@authhero/adapter-interfaces 0.37.0 → 0.38.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),H=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),K=g,G=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),L=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),W=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(W),tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),E=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Q=t.z.object({...E.shape,created_at:t.z.string()}),I=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),V=a.extend({...I.shape,id:t.z.string()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),Y=C.extend({...a.shape,hook_id:t.z.string()}),w=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),X=t.z.object({keys:t.z.array(w)}),J=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),Z=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const $=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),tt=t.z.object({type:$,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),et=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({session_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string(),used_at:t.z.string(),deleted_at:t.z.string().optional(),user_id:t.z.string()}),nt=t.z.object({created_at:t.z.string(),...U.shape}),it=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),D=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),T=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:D,displayName:t.z.string(),fonts:T,page_background:P,widget:x}),ot=F.extend({themeId:t.z.string()}),at=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),st=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()});function rt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=K;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=L;exports.codeInsertSchema=E;exports.codeSchema=Q;exports.codeTypeSchema=k;exports.colorsSchema=D;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=I;exports.domainSchema=V;exports.emailProviderSchema=st;exports.fontDetailsSchema=n;exports.fontsSchema=T;exports.hookInsertSchema=C;exports.hookSchema=Y;exports.identitySchema=z;exports.jwksKeySchema=X;exports.jwksSchema=w;exports.logSchema=tt;exports.loginInsertSchema=j;exports.loginSchema=Z;exports.openIDConfigurationSchema=J;exports.pageBackgroundSchema=P;exports.parseUserId=rt;exports.passwordInsertSchema=O;exports.passwordSchema=et;exports.profileDataSchema=p;exports.promptSettingSchema=at;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=nt;exports.signingKeySchema=it;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=F;exports.themeSchema=ot;exports.totalsSchema=H;exports.userInsertSchema=d;exports.userResponseSchema=G;exports.userSchema=g;exports.vendorSettingsSchema=q;exports.widgetSchema=x;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let L=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>L()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),E=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...E.shape,id:t.z.string()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=C.extend({...a.shape,hook_id:t.z.string()}),w=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(w)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({session_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string(),used_at:t.z.string(),deleted_at:t.z.string().optional(),user_id:t.z.string()}),it=t.z.object({created_at:t.z.string(),...U.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),at=F.extend({themeId:t.z.string()}),st=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),rt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({refresh_token:t.z.string(),session_id:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),lt=t.z.object({created_at:t.z.string(),...H.shape});function ct(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=E;exports.domainSchema=Y;exports.emailProviderSchema=rt;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=C;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=w;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=ct;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=st;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=lt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=at;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
|
|
@@ -2222,6 +2222,16 @@ export declare const openIDConfigurationSchema: z.ZodObject<{
