@authhero/adapter-interfaces 0.42.0 → 0.44.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,L=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),id:t.z.string(),...f.shape}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),it=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),U=t.z.object({id:t.z.string(),session_id:t.z.string().optional(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:it.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...U.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),rt=F.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),pt=t.z.object({created_at:t.z.string(),...H.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=Y;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=L;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),V=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(V),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),X=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(C)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),D=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:T,colors:D,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),rt=H.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({token:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U.optional(),resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...K.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=T;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=y;exports.colorsSchema=D;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=C;exports.logSchema=nt;exports.loginInsertSchema=j;exports.loginSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=H;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
@@ -1136,6 +1136,7 @@ declare const ClientSchema: z.ZodObject<{
1136
1136
  email_service?: string | undefined;
1137
1137
  }>, "many">;
1138
1138
  tenant: z.ZodObject<{
1139
+ id: z.ZodString;
1139
1140
  name: z.ZodString;
1140
1141
  audience: z.ZodString;
1141
1142
  sender_email: z.ZodString;
@@ -1147,7 +1148,6 @@ declare const ClientSchema: z.ZodObject<{
1147
1148
  language: z.ZodOptional<z.ZodString>;
1148
1149
  created_at: z.ZodEffects<z.ZodString, string, string>;
1149
1150
  updated_at: z.ZodEffects<z.ZodString, string, string>;
1150
- id: z.ZodString;
1151
1151
  }, "strip", z.ZodTypeAny, {
1152
1152
  created_at: string;
1153
1153
  updated_at: string;
@@ -2698,7 +2698,6 @@ export declare const passwordSchema: z.ZodObject<{
2698
2698
  export type Password = z.infer<typeof passwordSchema>;
2699
2699
  export declare const sessionInsertSchema: z.ZodObject<{
2700
2700
  id: z.ZodString;
2701
- session_id: z.ZodOptional<z.ZodString>;
2702
2701
  client_id: z.ZodString;
2703
2702
  revoked_at: z.ZodOptional<z.ZodString>;
2704
2703
  used_at: z.ZodString;
@@ -2743,7 +2742,6 @@ export declare const sessionInsertSchema: z.ZodObject<{
2743
2742
  };
2744
2743
  clients: string[];
2745
2744
  expires_at?: string | undefined;
2746
- session_id?: string | undefined;
2747
2745
  revoked_at?: string | undefined;
2748
2746
  idle_expires_at?: string | undefined;
2749
2747
  }, {
@@ -2761,14 +2759,12 @@ export declare const sessionInsertSchema: z.ZodObject<{
2761
2759
  };
2762
2760
  clients: string[];
2763
2761
  expires_at?: string | undefined;
2764
- session_id?: string | undefined;
2765
2762
  revoked_at?: string | undefined;
2766
2763
  idle_expires_at?: string | undefined;
2767
2764
  }>;
2768
2765
  export type SessionInsert = z.infer<typeof sessionInsertSchema>;
2769
2766
  export declare const sessionSchema: z.ZodObject<{
2770
2767
  id: z.ZodString;
2771
- session_id: z.ZodOptional<z.ZodString>;
