@supabase/auth-js
Version:
Official client library for Supabase Auth
1,298 lines (1,159 loc) • 37.3 kB
text/typescript
import { AuthError } from './errors'
import { Fetch } from './fetch'
import type { SolanaSignInInput, SolanaSignInOutput } from './solana'
/** One of the providers supported by GoTrue. */
export type Provider =
| 'apple'
| 'azure'
| 'bitbucket'
| 'discord'
| 'facebook'
| 'figma'
| 'github'
| 'gitlab'
| 'google'
| 'kakao'
| 'keycloak'
| 'linkedin'
| 'linkedin_oidc'
| 'notion'
| 'slack'
| 'slack_oidc'
| 'spotify'
| 'twitch'
| 'twitter'
| 'workos'
| 'zoom'
| 'fly'
export type AuthChangeEventMFA = 'MFA_CHALLENGE_VERIFIED'
export type AuthChangeEvent =
| 'INITIAL_SESSION'
| 'PASSWORD_RECOVERY'
| 'SIGNED_IN'
| 'SIGNED_OUT'
| 'TOKEN_REFRESHED'
| 'USER_UPDATED'
| AuthChangeEventMFA
/**
* Provide your own global lock implementation instead of the default
* implementation. The function should acquire a lock for the duration of the
* `fn` async function, such that no other client instances will be able to
* hold it at the same time.
*
* @experimental
*
* @param name Name of the lock to be acquired.
* @param acquireTimeout If negative, no timeout should occur. If positive it
* should throw an Error with an `isAcquireTimeout`
* property set to true if the operation fails to be
* acquired after this much time (ms).
* @param fn The operation to execute when the lock is acquired.
*/
export type LockFunc = <R>(name: string, acquireTimeout: number, fn: () => Promise<R>) => Promise<R>
export type GoTrueClientOptions = {
/* The URL of the GoTrue server. */
url?: string
/* Any additional headers to send to the GoTrue server. */
headers?: { [key: string]: string }
/* Optional key name used for storing tokens in local storage. */
storageKey?: string
/* Set to "true" if you want to automatically detects OAuth grants in the URL and signs in the user. */
detectSessionInUrl?: boolean
/* Set to "true" if you want to automatically refresh the token before expiring. */
autoRefreshToken?: boolean
/* Set to "true" if you want to automatically save the user session into local storage. If set to false, session will just be saved in memory. */
persistSession?: boolean
/* Provide your own local storage implementation to use instead of the browser's local storage. */
storage?: SupportedStorage
/**
* Stores the user object in a separate storage location from the rest of the session data. When non-null, `storage` will only store a JSON object containing the access and refresh token and some adjacent metadata, while `userStorage` will only contain the user object under the key `storageKey + '-user'`.
*
* When this option is set and cookie storage is used, `getSession()` and other functions that load a session from the cookie store might not return back a user. It's very important to always use `getUser()` to fetch a user object in those scenarios.
*
* @experimental
*/
userStorage?: SupportedStorage
/* A custom fetch implementation. */
fetch?: Fetch
/* If set to 'pkce' PKCE flow. Defaults to the 'implicit' flow otherwise */
flowType?: AuthFlowType
/* If debug messages are emitted. Can be used to inspect the behavior of the library. If set to a function, the provided function will be used instead of `console.log()` to perform the logging. */
debug?: boolean | ((message: string, ...args: any[]) => void)
/**
* Provide your own locking mechanism based on the environment. By default no locking is done at this time.
*
* @experimental
*/
lock?: LockFunc
/**
* Set to "true" if there is a custom authorization header set globally.
* @experimental
*/
hasCustomAuthorizationHeader?: boolean
}
export type WeakPasswordReasons = 'length' | 'characters' | 'pwned' | (string & {})
export type WeakPassword = {
reasons: WeakPasswordReasons[]
message: string
}
export type AuthResponse =
| {
data: {
user: User | null
session: Session | null
}
error: null
}
| {
data: {
user: null
session: null
}
error: AuthError
}
export type AuthResponsePassword =
| {
data: {
user: User | null
session: Session | null
weak_password?: WeakPassword | null
}
error: null
}
| {
data: {
user: null
session: null
}
error: AuthError
}
/**
* AuthOtpResponse is returned when OTP is used.