|
|
|
2222
2222
|
request_parameter_supported: boolean;
|
|
2223
2223
|
token_endpoint_auth_signing_alg_values_supported: string[];
|
|
2224
2224
|
}>;
|
|
2225
|
+
export interface ListParams {
|
|
2226
|
+
page: number;
|
|
2227
|
+
per_page: number;
|
|
2228
|
+
include_totals: boolean;
|
|
2229
|
+
q?: string;
|
|
2230
|
+
sort?: {
|
|
2231
|
+
sort_by: string;
|
|
2232
|
+
sort_order: "asc" | "desc";
|
|
2233
|
+
};
|
|
2234
|
+
}
|
|
2225
2235
|
export declare const loginInsertSchema: z.ZodObject<{
|
|
2226
2236
|
auth0Client: z.ZodOptional<z.ZodString>;
|
|
2227
2237
|
authParams: z.ZodObject<{
|
|
@@ -4207,20 +4217,53 @@ export declare const emailProviderSchema: z.ZodObject<{
|
|
|
4207
4217
|
settings?: {} | undefined;
|
|
4208
4218
|
}>;
|
|
4209
4219
|
export type EmailProvider = z.infer<typeof emailProviderSchema>;
|
|
4220
|
+
export declare const refreshTokenInsertSchema: z.ZodObject<{
|
|
4221
|
+
refresh_token: z.ZodString;
|
|
4222
|
+
session_id: z.ZodString;
|
|
4223
|
+
expires_at: z.ZodString;
|
|
4224
|
+
used_at: z.ZodOptional<z.ZodString>;
|
|
4225
|
+
revoked_at: z.ZodOptional<z.ZodString>;
|
|
4226
|
+
}, "strip", z.ZodTypeAny, {
|
|
4227
|
+
refresh_token: string;
|
|
4228
|
+
expires_at: string;
|
|
4229
|
+
session_id: string;
|
|
4230
|
+
used_at?: string | undefined;
|
|
4231
|
+
revoked_at?: string | undefined;
|
|
4232
|
+
}, {
|
|
4233
|
+
refresh_token: string;
|
|
4234
|
+
expires_at: string;
|
|
4235
|
+
session_id: string;
|
|
4236
|
+
used_at?: string | undefined;
|
|
4237
|
+
revoked_at?: string | undefined;
|
|
4238
|
+
}>;
|
|
4239
|
+
export type RefreshTokenInsert = z.infer<typeof refreshTokenInsertSchema>;
|
|
4240
|
+
export declare const refreshTokenSchema: z.ZodObject<{
|
|
4241
|
+
refresh_token: z.ZodString;
|
|
4242
|
+
session_id: z.ZodString;
|
|
4243
|
+
expires_at: z.ZodString;
|
|
4244
|
+
used_at: z.ZodOptional<z.ZodString>;
|
|
4245
|
+
revoked_at: z.ZodOptional<z.ZodString>;
|
|
4246
|
+
created_at: z.ZodString;
|
|
4247
|
+
}, "strip", z.ZodTypeAny, {
|
|
4248
|
+
created_at: string;
|
|
4249
|
+
refresh_token: string;
|
|
4250
|
+
expires_at: string;
|
|
4251
|
+
session_id: string;
|
|
4252
|
+
used_at?: string | undefined;
|
|
4253
|
+
revoked_at?: string | undefined;
|
|
4254
|
+
}, {
|
|
4255
|
+
created_at: string;
|
|
4256
|
+
refresh_token: string;
|
|
4257
|
+
expires_at: string;
|
|
4258
|
+
session_id: string;
|
|
4259
|
+
used_at?: string | undefined;
|
|
4260
|
+
revoked_at?: string | undefined;
|
|
4261
|
+
}>;
|
|
4262
|
+
export type RefreshToken = z.infer<typeof refreshTokenSchema>;
|
|
4210
4263
|
export declare function parseUserId(user_id: string): {
|
|
4211
4264
|
connection: string;
|
|
4212
4265
|
id: string;
|
|
4213
4266
|
};
|
|
4214
|
-
export interface ListParams {
|
|
4215
|
-
page: number;
|
|
4216
|
-
per_page: number;
|
|
4217
|
-
include_totals: boolean;
|
|
4218
|
-
q?: string;
|
|
4219
|
-
sort?: {
|
|
4220
|
-
sort_by: string;
|
|
4221
|
-
sort_order: "asc" | "desc";
|
|
4222
|
-
};
|
|
4223
|
-
}
|
|
4224
4267
|
export interface ListCodesResponse extends Totals {
|
|
4225
4268
|
codes: Code[];
|
|
4226
4269
|
}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { z as t } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const q = t.object({
|
|
3
3
|
start: t.number(),
|
|
4
4
|
limit: t.number(),
|
|
5
5
|
length: t.number()
|
|
@@ -15,7 +15,7 @@ const W = t.object({
|
|
|
15
15
|
phone_number: t.string().optional(),
|
|
16
16
|
phone_verified: t.boolean().optional(),
|
|
17
17
|
family_name: t.string().optional()
|
|
18
|
-
}).catchall(t.any()),
|
|
18
|
+
}).catchall(t.any()), g = t.object({
|
|
19
19
|
connection: t.string(),
|
|
20
20
|
user_id: t.string(),
|
|
21
21
|
provider: t.string(),
|
|
@@ -38,7 +38,7 @@ const W = t.object({
|
|
|
38
38
|
user_id: t.string().optional(),
|
|
39
39
|
app_metadata: t.any().default({}).optional(),
|
|
40
40
|
user_metadata: t.any().default({}).optional()
|
|
41
|
-
}),
|
|
41
|
+
}), d = s.extend({
|
|
42
42
|
email_verified: t.boolean().default(!1),
|
|
43
43
|
verify_email: t.boolean().optional(),
|
|
44
44
|
last_ip: t.string().optional(),
|
|
@@ -48,15 +48,15 @@ const W = t.object({
|
|
|
48
48
|
connection: t.string().default("email"),
|
|
49
49
|
is_social: t.boolean().optional()
|
|
50
50
|
}), _ = t.object({
|
|
51
|
-
...
