better-auth 0.4.1 → 0.4.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/.DS_Store ADDED
Binary file
@@ -1,7 +1,7 @@
1
- import { A as Adapter } from '../index-C6jmDLjB.js';
1
+ import { A as Adapter } from '../index-C-85i2-P.js';
2
2
  import 'zod';
3
3
  import 'kysely';
4
- import '../types-Bs23H3QM.js';
4
+ import '../types-DoyeJ_dw.js';
5
5
  import 'arctic';
6
6
  import '../helper-DPDj8Nix.js';
7
7
  import 'better-call';
@@ -1,8 +1,8 @@
1
1
  import { Db } from 'mongodb';
2
- import { W as Where } from '../index-C6jmDLjB.js';
2
+ import { W as Where } from '../index-C-85i2-P.js';
3
3
  import 'zod';
4
4
  import 'kysely';
5
- import '../types-Bs23H3QM.js';
5
+ import '../types-DoyeJ_dw.js';
6
6
  import 'arctic';
7
7
  import '../helper-DPDj8Nix.js';
8
8
  import 'better-call';
@@ -1,7 +1,7 @@
1
- import { A as Adapter } from '../index-C6jmDLjB.js';
1
+ import { A as Adapter } from '../index-C-85i2-P.js';
2
2
  import 'zod';
3
3
  import 'kysely';
4
- import '../types-Bs23H3QM.js';
4
+ import '../types-DoyeJ_dw.js';
5
5
  import 'arctic';
6
6
  import '../helper-DPDj8Nix.js';
7
7
  import 'better-call';
package/dist/api.d.ts CHANGED
@@ -1,9 +1,9 @@
1
- export { e as AuthEndpoint, f as AuthMiddleware, v as callbackOAuth, T as changePassword, d as createAuthEndpoint, c as createAuthMiddleware, M as createEmailVerificationToken, $ as csrfMiddleware, V as deleteUser, Y as error, J as forgetPassword, K as forgetPasswordCallback, X as getCSRFToken, r as getEndpoints, w as getSession, x as getSessionFromCtx, z as listSessions, Z as ok, o as optionsMiddleware, L as resetPassword, C as revokeSession, D as revokeSessions, s as router, N as sendVerificationEmail, y as sessionMiddleware, U as setPassword, u as signInEmail, t as signInOAuth, E as signOut, _ as signUpEmail, Q as updateUser, O as verifyEmail } from './index-C6jmDLjB.js';
1
+ export { e as AuthEndpoint, f as AuthMiddleware, v as callbackOAuth, T as changePassword, d as createAuthEndpoint, c as createAuthMiddleware, M as createEmailVerificationToken, $ as csrfMiddleware, V as deleteUser, Y as error, J as forgetPassword, K as forgetPasswordCallback, X as getCSRFToken, r as getEndpoints, w as getSession, x as getSessionFromCtx, z as listSessions, Z as ok, o as optionsMiddleware, L as resetPassword, C as revokeSession, D as revokeSessions, s as router, N as sendVerificationEmail, y as sessionMiddleware, U as setPassword, u as signInEmail, t as signInOAuth, E as signOut, _ as signUpEmail, Q as updateUser, O as verifyEmail } from './index-C-85i2-P.js';
2
2
  import './helper-DPDj8Nix.js';
3
3
  import 'zod';
4
4
  export { APIError } from 'better-call';
5
5
  import 'kysely';
6
- import './types-Bs23H3QM.js';
6
+ import './types-DoyeJ_dw.js';
7
7
  import 'arctic';
8
8
  import 'better-sqlite3';
9
9
  import 'mysql2';
package/dist/api.js CHANGED
@@ -104,9 +104,10 @@ import { generateCodeVerifier } from "oslo/oauth2";
104
104
  import { z as z4 } from "zod";
105
105
 
106
106
  // src/social-providers/apple.ts
107
- import "arctic";
108
107
  import { parseJWT } from "oslo/jwt";
109
- import "@better-fetch/fetch";
108
+
109
+ // src/social-providers/utils.ts
110
+ import { OAuth2Tokens } from "arctic";
110
111
 
111
112
  // src/error/better-auth-error.ts
112
113
  var BetterAuthError = class extends Error {
@@ -119,9 +120,6 @@ var BetterAuthError = class extends Error {
119
120
  }
120
121
  };
121
122
 
