@supabase/auth-js
Version:
Official SDK for Supabase Auth
1,240 lines (1,239 loc) • 64.7 kB
TypeScript
import { AuthError } from './errors';
import { Fetch } from './fetch';
import { EIP1193Provider, EthereumSignInInput, Hex } from './web3/ethereum';
import type { SolanaSignInInput, SolanaSignInOutput } from './web3/solana';
import { ServerCredentialCreationOptions, ServerCredentialRequestOptions, WebAuthnApi } from './webauthn';
import { AuthenticationCredential, PublicKeyCredentialCreationOptionsFuture, PublicKeyCredentialRequestOptionsFuture, RegistrationCredential } from './webauthn.dom';
/** One of the providers supported by GoTrue. */
export type Provider = 'apple' | 'azure' | 'bitbucket' | 'discord' | 'facebook' | 'figma' | 'github' | 'gitlab' | 'google' | 'kakao' | 'keycloak' | 'linkedin' | 'linkedin_oidc' | 'notion' | 'slack' | 'slack_oidc' | 'spotify' | 'twitch'
/** Uses OAuth 1.0a */
| 'twitter'
/** Uses OAuth 2.0 */
| 'x' | 'workos' | 'zoom' | 'fly';
export type AuthChangeEventMFA = 'MFA_CHALLENGE_VERIFIED';
export type AuthChangeEvent = 'INITIAL_SESSION' | 'PASSWORD_RECOVERY' | 'SIGNED_IN' | 'SIGNED_OUT' | 'TOKEN_REFRESHED' | 'USER_UPDATED' | AuthChangeEventMFA;
/**
* Provide your own global lock implementation instead of the default
* implementation. The function should acquire a lock for the duration of the
* `fn` async function, such that no other client instances will be able to
* hold it at the same time.
*
* @experimental
*
* @param name Name of the lock to be acquired.
* @param acquireTimeout If negative, no timeout should occur. If positive it
* should throw an Error with an `isAcquireTimeout`
* property set to true if the operation fails to be
* acquired after this much time (ms).
* @param fn The operation to execute when the lock is acquired.
*/
export type LockFunc = <R>(name: string, acquireTimeout: number, fn: () => Promise<R>) => Promise<R>;
export type GoTrueClientOptions = {
url?: string;
headers?: {
[key: string]: string;
};
storageKey?: string;
/**
* Set to "true" if you want to automatically detect OAuth grants in the URL and sign in the user.
* Set to "false" to disable automatic detection.
* Set to a function to provide custom logic for determining if a URL contains a Supabase auth callback.
* The function receives the current URL and parsed parameters, and should return true if the URL
* should be processed as a Supabase auth callback, or false to ignore it.
*
* This is useful when your app uses other OAuth providers (e.g., Facebook Login) that also return
* access_token in the URL fragment, which would otherwise be incorrectly intercepted by Supabase Auth.
*
* @example
* ```ts
* detectSessionInUrl: (url, params) => {
* // Ignore Facebook OAuth redirects
* if (url.pathname === '/facebook/redirect') return false
* // Use default detection for other URLs
* return Boolean(params.access_token || params.error_description)
* }
* ```
*/
detectSessionInUrl?: boolean | ((url: URL, params: {
[parameter: string]: string;
}) => boolean);
autoRefreshToken?: boolean;
persistSession?: boolean;
storage?: SupportedStorage;
/**
* Stores the user object in a separate storage location from the rest of the session data. When non-null, `storage` will only store a JSON object containing the access and refresh token and some adjacent metadata, while `userStorage` will only contain the user object under the key `storageKey + '-user'`.
*
* When this option is set and cookie storage is used, `getSession()` and other functions that load a session from the cookie store might not return back a user. It's very important to always use `getUser()` to fetch a user object in those scenarios.
*
* @experimental
*/
userStorage?: SupportedStorage;
fetch?: Fetch;
flowType?: AuthFlowType;
debug?: boolean | ((message: string, ...args: any[]) => void);
/**
* Provide your own locking mechanism based on the environment. By default no locking is done at this time.
*
* @experimental
*/
lock?: LockFunc;
/**
* Set to "true" if there is a custom authorization header set globally.
* @experimental
*/
hasCustomAuthorizationHeader?: boolean;
/**
* If there is an error with the query, throwOnError will reject the promise by
* throwing the error instead of returning it as part of a successful response.
*/
throwOnError?: boolean;
/**
* The maximum time in milliseconds to wait for acquiring a cross-tab synchronization lock.
*
* When multiple browser tabs or windows use the auth client simultaneously, they coordinate
* via the Web Locks API to prevent race conditions during session refresh and other operations.
* This timeout controls how long to wait for the lock before failing.
*
* If the lock cannot be acquired within this time, a `LockAcquireTimeoutError` is thrown.
* You can catch this by checking `error.isAcquireTimeout === true`.
*
* - **Positive value**: Wait up to this many milliseconds before timing out
* - **Zero (0)**: Fail immediately if the lock is unavailable
* - **Negative value**: Wait indefinitely (not recommended - can cause deadlocks)
*
* @default 10000
*
* @example
* ```ts
* const client = createClient(url, key, {
* auth: {
* lockAcquireTimeout: 10000, // 10 seconds
* },
* })
*
* try {
* await client.auth.getSession()
* } catch (error) {
* if (error.isAcquireTimeout) {
* // Lock held by another tab/instance, or a previous operation is stuck.
* // Consider: closing other tabs, increasing timeout, or restarting the browser.
* console.error('Could not acquire lock within timeout period.')
