@lobehub/lobehub 2.0.0-next.355 → 2.0.0-next.356

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (151) hide show
  1. package/.env.desktop +0 -1
  2. package/.env.example +16 -20
  3. package/.env.example.development +1 -4
  4. package/.github/workflows/e2e.yml +10 -11
  5. package/CHANGELOG.md +33 -0
  6. package/Dockerfile +28 -4
  7. package/changelog/v1.json +9 -0
  8. package/docker-compose/local/docker-compose.yml +2 -2
  9. package/docker-compose/local/grafana/docker-compose.yml +2 -2
  10. package/docker-compose/local/logto/docker-compose.yml +2 -2
  11. package/docker-compose/local/zitadel/.env.example +2 -2
  12. package/docker-compose/local/zitadel/.env.zh-CN.example +2 -2
  13. package/docker-compose/production/grafana/docker-compose.yml +2 -2
  14. package/docker-compose/production/logto/.env.example +2 -2
  15. package/docker-compose/production/logto/.env.zh-CN.example +2 -2
  16. package/docker-compose/production/zitadel/.env.example +2 -2
  17. package/docker-compose/production/zitadel/.env.zh-CN.example +2 -2
  18. package/docs/development/basic/add-new-authentication-providers.mdx +144 -136
  19. package/docs/development/basic/add-new-authentication-providers.zh-CN.mdx +146 -136
  20. package/docs/self-hosting/advanced/auth/legacy.mdx +4 -0
  21. package/docs/self-hosting/advanced/auth/legacy.zh-CN.mdx +4 -0
  22. package/docs/self-hosting/advanced/auth/nextauth-to-betterauth.mdx +326 -0
  23. package/docs/self-hosting/advanced/auth/nextauth-to-betterauth.zh-CN.mdx +323 -0
  24. package/docs/self-hosting/advanced/auth.mdx +43 -16
  25. package/docs/self-hosting/advanced/auth.zh-CN.mdx +44 -16
  26. package/docs/self-hosting/advanced/redis/upstash.mdx +69 -0
  27. package/docs/self-hosting/advanced/redis/upstash.zh-CN.mdx +69 -0
  28. package/docs/self-hosting/advanced/redis.mdx +128 -0
  29. package/docs/self-hosting/advanced/redis.zh-CN.mdx +126 -0
  30. package/docs/self-hosting/environment-variables/auth.mdx +15 -1
  31. package/docs/self-hosting/environment-variables/auth.zh-CN.mdx +15 -1
  32. package/docs/self-hosting/environment-variables/basic.mdx +13 -0
  33. package/docs/self-hosting/environment-variables/basic.zh-CN.mdx +13 -0
  34. package/docs/self-hosting/environment-variables/redis.mdx +68 -0
  35. package/docs/self-hosting/environment-variables/redis.zh-CN.mdx +67 -0
  36. package/docs/self-hosting/migration/v2/breaking-changes.mdx +23 -23
  37. package/docs/self-hosting/migration/v2/breaking-changes.zh-CN.mdx +23 -23
  38. package/docs/self-hosting/server-database/docker-compose.mdx +4 -4
  39. package/docs/self-hosting/server-database/docker-compose.zh-CN.mdx +4 -4
  40. package/e2e/CLAUDE.md +5 -6
  41. package/e2e/docs/local-setup.md +9 -12
  42. package/e2e/scripts/setup.ts +9 -15
  43. package/e2e/src/support/webServer.ts +6 -5
  44. package/package.json +4 -6
  45. package/packages/database/src/schemas/nextauth.ts +7 -2
  46. package/packages/utils/src/server/__tests__/auth.test.ts +1 -63
  47. package/packages/utils/src/server/auth.ts +8 -24
  48. package/scripts/_shared/checkDeprecatedAuth.js +99 -0
  49. package/scripts/clerk-to-betterauth/index.ts +8 -3
  50. package/scripts/nextauth-to-betterauth/_internal/config.ts +41 -0
  51. package/scripts/nextauth-to-betterauth/_internal/db.ts +32 -0
  52. package/scripts/nextauth-to-betterauth/_internal/env.ts +6 -0
  53. package/scripts/nextauth-to-betterauth/index.ts +226 -0
  54. package/scripts/nextauth-to-betterauth/verify.ts +188 -0
  55. package/scripts/prebuild.mts +66 -13
  56. package/scripts/serverLauncher/startServer.js +5 -5
  57. package/src/app/(backend)/api/auth/[...all]/route.ts +5 -23
  58. package/src/app/(backend)/api/webhooks/casdoor/route.ts +5 -5
  59. package/src/app/(backend)/api/webhooks/logto/route.ts +8 -8
  60. package/src/app/(backend)/middleware/auth/index.test.ts +8 -1
  61. package/src/app/(backend)/middleware/auth/index.ts +6 -15
  62. package/src/app/(backend)/middleware/auth/utils.test.ts +0 -32
  63. package/src/app/(backend)/middleware/auth/utils.ts +3 -8
  64. package/src/app/(backend)/webapi/chat/[provider]/route.test.ts +8 -1
  65. package/src/app/(backend)/webapi/create-image/comfyui/route.ts +0 -1
  66. package/src/app/(backend)/webapi/models/[provider]/route.test.ts +8 -1
  67. package/src/app/[variants]/(auth)/signin/SignInEmailStep.tsx +1 -1
  68. package/src/app/[variants]/(auth)/signup/[[...signup]]/page.tsx +4 -17
  69. package/src/app/[variants]/(main)/agent/cron/[cronId]/features/CronJobContentEditor.tsx +34 -21
  70. package/src/app/[variants]/(main)/settings/profile/features/SSOProvidersList/index.tsx +12 -19
  71. package/src/app/[variants]/(main)/settings/profile/index.tsx +8 -14
  72. package/src/components/{NextAuth/AuthIcons.tsx → AuthIcons.tsx} +8 -10
  73. package/src/envs/auth.ts +12 -51
  74. package/src/envs/email.ts +3 -0
