New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

lightauth

Package Overview
Dependencies
Maintainers
1
Versions
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

lightauth

LightAuth: lightweight authentication library with Arctic OAuth, Argon2id hashing, and Kysely-backed storage

latest
Source
npmnpm
Version
0.3.0
Version published
Maintainers
1
Created
Source

LightAuth

A lightweight authentication library built with Arctic (OAuth 2.0), Argon2id (password hashing), and Mech Storage as the database backend. Designed for teams who need production-ready auth with minimal bundle size (~15KB vs 150KB).

Features

  • Arctic OAuth 2.0 - Lightweight OAuth with GitHub, Google support (~10KB)
  • Argon2id password hashing - Secure, modern password hashing via @node-rs/argon2
  • Email/password authentication - Built-in email verification and password reset
  • Session management - Secure, database-backed sessions with configurable expiration
  • Mech Storage PostgreSQL as the database (HTTP-based, no direct DB connection needed)
  • Cloudflare Workers compatible - OAuth + sessions work in edge runtimes when using an HTTP-based database
  • React hooks included (useAuth, AuthProvider)
  • TypeScript-first - Full type safety with Kysely query builder
  • Minimal bundle size - ~15KB (vs 150KB for Better Auth)

Installation

Note: Install from npm as lightauth.

npm install lightauth arctic kysely @node-rs/argon2 oslo

Or using a specific version/tag:

npm install lightauth arctic kysely @node-rs/argon2 oslo

Or add to package.json:

{
  "dependencies": {
    "lightauth": "^0.3.0",
    "arctic": "^2.0.0",
    "kysely": "^0.27.3",
    "@node-rs/argon2": "^2.0.0",
    "oslo": "^1.2.0"
  }
}

Quick Start

Server Setup

Create lib/auth.ts:

import { createMechAuth } from "lightauth"

export const authConfig = createMechAuth({
  secret: process.env.AUTH_SECRET!,
  baseUrl: process.env.BASE_URL || "http://localhost:3000",
  database: {
    appId: process.env.MECH_APP_ID!,
    apiKey: process.env.MECH_API_KEY!,
  },
  oauth: {
    github: {
      clientId: process.env.GITHUB_CLIENT_ID!,
      clientSecret: process.env.GITHUB_CLIENT_SECRET!,
      redirectUri: `${process.env.BASE_URL}/auth/callback/github`,
    },
  },
})

Next.js App Router

Create app/api/auth/[...path]/route.ts:

import { handleMechAuthRequest } from "lightauth"
import { authConfig } from "@/lib/auth"

export async function GET(request: Request) {
  return handleMechAuthRequest(request, authConfig)
}

export async function POST(request: Request) {
  return handleMechAuthRequest(request, authConfig)
}

Cloudflare Workers

Create src/auth.ts:

import { createMechAuth, handleMechAuthRequest } from "lightauth"

export function createAuth(env: Env) {
  return createMechAuth({
    secret: env.AUTH_SECRET,
    baseUrl: "https://your-worker.workers.dev",
    database: {
      appId: env.MECH_APP_ID,
      apiKey: env.MECH_API_KEY,
    },
    isProduction: true,
  })
}

export default {
  async fetch(request: Request, env: Env): Promise<Response> {
    const url = new URL(request.url)

    if (url.pathname.startsWith("/auth")) {
      const config = createAuth(env)
      return handleMechAuthRequest(request, config)
    }

    return new Response("Hello World")
  }
}

React Client

Wrap your app with AuthProvider:

// app/providers.tsx
"use client"

import { AuthProvider } from "lightauth/react"

export function Providers({ children }: { children: React.ReactNode }) {
  return (
    <AuthProvider baseUrl="/api/auth">
      {children}
    </AuthProvider>
  )
}

Use in components:

"use client"

import { useAuth } from "lightauth/react"

export function LoginButton() {
  const { user, loading, signIn, signOut } = useAuth()

  if (loading) return <p>Loading...</p>

  if (user) {
    return (
      <div>
        <p>Welcome, {user.email}!</p>
        <button onClick={signOut}>Sign Out</button>
      </div>
    )
  }

  return (
    <button onClick={() => signIn("user@example.com", "password")}>
      Sign In
    </button>
  )
}

Configuration

Required Configuration

All configuration must be passed explicitly to createMechAuth():

ParameterTypeRequiredDescription
secretstringYesSecret for signing tokens (minimum 32 characters recommended)
baseUrlstringYesYour application's base URL (e.g., https://example.com)
database.appIdstringYesYour Mech app UUID
database.apiKeystringYesYour Mech API key
isProductionbooleanNoSet to true in production (enables secure cookies)

Optional Configuration

ParameterTypeDescription
oauthOAuthProvidersConfigOAuth provider configuration (GitHub, Google)
sessionSessionConfigSession configuration (expiration, cookie settings)
passwordPasswordConfigPassword validation rules (minLength)
corsCorsConfigCORS configuration for browser clients

Session Presets

Three session configurations are available:

import {
  defaultSessionConfig,  // 7 days, sameSite: lax
  shortSessionConfig,    // 1 hour, sameSite: strict
  longSessionConfig      // 30 days, sameSite: lax
} from "lightauth"

const config = createMechAuth({
  // ...
  session: shortSessionConfig, // Use preset
})

Node.js / Next.js (.env.local):