2772
2768
  client_id: z.ZodString;
2773
2769
  revoked_at: z.ZodOptional<z.ZodString>;
2774
2770
  used_at: z.ZodString;
@@ -2821,7 +2817,6 @@ export declare const sessionSchema: z.ZodObject<{
2821
2817
  authenticated_at: string;
2822
2818
  last_interaction_at: string;
2823
2819
  expires_at?: string | undefined;
2824
- session_id?: string | undefined;
2825
2820
  revoked_at?: string | undefined;
2826
2821
  idle_expires_at?: string | undefined;
2827
2822
  }, {
@@ -2843,7 +2838,6 @@ export declare const sessionSchema: z.ZodObject<{
2843
2838
  authenticated_at: string;
2844
2839
  last_interaction_at: string;
2845
2840
  expires_at?: string | undefined;
2846
- session_id?: string | undefined;
2847
2841
  revoked_at?: string | undefined;
2848
2842
  idle_expires_at?: string | undefined;
2849
2843
  }>;
@@ -2899,11 +2893,13 @@ export declare const tenantInsertSchema: z.ZodObject<{
2899
2893
  primary_color: z.ZodOptional<z.ZodString>;
2900
2894
  secondary_color: z.ZodOptional<z.ZodString>;
2901
2895
  language: z.ZodOptional<z.ZodString>;
2896
+ id: z.ZodOptional<z.ZodString>;
2902
2897
  }, "strip", z.ZodTypeAny, {
2903
2898
  name: string;
2904
2899
  audience: string;
2905
2900
  sender_email: string;
2906
2901
  sender_name: string;
2902
+ id?: string | undefined;
2907
2903
  support_url?: string | undefined;
2908
2904
  logo?: string | undefined;
2909
2905
  primary_color?: string | undefined;
@@ -2914,6 +2910,7 @@ export declare const tenantInsertSchema: z.ZodObject<{
2914
2910
  audience: string;
2915
2911
  sender_email: string;
2916
2912
  sender_name: string;
2913
+ id?: string | undefined;
2917
2914
  support_url?: string | undefined;
2918
2915
  logo?: string | undefined;
2919
2916
  primary_color?: string | undefined;
@@ -2921,6 +2918,7 @@ export declare const tenantInsertSchema: z.ZodObject<{
2921
2918
  language?: string | undefined;
2922
2919
  }>;
2923
2920
  export declare const tenantSchema: z.ZodObject<{
2921
+ id: z.ZodString;
2924
2922
  name: z.ZodString;
2925
2923
  audience: z.ZodString;
2926
2924
  sender_email: z.ZodString;
@@ -2932,7 +2930,6 @@ export declare const tenantSchema: z.ZodObject<{
2932
2930
  language: z.ZodOptional<z.ZodString>;
2933
2931
  created_at: z.ZodEffects<z.ZodString, string, string>;
2934
2932
  updated_at: z.ZodEffects<z.ZodString, string, string>;
2935
- id: z.ZodString;
2936
2933
  }, "strip", z.ZodTypeAny, {
2937
2934
  created_at: string;
2938
2935
  updated_at: string;
@@ -2960,20 +2957,7 @@ export declare const tenantSchema: z.ZodObject<{
2960
2957
  secondary_color?: string | undefined;
2961
2958
  language?: string | undefined;
2962
2959
  }>;
2963
- export interface Tenant {
2964
- id: string;
2965
- name: string;
2966
- audience: string;
2967
- sender_email: string;
2968
- sender_name: string;
2969
- support_url?: string;
2970
- logo?: string;
2971
- primary_color?: string;
2972
- secondary_color?: string;
2973
- language?: string;
2974
- created_at: string;
2975
- updated_at: string;
2976
- }
2960
+ export type Tenant = z.infer<typeof tenantSchema>;
2977
2961
  export declare const vendorSettingsSchema: z.ZodObject<{
2978
2962
  logoUrl: z.ZodString;
2979
2963
  loginBackgroundImage: z.ZodOptional<z.ZodNullable<z.ZodString>>;
@@ -4323,56 +4307,168 @@ export type EmailProvider = z.infer<typeof emailProviderSchema>;
4323
4307
  export declare const refreshTokenInsertSchema: z.ZodObject<{
4324
4308
  token: z.ZodString;
4325
4309
  session_id: z.ZodString;
4326
- scope: z.ZodString;
4327
- audience: z.ZodString;
4328
- expires_at: z.ZodString;
4329
- used_at: z.ZodOptional<z.ZodString>;
4330
- revoked_at: z.ZodOptional<z.ZodString>;
