@authhero/adapter-interfaces 0.108.0 → 0.109.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Ze=e.z.object({page:e.z.string().min(0).optional().default("0").transform(t=>parseInt(t,10)).openapi({description:"The page number where 0 is the first page"}),per_page:e.z.string().min(1).optional().default("10").transform(t=>parseInt(t,10)).openapi({description:"The number of items per page"}),include_totals:e.z.string().optional().default("false").transform(t=>t==="true").openapi({description:"If the total number of items should be included in the response"}),sort:e.z.string().regex(/^.+:(-1|1)$/).optional().openapi({description:"A property that should have the format 'string:-1' or 'string:1'"}),q:e.z.string().optional().openapi({description:"A lucene query string used to filter the results"})}),$e=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),r=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),O=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),y=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:O.optional()}),m=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),T=m.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().optional(),connection:e.z.string(),is_social:e.z.boolean().optional()}),N=e.z.object({...T.shape,...r.shape,user_id:e.z.string(),provider:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(y).optional()}),et=N,tt=m.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),ot="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let nt=(t=21)=>{let n="",a=crypto.getRandomValues(new Uint8Array(t|=0));for(;t--;)n+=ot[a[t]&63];return n};const L=e.z.object({client_id:e.z.string().openapi({description:"ID of this client."}),name:e.z.string().min(1).openapi({description:"Name of this client (min length: 1 character, does not allow < or >)."}),description:e.z.string().max(140).optional().openapi({description:"Free text description of this client (max length: 140 characters)."}),global:e.z.boolean().default(!1).openapi({description:"Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."}),client_secret:e.z.string().default(()=>nt()).optional().openapi({description:"Client secret (which you must not make public)."}),app_type:e.z.enum(["native","spa","regular_web","non_interactive","resource_server","express_configuration","rms","box","cloudbees","concur","dropbox","mscrm","echosign","egnyte","newrelic","office365","salesforce","sentry","sharepoint","slack","springcm","zendesk","zoom","sso_integration","oag"]).default("regular_web").optional().openapi({description:"The type of application this client represents"}),logo_uri:e.z.string().url().optional().openapi({description:"URL of the logo to display for this client. Recommended size is 150x150 pixels."}),is_first_party:e.z.boolean().default(!1).openapi({description:"Whether this client a first party client (true) or not (false)."}),oidc_conformant:e.z.boolean().default(!0).openapi({description:"Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."}),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),client_aliases:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of audiences/realms for SAML protocol. Used by the wsfed addon."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."}),connections:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of connection IDs enabled for this client. The order determines the display order on the login page."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),session_transfer:e.z.record(e.z.any()).default({}).optional().openapi({description:"Native to Web SSO Configuration"}),oidc_logout:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration for OIDC backchannel logout"}),grant_types:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."}),jwt_configuration:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration related to JWTs for the client."}),signing_keys:e.z.array(e.z.record(e.z.any())).default([]).optional().openapi({description:"Signing certificates associated with this client."}),encryption_key:e.z.record(e.z.any()).default({}).optional().openapi({description:"Encryption used for WsFed responses with this client."}),sso:e.z.boolean().default(!1).openapi({description:"Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."}),sso_disabled:e.z.boolean().default(!0).openapi({description:"Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."}),cross_origin_authentication:e.z.boolean().default(!1).openapi({description:"Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."}),cross_origin_loc:e.z.string().url().optional().openapi({description:"URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."}),custom_login_page_on:e.z.boolean().default(!1).openapi({description:"Whether a custom login page is to be used (true) or the default provided login page (false)."}),custom_login_page:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page."}),custom_login_page_preview:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"}),form_template:e.z.string().optional().openapi({description:"HTML form template to be used for WS-Federation."}),addons:e.z.record(e.z.any()).default({}).optional().openapi({description:"Addons enabled for this client and their associated configurations."}),token_endpoint_auth_method:e.z.enum(["none","client_secret_post","client_secret_basic"]).default("client_secret_basic").optional().openapi({description:"Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."}),client_metadata:e.z.record(e.z.string().max(255)).default({}).optional().openapi({description:'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'}),mobile:e.z.record(e.z.any()).default({}).optional().openapi({description:"Additional configuration for native mobile apps."}),initiate_login_uri:e.z.string().url().optional().openapi({description:"Initiate login uri, must be https"}),native_social_login:e.z.record(e.z.any()).default({}).optional(),refresh_token:e.z.record(e.z.any()).default({}).optional().openapi({description:"Refresh token configuration"}),default_organization:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines the default Organization ID and flows"}),organization_usage:e.z.enum(["deny","allow","require"]).default("deny").optional().openapi({description:"Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."}),organization_require_behavior:e.z.enum(["no_prompt","pre_login_prompt","post_login_prompt"]).default("no_prompt").optional().openapi({description:"Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."}),client_authentication_methods:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines client authentication methods."}),require_pushed_authorization_requests:e.z.boolean().default(!1).openapi({description:"Makes the use of Pushed Authorization Requests mandatory for this client"}),require_proof_of_possession:e.z.boolean().default(!1).openapi({description:"Makes the use of Proof-of-Possession mandatory for this client"}),signed_request_object:e.z.record(e.z.any()).default({}).optional().openapi({description:"JWT-secured Authorization Requests (JAR) settings."}),compliance_level:e.z.enum(["none","fapi1_adv_pkj_par","fapi1_adv_mtls_par","fapi2_sp_pkj_mtls","fapi2_sp_mtls_mtls"]).optional().openapi({description:"Defines the compliance level for this client, which may restrict it's capabilities"}),par_request_expiry:e.z.number().optional().openapi({description:"Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"}),token_quota:e.z.record(e.z.any()).default({}).optional()}),R=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),...L.shape}),D=e.z.object({client_id:e.z.string().min(1).openapi({description:"ID of the client."}),audience:e.z.string().min(1).openapi({description:"The audience (API identifier) of this client grant."}),scope:e.z.array(e.z.string()).optional().openapi({description:"Scopes allowed for this client grant."}),organization_usage:e.z.enum(["deny","allow","require"]).optional().openapi({description:"Defines whether organizations can be used with client credentials exchanges for this grant."}),allow_any_organization:e.z.boolean().optional().openapi({description:"If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."}),is_system:e.z.boolean().optional().openapi({description:"If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."}),subject_type:e.z.enum(["client","user"]).optional().openapi({description:"The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."}),authorization_details_types:e.z.array(e.z.string()).optional().openapi({description:"Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."})}),w=e.z.object({id:e.z.string().openapi({description:"ID of the client grant."}),...D.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),it=e.z.array(w),s=e.z.object({x:e.z.number(),y:e.z.number()});var h=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(h||{}),S=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(S||{});const d=e.z.object({id:e.z.string(),category:e.z.nativeEnum(S),type:e.z.nativeEnum(h)}),j=d.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),k=d.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),U=d.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),v=d.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),F=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),P=e.z.union([j,k,U,v,F]);var x=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(x||{});const M=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:s,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(P),next_node:e.z.string()}).passthrough()}),H=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:s,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),G=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:s}).passthrough(),K=e.z.union([M,H,G]),B=e.z.object({next_node:e.z.string(),coordinates:s}).passthrough(),W=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:s}).passthrough(),X=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(K),start:B,ending:W,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),at=X.omit({id:!0,created_at:!0,updated_at:!0});var b=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(b||{}),f=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(f||{}),E=(t=>(t.S256="S256",t.Plain="plain",t))(E||{});const V=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(b).optional(),response_mode:e.z.nativeEnum(f).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(E).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),rt=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),powered_by_logo_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),q=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional(),icon_url:e.z.string().optional()}),Y=e.z.object({id:e.z.string().optional(),name:e.z.string(),display_name:e.z.string().optional(),strategy:e.z.string(),options:q.