122
- // src/social-providers/utils.ts
123
- import { OAuth2Tokens } from "arctic";
124
-
125
123
  // src/utils/base-url.ts
126
124
  function checkHasPath(url) {
127
125
  try {
@@ -198,7 +196,15 @@ function generateCodeChallenge(codeVerifier) {
198
196
  includePadding: false
199
197
  });
200
198
  }
201
- function createAuthorizationURL(id, options, authorizationEndpoint, state, codeVerifier, scopes, disablePkce) {
199
+ function createAuthorizationURL({
200
+ id,
201
+ options,
202
+ authorizationEndpoint,
203
+ state,
204
+ codeVerifier,
205
+ scopes,
206
+ disablePkce
207
+ }) {
202
208
  const url = new URL(authorizationEndpoint);
203
209
  url.searchParams.set("response_type", "code");
204
210
  url.searchParams.set("client_id", options.clientId);
@@ -208,7 +214,7 @@ function createAuthorizationURL(id, options, authorizationEndpoint, state, codeV
208
214
  "redirect_uri",
209
215
  options.redirectURI || getRedirectURI(id)
210
216
  );
211
- if (!disablePkce) {
217
+ if (!disablePkce && codeVerifier) {
212
218
  const codeChallenge = generateCodeChallenge(codeVerifier);
213
219
  url.searchParams.set("code_challenge_method", "S256");
214
220
  url.searchParams.set("code_challenge", codeChallenge);
@@ -256,7 +262,7 @@ var apple = (options) => {
256
262
  };
257
263
 
258
264
  // src/social-providers/discord.ts
259
- import { betterFetch as betterFetch3 } from "@better-fetch/fetch";
265
+ import { betterFetch as betterFetch2 } from "@better-fetch/fetch";
260
266
  var discord = (options) => {
261
267
  return {
262
268
  id: "discord",
@@ -280,7 +286,7 @@ var discord = (options) => {
280
286
  });
281
287
  },
282
288
  async getUserInfo(token) {
283
- const { data: profile, error: error2 } = await betterFetch3(
289
+ const { data: profile, error: error2 } = await betterFetch2(
284
290
  "https://discord.com/api/users/@me",
285
291
  {
286
292
  headers: {
@@ -313,20 +319,21 @@ var discord = (options) => {
313
319
  };
314
320
 
315
321
  // src/social-providers/facebook.ts
316
- import { betterFetch as betterFetch4 } from "@better-fetch/fetch";
317
- import { Facebook } from "arctic";
322
+ import { betterFetch as betterFetch3 } from "@better-fetch/fetch";
318
323
  var facebook = (options) => {
319
- const facebookArctic = new Facebook(
320
- options.clientId,
321
- options.clientSecret,
322
- getRedirectURI("facebook", options.redirectURI)
323
- );
324
324
  return {
325
325
  id: "facebook",
326
326
  name: "Facebook",
327
- createAuthorizationURL({ state, scopes }) {
327
+ createAuthorizationURL({ state, scopes, codeVerifier }) {
328
328
  const _scopes = options.scope || scopes || ["email", "public_profile"];
329
- return facebookArctic.createAuthorizationURL(state, _scopes);
329
+ return createAuthorizationURL({
330
+ id: "facebook",
331
+ options,
332
+ authorizationEndpoint: "https://www.facebook.com/v16.0/dialog/oauth",
333
+ scopes: _scopes,
334
+ state,
335
+ codeVerifier
336
+ });
330
337
  },
331
338
  validateAuthorizationCode: async (code, codeVerifier, redirectURI) => {
332
339
  return validateAuthorizationCode({
@@ -338,7 +345,7 @@ var facebook = (options) => {
338
345
  });
339
346
  },
340
347
  async getUserInfo(token) {
341
- const { data: profile, error: error2 } = await betterFetch4(
348
+ const { data: profile, error: error2 } = await betterFetch3(
342
349
  "https://graph.facebook.com/me",
343
350
  {
344
351
  auth: {
@@ -364,21 +371,22 @@ var facebook = (options) => {
364
371
  };
365
372
 
