@authhero/adapter-interfaces 0.108.0 → 0.109.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +42 -2
- package/dist/adapter-interfaces.mjs +130 -101
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Ze=e.z.object({page:e.z.string().min(0).optional().default("0").transform(t=>parseInt(t,10)).openapi({description:"The page number where 0 is the first page"}),per_page:e.z.string().min(1).optional().default("10").transform(t=>parseInt(t,10)).openapi({description:"The number of items per page"}),include_totals:e.z.string().optional().default("false").transform(t=>t==="true").openapi({description:"If the total number of items should be included in the response"}),sort:e.z.string().regex(/^.+:(-1|1)$/).optional().openapi({description:"A property that should have the format 'string:-1' or 'string:1'"}),q:e.z.string().optional().openapi({description:"A lucene query string used to filter the results"})}),$e=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),r=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),O=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),y=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:O.optional()}),m=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),T=m.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().optional(),connection:e.z.string(),is_social:e.z.boolean().optional()}),N=e.z.object({...T.shape,...r.shape,user_id:e.z.string(),provider:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(y).optional()}),et=N,tt=m.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),ot="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let nt=(t=21)=>{let n="",a=crypto.getRandomValues(new Uint8Array(t|=0));for(;t--;)n+=ot[a[t]&63];return n};const L=e.z.object({client_id:e.z.string().openapi({description:"ID of this client."}),name:e.z.string().min(1).openapi({description:"Name of this client (min length: 1 character, does not allow < or >)."}),description:e.z.string().max(140).optional().openapi({description:"Free text description of this client (max length: 140 characters)."}),global:e.z.boolean().default(!1).openapi({description:"Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."}),client_secret:e.z.string().default(()=>nt()).optional().openapi({description:"Client secret (which you must not make public)."}),app_type:e.z.enum(["native","spa","regular_web","non_interactive","resource_server","express_configuration","rms","box","cloudbees","concur","dropbox","mscrm","echosign","egnyte","newrelic","office365","salesforce","sentry","sharepoint","slack","springcm","zendesk","zoom","sso_integration","oag"]).default("regular_web").optional().openapi({description:"The type of application this client represents"}),logo_uri:e.z.string().url().optional().openapi({description:"URL of the logo to display for this client. Recommended size is 150x150 pixels."}),is_first_party:e.z.boolean().default(!1).openapi({description:"Whether this client a first party client (true) or not (false)."}),oidc_conformant:e.z.boolean().default(!0).openapi({description:"Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."}),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),client_aliases:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of audiences/realms for SAML protocol. Used by the wsfed addon."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."}),connections:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of connection IDs enabled for this client. The order determines the display order on the login page."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),session_transfer:e.z.record(e.z.any()).default({}).optional().openapi({description:"Native to Web SSO Configuration"}),oidc_logout:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration for OIDC backchannel logout"}),grant_types:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."}),jwt_configuration:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration related to JWTs for the client."}),signing_keys:e.z.array(e.z.record(e.z.any())).default([]).optional().openapi({description:"Signing certificates associated with this client."}),encryption_key:e.z.record(e.z.any()).default({}).optional().openapi({description:"Encryption used for WsFed responses with this client."}),sso:e.z.boolean().default(!1).openapi({description:"Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."}),sso_disabled:e.z.boolean().default(!0).openapi({description:"Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."}),cross_origin_authentication:e.z.boolean().default(!1).openapi({description:"Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."}),cross_origin_loc:e.z.string().url().optional().openapi({description:"URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."}),custom_login_page_on:e.z.boolean().default(!1).openapi({description:"Whether a custom login page is to be used (true) or the default provided login page (false)."}),custom_login_page:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page."}),custom_login_page_preview:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"}),form_template:e.z.string().optional().openapi({description:"HTML form template to be used for WS-Federation."}),addons:e.z.record(e.z.any()).default({}).optional().openapi({description:"Addons enabled for this client and their associated configurations."}),token_endpoint_auth_method:e.z.enum(["none","client_secret_post","client_secret_basic"]).default("client_secret_basic").optional().openapi({description:"Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."}),client_metadata:e.z.record(e.z.string().max(255)).default({}).optional().openapi({description:'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'}),mobile:e.z.record(e.z.any()).default({}).optional().openapi({description:"Additional configuration for native mobile apps."}),initiate_login_uri:e.z.string().url().optional().openapi({description:"Initiate login uri, must be https"}),native_social_login:e.z.record(e.z.any()).default({}).optional(),refresh_token:e.z.record(e.z.any()).default({}).optional().openapi({description:"Refresh token configuration"}),default_organization:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines the default Organization ID and flows"}),organization_usage:e.z.enum(["deny","allow","require"]).default("deny").optional().openapi({description:"Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."}),organization_require_behavior:e.z.enum(["no_prompt","pre_login_prompt","post_login_prompt"]).default("no_prompt").optional().openapi({description:"Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."}),client_authentication_methods:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines client authentication methods."}),require_pushed_authorization_requests:e.z.boolean().default(!1).openapi({description:"Makes the use of Pushed Authorization Requests mandatory for this client"}),require_proof_of_possession:e.z.boolean().default(!1).openapi({description:"Makes the use of Proof-of-Possession mandatory for this client"}),signed_request_object:e.z.record(e.z.any()).default({}).optional().openapi({description:"JWT-secured Authorization Requests (JAR) settings."}),compliance_level:e.z.enum(["none","fapi1_adv_pkj_par","fapi1_adv_mtls_par","fapi2_sp_pkj_mtls","fapi2_sp_mtls_mtls"]).optional().openapi({description:"Defines the compliance level for this client, which may restrict it's capabilities"}),par_request_expiry:e.z.number().optional().openapi({description:"Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"}),token_quota:e.z.record(e.z.any()).default({}).optional()}),R=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),...L.shape}),D=e.z.object({client_id:e.z.string().min(1).openapi({description:"ID of the client."}),audience:e.z.string().min(1).openapi({description:"The audience (API identifier) of this client grant."}),scope:e.z.array(e.z.string()).optional().openapi({description:"Scopes allowed for this client grant."}),organization_usage:e.z.enum(["deny","allow","require"]).optional().openapi({description:"Defines whether organizations can be used with client credentials exchanges for this grant."}),allow_any_organization:e.z.boolean().optional().openapi({description:"If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."}),is_system:e.z.boolean().optional().openapi({description:"If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."}),subject_type:e.z.enum(["client","user"]).optional().openapi({description:"The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."}),authorization_details_types:e.z.array(e.z.string()).optional().openapi({description:"Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."})}),w=e.z.object({id:e.z.string().openapi({description:"ID of the client grant."}),...D.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),it=e.z.array(w),s=e.z.object({x:e.z.number(),y:e.z.number()});var h=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(h||{}),S=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(S||{});const d=e.z.object({id:e.z.string(),category:e.z.nativeEnum(S),type:e.z.nativeEnum(h)}),j=d.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),k=d.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),U=d.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),v=d.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),F=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),P=e.z.union([j,k,U,v,F]);var x=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(x||{});const M=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:s,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(P),next_node:e.z.string()}).passthrough()}),H=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:s,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),G=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:s}).passthrough(),K=e.z.union([M,H,G]),B=e.z.object({next_node:e.z.string(),coordinates:s}).passthrough(),W=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:s}).passthrough(),X=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(K),start:B,ending:W,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),at=X.omit({id:!0,created_at:!0,updated_at:!0});var b=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(b||{}),f=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(f||{}),E=(t=>(t.S256="S256",t.Plain="plain",t))(E||{});const V=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(b).optional(),response_mode:e.z.nativeEnum(f).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(E).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),rt=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),powered_by_logo_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),q=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional(),icon_url:e.z.string().optional()}),Y=e.z.object({id:e.z.string().optional(),name:e.z.string(),display_name:e.z.string().optional(),strategy:e.z.string(),options:q.