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional(),is_domain_connection:e.z.boolean().optional(),show_as_button:e.z.boolean().optional(),metadata:e.z.record(e.z.any()).optional()}),Q=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(Y.shape),J=e.z.object({id:e.z.string().optional(),audience:e.z.string(),friendly_name:e.z.string(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sender_email:e.z.string().email(),sender_name:e.z.string(),session_lifetime:e.z.number().optional(),idle_session_lifetime:e.z.number().optional(),ephemeral_session_lifetime:e.z.number().optional(),idle_ephemeral_session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),allowed_logout_urls:e.z.array(e.z.string()).optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_changing_enable_sso:e.z.boolean().optional(),allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),change_pwd_flow_v1:e.z.boolean().optional(),custom_domains_provisioning:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),disable_impersonation:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),enable_sso:e.z.boolean().optional(),enforce_client_authentication_on_passwordless_start:e.z.boolean().optional(),genai_trial:e.z.boolean().optional(),improved_signup_bot_detection_in_classic:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional(),no_disclose_enterprise_connections:e.z.boolean().optional(),remove_alg_from_jwks:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),trust_azure_adfs_email_verified_connection_property:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional()}).optional(),sandbox_version:e.z.string().optional(),legacy_sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),device_flow:e.z.object({charset:e.z.enum(["base20","digits"]).optional(),mask:e.z.string().max(20).optional()}).optional(),default_token_quota:e.z.object({clients:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional(),organizations:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional(),oidc_logout:e.z.object({rp_logout_end_session_endpoint_discovery:e.z.boolean().optional()}).optional(),allow_organization_name_in_authentication_api:e.z.boolean().optional(),customize_mfa_in_postlogin_action:e.z.boolean().optional(),acr_values_supported:e.z.array(e.z.string()).optional(),mtls:e.z.object({enable_endpoint_aliases:e.z.boolean().optional()}).optional(),pushed_authorization_requests_supported:e.z.boolean().optional(),authorization_response_iss_parameter_supported:e.z.boolean().optional()}),Z=e.z.object({created_at:e.z.string().nullable().transform(t=>t??""),updated_at:e.z.string().nullable().transform(t=>t??""),...J.shape,id:e.z.string()});e.z.object({...R.shape,tenant:Z,connections:e.z.array(Q)});const $=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),ee=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:$,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),st=e.z.object({...ee.shape,created_at:e.z.string()}),te=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),oe=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),ne=e.z.object({...te.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(oe)}).optional(),tls_policy:e.z.string().optional()}),lt=ne.extend({tenant_id:e.z.string()}),ct=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),ie=e.z.object({id:e.z.string(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),C=ie.extend({category:e.z.literal("BLOCK").optional()}),c=ie.extend({category:e.z.literal("FIELD").optional(),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional()}),ae=e.z.discriminatedUnion("type",[C.extend({type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()})}),c.omit({sensitive:!0}).extend({type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()})}),c.extend({type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()})}),C.extend({type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()})}),c.extend({type:e.z.literal("EMAIL"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})}),c.extend({type:e.z.literal("NUMBER"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})}),c.extend({type:e.z.literal("PHONE"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})})]),re=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string().optional()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(ae),next_node:e.z.string().optional()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),_t=e.z.object({...r.shape,...re.shape,id:e.z.string()}),se=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),le=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),z={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},pt=e.z.object({...z,trigger_id:se,url:e.z.string()}),dt=e.z.object({...z,trigger_id:le,form_id:e.z.string()}),zt=e.z.union([pt,dt]),gt=e.z.object({...z,trigger_id:se,...r.shape,hook_id:e.z.string(),url:e.z.string()}),ut=e.z.object({...z,trigger_id:le,...r.shape,hook_id:e.z.string(),form_id:e.z.string()}),mt=e.z.union([gt,ut]),ce=e.z.object({name:e.z.string().optional()}),_e=e.z.object({email:e.z.string().optional()}),pe=e.z.object({organization_id:e.z.string().max(50),inviter:ce,invitee:_e,invitation_url:e.z.string().url(),client_id:e.z.string(),connection_id:e.z.string().optional(),app_metadata:e.z.record(e.z.any()).default({}).optional(),user_metadata:e.z.record(e.z.any()).default({}).optional(),ttl_sec:e.z.number().int().max(2592e3).default(604800).optional(),roles:e.z.array(e.z.string()).default([]).optional(),send_invitation_email:e.z.boolean().default(!0).optional()}),ht=e.z.object({id:e.z.string(),organization_id:e.z.string().max(50),created_at:e.z.string().datetime(),expires_at:e.z.string().datetime(),ticket_id:e.z.string().optional()}).extend(pe.shape),de=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),St=e.z.object({keys:e.z.array(de)}),bt=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),ze=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:V,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),ft=e.z.object({...ze.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),ge={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},Et=e.z.string().refine(t=>Object.values(ge).includes(t),{message:"Invalid log type"}),ue=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),me=e.z.object({country_code:e.z.string().length(2),city_name:e.z.string(),latitude:e.z.string(),longitude:e.z.string(),time_zone:e.z.string(),continent_code:e.z.string()}),he=e.z.object({type:Et,date:e.z.string(),description:e.z.string().optional(),ip:e.z.string().optional(),user_agent:e.z.string().optional(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.string().optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ue.optional(),log_id:e.z.string().optional(),location_info:me.optional()}),At=e.z.object({...he.shape,log_id:e.z.string()}),Se=e.z.object({id:e.z.string().optional(),user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id"),is_current:e.z.boolean().default(!0)}),It=Se.extend({id:e.z.string(),created_at:e.z.string(),updated_at:e.z.string()}),be=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),fe=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:be.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),Ct=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...fe.shape}),Ot=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var Ee=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(Ee||{});const yt=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const Ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),Ie=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),i=e.z.object({bold:e.z.boolean(),size:e.z.number()}),Ce=e.z.object({body_text:i,buttons_text:i,font_url:e.z.string(),input_labels:i,links:i,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:i,title:i}),Oe=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),ye=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),Te=e.z.object({borders:Ae,colors:Ie,displayName:e.z.string(),fonts:Ce,page_background:Oe,widget:ye}),Tt=Te.extend({themeId:e.z.string()}),Nt=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),Lt=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),Ne=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:be,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),Rt=e.z.object({created_at:e.z.string(),...Ne.shape}),Dt=e.z.object({to:e.z.string(),message:e.z.string()}),wt=e.z.object({name:e.z.string(),options:e.z.object({})}),Le=e.z.object({value:e.z.string(),description:e.z.string().optional()}),Re=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),De=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(Le).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:Re.optional()}),we=e.z.object({id:e.z.string().optional(),...De.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),jt=e.z.array(we),je=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ke=e.z.object({...je.shape,created_at:e.z.string()}),kt=e.z.array(ke),Ue=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string(),organization_id:e.z.string().optional()}),ve=e.z.object({...Ue.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),Ut=e.z.array(ve),Fe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional(),organization_id:e.z.string().optional()}),vt=e.z.array(Fe),Pe=e.z.object({user_id:e.z.string(),role_id:e.z.string(),organization_id:e.z.string().optional()}),xe=e.z.object({...Pe.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),Ft=e.z.array(xe),Me=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),He=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Me.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),Pt=e.z.array(He),Ge=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Ke=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Be=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),We=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Ge,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Ke).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Be}),xt=e.z.object({...We.shape,...r.shape,id:e.z.string()}),Xe=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),Mt=e.z.object({...Xe.shape,...r.shape,id:e.z.string()}),Ht=e.z.object({idle_session_lifetime:e.z.number().optional(),session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),enable_client_connections:e.z.boolean().optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional()}).optional(),friendly_name:e.z.string().optional(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional()});function Gt(t){const[n,a]=t.split("|");if(!n||!a)throw new Error(`Invalid user_id: ${t}`);return{connection:n,id:a}}function Kt(t){const{primary:n,secondaries:a,syncMethods:Ve=["create","update","remove","delete","set"]}=t,qe={get(_,o){if(typeof o=="symbol")return _[o];const p=_[o];return typeof p!