  75. package/src/envs/redis.ts +12 -54
  76. package/src/features/ChatInput/ChatInputProvider.tsx +22 -2
  77. package/src/features/ChatInput/InputEditor/index.tsx +14 -3
  78. package/src/features/ChatInput/store/initialState.ts +2 -0
  79. package/src/features/User/__tests__/PanelContent.test.tsx +0 -11
  80. package/src/features/User/__tests__/UserAvatar.test.tsx +1 -16
  81. package/src/layout/AuthProvider/index.tsx +1 -6
  82. package/src/layout/GlobalProvider/StoreInitialization.tsx +2 -4
  83. package/src/libs/better-auth/define-config.ts +2 -0
  84. package/src/libs/better-auth/plugins/email-whitelist.test.ts +120 -0
  85. package/src/libs/better-auth/plugins/email-whitelist.ts +62 -0
  86. package/src/libs/next/config/define-config.ts +13 -1
  87. package/src/libs/next/proxy/define-config.ts +2 -75
  88. package/src/libs/oidc-provider/provider.test.ts +0 -4
  89. package/src/libs/redis/index.ts +0 -1
  90. package/src/libs/redis/manager.test.ts +9 -45
  91. package/src/libs/redis/manager.ts +2 -16
  92. package/src/libs/redis/redis.test.ts +2 -4
  93. package/src/libs/redis/redis.ts +2 -4
  94. package/src/libs/redis/types.ts +2 -24
  95. package/src/libs/redis/utils.test.ts +0 -10
  96. package/src/libs/redis/utils.ts +0 -19
  97. package/src/libs/trpc/lambda/context.test.ts +0 -13
  98. package/src/libs/trpc/lambda/context.ts +21 -59
  99. package/src/libs/trpc/middleware/userAuth.ts +1 -7
  100. package/src/libs/trusted-client/getSessionUser.ts +15 -35
  101. package/src/server/globalConfig/index.ts +1 -3
  102. package/src/server/routers/lambda/__tests__/user.test.ts +0 -48
  103. package/src/server/routers/lambda/user.ts +1 -12
  104. package/src/server/services/email/impls/nodemailer/index.ts +2 -2
  105. package/src/server/services/webhookUser/index.ts +88 -0
  106. package/src/services/user/index.test.ts +0 -14
  107. package/src/services/user/index.ts +0 -4
  108. package/src/store/user/slices/auth/action.test.ts +22 -126
  109. package/src/store/user/slices/auth/action.ts +32 -65
  110. package/src/store/user/slices/auth/initialState.ts +0 -3
  111. package/src/store/user/slices/auth/selectors.ts +0 -3
  112. package/tests/setup.ts +10 -0
  113. package/scripts/_shared/checkDeprecatedClerkEnv.js +0 -42
  114. package/src/app/(backend)/api/auth/adapter/route.ts +0 -137
  115. package/src/app/[variants]/(auth)/next-auth/error/AuthErrorPage.tsx +0 -40
  116. package/src/app/[variants]/(auth)/next-auth/error/page.tsx +0 -11
  117. package/src/app/[variants]/(auth)/next-auth/signin/AuthSignInBox.tsx +0 -167
  118. package/src/app/[variants]/(auth)/next-auth/signin/page.tsx +0 -11
  119. package/src/app/[variants]/(auth)/reset-password/layout.tsx +0 -12
  120. package/src/app/[variants]/(auth)/signin/layout.tsx +0 -12
  121. package/src/app/[variants]/(auth)/verify-email/layout.tsx +0 -12
  122. package/src/envs/auth.test.ts +0 -47
  123. package/src/layout/AuthProvider/NextAuth/UserUpdater.tsx +0 -44
  124. package/src/layout/AuthProvider/NextAuth/index.tsx +0 -17
  125. package/src/libs/next-auth/adapter/index.ts +0 -177
  126. package/src/libs/next-auth/auth.config.ts +0 -64
  127. package/src/libs/next-auth/index.ts +0 -20
  128. package/src/libs/next-auth/sso-providers/auth0.ts +0 -24
  129. package/src/libs/next-auth/sso-providers/authelia.ts +0 -39
  130. package/src/libs/next-auth/sso-providers/authentik.ts +0 -25
  131. package/src/libs/next-auth/sso-providers/casdoor.ts +0 -50
  132. package/src/libs/next-auth/sso-providers/cloudflare-zero-trust.ts +0 -34
  133. package/src/libs/next-auth/sso-providers/cognito.ts +0 -8
  134. package/src/libs/next-auth/sso-providers/feishu.ts +0 -83
  135. package/src/libs/next-auth/sso-providers/generic-oidc.ts +0 -38
  136. package/src/libs/next-auth/sso-providers/github.ts +0 -23
  137. package/src/libs/next-auth/sso-providers/google.ts +0 -18
  138. package/src/libs/next-auth/sso-providers/index.ts +0 -35
  139. package/src/libs/next-auth/sso-providers/keycloak.ts +0 -22
  140. package/src/libs/next-auth/sso-providers/logto.ts +0 -48
  141. package/src/libs/next-auth/sso-providers/microsoft-entra-id-helper.ts +0 -29
  142. package/src/libs/next-auth/sso-providers/microsoft-entra-id.ts +0 -19
  143. package/src/libs/next-auth/sso-providers/okta.ts +0 -22
  144. package/src/libs/next-auth/sso-providers/sso.config.ts +0 -8
  145. package/src/libs/next-auth/sso-providers/wechat.ts +0 -36
  146. package/src/libs/next-auth/sso-providers/zitadel.ts +0 -21
  147. package/src/libs/redis/upstash.test.ts +0 -158
  148. package/src/libs/redis/upstash.ts +0 -136
  149. package/src/server/services/nextAuthUser/index.ts +0 -318
  150. package/src/server/services/nextAuthUser/utils.ts +0 -62
  151. package/src/types/next-auth.d.ts +0 -26
@@ -15,29 +15,6 @@ vi.mock('@/libs/swr', async () => {
15
15
  };
16
16
  });
17
17
 
