@cedarjs/auth-supabase-web 2.2.2-next.0 → 2.2.2-next.31
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cjs/index.js +3 -3
- package/dist/cjs/supabase.js +0 -47
- package/dist/supabase.js +0 -47
- package/package.json +4 -4
package/dist/cjs/index.js
CHANGED
|
@@ -16,11 +16,11 @@ var __copyProps = (to, from, except, desc) => {
|
|
|
16
16
|
return to;
|
|
17
17
|
};
|
|
18
18
|
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
|
|
19
|
-
var
|
|
20
|
-
__export(
|
|
19
|
+
var src_exports = {};
|
|
20
|
+
__export(src_exports, {
|
|
21
21
|
createAuth: () => import_supabase.createAuth
|
|
22
22
|
});
|
|
23
|
-
module.exports = __toCommonJS(
|
|
23
|
+
module.exports = __toCommonJS(src_exports);
|
|
24
24
|
var import_supabase = require("./supabase.js");
|
|
25
25
|
// Annotate the CommonJS export names for ESM import in node:
|
|
26
26
|
0 && (module.exports = {
|
package/dist/cjs/supabase.js
CHANGED
|
@@ -70,65 +70,18 @@ function createAuthImplementation({
|
|
|
70
70
|
login: async (credentials) => {
|
|
71
71
|
let result;
|
|
72
72
|
switch (credentials.authMethod) {
|
|
73
|
-
/**
|
|
74
|
-
* Log in an existing user with an email and password or phone and password.
|
|
75
|
-
*
|
|
76
|
-
* Be aware that you may get back an error message that will not distinguish
|
|
77
|
-
* between the cases where the account does not exist or that the
|
|
78
|
-
* email/phone and password combination is wrong or that the account can only
|
|
79
|
-
* be accessed via social login.
|
|
80
|
-
*/
|
|
81
73
|
case "password":
|
|
82
74
|
result = await supabaseClient.auth.signInWithPassword(credentials);
|
|
83
75
|
break;
|
|
84
|
-
/**
|
|
85
|
-
* Log in an existing user via a third-party provider.
|
|
86
|
-
*/
|
|
87
76
|
case "oauth":
|
|
88
77
|
result = await supabaseClient.auth.signInWithOAuth(credentials);
|
|
89
78
|
break;
|
|
90
|
-
/**
|
|
91
|
-
* Log in a user using magiclink or a one-time password (OTP).
|
|
92
|
-
*
|
|
93
|
-
* If the `{{ .ConfirmationURL }}` variable is specified in the email template, a magiclink will be sent.
|
|
94
|
-
* If the `{{ .Token }}` variable is specified in the email template, an OTP will be sent.
|
|
95
|
-
* If you're using phone sign-ins, only an OTP will be sent. You won't be able to send a magiclink for phone sign-ins.
|
|
96
|
-
*
|
|
97
|
-
* Be aware that you may get back an error message that will not distinguish
|
|
98
|
-
* between the cases where the account does not exist or, that the account
|
|
99
|
-
* can only be accessed via social login.
|
|
100
|
-
*/
|
|
101
79
|
case "otp":
|
|
102
80
|
result = await supabaseClient.auth.signInWithOtp(credentials);
|
|
103
81
|
break;
|
|
104
|
-
/**
|
|
105
|
-
* Attempts a single-sign on using an enterprise Identity Provider. A
|
|
106
|
-
* successful SSO attempt will redirect the current page to the identity
|
|
107
|
-
* provider authorization page. The redirect URL is implementation and SSO
|
|
108
|
-
* protocol specific.
|
|
109
|
-
*
|
|
110
|
-
* You can use it by providing a SSO domain. Typically you can extract this
|
|
111
|
-
* domain by asking users for their email address. If this domain is
|
|
112
|
-
* registered on the Auth instance the redirect will use that organization's
|
|
113
|
-
* currently active SSO Identity Provider for the login.
|
|
114
|
-
*
|
|
115
|
-
* If you have built an organization-specific login page, you can use the
|
|
116
|
-
* organization's SSO Identity Provider UUID directly instead.
|
|
117
|
-
*
|
|
118
|
-
* This API is experimental and availability is conditional on correct
|
|
119
|
-
* settings on the Auth service.
|
|
120
|
-
*
|
|
121
|
-
* @experimental
|
|
122
|
-
*/
|
|
123
82
|
case "sso":
|
|
124
83
|
result = await supabaseClient.auth.signInWithSSO(credentials);
|
|
125
84
|
break;
|
|
126
|
-
/**
|
|
127
|
-
* Allows signing in with an ID token issued by certain supported providers.
|
|
128
|
-
* The ID token is verified for validity and a new session is established.
|
|
129
|
-
*
|
|
130
|
-
* @experimental
|
|
131
|
-
*/
|
|
132
85
|
case "id_token":
|
|
133
86
|
result = await supabaseClient.auth.signInWithIdToken(credentials);
|
|
134
87
|
break;
|
package/dist/supabase.js
CHANGED
|
@@ -50,65 +50,18 @@ function createAuthImplementation({
|
|
|
50
50
|
login: async (credentials) => {
|
|
51
51
|
let result;
|
|
52
52
|
switch (credentials.authMethod) {
|
|
53
|
-
/**
|
|
54
|
-
* Log in an existing user with an email and password or phone and password.