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional(),is_domain_connection:e.z.boolean().optional(),show_as_button:e.z.boolean().optional(),metadata:e.z.record(e.z.any()).optional()}),Q=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(Y.shape),J=e.z.object({id:e.z.string().optional(),audience:e.z.string(),friendly_name:e.z.string(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sender_email:e.z.string().email(),sender_name:e.z.string(),session_lifetime:e.z.number().optional(),idle_session_lifetime:e.z.number().optional(),ephemeral_session_lifetime:e.z.number().optional(),idle_ephemeral_session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),allowed_logout_urls:e.z.array(e.z.string()).optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_changing_enable_sso:e.z.boolean().optional(),allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),change_pwd_flow_v1:e.z.boolean().optional(),custom_domains_provisioning:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),disable_impersonation:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),enable_sso:e.z.boolean().optional(),enforce_client_authentication_on_passwordless_start:e.z.boolean().optional(),genai_trial:e.z.boolean().optional(),improved_signup_bot_detection_in_classic:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional(),no_disclose_enterprise_connections:e.z.boolean().optional(),remove_alg_from_jwks:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),trust_azure_adfs_email_verified_connection_property:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional()}).optional(),sandbox_version:e.z.string().optional(),legacy_sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),device_flow:e.z.object({charset:e.z.enum(["base20","digits"]).optional(),mask:e.z.string().max(20).optional()}).optional(),default_token_quota:e.z.object({clients:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional(),organizations:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional(),oidc_logout:e.z.object({rp_logout_end_session_endpoint_discovery:e.z.boolean().optional()}).optional(),allow_organization_name_in_authentication_api:e.z.boolean().optional(),customize_mfa_in_postlogin_action:e.z.boolean().optional(),acr_values_supported:e.z.array(e.z.string()).optional(),mtls:e.z.object({enable_endpoint_aliases:e.z.boolean().optional()}).optional(),pushed_authorization_requests_supported:e.z.boolean().optional(),authorization_response_iss_parameter_supported:e.z.boolean().optional()}),Z=e.z.object({created_at:e.z.string().nullable().transform(t=>t??""),updated_at:e.z.string().nullable().transform(t=>t??""),...J.shape,id:e.z.string()});e.z.object({...R.shape,tenant:Z,connections:e.z.array(Q)});const $=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),ee=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:$,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),st=e.z.object({...ee.shape,created_at:e.z.string()}),te=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),oe=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),ne=e.z.object({...te.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(oe)}).optional(),tls_policy:e.z.string().optional()}),lt=ne.extend({tenant_id:e.z.string()}),ct=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),ie=e.z.object({id:e.z.string(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),C=ie.extend({category:e.z.literal("BLOCK").optional()}),c=ie.extend({category:e.z.literal("FIELD").optional(),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional()}),ae=e.z.discriminatedUnion("type",[C.extend({type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()})}),c.omit({sensitive:!0}).extend({type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()})}),c.extend({type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()})}),C.extend({type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()})}),c.extend({type:e.z.literal("EMAIL"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})}),c.extend({type:e.z.literal("NUMBER"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})}),c.extend({type:e.z.literal("PHONE"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})})]),re=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string().optional()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(ae),next_node:e.z.string().optional()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),_t=e.z.object({...r.shape,...re.shape,id:e.z.string()}),se=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),le=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),z={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},pt=e.z.object({...z,trigger_id:se,url:e.z.string()}),dt=e.z.object({...z,trigger_id:le,form_id:e.z.string()}),zt=e.z.union([pt,dt]),gt=e.z.object({...z,trigger_id:se,...r.shape,hook_id:e.z.string(),url:e.z.string()}),ut=e.z.object({...z,trigger_id:le,...r.shape,hook_id:e.z.string(),form_id:e.z.string()}),mt=e.z.union([gt,ut]),ce=e.z.object({name:e.z.string().optional()}),_e=e.z.object({email:e.z.string().optional()}),pe=e.z.object({organization_id:e.z.string().max(50),inviter:ce,invitee:_e,invitation_url:e.z.string().url(),client_id:e.z.string(),connection_id:e.z.string().optional(),app_metadata:e.z.record(e.z.any()).default({}).optional(),user_metadata:e.z.record(e.z.any()).default({}).optional(),ttl_sec:e.z.number().int().max(2592e3).default(604800).optional(),roles:e.z.array(e.z.string()).default([]).optional(),send_invitation_email:e.z.boolean().default(!0).optional()}),ht=e.z.object({id:e.z.string(),organization_id:e.z.string().max(50),created_at:e.z.string().datetime(),expires_at:e.z.string().datetime(),ticket_id:e.z.string().optional()}).extend(pe.shape),de=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),St=e.z.object({keys:e.z.array(de)}),bt=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),ze=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:V,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),ft=e.z.object({...ze.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),ge={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},Et=e.z.string().refine(t=>Object.values(ge).includes(t),{message:"Invalid log type"}),ue=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),me=e.z.object({country_code:e.z.string().length(2),city_name:e.z.string(),latitude:e.z.string(),longitude:e.z.string(),time_zone:e.z.string(),continent_code:e.z.string()}),he=e.z.object({type:Et,date:e.z.string(),description:e.z.string().optional(),ip:e.z.string().optional(),user_agent:e.z.string().optional(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.string().optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ue.optional(),log_id:e.z.string().optional(),location_info:me.optional()}),At=e.z.object({...he.shape,log_id:e.z.string()}),Se=e.z.object({id:e.z.string().optional(),user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id"),is_current:e.z.boolean().default(!0)}),It=Se.extend({id:e.z.string(),created_at:e.z.string(),updated_at:e.z.string()}),be=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),fe=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:be.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),Ct=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...fe.shape}),Ot=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var Ee=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(Ee||{});const yt=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const Ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),Ie=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),i=e.z.object({bold:e.z.boolean(),size:e.z.number()}),Ce=e.z.object({body_text:i,buttons_text:i,font_url:e.z.string(),input_labels:i,links:i,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:i,title:i}),Oe=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),ye=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),Te=e.z.object({borders:Ae,colors:Ie,displayName:e.z.string(),fonts:Ce,page_background:Oe,widget:ye}),Tt=Te.extend({themeId:e.z.string()}),Nt=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),Lt=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),Ne=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:be,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),Rt=e.z.object({created_at:e.z.string(),...Ne.shape}),Dt=e.z.object({to:e.z.string(),message:e.z.string()}),wt=e.z.object({name:e.z.string(),options:e.z.object({})}),Le=e.z.object({value:e.z.string(),description:e.z.string().optional()}),Re=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),De=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(Le).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:Re.optional()}),we=e.z.object({id:e.z.string().optional(),...De.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),jt=e.z.array(we),je=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ke=e.z.object({...je.shape,created_at:e.z.string()}),kt=e.z.array(ke),Ue=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string(),organization_id:e.z.string().optional()}),ve=e.z.object({...Ue.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),Ut=e.z.array(ve),Fe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional(),organization_id:e.z.string().optional()}),vt=e.z.array(Fe),Pe=e.z.object({user_id:e.z.string(),role_id:e.z.string(),organization_id:e.z.string().optional()}),xe=e.z.object({...Pe.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),Ft=e.z.array(xe),Me=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),He=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Me.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),Pt=e.z.array(He),Ge=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Ke=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Be=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),We=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Ge,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Ke).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Be}),xt=e.z.object({...We.shape,...r.shape,id:e.z.string()}),Xe=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),Mt=e.z.object({...Xe.shape,...r.shape,id:e.z.string()}),Ht=e.z.object({idle_session_lifetime:e.z.number().optional(),session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),enable_client_connections:e.z.boolean().optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional()}).optional(),friendly_name:e.z.string().optional(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional()});function Gt(t){const[n,a]=t.split("|");if(!n||!a)throw new Error(`Invalid user_id: ${t}`);return{connection:n,id:a}}function Kt(t){const{primary:n,secondaries:a,syncMethods:Ve=["create","update","remove","delete","set"]}=t,qe={get(_,o){if(typeof o=="symbol")return _[o];const p=_[o];return typeof p!="function"?p:Ve.includes(o)?async(...g)=>{const Ye=await p.apply(_,g),u=[];for(const l of a){const A=l.adapter[o];if(typeof A!