@better-auth/sso 1.4.17 → 1.5.0-beta.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,16 +1,20 @@
1
1
 
2
- > @better-auth/sso@1.4.17 build /home/runner/work/better-auth/better-auth/packages/sso
2
+ > @better-auth/sso@1.5.0-beta.10 build /home/runner/work/better-auth/better-auth/packages/sso
3
3
  > tsdown
4
4
 
5
- ℹ tsdown v0.17.2 powered by rolldown v1.0.0-beta.53
5
+ ℹ tsdown v0.20.1 powered by rolldown v1.0.0-rc.1
6
6
  ℹ config file: /home/runner/work/better-auth/better-auth/packages/sso/tsdown.config.ts
7
7
  ℹ entry: src/index.ts, src/client.ts
8
8
  ℹ tsconfig: tsconfig.json
9
9
  ℹ Build start
10
- ℹ dist/index.mjs 99.41 kB │ gzip: 19.47 kB
11
- ℹ dist/client.mjs  0.15 kB │ gzip: 0.14 kB
12
- ℹ dist/index.d.mts  1.67 kB │ gzip: 0.57 kB
13
- ℹ dist/client.d.mts  0.49 kB │ gzip: 0.30 kB
14
- ℹ dist/index-XUgmj4eH.d.mts 44.12 kB │ gzip: 9.09 kB
15
- ℹ 5 files, total: 145.84 kB
16
- ✔ Build complete in 18735ms
10
+ ℹ dist/index.mjs 120.85 kB │ gzip: 24.06 kB
11
+ ℹ dist/client.mjs  0.28 kB │ gzip: 0.21 kB
12
+ ℹ dist/index.mjs.map 244.11 kB │ gzip: 46.78 kB
13
+ ℹ dist/client.mjs.map  0.94 kB │ gzip: 0.50 kB
14
+ ℹ dist/index.d.mts  1.67 kB │ gzip: 0.57 kB
15
+ ℹ dist/client.d.mts  0.62 kB │ gzip: 0.36 kB
16
+ ℹ dist/index-CBBJTszO.d.mts  56.16 kB │ gzip: 9.96 kB
17
+ ℹ 7 files, total: 424.63 kB
18
+ [PLUGIN_TIMINGS] Warning: Your build spent significant time in plugin `rolldown-plugin-dts:generate`. See https://rolldown.rs/options/checks#plugintimings for more details.
19
+
20
+ ✔ Build complete in 26757ms
package/LICENSE.md CHANGED
@@ -1,17 +1,20 @@
1
1
  The MIT License (MIT)
2
2
  Copyright (c) 2024 - present, Bereket Engida
3
3
 
4
- Permission is hereby granted, free of charge, to any person obtaining a copy of this software
5
- and associated documentation files (the "Software"), to deal in the Software without restriction,
6
- including without limitation the rights to use, copy, modify, merge, publish, distribute,
7
- sublicense, and/or sell copies of the Software, and to permit persons to whom the Software
8
- is furnished to do so, subject to the following conditions:
4
+ Permission is hereby granted, free of charge, to any person obtaining a copy of
5
+ this software and associated documentation files (the Software), to deal in
6
+ the Software without restriction, including without limitation the rights to
7
+ use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
8
+ the Software, and to permit persons to whom the Software is furnished to do so,
9
+ subject to the following conditions:
9
10
 
10
- The above copyright notice and this permission notice shall be included in all copies or
11
- substantial portions of the Software.
11
+ The above copyright notice and this permission notice shall be included in all
12
+ copies or substantial portions of the Software.
12
13
 
13
- THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
14
- BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
15
- NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
16
- DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
17
- OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
14
+ THE SOFTWARE IS PROVIDED AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
16
+ FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
17
+ IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
18
+ DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
19
+ ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
20
+ DEALINGS IN THE SOFTWARE.
