@authhero/adapter-interfaces 0.41.0 → 0.43.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let L=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>L()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),E=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...E.shape,id:t.z.string()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=C.extend({...a.shape,hook_id:t.z.string()}),w=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(w)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({session_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string(),used_at:t.z.string(),deleted_at:t.z.string().optional(),user_id:t.z.string()}),it=t.z.object({created_at:t.z.string(),...U.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const at=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),st=F.extend({themeId:t.z.string()}),rt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),lt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),ct=t.z.object({created_at:t.z.string(),...H.shape});function pt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=E;exports.domainSchema=Y;exports.emailProviderSchema=lt;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=C;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=w;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=pt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=rt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=ct;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=st;exports.tokenResponseSchema=at;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,L=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),it=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),U=t.z.object({id:t.z.string(),session_id:t.z.string().optional(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:it.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...U.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),rt=F.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),pt=t.z.object({created_at:t.z.string(),...H.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=Y;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=L;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
@@ -1136,6 +1136,7 @@ declare const ClientSchema: z.ZodObject<{
1136
1136
  email_service?: string | undefined;
1137
1137
  }>, "many">;
1138
1138
  tenant: z.ZodObject<{
1139
+ id: z.ZodString;
1139
1140
  name: z.ZodString;
1140
1141
  audience: z.ZodString;
1141
1142
  sender_email: z.ZodString;
@@ -1147,7 +1148,6 @@ declare const ClientSchema: z.ZodObject<{
1147
1148
  language: z.ZodOptional<z.ZodString>;
1148
1149
  created_at: z.ZodEffects<z.ZodString, string, string>;
1149
1150
  updated_at: z.ZodEffects<z.ZodString, string, string>;
1150
- id: z.ZodString;
1151
1151
  }, "strip", z.ZodTypeAny, {
1152
1152
  created_at: string;
1153
1153
  updated_at: string;
@@ -2697,52 +2697,155 @@ export declare const passwordSchema: z.ZodObject<{
2697
2697
  }>;
2698
2698
  export type Password = z.infer<typeof passwordSchema>;
2699
2699
  export declare const sessionInsertSchema: z.ZodObject<{
2700
- session_id: z.ZodString;
2700
+ id: z.ZodString;
2701
+ session_id: z.ZodOptional<z.ZodString>;
2701
2702
  client_id: z.ZodString;
2702
- expires_at: z.ZodString;
2703
+ revoked_at: z.ZodOptional<z.ZodString>;
2703
2704
  used_at: z.ZodString;
2704
- deleted_at: z.ZodOptional<z.ZodString>;
2705
2705
  user_id: z.ZodString;
2706
+ expires_at: z.ZodOptional<z.ZodString>;
2707
+ idle_expires_at: z.ZodOptional<z.ZodString>;
2708
+ device: z.ZodObject<{
2709
+ initial_user_agent: z.ZodString;
2710
+ initial_ip: z.ZodString;
2711
+ initial_asn: z.ZodString;
2712
+ last_user_agent: z.ZodString;
2713
+ last_ip: z.ZodString;
2714
+ last_asn: z.ZodString;
2715
+ }, "strip", z.ZodTypeAny, {
2716
+ last_ip: string;
2717
+ initial_user_agent: string;
2718
