@authhero/adapter-interfaces 0.42.0 → 0.44.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +148 -52
- package/dist/adapter-interfaces.mjs +88 -83
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,L=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),it=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),U=t.z.object({id:t.z.string(),session_id:t.z.string().optional(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:it.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...U.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),rt=F.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),pt=t.z.object({created_at:t.z.string(),...H.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=Y;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=L;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),V=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(V),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),X=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(C)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),D=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:T,colors:D,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),rt=H.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({token:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U.optional(),resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...K.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=T;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=y;exports.colorsSchema=D;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=C;exports.logSchema=nt;exports.loginInsertSchema=j;exports.loginSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=H;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
|
|
@@ -1136,6 +1136,7 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1136
1136
|
email_service?: string | undefined;
|
|
1137
1137
|
}>, "many">;
|
|
1138
1138
|
tenant: z.ZodObject<{
|
|
1139
|
+
id: z.ZodString;
|
|
1139
1140
|
name: z.ZodString;
|
|
1140
1141
|
audience: z.ZodString;
|
|
1141
1142
|
sender_email: z.ZodString;
|
|
@@ -1147,7 +1148,6 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1147
1148
|
language: z.ZodOptional<z.ZodString>;
|
|
1148
1149
|
created_at: z.ZodEffects<z.ZodString, string, string>;
|
|
1149
1150
|
updated_at: z.ZodEffects<z.ZodString, string, string>;
|
|
1150
|
-
id: z.ZodString;
|
|
1151
1151
|
}, "strip", z.ZodTypeAny, {
|
|
1152
1152
|
created_at: string;
|
|
1153
1153
|
updated_at: string;
|
|
@@ -2698,7 +2698,6 @@ export declare const passwordSchema: z.ZodObject<{
|
|
|
2698
2698
|
export type Password = z.infer<typeof passwordSchema>;
|
|
2699
2699
|
export declare const sessionInsertSchema: z.ZodObject<{
|
|
2700
2700
|
id: z.ZodString;
|
|
2701
|
-
session_id: z.ZodOptional<z.ZodString>;
|
|
2702
2701
|
client_id: z.ZodString;
|
|
2703
2702
|
revoked_at: z.ZodOptional<z.ZodString>;
|
|
2704
2703
|
used_at: z.ZodString;
|
|
@@ -2743,7 +2742,6 @@ export declare const sessionInsertSchema: z.ZodObject<{
|
|
|
2743
2742
|
};
|
|
2744
2743
|
clients: string[];
|
|
2745
2744
|
expires_at?: string | undefined;
|
|
2746
|
-
session_id?: string | undefined;
|
|
2747
2745
|
revoked_at?: string | undefined;
|
|
2748
2746
|
idle_expires_at?: string | undefined;
|
|
2749
2747
|
}, {
|
|
@@ -2761,14 +2759,12 @@ export declare const sessionInsertSchema: z.ZodObject<{
|
|
|
2761
2759
|
};
|
|
2762
2760
|
clients: string[];
|
|
2763
2761
|
expires_at?: string | undefined;
|
|
2764
|
-
session_id?: string | undefined;
|
|
2765
2762
|
revoked_at?: string | undefined;
|
|
2766
2763
|
idle_expires_at?: string | undefined;
|
|
2767
2764
|
}>;
|
|
2768
2765
|
export type SessionInsert = z.infer<typeof sessionInsertSchema>;
|
|
2769
2766
|
export declare const sessionSchema: z.ZodObject<{
|
|
2770
2767
|
id: z.ZodString;
|
|
2771
|
-
session_id: z.ZodOptional<z.ZodString>;
|
|
2772
2768
|
client_id: z.ZodString;
|
|
2773
2769
|
revoked_at: z.ZodOptional<z.ZodString>;
|
|
2774
2770