4310
+ user_id: z.ZodString;
4311
+ expires_at: z.ZodOptional<z.ZodString>;
4312
+ idle_expires_at: z.ZodOptional<z.ZodString>;
4313
+ last_exchanged_at: z.ZodOptional<z.ZodString>;
4314
+ device: z.ZodOptional<z.ZodObject<{
4315
+ initial_user_agent: z.ZodString;
4316
+ initial_ip: z.ZodString;
4317
+ initial_asn: z.ZodString;
4318
+ last_user_agent: z.ZodString;
4319
+ last_ip: z.ZodString;
4320
+ last_asn: z.ZodString;
4321
+ }, "strip", z.ZodTypeAny, {
4322
+ last_ip: string;
4323
+ initial_user_agent: string;
4324
+ initial_ip: string;
4325
+ initial_asn: string;
4326
+ last_user_agent: string;
4327
+ last_asn: string;
4328
+ }, {
4329
+ last_ip: string;
4330
+ initial_user_agent: string;
4331
+ initial_ip: string;
4332
+ initial_asn: string;
4333
+ last_user_agent: string;
4334
+ last_asn: string;
4335
+ }>>;
4336
+ resource_servers: z.ZodArray<z.ZodObject<{
4337
+ audience: z.ZodString;
4338
+ scopes: z.ZodString;
4339
+ }, "strip", z.ZodTypeAny, {
4340
+ audience: string;
4341
+ scopes: string;
4342
+ }, {
4343
+ audience: string;
4344
+ scopes: string;
4345
+ }>, "many">;
4346
+ rotating: z.ZodBoolean;
4331
4347
  }, "strip", z.ZodTypeAny, {
4332
- audience: string;
4348
+ user_id: string;
4333
4349
  token: string;
4334
- scope: string;
4335
- expires_at: string;
4336
4350
  session_id: string;
4337
- used_at?: string | undefined;
4338
- revoked_at?: string | undefined;
4351
+ resource_servers: {
4352
+ audience: string;
4353
+ scopes: string;
4354
+ }[];
4355
+ rotating: boolean;
4356
+ expires_at?: string | undefined;
4357
+ idle_expires_at?: string | undefined;
4358
+ device?: {
4359
+ last_ip: string;
4360
+ initial_user_agent: string;
4361
+ initial_ip: string;
4362
+ initial_asn: string;
4363
+ last_user_agent: string;
4364
+ last_asn: string;
4365
+ } | undefined;
4366
+ last_exchanged_at?: string | undefined;
4339
4367
  }, {
4340
- audience: string;
4368
+ user_id: string;
4341
4369
  token: string;
4342
- scope: string;
4343
- expires_at: string;
4344
4370
  session_id: string;
4345
- used_at?: string | undefined;
4346
- revoked_at?: string | undefined;
4371
+ resource_servers: {
4372
+ audience: string;
4373
+ scopes: string;
4374
+ }[];
4375
+ rotating: boolean;
4376
+ expires_at?: string | undefined;
4377
+ idle_expires_at?: string | undefined;
4378
+ device?: {
4379
+ last_ip: string;
4380
+ initial_user_agent: string;
4381
+ initial_ip: string;
4382
+ initial_asn: string;
4383
+ last_user_agent: string;
4384
+ last_asn: string;
4385
+ } | undefined;
4386
+ last_exchanged_at?: string | undefined;
4347
4387
  }>;
4348
4388
  export type RefreshTokenInsert = z.infer<typeof refreshTokenInsertSchema>;
4349
4389
  export declare const refreshTokenSchema: z.ZodObject<{
4350
4390
  token: z.ZodString;
4351
4391
  session_id: z.ZodString;
4352
- scope: z.ZodString;
4353
- audience: z.ZodString;
4354
- expires_at: z.ZodString;
4355
- used_at: z.ZodOptional<z.ZodString>;
4356
- revoked_at: z.ZodOptional<z.ZodString>;
4392
+ user_id: z.ZodString;
4393
+ expires_at: z.ZodOptional<z.ZodString>;
4394
+ idle_expires_at: z.ZodOptional<z.ZodString>;
4395
+ last_exchanged_at: z.ZodOptional<z.ZodString>;
4396
+ device: z.ZodOptional<z.ZodObject<{
4397
+ initial_user_agent: z.ZodString;
4398
+ initial_ip: z.ZodString;
4399
+ initial_asn: z.ZodString;
4400
+ last_user_agent: z.ZodString;
4401
+ last_ip: z.ZodString;
4402
+ last_asn: z.ZodString;
4403
+ }, "strip", z.ZodTypeAny, {
4404
+ last_ip: string;
4405
+ initial_user_agent: string;
4406
+ initial_ip: string;
4407
+ initial_asn: string;
4408
+ last_user_agent: string;
4409
+ last_asn: string;
4410
+ }, {
4411
