Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions apps/docs/content/guides/auth/auth-anonymous.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -116,7 +116,7 @@ Converting an anonymous user to a permanent user requires [linking an identity](
You can use the [`updateUser()`](/docs/reference/javascript/auth-updateuser) method to link an email or phone identity to the anonymous user. To add a password for the anonymous user, the user's email or phone number needs to be verified first.

```js
const { data, error } = await supabase.auth.updateUser({ email: 'example@email.com' })
const { data, error } = await supabase.auth.updateUser({ email: 'valid.email@supabase.io' })

// verify the user's email by clicking on the email change link
// or entering the 6-digit OTP sent to the email address
Expand All @@ -131,7 +131,7 @@ const { data, error } = await supabase.auth.updateUser({ password: 'password' })
You can use the [`updateUser()`](/docs/reference/dart/auth-updateuser) method to link an email or phone identity to the anonymous user.

```dart
await supabase.auth.updateUser(UserAttributes(email: 'example@email.com'));
await supabase.auth.updateUser(UserAttributes(email: 'valid.email@supabase.io'));
```

</TabPanel>
Expand All @@ -141,7 +141,7 @@ You can use the [`updateUser()`](/docs/reference/swift/auth-updateuser) method t

```swift
try await supabase.auth.updateUser(
user: UserAttributes(email: "example@email.com")
user: UserAttributes(email: "valid.email@supabase.io")
)
```

Expand All @@ -152,7 +152,7 @@ You can use the [`updateUser()`](/docs/reference/kotlin/auth-updateuser) method

```kotlin
supabase.auth.updateUser {
email = "example@email.com"
email = "valid.email@supabase.io"
}
```

Expand All @@ -163,7 +163,7 @@ You can use the [`update_user()`](/docs/reference/python/auth-updateuser) method

```python
response = supabase.auth.update_user({
'email': 'example@email.com',
'email': 'valid.email@supabase.io',
})

# verify the user's email by clicking on the email change link
Expand Down Expand Up @@ -274,7 +274,7 @@ const { data: anonData, error: anonError } = await supabase.auth.getSession()

// 2. Attempt to update the user with the existing email
const { data: updateData, error: updateError } = await supabase.auth.updateUser({
email: '[email protected]',
email: '[email protected]',
})

// 3. Handle the error (since the email belongs to an existing user)
Expand All @@ -286,7 +286,7 @@ if (updateError) {
data: { user: existingUser },
error: signInError,
} = await supabase.auth.signInWithPassword({
email: '[email protected]',
email: '[email protected]',
password: 'user_password',
})

Expand Down
22 changes: 11 additions & 11 deletions apps/docs/content/guides/auth/auth-email-passwordless.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ If the user hasn't signed up yet, they are automatically signed up by default. T
```js
async function signInWithEmail() {
const { data, error } = await supabase.auth.signInWithOtp({
email: 'example@email.com',
email: 'valid.email@supabase.io',
options: {
// set this to false if you do not want the user to be automatically signed up
shouldCreateUser: false,
Expand All @@ -67,7 +67,7 @@ import { makeRedirectUri } from 'expo-auth-session'
const redirectTo = makeRedirectUri()

const { error } = await supabase.auth.signInWithOtp({
email: 'example@email.com',
email: 'valid.email@supabase.io',
options: {
emailRedirectTo: redirectTo,
},
Expand All @@ -81,7 +81,7 @@ Read the [Deep Linking Documentation](/docs/guides/auth/native-mobile-deep-linki

```dart
Future<void> signInWithEmail() async {
final AuthResponse res = await supabase.auth.signinwithotp(email: 'example@email.com');
final AuthResponse res = await supabase.auth.signinwithotp(email: 'valid.email@supabase.io');
}
```

Expand All @@ -90,7 +90,7 @@ Future<void> signInWithEmail() async {

```swift
try await supabase.auth.signInWithOTP(
email: "example@email.com",
email: "valid.email@supabase.io",
redirectTo: URL(string: "https://example.com/welcome"),
// set this to false if you do not want the user to be automatically signed up
shouldCreateUser: false
Expand All @@ -103,7 +103,7 @@ try await supabase.auth.signInWithOTP(
```kotlin
suspend fun signInWithEmail() {
supabase.auth.signInWith(OTP) {
email = "example@email.com"
email = "valid.email@supabase.io"
}
}
```
Expand All @@ -113,7 +113,7 @@ suspend fun signInWithEmail() {

```python
response = supabase.auth.sign_in_with_otp({
'email': 'example@email.com',
'email': 'valid.email@supabase.io',
'options': {
# set this to false if you do not want the user to be automatically signed up
'should_create_user': False,
Expand Down Expand Up @@ -181,7 +181,7 @@ If the user hasn't signed up yet, they are automatically signed up by default. T