18
- // Use vi.hoisted to ensure variables exist before vi.mock factory executes
19
- const { enableNextAuth, enableBetterAuth } = vi.hoisted(() => ({
20
- enableNextAuth: { value: false },
21
- enableBetterAuth: { value: false },
22
- }));
23
-
24
- vi.mock('@/envs/auth', () => ({
25
- get enableNextAuth() {
26
- return enableNextAuth.value;
27
- },
28
- get enableBetterAuth() {
29
- return enableBetterAuth.value;
30
- },
31
- }));
32
-
33
- const mockUserService = vi.hoisted(() => ({
34
- getUserSSOProviders: vi.fn().mockResolvedValue([]),
35
- }));
36
-
37
- vi.mock('@/services/user', () => ({
38
- userService: mockUserService,
39
- }));
40
-
41
18
  const mockBetterAuthClient = vi.hoisted(() => ({
42
19
  listAccounts: vi.fn().mockResolvedValue({ data: [] }),
43
20
  accountInfo: vi.fn().mockResolvedValue({ data: { user: {} } }),
@@ -50,9 +27,6 @@ afterEach(() => {
50
27
  vi.restoreAllMocks();
51
28
  vi.clearAllMocks();
52
29
 
53
- enableNextAuth.value = false;
54
- enableBetterAuth.value = false;
55
-
56
30
  // Reset store state
57
31
  useUserStore.setState({
58
32
  isLoadedAuthProviders: false,
@@ -61,16 +35,6 @@ afterEach(() => {
61
35
  });
62
36
  });
63
37
 
64
- /**
65
- * Mock nextauth 库相关方法
66
- */
67
- vi.mock('next-auth/react', async () => {
68
- return {
69
- signIn: vi.fn(),
70
- signOut: vi.fn(),
71
- };
72
- });
73
-
74
38
  describe('createAuthSlice', () => {
75
39
  describe('refreshUserState', () => {
76
40
  it('should refresh user config', async () => {
@@ -85,64 +49,19 @@ describe('createAuthSlice', () => {
85
49
  });
86
50
 