*
* {@see AuthResponse}
*/
export type AuthOtpResponse =
| {
data: { user: null; session: null; messageId?: string | null }
error: null
}
| {
data: { user: null; session: null; messageId?: string | null }
error: AuthError
}
export type AuthTokenResponse =
| {
data: {
user: User
session: Session
}
error: null
}
| {
data: {
user: null
session: null
}
error: AuthError
}
export type AuthTokenResponsePassword =
| {
data: {
user: User
session: Session
weakPassword?: WeakPassword
}
error: null
}
| {
data: {
user: null
session: null
weakPassword?: null
}
error: AuthError
}
export type OAuthResponse =
| {
data: {
provider: Provider
url: string
}
error: null
}
| {
data: {
provider: Provider
url: null
}
error: AuthError
}
export type SSOResponse =
| {
data: {
/**
* URL to open in a browser which will complete the sign-in flow by
* taking the user to the identity provider's authentication flow.
*
* On browsers you can set the URL to `window.location.href` to take
* the user to the authentication flow.
*/
url: string
}
error: null
}
| {
data: null
error: AuthError
}
export type UserResponse =
| {
data: {
user: User
}
error: null
}
| {
data: {
user: null
}
error: AuthError
}
export interface Session {
/**
* The oauth provider token. If present, this can be used to make external API requests to the oauth provider used.
*/
provider_token?: string | null
/**
* The oauth provider refresh token. If present, this can be used to refresh the provider_token via the oauth provider's API.
* Not all oauth providers return a provider refresh token. If the provider_refresh_token is missing, please refer to the oauth provider's documentation for information on how to obtain the provider refresh token.
*/
provider_refresh_token?: string | null
/**
* The access token jwt. It is recommended to set the JWT_EXPIRY to a shorter expiry value.
*/
access_token: string
/**
* A one-time used refresh token that never expires.
*/
refresh_token: string
/**
* The number of seconds until the token expires (since it was issued). Returned when a login is confirmed.
*/
expires_in: number
/**
* A timestamp of when the token will expire. Returned when a login is confirmed.
*/
expires_at?: number
token_type: string
/**
* When using a separate user storage, accessing properties of this object will throw an error.
*/
user: User
}
/**
* An authentication methord reference (AMR) entry.
*
* An entry designates what method was used by the user to verify their
* identity and at what time.
*
* @see {@link GoTrueMFAApi#getAuthenticatorAssuranceLevel}.
*/
export interface AMREntry {
/** Authentication method name. */
method: 'password' | 'otp' | 'oauth' | 'mfa/totp' | (string & {})
/**
* Timestamp when the method was successfully used. Represents number of
* seconds since 1st January 1970 (UNIX epoch) in UTC.
*/
timestamp: number
}
export interface UserIdentity {
id: string
user_id: string
identity_data?: {
[key: string]: any
}
identity_id: string
provider: string
created_at?: string
last_sign_in_at?: string
updated_at?: string
}
/**
* A MFA factor.
*
* @see {@link GoTrueMFAApi#enroll}
* @see {@link GoTrueMFAApi#listFactors}
* @see {@link GoTrueMFAAdminApi#listFactors}
*/
export interface Factor {
/** ID of the factor. */
id: string
/** Friendly name of the factor, useful to disambiguate between multiple factors. */
friendly_name?: string
/**
* Type of factor. `totp` and `phone` supported with this version
*/
factor_type: 'totp' | 'phone' | (string & {})
/** Factor's status. */
status: 'verified' | 'unverified'
created_at: string
updated_at: string
}
export interface UserAppMetadata {
provider?: string
[key: string]: any
}
export interface UserMetadata {
[key: string]: any
}
export interface User {
id: string
app_metadata: UserAppMetadata
user_metadata: UserMetadata
aud: string
confirmation_sent_at?: string
recovery_sent_at?: string
email_change_sent_at?: string
new_email?: string
new_phone?: string
invited_at?: string
action_link?: string
email?: string
phone?: string
created_at: string
confirmed_at?: string
email_confirmed_at?: string
phone_confirmed_at?: string
last_sign_in_at?: string
role?: string
updated_at?: string
identities?: UserIdentity[]
is_anonymous?: boolean
is_sso_user?: boolean
factors?: Factor[]
deleted_at?: string
}
export interface UserAttributes {
/**
* The user's email.