+ last_ip: string;
4412
+ initial_user_agent: string;
4413
+ initial_ip: string;
4414
+ initial_asn: string;
4415
+ last_user_agent: string;
4416
+ last_asn: string;
4417
+ }>>;
4418
+ resource_servers: z.ZodArray<z.ZodObject<{
4419
+ audience: z.ZodString;
4420
+ scopes: z.ZodString;
4421
+ }, "strip", z.ZodTypeAny, {
4422
+ audience: string;
4423
+ scopes: string;
4424
+ }, {
4425
+ audience: string;
4426
+ scopes: string;
4427
+ }>, "many">;
4428
+ rotating: z.ZodBoolean;
4357
4429
  created_at: z.ZodString;
4358
4430
  }, "strip", z.ZodTypeAny, {
4359
4431
  created_at: string;
4360
- audience: string;
4432
+ user_id: string;
4361
4433
  token: string;
4362
- scope: string;
4363
- expires_at: string;
4364
4434
  session_id: string;
4365
- used_at?: string | undefined;
4366
- revoked_at?: string | undefined;
4435
+ resource_servers: {
4436
+ audience: string;
4437
+ scopes: string;
4438
+ }[];
4439
+ rotating: boolean;
4440
+ expires_at?: string | undefined;
4441
+ idle_expires_at?: string | undefined;
4442
+ device?: {
4443
+ last_ip: string;
4444
+ initial_user_agent: string;
4445
+ initial_ip: string;
4446
+ initial_asn: string;
4447
+ last_user_agent: string;
4448
+ last_asn: string;
4449
+ } | undefined;
4450
+ last_exchanged_at?: string | undefined;
4367
4451
  }, {
4368
4452
  created_at: string;
4369
- audience: string;
4453
+ user_id: string;
4370
4454
  token: string;
4371
- scope: string;
4372
- expires_at: string;
4373
4455
  session_id: string;
4374
- used_at?: string | undefined;
4375
- revoked_at?: string | undefined;
4456
+ resource_servers: {
4457
+ audience: string;
4458
+ scopes: string;
4459
+ }[];
4460
+ rotating: boolean;
4461
+ expires_at?: string | undefined;
4462
+ idle_expires_at?: string | undefined;
4463
+ device?: {
4464
+ last_ip: string;
4465
+ initial_user_agent: string;
4466
+ initial_ip: string;
4467
+ initial_asn: string;
4468
+ last_user_agent: string;
4469
+ last_asn: string;
4470
+ } | undefined;
4471
+ last_exchanged_at?: string | undefined;
4376
4472
  }>;
4377
4473
  export type RefreshToken = z.infer<typeof refreshTokenSchema>;
4378
4474
  export declare function parseUserId(user_id: string): {
@@ -6,7 +6,7 @@ const Q = t.object({
6
6
  }), s = t.object({
7
7
  created_at: t.string(),
8
8
  updated_at: t.string()
9
- }), p = t.object({
9
+ }), d = t.object({
10
10
  email: t.string().optional(),
11
11
  email_verified: t.boolean().optional(),
12
12
  name: t.string().optional(),
@@ -15,7 +15,7 @@ const Q = t.object({
15
15
  phone_number: t.string().optional(),
16
16
  phone_verified: t.boolean().optional(),
17
17
  family_name: t.string().optional()
18
- }).catchall(t.any()), d = t.object({
18
+ }).catchall(t.any()), g = t.object({
19
19
  connection: t.string(),
20
20
  user_id: t.string(),
21
21
  provider: t.string(),
@@ -23,7 +23,7 @@ const Q = t.object({
23
23
  access_token: t.string().optional(),
24
24
  access_token_secret: t.string().optional(),
25
25
  refresh_token: t.string().optional(),
26
- profileData: p.optional()
26
+ profileData: d.optional()
27
27
  }), a = t.object({
28
28
  email: t.string().optional(),
29
29
  username: t.string().optional(),
@@ -38,7 +38,7 @@ const Q = t.object({
38
38
  user_id: t.string().optional(),
39
39
  app_metadata: t.any().default({}).optional(),
40
40
  user_metadata: t.any().default({}).optional()
41
- }), g = a.extend({
41
+ }), _ = a.extend({
42
42
  email_verified: t.boolean().default(!1),
43
43
  verify_email: t.boolean().optional(),
44
44
  last_ip: t.string().optional(),
@@ -47,30 +47,30 @@ const Q = t.object({
47
47
  provider: t.string().default("email"),
48
48