|
used_at: z.ZodString;
|
|
@@ -2821,7 +2817,6 @@ export declare const sessionSchema: z.ZodObject<{
|
|
|
2821
2817
|
authenticated_at: string;
|
|
2822
2818
|
last_interaction_at: string;
|
|
2823
2819
|
expires_at?: string | undefined;
|
|
2824
|
-
session_id?: string | undefined;
|
|
2825
2820
|
revoked_at?: string | undefined;
|
|
2826
2821
|
idle_expires_at?: string | undefined;
|
|
2827
2822
|
}, {
|
|
@@ -2843,7 +2838,6 @@ export declare const sessionSchema: z.ZodObject<{
|
|
|
2843
2838
|
authenticated_at: string;
|
|
2844
2839
|
last_interaction_at: string;
|
|
2845
2840
|
expires_at?: string | undefined;
|
|
2846
|
-
session_id?: string | undefined;
|
|
2847
2841
|
revoked_at?: string | undefined;
|
|
2848
2842
|
idle_expires_at?: string | undefined;
|
|
2849
2843
|
}>;
|
|
@@ -2899,11 +2893,13 @@ export declare const tenantInsertSchema: z.ZodObject<{
|
|
|
2899
2893
|
primary_color: z.ZodOptional<z.ZodString>;
|
|
2900
2894
|
secondary_color: z.ZodOptional<z.ZodString>;
|
|
2901
2895
|
language: z.ZodOptional<z.ZodString>;
|
|
2896
|
+
id: z.ZodOptional<z.ZodString>;
|
|
2902
2897
|
}, "strip", z.ZodTypeAny, {
|
|
2903
2898
|
name: string;
|
|
2904
2899
|
audience: string;
|
|
2905
2900
|
sender_email: string;
|
|
2906
2901
|
sender_name: string;
|
|
2902
|
+
id?: string | undefined;
|
|
2907
2903
|
support_url?: string | undefined;
|
|
2908
2904
|
logo?: string | undefined;
|
|
2909
2905
|
primary_color?: string | undefined;
|
|
@@ -2914,6 +2910,7 @@ export declare const tenantInsertSchema: z.ZodObject<{
|
|
|
2914
2910
|
audience: string;
|
|
2915
2911
|
sender_email: string;
|
|
2916
2912
|
sender_name: string;
|
|
2913
|
+
id?: string | undefined;
|
|
2917
2914
|
support_url?: string | undefined;
|
|
2918
2915
|
logo?: string | undefined;
|
|
2919
2916
|
primary_color?: string | undefined;
|
|
@@ -2921,6 +2918,7 @@ export declare const tenantInsertSchema: z.ZodObject<{
|
|
|
2921
2918
|
language?: string | undefined;
|
|
2922
2919
|
}>;
|
|
2923
2920
|
export declare const tenantSchema: z.ZodObject<{
|
|
2921
|
+
id: z.ZodString;
|
|
2924
2922
|
name: z.ZodString;
|
|
2925
2923
|
audience: z.ZodString;
|
|
2926
2924
|
sender_email: z.ZodString;
|
|
@@ -2932,7 +2930,6 @@ export declare const tenantSchema: z.ZodObject<{
|
|
|
2932
2930
|
language: z.ZodOptional<z.ZodString>;
|
|
2933
2931
|
created_at: z.ZodEffects<z.ZodString, string, string>;
|
|
2934
2932
|
updated_at: z.ZodEffects<z.ZodString, string, string>;
|
|
2935
|
-
id: z.ZodString;
|
|
2936
2933
|
}, "strip", z.ZodTypeAny, {
|
|
2937
2934
|
created_at: string;
|
|
2938
2935
|
updated_at: string;
|
|
@@ -2960,20 +2957,7 @@ export declare const tenantSchema: z.ZodObject<{
|
|
|
2960
2957
|
secondary_color?: string | undefined;
|
|
2961
2958
|
language?: string | undefined;
|
|
2962
2959
|
}>;
|
|
2963
|
-
export
|
|
2964
|
-
id: string;
|
|
2965
|
-
name: string;
|
|
2966
|
-
audience: string;
|
|
2967
|
-
sender_email: string;
|
|
2968
|
-
sender_name: string;
|
|
2969
|
-
support_url?: string;
|
|
2970
|
-
logo?: string;
|
|
2971
|
-
primary_color?: string;
|
|
2972
|
-
secondary_color?: string;
|
|
2973
|
-
language?: string;
|
|
2974
|
-
created_at: string;
|
|
2975
|
-
updated_at: string;
|
|
2976
|
-
}
|
|
2960
|
+
export type Tenant = z.infer<typeof tenantSchema>;
|
|
2977
2961
|
export declare const vendorSettingsSchema: z.ZodObject<{
|
|
2978
2962
|
logoUrl: z.ZodString;
|
|
2979
2963
|
loginBackgroundImage: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
@@ -4323,56 +4307,168 @@ export type EmailProvider = z.infer<typeof emailProviderSchema>;
|
|
|
4323
4307
|
export declare const refreshTokenInsertSchema: z.ZodObject<{
|
|
4324
4308
|
token: z.ZodString;
|
|
4325
4309
|
session_id: z.ZodString;
|
|
4326
|
-
|
|
4327
|
-
|
|
4328
|
-
|
|
4329
|
-
|
|
4330
|
-
|
|
4310
|
+
user_id: z.ZodString;
|
|
4311
|
+
expires_at: z.ZodOptional<z.ZodString>;
|
|
4312
|
+
idle_expires_at: z.ZodOptional<z.ZodString>;
|
|
4313
|
+