* }
* }
* ```
*/
lockAcquireTimeout?: number;
};
declare const WeakPasswordReasons: readonly ["length", "characters", "pwned"];
export type WeakPasswordReasons = (typeof WeakPasswordReasons)[number];
export type WeakPassword = {
reasons: WeakPasswordReasons[];
message: string;
};
/**
* Resolve mapped types and show the derived keys and their types when hovering in
* VS Code, instead of just showing the names those mapped types are defined with.
*/
export type Prettify<T> = T extends Function ? T : {
[K in keyof T]: T[K];
};
/**
* A stricter version of TypeScript's Omit that only allows omitting keys that actually exist.
* This prevents typos and ensures type safety at compile time.
* Unlike regular Omit, this will error if you try to omit a non-existent key.
*/
export type StrictOmit<T, K extends keyof T> = Omit<T, K>;
/**
* a shared result type that encapsulates errors instead of throwing them, allows you to optionally specify the ErrorType
*/
export type RequestResult<T, ErrorType extends Error = AuthError> = {
data: T;
error: null;
} | {
data: null;
error: Error extends AuthError ? AuthError : ErrorType;
};
/**
* similar to RequestResult except it allows you to destructure the possible shape of the success response
* {@see RequestResult}
*/
export type RequestResultSafeDestructure<T> = {
data: T;
error: null;
} | {
data: T extends object ? {
[K in keyof T]: null;
} : null;
error: AuthError;
};
export type AuthResponse = RequestResultSafeDestructure<{
user: User | null;
session: Session | null;
}>;
export type AuthResponsePassword = RequestResultSafeDestructure<{
user: User | null;
session: Session | null;
weak_password?: WeakPassword | null;
}>;
/**
* AuthOtpResponse is returned when OTP is used.
*
* {@see AuthResponse}
*/
export type AuthOtpResponse = RequestResultSafeDestructure<{
user: null;
session: null;
messageId?: string | null;
}>;
export type AuthTokenResponse = RequestResultSafeDestructure<{
user: User;
session: Session;
}>;
export type AuthTokenResponsePassword = RequestResultSafeDestructure<{
user: User;
session: Session;
weakPassword?: WeakPassword;
}>;
export type OAuthResponse = {
data: {
provider: Provider;
url: string;
};
error: null;
} | {
data: {
provider: Provider;
url: null;
};
error: AuthError;
};
export type SSOResponse = RequestResult<{
/**
* URL to open in a browser which will complete the sign-in flow by
* taking the user to the identity provider's authentication flow.
*
* On browsers you can set the URL to `window.location.href` to take
* the user to the authentication flow.
*/
url: string;
}>;
export type UserResponse = RequestResultSafeDestructure<{
user: User;
}>;
export interface Session {
/**
* The oauth provider token. If present, this can be used to make external API requests to the oauth provider used.
*/
provider_token?: string | null;
/**
* The oauth provider refresh token. If present, this can be used to refresh the provider_token via the oauth provider's API.
* Not all oauth providers return a provider refresh token. If the provider_refresh_token is missing, please refer to the oauth provider's documentation for information on how to obtain the provider refresh token.
*/
provider_refresh_token?: string | null;
/**
* The access token jwt. It is recommended to set the JWT_EXPIRY to a shorter expiry value.
*/
access_token: string;
/**
* A one-time used refresh token that never expires.
*/
refresh_token: string;
/**
* The number of seconds until the token expires (since it was issued). Returned when a login is confirmed.
*/
expires_in: number;
/**
* A timestamp of when the token will expire. Returned when a login is confirmed.
*/
expires_at?: number;
token_type: 'bearer';
/**
* When using a separate user storage, accessing properties of this object will throw an error.
*/
user: User;
}
declare const AMRMethods: readonly ["password", "otp", "oauth", "totp", "mfa/totp", "mfa/phone", "mfa/webauthn", "anonymous", "sso/saml", "magiclink", "web3", "oauth_provider/authorization_code"];
export type AMRMethod = (typeof AMRMethods)[number] | (string & {});
/**
* An authentication method reference (AMR) entry.
*
* An entry designates what method was used by the user to verify their
* identity and at what time.
*
* Note: Custom access token hooks can return AMR claims as either:
* - An array of AMREntry objects (detailed format with timestamps)
* - An array of strings (RFC-8176 compliant format)
*
* @see {@link GoTrueMFAApi#getAuthenticatorAssuranceLevel}.
*/
export interface AMREntry {
/** Authentication method name. */
method: AMRMethod;
/**
* Timestamp when the method was successfully used. Represents number of
* seconds since 1st January 1970 (UNIX epoch) in UTC.
*/
timestamp: number;
}
export interface UserIdentity {
id: string;
user_id: string;
identity_data?: {
[key: string]: any;
};
identity_id: string;
provider: string;
created_at?: string;
last_sign_in_at?: string;
updated_at?: string;
}
declare const FactorTypes: readonly ["totp", "phone", "webauthn"];
/**
* Type of factor. `totp` and `phone` supported with this version
*/
export type FactorType = (typeof FactorTypes)[number];
declare const FactorVerificationStatuses: readonly ["verified", "unverified"];
/**
* The verification status of the factor, default is `unverified` after `.enroll()`, then `verified` after the user verifies it with `.verify()`
*/
type FactorVerificationStatus = (typeof FactorVerificationStatuses)[number];
/**
* A MFA factor.
