mirror of
https://github.com/better-auth/better-auth.git
synced 2026-05-23 15:42:09 -05:00
auth.api.getSession returns null in RSC Layout.tsx with valid session #947
Closed
opened 2026-03-13 08:11:07 -05:00 by GiteaMirror
·
68 comments
No Branch/Tag Specified
2026-05-13/ci/stabilize-docker-startup
dependabot/npm_and_yarn/samlify-2.13.0
changeset-release/main
main
2026-05-22/chore/adopt-agents-md
2026-05-22/refactor/string-case-utils
2026-05-14/fix/passkey-verify-error-and-claim
changeset-release/next
next
ping-maxwell/c-ping-maxwell/fix-error-link-apostrophe-f89a
dependabot/npm_and_yarn/demo/electron/demo-minor-patch-519ef7475f
dependabot/github_actions/github-actions-98f3470200
client-assertions-main
2026-05-15/ci/fix-sqlite-abi-mismatch
2026-05-15/fix/organization-team-add-cascade
2026-05-15/fix/parse-set-cookie-value-validation
2026-05-13/feat/captcha-wildcard-endpoints
fix/i18n-before-hook-translation
fix/disable-migration-generate
2026-05-07/fix/admin-set-password-upsert
2026-05-10/fix/cookie-drain-order
2026-05-10/feat/hooks-finally
2026-05-09/fix/cookie-drain-order
2026-05-09/feat/hooks-finally
2026-05-08/feat/register-before-send
fix/stripe/subscription-data-merge
2026-05-01/chore/pnpm-v11-harden
chore/pnpm-v11
2026-04-29/feat/google-include-granted-scopes
2026-04-29/fix/oauth-account-scope-semantics
2026-04-27/fix/nextcookies-idempotent-writes
2026-04-26/fix/harden-proxy-host-validation
2026-04-26/refactor/stripe-callback-signature-cleanup
2026-04-26/fix/stripe-subscription-callback-timing
2026-04-11/fix/sveltekit-app-modules
feat/open-api-zod-contract
feat/oauth-provider-backchannel-logout-next
feat/oauth-idp-initiated-bounce
refactor/sign-in-challenges
2026-04-21/fix/oauth-rfc-input-validation
fix/release-notes-new-packages
fix/two-factor-identity-guard
fix/resource
feat/emailpassword-authorize
2026-04-12/security/dynamic-baseurl-proxy-trust-default
feat/oauth-provider-at-hash-v2
fix/release-grep-fallback
claude/address-review-comments-JhFLr
claude/slack-update-stripe-docs-consistency-8Sc0w
feat/async-auth
fix/two-factor-totp-verified-enrollment
feat/plugin-ui
codex/blog-1-6-release-post
2026-04-06/fix/type-any-guards
2026-04-05/chore/downgrade-better-call
2026-04-04/ci/skip-vercel-fork-prs
2026-03-28/ci/add-autofix-ci
chore/release-preview-script
himself65/2026/02/19/role
2026-03-24/fix/update-user-info-on-link
2026-03-20/docs/improve-website
2026-03-20/fix/anonymous-onlinkaccount-expo
2026-02-17/fix/anonymous-link-state
fix/8607-saml-inresponseto
fix/8549-scim-patch-noop
v1.4.x
refactor/migration-snapshot-tests
worktree-magic-link-additional-data
chore/migrate-build-to-rollup
worktree-fix-dynamic-baseurl-8447
2026-03-06/chore/public-api-check
fix/close-8156-regression-test
fix/secondary-storage-json-error-handling
himself65/verification-namespace
cursor/issue-8307-validation-79a3
himself65/2026/01/30/error-mdx
v1.4.x-staging
fix/email-otp-user
fix/restrict-full-organization-access-roles
himself65/2026/02/12/count
himself65/2026/02/04/define-plugin
2026-02-04/feat/add-pluralize
cursor/better-auth-js-integration-ec21
cursor/expo-state-mismatch-394c
2026-02-01/fix/org-update-role-sync-members
cursor/issue-7607-investigation-e146
cursor/email-generation-helper-0ff6
himself65/2026/01/21/avoid-spread-operator
himself65/2026/01/14/cli
claude/slack-add-docs-pr-NMvgO
claude/slack-add-advanced-useplural-WHKYL
feat/hooks-pos
feat/2fa-phone
feat/2fa
fix/rotation
fix/username-check
v1.3.x
refactor/organization
feat/multiple-client-ids-social-providers
better-auth@1.6.11
auth@1.6.11
@better-auth/test-utils@1.6.11
@better-auth/telemetry@1.6.11
@better-auth/stripe@1.6.11
@better-auth/sso@1.6.11
@better-auth/scim@1.6.11
@better-auth/api-key@1.6.11
@better-auth/redis-storage@1.6.11
@better-auth/core@1.6.11
@better-auth/oauth-provider@1.6.11
@better-auth/mongo-adapter@1.6.11
@better-auth/memory-adapter@1.6.11
@better-auth/kysely-adapter@1.6.11
@better-auth/i18n@1.6.11
@better-auth/expo@1.6.11
@better-auth/electron@1.6.11
@better-auth/drizzle-adapter@1.6.11
@better-auth/prisma-adapter@1.6.11
@better-auth/passkey@1.6.11
v1.6.11
better-auth@1.7.0-beta.3
auth@1.7.0-beta.3
@better-auth/test-utils@1.7.0-beta.3
@better-auth/telemetry@1.7.0-beta.3
@better-auth/stripe@1.7.0-beta.3
@better-auth/sso@1.7.0-beta.3
@better-auth/scim@1.7.0-beta.3
@better-auth/redis-storage@1.7.0-beta.3
@better-auth/prisma-adapter@1.7.0-beta.3
@better-auth/passkey@1.7.0-beta.3
@better-auth/oauth-provider@1.7.0-beta.3
@better-auth/mongo-adapter@1.7.0-beta.3
@better-auth/memory-adapter@1.7.0-beta.3
@better-auth/kysely-adapter@1.7.0-beta.3
@better-auth/i18n@1.7.0-beta.3
@better-auth/expo@1.7.0-beta.3
@better-auth/electron@1.7.0-beta.3
@better-auth/drizzle-adapter@1.7.0-beta.3
@better-auth/core@1.7.0-beta.3
@better-auth/cimd@1.7.0-beta.3
@better-auth/api-key@1.7.0-beta.3
v1.7.0-beta.3
better-auth@1.6.10
auth@1.6.10
@better-auth/test-utils@1.6.10