last_exchanged_at: z.ZodOptional<z.ZodString>;
|
|
4314
|
+
device: z.ZodOptional<z.ZodObject<{
|
|
4315
|
+
initial_user_agent: z.ZodString;
|
|
4316
|
+
initial_ip: z.ZodString;
|
|
4317
|
+
initial_asn: z.ZodString;
|
|
4318
|
+
last_user_agent: z.ZodString;
|
|
4319
|
+
last_ip: z.ZodString;
|
|
4320
|
+
last_asn: z.ZodString;
|
|
4321
|
+
}, "strip", z.ZodTypeAny, {
|
|
4322
|
+
last_ip: string;
|
|
4323
|
+
initial_user_agent: string;
|
|
4324
|
+
initial_ip: string;
|
|
4325
|
+
initial_asn: string;
|
|
4326
|
+
last_user_agent: string;
|
|
4327
|
+
last_asn: string;
|
|
4328
|
+
}, {
|
|
4329
|
+
last_ip: string;
|
|
4330
|
+
initial_user_agent: string;
|
|
4331
|
+
initial_ip: string;
|
|
4332
|
+
initial_asn: string;
|
|
4333
|
+
last_user_agent: string;
|
|
4334
|
+
last_asn: string;
|
|
4335
|
+
}>>;
|
|
4336
|
+
resource_servers: z.ZodArray<z.ZodObject<{
|
|
4337
|
+
audience: z.ZodString;
|
|
4338
|
+
scopes: z.ZodString;
|
|
4339
|
+
}, "strip", z.ZodTypeAny, {
|
|
4340
|
+
audience: string;
|
|
4341
|
+
scopes: string;
|
|
4342
|
+
}, {
|
|
4343
|
+
audience: string;
|
|
4344
|
+
scopes: string;
|
|
4345
|
+
}>, "many">;
|
|
4346
|
+
rotating: z.ZodBoolean;
|
|
4331
4347
|
}, "strip", z.ZodTypeAny, {
|
|
4332
|
-
|
|
4348
|
+
user_id: string;
|
|
4333
4349
|
token: string;
|
|
4334
|
-
scope: string;
|
|
4335
|
-
expires_at: string;
|
|
4336
4350
|
session_id: string;
|
|
4337
|
-
|
|
4338
|
-
|
|
4351
|
+
resource_servers: {
|
|
4352
|
+
audience: string;
|
|
4353
|
+
scopes: string;
|
|
4354
|
+
}[];
|
|
4355
|
+
rotating: boolean;
|
|
4356
|
+
expires_at?: string | undefined;
|
|
4357
|
+
idle_expires_at?: string | undefined;
|
|
4358
|
+
device?: {
|
|
4359
|
+
last_ip: string;
|
|
4360
|
+
initial_user_agent: string;
|
|
4361
|
+
initial_ip: string;
|
|
4362
|
+
initial_asn: string;
|
|
4363
|
+
last_user_agent: string;
|
|
4364
|
+
last_asn: string;
|
|
4365
|
+
} | undefined;
|
|
4366
|
+
last_exchanged_at?: string | undefined;
|
|
4339
4367
|
}, {
|
|
4340
|
-
|
|
4368
|
+
user_id: string;
|
|
4341
4369
|
token: string;
|
|
4342
|
-
scope: string;
|
|
4343
|
-
expires_at: string;
|
|
4344
4370
|
session_id: string;
|
|
4345
|
-
|
|
4346
|
-
|
|
4371
|
+
resource_servers: {
|
|
4372
|
+
audience: string;
|
|
4373
|
+
scopes: string;
|
|
4374
|
+
}[];
|
|
4375
|
+
rotating: boolean;
|
|
4376
|
+
expires_at?: string | undefined;
|
|
4377
|
+
idle_expires_at?: string | undefined;
|
|
4378
|
+
device?: {
|
|
4379
|
+
last_ip: string;
|
|
4380
|
+
initial_user_agent: string;
|
|
4381
|
+
initial_ip: string;
|
|
4382
|
+
initial_asn: string;
|
|
4383
|
+
last_user_agent: string;
|
|
4384
|
+
last_asn: string;
|
|
4385
|
+
} | undefined;
|
|
4386
|
+
last_exchanged_at?: string | undefined;
|
|
4347
4387
|
}>;
|
|
4348
4388
|
export type RefreshTokenInsert = z.infer<typeof refreshTokenInsertSchema>;
|
|
4349
4389
|
export declare const refreshTokenSchema: z.ZodObject<{
|
|
4350
4390
|
token: z.ZodString;
|
|
4351
4391
|
session_id: z.ZodString;
|
|
4352
|
-
|
|
4353
|
-
|
|
4354
|
-
|
|
4355
|
-
|
|
4356
|
-
|
|
4392
|
+
user_id: z.ZodString;
|
|
4393
|
+
expires_at: z.ZodOptional<z.ZodString>;
|
|
4394
|
+
idle_expires_at: z.ZodOptional<z.ZodString>;
|
|
4395
|
+
last_exchanged_at: z.ZodOptional<z.ZodString>;
|
|
4396
|
+
device: z.ZodOptional<z.ZodObject<{
|
|
4397
|
+
initial_user_agent: z.ZodString;
|
|
4398
|
+
initial_ip: z.ZodString;
|
|
4399
|
+
initial_asn: z.ZodString;
|
|
4400
|
+
last_user_agent: z.ZodString;
|
|
4401
|
+
last_ip: z.ZodString;
|
|
4402
|
+
last_asn: z.ZodString;
|
|
4403
|
+
}, "strip", z.ZodTypeAny, {
|
|
4404
|
+
last_ip: string;
|
|
4405
|
+
initial_user_agent: string;
|
|
4406
|
+
initial_ip: string;
|
|
4407
|
+
initial_asn: string;
|
|
4408
|
+
last_user_agent: string;
|
|
4409
|
+
last_asn: string;
|
|
4410
|
+
}, {
|
|
4411
|
+
last_ip: string;
|
|
4412
|
+
initial_user_agent: string;
|
|
4413
|
+
initial_ip: string;
|
|
4414
|
+
initial_asn: string;
|
|
4415
|
+