87
51
  describe('logout', () => {
88
- it('should call next-auth signOut when NextAuth is enabled', async () => {
89
- enableNextAuth.value = true;
90
-
91
- const { result } = renderHook(() => useUserStore());
92
-
93
- await act(async () => {
94
- await result.current.logout();
95
- });
96
-
97
- const { signOut } = await import('next-auth/react');
98
-
99
- expect(signOut).toHaveBeenCalled();
100
- enableNextAuth.value = false;
101
- });
102
-
103
- it('should not call next-auth signOut when NextAuth is disabled', async () => {
52
+ it('should call better-auth signOut', async () => {
104
53
  const { result } = renderHook(() => useUserStore());
105
54
 
106
55
  await act(async () => {
107
56
  await result.current.logout();
108
57
  });
109
58
 
110
- const { signOut } = await import('next-auth/react');
111
-
112
- expect(signOut).not.toHaveBeenCalled();
59
+ expect(mockBetterAuthClient.signOut).toHaveBeenCalled();
113
60
  });
114
61
  });
115
62
 
116
63
  describe('openLogin', () => {
117
- it('should call next-auth signIn when NextAuth is enabled', async () => {
118
- enableNextAuth.value = true;
119
-
120
- const { result } = renderHook(() => useUserStore());
121
-
122
- await act(async () => {
123
- await result.current.openLogin();
124
- });
125
-
126
- const { signIn } = await import('next-auth/react');
127
-
128
- expect(signIn).toHaveBeenCalled();
129
- enableNextAuth.value = false;
130
- });
131
- it('should not call next-auth signIn when NextAuth is disabled', async () => {
132
- const { result } = renderHook(() => useUserStore());
133
-
134
- await act(async () => {
135
- await result.current.openLogin();
136
- });
137
-
138
- const { signIn } = await import('next-auth/react');
139
-
140
- expect(signIn).not.toHaveBeenCalled();
141
- });
142
-
143
- it('should redirect to signin page when BetterAuth is enabled', async () => {
144
- enableBetterAuth.value = true;
145
-
64
+ it('should redirect to signin page', async () => {
146
65
  const originalLocation = window.location;
147
66
  Object.defineProperty(window, 'location', {
148
67
  configurable: true,
@@ -171,18 +90,15 @@ describe('createAuthSlice', () => {
171
90
  });
172
91
  });
173
92
 
174
- it('should call signIn with single provider when only one OAuth provider available', async () => {
175
- enableNextAuth.value = true;
176
- useUserStore.setState({ oAuthSSOProviders: ['github'] });
177
-
93
+ it('should not redirect when already on signin page', async () => {
178
94
  const originalLocation = window.location;
179
95
  Object.defineProperty(window, 'location', {
180
96
  configurable: true,
181
97
  value: {
182
98
  ...originalLocation,
183
99
  href: '',
184
- pathname: '/chat',
185
- toString: () => 'http://localhost/chat',
100
+ pathname: '/signin',
101
+ toString: () => 'http://localhost/signin',
186
102
  },
187
103
  writable: true,
188
104
  });
@@ -193,9 +109,7 @@ describe('createAuthSlice', () => {
193
109
  await result.current.openLogin();
194
110
  });
195
111
 
196
- const { signIn } = await import('next-auth/react');
197
-
198
- expect(signIn).toHaveBeenCalledWith('github');
112
+ expect(window.location.href).toBe('');
199
113
 
200
114
  Object.defineProperty(window, 'location', {
201
115
  configurable: true,
@@ -215,29 +129,10 @@ describe('createAuthSlice', () => {
215
129
  await result.current.fetchAuthProviders();
216
130
  });
217
131
 
218
- expect(mockUserService.getUserSSOProviders).not.toHaveBeenCalled();
219
- });
220
-
221
- it('should fetch providers from NextAuth when BetterAuth is disabled', async () => {
222
- enableBetterAuth.value = false;
223
- const mockProviders = [
224
- { provider: 'github', email: 'test@example.com', providerAccountId: '123' },
225
- ];
226
- mockUserService.getUserSSOProviders.mockResolvedValueOnce(mockProviders);
227
-
228
- const { result } = renderHook(() => useUserStore());
229
-
230
- await act(async () => {
231
- await result.current.fetchAuthProviders();
232
- });
233
-
234
- expect(mockUserService.getUserSSOProviders).toHaveBeenCalled();
235
- expect(result.current.isLoadedAuthProviders).toBe(true);
236
- expect(result.current.authProviders).toEqual(mockProviders);
132
+ expect(mockBetterAuthClient.listAccounts).not.toHaveBeenCalled();
237
133
  });
238
134
 