package/dist/client.d.mts CHANGED
@@ -1,4 +1,4 @@
1
- import { t as SSOPlugin } from "./index-XUgmj4eH.mjs";
1
+ import { t as SSOPlugin } from "./index-CBBJTszO.mjs";
2
2
 
3
3
  //#region src/client.d.ts
4
4
  interface SSOClientOptions {
@@ -15,6 +15,11 @@ declare const ssoClient: <CO extends SSOClientOptions>(options?: CO | undefined)
15
15
  } ? true : false;
16
16
  };
17
17
  }>;
18
+ pathMethods: {
19
+ "/sso/providers": "GET";
20
+ "/sso/providers/:providerId": "GET";
21
+ };
18
22
  };
19
23
  //#endregion
20
- export { ssoClient };
24
+ export { ssoClient };
25
+ //# sourceMappingURL=client.d.mts.map
package/dist/client.mjs CHANGED
@@ -2,9 +2,14 @@
2
2
  const ssoClient = (options) => {
3
3
  return {
4
4
  id: "sso-client",
5
- $InferServerPlugin: {}
5
+ $InferServerPlugin: {},
6
+ pathMethods: {
7
+ "/sso/providers": "GET",
8
+ "/sso/providers/:providerId": "GET"
9
+ }
6
10
  };
7
11
  };
8
12
 
9
13
  //#endregion
10
- export { ssoClient };
14
+ export { ssoClient };
15
+ //# sourceMappingURL=client.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"client.mjs","names":[],"sources":["../src/client.ts"],"sourcesContent":["import type { BetterAuthClientPlugin } from \"better-auth/client\";\nimport type { SSOPlugin } from \"./index\";\n\ninterface SSOClientOptions {\n\tdomainVerification?:\n\t\t| {\n\t\t\t\tenabled: boolean;\n\t\t }\n\t\t| undefined;\n}\n\nexport const ssoClient = <CO extends SSOClientOptions>(\n\toptions?: CO | undefined,\n) => {\n\treturn {\n\t\tid: \"sso-client\",\n\t\t$InferServerPlugin: {} as SSOPlugin<{\n\t\t\tdomainVerification: {\n\t\t\t\tenabled: CO[\"domainVerification\"] extends { enabled: true }\n\t\t\t\t\t? true\n\t\t\t\t\t: false;\n\t\t\t};\n\t\t}>,\n\t\tpathMethods: {\n\t\t\t\"/sso/providers\": \"GET\",\n\t\t\t\"/sso/providers/:providerId\": \"GET\",\n\t\t},\n\t} satisfies BetterAuthClientPlugin;\n};\n"],"mappings":";AAWA,MAAa,aACZ,YACI;AACJ,QAAO;EACN,IAAI;EACJ,oBAAoB,EAAE;EAOtB,aAAa;GACZ,kBAAkB;GAClB,8BAA8B;GAC9B;EACD"}
@@ -1,7 +1,7 @@
1
1
  import { APIError } from "better-auth/api";
2
2
  import * as z$1 from "zod/v4";
3
3
  import z from "zod/v4";
4
- import { Awaitable, OAuth2Tokens, User } from "better-auth";
4
+ import { Awaitable, BetterAuthPlugin, OAuth2Tokens, User } from "better-auth";
5
5
  import * as better_call0 from "better-call";
6
6
 
7
7
  //#region src/saml/algorithms.d.ts
@@ -109,6 +109,7 @@ interface SAMLConfig {
109
109
  encPrivateKeyPass?: string | undefined;
110
110
  };
111
111
  wantAssertionsSigned?: boolean | undefined;
112
+ authnRequestsSigned?: boolean | undefined;
112
113
  signatureAlgorithm?: string | undefined;
113
114
  digestAlgorithm?: string | undefined;
114
115
  identifierFormat?: string | undefined;
@@ -481,6 +482,377 @@ declare const verifyDomain: (options: SSOOptions) => better_call0.StrictEndpoint
481
482
  }>)[];
482
483
  }, void>;
483
484
  //#endregion
485
+ //#region src/routes/providers.d.ts
486
+ declare const listSSOProviders: () => better_call0.StrictEndpoint<"/sso/providers", {
487
+ method: "GET";
488
+ use: ((inputContext: better_call0.MiddlewareInputContext<better_call0.MiddlewareOptions>) => Promise<{
489
+ session: {
490
+ session: Record<string, any> & {
491
+ id: string;
492
+ createdAt: Date;
493
+ updatedAt: Date;
494
+ userId: string;
495
+ expiresAt: Date;
496
+ token: string;
497
+ ipAddress?: string | null | undefined;
498
+ userAgent?: string | null | undefined;
499
+ };
500
+ user: Record<string, any> & {
501
+ id: string;
502
+ createdAt: Date;
503
