@authhero/adapter-interfaces 0.40.0 → 0.42.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let L=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>L()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),E=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...E.shape,id:t.z.string()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=C.extend({...a.shape,hook_id:t.z.string()}),w=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(w)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({session_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string(),used_at:t.z.string(),deleted_at:t.z.string().optional(),user_id:t.z.string()}),it=t.z.object({created_at:t.z.string(),...U.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),at=F.extend({themeId:t.z.string()}),st=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),rt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),lt=t.z.object({created_at:t.z.string(),...H.shape});function ct(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=E;exports.domainSchema=Y;exports.emailProviderSchema=rt;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=C;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=w;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=ct;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=st;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=lt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=at;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,L=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),it=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),U=t.z.object({id:t.z.string(),session_id:t.z.string().optional(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:it.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...U.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),rt=F.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),pt=t.z.object({created_at:t.z.string(),...H.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=Y;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=L;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
@@ -2697,52 +2697,155 @@ export declare const passwordSchema: z.ZodObject<{
2697
2697
  }>;
2698
2698
  export type Password = z.infer<typeof passwordSchema>;
2699
2699
  export declare const sessionInsertSchema: z.ZodObject<{
2700
- session_id: z.ZodString;
2700
+ id: z.ZodString;
2701
+ session_id: z.ZodOptional<z.ZodString>;
2701
2702
  client_id: z.ZodString;
2702
- expires_at: z.ZodString;
2703
+ revoked_at: z.ZodOptional<z.ZodString>;
2703
2704
  used_at: z.ZodString;
2704
- deleted_at: z.ZodOptional<z.ZodString>;
2705
2705
  user_id: z.ZodString;
2706
+ expires_at: z.ZodOptional<z.ZodString>;
2707
+ idle_expires_at: z.ZodOptional<z.ZodString>;
2708
+ device: z.ZodObject<{
2709
+ initial_user_agent: z.ZodString;
2710
+ initial_ip: z.ZodString;
2711
+ initial_asn: z.ZodString;
2712
+ last_user_agent: z.ZodString;
2713
+ last_ip: z.ZodString;
2714
+ last_asn: z.ZodString;
2715
+ }, "strip", z.ZodTypeAny, {
2716
+ last_ip: string;
2717
+ initial_user_agent: string;
2718
+ initial_ip: string;
2719
+ initial_asn: string;
2720
+ last_user_agent: string;
2721
+ last_asn: string;
2722
+ }, {
2723
+ last_ip: string;
2724
+ initial_user_agent: string;
2725
+ initial_ip: string;
2726
+ initial_asn: string;
2727
+ last_user_agent: string;
2728
+ last_asn: string;
2729
+ }>;
2730
+ clients: z.ZodArray<z.ZodString, "many">;
2706
2731
  }, "strip", z.ZodTypeAny, {
2707
2732