*
* @see {@link GoTrueMFAApi#enroll}
* @see {@link GoTrueMFAApi#listFactors}
* @see {@link GoTrueMFAAdminApi#listFactors}
*/
export type Factor<Type extends FactorType = FactorType, Status extends FactorVerificationStatus = (typeof FactorVerificationStatuses)[number]> = {
/** ID of the factor. */
id: string;
/** Friendly name of the factor, useful to disambiguate between multiple factors. */
friendly_name?: string;
/**
* Type of factor. `totp` and `phone` supported with this version
*/
factor_type: Type;
/**
* The verification status of the factor, default is `unverified` after `.enroll()`, then `verified` after the user verifies it with `.verify()`
*/
status: Status;
created_at: string;
updated_at: string;
last_challenged_at?: string;
};
export interface UserAppMetadata {
/**
* The first provider that the user used to sign up with.
*/
provider?: string;
/**
* A list of all providers that the user has linked to their account.
*/
providers?: string[];
[key: string]: any;
}
export interface UserMetadata {
[key: string]: any;
}
export interface User {
id: string;
app_metadata: UserAppMetadata;
user_metadata: UserMetadata;
aud: string;
confirmation_sent_at?: string;
recovery_sent_at?: string;
email_change_sent_at?: string;
new_email?: string;
new_phone?: string;
invited_at?: string;
action_link?: string;
email?: string;
phone?: string;
created_at: string;
confirmed_at?: string;
email_confirmed_at?: string;
phone_confirmed_at?: string;
last_sign_in_at?: string;
role?: string;
updated_at?: string;
identities?: UserIdentity[];
is_anonymous?: boolean;
is_sso_user?: boolean;
factors?: (Factor<FactorType, 'verified'> | Factor<FactorType, 'unverified'>)[];
deleted_at?: string;
banned_until?: string;
}
export interface UserAttributes {
/**
* The user's email.
*/
email?: string;
/**
* The user's phone.
*/
phone?: string;
/**
* The user's password.
*/
password?: string;
/**
* The nonce sent for reauthentication if the user's password is to be updated.
*
* Call reauthenticate() to obtain the nonce first.
*/
nonce?: string;
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*
*/
data?: object;
}
export interface AdminUserAttributes extends Omit<UserAttributes, 'data'> {
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
*
* The `user_metadata` should be a JSON object that includes user-specific info, such as their first and last name.
*
* Note: When using the GoTrueAdminApi and wanting to modify a user's metadata,
* this attribute is used instead of UserAttributes data.
*
*/
user_metadata?: object;
/**
* A custom data object to store the user's application specific metadata. This maps to the `auth.users.app_metadata` column.
*
* Only a service role can modify.
*
* The `app_metadata` should be a JSON object that includes app-specific info, such as identity providers, roles, and other
* access control information.
*/
app_metadata?: object;
/**
* Sets the user's email as confirmed when true, or unconfirmed when false.
*
* Only a service role can modify.
*/
email_confirm?: boolean;
/**
* Sets the user's phone as confirmed when true, or unconfirmed when false.
*
* Only a service role can modify.
*/
phone_confirm?: boolean;
/**
* Determines how long a user is banned for.
*
* The format for the ban duration follows a strict sequence of decimal numbers with a unit suffix.
* Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h".
*
* For example, some possible durations include: '300ms', '2h45m'.
*
* Setting the ban duration to 'none' lifts the ban on the user.
*/
ban_duration?: string | 'none';
/**
* The `role` claim set in the user's access token JWT.
*
* When a user signs up, this role is set to `authenticated` by default. You should only modify the `role` if you need to provision several levels of admin access that have different permissions on individual columns in your database.
*
* Setting this role to `service_role` is not recommended as it grants the user admin privileges.
*/
role?: string;
/**
* The `password_hash` for the user's password.
*
* Allows you to specify a password hash for the user. This is useful for migrating a user's password hash from another service.
*
* Supports bcrypt, scrypt (firebase), and argon2 password hashes.
*/
password_hash?: string;
/**
* The `id` for the user.
*
* Allows you to overwrite the default `id` set for the user.
*/
id?: string;
}
export interface Subscription {
/**
* A unique identifier for this subscription, set by the client.
* This is an internal identifier used for managing callbacks and should not be
* relied upon by application code. Use the unsubscribe() method to remove listeners.
*/
id: string | symbol;
/**
* The function to call every time there is an event. eg: (eventName) => {}
*/
callback: (event: AuthChangeEvent, session: Session | null) => void;
/**
* Call this to remove the listener.