="function")continue;const Qe=(async()=>{try{await A.apply(l.adapter,g)}catch(I){try{l.onError?l.onError(I,o,g):console.error(`Passthrough adapter: secondary write failed for ${o}:`,I)}catch(Je){console.error(`Passthrough adapter: onError handler threw for ${o}:`,Je)}}})();l.blocking&&u.push(Qe)}return u.length>0&&await Promise.all(u),Ye}:p.bind(_)}};return new Proxy(n,qe)}function Bt(t){return t}exports.Auth0Client=ue;exports.AuthorizationResponseMode=f;exports.AuthorizationResponseType=b;exports.CodeChallengeMethod=E;exports.ComponentCategory=S;exports.ComponentType=h;exports.GrantType=Ee;exports.LocationInfo=me;exports.LogTypes=ge;exports.NodeType=x;exports.auth0FlowInsertSchema=at;exports.auth0FlowSchema=X;exports.auth0QuerySchema=Ze;exports.auth0UserResponseSchema=et;exports.authParamsSchema=V;exports.baseUserSchema=m;exports.bordersSchema=Ae;exports.brandingSchema=rt;exports.buttonComponentSchema=k;exports.clientGrantInsertSchema=D;exports.clientGrantListSchema=it;exports.clientGrantSchema=w;exports.clientInsertSchema=L;exports.clientSchema=R;exports.codeInsertSchema=ee;exports.codeSchema=st;exports.codeTypeSchema=$;exports.colorsSchema=Ie;exports.componentSchema=P;exports.connectionInsertSchema=Y;exports.connectionOptionsSchema=q;exports.connectionSchema=Q;exports.coordinatesSchema=s;exports.createPassthroughAdapter=Kt;exports.createWriteOnlyAdapter=Bt;exports.customDomainInsertSchema=te;exports.customDomainSchema=ne;exports.customDomainWithTenantIdSchema=lt;exports.emailProviderSchema=Lt;exports.endingSchema=W;exports.fieldComponentSchema=v;exports.flowNodeSchema=H;exports.fontDetailsSchema=i;exports.fontsSchema=Ce;exports.formControlSchema=ct;exports.formInsertSchema=re;exports.formNodeComponentDefinition=ae;exports.formSchema=_t;exports.genericComponentSchema=F;exports.genericNodeSchema=G;exports.hookInsertSchema=zt;exports.hookSchema=mt;exports.identitySchema=y;exports.inviteInsertSchema=pe;exports.inviteSchema=ht;exports.inviteeSchema=_e;exports.inviterSchema=ce;exports.jwksKeySchema=St;exports.jwksSchema=de;exports.legalComponentSchema=U;exports.logInsertSchema=he;exports.logSchema=At;exports.loginSessionInsertSchema=ze;exports.loginSessionSchema=ft;exports.nodeSchema=K;exports.openIDConfigurationSchema=bt;exports.organizationBrandingSchema=Ge;exports.organizationEnabledConnectionSchema=Ke;exports.organizationInsertSchema=We;exports.organizationSchema=xt;exports.organizationTokenQuotaSchema=Be;exports.pageBackgroundSchema=Oe;exports.parseUserId=Gt;exports.passwordInsertSchema=Se;exports.passwordSchema=It;exports.profileDataSchema=O;exports.promptSettingSchema=Nt;exports.refreshTokenInsertSchema=Ne;exports.refreshTokenSchema=Rt;exports.resourceServerInsertSchema=De;exports.resourceServerListSchema=jt;exports.resourceServerOptionsSchema=Re;exports.resourceServerSchema=we;exports.resourceServerScopeSchema=Le;exports.richTextComponentSchema=j;exports.roleInsertSchema=Me;exports.roleListSchema=Pt;exports.rolePermissionInsertSchema=je;exports.rolePermissionListSchema=kt;exports.rolePermissionSchema=ke;exports.roleSchema=He;exports.sessionInsertSchema=fe;exports.sessionSchema=Ct;exports.signingKeySchema=Ot;exports.smsProviderSchema=wt;exports.smsSendParamsSchema=Dt;exports.startSchema=B;exports.stepNodeSchema=M;exports.tenantInsertSchema=J;exports.tenantSchema=Z;exports.tenantSettingsSchema=Ht;exports.themeInsertSchema=Te;exports.themeSchema=Tt;exports.tokenResponseSchema=yt;exports.totalsSchema=$e;exports.userInsertSchema=T;exports.userOrganizationInsertSchema=Xe;exports.userOrganizationSchema=Mt;exports.userPermissionInsertSchema=Ue;exports.userPermissionListSchema=Ut;exports.userPermissionSchema=ve;exports.userPermissionWithDetailsListSchema=vt;exports.userPermissionWithDetailsSchema=Fe;exports.userResponseSchema=tt;exports.userRoleInsertSchema=Pe;exports.userRoleListSchema=Ft;exports.userRoleSchema=xe;exports.userSchema=N;exports.verificationMethodsSchema=oe;exports.widgetSchema=ye;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Ze=e.z.object({page:e.z.string().min(0).optional().default("0").transform(t=>parseInt(t,10)).openapi({description:"The page number where 0 is the first page"}),per_page:e.z.string().min(1).optional().default("10").transform(t=>parseInt(t,10)).openapi({description:"The number of items per page"}),include_totals:e.z.string().optional().default("false").transform(t=>t==="true").openapi({description:"If the total number of items should be included in the response"}),sort:e.z.string().regex(/^.+:(-1|1)$/).optional().openapi({description:"A property that should have the format 'string:-1' or 'string:1'"}),q:e.z.string().optional().openapi({description:"A lucene query string used to filter the results"})}),$e=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),s=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),O=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),y=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:O.optional()}),m=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),T=m.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().optional(),connection:e.z.string(),is_social:e.z.boolean().optional()}),N=e.z.object({...T.shape,...s.shape,user_id:e.z.string(),provider:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(y).optional()}),et=N,tt=m.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),ot="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let nt=(t=21)=>{let n="",a=crypto.getRandomValues(new Uint8Array(t|=0));for(;t--;)n+=ot[a[t]&63];return n};const R=e.z.object({client_id:e.z.string().openapi({description:"ID of this client."}),name:e.z.string().min(1).openapi({description:"Name of this client (min length: 1 character, does not allow < or >)."}),description:e.z.string().max(140).optional().openapi({description:"Free text description of this client (max length: 140 characters)."}),global:e.z.boolean().default(!1).openapi({description:"Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."}),client_secret:e.z.string().default(()=>nt()).optional().openapi({description:"Client secret (which you must not make public)."}),app_type:e.z.enum(["native","spa","regular_web","non_interactive","resource_server","express_configuration","rms","box","cloudbees","concur","dropbox","mscrm","echosign","egnyte","newrelic","office365","salesforce","sentry","sharepoint","slack","springcm","zendesk","zoom","sso_integration","oag"]).default("regular_web").optional().openapi({description:"The type of application this client represents"}),logo_uri:e.z.string().url().optional().openapi({description:"URL of the logo to display for this client. Recommended size is 150x150 pixels."}),is_first_party:e.z.boolean().default(!1).openapi({description:"Whether this client a first party client (true) or not (false)."}),oidc_conformant:e.z.boolean().default(!0).openapi({description:"Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."}),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),client_aliases:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of audiences/realms for SAML protocol. Used by the wsfed addon."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."}),connections:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of connection IDs enabled for this client. The order determines the display order on the login page."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),session_transfer:e.z.record(e.z.any()).default({}).optional().openapi({description:"Native to Web SSO Configuration"}),oidc_logout:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration for OIDC backchannel logout"}),grant_types:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."}),jwt_configuration:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration related to JWTs for the client."}),signing_keys:e.z.array(e.z.record(e.z.any())).default([]).optional().openapi({description:"Signing certificates associated with this client."}),encryption_key:e.z.record(e.z.any()).default({}).optional().openapi({description:"Encryption used for WsFed responses with this client."}),sso:e.z.boolean().default(!1).openapi({description:"Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."}),sso_disabled:e.z.boolean().default(!0).openapi({description:"Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."}),cross_origin_authentication:e.z.boolean().default(!1).openapi({description:"Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."}),cross_origin_loc:e.z.string().url().optional().openapi({description:"URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."}),custom_login_page_on:e.z.boolean().default(!1).openapi({description:"Whether a custom login page is to be used (true) or the default provided login page (false)."}),custom_login_page:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page."}),custom_login_page_preview:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"}),form_template:e.z.string().optional().openapi({description:"HTML form template to be used for WS-Federation."}),addons:e.z.record(e.z.any()).default({}).optional().openapi({description:"Addons enabled for this client and their associated configurations."}),token_endpoint_auth_method:e.z.enum(["none","client_secret_post","client_secret_basic"]).default("client_secret_basic").optional().openapi({description:"Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."}),client_metadata:e.z.record(e.z.string().max(255)).default({}).optional().openapi({description:'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'}),mobile:e.z.record(e.z.any()).default({}).optional().openapi({description:"Additional configuration for native mobile apps."}),initiate_login_uri:e.z.string().url().optional().openapi({description:"Initiate login uri, must be https"}),native_social_login:e.z.record(e.z.any()).default({}).optional(),refresh_token:e.z.record(e.z.any()).default({}).optional().openapi({description:"Refresh token configuration"}),default_organization:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines the default Organization ID and flows"}),organization_usage:e.z.enum(["deny","allow","require"]).default("deny").optional().openapi({description:"Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."}),organization_require_behavior:e.z.enum(["no_prompt","pre_login_prompt","post_login_prompt"]).default("no_prompt").optional().openapi({description:"Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."}),client_authentication_methods:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines client authentication methods."}),require_pushed_authorization_requests:e.z.boolean().default(!1).openapi({description:"Makes the use of Pushed Authorization Requests mandatory for this client"}),require_proof_of_possession:e.z.boolean().default(!1).openapi({description:"Makes the use of Proof-of-Possession mandatory for this client"}),signed_request_object:e.z.record(e.z.any()).default({}).optional().openapi({description:"JWT-secured Authorization Requests (JAR) settings."}),compliance_level:e.z.enum(["none","fapi1_adv_pkj_par","fapi1_adv_mtls_par","fapi2_sp_pkj_mtls","fapi2_sp_mtls_mtls"]).optional().openapi({description:"Defines the compliance level for this client, which may restrict it's capabilities"}),par_request_expiry:e.z.number().optional().openapi({description:"Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"}),token_quota:e.z.record(e.z.any()).default({}).optional()}),L=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),...R.shape}),D=e.z.object({client_id:e.z.string().min(1).openapi({description:"ID of the client."}),audience:e.z.string().min(1).openapi({description:"The audience (API identifier) of this client grant."}),scope:e.z.array(e.z.string()).optional().openapi({description:"Scopes allowed for this client grant."}),organization_usage:e.z.enum(["deny","allow","require"]).optional().openapi({description:"Defines whether organizations can be used with client credentials exchanges for this grant."}),allow_any_organization:e.z.boolean().optional().openapi({description:"If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."}),is_system:e.z.boolean().optional().openapi({description:"If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."}),subject_type:e.z.enum(["client","user"]).optional().openapi({description:"The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."