```js
const { data, error } = await supabase.auth.signInWithOtp({
email: 'example@email.com',
email: 'valid.email@supabase.io',
options: {
// set this to false if you do not want the user to be automatically signed up
shouldCreateUser: false,
Expand All @@ -194,7 +194,7 @@ const { data, error } = await supabase.auth.signInWithOtp({

```dart
Future<void> signInWithEmailOtp() async {
final AuthResponse res = await supabase.auth.signInWithOtp(email: 'example@email.com');
final AuthResponse res = await supabase.auth.signInWithOtp(email: 'valid.email@supabase.io');
}
```

Expand All @@ -203,7 +203,7 @@ Future<void> signInWithEmailOtp() async {

```swift
try await supabase.auth.signInWithOTP(
email: "example@email.com",
email: "valid.email@supabase.io",
// set this to false if you do not want the user to be automatically signed up
shouldCreateUser: false
)
Expand All @@ -215,7 +215,7 @@ try await supabase.auth.signInWithOTP(
```kotlin
suspend fun signInWithEmailOtp() {
supabase.auth.signInWith(OTP) {
email = "example@email.com"
email = "valid.email@supabase.io"
}
}
```
Expand All @@ -225,7 +225,7 @@ suspend fun signInWithEmailOtp() {

```python
response = supabase.auth.sign_in_with_otp({
'email': 'example@email.com',
'email': 'valid.email@supabase.io',
'options': {
# set this to false if you do not want the user to be automatically signed up
'should_create_user': False,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -664,7 +664,7 @@ For authentication methods that have a `redirectTo` or `emailRedirectTo`, this m

```jsx
supabase.auth.signUp({
email: '[email protected]',
email: '[email protected]',
password: 'sup3rs3cur3',
options: {
emailRedirectTo: 'http://localhost:3000/auth/callback',
Expand Down
2 changes: 1 addition & 1 deletion apps/docs/content/guides/auth/auth-helpers/nextjs.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -1294,7 +1294,7 @@ For authentication methods that have a `redirectTo` or `emailRedirectTo`, this m

```jsx
supabase.auth.signUp({
email: '[email protected]',
email: '[email protected]',
password: 'sup3rs3cur3',
options: {
emailRedirectTo: 'http://localhost:3000/auth/callback',
Expand Down
6 changes: 3 additions & 3 deletions apps/docs/content/guides/auth/auth-helpers/remix.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -613,7 +613,7 @@ export default function Login() {

const handleEmailLogin = async () => {
await supabase.auth.signInWithPassword({
email: 'jon@supabase.com',
email: 'valid.email@supabase.io',
password: 'password',
})
}
Expand Down Expand Up @@ -651,7 +651,7 @@ export default function Login() {

const handleEmailLogin = async () => {
await supabase.auth.signInWithPassword({
email: 'jon@supabase.com',
email: 'valid.email@supabase.io',
password: 'password',
})
}
Expand Down Expand Up @@ -826,7 +826,7 @@ For authentication methods that have a `redirectTo` or `emailRedirectTo`, this m

```jsx
supabaseClient.auth.signUp({
email: '[email protected]',
email: '[email protected]',
password: 'sup3rs3cur3',
options: {
emailRedirectTo: 'http://localhost:3000/auth/callback',
Expand Down
2 changes: 1 addition & 1 deletion apps/docs/content/guides/auth/auth-helpers/sveltekit.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -903,7 +903,7 @@ For authentication methods that have a `redirectTo` or `emailRedirectTo`, this m