@better-auth/telemetry@1.6.10
@better-auth/stripe@1.6.10
@better-auth/sso@1.6.10
@better-auth/scim@1.6.10
@better-auth/redis-storage@1.6.10
@better-auth/prisma-adapter@1.6.10
@better-auth/passkey@1.6.10
@better-auth/oauth-provider@1.6.10
@better-auth/mongo-adapter@1.6.10
@better-auth/memory-adapter@1.6.10
@better-auth/kysely-adapter@1.6.10
@better-auth/i18n@1.6.10
@better-auth/expo@1.6.10
@better-auth/electron@1.6.10
@better-auth/drizzle-adapter@1.6.10
@better-auth/core@1.6.10
@better-auth/api-key@1.6.10
v1.6.10
better-auth@1.6.9
auth@1.6.9
@better-auth/test-utils@1.6.9
@better-auth/telemetry@1.6.9
@better-auth/stripe@1.6.9
@better-auth/sso@1.6.9
@better-auth/scim@1.6.9
@better-auth/redis-storage@1.6.9
@better-auth/prisma-adapter@1.6.9
@better-auth/passkey@1.6.9
@better-auth/oauth-provider@1.6.9
@better-auth/mongo-adapter@1.6.9
@better-auth/memory-adapter@1.6.9
@better-auth/kysely-adapter@1.6.9
@better-auth/i18n@1.6.9
@better-auth/expo@1.6.9
@better-auth/electron@1.6.9
@better-auth/drizzle-adapter@1.6.9
@better-auth/core@1.6.9
@better-auth/api-key@1.6.9
v1.6.9
better-auth@1.6.8
auth@1.6.8
@better-auth/test-utils@1.6.8
@better-auth/telemetry@1.6.8
@better-auth/stripe@1.6.8
@better-auth/sso@1.6.8
@better-auth/scim@1.6.8
@better-auth/redis-storage@1.6.8
@better-auth/prisma-adapter@1.6.8
@better-auth/passkey@1.6.8
@better-auth/oauth-provider@1.6.8
@better-auth/mongo-adapter@1.6.8
@better-auth/memory-adapter@1.6.8
@better-auth/kysely-adapter@1.6.8
@better-auth/i18n@1.6.8
@better-auth/expo@1.6.8
@better-auth/electron@1.6.8
@better-auth/drizzle-adapter@1.6.8
@better-auth/core@1.6.8
@better-auth/api-key@1.6.8
v1.6.8
@better-auth/api-key@1.7.0-beta.2
better-auth@1.7.0-beta.2
auth@1.7.0-beta.2
@better-auth/test-utils@1.7.0-beta.2
@better-auth/telemetry@1.7.0-beta.2
@better-auth/stripe@1.7.0-beta.2
@better-auth/sso@1.7.0-beta.2
@better-auth/scim@1.7.0-beta.2
@better-auth/redis-storage@1.7.0-beta.2
@better-auth/prisma-adapter@1.7.0-beta.2
@better-auth/passkey@1.7.0-beta.2
@better-auth/oauth-provider@1.7.0-beta.2
@better-auth/mongo-adapter@1.7.0-beta.2
@better-auth/memory-adapter@1.7.0-beta.2
@better-auth/kysely-adapter@1.7.0-beta.2
@better-auth/i18n@1.7.0-beta.2
@better-auth/expo@1.7.0-beta.2
@better-auth/electron@1.7.0-beta.2
@better-auth/drizzle-adapter@1.7.0-beta.2
@better-auth/core@1.7.0-beta.2
@better-auth/cimd@1.7.0-beta.2
v1.7.0-beta.2
better-auth@1.6.7
auth@1.6.7
@better-auth/test-utils@1.6.7
@better-auth/telemetry@1.6.7
@better-auth/stripe@1.6.7
@better-auth/sso@1.6.7
@better-auth/scim@1.6.7
@better-auth/redis-storage@1.6.7
@better-auth/prisma-adapter@1.6.7
@better-auth/passkey@1.6.7
@better-auth/oauth-provider@1.6.7
@better-auth/mongo-adapter@1.6.7
@better-auth/memory-adapter@1.6.7
@better-auth/kysely-adapter@1.6.7
@better-auth/i18n@1.6.7
@better-auth/expo@1.6.7
@better-auth/electron@1.6.7
@better-auth/drizzle-adapter@1.6.7
@better-auth/core@1.6.7
@better-auth/api-key@1.6.7
v1.6.7
better-auth@1.6.6
auth@1.6.6
@better-auth/test-utils@1.6.6
@better-auth/telemetry@1.6.6
@better-auth/stripe@1.6.6
@better-auth/sso@1.6.6
@better-auth/scim@1.6.6
@better-auth/redis-storage@1.6.6
@better-auth/prisma-adapter@1.6.6
@better-auth/passkey@1.6.6
@better-auth/oauth-provider@1.6.6
@better-auth/mongo-adapter@1.6.6
@better-auth/memory-adapter@1.6.6
@better-auth/kysely-adapter@1.6.6
@better-auth/i18n@1.6.6
@better-auth/expo@1.6.6
@better-auth/electron@1.6.6
@better-auth/drizzle-adapter@1.6.6
@better-auth/core@1.6.6
@better-auth/api-key@1.6.6
v1.6.6
better-auth@1.6.5
auth@1.6.5
@better-auth/test-utils@1.6.5
@better-auth/telemetry@1.6.5
@better-auth/stripe@1.6.5
@better-auth/sso@1.6.5
@better-auth/scim@1.6.5
@better-auth/redis-storage@1.6.5
@better-auth/prisma-adapter@1.6.5
@better-auth/passkey@1.6.5
@better-auth/oauth-provider@1.6.5
@better-auth/mongo-adapter@1.6.5
@better-auth/memory-adapter@1.6.5
@better-auth/kysely-adapter@1.6.5
@better-auth/i18n@1.6.5
@better-auth/expo@1.6.5
@better-auth/electron@1.6.5
@better-auth/drizzle-adapter@1.6.5
@better-auth/core@1.6.5
@better-auth/api-key@1.6.5
v1.6.5
@better-auth/api-key@1.6.4
better-auth@1.6.4
auth@1.6.4
@better-auth/test-utils@1.6.4
@better-auth/telemetry@1.6.4
@better-auth/stripe@1.6.4
@better-auth/sso@1.6.4
@better-auth/scim@1.6.4
@better-auth/redis-storage@1.6.4
@better-auth/prisma-adapter@1.6.4
@better-auth/passkey@1.6.4
@better-auth/oauth-provider@1.6.4
@better-auth/mongo-adapter@1.6.4
@better-auth/memory-adapter@1.6.4
@better-auth/kysely-adapter@1.6.4
@better-auth/i18n@1.6.4
@better-auth/expo@1.6.4
@better-auth/electron@1.6.4
@better-auth/drizzle-adapter@1.6.4
@better-auth/core@1.6.4
v1.6.4
@better-auth/cimd@1.7.0-beta.1
v1.7.0-beta.1
@better-auth/api-key@1.6.3
better-auth@1.6.3
auth@1.6.3
@better-auth/test-utils@1.6.3
@better-auth/telemetry@1.6.3
@better-auth/stripe@1.6.3
@better-auth/sso@1.6.3
@better-auth/scim@1.6.3
@better-auth/redis-storage@1.6.3