*/
email?: string
/**
* The user's phone.
*/
phone?: string
/**
* The user's password.
*/
password?: string
/**
* The nonce sent for reauthentication if the user's password is to be updated.
*
* Call reauthenticate() to obtain the nonce first.
*/
nonce?: string
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*
*/
data?: object
}
export interface AdminUserAttributes extends Omit<UserAttributes, 'data'> {
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
*
* The `user_metadata` should be a JSON object that includes user-specific info, such as their first and last name.
*
* Note: When using the GoTrueAdminApi and wanting to modify a user's metadata,
* this attribute is used instead of UserAttributes data.
*
*/
user_metadata?: object
/**
* A custom data object to store the user's application specific metadata. This maps to the `auth.users.app_metadata` column.
*
* Only a service role can modify.
*
* The `app_metadata` should be a JSON object that includes app-specific info, such as identity providers, roles, and other
* access control information.
*/
app_metadata?: object
/**
* Confirms the user's email address if set to true.
*
* Only a service role can modify.
*/
email_confirm?: boolean
/**
* Confirms the user's phone number if set to true.
*
* Only a service role can modify.
*/
phone_confirm?: boolean
/**
* Determines how long a user is banned for.
*
* The format for the ban duration follows a strict sequence of decimal numbers with a unit suffix.
* Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h".
*
* For example, some possible durations include: '300ms', '2h45m'.
*
* Setting the ban duration to 'none' lifts the ban on the user.
*/
ban_duration?: string | 'none'
/**
* The `role` claim set in the user's access token JWT.
*
* When a user signs up, this role is set to `authenticated` by default. You should only modify the `role` if you need to provision several levels of admin access that have different permissions on individual columns in your database.
*
* Setting this role to `service_role` is not recommended as it grants the user admin privileges.
*/
role?: string
/**
* The `password_hash` for the user's password.
*
* Allows you to specify a password hash for the user. This is useful for migrating a user's password hash from another service.
*
* Supports bcrypt, scrypt (firebase), and argon2 password hashes.
*/
password_hash?: string
/**
* The `id` for the user.
*
* Allows you to overwrite the default `id` set for the user.
*/
id?: string
}
export interface Subscription {
/**
* The subscriber UUID. This will be set by the client.
*/
id: string
/**
* The function to call every time there is an event. eg: (eventName) => {}
*/
callback: (event: AuthChangeEvent, session: Session | null) => void
/**
* Call this to remove the listener.
*/
unsubscribe: () => void
}
export type SignInAnonymouslyCredentials = {
options?: {
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
export type SignUpWithPasswordCredentials =
| {
/** The user's email address. */
email: string
/** The user's password. */
password: string
options?: {
/** The redirect url embedded in the email link */
emailRedirectTo?: string
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
| {
/** The user's phone number. */
phone: string
/** The user's password. */
password: string
options?: {
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object
/** Verification token received when the user completes the captcha on the site. Requires a configured WhatsApp sender on Twilio */
captchaToken?: string
/** Messaging channel to use (e.g. whatsapp or sms) */
channel?: 'sms' | 'whatsapp'
}
}
export type SignInWithPasswordCredentials =
| {
/** The user's email address. */
email: string
/** The user's password. */
password: string
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
| {
/** The user's phone number. */
phone: string
/** The user's password. */
password: string
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
export type SignInWithPasswordlessCredentials =
| {
/** The user's email address. */
email: string
options?: {
/** The redirect url embedded in the email link */
emailRedirectTo?: string
/** If set to false, this method will not create a new user. Defaults to true. */
shouldCreateUser?: boolean
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
| {
/** The user's phone number. */
phone: string
options?: {
/** If set to false, this method will not create a new user. Defaults to true. */
shouldCreateUser?: boolean
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
/** Messaging channel to use (e.g. whatsapp or sms) */
channel?: 'sms' | 'whatsapp'
}
}
export type AuthFlowType = 'implicit' | 'pkce'
export type SignInWithOAuthCredentials = {
/** One of the providers supported by GoTrue. */
provider: Provider
options?: {
/** A URL to send the user to after they are confirmed. */
redirectTo?: string
/** A space-separated list of scopes granted to the OAuth application. */
scopes?: string
/** An object of query params */
queryParams?: { [key: string]: string }
/** If set to true does not immediately redirect the current browser context to visit the OAuth authorization page for the provider. */