last_user_agent: string;
|
|
4416
|
+
last_asn: string;
|
|
4417
|
+
}>>;
|
|
4418
|
+
resource_servers: z.ZodArray<z.ZodObject<{
|
|
4419
|
+
audience: z.ZodString;
|
|
4420
|
+
scopes: z.ZodString;
|
|
4421
|
+
}, "strip", z.ZodTypeAny, {
|
|
4422
|
+
audience: string;
|
|
4423
|
+
scopes: string;
|
|
4424
|
+
}, {
|
|
4425
|
+
audience: string;
|
|
4426
|
+
scopes: string;
|
|
4427
|
+
}>, "many">;
|
|
4428
|
+
rotating: z.ZodBoolean;
|
|
4357
4429
|
created_at: z.ZodString;
|
|
4358
4430
|
}, "strip", z.ZodTypeAny, {
|
|
4359
4431
|
created_at: string;
|
|
4360
|
-
|
|
4432
|
+
user_id: string;
|
|
4361
4433
|
token: string;
|
|
4362
|
-
scope: string;
|
|
4363
|
-
expires_at: string;
|
|
4364
4434
|
session_id: string;
|
|
4365
|
-
|
|
4366
|
-
|
|
4435
|
+
resource_servers: {
|
|
4436
|
+
audience: string;
|
|
4437
|
+
scopes: string;
|
|
4438
|
+
}[];
|
|
4439
|
+
rotating: boolean;
|
|
4440
|
+
expires_at?: string | undefined;
|
|
4441
|
+
idle_expires_at?: string | undefined;
|
|
4442
|
+
device?: {
|
|
4443
|
+
last_ip: string;
|
|
4444
|
+
initial_user_agent: string;
|
|
4445
|
+
initial_ip: string;
|
|
4446
|
+
initial_asn: string;
|
|
4447
|
+
last_user_agent: string;
|
|
4448
|
+
last_asn: string;
|
|
4449
|
+
} | undefined;
|
|
4450
|
+
last_exchanged_at?: string | undefined;
|
|
4367
4451
|
}, {
|
|
4368
4452
|
created_at: string;
|
|
4369
|
-
|
|
4453
|
+
user_id: string;
|
|
4370
4454
|
token: string;
|
|
4371
|
-
scope: string;
|
|
4372
|
-
expires_at: string;
|
|
4373
4455
|
session_id: string;
|
|
4374
|
-
|
|
4375
|
-
|
|
4456
|
+
resource_servers: {
|
|
4457
|
+
audience: string;
|
|
4458
|
+
scopes: string;
|
|
4459
|
+
}[];
|
|
4460
|
+
rotating: boolean;
|
|
4461
|
+
expires_at?: string | undefined;
|
|
4462
|
+
idle_expires_at?: string | undefined;
|
|
4463
|
+
device?: {
|
|
4464
|
+
last_ip: string;
|
|
4465
|
+
initial_user_agent: string;
|
|
4466
|
+
initial_ip: string;
|
|
4467
|
+
initial_asn: string;
|
|
4468
|
+
last_user_agent: string;
|
|
4469
|
+
last_asn: string;
|
|
4470
|
+
} | undefined;
|
|
4471
|
+
last_exchanged_at?: string | undefined;
|
|
4376
4472
|
}>;
|
|
4377
4473
|
export type RefreshToken = z.infer<typeof refreshTokenSchema>;
|
|
4378
4474
|
export declare function parseUserId(user_id: string): {
|
|
@@ -6,7 +6,7 @@ const Q = t.object({
|
|
|
6
6
|
}), s = t.object({
|
|
7
7
|
created_at: t.string(),
|
|
8
8
|
updated_at: t.string()
|
|
9
|
-
}),
|
|
9
|
+
}), d = t.object({
|
|
10
10
|
email: t.string().optional(),
|
|
11
11
|
email_verified: t.boolean().optional(),
|
|
12
12
|
name: t.string().optional(),
|
|
@@ -15,7 +15,7 @@ const Q = t.object({
|
|
|
15
15
|
phone_number: t.string().optional(),
|
|
16
16
|
phone_verified: t.boolean().optional(),
|
|
17
17
|
family_name: t.string().optional()
|
|
18
|
-
}).catchall(t.any()),
|
|
18
|
+
}).catchall(t.any()), g = t.object({
|
|
19
19
|
connection: t.string(),
|
|
20
20
|
user_id: t.string(),
|
|
21
21
|
provider: t.string(),
|
|
@@ -23,7 +23,7 @@ const Q = t.object({
|
|
|
23
23
|
access_token: t.string().optional(),
|
|
24
24
|
access_token_secret: t.string().optional(),
|
|
25
25
|
refresh_token: t.string().optional(),
|
|
26
|
-
profileData:
|
|
26
|
+
profileData: d.optional()
|
|
27
27
|
}), a = t.object({
|
|
28
28
|
email: t.string().optional(),
|
|
29
29
|
username: t.string().optional(),
|
|
@@ -38,7 +38,7 @@ const Q = t.object({
|
|
|
38
38
|
user_id: t.string().optional(),
|
|
39
39
|
app_metadata: t.any().default({}).optional(),
|
|
40
40
|
user_metadata: t.any().default({}).optional()
|
|
41
|
-
}),
|
|
41
|
+
}), _ = a.extend({
|
|
42
42
|
email_verified: t.boolean().default(!1),
|
|
43
43
|
verify_email: t.boolean().optional(),
|
|
44
44
|
last_ip: t.string().optional(),
|
|
@@ -47,30 +47,30 @@ const Q = t.object({
|
|
|
47
47
|
provider: t.string().default("email"),
|
|
48
48
|
connection: t.string().default("email"),
|
|
49
49
|
is_social: t.boolean().optional()
|
|
50
|
-
}),
|
|
51
|
-
...