  user_id: string;
2733
+ id: string;
2708
2734
  client_id: string;
2709
- expires_at: string;
2710
2735
  used_at: string;
2711
- session_id: string;
2712
- deleted_at?: string | undefined;
2736
+ device: {
2737
+ last_ip: string;
2738
+ initial_user_agent: string;
2739
+ initial_ip: string;
2740
+ initial_asn: string;
2741
+ last_user_agent: string;
2742
+ last_asn: string;
2743
+ };
2744
+ clients: string[];
2745
+ expires_at?: string | undefined;
2746
+ session_id?: string | undefined;
2747
+ revoked_at?: string | undefined;
2748
+ idle_expires_at?: string | undefined;
2713
2749
  }, {
2714
2750
  user_id: string;
2751
+ id: string;
2715
2752
  client_id: string;
2716
- expires_at: string;
2717
2753
  used_at: string;
2718
- session_id: string;
2719
- deleted_at?: string | undefined;
2754
+ device: {
2755
+ last_ip: string;
2756
+ initial_user_agent: string;
2757
+ initial_ip: string;
2758
+ initial_asn: string;
2759
+ last_user_agent: string;
2760
+ last_asn: string;
2761
+ };
2762
+ clients: string[];
2763
+ expires_at?: string | undefined;
2764
+ session_id?: string | undefined;
2765
+ revoked_at?: string | undefined;
2766
+ idle_expires_at?: string | undefined;
2720
2767
  }>;
2721
2768
  export type SessionInsert = z.infer<typeof sessionInsertSchema>;
2722
2769
  export declare const sessionSchema: z.ZodObject<{
2723
- session_id: z.ZodString;
2770
+ id: z.ZodString;
2771
+ session_id: z.ZodOptional<z.ZodString>;
2724
2772
  client_id: z.ZodString;
2725
- expires_at: z.ZodString;
2773
+ revoked_at: z.ZodOptional<z.ZodString>;
2726
2774
  used_at: z.ZodString;
2727
- deleted_at: z.ZodOptional<z.ZodString>;
2728
2775
  user_id: z.ZodString;
2776
+ expires_at: z.ZodOptional<z.ZodString>;
2777
+ idle_expires_at: z.ZodOptional<z.ZodString>;
2778
+ device: z.ZodObject<{
2779
+ initial_user_agent: z.ZodString;
2780
+ initial_ip: z.ZodString;
2781
+ initial_asn: z.ZodString;
2782
+ last_user_agent: z.ZodString;
2783
+ last_ip: z.ZodString;
2784
+ last_asn: z.ZodString;
2785
+ }, "strip", z.ZodTypeAny, {
2786
+ last_ip: string;
2787
+ initial_user_agent: string;
2788
+ initial_ip: string;
2789
+ initial_asn: string;
2790
+ last_user_agent: string;
2791
+ last_asn: string;
2792
+ }, {
2793
+ last_ip: string;
2794
+ initial_user_agent: string;
2795
+ initial_ip: string;
2796
+ initial_asn: string;
2797
+ last_user_agent: string;
2798
+ last_asn: string;
2799
+ }>;
2800
+ clients: z.ZodArray<z.ZodString, "many">;
2729
2801
  created_at: z.ZodString;
2802
+ updated_at: z.ZodString;
2803
+ authenticated_at: z.ZodString;
2804
+ last_interaction_at: z.ZodString;
2730
2805
  }, "strip", z.ZodTypeAny, {
2731
2806
  created_at: string;
2807
+ updated_at: string;
2732
2808
  user_id: string;
2809
+ id: string;
2733
2810
  client_id: string;
2734
- expires_at: string;
2735
2811
  used_at: string;
2736
- session_id: string;
2737
- deleted_at?: string | undefined;
2812
+ device: {
2813
+ last_ip: string;
2814
+ initial_user_agent: string;
2815
+ initial_ip: string;
2816
+ initial_asn: string;
2817
+ last_user_agent: string;
2818
+ last_asn: string;
2819
+ };
2820
+ clients: string[];
2821
+ authenticated_at: string;
2822
+ last_interaction_at: string;
2823
+ expires_at?: string | undefined;
2824
+ session_id?: string | undefined;
2825
+ revoked_at?: string | undefined;
2826
+ idle_expires_at?: string | undefined;
2738
2827
  }, {
2739
2828
  created_at: string;
2829
+ updated_at: string;
2740
2830
  user_id: string;
2831
+ id: string;
2741