skipBrowserRedirect?: boolean
}
}
export type SignInWithIdTokenCredentials = {
/** Provider name or OIDC `iss` value identifying which provider should be used to verify the provided token. Supported names: `google`, `apple`, `azure`, `facebook`, `kakao`, `keycloak` (deprecated). */
provider: 'google' | 'apple' | 'azure' | 'facebook' | 'kakao' | (string & {})
/** OIDC ID token issued by the specified provider. The `iss` claim in the ID token must match the supplied provider. Some ID tokens contain an `at_hash` which require that you provide an `access_token` value to be accepted properly. If the token contains a `nonce` claim you must supply the nonce used to obtain the ID token. */
token: string
/** If the ID token contains an `at_hash` claim, then the hash of this value is compared to the value in the ID token. */
access_token?: string
/** If the ID token contains a `nonce` claim, then the hash of this value is compared to the value in the ID token. */
nonce?: string
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
export type SolanaWallet = {
signIn?: (...inputs: SolanaSignInInput[]) => Promise<SolanaSignInOutput | SolanaSignInOutput[]>
publicKey?: {
toBase58: () => string
} | null
signMessage?: (message: Uint8Array, encoding?: 'utf8' | string) => Promise<Uint8Array> | undefined
}
export type SolanaWeb3Credentials =
| {
chain: 'solana'
/** Wallet interface to use. If not specified will default to `window.solana`. */
wallet?: SolanaWallet
/** Optional statement to include in the Sign in with Solana message. Must not include new line characters. Most wallets like Phantom **require specifying a statement!** */
statement?: string
options?: {
/** URL to use with the wallet interface. Some wallets do not allow signing a message for URLs different from the current page. */
url?: string
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
signInWithSolana?: Partial<
Omit<SolanaSignInInput, 'version' | 'chain' | 'domain' | 'uri' | 'statement'>
>
}
}
| {
chain: 'solana'
/** Sign in with Solana compatible message. Must include `Issued At`, `URI` and `Version`. */
message: string
/** Ed25519 signature of the message. */
signature: Uint8Array
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
export type Web3Credentials = SolanaWeb3Credentials
export type VerifyOtpParams = VerifyMobileOtpParams | VerifyEmailOtpParams | VerifyTokenHashParams
export interface VerifyMobileOtpParams {
/** The user's phone number. */
phone: string
/** The otp sent to the user's phone number. */
token: string
/** The user's verification type. */
type: MobileOtpType
options?: {
/** A URL to send the user to after they are confirmed. */
redirectTo?: string
/**
* Verification token received when the user completes the captcha on the site.
*
* @deprecated
*/
captchaToken?: string
}
}
export interface VerifyEmailOtpParams {
/** The user's email address. */
email: string
/** The otp sent to the user's email address. */
token: string
/** The user's verification type. */
type: EmailOtpType
options?: {
/** A URL to send the user to after they are confirmed. */
redirectTo?: string
/** Verification token received when the user completes the captcha on the site.
*
* @deprecated
*/
captchaToken?: string
}
}
export interface VerifyTokenHashParams {
/** The token hash used in an email link */
token_hash: string
/** The user's verification type. */
type: EmailOtpType
}
export type MobileOtpType = 'sms' | 'phone_change'
export type EmailOtpType = 'signup' | 'invite' | 'magiclink' | 'recovery' | 'email_change' | 'email'
export type ResendParams =
| {
type: Extract<EmailOtpType, 'signup' | 'email_change'>
email: string
options?: {
/** A URL to send the user to after they have signed-in. */
emailRedirectTo?: string
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
| {
type: Extract<MobileOtpType, 'sms' | 'phone_change'>
phone: string
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
export type SignInWithSSO =
| {
/** UUID of the SSO provider to invoke single-sign on to. */
providerId: string
options?: {
/** A URL to send the user to after they have signed-in. */
redirectTo?: string
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
| {
/** Domain name of the organization for which to invoke single-sign on. */
domain: string
options?: {
/** A URL to send the user to after they have signed-in. */
redirectTo?: string
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string
}
}
export type GenerateSignupLinkParams = {
type: 'signup'
email: string
password: string
options?: Pick<GenerateLinkOptions, 'data' | 'redirectTo'>
}
export type GenerateInviteOrMagiclinkParams = {
type: 'invite' | 'magiclink'
/** The user's email */
email: string
options?: Pick<GenerateLinkOptions, 'data' | 'redirectTo'>
}
export type GenerateRecoveryLinkParams = {
type: 'recovery'
/** The user's email */
email: string
options?: Pick<GenerateLinkOptions, 'redirectTo'>
}
export type GenerateEmailChangeLinkParams = {
type: 'email_change_current' | 'email_change_new'
/** The user's email */
email: string
/**
* The user's new email. Only required if type is 'email_change_current' or 'email_change_new'.