|
|
50
|
+
}), u = t.object({
|
|
51
|
+
..._.shape,
|
|
52
52
|
...s.shape,
|
|
53
53
|
user_id: t.string(),
|
|
54
54
|
is_social: t.boolean(),
|
|
55
55
|
// TODO: this not might be correct if you use the username
|
|
56
56
|
email: t.string(),
|
|
57
57
|
login_count: t.number(),
|
|
58
|
-
identities: t.array(
|
|
59
|
-
}), V =
|
|
58
|
+
identities: t.array(g).optional()
|
|
59
|
+
}), V = u, Y = a.extend({
|
|
60
60
|
email: t.string(),
|
|
61
61
|
login_count: t.number(),
|
|
62
62
|
multifactor: t.array(t.string()).optional(),
|
|
63
63
|
last_ip: t.string().optional(),
|
|
64
64
|
last_login: t.string().optional(),
|
|
65
65
|
user_id: t.string()
|
|
66
|
-
}).catchall(t.any()),
|
|
67
|
-
let
|
|
66
|
+
}).catchall(t.any()), m = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
67
|
+
let h = (e = 21) => {
|
|
68
68
|
let i = "", o = crypto.getRandomValues(new Uint8Array(e));
|
|
69
69
|
for (; e--; )
|
|
70
|
-
i +=
|
|
70
|
+
i += m[o[e] & 63];
|
|
71
71
|
return i;
|
|
72
72
|
};
|
|
73
|
-
const
|
|
73
|
+
const b = t.object({
|
|
74
74
|
audience: t.string().optional(),
|
|
75
75
|
recipient: t.string().optional(),
|
|
76
76
|
createUpnClaim: t.boolean().optional(),
|
|
@@ -87,7 +87,7 @@ const h = t.object({
|
|
|
87
87
|
nameIdentifierProbes: t.array(t.string()).optional(),
|
|
88
88
|
authnContextClassRef: t.string().optional(),
|
|
89
89
|
mappings: t.record(t.string()).optional()
|
|
90
|
-
}),
|
|
90
|
+
}), f = t.object({
|
|
91
91
|
id: t.string(),
|
|
92
92
|
name: t.string(),
|
|
93
93
|
callbacks: t.array(t.string()).default([]).optional().openapi({
|
|
@@ -106,24 +106,24 @@ const h = t.object({
|
|
|
106
106
|
description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
|
|
107
107
|
}),
|
|
108
108
|
addons: t.object({
|
|
109
|
-
samlp:
|
|
109
|
+
samlp: b.optional()
|
|
110
110
|
}).default({}).optional().openapi({
|
|
111
111
|
description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
|
|
112
112
|
}),
|
|
113
113
|
email_validation: t.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
|
|
114
114
|
description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
|
|
115
115
|
}),
|
|
116
|
-
client_secret: t.string().default(() =>
|
|
116
|
+
client_secret: t.string().default(() => h()).optional(),
|
|
117
117
|
disable_sign_ups: t.boolean().optional().default(!1).openapi({
|
|
118
118
|
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
119
119
|
})
|
|
120
|
-
}),
|
|
120
|
+
}), S = t.object({
|
|
121
121
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
122
122
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
123
|
-
...