*/
unsubscribe: () => void;
}
export type SignInAnonymouslyCredentials = {
options?: {
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object;
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
};
};
export type SignUpWithPasswordCredentials = Prettify<PasswordCredentialsBase & {
options?: {
emailRedirectTo?: string;
data?: object;
captchaToken?: string;
channel?: 'sms' | 'whatsapp';
};
}>;
type PasswordCredentialsBase = {
email: string;
password: string;
} | {
phone: string;
password: string;
};
export type SignInWithPasswordCredentials = PasswordCredentialsBase & {
options?: {
captchaToken?: string;
};
};
export type SignInWithPasswordlessCredentials = {
/** The user's email address. */
email: string;
options?: {
/** The redirect url embedded in the email link */
emailRedirectTo?: string;
/** If set to false, this method will not create a new user. Defaults to true. */
shouldCreateUser?: boolean;
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object;
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
};
} | {
/** The user's phone number. */
phone: string;
options?: {
/** If set to false, this method will not create a new user. Defaults to true. */
shouldCreateUser?: boolean;
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object;
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
/** Messaging channel to use (e.g. whatsapp or sms) */
channel?: 'sms' | 'whatsapp';
};
};
export type AuthFlowType = 'implicit' | 'pkce';
export type SignInWithOAuthCredentials = {
/** One of the providers supported by GoTrue. */
provider: Provider;
options?: {
/** A URL to send the user to after they are confirmed. */
redirectTo?: string;
/** A space-separated list of scopes granted to the OAuth application. */
scopes?: string;
/** An object of query params */
queryParams?: {
[key: string]: string;
};
/** If set to true does not immediately redirect the current browser context to visit the OAuth authorization page for the provider. */
skipBrowserRedirect?: boolean;
};
};
export type SignInWithIdTokenCredentials = {
/** Provider name or OIDC `iss` value identifying which provider should be used to verify the provided token. Supported names: `google`, `apple`, `azure`, `facebook`, `kakao`, `keycloak` (deprecated). */
provider: 'google' | 'apple' | 'azure' | 'facebook' | 'kakao' | (string & {});
/** OIDC ID token issued by the specified provider. The `iss` claim in the ID token must match the supplied provider. Some ID tokens contain an `at_hash` which require that you provide an `access_token` value to be accepted properly. If the token contains a `nonce` claim you must supply the nonce used to obtain the ID token. */
token: string;
/** If the ID token contains an `at_hash` claim, then the hash of this value is compared to the value in the ID token. */
access_token?: string;
/** If the ID token contains a `nonce` claim, then the hash of this value is compared to the value in the ID token. */
nonce?: string;
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
};
};
export type SolanaWallet = {
signIn?: (...inputs: SolanaSignInInput[]) => Promise<SolanaSignInOutput | SolanaSignInOutput[]>;
publicKey?: {
toBase58: () => string;
} | null;
signMessage?: (message: Uint8Array, encoding?: 'utf8' | string) => Promise<Uint8Array> | undefined;
};
export type SolanaWeb3Credentials = {
chain: 'solana';
/** Wallet interface to use. If not specified will default to `window.solana`. */
wallet?: SolanaWallet;
/** Optional statement to include in the Sign in with Solana message. Must not include new line characters. Most wallets like Phantom **require specifying a statement!** */
statement?: string;
options?: {
/** URL to use with the wallet interface. Some wallets do not allow signing a message for URLs different from the current page. */
url?: string;
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
signInWithSolana?: Partial<Omit<SolanaSignInInput, 'version' | 'chain' | 'domain' | 'uri' | 'statement'>>;
};
} | {
chain: 'solana';
/** Sign in with Solana compatible message. Must include `Issued At`, `URI` and `Version`. */
message: string;
/** Ed25519 signature of the message. */
signature: Uint8Array;
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
};
};
export type EthereumWallet = EIP1193Provider;
export type EthereumWeb3Credentials = {
chain: 'ethereum';
/** Wallet interface to use. If not specified will default to `window.ethereum`. */
wallet?: EthereumWallet;
/** Optional statement to include in the Sign in with Ethereum message. Must not include new line characters. Most wallets like Phantom **require specifying a statement!** */
statement?: string;
options?: {
/** URL to use with the wallet interface. Some wallets do not allow signing a message for URLs different from the current page. */
url?: string;
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
signInWithEthereum?: Partial<Omit<EthereumSignInInput, 'version' | 'domain' | 'uri' | 'statement'>>;
};
} | {
chain: 'ethereum';
/** Sign in with Ethereum compatible message. Must include `Issued At`, `URI` and `Version`. */
message: string;
/** Ethereum curve (secp256k1) signature of the message. */
signature: Hex;
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
};
};
export type Web3Credentials = SolanaWeb3Credentials | EthereumWeb3Credentials;
export type VerifyOtpParams = VerifyMobileOtpParams | VerifyEmailOtpParams | VerifyTokenHashParams;
export interface VerifyMobileOtpParams {
/** The user's phone number. */
phone: string;
/** The otp sent to the user's phone number. */
token: string;
/** The user's verification type. */
type: MobileOtpType;
options?: {
/** A URL to send the user to after they are confirmed. */
redirectTo?: string;
/**
* Verification token received when the user completes the captcha on the site.
*
* @deprecated
*/
captchaToken?: string;
};
}
export interface VerifyEmailOtpParams {
/** The user's email address. */
email: string;
/** The otp sent to the user's email address. */
token: string;
/** The user's verification type. */
type: EmailOtpType;
options?: {
/** A URL to send the user to after they are confirmed. */
redirectTo?: string;
/** Verification token received when the user completes the captcha on the site.
*
* @deprecated
*/
captchaToken?: string;
};
}
export interface VerifyTokenHashParams {
/** The token hash used in an email link */
token_hash: string;
/** The user's verification type. */
type: EmailOtpType;
}
export type MobileOtpType = 'sms' | 'phone_change';
export type EmailOtpType = 'signup' | 'invite' | 'magiclink' | 'recovery' | 'email_change' | 'email';
export type ResendParams = {
type: Extract<EmailOtpType, 'signup' | 'email_change'>;
email: string;
options?: {
/** A URL to send the user to after they have signed-in. */
emailRedirectTo?: string;
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
};
} | {
type: Extract<MobileOtpType, 'sms' | 'phone_change'>;
phone: string;
options?: {
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
};
};
export type SignInWithSSO = {
/** UUID of the SSO provider to invoke single-sign on to. */
providerId: string;
options?: {
/** A URL to send the user to after they have signed-in. */
redirectTo?: string;
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
/**
* If set to true, the redirect will not happen on the client side.
* This parameter is used when you wish to handle the redirect yourself.
* Defaults to false.
*/
skipBrowserRedirect?: boolean;
};
} | {
/** Domain name of the organization for which to invoke single-sign on. */
domain: string;
options?: {
/** A URL to send the user to after they have signed-in. */
redirectTo?: string;
/** Verification token received when the user completes the captcha on the site. */
captchaToken?: string;
/**
* If set to true, the redirect will not happen on the client side.