366
373
  // src/social-providers/github.ts
367
- import { betterFetch as betterFetch5 } from "@better-fetch/fetch";
368
- import { GitHub } from "arctic";
374
+ import { betterFetch as betterFetch4 } from "@better-fetch/fetch";
369
375
  var github = (options) => {
370
- const githubArctic = new GitHub(
371
- options.clientId,
372
- options.clientSecret,
373
- getRedirectURI("github", options.redirectURI)
374
- );
375
376
  const tokenEndpoint = "https://github.com/login/oauth/access_token";
376
377
  return {
377
378
  id: "github",
378
379
  name: "Github",
379
- createAuthorizationURL({ state, scopes }) {
380
+ createAuthorizationURL({ state, scopes, codeVerifier }) {
380
381
  const _scopes = options.scope || scopes || ["user:email"];
381
- return githubArctic.createAuthorizationURL(state, _scopes);
382
+ return createAuthorizationURL({
383
+ id: "github",
384
+ options,
385
+ authorizationEndpoint: "https://github.com/login/oauth/authorize",
386
+ scopes: _scopes,
387
+ state,
388
+ codeVerifier
389
+ });
382
390
  },
383
391
  validateAuthorizationCode: async (code, _, redirect) => {
384
392
  return validateAuthorizationCode({
@@ -389,7 +397,7 @@ var github = (options) => {
389
397
  });
390
398
  },
391
399
  async getUserInfo(token) {
392
- const { data: profile, error: error2 } = await betterFetch5(
400
+ const { data: profile, error: error2 } = await betterFetch4(
393
401
  "https://api.github.com/user",
394
402
  {
395
403
  auth: {
@@ -403,7 +411,7 @@ var github = (options) => {
403
411
  }
404
412
  let emailVerified = false;
405
413
  if (!profile.email) {
406
- const { data, error: error3 } = await betterFetch5("https://api.github.com/user/emails", {
414
+ const { data, error: error3 } = await betterFetch4("https://api.github.com/user/emails", {
407
415
  auth: {
408
416
  type: "Bearer",
409
417
  token: token.accessToken()
@@ -429,7 +437,6 @@ var github = (options) => {
429
437
  };
430
438
 
431
439
  // src/social-providers/google.ts
432
- import { Google } from "arctic";
433
440
  import { parseJWT as parseJWT2 } from "oslo/jwt";
434
441
 
435
442
  // src/utils/logger.ts
@@ -476,11 +483,6 @@ var logger = createLogger();
476
483
 
477
484
  // src/social-providers/google.ts
478
485
  var google = (options) => {
479
- const googleArctic = new Google(
480
- options.clientId,
481
- options.clientSecret,
482
- getRedirectURI("google", options.redirectURI)
483
- );
484
486
  return {
485
487
  id: "google",
486
488
  name: "Google",
@@ -495,11 +497,14 @@ var google = (options) => {
495
497
  throw new BetterAuthError("codeVerifier is required for Google");
496
498
  }
497
499
  const _scopes = options.scope || scopes || ["email", "profile"];
498
- const url = googleArctic.createAuthorizationURL(
500
+ const url = createAuthorizationURL({
501
+ id: "google",
502
+ options,
503
+ authorizationEndpoint: "https://accounts.google.com/o/oauth2/auth",
504
+ scopes: _scopes,
499
505
  state,
500
- codeVerifier,
501
- _scopes
502
- );
506
+ codeVerifier
507
+ });
503
508
  return url;
504
509
  },
505
510
  validateAuthorizationCode: async (code, codeVerifier, redirectURI) => {
@@ -531,7 +536,7 @@ var google = (options) => {
531
536
  };
532
537
 
533
538
  // src/social-providers/microsoft-entra-id.ts
534
- import { betterFetch as betterFetch6 } from "@better-fetch/fetch";
539
+ import { betterFetch as betterFetch5 } from "@better-fetch/fetch";
535
540
  import { parseJWT as parseJWT3 } from "oslo/jwt";
536
541
  var microsoft = (options) => {
537
542
  const tenant = options.tenantId || "common";
@@ -542,14 +547,14 @@ var microsoft = (options) => {
542
547
  name: "Microsoft EntraID",
543
548
  createAuthorizationURL(data) {
544
549
  const scopes = options.scope || data.scopes || ["openid", "profile", "email", "User.Read"];
545
- return createAuthorizationURL(
546
- "microsoft",
550
+ return createAuthorizationURL({
551
+ id: "microsoft",
547
552
  options,
548
553
  authorizationEndpoint,
549
- data.state,
550
- data.codeVerifier,
554
+ state: data.state,
555
+ codeVerifier: data.codeVerifier,
551
556
  scopes
552
- );
557
+ });
553
558
  },
554
559
  validateAuthorizationCode(code, codeVerifier, redirectURI) {
555
560
  return validateAuthorizationCode({
@@ -563,7 +568,7 @@ var microsoft = (options) => {
563
568
  async getUserInfo(token) {
564
569
  const user = parseJWT3(token.idToken())?.payload;
565
570
  const profilePhotoSize = options.profilePhotoSize || 48;
566
- await betterFetch6(
571
+ await betterFetch5(
567
572
  `https://graph.microsoft.com/v1.0/me/photos/${profilePhotoSize}x${profilePhotoSize}/$value`,
568
573
  {
569
574
  headers: {
@@ -599,20 +604,21 @@ var microsoft = (options) => {
599
604
  };
600
605
 
