[PR #9052] [MERGED] chore: version packages #25304

Closed
opened 2026-04-15 22:49:18 -05:00 by GiteaMirror · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/better-auth/better-auth/pull/9052
Author: @better-release[bot]
Created: 4/9/2026
Status: Merged
Merged: 4/9/2026
Merged by: @gustavovalverde

Base: mainHead: changeset-release/main


📝 Commits (1)

📊 Changes

49 files changed (+213 additions, -91 deletions)

View changed files

.changeset/famous-banks-open.md (+0 -5)
.changeset/fix-link-social-provider-scope.md (+0 -9)
.changeset/fix-nextcookies-router-refresh.md (+0 -5)
.changeset/fix-oauth-query-array-serialization.md (+0 -8)
.changeset/gentle-trains-knock.md (+0 -5)
.changeset/saml-relay-state-signing.md (+0 -8)
.changeset/saml-whitespace-decoding.md (+0 -7)
.changeset/two-factor-methods-redirect.md (+0 -11)
.changeset/two-factor-verified-enrollment.md (+0 -13)
📝 packages/api-key/CHANGELOG.md (+8 -0)
📝 packages/api-key/package.json (+1 -1)
📝 packages/better-auth/CHANGELOG.md (+43 -0)
📝 packages/better-auth/package.json (+1 -1)
📝 packages/cli/CHANGELOG.md (+9 -0)
📝 packages/cli/package.json (+1 -1)
📝 packages/core/CHANGELOG.md (+2 -0)
📝 packages/core/package.json (+1 -1)
📝 packages/drizzle-adapter/CHANGELOG.md (+7 -0)
📝 packages/drizzle-adapter/package.json (+1 -1)
📝 packages/electron/CHANGELOG.md (+8 -0)

...and 29 more files

📄 Description

This PR was opened by the Changesets release GitHub action. When you're ready to do a release, you can merge this and the packages will be published to npm automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to main, this PR will be updated.

Releases

@better-auth/api-key@1.6.2

Patch Changes

better-auth@1.6.2

Patch Changes

  • #8949 9deb793 Thanks @ping-maxwell! - security: verify OAuth state parameter against cookie-stored nonce to prevent CSRF on cookie-backed flows

  • #8983 2cbcb9b Thanks @jaydeep-pipaliya! - fix(oauth2): prevent cross-provider account collision in link-social callback

    The link-social callback used findAccount(accountId) which matched by account ID across all providers. When two providers return the same numeric ID (e.g. both Google and GitHub assign 99999), the lookup could match the wrong provider's account, causing a spurious account_already_linked_to_different_user error or silently updating the wrong account's tokens.

    Replaced with findAccountByProviderId(accountId, providerId) to scope the lookup to the correct provider, matching the pattern already used in the generic OAuth plugin.

  • #9059 b20fa42 Thanks @gustavovalverde! - fix(next-js): replace cookie probe with header-based RSC detection in nextCookies() to prevent infinite router refresh loops and eliminate leaked __better-auth-cookie-store cookie. Also fix two-factor enrollment flows to set the new session cookie before deleting the old session.

  • #9058 608d8c3 Thanks @gustavovalverde! - fix(sso): include RelayState in signed SAML AuthnRequests per SAML 2.0 Bindings §3.4.4.1

    • RelayState is now passed to samlify's ServiceProvider constructor so it is included in the redirect binding signature. Previously it was appended after the signature, causing spec-compliant IdPs to reject signed AuthnRequests.
    • authnRequestsSigned: true without a private key now throws instead of silently sending unsigned requests.
  • #8772 8409843 Thanks @aarmful! - feat(two-factor): include enabled 2fa methods in sign-in redirect response

    The 2FA sign-in redirect now returns twoFactorMethods (e.g. ["totp", "otp"]) so frontends can render the correct verification UI without guessing. The onTwoFactorRedirect client callback receives twoFactorMethods as a context parameter.

    • TOTP is included only when the user has a verified TOTP secret and TOTP is not disabled in config.
    • OTP is included when otpOptions.sendOTP is configured.
    • Unverified TOTP enrollments are excluded from the methods list.
  • #8711 e78a7b1 Thanks @aarmful! - fix(two-factor): prevent unverified TOTP enrollment from gating sign-in

    Adds a verified boolean column to the twoFactor table that tracks whether a TOTP secret has been confirmed by the user.

    • First-time enrollment: enableTwoFactor creates the row with verified: false. The row is promoted to verified: true only after verifyTOTP succeeds with a valid code.
    • Re-enrollment (calling enableTwoFactor when TOTP is already verified): the new row preserves verified: true, so the user is never locked out of sign-in while rotating their TOTP secret.
    • Sign-in: verifyTOTP rejects rows where verified === false, preventing abandoned enrollments from blocking authentication. Backup codes and OTP are unaffected and work as fallbacks during unfinished enrollment.

