Today we're releasing @supabase/server in public beta.
This is a new package that handles auth verification, client setup, request context, and common server-side boilerplate for you. It works across Edge Functions, Cloudflare Workers, Hono and Bun.
We anonymously analyzed 25,000 deployed Edge Functions and saw the same pattern everywhere: developers were rebuilding the same setup code over and over just to get to their actual business logic.
Most functions needed to:
- Create a Supabase client with
SUPABASE_ANON_KEY - Create another admin client with
SUPABASE_SERVICE_ROLE_KEYthat can bypass Row Level Security - Verify the JWT
- Parse claims
- Handle CORS
- Wire up auth context
- Copy/paste the same
_shared/*.tsfiles between functions
With @supabase/server you just declare who can call your endpoint and get a fully initialized context back:
- User-scoped Supabase client
- Admin client with service role access
- Verified user identity
- JWT claims
- Built-in request/auth helpers
_17import { withSupabase } from '@supabase/server'_17_17// Typical Deno.serve usage_17Deno.serve(_17 withSupabase({ auth: 'user' }, async (req, ctx) => {_17 const { data } = await ctx.supabase.from('todos').select()_17 return Response.json(data)_17 })_17)_17_17// New fetch style handler usage_17export default {_17 fetch: withSupabase({ auth: 'user' }, async (req, ctx) => {_17 const { data } = await ctx.supabase.from('todos').select()_17 return Response.json(data)_17 }),_17}
Note that export default { fetch } is equivalent to Deno.serve(...). Both define a request handler. We use export default throughout this post because it works across Edge Functions, Workers, and Bun. If you prefer Deno.serve, you can keep using it — it's still supported on Edge Functions.
How it works#
At the core of @supabase/server is the SupabaseContext: a request context that includes everything most Edge Functions need, already configured for you.
That includes:
- A user-scoped Supabase client
- An admin client with service role access
- Verified user identity
- JWT claims
- Auth metadata
@supabase/server gives you multiple ways to get a SupabaseContext. The most common is withSupabase, a wrapper that handles auth, client creation, and CORS before your handler runs:
_10import { withSupabase } from 'npm:@supabase/server'_10_10export default {_10 fetch: withSupabase({ auth: 'user' }, async (req, ctx) => {_10 const { data } = await ctx.supabase.from('todos').select()_10 return Response.json(data)_10 }),_10}
If you need more control over error handling and responses, you can also call createSupabaseContext directly:
_11import { createSupabaseContext } from '@supabase/server'_11_11export default {_11 fetch: async (req) => {_11 const { data: ctx, error } = await createSupabaseContext(req, { auth: 'user' })_11 if (error) return Response.json({ error: error.message }, { status: error.status })_11_11 const { data } = await ctx.supabase.from('todos').select()_11 return Response.json(data)_11 },_11}
Both approaches give you the same SupabaseContext. No shared utility files. No environment variable management. No manual JWT verification.
What's in the context#
Every withSupabase handler receives a ctx object with two pre-configured clients:
ctx.supabase — a user-scoped client that automatically respects RLS policies
ctx.supabaseAdmin — an admin client using the service role for privileged operations
No manual client setup, JWT verification, or environment variable wiring required.
The full context looks like this:
_10interface SupabaseContext {_10 supabase: SupabaseClient_10 supabaseAdmin: SupabaseClient_10 userClaims: UserIdentity | null_10 jwtClaims: JWTClaims | null_10 authMode: AuthMode_10}
Declarative access control#
With @supabase/server, authentication happens before your handler runs.
You declare who is allowed to call the endpoint, and the package handles verification automatically.
For example, this endpoint allows unauthenticated requests:
_10export default {_10 fetch: withSupabase({ auth: 'none' }, async (_req, _ctx) => {_10 return Response.json({ status: 'ok' })_10 }),_10}
This endpoint requires a valid user JWT:
_10export default {_10 fetch: withSupabase({ auth: 'user' }, async (req, ctx) => {_10 const { data } = await ctx.supabase.from('todos').select()_10 return Response.json(data)_10 }),_10}
If the request does not include a valid user token, the request is rejected before your handler executes.
Here's all of the auth modes included in the package:
_14// authenticated users only (default)_14withSupabase({ auth: 'user' }, handler)_14_14// no auth required, good for webhooks and health checks_14withSupabase({ auth: 'none' }, handler)_14_14// server-to-server with secret key_14withSupabase({ auth: 'secret' }, handler)_14_14// with publishable key_14withSupabase({ auth: 'publishable' }, handler)_14_14// accept either a user JWT or a secret key_14withSupabase({ auth: ['user', 'secret'] }, handler)
Your function's security model is visible in one line.
Adopting new auth keys without the boilerplate#
Last year we improved project security with asymmetric JWT Signing Keys and new API keys. Better security for every project, but migrating existing functions was hard.
You had to install jose, configure a JWKS endpoint, build your own auth middleware, expose new secrets, and update every function individually.
We fixed it. @supabase/server handles new key validation and JWT verification internally. You adopt the package and the new security model comes with it. No jose. No JWKS configuration. No manual secret setup.