+ updatedAt: Date;
504
+ email: string;
505
+ emailVerified: boolean;
506
+ name: string;
507
+ image?: string | null | undefined;
508
+ };
509
+ };
510
+ }>)[];
511
+ metadata: {
512
+ openapi: {
513
+ operationId: string;
514
+ summary: string;
515
+ description: string;
516
+ responses: {
517
+ "200": {
518
+ description: string;
519
+ };
520
+ };
521
+ };
522
+ };
523
+ }, {
524
+ providers: {
525
+ providerId: string;
526
+ type: string;
527
+ issuer: string;
528
+ domain: string;
529
+ organizationId: string | null;
530
+ domainVerified: boolean;
531
+ oidcConfig: {
532
+ discoveryEndpoint: string;
533
+ clientIdLastFour: string;
534
+ pkce: boolean;
535
+ authorizationEndpoint: string | undefined;
536
+ tokenEndpoint: string | undefined;
537
+ userInfoEndpoint: string | undefined;
538
+ jwksEndpoint: string | undefined;
539
+ scopes: string[] | undefined;
540
+ tokenEndpointAuthentication: "client_secret_post" | "client_secret_basic" | undefined;
541
+ } | undefined;
542
+ samlConfig: {
543
+ entryPoint: string;
544
+ callbackUrl: string;
545
+ audience: string | undefined;
546
+ wantAssertionsSigned: boolean | undefined;
547
+ authnRequestsSigned: boolean | undefined;
548
+ identifierFormat: string | undefined;
549
+ signatureAlgorithm: string | undefined;
550
+ digestAlgorithm: string | undefined;
551
+ certificate: {
552
+ fingerprintSha256: string;
553
+ notBefore: string;
554
+ notAfter: string;
555
+ publicKeyAlgorithm: string;
556
+ } | {
557
+ error: string;
558
+ };
559
+ } | undefined;
560
+ spMetadataUrl: string;
561
+ }[];
562
+ }>;
563
+ declare const getSSOProvider: () => better_call0.StrictEndpoint<"/sso/providers/:providerId", {
564
+ method: "GET";
565
+ use: ((inputContext: better_call0.MiddlewareInputContext<better_call0.MiddlewareOptions>) => Promise<{
566
+ session: {
567
+ session: Record<string, any> & {
568
+ id: string;
569
+ createdAt: Date;
570
+ updatedAt: Date;
571
+ userId: string;
572
+ expiresAt: Date;
573
+ token: string;
574
+ ipAddress?: string | null | undefined;
575
+ userAgent?: string | null | undefined;
576
+ };
577
+ user: Record<string, any> & {
578
+ id: string;
579
+ createdAt: Date;
580
+ updatedAt: Date;
581
+ email: string;
582
+ emailVerified: boolean;
583
+ name: string;
584
+ image?: string | null | undefined;
585
+ };
586
+ };
587
+ }>)[];
588
+ params: z.ZodObject<{
589
+ providerId: z.ZodString;
590
+ }, z.core.$strip>;
591
+ metadata: {
592
+ openapi: {
593
+ operationId: string;
594
+ summary: string;
595
+ description: string;
596
+ responses: {
597
+ "200": {
598
+ description: string;
599
+ };
600
+ "404": {
601
+ description: string;
602
+ };
603
+ "403": {
604
+ description: string;
605
+ };
606
+ };
607
+ };
608
+ };
609
+ }, {
610
+ providerId: string;
611
+ type: string;
612
+ issuer: string;
613
+ domain: string;
614
+ organizationId: string | null;
615
+ domainVerified: boolean;
616
+ oidcConfig: {
617
+ discoveryEndpoint: string;
618
+ clientIdLastFour: string;
619
+ pkce: boolean;
620
+ authorizationEndpoint: string | undefined;
621
+ tokenEndpoint: string | undefined;
622
+ userInfoEndpoint: string | undefined;
623
+ jwksEndpoint: string | undefined;
624
+ scopes: string[] | undefined;
625
+ tokenEndpointAuthentication: "client_secret_post" | "client_secret_basic" | undefined;
626
+ } | undefined;
627
+ samlConfig: {
628
+ entryPoint: string;
629
+ callbackUrl: string;
630
+ audience: string | undefined;
631
+ wantAssertionsSigned: boolean | undefined;
632
+ authnRequestsSigned: boolean | undefined;