="function"?p:Ve.includes(o)?async(...g)=>{const Ye=await p.apply(_,g),u=[];for(const l of a){const A=l.adapter[o];if(typeof A!="function")continue;const Qe=(async()=>{try{await A.apply(l.adapter,g)}catch(I){try{l.onError?l.onError(I,o,g):console.error(`Passthrough adapter: secondary write failed for ${o}:`,I)}catch(Je){console.error(`Passthrough adapter: onError handler threw for ${o}:`,Je)}}})();l.blocking&&u.push(Qe)}return u.length>0&&await Promise.all(u),Ye}:p.bind(_)}};return new Proxy(n,qe)}function Bt(t){return t}exports.Auth0Client=ue;exports.AuthorizationResponseMode=f;exports.AuthorizationResponseType=b;exports.CodeChallengeMethod=E;exports.ComponentCategory=S;exports.ComponentType=h;exports.GrantType=Ee;exports.LocationInfo=me;exports.LogTypes=ge;exports.NodeType=x;exports.auth0FlowInsertSchema=at;exports.auth0FlowSchema=X;exports.auth0QuerySchema=Ze;exports.auth0UserResponseSchema=et;exports.authParamsSchema=V;exports.baseUserSchema=m;exports.bordersSchema=Ae;exports.brandingSchema=rt;exports.buttonComponentSchema=k;exports.clientGrantInsertSchema=D;exports.clientGrantListSchema=it;exports.clientGrantSchema=w;exports.clientInsertSchema=L;exports.clientSchema=R;exports.codeInsertSchema=ee;exports.codeSchema=st;exports.codeTypeSchema=$;exports.colorsSchema=Ie;exports.componentSchema=P;exports.connectionInsertSchema=Y;exports.connectionOptionsSchema=q;exports.connectionSchema=Q;exports.coordinatesSchema=s;exports.createPassthroughAdapter=Kt;exports.createWriteOnlyAdapter=Bt;exports.customDomainInsertSchema=te;exports.customDomainSchema=ne;exports.customDomainWithTenantIdSchema=lt;exports.emailProviderSchema=Lt;exports.endingSchema=W;exports.fieldComponentSchema=v;exports.flowNodeSchema=H;exports.fontDetailsSchema=i;exports.fontsSchema=Ce;exports.formControlSchema=ct;exports.formInsertSchema=re;exports.formNodeComponentDefinition=ae;exports.formSchema=_t;exports.genericComponentSchema=F;exports.genericNodeSchema=G;exports.hookInsertSchema=zt;exports.hookSchema=mt;exports.identitySchema=y;exports.inviteInsertSchema=pe;exports.inviteSchema=ht;exports.inviteeSchema=_e;exports.inviterSchema=ce;exports.jwksKeySchema=St;exports.jwksSchema=de;exports.legalComponentSchema=U;exports.logInsertSchema=he;exports.logSchema=At;exports.loginSessionInsertSchema=ze;exports.loginSessionSchema=ft;exports.nodeSchema=K;exports.openIDConfigurationSchema=bt;exports.organizationBrandingSchema=Ge;exports.organizationEnabledConnectionSchema=Ke;exports.organizationInsertSchema=We;exports.organizationSchema=xt;exports.organizationTokenQuotaSchema=Be;exports.pageBackgroundSchema=Oe;exports.parseUserId=Gt;exports.passwordInsertSchema=Se;exports.passwordSchema=It;exports.profileDataSchema=O;exports.promptSettingSchema=Nt;exports.refreshTokenInsertSchema=Ne;exports.refreshTokenSchema=Rt;exports.resourceServerInsertSchema=De;exports.resourceServerListSchema=jt;exports.resourceServerOptionsSchema=Re;exports.resourceServerSchema=we;exports.resourceServerScopeSchema=Le;exports.richTextComponentSchema=j;exports.roleInsertSchema=Me;exports.roleListSchema=Pt;exports.rolePermissionInsertSchema=je;exports.rolePermissionListSchema=kt;exports.rolePermissionSchema=ke;exports.roleSchema=He;exports.sessionInsertSchema=fe;exports.sessionSchema=Ct;exports.signingKeySchema=Ot;exports.smsProviderSchema=wt;exports.smsSendParamsSchema=Dt;exports.startSchema=B;exports.stepNodeSchema=M;exports.tenantInsertSchema=J;exports.tenantSchema=Z;exports.tenantSettingsSchema=Ht;exports.themeInsertSchema=Te;exports.themeSchema=Tt;exports.tokenResponseSchema=yt;exports.totalsSchema=$e;exports.userInsertSchema=T;exports.userOrganizationInsertSchema=Xe;exports.userOrganizationSchema=Mt;exports.userPermissionInsertSchema=Ue;exports.userPermissionListSchema=Ut;exports.userPermissionSchema=ve;exports.userPermissionWithDetailsListSchema=vt;exports.userPermissionWithDetailsSchema=Fe;exports.userResponseSchema=tt;exports.userRoleInsertSchema=Pe;exports.userRoleListSchema=Ft;exports.userRoleSchema=xe;exports.userSchema=N;exports.verificationMethodsSchema=oe;exports.widgetSchema=ye;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Ze=e.z.object({page:e.z.string().min(0).optional().default("0").transform(t=>parseInt(t,10)).openapi({description:"The page number where 0 is the first page"}),per_page:e.z.string().min(1).optional().default("10").transform(t=>parseInt(t,10)).openapi({description:"The number of items per page"}),include_totals:e.z.string().optional().default("false").transform(t=>t==="true").openapi({description:"If the total number of items should be included in the response"}),sort:e.z.string().regex(/^.+:(-1|1)$/).optional().openapi({description:"A property that should have the format 'string:-1' or 'string:1'"}),q:e.z.string().optional().openapi({description:"A lucene query string used to filter the results"})}),$e=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),s=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),O=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),y=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:O.optional()}),m=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),T=m.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().optional(),connection:e.z.string(),is_social:e.z.boolean().optional()}),N=e.z.object({...T.shape,...s.shape,user_id:e.z.string(),provider:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(y).optional()}),et=N,tt=m.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),ot="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let nt=(t=21)=>{let n="",a=crypto.getRandomValues(new Uint8Array(t|=0));for(;t--;)n+=ot[a[t]&63];return n};const R=e.z.object({client_id:e.z.string().openapi({description:"ID of this client."}),name:e.z.string().min(1).openapi({description:"Name of this client (min length: 1 character, does not allow < or >)."}),description:e.z.string().max(140).optional().openapi({description:"Free text description of this client (max length: 140 characters)."}),global:e.z.boolean().default(!1).openapi({description:"Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."}),client_secret:e.z.string().default(()=>nt()).optional().openapi({description:"Client secret (which you must not make public)."}),app_type:e.z.enum(["native","spa","regular_web","non_interactive","resource_server","express_configuration","rms","box","cloudbees","concur","dropbox","mscrm","echosign","egnyte","newrelic","office365","salesforce","sentry","sharepoint","slack","springcm","zendesk","zoom","sso_integration","oag"]).default("regular_web").optional().openapi({description:"The type of application this client represents"}),logo_uri:e.z.string().url().optional().openapi({description:"URL of the logo to display for this client. Recommended size is 150x150 pixels."}),is_first_party:e.z.boolean().default(!1).openapi({description:"Whether this client a first party client (true) or not (false)."}),oidc_conformant:e.z.boolean().default(!0).openapi({description:"Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."}),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),client_aliases:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of audiences/realms for SAML protocol. Used by the wsfed addon."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."}),connections:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of connection IDs enabled for this client. The order determines the display order on the login page."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),session_transfer:e.z.record(e.z.any()).default({}).optional().openapi({description:"Native to Web SSO Configuration"}),oidc_logout:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration for OIDC backchannel logout"}),grant_types:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."}),jwt_configuration:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration related to JWTs for the client."}),signing_keys:e.z.array(e.z.record(e.z.any())).default([]).optional().openapi({description:"Signing certificates associated with this client."}),encryption_key:e.z.record(e.z.any()).default({}).optional().openapi({description:"Encryption used for WsFed responses with this client."}),sso:e.z.boolean().default(!1).openapi({description:"Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."}),sso_disabled:e.z.boolean().default(!0).openapi({description:"Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."}),cross_origin_authentication:e.z.boolean().default(!1).openapi({description:"Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."}),cross_origin_loc:e.z.string().url().optional().openapi({description:"URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."}),custom_login_page_on:e.z.boolean().default(!1).openapi({description:"Whether a custom login page is to be used (true) or the default provided login page (false)."}),custom_login_page:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page."}),custom_login_page_preview:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"}),form_template:e.z.string().optional().openapi({description:"HTML form template to be used for WS-Federation."}),addons:e.z.record(e.z.any()).default({}).optional().openapi({description:"Addons enabled for this client and their associated configurations."}),token_endpoint_auth_method:e.z.enum(["none","client_secret_post","client_secret_basic"]).default("client_secret_basic").optional().openapi({description:"Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."}),client_metadata:e.z.record(e.z.string().max(255)).default({}).optional().openapi({description:'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'}),mobile:e.z.record(e.z.any()).default({}).optional().openapi({description:"Additional configuration for native mobile apps."}),initiate_login_uri:e.z.string().url().optional().openapi({description:"Initiate login uri, must be https"}),native_social_login:e.z.record(e.z.any()).default({}).optional(),refresh_token:e.z.record(e.z.any()).default({}).optional().openapi({description:"Refresh token configuration"}),default_organization:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines the default Organization ID and flows"}),organization_usage:e.z.enum(["deny","allow","require"]).default("deny").optional().openapi({description:"Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."}),organization_require_behavior:e.z.enum(["no_prompt","pre_login_prompt","post_login_prompt"]).default("no_prompt").optional().openapi({description:"Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."}),client_authentication_methods:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines client authentication methods."