601
606
  // src/social-providers/spotify.ts
602
- import { betterFetch as betterFetch7 } from "@better-fetch/fetch";
603
- import { Spotify } from "arctic";
607
+ import { betterFetch as betterFetch6 } from "@better-fetch/fetch";
604
608
  var spotify = (options) => {
605
- const spotifyArctic = new Spotify(
606
- options.clientId,
607
- options.clientSecret,
608
- getRedirectURI("spotify", options.redirectURI)
609
- );
610
609
  return {
611
610
  id: "spotify",
612
611
  name: "Spotify",
613
- createAuthorizationURL({ state, scopes }) {
612
+ createAuthorizationURL({ state, scopes, codeVerifier }) {
614
613
  const _scopes = options.scope || scopes || ["user-read-email"];
615
- return spotifyArctic.createAuthorizationURL(state, _scopes);
614
+ return createAuthorizationURL({
615
+ id: "spotify",
616
+ options,
617
+ authorizationEndpoint: "https://accounts.spotify.com/authorize",
618
+ scopes: _scopes,
619
+ state,
620
+ codeVerifier
621
+ });
616
622
  },
617
623
  validateAuthorizationCode: async (code, codeVerifier, redirectURI) => {
618
624
  return validateAuthorizationCode({
@@ -624,7 +630,7 @@ var spotify = (options) => {
624
630
  });
625
631
  },
626
632
  async getUserInfo(token) {
627
- const { data: profile, error: error2 } = await betterFetch7(
633
+ const { data: profile, error: error2 } = await betterFetch6(
628
634
  "https://api.spotify.com/v1/me",
629
635
  {
630
636
  method: "GET",
@@ -651,20 +657,20 @@ var spotify = (options) => {
651
657
  };
652
658
 
653
659
  // src/social-providers/twitch.ts
654
- import { betterFetch as betterFetch8 } from "@better-fetch/fetch";
655
- import { Twitch } from "arctic";
660
+ import { betterFetch as betterFetch7 } from "@better-fetch/fetch";
656
661
  var twitch = (options) => {
657
- const twitchArctic = new Twitch(
658
- options.clientId,
659
- options.clientSecret,
660
- getRedirectURI("twitch", options.redirectURI)
661
- );
662
662
  return {
663
663
  id: "twitch",
664
664
  name: "Twitch",
665
665
  createAuthorizationURL({ state, scopes }) {
666
666
  const _scopes = options.scope || scopes || ["activity:write", "read"];
667
- return twitchArctic.createAuthorizationURL(state, _scopes);
667
+ return createAuthorizationURL({
668
+ id: "twitch",
669
+ options,
670
+ authorizationEndpoint: "https://id.twitch.tv/oauth2/authorize",
671
+ scopes: _scopes,
672
+ state
673
+ });
668
674
  },
669
675
  validateAuthorizationCode: async (code, codeVerifier, redirectURI) => {
670
676
  return validateAuthorizationCode({
@@ -675,7 +681,7 @@ var twitch = (options) => {
675
681
  });
676
682
  },
677
683
  async getUserInfo(token) {
678
- const { data: profile, error: error2 } = await betterFetch8(
684
+ const { data: profile, error: error2 } = await betterFetch7(
679
685
  "https://api.twitch.tv/helix/users",
680
686
  {
681
687
  method: "GET",
@@ -702,24 +708,21 @@ var twitch = (options) => {
702
708
  };
703
709
 