@better-auth/prisma-adapter@1.6.3
@better-auth/passkey@1.6.3
@better-auth/oauth-provider@1.6.3
@better-auth/mongo-adapter@1.6.3
@better-auth/memory-adapter@1.6.3
@better-auth/kysely-adapter@1.6.3
@better-auth/i18n@1.6.3
@better-auth/expo@1.6.3
@better-auth/electron@1.6.3
@better-auth/drizzle-adapter@1.6.3
@better-auth/core@1.6.3
v1.6.3
@better-auth/api-key@1.7.0-beta.0
better-auth@1.7.0-beta.0
auth@1.7.0-beta.0
@better-auth/test-utils@1.7.0-beta.0
@better-auth/telemetry@1.7.0-beta.0
@better-auth/stripe@1.7.0-beta.0
@better-auth/sso@1.7.0-beta.0
@better-auth/scim@1.7.0-beta.0
@better-auth/redis-storage@1.7.0-beta.0
@better-auth/prisma-adapter@1.7.0-beta.0
@better-auth/passkey@1.7.0-beta.0
@better-auth/oauth-provider@1.7.0-beta.0
@better-auth/mongo-adapter@1.7.0-beta.0
@better-auth/memory-adapter@1.7.0-beta.0
@better-auth/kysely-adapter@1.7.0-beta.0
@better-auth/i18n@1.7.0-beta.0
@better-auth/expo@1.7.0-beta.0
@better-auth/electron@1.7.0-beta.0
@better-auth/drizzle-adapter@1.7.0-beta.0
@better-auth/core@1.7.0-beta.0
v1.7.0-beta.0
better-auth@1.6.2
auth@1.6.2
@better-auth/test-utils@1.6.2
@better-auth/telemetry@1.6.2
@better-auth/stripe@1.6.2
@better-auth/sso@1.6.2
@better-auth/scim@1.6.2
@better-auth/redis-storage@1.6.2
@better-auth/prisma-adapter@1.6.2
@better-auth/passkey@1.6.2
@better-auth/oauth-provider@1.6.2
@better-auth/mongo-adapter@1.6.2
@better-auth/memory-adapter@1.6.2
@better-auth/kysely-adapter@1.6.2
@better-auth/i18n@1.6.2
@better-auth/expo@1.6.2
@better-auth/electron@1.6.2
@better-auth/drizzle-adapter@1.6.2
@better-auth/core@1.6.2
@better-auth/api-key@1.6.2
v1.6.2
better-auth@1.6.1
auth@1.6.1
@better-auth/test-utils@1.6.1
@better-auth/telemetry@1.6.1
@better-auth/stripe@1.6.1
@better-auth/sso@1.6.1
@better-auth/scim@1.6.1
@better-auth/redis-storage@1.6.1
@better-auth/prisma-adapter@1.6.1
@better-auth/passkey@1.6.1
@better-auth/oauth-provider@1.6.1
@better-auth/mongo-adapter@1.6.1
@better-auth/memory-adapter@1.6.1
@better-auth/kysely-adapter@1.6.1
@better-auth/i18n@1.6.1
@better-auth/expo@1.6.1
@better-auth/electron@1.6.1
@better-auth/drizzle-adapter@1.6.1
@better-auth/core@1.6.1
@better-auth/api-key@1.6.1
v1.6.1
better-auth@1.6.0
auth@1.6.0
@better-auth/test-utils@1.6.0
@better-auth/telemetry@1.6.0
@better-auth/stripe@1.6.0
@better-auth/sso@1.6.0
@better-auth/scim@1.6.0
@better-auth/redis-storage@1.6.0
@better-auth/prisma-adapter@1.6.0
@better-auth/passkey@1.6.0
@better-auth/oauth-provider@1.6.0
@better-auth/mongo-adapter@1.6.0
@better-auth/memory-adapter@1.6.0
@better-auth/kysely-adapter@1.6.0
@better-auth/i18n@1.6.0
@better-auth/expo@1.6.0
@better-auth/electron@1.6.0
@better-auth/drizzle-adapter@1.6.0
@better-auth/core@1.6.0
@better-auth/api-key@1.6.0
v1.6.0
v1.5.7-beta.1
v1.5.1-beta.4
v1.5.6
v1.4.22
v1.5.5
v1.5.4
v1.5.3
v1.5.2
v1.5.1-beta.3
v1.5.1-beta.2
v1.5.1
v1.4.21
v1.5.1-beta.1
v1.5.0
v1.4.20
v1.5.0-beta.20
v1.5.0-beta.19
v1.5.0-beta.18
v1.4.19
v1.5.0-beta.17
v1.5.0-beta.16
v1.5.0-beta.15
v1.5.0-beta.14
v1.5.0-beta.13
v1.5.0-beta.12
v1.5.0-beta.11
v1.4.18
v1.5.0-beta.10
v1.5.0-beta.9
v1.4.17
v1.4.16
v1.4.15
v1.5.0-beta.8
v1.4.14
v1.4.13
v1.5.0-beta.7
v1.4.12
v1.4.12-beta.2
v1.5.0-beta.6
v1.4.12-beta.1
v1.5.0-beta.5
v1.4.11
v1.5.0-beta.4
v1.4.11-beta.2
v1.5.0-beta.3
v1.4.11-beta.1
v1.4.10
v1.5.0-beta.2
v1.4.10-beta.1
v1.4.9-beta.1
v1.5.0-beta.1
v1.4.9
v1.4.8
v1.4.8-beta.7
v1.4.8-beta.6
v1.4.8-beta.5
v1.4.8-beta.4
v1.4.8-beta.3
v1.4.8-beta.2
v1.4.8-beta.1
v1.4.7
v1.4.7-beta.4
v1.4.7-beta.3
v1.4.7-beta.2
v1.4.6-beta.5
v1.4.7-beta.1
v1.4.6
v1.4.6-beta.4
v1.4.6-beta.3
v1.4.5
v1.4.6-beta.2
v1.4.6-beta.1
v1.4.5-beta.2
v1.4.5-beta.1
v1.4.4-beta.3
v1.4.4
v1.4.4-beta.2
v1.4.4-beta.1
v1.4.3
v1.4.2
v1.4.2-beta.5
v1.4.2-beta.4
v1.4.2-beta.3
v1.4.2-beta.2
v1.4.2-beta.1
v1.4.1
v1.4.1-beta.1
v1.4.0
v1.4.0-beta.28
v1.4.0-beta.27
v1.4.0-beta.26
v1.4.0-beta.25
v1.4.0-beta.24
v1.4.0-beta.23
v1.4.0-beta.22
v1.4.0-beta.21
v1.4.0-beta.20
v1.4.0-beta.19
v1.4.0-beta.18
v1.4.0-beta.17
v1.4.0-beta.16
v1.4.0-beta.15
v1.3.34
v1.3.33
v1.4.0-beta.14
v1.3.32
v1.3.31
v1.3.30
v1.4.0-beta.13
v1.3.29
v1.4.0-beta.12
v1.3.28
v1.4.0-beta.11
v1.4.0-beta.10
v1.4.0-beta.9
v1.4.0-beta.8
v1.3.27
v1.4.0-beta.7
v1.3.26
v1.3.25
v1.3.24
v1.4.0-beta.6
v1.3.23
v1.3.22
v1.3.21
v1.3.20
v1.3.19
v1.4.0-beta.5
v1.3.18
v1.4.0-beta.4
v1.3.17
v1.4.0-beta.3
v1.3.16
v1.3.15
v1.3.14
v1.4.0-beta.2
v1.3.13
v1.4.0-beta.1
v1.3.12
v1.3.11-beta.2
v1.3.11
v1.3.11-beta.1
v1.3.10
v1.3.10-beta.7
v1.3.10-beta.6
v1.3.10-beta.5
v1.3.10-beta.4
v1.3.10-beta.3
v1.3.10-beta.2
v1.3.10-beta.1
v1.3.9
v1.3.9-beta.4
v1.3.9-beta.3
v1.3.9-beta.2
v1.3.9-beta.1
v1.3.8
v1.3.8-beta.11
v1.3.8-beta.10
v1.3.8-beta.9
v1.3.8-beta.8
v1.3.8-beta.7
v1.3.8-beta.6
v1.3.8-beta.5
v1.3.8-beta.4
v1.3.8-beta.3
v1.3.8-beta.2
v1.3.8-beta.1
v1.3.7
v1.3.7-beta.4
v1.3.7-beta.3
v1.3.7-beta.2
v1.3.7-beta.1
v1.3.6
v1.3.6-beta.2
v1.3.6-beta.1
v1.3.5
v1.3.5-beta.7
v1.3.5-beta.6
v1.3.5-beta.5
v1.3.5-beta.4