* This parameter is used when you wish to handle the redirect yourself.
* Defaults to false.
*/
skipBrowserRedirect?: boolean;
};
};
export type GenerateSignupLinkParams = {
type: 'signup';
email: string;
password: string;
options?: Pick<GenerateLinkOptions, 'data' | 'redirectTo'>;
};
export type GenerateInviteOrMagiclinkParams = {
type: 'invite' | 'magiclink';
/** The user's email */
email: string;
options?: Pick<GenerateLinkOptions, 'data' | 'redirectTo'>;
};
export type GenerateRecoveryLinkParams = {
type: 'recovery';
/** The user's email */
email: string;
options?: Pick<GenerateLinkOptions, 'redirectTo'>;
};
export type GenerateEmailChangeLinkParams = {
type: 'email_change_current' | 'email_change_new';
/** The user's email */
email: string;
/**
* The user's new email. Only required if type is 'email_change_current' or 'email_change_new'.
*/
newEmail: string;
options?: Pick<GenerateLinkOptions, 'redirectTo'>;
};
export interface GenerateLinkOptions {
/**
* A custom data object to store the user's metadata. This maps to the `auth.users.raw_user_meta_data` column.
*
* The `data` should be a JSON object that includes user-specific info, such as their first and last name.
*/
data?: object;
/** The URL which will be appended to the email link generated. */
redirectTo?: string;
}
export type GenerateLinkParams = GenerateSignupLinkParams | GenerateInviteOrMagiclinkParams | GenerateRecoveryLinkParams | GenerateEmailChangeLinkParams;
export type GenerateLinkResponse = RequestResultSafeDestructure<{
properties: GenerateLinkProperties;
user: User;
}>;
/** The properties related to the email link generated */
export type GenerateLinkProperties = {
/**
* The email link to send to the user.
* The action_link follows the following format: auth/v1/verify?type={verification_type}&token={hashed_token}&redirect_to={redirect_to}
* */
action_link: string;
/**
* The raw email OTP.
* You should send this in the email if you want your users to verify using an OTP instead of the action link.
* */
email_otp: string;
/**
* The hashed token appended to the action link.
* */
hashed_token: string;
/** The URL appended to the action link. */
redirect_to: string;
/** The verification type that the email link is associated to. */
verification_type: GenerateLinkType;
};
export type GenerateLinkType = 'signup' | 'invite' | 'magiclink' | 'recovery' | 'email_change_current' | 'email_change_new';
export type MFAEnrollParams = MFAEnrollTOTPParams | MFAEnrollPhoneParams | MFAEnrollWebauthnParams;
export type MFAUnenrollParams = {
/** ID of the factor being unenrolled. */
factorId: string;
};
type MFAVerifyParamsBase = {
/** ID of the factor being verified. Returned in enroll(). */
factorId: string;
/** ID of the challenge being verified. Returned in challenge(). */
challengeId: string;
};
type MFAVerifyTOTPParamFields = {
/** Verification code provided by the user. */
code: string;
};
export type MFAVerifyTOTPParams = Prettify<MFAVerifyParamsBase & MFAVerifyTOTPParamFields>;
type MFAVerifyPhoneParamFields = MFAVerifyTOTPParamFields;
export type MFAVerifyPhoneParams = Prettify<MFAVerifyParamsBase & MFAVerifyPhoneParamFields>;
type MFAVerifyWebauthnParamFieldsBase = {
/** Relying party ID */
rpId: string;
/** Relying party origins */
rpOrigins?: string[];
};
type MFAVerifyWebauthnCredentialParamFields<T extends 'create' | 'request' = 'create' | 'request'> = {
/** Operation type */
type: T;
/** Creation response from the authenticator (for enrollment/unverified factors) */
credential_response: T extends 'create' ? RegistrationCredential : AuthenticationCredential;
};
/**
* WebAuthn-specific fields for MFA verification.
* Supports both credential creation (registration) and request (authentication) flows.
* @template T - Type of WebAuthn operation: 'create' for registration, 'request' for authentication
*/
export type MFAVerifyWebauthnParamFields<T extends 'create' | 'request' = 'create' | 'request'> = {
webauthn: MFAVerifyWebauthnParamFieldsBase & MFAVerifyWebauthnCredentialParamFields<T>;
};
/**
* Parameters for WebAuthn MFA verification.
* Used to verify WebAuthn credentials after challenge.
* @template T - Type of WebAuthn operation: 'create' for registration, 'request' for authentication
* @see {@link https://w3c.github.io/webauthn/#sctn-verifying-assertion W3C WebAuthn Spec - Verifying an Authentication Assertion}
*/
export type MFAVerifyWebauthnParams<T extends 'create' | 'request' = 'create' | 'request'> = Prettify<MFAVerifyParamsBase & MFAVerifyWebauthnParamFields<T>>;
export type MFAVerifyParams = MFAVerifyTOTPParams | MFAVerifyPhoneParams | MFAVerifyWebauthnParams;
type MFAChallengeParamsBase = {
/** ID of the factor to be challenged. Returned in enroll(). */
factorId: string;
};
declare const MFATOTPChannels: readonly ["sms", "whatsapp"];
export type MFATOTPChannel = (typeof MFATOTPChannels)[number];
export type MFAChallengeTOTPParams = Prettify<MFAChallengeParamsBase>;
type MFAChallengePhoneParamFields<Channel extends MFATOTPChannel = MFATOTPChannel> = {
/** Messaging channel to use (e.g. whatsapp or sms). Only relevant for phone factors */
channel: Channel;
};
export type MFAChallengePhoneParams = Prettify<MFAChallengeParamsBase & MFAChallengePhoneParamFields>;
/** WebAuthn parameters for WebAuthn factor challenge */
type MFAChallengeWebauthnParamFields = {
webauthn: {
/** Relying party ID */
rpId: string;
/** Relying party origins*/
rpOrigins?: string[];
};
};
/**
* Parameters for initiating a WebAuthn MFA challenge.