704
710
  // src/social-providers/twitter.ts
705
- import { betterFetch as betterFetch9 } from "@better-fetch/fetch";
706
- import { Twitter } from "arctic";
711
+ import { betterFetch as betterFetch8 } from "@better-fetch/fetch";
707
712
  var twitter = (options) => {
708
- const twitterArctic = new Twitter(
709
- options.clientId,
710
- options.clientSecret,
711
- getRedirectURI("twitter", options.redirectURI)
712
- );
713
713
  return {
714
714
  id: "twitter",
715
715
  name: "Twitter",
716
716
  createAuthorizationURL(data) {
717
717
  const _scopes = options.scope || data.scopes || ["account_info.read"];
718
- return twitterArctic.createAuthorizationURL(
719
- data.state,
720
- data.codeVerifier,
721
- _scopes
722
- );
718
+ return createAuthorizationURL({
719
+ id: "twitter",
720
+ options,
721
+ authorizationEndpoint: "https://twitter.com/i/oauth2/authorize",
722
+ scopes: _scopes,
723
+ state: data.state,
724
+ codeVerifier: data.codeVerifier
725
+ });
723
726
  },
724
727
  validateAuthorizationCode: async (code, codeVerifier, redirectURI) => {
725
728
  return validateAuthorizationCode({
@@ -731,7 +734,7 @@ var twitter = (options) => {
731
734
  });
732
735
  },
733
736
  async getUserInfo(token) {
734
- const { data: profile, error: error2 } = await betterFetch9(
737
+ const { data: profile, error: error2 } = await betterFetch8(
735
738
  "https://api.x.com/2/users/me?user.fields=profile_image_url",
736
739
  {
737
740
  method: "GET",
package/dist/cli.js CHANGED
@@ -2,7 +2,6 @@
2
2
 
3
3
  // src/cli/index.ts
4
4
  import { Command as Command3 } from "commander";
5
- import "dotenv/config";
6
5
 
7
6
  // src/cli/commands/migrate.ts
8
7
  import { Command } from "commander";
@@ -267,7 +266,7 @@ var createKyselyAdapter = async (config) => {
267
266
  };
268
267
 
269
268
  // src/cli/commands/migrate.ts
270
- import ora from "ora";
269
+ import yoctoSpinner from "yocto-spinner";
271
270
  import chalk from "chalk";
272
271
  import prompts from "prompts";
273
272
 
@@ -726,7 +725,7 @@ var migrate = new Command("migrate").option(
726
725
  );
727
726
  process.exit(1);
728
727
  }
729
- const spinner = ora("preparing migration...").start();
728
+ const spinner = yoctoSpinner({ text: "preparing migration..." }).start();
730
729
  const { toBeAdded, toBeCreated, runMigrations } = await getMigrations(config);
731
730
  if (!toBeAdded.length && !toBeCreated.length) {
732
731
  spinner.stop();
@@ -766,7 +765,7 @@ import { Command as Command2 } from "commander";
766
765
  import { z as z2 } from "zod";
767
766
  import { existsSync as existsSync3 } from "fs";
768
767
  import path4 from "path";
769
- import ora2 from "ora";
768
+ import yoctoSpinner2 from "yocto-spinner";
770
769
  import prompts2 from "prompts";
771
770
 
