
28
+ "types": "./dist/index.d.mts",
15
29
  "exports": {
16
30
  ".": {
17
31
  "dev-source": "./src/index.ts",
@@ -42,35 +56,29 @@
42
56
  ]
43
57
  }
44
58
  },
45
- "keywords": [
46
- "auth",
47
- "expo",
48
- "react-native",
49
- "typescript",
50
- "better-auth"
51
- ],
52
- "publishConfig": {
53
- "access": "public"
59
+ "dependencies": {
60
+ "@better-fetch/fetch": "1.1.21",
61
+ "better-call": "1.3.2",
62
+ "zod": "^4.3.6"
54
63
  },
55
- "license": "MIT",
56
64
  "devDependencies": {
57
65
  "@better-fetch/fetch": "1.1.21",
58
- "expo-constants": "~17.1.7",
59
- "expo-network": "^8.0.7",
60
- "expo-linking": "~7.1.7",
61
- "expo-web-browser": "~14.2.0",
62
- "react-native": "~0.80.2",
63
- "tsdown": "^0.19.0",
64
- "@better-auth/core": "1.5.0-beta.8",
65
- "better-auth": "1.5.0-beta.8"
66
+ "expo-constants": "~55.0.7",
67
+ "expo-linking": "~55.0.7",
68
+ "expo-network": "~55.0.8",
69
+ "expo-web-browser": "~55.0.9",
70
+ "react-native": "~0.84.1",
71
+ "tsdown": "^0.20.3",
72
+ "@better-auth/core": "1.5.0",
73
+ "better-auth": "1.5.0"
66
74
  },
67
75
  "peerDependencies": {
68
76
  "expo-constants": ">=17.0.0",
69
77
  "expo-linking": ">=7.0.0",
70
- "expo-network": "^8.0.7",
78
+ "expo-network": ">=8.0.7",
71
79
  "expo-web-browser": ">=14.0.0",
72
- "better-auth": "1.5.0-beta.8",
73
- "@better-auth/core": "1.5.0-beta.8"
80
+ "@better-auth/core": "1.5.0",
81
+ "better-auth": "1.5.0"
74
82
  },
75
83
  "peerDependenciesMeta": {
76
84
  "expo-constants": {
@@ -79,25 +87,20 @@
79
87
  "expo-linking": {
80
88
  "optional": true
81
89
  },
90
+ "expo-network": {
91
+ "optional": true
92
+ },
82
93
  "expo-web-browser": {
83
94
  "optional": true
84
95
  }
85
96
  },
86
- "dependencies": {
87
- "@better-fetch/fetch": "1.1.21",
88
- "better-call": "1.1.8",
89
- "zod": "^4.1.12"
90
- },
91
- "files": [
92
- "dist"
93
- ],
94
97
  "scripts": {
95
- "test": "vitest",
96
- "coverage": "vitest run --coverage --coverage.provider=istanbul",
97
- "lint:types": "attw --profile esm-only --pack .",
98
- "lint:package": "publint run --strict",
99
98
  "build": "tsdown",
100
99
  "dev": "tsdown --watch",
101
- "typecheck": "tsc --project tsconfig.json"
100
+ "lint:package": "publint run --strict",
101
+ "lint:types": "attw --profile esm-only --pack .",
102
+ "typecheck": "tsc --project tsconfig.json",
103
+ "test": "vitest",
104
+ "coverage": "vitest run --coverage --coverage.provider=istanbul"
102
105
  }
103
106
  }