}),authorization_details_types:e.z.array(e.z.string()).optional().openapi({description:"Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."})}),w=e.z.object({id:e.z.string().openapi({description:"ID of the client grant."}),...D.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),it=e.z.array(w),r=e.z.object({x:e.z.number(),y:e.z.number()});var h=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(h||{}),S=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(S||{});const d=e.z.object({id:e.z.string(),category:e.z.nativeEnum(S),type:e.z.nativeEnum(h)}),j=d.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),k=d.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),v=d.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),U=d.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),F=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),P=e.z.union([j,k,v,U,F]);var x=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(x||{});const M=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:r,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(P),next_node:e.z.string()}).passthrough()}),H=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:r,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),G=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:r}).passthrough(),K=e.z.union([M,H,G]),B=e.z.object({next_node:e.z.string(),coordinates:r}).passthrough(),W=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:r}).passthrough(),X=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(K),start:B,ending:W,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),at=X.omit({id:!0,created_at:!0,updated_at:!0});var b=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(b||{}),f=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(f||{}),E=(t=>(t.S256="S256",t.Plain="plain",t))(E||{});const V=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(b).optional(),response_mode:e.z.nativeEnum(f).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(E).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),st=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),powered_by_logo_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),q=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional(),icon_url:e.z.string().optional()}),Y=e.z.object({id:e.z.string().optional(),name:e.z.string(),display_name:e.z.string().optional(),strategy:e.z.string(),options:q.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional(),is_domain_connection:e.z.boolean().optional(),show_as_button:e.z.boolean().optional(),metadata:e.z.record(e.z.any()).optional()}),Q=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(Y.shape),J=e.z.object({id:e.z.string().optional(),audience:e.z.string(),friendly_name:e.z.string(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sender_email:e.z.string().email(),sender_name:e.z.string(),session_lifetime:e.z.number().optional(),idle_session_lifetime:e.z.number().optional(),ephemeral_session_lifetime:e.z.number().optional(),idle_ephemeral_session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),allowed_logout_urls:e.z.array(e.z.string()).optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_changing_enable_sso:e.z.boolean().optional(),allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),change_pwd_flow_v1:e.z.boolean().optional(),custom_domains_provisioning:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),disable_impersonation:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),enable_sso:e.z.boolean().optional(),enforce_client_authentication_on_passwordless_start:e.z.boolean().optional(),genai_trial:e.z.boolean().optional(),improved_signup_bot_detection_in_classic:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional(),no_disclose_enterprise_connections:e.z.boolean().optional(),remove_alg_from_jwks:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),trust_azure_adfs_email_verified_connection_property:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional()}).optional(),sandbox_version:e.z.string().optional(),legacy_sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),device_flow:e.z.object({charset:e.z.enum(["base20","digits"]).optional(),mask:e.z.string().max(20).optional()}).optional(),default_token_quota:e.z.object({clients:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional(),organizations:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional(),oidc_logout:e.z.object({rp_logout_end_session_endpoint_discovery:e.z.boolean().optional()}).optional(),allow_organization_name_in_authentication_api:e.z.boolean().optional(),customize_mfa_in_postlogin_action:e.z.boolean().optional(),acr_values_supported:e.z.array(e.z.string()).optional(),mtls:e.z.object({enable_endpoint_aliases:e.z.boolean().optional()}).optional(),pushed_authorization_requests_supported:e.z.boolean().optional(),authorization_response_iss_parameter_supported:e.z.boolean().optional()}),Z=e.z.object({created_at:e.z.string().nullable().transform(t=>t??""),updated_at:e.z.string().nullable().transform(t=>t??""),...J.shape,id:e.z.string()}),rt=e.z.object({...L.shape,tenant:Z,connections:e.z.array(Q)}),$=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),ee=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:$,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),lt=e.z.object({...ee.shape,created_at:e.z.string()}),te=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),oe=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),ne=e.z.object({...te.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(oe)}).optional(),tls_policy:e.z.string().optional()}),ct=ne.extend({tenant_id:e.z.string()}),pt=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),ie=e.z.object({id:e.z.string(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),C=ie.extend({category:e.z.literal("BLOCK").optional()}),c=ie.extend({category:e.z.literal("FIELD").optional(),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional()}),ae=e.z.discriminatedUnion("type",[C.extend({type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()})}),c.omit({sensitive:!0}).extend({type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()})}),c.extend({type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()})}),C.extend({type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()})}),c.extend({type:e.z.literal("EMAIL"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})}),c.extend({type:e.z.literal("NUMBER"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})}),c.extend({type:e.z.literal("PHONE"),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()})})]),se=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string().optional()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(ae),next_node:e.z.string().optional()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),_t=e.z.object({...s.shape,...se.shape,id:e.z.string()}),re=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),le=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),z={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},dt=e.z.object({...z,trigger_id:re,url:e.z.string()}),zt=e.z.object({...z,trigger_id:le,form_id:e.z.string()}),gt=e.z.union([dt,zt]),ut=e.z.object({...z,trigger_id:re,...s.shape,hook_id:e.z.string(),url:e.z.string()}),mt=e.z.object({...z,trigger_id:le,...s.shape,hook_id:e.z.string(),form_id:e.z.string()}),ht=e.z.union([ut,mt]),ce=e.z.object({name:e.z.string().optional()}),pe=e.z.object({email:e.z.string().optional()}),_e=e.z.object({organization_id:e.z.string().max(50),inviter:ce,invitee:pe,invitation_url:e.z.string().url(),client_id:e.z.string(),connection_id:e.z.string().optional(),app_metadata:e.z.record(e.z.any()).default({}).optional(),user_metadata:e.z.record(e.z.any()).default({}).optional(),ttl_sec:e.z.number().int().max(2592e3).default(604800).optional(),roles:e.z.array(e.z.string()).default([]).optional(),send_invitation_email:e.z.boolean().default(!0).optional()}),St=e.z.object({id:e.z.string(),organization_id:e.z.string().max(50),created_at:e.z.string().datetime(),expires_at:e.z.string().datetime(),ticket_id:e.z.string().optional()}).extend(_e.shape),de=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),bt=e.z.object({keys:e.z.array(de)}),ft=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),ze=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:V,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),Et=e.z.object({...ze.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),ge={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},At=e.z.string().refine(t=>Object.values(ge).includes(t),{message:"Invalid log type"}),ue=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),me=e.z.object({country_code:e.z.string().length(2),city_name:e.z.string(),latitude:e.z.string(),longitude:e.z.string(),time_zone:e.z.string(),continent_code:e.z.string()}),he=e.z.object({type:At,date:e.z.string(),description:e.z.string().optional(),ip:e.z.string().optional(),user_agent:e.z.string().optional(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.string().optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ue.optional(),log_id:e.z.string().optional(),location_info:me.optional()}),It=e.z.object({...he.shape,log_id:e.z.string()}),Se=e.z.object({id:e.z.string().optional(),user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id"),is_current:e.z.boolean().default(!0)}),Ct=Se.extend({id:e.z.string(),created_at:e.z.string(),updated_at:e.z.string()}),be=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),fe=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:be.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),Ot=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...fe.shape}),yt=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var Ee=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(Ee||{});const Tt=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const Ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),Ie=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),i=e.z.object({bold:e.z.boolean(),size:e.z.number()}),Ce=e.z.object({body_text:i,buttons_text:i,font_url:e.z.string(),input_labels:i,links:i,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:i,title:i}),Oe=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),ye=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),Te=e.z.object({borders:Ae,colors:Ie,displayName:e.z.string(),fonts:Ce,page_background:Oe,widget:ye}),Nt=Te.extend({themeId:e.z.string()}),Rt=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),Lt=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),Ne=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:be,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),Dt=e.z.object({created_at:e.z.string(),...Ne.shape}),wt=e.z.object({to:e.z.string(),message:e.z.string()}),jt=e.z.object({name:e.z.string(),options:e.z.object({})}),Re=e.z.object({value:e.z.string(),description:e.z.string().optional()}),Le=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),De=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(Re).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:Le.optional()}),we=e.z.object({id:e.z.string().optional(),...De.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),kt=e.z.array(we),je=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ke=e.z.object({...je.shape,created_at:e.z.string()}),vt=e.z.array(ke),ve=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string(),organization_id:e.z.string().optional()}),Ue=e.z.object({...ve.