+ initial_ip: string;
2719
+ initial_asn: string;
2720
+ last_user_agent: string;
2721
+ last_asn: string;
2722
+ }, {
2723
+ last_ip: string;
2724
+ initial_user_agent: string;
2725
+ initial_ip: string;
2726
+ initial_asn: string;
2727
+ last_user_agent: string;
2728
+ last_asn: string;
2729
+ }>;
2730
+ clients: z.ZodArray<z.ZodString, "many">;
2706
2731
  }, "strip", z.ZodTypeAny, {
2707
2732
  user_id: string;
2733
+ id: string;
2708
2734
  client_id: string;
2709
- expires_at: string;
2710
2735
  used_at: string;
2711
- session_id: string;
2712
- deleted_at?: string | undefined;
2736
+ device: {
2737
+ last_ip: string;
2738
+ initial_user_agent: string;
2739
+ initial_ip: string;
2740
+ initial_asn: string;
2741
+ last_user_agent: string;
2742
+ last_asn: string;
2743
+ };
2744
+ clients: string[];
2745
+ expires_at?: string | undefined;
2746
+ session_id?: string | undefined;
2747
+ revoked_at?: string | undefined;
2748
+ idle_expires_at?: string | undefined;
2713
2749
  }, {
2714
2750
  user_id: string;
2751
+ id: string;
2715
2752
  client_id: string;
2716
- expires_at: string;
2717
2753
  used_at: string;
2718
- session_id: string;
2719
- deleted_at?: string | undefined;
2754
+ device: {
2755
+ last_ip: string;
2756
+ initial_user_agent: string;
2757
+ initial_ip: string;
2758
+ initial_asn: string;
2759
+ last_user_agent: string;
2760
+ last_asn: string;
2761
+ };
2762
+ clients: string[];
2763
+ expires_at?: string | undefined;
2764
+ session_id?: string | undefined;
2765
+ revoked_at?: string | undefined;
2766
+ idle_expires_at?: string | undefined;
2720
2767
  }>;
2721
2768
  export type SessionInsert = z.infer<typeof sessionInsertSchema>;
2722
2769
  export declare const sessionSchema: z.ZodObject<{
2723
- session_id: z.ZodString;
2770
+ id: z.ZodString;
2771
+ session_id: z.ZodOptional<z.ZodString>;
2724
2772
  client_id: z.ZodString;
2725
- expires_at: z.ZodString;
2773
+ revoked_at: z.ZodOptional<z.ZodString>;
2726
2774
  used_at: z.ZodString;
2727
- deleted_at: z.ZodOptional<z.ZodString>;
2728
2775
  user_id: z.ZodString;
2776
+ expires_at: z.ZodOptional<z.ZodString>;
2777
+ idle_expires_at: z.ZodOptional<z.ZodString>;
2778
+ device: z.ZodObject<{
2779
+ initial_user_agent: z.ZodString;
2780
+ initial_ip: z.ZodString;
2781
+ initial_asn: z.ZodString;
2782
+ last_user_agent: z.ZodString;
2783
+ last_ip: z.ZodString;
2784
+ last_asn: z.ZodString;
2785
+ }, "strip", z.ZodTypeAny, {
2786
+ last_ip: string;
2787
+ initial_user_agent: string;
2788
+ initial_ip: string;
2789
+ initial_asn: string;
2790
+ last_user_agent: string;
2791
+ last_asn: string;
2792
+ }, {
2793
+ last_ip: string;
2794
+ initial_user_agent: string;
2795
+ initial_ip: string;
2796
+ initial_asn: string;
2797
+ last_user_agent: string;
2798
+ last_asn: string;
2799
+ }>;
2800
+ clients: z.ZodArray<z.ZodString, "many">;
2729
2801
  created_at: z.ZodString;
2802
+ updated_at: z.ZodString;
2803
+ authenticated_at: z.ZodString;
2804
+ last_interaction_at: z.ZodString;
2730
2805
  }, "strip", z.ZodTypeAny, {
2731
2806
  created_at: string;
2807
+ updated_at: string;
2732
2808
  user_id: string;
2809
+ id: string;
2733
2810
  client_id: string;
2734
- expires_at: string;
2735
2811
  used_at: string;
2736
- session_id: string;
2737
- deleted_at?: string | undefined;
2812
+ device: {
2813
+ last_ip: string;
2814
+ initial_user_agent: string;
2815
+ initial_ip: string;
2816
+ initial_asn: string;
2817
+ last_user_agent: string;
2818
+ last_asn: string;
2819
+ };
2820
+ clients: string[];
2821
+ authenticated_at: string;
2822
+ last_interaction_at: string;
2823
+ expires_at?: string | undefined;
2824
+ session_id?: string | undefined;
2825
+ revoked_at?: string | undefined;
2826
+ idle_expires_at?: string | undefined;
2738
2827
  }, {
2739
2828
  created_at: string;
2829
+ updated_at: string;
2740
2830
  user_id: string;