* Includes Relying Party information needed for WebAuthn ceremonies.
* @see {@link https://w3c.github.io/webauthn/#sctn-rp-operations W3C WebAuthn Spec - Relying Party Operations}
*/
export type MFAChallengeWebauthnParams = Prettify<MFAChallengeParamsBase & MFAChallengeWebauthnParamFields>;
export type MFAChallengeParams = MFAChallengeTOTPParams | MFAChallengePhoneParams | MFAChallengeWebauthnParams;
type MFAChallengeAndVerifyParamsBase = Omit<MFAVerifyParamsBase, 'challengeId'>;
type MFAChallengeAndVerifyTOTPParamFields = MFAVerifyTOTPParamFields;
type MFAChallengeAndVerifyTOTPParams = Prettify<MFAChallengeAndVerifyParamsBase & MFAChallengeAndVerifyTOTPParamFields>;
export type MFAChallengeAndVerifyParams = MFAChallengeAndVerifyTOTPParams;
/**
* Data returned after successful MFA verification.
* Contains new session tokens and updated user information.
*/
export type AuthMFAVerifyResponseData = {
/** New access token (JWT) after successful verification. */
access_token: string;
/** Type of token, always `bearer`. */
token_type: 'bearer';
/** Number of seconds in which the access token will expire. */
expires_in: number;
/** Refresh token you can use to obtain new access tokens when expired. */
refresh_token: string;
/** Updated user profile. */
user: User;
};
/**
* Response type for MFA verification operations.
* Returns session tokens on successful verification.
*/
export type AuthMFAVerifyResponse = RequestResult<AuthMFAVerifyResponseData>;
export type AuthMFAEnrollResponse = AuthMFAEnrollTOTPResponse | AuthMFAEnrollPhoneResponse | AuthMFAEnrollWebauthnResponse;
export type AuthMFAUnenrollResponse = RequestResult<{
/** ID of the factor that was successfully unenrolled. */
id: string;
}>;
type AuthMFAChallengeResponseBase<T extends FactorType> = {
/** ID of the newly created challenge. */
id: string;
/** Factor Type which generated the challenge */
type: T;
/** Timestamp in UNIX seconds when this challenge will no longer be usable. */
expires_at: number;
};
type AuthMFAChallengeTOTPResponseFields = {};
export type AuthMFAChallengeTOTPResponse = RequestResult<Prettify<AuthMFAChallengeResponseBase<'totp'> & AuthMFAChallengeTOTPResponseFields>>;
type AuthMFAChallengePhoneResponseFields = {};
export type AuthMFAChallengePhoneResponse = RequestResult<Prettify<AuthMFAChallengeResponseBase<'phone'> & AuthMFAChallengePhoneResponseFields>>;
type AuthMFAChallengeWebauthnResponseFields = {
webauthn: {
type: 'create';
credential_options: {
publicKey: PublicKeyCredentialCreationOptionsFuture;
};
} | {
type: 'request';
credential_options: {
publicKey: PublicKeyCredentialRequestOptionsFuture;
};
};
};
/**
* Response type for WebAuthn MFA challenge.
* Contains credential creation or request options from the server.
* @see {@link https://w3c.github.io/webauthn/#sctn-credential-creation W3C WebAuthn Spec - Credential Creation}
*/
export type AuthMFAChallengeWebauthnResponse = RequestResult<Prettify<AuthMFAChallengeResponseBase<'webauthn'> & AuthMFAChallengeWebauthnResponseFields>>;
type AuthMFAChallengeWebauthnResponseFieldsJSON = {
webauthn: {
type: 'create';
credential_options: {
publicKey: ServerCredentialCreationOptions;
};
} | {
type: 'request';
credential_options: {
publicKey: ServerCredentialRequestOptions;
};
};
};
/**
* JSON-serializable version of WebAuthn challenge response.
* Used for server communication with base64url-encoded binary fields.
*/
export type AuthMFAChallengeWebauthnResponseDataJSON = Prettify<AuthMFAChallengeResponseBase<'webauthn'> & AuthMFAChallengeWebauthnResponseFieldsJSON>;
/**
* Server response type for WebAuthn MFA challenge.
* Contains JSON-formatted WebAuthn options ready for browser API.
*/
export type AuthMFAChallengeWebauthnServerResponse = RequestResult<AuthMFAChallengeWebauthnResponseDataJSON>;
export type AuthMFAChallengeResponse = AuthMFAChallengeTOTPResponse | AuthMFAChallengePhoneResponse | AuthMFAChallengeWebauthnResponse;
/** response of ListFactors, which should contain all the types of factors that are available, this ensures we always include all */
export type AuthMFAListFactorsResponse<T extends typeof FactorTypes = typeof FactorTypes> = RequestResult<{
/** All available factors (verified and unverified). */
all: Prettify<Factor>[];
} & {
[K in T[number]]: Prettify<Factor<K, 'verified'>>[];
}>;
export type AuthenticatorAssuranceLevels = 'aal1' | 'aal2';
export type AuthMFAGetAuthenticatorAssuranceLevelResponse = RequestResult<{
/** Current AAL level of the session. */
currentLevel: AuthenticatorAssuranceLevels | null;
/**
* Next possible AAL level for the session. If the next level is higher
* than the current one, the user should go through MFA.
