@better-auth/sso 1.5.0-beta.10 → 1.5.0-beta.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/.turbo/turbo-build.log
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
|
|
2
|
-
> @better-auth/sso@1.5.0-beta.
|
|
2
|
+
> @better-auth/sso@1.5.0-beta.11 build /home/runner/work/better-auth/better-auth/packages/sso
|
|
3
3
|
> tsdown
|
|
4
4
|
|
|
5
5
|
[34mℹ[39m tsdown [2mv0.20.1[22m powered by rolldown [2mv1.0.0-rc.1[22m
|
|
@@ -7,14 +7,14 @@
|
|
|
7
7
|
[34mℹ[39m entry: [34msrc/index.ts, src/client.ts[39m
|
|
8
8
|
[34mℹ[39m tsconfig: [34mtsconfig.json[39m
|
|
9
9
|
[34mℹ[39m Build start
|
|
10
|
-
[34mℹ[39m [2mdist/[22m[1mindex.mjs[22m [2m120.
|
|
10
|
+
[34mℹ[39m [2mdist/[22m[1mindex.mjs[22m [2m120.79 kB[22m [2m│ gzip: 24.04 kB[22m
|
|
11
11
|
[34mℹ[39m [2mdist/[22m[1mclient.mjs[22m [2m 0.28 kB[22m [2m│ gzip: 0.21 kB[22m
|
|
12
|
-
[34mℹ[39m [2mdist/[22mindex.mjs.map [2m244.
|
|
12
|
+
[34mℹ[39m [2mdist/[22mindex.mjs.map [2m244.10 kB[22m [2m│ gzip: 46.76 kB[22m
|
|
13
13
|
[34mℹ[39m [2mdist/[22mclient.mjs.map [2m 0.94 kB[22m [2m│ gzip: 0.50 kB[22m
|
|
14
|
+
[33m[PLUGIN_TIMINGS] Warning:[0m Your build spent significant time in plugin `rolldown-plugin-dts:generate`. See https://rolldown.rs/options/checks#plugintimings for more details.
|
|
14
15
|
[34mℹ[39m [2mdist/[22m[32m[1mindex.d.mts[22m[39m [2m 1.67 kB[22m [2m│ gzip: 0.57 kB[22m
|
|
15
16
|
[34mℹ[39m [2mdist/[22m[32m[1mclient.d.mts[22m[39m [2m 0.62 kB[22m [2m│ gzip: 0.36 kB[22m
|
|
16
|
-
[34mℹ[39m [2mdist/[22m[32mindex-
|
|
17
|
-
[34mℹ[39m 7 files, total: 424.
|
|
18
|
-
[33m[PLUGIN_TIMINGS] Warning:[0m Your build spent significant time in plugin `rolldown-plugin-dts:generate`. See https://rolldown.rs/options/checks#plugintimings for more details.
|
|
17
|
+
[34mℹ[39m [2mdist/[22m[32mindex-Bg_GWJqf.d.mts[39m [2m 56.30 kB[22m [2m│ gzip: 9.97 kB[22m
|
|
18
|
+
[34mℹ[39m 7 files, total: 424.70 kB
|
|
19
19
|
|
|
20
|
-
[32m✔[39m Build complete in [
|
|
20
|
+
[32m✔[39m Build complete in [32m25650ms[39m
|
package/dist/client.d.mts
CHANGED
|
@@ -424,7 +424,7 @@ declare const requestDomainVerification: (options: SSOOptions) => better_call0.S
|
|
|
424
424
|
updatedAt: Date;
|
|
425
425
|
email: string;
|
|
426
426
|
emailVerified: boolean;
|
|
427
|
-
name
|
|
427
|
+
name?: string | null | undefined;
|
|
428
428
|
image?: string | null | undefined;
|
|
429
429
|
};
|
|
430
430
|
};
|
|
@@ -475,7 +475,7 @@ declare const verifyDomain: (options: SSOOptions) => better_call0.StrictEndpoint
|
|
|
475
475
|
updatedAt: Date;
|
|
476
476
|
email: string;
|
|
477
477
|
emailVerified: boolean;
|
|
478
|
-
name
|
|
478
|
+
name?: string | null | undefined;
|
|
479
479
|
image?: string | null | undefined;
|
|
480
480
|
};
|
|
481
481
|
};
|
|
@@ -503,7 +503,7 @@ declare const listSSOProviders: () => better_call0.StrictEndpoint<"/sso/provider
|
|
|
503
503
|
updatedAt: Date;
|
|
504
504
|
email: string;
|
|
505
505
|
emailVerified: boolean;
|
|
506
|
-
name
|
|
506
|
+
name?: string | null | undefined;
|
|
507
507
|
image?: string | null | undefined;
|
|
508
508
|
};
|
|
509
509
|
};
|
|
@@ -580,7 +580,7 @@ declare const getSSOProvider: () => better_call0.StrictEndpoint<"/sso/providers/
|
|
|
580
580
|
updatedAt: Date;
|
|
581
581
|
email: string;
|
|
582
582
|
emailVerified: boolean;
|
|
583
|
-
name
|
|
583
|
+
name?: string | null | undefined;
|
|
584
584
|
image?: string | null | undefined;
|
|
585
585
|
};
|
|
586
586
|
};
|
|
@@ -664,7 +664,7 @@ declare const updateSSOProvider: (options: SSOOptions) => better_call0.StrictEnd
|
|
|
664
664
|
updatedAt: Date;
|
|
665