  connection: t.string().default("email"),
49
49
  is_social: t.boolean().optional()
50
- }), _ = t.object({
51
- ...g.shape,
50
+ }), u = t.object({
51
+ ..._.shape,
52
52
  ...s.shape,
53
53
  user_id: t.string(),
54
54
  is_social: t.boolean(),
55
55
  // TODO: this not might be correct if you use the username
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
- identities: t.array(d).optional()
59
- }), V = _, Y = a.extend({
58
+ identities: t.array(g).optional()
59
+ }), V = u, Y = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
63
63
  last_ip: t.string().optional(),
64
64
  last_login: t.string().optional(),
65
65
  user_id: t.string()
66
- }).catchall(t.any()), u = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
67
- let m = (e = 21) => {
66
+ }).catchall(t.any()), m = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
67
+ let h = (e = 21) => {
68
68
  let i = "", o = crypto.getRandomValues(new Uint8Array(e));
69
69
  for (; e--; )
70
- i += u[o[e] & 63];
70
+ i += m[o[e] & 63];
71
71
  return i;
72
72
  };
73
- const h = t.object({
73
+ const b = t.object({
74
74
  audience: t.string().optional(),
75
75
  recipient: t.string().optional(),
76
76
  createUpnClaim: t.boolean().optional(),
@@ -87,7 +87,7 @@ const h = t.object({
87
87
  nameIdentifierProbes: t.array(t.string()).optional(),
88
88
  authnContextClassRef: t.string().optional(),
89
89
  mappings: t.record(t.string()).optional()
90
- }), b = t.object({
90
+ }), f = t.object({
91
91
  id: t.string(),
92
92
  name: t.string(),
93
93
  callbacks: t.array(t.string()).default([]).optional().openapi({
@@ -106,24 +106,24 @@ const h = t.object({
106
106
  description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
107
107
  }),
108
108
  addons: t.object({
109
- samlp: h.optional()
109
+ samlp: b.optional()
110
110
  }).default({}).optional().openapi({
111
111
  description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
112
112
  }),
113
113
  email_validation: t.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
114
114
  description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
115
115
  }),
116
- client_secret: t.string().default(() => m()).optional(),
116
+ client_secret: t.string().default(() => h()).optional(),
117
117
  disable_sign_ups: t.boolean().optional().default(!1).openapi({
118
118
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
119
119
  })
120
- }), f = t.object({
120
+ }), S = t.object({
121
121
  created_at: t.string().transform((e) => e === null ? "" : e),
122
122
  updated_at: t.string().transform((e) => e === null ? "" : e),
123
- ...b.shape
123
+ ...f.shape
124
124
  });
125
125
  var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
126
- const S = t.object({
126
+ const k = t.object({
127
127
  client_id: t.string(),
128
128
  vendor_id: t.string().optional(),
129
129
  act_as: t.string().optional(),
@@ -154,7 +154,7 @@ const S = t.object({
154
154
  font: t.object({
155
155
  url: t.string()
156
156
  }).optional()
157
- }), k = t.object({
157
+ }), y = t.object({
158
158
  id: t.string().optional(),
159
159
  name: t.string(),
160
160
  strategy: t.string(),
@@ -176,11 +176,11 @@ const S = t.object({
176
176
  enabled_clients: t.array(t.string()).default([]).optional(),
177
177
  response_type: t.custom().optional(),
178
178
  response_mode: t.custom().optional()
179
- }), y = t.object({
179
+ }), E = t.object({
180
180
  id: t.string(),
181
181
  created_at: t.string().transform((e) => e === null ? "" : e),
182
182
  updated_at: t.string().transform((e) => e === null ? "" : e)
183
- }).extend(k.shape), E = t.object({
183
+ }).extend(y.shape), w = t.object({
184