|
|
123
|
+
...f.shape
|
|
124
124
|
});
|
|
125
125
|
var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
|
|
126
|
-
const
|
|
126
|
+
const k = t.object({
|
|
127
127
|
client_id: t.string(),
|
|
128
128
|
vendor_id: t.string().optional(),
|
|
129
129
|
act_as: t.string().optional(),
|
|
@@ -154,7 +154,7 @@ const S = t.object({
|
|
|
154
154
|
font: t.object({
|
|
155
155
|
url: t.string()
|
|
156
156
|
}).optional()
|
|
157
|
-
}),
|
|
157
|
+
}), y = t.object({
|
|
158
158
|
id: t.string().optional(),
|
|
159
159
|
name: t.string(),
|
|
160
160
|
strategy: t.string(),
|
|
@@ -176,11 +176,11 @@ const S = t.object({
|
|
|
176
176
|
enabled_clients: t.array(t.string()).default([]).optional(),
|
|
177
177
|
response_type: t.custom().optional(),
|
|
178
178
|
response_mode: t.custom().optional()
|
|
179
|
-
}),
|
|
179
|
+
}), E = t.object({
|
|
180
180
|
id: t.string(),
|
|
181
181
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
182
182
|
updated_at: t.string().transform((e) => e === null ? "" : e)
|
|
183
|
-
}).extend(
|
|
183
|
+
}).extend(y.shape), w = t.object({
|
|
184
184
|
name: t.string(),
|
|
185
185
|
audience: t.string(),
|
|
186
186
|
sender_email: t.string().email(),
|
|
@@ -189,12 +189,13 @@ const S = t.object({
|
|
|
189
189
|
logo: t.string().url().optional(),
|
|
190
190
|
primary_color: t.string().optional(),
|
|
191
191
|
secondary_color: t.string().optional(),
|
|
192
|
-
language: t.string().optional()
|
|
193
|
-
|
|
192
|
+
language: t.string().optional(),
|
|
193
|
+
id: t.string().optional()
|
|
194
|
+
}), C = t.object({
|
|
194
195
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
195
196
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
196
|
-
|
|
197
|
-
|
|
197
|
+
...w.shape,
|
|
198
|
+
id: t.string()
|
|
198
199
|
}), z = t.object({
|
|
199
200
|
logoUrl: t.string(),
|
|
200
201
|
loginBackgroundImage: t.string().nullish(),
|
|
@@ -212,7 +213,7 @@ const S = t.object({
|
|
|
212
213
|
checkoutHideSocial: t.boolean().optional(),
|
|
213
214
|
siteUrl: t.string().nullable(),
|
|
214
215
|
manageSubscriptionsUrl: t.string().optional()
|
|
215
|
-
}),
|
|
216
|
+
}), I = t.object({
|
|
216
217
|
domain: t.string(),
|
|
217
218
|
dkim_private_key: t.string().optional(),
|
|
218
219
|
dkim_public_key: t.string().optional(),
|
|
@@ -220,19 +221,19 @@ const S = t.object({
|
|
|
220
221
|
email_service: t.string().optional()
|
|
221
222
|
});
|
|
222
223
|
t.object({
|
|
223
|
-
...
|
|
224
|
-
domains: t.array(
|
|
225
|
-
tenant:
|
|
226
|
-
connections: t.array(
|
|
224
|
+
...S.shape,
|
|
225
|
+
domains: t.array(I),
|
|
226
|
+
tenant: C,
|
|
227
|
+
connections: t.array(E)
|
|
227
228
|
});
|
|
228
|
-
const
|
|
229
|
+
const j = t.enum([
|
|
229
230
|
"password_reset",
|
|
230
231
|
"email_verification",
|
|
231
232
|
"otp",
|
|
232
233
|
"authorization_code",
|
|
233
234
|
"oauth2_state",
|
|
234
235
|
"ticket"
|
|
235
|
-
]),
|
|
236
|
+
]), v = t.object({
|
|
236
237
|
code_id: t.string().openapi({
|
|
237
238
|
description: "The code that will be used in for instance an email verification flow"
|
|
238
239
|
}),
|
|
@@ -242,7 +243,7 @@ const I = t.enum([
|
|
|
242
243
|
connection_id: t.string().optional().openapi({
|
|
243
244
|
description: "The connection that the code is connected to"
|
|
244
245
|
}),
|
|
245
|
-
code_type:
|
|
246
|
+
code_type: j,
|
|
246
247
|
code_verifier: t.string().optional().openapi({
|
|
247
248
|
description: "The code verifier used in PKCE in outbound flows"
|
|
248
249
|
}),
|
|
@@ -250,18 +251,18 @@ const I = t.enum([
|
|
|
250
251
|
used_at: t.string().optional(),
|
|
251
252
|
user_id: t.string().optional()
|
|
252
253
|
}), J = t.object({
|
|
253
|
-
...
|
|
254
|
+
...v.shape,
|
|
254
255
|
created_at: t.string()
|
|
255
|
-
}),
|
|
256
|
+
}), A = t.object({
|
|
256
257
|
domain: t.string(),
|
|
257
258
|
dkim_private_key: t.string().optional(),
|
|
258
259
|
dkim_public_key: t.string().optional(),
|
|
259
260
|
email_api_key: t.string().optional(),
|
|
260
261
|
email_service: t.string().optional()
|
|
261
262
|
}), Z = s.extend({
|
|
262
|
-
...