}),require_pushed_authorization_requests:e.z.boolean().default(!1).openapi({description:"Makes the use of Pushed Authorization Requests mandatory for this client"}),require_proof_of_possession:e.z.boolean().default(!1).openapi({description:"Makes the use of Proof-of-Possession mandatory for this client"}),signed_request_object:e.z.record(e.z.any()).default({}).optional().openapi({description:"JWT-secured Authorization Requests (JAR) settings."}),compliance_level:e.z.enum(["none","fapi1_adv_pkj_par","fapi1_adv_mtls_par","fapi2_sp_pkj_mtls","fapi2_sp_mtls_mtls"]).optional().openapi({description:"Defines the compliance level for this client, which may restrict it's capabilities"}),par_request_expiry:e.z.number().optional().openapi({description:"Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"}),token_quota:e.z.record(e.z.any()).default({}).optional()}),L=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),...R.shape}),D=e.z.object({client_id:e.z.string().min(1).openapi({description:"ID of the client."}),audience:e.z.string().min(1).openapi({description:"The audience (API identifier) of this client grant."}),scope:e.z.array(e.z.string()).optional().openapi({description:"Scopes allowed for this client grant."}),organization_usage:e.z.enum(["deny","allow","require"]).optional().openapi({description:"Defines whether organizations can be used with client credentials exchanges for this grant."}),allow_any_organization:e.z.boolean().optional().openapi({description:"If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."}),is_system:e.z.boolean().optional().openapi({description:"If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."}),subject_type:e.z.enum(["client","user"]).optional().openapi({description:"The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."}),authorization_details_types:e.z.array(e.z.string()).optional().openapi({description:"Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."})}),w=e.z.object({id:e.z.string().openapi({description:"ID of the client grant."}),...D.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),it=e.z.array(w),r=e.z.object({x:e.z.number(),y:e.z.number()});var h=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(h||{}),S=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(S||{});const d=e.z.object({id:e.z.string(),category:e.z.nativeEnum(S),type:e.z.nativeEnum(h)}),j=d.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),k=d.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),v=d.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),U=d.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),F=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),P=e.z.union([j,k,v,U,F]);var x=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(x||{});const M=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:r,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(P),next_node:e.z.string()}).passthrough()}),H=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:r,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),G=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:r}).passthrough(),K=e.z.union([M,H,G]),B=e.z.object({next_node:e.z.string(),coordinates:r}).passthrough(),W=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:r}).passthrough(),X=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(K),start:B,ending:W,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),at=X.omit({id:!0,created_at:!0,updated_at:!0});var b=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(b||{}),f=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(f||{}),E=(t=>(t.S256="S256",t.Plain="plain",t))(E||{});const V=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(b).optional(),response_mode:e.z.nativeEnum(f).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(E).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),st=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),powered_by_logo_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),q=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional(),icon_url:e.z.string().optional()}),Y=e.z.object({id:e.z.string().optional(),name:e.z.string(),display_name:e.z.string().optional(),strategy:e.z.string(),options:q.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional(),is_domain_connection:e.z.boolean().optional(),show_as_button:e.z.boolean().optional(),metadata:e.z.record(e.z.any()).optional()}),Q=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(Y.shape),J=e.z.object({id:e.z.string().optional(),audience:e.z.string(),friendly_name:e.z.string(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sender_email:e.z.string().email(),sender_name:e.z.string(),session_lifetime:e.z.number().optional(),idle_session_lifetime:e.z.number().optional(),ephemeral_session_lifetime:e.z.number().optional(),idle_ephemeral_session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),allowed_logout_urls:e.z.array(e.z.string()).optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_changing_enable_sso:e.z.boolean().optional(),allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),change_pwd_flow_v1:e.z.boolean().optional(),custom_domains_provisioning:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),disable_impersonation:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),enable_sso:e.z.boolean().optional(),enforce_client_authentication_on_passwordless_start:e.z.boolean().optional(),genai_trial:e.z.boolean().optional(),improved_signup_bot_detection_in_classic:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional(),no_disclose_enterprise_connections:e.z.boolean().optional(),remove_alg_from_jwks:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),trust_azure_adfs_email_verified_connection_property:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional()}).optional(),sandbox_version:e.z.string().optional(),legacy_sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),device_flow:e.z.object({charset:e.z.enum(["base20","digits"]).optional(),mask:e.z.string().max(20).optional()}).optional(),default_token_quota:e.z.object({clients:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional(),organizations:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional(),oidc_logout:e.z.object({rp_logout_end_session_endpoint_discovery:e.z.boolean().optional()}).optional(),allow_organization_name_in_authentication_api:e.z.boolean().optional(),customize_mfa_in_postlogin_action:e.z.boolean().optional(),acr_values_supported:e.z.array(e.z.string()).optional(),mtls:e.z.object({enable_endpoint_aliases:e.z.boolean().optional()}).optional(),pushed_authorization_requests_supported:e.z.boolean().optional(),authorization_response_iss_parameter_supported:e.z.boolean().optional()}),Z=e.z.object({created_at:e.z.string().nullable().transform(t=>t??""),updated_at:e.z.string().nullable().transform(t=>t??""),...J.shape,id:e.z.string()}),rt=e.z.object({...L.shape,tenant:Z,connections:e.z.array(Q)}),$=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),ee=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:$,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),lt=e.z.object({...ee.shape,created_at:e.z.string()}),te=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),oe=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),ne=e.z.object({...te.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(oe)}).optional(),tls_policy:e.z.string().optional()}),ct=ne.extend({tenant_id:e.z.string()}),pt=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),ie=e.z.object({id:e.z.string(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),C=ie.extend({category:e.z.literal("BLOCK").optional()}),c=ie.extend({category:e.z.literal("FIELD").optional(),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional()}),ae=e.z.discriminatedUnion("type",[C.extend({type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()})}),c.omit({sensitive:!0}).extend({type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()})}),c.extend({type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()})}),C.extend({type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()})}),c.extend({type:e.z.literal("EMAIL"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})}),c.extend({type:e.z.literal("NUMBER"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})}),c.extend({type:e.z.literal("PHONE"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})})]),se=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string().optional()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(ae),next_node:e.z.string().optional()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),_t=e.z.object({...s.shape,...se.shape,id:e.z.string()}),re=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),le=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),z={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},dt=e.z.object({...z,trigger_id:re,url:e.z.string()}),zt=e.z.object({...z,trigger_id:le,form_id:e.z.string()}),gt=e.z.union([dt,zt]),ut=e.z.object({...z,trigger_id:re,...s.shape,hook_id:e.z.string(),url:e.z.string()}),mt=e.z.object({...z,trigger_id:le,...s.shape,hook_id:e.z.string(),form_id:e.z.string()}),ht=e.z.union([ut,mt]),ce=e.z.object({name:e.z.string().optional()}),pe=e.z.object({email:e.z.string().optional()}),_e=e.z.object({organization_id:e.z.string().max(50),inviter:ce,invitee:pe,invitation_url:e.z.string().url(),client_id:e.z.string(),connection_id:e.z.string().optional(),app_metadata:e.z.record(e.z.any()).default({}).optional(),user_metadata:e.z.record(e.z.any()).default({}).optional(),ttl_sec:e.z.number().int().max(2592e3).default(604800).optional(),roles:e.z.array(e.z.string()).default([]).optional(),send_invitation_email:e.z.boolean().default(!0).optional()}),St=e.z.object({id:e.z.string(),organization_id:e.z.string().max(50),created_at:e.z.string().datetime(),expires_at:e.z.string().datetime(),ticket_id:e.z.string().optional()}).extend(_e.shape),de=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),bt=e.z.object({keys:e.z.array(de)}),ft=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),ze=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:V,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),Et=e.z.object({...ze.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),ge={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},At=e.z.string().refine(t=>Object.values(ge).includes(t),{message:"Invalid log type"}),ue=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),me=e.z.object({country_code:e.z.string().length(2),city_name:e.z.string(),latitude:e.z.string(),longitude:e.z.string(),time_zone:e.z.string(),continent_code:e.z.string()}),he=e.z.object({type:At,date:e.z.string(),description:e.z.string().optional(),ip:e.z.string().optional(),user_agent:e.z.string().optional(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.string().optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ue.optional(),log_id:e.z.string().optional(),location_info:me.optional()}),It=e.z.object({...he.shape,log_id:e.z.string()}),Se=e.z.object({id:e.z.string().optional(),user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id"),is_current:e.z.boolean().default(!0)}),Ct=Se.extend({id:e.z.string(),created_at:e.z.string(),updated_at:e.z.string()}),be=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),fe=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:be.