@better-auth/sso 1.4.0-beta.19 → 1.4.0-beta.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1,5 @@
1
1
 
2
- > @better-auth/sso@1.4.0-beta.19 build /home/runner/work/better-auth/better-auth/packages/sso
2
+ > @better-auth/sso@1.4.0-beta.20 build /home/runner/work/better-auth/better-auth/packages/sso
3
3
  > tsdown
4
4
 
5
5
  ℹ tsdown v0.16.0 powered by rolldown v1.0.0-beta.46
@@ -9,9 +9,9 @@
9
9
  ℹ Build start
10
10
  ℹ dist/client.mjs  0.18 kB │ gzip: 0.16 kB
11
11
  ℹ dist/index.mjs  0.06 kB │ gzip: 0.07 kB
12
- ℹ dist/src-D0TWWO55.mjs 49.60 kB │ gzip: 8.54 kB
13
- ℹ dist/index.d.mts  0.24 kB │ gzip: 0.16 kB
12
+ ℹ dist/src-BUIX9n33.mjs 47.23 kB │ gzip: 8.48 kB
14
13
  ℹ dist/client.d.mts  0.21 kB │ gzip: 0.18 kB
15
- ℹ dist/index-D8XmWYZn.d.mts 22.51 kB │ gzip: 3.39 kB
16
- ℹ 6 files, total: 72.81 kB
17
- ✔ Build complete in 11314ms
14
+ ℹ dist/index.d.mts  0.15 kB │ gzip: 0.12 kB
15
+ ℹ dist/index-Ba2niv2R.d.mts 20.57 kB │ gzip: 3.36 kB
16
+ ℹ 6 files, total: 68.40 kB
17
+ ✔ Build complete in 11356ms
package/dist/client.d.mts CHANGED
@@ -1,4 +1,4 @@
1
- import { s as sso } from "./index-D8XmWYZn.mjs";
1
+ import { t as sso } from "./index-Ba2niv2R.mjs";
2
2
 
3
3
  //#region src/client.d.ts
4
4
  declare const ssoClient: () => {
package/dist/client.mjs CHANGED
@@ -1,4 +1,4 @@
1
- import "./src-D0TWWO55.mjs";
1
+ import "./src-BUIX9n33.mjs";
2
2
 
3
3
  //#region src/client.ts
4
4
  const ssoClient = () => {
@@ -0,0 +1,669 @@
1
+ import { OAuth2Tokens, User } from "better-auth";
2
+ import * as z from "zod/v4";
3
+ import * as better_call0 from "better-call";
4
+
5
+ //#region src/types.d.ts
6
+ interface OIDCMapping {
7
+ id?: string | undefined;
8
+ email?: string | undefined;
9
+ emailVerified?: string | undefined;
10
+ name?: string | undefined;
11
+ image?: string | undefined;
12
+ extraFields?: Record<string, string> | undefined;
13
+ }
14
+ interface SAMLMapping {
15
+ id?: string | undefined;
16
+ email?: string | undefined;
17
+ emailVerified?: string | undefined;
18
+ name?: string | undefined;
19
+ firstName?: string | undefined;
20
+ lastName?: string | undefined;
21
+ extraFields?: Record<string, string> | undefined;
22
+ }
23
+ interface OIDCConfig {
24
+ issuer: string;
25
+ pkce: boolean;
26
+ clientId: string;
27
+ clientSecret: string;
28
+ authorizationEndpoint?: string | undefined;
29
+ discoveryEndpoint: string;
30
+ userInfoEndpoint?: string | undefined;
31
+ scopes?: string[] | undefined;
32
+ overrideUserInfo?: boolean | undefined;
33
+ tokenEndpoint?: string | undefined;
34
+ tokenEndpointAuthentication?: ("client_secret_post" | "client_secret_basic") | undefined;
35
+ jwksEndpoint?: string | undefined;
36
+ mapping?: OIDCMapping | undefined;
37
+ }
38
+ interface SAMLConfig {
39
+ issuer: string;
40
+ entryPoint: string;
41
+ cert: string;
42
+ callbackUrl: string;
43
+ audience?: string | undefined;
44
+ idpMetadata?: {
45
+ metadata?: string;
46
+ entityID?: string;
47
+ entityURL?: string;
48
+ redirectURL?: string;
49
+ cert?: string;
50
+ privateKey?: string;
51
+ privateKeyPass?: string;
52
+ isAssertionEncrypted?: boolean;
53
+ encPrivateKey?: string;
54
+ encPrivateKeyPass?: string;
55
+ singleSignOnService?: Array<{
56
+ Binding: string;
57
+ Location: string;
58
+ }>;
59
+ } | undefined;
60
+ spMetadata: {