    Migration: The new column defaults to true, so existing twoFactor rows are treated as verified. No data migration is required. skipVerificationOnEnable: true is also unaffected — the row is created as verified: true in that mode.

  • Updated dependencies []:

    • @better-auth/core@1.6.2
    • @better-auth/drizzle-adapter@1.6.2
    • @better-auth/kysely-adapter@1.6.2
    • @better-auth/memory-adapter@1.6.2
    • @better-auth/mongo-adapter@1.6.2
    • @better-auth/prisma-adapter@1.6.2
    • @better-auth/telemetry@1.6.2

auth@1.6.2

Patch Changes

@better-auth/drizzle-adapter@1.6.2

Patch Changes

  • Updated dependencies []:
    • @better-auth/core@1.6.2

@better-auth/electron@1.6.2

Patch Changes

@better-auth/expo@1.6.2

Patch Changes

@better-auth/i18n@1.6.2

Patch Changes

@better-auth/kysely-adapter@1.6.2

Patch Changes

  • Updated dependencies []:
    • @better-auth/core@1.6.2

@better-auth/memory-adapter@1.6.2

Patch Changes

  • Updated dependencies []:
    • @better-auth/core@1.6.2

@better-auth/mongo-adapter@1.6.2

Patch Changes

  • Updated dependencies []:
    • @better-auth/core@1.6.2

@better-auth/oauth-provider@1.6.2

Patch Changes

  • #9060 4c829bf Thanks @gustavovalverde! - fix(oauth-provider): preserve multi-valued query params through prompt redirects

    • serializeAuthorizationQuery now uses params.append() for array values instead of String(array) which collapsed them into a single comma-joined entry.
    • deleteFromPrompt return type widens from Record<string, string> to Record<string, string | string[]>. The previous type was incorrect — Object.fromEntries() silently dropped duplicate keys, so the narrower type only held because the data was being corrupted.
  • #8998 c6922dc Thanks @dvanmali! - Typescript specifies skip_consent type never and errors through zod

  • Updated dependencies [9deb793, 2cbcb9b, b20fa42, 608d8c3, 8409843, e78a7b1]:

    • better-auth@1.6.2
    • @better-auth/core@1.6.2

@better-auth/passkey@1.6.2

Patch Changes

@better-auth/prisma-adapter@1.6.2

Patch Changes

  • Updated dependencies []:
    • @better-auth/core@1.6.2

@better-auth/redis-storage@1.6.2

Patch Changes

  • Updated dependencies []:
    • @better-auth/core@1.6.2

@better-auth/scim@1.6.2

Patch Changes

@better-auth/sso@1.6.2

Patch Changes

  • #8968 5e5d3f6 Thanks @cyphercodes! - fix(sso): strip whitespace from SAMLResponse before base64 decoding

    Some SAML IDPs send SAMLResponse with line-wrapped base64 (per RFC 2045), which caused decoding failures. Whitespace is now stripped at the request boundary before any processing.

  • Updated dependencies [9deb793, 2cbcb9b, b20fa42, 608d8c3, 8409843, e78a7b1]:

    • better-auth@1.6.2
    • @better-auth/core@1.6.2

@better-auth/stripe@1.6.2

Patch Changes

@better-auth/telemetry@1.6.2

Patch Changes

  • Updated dependencies []:
    • @better-auth/core@1.6.2

@better-auth/test-utils@1.6.2

Patch Changes

@better-auth/core@1.6.2


🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/better-auth/better-auth/pull/9052 **Author:** [@better-release[bot]](https://github.com/apps/better-release) **Created:** 4/9/2026 **Status:** ✅ Merged **Merged:** 4/9/2026 **Merged by:** [@gustavovalverde](https://github.com/gustavovalverde) **Base:** `main` ← **Head:** `changeset-release/main` --- ### 📝 Commits (1) - [`d3a2298`](https://github.com/better-auth/better-auth/commit/d3a2298f6b37078209a5cbdf112d6ebaf3fb344e) chore: version packages ### 📊 Changes **49 files changed** (+213 additions, -91 deletions) <details> <summary>View changed files</summary> ➖ `.changeset/famous-banks-open.md` (+0 -5) ➖ `.changeset/fix-link-social-provider-scope.md` (+0 -9) ➖ `.changeset/fix-nextcookies-router-refresh.md` (+0 -5) ➖ `.changeset/fix-oauth-query-array-serialization.md` (+0 -8) ➖ `.changeset/gentle-trains-knock.md` (+0 -5) ➖ `.changeset/saml-relay-state-signing.md` (+0 -8) ➖ `.changeset/saml-whitespace-decoding.md` (+0 -7) ➖ `.changeset/two-factor-methods-redirect.md` (+0 -11) ➖ `.changeset/two-factor-verified-enrollment.md` (+0 -13) 📝 `packages/api-key/CHANGELOG.md` (+8 -0) 📝 `packages/api-key/package.json` (+1 -1) 📝 `packages/better-auth/CHANGELOG.md` (+43 -0) 📝 `packages/better-auth/package.json` (+1 -1) 📝 `packages/cli/CHANGELOG.md` (+9 -0) 📝 `packages/cli/package.json` (+1 -1) 📝 `packages/core/CHANGELOG.md` (+2 -0) 📝 `packages/core/package.json` (+1 -1) 📝 `packages/drizzle-adapter/CHANGELOG.md` (+7 -0) 📝 `packages/drizzle-adapter/package.json` (+1 -1) 📝 `packages/electron/CHANGELOG.md` (+8 -0) _...and 29 more files_ </details> ### 📄 Description This PR was opened by the [Changesets release](https://github.com/changesets/action) GitHub action. When you're ready to do a release, you can merge this and the packages will be published to npm automatically. If you're not ready to do a release yet, that's fine, whenever you add more changesets to main, this PR will be updated. # Releases ## @better-auth/api-key@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## better-auth@1.6.2 ### Patch Changes - [#8949](https://github.com/better-auth/better-auth/pull/8949) [`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd) Thanks [@ping-maxwell](https://github.com/ping-maxwell)! - security: verify OAuth state parameter against cookie-stored nonce to prevent CSRF on cookie-backed flows - [#8983](https://github.com/better-auth/better-auth/pull/8983) [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2) Thanks [@jaydeep-pipaliya](https://github.com/jaydeep-pipaliya)! - fix(oauth2): prevent cross-provider account collision in link-social callback The link-social callback used `findAccount(accountId)` which matched by account ID across all providers. When two providers return the same numeric ID (e.g. both Google and GitHub assign `99999`), the lookup could match the wrong provider's account, causing a spurious `account_already_linked_to_different_user` error or silently updating the wrong account's tokens. Replaced with `findAccountByProviderId(accountId, providerId)` to scope the lookup to the correct provider, matching the pattern already used in the generic OAuth plugin. - [#9059](https://github.com/better-auth/better-auth/pull/9059) [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19) Thanks [@gustavovalverde](https://github.com/gustavovalverde)! - fix(next-js): replace cookie probe with header-based RSC detection in `nextCookies()` to prevent infinite router refresh loops and eliminate leaked `__better-auth-cookie-store` cookie. Also fix two-factor enrollment flows to set the new session cookie before deleting the old session. - [#9058](https://github.com/better-auth/better-auth/pull/9058) [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae) Thanks [@gustavovalverde](https://github.com/gustavovalverde)! - fix(sso): include RelayState in signed SAML AuthnRequests per SAML 2.0 Bindings §3.4.4.1 - RelayState is now passed to samlify's ServiceProvider constructor so it is included in the redirect binding signature. Previously it was appended after the signature, causing spec-compliant IdPs to reject signed AuthnRequests. - `authnRequestsSigned: true` without a private key now throws instead of silently sending unsigned requests. - [#8772](https://github.com/better-auth/better-auth/pull/8772) [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a) Thanks [@aarmful](https://github.com/aarmful)! - feat(two-factor): include enabled 2fa methods in sign-in redirect response The 2FA sign-in redirect now returns `twoFactorMethods` (e.g. `["totp", "otp"]`) so frontends can render the correct verification UI without guessing. The `onTwoFactorRedirect` client callback receives `twoFactorMethods` as a context parameter. - TOTP is included only when the user has a verified TOTP secret and TOTP is not disabled in config. - OTP is included when `otpOptions.sendOTP` is configured. - Unverified TOTP enrollments are excluded from the methods