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),Ot=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...fe.shape}),yt=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var Ee=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(Ee||{});const Tt=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const Ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),Ie=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),i=e.z.object({bold:e.z.boolean(),size:e.z.number()}),Ce=e.z.object({body_text:i,buttons_text:i,font_url:e.z.string(),input_labels:i,links:i,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:i,title:i}),Oe=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),ye=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),Te=e.z.object({borders:Ae,colors:Ie,displayName:e.z.string(),fonts:Ce,page_background:Oe,widget:ye}),Nt=Te.extend({themeId:e.z.string()}),Rt=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),Lt=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),Ne=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:be,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),Dt=e.z.object({created_at:e.z.string(),...Ne.shape}),wt=e.z.object({to:e.z.string(),message:e.z.string()}),jt=e.z.object({name:e.z.string(),options:e.z.object({})}),Re=e.z.object({value:e.z.string(),description:e.z.string().optional()}),Le=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),De=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(Re).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:Le.optional()}),we=e.z.object({id:e.z.string().optional(),...De.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),kt=e.z.array(we),je=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ke=e.z.object({...je.shape,created_at:e.z.string()}),vt=e.z.array(ke),ve=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string(),organization_id:e.z.string().optional()}),Ue=e.z.object({...ve.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),Ut=e.z.array(Ue),Fe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional(),organization_id:e.z.string().optional()}),Ft=e.z.array(Fe),Pe=e.z.object({user_id:e.z.string(),role_id:e.z.string(),organization_id:e.z.string().optional()}),xe=e.z.object({...Pe.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),Pt=e.z.array(xe),Me=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),He=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Me.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),xt=e.z.array(He),Ge=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Ke=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Be=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),We=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Ge,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Ke).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Be}),Mt=e.z.object({...We.shape,...s.shape,id:e.z.string()}),Xe=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),Ht=e.z.object({...Xe.shape,...s.shape,id:e.z.string()}),Gt=e.z.object({idle_session_lifetime:e.z.number().optional(),session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),enable_client_connections:e.z.boolean().optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional()}).optional(),friendly_name:e.z.string().optional(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional()}),Kt=e.z.object({date:e.z.string().openapi({description:"Date these events occurred in ISO 8601 format",example:"2025-12-19"}),logins:e.z.number().openapi({description:"Number of logins on this date",example:150}),signups:e.z.number().openapi({description:"Number of signups on this date",example:25}),leaked_passwords:e.z.number().openapi({description:"Number of breached-password detections on this date (subscription required)",example:0}),updated_at:e.z.string().openapi({description:"Date and time this stats entry was last updated in ISO 8601 format",example:"2025-12-19T10:30:00.000Z"}),created_at:e.z.string().openapi({description:"Approximate date and time the first event occurred in ISO 8601 format",example:"2025-12-19T00:00:00.000Z"})}),Bt=e.z.number().openapi({description:"Number of active users in the last 30 days",example:1234});function Wt(t){const[n,a]=t.split("|");if(!n||!a)throw new Error(`Invalid user_id: ${t}`);return{connection:n,id:a}}function Xt(t){const{primary:n,secondaries:a,syncMethods:Ve=["create","update","remove","delete","set"]}=t,qe={get(p,o){if(typeof o=="symbol")return p[o];const _=p[o];return typeof _!="function"?_:Ve.includes(o)?async(...g)=>{const Ye=await _.apply(p,g),u=[];for(const l of a){const A=l.adapter[o];if(typeof A!="function")continue;const Qe=(async()=>{try{await A.apply(l.adapter,g)}catch(I){try{l.onError?l.onError(I,o,g):console.error(`Passthrough adapter: secondary write failed for ${o}:`,I)}catch(Je){console.error(`Passthrough adapter: onError handler threw for ${o}:`,Je)}}})();l.blocking&&u.push(Qe)}return u.length>0&&await Promise.all(u),Ye}:_.bind(p)}};return new Proxy(n,qe)}function Vt(t){return t}exports.Auth0Client=ue;exports.AuthorizationResponseMode=f;exports.AuthorizationResponseType=b;exports.CodeChallengeMethod=E;exports.ComponentCategory=S;exports.ComponentType=h;exports.GrantType=Ee;exports.LocationInfo=me;exports.LogTypes=ge;exports.NodeType=x;exports.activeUsersResponseSchema=Bt;exports.auth0FlowInsertSchema=at;exports.auth0FlowSchema=X;exports.auth0QuerySchema=Ze;exports.auth0UserResponseSchema=et;exports.authParamsSchema=V;exports.baseUserSchema=m;exports.bordersSchema=Ae;exports.brandingSchema=st;exports.buttonComponentSchema=k;exports.clientGrantInsertSchema=D;exports.clientGrantListSchema=it;exports.clientGrantSchema=w;exports.clientInsertSchema=R;exports.clientSchema=L;exports.codeInsertSchema=ee;exports.codeSchema=lt;exports.codeTypeSchema=$;exports.colorsSchema=Ie;exports.componentSchema=P;exports.connectionInsertSchema=Y;exports.connectionOptionsSchema=q;exports.connectionSchema=Q;exports.coordinatesSchema=r;exports.createPassthroughAdapter=Xt;exports.createWriteOnlyAdapter=Vt;exports.customDomainInsertSchema=te;exports.customDomainSchema=ne;exports.customDomainWithTenantIdSchema=ct;exports.dailyStatsSchema=Kt;exports.emailProviderSchema=Lt;exports.endingSchema=W;exports.fieldComponentSchema=U;exports.flowNodeSchema=H;exports.fontDetailsSchema=i;exports.fontsSchema=Ce;exports.formControlSchema=pt;exports.formInsertSchema=se;exports.formNodeComponentDefinition=ae;exports.formSchema=_t;exports.genericComponentSchema=F;exports.genericNodeSchema=G;exports.hookInsertSchema=gt;exports.hookSchema=ht;exports.identitySchema=y;exports.inviteInsertSchema=_e;exports.inviteSchema=St;exports.inviteeSchema=pe;exports.inviterSchema=ce;exports.jwksKeySchema=bt;exports.jwksSchema=de;exports.legacyClientSchema=rt;exports.legalComponentSchema=v;exports.logInsertSchema=he;exports.logSchema=It;exports.loginSessionInsertSchema=ze;exports.loginSessionSchema=Et;exports.nodeSchema=K;exports.openIDConfigurationSchema=ft;exports.organizationBrandingSchema=Ge;exports.organizationEnabledConnectionSchema=Ke;exports.organizationInsertSchema=We;exports.organizationSchema=Mt;exports.organizationTokenQuotaSchema=Be;exports.pageBackgroundSchema=Oe;exports.parseUserId=Wt;exports.passwordInsertSchema=Se;exports.passwordSchema=Ct;exports.profileDataSchema=O;exports.promptSettingSchema=Rt;exports.refreshTokenInsertSchema=Ne;exports.refreshTokenSchema=Dt;exports.resourceServerInsertSchema=De;exports.resourceServerListSchema=kt;exports.resourceServerOptionsSchema=Le;exports.resourceServerSchema=we;exports.resourceServerScopeSchema=Re;exports.richTextComponentSchema=j;exports.roleInsertSchema=Me;exports.roleListSchema=xt;exports.rolePermissionInsertSchema=je;exports.rolePermissionListSchema=vt;exports.rolePermissionSchema=ke;exports.roleSchema=He;exports.sessionInsertSchema=fe;exports.sessionSchema=Ot;exports.signingKeySchema=yt;exports.smsProviderSchema=jt;exports.smsSendParamsSchema=wt;exports.startSchema=B;exports.stepNodeSchema=M;exports.tenantInsertSchema=J;exports.tenantSchema=Z;exports.tenantSettingsSchema=Gt;exports.themeInsertSchema=Te;exports.themeSchema=Nt;exports.tokenResponseSchema=Tt;exports.totalsSchema=$e;exports.userInsertSchema=T;exports.userOrganizationInsertSchema=Xe;exports.userOrganizationSchema=Ht;exports.userPermissionInsertSchema=ve;exports.userPermissionListSchema=Ut;exports.userPermissionSchema=Ue;exports.userPermissionWithDetailsListSchema=Ft;exports.userPermissionWithDetailsSchema=Fe;exports.userResponseSchema=tt;exports.userRoleInsertSchema=Pe;exports.userRoleListSchema=Pt;exports.userRoleSchema=xe;exports.userSchema=N;exports.verificationMethodsSchema=oe;exports.widgetSchema=ye;
@@ -8274,7 +8274,7 @@ export declare const brandingSchema: z.ZodObject<{
8274
8274
  } | undefined;
8275
8275
  }>;
8276
8276
  export type Branding = z.infer<typeof brandingSchema>;
8277
- declare const LegacyClientSchema: z.ZodObject<{
8277
+ export declare const legacyClientSchema: z.ZodObject<{
8278
8278
  tenant: z.ZodObject<{
8279
8279
  id: z.ZodString;
8280
8280
  audience: z.ZodString;
@@ -9319,7 +9319,7 @@ declare const LegacyClientSchema: z.ZodObject<{
9319
9319
  par_request_expiry?: number | undefined;
9320
9320
  token_quota?: Record<string, any> | undefined;
9321
9321
  }>;
9322
- export type LegacyClient = z.infer<typeof LegacyClientSchema>;
9322
+ export type LegacyClient = z.infer<typeof legacyClientSchema>;
9323
9323
  export declare const codeTypeSchema: z.ZodEnum<[
9324
9324
  "password_reset",
9325
9325
  "email_verification",
@@ -18034,6 +18034,31 @@ export declare const tenantSettingsSchema: z.ZodObject<{
18034
18034
  } | undefined;
18035
18035
  }>;
18036
18036
  export type TenantSettings = z.infer<typeof tenantSettingsSchema>;
18037
+ export declare const dailyStatsSchema: z.ZodObject<{
18038
+ date: z.ZodString;
18039
+ logins: z.ZodNumber;
18040
+ signups: z.ZodNumber;
18041
+ leaked_passwords: z.ZodNumber;
18042
+ updated_at: z.ZodString;
18043
+ created_at: z.ZodString;
18044
+ }, "strip", z.ZodTypeAny, {
18045
+ date: string;
18046
+ created_at: string;
18047
+ updated_at: string;
18048
+ logins: number;
18049
+ signups: number;
18050
+ leaked_passwords: number;
18051
+ }, {
18052
+ date: string;
18053
+ created_at: string;
18054
+ updated_at: string;
18055
+ logins: number;
18056