61
+ metadata?: string | undefined;
62
+ entityID?: string | undefined;
63
+ binding?: string | undefined;
64
+ privateKey?: string | undefined;
65
+ privateKeyPass?: string | undefined;
66
+ isAssertionEncrypted?: boolean | undefined;
67
+ encPrivateKey?: string | undefined;
68
+ encPrivateKeyPass?: string | undefined;
69
+ };
70
+ wantAssertionsSigned?: boolean | undefined;
71
+ signatureAlgorithm?: string | undefined;
72
+ digestAlgorithm?: string | undefined;
73
+ identifierFormat?: string | undefined;
74
+ privateKey?: string | undefined;
75
+ decryptionPvk?: string | undefined;
76
+ additionalParams?: Record<string, any> | undefined;
77
+ mapping?: SAMLMapping | undefined;
78
+ }
79
+ type SSOProvider = {
80
+ issuer: string;
81
+ oidcConfig?: OIDCConfig | undefined;
82
+ samlConfig?: SAMLConfig | undefined;
83
+ userId: string;
84
+ providerId: string;
85
+ organizationId?: string | undefined;
86
+ domain: string;
87
+ };
88
+ interface SSOOptions {
89
+ /**
90
+ * custom function to provision a user when they sign in with an SSO provider.
91
+ */
92
+ provisionUser?: ((data: {
93
+ /**
94
+ * The user object from the database
95
+ */
96
+ user: User & Record<string, any>;
97
+ /**
98
+ * The user info object from the provider
99
+ */
100
+ userInfo: Record<string, any>;
101
+ /**
102
+ * The OAuth2 tokens from the provider
103
+ */
104
+ token?: OAuth2Tokens;
105
+ /**
106
+ * The SSO provider
107
+ */
108
+ provider: SSOProvider;
109
+ }) => Promise<void>) | undefined;
110
+ /**
111
+ * Organization provisioning options
112
+ */
113
+ organizationProvisioning?: {
114
+ disabled?: boolean;
115
+ defaultRole?: "member" | "admin";
116
+ getRole?: (data: {
117
+ /**
118
+ * The user object from the database
119
+ */
120
+ user: User & Record<string, any>;
121
+ /**
122
+ * The user info object from the provider
123
+ */
124
+ userInfo: Record<string, any>;
125
+ /**
126
+ * The OAuth2 tokens from the provider
127
+ */
128
+ token?: OAuth2Tokens;
129
+ /**
130
+ * The SSO provider
131
+ */
132
+ provider: SSOProvider;
133
+ }) => Promise<"member" | "admin">;
134
+ } | undefined;
135
+ /**
136
+ * Default SSO provider configurations for testing.
137
+ * These will take the precedence over the database providers.
138
+ */
139
+ defaultSSO?: Array<{
140
+ /**
141
+ * The domain to match for this default provider.
142
+ * This is only used to match incoming requests to this default provider.
143
+ */
144
+ domain: string;
145
+ /**
146
+ * The provider ID to use
147
+ */
148
+ providerId: string;
149
+ /**
150
+ * SAML configuration
151
+ */
152
+ samlConfig?: SAMLConfig;
153
+ /**
154
+ * OIDC configuration
155
+ */
156
+ oidcConfig?: OIDCConfig;
157
+ }> | undefined;
158
+ /**
159
+ * Override user info with the provider info.
160
+ * @default false
161
+ */
162
+ defaultOverrideUserInfo?: boolean | undefined;
163
+ /**
164
+ * Disable implicit sign up for new users. When set to true for the provider,
165
+ * sign-in need to be called with with requestSignUp as true to create new users.
166
+ */
167
+ disableImplicitSignUp?: boolean | undefined;
168
+ /**
169
+ * Configure the maximum number of SSO providers a user can register.
170
+ * You can also pass a function that returns a number.
171
+ * Set to 0 to disable SSO provider registration.