633
+ identifierFormat: string | undefined;
634
+ signatureAlgorithm: string | undefined;
635
+ digestAlgorithm: string | undefined;
636
+ certificate: {
637
+ fingerprintSha256: string;
638
+ notBefore: string;
639
+ notAfter: string;
640
+ publicKeyAlgorithm: string;
641
+ } | {
642
+ error: string;
643
+ };
644
+ } | undefined;
645
+ spMetadataUrl: string;
646
+ }>;
647
+ declare const updateSSOProvider: (options: SSOOptions) => better_call0.StrictEndpoint<"/sso/providers/:providerId", {
648
+ method: "PATCH";
649
+ use: ((inputContext: better_call0.MiddlewareInputContext<better_call0.MiddlewareOptions>) => Promise<{
650
+ session: {
651
+ session: Record<string, any> & {
652
+ id: string;
653
+ createdAt: Date;
654
+ updatedAt: Date;
655
+ userId: string;
656
+ expiresAt: Date;
657
+ token: string;
658
+ ipAddress?: string | null | undefined;
659
+ userAgent?: string | null | undefined;
660
+ };
661
+ user: Record<string, any> & {
662
+ id: string;
663
+ createdAt: Date;
664
+ updatedAt: Date;
665
+ email: string;
666
+ emailVerified: boolean;
667
+ name: string;
668
+ image?: string | null | undefined;
669
+ };
670
+ };
671
+ }>)[];
672
+ params: z.ZodObject<{
673
+ providerId: z.ZodString;
674
+ }, z.core.$strip>;
675
+ body: z.ZodObject<{
676
+ issuer: z.ZodOptional<z.ZodString>;
677
+ domain: z.ZodOptional<z.ZodString>;
678
+ oidcConfig: z.ZodOptional<z.ZodObject<{
679
+ clientId: z.ZodOptional<z.ZodString>;
680
+ clientSecret: z.ZodOptional<z.ZodString>;
681
+ authorizationEndpoint: z.ZodOptional<z.ZodString>;
682
+ tokenEndpoint: z.ZodOptional<z.ZodString>;
683
+ userInfoEndpoint: z.ZodOptional<z.ZodString>;
684
+ tokenEndpointAuthentication: z.ZodOptional<z.ZodEnum<{
685
+ client_secret_post: "client_secret_post";
686
+ client_secret_basic: "client_secret_basic";
687
+ }>>;
688
+ jwksEndpoint: z.ZodOptional<z.ZodString>;
689
+ discoveryEndpoint: z.ZodOptional<z.ZodString>;
690
+ scopes: z.ZodOptional<z.ZodArray<z.ZodString>>;
691
+ pkce: z.ZodOptional<z.ZodBoolean>;
692
+ overrideUserInfo: z.ZodOptional<z.ZodBoolean>;
693
+ mapping: z.ZodOptional<z.ZodObject<{
694
+ id: z.ZodOptional<z.ZodString>;
695
+ email: z.ZodOptional<z.ZodString>;
696
+ emailVerified: z.ZodOptional<z.ZodString>;
697
+ name: z.ZodOptional<z.ZodString>;
698
+ image: z.ZodOptional<z.ZodString>;
699
+ extraFields: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodAny>>;
700
+ }, z.core.$strip>>;
701
+ }, z.core.$strip>>;
702
+ samlConfig: z.ZodOptional<z.ZodObject<{
703
+ entryPoint: z.ZodOptional<z.ZodString>;
704
+ cert: z.ZodOptional<z.ZodString>;
705
+ callbackUrl: z.ZodOptional<z.ZodString>;
706
+ audience: z.ZodOptional<z.ZodString>;
707
+ idpMetadata: z.ZodOptional<z.ZodObject<{
708
+ metadata: z.ZodOptional<z.ZodString>;
709
+ entityID: z.ZodOptional<z.ZodString>;
710
+ cert: z.ZodOptional<z.ZodString>;
711
+ privateKey: z.ZodOptional<z.ZodString>;
712
+ privateKeyPass: z.ZodOptional<z.ZodString>;
713
+ isAssertionEncrypted: z.ZodOptional<z.ZodBoolean>;
714
+ encPrivateKey: z.ZodOptional<z.ZodString>;
715
+ encPrivateKeyPass: z.ZodOptional<z.ZodString>;
716
+ singleSignOnService: z.ZodOptional<z.ZodArray<z.ZodObject<{
717
+ Binding: z.ZodString;
718
+ Location: z.ZodString;
719
+ }, z.core.$strip>>>;
720
+ }, z.core.$strip>>;
721
+ spMetadata: z.ZodOptional<z.ZodObject<{
722
+ metadata: z.ZodOptional<z.ZodString>;
723
+ entityID: z.ZodOptional<z.ZodString>;
724
+ binding: z.ZodOptional<z.ZodString>;
725
+ privateKey: z.ZodOptional<z.ZodString>;
726
+ privateKeyPass: z.ZodOptional<z.ZodString>;