|
|
51
|
+
...d.shape,
|
|
52
52
|
...a.shape,
|
|
53
53
|
user_id: t.string(),
|
|
54
54
|
is_social: t.boolean(),
|
|
55
55
|
// TODO: this not might be correct if you use the username
|
|
56
56
|
email: t.string(),
|
|
57
57
|
login_count: t.number(),
|
|
58
|
-
identities: t.array(
|
|
59
|
-
}),
|
|
58
|
+
identities: t.array(g).optional()
|
|
59
|
+
}), Q = _, V = s.extend({
|
|
60
60
|
email: t.string(),
|
|
61
61
|
login_count: t.number(),
|
|
62
62
|
multifactor: t.array(t.string()).optional(),
|
|
@@ -139,7 +139,7 @@ const S = t.object({
|
|
|
139
139
|
code_challenge: t.string().optional(),
|
|
140
140
|
username: t.string().optional(),
|
|
141
141
|
ui_locales: t.string().optional()
|
|
142
|
-
}),
|
|
142
|
+
}), Y = t.object({
|
|
143
143
|
colors: t.object({
|
|
144
144
|
primary: t.string(),
|
|
145
145
|
page_background: t.object({
|
|
@@ -195,7 +195,7 @@ const S = t.object({
|
|
|
195
195
|
updated_at: t.string().transform((n) => n === null ? "" : n),
|
|
196
196
|
id: t.string(),
|
|
197
197
|
...E.shape
|
|
198
|
-
}),
|
|
198
|
+
}), X = t.object({
|
|
199
199
|
logoUrl: t.string(),
|
|
200
200
|
loginBackgroundImage: t.string().nullish(),
|
|
201
201
|
style: t.object({
|
|
@@ -249,7 +249,7 @@ const I = t.enum([
|
|
|
249
249
|
expires_at: t.string(),
|
|
250
250
|
used_at: t.string().optional(),
|
|
251
251
|
user_id: t.string().optional()
|
|
252
|
-
}),
|
|
252
|
+
}), z = t.object({
|
|
253
253
|
...j.shape,
|
|
254
254
|
created_at: t.string()
|
|
255
255
|
}), v = t.object({
|
|
@@ -258,7 +258,7 @@ const I = t.enum([
|
|
|
258
258
|
dkim_public_key: t.string().optional(),
|
|
259
259
|
email_api_key: t.string().optional(),
|
|
260
260
|
email_service: t.string().optional()
|
|
261
|
-
}),
|
|
261
|
+
}), J = a.extend({
|
|
262
262
|
...v.shape,
|
|
263
263
|
id: t.string()
|
|
264
264
|
}), A = t.object({
|
|
@@ -272,7 +272,7 @@ const I = t.enum([
|
|
|
272
272
|
hook_id: t.string().optional(),
|
|
273
273
|
synchronous: t.boolean().default(!1),
|
|
274
274
|
priority: t.number().optional()
|
|
275
|
-
}),
|
|
275
|
+
}), Z = A.extend({
|
|
276
276
|
...a.shape,
|
|
277
277
|
hook_id: t.string()
|
|
278
278
|
}), O = t.object({
|
|
@@ -294,9 +294,9 @@ const I = t.enum([
|
|
|
294
294
|
x5t: t.string().optional(),
|
|
295
295
|
x5c: t.array(t.string()).optional(),
|
|
296
296
|
use: t.enum(["sig", "enc"]).optional()
|
|
297
|
-
}), Z = t.object({
|
|
298
|
-
keys: t.array(O)
|
|
299
297
|
}), $ = t.object({
|
|
298
|
+
keys: t.array(O)
|
|
299
|
+
}), tt = t.object({
|
|
300
300
|
issuer: t.string(),
|
|
301
301
|
authorization_endpoint: t.string(),
|
|
302
302
|
token_endpoint: t.string(),
|
|
@@ -326,7 +326,7 @@ const I = t.enum([
|
|
|
326
326