|
|
55
|
-
*
|
|
56
|
-
* Be aware that you may get back an error message that will not distinguish
|
|
57
|
-
* between the cases where the account does not exist or that the
|
|
58
|
-
* email/phone and password combination is wrong or that the account can only
|
|
59
|
-
* be accessed via social login.
|
|
60
|
-
*/
|
|
61
53
|
case "password":
|
|
62
54
|
result = await supabaseClient.auth.signInWithPassword(credentials);
|
|
63
55
|
break;
|
|
64
|
-
/**
|
|
65
|
-
* Log in an existing user via a third-party provider.
|
|
66
|
-
*/
|
|
67
56
|
case "oauth":
|
|
68
57
|
result = await supabaseClient.auth.signInWithOAuth(credentials);
|
|
69
58
|
break;
|
|
70
|
-
/**
|
|
71
|
-
* Log in a user using magiclink or a one-time password (OTP).
|
|
72
|
-
*
|
|
73
|
-
* If the `{{ .ConfirmationURL }}` variable is specified in the email template, a magiclink will be sent.
|
|
74
|
-
* If the `{{ .Token }}` variable is specified in the email template, an OTP will be sent.
|
|
75
|
-
* If you're using phone sign-ins, only an OTP will be sent. You won't be able to send a magiclink for phone sign-ins.
|
|
76
|
-
*
|
|
77
|
-
* Be aware that you may get back an error message that will not distinguish
|
|
78
|
-
* between the cases where the account does not exist or, that the account
|
|
79
|
-
* can only be accessed via social login.
|
|
80
|
-
*/
|
|
81
59
|
case "otp":
|
|
82
60
|
result = await supabaseClient.auth.signInWithOtp(credentials);
|
|
83
61
|
break;
|
|
84
|
-
/**
|
|
85
|
-
* Attempts a single-sign on using an enterprise Identity Provider. A
|
|
86
|
-
* successful SSO attempt will redirect the current page to the identity
|
|
87
|
-
* provider authorization page. The redirect URL is implementation and SSO
|
|
88
|
-
* protocol specific.
|
|
89
|
-
*
|
|
90
|
-
* You can use it by providing a SSO domain. Typically you can extract this
|
|
91
|
-
* domain by asking users for their email address. If this domain is
|
|
92
|
-
* registered on the Auth instance the redirect will use that organization's
|
|
93
|
-
* currently active SSO Identity Provider for the login.
|
|
94
|
-
*
|
|
95
|
-
* If you have built an organization-specific login page, you can use the
|
|
96
|
-
* organization's SSO Identity Provider UUID directly instead.
|
|
97
|
-
*
|
|
98
|
-
* This API is experimental and availability is conditional on correct
|
|
99
|
-
* settings on the Auth service.
|
|
100
|
-
*
|
|
101
|
-
* @experimental
|
|
102
|
-
*/
|
|
103
62
|
case "sso":
|
|
104
63
|
result = await supabaseClient.auth.signInWithSSO(credentials);
|
|
105
64
|
break;
|
|
106
|
-
/**
|
|
107
|
-
* Allows signing in with an ID token issued by certain supported providers.
|
|
108
|
-
* The ID token is verified for validity and a new session is established.
|
|
109
|
-
*
|
|
110
|
-
* @experimental
|
|
111
|
-
*/
|
|
112
65
|
case "id_token":
|
|
113
66
|
result = await supabaseClient.auth.signInWithIdToken(credentials);
|
|
114
67
|
break;
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@cedarjs/auth-supabase-web",
|
|
3
|
-
"version": "2.2.2-next.
|
|
3
|
+
"version": "2.2.2-next.31+ff2776832",
|
|
4
4
|
"repository": {
|
|
5
5
|
"type": "git",
|
|
6
6
|
"url": "git+https://github.com/cedarjs/cedar.git",
|
|
@@ -49,10 +49,10 @@
|
|
|
49
49
|
"test:watch": "vitest watch"
|
|
50
50
|
},
|
|
51
51
|
"dependencies": {
|
|
52
|
-
"@cedarjs/auth": "2.2.2-next.
|
|
52
|
+
"@cedarjs/auth": "2.2.2-next.31+ff2776832"
|
|
53
53
|
},
|
|
54
54
|
"devDependencies": {
|
|
55
|
-
"@cedarjs/framework-tools": "2.2.2-next.
|
|
55
|
+
"@cedarjs/framework-tools": "2.2.2-next.31",
|
|
56
56
|
"@supabase/ssr": "0.8.0",
|
|
57
57
|
"@supabase/supabase-js": "2.87.3",
|
|
58
58
|
"@types/react": "^18.2.55",
|
|
@@ -69,5 +69,5 @@
|
|
|
69
69
|
"publishConfig": {
|
|
70
70
|
"access": "public"
|
|
71
71
|
},
|
|
72
|
-
"gitHead": "
|
|
72
|
+
"gitHead": "ff2776832afcb70cd4ca38986ec4e37043e1c44b"
|
|
73
73
|
}
|