727
+ isAssertionEncrypted: z.ZodOptional<z.ZodBoolean>;
728
+ encPrivateKey: z.ZodOptional<z.ZodString>;
729
+ encPrivateKeyPass: z.ZodOptional<z.ZodString>;
730
+ }, z.core.$strip>>;
731
+ wantAssertionsSigned: z.ZodOptional<z.ZodBoolean>;
732
+ authnRequestsSigned: z.ZodOptional<z.ZodBoolean>;
733
+ signatureAlgorithm: z.ZodOptional<z.ZodString>;
734
+ digestAlgorithm: z.ZodOptional<z.ZodString>;
735
+ identifierFormat: z.ZodOptional<z.ZodString>;
736
+ privateKey: z.ZodOptional<z.ZodString>;
737
+ decryptionPvk: z.ZodOptional<z.ZodString>;
738
+ additionalParams: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodAny>>;
739
+ mapping: z.ZodOptional<z.ZodObject<{
740
+ id: z.ZodOptional<z.ZodString>;
741
+ email: z.ZodOptional<z.ZodString>;
742
+ emailVerified: z.ZodOptional<z.ZodString>;
743
+ name: z.ZodOptional<z.ZodString>;
744
+ firstName: z.ZodOptional<z.ZodString>;
745
+ lastName: z.ZodOptional<z.ZodString>;
746
+ extraFields: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodAny>>;
747
+ }, z.core.$strip>>;
748
+ }, z.core.$strip>>;
749
+ }, z.core.$strip>;
750
+ metadata: {
751
+ openapi: {
752
+ operationId: string;
753
+ summary: string;
754
+ description: string;
755
+ responses: {
756
+ "200": {
757
+ description: string;
758
+ };
759
+ "404": {
760
+ description: string;
761
+ };
762
+ "403": {
763
+ description: string;
764
+ };
765
+ };
766
+ };
767
+ };
768
+ }, {
769
+ providerId: string;
770
+ type: string;
771
+ issuer: string;
772
+ domain: string;
773
+ organizationId: string | null;
774
+ domainVerified: boolean;
775
+ oidcConfig: {
776
+ discoveryEndpoint: string;
777
+ clientIdLastFour: string;
778
+ pkce: boolean;
779
+ authorizationEndpoint: string | undefined;
780
+ tokenEndpoint: string | undefined;
781
+ userInfoEndpoint: string | undefined;
782
+ jwksEndpoint: string | undefined;
783
+ scopes: string[] | undefined;
784
+ tokenEndpointAuthentication: "client_secret_post" | "client_secret_basic" | undefined;
785
+ } | undefined;
786
+ samlConfig: {
787
+ entryPoint: string;
788
+ callbackUrl: string;
789
+ audience: string | undefined;
790
+ wantAssertionsSigned: boolean | undefined;
791
+ authnRequestsSigned: boolean | undefined;
792
+ identifierFormat: string | undefined;
793
+ signatureAlgorithm: string | undefined;
794
+ digestAlgorithm: string | undefined;
795
+ certificate: {
796
+ fingerprintSha256: string;
797
+ notBefore: string;
798
+ notAfter: string;
799
+ publicKeyAlgorithm: string;
800
+ } | {
801
+ error: string;
802
+ };
803
+ } | undefined;
804
+ spMetadataUrl: string;
805
+ }>;
806
+ declare const deleteSSOProvider: () => better_call0.StrictEndpoint<"/sso/providers/:providerId", {
807
+ method: "DELETE";
808
+ use: ((inputContext: better_call0.MiddlewareInputContext<better_call0.MiddlewareOptions>) => Promise<{
809
+ session: {
810
+ session: Record<string, any> & {
811
+ id: string;
812
+ createdAt: Date;
813
+ updatedAt: Date;
814
+ userId: string;
815
+ expiresAt: Date;
816
+ token: string;
817
+ ipAddress?: string | null | undefined;
818
+ userAgent?: string | null | undefined;
819
+ };
820
+ user: Record<string, any> & {
821
+ id: string;
822
+ createdAt: Date;
823
+ updatedAt: Date;
824
+ email: string;
825
+ emailVerified: boolean;
826
+ name: string;
827
+ image?: string | null | undefined;
828
+ };
829
+ };
830
+ }>)[];
831
+ params: z.ZodObject<{
832
+ providerId: z.ZodString;
833
+ }, z.core.$strip>;
834
+ metadata: {
835
+ openapi: {
836
+ operationId: string;
837
+ summary: string;