2832
  client_id: string;
2742
- expires_at: string;
2743
2833
  used_at: string;
2744
- session_id: string;
2745
- deleted_at?: string | undefined;
2834
+ device: {
2835
+ last_ip: string;
2836
+ initial_user_agent: string;
2837
+ initial_ip: string;
2838
+ initial_asn: string;
2839
+ last_user_agent: string;
2840
+ last_asn: string;
2841
+ };
2842
+ clients: string[];
2843
+ authenticated_at: string;
2844
+ last_interaction_at: string;
2845
+ expires_at?: string | undefined;
2846
+ session_id?: string | undefined;
2847
+ revoked_at?: string | undefined;
2848
+ idle_expires_at?: string | undefined;
2746
2849
  }>;
2747
2850
  export type Session = z.infer<typeof sessionSchema>;
2748
2851
  export declare const signingKeySchema: z.ZodObject<{
@@ -2763,6 +2866,7 @@ export declare const signingKeySchema: z.ZodObject<{
2763
2866
  cert: string;
2764
2867
  fingerprint: string;
2765
2868
  thumbprint: string;
2869
+ revoked_at?: string | undefined;
2766
2870
  pkcs7?: string | undefined;
2767
2871
  current?: boolean | undefined;
2768
2872
  next?: boolean | undefined;
@@ -2770,12 +2874,12 @@ export declare const signingKeySchema: z.ZodObject<{
2770
2874
  current_since?: string | undefined;
2771
2875
  current_until?: string | undefined;
2772
2876
  revoked?: boolean | undefined;
2773
- revoked_at?: string | undefined;
2774
2877
  }, {
2775
2878
  kid: string;
2776
2879
  cert: string;
2777
2880
  fingerprint: string;
2778
2881
  thumbprint: string;
2882
+ revoked_at?: string | undefined;
2779
2883
  pkcs7?: string | undefined;
2780
2884
  current?: boolean | undefined;
2781
2885
  next?: boolean | undefined;
@@ -2783,7 +2887,6 @@ export declare const signingKeySchema: z.ZodObject<{
2783
2887
  current_since?: string | undefined;
2784
2888
  current_until?: string | undefined;
2785
2889
  revoked?: boolean | undefined;
2786
- revoked_at?: string | undefined;
2787
2890
  }>;
2788
2891
  export type SigningKey = z.infer<typeof signingKeySchema>;
2789
2892
  export declare const tenantInsertSchema: z.ZodObject<{
@@ -2939,7 +3042,7 @@ export declare enum GrantType {
2939
3042
  Passwordless = "passwordless",
2940
3043
  Password = "password"
2941
3044
  }
2942
- declare const tokenResponseSchema: z.ZodObject<{
3045
+ export declare const tokenResponseSchema: z.ZodObject<{
2943
3046
  access_token: z.ZodString;
2944
3047
  id_token: z.ZodOptional<z.ZodString>;
2945
3048
  scope: z.ZodOptional<z.ZodString>;
@@ -4298,9 +4401,7 @@ export interface SessionsAdapter {
4298
4401
  create: (tenant_id: string, session: SessionInsert) => Promise<Session>;
4299
4402
  get: (tenant_id: string, id: string) => Promise<Session | null>;
4300
4403
  list(tenantId: string, params?: ListParams): Promise<ListSesssionsResponse>;
4301
- update: (tenant_id: string, id: string, session: {
4302
- used_at: string;
4303
- }) => Promise<boolean>;
4404
+ update: (tenant_id: string, id: string, session: Partial<Session>) => Promise<boolean>;
4304
4405
  remove: (tenant_id: string, id: string) => Promise<boolean>;
4305
4406
  }
4306
4407
  export interface CreateTenantParams {
@@ -1,9 +1,9 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const q = t.object({
2
+ const Q = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
6
- }), a = t.object({
6
+ }), s = t.object({
7
7
  created_at: t.string(),
8
8
  updated_at: t.string()
9
9
  }), p = t.object({
@@ -15,7 +15,7 @@ const q = t.object({
15
15
  phone_number: t.string().optional(),
16
16