|
|
263
|
+
...A.shape,
|
|
263
264
|
id: t.string()
|
|
264
|
-
}),
|
|
265
|
+
}), O = t.object({
|
|
265
266
|
trigger_id: t.enum([
|
|
266
267
|
"pre-user-signup",
|
|
267
268
|
"post-user-registration",
|
|
@@ -272,10 +273,10 @@ const I = t.enum([
|
|
|
272
273
|
hook_id: t.string().optional(),
|
|
273
274
|
synchronous: t.boolean().default(!1),
|
|
274
275
|
priority: t.number().optional()
|
|
275
|
-
}), $ =
|
|
276
|
+
}), $ = O.extend({
|
|
276
277
|
...s.shape,
|
|
277
278
|
hook_id: t.string()
|
|
278
|
-
}),
|
|
279
|
+
}), N = t.object({
|
|
279
280
|
alg: t.enum([
|
|
280
281
|
"RS256",
|
|
281
282
|
"RS384",
|
|
@@ -295,7 +296,7 @@ const I = t.enum([
|
|
|
295
296
|
x5c: t.array(t.string()).optional(),
|
|
296
297
|
use: t.enum(["sig", "enc"]).optional()
|
|
297
298
|
}), tt = t.object({
|
|
298
|
-
keys: t.array(
|
|
299
|
+
keys: t.array(N)
|
|
299
300
|
}), et = t.object({
|
|
300
301
|
issuer: t.string(),
|
|
301
302
|
authorization_endpoint: t.string(),
|
|
@@ -317,9 +318,9 @@ const I = t.enum([
|
|
|
317
318
|
request_uri_parameter_supported: t.boolean(),
|
|
318
319
|
request_parameter_supported: t.boolean(),
|
|
319
320
|
token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
|
|
320
|
-
}),
|
|
321
|
+
}), U = t.object({
|
|
321
322
|
auth0Client: t.string().optional(),
|
|
322
|
-
authParams:
|
|
323
|
+
authParams: k,
|
|
323
324
|
expires_at: t.string(),
|
|
324
325
|
deleted_at: t.string().optional(),
|
|
325
326
|
ip: t.string().optional(),
|
|
@@ -327,15 +328,15 @@ const I = t.enum([
|
|
|
327
328
|
}).openapi({
|
|
328
329
|
description: "This represents a login sesion"
|
|
329
330
|
}), nt = t.object({
|
|
330
|
-
...
|
|
331
|
+
...U.shape,
|
|
331
332
|
login_id: t.string().openapi({
|
|
332
333
|
description: "This is is used as the state in the universal login"
|
|
333
334
|
}),
|
|
334
335
|
created_at: t.string(),
|
|
335
336
|
updated_at: t.string()
|
|
336
337
|
});
|
|
337
|
-
var
|
|
338
|
-
const
|
|
338
|
+
var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
|
|
339
|
+
const D = t.enum([
|
|
339
340
|
"cls",
|
|
340
341
|
// CODE_LINK_SENT
|
|
341
342
|
"fsa",
|
|
@@ -384,14 +385,14 @@ const R = t.enum([
|
|
|
384
385
|
// SUCCESS_VERIFICATION_EMAIL
|
|
385
386
|
"svr"
|
|
386
387
|
// SUCCESS_VERIFICATION_EMAIL_REQUEST
|
|
387
|
-
]),
|
|
388
|
+
]), T = t.object({
|
|
388
389
|
name: t.string(),
|
|
389
390
|
version: t.string(),
|
|
390
391
|
env: t.object({
|
|
391
392
|
node: t.string().optional()
|
|
392
393
|
}).optional()
|
|
393
394
|
}), it = t.object({
|
|
394
|
-
type:
|
|
395
|
+
type: D,
|
|
395
396
|
date: t.string(),
|
|
396
397
|
description: t.string().optional(),
|
|
397
398
|
log_id: t.string().optional(),
|
|
@@ -412,16 +413,16 @@ const R = t.enum([
|
|
|
412
413
|
strategy: t.string().optional(),
|
|
413
414
|
strategy_type: t.string().optional(),
|
|
414
415
|
hostname: t.string().optional(),
|
|
415
|
-
auth0_client:
|
|
416
|
-
}),
|
|
416
|
+
auth0_client: T.optional()
|
|
417
|
+
}), x = t.object({
|
|
417
418
|
user_id: t.string(),
|
|
418
419
|
password: t.string(),
|
|
419
420
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
420
421
|
}), ot = t.object({
|
|
421
|
-
...
|
|
422
|
+
...x.shape,
|
|
422
423
|
created_at: t.string(),
|
|
423
424
|
updated_at: t.string()
|
|
424
|
-
}),
|
|
425
|
+
}), p = t.object({
|
|
425
426
|
initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
|
|
426
427
|
initial_ip: t.string().describe("First IP address associated with this session"),
|
|
427
428
|
initial_asn: t.string().describe("First autonomous system number associated with this session"),
|
|
@@ -430,15 +431,13 @@ const R = t.enum([
|
|
|
430
431
|
last_asn: t.string().describe("Last autonomous system number from which this user logged in")
|
|
431
432
|
}), P = t.object({
|
|
432
433
|
id: t.string(),
|
|
433
|
-
// TODO: Remove once data migrated
|
|
434
|
-
session_id: t.string().optional(),
|
|
435
434
|
client_id: t.string(),
|
|
436
435
|
revoked_at: t.string().optional(),
|
|
437
436
|
used_at: t.string(),
|
|
438
437
|
user_id: t.string().describe("The user ID associated with the session"),
|
|
439
438
|
expires_at: t.string().optional(),
|
|
440
439
|
idle_expires_at: t.string().optional(),
|
|
441
|
-
device:
|
|
440
|
+
device: p.describe(
|
|
442
441
|
"Metadata related to the device used in the session"
|
|
443
442
|
),
|
|
444
443
|
clients: t.array(t.string()).describe("List of client details for the session")
|
|
@@ -582,17 +581,23 @@ const H = t.object({
|
|
|
582
581
|
}), W = t.object({
|
|
583
582
|
// The actual refresh token value (primary key).