838
+ description: string;
839
+ responses: {
840
+ "200": {
841
+ description: string;
842
+ };
843
+ "404": {
844
+ description: string;
845
+ };
846
+ "403": {
847
+ description: string;
848
+ };
849
+ };
850
+ };
851
+ };
852
+ }, {
853
+ success: boolean;
854
+ }>;
855
+ //#endregion
484
856
  //#region src/routes/sso.d.ts
485
857
  interface TimestampValidationOptions {
486
858
  clockSkew?: number;
@@ -582,6 +954,7 @@ declare const registerSSOProvider: <O extends SSOOptions>(options: O) => better_
582
954
  encPrivateKeyPass: z.ZodOptional<z.ZodString>;
583
955
  }, z.core.$strip>;
584
956
  wantAssertionsSigned: z.ZodOptional<z.ZodBoolean>;
957
+ authnRequestsSigned: z.ZodOptional<z.ZodBoolean>;
585
958
  signatureAlgorithm: z.ZodOptional<z.ZodString>;
586
959
  digestAlgorithm: z.ZodOptional<z.ZodString>;
587
960
  identifierFormat: z.ZodOptional<z.ZodString>;
@@ -917,11 +1290,14 @@ declare const callbackSSO: (options?: SSOOptions) => better_call0.StrictEndpoint
917
1290
  };
918
1291
  }, never>;
919
1292
  declare const callbackSSOSAML: (options?: SSOOptions) => better_call0.StrictEndpoint<"/sso/saml2/callback/:providerId", {
920
- method: "POST";
921
- body: z.ZodObject<{
1293
+ method: ("POST" | "GET")[];
1294
+ body: z.ZodOptional<z.ZodObject<{
922
1295
  SAMLResponse: z.ZodString;
923
1296
  RelayState: z.ZodOptional<z.ZodString>;
924
- }, z.core.$strip>;
1297
+ }, z.core.$strip>>;
1298
+ query: z.ZodOptional<z.ZodObject<{
1299
+ RelayState: z.ZodOptional<z.ZodString>;
1300
+ }, z.core.$strip>>;
925
1301
  metadata: {
926
1302
  allowedMediaTypes: string[];
927
1303
  openapi: {
@@ -1062,16 +1438,7 @@ interface OIDCDiscoveryDocument {
1062
1438
  /**
1063
1439
  * Error codes for OIDC discovery operations.
1064
1440
  */
1065
- type DiscoveryErrorCode = /** Request to discovery endpoint timed out */
1066
- "discovery_timeout"
1067
- /** Discovery endpoint returned 404 or similar */ | "discovery_not_found"
1068
- /** Discovery endpoint returned invalid JSON */ | "discovery_invalid_json"
1069
- /** Discovery URL is invalid or malformed */ | "discovery_invalid_url"
1070
- /** Discovery URL is not trusted by the trusted origins configuration */ | "discovery_untrusted_origin"
1071
- /** Discovery document issuer doesn't match configured issuer */ | "issuer_mismatch"
1072
- /** Discovery document is missing required fields */ | "discovery_incomplete"
1073
- /** IdP only advertises token auth methods that Better Auth doesn't currently support */ | "unsupported_token_auth_method"
1074
- /** Catch-all for unexpected errors */ | "discovery_unexpected_error";
1441
+ type DiscoveryErrorCode = /** Request to discovery endpoint timed out */"discovery_timeout" /** Discovery endpoint returned 404 or similar */ | "discovery_not_found" /** Discovery endpoint returned invalid JSON */ | "discovery_invalid_json" /** Discovery URL is invalid or malformed */ | "discovery_invalid_url" /** Discovery URL is not trusted by the trusted origins configuration */ | "discovery_untrusted_origin" /** Discovery document issuer doesn't match configured issuer */ | "issuer_mismatch" /** Discovery document is missing required fields */ | "discovery_incomplete" /** IdP only advertises token auth methods that Better Auth doesn't currently support */ | "unsupported_token_auth_method" /** Catch-all for unexpected errors */ | "discovery_unexpected_error";
1075
1442
  /**
1076
1443
  * Custom error class for OIDC discovery failures.
1077
1444
  * Can be caught and mapped to APIError at the edge.