239
- it('should fetch providers from BetterAuth when enabled', async () => {
240
- enableBetterAuth.value = true;
135
+ it('should fetch providers from BetterAuth', async () => {
241
136
  mockBetterAuthClient.listAccounts.mockResolvedValueOnce({
242
137
  data: [
243
138
  { providerId: 'github', accountId: 'gh-123' },
@@ -260,8 +155,7 @@ describe('createAuthSlice', () => {
260
155
  });
261
156
 
262
157
  it('should handle fetch error gracefully', async () => {
263
- enableBetterAuth.value = false;
264
- mockUserService.getUserSSOProviders.mockRejectedValueOnce(new Error('Network error'));
158
+ mockBetterAuthClient.listAccounts.mockRejectedValueOnce(new Error('Network error'));
265
159
 
266
160
  const consoleSpy = vi.spyOn(console, 'error').mockImplementation(() => {});
267
161
 
@@ -277,12 +171,13 @@ describe('createAuthSlice', () => {
277
171
  });
278
172
 
279
173
  describe('refreshAuthProviders', () => {
280
- it('should refresh providers from NextAuth', async () => {
281
- enableBetterAuth.value = false;
282
- const mockProviders = [
283
- { provider: 'google', email: 'user@gmail.com', providerAccountId: 'g-1' },
284
- ];
285
- mockUserService.getUserSSOProviders.mockResolvedValueOnce(mockProviders);
174
+ it('should refresh providers from BetterAuth', async () => {
175
+ mockBetterAuthClient.listAccounts.mockResolvedValueOnce({
176
+ data: [{ providerId: 'google', accountId: 'g-1' }],
177
+ });
178
+ mockBetterAuthClient.accountInfo.mockResolvedValueOnce({
179
+ data: { user: { email: 'user@gmail.com' } },
180
+ });
286
181
 
287
182
  const { result } = renderHook(() => useUserStore());
288
183
 
@@ -290,13 +185,14 @@ describe('createAuthSlice', () => {
290
185
  await result.current.refreshAuthProviders();
291
186
  });
292
187
 
293
- expect(mockUserService.getUserSSOProviders).toHaveBeenCalled();
294
- expect(result.current.authProviders).toEqual(mockProviders);
188
+ expect(mockBetterAuthClient.listAccounts).toHaveBeenCalled();
189
+ expect(result.current.authProviders).toEqual([
190
+ { provider: 'google', email: 'user@gmail.com', providerAccountId: 'g-1' },
191
+ ]);
295
192
  });
296
193
 
297
194
  it('should handle refresh error gracefully', async () => {
298
- enableBetterAuth.value = false;
299
- mockUserService.getUserSSOProviders.mockRejectedValueOnce(new Error('Refresh failed'));
195
+ mockBetterAuthClient.listAccounts.mockRejectedValueOnce(new Error('Refresh failed'));
300
196
 
301
197
  const consoleSpy = vi.spyOn(console, 'error').mockImplementation(() => {});
302
198
 
@@ -1,9 +1,6 @@
1
1
  import { type SSOProvider } from '@lobechat/types';
2
2
  import { type StateCreator } from 'zustand/vanilla';
3
3
 
4
- import { enableBetterAuth, enableNextAuth } from '@/envs/auth';
5
- import { userService } from '@/services/user';
6
-
7
4
  import type { UserStore } from '../../store';
8
5
 
9
6
  interface AuthProvidersData {
@@ -31,32 +28,26 @@ export interface UserAuthAction {
31
28
  }
32
29
 
33
30
  const fetchAuthProvidersData = async (): Promise<AuthProvidersData> => {
34
- if (enableBetterAuth) {
35
- const { accountInfo, listAccounts } = await import('@/libs/better-auth/auth-client');
36
- const result = await listAccounts();
37
- const accounts = result.data || [];
38
- const hasPasswordAccount = accounts.some((account) => account.providerId === 'credential');
39
- const providers = await Promise.all(
40
- accounts
41
- .filter((account) => account.providerId !== 'credential')
42
- .map(async (account) => {
43
- // In theory, the id_token could be decrypted from the accounts table, but I found that better-auth on GitHub does not save the id_token
44
- const info = await accountInfo({
45
- query: { accountId: account.accountId },
46
- });
47
- return {
48
- email: info.data?.user?.email ?? undefined,
49
- provider: account.providerId,
50
- providerAccountId: account.accountId,
51
- };
52
- }),
53
- );
54
- return { hasPasswordAccount, providers };
55
- }
56
-
57
- // Fallback for NextAuth
58
- const providers = await userService.getUserSSOProviders();
59
- return { hasPasswordAccount: false, providers };
31
+ const { accountInfo, listAccounts } = await import('@/libs/better-auth/auth-client');
32
+ const result = await listAccounts();
33
+ const accounts = result.data || [];
34
+ const hasPasswordAccount = accounts.some((account) => account.providerId === 'credential');
35
+ const providers = await Promise.all(
36
+ accounts
37
+ .filter((account) => account.providerId !== 'credential')
38
+ .map(async (account) => {
39
+ // In theory, the id_token could be decrypted from the accounts table, but I found that better-auth on GitHub does not save the id_token
40
+ const info = await accountInfo({
41
+ query: { accountId: account.accountId },
42
+ });
43
+ return {
44
+ email: info.data?.user?.email ?? undefined,
45
+ provider: account.providerId,
46
+ providerAccountId: account.accountId,
47
+ };
48
+ }),
49
+ );
50
+ return { hasPasswordAccount, providers };
60
51
  };
61
52
 