  phone_verified: t.boolean().optional(),
17
17
  family_name: t.string().optional()
18
- }).catchall(t.any()), g = t.object({
18
+ }).catchall(t.any()), d = t.object({
19
19
  connection: t.string(),
20
20
  user_id: t.string(),
21
21
  provider: t.string(),
@@ -24,7 +24,7 @@ const q = t.object({
24
24
  access_token_secret: t.string().optional(),
25
25
  refresh_token: t.string().optional(),
26
26
  profileData: p.optional()
27
- }), s = t.object({
27
+ }), a = t.object({
28
28
  email: t.string().optional(),
29
29
  username: t.string().optional(),
30
30
  given_name: t.string().optional(),
@@ -38,7 +38,7 @@ const q = t.object({
38
38
  user_id: t.string().optional(),
39
39
  app_metadata: t.any().default({}).optional(),
40
40
  user_metadata: t.any().default({}).optional()
41
- }), d = s.extend({
41
+ }), g = a.extend({
42
42
  email_verified: t.boolean().default(!1),
43
43
  verify_email: t.boolean().optional(),
44
44
  last_ip: t.string().optional(),
@@ -48,15 +48,15 @@ const q = t.object({
48
48
  connection: t.string().default("email"),
49
49
  is_social: t.boolean().optional()
50
50
  }), _ = t.object({
51
- ...d.shape,
52
- ...a.shape,
51
+ ...g.shape,
52
+ ...s.shape,
53
53
  user_id: t.string(),
54
54
  is_social: t.boolean(),
55
55
  // TODO: this not might be correct if you use the username
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
- identities: t.array(g).optional()
59
- }), Q = _, V = s.extend({
58
+ identities: t.array(d).optional()
59
+ }), V = _, Y = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
@@ -64,10 +64,10 @@ const q = t.object({
64
64
  last_login: t.string().optional(),
65
65
  user_id: t.string()
66
66
  }).catchall(t.any()), u = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
67
- let m = (n = 21) => {
68
- let i = "", o = crypto.getRandomValues(new Uint8Array(n));
69
- for (; n--; )
70
- i += u[o[n] & 63];
67
+ let m = (e = 21) => {
68
+ let i = "", o = crypto.getRandomValues(new Uint8Array(e));
69
+ for (; e--; )
70
+ i += u[o[e] & 63];
71
71
  return i;
72
72
  };
73
73
  const h = t.object({
@@ -118,11 +118,11 @@ const h = t.object({
118
118
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
119
119
  })
120
120
  }), f = t.object({
121
- created_at: t.string().transform((n) => n === null ? "" : n),
122
- updated_at: t.string().transform((n) => n === null ? "" : n),
121
+ created_at: t.string().transform((e) => e === null ? "" : e),
122
+ updated_at: t.string().transform((e) => e === null ? "" : e),
123
123
  ...b.shape
124
124
  });
125
- var r = /* @__PURE__ */ ((n) => (n.TOKEN = "token", n.TOKEN_ID_TOKEN = "token id_token", n.CODE = "code", n))(r || {}), l = /* @__PURE__ */ ((n) => (n.QUERY = "query", n.FRAGMENT = "fragment", n.FORM_POST = "form_post", n.WEB_MESSAGE = "web_message", n.SAML_POST = "saml_post", n))(l || {}), c = /* @__PURE__ */ ((n) => (n.S256 = "S256", n.Plain = "plain", n))(c || {});
125
+ var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
126
126
  const S = t.object({
127
127
  client_id: t.string(),
128
128
  vendor_id: t.string().optional(),
@@ -139,7 +139,7 @@ const S = t.object({
139
139
  code_challenge: t.string().optional(),
140
140
  username: t.string().optional(),
141
141
  ui_locales: t.string().optional()
142
- }), Y = t.object({
142
+ }), X = t.object({
143
143
  colors: t.object({
144
144
  primary: t.string(),
145
145
  page_background: t.object({
@@ -178,8 +178,8 @@ const S = t.object({
178
178
  response_mode: t.custom().optional()
179