*
* @see {@link GoTrueMFAApi#challenge}
*/
nextLevel: AuthenticatorAssuranceLevels | null;
/**
* A list of all authentication methods attached to this session. Use
* the information here to detect the last time a user verified a
* factor, for example if implementing a step-up scenario.
*
* Supports both RFC-8176 compliant format (string[]) and detailed format (AMREntry[]).
* - String format: ['password', 'otp'] - RFC-8176 compliant
* - Object format: [{ method: 'password', timestamp: 1234567890 }] - includes timestamps
*/
currentAuthenticationMethods: AMREntry[] | string[];
}>;
/**
* Contains the full multi-factor authentication API.
*
*/
export interface GoTrueMFAApi {
/**
* Starts the enrollment process for a new Multi-Factor Authentication (MFA)
* factor. This method creates a new `unverified` factor.
* To verify a factor, present the QR code or secret to the user and ask them to add it to their
* authenticator app.
* The user has to enter the code from their authenticator app to verify it.
*
* Upon verifying a factor, all other sessions are logged out and the current session's authenticator level is promoted to `aal2`.
*/
enroll(params: MFAEnrollTOTPParams): Promise<AuthMFAEnrollTOTPResponse>;
enroll(params: MFAEnrollPhoneParams): Promise<AuthMFAEnrollPhoneResponse>;
enroll(params: MFAEnrollWebauthnParams): Promise<AuthMFAEnrollWebauthnResponse>;
enroll(params: MFAEnrollParams): Promise<AuthMFAEnrollResponse>;
/**
* Prepares a challenge used to verify that a user has access to a MFA
* factor.
*/
challenge(params: MFAChallengeTOTPParams): Promise<Prettify<AuthMFAChallengeTOTPResponse>>;
challenge(params: MFAChallengePhoneParams): Promise<Prettify<AuthMFAChallengePhoneResponse>>;
challenge(params: MFAChallengeWebauthnParams): Promise<Prettify<AuthMFAChallengeWebauthnResponse>>;
challenge(params: MFAChallengeParams): Promise<AuthMFAChallengeResponse>;
/**
* Verifies a code against a challenge. The verification code is
* provided by the user by entering a code seen in their authenticator app.
*/
verify(params: MFAVerifyTOTPParams): Promise<AuthMFAVerifyResponse>;
verify(params: MFAVerifyPhoneParams): Promise<AuthMFAVerifyResponse>;
verify(params: MFAVerifyWebauthnParams): Promise<AuthMFAVerifyResponse>;
verify(params: MFAVerifyParams): Promise<AuthMFAVerifyResponse>;
/**
* Unenroll removes a MFA factor.
* A user has to have an `aal2` authenticator level in order to unenroll a `verified` factor.
*/
unenroll(params: MFAUnenrollParams): Promise<AuthMFAUnenrollResponse>;
/**
* Helper method which creates a challenge and immediately uses the given code to verify against it thereafter. The verification code is
* provided by the user by entering a code seen in their authenticator app.
*/
challengeAndVerify(params: MFAChallengeAndVerifyParams): Promise<AuthMFAVerifyResponse>;
/**
* Returns the list of MFA factors enabled for this user.
*
* @see {@link GoTrueMFAApi#enroll}
* @see {@link GoTrueMFAApi#getAuthenticatorAssuranceLevel}
* @see {@link GoTrueClient#getUser}
*
*/
listFactors(): Promise<AuthMFAListFactorsResponse>;
/**
* Returns the Authenticator Assurance Level (AAL) for the active session.
*
* - `aal1` (or `null`) means that the user's identity has been verified only
* with a conventional login (email+password, OTP, magic link, social login,
* etc.).
* - `aal2` means that the user's identity has been verified both with a conventional login and at least one MFA factor.
*
* When called without a JWT parameter, this method is fairly quick (microseconds)
* and rarely uses the network. When a JWT is provided (useful in server-side
* environments like Edge Functions where no session is stored), this method
* will make a network request to validate the user and fetch their MFA factors.
*
* @param jwt Takes in an optional access token JWT. If no JWT is provided, the JWT from the current session is used.
*/
getAuthenticatorAssuranceLevel(jwt?: string): Promise<AuthMFAGetAuthenticatorAssuranceLevelResponse>;
webauthn: WebAuthnApi;
}
/**
* @expermental
*/
export type AuthMFAAdminDeleteFactorResponse = RequestResult<{
/** ID of the factor that was successfully deleted. */
id: string;
}>;
/**
* @expermental
*/
export type AuthMFAAdminDeleteFactorParams = {
/** ID of the MFA factor to delete. */
id: string;
/** ID of the user whose factor is being deleted. */
userId: string;
};
/**
* @expermental
*/
export type AuthMFAAdminListFactorsResponse = RequestResult<{
/** All factors attached to the user. */
factors: Factor[];
}>;
/**
* @expermental
*/
export type AuthMFAAdminListFactorsParams = {
/** ID of the user. */
userId: string;
};
/**
* Contains the full multi-factor authentication administration API.
*
* @expermental
*/
export interface GoTrueAdminMFAApi {
/**
* Lists all factors associated to a user.
*
*/
listFactors(params: AuthMFAAdminListFactorsParams): Promise<AuthMFAAdminListFactorsResponse>;
/**
* Deletes a factor on a user. This will log the user out of all active
* sessions if the deleted factor was verified.