62
53
  export const createAuthSlice: StateCreator<
@@ -78,50 +69,26 @@ export const createAuthSlice: StateCreator<
78
69
  }
79
70
  },
80
71
  logout: async () => {
81
- if (enableBetterAuth) {
82
- const { signOut } = await import('@/libs/better-auth/auth-client');
83
- await signOut({
84
- fetchOptions: {
85
- onSuccess: () => {
86
- // Use window.location.href to trigger a full page reload
87
- // This ensures all client-side state (React, Zustand, cache) is cleared
88
- window.location.href = '/signin';
89
- },
72
+ const { signOut } = await import('@/libs/better-auth/auth-client');
73
+ await signOut({
74
+ fetchOptions: {
75
+ onSuccess: () => {
76
+ // Use window.location.href to trigger a full page reload
77
+ // This ensures all client-side state (React, Zustand, cache) is cleared
78
+ window.location.href = '/signin';
90
79
  },
91
- });
92
-
93
- return;
94
- }
95
-
96
- if (enableNextAuth) {
97
- const { signOut } = await import('next-auth/react');
98
- signOut();
99
- }
80
+ },
81
+ });
100
82
  },
101
83
  openLogin: async () => {
102
- // Skip if already on a Better Auth login page (/signin, /signup)
84
+ // Skip if already on a login page (/signin, /signup)
103
85
  const pathname = location.pathname;
104
86
  if (pathname.startsWith('/signin') || pathname.startsWith('/signup')) {
105
87
  return;
106
88
  }
107
89
 
108
- if (enableBetterAuth) {
109
- const currentUrl = location.toString();
110
- window.location.href = `/signin?callbackUrl=${encodeURIComponent(currentUrl)}`;
111
-
112
- return;
113
- }
114
-
115
- if (enableNextAuth) {
116
- const { signIn } = await import('next-auth/react');
117
- // Check if only one provider is available
118
- const providers = get()?.oAuthSSOProviders;
119
- if (providers && providers.length === 1) {
120
- signIn(providers[0]);
121
- return;
122
- }
123
- signIn();
124
- }
90
+ const currentUrl = location.toString();
91
+ window.location.href = `/signin?callbackUrl=${encodeURIComponent(currentUrl)}`;
125
92
  },
126
93
  refreshAuthProviders: async () => {
127
94
  try {
@@ -1,4 +1,3 @@
1
- import { type Session, type User } from '@auth/core/types';
2
1
  import { type SSOProvider } from '@lobechat/types';
3
2
 
4
3
  import { type LobeUser } from '@/types/user';
@@ -13,8 +12,6 @@ export interface UserAuthState {
13
12
  isLoadedAuthProviders?: boolean;
14
13
 
15
14
  isSignedIn?: boolean;
16
- nextSession?: Session;
17
- nextUser?: User;
18
15
  oAuthSSOProviders?: string[];
19
16
  user?: LobeUser;
20
17
  }
@@ -1,7 +1,6 @@
1
1
  import { type LobeUser, type SSOProvider } from '@lobechat/types';
2
2
  import { t } from 'i18next';
3
3
 
4
- import { enableBetterAuth, enableNextAuth } from '@/envs/auth';
5
4
  import type { UserStore } from '@/store/user';
6
5
 
7
6
  const nickName = (s: UserStore) => {
@@ -37,6 +36,4 @@ export const authSelectors = {
37
36
  isLoadedAuthProviders: (s: UserStore) => s.isLoadedAuthProviders ?? false,
38
37
  isLogin: (s: UserStore) => s.isSignedIn,
39
38
  isLoginWithAuth: (s: UserStore) => s.isSignedIn,
40
- isLoginWithBetterAuth: (s: UserStore): boolean => (s.isSignedIn && enableBetterAuth) || false,
41
- isLoginWithNextAuth: (s: UserStore): boolean => (s.isSignedIn && !!enableNextAuth) || false,
42
39
  };
package/tests/setup.ts CHANGED
@@ -24,6 +24,16 @@ vi.mock('@lobehub/analytics/react', () => ({
24
24
  }),
25
25
  }));
26
26
 