+ signups: number;
18057
+ leaked_passwords: number;
18058
+ }>;
18059
+ export type DailyStats = z.infer<typeof dailyStatsSchema>;
18060
+ export declare const activeUsersResponseSchema: z.ZodNumber;
18061
+ export type ActiveUsersResponse = z.infer<typeof activeUsersResponseSchema>;
18037
18062
  export declare function parseUserId(user_id: string): {
18038
18063
  connection: string;
18039
18064
  id: string;
@@ -18469,6 +18494,20 @@ export interface GeoAdapter {
18469
18494
  */
18470
18495
  getGeoInfo(headers: Record<string, string>): Promise<GeoInfo | null>;
18471
18496
  }
18497
+ export interface StatsListParams {
18498
+ from?: string;
18499
+ to?: string;
18500
+ }
18501
+ export interface StatsAdapter {
18502
+ /**
18503
+ * Get daily statistics (logins, signups, etc.) for a date range
18504
+ */
18505
+ getDaily(tenantId: string, params?: StatsListParams): Promise<DailyStats[]>;
18506
+ /**
18507
+ * Get the number of active users in the last 30 days
18508
+ */
18509
+ getActiveUsers(tenantId: string): Promise<number>;
18510
+ }
18472
18511
  export interface DataAdapters {
18473
18512
  branding: BrandingAdapter;
18474
18513
  cache?: CacheAdapter;
@@ -18495,6 +18534,7 @@ export interface DataAdapters {
18495
18534
  userPermissions: UserPermissionsAdapter;
18496
18535
  roles: RolesAdapter;
18497
18536
  sessions: SessionsAdapter;
18537
+ stats?: StatsAdapter;
18498
18538
  tenants: TenantsDataAdapter;
18499
18539
  themes: ThemesAdapter;
18500
18540
  users: UserDataAdapter;
@@ -1,5 +1,5 @@
1
1
  import { z as e } from "@hono/zod-openapi";
2
- const rt = e.object({
2
+ const st = e.object({
3
3
  page: e.string().min(0).optional().default("0").transform((t) => parseInt(t, 10)).openapi({
4
4
  description: "The page number where 0 is the first page"
5
5
  }),
@@ -15,11 +15,11 @@ const rt = e.object({
15
15
  q: e.string().optional().openapi({
16
16
  description: "A lucene query string used to filter the results"
17
17
  })
18
- }), st = e.object({
18
+ }), rt = e.object({
19
19
  start: e.number(),
20
20
  limit: e.number(),
21
21
  length: e.number()
22
- }), r = e.object({
22
+ }), s = e.object({
23
23
  created_at: e.string(),
24
24
  updated_at: e.string()
25
25
  }), U = e.object({
@@ -66,7 +66,7 @@ const rt = e.object({
66
66
  is_social: e.boolean().optional()
67
67
  }), P = e.object({
68
68
  ...v.shape,
69
- ...r.shape,
69
+ ...s.shape,
70
70
  user_id: e.string(),
71
71
  provider: e.string(),
72
72
  is_social: e.boolean(),
@@ -527,7 +527,7 @@ const ie = e.object({
527
527
  twilio_sid: e.string().optional(),
528
528
  twilio_token: e.string().optional(),
529
529
  icon_url: e.string().optional()
530
- }), re = e.object({
530
+ }), se = e.object({
531
531
  id: e.string().optional(),
532
532
  name: e.string(),
533
533
  display_name: e.string().optional(),
@@ -539,11 +539,11 @@ const ie = e.object({
539
539
  is_domain_connection: e.boolean().optional(),
540
540
  show_as_button: e.boolean().optional(),
541
541
  metadata: e.record(e.any()).optional()
542
- }), se = e.object({
542
+ }), re = e.object({
543
543
  id: e.string(),
544
544
  created_at: e.string().transform((t) => t === null ? "" : t),
545
545
  updated_at: e.string().transform((t) => t === null ? "" : t)
546
- }).extend(re.shape), le = e.object({
546
+ }).extend(se.shape), le = e.object({
547
547
  id: e.string().optional(),
548
548
  // Basic settings
549
549
  audience: e.string(),
@@ -668,13 +668,11 @@ const ie = e.object({
668
668
  updated_at: e.string().nullable().transform((t) => t ?? ""),
669
669
  ...le.shape,
670
670
  id: e.string()
671
- });
672
- e.object({
671
+ }), gt = e.object({
673
672
  ...G.shape,
674
673
  tenant: ce,
675
- connections: e.array(se)
676
- });
677
- const _e = e.enum([
674
+ connections: e.array(re)
675
+ }), _e = e.enum([
678
676
  "password_reset",
679
677
  "email_verification",
680
678
  "otp",
@@ -713,7 +711,7 @@ const _e = e.enum([
713
711
  expires_at: e.string(),
714
712
  used_at: e.string().optional(),
715
713
  user_id: e.string().optional()
716
- }), gt = e.object({
714
+ }), ut = e.object({
717
715
  ...pe.shape,
718
716
  created_at: e.string()
719
717
  }), de = e.object({
@@ -744,9 +742,9 @@ const _e = e.enum([
744
742
  methods: e.array(ge)
745
743
  }).optional(),
746
744
  tls_policy: e.string().optional()
747
- }), ut = ue.extend({
745
+ }), mt = ue.extend({
748
746
  tenant_id: e.string()
749
- }), mt = e.object({
747
+ }), ht = e.object({
750
748
  id: e.string(),
751
749
  type: e.literal("submit"),
752
750
  label: e.string(),
@@ -888,8 +886,8 @@ const _e = e.enum([
888
886
  style: e.object({ css: e.string().optional() }).optional()
889
887
  }).openapi({
890
888
  description: "Schema for flow-based forms (matches new JSON structure)"
891
- }), ht = e.object({
892
- ...r.shape,
889
+ }), bt = e.object({
890
+ ...s.shape,
893
891
  ...he.shape,
894
892
  id: e.string()
895
893
  }), T = e.enum([
@@ -920,22 +918,22 @@ const _e = e.enum([
920
918
  ...g,
921
919
  trigger_id: N,
922
920
  form_id: e.string()
923
- }), bt = e.union([
921
+ }), ft = e.union([
924
922
  be,
925
923
  fe
926
924
  ]), Ee = e.object({
927
925
  ...g,
928
926
  trigger_id: T,
929
- ...r.shape,
927
+ ...s.shape,
930
928
  hook_id: e.string(),
931
929
  url: e.string()
932
930
  }), Se = e.object({
933
931
  ...g,
934
932
  trigger_id: N,
935
- ...r.shape,
933
+ ...s.shape,
936
934
  hook_id: e.string(),
937
935
  form_id: e.string()
938
- }), ft = e.union([Ee, Se]), Ae = e.object({
936
+ }), Et = e.union([Ee, Se]), Ae = e.object({
939
937
  name: e.string().optional()
940
938
  }), Ie = e.object({
941
939
  email: e.string().optional()
@@ -951,7 +949,7 @@ const _e = e.enum([
951
949
  ttl_sec: e.number().int().max(2592e3).default(604800).optional(),
952
950
  roles: e.array(e.string()).default([]).optional(),
953
951
  send_invitation_email: e.boolean().default(!0).optional()
954
- }), Et = e.object({
952
+ }), St = e.object({
955
953
  id: e.string(),
956
954
  organization_id: e.string().max(50),
957
955
  created_at: e.string().datetime(),
@@ -976,9 +974,9 @@ const _e = e.enum([
976
974
  x5t: e.string().optional(),
977
975
  x5c: e.array(e.string()).optional(),
978
976
  use: e.enum(["sig", "enc"]).optional()
979
- }), St = e.object({
980
- keys: e.array(Oe)
981
977
  }), At = e.object({
978
+ keys: e.array(Oe)
979
+ }), It = e.object({
982
980
  issuer: e.string(),
983
981
  authorization_endpoint: e.string(),
984
982
  token_endpoint: e.string(),
@@ -1012,7 +1010,7 @@ const _e = e.enum([
1012
1010
  login_completed: e.boolean().optional().default(!1)
1013
1011
  }).openapi({
1014
1012
  description: "This represents a login sesion"
1015
- }), It = e.object({
1013
+ }), Ct = e.object({
1016
1014
  ...ye.shape,
1017
1015
  id: e.string().openapi({
1018
1016
  description: "This is is used as the state in the universal login"
@@ -1189,13 +1187,13 @@ const _e = e.enum([
1189
1187
  }, Ne = e.string().refine(
1190
1188
  (t) => Object.values(Te).includes(t),
1191
1189
  { message: "Invalid log type" }
1192
- ), Le = e.object({
1190
+ ), Re = e.object({
1193
1191
  name: e.string(),
1194
1192
  version: e.string(),
1195
1193
  env: e.object({
1196
1194
  node: e.string().optional()
1197
1195
  }).optional()
1198
- }), Re = e.object({
1196
+ }), Le = e.object({
1199
1197
  country_code: e.string().length(2),
1200
1198
  city_name: e.string(),
1201
1199
  latitude: e.string(),
@@ -1222,10 +1220,10 @@ const _e = e.enum([
1222
1220
  strategy: e.string().optional(),
1223
1221
  strategy_type: e.string().optional(),
1224
1222
  hostname: e.string().optional(),
1225
- auth0_client: Le.optional(),
1223
+ auth0_client: Re.optional(),
1226
1224
  log_id: e.string().optional(),
1227
- location_info: Re.optional()
1228
- }), Ct = e.object({
1225
+ location_info: Le.optional()
1226
+ }), Ot = e.object({
1229
1227
  ...De.shape,
1230
1228
  log_id: e.string()
1231
1229
  }), we = e.object({
@@ -1234,11 +1232,11 @@ const _e = e.enum([
1234
1232
  password: e.string(),
1235
1233
  algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id"),
1236
1234
  is_current: e.boolean().default(!0)
1237
- }), Ot = we.extend({
1235
+ }), yt = we.extend({
1238
1236
  id: e.string(),
1239
1237
  created_at: e.string(),
1240
1238
  updated_at: e.string()
1241
- }), L = e.object({
1239
+ }), R = e.object({
1242
1240
  initial_user_agent: e.string().describe("First user agent of the device from which this user logged in"),
1243
1241
  initial_ip: e.string().describe("First IP address associated with this session"),
1244
1242
  initial_asn: e.string().describe("First autonomous system number associated with this session"),
@@ -1253,17 +1251,17 @@ const _e = e.enum([
1253
1251
  expires_at: e.string().optional(),
1254
1252
  login_session_id: e.string(),
1255
1253
  idle_expires_at: e.string().optional(),
1256
- device: L.describe(
1254
+ device: R.describe(
1257
1255
  "Metadata related to the device used in the session"
1258
1256
  ),
1259
1257
  clients: e.array(e.string()).describe("List of client details for the session")
1260
- }), yt = e.object({
1258
+ }), Tt = e.object({
1261
1259
  created_at: e.string(),
1262
1260
  updated_at: e.string(),
1263
1261
  authenticated_at: e.string(),
1264
1262
  last_interaction_at: e.string(),
1265
1263
  ...je.shape
1266
- }), Tt = e.object({
1264
+ }), Nt = e.object({
1267
1265
  kid: e.string().openapi({ description: "The key id of the signing key" }),
1268
1266
  cert: e.string().openapi({ description: "The public certificate of the signing key" }),
1269
1267
  fingerprint: e.string().openapi({ description: "The cert fingerprint" }),
@@ -1290,7 +1288,7 @@ const _e = e.enum([
1290
1288
  })
1291
1289
  });
1292
1290
  var ke = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(ke || {});
1293
- const Nt = e.object({
1291
+ const Rt = e.object({
1294
1292
  access_token: e.string(),
1295
1293
  id_token: e.string().optional(),
1296
1294
  scope: e.string().optional(),
@@ -1365,12 +1363,12 @@ const Ue = e.object({
1365
1363
  widget: xe
1366
1364
  }), Lt = Me.extend({
1367
1365
  themeId: e.string()
1368
- }), Rt = e.object({
1366
+ }), Dt = e.object({
1369
1367
  universal_login_experience: e.enum(["new", "classic"]).default("new"),
1370
1368
  identifier_first: e.boolean().default(!0),
1371
1369
  password_first: e.boolean().default(!1),
1372
1370
  webauthn_platform_first_factor: e.boolean()
1373
- }), Dt = e.object({
1371
+ }), wt = e.object({
1374
1372
  name: e.string(),
1375
1373
  enabled: e.boolean().optional().default(!0),
1376
1374
  default_from_address: e.string().optional(),
@@ -1413,7 +1411,7 @@ const Ue = e.object({
1413
1411
  idle_expires_at: e.string().optional(),
1414
1412
  // When the token was last used.