list. - [#8711](https://github.com/better-auth/better-auth/pull/8711) [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2) Thanks [@aarmful](https://github.com/aarmful)! - fix(two-factor): prevent unverified TOTP enrollment from gating sign-in Adds a `verified` boolean column to the `twoFactor` table that tracks whether a TOTP secret has been confirmed by the user. - **First-time enrollment:** `enableTwoFactor` creates the row with `verified: false`. The row is promoted to `verified: true` only after `verifyTOTP` succeeds with a valid code. - **Re-enrollment** (calling `enableTwoFactor` when TOTP is already verified): the new row preserves `verified: true`, so the user is never locked out of sign-in while rotating their TOTP secret. - **Sign-in:** `verifyTOTP` rejects rows where `verified === false`, preventing abandoned enrollments from blocking authentication. Backup codes and OTP are unaffected and work as fallbacks during unfinished enrollment. **Migration:** The new column defaults to `true`, so existing `twoFactor` rows are treated as verified. No data migration is required. `skipVerificationOnEnable: true` is also unaffected — the row is created as `verified: true` in that mode. - Updated dependencies \[]: - @better-auth/core@1.6.2 - @better-auth/drizzle-adapter@1.6.2 - @better-auth/kysely-adapter@1.6.2 - @better-auth/memory-adapter@1.6.2 - @better-auth/mongo-adapter@1.6.2 - @better-auth/prisma-adapter@1.6.2 - @better-auth/telemetry@1.6.2 ## auth@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 - @better-auth/telemetry@1.6.2 ## @better-auth/drizzle-adapter@1.6.2 ### Patch Changes - Updated dependencies \[]: - @better-auth/core@1.6.2 ## @better-auth/electron@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/expo@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/i18n@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/kysely-adapter@1.6.2 ### Patch Changes - Updated dependencies \[]: - @better-auth/core@1.6.2 ## @better-auth/memory-adapter@1.6.2 ### Patch Changes - Updated dependencies \[]: - @better-auth/core@1.6.2 ## @better-auth/mongo-adapter@1.6.2 ### Patch Changes - Updated dependencies \[]: - @better-auth/core@1.6.2 ## @better-auth/oauth-provider@1.6.2 ### Patch Changes - [#9060](https://github.com/better-auth/better-auth/pull/9060) [`4c829bf`](https://github.com/better-auth/better-auth/commit/4c829bf2892a7fbf9f137f9bc9972b0c8fff12b5) Thanks [@gustavovalverde](https://github.com/gustavovalverde)! - fix(oauth-provider): preserve multi-valued query params through prompt redirects - `serializeAuthorizationQuery` now uses `params.append()` for array values instead of `String(array)` which collapsed them into a single comma-joined entry. - `deleteFromPrompt` return type widens from `Record<string, string>` to `Record<string, string | string[]>`. The previous type was incorrect — `Object.fromEntries()` silently dropped duplicate keys, so the narrower type only held because the data was being corrupted. - [#8998](https://github.com/better-auth/better-auth/pull/8998) [`c6922dc`](https://github.com/better-auth/better-auth/commit/c6922dce8edaed9293ce8d8962fa6ec03dafb2ce) Thanks [@dvanmali](https://github.com/dvanmali)! - Typescript specifies skip_consent type never and errors through zod - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/passkey@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/prisma-adapter@1.6.2 ### Patch Changes - Updated dependencies \[]: - @better-auth/core@1.6.2 ## @better-auth/redis-storage@1.6.2 ### Patch Changes - Updated dependencies \[]: - @better-auth/core@1.6.2 ## @better-auth/scim@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/sso@1.6.2 ### Patch Changes - [#8968](https://github.com/better-auth/better-auth/pull/8968) [`5e5d3f6`](https://github.com/better-auth/better-auth/commit/5e5d3f62fcf457a2717e5ed774122ab0fd39884d) Thanks [@cyphercodes](https://github.com/cyphercodes)! - fix(sso): strip whitespace from SAMLResponse before base64 decoding Some SAML IDPs send SAMLResponse with line-wrapped base64 (per RFC 2045), which caused decoding failures. Whitespace is now stripped at the request boundary before any processing. - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/stripe@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/telemetry@1.6.2 ### Patch Changes - Updated dependencies \[]: - @better-auth/core@1.6.2 ## @better-auth/test-utils@1.6.2 ### Patch Changes - Updated dependencies \[[`9deb793`](https://github.com/better-auth/better-auth/commit/9deb7936aba7931f2db4b460141f476508f11bfd), [`2cbcb9b`](https://github.com/better-auth/better-auth/commit/2cbcb9baacdd8e6fa1ed605e9b788f8922f0a8c2), [`b20fa42`](https://github.com/better-auth/better-auth/commit/b20fa424c379396f0b86f94fbac1604e4a17fe19), [`608d8c3`](https://github.com/better-auth/better-auth/commit/608d8c3082c2d6e52c6ca6a8f38348619869b1ae), [`8409843`](https://github.com/better-auth/better-auth/commit/84098432ad8432fe33b3134d933e574259f3430a), [`e78a7b1`](https://github.com/better-auth/better-auth/commit/e78a7b120d56b7320cc8d818270e20057963a7b2)]: - better-auth@1.6.2 - @better-auth/core@1.6.2 ## @better-auth/core@1.6.2 --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
GiteaMirror added the pull-request label 2026-04-15 22:49:18 -05:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/better-auth#25304