@@ -1246,6 +1613,13 @@ declare function selectTokenEndpointAuthMethod(doc: OIDCDiscoveryDocument, exist
1246
1613
  declare function needsRuntimeDiscovery(config: Partial<HydratedOIDCConfig> | undefined): boolean;
1247
1614
  //#endregion
1248
1615
  //#region src/index.d.ts
1616
+ declare module "@better-auth/core" {
1617
+ interface BetterAuthPluginRegistry<AuthOptions, Options> {
1618
+ sso: {
1619
+ creator: typeof sso;
1620
+ };
1621
+ }
1622
+ }
1249
1623
  type DomainVerificationEndpoints = {
1250
1624
  requestDomainVerification: ReturnType<typeof requestDomainVerification>;
1251
1625
  verifyDomain: ReturnType<typeof verifyDomain>;
@@ -1257,6 +1631,10 @@ type SSOEndpoints<O extends SSOOptions> = {
1257
1631
  callbackSSO: ReturnType<typeof callbackSSO>;
1258
1632
  callbackSSOSAML: ReturnType<typeof callbackSSOSAML>;
1259
1633
  acsEndpoint: ReturnType<typeof acsEndpoint>;
1634
+ listSSOProviders: ReturnType<typeof listSSOProviders>;
1635
+ getSSOProvider: ReturnType<typeof getSSOProvider>;
1636
+ updateSSOProvider: ReturnType<typeof updateSSOProvider>;
1637
+ deleteSSOProvider: ReturnType<typeof deleteSSOProvider>;
1260
1638
  };
1261
1639
  type SSOPlugin<O extends SSOOptions> = {
1262
1640
  id: "sso";
@@ -1273,7 +1651,7 @@ declare function sso<O extends SSOOptions & {
1273
1651
  }>(options?: O | undefined): {
1274
1652
  id: "sso";
1275
1653
  endpoints: SSOEndpoints<O> & DomainVerificationEndpoints;
1276
- schema: any;
1654
+ schema: NonNullable<BetterAuthPlugin["schema"]>;
1277
1655
  options: O;
1278
1656
  };
1279
1657
  declare function sso<O extends SSOOptions>(options?: O | undefined): {
@@ -1281,4 +1659,5 @@ declare function sso<O extends SSOOptions>(options?: O | undefined): {
1281
1659
  endpoints: SSOEndpoints<O>;
1282
1660
  };
1283
1661
  //#endregion
1284
- export { DataEncryptionAlgorithm as A, TimestampValidationOptions as C, SSOOptions as D, SAMLConfig as E, DigestAlgorithm as M, KeyEncryptionAlgorithm as N, SSOProvider as O, SignatureAlgorithm as P, SAMLConditions as S, OIDCConfig as T, REQUIRED_DISCOVERY_FIELDS as _, fetchDiscoveryDocument as a, DEFAULT_MAX_SAML_METADATA_SIZE as b, normalizeUrl as c, validateDiscoveryUrl as d, DiscoverOIDCConfigParams as f, OIDCDiscoveryDocument as g, HydratedOIDCConfig as h, discoverOIDCConfig as i, DeprecatedAlgorithmBehavior as j, AlgorithmValidationOptions as k, selectTokenEndpointAuthMethod as l, DiscoveryErrorCode as m, sso as n, needsRuntimeDiscovery as o, DiscoveryError as p, computeDiscoveryUrl as r, normalizeDiscoveryUrls as s, SSOPlugin as t, validateDiscoveryDocument as u, RequiredDiscoveryField as v, validateSAMLTimestamp as w, DEFAULT_MAX_SAML_RESPONSE_SIZE as x, DEFAULT_CLOCK_SKEW_MS as y };
1662