1415
1413
  last_exchanged_at: e.string().optional(),
1416
- device: L,
1414
+ device: R,
1417
1415
  resource_servers: e.array(
1418
1416
  e.object({
1419
1417
  audience: e.string(),
@@ -1421,15 +1419,15 @@ const Ue = e.object({
1421
1419
  })
1422
1420
  ),
1423
1421
  rotating: e.boolean()
1424
- }), wt = e.object({
1422
+ }), jt = e.object({
1425
1423
  // When the refresh token record was created.
1426
1424
  created_at: e.string(),
1427
1425
  // Spread in the rest of the refresh token properties.
1428
1426
  ...He.shape
1429
- }), jt = e.object({
1427
+ }), kt = e.object({
1430
1428
  to: e.string(),
1431
1429
  message: e.string()
1432
- }), kt = e.object({
1430
+ }), Ut = e.object({
1433
1431
  name: e.string(),
1434
1432
  options: e.object({})
1435
1433
  }), Ge = e.object({
@@ -1462,14 +1460,14 @@ const Ue = e.object({
1462
1460
  ...Be.shape,
1463
1461
  created_at: e.string().optional(),
1464
1462
  updated_at: e.string().optional()
1465
- }), Ut = e.array(ze), We = e.object({
1463
+ }), Ft = e.array(ze), We = e.object({
1466
1464
  role_id: e.string(),
1467
1465
  resource_server_identifier: e.string(),
1468
1466
  permission_name: e.string()
1469
1467
  }), Xe = e.object({
1470
1468
  ...We.shape,
1471
1469
  created_at: e.string()
1472
- }), Ft = e.array(Xe), Ve = e.object({
1470
+ }), vt = e.array(Xe), Ve = e.object({
1473
1471
  user_id: e.string(),
1474
1472
  resource_server_identifier: e.string(),
1475
1473
  permission_name: e.string(),
@@ -1478,7 +1476,7 @@ const Ue = e.object({
1478
1476
  ...Ve.shape,
1479
1477
  tenant_id: e.string(),
1480
1478
  created_at: e.string().optional()
1481
- }), vt = e.array(qe), Ye = e.object({
1479
+ }), Pt = e.array(qe), Ye = e.object({
1482
1480
  user_id: e.string(),
1483
1481
  resource_server_identifier: e.string(),
1484
1482
  resource_server_name: e.string(),
@@ -1486,7 +1484,7 @@ const Ue = e.object({
1486
1484
  description: e.string().nullable().optional(),
1487
1485
  created_at: e.string().optional(),
1488
1486
  organization_id: e.string().optional()
1489
- }), Pt = e.array(
1487
+ }), xt = e.array(
1490
1488
  Ye
1491
1489
  ), Qe = e.object({
1492
1490
  user_id: e.string(),
@@ -1496,7 +1494,7 @@ const Ue = e.object({
1496
1494
  ...Qe.shape,
1497
1495
  tenant_id: e.string(),
1498
1496
  created_at: e.string().optional()
1499
- }), xt = e.array(Je), Ze = e.object({
1497
+ }), Mt = e.array(Je), Ze = e.object({
1500
1498
  name: e.string().min(1).max(50).openapi({
1501
1499
  description: "The name of the role. Cannot include '<' or '>'"
1502
1500
  }),
@@ -1510,7 +1508,7 @@ const Ue = e.object({
1510
1508
  ...Ze.shape,
1511
1509
  created_at: e.string().optional(),
1512
1510
  updated_at: e.string().optional()
1513
- }), Mt = e.array($e), et = e.object({
1511
+ }), Ht = e.array($e), et = e.object({
1514
1512
  logo_url: e.string().optional().openapi({
1515
1513
  description: "URL of the organization's logo"
1516
1514
  }),
@@ -1563,9 +1561,9 @@ const Ue = e.object({
1563
1561
  description: "List of enabled connections for the organization"
1564
1562
  }),
1565
1563
  token_quota: ot
1566
- }), Ht = e.object({
1564
+ }), Gt = e.object({
1567
1565
  ...nt.shape,
1568
- ...r.shape,
1566
+ ...s.shape,
1569
1567
  id: e.string()
1570
1568
  }), it = e.object({
1571
1569
  user_id: e.string().openapi({
@@ -1574,11 +1572,11 @@ const Ue = e.object({
1574
1572
  organization_id: e.string().openapi({
1575
1573
  description: "ID of the organization"
1576
1574
  })
1577
- }), Gt = e.object({
1575
+ }), Kt = e.object({
1578
1576
  ...it.shape,
1579
- ...r.shape,
1577
+ ...s.shape,
1580
1578
  id: e.string()
1581
- }), Kt = e.object({
1579
+ }), Bt = e.object({
1582
1580
  // Session settings
1583
1581
  idle_session_lifetime: e.number().optional(),
1584
1582
  session_lifetime: e.number().optional(),
@@ -1647,35 +1645,63 @@ const Ue = e.object({
1647
1645
  sessions: e.object({
1648
1646
  oidc_logout_prompt_enabled: e.boolean().optional()
1649
1647
  }).optional()
1648
+ }), zt = e.object({
1649
+ date: e.string().openapi({
1650
+ description: "Date these events occurred in ISO 8601 format",
1651
+ example: "2025-12-19"
1652
+ }),
1653
+ logins: e.number().openapi({
1654
+ description: "Number of logins on this date",
1655
+ example: 150
1656
+ }),
1657
+ signups: e.number().openapi({
1658
+ description: "Number of signups on this date",
1659
+ example: 25
1660
+ }),
1661
+ leaked_passwords: e.number().openapi({
1662
+ description: "Number of breached-password detections on this date (subscription required)",
1663
+ example: 0
1664
+ }),
1665
+ updated_at: e.string().openapi({
1666
+ description: "Date and time this stats entry was last updated in ISO 8601 format",
1667
+ example: "2025-12-19T10:30:00.000Z"
1668
+ }),
1669
+ created_at: e.string().openapi({
1670
+ description: "Approximate date and time the first event occurred in ISO 8601 format",
1671
+ example: "2025-12-19T00:00:00.000Z"
1672
+ })
1673
+ }), Wt = e.number().openapi({
1674
+ description: "Number of active users in the last 30 days",
1675
+ example: 1234
1650
1676
  });
1651
- function Bt(t) {
1677
+ function Xt(t) {
1652
1678
  const [n, i] = t.split("|");
1653
1679
  if (!n || !i)
1654
1680
  throw new Error(`Invalid user_id: ${t}`);
1655
1681
  return { connection: n, id: i };
1656
1682
  }
1657
- function zt(t) {
1683
+ function Vt(t) {
1658
1684
  const {
1659
1685
  primary: n,
1660
1686
  secondaries: i,
1661
- syncMethods: R = ["create", "update", "remove", "delete", "set"]
1687
+ syncMethods: L = ["create", "update", "remove", "delete", "set"]
1662
1688
  } = t, D = {
1663
1689
  get(_, o) {
1664
1690
  if (typeof o == "symbol")
1665
1691
  return _[o];
1666
1692
  const p = _[o];
1667
- return typeof p != "function" ? p : R.includes(o) ? async (...u) => {
1693
+ return typeof p != "function" ? p : L.includes(o) ? async (...u) => {
1668
1694
  const w = await p.apply(_, u), m = [];
1669
- for (const s of i) {
1670
- const h = s.adapter[o];
1695
+ for (const r of i) {
1696
+ const h = r.adapter[o];
1671
1697
  if (typeof h != "function")
1672
1698
  continue;
1673
1699
  const j = (async () => {
1674
1700
  try {
1675
- await h.apply(s.adapter, u);
1701
+ await h.apply(r.adapter, u);
1676
1702
  } catch (b) {
1677
1703