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),Ut=e.z.array(Ue),Fe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional(),organization_id:e.z.string().optional()}),Ft=e.z.array(Fe),Pe=e.z.object({user_id:e.z.string(),role_id:e.z.string(),organization_id:e.z.string().optional()}),xe=e.z.object({...Pe.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),Pt=e.z.array(xe),Me=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),He=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Me.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),xt=e.z.array(He),Ge=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Ke=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Be=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),We=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Ge,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Ke).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Be}),Mt=e.z.object({...We.shape,...s.shape,id:e.z.string()}),Xe=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),Ht=e.z.object({...Xe.shape,...s.shape,id:e.z.string()}),Gt=e.z.object({idle_session_lifetime:e.z.number().optional(),session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),enable_client_connections:e.z.boolean().optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional()}).optional(),friendly_name:e.z.string().optional(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional()}),Kt=e.z.object({date:e.z.string().openapi({description:"Date these events occurred in ISO 8601 format",example:"2025-12-19"}),logins:e.z.number().openapi({description:"Number of logins on this date",example:150}),signups:e.z.number().openapi({description:"Number of signups on this date",example:25}),leaked_passwords:e.z.number().openapi({description:"Number of breached-password detections on this date (subscription required)",example:0}),updated_at:e.z.string().openapi({description:"Date and time this stats entry was last updated in ISO 8601 format",example:"2025-12-19T10:30:00.000Z"}),created_at:e.z.string().openapi({description:"Approximate date and time the first event occurred in ISO 8601 format",example:"2025-12-19T00:00:00.000Z"})}),Bt=e.z.number().openapi({description:"Number of active users in the last 30 days",example:1234});function Wt(t){const[n,a]=t.split("|");if(!n||!a)throw new Error(`Invalid user_id: ${t}`);return{connection:n,id:a}}function Xt(t){const{primary:n,secondaries:a,syncMethods:Ve=["create","update","remove","delete","set"]}=t,qe={get(p,o){if(typeof o=="symbol")return p[o];const _=p[o];return typeof _!="function"?_:Ve.includes(o)?async(...g)=>{const Ye=await _.apply(p,g),u=[];for(const l of a){const A=l.adapter[o];if(typeof A!="function")continue;const Qe=(async()=>{try{await A.apply(l.adapter,g)}catch(I){try{l.onError?l.onError(I,o,g):console.error(`Passthrough adapter: secondary write failed for ${o}:`,I)}catch(Je){console.error(`Passthrough adapter: onError handler threw for ${o}:`,Je)}}})();l.blocking&&u.push(Qe)}return u.length>0&&await Promise.all(u),Ye}:_.bind(p)}};return new Proxy(n,qe)}function Vt(t){return t}exports.Auth0Client=ue;exports.AuthorizationResponseMode=f;exports.AuthorizationResponseType=b;exports.CodeChallengeMethod=E;exports.ComponentCategory=S;exports.ComponentType=h;exports.GrantType=Ee;exports.LocationInfo=me;exports.LogTypes=ge;exports.NodeType=x;exports.activeUsersResponseSchema=Bt;exports.auth0FlowInsertSchema=at;exports.auth0FlowSchema=X;exports.auth0QuerySchema=Ze;exports.auth0UserResponseSchema=et;exports.authParamsSchema=V;exports.baseUserSchema=m;exports.bordersSchema=Ae;exports.brandingSchema=st;exports.buttonComponentSchema=k;exports.clientGrantInsertSchema=D;exports.clientGrantListSchema=it;exports.clientGrantSchema=w;exports.clientInsertSchema=R;exports.clientSchema=L;exports.codeInsertSchema=ee;exports.codeSchema=lt;exports.codeTypeSchema=$;exports.colorsSchema=Ie;exports.componentSchema=P;exports.connectionInsertSchema=Y;exports.connectionOptionsSchema=q;exports.connectionSchema=Q;exports.coordinatesSchema=r;exports.createPassthroughAdapter=Xt;exports.createWriteOnlyAdapter=Vt;exports.customDomainInsertSchema=te;exports.customDomainSchema=ne;exports.customDomainWithTenantIdSchema=ct;exports.dailyStatsSchema=Kt;exports.emailProviderSchema=Lt;exports.endingSchema=W;exports.fieldComponentSchema=U;exports.flowNodeSchema=H;exports.fontDetailsSchema=i;exports.fontsSchema=Ce;exports.formControlSchema=pt;exports.formInsertSchema=se;exports.formNodeComponentDefinition=ae;exports.formSchema=_t;exports.genericComponentSchema=F;exports.genericNodeSchema=G;exports.hookInsertSchema=gt;exports.hookSchema=ht;exports.identitySchema=y;exports.inviteInsertSchema=_e;exports.inviteSchema=St;exports.inviteeSchema=pe;exports.inviterSchema=ce;exports.jwksKeySchema=bt;exports.jwksSchema=de;exports.legacyClientSchema=rt;exports.legalComponentSchema=v;exports.logInsertSchema=he;exports.logSchema=It;exports.loginSessionInsertSchema=ze;exports.loginSessionSchema=Et;exports.nodeSchema=K;exports.openIDConfigurationSchema=ft;exports.organizationBrandingSchema=Ge;exports.organizationEnabledConnectionSchema=Ke;exports.organizationInsertSchema=We;exports.organizationSchema=Mt;exports.organizationTokenQuotaSchema=Be;exports.pageBackgroundSchema=Oe;exports.parseUserId=Wt;exports.passwordInsertSchema=Se;exports.passwordSchema=Ct;exports.profileDataSchema=O;exports.promptSettingSchema=Rt;exports.refreshTokenInsertSchema=Ne;exports.refreshTokenSchema=Dt;exports.resourceServerInsertSchema=De;exports.resourceServerListSchema=kt;exports.resourceServerOptionsSchema=Le;exports.resourceServerSchema=we;exports.resourceServerScopeSchema=Re;exports.richTextComponentSchema=j;exports.roleInsertSchema=Me;exports.roleListSchema=xt;exports.rolePermissionInsertSchema=je;exports.rolePermissionListSchema=vt;exports.rolePermissionSchema=ke;exports.roleSchema=He;exports.sessionInsertSchema=fe;exports.sessionSchema=Ot;exports.signingKeySchema=yt;exports.smsProviderSchema=jt;exports.smsSendParamsSchema=wt;exports.startSchema=B;exports.stepNodeSchema=M;exports.tenantInsertSchema=J;exports.tenantSchema=Z;exports.tenantSettingsSchema=Gt;exports.themeInsertSchema=Te;exports.themeSchema=Nt;exports.tokenResponseSchema=Tt;exports.totalsSchema=$e;exports.userInsertSchema=T;exports.userOrganizationInsertSchema=Xe;exports.userOrganizationSchema=Ht;exports.userPermissionInsertSchema=ve;exports.userPermissionListSchema=Ut;exports.userPermissionSchema=Ue;exports.userPermissionWithDetailsListSchema=Ft;exports.userPermissionWithDetailsSchema=Fe;exports.userResponseSchema=tt;exports.userRoleInsertSchema=Pe;exports.userRoleListSchema=Pt;exports.userRoleSchema=xe;exports.userSchema=N;exports.verificationMethodsSchema=oe;exports.widgetSchema=ye;
|
|
@@ -8274,7 +8274,7 @@ export declare const brandingSchema: z.ZodObject<{
|
|
|
8274
8274
|
} | undefined;
|
|
8275
8275
|
}>;
|
|
8276
8276
|
export type Branding = z.infer<typeof brandingSchema>;
|
|
8277
|
-
declare const
|
|
8277
|
+
export declare const legacyClientSchema: z.ZodObject<{
|
|
8278
8278
|
tenant: z.ZodObject<{
|
|
8279
8279
|
id: z.ZodString;
|
|
8280
8280
|
audience: z.ZodString;
|
|
@@ -9319,7 +9319,7 @@ declare const LegacyClientSchema: z.ZodObject<{
|
|
|
9319
9319
|
par_request_expiry?: number | undefined;
|
|
9320
9320
|
token_quota?: Record<string, any> | undefined;
|
|
9321
9321
|
}>;
|
|
9322
|
-
export type LegacyClient = z.infer<typeof
|
|
9322
|
+
export type LegacyClient = z.infer<typeof legacyClientSchema>;
|
|
9323
9323
|
export declare const codeTypeSchema: z.ZodEnum<[
|
|
9324
9324
|
"password_reset",
|
|
9325
9325
|
"email_verification",
|
|
@@ -18034,6 +18034,31 @@ export declare const tenantSettingsSchema: z.ZodObject<{
|
|
|
18034
18034
|
} | undefined;
|
|
18035
18035
|
}>;
|
|
18036
18036
|
export type TenantSettings = z.infer<typeof tenantSettingsSchema>;
|
|
18037
|
+
export declare const dailyStatsSchema: z.ZodObject<{
|
|
18038
|
+
date: z.ZodString;
|
|
18039
|
+
logins: z.ZodNumber;
|
|
18040
|
+
signups: z.ZodNumber;
|
|
18041
|
+
leaked_passwords: z.ZodNumber;
|
|
18042
|
+
updated_at: z.ZodString;
|
|
18043
|
+
created_at: z.ZodString;
|
|
18044
|
+
}, "strip", z.ZodTypeAny, {
|
|
18045
|
+
date: string;
|
|
18046
|
+
created_at: string;
|
|
18047
|
+
updated_at: string;
|
|
18048
|
+
logins: number;
|
|
18049
|
+
signups: number;
|
|
18050
|
+
leaked_passwords: number;
|
|
18051
|
+
}, {
|
|
18052
|
+
date: string;
|
|
18053
|
+
created_at: string;
|
|
18054
|
+
updated_at: string;
|
|
18055
|
+
logins: number;
|
|
18056
|
+
signups: number;
|
|
18057
|
+
leaked_passwords: number;
|
|
18058
|
+
}>;
|
|
18059
|
+
export type DailyStats = z.infer<typeof dailyStatsSchema>;
|
|
18060
|
+
export declare const activeUsersResponseSchema: z.ZodNumber;
|
|
18061
|
+
export type ActiveUsersResponse = z.infer<typeof activeUsersResponseSchema>;
|
|
18037
18062
|
export declare function parseUserId(user_id: string): {
|
|
18038
18063
|
connection: string;
|
|
18039
18064
|
id: string;
|
|
@@ -18469,6 +18494,20 @@ export interface GeoAdapter {
|
|
|
18469
18494
|
*/
|
|
18470
18495
|
getGeoInfo(headers: Record<string, string>): Promise<GeoInfo | null>;
|
|
18471
18496
|
}
|
|
18497
|
+
export interface StatsListParams {
|
|
18498
|
+
from?: string;
|
|
18499
|
+
to?: string;
|
|
18500
|
+
}
|
|
18501
|
+
export interface StatsAdapter {
|
|
18502
|
+
/**
|
|
18503
|
+
* Get daily statistics (logins, signups, etc.) for a date range
|
|
18504
|
+
*/
|
|
18505
|
+
getDaily(tenantId: string, params?: StatsListParams): Promise<DailyStats[]>;
|
|
18506
|
+
/**
|
|
18507
|
+
* Get the number of active users in the last 30 days
|
|
18508
|
+
*/
|
|
18509
|
+
getActiveUsers(tenantId: string): Promise<number>;
|
|
18510
|
+
}
|
|
18472
18511
|
export interface DataAdapters {
|
|
18473
18512
|
branding: BrandingAdapter;
|
|
18474
18513
|
cache?: CacheAdapter;
|
|
@@ -18495,6 +18534,7 @@ export interface DataAdapters {
|
|
|
18495
18534
|
userPermissions: UserPermissionsAdapter;
|
|
18496
18535
|
roles: RolesAdapter;
|
|
18497
18536
|
sessions: SessionsAdapter;
|
|
18537
|
+
stats?: StatsAdapter;
|
|
18498
18538
|
tenants: TenantsDataAdapter;
|
|
18499
18539
|
themes: ThemesAdapter;
|
|
18500
18540
|
users: UserDataAdapter;
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { z as e } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const st = e.object({
|
|
3
3
|
page: e.string().min(0).optional().default("0").transform((t) => parseInt(t, 10)).openapi({
|
|
4
4
|
description: "The page number where 0 is the first page"
|
|
5
5
|
}),
|
|
@@ -15,11 +15,11 @@ const rt = e.object({
|
|
|
15
15
|
q: e.string().optional().openapi({
|
|
16
16
|
description: "A lucene query string used to filter the results"
|
|
17
17
|
})
|
|
18
|
-
}),
|
|
18
|
+
}), rt = e.object({
|
|
19
19
|
start: e.number(),
|
|
20
20
|
limit: e.number(),
|
|
21
21
|
length: e.number()
|
|
22
|
-
}),
|
|
22
|
+
}), s = e.object({
|
|
23
23
|
created_at: e.string(),
|
|
24
24
|
updated_at: e.string()
|
|
25
25
|
}), U = e.object({
|
|
@@ -66,7 +66,7 @@ const rt = e.object({
|
|
|
66
66
|
is_social: e.boolean().optional()
|
|
67
67
|
}), P = e.object({
|
|
68
68
|
...v.shape,
|
|
69
|
-
...