*/
newEmail: string
options?: Pick<GenerateLinkOptions, 'redirectTo'>
}
export interface GenerateLinkOptions {
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object
/** The URL which will be appended to the email link generated. */
redirectTo?: string
}
export type GenerateLinkParams =
| GenerateSignupLinkParams
| GenerateInviteOrMagiclinkParams
| GenerateRecoveryLinkParams
| GenerateEmailChangeLinkParams
export type GenerateLinkResponse =
| {
data: {
properties: GenerateLinkProperties
user: User
}
error: null
}
| {
data: {
properties: null
user: null
}
error: AuthError
}
/** The properties related to the email link generated */
export type GenerateLinkProperties = {
/**
* The email link to send to the user.
* The action_link follows the following format: auth/v1/verify?type={verification_type}&token={hashed_token}&redirect_to={redirect_to}
* */
action_link: string
/**
* The raw email OTP.
* You should send this in the email if you want your users to verify using an OTP instead of the action link.
* */
email_otp: string
/**
* The hashed token appended to the action link.
* */
hashed_token: string
/** The URL appended to the action link. */
redirect_to: string
/** The verification type that the email link is associated to. */
verification_type: GenerateLinkType
}
export type GenerateLinkType =
| 'signup'
| 'invite'
| 'magiclink'
| 'recovery'
| 'email_change_current'
| 'email_change_new'
export type MFAEnrollParams = MFAEnrollTOTPParams | MFAEnrollPhoneParams
export type MFAUnenrollParams = {
/** ID of the factor being unenrolled. */
factorId: string
}
export type MFAVerifyParams = {
/** ID of the factor being verified. Returned in enroll(). */
factorId: string
/** ID of the challenge being verified. Returned in challenge(). */
challengeId: string
/** Verification code provided by the user. */
code: string
}
export type MFAChallengeParams = {
/** ID of the factor to be challenged. Returned in enroll(). */
factorId: string
/** Messaging channel to use (e.g. whatsapp or sms). Only relevant for phone factors */
channel?: 'sms' | 'whatsapp'
}
export type MFAChallengeAndVerifyParams = {
/** ID of the factor being verified. Returned in enroll(). */
factorId: string
/** Verification code provided by the user. */
code: string
}
export type AuthMFAVerifyResponse =
| {
data: {
/** New access token (JWT) after successful verification. */
access_token: string
/** Type of token, typically `Bearer`. */
token_type: string
/** Number of seconds in which the access token will expire. */
expires_in: number
/** Refresh token you can use to obtain new access tokens when expired. */
refresh_token: string
/** Updated user profile. */
user: User
}
error: null
}
| {
data: null
error: AuthError
}
export type AuthMFAEnrollResponse = AuthMFAEnrollTOTPResponse | AuthMFAEnrollPhoneResponse
export type AuthMFAUnenrollResponse =
| {
data: {
/** ID of the factor that was successfully unenrolled. */
id: string
}
error: null
}
| { data: null; error: AuthError }
export type AuthMFAChallengeResponse =
| {
data: {
/** ID of the newly created challenge. */
id: string
/** Factor Type which generated the challenge */
type: 'totp' | 'phone'
/** Timestamp in UNIX seconds when this challenge will no longer be usable. */
expires_at: number
}
error: null
}
| { data: null; error: AuthError }
export type AuthMFAListFactorsResponse =
| {
data: {
/** All available factors (verified and unverified). */
all: Factor[]
/** Only verified TOTP factors. (A subset of `all`.) */
totp: Factor[]
/** Only verified Phone factors. (A subset of `all`.) */
phone: Factor[]
}
error: null
}
| { data: null; error: AuthError }
export type AuthenticatorAssuranceLevels = 'aal1' | 'aal2'
export type AuthMFAGetAuthenticatorAssuranceLevelResponse =
| {
data: {
/** Current AAL level of the session. */
currentLevel: AuthenticatorAssuranceLevels | null
/**
* Next possible AAL level for the session. If the next level is higher
* than the current one, the user should go through MFA.
