@authhero/adapter-interfaces 0.11.0 → 0.11.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2927,7 +2927,7 @@ var r = /* @__PURE__ */ Object.freeze({
2927
2927
  ZodError: T
2928
2928
  });
2929
2929
  ht(r);
2930
- const Gn = r.object({
2930
+ const Hn = r.object({
2931
2931
  start: r.number(),
2932
2932
  limit: r.number(),
2933
2933
  length: r.number()
@@ -2979,7 +2979,7 @@ const Gn = r.object({
2979
2979
  is_social: r.boolean(),
2980
2980
  login_count: r.number(),
2981
2981
  identities: r.array(yn).optional()
2982
- }), Hn = bn, qn = tt.extend({
2982
+ }), qn = bn, Fn = tt.extend({
2983
2983
  email: r.string(),
2984
2984
  login_count: r.number(),
2985
2985
  multifactor: r.array(r.string()).optional(),
@@ -2989,26 +2989,29 @@ const Gn = r.object({
2989
2989
  }).catchall(r.any()), kn = r.object({
2990
2990
  id: r.string(),
2991
2991
  name: r.string(),
2992
- callbacks: r.string().transform((t) => t === null ? "" : t).default("").openapi({
2992
+ callbacks: r.array(r.string()).openapi({
2993
2993
  description: "Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."
2994
2994
  }),
2995
- allowed_origins: r.string().transform((t) => t === null ? "" : t).default("").openapi({
2995
+ allowed_origins: r.array(r.string()).openapi({
2996
2996
  description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."
2997
2997
  }),
2998
- web_origins: r.string().transform((t) => t === null ? "" : t).default("").openapi({
2998
+ web_origins: r.array(r.string()).openapi({
2999
2999
  description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
3000
3000
  }),
3001
+ allowed_logout_urls: r.array(r.string()).openapi({
3002
+ description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
3003
+ }),
3001
3004
  addons: r.record(r.string(), r.record(r.string(), r.union([r.string(), r.number()]))).optional().openapi({
3002
3005
  description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
3003
3006
  }),
3004
- // @deprecated. Renamed to match the auth0 API
3005
- allowed_web_origins: r.string().transform((t) => t === null ? "" : t).default(""),
3006
- allowed_callback_urls: r.string().transform((t) => t === null ? "" : t).default(""),
3007
- allowed_logout_urls: r.string().transform((t) => t === null ? "" : t).default(""),
3008
- email_validation: r.enum(["enabled", "disabled", "enforced"]).default("enforced"),
3007
+ email_validation: r.enum(["enabled", "disabled", "enforced"]).default("enforced").openapi({
3008
+ description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
3009
+ }),
3009
3010
  client_secret: r.string().default(""),
3010
- disable_sign_ups: r.boolean().default(!1)
3011
- }), Fn = r.object({
3011
+ disable_sign_ups: r.boolean().default(!1).openapi({
3012
+ description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
3013
+ })
3014
+ }), xn = r.object({
3012
3015
  created_at: r.string().transform((t) => t === null ? "" : t),
3013
3016
  updated_at: r.string().transform((t) => t === null ? "" : t)
3014
3017
  }).extend(kn.shape);
@@ -3041,7 +3044,7 @@ const we = r.object({
3041
3044
  font: r.object({
3042
3045
  url: r.string()
3043
3046
  }).optional()
3044
- }), xn = r.object({
3047
+ }), wn = r.object({
3045
3048
  id: r.string().optional(),
3046
3049
  name: r.string(),
3047
3050
  client_id: r.string().optional(),
@@ -3060,27 +3063,15 @@ const we = r.object({
3060
3063
  id: r.string(),
3061
3064
  created_at: r.string().transform((t) => t === null ? "" : t),
3062
3065
  updated_at: r.string().transform((t) => t === null ? "" : t)
3063
- }).extend(xn.shape), wn = r.object({
3066
+ }).extend(wn.shape), Sn = r.object({
3064
3067
  domain: r.string(),
3065
3068