|
|
69
|
+
...s.shape,
|
|
70
70
|
user_id: e.string(),
|
|
71
71
|
provider: e.string(),
|
|
72
72
|
is_social: e.boolean(),
|
|
@@ -527,7 +527,7 @@ const ie = e.object({
|
|
|
527
527
|
twilio_sid: e.string().optional(),
|
|
528
528
|
twilio_token: e.string().optional(),
|
|
529
529
|
icon_url: e.string().optional()
|
|
530
|
-
}),
|
|
530
|
+
}), se = e.object({
|
|
531
531
|
id: e.string().optional(),
|
|
532
532
|
name: e.string(),
|
|
533
533
|
display_name: e.string().optional(),
|
|
@@ -539,11 +539,11 @@ const ie = e.object({
|
|
|
539
539
|
is_domain_connection: e.boolean().optional(),
|
|
540
540
|
show_as_button: e.boolean().optional(),
|
|
541
541
|
metadata: e.record(e.any()).optional()
|
|
542
|
-
}),
|
|
542
|
+
}), re = e.object({
|
|
543
543
|
id: e.string(),
|
|
544
544
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
545
545
|
updated_at: e.string().transform((t) => t === null ? "" : t)
|
|
546
|
-
}).extend(
|
|
546
|
+
}).extend(se.shape), le = e.object({
|
|
547
547
|
id: e.string().optional(),
|
|
548
548
|
// Basic settings
|
|
549
549
|
audience: e.string(),
|
|
@@ -668,13 +668,11 @@ const ie = e.object({
|
|
|
668
668
|
updated_at: e.string().nullable().transform((t) => t ?? ""),
|
|
669
669
|
...le.shape,
|
|
670
670
|
id: e.string()
|
|
671
|
-
})
|
|
672
|
-
e.object({
|
|
671
|
+
}), gt = e.object({
|
|
673
672
|
...G.shape,
|
|
674
673
|
tenant: ce,
|
|
675
|
-
connections: e.array(
|
|
676
|
-
})
|
|
677
|
-
const _e = e.enum([
|
|
674
|
+
connections: e.array(re)
|
|
675
|
+
}), _e = e.enum([
|
|
678
676
|
"password_reset",
|
|
679
677
|
"email_verification",
|
|
680
678
|
"otp",
|
|
@@ -713,7 +711,7 @@ const _e = e.enum([
|
|
|
713
711
|
expires_at: e.string(),
|
|
714
712
|
used_at: e.string().optional(),
|
|
715
713
|
user_id: e.string().optional()
|
|
716
|
-
}),
|
|
714
|
+
}), ut = e.object({
|
|
717
715
|
...pe.shape,
|
|
718
716
|
created_at: e.string()
|
|
719
717
|
}), de = e.object({
|
|
@@ -744,9 +742,9 @@ const _e = e.enum([
|
|
|
744
742
|
methods: e.array(ge)
|
|
745
743
|
}).optional(),
|
|
746
744
|
tls_policy: e.string().optional()
|
|
747
|
-
}),
|
|
745
|
+
}), mt = ue.extend({
|
|
748
746
|
tenant_id: e.string()
|
|
749
|
-
}),
|
|
747
|
+
}), ht = e.object({
|
|
750
748
|
id: e.string(),
|
|
751
749
|
type: e.literal("submit"),
|
|
752
750
|
label: e.string(),
|
|
@@ -888,8 +886,8 @@ const _e = e.enum([
|
|
|
888
886
|
style: e.object({ css: e.string().optional() }).optional()
|
|
889
887
|
}).openapi({
|
|
890
888
|
description: "Schema for flow-based forms (matches new JSON structure)"
|
|
891
|
-
}),
|
|
892
|
-
...
|
|
889
|
+
}), bt = e.object({
|
|
890
|
+
...s.shape,
|
|
893
891
|
...he.shape,
|
|
894
892
|
id: e.string()
|
|
895
893
|
}), T = e.enum([
|
|
@@ -920,22 +918,22 @@ const _e = e.enum([
|
|
|
920
918
|
...g,
|
|
921
919
|
trigger_id: N,
|
|
922
920
|
form_id: e.string()
|
|
923
|
-
}),
|
|
921
|
+
}), ft = e.union([
|
|
924
922
|
be,
|
|
925
923
|
fe
|
|
926
924
|
]), Ee = e.object({
|
|
927
925
|
...g,
|
|
928
926
|
trigger_id: T,
|
|
929
|
-
...
|
|
927
|
+
...s.shape,
|
|
930
928
|
hook_id: e.string(),
|
|
931
929
|
url: e.string()
|
|
932
930
|
}), Se = e.object({
|
|
933
931
|
...g,
|
|
934
932
|
trigger_id: N,
|
|
935
|
-
...
|
|
933
|
+
...s.shape,
|
|
936
934
|
hook_id: e.string(),
|
|
937
935
|
form_id: e.string()
|
|
938
|
-
}),
|
|
936
|
+
}), Et = e.union([Ee, Se]), Ae = e.object({
|
|
939
937
|
name: e.string().optional()
|
|
940
938
|
}), Ie = e.object({
|
|
941
939
|
email: e.string().optional()
|
|
@@ -951,7 +949,7 @@ const _e = e.enum([
|
|
|
951
949
|
ttl_sec: e.number().int().max(2592e3).default(604800).optional(),
|
|
952
950
|
roles: e.array(e.string()).default([]).optional(),
|
|
953
951
|
send_invitation_email: e.boolean().default(!0).optional()
|
|
954
|
-
}),
|
|
952
|
+
}), St = e.object({
|
|
955
953
|
id: e.string(),
|
|
956
954
|
organization_id: e.string().max(50),
|
|
957
955
|
created_at: e.string().datetime(),
|
|
@@ -976,9 +974,9 @@ const _e = e.enum([
|
|
|
976
974
|
x5t: e.string().optional(),
|
|
977
975
|
x5c: e.array(e.string()).optional(),
|
|
978
976
|
use: e.enum(["sig", "enc"]).optional()
|
|
979
|
-
}), St = e.object({
|
|
980
|
-
keys: e.array(Oe)
|
|
981
977
|
}), At = e.object({
|
|
978
|
+
keys: e.array(Oe)
|
|
979
|
+
}), It = e.object({
|
|
982
980
|
issuer: e.string(),
|
|
983
981
|
authorization_endpoint: e.string(),
|
|
984
982
|
token_endpoint: e.string(),
|
|
@@ -1012,7 +1010,7 @@ const _e = e.enum([
|
|
|
1012
1010
|
login_completed: e.boolean().optional().default(!1)
|
|
1013
1011
|
}).openapi({
|
|
1014
1012
|
description: "This represents a login sesion"
|
|
1015
|
-
}),
|
|
1013
|
+
}), Ct = e.object({
|
|
1016
1014
|
...ye.shape,
|
|
1017
1015
|
id: e.string().openapi({
|
|
1018
1016
|
description: "This is is used as the state in the universal login"
|
|
@@ -1189,13 +1187,13 @@ const _e = e.enum([
|
|
|
1189
1187
|
}, Ne = e.string().refine(
|
|
1190
1188
|
(t) => Object.values(Te).includes(t),
|
|
1191
1189
|
{ message: "Invalid log type" }
|
|
1192
|
-
),
|
|
1190
|
+
), Re = e.object({
|
|
1193
1191
|
name: e.string(),
|
|
1194
1192
|
version: e.string(),
|
|
1195
1193
|
env: e.object({
|
|
1196
1194
|
node: e.string().optional()
|
|
1197
1195
|
}).optional()
|
|
1198
|
-
}),
|
|
1196
|
+
}), Le = e.object({
|
|
1199
1197
|
country_code: e.string().length(2),
|
|
1200
1198
|
city_name: e.string(),
|
|
1201
1199
|
latitude: e.string(),
|
|
@@ -1222,10 +1220,10 @@ const _e = e.enum([
|
|
|
1222
1220
|
strategy: e.string().optional(),
|
|
1223
1221
|
strategy_type: e.string().optional(),
|
|
1224
1222
|
hostname: e.string().optional(),
|
|
1225
|
-
auth0_client:
|
|
1223
|
+
auth0_client: Re.optional(),
|
|
1226
1224
|
log_id: e.string().optional(),
|
|
1227
|
-
location_info:
|
|
1228
|
-
}),
|
|
1225
|
+
location_info: Le.optional()
|
|
1226
|
+
}), Ot = e.object({
|
|
1229
1227
|
...De.shape,
|
|
1230
1228
|
log_id: e.string()
|
|
1231
1229
|
}), we = e.object({
|
|
@@ -1234,11 +1232,11 @@ const _e = e.enum([
|
|
|
1234
1232
|
password: e.string(),
|
|
1235
1233
|
algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id"),
|
|
1236
1234
|
is_current: e.boolean().default(!0)
|
|
1237
|
-
}),
|
|
1235
|
+
}), yt = we.extend({
|
|
1238
1236
|
id: e.string(),
|
|
1239
1237
|
created_at: e.string(),
|
|
1240
1238
|
updated_at: e.string()
|
|
1241
|
-
}),
|
|
1239
|
+
}), R = e.object({
|
|
1242
1240
|
initial_user_agent: e.string().describe("First user agent of the device from which this user logged in"),
|
|
1243
1241
|
initial_ip: e.string().describe("First IP address associated with this session"),
|
|
1244
1242
|
initial_asn: e.string().describe("First autonomous system number associated with this session"),
|
|
@@ -1253,17 +1251,17 @@ const _e = e.enum([
|
|
|
1253
1251
|
expires_at: e.string().optional(),
|
|
1254
1252
|
login_session_id: e.string(),
|
|
1255
1253
|
idle_expires_at: e.string().optional(),
|
|
1256
|
-
device:
|
|
1254
|
+
device: R.describe(
|
|
1257
1255
|
"Metadata related to the device used in the session"
|
|
1258
1256
|
),
|
|
1259
1257
|
clients: e.array(e.string()).describe("List of client details for the session")
|
|
1260
|
-
}),
|
|
1258
|
+
}), Tt = e.object({
|
|
1261
1259
|
created_at: e.string(),
|
|
1262
1260
|
updated_at: e.string(),
|
|
1263
1261
|
authenticated_at: e.string(),
|
|
1264
1262
|
last_interaction_at: e.string(),
|
|
1265
1263
|
...je.shape
|
|
1266
|
-
}),
|
|
1264
|
+
}), Nt = e.object({
|
|
1267
1265
|
kid: e.string().openapi({ description: "The key id of the signing key" }),
|
|
1268
1266
|
cert: e.string().openapi({ description: "The public certificate of the signing key" }),
|
|
1269
1267
|
fingerprint: e.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -1290,7 +1288,7 @@ const _e = e.enum([
|
|
|
1290
1288
|
})
|
|
1291
1289
|
});
|
|
1292
1290
|
var ke = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(ke || {});
|
|
1293
|
-
const
|
|
1291
|
+
const Rt = e.object({
|
|
1294
1292
|
access_token: e.string(),
|
|
1295
1293
|
id_token: e.string().optional(),
|
|
1296
1294
|
scope: e.string().optional(),
|
|
@@ -1365,12 +1363,12 @@ const Ue = e.object({
|
|
|
1365
1363
|
widget: xe
|
|
1366
1364
|
}), Lt = Me.extend({
|
|
1367
1365
|
themeId: e.string()
|
|
1368
|
-
}),
|
|
1366
|
+
}), Dt = e.object({
|
|
1369
1367
|
universal_login_experience: e.enum(["new", "classic"]).default("new"),
|
|
1370
1368
|
identifier_first: e.boolean().default(!0),
|
|
1371
1369
|
password_first: e.boolean().default(!1),
|
|
1372
1370
|
webauthn_platform_first_factor: e.boolean()
|
|
1373
|
-
}),
|
|
1371
|
+
}), wt = e.object({
|
|
1374
1372
|
name: e.string(),
|
|
1375
1373
|
enabled: e.boolean().optional().default(!0),
|
|
1376
1374
|
default_from_address: e.string().optional(),
|
|
@@ -1413,7 +1411,7 @@ const Ue = e.object({
|
|
|
1413
1411
|
idle_expires_at: e.string().optional(),
|
|
1414
1412
|
// When the token was last used.
|
|
1415
1413
|
last_exchanged_at: e.string().optional(),
|
|
1416
|
-
device:
|
|
1414
|
+
device: R,
|
|
1417
1415
|
resource_servers: e.array(
|
|
1418
1416
|
e.object({
|
|
1419
1417
|
audience: e.string(),
|
|
@@ -1421,15 +1419,15 @@ const Ue = e.object({
|
|
|
1421
1419
|
})
|
|
1422
1420
|
),
|
|
1423
1421
|
rotating: e.boolean()
|
|
1424
|
-
}),
|
|
1422
|
+
}), jt = e.object({
|
|
1425
1423
|
// When the refresh token record was created.
|
|
1426
1424
|
created_at: e.string(),
|
|
1427
1425
|
// Spread in the rest of the refresh token properties.
|
|
1428
1426
|
...He.shape
|
|
1429
|
-
}),
|
|
1427
|
+
}), kt = e.object({
|
|
1430
1428
|
to: e.string(),
|
|
1431
1429
|
message: e.string()
|
|
1432
|
-
}),
|
|
1430
|
+
}), Ut = e.object({
|
|
1433
1431
|
name: e.string(),
|
|
1434
1432
|
options: e.object({})
|
|
1435
1433
|
}), Ge = e.object({
|
|
@@ -1462,14 +1460,14 @@ const Ue = e.object({
|
|
|
1462
1460
|
...Be.shape,
|
|
1463
1461
|
created_at: e.string().optional(),
|
|
1464
1462
|
updated_at: e.string().optional()
|
|
1465
|
-
}),
|
|
1463
|
+
}), Ft = e.array(ze), We = e.object({
|
|
1466
1464
|
role_id: e.string(),
|
|
1467
1465
|
resource_server_identifier: e.string(),
|
|
1468
1466
|
permission_name: e.string()
|
|
1469
1467
|
}), Xe = e.object({
|
|
1470
1468
|
...We.shape,
|
|
1471
1469
|
created_at: e.string()
|
|
1472
|
-
}),
|
|
1470
|
+
}), vt = e.array(Xe), Ve = e.object({
|
|
1473
1471
|
user_id: e.string(),
|
|
1474
1472
|
resource_server_identifier: e.string(),
|
|
1475
1473
|
permission_name: e.string(),
|
|
@@ -1478,7 +1476,7 @@ const Ue = e.object({
|
|
|
1478
1476
|
...Ve.shape,
|
|
1479
1477
|
tenant_id: e.string(),
|
|
1480
1478
|
created_at: e.string().optional()
|
|
1481
|
-
}),
|
|
1479
|
+
}), Pt = e.array(qe), Ye = e.object({
|
|
1482
1480
|
user_id: e.string(),
|
|
1483
1481
|
resource_server_identifier: e.string(),
|
|
1484
1482
|
resource_server_name: e.string(),
|
|
@@ -1486,7 +1484,7 @@ const Ue = e.object({
|
|
|
1486
1484
|
description: e.string().nullable().optional(),
|
|
1487
1485
|
created_at: e.string().optional(),
|
|
1488
1486
|
organization_id: e.string().optional()
|
|
1489
|
-
}),
|
|
1487
|
+
}), xt = e.array(
|
|
1490
1488
|
Ye
|
|
1491
1489
|
), Qe = e.object({
|
|
1492
1490
|
user_id: e.string(),
|
|
@@ -1496,7 +1494,7 @@ const Ue = e.object({
|
|
|
1496
1494
|
...Qe.shape,
|
|
1497
1495
|
tenant_id: e.string(),
|
|
1498
1496
|
created_at: e.string().optional()
|
|
1499
|
-
}),
|
|
1497
|
+
}), Mt = e.array(Je), Ze = e.object({
|
|
1500
1498
|
name: e.string().min(1).max(50).openapi({
|
|
1501
1499
|
description: "The name of the role. Cannot include '<' or '>'"
|
|
1502
1500
|
}),
|
|
@@ -1510,7 +1508,7 @@ const Ue = e.object({
|
|
|
1510
1508
|
...Ze.shape,
|
|
1511
1509
|
created_at: e.string().optional(),
|
|
1512
1510
|
updated_at: e.string().optional()
|
|
1513
|
-
}),
|
|
1511
|
+
}), Ht = e.array($e), et = e.object({
|
|
1514
1512
|
logo_url: e.string().optional().openapi({
|
|
1515
1513
|
description: "URL of the organization's logo"
|
|
1516
1514
|
}),
|
|
@@ -1563,9 +1561,9 @@ const Ue = e.object({
|
|
|
1563
1561
|
description: "List of enabled connections for the organization"
|
|
1564
1562
|
}),
|
|
1565
1563
|
token_quota: ot
|
|
1566
|
-
}),
|
|
1564
|
+
}), Gt = e.object({
|
|
1567
1565
|
...nt.shape,
|
|
1568
|
-
...
|
|
1566
|
+
...s.shape,
|
|
1569
1567
|
id: e.string()
|
|
1570
1568
|
}), it = e.object({
|
|
1571
1569
|
user_id: e.string().openapi({
|
|
@@ -1574,11 +1572,11 @@ const Ue = e.object({
|
|
|
1574
1572
|
organization_id: e.string().openapi({
|
|
1575
1573
|
description: "ID of the organization"
|
|
1576
1574
|
})
|
|
1577
|
-
}),
|
|
1575
|
+
}), Kt = e.object({
|
|
1578
1576
|
...it.shape,
|
|
1579
|
-
...
|
|
1577
|
+
...s.shape,
|
|
1580
1578
|
id: e.string()
|
|
1581
|
-
}),
|
|
1579
|
+
}), Bt = e.object({
|
|
1582
1580
|
// Session settings
|
|
1583
1581
|
idle_session_lifetime: e.number().optional(),
|
|
1584
1582
|
session_lifetime: e.number().optional(),
|
|
@@ -1647,35 +1645,63 @@ const Ue = e.object({
|
|
|
1647
1645
|
sessions: e.object({
|
|
1648
1646
|
oidc_logout_prompt_enabled: e.boolean().optional()
|
|
1649
1647
|
}).optional()
|
|
1648
|
+
}), zt = e.object({
|
|
1649
|
+
date: e.string().openapi({
|
|
1650
|
+
description: "Date these events occurred in ISO 8601 format",
|
|
1651
|
+
example: "2025-12-19"
|
|
1652
|
+
}),
|
|
1653
|
+
logins: e.number().openapi({
|
|
1654
|
+
description: "Number of logins on this date",
|
|
1655
|
+
example: 150
|
|
1656
|
+
}),
|
|
1657
|
+
signups: e.number().openapi({
|
|
1658
|
+
description: "Number of signups on this date",
|
|
1659
|
+
example: 25
|
|
1660
|
+
}),
|
|
1661
|
+
leaked_passwords: e.number().openapi({
|
|
1662
|
+
description: "Number of breached-password detections on this date (subscription required)",
|
|
1663
|
+
example: 0
|
|
1664
|
+
}),
|
|
1665
|
+
updated_at: e.string().openapi({
|
|
1666
|
+
description: "Date and time this stats entry was last updated in ISO 8601 format",
|
|
1667
|
+
example: "2025-12-19T10:30:00.000Z"
|
|
1668
|
+
}),
|
|
1669
|
+
created_at: e.string().openapi({
|
|
1670
|
+
description: "Approximate date and time the first event occurred in ISO 8601 format",
|
|
1671
|
+
example: "2025-12-19T00:00:00.000Z"
|
|
1672
|
+
})
|
|
1673
|
+
}), Wt = e.number().openapi({
|
|
1674
|
+
description: "Number of active users in the last 30 days",
|
|
1675
|
+
example: 1234
|
|
1650
1676
|
});
|
|
1651
|
-
function
|
|
1677
|
+
function Xt(t) {
|
|
1652
1678
|
const [n, i] = t.split("|");
|
|
1653
1679
|
if (!n || !i)
|
|
1654
1680
|
throw new Error(`Invalid user_id: ${t}`);
|
|
1655
1681
|
return { connection: n, id: i };
|
|
1656
1682
|
}
|
|
1657
|
-
function
|
|
1683
|
+
function Vt(t) {
|
|
1658
1684
|
const {
|
|
1659
1685
|
primary: n,
|
|
1660
1686
|
secondaries: i,
|
|
1661
|
-
syncMethods:
|
|
1687
|
+
syncMethods: L = ["create", "update", "remove", "delete", "set"]
|
|
1662
1688
|
} = t, D = {
|
|
1663
1689
|
get(_, o) {
|
|
1664
1690
|
if (typeof o == "symbol")
|
|
1665
1691
|
return _[o];
|
|
1666
1692
|
const p = _[o];
|
|
1667
|
-
return typeof p != "function" ? p :
|
|
1693
|
+
return typeof p != "function" ? p : L.includes(o) ? async (...u) => {
|
|
1668
1694
|
const w = await p.apply(_, u), m = [];
|
|
1669
|
-
for (const
|
|
1670
|
-
const h =
|
|
1695
|
+
for (const r of i) {
|
|
1696
|
+
const h = r.adapter[o];
|
|
1671
1697
|
if (typeof h != "function")
|
|
1672
1698
|
continue;
|
|
1673
1699
|
const j = (async () => {
|
|
1674
1700
|
try {
|
|
1675
|
-
await h.apply(
|
|
1701
|
+
await h.apply(r.adapter, u);
|
|
1676
1702
|
} catch (b) {
|
|
1677
1703
|
try {
|
|
1678
|
-
|
|
1704
|
+
r.onError ? r.onError(b, o, u) : console.error(
|
|
1679
1705
|
`Passthrough adapter: secondary write failed for ${o}:`,
|
|
1680
1706
|
b
|
|
1681
1707
|
);
|
|
@@ -1687,7 +1713,7 @@ function zt(t) {
|
|
|
1687
1713
|
}
|
|
1688
1714
|
}
|
|
1689
1715
|
})();
|
|
1690
|
-
|
|
1716
|
+
r.blocking && m.push(j);
|
|
1691
1717
|
}
|
|
1692
1718
|
return m.length > 0 && await Promise.all(m), w;
|
|
1693
1719
|
} : p.bind(_);
|
|
@@ -1695,23 +1721,24 @@ function zt(t) {
|
|
|
1695
1721
|
};
|
|
1696
1722
|
return new Proxy(n, D);
|
|
1697
1723
|
}
|
|
1698
|
-
function
|
|
1724
|
+
function qt(t) {
|
|
1699
1725
|
return t;
|
|
1700
1726
|
}
|
|
1701
1727
|
export {
|
|
1702
|
-
|
|
1728
|
+
Re as Auth0Client,
|
|
1703
1729
|
C as AuthorizationResponseMode,
|
|
1704
1730
|
I as AuthorizationResponseType,
|
|
1705
1731
|
O as CodeChallengeMethod,
|
|
1706
1732
|
A as ComponentCategory,
|
|
1707
1733
|
S as ComponentType,
|
|
1708
1734
|
ke as GrantType,
|
|
1709
|
-
|
|
1735
|
+
Le as LocationInfo,
|
|
1710
1736
|
Te as LogTypes,
|
|
1711
1737
|
Q as NodeType,
|
|
1738
|
+
Wt as activeUsersResponseSchema,
|
|
1712
1739
|
pt as auth0FlowInsertSchema,
|
|
1713
1740
|
ne as auth0FlowSchema,
|
|
1714
|
-
|
|
1741
|
+
st as auth0QuerySchema,
|
|
1715
1742
|
lt as auth0UserResponseSchema,
|
|
1716
1743
|
ie as authParamsSchema,
|
|
1717
1744
|
E as baseUserSchema,
|
|
@@ -1724,97 +1751,99 @@ export {
|
|
|
1724
1751
|
H as clientInsertSchema,
|
|
1725
1752
|
G as clientSchema,
|
|
1726
1753
|
pe as codeInsertSchema,
|
|
1727
|
-
|
|
1754
|
+
ut as codeSchema,
|
|
1728
1755
|
_e as codeTypeSchema,
|
|
1729
1756
|
Fe as colorsSchema,
|
|
1730
1757
|
Y as componentSchema,
|
|
1731
|
-
|
|
1758
|
+
se as connectionInsertSchema,
|
|
1732
1759
|
ae as connectionOptionsSchema,
|
|
1733
|
-
|
|
1760
|
+
re as connectionSchema,
|
|
1734
1761
|
c as coordinatesSchema,
|
|
1735
|
-
|
|
1736
|
-
|
|
1762
|
+
Vt as createPassthroughAdapter,
|
|
1763
|
+
qt as createWriteOnlyAdapter,
|
|
1737
1764
|
de as customDomainInsertSchema,
|
|
1738
1765
|
ue as customDomainSchema,
|
|
1739
|
-
|
|
1740
|
-
|
|
1766
|
+
mt as customDomainWithTenantIdSchema,
|
|
1767
|
+
zt as dailyStatsSchema,
|
|
1768
|
+
wt as emailProviderSchema,
|
|
1741
1769
|
oe as endingSchema,
|
|
1742
1770
|
V as fieldComponentSchema,
|
|
1743
1771
|
Z as flowNodeSchema,
|
|
1744
1772
|
a as fontDetailsSchema,
|
|
1745
1773
|
ve as fontsSchema,
|
|
1746
|
-
|
|
1774
|
+
ht as formControlSchema,
|
|
1747
1775
|
he as formInsertSchema,
|
|
1748
1776
|
me as formNodeComponentDefinition,
|
|
1749
|
-
|
|
1777
|
+
bt as formSchema,
|
|
1750
1778
|
q as genericComponentSchema,
|
|
1751
1779
|
$ as genericNodeSchema,
|
|
1752
|
-
|
|
1753
|
-
|
|
1780
|
+
ft as hookInsertSchema,
|
|
1781
|
+
Et as hookSchema,
|
|
1754
1782
|
F as identitySchema,
|
|
1755
1783
|
Ce as inviteInsertSchema,
|
|
1756
|
-
|
|
1784
|
+
St as inviteSchema,
|
|
1757
1785
|
Ie as inviteeSchema,
|
|
1758
1786
|
Ae as inviterSchema,
|
|
1759
|
-
|
|
1787
|
+
At as jwksKeySchema,
|
|
1760
1788
|
Oe as jwksSchema,
|
|
1789
|
+
gt as legacyClientSchema,
|
|
1761
1790
|
X as legalComponentSchema,
|
|
1762
1791
|
De as logInsertSchema,
|
|
1763
|
-
|
|
1792
|
+
Ot as logSchema,
|
|
1764
1793
|
ye as loginSessionInsertSchema,
|
|
1765
|
-
|
|
1794
|
+
Ct as loginSessionSchema,
|
|
1766
1795
|
ee as nodeSchema,
|
|
1767
|
-
|
|
1796
|
+
It as openIDConfigurationSchema,
|
|
1768
1797
|
et as organizationBrandingSchema,
|
|
1769
1798
|
tt as organizationEnabledConnectionSchema,
|
|
1770
1799
|
nt as organizationInsertSchema,
|
|
1771
|
-
|
|
1800
|
+
Gt as organizationSchema,
|
|
1772
1801
|
ot as organizationTokenQuotaSchema,
|
|
1773
1802
|
Pe as pageBackgroundSchema,
|
|
1774
|
-
|
|
1803
|
+
Xt as parseUserId,
|
|
1775
1804
|
we as passwordInsertSchema,
|
|
1776
|
-
|
|
1805
|
+
yt as passwordSchema,
|
|
1777
1806
|
U as profileDataSchema,
|
|
1778
|
-
|
|
1807
|
+
Dt as promptSettingSchema,
|
|
1779
1808
|
He as refreshTokenInsertSchema,
|
|
1780
|
-
|
|
1809
|
+
jt as refreshTokenSchema,
|
|
1781
1810
|
Be as resourceServerInsertSchema,
|
|
1782
|
-
|
|
1811
|
+
Ft as resourceServerListSchema,
|
|
1783
1812
|
Ke as resourceServerOptionsSchema,
|
|
1784
1813
|
ze as resourceServerSchema,
|
|
1785
1814
|
Ge as resourceServerScopeSchema,
|
|
1786
1815
|
z as richTextComponentSchema,
|
|
1787
1816
|
Ze as roleInsertSchema,
|
|
1788
|
-
|
|
1817
|
+
Ht as roleListSchema,
|
|
1789
1818
|
We as rolePermissionInsertSchema,
|
|
1790
|
-
|
|
1819
|
+
vt as rolePermissionListSchema,
|
|
1791
1820
|
Xe as rolePermissionSchema,
|
|
1792
1821
|
$e as roleSchema,
|
|
1793
1822
|
je as sessionInsertSchema,
|
|
1794
|
-
|
|
1795
|
-
|
|
1796
|
-
|
|
1797
|
-
|
|
1823
|
+
Tt as sessionSchema,
|
|
1824
|
+
Nt as signingKeySchema,
|
|
1825
|
+
Ut as smsProviderSchema,
|
|
1826
|
+
kt as smsSendParamsSchema,
|
|
1798
1827
|
te as startSchema,
|
|
1799
1828
|
J as stepNodeSchema,
|
|
1800
1829
|
le as tenantInsertSchema,
|
|
1801
1830
|
ce as tenantSchema,
|
|
1802
|
-
|
|
1831
|
+
Bt as tenantSettingsSchema,
|
|
1803
1832
|
Me as themeInsertSchema,
|
|
1804
1833
|
Lt as themeSchema,
|
|
1805
|
-
|
|
1806
|
-
|
|
1834
|
+
Rt as tokenResponseSchema,
|
|
1835
|
+
rt as totalsSchema,
|
|
1807
1836
|
v as userInsertSchema,
|
|
1808
1837
|
it as userOrganizationInsertSchema,
|
|
1809
|
-
|
|
1838
|
+
Kt as userOrganizationSchema,
|
|
1810
1839
|
Ve as userPermissionInsertSchema,
|
|
1811
|
-
|
|
1840
|
+
Pt as userPermissionListSchema,
|
|
1812
1841
|
qe as userPermissionSchema,
|
|
1813
|
-
|
|
1842
|
+
xt as userPermissionWithDetailsListSchema,
|
|
1814
1843
|
Ye as userPermissionWithDetailsSchema,
|
|
1815
1844
|
ct as userResponseSchema,
|
|
1816
1845
|
Qe as userRoleInsertSchema,
|
|
1817
|
-
|
|
1846
|
+
Mt as userRoleListSchema,
|
|
1818
1847
|
Je as userRoleSchema,
|
|
1819
1848
|
P as userSchema,
|
|
1820
1849
|
ge as verificationMethodsSchema,
|