|
useragent: t.string().optional()
|
|
327
327
|
}).openapi({
|
|
328
328
|
description: "This represents a login sesion"
|
|
329
|
-
}),
|
|
329
|
+
}), nt = t.object({
|
|
330
330
|
...N.shape,
|
|
331
331
|
login_id: t.string().openapi({
|
|
332
332
|
description: "This is is used as the state in the universal login"
|
|
@@ -390,7 +390,7 @@ const R = t.enum([
|
|
|
390
390
|
env: t.object({
|
|
391
391
|
node: t.string().optional()
|
|
392
392
|
}).optional()
|
|
393
|
-
}),
|
|
393
|
+
}), et = t.object({
|
|
394
394
|
type: R,
|
|
395
395
|
date: t.string(),
|
|
396
396
|
description: t.string().optional(),
|
|
@@ -417,7 +417,7 @@ const R = t.enum([
|
|
|
417
417
|
user_id: t.string(),
|
|
418
418
|
password: t.string(),
|
|
419
419
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
420
|
-
}),
|
|
420
|
+
}), it = t.object({
|
|
421
421
|
...T.shape,
|
|
422
422
|
created_at: t.string(),
|
|
423
423
|
updated_at: t.string()
|
|
@@ -428,10 +428,10 @@ const R = t.enum([
|
|
|
428
428
|
used_at: t.string(),
|
|
429
429
|
deleted_at: t.string().optional(),
|
|
430
430
|
user_id: t.string()
|
|
431
|
-
}),
|
|
431
|
+
}), ot = t.object({
|
|
432
432
|
created_at: t.string(),
|
|
433
433
|
...x.shape
|
|
434
|
-
}),
|
|
434
|
+
}), at = t.object({
|
|
435
435
|
kid: t.string().openapi({ description: "The key id of the signing key" }),
|
|
436
436
|
cert: t.string().openapi({ description: "The public certificate of the signing key" }),
|
|
437
437
|
fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -525,14 +525,14 @@ const F = t.object({
|
|
|
525
525
|
fonts: K,
|
|
526
526
|
page_background: G,
|
|
527
527
|
widget: B
|
|
528
|
-
}),
|
|
528
|
+
}), st = L.extend({
|
|
529
529
|
themeId: t.string()
|
|
530
|
-
}),
|
|
530
|
+
}), rt = t.object({
|
|
531
531
|
universal_login_experience: t.enum(["new", "classic"]).default("new"),
|
|
532
532
|
identifier_first: t.boolean().default(!0),
|
|
533
533
|
password_first: t.boolean().default(!1),
|
|
534
534
|
webauthn_platform_first_factor: t.boolean()
|
|
535
|
-
}),
|
|
535
|
+
}), lt = t.object({
|
|
536
536
|
name: t.string(),
|
|
537
537
|
enabled: t.boolean().optional().default(!0),
|
|
538
538
|
default_from_address: t.string().optional(),
|
|
@@ -562,8 +562,24 @@ const F = t.object({
|
|
|
562
562
|
})
|
|
563
563
|
]),
|
|
564
564
|
settings: t.object({}).optional()
|
|
565
|
+
}), M = t.object({
|
|
566
|
+
// The actual refresh token value (primary key).
|
|
567
|
+
refresh_token: t.string(),
|
|
568
|
+
// Link to the session record (foreign key).
|
|
569
|
+
session_id: t.string(),
|
|
570
|
+
// When the refresh token expires.
|
|
571
|
+
expires_at: t.string(),
|
|
572
|
+
// When the token was last used.