  dkim_private_key: r.string().optional(),
3066
3069
  dkim_public_key: r.string().optional(),
3067
3070
  email_api_key: r.string().optional(),
3068
3071
  email_service: r.union([r.literal("mailgun"), r.literal("mailchannels")]).optional()
3069
3072
  }), it = r.object({
3070
- id: r.string(),
3071
- name: r.string(),
3072
- domains: r.array(wn),
3073
- allowed_callback_urls: r.array(r.string()),
3074
- allowed_logout_urls: r.array(r.string()),
3075
- allowed_web_origins: r.array(r.string()),
3076
- email_validation: r.union([
3077
- r.literal("enabled"),
3078
- r.literal("disabled"),
3079
- r.literal("enforced")
3080
- ]),
3081
- tenant_id: r.string(),
3082
- client_secret: r.string(),
3083
- disable_sign_ups: r.boolean(),
3073
+ ...xn.shape,
3074
+ domains: r.array(Sn),
3084
3075
  tenant: r.object({
3085
3076
  name: r.string(),
3086
3077
  audience: r.string().optional(),
@@ -3096,36 +3087,36 @@ const we = r.object({
3096
3087
  connections: r.array(at)
3097
3088
  }), Jn = it.extend({
3098
3089
  connections: r.array(at.partial())
3099
- }), Sn = r.enum([
3090
+ }), Tn = r.enum([
3100
3091
  "password_reset",
3101
3092
  "email_verification",
3102
3093
  "otp",
3103
3094
  "oauth2",
3104
3095
  "oauth2_state",
3105
3096
  "ticket"
3106
- ]), Tn = r.object({
3097
+ ]), En = r.object({
3107
3098
  code_id: r.string().openapi({
3108
3099
  description: "The code that will be used in for instance an email verification flow"
3109
3100
  }),
3110
3101
  login_id: r.string().openapi({
3111
3102
  description: "The id of the login session that the code is connected to"
3112
3103
  }),
3113
- code_type: Sn,
3104
+ code_type: Tn,
3114
3105
  expires_at: r.string(),
3115
3106
  used_at: r.string().optional()
3116
3107
  }), Qn = r.object({
3117
- ...Tn.shape,
3108
+ ...En.shape,
3118
3109
  created_at: r.string()
3119
- }), En = r.object({
3110
+ }), Cn = r.object({
3120
3111
  domain: r.string(),
3121
3112
  dkim_private_key: r.string().optional(),
3122
3113
  dkim_public_key: r.string().optional(),
3123
3114
  email_api_key: r.string().optional(),
3124
3115
  email_service: r.enum(["mailgun", "mailchannels"])
3125
3116
  }), Xn = De.extend({
3126
- ...En.shape,
3117
+ ...Cn.shape,
3127
3118
  id: r.string()
3128
- }), Cn = r.object({
3119
+ }), On = r.object({
3129
3120
  trigger_id: r.enum([
3130
3121
  "pre-user-signup",
3131
3122
  "post-user-registration",
@@ -3136,10 +3127,10 @@ const we = r.object({
3136
3127
  hook_id: r.string().optional(),
3137
3128
  synchronous: r.boolean().default(!1),
3138
3129
  priority: r.number().optional()
3139
- }), er = Cn.extend({
3130
+ }), er = On.extend({
3140
3131
  ...De.shape,
3141
3132
  hook_id: r.string()
3142
- }), On = r.object({
3133
+ }), jn = r.object({
3143
3134
  alg: r.string(),
3144
3135
  e: r.string(),
3145
3136
  kid: r.string(),
@@ -3147,7 +3138,7 @@ const we = r.object({
3147
3138
  n: r.string(),
3148
3139
  use: r.string().optional()
3149
3140
  }), tr = r.object({
3150
- keys: r.array(On)
3141
+ keys: r.array(jn)
3151
3142
  }), nr = r.object({
3152
3143
  issuer: r.string(),
3153
3144
  authorization_endpoint: r.string(),
@@ -3169,7 +3160,7 @@ const we = r.object({
3169
3160
  request_uri_parameter_supported: r.boolean(),
3170
3161
  request_parameter_supported: r.boolean(),
3171
3162
  token_endpoint_auth_signing_alg_values_supported: r.array(r.string())
3172
- }), jn = r.object({
3163
+ }), In = r.object({
3173
3164
  auth0Client: r.string().optional(),
3174
3165
  authParams: we,
3175
3166
  expires_at: r.string(),
@@ -3178,15 +3169,15 @@ const we = r.object({
3178
3169
  }).openapi({
3179
3170
  description: "This represents a login sesion"
3180
3171
  }), rr = r.object({
3181
- ...jn.shape,
3172
+ ...In.shape,
3182
3173
  login_id: r.string().openapi({
3183
3174
  description: "This is is used as the state in the universal login"
3184
3175
  }),
3185
3176
  created_at: r.string(),
3186
3177
  updated_at: r.string()
3187
3178
  });
3188
- var In = /* @__PURE__ */ ((t) => (t.FAILED_SILENT_AUTH = "fsa", t.FAILED_SIGNUP = "fs", t.FAILED_LOGIN = "f", t.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", t.FAILED_CHANGE_PASSWORD = "fcp", t.FAILED_BY_CONNECTOR = "fc", t.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", t.FAILED_HOOK = "fh", t.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", t.SUCCESS_API_OPERATION = "sapi", t.SUCCESS_CHANGE_PASSWORD = "scp", t.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", t.SUCCESS_CHANGE_USERNAME = "scu", t.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", t.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", t.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", t.SUCCESS_LOGIN = "s", t.SUCCESS_LOGOUT = "slo", t.SUCCESS_SIGNUP = "ss", t.SUCCESS_SILENT_AUTH = "ssa", t.SUCCESS_VERIFICATION_EMAIL = "sv", t.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", t.CODE_LINK_SENT = "cls", t))(In || {});
3189
- const Nn = r.enum([
3179
+ var Nn = /* @__PURE__ */ ((t) => (t.FAILED_SILENT_AUTH = "fsa", t.FAILED_SIGNUP = "fs", t.FAILED_LOGIN = "f", t.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", t.FAILED_CHANGE_PASSWORD = "fcp", t.FAILED_BY_CONNECTOR = "fc", t.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", t.FAILED_HOOK = "fh", t.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", t.SUCCESS_API_OPERATION = "sapi", t.SUCCESS_CHANGE_PASSWORD = "scp", t.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", t.SUCCESS_CHANGE_USERNAME = "scu", t.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", t.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", t.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", t.SUCCESS_LOGIN = "s", t.SUCCESS_LOGOUT = "slo", t.SUCCESS_SIGNUP = "ss", t.SUCCESS_SILENT_AUTH = "ssa", t.SUCCESS_VERIFICATION_EMAIL = "sv", t.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", t.CODE_LINK_SENT = "cls", t))(Nn || {});
3180
+ const Zn = r.enum([
3190
3181
  "cls",
3191
3182
  // CODE_LINK_SENT
3192
3183
  "fsa",
@@ -3235,14 +3226,14 @@ const Nn = r.enum([
3235
3226
  // SUCCESS_VERIFICATION_EMAIL
3236
3227
  "svr"
3237
3228
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
3238
- ]), Zn = r.object({
3229
+ ]), Rn = r.object({
3239
3230
  name: r.string(),
3240
3231
  version: r.string(),
3241
3232
  env: r.object({
3242
3233
  node: r.string().optional()
3243
3234
  }).optional()
3244
3235
  }), sr = r.object({
3245
- type: Nn,
3236
+ type: Zn,
3246
3237
  date: r.string(),
3247
3238
  description: r.string().optional(),
3248
3239
  log_id: r.string().optional(),
@@ -3263,16 +3254,16 @@ const Nn = r.enum([
3263
3254
  strategy: r.string().optional(),
3264
3255
  strategy_type: r.string().optional(),
3265
3256
  hostname: r.string().optional(),
3266
- auth0_client: Zn.optional()
3267
- }), Rn = r.object({
3257
+ auth0_client: Rn.optional()
3258
+ }), An = r.object({
3268
3259
  user_id: r.string(),
3269
3260
  password: r.string(),
3270
3261
  algorithm: r.enum(["bcrypt", "argon2id"]).default("argon2id")
3271
3262
  }), ar = r.object({
3272
- ...Rn.shape,
3263
+ ...An.shape,
3273
3264
  created_at: r.string(),
3274
3265
  updated_at: r.string()
3275
- }), An = r.object({
3266
+ }), Pn = r.object({
3276
3267
  session_id: r.string(),
3277
3268
  client_id: r.string(),
3278
3269
  expires_at: r.string(),
@@ -3281,7 +3272,7 @@ const Nn = r.enum([
3281
3272