179
  }), y = t.object({
180
180
  id: t.string(),
181
- created_at: t.string().transform((n) => n === null ? "" : n),
182
- updated_at: t.string().transform((n) => n === null ? "" : n)
181
+ created_at: t.string().transform((e) => e === null ? "" : e),
182
+ updated_at: t.string().transform((e) => e === null ? "" : e)
183
183
  }).extend(k.shape), E = t.object({
184
184
  name: t.string(),
185
185
  audience: t.string(),
@@ -190,12 +190,12 @@ const S = t.object({
190
190
  primary_color: t.string().optional(),
191
191
  secondary_color: t.string().optional(),
192
192
  language: t.string().optional()
193
- }), C = t.object({
194
- created_at: t.string().transform((n) => n === null ? "" : n),
195
- updated_at: t.string().transform((n) => n === null ? "" : n),
193
+ }), w = t.object({
194
+ created_at: t.string().transform((e) => e === null ? "" : e),
195
+ updated_at: t.string().transform((e) => e === null ? "" : e),
196
196
  id: t.string(),
197
197
  ...E.shape
198
- }), X = t.object({
198
+ }), z = t.object({
199
199
  logoUrl: t.string(),
200
200
  loginBackgroundImage: t.string().nullish(),
201
201
  style: t.object({
@@ -212,7 +212,7 @@ const S = t.object({
212
212
  checkoutHideSocial: t.boolean().optional(),
213
213
  siteUrl: t.string().nullable(),
214
214
  manageSubscriptionsUrl: t.string().optional()
215
- }), w = t.object({
215
+ }), C = t.object({
216
216
  domain: t.string(),
217
217
  dkim_private_key: t.string().optional(),
218
218
  dkim_public_key: t.string().optional(),
@@ -221,8 +221,8 @@ const S = t.object({
221
221
  });
222
222
  t.object({
223
223
  ...f.shape,
224
- domains: t.array(w),
225
- tenant: C,
224
+ domains: t.array(C),
225
+ tenant: w,
226
226
  connections: t.array(y)
227
227
  });
228
228
  const I = t.enum([
@@ -249,7 +249,7 @@ const I = t.enum([
249
249
  expires_at: t.string(),
250
250
  used_at: t.string().optional(),
251
251
  user_id: t.string().optional()
252
- }), z = t.object({
252
+ }), J = t.object({
253
253
  ...j.shape,
254
254
  created_at: t.string()
255
255
  }), v = t.object({
@@ -258,7 +258,7 @@ const I = t.enum([
258
258
  dkim_public_key: t.string().optional(),
259
259
  email_api_key: t.string().optional(),
260
260
  email_service: t.string().optional()
261
- }), J = a.extend({
261
+ }), Z = s.extend({
262
262
  ...v.shape,
263
263
  id: t.string()
264
264
  }), A = t.object({
@@ -272,8 +272,8 @@ const I = t.enum([
272
272
  hook_id: t.string().optional(),
273
273
  synchronous: t.boolean().default(!1),
274
274
  priority: t.number().optional()
275
- }), Z = A.extend({
276
- ...a.shape,
275
+ }), $ = A.extend({
276
+ ...s.shape,
277
277
  hook_id: t.string()
278
278
  }), O = t.object({
279
279
  alg: t.enum([
@@ -294,9 +294,9 @@ const I = t.enum([
294
294
  x5t: t.string().optional(),
295
295
  x5c: t.array(t.string()).optional(),
296
296
  use: t.enum(["sig", "enc"]).optional()
297
- }), $ = t.object({
298
- keys: t.array(O)
299
297
  }), tt = t.object({
298
+ keys: t.array(O)
299
+ }), et = t.object({
300
300
  issuer: t.string(),
301
301
  authorization_endpoint: t.string(),
302
302
  token_endpoint: t.string(),
@@ -334,7 +334,7 @@ const I = t.enum([
334
334
  created_at: t.string(),
335
335
  updated_at: t.string()
336
336
  });
337