AUTH_SECRET=your-secret-key-at-least-32-chars
BASE_URL=http://localhost:3000
MECH_APP_ID=550e8400-e29b-41d4-a716-446655440000
MECH_API_KEY=your-mech-api-key

# OAuth (optional)
GITHUB_CLIENT_ID=your-github-client-id
GITHUB_CLIENT_SECRET=your-github-client-secret

Cloudflare Workers (wrangler.toml):

[vars]
BASE_URL = "https://your-worker.workers.dev"

# Use `wrangler secret put` for sensitive values:
# wrangler secret put AUTH_SECRET
# wrangler secret put MECH_API_KEY
# wrangler secret put GITHUB_CLIENT_SECRET

API Reference

createMechAuth(options)

Creates an authentication configuration object.

import { createMechAuth } from "lightauth"

const config = createMechAuth({
  secret: process.env.AUTH_SECRET!,
  baseUrl: "https://example.com",
  database: {
    appId: process.env.MECH_APP_ID!,
    apiKey: process.env.MECH_API_KEY!,
  },
  oauth: {
    github: {
      clientId: process.env.GITHUB_CLIENT_ID!,
      clientSecret: process.env.GITHUB_CLIENT_SECRET!,
      redirectUri: "https://example.com/auth/callback/github",
    },
  },
  session: defaultSessionConfig,
  password: { minLength: 12 },
})

Returns: MechAuthConfig - Configuration object to pass to handleMechAuthRequest()

handleMechAuthRequest(request, config)

Universal request handler for all authentication routes.

import { handleMechAuthRequest } from "lightauth"

const response = await handleMechAuthRequest(request, authConfig)

Parameters:

  • request: Request - Web standard Request object
  • config: MechAuthConfig - Configuration from createMechAuth()

Returns: Promise<Response> - Web standard Response object

React Hooks

<AuthProvider>

Wraps your app to provide authentication context.

import { AuthProvider } from "lightauth/react"

<AuthProvider baseUrl="/api/auth">
  {children}
</AuthProvider>

useAuth()

Access authentication state and actions.

import { useAuth } from "lightauth/react"

const {
  user,              // Current user or null
  loading,           // Loading state
  error,             // Error message or null
  signIn,            // (email, password) => Promise<void>
  signUp,            // (email, password, name?) => Promise<void>
  signOut,           // () => Promise<void>
  loginWithGithub,   // () => Promise<void>
  loginWithGoogle,   // () => Promise<void>
  refresh,           // () => Promise<void>
} = useAuth()

Authentication Routes

All routes are handled by handleMechAuthRequest():

RouteMethodDescription
/auth/signupPOSTEmail/password signup
/auth/loginPOSTEmail/password login
/auth/logoutPOSTSign out current user
/auth/sessionGETGet current session
/auth/verify-emailPOSTRequest email verification
/auth/reset-passwordPOSTRequest password reset
/auth/reset-password/confirmPOSTConfirm password reset with token
/auth/githubGETInitiate GitHub OAuth flow
/auth/callback/githubGETGitHub OAuth callback
/auth/googleGETInitiate Google OAuth flow
/auth/callback/googleGETGoogle OAuth callback

How It Works

  • Arctic handles OAuth 2.0 flows (GitHub, Google) with PKCE and state validation
  • Argon2id hashes passwords securely (memory-hard, side-channel resistant)
  • Oslo generates cryptographically secure tokens (base64url encoded)
  • Kysely provides type-safe SQL queries to Mech Storage
  • Mech Storage stores users, sessions, and OAuth accounts via HTTP API

This architecture means:

  • No heavyweight auth frameworks required
  • Works in any JavaScript runtime (Node.js, Cloudflare Workers, Deno, Bun)
  • No direct database connections needed
  • Minimal bundle size (~15KB vs 150KB)
  • Full TypeScript type safety

Security Features

  • Argon2id password hashing - OWASP recommended, memory-hard algorithm
  • Email enumeration prevention - Constant-time responses for password reset
  • CSRF protection - State parameter validation in OAuth flows
  • PKCE for OAuth - Prevents authorization code interception
  • Secure session cookies - httpOnly, sameSite, secure flags
  • Token expiration - Configurable session and token TTLs
  • Timing attack resistance - Constant-time comparisons

Cloudflare Compatibility

Compatible with Cloudflare Workers and Pages when using an HTTP-based database backend. Note that email/password uses @node-rs/argon2 (native) and may require a Node runtime.

  • No process.env usage - All configuration is explicit
  • Works with Workers env bindings - Pass secrets from environment
  • HTTP-based database - No TCP connections required
  • Edge-friendly - No Node.js-specific APIs
  • Web Standards - Uses Request/Response objects

Development

# Install dependencies
bun install

# Run tests
bun run test

# Run tests in watch mode
bun run test:watch

# Build
bun run build

# Output appears in dist/

Migration from Better Auth

If migrating from Better Auth:

  • Replace better-auth dependency with arctic, @node-rs/argon2, oslo
  • Update createMechAuth() - returns MechAuthConfig instead of auth instance
  • Use handleMechAuthRequest() instead of auth.handler
  • Update React imports from better-auth/react to lightauth/react
  • Update session config - uses new format with cookie object

See MIGRATION_GUIDE.md for detailed migration steps.

License

MIT

Keywords

auth

FAQs

Package last updated on 12 Dec 2025

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts