@authhero/adapter-interfaces 0.41.0 → 0.42.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +124 -23
- package/dist/adapter-interfaces.mjs +116 -99
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let L=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>L()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),E=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...E.shape,id:t.z.string()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=C.extend({...a.shape,hook_id:t.z.string()}),w=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(w)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({session_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string(),used_at:t.z.string(),deleted_at:t.z.string().optional(),user_id:t.z.string()}),it=t.z.object({created_at:t.z.string(),...U.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const at=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),st=F.extend({themeId:t.z.string()}),rt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),lt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),ct=t.z.object({created_at:t.z.string(),...H.shape});function pt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=E;exports.domainSchema=Y;exports.emailProviderSchema=lt;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=C;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=w;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=pt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=rt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=ct;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=st;exports.tokenResponseSchema=at;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,L=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),it=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),U=t.z.object({id:t.z.string(),session_id:t.z.string().optional(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:it.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...U.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),rt=F.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),pt=t.z.object({created_at:t.z.string(),...H.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=Y;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=L;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
|
|
@@ -2697,52 +2697,155 @@ export declare const passwordSchema: z.ZodObject<{
|
|
|
2697
2697
|
}>;
|
|
2698
2698
|
export type Password = z.infer<typeof passwordSchema>;
|
|
2699
2699
|
export declare const sessionInsertSchema: z.ZodObject<{
|
|
2700
|
-
|
|
2700
|
+
id: z.ZodString;
|
|
2701
|
+
session_id: z.ZodOptional<z.ZodString>;
|
|
2701
2702
|
client_id: z.ZodString;
|
|
2702
|
-
|
|
2703
|
+
revoked_at: z.ZodOptional<z.ZodString>;
|
|
2703
2704
|
used_at: z.ZodString;
|
|
2704
|
-
deleted_at: z.ZodOptional<z.ZodString>;
|
|
2705
2705
|
user_id: z.ZodString;
|
|
2706
|
+
expires_at: z.ZodOptional<z.ZodString>;
|
|
2707
|
+
idle_expires_at: z.ZodOptional<z.ZodString>;
|
|
2708
|
+
device: z.ZodObject<{
|
|
2709
|
+
initial_user_agent: z.ZodString;
|
|
2710
|
+
initial_ip: z.ZodString;
|
|
2711
|
+
initial_asn: z.ZodString;
|
|
2712
|
+
last_user_agent: z.ZodString;
|
|
2713
|
+
last_ip: z.ZodString;
|
|
2714
|
+
last_asn: z.ZodString;
|
|
2715
|
+
}, "strip", z.ZodTypeAny, {
|
|
2716
|
+
last_ip: string;
|
|
2717
|
+
initial_user_agent: string;
|
|
2718
|
+
initial_ip: string;
|
|
2719
|
+
initial_asn: string;
|
|
2720
|
+
last_user_agent: string;
|
|
2721
|
+
last_asn: string;
|
|
2722
|
+
}, {
|
|
2723
|
+
last_ip: string;
|
|
2724
|
+
initial_user_agent: string;
|
|
2725
|
+
initial_ip: string;
|
|
2726
|
+
initial_asn: string;
|
|
2727
|
+
last_user_agent: string;
|
|
2728
|
+
last_asn: string;
|
|
2729
|
+
}>;
|
|
2730
|
+
clients: z.ZodArray<z.ZodString, "many">;
|
|
2706
2731
|
}, "strip", z.ZodTypeAny, {
|
|
2707
2732
|
user_id: string;
|
|
2733
|
+
id: string;
|
|
2708
2734
|
client_id: string;
|
|
2709
|
-
expires_at: string;
|
|
2710
2735
|
used_at: string;
|
|
2711
|
-
|
|
2712
|
-
|
|
2736
|
+
device: {
|
|
2737
|
+
last_ip: string;
|
|
2738
|
+
initial_user_agent: string;
|
|
2739
|
+
initial_ip: string;
|
|
2740
|
+
initial_asn: string;
|
|
2741
|
+
last_user_agent: string;
|
|
2742
|
+
last_asn: string;
|
|
2743
|
+
};
|
|
2744
|
+
clients: string[];
|
|
2745
|
+
expires_at?: string | undefined;
|
|
2746
|
+
session_id?: string | undefined;
|
|
2747
|
+
revoked_at?: string | undefined;
|
|
2748
|
+
idle_expires_at?: string | undefined;
|
|
2713
2749
|
}, {
|
|
2714
2750
|
user_id: string;
|
|
2751
|
+
id: string;
|
|
2715
2752
|
client_id: string;
|
|
2716
|
-
expires_at: string;
|
|
2717
2753
|
used_at: string;
|
|
2718
|
-
|
|
2719
|
-
|
|
2754
|
+
device: {
|
|
2755
|
+
last_ip: string;
|
|
2756
|
+
initial_user_agent: string;
|
|
2757
|
+
initial_ip: string;
|
|
2758
|
+
initial_asn: string;
|
|
2759
|
+
last_user_agent: string;
|
|
2760
|
+
last_asn: string;
|
|
2761
|
+
};
|
|
2762
|
+
clients: string[];
|
|
2763
|
+
expires_at?: string | undefined;
|
|
2764
|
+
session_id?: string | undefined;
|
|
2765
|
+
revoked_at?: string | undefined;
|
|
2766
|
+
idle_expires_at?: string | undefined;
|
|
2720
2767
|
}>;
|
|
2721
2768
|
export type SessionInsert = z.infer<typeof sessionInsertSchema>;
|
|
2722
2769
|
export declare const sessionSchema: z.ZodObject<{
|
|
2723
|
-
|
|
2770
|
+
id: z.ZodString;
|
|
2771
|
+
session_id: z.ZodOptional<z.ZodString>;
|
|
2724
2772
|
client_id: z.ZodString;
|
|
2725
|
-
|
|
2773
|
+
revoked_at: z.ZodOptional<z.ZodString>;
|
|
2726
2774
|
used_at: z.ZodString;
|
|
2727
|
-
deleted_at: z.ZodOptional<z.ZodString>;
|
|
2728
2775
|
user_id: z.ZodString;
|
|
2776
|
+
expires_at: z.ZodOptional<z.ZodString>;
|
|
2777
|
+
idle_expires_at: z.ZodOptional<z.ZodString>;
|
|
2778
|
+
device: z.ZodObject<{
|
|
2779
|
+
initial_user_agent: z.ZodString;
|
|
2780
|
+
initial_ip: z.ZodString;
|
|
2781
|
+
initial_asn: z.ZodString;
|
|
2782
|
+
last_user_agent: z.ZodString;
|
|
2783
|
+
last_ip: z.ZodString;
|
|
2784
|
+
last_asn: z.ZodString;
|
|
2785
|
+
}, "strip", z.ZodTypeAny, {
|
|
2786
|
+
last_ip: string;
|
|
2787
|
+
initial_user_agent: string;
|
|
2788
|
+
initial_ip: string;
|
|
2789
|
+
initial_asn: string;
|
|
2790
|
+
last_user_agent: string;
|
|
2791
|
+
last_asn: string;
|
|
2792
|
+
}, {
|
|
2793
|
+
last_ip: string;
|
|
2794
|
+
initial_user_agent: string;
|
|
2795
|
+
initial_ip: string;
|
|
2796
|
+
initial_asn: string;
|
|
2797
|
+
last_user_agent: string;
|
|
2798
|
+
last_asn: string;
|
|
2799
|
+
}>;
|
|
2800
|
+
clients: z.ZodArray<z.ZodString, "many">;
|
|
2729
2801
|
created_at: z.ZodString;
|
|
2802
|
+
updated_at: z.ZodString;
|
|
2803
|
+
authenticated_at: z.ZodString;
|
|
2804
|
+
last_interaction_at: z.ZodString;
|
|
2730
2805
|
}, "strip", z.ZodTypeAny, {
|
|
2731
2806
|
created_at: string;
|
|
2807
|
+
updated_at: string;
|
|
2732
2808
|
user_id: string;
|
|
2809
|
+
id: string;
|
|
2733
2810
|
client_id: string;
|
|
2734
|
-
expires_at: string;
|
|
2735
2811
|
used_at: string;
|
|
2736
|
-
|
|
2737
|
-
|
|
2812
|
+
device: {
|
|
2813
|
+
last_ip: string;
|
|
2814
|
+
initial_user_agent: string;
|
|
2815
|
+
initial_ip: string;
|
|
2816
|
+
initial_asn: string;
|
|
2817
|
+
last_user_agent: string;
|
|
2818
|
+
last_asn: string;
|
|
2819
|
+
};
|
|
2820
|
+
clients: string[];
|
|
2821
|
+
authenticated_at: string;
|
|
2822
|
+
last_interaction_at: string;
|
|
2823
|
+
expires_at?: string | undefined;
|
|
2824
|
+
session_id?: string | undefined;
|
|
2825
|
+
revoked_at?: string | undefined;
|
|
2826
|
+
idle_expires_at?: string | undefined;
|
|
2738
2827
|
}, {
|
|
2739
2828
|
created_at: string;
|
|
2829
|
+
updated_at: string;
|
|
2740
2830
|
user_id: string;
|
|
2831
|
+
id: string;
|
|
2741
2832
|
client_id: string;
|
|
2742
|
-
expires_at: string;
|
|
2743
2833
|
used_at: string;
|
|
2744
|
-
|
|
2745
|
-
|
|
2834
|
+
device: {
|
|
2835
|
+
last_ip: string;
|
|
2836
|
+
initial_user_agent: string;
|
|
2837
|
+
initial_ip: string;
|
|
2838
|
+
initial_asn: string;
|
|
2839
|
+
last_user_agent: string;
|
|
2840
|
+
last_asn: string;
|
|
2841
|
+
};
|
|
2842
|
+
clients: string[];
|
|
2843
|
+
authenticated_at: string;
|
|
2844
|
+
last_interaction_at: string;
|
|
2845
|
+
expires_at?: string | undefined;
|
|
2846
|
+
session_id?: string | undefined;
|
|
2847
|
+
revoked_at?: string | undefined;
|
|
2848
|
+
idle_expires_at?: string | undefined;
|
|
2746
2849
|
}>;
|
|
2747
2850
|
export type Session = z.infer<typeof sessionSchema>;
|
|
2748
2851
|
export declare const signingKeySchema: z.ZodObject<{
|
|
@@ -2763,6 +2866,7 @@ export declare const signingKeySchema: z.ZodObject<{
|
|
|
2763
2866
|
cert: string;
|
|
2764
2867
|
fingerprint: string;
|
|
2765
2868
|
thumbprint: string;
|
|
2869
|
+
revoked_at?: string | undefined;
|
|
2766
2870
|
pkcs7?: string | undefined;
|
|
2767
2871
|
current?: boolean | undefined;
|
|
2768
2872
|
next?: boolean | undefined;
|
|
@@ -2770,12 +2874,12 @@ export declare const signingKeySchema: z.ZodObject<{
|
|
|
2770
2874
|
current_since?: string | undefined;
|
|
2771
2875
|
current_until?: string | undefined;
|
|
2772
2876
|
revoked?: boolean | undefined;
|
|
2773
|
-
revoked_at?: string | undefined;
|
|
2774
2877
|
}, {
|
|
2775
2878
|
kid: string;
|
|
2776
2879
|
cert: string;
|
|
2777
2880
|
fingerprint: string;
|
|
2778
2881
|
thumbprint: string;
|
|
2882
|
+
revoked_at?: string | undefined;
|
|
2779
2883
|
pkcs7?: string | undefined;
|
|
2780
2884
|
current?: boolean | undefined;
|
|
2781
2885
|
next?: boolean | undefined;
|
|
@@ -2783,7 +2887,6 @@ export declare const signingKeySchema: z.ZodObject<{
|
|
|
2783
2887
|
current_since?: string | undefined;
|
|
2784
2888
|
current_until?: string | undefined;
|
|
2785
2889
|
revoked?: boolean | undefined;
|
|
2786
|
-
revoked_at?: string | undefined;
|
|
2787
2890
|
}>;
|
|
2788
2891
|
export type SigningKey = z.infer<typeof signingKeySchema>;
|
|
2789
2892
|
export declare const tenantInsertSchema: z.ZodObject<{
|
|
@@ -4298,9 +4401,7 @@ export interface SessionsAdapter {
|
|
|
4298
4401
|
create: (tenant_id: string, session: SessionInsert) => Promise<Session>;
|
|
4299
4402
|
get: (tenant_id: string, id: string) => Promise<Session | null>;
|
|
4300
4403
|
list(tenantId: string, params?: ListParams): Promise<ListSesssionsResponse>;
|
|
4301
|
-
update: (tenant_id: string, id: string, session:
|
|
4302
|
-
used_at: string;
|
|
4303
|
-
}) => Promise<boolean>;
|
|
4404
|
+
update: (tenant_id: string, id: string, session: Partial<Session>) => Promise<boolean>;
|
|
4304
4405
|
remove: (tenant_id: string, id: string) => Promise<boolean>;
|
|
4305
4406
|
}
|
|
4306
4407
|
export interface CreateTenantParams {
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { z as t } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const Q = t.object({
|
|
3
3
|
start: t.number(),
|
|
4
4
|
limit: t.number(),
|
|
5
5
|
length: t.number()
|
|
6
|
-
}),
|
|
6
|
+
}), s = t.object({
|
|
7
7
|
created_at: t.string(),
|
|
8
8
|
updated_at: t.string()
|
|
9
9
|
}), p = t.object({
|
|
@@ -15,7 +15,7 @@ const q = t.object({
|
|
|
15
15
|
phone_number: t.string().optional(),
|
|
16
16
|
phone_verified: t.boolean().optional(),
|
|
17
17
|
family_name: t.string().optional()
|
|
18
|
-
}).catchall(t.any()),
|
|
18
|
+
}).catchall(t.any()), d = t.object({
|
|
19
19
|
connection: t.string(),
|
|
20
20
|
user_id: t.string(),
|
|
21
21
|
provider: t.string(),
|
|
@@ -24,7 +24,7 @@ const q = t.object({
|
|
|
24
24
|
access_token_secret: t.string().optional(),
|
|
25
25
|
refresh_token: t.string().optional(),
|
|
26
26
|
profileData: p.optional()
|
|
27
|
-
}),
|
|
27
|
+
}), a = t.object({
|
|
28
28
|
email: t.string().optional(),
|
|
29
29
|
username: t.string().optional(),
|
|
30
30
|
given_name: t.string().optional(),
|
|
@@ -38,7 +38,7 @@ const q = t.object({
|
|
|
38
38
|
user_id: t.string().optional(),
|
|
39
39
|
app_metadata: t.any().default({}).optional(),
|
|
40
40
|
user_metadata: t.any().default({}).optional()
|
|
41
|
-
}),
|
|
41
|
+
}), g = a.extend({
|
|
42
42
|
email_verified: t.boolean().default(!1),
|
|
43
43
|
verify_email: t.boolean().optional(),
|
|
44
44
|
last_ip: t.string().optional(),
|
|
@@ -48,15 +48,15 @@ const q = t.object({
|
|
|
48
48
|
connection: t.string().default("email"),
|
|
49
49
|
is_social: t.boolean().optional()
|
|
50
50
|
}), _ = t.object({
|
|
51
|
-
...
|
|
52
|
-
...
|
|
51
|
+
...g.shape,
|
|
52
|
+
...s.shape,
|
|
53
53
|
user_id: t.string(),
|
|
54
54
|
is_social: t.boolean(),
|
|
55
55
|
// TODO: this not might be correct if you use the username
|
|
56
56
|
email: t.string(),
|
|
57
57
|
login_count: t.number(),
|
|
58
|
-
identities: t.array(
|
|
59
|
-
}),
|
|
58
|
+
identities: t.array(d).optional()
|
|
59
|
+
}), V = _, Y = a.extend({
|
|
60
60
|
email: t.string(),
|
|
61
61
|
login_count: t.number(),
|
|
62
62
|
multifactor: t.array(t.string()).optional(),
|
|
@@ -64,10 +64,10 @@ const q = t.object({
|
|
|
64
64
|
last_login: t.string().optional(),
|
|
65
65
|
user_id: t.string()
|
|
66
66
|
}).catchall(t.any()), u = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
67
|
-
let m = (
|
|
68
|
-
let i = "", o = crypto.getRandomValues(new Uint8Array(
|
|
69
|
-
for (;
|
|
70
|
-
i += u[o[
|
|
67
|
+
let m = (e = 21) => {
|
|
68
|
+
let i = "", o = crypto.getRandomValues(new Uint8Array(e));
|
|
69
|
+
for (; e--; )
|
|
70
|
+
i += u[o[e] & 63];
|
|
71
71
|
return i;
|
|
72
72
|
};
|
|
73
73
|
const h = t.object({
|
|
@@ -118,11 +118,11 @@ const h = t.object({
|
|
|
118
118
|
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
119
119
|
})
|
|
120
120
|
}), f = t.object({
|
|
121
|
-
created_at: t.string().transform((
|
|
122
|
-
updated_at: t.string().transform((
|
|
121
|
+
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
122
|
+
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
123
123
|
...b.shape
|
|
124
124
|
});
|
|
125
|
-
var r = /* @__PURE__ */ ((
|
|
125
|
+
var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
|
|
126
126
|
const S = t.object({
|
|
127
127
|
client_id: t.string(),
|
|
128
128
|
vendor_id: t.string().optional(),
|
|
@@ -139,7 +139,7 @@ const S = t.object({
|
|
|
139
139
|
code_challenge: t.string().optional(),
|
|
140
140
|
username: t.string().optional(),
|
|
141
141
|
ui_locales: t.string().optional()
|
|
142
|
-
}),
|
|
142
|
+
}), X = t.object({
|
|
143
143
|
colors: t.object({
|
|
144
144
|
primary: t.string(),
|
|
145
145
|
page_background: t.object({
|
|
@@ -178,8 +178,8 @@ const S = t.object({
|
|
|
178
178
|
response_mode: t.custom().optional()
|
|
179
179
|
}), y = t.object({
|
|
180
180
|
id: t.string(),
|
|
181
|
-
created_at: t.string().transform((
|
|
182
|
-
updated_at: t.string().transform((
|
|
181
|
+
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
182
|
+
updated_at: t.string().transform((e) => e === null ? "" : e)
|
|
183
183
|
}).extend(k.shape), E = t.object({
|
|
184
184
|
name: t.string(),
|
|
185
185
|
audience: t.string(),
|
|
@@ -190,12 +190,12 @@ const S = t.object({
|
|
|
190
190
|
primary_color: t.string().optional(),
|
|
191
191
|
secondary_color: t.string().optional(),
|
|
192
192
|
language: t.string().optional()
|
|
193
|
-
}),
|
|
194
|
-
created_at: t.string().transform((
|
|
195
|
-
updated_at: t.string().transform((
|
|
193
|
+
}), w = t.object({
|
|
194
|
+
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
195
|
+
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
196
196
|
id: t.string(),
|
|
197
197
|
...E.shape
|
|
198
|
-
}),
|
|
198
|
+
}), z = t.object({
|
|
199
199
|
logoUrl: t.string(),
|
|
200
200
|
loginBackgroundImage: t.string().nullish(),
|
|
201
201
|
style: t.object({
|
|
@@ -212,7 +212,7 @@ const S = t.object({
|
|
|
212
212
|
checkoutHideSocial: t.boolean().optional(),
|
|
213
213
|
siteUrl: t.string().nullable(),
|
|
214
214
|
manageSubscriptionsUrl: t.string().optional()
|
|
215
|
-
}),
|
|
215
|
+
}), C = t.object({
|
|
216
216
|
domain: t.string(),
|
|
217
217
|
dkim_private_key: t.string().optional(),
|
|
218
218
|
dkim_public_key: t.string().optional(),
|
|
@@ -221,8 +221,8 @@ const S = t.object({
|
|
|
221
221
|
});
|
|
222
222
|
t.object({
|
|
223
223
|
...f.shape,
|
|
224
|
-
domains: t.array(
|
|
225
|
-
tenant:
|
|
224
|
+
domains: t.array(C),
|
|
225
|
+
tenant: w,
|
|
226
226
|
connections: t.array(y)
|
|
227
227
|
});
|
|
228
228
|
const I = t.enum([
|
|
@@ -249,7 +249,7 @@ const I = t.enum([
|
|
|
249
249
|
expires_at: t.string(),
|
|
250
250
|
used_at: t.string().optional(),
|
|
251
251
|
user_id: t.string().optional()
|
|
252
|
-
}),
|
|
252
|
+
}), J = t.object({
|
|
253
253
|
...j.shape,
|
|
254
254
|
created_at: t.string()
|
|
255
255
|
}), v = t.object({
|
|
@@ -258,7 +258,7 @@ const I = t.enum([
|
|
|
258
258
|
dkim_public_key: t.string().optional(),
|
|
259
259
|
email_api_key: t.string().optional(),
|
|
260
260
|
email_service: t.string().optional()
|
|
261
|
-
}),
|
|
261
|
+
}), Z = s.extend({
|
|
262
262
|
...v.shape,
|
|
263
263
|
id: t.string()
|
|
264
264
|
}), A = t.object({
|
|
@@ -272,8 +272,8 @@ const I = t.enum([
|
|
|
272
272
|
hook_id: t.string().optional(),
|
|
273
273
|
synchronous: t.boolean().default(!1),
|
|
274
274
|
priority: t.number().optional()
|
|
275
|
-
}),
|
|
276
|
-
...
|
|
275
|
+
}), $ = A.extend({
|
|
276
|
+
...s.shape,
|
|
277
277
|
hook_id: t.string()
|
|
278
278
|
}), O = t.object({
|
|
279
279
|
alg: t.enum([
|
|
@@ -294,9 +294,9 @@ const I = t.enum([
|
|
|
294
294
|
x5t: t.string().optional(),
|
|
295
295
|
x5c: t.array(t.string()).optional(),
|
|
296
296
|
use: t.enum(["sig", "enc"]).optional()
|
|
297
|
-
}), $ = t.object({
|
|
298
|
-
keys: t.array(O)
|
|
299
297
|
}), tt = t.object({
|
|
298
|
+
keys: t.array(O)
|
|
299
|
+
}), et = t.object({
|
|
300
300
|
issuer: t.string(),
|
|
301
301
|
authorization_endpoint: t.string(),
|
|
302
302
|
token_endpoint: t.string(),
|
|
@@ -334,7 +334,7 @@ const I = t.enum([
|
|
|
334
334
|
created_at: t.string(),
|
|
335
335
|
updated_at: t.string()
|
|
336
336
|
});
|
|
337
|
-
var U = /* @__PURE__ */ ((
|
|
337
|
+
var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
|
|
338
338
|
const R = t.enum([
|
|
339
339
|
"cls",
|
|
340
340
|
// CODE_LINK_SENT
|
|
@@ -390,7 +390,7 @@ const R = t.enum([
|
|
|
390
390
|
env: t.object({
|
|
391
391
|
node: t.string().optional()
|
|
392
392
|
}).optional()
|
|
393
|
-
}),
|
|
393
|
+
}), it = t.object({
|
|
394
394
|
type: R,
|
|
395
395
|
date: t.string(),
|
|
396
396
|
description: t.string().optional(),
|
|
@@ -417,20 +417,37 @@ const R = t.enum([
|
|
|
417
417
|
user_id: t.string(),
|
|
418
418
|
password: t.string(),
|
|
419
419
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
420
|
-
}),
|
|
420
|
+
}), ot = t.object({
|
|
421
421
|
...T.shape,
|
|
422
422
|
created_at: t.string(),
|
|
423
423
|
updated_at: t.string()
|
|
424
424
|
}), x = t.object({
|
|
425
|
-
|
|
425
|
+
initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
|
|
426
|
+
initial_ip: t.string().describe("First IP address associated with this session"),
|
|
427
|
+
initial_asn: t.string().describe("First autonomous system number associated with this session"),
|
|
428
|
+
last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
|
|
429
|
+
last_ip: t.string().describe("Last IP address from which this user logged in"),
|
|
430
|
+
last_asn: t.string().describe("Last autonomous system number from which this user logged in")
|
|
431
|
+
}), P = t.object({
|
|
432
|
+
id: t.string(),
|
|
433
|
+
// TODO: Remove once data migrated
|
|
434
|
+
session_id: t.string().optional(),
|
|
426
435
|
client_id: t.string(),
|
|
427
|
-
|
|
436
|
+
revoked_at: t.string().optional(),
|
|
428
437
|
used_at: t.string(),
|
|
429
|
-
|
|
430
|
-
|
|
431
|
-
|
|
438
|
+
user_id: t.string().describe("The user ID associated with the session"),
|
|
439
|
+
expires_at: t.string().optional(),
|
|
440
|
+
idle_expires_at: t.string().optional(),
|
|
441
|
+
device: x.describe(
|
|
442
|
+
"Metadata related to the device used in the session"
|
|
443
|
+
),
|
|
444
|
+
clients: t.array(t.string()).describe("List of client details for the session")
|
|
445
|
+
}), st = t.object({
|
|
432
446
|
created_at: t.string(),
|
|
433
|
-
|
|
447
|
+
updated_at: t.string(),
|
|
448
|
+
authenticated_at: t.string(),
|
|
449
|
+
last_interaction_at: t.string(),
|
|
450
|
+
...P.shape
|
|
434
451
|
}), at = t.object({
|
|
435
452
|
kid: t.string().openapi({ description: "The key id of the signing key" }),
|
|
436
453
|
cert: t.string().openapi({ description: "The public certificate of the signing key" }),
|
|
@@ -451,8 +468,8 @@ const R = t.enum([
|
|
|
451
468
|
revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
|
|
452
469
|
revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
|
|
453
470
|
});
|
|
454
|
-
var
|
|
455
|
-
const
|
|
471
|
+
var F = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(F || {});
|
|
472
|
+
const rt = t.object({
|
|
456
473
|
access_token: t.string(),
|
|
457
474
|
id_token: t.string().optional(),
|
|
458
475
|
scope: t.string().optional(),
|
|
@@ -465,7 +482,7 @@ t.object({
|
|
|
465
482
|
code: t.string(),
|
|
466
483
|
state: t.string().optional()
|
|
467
484
|
});
|
|
468
|
-
const
|
|
485
|
+
const H = t.object({
|
|
469
486
|
button_border_radius: t.number(),
|
|
470
487
|
button_border_weight: t.number(),
|
|
471
488
|
buttons_style: t.enum(["pill"]),
|
|
@@ -475,7 +492,7 @@ const F = t.object({
|
|
|
475
492
|
show_widget_shadow: t.boolean(),
|
|
476
493
|
widget_border_weight: t.number(),
|
|
477
494
|
widget_corner_radius: t.number()
|
|
478
|
-
}),
|
|
495
|
+
}), K = t.object({
|
|
479
496
|
base_focus_color: t.string(),
|
|
480
497
|
base_hover_color: t.string(),
|
|
481
498
|
body_text: t.string(),
|
|
@@ -495,20 +512,20 @@ const F = t.object({
|
|
|
495
512
|
success: t.string(),
|
|
496
513
|
widget_background: t.string(),
|
|
497
514
|
widget_border: t.string()
|
|
498
|
-
}),
|
|
515
|
+
}), n = t.object({
|
|
499
516
|
bold: t.boolean(),
|
|
500
517
|
size: t.number()
|
|
501
|
-
}),
|
|
502
|
-
body_text:
|
|
503
|
-
buttons_text:
|
|
518
|
+
}), G = t.object({
|
|
519
|
+
body_text: n,
|
|
520
|
+
buttons_text: n,
|
|
504
521
|
font_url: t.string(),
|
|
505
|
-
input_labels:
|
|
506
|
-
links:
|
|
522
|
+
input_labels: n,
|
|
523
|
+
links: n,
|
|
507
524
|
links_style: t.enum(["normal"]),
|
|
508
525
|
reference_text_size: t.number(),
|
|
509
|
-
subtitle:
|
|
510
|
-
title:
|
|
511
|
-
}),
|
|
526
|
+
subtitle: n,
|
|
527
|
+
title: n
|
|
528
|
+
}), L = t.object({
|
|
512
529
|
background_color: t.string(),
|
|
513
530
|
background_image_url: t.string(),
|
|
514
531
|
page_layout: t.enum(["center"])
|
|
@@ -518,21 +535,21 @@ const F = t.object({
|
|
|
518
535
|
logo_position: t.enum(["center"]),
|
|
519
536
|
logo_url: t.string(),
|
|
520
537
|
social_buttons_layout: t.enum(["bottom"])
|
|
521
|
-
}),
|
|
522
|
-
borders:
|
|
523
|
-
colors:
|
|
538
|
+
}), M = t.object({
|
|
539
|
+
borders: H,
|
|
540
|
+
colors: K,
|
|
524
541
|
displayName: t.string(),
|
|
525
|
-
fonts:
|
|
526
|
-
page_background:
|
|
542
|
+
fonts: G,
|
|
543
|
+
page_background: L,
|
|
527
544
|
widget: B
|
|
528
|
-
}),
|
|
545
|
+
}), lt = M.extend({
|
|
529
546
|
themeId: t.string()
|
|
530
|
-
}),
|
|
547
|
+
}), ct = t.object({
|
|
531
548
|
universal_login_experience: t.enum(["new", "classic"]).default("new"),
|
|
532
549
|
identifier_first: t.boolean().default(!0),
|
|
533
550
|
password_first: t.boolean().default(!1),
|
|
534
551
|
webauthn_platform_first_factor: t.boolean()
|
|
535
|
-
}),
|
|
552
|
+
}), pt = t.object({
|
|
536
553
|
name: t.string(),
|
|
537
554
|
enabled: t.boolean().optional().default(!0),
|
|
538
555
|
default_from_address: t.string().optional(),
|
|
@@ -562,7 +579,7 @@ const F = t.object({
|
|
|
562
579
|
})
|
|
563
580
|
]),
|
|
564
581
|
settings: t.object({}).optional()
|
|
565
|
-
}),
|
|
582
|
+
}), W = t.object({
|
|
566
583
|
// The actual refresh token value (primary key).
|
|
567
584
|
token: t.string(),
|
|
568
585
|
// Link to the session record (foreign key).
|
|
@@ -576,16 +593,16 @@ const F = t.object({
|
|
|
576
593
|
used_at: t.string().optional(),
|
|
577
594
|
// If the token is revoked or deleted.
|
|
578
595
|
revoked_at: t.string().optional()
|
|
579
|
-
}),
|
|
596
|
+
}), dt = t.object({
|
|
580
597
|
// When the refresh token record was created.
|
|
581
598
|
created_at: t.string(),
|
|
582
599
|
// Spread in the rest of the refresh token properties.