  user_id: r.string()
3282
3273
  }), ir = r.object({
3283
3274
  created_at: r.string(),
3284
- ...An.shape
3275
+ ...Pn.shape
3285
3276
  }), or = r.object({
3286
3277
  private_key: r.string(),
3287
3278
  public_key: r.string(),
@@ -3307,7 +3298,7 @@ const Nn = r.enum([
3307
3298
  }),
3308
3299
  revoked: r.boolean().optional().openapi({ description: "True if the key is revoked" }),
3309
3300
  revoked_at: r.string().optional().openapi({ description: "The date and time when the key was revoked" })
3310
- }), Pn = r.object({
3301
+ }), Mn = r.object({
3311
3302
  name: r.string(),
3312
3303
  audience: r.string(),
3313
3304
  sender_email: r.string().email(),
@@ -3317,7 +3308,7 @@ const Nn = r.enum([
3317
3308
  primary_color: r.string().optional(),
3318
3309
  secondary_color: r.string().optional(),
3319
3310
  language: r.string().optional()
3320
- }), dr = Pn.extend({
3311
+ }), dr = Mn.extend({
3321
3312
  created_at: r.string().transform((t) => t === null ? "" : t),
3322
3313
  updated_at: r.string().transform((t) => t === null ? "" : t)
3323
3314
  }), lr = r.object({
@@ -3379,7 +3370,7 @@ r.object({
3379
3370
  code: r.string(),
3380
3371
  state: r.string().optional()
3381
3372
  });
3382
- const Mn = r.object({
3373
+ const Dn = r.object({
3383
3374
  button_border_radius: r.number(),
3384
3375
  button_border_weight: r.number(),
3385
3376
  buttons_style: r.enum(["pill"]),
@@ -3389,7 +3380,7 @@ const Mn = r.object({
3389
3380
  show_widget_shadow: r.boolean(),
3390
3381
  widget_border_weight: r.number(),
3391
3382
  widget_corner_radius: r.number()
3392
- }), Dn = r.object({
3383
+ }), Un = r.object({
3393
3384
  base_focus_color: r.string(),
3394
3385
  base_hover_color: r.string(),
3395
3386
  body_text: r.string(),
@@ -3412,7 +3403,7 @@ const Mn = r.object({
3412
3403
  }), W = r.object({
3413
3404
  bold: r.boolean(),
3414
3405
  size: r.number()
3415
- }), Un = r.object({
3406
+ }), $n = r.object({
3416
3407
  body_text: W,
3417
3408
  buttons_text: W,
3418
3409
  font_url: r.string(),
@@ -3422,35 +3413,35 @@ const Mn = r.object({
3422
3413
  reference_text_size: r.number(),
3423
3414
  subtitle: W,
3424
3415
  title: W
3425
- }), $n = r.object({
3416
+ }), Vn = r.object({
3426
3417
  background_color: r.string(),
3427
3418
  background_image_url: r.string(),
3428
3419
  page_layout: r.enum(["center"])
3429
- }), Vn = r.object({
3420
+ }), Ln = r.object({
3430
3421
  header_text_alignment: r.enum(["center"]),
3431
3422
  logo_height: r.number(),
3432
3423
  logo_position: r.enum(["center"]),
3433
3424
  logo_url: r.string(),
3434
3425
  social_buttons_layout: r.enum(["bottom"])
3435
- }), Ln = r.object({
3436
- borders: Mn,
3437
- colors: Dn,
3426
+ }), zn = r.object({
3427
+ borders: Dn,
3428
+ colors: Un,
3438
3429
  displayName: r.string(),
3439
- fonts: Un,
3440
- page_background: $n,
3441
- widget: Vn
3442
- }), fr = Ln.extend({
3430
+ fonts: $n,
3431
+ page_background: Vn,
3432
+ widget: Ln
3433
+ }), fr = zn.extend({
3443
3434
  themeId: r.string()
3444
- }), zn = r.object({
3435
+ }), Bn = r.object({
3445
3436
  id: r.string(),
3446
3437
  expires_at: r.string(),
3447
3438
  auth0Client: r.string().optional(),
3448
3439
  authParams: we
3449
3440
  }), mr = r.object({
3450
- ...zn.shape,
3441
+ ...Bn.shape,
3451
3442
  created_at: r.string(),
3452
3443
  updated_at: r.string()
3453
- }), Bn = r.object({
3444
+ }), Wn = r.object({
3454
3445
  id: r.string(),
3455
3446
  email: r.string(),
3456
3447
  code: r.string(),
@@ -3462,8 +3453,8 @@ const Mn = r.object({
3462
3453
  user_id: r.string().optional()
3463
3454
  }), _r = r.object({
3464
3455
  created_at: r.string(),
3465
- ...Bn.shape