*
* @see {@link GoTrueMFAApi#challenge}
*/
nextLevel: AuthenticatorAssuranceLevels | null
/**
* A list of all authentication methods attached to this session. Use
* the information here to detect the last time a user verified a
* factor, for example if implementing a step-up scenario.
*/
currentAuthenticationMethods: AMREntry[]
}
error: null
}
| { data: null; error: AuthError }
/**
* Contains the full multi-factor authentication API.
*
*/
export interface GoTrueMFAApi {
/**
* Starts the enrollment process for a new Multi-Factor Authentication (MFA)
* factor. This method creates a new `unverified` factor.
* To verify a factor, present the QR code or secret to the user and ask them to add it to their
* authenticator app.
* The user has to enter the code from their authenticator app to verify it.
*
* Upon verifying a factor, all other sessions are logged out and the current session's authenticator level is promoted to `aal2`.
*
*/
enroll(params: MFAEnrollTOTPParams): Promise<AuthMFAEnrollTOTPResponse>
enroll(params: MFAEnrollPhoneParams): Promise<AuthMFAEnrollPhoneResponse>
enroll(params: MFAEnrollParams): Promise<AuthMFAEnrollResponse>
/**
* Prepares a challenge used to verify that a user has access to a MFA
* factor.
*/
challenge(params: MFAChallengeParams): Promise<AuthMFAChallengeResponse>
/**
* Verifies a code against a challenge. The verification code is
* provided by the user by entering a code seen in their authenticator app.
*/
verify(params: MFAVerifyParams): Promise<AuthMFAVerifyResponse>
/**
* Unenroll removes a MFA factor.
* A user has to have an `aal2` authenticator level in order to unenroll a `verified` factor.
*/
unenroll(params: MFAUnenrollParams): Promise<AuthMFAUnenrollResponse>
/**
* Helper method which creates a challenge and immediately uses the given code to verify against it thereafter. The verification code is
* provided by the user by entering a code seen in their authenticator app.
*/
challengeAndVerify(params: MFAChallengeAndVerifyParams): Promise<AuthMFAVerifyResponse>
/**
* Returns the list of MFA factors enabled for this user.
*
* @see {@link GoTrueMFAApi#enroll}
* @see {@link GoTrueMFAApi#getAuthenticatorAssuranceLevel}
* @see {@link GoTrueClient#getUser}
*
*/
listFactors(): Promise<AuthMFAListFactorsResponse>
/**
* Returns the Authenticator Assurance Level (AAL) for the active session.
*
* - `aal1` (or `null`) means that the user's identity has been verified only
* with a conventional login (email+password, OTP, magic link, social login,
* etc.).
* - `aal2` means that the user's identity has been verified both with a conventional login and at least one MFA factor.
*
* Although this method returns a promise, it's fairly quick (microseconds)
* and rarely uses the network. You can use this to check whether the current
* user needs to be shown a screen to verify their MFA factors.
*
*/
getAuthenticatorAssuranceLevel(): Promise<AuthMFAGetAuthenticatorAssuranceLevelResponse>
}
/**
* @expermental
*/
export type AuthMFAAdminDeleteFactorResponse =
| {
data: {
/** ID of the factor that was successfully deleted. */
id: string
}
error: null
}
| { data: null; error: AuthError }
/**
* @expermental
*/
export type AuthMFAAdminDeleteFactorParams = {
/** ID of the MFA factor to delete. */
id: string
/** ID of the user whose factor is being deleted. */
userId: string
}
/**
* @expermental
*/
export type AuthMFAAdminListFactorsResponse =
| {
data: {
/** All factors attached to the user. */
factors: Factor[]
}
error: null
}
| { data: null; error: AuthError }
/**
* @expermental
*/
export type AuthMFAAdminListFactorsParams = {
/** ID of the user. */
userId: string
}
/**
* Contains the full multi-factor authentication administration API.
*
* @expermental
*/
export interface GoTrueAdminMFAApi {
/**
* Lists all factors associated to a user.