- var U = /* @__PURE__ */ ((n) => (n.FAILED_SILENT_AUTH = "fsa", n.FAILED_SIGNUP = "fs", n.FAILED_LOGIN = "f", n.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", n.FAILED_CHANGE_PASSWORD = "fcp", n.FAILED_BY_CONNECTOR = "fc", n.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", n.FAILED_HOOK = "fh", n.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", n.SUCCESS_API_OPERATION = "sapi", n.SUCCESS_CHANGE_PASSWORD = "scp", n.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", n.SUCCESS_CHANGE_USERNAME = "scu", n.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", n.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", n.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", n.SUCCESS_LOGIN = "s", n.SUCCESS_LOGOUT = "slo", n.SUCCESS_SIGNUP = "ss", n.SUCCESS_SILENT_AUTH = "ssa", n.SUCCESS_VERIFICATION_EMAIL = "sv", n.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", n.CODE_LINK_SENT = "cls", n.BLOCKED_ACCOUNT_EMAIL = "limit_wc", n.BLOCKED_ACCOUNT_IP = "limit_sul", n.BLOCKED_IP_ADDRESS = "limit_mu", n))(U || {});
337
+ var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
338
338
  const R = t.enum([
339
339
  "cls",
340
340
  // CODE_LINK_SENT
@@ -390,7 +390,7 @@ const R = t.enum([
390
390
  env: t.object({
391
391
  node: t.string().optional()
392
392
  }).optional()
393
- }), et = t.object({
393
+ }), it = t.object({
394
394
  type: R,
395
395
  date: t.string(),
396
396
  description: t.string().optional(),
@@ -417,20 +417,37 @@ const R = t.enum([
417
417
  user_id: t.string(),
418
418
  password: t.string(),
419
419
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
420
- }), it = t.object({
420
+ }), ot = t.object({
421
421
  ...T.shape,
422
422
  created_at: t.string(),
423
423
  updated_at: t.string()
424
424
  }), x = t.object({
425
- session_id: t.string(),
425
+ initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
426
+ initial_ip: t.string().describe("First IP address associated with this session"),
427
+ initial_asn: t.string().describe("First autonomous system number associated with this session"),
428
+ last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
429
+ last_ip: t.string().describe("Last IP address from which this user logged in"),
430
+ last_asn: t.string().describe("Last autonomous system number from which this user logged in")
431
+ }), P = t.object({
432
+ id: t.string(),
433
+ // TODO: Remove once data migrated
434
+ session_id: t.string().optional(),
426
435
  client_id: t.string(),
427
- expires_at: t.string(),
436
+ revoked_at: t.string().optional(),
428
437
  used_at: t.string(),
429
- deleted_at: t.string().optional(),
430
- user_id: t.string()
431
- }), ot = t.object({
438
+ user_id: t.string().describe("The user ID associated with the session"),
439
+ expires_at: t.string().optional(),
440
+ idle_expires_at: t.string().optional(),
441
+ device: x.describe(
442
+ "Metadata related to the device used in the session"
443
+ ),
444
+ clients: t.array(t.string()).describe("List of client details for the session")
445
+ }), st = t.object({
432
446
  created_at: t.string(),
433
- ...x.shape
447
+ updated_at: t.string(),
448
+ authenticated_at: t.string(),
449
+ last_interaction_at: t.string(),
450
+ ...P.shape
434
451
  }), at = t.object({
435
452
  kid: t.string().openapi({ description: "The key id of the signing key" }),
436
453
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
@@ -451,8 +468,8 @@ const R = t.enum([
451
468
  revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
452
469
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
453
470
  });
454
