@cedarjs/auth-supabase-web 2.2.2-next.0 → 2.2.2-next.31

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/cjs/index.js CHANGED
@@ -16,11 +16,11 @@ var __copyProps = (to, from, except, desc) => {
16
16
  return to;
17
17
  };
18
18
  var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
19
- var index_exports = {};
20
- __export(index_exports, {
19
+ var src_exports = {};
20
+ __export(src_exports, {
21
21
  createAuth: () => import_supabase.createAuth
22
22
  });
23
- module.exports = __toCommonJS(index_exports);
23
+ module.exports = __toCommonJS(src_exports);
24
24
  var import_supabase = require("./supabase.js");
25
25
  // Annotate the CommonJS export names for ESM import in node:
26
26
  0 && (module.exports = {
@@ -70,65 +70,18 @@ function createAuthImplementation({
70
70
  login: async (credentials) => {
71
71
  let result;
72
72
  switch (credentials.authMethod) {
73
- /**
74
- * Log in an existing user with an email and password or phone and password.
75
- *
76
- * Be aware that you may get back an error message that will not distinguish
77
- * between the cases where the account does not exist or that the
78
- * email/phone and password combination is wrong or that the account can only
79
- * be accessed via social login.
80
- */
81
73
  case "password":
82
74
  result = await supabaseClient.auth.signInWithPassword(credentials);
83
75
  break;
84
- /**
85
- * Log in an existing user via a third-party provider.
86
- */
87
76
  case "oauth":
88
77
  result = await supabaseClient.auth.signInWithOAuth(credentials);
89
78
  break;
90
- /**
91
- * Log in a user using magiclink or a one-time password (OTP).
92
- *
93
- * If the `{{ .ConfirmationURL }}` variable is specified in the email template, a magiclink will be sent.
94
- * If the `{{ .Token }}` variable is specified in the email template, an OTP will be sent.
95
- * If you're using phone sign-ins, only an OTP will be sent. You won't be able to send a magiclink for phone sign-ins.
96
- *
97
- * Be aware that you may get back an error message that will not distinguish
98
- * between the cases where the account does not exist or, that the account
99
- * can only be accessed via social login.
100
- */
101
79
  case "otp":
102
80
  result = await supabaseClient.auth.signInWithOtp(credentials);
103
81
  break;
104
- /**
105
- * Attempts a single-sign on using an enterprise Identity Provider. A
106
- * successful SSO attempt will redirect the current page to the identity
107
- * provider authorization page. The redirect URL is implementation and SSO
108
- * protocol specific.
109
- *
110
- * You can use it by providing a SSO domain. Typically you can extract this
111
- * domain by asking users for their email address. If this domain is
112
- * registered on the Auth instance the redirect will use that organization's
113
- * currently active SSO Identity Provider for the login.
114
- *
115
- * If you have built an organization-specific login page, you can use the
116
- * organization's SSO Identity Provider UUID directly instead.
117
- *
118
- * This API is experimental and availability is conditional on correct
119
- * settings on the Auth service.
120
- *
121
- * @experimental
122
- */
123
82
  case "sso":
124
83
  result = await supabaseClient.auth.signInWithSSO(credentials);
125
84
  break;
126
- /**
127
- * Allows signing in with an ID token issued by certain supported providers.
128
- * The ID token is verified for validity and a new session is established.
129
- *
130
- * @experimental
131
- */
132
85
  case "id_token":
133
86
  result = await supabaseClient.auth.signInWithIdToken(credentials);
134
87
  break;
package/dist/supabase.js CHANGED
@@ -50,65 +50,18 @@ function createAuthImplementation({
50
50
  login: async (credentials) => {
51
51
  let result;
52
52
  switch (credentials.authMethod) {
53
- /**
54
- * Log in an existing user with an email and password or phone and password.
55
- *
56
- * Be aware that you may get back an error message that will not distinguish
57
- * between the cases where the account does not exist or that the
58
- * email/phone and password combination is wrong or that the account can only
59
- * be accessed via social login.
60
- */
61
53
  case "password":
62
54
  result = await supabaseClient.auth.signInWithPassword(credentials);
63
55
  break;
64
- /**
65
- * Log in an existing user via a third-party provider.
66
- */
67
56
  case "oauth":
68
57
  result = await supabaseClient.auth.signInWithOAuth(credentials);
69
58
  break;
70
- /**
71
- * Log in a user using magiclink or a one-time password (OTP).
72
- *
73
- * If the `{{ .ConfirmationURL }}` variable is specified in the email template, a magiclink will be sent.
74
- * If the `{{ .Token }}` variable is specified in the email template, an OTP will be sent.
75
- * If you're using phone sign-ins, only an OTP will be sent. You won't be able to send a magiclink for phone sign-ins.
76
- *
77
- * Be aware that you may get back an error message that will not distinguish
78
- * between the cases where the account does not exist or, that the account
79
- * can only be accessed via social login.
80
- */
81
59
  case "otp":
82
60
  result = await supabaseClient.auth.signInWithOtp(credentials);
83
61
  break;
84
- /**
85
- * Attempts a single-sign on using an enterprise Identity Provider. A
86
- * successful SSO attempt will redirect the current page to the identity
87
- * provider authorization page. The redirect URL is implementation and SSO
88
- * protocol specific.
89
- *
90
- * You can use it by providing a SSO domain. Typically you can extract this
91
- * domain by asking users for their email address. If this domain is
92
- * registered on the Auth instance the redirect will use that organization's
93
- * currently active SSO Identity Provider for the login.
94
- *
95
- * If you have built an organization-specific login page, you can use the
96
- * organization's SSO Identity Provider UUID directly instead.
97
- *
98
- * This API is experimental and availability is conditional on correct
99
- * settings on the Auth service.
100
- *
101
- * @experimental
102
- */
103
62
  case "sso":
104
63
  result = await supabaseClient.auth.signInWithSSO(credentials);
105
64
  break;
106
- /**
107
- * Allows signing in with an ID token issued by certain supported providers.
108
- * The ID token is verified for validity and a new session is established.
109
- *
110
- * @experimental
111
- */
112
65
  case "id_token":
113
66
  result = await supabaseClient.auth.signInWithIdToken(credentials);
114
67
  break;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@cedarjs/auth-supabase-web",
3
- "version": "2.2.2-next.0+50c9164d3",
3
+ "version": "2.2.2-next.31+ff2776832",
4
4
  "repository": {
5
5
  "type": "git",
6
6
  "url": "git+https://github.com/cedarjs/cedar.git",
@@ -49,10 +49,10 @@
49
49
  "test:watch": "vitest watch"
50
50
  },
51
51
  "dependencies": {
52
- "@cedarjs/auth": "2.2.2-next.0+50c9164d3"
52
+ "@cedarjs/auth": "2.2.2-next.31+ff2776832"
53
53
  },
54
54
  "devDependencies": {
55
- "@cedarjs/framework-tools": "2.2.2-next.1",
55
+ "@cedarjs/framework-tools": "2.2.2-next.31",
56
56
  "@supabase/ssr": "0.8.0",
57
57
  "@supabase/supabase-js": "2.87.3",
58
58
  "@types/react": "^18.2.55",
@@ -69,5 +69,5 @@
69
69
  "publishConfig": {
70
70
  "access": "public"
71
71
  },
72
- "gitHead": "50c9164d38f49178f060177be747dd7c484d1e36"
72
+ "gitHead": "ff2776832afcb70cd4ca38986ec4e37043e1c44b"
73
73
  }