2831
+ id: string;
2741
2832
  client_id: string;
2742
- expires_at: string;
2743
2833
  used_at: string;
2744
- session_id: string;
2745
- deleted_at?: string | undefined;
2834
+ device: {
2835
+ last_ip: string;
2836
+ initial_user_agent: string;
2837
+ initial_ip: string;
2838
+ initial_asn: string;
2839
+ last_user_agent: string;
2840
+ last_asn: string;
2841
+ };
2842
+ clients: string[];
2843
+ authenticated_at: string;
2844
+ last_interaction_at: string;
2845
+ expires_at?: string | undefined;
2846
+ session_id?: string | undefined;
2847
+ revoked_at?: string | undefined;
2848
+ idle_expires_at?: string | undefined;
2746
2849
  }>;
2747
2850
  export type Session = z.infer<typeof sessionSchema>;
2748
2851
  export declare const signingKeySchema: z.ZodObject<{
@@ -2763,6 +2866,7 @@ export declare const signingKeySchema: z.ZodObject<{
2763
2866
  cert: string;
2764
2867
  fingerprint: string;
2765
2868
  thumbprint: string;
2869
+ revoked_at?: string | undefined;
2766
2870
  pkcs7?: string | undefined;
2767
2871
  current?: boolean | undefined;
2768
2872
  next?: boolean | undefined;
@@ -2770,12 +2874,12 @@ export declare const signingKeySchema: z.ZodObject<{
2770
2874
  current_since?: string | undefined;
2771
2875
  current_until?: string | undefined;
2772
2876
  revoked?: boolean | undefined;
2773
- revoked_at?: string | undefined;
2774
2877
  }, {
2775
2878
  kid: string;
2776
2879
  cert: string;
2777
2880
  fingerprint: string;
2778
2881
  thumbprint: string;
2882
+ revoked_at?: string | undefined;
2779
2883
  pkcs7?: string | undefined;
2780
2884
  current?: boolean | undefined;
2781
2885
  next?: boolean | undefined;
@@ -2783,7 +2887,6 @@ export declare const signingKeySchema: z.ZodObject<{
2783
2887
  current_since?: string | undefined;
2784
2888
  current_until?: string | undefined;
2785
2889
  revoked?: boolean | undefined;
2786
- revoked_at?: string | undefined;
2787
2890
  }>;
2788
2891
  export type SigningKey = z.infer<typeof signingKeySchema>;
2789
2892
  export declare const tenantInsertSchema: z.ZodObject<{
@@ -2796,11 +2899,13 @@ export declare const tenantInsertSchema: z.ZodObject<{
2796
2899
  primary_color: z.ZodOptional<z.ZodString>;
2797
2900
  secondary_color: z.ZodOptional<z.ZodString>;
2798
2901
  language: z.ZodOptional<z.ZodString>;
2902
+ id: z.ZodOptional<z.ZodString>;
2799
2903
  }, "strip", z.ZodTypeAny, {
2800
2904
  name: string;
2801
2905
  audience: string;
2802
2906
  sender_email: string;
2803
2907
  sender_name: string;
2908
+ id?: string | undefined;
2804
2909
  support_url?: string | undefined;
2805
2910
  logo?: string | undefined;
2806
2911
  primary_color?: string | undefined;
@@ -2811,6 +2916,7 @@ export declare const tenantInsertSchema: z.ZodObject<{
2811
2916
  audience: string;
2812
2917
  sender_email: string;
2813
2918
  sender_name: string;
2919
+ id?: string | undefined;
2814
2920
  support_url?: string | undefined;
2815
2921
  logo?: string | undefined;
2816
2922
  primary_color?: string | undefined;
@@ -2818,6 +2924,7 @@ export declare const tenantInsertSchema: z.ZodObject<{
2818
2924
  language?: string | undefined;
2819
2925
  }>;
2820
2926
  export declare const tenantSchema: z.ZodObject<{
2927
+ id: z.ZodString;
2821
2928
  name: z.ZodString;
2822
2929
  audience: z.ZodString;
2823
2930
  sender_email: z.ZodString;
@@ -2829,7 +2936,6 @@ export declare const tenantSchema: z.ZodObject<{
2829
2936
  language: z.ZodOptional<z.ZodString>;
2830
2937
  created_at: z.ZodEffects<z.ZodString, string, string>;
2831
2938
  updated_at: z.ZodEffects<z.ZodString, string, string>;
2832
- id: z.ZodString;
2833
2939
  }, "strip", z.ZodTypeAny, {
2834
2940
  created_at: string;
2835
2941
  updated_at: string;
@@ -2857,20 +2963,7 @@ export declare const tenantSchema: z.ZodObject<{
2857
2963
  secondary_color?: string | undefined;
2858
2964
  language?: string | undefined;
2859
2965
  }>;
2860
- export interface Tenant {
2861
- id: string;
2862
- name: string;
2863
- audience: string;
2864
- sender_email: string;
2865
- sender_name: string;
2866
- support_url?: string;
2867
- logo?: string;
2868
- primary_color?: string;
2869
- secondary_color?: string;
2870
- language?: string;
2871
- created_at: string;
2872
- updated_at: string;
2873
- }
2966
+ export type Tenant = z.infer<typeof tenantSchema>;
2874
2967
  export declare const vendorSettingsSchema: z.ZodObject<{
2875
2968
  logoUrl: z.ZodString;
2876
2969
  loginBackgroundImage: z.ZodOptional<z.ZodNullable<z.ZodString>>;
@@ -4298,9 +4391,7 @@ export interface SessionsAdapter {
4298
4391
  create: (tenant_id: string, session: SessionInsert) => Promise<Session>;
4299
4392
  get: (tenant_id: string, id: string) => Promise<Session | null>;
4300
4393
  list(tenantId: string, params?: ListParams): Promise<ListSesssionsResponse>;
4301
- update: (tenant_id: string, id: string, session: {
4302
- used_at: string;
4303
- }) => Promise<boolean>;
4394
+ update: (tenant_id: string, id: string, session: Partial<Session>) => Promise<boolean>;
4304
4395
  remove: (tenant_id: string, id: string) => Promise<boolean>;
4305
4396
  }
4306
4397
  export interface CreateTenantParams {
@@ -1,9 +1,9 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const q = t.object({
2
+ const Q = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
6
- }), a = t.object({
6
+ }), s = t.object({
7
7
  created_at: t.string(),
8
8
  updated_at: t.string()
9
9
  }), p = t.object({
@@ -15,7 +15,7 @@ const q = t.object({
15
15
  phone_number: t.string().optional(),
16
16
  phone_verified: t.boolean().optional(),
17
17
  family_name: t.string().optional()
18
- }).catchall(t.any()), g = t.object({
18
+ }).catchall(t.any()), d = t.object({
19
19
  connection: t.string(),
20
20
  user_id: t.string(),
21
21
  provider: t.string(),
@@ -24,7 +24,7 @@ const q = t.object({
24
24
  access_token_secret: t.string().optional(),
25
25
  refresh_token: t.string().optional(),
26
26
  profileData: p.optional()
27
- }), s = t.object({
27
+ }), a = t.object({
28
28
  email: t.string().optional(),
29
29
  username: t.string().optional(),
30
30
  given_name: t.string().optional(),
@@ -38,7 +38,7 @@ const q = t.object({
38
38
  user_id: t.string().optional(),
39
39
  app_metadata: t.any().default({}).optional(),
40
40
  user_metadata: t.any().default({}).optional()
41
- }), d = s.extend({
41
+ }), g = a.extend({
42
42
  email_verified: t.boolean().default(!1),
43
43
  verify_email: t.boolean().optional(),
44
44
  last_ip: t.string().optional(),
@@ -48,15 +48,15 @@ const q = t.object({
48
48
  connection: t.string().default("email"),
49
49
  is_social: t.boolean().optional()
50
50
  }), _ = t.object({
51
- ...d.shape,
52
- ...a.shape,
51
+ ...g.shape,
52
+ ...s.shape,
53
53
  user_id: t.string(),
54
54
  is_social: t.boolean(),
55
55
  // TODO: this not might be correct if you use the username
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
- identities: t.array(g).optional()
59
- }), Q = _, V = s.extend({
58
+ identities: t.array(d).optional()
59
+ }), V = _, Y = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
@@ -64,10 +64,10 @@ const q = t.object({
64
64
  last_login: t.string().optional(),
65
65
  user_id: t.string()
66
66
  }).catchall(t.any()), u = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
67
- let m = (n = 21) => {
68
- let i = "", o = crypto.getRandomValues(new Uint8Array(n));
69
- for (; n--; )
70
- i += u[o[n] & 63];
67
+ let m = (e = 21) => {
68
+ let i = "", o = crypto.getRandomValues(new Uint8Array(e));
69
+ for (; e--; )
70
+ i += u[o[e] & 63];
71
71
  return i;
72
72
  };
73
73
  const h = t.object({
@@ -118,11 +118,11 @@ const h = t.object({
118
118
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
119
119
  })
120
120
  }), f = t.object({
121
- created_at: t.string().transform((n) => n === null ? "" : n),
122
- updated_at: t.string().transform((n) => n === null ? "" : n),
121
+ created_at: t.string().transform((e) => e === null ? "" : e),
122
+ updated_at: t.string().transform((e) => e === null ? "" : e),
123
123
  ...b.shape
124
124
  });
125
- var r = /* @__PURE__ */ ((n) => (n.TOKEN = "token", n.TOKEN_ID_TOKEN = "token id_token", n.CODE = "code", n))(r || {}), l = /* @__PURE__ */ ((n) => (n.QUERY = "query", n.FRAGMENT = "fragment", n.FORM_POST = "form_post", n.WEB_MESSAGE = "web_message", n.SAML_POST = "saml_post", n))(l || {}), c = /* @__PURE__ */ ((n) => (n.S256 = "S256", n.Plain = "plain", n))(c || {});
125
+ var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
126
126
  const S = t.object({
127
127
  client_id: t.string(),
128
128
  vendor_id: t.string().optional(),
@@ -139,7 +139,7 @@ const S = t.object({
139
139
  code_challenge: t.string().optional(),
140
140
  username: t.string().optional(),
141
141
  ui_locales: t.string().optional()
142
- }), Y = t.object({
142
+ }), X = t.object({
143
143
  colors: t.object({
144
144
  primary: t.string(),
145
145
  page_background: t.object({
@@ -178,8 +178,8 @@ const S = t.object({
178
178
  response_mode: t.custom().optional()
179
179
  }), y = t.object({
180
180
  id: t.string(),
181
- created_at: t.string().transform((n) => n === null ? "" : n),
182
- updated_at: t.string().transform((n) => n === null ? "" : n)
181
+ created_at: t.string().transform((e) => e === null ? "" : e),
182
+ updated_at: t.string().transform((e) => e === null ? "" : e)
183
183
  }).extend(k.shape), E = t.object({
184
184
  name: t.string(),
185
185
  audience: t.string(),
@@ -189,13 +189,14 @@ const S = t.object({
189
189
  logo: t.string().url().optional(),
190
190
  primary_color: t.string().optional(),
191
191
  secondary_color: t.string().optional(),
192
- language: t.string().optional()
193
- }), C = t.object({
194
- created_at: t.string().transform((n) => n === null ? "" : n),
195
- updated_at: t.string().transform((n) => n === null ? "" : n),
196
- id: t.string(),
197
- ...E.shape
198
- }), X = t.object({
192
+ language: t.string().optional(),
193
+ id: t.string().optional()
194
+ }), w = t.object({
195
+ created_at: t.string().transform((e) => e === null ? "" : e),
196
+ updated_at: t.string().transform((e) => e === null ? "" : e),
197
+ ...E.shape,
198
+ id: t.string()
199
+ }), z = t.object({
199
200
  logoUrl: t.string(),
200
201
  loginBackgroundImage: t.string().nullish(),
201
202
  style: t.object({
@@ -212,7 +213,7 @@ const S = t.object({
212
213
  checkoutHideSocial: t.boolean().optional(),
213
214
  siteUrl: t.string().nullable(),
214
215
  manageSubscriptionsUrl: t.string().optional()
215
- }), w = t.object({
216
+ }), C = t.object({
216
217
  domain: t.string(),
217
218
  dkim_private_key: t.string().optional(),
218
219
  dkim_public_key: t.string().optional(),
@@ -221,8 +222,8 @@ const S = t.object({
221
222
  });
222
223
  t.object({
223
224
  ...f.shape,
224
- domains: t.array(w),
225
- tenant: C,
225
+ domains: t.array(C),
226
+ tenant: w,
226
227
  connections: t.array(y)
227
228
  });
228
229
  const I = t.enum([
@@ -249,7 +250,7 @@ const I = t.enum([
249
250
  expires_at: t.string(),
250
251
  used_at: t.string().optional(),
251
252
  user_id: t.string().optional()
252
- }), z = t.object({
253
+ }), J = t.object({
253
254
  ...j.shape,
254
255
  created_at: t.string()
255
256
  }), v = t.object({
@@ -258,7 +259,7 @@ const I = t.enum([
258
259
  dkim_public_key: t.string().optional(),
259
260
  email_api_key: t.string().optional(),
260
261
  email_service: t.string().optional()
261
- }), J = a.extend({
262
+ }), Z = s.extend({
262
263
  ...v.shape,
263
264
  id: t.string()
264
265
  }), A = t.object({
@@ -272,8 +273,8 @@ const I = t.enum([
272
273
  hook_id: t.string().optional(),
273
274
  synchronous: t.boolean().default(!1),
274
275
  priority: t.number().optional()
275
- }), Z = A.extend({
276
- ...a.shape,
276
+ }), $ = A.extend({
277
+ ...s.shape,
277
278
  hook_id: t.string()
278
279
  }), O = t.object({
279
280
  alg: t.enum([
@@ -294,9 +295,9 @@ const I = t.enum([
294
295
  x5t: t.string().optional(),
295
296
  x5c: t.array(t.string()).optional(),
296
297
  use: t.enum(["sig", "enc"]).optional()
297
- }), $ = t.object({
298
- keys: t.array(O)
299
298
  }), tt = t.object({
299
+ keys: t.array(O)
300
+ }), et = t.object({
300
301
  issuer: t.string(),
301
302
  authorization_endpoint: t.string(),
302
303
  token_endpoint: t.string(),
@@ -334,7 +335,7 @@ const I = t.enum([
334
335
  created_at: t.string(),
335
336
  updated_at: t.string()
336
337
  });
337
- var U = /* @__PURE__ */ ((n) => (n.FAILED_SILENT_AUTH = "fsa", n.FAILED_SIGNUP = "fs", n.FAILED_LOGIN = "f", n.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", n.FAILED_CHANGE_PASSWORD = "fcp", n.FAILED_BY_CONNECTOR = "fc", n.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", n.FAILED_HOOK = "fh", n.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", n.SUCCESS_API_OPERATION = "sapi", n.SUCCESS_CHANGE_PASSWORD = "scp", n.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", n.SUCCESS_CHANGE_USERNAME = "scu", n.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", n.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", n.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", n.SUCCESS_LOGIN = "s", n.SUCCESS_LOGOUT = "slo", n.SUCCESS_SIGNUP = "ss", n.SUCCESS_SILENT_AUTH = "ssa", n.SUCCESS_VERIFICATION_EMAIL = "sv", n.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", n.CODE_LINK_SENT = "cls", n.BLOCKED_ACCOUNT_EMAIL = "limit_wc", n.BLOCKED_ACCOUNT_IP = "limit_sul", n.BLOCKED_IP_ADDRESS = "limit_mu", n))(U || {});
338
+ var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
338
339
  const R = t.enum([
339
340
  "cls",
340
341
  // CODE_LINK_SENT
@@ -390,7 +391,7 @@ const R = t.enum([
390
391
  env: t.object({
391
392
  node: t.string().optional()
392
393
  }).optional()
393
- }), et = t.object({
394
+ }), it = t.object({
394
395
  type: R,
395
396
  date: t.string(),
396
397
  description: t.string().optional(),
@@ -417,20 +418,37 @@ const R = t.enum([
417
418
  user_id: t.string(),
418
419
  password: t.string(),
419
420
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
420
- }), it = t.object({
421
+ }), ot = t.object({
421
422
  ...T.shape,
422
423
  created_at: t.string(),
423
424
  updated_at: t.string()
424
425
  }), x = t.object({
425
- session_id: t.string(),
426
+ initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
427
+ initial_ip: t.string().describe("First IP address associated with this session"),
428
+ initial_asn: t.string().describe("First autonomous system number associated with this session"),
429
+ last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
430
+ last_ip: t.string().describe("Last IP address from which this user logged in"),
431
+ last_asn: t.string().describe("Last autonomous system number from which this user logged in")
432
+ }), P = t.object({
433
+ id: t.string(),
434
+ // TODO: Remove once data migrated
435
+ session_id: t.string().optional(),
426
436
  client_id: t.string(),
427
- expires_at: t.string(),
437
+ revoked_at: t.string().optional(),
428
438
  used_at: t.string(),
429
- deleted_at: t.string().optional(),
430
- user_id: t.string()
431
- }), ot = t.object({
439
+ user_id: t.string().describe("The user ID associated with the session"),
440
+ expires_at: t.string().optional(),
441
+ idle_expires_at: t.string().optional(),
442
+ device: x.describe(
443
+ "Metadata related to the device used in the session"
444
+ ),
445
+ clients: t.array(t.string()).describe("List of client details for the session")
446
+ }), st = t.object({
432
447
  created_at: t.string(),
433
- ...x.shape
448
+ updated_at: t.string(),
449
+ authenticated_at: t.string(),
450
+ last_interaction_at: t.string(),
451
+ ...P.shape
434
452
  }), at = t.object({
435
453
  kid: t.string().openapi({ description: "The key id of the signing key" }),
436
454
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
@@ -451,8 +469,8 @@ const R = t.enum([
451
469
  revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
452
470
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
453
471
  });
454
- var P = /* @__PURE__ */ ((n) => (n.RefreshToken = "refresh_token", n.AuthorizationCode = "authorization_code", n.ClientCredential = "client_credentials", n.Passwordless = "passwordless", n.Password = "password", n))(P || {});
455
- const st = t.object({
472
+ var F = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(F || {});
473
+ const rt = t.object({
456
474
  access_token: t.string(),
457
475
  id_token: t.string().optional(),
458
476
  scope: t.string().optional(),
@@ -465,7 +483,7 @@ t.object({
465
483
  code: t.string(),
466
484
  state: t.string().optional()
467
485
  });
468
- const F = t.object({
486
+ const H = t.object({
469
487
  button_border_radius: t.number(),
470
488
  button_border_weight: t.number(),
471
489
  buttons_style: t.enum(["pill"]),
@@ -475,7 +493,7 @@ const F = t.object({
475
493
  show_widget_shadow: t.boolean(),
476
494
  widget_border_weight: t.number(),
477
495
  widget_corner_radius: t.number()
478
- }), H = t.object({
496
+ }), K = t.object({
479
497
  base_focus_color: t.string(),
480
498
  base_hover_color: t.string(),
481
499
  body_text: t.string(),
@@ -495,20 +513,20 @@ const F = t.object({
495
513
  success: t.string(),
496
514
  widget_background: t.string(),
497
515
  widget_border: t.string()
498
- }), e = t.object({
516
+ }), n = t.object({
499
517
  bold: t.boolean(),
500
518
  size: t.number()
501
- }), K = t.object({
502
- body_text: e,
503
- buttons_text: e,
519
+ }), G = t.object({
520
+ body_text: n,
521
+ buttons_text: n,
504
522
  font_url: t.string(),
505
- input_labels: e,
506
- links: e,
523
+ input_labels: n,
524
+ links: n,
507
525
  links_style: t.enum(["normal"]),
508
526
  reference_text_size: t.number(),
509
- subtitle: e,
510
- title: e
511
- }), G = t.object({
527
+ subtitle: n,
528
+ title: n
529
+ }), L = t.object({
512
530
  background_color: t.string(),
513
531
  background_image_url: t.string(),
514
532
  page_layout: t.enum(["center"])
@@ -518,21 +536,21 @@ const F = t.object({
518
536
  logo_position: t.enum(["center"]),
519
537
  logo_url: t.string(),
520
538
  social_buttons_layout: t.enum(["bottom"])
521
- }), L = t.object({
522
- borders: F,
523
- colors: H,
539
+ }), M = t.object({
540
+ borders: H,
541
+ colors: K,
524
542
  displayName: t.string(),
525
- fonts: K,
526
- page_background: G,
543
+ fonts: G,
544
+ page_background: L,
527
545
  widget: B
528
- }), rt = L.extend({
546
+ }), lt = M.extend({
529
547
  themeId: t.string()
530
- }), lt = t.object({
548
+ }), ct = t.object({
531
549
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
532
550
  identifier_first: t.boolean().default(!0),
533
551
  password_first: t.boolean().default(!1),
534
552
  webauthn_platform_first_factor: t.boolean()
535
- }), ct = t.object({
553
+ }), pt = t.object({
536
554
  name: t.string(),
537
555
  enabled: t.boolean().optional().default(!0),
538
556
  default_from_address: t.string().optional(),
@@ -562,7 +580,7 @@ const F = t.object({
562
580
  })
563
581
  ]),
564
582
  settings: t.object({}).optional()
565
- }), M = t.object({
583
+ }), W = t.object({
566
584
  // The actual refresh token value (primary key).
567
585
  token: t.string(),
568
586
  // Link to the session record (foreign key).