172
+ *
173
+ * @example
174
+ * ```ts
175
+ * providersLimit: async (user) => {
176
+ * const plan = await getUserPlan(user);
177
+ * return plan.name === "pro" ? 10 : 1;
178
+ * }
179
+ * ```
180
+ * @default 10
181
+ */
182
+ providersLimit?: (number | ((user: User) => Promise<number> | number)) | undefined;
183
+ /**
184
+ * Trust the email verified flag from the provider.
185
+ *
186
+ * ⚠️ Use this with caution — it can lead to account takeover if misused. Only enable it if users **cannot freely register new providers**. You can
187
+ * prevent that by using `disabledPaths` or other safeguards to block provider registration from the client.
188
+ *
189
+ * If you want to allow account linking for specific trusted providers, enable the `accountLinking` option in your auth config and specify those
190
+ * providers in the `trustedProviders` list.
191
+ * @default false
192
+ */
193
+ trustEmailVerified?: boolean | undefined;
194
+ }
195
+ //#endregion
196
+ //#region src/routes/sso.d.ts
197
+ declare const spMetadata: () => better_call0.StrictEndpoint<"/sso/saml2/sp/metadata", {
198
+ method: "GET";
199
+ query: z.ZodObject<{
200
+ providerId: z.ZodString;
201
+ format: z.ZodDefault<z.ZodEnum<{
202
+ xml: "xml";
203
+ json: "json";
204
+ }>>;
205
+ }, z.core.$strip>;
206
+ metadata: {
207
+ openapi: {
208
+ summary: string;
209
+ description: string;
210
+ responses: {
211
+ "200": {
212
+ description: string;
213
+ };
214
+ };
215
+ };
216
+ };
217
+ } & {
218
+ use: any[];
219
+ }, Response>;
220
+ declare const registerSSOProvider: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sso/register", {
221
+ method: "POST";
222
+ body: z.ZodObject<{
223
+ providerId: z.ZodString;
224
+ issuer: z.ZodString;
225
+ domain: z.ZodString;
226
+ oidcConfig: z.ZodOptional<z.ZodObject<{
227
+ clientId: z.ZodString;
228
+ clientSecret: z.ZodString;
229
+ authorizationEndpoint: z.ZodOptional<z.ZodString>;
230
+ tokenEndpoint: z.ZodOptional<z.ZodString>;
231
+ userInfoEndpoint: z.ZodOptional<z.ZodString>;
232
+ tokenEndpointAuthentication: z.ZodOptional<z.ZodEnum<{
233
+ client_secret_post: "client_secret_post";
234
+ client_secret_basic: "client_secret_basic";
235
+ }>>;
236
+ jwksEndpoint: z.ZodOptional<z.ZodString>;
237
+ discoveryEndpoint: z.ZodOptional<z.ZodString>;
238
+ scopes: z.ZodOptional<z.ZodArray<z.ZodString>>;
239
+ pkce: z.ZodOptional<z.ZodDefault<z.ZodBoolean>>;
240
+ mapping: z.ZodOptional<z.ZodObject<{
241
+ id: z.ZodString;
242
+ email: z.ZodString;
243
+ emailVerified: z.ZodOptional<z.ZodString>;
244
+ name: z.ZodString;
245
+ image: z.ZodOptional<z.ZodString>;
246
+ extraFields: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodAny>>;
247
+ }, z.core.$strip>>;
248
+ }, z.core.$strip>>;
249
+ samlConfig: z.ZodOptional<z.ZodObject<{
250
+ entryPoint: z.ZodString;
251
+ cert: z.ZodString;
252
+ callbackUrl: z.ZodString;
253
+ audience: z.ZodOptional<z.ZodString>;
254
+ idpMetadata: z.ZodOptional<z.ZodObject<{
255
+ metadata: z.ZodOptional<z.ZodString>;
256
+ entityID: z.ZodOptional<z.ZodString>;
257
+ cert: z.ZodOptional<z.ZodString>;
258
+ privateKey: z.ZodOptional<z.ZodString>;
259
+ privateKeyPass: z.ZodOptional<z.ZodString>;
260
+ isAssertionEncrypted: z.ZodOptional<z.ZodBoolean>;
261
+ encPrivateKey: z.ZodOptional<z.ZodString>;
262
+ encPrivateKeyPass: z.ZodOptional<z.ZodString>;
263
+ singleSignOnService: z.ZodOptional<z.ZodArray<z.ZodObject<{
264
+ Binding: z.ZodString;