- var P = /* @__PURE__ */ ((n) => (n.RefreshToken = "refresh_token", n.AuthorizationCode = "authorization_code", n.ClientCredential = "client_credentials", n.Passwordless = "passwordless", n.Password = "password", n))(P || {});
455
- t.object({
471
+ var F = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(F || {});
472
+ const rt = t.object({
456
473
  access_token: t.string(),
457
474
  id_token: t.string().optional(),
458
475
  scope: t.string().optional(),
@@ -465,7 +482,7 @@ t.object({
465
482
  code: t.string(),
466
483
  state: t.string().optional()
467
484
  });
468
- const F = t.object({
485
+ const H = t.object({
469
486
  button_border_radius: t.number(),
470
487
  button_border_weight: t.number(),
471
488
  buttons_style: t.enum(["pill"]),
@@ -475,7 +492,7 @@ const F = t.object({
475
492
  show_widget_shadow: t.boolean(),
476
493
  widget_border_weight: t.number(),
477
494
  widget_corner_radius: t.number()
478
- }), H = t.object({
495
+ }), K = t.object({
479
496
  base_focus_color: t.string(),
480
497
  base_hover_color: t.string(),
481
498
  body_text: t.string(),
@@ -495,20 +512,20 @@ const F = t.object({
495
512
  success: t.string(),
496
513
  widget_background: t.string(),
497
514
  widget_border: t.string()
498
- }), e = t.object({
515
+ }), n = t.object({
499
516
  bold: t.boolean(),
500
517
  size: t.number()
501
- }), K = t.object({
502
- body_text: e,
503
- buttons_text: e,
518
+ }), G = t.object({
519
+ body_text: n,
520
+ buttons_text: n,
504
521
  font_url: t.string(),
505
- input_labels: e,
506
- links: e,
522
+ input_labels: n,
523
+ links: n,
507
524
  links_style: t.enum(["normal"]),
508
525
  reference_text_size: t.number(),
509
- subtitle: e,
510
- title: e
511
- }), G = t.object({
526
+ subtitle: n,
527
+ title: n
528
+ }), L = t.object({
512
529
  background_color: t.string(),
513
530
  background_image_url: t.string(),
514
531
  page_layout: t.enum(["center"])
@@ -518,21 +535,21 @@ const F = t.object({
518
535
  logo_position: t.enum(["center"]),
519
536
  logo_url: t.string(),
520
537
  social_buttons_layout: t.enum(["bottom"])
521
- }), L = t.object({
522
- borders: F,
523
- colors: H,
538
+ }), M = t.object({
539
+ borders: H,
540
+ colors: K,
524
541
  displayName: t.string(),
525
- fonts: K,
526
- page_background: G,
542
+ fonts: G,
543
+ page_background: L,
527
544
  widget: B
528
- }), st = L.extend({
545
+ }), lt = M.extend({
529
546
  themeId: t.string()
530
- }), rt = t.object({
547
+ }), ct = t.object({
531
548
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
532
549
  identifier_first: t.boolean().default(!0),
533
550
  password_first: t.boolean().default(!1),
534
551
  webauthn_platform_first_factor: t.boolean()
535
- }), lt = t.object({
552
+ }), pt = t.object({
536
553
  name: t.string(),
537
554
  enabled: t.boolean().optional().default(!0),
538
555
  default_from_address: t.string().optional(),
@@ -562,7 +579,7 @@ const F = t.object({
562
579
  })
563
580
  ]),
564
581
  settings: t.object({}).optional()
565
- }), M = t.object({
582
+ }), W = t.object({
566
583
  // The actual refresh token value (primary key).
567
584
  token: t.string(),
568
585
  // Link to the session record (foreign key).
@@ -576,16 +593,16 @@ const F = t.object({
576
593
  used_at: t.string().optional(),
577
594
  // If the token is revoked or deleted.
578
595
  revoked_at: t.string().optional()
579
- }), ct = t.object({
596
+ }), dt = t.object({
580
597
  // When the refresh token record was created.
581
598
  created_at: t.string(),
582
599
  // Spread in the rest of the refresh token properties.
