@better-auth/sso 1.5.1-beta.3 → 1.5.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/client.d.mts CHANGED
@@ -1,4 +1,4 @@
1
- import { t as SSOPlugin } from "./index-DoxMd-mL.mjs";
1
+ import { t as SSOPlugin } from "./index-DHITQH_m.mjs";
2
2
 
3
3
  //#region src/client.d.ts
4
4
  interface SSOClientOptions {
@@ -1,5 +1,6 @@
1
1
  import { APIError } from "better-auth/api";
2
- import * as z from "zod";
2
+ import * as z$1 from "zod/v4";
3
+ import z from "zod/v4";
3
4
  import { Awaitable, BetterAuthPlugin, OAuth2Tokens, User } from "better-auth";
4
5
  import * as better_call0 from "better-call";
5
6
 
@@ -417,9 +418,9 @@ interface SSOOptions {
417
418
  //#region src/routes/domain-verification.d.ts
418
419
  declare const requestDomainVerification: (options: SSOOptions) => better_call0.StrictEndpoint<"/sso/request-domain-verification", {
419
420
  method: "POST";
420
- body: z.ZodObject<{
421
- providerId: z.ZodString;
422
- }, z.core.$strip>;
421
+ body: z$1.ZodObject<{
422
+ providerId: z$1.ZodString;
423
+ }, z$1.core.$strip>;
423
424
  metadata: {
424
425
  openapi: {
425
426
  summary: string;
@@ -465,9 +466,9 @@ declare const requestDomainVerification: (options: SSOOptions) => better_call0.S
465
466
  }>;
466
467
  declare const verifyDomain: (options: SSOOptions) => better_call0.StrictEndpoint<"/sso/verify-domain", {
467
468
  method: "POST";
468
- body: z.ZodObject<{
469
- providerId: z.ZodString;
470
- }, z.core.$strip>;
469
+ body: z$1.ZodObject<{
470
+ providerId: z$1.ZodString;
471
+ }, z$1.core.$strip>;
471
472
  metadata: {
472
473
  openapi: {
473
474
  summary: string;
@@ -1772,4 +1773,4 @@ declare function sso<O extends SSOOptions>(options?: O | undefined): {
1772
1773
  };
1773
1774
  //#endregion
1774
1775
  export { DataEncryptionAlgorithm as A, TimestampValidationOptions as C, SSOOptions as D, SAMLConfig as E, DigestAlgorithm as M, KeyEncryptionAlgorithm as N, SSOProvider as O, SignatureAlgorithm as P, SAMLConditions as S, OIDCConfig as T, REQUIRED_DISCOVERY_FIELDS as _, fetchDiscoveryDocument as a, DEFAULT_MAX_SAML_METADATA_SIZE as b, normalizeUrl as c, validateDiscoveryUrl as d, DiscoverOIDCConfigParams as f, OIDCDiscoveryDocument as g, HydratedOIDCConfig as h, discoverOIDCConfig as i, DeprecatedAlgorithmBehavior as j, AlgorithmValidationOptions as k, selectTokenEndpointAuthMethod as l, DiscoveryErrorCode as m, sso as n, needsRuntimeDiscovery as o, DiscoveryError as p, computeDiscoveryUrl as r, normalizeDiscoveryUrls as s, SSOPlugin as t, validateDiscoveryDocument as u, RequiredDiscoveryField as v, validateSAMLTimestamp as w, DEFAULT_MAX_SAML_RESPONSE_SIZE as x, DEFAULT_CLOCK_SKEW_MS as y };
1775
- //# sourceMappingURL=index-DoxMd-mL.d.mts.map
1776
+ //# sourceMappingURL=index-DHITQH_m.d.mts.map
package/dist/index.d.mts CHANGED
@@ -1,2 +1,2 @@
1
- import { A as DataEncryptionAlgorithm, C as TimestampValidationOptions, D as SSOOptions, E as SAMLConfig, M as DigestAlgorithm, N as KeyEncryptionAlgorithm, O as SSOProvider, P as SignatureAlgorithm, S as SAMLConditions, T as OIDCConfig, _ as REQUIRED_DISCOVERY_FIELDS, a as fetchDiscoveryDocument, b as DEFAULT_MAX_SAML_METADATA_SIZE, c as normalizeUrl, d as validateDiscoveryUrl, f as DiscoverOIDCConfigParams, g as OIDCDiscoveryDocument, h as HydratedOIDCConfig, i as discoverOIDCConfig, j as DeprecatedAlgorithmBehavior, k as AlgorithmValidationOptions, l as selectTokenEndpointAuthMethod, m as DiscoveryErrorCode, n as sso, o as needsRuntimeDiscovery, p as DiscoveryError, r as computeDiscoveryUrl, s as normalizeDiscoveryUrls, t as SSOPlugin, u as validateDiscoveryDocument, v as RequiredDiscoveryField, w as validateSAMLTimestamp, x as DEFAULT_MAX_SAML_RESPONSE_SIZE, y as DEFAULT_CLOCK_SKEW_MS } from "./index-DoxMd-mL.mjs";