@@ -576,16 +594,16 @@ const F = t.object({
576
594
  used_at: t.string().optional(),
577
595
  // If the token is revoked or deleted.
578
596
  revoked_at: t.string().optional()
579
- }), pt = t.object({
597
+ }), dt = t.object({
580
598
  // When the refresh token record was created.
581
599
  created_at: t.string(),
582
600
  // Spread in the rest of the refresh token properties.
583
- ...M.shape
601
+ ...W.shape
584
602
  });
585
- function gt(n) {
586
- const [i, o] = n.split("|");
603
+ function gt(e) {
604
+ const [i, o] = e.split("|");
587
605
  if (!i || !o)
588
- throw new Error(`Invalid user_id: ${n}`);
606
+ throw new Error(`Invalid user_id: ${e}`);
589
607
  return { connection: i, id: o };
590
608
  }
591
609
  export {
@@ -593,56 +611,56 @@ export {
593
611
  l as AuthorizationResponseMode,
594
612
  r as AuthorizationResponseType,
595
613
  c as CodeChallengeMethod,
596
- P as GrantType,
614
+ F as GrantType,
597
615
  U as LogTypes,
598
616
  b as applicationInsertSchema,
599
617
  f as applicationSchema,
600
- Q as auth0UserResponseSchema,
618
+ V as auth0UserResponseSchema,
601
619
  S as authParamsSchema,
602
- s as baseUserSchema,
603
- F as bordersSchema,
604
- Y as brandingSchema,
620
+ a as baseUserSchema,
621
+ H as bordersSchema,
622
+ X as brandingSchema,
605
623
  j as codeInsertSchema,
606
- z as codeSchema,
624
+ J as codeSchema,
607
625
  I as codeTypeSchema,
608
- H as colorsSchema,
626
+ K as colorsSchema,
609
627
  k as connectionInsertSchema,
610
628
  y as connectionSchema,
611
629
  v as domainInsertSchema,
612
- J as domainSchema,
613
- ct as emailProviderSchema,
614
- e as fontDetailsSchema,
615
- K as fontsSchema,
630
+ Z as domainSchema,
631
+ pt as emailProviderSchema,
632
+ n as fontDetailsSchema,
633
+ G as fontsSchema,
616
634
  A as hookInsertSchema,
617
- Z as hookSchema,
618
- g as identitySchema,
619
- $ as jwksKeySchema,
635
+ $ as hookSchema,
636
+ d as identitySchema,
637
+ tt as jwksKeySchema,
620
638
  O as jwksSchema,
621
- et as logSchema,
639
+ it as logSchema,
622
640
  N as loginInsertSchema,
623
641
  nt as loginSchema,
624
- tt as openIDConfigurationSchema,
625
- G as pageBackgroundSchema,
642
+ et as openIDConfigurationSchema,
643
+ L as pageBackgroundSchema,
626
644
  gt as parseUserId,
627
645
  T as passwordInsertSchema,
628
- it as passwordSchema,
646
+ ot as passwordSchema,
629
647
  p as profileDataSchema,
630
- lt as promptSettingSchema,
631
- M as refreshTokenInsertSchema,
632
- pt as refreshTokenSchema,
648
+ ct as promptSettingSchema,
649
+ W as refreshTokenInsertSchema,
650
+ dt as refreshTokenSchema,
633
651
  h as samlpAddon,
634
- x as sessionInsertSchema,
635
- ot as sessionSchema,
652
+ P as sessionInsertSchema,
653
+ st as sessionSchema,
636
654
  at as signingKeySchema,
637
655
  E as tenantInsertSchema,
638
- C as tenantSchema,
639
- L as themeInsertSchema,
640
- rt as themeSchema,
641
- st as tokenResponseSchema,
642
- q as totalsSchema,
643
- d as userInsertSchema,
644
- V as userResponseSchema,
656
+ w as tenantSchema,
657
+ M as themeInsertSchema,
658
+ lt as themeSchema,
659
+ rt as tokenResponseSchema,
660
+ Q as totalsSchema,
661
+ g as userInsertSchema,
662
+ Y as userResponseSchema,
645
663
  _ as userSchema,
646
- X as vendorSettingsSchema,
664
+ z as vendorSettingsSchema,
647
665
  B as widgetSchema
648
666
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.41.0",
14
+ "version": "0.43.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],