27
+ // Global mock for @/auth to avoid better-auth validator module issue in tests
28
+ // The validator package has ESM resolution issues in Vitest environment
29
+ vi.mock('@/auth', () => ({
30
+ auth: {
31
+ api: {
32
+ getSession: vi.fn().mockResolvedValue(null),
33
+ },
34
+ },
35
+ }));
36
+
27
37
  // node runtime
28
38
  if (typeof window === 'undefined') {
29
39
  // test with polyfill crypto
@@ -1,42 +0,0 @@
1
- /**
2
- * Shared utility to check for deprecated Clerk environment variables.
3
- * Used by both prebuild.mts (build time) and startServer.js (Docker runtime).
4
- *
5
- * IMPORTANT: Keep this file as CommonJS (.js) for compatibility with startServer.js
6
- */
7
-
8
- const CLERK_MIGRATION_DOC_URL =
9
- 'https://lobehub.com/docs/self-hosting/advanced/auth/clerk-to-betterauth';
10
-
11
- const CLERK_ENV_VARS = [
12
- 'NEXT_PUBLIC_CLERK_PUBLISHABLE_KEY',
13
- 'CLERK_SECRET_KEY',
14
- 'CLERK_WEBHOOK_SECRET',
15
- ];
16
-
17
- /**
18
- * Check for deprecated Clerk environment variables and exit if found
19
- * @param {object} options
20
- * @param {string} [options.action='redeploy'] - Action hint in error message ('redeploy' or 'restart')
21
- */
22
- function checkDeprecatedClerkEnv(options = {}) {
23
- const { action = 'redeploy' } = options;
24
- const foundClerkEnvVars = CLERK_ENV_VARS.filter((envVar) => process.env[envVar]);
25
-
26
- if (foundClerkEnvVars.length > 0) {
27
- console.error('\n' + '═'.repeat(70));
28
- console.error('❌ ERROR: Clerk authentication is no longer supported!');
29
- console.error('═'.repeat(70));
30
- console.error('\nDetected deprecated Clerk environment variables:');
31
- for (const envVar of foundClerkEnvVars) {
32
- console.error(` • ${envVar}`);
33
- }
34
- console.error('\nClerk has been removed from LobeChat. Please migrate to Better Auth.');
35
- console.error(`\n📖 Migration guide: ${CLERK_MIGRATION_DOC_URL}`);
36
- console.error(`\nAfter migration, remove the Clerk environment variables and ${action}.`);
37
- console.error('═'.repeat(70) + '\n');
38
- process.exit(1);
39
- }
40
- }
41
-
42
- module.exports = { checkDeprecatedClerkEnv };
@@ -1,137 +0,0 @@
1
- import debug from 'debug';
2
- import { type NextRequest, NextResponse } from 'next/server';
3
-
4
- import { serverDBEnv } from '@/config/db';
5
- import { serverDB } from '@/database/server';
6
- import { dateKeys } from '@/libs/next-auth/adapter';
7
- import { NextAuthUserService } from '@/server/services/nextAuthUser';
8
-
9
- const log = debug('lobe-next-auth:api:auth:adapter');
10
-
11
- /**
12
- * @description Process the db query for the NextAuth adapter.
13
- * Returns the db query result directly and let NextAuth handle the raw results.
14
- * @returns {
15
- * success: boolean; // Only return false if the database query fails or the action is invalid.
16
- * data?: any;
17
- * error?: string;
18
- * }
19
- */
20
- export async function POST(req: NextRequest) {
21
- try {
22
- // try validate the request
23
- if (
24
- !req.headers.get('Authorization') ||
25
- req.headers.get('Authorization')?.trim() !== `Bearer ${serverDBEnv.KEY_VAULTS_SECRET}`
26
- ) {
27
- log('Unauthorized request, missing or invalid Authorization header');
28
- return NextResponse.json({ error: 'Unauthorized', success: false }, { status: 401 });
29
- }
30
-
31
- // Parse the request body
32
- const data = await req.json();
33
- log('Received request data:', data);
34
- // Preprocess
35
- if (data?.data) {
36
- for (const key of dateKeys) {
37
- if (data?.data && data.data[key]) {
38
- data.data[key] = new Date(data.data[key]);
39
- continue;
40
- }
41
- }
42
- }
43
- const service = new NextAuthUserService(serverDB);
44
- let result;
45
- switch (data.action) {
46
- case 'createAuthenticator': {
47
- result = await service.createAuthenticator(data.data);
48
- break;
49
- }
50
- case 'createSession': {
51
- result = await service.createSession(data.data);
52
- break;
53
- }
54
- case 'createUser': {
55
- result = await service.createUser(data.data);
56
- break;
57
- }
58