|
|
573
|
+
used_at: t.string().optional(),
|
|
574
|
+
// If the token is revoked or deleted.
|
|
575
|
+
revoked_at: t.string().optional()
|
|
576
|
+
}), ct = t.object({
|
|
577
|
+
// When the refresh token record was created.
|
|
578
|
+
created_at: t.string(),
|
|
579
|
+
// Spread in the rest of the refresh token properties.
|
|
580
|
+
...M.shape
|
|
565
581
|
});
|
|
566
|
-
function
|
|
582
|
+
function pt(n) {
|
|
567
583
|
const [i, o] = n.split("|");
|
|
568
584
|
if (!i || !o)
|
|
569
585
|
throw new Error(`Invalid user_id: ${n}`);
|
|
@@ -578,49 +594,51 @@ export {
|
|
|
578
594
|
U as LogTypes,
|
|
579
595
|
b as applicationInsertSchema,
|
|
580
596
|
f as applicationSchema,
|
|
581
|
-
|
|
597
|
+
Q as auth0UserResponseSchema,
|
|
582
598
|
S as authParamsSchema,
|
|
583
599
|
s as baseUserSchema,
|
|
584
600
|
F as bordersSchema,
|
|
585
|
-
|
|
601
|
+
Y as brandingSchema,
|
|
586
602
|
j as codeInsertSchema,
|
|
587
|
-
|
|
603
|
+
z as codeSchema,
|
|
588
604
|
I as codeTypeSchema,
|
|
589
605
|
H as colorsSchema,
|
|
590
606
|
k as connectionInsertSchema,
|
|
591
607
|
y as connectionSchema,
|
|
592
608
|
v as domainInsertSchema,
|
|
593
|
-
|
|
594
|
-
|
|
609
|
+
J as domainSchema,
|
|
610
|
+
lt as emailProviderSchema,
|
|
595
611
|
e as fontDetailsSchema,
|
|
596
612
|
K as fontsSchema,
|
|
597
613
|
A as hookInsertSchema,
|
|
598
|
-
|
|
599
|
-
|
|
600
|
-
|
|
614
|
+
Z as hookSchema,
|
|
615
|
+
g as identitySchema,
|
|
616
|
+
$ as jwksKeySchema,
|
|
601
617
|
O as jwksSchema,
|
|
602
|
-
|
|
618
|
+
et as logSchema,
|
|
603
619
|
N as loginInsertSchema,
|
|
604
|
-
|
|
605
|
-
|
|
620
|
+
nt as loginSchema,
|
|
621
|
+
tt as openIDConfigurationSchema,
|
|
606
622
|
G as pageBackgroundSchema,
|
|
607
|
-
|
|
623
|
+
pt as parseUserId,
|
|
608
624
|
T as passwordInsertSchema,
|
|
609
|
-
|
|
625
|
+
it as passwordSchema,
|
|
610
626
|
p as profileDataSchema,
|
|
611
|
-
|
|
627
|
+
rt as promptSettingSchema,
|
|
628
|
+
M as refreshTokenInsertSchema,
|
|
629
|
+
ct as refreshTokenSchema,
|
|
612
630
|
h as samlpAddon,
|
|
613
631
|
x as sessionInsertSchema,
|
|
614
|
-
|
|
615
|
-
|
|
632
|
+
ot as sessionSchema,
|
|
633
|
+
at as signingKeySchema,
|
|
616
634
|
E as tenantInsertSchema,
|
|
617
635
|
C as tenantSchema,
|
|
618
636
|
L as themeInsertSchema,
|
|
619
|
-
|
|
620
|
-
|
|
621
|
-
|
|
622
|
-
|
|
637
|
+
st as themeSchema,
|
|
638
|
+
q as totalsSchema,
|
|
639
|
+
d as userInsertSchema,
|
|
640
|
+
V as userResponseSchema,
|
|
623
641
|
_ as userSchema,
|
|
624
|
-
|
|
642
|
+
X as vendorSettingsSchema,
|
|
625
643
|
B as widgetSchema
|
|
626
644
|
};
|