3466
- }), Wn = r.object({
3456
+ ...Wn.shape
3457
+ }), Gn = r.object({
3467
3458
  authParams: we,
3468
3459
  code: r.string(),
3469
3460
  user_id: r.string(),
@@ -3471,7 +3462,7 @@ const Mn = r.object({
3471
3462
  expires_at: r.string(),
3472
3463
  used_at: r.string().optional()
3473
3464
  }), gr = r.object({
3474
- ...Wn.shape,
3465
+ ...Gn.shape,
3475
3466
  created_at: r.string()
3476
3467
  });
3477
3468
  function yr(t) {
@@ -3481,66 +3472,66 @@ function yr(t) {
3481
3472
  return { connection: e, id: n };
3482
3473
  }
3483
3474
  export {
3484
- Zn as Auth0Client,
3475
+ Rn as Auth0Client,
3485
3476
  rt as AuthorizationResponseMode,
3486
3477
  nt as AuthorizationResponseType,
3487
3478
  Kn as ClientSchema,
3488
3479
  st as CodeChallengeMethod,
3489
3480
  ot as GrantType,
3490
- In as LogTypes,
3481
+ Nn as LogTypes,
3491
3482
  Jn as PartialClientSchema,
3492
3483
  kn as applicationInsertSchema,
3493
- Fn as applicationSchema,
3494
- Hn as auth0UserResponseSchema,
3484
+ xn as applicationSchema,
3485
+ qn as auth0UserResponseSchema,
3495
3486
  we as authParamsSchema,
3496
- Wn as authenticationCodeInsertSchema,
3487
+ Gn as authenticationCodeInsertSchema,
3497
3488
  gr as authenticationCodeSchema,
3498
3489
  ur as authorizationCodeGrantTypeParamsSchema,
3499
3490
  tt as baseUserSchema,
3500
- Mn as bordersSchema,
3491
+ Dn as bordersSchema,
3501
3492
  Yn as brandingSchema,
3502
3493
  or as certificateSchema,
3503
3494
  hr as clientCredentialGrantTypeParamsSchema,
3504
- Tn as codeInsertSchema,
3495
+ En as codeInsertSchema,
3505
3496
  Qn as codeSchema,
3506
- Sn as codeTypeSchema,
3507
- Dn as colorsSchema,
3508
- xn as connectionInsertSchema,
3497
+ Tn as codeTypeSchema,
3498
+ Un as colorsSchema,
3499
+ wn as connectionInsertSchema,
3509
3500
  at as connectionSchema,
3510
- En as domainInsertSchema,
3501
+ Cn as domainInsertSchema,
3511
3502
  Xn as domainSchema,
3512
3503
  W as fontDetailsSchema,
3513
- Un as fontsSchema,
3514
- Cn as hookInsertSchema,
3504
+ $n as fontsSchema,
3505
+ On as hookInsertSchema,
3515
3506
  er as hookSchema,
3516
3507
  yn as identitySchema,
3517
3508
  tr as jwksKeySchema,
3518
- On as jwksSchema,
3509
+ jn as jwksSchema,
3519
3510
  sr as logSchema,
3520
- jn as loginInsertSchema,
3511
+ In as loginInsertSchema,
3521
3512
  rr as loginSchema,
3522
3513
  nr as openIDConfigurationSchema,
3523
- Bn as otpInsertSchema,
3514
+ Wn as otpInsertSchema,
3524
3515
  _r as otpSchema,
3525
- $n as pageBackgroundSchema,
3516
+ Vn as pageBackgroundSchema,
3526
3517
  yr as parseUserId,
3527
- Rn as passwordInsertSchema,
3518
+ An as passwordInsertSchema,
3528
3519
  ar as passwordSchema,
3529
3520
  pr as pkceAuthorizationCodeGrantTypeParamsSchema,
3530
3521
  gn as profileDataSchema,
3531
- An as sessionInsertSchema,
3522
+ Pn as sessionInsertSchema,
3532
3523
  ir as sessionSchema,
3533
3524
  cr as signingKeySchema,
3534
- Pn as tenantInsertSchema,
3525
+ Mn as tenantInsertSchema,
3535
3526
  dr as tenantSchema,
3536
- Ln as themeInsertSchema,
3527
+ zn as themeInsertSchema,
3537
3528
  fr as themeSchema,
3538
- Gn as totalsSchema,
3539
- zn as universalLoginSessionInsertSchema,
3529
+ Hn as totalsSchema,
3530
+ Bn as universalLoginSessionInsertSchema,
3540
3531
  mr as universalLoginSessionSchema,
3541
3532
  vn as userInsertSchema,
3542
- qn as userResponseSchema,
3533
+ Fn as userResponseSchema,
3543
3534
  bn as userSchema,
3544
3535
  lr as vendorSettingsSchema,
3545
- Vn as widgetSchema
3536
+ Ln as widgetSchema
3546
3537
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.11.0",
14
+ "version": "0.11.2",
15
15
  "files": [
16
16
  "dist"
17
17
  ],