|
|
584
583
|
token: t.string(),
|
|
585
|
-
// Link to the session record
|
|
584
|
+
// Link to the session record
|
|
586
585
|
session_id: t.string(),
|
|
587
|
-
//
|
|
588
|
-
|
|
589
|
-
audience: t.string(),
|
|
586
|
+
// Link to user (foreign key)
|
|
587
|
+
user_id: t.string(),
|
|
590
588
|
// When the refresh token expires.
|
|
591
|
-
expires_at: t.string(),
|
|
589
|
+
expires_at: t.string().optional(),
|
|
590
|
+
idle_expires_at: t.string().optional(),
|
|
592
591
|
// When the token was last used.
|
|
593
|
-
|
|
594
|
-
|
|
595
|
-
|
|
592
|
+
last_exchanged_at: t.string().optional(),
|
|
593
|
+
device: p.optional(),
|
|
594
|
+
resource_servers: t.array(
|
|
595
|
+
t.object({
|
|
596
|
+
audience: t.string(),
|
|
597
|
+
scopes: t.string()
|
|
598
|
+
})
|
|
599
|
+
),
|
|
600
|
+
rotating: t.boolean()
|
|
596
601
|
}), dt = t.object({
|
|
597
602
|
// When the refresh token record was created.
|
|
598
603
|
created_at: t.string(),
|
|
@@ -606,60 +611,60 @@ function gt(e) {
|
|
|
606
611
|
return { connection: i, id: o };
|
|
607
612
|
}
|
|
608
613
|
export {
|
|
609
|
-
|
|
614
|
+
T as Auth0Client,
|
|
610
615
|
l as AuthorizationResponseMode,
|
|
611
616
|
r as AuthorizationResponseType,
|
|
612
617
|
c as CodeChallengeMethod,
|
|
613
618
|
F as GrantType,
|
|
614
|
-
|
|
615
|
-
|
|
616
|
-
|
|
619
|
+
R as LogTypes,
|
|
620
|
+
f as applicationInsertSchema,
|
|
621
|
+
S as applicationSchema,
|
|
617
622
|
V as auth0UserResponseSchema,
|
|
618
|
-
|
|
623
|
+
k as authParamsSchema,
|
|
619
624
|
a as baseUserSchema,
|
|
620
625
|
H as bordersSchema,
|
|
621
626
|
X as brandingSchema,
|
|
622
|
-
|
|
627
|
+
v as codeInsertSchema,
|
|
623
628
|
J as codeSchema,
|
|
624
|
-
|
|
629
|
+
j as codeTypeSchema,
|
|
625
630
|
K as colorsSchema,
|
|
626
|
-
|
|
627
|
-
|
|
628
|
-
|
|
631
|
+
y as connectionInsertSchema,
|
|
632
|
+
E as connectionSchema,
|
|
633
|
+
A as domainInsertSchema,
|
|
629
634
|
Z as domainSchema,
|
|
630
635
|
pt as emailProviderSchema,
|
|
631
636
|
n as fontDetailsSchema,
|
|
632
637
|
G as fontsSchema,
|
|
633
|
-
|
|
638
|
+
O as hookInsertSchema,
|
|
634
639
|
$ as hookSchema,
|
|
635
|
-
|
|
640
|
+
g as identitySchema,
|
|
636
641
|
tt as jwksKeySchema,
|
|
637
|
-
|
|
642
|
+
N as jwksSchema,
|
|
638
643
|
it as logSchema,
|
|
639
|
-
|
|
644
|
+
U as loginInsertSchema,
|
|
640
645
|
nt as loginSchema,
|
|
641
646
|
et as openIDConfigurationSchema,
|
|
642
647
|
L as pageBackgroundSchema,
|
|
643
648
|
gt as parseUserId,
|
|
644
|
-
|
|
649
|
+
x as passwordInsertSchema,
|
|
645
650
|
ot as passwordSchema,
|
|
646
|
-
|
|
651
|
+
d as profileDataSchema,
|
|
647
652
|
ct as promptSettingSchema,
|
|
648
653
|
W as refreshTokenInsertSchema,
|
|
649
654
|
dt as refreshTokenSchema,
|
|
650
|
-
|
|
655
|
+
b as samlpAddon,
|
|
651
656
|
P as sessionInsertSchema,
|
|
652
657
|
st as sessionSchema,
|
|
653
658
|
at as signingKeySchema,
|
|
654
|
-
|
|
655
|
-
|
|
659
|
+
w as tenantInsertSchema,
|
|
660
|
+
C as tenantSchema,
|
|
656
661
|
M as themeInsertSchema,
|
|
657
662
|
lt as themeSchema,
|
|
658
663
|
rt as tokenResponseSchema,
|
|
659
664
|
Q as totalsSchema,
|
|
660
|
-
|
|
665
|
+
_ as userInsertSchema,
|
|
661
666
|
Y as userResponseSchema,
|
|
662
|
-
|
|
667
|
+
u as userSchema,
|
|
663
668
|
z as vendorSettingsSchema,
|
|
664
669
|
B as widgetSchema
|
|
665
670
|
};
|