v1.3.5-beta.3
v1.3.5-beta.2
v1.3.5-beta.1
better-auth@1.3.4
@better-auth/stripe@1.3.4
@better-auth/sso@1.3.4
@better-auth/expo@1.3.4
@better-auth/cli@1.3.4
v1.3.4-beta.3
v1.3.4-beta.2
v1.3.4-beta.1
v1.3.3
v1.3.2
v1.3.1
v1.3.1-beta.1
v1.3.0
v1.3.0-beta.11
v1.3.0-beta.10
v1.3.0-beta.9
v1.3.0-beta.8
v1.3.0-beta.7
v1.3.0-beta.6
v1.3.0-beta.5
v1.3.0-beta.4
v1.2.12
v1.3.0-beta.3
v1.3.0-beta.2
v1.3.0-beta.1
v1.2.11
v1.2.10
v1.2.10-pkce-fix.3
v1.2.10-beta.1
v1.2.9
v1.2.9-beta.10
v1.2.9-beta.9
feat/2867-oidcprovider-trusted
v1.2.9-beta.8
v1.2.9-beta.7
v1.2.9-beta.6
v1.2.9-beta.5
v1.2.9-beta.4
v1.2.9-beta.3
v1.2.9-beta.2
v1.2.9-beta.1
v1.2.8
v1.2.8-beta.8
v1.2.8-beta.7
v1.2.8-beta.6
v1.2.8-beta.5
v1.2.8-beta.4
v1.2.8-beta.3
v1.2.8-beta.2
v1.2.8-beta.1
v1.2.7
v1.2.7-beta.1
v1.2.6
v1.2.6-beta.13
v1.2.6-beta.12
v1.2.6-beta.11
v1.2.6-beta.10
v1.2.6-beta.9
v1.2.6-beta.8
v1.2.6-beta.7
v1.2.6-beta.6
v1.2.6-beta.5
v1.2.6-beta.4
v1.2.6-beta.3
v1.2.6-beta.2
v1.2.6-beta.1
v1.2.5
v1.2.5-beta.10
v1.2.5-beta.9
v1.2.5-beta.8
v1.2.5-beta.7
v1.2.5-beta.6
v1.2.5-beta.5
v1.2.5-beta.4
v1.2.5-beta.3
v1.2.5-beta.2
v1.2.5-beta.1
v1.2.4
v1.2.4-beta.12
v1.2.4-beta.11
v1.2.4-beta.10
v1.2.4-beta.9
v1.2.4-beta.8
v1.2.4-beta.7
v1.2.4-beta.6
v1.2.4-beta.5
v1.2.4-beta.4
v1.2.4-beta.3
v1.2.4-beta.2
v1.2.4-beta.1
v1.2.3
v1.2.3-beta.3
v1.2.3-beta.2
v1.2.3-beta.1
v1.2.2
v1.2.2-beta.6
v1.2.2-beta.5
v1.2.2-beta.4
v1.2.2-beta.3
v1.2.2-beta.2
v1.2.2-beta.1
v1.2.1
v1.2.1-beta.8
v1.2.1-beta.7
v1.2.1-beta.6
v1.2.1-beta.5
v1.2.1-beta.4
v1.2.1-beta.3
v1.2.1-beta.2
v1.2.1-beta.1
v1.2.0
v1.2.0-beta.19
v1.2.0-beta.18
v1.2.0-beta.17
v1.1.22-beta.2
v1.1.22-beta.1
v1.2.0-beta.16
v1.1.21
v1.1.21-beta.1
v1.2.0-beta.15
v1.1.20
v1.1.20-beta.5
v1.1.20-beta.4
v1.2.0-beta.14
v1.2.0-beta.13
v1.1.20-beta.3
v1.1.20-beta.2
v1.2.0-beta.12
v1.1.20-beta.1
v1.2.0-beta.11
v1.1.19
v1.1.19-beta.3
v1.2.0-beta.10
v1.2.0-beta.9
v1.2.0-beta.8
v1.2.0-beta.7
v1.1.19-beta.2
v1.1.19-beta.1
v1.1.18
v1.2.0-beta.6
v1.2.0-beta.5
v1.1.18-beta.3
v1.1.18-beta.2
v1.1.18-beta.1
v1.2.0-beta.4
v1.2.0-beta.3
v1.2.0-beta.2
v1.1.17
v1.2.0-beta.1
v1.1.17-beta.5
v1.1.17-beta.4
v1.1.17-beta.3
v1.1.17-beta.2
v1.1.17-beta.1
v1.1.16
v1.1.16-beta.10
v1.1.16-beta.9
v1.1.16-beta.8
v1.1.16-beta.7
v1.1.16-beta.6
v1.1.16-beta.5
v1.1.16-beta.4
v1.1.16-beta.3
v1.1.16-beta.2
v1.1.16-beta.1
v1.1.15
v1.1.15-beta.7
v1.1.15-beta.6
v1.1.15-beta.5
v1.1.15-beta.4
v1.1.15-beta.3
v1.1.15-beta.2
v1.1.15-beta.1
v1.1.14
v1.1.14-beta.6
v1.1.14-beta.5
v1.1.14-beta.4
v1.1.14-beta.3
v1.1.14-beta.2
v1.1.14-beta.1
v1.1.13
v1.1.13-beta.3
v1.1.13-beta.2
v1.1.13-beta.1
v1.1.12
v1.1.12-beta.4
v1.1.12-beta.3
v1.1.12-beta.2
v1.1.12-beta.1
v1.1.11
v1.1.11-beta.1
v1.1.10
v1.1.10-beta.2
v1.1.10-beta.1
v1.1.9
v1.1.9-beta.1
v1.1.8
v1.1.8-beta.3
v1.1.8-beta.2
v1.1.8-beta.1
v1.1.7
v1.1.7-beta.5
v1.1.7-beta.4
v1.1.7-beta.3
v1.1.7-beta.2
v1.1.7-beta.1
v1.1.6
v1.1.5
v1.1.4
v1.1.4-beta.2
v1.1.4-beta.1
v1.1.3
v1.1.3-beta.9
v1.1.3-beta.8
v1.1.3-beta.7
v1.1.3-beta.6
v1.1.3-beta.4
v1.1.3-beta.2
v1.1.3-beta.1
v1.1.2
v1.1.2-beta.4
v1.1.2-beta.3
v1.1.2-beta.2
v1.1.2-beta.1
v1.1.1
v1.1.0
v1.0.23-beta.6
v1.0.23-beta.5
v1.0.23-beta.4
v1.0.23-beta.3
v1.0.23-beta.2
v1.0.23-beta.1
v1.0.22
v1.0.22-beta.4
v1.0.22-beta.3
v1.0.22-beta.2
v1.0.22-beta.1
v1.0.21
v1.0.20
v1.0.19
v1.0.18
v1.0.17
v1.0.16
v1.0.16-beta.2
v1.0.16-beta.1
v1.0.15
v1.0.15-beta.1
v1.0.14
v1.0.13
v1.0.12
v1.0.12-beta.3
v1.0.12-beta.2
v1.0.12-beta.1
v1.0.11
v1.0.11-beta.8
v1.0.11-beta.7
v1.0.11-beta.6
v1.0.11-beta.5
v1.0.11-beta.4
v1.0.11-beta.3
v1.0.11-beta.2
v1.0.11-beta.1
v1.0.10
v1.0.10-beta.3
v1.0.10-beta.2
v1.0.10-beta.1
v1.0.9
v1.0.9-beta.7
v1.0.9-beta.6
v1.0.9-beta.5
v1.0.9-beta.4
v1.0.9-beta.3
v1.0.9-beta.2
v1.0.9-beta.1
v1.0.8
v1.0.8-beta.4
v1.0.8-beta.3
v1.0.8-beta.2
v1.0.8-beta.1
v1.0.7
v1.0.6
v1.0.5
v1.0.4
v1.0.3
v1.0.2
v1.0.1
v1.0.0
v1.0.0-canary.14
v1.0.0-canary.13
v1.0.0-canary.12
v1.0.0-canary.11
v1.0.0-canary.10
v1.0.0-canary.9
v1.0.0-canary.8
v1.0.0-canary.7
v1.0.0-canary.6
v0.8.9-beta.2
v0.8.9-beta.1
v1.0.0-canary.5
v1.0.0-canary.4
v1.0.0-canary.3
v1.0.0-canary.2
v1.0.0-canary.1
v0.8.8
v0.8.8-beta.2
v0.8.8-beta.1
v0.9.0-canary.1
v0.8.7
v0.8.7-canary.2
v0.8.7-canary.1
v0.8.7-beta.5
v0.8.7-beta.4
v0.8.7-beta.3
v0.8.7-beta.2
v0.8.7-beta.1
v0.8.6
v0.8.6-beta.6
v0.8.6-beta.5
v0.8.6-beta.4
v0.8.6-beta.3
v0.8.6-beta.2
v0.8.6-beta.1
v0.8.5
v0.8.5-beta.3
v0.8.5-beta.2
v0.8.5-beta.1
v0.8.4
v0.8.4-beta.7
v0.8.4-beta.6
v0.8.4-beta.5
v0.8.4-beta.4
v0.8.4-beta.2
v0.8.4-beta.1
v0.8.3
v0.8.3-beta.7
v0.8.3-beta.6
v0.8.3-beta.5
v0.8.3-beta.4
v0.8.3-beta.3
v0.8.3-beta.2
v0.8.3-beta.1
v0.8.2
v0.8.2-beta.3
v0.8.2-beta.2
v0.8.2-beta.1
v0.8.1
v0.8.1-beta.5
v0.8.1-beta.4
v0.8.1-beta.3
v0.8.1-beta.2
v0.8.1-beta.1
v0.8.0
v0.7.6-beta.4
v0.7.6-beta.3
v0.7.6-beta.2
v0.7.6-beta.1
v0.7.5
v0.7.5-beta.9
v0.7.5-beta.8
v0.7.5-beta.7
v0.7.5-beta.6
v0.7.5-beta.5
v0.7.5-beta.4
v0.7.5-beta.3
v0.7.5-beta.2
v0.7.5-beta.1