_10import { withSupabase } from '@supabase/server'_10_10export default {_10 // auth: 'user' will handle incoming user JWT validation for you_10 fetch: withSupabase({ auth: 'user' }, async (req, { supabase }) => {_10 const { data } = await supabase.from('subscriptions').select('*')_10 return Response.json(data)_10 }),_10}
Now you get support for the new auth keys without manual JWT verification. Delete your shared utility files and focus on business logic.
Same code, every runtime#
withSupabase returns a standard (Request) => Promise<Response> handler. It works with any runtime that supports the Web API pattern.
Edge Functions and Cloudflare Workers:
_10export default {_10 fetch: withSupabase({ auth: 'user' }, handler),_10}
Hono (with the included adapter):
_12import { withSupabase } from '@supabase/server/adapters/hono'_12import { Hono } from 'hono'_12_12const app = new Hono()_12_12app.get('/todos', withSupabase({ auth: 'user' }), async (c) => {_12 const { supabase } = c.var.supabaseContext_12 const { data } = await supabase.from('todos').select()_12 return c.json(data)_12})_12_12export default { fetch: app.fetch }
Composable primitives#
Most developers don't need anything beyond withSupabase or createSupabaseContext. But you can use the underlying primitives directly.
_10import {_10 createAdminClient,_10 createContextClient,_10 resolveEnv,_10 verifyAuth,_10} from '@supabase/server/core'
These are useful when you need more control: multiple routes with different auth, custom response headers, or domain-specific wrappers like MCP servers.
Here's an Edge Function with per-route auth:
_22import { createContextClient, verifyAuth } from '@supabase/server/core'_22_22export default {_22 fetch: async (req) => {_22 const url = new URL(req.url)_22_22 if (url.pathname === '/health') {_22 return Response.json({ status: 'ok' })_22 }_22_22 if (url.pathname === '/todos') {_22 const { data: auth, error } = await verifyAuth(req, { auth: 'user' })_22 if (error) return Response.json({ error: error.message }, { status: error.status })_22_22 const supabase = createContextClient(auth.token)_22 const { data } = await supabase.from('todos').select()_22 return Response.json(data)_22 }_22_22 return new Response('Not found', { status: 404 })_22 },_22}
These are the same primitives that power withSupabase. Teams building MCP servers, custom middleware, or framework adapters can compose them into their own patterns.
One pattern for humans and AI agents#
We designed @supabase/server with agentic development in mind. Every function follows the same structure: declare access, receive context, write logic.
During internal testing, Claude Code migrated an entire project's Edge Functions to @supabase/server in a single prompt. That included adopting new API keys, removing shared utility files, and switching every function to withSupabase. All functions worked on the first run.
When every function looks the same, agents produce correct code from a single example.
FAQ#
Does this replace @supabase/ssr?
No. @supabase/ssr handles cookie-based session management for frameworks like Next.js and SvelteKit. @supabase/server handles stateless, header-based auth for Edge Functions, Workers, and other backend runtimes. The two packages coexist and are not replacements for each other. Deeper integration with @supabase/ssr is on the roadmap.
If you would like to adopt the DX that this package provides, check our SSR frameworks documentation for implementation references.
Does this only support Hono?
No. withSupabase works with any runtime that supports the standard Request/Response Web API: Edge Functions, Cloudflare Workers, Bun, and more. Hono was the first framework adapter we shipped, and we have already merged a community PR for the H3 adapter. We expect to accept more community-contributed adapters.
Where is the documentation?
The package ships with full documentation in the GitHub repo. We're also working on adding guides to the Supabase docs.
What about environment variables?
On the Supabase platform and Local Development (CLI), your Edge Functions will receive the required environment variables to work out of the box (SUPABASE_PUBLISHABLE_KEYS, SUPABASE_SECRET_KEYS, SUPABASE_JWKS).
In local development or self-hosted environments, use the same plural form: SUPABASE_PUBLISHABLE_KEYS instead of SUPABASE_ANON_KEY, SUPABASE_SECRET_KEYS instead of SUPABASE_SERVICE_ROLE_KEY.
Check out the environment variables documentation for more details.
How can I leave feedback?
Open an issue on the GitHub repo or join the conversation in Discord.
Get started#
Install the package and the AI skill:
_10npm install @supabase/server@latest_10npx skills add supabase/server
The skill gives Claude Code and Cursor full context about the API surface, patterns, and migration paths. From there, you can prompt your way through most tasks.
Migrate existing Edge Functions to the new API keys:
_10Analyze all Edge Functions, and plan a full migration to use_10the new API keys with @supabase/server
Scaffold a new REST API with Hono:
_10Create a Hono API with @supabase/server that has CRUD_10endpoints for a todos table, using per-route auth
Add a protected Edge Function with admin operations:
_10Create an Edge Function that accepts user or secret key auth,_10reads from a user's profile with RLS, and writes audit logs_10with the admin client
Or write it by hand:
_10import { withSupabase } from '@supabase/server'_10_10export default {_10 fetch: withSupabase({ auth: 'user' }, async (req, ctx) => {_10 const { data } = await ctx.supabase.from('todos').select()_10 return Response.json(data)_10 }),_10}
@supabase/server is in public beta. We're looking for feedback on the API surface, the adapter patterns, and edge cases we haven't hit yet.
Check out the GitHub repo and the docs and let us know what you build.