184
  name: t.string(),
185
185
  audience: t.string(),
186
186
  sender_email: t.string().email(),
@@ -189,12 +189,13 @@ const S = t.object({
189
189
  logo: t.string().url().optional(),
190
190
  primary_color: t.string().optional(),
191
191
  secondary_color: t.string().optional(),
192
- language: t.string().optional()
193
- }), w = t.object({
192
+ language: t.string().optional(),
193
+ id: t.string().optional()
194
+ }), C = t.object({
194
195
  created_at: t.string().transform((e) => e === null ? "" : e),
195
196
  updated_at: t.string().transform((e) => e === null ? "" : e),
196
- id: t.string(),
197
- ...E.shape
197
+ ...w.shape,
198
+ id: t.string()
198
199
  }), z = t.object({
199
200
  logoUrl: t.string(),
200
201
  loginBackgroundImage: t.string().nullish(),
@@ -212,7 +213,7 @@ const S = t.object({
212
213
  checkoutHideSocial: t.boolean().optional(),
213
214
  siteUrl: t.string().nullable(),
214
215
  manageSubscriptionsUrl: t.string().optional()
215
- }), C = t.object({
216
+ }), I = t.object({
216
217
  domain: t.string(),
217
218
  dkim_private_key: t.string().optional(),
218
219
  dkim_public_key: t.string().optional(),
@@ -220,19 +221,19 @@ const S = t.object({
220
221
  email_service: t.string().optional()
221
222
  });
222
223
  t.object({
223
- ...f.shape,
224
- domains: t.array(C),
225
- tenant: w,
226
- connections: t.array(y)
224
+ ...S.shape,
225
+ domains: t.array(I),
226
+ tenant: C,
227
+ connections: t.array(E)
227
228
  });
228
- const I = t.enum([
229
+ const j = t.enum([
229
230
  "password_reset",
230
231
  "email_verification",
231
232
  "otp",
232
233
  "authorization_code",
233
234
  "oauth2_state",
234
235
  "ticket"
235
- ]), j = t.object({
236
+ ]), v = t.object({
236
237
  code_id: t.string().openapi({
237
238
  description: "The code that will be used in for instance an email verification flow"
238
239
  }),
@@ -242,7 +243,7 @@ const I = t.enum([
242
243
  connection_id: t.string().optional().openapi({
243
244
  description: "The connection that the code is connected to"
244
245
  }),
245
- code_type: I,
246
+ code_type: j,
246
247
  code_verifier: t.string().optional().openapi({
247
248
  description: "The code verifier used in PKCE in outbound flows"
248
249
  }),
@@ -250,18 +251,18 @@ const I = t.enum([
250
251
  used_at: t.string().optional(),
251
252
  user_id: t.string().optional()
252
253
  }), J = t.object({
253
- ...j.shape,
254
+ ...v.shape,
254
255
  created_at: t.string()
255
- }), v = t.object({
256
+ }), A = t.object({
256
257
  domain: t.string(),
257
258
  dkim_private_key: t.string().optional(),
258
259
  dkim_public_key: t.string().optional(),
259
260
  email_api_key: t.string().optional(),
260
261
  email_service: t.string().optional()
261
262
  }), Z = s.extend({
262
- ...v.shape,
263
+ ...A.shape,
263
264
  id: t.string()
264
- }), A = t.object({
265
+ }), O = t.object({
265
266
  trigger_id: t.enum([
266
267
  "pre-user-signup",
267
268
  "post-user-registration",
@@ -272,10 +273,10 @@ const I = t.enum([
272
273
  hook_id: t.string().optional(),
273
274
  synchronous: t.boolean().default(!1),
274
275
  priority: t.number().optional()
275
- }), $ = A.extend({
276
+ }), $ = O.extend({
276
277
  ...s.shape,
277
278
  hook_id: t.string()
278
- }), O = t.object({
279
+ }), N = t.object({
279
280
  alg: t.enum([
280
281
  "RS256",
281
282
  "RS384",
@@ -295,7 +296,7 @@ const I = t.enum([
295
296
  x5c: t.array(t.string()).optional(),
296
297
  use: t.enum(["sig", "enc"]).optional()
297
298
  }), tt = t.object({
298
- keys: t.array(O)
299
+ keys: t.array(N)
299
300
  }), et = t.object({
300
301
  issuer: t.string(),
301
302