1
+ import { A as DataEncryptionAlgorithm, C as TimestampValidationOptions, D as SSOOptions, E as SAMLConfig, M as DigestAlgorithm, N as KeyEncryptionAlgorithm, O as SSOProvider, P as SignatureAlgorithm, S as SAMLConditions, T as OIDCConfig, _ as REQUIRED_DISCOVERY_FIELDS, a as fetchDiscoveryDocument, b as DEFAULT_MAX_SAML_METADATA_SIZE, c as normalizeUrl, d as validateDiscoveryUrl, f as DiscoverOIDCConfigParams, g as OIDCDiscoveryDocument, h as HydratedOIDCConfig, i as discoverOIDCConfig, j as DeprecatedAlgorithmBehavior, k as AlgorithmValidationOptions, l as selectTokenEndpointAuthMethod, m as DiscoveryErrorCode, n as sso, o as needsRuntimeDiscovery, p as DiscoveryError, r as computeDiscoveryUrl, s as normalizeDiscoveryUrls, t as SSOPlugin, u as validateDiscoveryDocument, v as RequiredDiscoveryField, w as validateSAMLTimestamp, x as DEFAULT_MAX_SAML_RESPONSE_SIZE, y as DEFAULT_CLOCK_SKEW_MS } from "./index-DHITQH_m.mjs";
2
2
  export { AlgorithmValidationOptions, DEFAULT_CLOCK_SKEW_MS, DEFAULT_MAX_SAML_METADATA_SIZE, DEFAULT_MAX_SAML_RESPONSE_SIZE, DataEncryptionAlgorithm, DeprecatedAlgorithmBehavior, DigestAlgorithm, DiscoverOIDCConfigParams, DiscoveryError, DiscoveryErrorCode, HydratedOIDCConfig, KeyEncryptionAlgorithm, OIDCConfig, OIDCDiscoveryDocument, REQUIRED_DISCOVERY_FIELDS, RequiredDiscoveryField, SAMLConditions, SAMLConfig, SSOOptions, SSOPlugin, SSOProvider, SignatureAlgorithm, TimestampValidationOptions, computeDiscoveryUrl, discoverOIDCConfig, fetchDiscoveryDocument, needsRuntimeDiscovery, normalizeDiscoveryUrls, normalizeUrl, selectTokenEndpointAuthMethod, sso, validateDiscoveryDocument, validateDiscoveryUrl, validateSAMLTimestamp };
package/dist/index.mjs CHANGED
@@ -3,7 +3,8 @@ import { XMLParser, XMLValidator } from "fast-xml-parser";
3
3
  import saml from "samlify";
4
4
  import { X509Certificate } from "node:crypto";
5
5
  import { generateRandomString } from "better-auth/crypto";
6
- import * as z from "zod";
6
+ import * as z$1 from "zod/v4";
7
+ import z from "zod/v4";
7
8
  import { base64 } from "@better-auth/utils/base64";
8
9
  import { BetterFetchError, betterFetch } from "@better-fetch/fetch";
9
10
  import { HIDE_METADATA, createAuthorizationURL, generateGenericState, generateState, parseGenericState, parseState, validateAuthorizationCode, validateToken } from "better-auth";
@@ -217,7 +218,7 @@ async function assignOrganizationByDomain(ctx, options) {
217
218
  //#region src/routes/domain-verification.ts
218
219
  const DNS_LABEL_MAX_LENGTH = 63;
219
220
  const DEFAULT_TOKEN_PREFIX = "better-auth-token";
220
- const domainVerificationBodySchema = z.object({ providerId: z.string() });
221
+ const domainVerificationBodySchema = z$1.object({ providerId: z$1.string() });
221
222
  function getVerificationIdentifier(options, providerId) {
222
223
  return `_${options.domainVerification?.tokenPrefix || DEFAULT_TOKEN_PREFIX}-${providerId}`;
223
224
  }