@better-auth/sso 1.4.11-beta.1 → 1.4.11-beta.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1,5 @@
1
1
 
2
- > @better-auth/sso@1.4.11-beta.1 build /home/runner/work/better-auth/better-auth/packages/sso
2
+ > @better-auth/sso@1.4.11-beta.2 build /home/runner/work/better-auth/better-auth/packages/sso
3
3
  > tsdown
4
4
 
5
5
  ℹ tsdown v0.17.2 powered by rolldown v1.0.0-beta.53
@@ -11,6 +11,6 @@
11
11
  ℹ dist/client.mjs  0.15 kB │ gzip: 0.14 kB
12
12
  ℹ dist/index.d.mts  1.67 kB │ gzip: 0.57 kB
13
13
  ℹ dist/client.d.mts  0.49 kB │ gzip: 0.30 kB
14
- ℹ dist/index-D4Ey-vkQ.d.mts 44.21 kB │ gzip: 9.10 kB
14
+ ℹ dist/index-BJqo8KP7.d.mts 44.21 kB │ gzip: 9.10 kB
15
15
  ℹ 5 files, total: 146.05 kB
16
- ✔ Build complete in 23049ms
16
+ ✔ Build complete in 15932ms
package/dist/client.d.mts CHANGED
@@ -1,4 +1,4 @@
1
- import { t as SSOPlugin } from "./index-D4Ey-vkQ.mjs";
1
+ import { t as SSOPlugin } from "./index-BJqo8KP7.mjs";
2
2
 
3
3
  //#region src/client.d.ts
4
4
  interface SSOClientOptions {
@@ -2,7 +2,7 @@ import { APIError } from "better-auth/api";
2
2
  import * as z$1 from "zod/v4";
3
3
  import z from "zod/v4";
4
4
  import { Awaitable, OAuth2Tokens, User } from "better-auth";
5
- import * as better_call0 from "better-call";
5
+ import * as better_call7 from "better-call";
6
6
 
7
7
  //#region src/saml/algorithms.d.ts
8
8
  declare const SignatureAlgorithm: {
@@ -383,7 +383,7 @@ interface SSOOptions {
383
383
  }
384
384
  //#endregion
385
385
  //#region src/routes/domain-verification.d.ts
386
- declare const requestDomainVerification: (options: SSOOptions) => better_call0.StrictEndpoint<"/sso/request-domain-verification", {
386
+ declare const requestDomainVerification: (options: SSOOptions) => better_call7.StrictEndpoint<"/sso/request-domain-verification", {
387
387
  method: "POST";
388
388
  body: z$1.ZodObject<{
389
389
  providerId: z$1.ZodString;
@@ -405,7 +405,7 @@ declare const requestDomainVerification: (options: SSOOptions) => better_call0.S
405
405
  };
406
406
  };
407
407
  };
408
- use: ((inputContext: better_call0.MiddlewareInputContext<better_call0.MiddlewareOptions>) => Promise<{
408
+ use: ((inputContext: better_call7.MiddlewareInputContext<better_call7.MiddlewareOptions>) => Promise<{
409
409
  session: {
410
410
  session: Record<string, any> & {
411
411
  id: string;
@@ -431,7 +431,7 @@ declare const requestDomainVerification: (options: SSOOptions) => better_call0.S
431
431
  }, {
432
432
  domainVerificationToken: string;
433
433
  }>;
434
- declare const verifyDomain: (options: SSOOptions) => better_call0.StrictEndpoint<"/sso/verify-domain", {
434
+ declare const verifyDomain: (options: SSOOptions) => better_call7.StrictEndpoint<"/sso/verify-domain", {
435
435
  method: "POST";
436
436
  body: z$1.ZodObject<{
437
437
  providerId: z$1.ZodString;
@@ -456,7 +456,7 @@ declare const verifyDomain: (options: SSOOptions) => better_call0.StrictEndpoint
456
456
  };
457
457
  };
458
458
  };
459
- use: ((inputContext: better_call0.MiddlewareInputContext<better_call0.MiddlewareOptions>) => Promise<{
459
+ use: ((inputContext: better_call7.MiddlewareInputContext<better_call7.MiddlewareOptions>) => Promise<{
460
460
  session: {
461
461
  session: Record<string, any> & {
462
462
  id: string;
@@ -500,7 +500,7 @@ interface SAMLConditions {
500
500
  * @throws {APIError} If timestamps are invalid, expired, or not yet valid
501
501
  */