  authorization_endpoint: t.string(),
@@ -317,9 +318,9 @@ const I = t.enum([
317
318
  request_uri_parameter_supported: t.boolean(),
318
319
  request_parameter_supported: t.boolean(),
319
320
  token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
320
- }), N = t.object({
321
+ }), U = t.object({
321
322
  auth0Client: t.string().optional(),
322
- authParams: S,
323
+ authParams: k,
323
324
  expires_at: t.string(),
324
325
  deleted_at: t.string().optional(),
325
326
  ip: t.string().optional(),
@@ -327,15 +328,15 @@ const I = t.enum([
327
328
  }).openapi({
328
329
  description: "This represents a login sesion"
329
330
  }), nt = t.object({
330
- ...N.shape,
331
+ ...U.shape,
331
332
  login_id: t.string().openapi({
332
333
  description: "This is is used as the state in the universal login"
333
334
  }),
334
335
  created_at: t.string(),
335
336
  updated_at: t.string()
336
337
  });
337
- var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
338
- const R = t.enum([
338
+ var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
339
+ const D = t.enum([
339
340
  "cls",
340
341
  // CODE_LINK_SENT
341
342
  "fsa",
@@ -384,14 +385,14 @@ const R = t.enum([
384
385
  // SUCCESS_VERIFICATION_EMAIL
385
386
  "svr"
386
387
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
387
- ]), D = t.object({
388
+ ]), T = t.object({
388
389
  name: t.string(),
389
390
  version: t.string(),
390
391
  env: t.object({
391
392
  node: t.string().optional()
392
393
  }).optional()
393
394
  }), it = t.object({
394
- type: R,
395
+ type: D,
395
396
  date: t.string(),
396
397
  description: t.string().optional(),
397
398
  log_id: t.string().optional(),
@@ -412,16 +413,16 @@ const R = t.enum([
412
413
  strategy: t.string().optional(),
413
414
  strategy_type: t.string().optional(),
414
415
  hostname: t.string().optional(),
415
- auth0_client: D.optional()
416
- }), T = t.object({
416
+ auth0_client: T.optional()
417
+ }), x = t.object({
417
418
  user_id: t.string(),
418
419
  password: t.string(),
419
420
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
420
421
  }), ot = t.object({
421
- ...T.shape,
422
+ ...x.shape,
422
423
  created_at: t.string(),
423
424
  updated_at: t.string()
424
- }), x = t.object({
425
+ }), p = t.object({
425
426
  initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
426
427
  initial_ip: t.string().describe("First IP address associated with this session"),
427
428
  initial_asn: t.string().describe("First autonomous system number associated with this session"),
@@ -430,15 +431,13 @@ const R = t.enum([
430
431
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
431
432
  }), P = t.object({
432
433
  id: t.string(),
433
- // TODO: Remove once data migrated
434
- session_id: t.string().optional(),
435
434
  client_id: t.string(),
436
435
  revoked_at: t.string().optional(),
437
436
  used_at: t.string(),
438
437
  user_id: t.string().describe("The user ID associated with the session"),
439
438
  expires_at: t.string().optional(),
440
439
  idle_expires_at: t.string().optional(),
441
- device: x.describe(
440
+ device: p.describe(
442
441
  "Metadata related to the device used in the session"
443
442
  ),
444
443
  clients: t.array(t.string()).describe("List of client details for the session")
@@ -582,17 +581,23 @@ const H = t.object({
582
581
  }), W = t.object({
583
582
  // The actual refresh token value (primary key).
584
583
  token: t.string(),
585
- // Link to the session record (foreign key).
584
+ // Link to the session record
586
585
  session_id: t.string(),
587
- // The scope and audience that was requested when the token was created.