265
+ Location: z.ZodString;
266
+ }, z.core.$strip>>>;
267
+ }, z.core.$strip>>;
268
+ spMetadata: z.ZodObject<{
269
+ metadata: z.ZodOptional<z.ZodString>;
270
+ entityID: z.ZodOptional<z.ZodString>;
271
+ binding: z.ZodOptional<z.ZodString>;
272
+ privateKey: z.ZodOptional<z.ZodString>;
273
+ privateKeyPass: z.ZodOptional<z.ZodString>;
274
+ isAssertionEncrypted: z.ZodOptional<z.ZodBoolean>;
275
+ encPrivateKey: z.ZodOptional<z.ZodString>;
276
+ encPrivateKeyPass: z.ZodOptional<z.ZodString>;
277
+ }, z.core.$strip>;
278
+ wantAssertionsSigned: z.ZodOptional<z.ZodBoolean>;
279
+ signatureAlgorithm: z.ZodOptional<z.ZodString>;
280
+ digestAlgorithm: z.ZodOptional<z.ZodString>;
281
+ identifierFormat: z.ZodOptional<z.ZodString>;
282
+ privateKey: z.ZodOptional<z.ZodString>;
283
+ decryptionPvk: z.ZodOptional<z.ZodString>;
284
+ additionalParams: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodAny>>;
285
+ mapping: z.ZodOptional<z.ZodObject<{
286
+ id: z.ZodString;
287
+ email: z.ZodString;
288
+ emailVerified: z.ZodOptional<z.ZodString>;
289
+ name: z.ZodString;
290
+ firstName: z.ZodOptional<z.ZodString>;
291
+ lastName: z.ZodOptional<z.ZodString>;
292
+ extraFields: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodAny>>;
293
+ }, z.core.$strip>>;
294
+ }, z.core.$strip>>;
295
+ organizationId: z.ZodOptional<z.ZodString>;
296
+ overrideUserInfo: z.ZodOptional<z.ZodDefault<z.ZodBoolean>>;
297
+ }, z.core.$strip>;
298
+ use: ((inputContext: better_call0.MiddlewareInputContext<better_call0.MiddlewareOptions>) => Promise<{
299
+ session: {
300
+ session: Record<string, any> & {
301
+ id: string;
302
+ createdAt: Date;
303
+ updatedAt: Date;
304
+ userId: string;
305
+ expiresAt: Date;
306
+ token: string;
307
+ ipAddress?: string | null | undefined;
308
+ userAgent?: string | null | undefined;
309
+ };
310
+ user: Record<string, any> & {
311
+ id: string;
312
+ createdAt: Date;
313
+ updatedAt: Date;
314
+ email: string;
315
+ emailVerified: boolean;
316
+ name: string;
317
+ image?: string | null | undefined;
318
+ };
319
+ };
320
+ }>)[];
321
+ metadata: {
322
+ openapi: {
323
+ summary: string;
324
+ description: string;
325
+ responses: {
326
+ "200": {
327
+ description: string;
328
+ content: {
329
+ "application/json": {
330
+ schema: {
331
+ type: "object";
332
+ properties: {
333
+ issuer: {
334
+ type: string;
335
+ format: string;
336
+ description: string;
337
+ };
338
+ domain: {
339
+ type: string;
340
+ description: string;
341
+ };
342
+ oidcConfig: {
343
+ type: string;
344
+ properties: {
345
+ issuer: {
346
+ type: string;
347
+ format: string;
348
+ description: string;
349
+ };
350
+ pkce: {
351
+ type: string;
352
+ description: string;
353
+ };
354
+ clientId: {
355
+ type: string;
356
+ description: string;
357
+ };
358
+ clientSecret: {
359
+ type: string;
360
+ description: string;
361
+ };
362
+ authorizationEndpoint: {
363
+ type: string;
364
+ format: string;
365
+ nullable: boolean;
366
+ description: string;
367
+ };
368
+ discoveryEndpoint: {
369
+ type: string;
370
+ format: string;
371
+ description: string;
372
+ };
373
+ userInfoEndpoint: {
374
+ type: string;
375
+ format: string;
376
+ nullable: boolean;
377
+ description: string;
378
+ };
379
+ scopes: {
380
+ type: string;
381
+ items: {
382
+ type: string;
383
+ };
384
+ nullable: boolean;
385
+ description: string;
386
+ };
387
+ tokenEndpoint: {
388
+ type: string;
389