502
502
  declare function validateSAMLTimestamp(conditions: SAMLConditions | undefined, options?: TimestampValidationOptions): void;
503
- declare const spMetadata: () => better_call0.StrictEndpoint<"/sso/saml2/sp/metadata", {
503
+ declare const spMetadata: () => better_call7.StrictEndpoint<"/sso/saml2/sp/metadata", {
504
504
  method: "GET";
505
505
  query: z.ZodObject<{
506
506
  providerId: z.ZodString;
@@ -522,7 +522,7 @@ declare const spMetadata: () => better_call0.StrictEndpoint<"/sso/saml2/sp/metad
522
522
  };
523
523
  };
524
524
  }, Response>;
525
- declare const registerSSOProvider: <O extends SSOOptions>(options: O) => better_call0.StrictEndpoint<"/sso/register", {
525
+ declare const registerSSOProvider: <O extends SSOOptions>(options: O) => better_call7.StrictEndpoint<"/sso/register", {
526
526
  method: "POST";
527
527
  body: z.ZodObject<{
528
528
  providerId: z.ZodString;
@@ -601,7 +601,7 @@ declare const registerSSOProvider: <O extends SSOOptions>(options: O) => better_
601
601
  organizationId: z.ZodOptional<z.ZodString>;
602
602
  overrideUserInfo: z.ZodOptional<z.ZodDefault<z.ZodBoolean>>;
603
603
  }, z.core.$strip>;
604
- use: ((inputContext: better_call0.MiddlewareInputContext<better_call0.MiddlewareOptions>) => Promise<{
604
+ use: ((inputContext: better_call7.MiddlewareInputContext<better_call7.MiddlewareOptions>) => Promise<{
605
605
  session: {
606
606
  session: Record<string, any> & {
607
607
  id: string;
@@ -799,7 +799,7 @@ declare const registerSSOProvider: <O extends SSOOptions>(options: O) => better_
799
799
  oidcConfig: OIDCConfig | null;
800
800
  samlConfig: SAMLConfig | null;
801
801
  } & Omit<SSOProvider<O>, "oidcConfig" | "samlConfig">>;
802
- declare const signInSSO: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sign-in/sso", {
802
+ declare const signInSSO: (options?: SSOOptions) => better_call7.StrictEndpoint<"/sign-in/sso", {
803
803
  method: "POST";
804
804
  body: z.ZodObject<{
805
805
  email: z.ZodOptional<z.ZodString>;
@@ -893,7 +893,7 @@ declare const signInSSO: (options?: SSOOptions) => better_call0.StrictEndpoint<"
893
893
  url: string;
894
894
  redirect: boolean;
895
895
  }>;
896
- declare const callbackSSO: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sso/callback/:providerId", {
896
+ declare const callbackSSO: (options?: SSOOptions) => better_call7.StrictEndpoint<"/sso/callback/:providerId", {
897
897
  method: "GET";
898
898
  query: z.ZodObject<{
899
899
  code: z.ZodOptional<z.ZodString>;
@@ -916,7 +916,7 @@ declare const callbackSSO: (options?: SSOOptions) => better_call0.StrictEndpoint
916
916
  scope: "server";
917
917
  };
918
918
  }, never>;
919
- declare const callbackSSOSAML: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sso/saml2/callback/:providerId", {
919
+ declare const callbackSSOSAML: (options?: SSOOptions) => better_call7.StrictEndpoint<"/sso/saml2/callback/:providerId", {
920
920
  method: "POST";
921
921
  body: z.ZodObject<{
922
922
  SAMLResponse: z.ZodString;
@@ -943,7 +943,7 @@ declare const callbackSSOSAML: (options?: SSOOptions) => better_call0.StrictEndp
943
943
  scope: "server";
944
944
  };
945
945
  }, never>;
946
- declare const acsEndpoint: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sso/saml2/sp/acs/:providerId", {
946
+ declare const acsEndpoint: (options?: SSOOptions) => better_call7.StrictEndpoint<"/sso/saml2/sp/acs/:providerId", {
947