v0.7.4
v0.7.4-beta.1
v0.7.3
v0.7.3-beta.11
v0.7.3-beta.10
v0.7.3-beta.9
v0.7.3-beta.8
v0.7.3-beta.7
v0.7.3-beta.6
v0.7.3-beta.5
v0.7.3-beta.4
v0.7.3-beta.3
v0.7.3-beta.2
v0.7.3-beta.1
v0.7.2
v0.7.2-beta.5
v0.7.2-beta.4
v0.7.2-beta.3
v0.7.2-beta.2
v0.7.2-beta.1
v0.7.1
v0.7.1-beta.6
v0.7.1-beta.5
v0.7.1-beta.4
v0.7.1-beta.3
v0.7.1-beta.2
v0.7.1-beta.1
v0.7.0
v0.7.0-beta.1
v0.6.3-beta.5
v0.6.3-beta.4
v0.6.3-beta.3
v0.6.3-beta.2
v0.6.3-beta.1
v0.6.2
v0.6.2-beta.8
v0.6.2-beta.7
v0.6.2-beta.6
v0.6.2-beta.5
v0.6.2-beta.4
v0.6.2-beta.3
v0.6.2-beta.2
v0.6.2-beta.1
v0.6.1
v0.6.1-beta.9
v0.6.1-beta.8
v0.6.1-beta.7
v0.6.1-beta.6
v0.6.1-beta.5
v0.6.1-beta.4
v0.6.1-beta.3
v0.6.1-beta.2
v0.6.1-beta.1
v0.6.0
v0.6.0-beta.1
v0.5.4-beta.9
v0.5.4-beta.8
v0.5.4-beta.7
v0.5.4-beta.6
v0.5.4-beta.5
v0.5.4-beta.4
v0.5.4-beta.3
v0.5.4-beta.2
v0.5.4-beta.1
v0.5.3
v0.5.3-beta.17
v0.5.3-beta.16
v0.5.3-beta.15
v0.5.3-beta.14
v0.5.3-beta.13
v0.5.3-beta.12
v0.5.3-beta.11
v0.5.3-beta.10
v0.5.3-beta.9
v0.5.3-beta.8
v0.5.3-beta.7
v0.5.3-beta.6
v0.5.3-beta.5
v0.5.3-beta.4
v0.5.3-beta.3
v0.5.3-beta.2
v0.5.3-beta.1
v0.5.2
v0.5.2-beta.21
v0.5.2-beta.20
v0.5.2-beta.19
v0.5.2-beta.18
v0.5.2-beta.17
v0.5.2-beta.16
v0.5.2-beta.15
v0.5.2-beta.14
v0.5.2-beta.13
v0.5.2-beta.12
v0.5.2-beta.11
v0.5.2-beta.10
v0.5.2-beta.9
v0.5.2-beta.8
v0.5.2-beta.7
v0.5.2-beta.6
v0.5.2-beta.5
v0.5.2-beta.4
v0.5.2-beta.3
v0.5.2-beta.2
v0.5.2-beta.1
v0.5.1
v0.5.1-beta.7
v0.5.1-beta.6
v0.5.1-beta.5
v0.5.1-beta.4
v0.5.1-beta.3
v0.5.1-beta.2
v0.5.1-beta.1
v0.5.0
v0.4.14-beta.2
v0.4.14-beta.1
v0.4.13
v0.4.12
v0.4.12-beta.7
v0.4.12-beta.6
v0.4.12-beta.5
v0.4.12-beta.4
v0.4.12-beta.3
v0.4.12-beta.2
v0.4.12-beta.1
v0.4.11
v0.4.11-beta.3
v0.4.11-beta.2
v0.4.11-beta.1
v0.4.10-beta.10
v0.4.10-beta.9
v0.4.10
v0.4.10-beta.8
v0.4.10-beta.7
v0.4.10-beta.6
v0.4.10-beta.5
v0.4.10-beta.4
v0.4.10-beta.3
v0.4.10-beta.2
v0.4.10-beta.1
v0.4.9
v0.4.9-beta.14
v0.4.9-beta.13
v0.4.9-beta.12
v0.4.9-beta.11
v0.4.9-beta.10
v0.4.9-beta.9
v0.4.9-beta.8
v0.4.9-beta.7
v0.4.9-beta.6
v0.4.9-beta.5
v0.4.9-beta.4
v0.4.9-beta.3
v0.4.9-beta.2
v0.4.9-beta.1
v0.4.8
v0.4.7
v0.4.7-beta.2
v0.4.7-beta.1
v0.4.6
v0.4.5
v0.4.4
v0.4.4-beta.1
v0.4.3
v0.4.3-beta.1
v0.4.2
v0.4.2-beta.1
v0.4.1
v0.4.0
v0.3.6
v0.3.5
v0.3.5-beta.8
v0.3.5-beta.7
v0.3.5-beta.6
v0.3.5-beta.5
v0.3.5-beta.4
v0.3.5-beta.3
v0.3.5-beta.2
v0.3.5-beta.1
v0.3.4
v0.3.4-beta.6
v0.3.4-beta.5
v0.3.4-beta.4
v0.3.4-beta.3
v0.3.4-beta.2
v0.3.4-beta.1
v0.3.3
v0.3.3-beta.12
v0.3.3-beta.11
v0.3.3-beta.10
v0.3.3-beta.9
v0.3.3-beta.8
v0.3.3-beta.7
v0.3.3-beta.6
v0.3.3-beta.5
v0.3.3-beta.4
v0.3.3-beta.3
v0.3.3-beta.2
v0.3.3-beta.1
v0.3.2
v0.3.1
v0.3.0
v0.2.11
v0.2.10
v0.2.9
v0.2.9-beta.10
v0.2.9-beta.9
v0.2.9-beta.8
v0.2.9-beta.7
v0.2.9-beta.6
v0.2.9-beta.5
v0.2.9-beta.4
v0.2.9-beta.3
v0.2.9-beta.2
v0.2.9-beta.1
v0.2.8
v0.2.8-beta.13
v0.2.8-beta.12
v0.2.8-beta.11
v0.2.8-beta.10
v0.2.8-beta.9
v0.2.8-beta.8
v0.2.8-beta.7
v0.2.8-beta.6
v0.2.8-beta.5
v0.2.8-beta.4
v0.2.8-beta.3
v0.2.8-beta.2
v0.2.8-beta.1
v0.2.7
v0.2.6
v0.2.6-beta.10
v0.2.6-beta.9
v0.2.6-beta.8
v0.2.6-beta.7
v0.2.6-beta.6
v0.2.6-beta.5
v0.2.6-beta.4
v0.2.6-beta.3
v0.2.6-beta.2
v0.2.6-beta.1
v0.2.5
v0.2.5-beta.5
v0.2.5-beta.4
v0.2.5-beta.3
v0.2.5-beta.2
v0.2.5-beta.1
v0.2.4
v0.2.3
v0.2.3-beta.14
v0.2.3-beta.13
v0.2.3-beta.12
v0.2.3-beta.11
v0.2.3-beta.10
v0.2.3-beta.9
v0.2.3-beta.8
v0.2.3-beta.7
v0.2.3-beta.6
v0.2.3-beta.5
v0.2.3-beta.4
v0.2.3-beta.3
v0.2.3-beta.2
v0.2.3-beta.1
v0.2.2
v0.2.1
v0.2.1-beta.1
v0.2.0
v0.1.1-beta.6
v0.1.1-beta.5
v0.1.1-beta.4
v0.1.1-beta.3
v0.1.1-beta.2
v0.1.1-beta.1
v0.1.0
v0.0.10-beta.27
v0.0.10-beta.26
v0.0.10-beta.25
v0.0.10-beta.24
v0.0.10-beta.23
v0.0.10-beta.22
v0.0.10-beta.21
v0.0.10-beta.20
v0.0.10-beta.19
v0.0.10-beta.18
v0.0.10-beta.17
v0.0.10-beta.16
v0.0.10-beta.15
v0.0.10-beta.14
v0.0.10-beta.13
v0.0.10-beta.12
v0.0.10-beta.11
v0.0.10-beta.10
v0.0.10-beta.9
v0.0.10-beta.8
v0.0.10-beta.7
v0.0.10-beta.6
v0.0.10-beta.5
v0.0.10-beta.4
v0.0.10-beta.3
v0.0.10-beta.2
v0.0.10-beta.1
v0.0.9
v0.0.9-beta.38
v0.0.9-beta.37
v0.0.9-beta.36
v0.0.9-beta.35
v0.0.9-beta.34
v0.0.9-beta.33
v0.0.9-beta.32
v0.0.9-beta.31
v0.0.9-beta.30
v0.0.9-beta.29
v0.0.9-beta.28
v0.0.9-beta.27
v0.0.9-beta.26
v0.0.9-beta.25
v0.0.9-beta.24
v0.0.9-beta.23
v0.0.9-beta.22
v0.0.9-beta.21
v0.0.9-beta.20
v0.0.9-beta.19
v0.0.9-beta.18
v0.0.9-beta.17
v0.0.9-beta.16
v0.0.9-beta.15
v0.0.9-beta.14
v0.0.9-beta.13
v0.0.9-beta.12
v0.0.9-beta.11
v0.0.9-beta.10
v0.0.9-beta.9
v0.0.9-beta.8
v0.0.9-beta.7
v0.0.9-beta.6
v0.0.9-beta.5
v0.0.9-beta.4
v0.0.9-beta.3
v0.0.9-beta.2
v0.0.9-beta.1
v0.0.8
v0.0.8-beta.29
v0.0.8-beta.28
v0.0.8-beta.27
v0.0.8-beta.26
v0.0.8-beta.25
v0.0.8-beta.24
v0.0.8-beta.23
v0.0.8-beta.22
v0.0.8-beta.21
v0.0.8-beta.20
v0.0.8-beta.19
v0.0.8-beta.18
v0.0.8-beta.17
v0.0.8-beta.16
v0.0.8-beta.15
v0.0.8-beta.14
v0.0.8-beta.13
v0.0.8-beta.12
v0.0.8-beta.11
v0.0.8-beta.10
v0.0.8-beta.9
v0.0.8-beta.8