  try {
1678
- s.onError ? s.onError(b, o, u) : console.error(
1704
+ r.onError ? r.onError(b, o, u) : console.error(
1679
1705
  `Passthrough adapter: secondary write failed for ${o}:`,
1680
1706
  b
1681
1707
  );
@@ -1687,7 +1713,7 @@ function zt(t) {
1687
1713
  }
1688
1714
  }
1689
1715
  })();
1690
- s.blocking && m.push(j);
1716
+ r.blocking && m.push(j);
1691
1717
  }
1692
1718
  return m.length > 0 && await Promise.all(m), w;
1693
1719
  } : p.bind(_);
@@ -1695,23 +1721,24 @@ function zt(t) {
1695
1721
  };
1696
1722
  return new Proxy(n, D);
1697
1723
  }
1698
- function Wt(t) {
1724
+ function qt(t) {
1699
1725
  return t;
1700
1726
  }
1701
1727
  export {
1702
- Le as Auth0Client,
1728
+ Re as Auth0Client,
1703
1729
  C as AuthorizationResponseMode,
1704
1730
  I as AuthorizationResponseType,
1705
1731
  O as CodeChallengeMethod,
1706
1732
  A as ComponentCategory,
1707
1733
  S as ComponentType,
1708
1734
  ke as GrantType,
1709
- Re as LocationInfo,
1735
+ Le as LocationInfo,
1710
1736
  Te as LogTypes,
1711
1737
  Q as NodeType,
1738
+ Wt as activeUsersResponseSchema,
1712
1739
  pt as auth0FlowInsertSchema,
1713
1740
  ne as auth0FlowSchema,
1714
- rt as auth0QuerySchema,
1741
+ st as auth0QuerySchema,
1715
1742
  lt as auth0UserResponseSchema,
1716
1743
  ie as authParamsSchema,
1717
1744
  E as baseUserSchema,
@@ -1724,97 +1751,99 @@ export {
1724
1751
  H as clientInsertSchema,
1725
1752
  G as clientSchema,
1726
1753
  pe as codeInsertSchema,
1727
- gt as codeSchema,
1754
+ ut as codeSchema,
1728
1755
  _e as codeTypeSchema,
1729
1756
  Fe as colorsSchema,
1730
1757
  Y as componentSchema,
1731
- re as connectionInsertSchema,
1758
+ se as connectionInsertSchema,
1732
1759
  ae as connectionOptionsSchema,
1733
- se as connectionSchema,
1760
+ re as connectionSchema,
1734
1761
  c as coordinatesSchema,
1735
- zt as createPassthroughAdapter,
1736
- Wt as createWriteOnlyAdapter,
1762
+ Vt as createPassthroughAdapter,
1763
+ qt as createWriteOnlyAdapter,
1737
1764
  de as customDomainInsertSchema,
1738
1765
  ue as customDomainSchema,
1739
- ut as customDomainWithTenantIdSchema,
1740
- Dt as emailProviderSchema,
1766
+ mt as customDomainWithTenantIdSchema,
1767
+ zt as dailyStatsSchema,
1768
+ wt as emailProviderSchema,
1741
1769
  oe as endingSchema,
1742
1770
  V as fieldComponentSchema,
1743
1771
  Z as flowNodeSchema,
1744
1772
  a as fontDetailsSchema,
1745
1773
  ve as fontsSchema,
1746
- mt as formControlSchema,
1774
+ ht as formControlSchema,
1747
1775
  he as formInsertSchema,
1748
1776
  me as formNodeComponentDefinition,
1749
- ht as formSchema,
1777
+ bt as formSchema,
1750
1778
  q as genericComponentSchema,
1751
1779
  $ as genericNodeSchema,
1752
- bt as hookInsertSchema,
1753
- ft as hookSchema,
1780
+ ft as hookInsertSchema,
1781
+ Et as hookSchema,
1754
1782
  F as identitySchema,
1755
1783
  Ce as inviteInsertSchema,
1756
- Et as inviteSchema,
1784
+ St as inviteSchema,
1757
1785
  Ie as inviteeSchema,
1758
1786
  Ae as inviterSchema,
1759
- St as jwksKeySchema,
1787
+ At as jwksKeySchema,
1760
1788
  Oe as jwksSchema,
1789
+ gt as legacyClientSchema,
1761
1790
  X as legalComponentSchema,
1762
1791
  De as logInsertSchema,
1763
- Ct as logSchema,
1792
+ Ot as logSchema,
1764
1793
  ye as loginSessionInsertSchema,
1765
- It as loginSessionSchema,
1794
+ Ct as loginSessionSchema,
1766
1795
  ee as nodeSchema,
1767
- At as openIDConfigurationSchema,
1796
+ It as openIDConfigurationSchema,
1768
1797
  et as organizationBrandingSchema,
1769
1798
  tt as organizationEnabledConnectionSchema,
1770
1799
  nt as organizationInsertSchema,
1771
- Ht as organizationSchema,
1800
+ Gt as organizationSchema,
1772
1801
  ot as organizationTokenQuotaSchema,
1773
1802
  Pe as pageBackgroundSchema,
1774
- Bt as parseUserId,
1803
+ Xt as parseUserId,
1775
1804
  we as passwordInsertSchema,
1776
- Ot as passwordSchema,
1805
+ yt as passwordSchema,
1777
1806
  U as profileDataSchema,
1778
- Rt as promptSettingSchema,
1807
+ Dt as promptSettingSchema,
1779
1808
  He as refreshTokenInsertSchema,
1780
- wt as refreshTokenSchema,
1809
+ jt as refreshTokenSchema,
1781
1810
  Be as resourceServerInsertSchema,
1782
- Ut as resourceServerListSchema,
1811
+ Ft as resourceServerListSchema,
1783
1812
  Ke as resourceServerOptionsSchema,
1784
1813
  ze as resourceServerSchema,
1785
1814
  Ge as resourceServerScopeSchema,
1786
1815
  z as richTextComponentSchema,
1787
1816
  Ze as roleInsertSchema,
1788
- Mt as roleListSchema,
1817
+ Ht as roleListSchema,
1789
1818
  We as rolePermissionInsertSchema,
1790
- Ft as rolePermissionListSchema,
1819
+ vt as rolePermissionListSchema,
1791
1820
  Xe as rolePermissionSchema,
1792
1821
  $e as roleSchema,
1793
1822
  je as sessionInsertSchema,
1794
- yt as sessionSchema,
1795
- Tt as signingKeySchema,
1796
- kt as smsProviderSchema,
1797
- jt as smsSendParamsSchema,
1823
+ Tt as sessionSchema,
1824
+ Nt as signingKeySchema,
1825
+ Ut as smsProviderSchema,
1826
+ kt as smsSendParamsSchema,
1798
1827
  te as startSchema,
1799
1828
  J as stepNodeSchema,
1800
1829
  le as tenantInsertSchema,
1801
1830
  ce as tenantSchema,
1802
- Kt as tenantSettingsSchema,
1831
+ Bt as tenantSettingsSchema,
1803
1832
  Me as themeInsertSchema,
1804
1833
  Lt as themeSchema,
1805
- Nt as tokenResponseSchema,
1806
- st as totalsSchema,
1834
+ Rt as tokenResponseSchema,
1835
+ rt as totalsSchema,
1807
1836
  v as userInsertSchema,
1808
1837
  it as userOrganizationInsertSchema,
1809
- Gt as userOrganizationSchema,
1838
+ Kt as userOrganizationSchema,
1810
1839
  Ve as userPermissionInsertSchema,
1811
- vt as userPermissionListSchema,
1840
+ Pt as userPermissionListSchema,
1812
1841
  qe as userPermissionSchema,
1813
- Pt as userPermissionWithDetailsListSchema,
1842
+ xt as userPermissionWithDetailsListSchema,
1814
1843
  Ye as userPermissionWithDetailsSchema,
1815
1844
  ct as userResponseSchema,
1816
1845
  Qe as userRoleInsertSchema,
1817
- xt as userRoleListSchema,
1846
+ Mt as userRoleListSchema,
1818
1847
  Je as userRoleSchema,
1819
1848
  P as userSchema,
1820
1849
  ge as verificationMethodsSchema,
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.108.0",
14
+ "version": "0.109.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],