+ export { DataEncryptionAlgorithm as A, TimestampValidationOptions as C, SSOOptions as D, SAMLConfig as E, DigestAlgorithm as M, KeyEncryptionAlgorithm as N, SSOProvider as O, SignatureAlgorithm as P, SAMLConditions as S, OIDCConfig as T, REQUIRED_DISCOVERY_FIELDS as _, fetchDiscoveryDocument as a, DEFAULT_MAX_SAML_METADATA_SIZE as b, normalizeUrl as c, validateDiscoveryUrl as d, DiscoverOIDCConfigParams as f, OIDCDiscoveryDocument as g, HydratedOIDCConfig as h, discoverOIDCConfig as i, DeprecatedAlgorithmBehavior as j, AlgorithmValidationOptions as k, selectTokenEndpointAuthMethod as l, DiscoveryErrorCode as m, sso as n, needsRuntimeDiscovery as o, DiscoveryError as p, computeDiscoveryUrl as r, normalizeDiscoveryUrls as s, SSOPlugin as t, validateDiscoveryDocument as u, RequiredDiscoveryField as v, validateSAMLTimestamp as w, DEFAULT_MAX_SAML_RESPONSE_SIZE as x, DEFAULT_CLOCK_SKEW_MS as y };
1663
+ //# sourceMappingURL=index-CBBJTszO.d.mts.map
package/dist/index.d.mts CHANGED
@@ -1,2 +1,2 @@
1
- import { A as DataEncryptionAlgorithm, C as TimestampValidationOptions, D as SSOOptions, E as SAMLConfig, M as DigestAlgorithm, N as KeyEncryptionAlgorithm, O as SSOProvider, P as SignatureAlgorithm, S as SAMLConditions, T as OIDCConfig, _ as REQUIRED_DISCOVERY_FIELDS, a as fetchDiscoveryDocument, b as DEFAULT_MAX_SAML_METADATA_SIZE, c as normalizeUrl, d as validateDiscoveryUrl, f as DiscoverOIDCConfigParams, g as OIDCDiscoveryDocument, h as HydratedOIDCConfig, i as discoverOIDCConfig, j as DeprecatedAlgorithmBehavior, k as AlgorithmValidationOptions, l as selectTokenEndpointAuthMethod, m as DiscoveryErrorCode, n as sso, o as needsRuntimeDiscovery, p as DiscoveryError, r as computeDiscoveryUrl, s as normalizeDiscoveryUrls, t as SSOPlugin, u as validateDiscoveryDocument, v as RequiredDiscoveryField, w as validateSAMLTimestamp, x as DEFAULT_MAX_SAML_RESPONSE_SIZE, y as DEFAULT_CLOCK_SKEW_MS } from "./index-XUgmj4eH.mjs";
1
+ import { A as DataEncryptionAlgorithm, C as TimestampValidationOptions, D as SSOOptions, E as SAMLConfig, M as DigestAlgorithm, N as KeyEncryptionAlgorithm, O as SSOProvider, P as SignatureAlgorithm, S as SAMLConditions, T as OIDCConfig, _ as REQUIRED_DISCOVERY_FIELDS, a as fetchDiscoveryDocument, b as DEFAULT_MAX_SAML_METADATA_SIZE, c as normalizeUrl, d as validateDiscoveryUrl, f as DiscoverOIDCConfigParams, g as OIDCDiscoveryDocument, h as HydratedOIDCConfig, i as discoverOIDCConfig, j as DeprecatedAlgorithmBehavior, k as AlgorithmValidationOptions, l as selectTokenEndpointAuthMethod, m as DiscoveryErrorCode, n as sso, o as needsRuntimeDiscovery, p as DiscoveryError, r as computeDiscoveryUrl, s as normalizeDiscoveryUrls, t as SSOPlugin, u as validateDiscoveryDocument, v as RequiredDiscoveryField, w as validateSAMLTimestamp, x as DEFAULT_MAX_SAML_RESPONSE_SIZE, y as DEFAULT_CLOCK_SKEW_MS } from "./index-CBBJTszO.mjs";
2
2
  export { AlgorithmValidationOptions, DEFAULT_CLOCK_SKEW_MS, DEFAULT_MAX_SAML_METADATA_SIZE, DEFAULT_MAX_SAML_RESPONSE_SIZE, DataEncryptionAlgorithm, DeprecatedAlgorithmBehavior, DigestAlgorithm, DiscoverOIDCConfigParams, DiscoveryError, DiscoveryErrorCode, HydratedOIDCConfig, KeyEncryptionAlgorithm, OIDCConfig, OIDCDiscoveryDocument, REQUIRED_DISCOVERY_FIELDS, RequiredDiscoveryField, SAMLConditions, SAMLConfig, SSOOptions, SSOPlugin, SSOProvider, SignatureAlgorithm, TimestampValidationOptions, computeDiscoveryUrl, discoverOIDCConfig, fetchDiscoveryDocument, needsRuntimeDiscovery, normalizeDiscoveryUrls, normalizeUrl, selectTokenEndpointAuthMethod, sso, validateDiscoveryDocument, validateDiscoveryUrl, validateSAMLTimestamp };