- case 'createVerificationToken': {
59
- result = await service.createVerificationToken(data.data);
60
- break;
61
- }
62
- case 'deleteSession': {
63
- result = await service.deleteSession(data.data);
64
- break;
65
- }
66
- case 'deleteUser': {
67
- result = await service.deleteUser(data.data);
68
- break;
69
- }
70
- case 'getAccount': {
71
- result = await service.getAccount(data.data.providerAccountId, data.data.provider);
72
- break;
73
- }
74
- case 'getAuthenticator': {
75
- result = await service.getAuthenticator(data.data);
76
- break;
77
- }
78
- case 'getSessionAndUser': {
79
- result = await service.getSessionAndUser(data.data);
80
- break;
81
- }
82
- case 'getUser': {
83
- result = await service.getUser(data.data);
84
- break;
85
- }
86
- case 'getUserByAccount': {
87
- result = await service.getUserByAccount(data.data);
88
- break;
89
- }
90
- case 'getUserByEmail': {
91
- result = await service.getUserByEmail(data.data);
92
- break;
93
- }
94
- case 'linkAccount': {
95
- result = await service.linkAccount(data.data);
96
- break;
97
- }
98
- case 'listAuthenticatorsByUserId': {
99
- result = await service.listAuthenticatorsByUserId(data.data);
100
- break;
101
- }
102
- case 'unlinkAccount': {
103
- result = await service.unlinkAccount(data.data);
104
- break;
105
- }
106
- case 'updateAuthenticatorCounter': {
107
- result = await service.updateAuthenticatorCounter(
108
- data.data.credentialID,
109
- data.data.counter,
110
- );
111
- break;
112
- }
113
- case 'updateSession': {
114
- result = await service.updateSession(data.data);
115
- break;
116
- }
117
- case 'updateUser': {
118
- result = await service.updateUser(data.data);
119
- break;
120
- }
121
- case 'useVerificationToken': {
122
- result = await service.useVerificationToken(data.data);
123
- break;
124
- }
125
- default: {
126
- return NextResponse.json({ error: 'Invalid action', success: false }, { status: 400 });
127
- }
128
- }
129
- return NextResponse.json({ data: result, success: true });
130
- } catch (error) {
131
- log('Error processing request:');
132
- log(error);
133
- return NextResponse.json({ error, success: false }, { status: 400 });
134
- }
135
- }
136
-
137
- export const runtime = 'nodejs';
@@ -1,40 +0,0 @@
1
- 'use client';
2
-
3
- import { signIn } from 'next-auth/react';
4
- import { useSearchParams } from '@/libs/next/navigation';
5
- import { memo } from 'react';
6
-
7
- import ErrorCapture from '@/components/Error';
8
-
9
- enum ErrorEnum {
10
- AccessDenied = 'AccessDenied',
11
- Configuration = 'Configuration',
12
- Default = 'Default',
13
- Verification = 'Verification',
14
- }
15
-
16
- const errorMap = {
17
- [ErrorEnum.Configuration]:
18
- 'Wrong configuration, make sure you have the correct environment variables set. Visit https://lobehub.com/docs/self-hosting/advanced/authentication for more details.',
19
- [ErrorEnum.AccessDenied]:
20
- 'Access was denied. Visit https://authjs.dev/reference/core/errors#accessdenied for more details. ',
21
- [ErrorEnum.Verification]:
22
- 'Verification error, visit https://authjs.dev/reference/core/errors#verification for more details.',
23
- [ErrorEnum.Default]:
24
- 'There was a problem when trying to authenticate. Visit https://authjs.dev/reference/core/errors for more details.',
25
- };
26
-
27
- export default memo(() => {
28
- const search = useSearchParams();
29
- const error = search.get('error') as ErrorEnum;
30
- const props = {
31
- error: {
32
- cause: error,
33
- message: errorMap[error] || 'Unknown error type.',
34
- name: 'NextAuth Error',
35
- },
36
- reset: () => signIn(undefined, { callbackUrl: '/' }),
37
- };
38
- console.log('[NextAuth] Error:', props.error);
39
- return <ErrorCapture {...props} />;
40
- });
@@ -1,11 +0,0 @@
1
- import { Suspense } from 'react';
2
-
3
- import Loading from '@/components/Loading/BrandTextLoading';
4
-
5
- import AuthErrorPage from './AuthErrorPage';
6
-
7
- export default () => (
8
- <Suspense fallback={<Loading debugId="Auth > Error" />}>
9
- <AuthErrorPage />
10
- </Suspense>
11
- );