583
- ...M.shape
600
+ ...W.shape
584
601
  });
585
- function pt(n) {
586
- const [i, o] = n.split("|");
602
+ function gt(e) {
603
+ const [i, o] = e.split("|");
587
604
  if (!i || !o)
588
- throw new Error(`Invalid user_id: ${n}`);
605
+ throw new Error(`Invalid user_id: ${e}`);
589
606
  return { connection: i, id: o };
590
607
  }
591
608
  export {
@@ -593,55 +610,56 @@ export {
593
610
  l as AuthorizationResponseMode,
594
611
  r as AuthorizationResponseType,
595
612
  c as CodeChallengeMethod,
596
- P as GrantType,
613
+ F as GrantType,
597
614
  U as LogTypes,
598
615
  b as applicationInsertSchema,
599
616
  f as applicationSchema,
600
- Q as auth0UserResponseSchema,
617
+ V as auth0UserResponseSchema,
601
618
  S as authParamsSchema,
602
- s as baseUserSchema,
603
- F as bordersSchema,
604
- Y as brandingSchema,
619
+ a as baseUserSchema,
620
+ H as bordersSchema,
621
+ X as brandingSchema,
605
622
  j as codeInsertSchema,
606
- z as codeSchema,
623
+ J as codeSchema,
607
624
  I as codeTypeSchema,
608
- H as colorsSchema,
625
+ K as colorsSchema,
609
626
  k as connectionInsertSchema,
610
627
  y as connectionSchema,
611
628
  v as domainInsertSchema,
612
- J as domainSchema,
613
- lt as emailProviderSchema,
614
- e as fontDetailsSchema,
615
- K as fontsSchema,
629
+ Z as domainSchema,
630
+ pt as emailProviderSchema,
631
+ n as fontDetailsSchema,
632
+ G as fontsSchema,
616
633
  A as hookInsertSchema,
617
- Z as hookSchema,
618
- g as identitySchema,
619
- $ as jwksKeySchema,
634
+ $ as hookSchema,
635
+ d as identitySchema,
636
+ tt as jwksKeySchema,
620
637
  O as jwksSchema,
621
- et as logSchema,
638
+ it as logSchema,
622
639
  N as loginInsertSchema,
623
640
  nt as loginSchema,
624
- tt as openIDConfigurationSchema,
625
- G as pageBackgroundSchema,
626
- pt as parseUserId,
641
+ et as openIDConfigurationSchema,
642
+ L as pageBackgroundSchema,
643
+ gt as parseUserId,
627
644
  T as passwordInsertSchema,
628
- it as passwordSchema,
645
+ ot as passwordSchema,
629
646
  p as profileDataSchema,
630
- rt as promptSettingSchema,
631
- M as refreshTokenInsertSchema,
632
- ct as refreshTokenSchema,
647
+ ct as promptSettingSchema,
648
+ W as refreshTokenInsertSchema,
649
+ dt as refreshTokenSchema,
633
650
  h as samlpAddon,
634
- x as sessionInsertSchema,
635
- ot as sessionSchema,
651
+ P as sessionInsertSchema,
652
+ st as sessionSchema,
636
653
  at as signingKeySchema,
637
654
  E as tenantInsertSchema,
638
- C as tenantSchema,
639
- L as themeInsertSchema,
640
- st as themeSchema,
641
- q as totalsSchema,
642
- d as userInsertSchema,
643
- V as userResponseSchema,
655
+ w as tenantSchema,
656
+ M as themeInsertSchema,
657
+ lt as themeSchema,
658
+ rt as tokenResponseSchema,
659
+ Q as totalsSchema,
660
+ g as userInsertSchema,
661
+ Y as userResponseSchema,
644
662
  _ as userSchema,
645
- X as vendorSettingsSchema,
663
+ z as vendorSettingsSchema,
646
664
  B as widgetSchema
647
665
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.40.0",
14
+ "version": "0.42.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],