+ format: string;
390
+ nullable: boolean;
391
+ description: string;
392
+ };
393
+ tokenEndpointAuthentication: {
394
+ type: string;
395
+ enum: string[];
396
+ nullable: boolean;
397
+ description: string;
398
+ };
399
+ jwksEndpoint: {
400
+ type: string;
401
+ format: string;
402
+ nullable: boolean;
403
+ description: string;
404
+ };
405
+ mapping: {
406
+ type: string;
407
+ nullable: boolean;
408
+ properties: {
409
+ id: {
410
+ type: string;
411
+ description: string;
412
+ };
413
+ email: {
414
+ type: string;
415
+ description: string;
416
+ };
417
+ emailVerified: {
418
+ type: string;
419
+ nullable: boolean;
420
+ description: string;
421
+ };
422
+ name: {
423
+ type: string;
424
+ description: string;
425
+ };
426
+ image: {
427
+ type: string;
428
+ nullable: boolean;
429
+ description: string;
430
+ };
431
+ extraFields: {
432
+ type: string;
433
+ additionalProperties: {
434
+ type: string;
435
+ };
436
+ nullable: boolean;
437
+ description: string;
438
+ };
439
+ };
440
+ required: string[];
441
+ };
442
+ };
443
+ required: string[];
444
+ description: string;
445
+ };
446
+ organizationId: {
447
+ type: string;
448
+ nullable: boolean;
449
+ description: string;
450
+ };
451
+ userId: {
452
+ type: string;
453
+ description: string;
454
+ };
455
+ providerId: {
456
+ type: string;
457
+ description: string;
458
+ };
459
+ redirectURI: {
460
+ type: string;
461
+ format: string;
462
+ description: string;
463
+ };
464
+ };
465
+ required: string[];
466
+ };
467
+ };
468
+ };
469
+ };
470
+ };
471
+ };
472
+ };
473
+ } & {
474
+ use: any[];
475
+ }, {
476
+ oidcConfig: OIDCConfig;
477
+ samlConfig: SAMLConfig;
478
+ redirectURI: string;
479
+ issuer: string;
480
+ userId: string;
481
+ providerId: string;
482
+ organizationId?: string | undefined;
483
+ domain: string;
484
+ }>;
485
+ declare const signInSSO: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sign-in/sso", {
486
+ method: "POST";
487
+ body: z.ZodObject<{
488
+ email: z.ZodOptional<z.ZodString>;
489
+ organizationSlug: z.ZodOptional<z.ZodString>;
490
+ providerId: z.ZodOptional<z.ZodString>;
491
+ domain: z.ZodOptional<z.ZodString>;
492
+ callbackURL: z.ZodString;
493
+ errorCallbackURL: z.ZodOptional<z.ZodString>;
494
+ newUserCallbackURL: z.ZodOptional<z.ZodString>;
495
+ scopes: z.ZodOptional<z.ZodArray<z.ZodString>>;
496
+ loginHint: z.ZodOptional<z.ZodString>;
497
+ requestSignUp: z.ZodOptional<z.ZodBoolean>;
498
+ providerType: z.ZodOptional<z.ZodEnum<{
499
+ oidc: "oidc";
500
+ saml: "saml";
501
+ }>>;
502
+ }, z.core.$strip>;
503
+ metadata: {
504
+ openapi: {
505
+ summary: string;
506
+ description: string;
507
+ requestBody: {
508
+ content: {
509
+ "application/json": {
510
+ schema: {
511
+ type: "object";
512
+ properties: {
513
+ email: {
514
+ type: string;
515
+ description: string;
516
+ };
517
+ issuer: {
518
+ type: string;
519
+ description: string;
520
+ };
521
+ providerId: {
522
+ type: string;
523
+ description: string;
524
+ };
525
+ callbackURL: {
526
+ type: string;
527
+ description: string;
528
+ };
529
+ errorCallbackURL: {
530
+ type: string;
531
+ description: string;
532
+ };
533
+ newUserCallbackURL: {
534
+ type: string;
535
+ description: string;
536
+ };
537
+ loginHint: {
538
+ type: string;
539
+ description: string;
540
+ };
541
+ };
542
+ required: string[];
543
+ };
544
+ };
545
+ };
546
+ };
547
+ responses: {
548
+ "200": {
549
+ description: string;