665
|
email: string;
|
|
666
666
|
emailVerified: boolean;
|
|
667
|
-
name
|
|
667
|
+
name?: string | null | undefined;
|
|
668
668
|
image?: string | null | undefined;
|
|
669
669
|
};
|
|
670
670
|
};
|
|
@@ -823,7 +823,7 @@ declare const deleteSSOProvider: () => better_call0.StrictEndpoint<"/sso/provide
|
|
|
823
823
|
updatedAt: Date;
|
|
824
824
|
email: string;
|
|
825
825
|
emailVerified: boolean;
|
|
826
|
-
name
|
|
826
|
+
name?: string | null | undefined;
|
|
827
827
|
image?: string | null | undefined;
|
|
828
828
|
};
|
|
829
829
|
};
|
|
@@ -877,8 +877,8 @@ declare const spMetadata: () => better_call0.StrictEndpoint<"/sso/saml2/sp/metad
|
|
|
877
877
|
query: z.ZodObject<{
|
|
878
878
|
providerId: z.ZodString;
|
|
879
879
|
format: z.ZodDefault<z.ZodEnum<{
|
|
880
|
-
xml: "xml";
|
|
881
880
|
json: "json";
|
|
881
|
+
xml: "xml";
|
|
882
882
|
}>>;
|
|
883
883
|
}, z.core.$strip>;
|
|
884
884
|
metadata: {
|
|
@@ -992,7 +992,7 @@ declare const registerSSOProvider: <O extends SSOOptions>(options: O) => better_
|
|
|
992
992
|
updatedAt: Date;
|
|
993
993
|
email: string;
|
|
994
994
|
emailVerified: boolean;
|
|
995
|
-
name
|
|
995
|
+
name?: string | null | undefined;
|
|
996
996
|
image?: string | null | undefined;
|
|
997
997
|
};
|
|
998
998
|
};
|
|
@@ -1660,4 +1660,4 @@ declare function sso<O extends SSOOptions>(options?: O | undefined): {
|
|
|
1660
1660
|
};
|
|
1661
1661
|
//#endregion
|
|
1662
1662
|
export { DataEncryptionAlgorithm as A, TimestampValidationOptions as C, SSOOptions as D, SAMLConfig as E, DigestAlgorithm as M, KeyEncryptionAlgorithm as N, SSOProvider as O, SignatureAlgorithm as P, SAMLConditions as S, OIDCConfig as T, REQUIRED_DISCOVERY_FIELDS as _, fetchDiscoveryDocument as a, DEFAULT_MAX_SAML_METADATA_SIZE as b, normalizeUrl as c, validateDiscoveryUrl as d, DiscoverOIDCConfigParams as f, OIDCDiscoveryDocument as g, HydratedOIDCConfig as h, discoverOIDCConfig as i, DeprecatedAlgorithmBehavior as j, AlgorithmValidationOptions as k, selectTokenEndpointAuthMethod as l, DiscoveryErrorCode as m, sso as n, needsRuntimeDiscovery as o, DiscoveryError as p, computeDiscoveryUrl as r, normalizeDiscoveryUrls as s, SSOPlugin as t, validateDiscoveryDocument as u, RequiredDiscoveryField as v, validateSAMLTimestamp as w, DEFAULT_MAX_SAML_RESPONSE_SIZE as x, DEFAULT_CLOCK_SKEW_MS as y };
|
|
1663
|
-
//# sourceMappingURL=index-
|
|
1663
|
+
//# sourceMappingURL=index-Bg_GWJqf.d.mts.map
|
package/dist/index.d.mts
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
import { A as DataEncryptionAlgorithm, C as TimestampValidationOptions, D as SSOOptions, E as SAMLConfig, M as DigestAlgorithm, N as KeyEncryptionAlgorithm, O as SSOProvider, P as SignatureAlgorithm, S as SAMLConditions, T as OIDCConfig, _ as REQUIRED_DISCOVERY_FIELDS, a as fetchDiscoveryDocument, b as DEFAULT_MAX_SAML_METADATA_SIZE, c as normalizeUrl, d as validateDiscoveryUrl, f as DiscoverOIDCConfigParams, g as OIDCDiscoveryDocument, h as HydratedOIDCConfig, i as discoverOIDCConfig, j as DeprecatedAlgorithmBehavior, k as AlgorithmValidationOptions, l as selectTokenEndpointAuthMethod, m as DiscoveryErrorCode, n as sso, o as needsRuntimeDiscovery, p as DiscoveryError, r as computeDiscoveryUrl, s as normalizeDiscoveryUrls, t as SSOPlugin, u as validateDiscoveryDocument, v as RequiredDiscoveryField, w as validateSAMLTimestamp, x as DEFAULT_MAX_SAML_RESPONSE_SIZE, y as DEFAULT_CLOCK_SKEW_MS } from "./index-
|
|
1
|
+
import { A as DataEncryptionAlgorithm, C as TimestampValidationOptions, D as SSOOptions, E as SAMLConfig, M as DigestAlgorithm, N as KeyEncryptionAlgorithm, O as SSOProvider, P as SignatureAlgorithm, S as SAMLConditions, T as OIDCConfig, _ as REQUIRED_DISCOVERY_FIELDS, a as fetchDiscoveryDocument, b as DEFAULT_MAX_SAML_METADATA_SIZE, c as normalizeUrl, d as validateDiscoveryUrl, f as DiscoverOIDCConfigParams, g as OIDCDiscoveryDocument, h as HydratedOIDCConfig, i as discoverOIDCConfig, j as DeprecatedAlgorithmBehavior, k as AlgorithmValidationOptions, l as selectTokenEndpointAuthMethod, m as DiscoveryErrorCode, n as sso, o as needsRuntimeDiscovery, p as DiscoveryError, r as computeDiscoveryUrl, s as normalizeDiscoveryUrls, t as SSOPlugin, u as validateDiscoveryDocument, v as RequiredDiscoveryField, w as validateSAMLTimestamp, x as DEFAULT_MAX_SAML_RESPONSE_SIZE, y as DEFAULT_CLOCK_SKEW_MS } from "./index-Bg_GWJqf.mjs";
|
|
2
2
|
export { AlgorithmValidationOptions, DEFAULT_CLOCK_SKEW_MS, DEFAULT_MAX_SAML_METADATA_SIZE, DEFAULT_MAX_SAML_RESPONSE_SIZE, DataEncryptionAlgorithm, DeprecatedAlgorithmBehavior, DigestAlgorithm, DiscoverOIDCConfigParams, DiscoveryError, DiscoveryErrorCode, HydratedOIDCConfig, KeyEncryptionAlgorithm, OIDCConfig, OIDCDiscoveryDocument, REQUIRED_DISCOVERY_FIELDS, RequiredDiscoveryField, SAMLConditions, SAMLConfig, SSOOptions, SSOPlugin, SSOProvider, SignatureAlgorithm, TimestampValidationOptions, computeDiscoveryUrl, discoverOIDCConfig, fetchDiscoveryDocument, needsRuntimeDiscovery, normalizeDiscoveryUrls, normalizeUrl, selectTokenEndpointAuthMethod, sso, validateDiscoveryDocument, validateDiscoveryUrl, validateSAMLTimestamp };
|
package/dist/index.mjs
CHANGED
|
@@ -11,7 +11,6 @@ import { HIDE_METADATA, createAuthorizationURL, generateGenericState, generateSt
|
|
|
11
11
|
import { setSessionCookie } from "better-auth/cookies";
|
|
12
12
|
import { handleOAuthUserInfo } from "better-auth/oauth2";
|
|
13
13
|
import { decodeJwt } from "jose";
|
|
14
|
-
import { APIError as APIError$1 } from "better-call";
|
|
15
14
|
|
|
16
15
|
//#region src/utils.ts
|
|
17
16
|
/**
|
|
@@ -1360,7 +1359,7 @@ function mapDiscoveryErrorToAPIError(error) {
|
|
|
1360
1359
|
//#region src/saml-state.ts
|
|
1361
1360
|
async function generateRelayState(c, link, additionalData) {
|
|
1362
1361
|
const callbackURL = c.body.callbackURL;
|
|
1363
|
-
if (!callbackURL) throw new APIError
|
|
1362
|
+
if (!callbackURL) throw new APIError("BAD_REQUEST", { message: "callbackURL is required" });
|
|
1364
1363
|
const codeVerifier = generateRandomString(128);
|
|
1365
1364
|
const stateData = {
|
|
1366
1365
|
...additionalData ? additionalData : {},
|
|
@@ -1376,7 +1375,7 @@ async function generateRelayState(c, link, additionalData) {
|
|
|
1376
1375
|
return generateGenericState(c, stateData, { cookieName: "relay_state" });
|
|
1377
1376
|
} catch (error) {
|
|
1378
1377
|
c.context.logger.error("Failed to create verification for relay state", error);
|
|
1379
|
-
throw new APIError
|
|
1378
|
+
throw new APIError("INTERNAL_SERVER_ERROR", {
|
|
1380
1379
|
message: "State error: Unable to create verification for relay state",
|
|
1381
1380
|
cause: error
|
|
1382
1381
|
});
|
|
@@ -1390,7 +1389,7 @@ async function parseRelayState(c) {
|
|
|
1390
1389
|
parsedData = await parseGenericState(c, state, { cookieName: "relay_state" });
|
|
1391
1390
|
} catch (error) {
|
|
1392
1391
|
c.context.logger.error("Failed to parse relay state", error);
|
|
1393
|
-
throw new APIError
|
|
1392
|
+
throw new APIError("BAD_REQUEST", {
|
|
1394
1393
|
message: "State error: failed to validate relay state",
|
|
1395
1394
|
cause: error
|
|
1396
1395
|
});
|