*
*/
listFactors(params: AuthMFAAdminListFactorsParams): Promise<AuthMFAAdminListFactorsResponse>
/**
* Deletes a factor on a user. This will log the user out of all active
* sessions if the deleted factor was verified.
*
* @see {@link GoTrueMFAApi#unenroll}
*
* @expermental
*/
deleteFactor(params: AuthMFAAdminDeleteFactorParams): Promise<AuthMFAAdminDeleteFactorResponse>
}
type AnyFunction = (...args: any[]) => any
type MaybePromisify<T> = T | Promise<T>
type PromisifyMethods<T> = {
[K in keyof T]: T[K] extends AnyFunction
? (...args: Parameters<T[K]>) => MaybePromisify<ReturnType<T[K]>>
: T[K]
}
export type SupportedStorage = PromisifyMethods<
Pick<Storage, 'getItem' | 'setItem' | 'removeItem'>
> & {
/**
* If set to `true` signals to the library that the storage medium is used
* on a server and the values may not be authentic, such as reading from
* request cookies. Implementations should not set this to true if the client
* is used on a server that reads storage information from authenticated
* sources, such as a secure database or file.
*/
isServer?: boolean
}
export type InitializeResult = { error: AuthError | null }
export type CallRefreshTokenResult =
| {
session: Session
error: null
}
| {
session: null
error: AuthError
}
export type Pagination = {
[key: string]: any
nextPage: number | null
lastPage: number
total: number
}
export type PageParams = {
/** The page number */
page?: number
/** Number of items returned per page */
perPage?: number
}
export type SignOut = {
/**
* Determines which sessions should be
* logged out. Global means all
* sessions by this account. Local
* means only this session. Others
* means all other sessions except the
* current one. When using others,
* there is no sign-out event fired on
* the current session!
*/
scope?: 'global' | 'local' | 'others'
}
export type MFAEnrollTOTPParams = {
/** The type of factor being enrolled. */
factorType: 'totp'
/** Domain which the user is enrolled with. */
issuer?: string
/** Human readable name assigned to the factor. */
friendlyName?: string
}
export type MFAEnrollPhoneParams = {
/** The type of factor being enrolled. */
factorType: 'phone'
/** Human readable name assigned to the factor. */
friendlyName?: string
/** Phone number associated with a factor. Number should conform to E.164 format */
phone: string
}
export type AuthMFAEnrollTOTPResponse =
| {
data: {
/** ID of the factor that was just enrolled (in an unverified state). */
id: string
/** Type of MFA factor.*/
type: 'totp'
/** TOTP enrollment information. */
totp: {
/** Contains a QR code encoding the authenticator URI. You can
* convert it to a URL by prepending `data:image/svg+xml;utf-8,` to
* the value. Avoid logging this value to the console. */
qr_code: string
/** The TOTP secret (also encoded in the QR code). Show this secret
* in a password-style field to the user, in case they are unable to
* scan the QR code. Avoid logging this value to the console. */
secret: string
/** The authenticator URI encoded within the QR code, should you need
* to use it. Avoid loggin this value to the console. */
uri: string
}
/** Friendly name of the factor, useful for distinguishing between factors **/
friendly_name?: string
}
error: null
}
| {
data: null
error: AuthError
}
export type AuthMFAEnrollPhoneResponse =
| {
data: {
/** ID of the factor that was just enrolled (in an unverified state). */
id: string
/** Type of MFA factor. */
type: 'phone'
/** Friendly name of the factor, useful for distinguishing between factors **/
friendly_name?: string
/** Phone number of the MFA factor in E.164 format. Used to send messages */
phone: string
}
error: null
}
| {
data: null
error: AuthError
}
export type JwtHeader = {
alg: 'RS256' | 'ES256' | 'HS256'
kid: string
typ: string
}
export type RequiredClaims = {
iss: string
sub: string
aud: string | string[]
exp: number
iat: number
role: string
aal: AuthenticatorAssuranceLevels
session_id: string
}
export type JwtPayload = RequiredClaims & {
[key: string]: any
}
export interface JWK {
kty: 'RSA' | 'EC' | 'oct'
key_ops: string[]
alg?: string
kid?: string
[key: string]: any
}
export const SIGN_OUT_SCOPES = ['global', 'local', 'others'] as const
export type SignOutScope = typeof SIGN_OUT_SCOPES[number]