*
* @see {@link GoTrueMFAApi#unenroll}
*
* @expermental
*/
deleteFactor(params: AuthMFAAdminDeleteFactorParams): Promise<AuthMFAAdminDeleteFactorResponse>;
}
type AnyFunction = (...args: any[]) => any;
type MaybePromisify<T> = T | Promise<T>;
type PromisifyMethods<T> = {
[K in keyof T]: T[K] extends AnyFunction ? (...args: Parameters<T[K]>) => MaybePromisify<ReturnType<T[K]>> : T[K];
};
export type SupportedStorage = PromisifyMethods<Pick<Storage, 'getItem' | 'setItem' | 'removeItem'>> & {
/**
* If set to `true` signals to the library that the storage medium is used
* on a server and the values may not be authentic, such as reading from
* request cookies. Implementations should not set this to true if the client
* is used on a server that reads storage information from authenticated
* sources, such as a secure database or file.
*/
isServer?: boolean;
};
export type InitializeResult = {
error: AuthError | null;
};
export type CallRefreshTokenResult = RequestResult<Session>;
export type Pagination = {
[key: string]: any;
nextPage: number | null;
lastPage: number;
total: number;
};
export type PageParams = {
/** The page number */
page?: number;
/** Number of items returned per page */
perPage?: number;
};
export type SignOut = {
/**
* Determines which sessions should be
* logged out. Global means all
* sessions by this account. Local
* means only this session. Others
* means all other sessions except the
* current one. When using others,
* there is no sign-out event fired on
* the current session!
*/
scope?: 'global' | 'local' | 'others';
};
type MFAEnrollParamsBase<T extends FactorType> = {
/** The type of factor being enrolled. */
factorType: T;
/** Human readable name assigned to the factor. */
friendlyName?: string;
};
type MFAEnrollTOTPParamFields = {
/** Domain which the user is enrolled with. */
issuer?: string;
};
export type MFAEnrollTOTPParams = Prettify<MFAEnrollParamsBase<'totp'> & MFAEnrollTOTPParamFields>;
type MFAEnrollPhoneParamFields = {
/** Phone number associated with a factor. Number should conform to E.164 format */
phone: string;
};
export type MFAEnrollPhoneParams = Prettify<MFAEnrollParamsBase<'phone'> & MFAEnrollPhoneParamFields>;
type MFAEnrollWebauthnFields = {};
/**
* Parameters for enrolling a WebAuthn factor.
* Creates an unverified WebAuthn factor that must be verified with a credential.
* @see {@link https://w3c.github.io/webauthn/#sctn-registering-a-new-credential W3C WebAuthn Spec - Registering a New Credential}
*/
export type MFAEnrollWebauthnParams = Prettify<MFAEnrollParamsBase<'webauthn'> & MFAEnrollWebauthnFields>;
type AuthMFAEnrollResponseBase<T extends FactorType> = {
/** ID of the factor that was just enrolled (in an unverified state). */
id: string;
/** Type of MFA factor.*/
type: T;
/** Friendly name of the factor, useful for distinguishing between factors **/
friendly_name?: string;
};
type AuthMFAEnrollTOTPResponseFields = {
/** TOTP enrollment information. */
totp: {
/** Contains a QR code encoding the authenticator URI. You can
* convert it to a URL by prepending `data:image/svg+xml;utf-8,` to
* the value. Avoid logging this value to the console. */
qr_code: string;
/** The TOTP secret (also encoded in the QR code). Show this secret
* in a password-style field to the user, in case they are unable to
* scan the QR code. Avoid logging this value to the console. */
secret: string;
/** The authenticator URI encoded within the QR code, should you need
* to use it. Avoid loggin this value to the console. */
uri: string;
};
};
export type AuthMFAEnrollTOTPResponse = RequestResult<Prettify<AuthMFAEnrollResponseBase<'totp'> & AuthMFAEnrollTOTPResponseFields>>;
type AuthMFAEnrollPhoneResponseFields = {
/** Phone number of the MFA factor in E.164 format. Used to send messages */
phone: string;
};
export type AuthMFAEnrollPhoneResponse = RequestResult<Prettify<AuthMFAEnrollResponseBase<'phone'> & AuthMFAEnrollPhoneResponseFields>>;
type AuthMFAEnrollWebauthnFields = {};
/**
* Response type for WebAuthn factor enrollment.
* Returns the enrolled factor ID and metadata.
* @see {@link https://w3c.github.io/webauthn/#sctn-registering-a-new-credential W3C WebAuthn Spec - Registering a New Credential}
*/
export type AuthMFAEnrollWebauthnResponse = RequestResult<Prettify<AuthMFAEnrollResponseBase<'webauthn'> & AuthMFAEnrollWebauthnFields>>;
export type JwtHeader = {
alg: 'RS256' | 'ES256' | 'HS256';
kid: string;
typ: string;
};
export type RequiredClaims = {
iss: string;
sub: string;
aud: string | string[];
exp: number;
iat: number;
role: string;
aal: AuthenticatorAssuranceLevels;
session_id: string;
};
/**
* JWT Payload containing claims for Supabase authentication tokens.
*
* Required claims (iss, aud, exp, iat, sub, role, aal, session_id) are inherited from RequiredClaims.
* All other claims are optional as they can be customized via Custom Access Token Hooks.
*
* @see https://supabase.com/docs/guides/auth/jwt-fields
*/
export interface JwtPayload extends RequiredClaims {
email?: string;
phone?: string;
is_anonymous?: boolean;
jti?: string;
nbf?: number;
app_metadata?: UserAppMetadata;
user_metadata?: UserMetadata;
/**
* Authentication Method References.
* Supports both RFC-8176 compliant format (string[]) and detailed format (AMREntry[]).
* - String format: ['password', 'otp'] - RFC-8176 compliant
* - Object format: [{ method: 'password', timestamp: 1234567890 }] - includes timestamps
*/
amr?: AMREntry[] | string[];