v0.0.8-beta.7
v0.0.8-beta.6
v0.0.8-beta.5
v0.0.8-beta.4
v0.0.8-beta.3
v0.0.8-beta.2
v0.0.8-beta.1
v0.0.7
v0.0.6
v0.0.5
v0.0.4
v0.0.3
v0.0.2
v0.0.2-beta.8
v0.0.2-beta.7
v0.0.2-beta.6
v0.0.2-beta.5
v0.0.2-beta.4
v0.0.2-beta.3
v0.0.2-beta.2
v0.0.2-beta.1
Labels
Clear labels
adapter
astro
awaiting external contributor
blocked
breaking
breaking change
bug
c-devops
core
credentials
database
dependencies
devops
devtools
docs
documentation
duplicate
elysia
enhancement
enterprise
expo
express
fastify
good first issue
help wanted
hono
identity
infra
integration
invalid
javascript
locked
maintenance
need-more-information
needs: info
needs: repro
nextjs
nuxt
oauth
organization
P0
payments
perf
platform
plugin
pull-request
question
ready
regression
remix
security
social-provider
solid
stale
svelte
tanstack-start
tracking
version-bump
vue
wontfix
Mirrored from GitHub Pull Request
No Label
bug
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/better-auth#947
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ian on GitHub (Mar 30, 2025).
Is this suited for github?
To Reproduce
I'm trying to debug why
auth.api.getSessionwill return null, when the session is valid after a query to /api/auth/get-session.Consider the following src/app/layout.tsx:
Current vs. Expected behavior
One would expect to see "RootLayout: { session: { ... } }" but instead, the session is null.
I can see the session token in the requests:
And requests to /api/auth/get-session return a valid session:
What version of Better Auth are you using?
1.2.5
Provide environment information
Which area(s) are affected? (Select all that apply)
Backend
Auth config (if applicable)
Additional context
No response
@BjoernRave commented on GitHub (Mar 30, 2025):
I have the same issue when trying to retrieve the session inside the
getRequestConfigfn of next-intl to retrieve the language of the user, which is also executed in the layout@Kinfe123 commented on GitHub (Mar 30, 2025):
is it because you used it with in a layout file ? or does it persist with in other RSC's ?
@krzkz94 commented on GitHub (Mar 30, 2025):
@Kinfe123 also happens in a page component, not strictly related to layours
Session is null, cookie is present :)
@Kinfe123 commented on GitHub (Mar 30, 2025):
i have upgraded the version to 1.2.5 and try to repro it on both but it is working fine .. may be can u pls check if the cookies is being stale or some other services or even using multiple apps are overriding the value and making it invalid so can you try cleaning it up and try it again if that works.
@krzkz94 commented on GitHub (Mar 30, 2025):
Hey! Attached some extra info below
code
await headers()
await cookies()
better auth session null
NextJS 15.2.4
better-auth: 1.2.0, 1.2.4, 1.2.5 (Tried all 3, downgrading both on server / client)
Then just after the code to get it trough the better-auth API I got a http call
All this was in the same "request" with the same cookies and headers FYI
@Kinfe123 commented on GitHub (Mar 30, 2025):
hmm for auth.api.getSession() which is like a handler that we run as function instead of calling endpoint which the client hooks does but as i said this is sth that other developer are using it for most of the usecase for fetching the user and session and it should have probably been asked by many developer. i mean i dont think there is a bug here but also might be an edge on some conflicting things. ig it should be somewhere in your causing an issue since the route is already mounted as you mentioned. may be on your end try to clean up stuff or restart servers or other thing that is related to your auth as well but lets open it if others do have the problem as well...
@Kinfe123 commented on GitHub (Mar 30, 2025):
wait does it work before adding it ?
@BjoernRave commented on GitHub (Mar 30, 2025):
before adding what? next-intl works fine without adding the getSession call inside it or what do you mean exactly?
@ian commented on GitHub (Mar 30, 2025):
I can't even get the /auth/get-session to return a session when I construct a fetch call manually from the server with cookies forwarded.
Is there some way to turn on debugging to see what's happening at this endpoint, and why it's getting rejected?
@Kinfe123 commented on GitHub (Mar 30, 2025):
i mean before adding next-intl and additionalFields.
@BjoernRave commented on GitHub (Mar 30, 2025):
ahh, in general better-auth works fine for me. I added it to an existing application so next-intl was already there. My only issue was getting the session inside the getRequestConfig call, which is (I am 95% certain) done on the server, so related to the issue. Btw. this is my core, I use the customSession plugin:
@ian commented on GitHub (Mar 30, 2025):
@BjoernRave this is not a next-intl issue, there are some strange behaviors with the get-session endpoint. Sometimes it refuses to return a response body but includes a 200 status.