588
- scope: t.string(),
589
- audience: t.string(),
586
+ // Link to user (foreign key)
587
+ user_id: t.string(),
590
588
  // When the refresh token expires.
591
- expires_at: t.string(),
589
+ expires_at: t.string().optional(),
590
+ idle_expires_at: t.string().optional(),
592
591
  // When the token was last used.
593
- used_at: t.string().optional(),
594
- // If the token is revoked or deleted.
595
- revoked_at: t.string().optional()
592
+ last_exchanged_at: t.string().optional(),
593
+ device: p.optional(),
594
+ resource_servers: t.array(
595
+ t.object({
596
+ audience: t.string(),
597
+ scopes: t.string()
598
+ })
599
+ ),
600
+ rotating: t.boolean()
596
601
  }), dt = t.object({
597
602
  // When the refresh token record was created.
598
603
  created_at: t.string(),
@@ -606,60 +611,60 @@ function gt(e) {
606
611
  return { connection: i, id: o };
607
612
  }
608
613
  export {
609
- D as Auth0Client,
614
+ T as Auth0Client,
610
615
  l as AuthorizationResponseMode,
611
616
  r as AuthorizationResponseType,
612
617
  c as CodeChallengeMethod,
613
618
  F as GrantType,
614
- U as LogTypes,
615
- b as applicationInsertSchema,
616
- f as applicationSchema,
619
+ R as LogTypes,
620
+ f as applicationInsertSchema,
621
+ S as applicationSchema,
617
622
  V as auth0UserResponseSchema,
618
- S as authParamsSchema,
623
+ k as authParamsSchema,
619
624
  a as baseUserSchema,
620
625
  H as bordersSchema,
621
626
  X as brandingSchema,
622
- j as codeInsertSchema,
627
+ v as codeInsertSchema,
623
628
  J as codeSchema,
624
- I as codeTypeSchema,
629
+ j as codeTypeSchema,
625
630
  K as colorsSchema,
626
- k as connectionInsertSchema,
627
- y as connectionSchema,
628
- v as domainInsertSchema,
631
+ y as connectionInsertSchema,
632
+ E as connectionSchema,
633
+ A as domainInsertSchema,
629
634
  Z as domainSchema,
630
635
  pt as emailProviderSchema,
631
636
  n as fontDetailsSchema,
632
637
  G as fontsSchema,
633
- A as hookInsertSchema,
638
+ O as hookInsertSchema,
634
639
  $ as hookSchema,
635
- d as identitySchema,
640
+ g as identitySchema,
636
641
  tt as jwksKeySchema,
637
- O as jwksSchema,
642
+ N as jwksSchema,
638
643
  it as logSchema,
639
- N as loginInsertSchema,
644
+ U as loginInsertSchema,
640
645
  nt as loginSchema,
641
646
  et as openIDConfigurationSchema,
642
647
  L as pageBackgroundSchema,
643
648
  gt as parseUserId,
644
- T as passwordInsertSchema,
649
+ x as passwordInsertSchema,
645
650
  ot as passwordSchema,
646
- p as profileDataSchema,
651
+ d as profileDataSchema,
647
652
  ct as promptSettingSchema,
648
653
  W as refreshTokenInsertSchema,
649
654
  dt as refreshTokenSchema,
650
- h as samlpAddon,
655
+ b as samlpAddon,
651
656
  P as sessionInsertSchema,
652
657
  st as sessionSchema,
653
658
  at as signingKeySchema,
654
- E as tenantInsertSchema,
655
- w as tenantSchema,
659
+ w as tenantInsertSchema,
660
+ C as tenantSchema,
656
661
  M as themeInsertSchema,
657
662
  lt as themeSchema,
658
663
  rt as tokenResponseSchema,
659
664
  Q as totalsSchema,
660
- g as userInsertSchema,
665
+ _ as userInsertSchema,
661
666
  Y as userResponseSchema,
662
- _ as userSchema,
667
+ u as userSchema,
663
668
  z as vendorSettingsSchema,
664
669
  B as widgetSchema
665
670
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.42.0",
14
+ "version": "0.44.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],