550
+ content: {
551
+ "application/json": {
552
+ schema: {
553
+ type: "object";
554
+ properties: {
555
+ url: {
556
+ type: string;
557
+ format: string;
558
+ description: string;
559
+ };
560
+ redirect: {
561
+ type: string;
562
+ description: string;
563
+ enum: boolean[];
564
+ };
565
+ };
566
+ required: string[];
567
+ };
568
+ };
569
+ };
570
+ };
571
+ };
572
+ };
573
+ };
574
+ } & {
575
+ use: any[];
576
+ }, {
577
+ url: string;
578
+ redirect: boolean;
579
+ }>;
580
+ declare const callbackSSO: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sso/callback/:providerId", {
581
+ method: "GET";
582
+ query: z.ZodObject<{
583
+ code: z.ZodOptional<z.ZodString>;
584
+ state: z.ZodString;
585
+ error: z.ZodOptional<z.ZodString>;
586
+ error_description: z.ZodOptional<z.ZodString>;
587
+ }, z.core.$strip>;
588
+ metadata: {
589
+ isAction: boolean;
590
+ openapi: {
591
+ summary: string;
592
+ description: string;
593
+ responses: {
594
+ "302": {
595
+ description: string;
596
+ };
597
+ };
598
+ };
599
+ };
600
+ } & {
601
+ use: any[];
602
+ }, never>;
603
+ declare const callbackSSOSAML: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sso/saml2/callback/:providerId", {
604
+ method: "POST";
605
+ body: z.ZodObject<{
606
+ SAMLResponse: z.ZodString;
607
+ RelayState: z.ZodOptional<z.ZodString>;
608
+ }, z.core.$strip>;
609
+ metadata: {
610
+ isAction: boolean;
611
+ openapi: {
612
+ summary: string;
613
+ description: string;
614
+ responses: {
615
+ "302": {
616
+ description: string;
617
+ };
618
+ "400": {
619
+ description: string;
620
+ };
621
+ "401": {
622
+ description: string;
623
+ };
624
+ };
625
+ };
626
+ };
627
+ } & {
628
+ use: any[];
629
+ }, never>;
630
+ declare const acsEndpoint: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sso/saml2/sp/acs/:providerId", {
631
+ method: "POST";
632
+ params: z.ZodObject<{
633
+ providerId: z.ZodOptional<z.ZodString>;
634
+ }, z.core.$strip>;
635
+ body: z.ZodObject<{
636
+ SAMLResponse: z.ZodString;
637
+ RelayState: z.ZodOptional<z.ZodString>;
638
+ }, z.core.$strip>;
639
+ metadata: {
640
+ isAction: boolean;
641
+ openapi: {
642
+ summary: string;
643
+ description: string;
644
+ responses: {
645
+ "302": {
646
+ description: string;
647
+ };
648
+ };
649
+ };
650
+ };
651
+ } & {
652
+ use: any[];
653
+ }, never>;
654
+ //#endregion
655
+ //#region src/index.d.ts
656
+ type SSOEndpoints = {
657
+ spMetadata: ReturnType<typeof spMetadata>;
658
+ registerSSOProvider: ReturnType<typeof registerSSOProvider>;
659
+ signInSSO: ReturnType<typeof signInSSO>;
660
+ callbackSSO: ReturnType<typeof callbackSSO>;
661
+ callbackSSOSAML: ReturnType<typeof callbackSSOSAML>;
662
+ acsEndpoint: ReturnType<typeof acsEndpoint>;
663
+ };
664
+ declare function sso<O extends SSOOptions>(options?: O | undefined): {
665
+ id: "sso";
666
+ endpoints: SSOEndpoints;
667
+ };
668
+ //#endregion
669
+ export { SSOOptions as i, OIDCConfig as n, SAMLConfig as r, sso as t };
package/dist/index.d.mts CHANGED
@@ -1,2 +1,2 @@
1
- import { a as SSOOptions, i as SAMLMapping, n as OIDCMapping, o as SSOProvider, r as SAMLConfig, s as sso, t as OIDCConfig } from "./index-D8XmWYZn.mjs";
2
- export { OIDCConfig, OIDCMapping, SAMLConfig, SAMLMapping, SSOOptions, SSOProvider, sso };
1
+ import { i as SSOOptions, n as OIDCConfig, r as SAMLConfig, t as sso } from "./index-Ba2niv2R.mjs";
2
+ export { OIDCConfig, SAMLConfig, SSOOptions, sso };