947
  method: "POST";
948
948
  params: z.ZodObject<{
949
949
  providerId: z.ZodOptional<z.ZodString>;
package/dist/index.d.mts CHANGED
@@ -1,2 +1,2 @@
1
- import { A as DataEncryptionAlgorithm, C as TimestampValidationOptions, D as SSOOptions, E as SAMLConfig, M as DigestAlgorithm, N as KeyEncryptionAlgorithm, O as SSOProvider, P as SignatureAlgorithm, S as SAMLConditions, T as OIDCConfig, _ as REQUIRED_DISCOVERY_FIELDS, a as fetchDiscoveryDocument, b as DEFAULT_MAX_SAML_METADATA_SIZE, c as normalizeUrl, d as validateDiscoveryUrl, f as DiscoverOIDCConfigParams, g as OIDCDiscoveryDocument, h as HydratedOIDCConfig, i as discoverOIDCConfig, j as DeprecatedAlgorithmBehavior, k as AlgorithmValidationOptions, l as selectTokenEndpointAuthMethod, m as DiscoveryErrorCode, n as sso, o as needsRuntimeDiscovery, p as DiscoveryError, r as computeDiscoveryUrl, s as normalizeDiscoveryUrls, t as SSOPlugin, u as validateDiscoveryDocument, v as RequiredDiscoveryField, w as validateSAMLTimestamp, x as DEFAULT_MAX_SAML_RESPONSE_SIZE, y as DEFAULT_CLOCK_SKEW_MS } from "./index-D4Ey-vkQ.mjs";
1
+ import { A as DataEncryptionAlgorithm, C as TimestampValidationOptions, D as SSOOptions, E as SAMLConfig, M as DigestAlgorithm, N as KeyEncryptionAlgorithm, O as SSOProvider, P as SignatureAlgorithm, S as SAMLConditions, T as OIDCConfig, _ as REQUIRED_DISCOVERY_FIELDS, a as fetchDiscoveryDocument, b as DEFAULT_MAX_SAML_METADATA_SIZE, c as normalizeUrl, d as validateDiscoveryUrl, f as DiscoverOIDCConfigParams, g as OIDCDiscoveryDocument, h as HydratedOIDCConfig, i as discoverOIDCConfig, j as DeprecatedAlgorithmBehavior, k as AlgorithmValidationOptions, l as selectTokenEndpointAuthMethod, m as DiscoveryErrorCode, n as sso, o as needsRuntimeDiscovery, p as DiscoveryError, r as computeDiscoveryUrl, s as normalizeDiscoveryUrls, t as SSOPlugin, u as validateDiscoveryDocument, v as RequiredDiscoveryField, w as validateSAMLTimestamp, x as DEFAULT_MAX_SAML_RESPONSE_SIZE, y as DEFAULT_CLOCK_SKEW_MS } from "./index-BJqo8KP7.mjs";
2
2
  export { AlgorithmValidationOptions, DEFAULT_CLOCK_SKEW_MS, DEFAULT_MAX_SAML_METADATA_SIZE, DEFAULT_MAX_SAML_RESPONSE_SIZE, DataEncryptionAlgorithm, DeprecatedAlgorithmBehavior, DigestAlgorithm, DiscoverOIDCConfigParams, DiscoveryError, DiscoveryErrorCode, HydratedOIDCConfig, KeyEncryptionAlgorithm, OIDCConfig, OIDCDiscoveryDocument, REQUIRED_DISCOVERY_FIELDS, RequiredDiscoveryField, SAMLConditions, SAMLConfig, SSOOptions, SSOPlugin, SSOProvider, SignatureAlgorithm, TimestampValidationOptions, computeDiscoveryUrl, discoverOIDCConfig, fetchDiscoveryDocument, needsRuntimeDiscovery, normalizeDiscoveryUrls, normalizeUrl, selectTokenEndpointAuthMethod, sso, validateDiscoveryDocument, validateDiscoveryUrl, validateSAMLTimestamp };
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@better-auth/sso",
3
3
  "author": "Bereket Engida",
4
- "version": "1.4.11-beta.1",
4
+ "version": "1.4.11-beta.2",
5
5
  "type": "module",
6
6
  "main": "dist/index.mjs",
7
7
  "types": "dist/index.d.mts",
@@ -67,11 +67,11 @@
67
67
  "express": "^5.1.0",
68
68
  "oauth2-mock-server": "^8.2.0",
69
69
  "tsdown": "^0.17.2",
70
- "better-auth": "1.4.11-beta.1"
70
+ "better-auth": "1.4.11-beta.2"
71
71
  },
72
72
  "peerDependencies": {
73
73
  "@better-auth/utils": "0.3.0",
74
- "better-auth": "1.4.11-beta.1"
74
+ "better-auth": "1.4.11-beta.2"
75
75
  },
76
76
  "scripts": {
77
77
  "test": "vitest",