@ian commented on GitHub (Mar 30, 2025):
I've found that I can make the /auth/get-session call manually and it works fine, it's just when using the auth.api.getSession helper it doesn't work at all.
Layout:
WORKING:
DOES NOT WORK:
@BjoernRave commented on GitHub (Mar 31, 2025):
this is how the response looks like:
session { "data": null, "error": { "status": 0, "statusText": "" } }@serv commented on GitHub (Apr 1, 2025):
I'm facing the same issue.
One thing I am noticing is that the session is populated on the serverside when I am opening a page that
use client.But when the page doesn't have that, this issue happens and session is null for me. Not sure why this is the case.
@ian commented on GitHub (Apr 1, 2025):
Have added better-auth to second application and it's the same exact problem.
@Kinfe123 commented on GitHub (Apr 1, 2025):
@ian can you please send us the code sandbox or github link for more clarified reproduction
@soyricardodev commented on GitHub (Apr 8, 2025):
i had this issue with next canary and better-auth, from 1.2.3 and now with 1.2.5, for me doesnt work the manual fetch to /api/auth/get-session, my solution was to create a "server redirect", basically just a server action that i call when register, login or signout with the authClient helper, if i do a route.push("/another-page"), this dont "refetch" the session on the layout, but if i redirect from a server action this is working
i need the authClient because i like the onError and onSucces for toast stuff and logging, so i dont want to login from a server action 100%, so i just create that util called redirect.ts
And this is how i use it:
@Bekacru commented on GitHub (Apr 11, 2025):
can anyone share me a POC? I couldn't reproduce it either and this is a very important issue to address
@soyricardodev commented on GitHub (Apr 11, 2025):
I could do it, I'd love to. But one question, once I do it, how can I let you know? Would it work for you here?
@Bekacru commented on GitHub (Apr 11, 2025):
@soyricardodev yes. make the repo public and share the link in this thread.
@capaj commented on GitHub (Apr 15, 2025):
same problem here @ian your solution with calling the API with fetch works. Definitely a bug and pretty frustrating one.
I am on 1.2.7.
here's my code snippet including the proper types for the session:
@moreorover commented on GitHub (Apr 16, 2025):
I was not able to reproduce this exact problem, session always logs for me as it should inside root
/src/app/layout.tsHowever, I have found a very similar issue but with tRPC. After refreshing page first request that goes to private procedure comes out as unauthorized because session object received by tRPC is null.
Here is reproduction:
https://github.com/moreorover/prive-video/tree/reproduction
Instructions to start the project are found at https://github.com/moreorover/prive-video/blob/reproduction/README.md
@soyricardodev commented on GitHub (Apr 17, 2025):
Repo to reproduce here: https://github.com/soyricardodev/better-auth-nextjs-session-bug
Also a video
https://github.com/user-attachments/assets/93bf3cde-d237-451f-987c-1e94f04cda80
@soyricardodev commented on GitHub (Apr 17, 2025):
@Bekacru if you need more details, or help to reproduce feel free to lmk
i am very insterested to make this work by default as it should, better-auth is awesome
@drago1520 commented on GitHub (Apr 19, 2025):
I have the same issue here. Again, such a basic feature is missing: the ability to simply get the session from an anonymous user.
@Joe-Taka commented on GitHub (Apr 20, 2025):
For some reason
/api/auth/get-sessionreturns null for me, which also happens forauth.api.getSession(...).@soyricardodev commented on GitHub (Apr 21, 2025):
in which cases do you have that issue, can you share some code and your use?
@soyricardodev commented on GitHub (Apr 21, 2025):
i didnt tested it with anon stuff, can you share a repro?
@drago1520 commented on GitHub (Apr 25, 2025):
I am pretty sure
does not update the browser. Next.js 15.30
@drago1520 commented on GitHub (Apr 26, 2025):
I understood why this happens. You cannot send cookies from server components (as pointed out in #2434 ), so the browser is out of sync with the database sessions. You must use client components or server actions. Let's close this issue.
@BjoernRave commented on GitHub (Apr 26, 2025):
@drago1520 can you please open a seperate issue for your problem with anonymous session and not pollute this thread?
@drago1520 commented on GitHub (Apr 26, 2025):
I believe the issue is the same. We are trying to sign in from an RSC that does not support the writing of cookies. Thus, the browser does not return a session cookie, and we log
null. Please let me know if I am wrong. More details at #2434@soyricardodev commented on GitHub (Apr 26, 2025):
Can you elaborate more why this should be closed?
This happens even with client side stuff, if you see the examples from official docs and from this issue, we are using signIn from auth-client, this sets cookies and log the user with the auth handler, the cookies are being set, but the redirect with use router don't rfresh the browser UI data
@Kinfe123 commented on GitHub (Apr 26, 2025):
@drago1520 but on the above mentioned threads, they were logging the headers and it does have the cookie and cant able to get the session but i see you are trying to run the action handler directly with the RSC.
@edocollado commented on GitHub (May 7, 2025):
i have the same problem
@ian commented on GitHub (May 7, 2025):
We're using a pnpm workspace with shared auth code, I wonder if it's related.
For those having issues, can you reply with whether you are using a package in a workspace, or as a standalone repo?
@capaj commented on GitHub (May 7, 2025):
I am using pnpm in a monorepo
What do you mean by "shared Auth code"
@aleehedl commented on GitHub (May 8, 2025):
I have the same issue, but only when I'm running in dev mode with turbopack:
npx next dev --turbopack, which is the default for Next.js.With production mode or even
npx next devit works.@ricklabanca commented on GitHub (May 21, 2025):
I am glad I found this thread, it drives me crazy. In my server side code (a dto not related to a page directly) I get current user.
I can be running fine, and all of the sudden I have cookies but no session. Then a few minutes later it starts to work again. Restart makes no difference.
It is really strange because I don't see a pattern other than it stopping and suddenly start working again, same page just refreshing, nothing changes other than some time passing.
Are there some flags we could set for the session code? I am on the latest
@Rieranthony commented on GitHub (May 21, 2025):
I have a similar issue, I have a setup with a monorepo.
Everything works fine, I get to do the social sign in with google, cookies are set, but
const session = await auth.api.getSession({ headers: await headers(), });Always returns
nullEverything is on latest.
EDIT:
Getting the session client side wiht "useSession" works fine, so the setup works.
@moreorover commented on GitHub (May 21, 2025):
In my case this was due to the how Next.js handles cookies on server side. Here is the problem explained: https://github.com/t3-oss/create-t3-app/issues/1765
Nothing to do with Better Auth itself.
@dolanoadriano commented on GitHub (May 27, 2025):
I have the problems in the dev.
After building it works.
@dolanoadriano commented on GitHub (May 27, 2025):
update: when I disable the
--turbopackargument for thenext devscript the problem disappears@elpidev commented on GitHub (May 30, 2025):
I didn't run into this issue before, but it started happening about a week ago.
I have a lot of customizations, so I tried reverting to a minimal setup, but the issue still persists.
The user/session is fetched in the root layout and other pages, and if it's null, it redirects to the login page, which is causing users to be logged out frequently.
I added a query param to
/loginlike/login?r=201to help track where the redirect is coming from. In my case, it's not just triggered in the root layout, it also happens on other pages.I'm wondering if there's any workaround available at the moment.
@binarytide commented on GitHub (Jun 4, 2025):
I'm trying to wrap better-auth in an Effect service, and calls like signInEmail successfully returns { redirect, token, user } no problem, but I can't get anything back from getSession
@binarytide commented on GitHub (Jun 4, 2025):
I'll gladly construct a simple poc if it's still needed
@Kinfe123 commented on GitHub (Jun 5, 2025):
Yeah would love that.
@Kinfe123 commented on GitHub (Jun 20, 2025):
@soyricardodev If you look closely, the server session is null before authentication, which makes sense. However, the session is not displayed as null after you click the signup button which means it is not being re-rendered for that unfulfilled or fulfilled promise.