```ts
await supabase.auth.signUp({
email: '[email protected]',
email: '[email protected]',
password: 'sup3rs3cur3',
options: {
emailRedirectTo: 'http://localhost:3000/auth/callback',
Expand Down
8 changes: 4 additions & 4 deletions apps/docs/content/guides/auth/auth-hooks/send-email-hook.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -37,14 +37,14 @@ Email sending depends on two settings: Email Provider and Auth Hook status.
"id": "8484b834-f29e-4af2-bf42-80644d154f76",
"aud": "authenticated",
"role": "authenticated",
"email": "john@soupbase.io",
"email": "valid.email@supabase.io",
"phone": "",
"app_metadata": {
"provider": "email",
"providers": ["email"]
},
"user_metadata": {
"email": "john@soupbase.io",
"email": "valid.email@supabase.io",
"email_verified": false,
"phone_verified": false,
"sub": "8484b834-f29e-4af2-bf42-80644d154f76"
Expand All @@ -55,7 +55,7 @@ Email sending depends on two settings: Email Provider and Auth Hook status.
"id": "8484b834-f29e-4af2-bf42-80644d154f76",
"user_id": "8484b834-f29e-4af2-bf42-80644d154f76",
"identity_data": {
"email": "john@soupbase.io",
"email": "valid.email@supabase.io",
"email_verified": false,
"phone_verified": false,
"sub": "8484b834-f29e-4af2-bf42-80644d154f76"
Expand All @@ -64,7 +64,7 @@ Email sending depends on two settings: Email Provider and Auth Hook status.
"last_sign_in_at": "2024-05-14T12:56:33.824231484Z",
"created_at": "2024-05-14T12:56:33.824261Z",
"updated_at": "2024-05-14T12:56:33.824261Z",
"email": "john@soupbase.io"
"email": "valid.email@supabase.io"
}
],
"created_at": "2024-05-14T12:56:33.821567Z",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ Alternatively, you can use the `supabase sso info --project-ref <your-project>`
User accounts and identities created via SSO differ from regular (email, phone, password, social login...) accounts in these ways:

- **No automatic linking.**
Each user account verified using a SSO identity provider will not be automatically linked to existing user accounts in the system. That is, if a user `[email protected]` had signed up with a password, and then uses their company SSO login with your project, there will be two `[email protected]` user accounts in the system.
Each user account verified using a SSO identity provider will not be automatically linked to existing user accounts in the system. That is, if a user `[email protected]` had signed up with a password, and then uses their company SSO login with your project, there will be two `[email protected]` user accounts in the system.
- **Emails are not necessarily unique.**
Given the behavior with no automatic linking, email addresses are no longer a unique identifier for a user account. Please always use the user's UUID to correctly reference user accounts.
- **Sessions may have a maximum duration.**
Expand Down Expand Up @@ -288,7 +288,7 @@ Given a SAML 2.0 assertion that includes these attributes:
NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
>
<saml:AttributeValue xsi:type="xs:string">
[email protected]
[email protected]
</saml:AttributeValue>
</saml:Attribute>

Expand All @@ -308,7 +308,7 @@ Will result in the following claims in the user's identity in the database and J

```json
{
"email": "[email protected]",
"email": "[email protected]",
"custom_claims": {
"first_name": "Jane Doe"
}
Expand Down
4 changes: 2 additions & 2 deletions apps/docs/content/guides/auth/jwts.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ The `user access token` is the JWT issued when you call for example:

```js
supabase.auth.signIn({
email: '[email protected]',
email: '[email protected]',
password: 'They_Live_1988!',
})
```
Expand All @@ -153,7 +153,7 @@ You'll notice that this token is quite a bit longer, since it contains informati
"aud": "authenticated",
"exp": 1615824388,
"sub": "0334744a-f2a2-4aba-8c8a-6e748f62a172",
"email": "[email protected]",
"email": "[email protected]",
"app_metadata": {
"provider": "email"
},
Expand Down
8 changes: 4 additions & 4 deletions apps/docs/content/guides/auth/managing-user-data.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ You can assign metadata to users on sign up:

```js
const { data, error } = await supabase.auth.signUp({
email: 'example@email.com',
email: 'valid.email@supabase.io',
password: 'example-password',
options: {
data: {
Expand All @@ -85,7 +85,7 @@ const { data, error } = await supabase.auth.signUp({

```dart
final res = await supabase.auth.signUp(
email: 'example@email.com',
email: 'valid.email@supabase.io',
password: 'example-password',
data: {
'first_name': 'John',
Expand All @@ -99,7 +99,7 @@ final res = await supabase.auth.signUp(

```swift
try await supabase.auth.signUp(
email: "example@email.com",
email: "valid.email@supabase.io",
password: "example-password",
data: [
"first_name": .string("John"),
Expand All @@ -113,7 +113,7 @@ try await supabase.auth.signUp(

```kotlin
val data = supabase.auth.signUpWith(Email) {
email = "example@email.com"
email = "valid.email@supabase.io"
password = "example-password"
data = buildJsonObject {
put("first_name", "John")
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ With Deep Linking, you can configure this redirect to open a specific page. This

const sendMagicLink = async () => {
const { error } = await supabase.auth.signInWithOtp({
email: "example@email.com",
email: "valid.email@supabase.io",
options: {
emailRedirectTo: redirectTo,
},
Expand Down
Loading
Loading