|
|
583
|
-
...
|
|
600
|
+
...W.shape
|
|
584
601
|
});
|
|
585
|
-
function gt(
|
|
586
|
-
const [i, o] =
|
|
602
|
+
function gt(e) {
|
|
603
|
+
const [i, o] = e.split("|");
|
|
587
604
|
if (!i || !o)
|
|
588
|
-
throw new Error(`Invalid user_id: ${
|
|
605
|
+
throw new Error(`Invalid user_id: ${e}`);
|
|
589
606
|
return { connection: i, id: o };
|
|
590
607
|
}
|
|
591
608
|
export {
|
|
@@ -593,56 +610,56 @@ export {
|
|
|
593
610
|
l as AuthorizationResponseMode,
|
|
594
611
|
r as AuthorizationResponseType,
|
|
595
612
|
c as CodeChallengeMethod,
|
|
596
|
-
|
|
613
|
+
F as GrantType,
|
|
597
614
|
U as LogTypes,
|
|
598
615
|
b as applicationInsertSchema,
|
|
599
616
|
f as applicationSchema,
|
|
600
|
-
|
|
617
|
+
V as auth0UserResponseSchema,
|
|
601
618
|
S as authParamsSchema,
|
|
602
|
-
|
|
603
|
-
|
|
604
|
-
|
|
619
|
+
a as baseUserSchema,
|
|
620
|
+
H as bordersSchema,
|
|
621
|
+
X as brandingSchema,
|
|
605
622
|
j as codeInsertSchema,
|
|
606
|
-
|
|
623
|
+
J as codeSchema,
|
|
607
624
|
I as codeTypeSchema,
|
|
608
|
-
|
|
625
|
+
K as colorsSchema,
|
|
609
626
|
k as connectionInsertSchema,
|
|
610
627
|
y as connectionSchema,
|
|
611
628
|
v as domainInsertSchema,
|
|
612
|
-
|
|
613
|
-
|
|
614
|
-
|
|
615
|
-
|
|
629
|
+
Z as domainSchema,
|
|
630
|
+
pt as emailProviderSchema,
|
|
631
|
+
n as fontDetailsSchema,
|
|
632
|
+
G as fontsSchema,
|
|
616
633
|
A as hookInsertSchema,
|
|
617
|
-
|
|
618
|
-
|
|
619
|
-
|
|
634
|
+
$ as hookSchema,
|
|
635
|
+
d as identitySchema,
|
|
636
|
+
tt as jwksKeySchema,
|
|
620
637
|
O as jwksSchema,
|
|
621
|
-
|
|
638
|
+
it as logSchema,
|
|
622
639
|
N as loginInsertSchema,
|
|
623
640
|
nt as loginSchema,
|
|
624
|
-
|
|
625
|
-
|
|
641
|
+
et as openIDConfigurationSchema,
|
|
642
|
+
L as pageBackgroundSchema,
|
|
626
643
|
gt as parseUserId,
|
|
627
644
|
T as passwordInsertSchema,
|
|
628
|
-
|
|
645
|
+
ot as passwordSchema,
|
|
629
646
|
p as profileDataSchema,
|
|
630
|
-
|
|
631
|
-
|
|
632
|
-
|
|
647
|
+
ct as promptSettingSchema,
|
|
648
|
+
W as refreshTokenInsertSchema,
|
|
649
|
+
dt as refreshTokenSchema,
|
|
633
650
|
h as samlpAddon,
|
|
634
|
-
|
|
635
|
-
|
|
651
|
+
P as sessionInsertSchema,
|
|
652
|
+
st as sessionSchema,
|
|
636
653
|
at as signingKeySchema,
|
|
637
654
|
E as tenantInsertSchema,
|
|
638
|
-
|
|
639
|
-
|
|
640
|
-
|
|
641
|
-
|
|
642
|
-
|
|
643
|
-
|
|
644
|
-
|
|
655
|
+
w as tenantSchema,
|
|
656
|
+
M as themeInsertSchema,
|
|
657
|
+
lt as themeSchema,
|
|
658
|
+
rt as tokenResponseSchema,
|
|
659
|
+
Q as totalsSchema,
|
|
660
|
+
g as userInsertSchema,
|
|
661
|
+
Y as userResponseSchema,
|
|
645
662
|
_ as userSchema,
|
|
646
|
-
|
|
663
|
+
z as vendorSettingsSchema,
|
|
647
664
|
B as widgetSchema
|
|
648
665
|
};
|