Beyond that, it also seems like an architectural issue , there should be a state change in your context for triggering a re-render of the Nav component, even when you pass the hot promise created on the server.
@applicazza commented on GitHub (Jun 23, 2025):
I've managed to authenticate user anonymously with following code in React Router v7
root.tsx:@mateo-m commented on GitHub (Jun 24, 2025):
Removing the
--turbopackflag when running my NextJS app in dev mode has "reduced" the occurence of the issue for me, but it still happens sometimes - I'm not sure why though, and it disables the recent optimizations that come with Turbopack 😥.better-auth: v1.2.10next: v15.3.0@quroneko-del commented on GitHub (Jun 25, 2025):
In my case, the issue was caused by the hono/language middleware. It seemed to overwrite the cookies after a successful sign-in, so the token couldn't be retained.
Disabling the cache like this resolved the issue.
@bcheung commented on GitHub (Jun 27, 2025):
Also experiencing something similar although I am making the request to my Hono API from the client side.
BUT, it randomly happens once in ~10-20 requests to the get-session endpoint.
When I inspect the requests, I can see that cookies are set properly, there is a valid session in the DB, but sometimes the response is null instead of returning the session data.
Cookies set:

Valid non-expired session:

Null response but status 200:

And refreshing the page again often would result in a successful non-null response body:

Until I refresh it for another 10-20 times then I get a null response.
I have a SPA Expo react native app running on web with better auth routes configured on my Hono API.
Using better auth 1.2.8
It's pretty hard to debug bc it randomly occurs pretty infrequently. But still a huge issue because my app redirects the user to log in again when this happens.
Let me know if anyone has any pointers on how I can debug this type of thing
@bcheung commented on GitHub (Jun 27, 2025):
Might have found a potential lead for my case mentioned above: https://github.com/better-auth/better-auth/issues/2055#issuecomment-3011799925
I stepped through the code and set a breakpoint on line 116 here (inside the sessionDataPayload validity check):
e3ce89562d/packages/better-auth/src/api/routes/session.ts (L106-L122)And called the get-session endpoint (with disableCookieCache=true) every second on my client app using the better auth client.
After 5ish minutes, I hit the breakpoint...
Correct me if I'm wrong but the logic above validates if the session payload is valid based on the secret and the signature.
I confirmed that for a successful request and a failing request, the secret is the same.
That means the signature or some other data in the payload is incorrect/tampered with relative to the signature. But I can assure you I didn't tamper with it lol.
My initial thought is maybe I'm doing something funky somewhere with hooks or middlewares, but is it even possible to accidentally change the cookie session payload or generate an incorrect signature through these? I wouldn't think so but lmk if I should double check a particular area.
If I have some time, I may try to create a simple repro.
But lmk if anyone else can repro.
UPDATE: After digging into this a bit more, I believe my case is not an issue with better auth. Seemed to be an issue with how I proxied and signed requests in my cloudflare worker. After fixing this, can no longer repro.
UPDATE 2: Actually just ran into the the issue again after I thought I fixed it 😂 I had forgotten to set disableCookieCache=true. When this is set to false, I can't reproduce the issue. Can only reproduce it when set to true with my setup. So the issue still remains, going to see if I can repro with a simpler setup.
When comparing the session data payload of a valid cookie vs an invalid cookie, the only thing that changes is the expiresAt and signature fields. I can see how the expiresAt date changes as we refresh the cookie but don't understand why the signature would be incorrect.
UPDATE 3: Here is the repro: https://github.com/bcheung/better-auth-get-session-bug
@web-deved commented on GitHub (Jun 27, 2025):
Was already debugging for 2 hours and probably would have been a few more without your comment. Appreciate it, this fixed the issue for me as well. Have you raised the issue with hono?
@bcheung commented on GitHub (Jun 30, 2025):
@Kinfe123 let me know if I should open a new issue for this as I'm not dealing with RSC but I am getting a null session when cookies are present which leads me to believe it could be related.
Here is the repro: https://github.com/bcheung/better-auth-get-session-bug
Sometimes it takes a while for the issue to occur, but just set the breakpoint and let it run until you encounter it. More details in the README
Also btw, in the repro you will notice I don't use the useSession hook because I ran into issues with it, likely related to this: https://github.com/better-auth/better-auth/issues/1006
So instead, I used react query to manage the auth state. I set the refetch interval to 1s for the purpose of this repro.
@bcheung commented on GitHub (Jul 2, 2025):
@Bekacru @Kinfe123
Don't mean to be annoying, but just want to bump this to see if anyone has ideas on what could be causing this issue.
It seems like a pretty big issue for the session to come back null when the user didn't log out and the session has not expired. It's affecting a handful of my users every day as I see unauthed errors while they use our app. This doesn't even include the untrackable occurences when the user first signs in and gets a null session I currently don't throw an error, it just doesnt trigger a rerender and it keeps them on the sign in page. So the percentage of users affected is not insignificant.
I don't know if I'm just doing something wrong or if it's actually an issue but I made a simple rerpro here:
https://github.com/bcheung/better-auth-get-session-bug
Ideas I have are there may be some issue with updating the expiration and signature, maybe there's a race condition somewhere which is why it happens sometimes but not all the time
I've turned off cookie caching completely and stopped using the disableCookieCache param to avoid this issue for now.
@dolanoadriano commented on GitHub (Jul 3, 2025):
it's unbelievable that such a good library contains such a bug...
@ian commented on GitHub (Jul 3, 2025):
@dolanoadriano the better-auth library is opensource, feel free to submit a fix.
Otherwise, maybe we should start a bug bounty on this.
@Ryan0204 commented on GitHub (Jul 20, 2025):
https://github.com/better-auth/better-auth/issues/3470
This solved my problem.
@golddydev commented on GitHub (Jul 21, 2025):
I am also facing this issue. (most of time it works all fine, but sometimes, I faced this issue)
I am using next.js and better auth
next v15.4.2 and better-auth v1.3.1
I do session check on middleware
and in layout.tsx, I get session, but it returns null
@Ariastarcos commented on GitHub (Jul 23, 2025):
Also having this issue. It only happens for me when the auth client is using a Docker network URL (for example,
http://api:5000), and never happens in local/development when using localhost URLs.@SaviruFr commented on GitHub (Jul 23, 2025):
same here
@PacifismPostMortem commented on GitHub (Jul 24, 2025):
@Bekacru I was seeing the same issue when using the cookie cache. The issue is the expires at time is different in the cookie payload and signature when generating the cookie in setCookeCache, so it's an invalid cookie. The reason it's sporadic is it depends on the timing of the code. When I was testing it, sometimes the date would be the same and other times 1 tick off, it was sporadic. I've opened pull request #3283 to fix the bug.
@ricklabanca commented on GitHub (Jul 24, 2025):
@PacifismPostMortem fantastic catch!!
@ping-maxwell commented on GitHub (Aug 8, 2025):
I will be closing this issue as it's very broad and anything could be the cause of
null.@PacifismPostMortem did a great job at finding that bug and hopefully that's the end of it.
If anyone has any
nullrelated get-session issues please open a new issue, and try to be specific in the title to reduce chances of more broad issues that introduce a lot of unrelated noise.@pTinosq commented on GitHub (Sep 5, 2025):
For anyone struggling with React Native frontend + some other backend this fix worked:
https://github.com/better-auth/better-auth/issues/3892#issuecomment-3170588827
@abdtriedcoding commented on GitHub (Feb 7, 2026):
Actual behavior
The call above always returns
nullin Server Components, even though:Temporary workaround (works for me)
I was able to make it work by manually calling the
/api/auth/get-sessionendpoint and forwarding cookies explicitly:This confirms:
auth.api.getSession()inside Server ComponentsQuestion / discussion
auth.api.getSession({ headers })work in Server Components, or is a different approach recommended?Would love to hear your thoughts!!