772
771
  // src/adapters/kysely-adapter/index.ts
@@ -1105,7 +1104,7 @@ var generate = new Command2("generate").option(
1105
1104
  );
1106
1105
  return;
1107
1106
  }
1108
- const spinner = ora2("preparing schema...").start();
1107
+ const spinner = yoctoSpinner2({ text: "preparing schema..." }).start();
1109
1108
  const adapter = await getAdapter(config, true).catch((e) => {
1110
1109
  logger.error(e.message);
1111
1110
  process.exit(1);
@@ -2,13 +2,13 @@ import * as nanostores from 'nanostores';
2
2
  import { A as AccessControl, S as StatementsPrimitive, R as Role } from '../statement-CfnyN34h.js';
3
3
  import * as _better_fetch_fetch from '@better-fetch/fetch';
4
4
  import { BetterFetchOption } from '@better-fetch/fetch';
5
- import { o as organization, j as Organization, M as Member, I as Invitation, u as username, m as magicLink, d as phoneNumber, e as anonymous, i as admin } from '../index-DCBFTxDp.js';
6
- export { g as getPasskeyActions, c as passkeyClient, a as twoFactorClient } from '../index-DCBFTxDp.js';
5
+ import { o as organization, j as Organization, M as Member, I as Invitation, u as username, m as magicLink, d as phoneNumber, e as anonymous, i as admin } from '../index-BOgQnoz7.js';
6
+ export { g as getPasskeyActions, c as passkeyClient, a as twoFactorClient } from '../index-BOgQnoz7.js';
7
7
  import { P as Prettify } from '../helper-DPDj8Nix.js';
8
- import { F as FieldAttribute, B as BetterAuthOptions, b as BetterAuthPlugin } from '../index-C6jmDLjB.js';
8
+ import { F as FieldAttribute, B as BetterAuthOptions, b as BetterAuthPlugin } from '../index-C-85i2-P.js';
9
9
  import * as better_call from 'better-call';
10
10
  import { z } from 'zod';
11
- import { U as User } from '../types-Bs23H3QM.js';
11
+ import { U as User } from '../types-DoyeJ_dw.js';
12
12
  import { OAuth2Tokens } from 'arctic';
13
13
  import '@simplewebauthn/types';
14
14
  import 'kysely';
package/dist/client.d.ts CHANGED
@@ -6,9 +6,9 @@ import { BetterFetch, BetterFetchError, BetterFetchOption } from '@better-fetch/
6
6
  import { U as UnionToIntersection, P as Prettify, S as StripEmptyObjects } from './helper-DPDj8Nix.js';
7
7
  import { ClientOptions, InferClientAPI, InferActions, InferAdditionalFromClient, InferSessionFromClient, InferUserFromClient, BetterAuthClientPlugin, IsSignal } from './types.js';
8
8
  export { AtomListener, InferPluginsFromClient } from './types.js';
9
- import './index-C6jmDLjB.js';
9
+ import './index-C-85i2-P.js';
10
10
  import 'kysely';
11
- import './types-Bs23H3QM.js';
11
+ import './types-DoyeJ_dw.js';
12
12
  import 'arctic';
13
13
  import 'better-call';
14
14
  import 'better-sqlite3';
@@ -1,11 +1,11 @@
1
- import { U as User, S as Session } from './types-Bs23H3QM.js';
1
+ import { U as User, S as Session } from './types-DoyeJ_dw.js';
2
2
  import * as better_call from 'better-call';
3
3
  import { z, ZodObject, ZodOptional, ZodArray, ZodLiteral } from 'zod';
4
4
  import { P as Prettify } from './helper-DPDj8Nix.js';
5
5
  import { A as AccessControl, R as Role, S as StatementsPrimitive, g as defaultRoles } from './statement-CfnyN34h.js';
6
6
  import * as _better_fetch_fetch from '@better-fetch/fetch';
7
7
  import { BetterFetch, BetterFetchOption } from '@better-fetch/fetch';
8
- import { H as HookEndpointContext, g as AuthContext } from './index-C6jmDLjB.js';
8
+ import { H as HookEndpointContext, g as AuthContext } from './index-C-85i2-P.js';
9
9
  import * as nanostores from 'nanostores';
10
10
  import { atom } from 'nanostores';
11
11
  import * as _simplewebauthn_types from '@simplewebauthn/types';
@@ -1,7 +1,7 @@
1
1
  import * as zod from 'zod';
2
2
  import { ZodSchema, z, ZodString, ZodOptional, ZodObject } from 'zod';
3
3
  import { Kysely, Migration, PostgresPool, Dialect } from 'kysely';
4
- import { O as OAuthProvider, U as User, S as Session, a as SocialProviders, A as Account, b as OAuthProviderList, V as Verification } from './types-Bs23H3QM.js';
4
+ import { O as OAuthProvider, U as User, S as Session, a as SocialProviders, A as Account, b as OAuthProviderList, V as Verification } from './types-DoyeJ_dw.js';
5
5
  import * as better_call from 'better-call';
6
6
  import { ContextTools, CookieOptions, Endpoint, EndpointResponse, Context, Prettify as Prettify$1 } from 'better-call';
7
7
  import { L as LiteralString, D as DeepPartial, U as UnionToIntersection, S as StripEmptyObjects, P as Prettify } from './helper-DPDj8Nix.js';
package/dist/index.d.ts CHANGED
@@ -1,7 +1,7 @@
1
- export { a as Auth, a0 as betterAuth } from './index-C6jmDLjB.js';
1
+ export { a as Auth, a0 as betterAuth } from './index-C-85i2-P.js';
2
2
  import 'zod';
3
3
  import 'kysely';
4
- import './types-Bs23H3QM.js';
4
+ import './types-DoyeJ_dw.js';
5
5
  import 'arctic';
6
6
  import './helper-DPDj8Nix.js';
7
7
  import 'better-call';