@authhero/adapter-interfaces 0.43.0 → 0.44.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,L=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),it=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),U=t.z.object({id:t.z.string(),session_id:t.z.string().optional(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:it.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...U.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),rt=F.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),pt=t.z.object({created_at:t.z.string(),...H.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=Y;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=L;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),V=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(V),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),X=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(C)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),D=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:T,colors:D,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),rt=H.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({token:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U.optional(),resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...K.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=T;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=y;exports.colorsSchema=D;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=C;exports.logSchema=nt;exports.loginInsertSchema=j;exports.loginSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=H;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
@@ -2698,7 +2698,6 @@ export declare const passwordSchema: z.ZodObject<{
2698
2698
  export type Password = z.infer<typeof passwordSchema>;
2699
2699
  export declare const sessionInsertSchema: z.ZodObject<{
2700
2700
  id: z.ZodString;
2701
- session_id: z.ZodOptional<z.ZodString>;
2702
2701
  client_id: z.ZodString;
2703
2702
  revoked_at: z.ZodOptional<z.ZodString>;
2704
2703
  used_at: z.ZodString;
@@ -2743,7 +2742,6 @@ export declare const sessionInsertSchema: z.ZodObject<{
2743
2742
  };
2744
2743
  clients: string[];
2745
2744
  expires_at?: string | undefined;
2746
- session_id?: string | undefined;
2747
2745
  revoked_at?: string | undefined;
2748
2746
  idle_expires_at?: string | undefined;
2749
2747
  }, {
@@ -2761,14 +2759,12 @@ export declare const sessionInsertSchema: z.ZodObject<{
2761
2759
  };
2762
2760
  clients: string[];
2763
2761
  expires_at?: string | undefined;
2764
- session_id?: string | undefined;
2765
2762
  revoked_at?: string | undefined;
2766
2763
  idle_expires_at?: string | undefined;
2767
2764
  }>;
2768
2765
  export type SessionInsert = z.infer<typeof sessionInsertSchema>;
2769
2766
  export declare const sessionSchema: z.ZodObject<{
2770
2767
  id: z.ZodString;
2771
- session_id: z.ZodOptional<z.ZodString>;
2772
2768
  client_id: z.ZodString;
2773
2769
  revoked_at: z.ZodOptional<z.ZodString>;
2774
2770
  used_at: z.ZodString;
@@ -2821,7 +2817,6 @@ export declare const sessionSchema: z.ZodObject<{
2821
2817
  authenticated_at: string;
2822
2818
  last_interaction_at: string;
2823
2819
  expires_at?: string | undefined;
2824
- session_id?: string | undefined;
2825
2820
  revoked_at?: string | undefined;
2826
2821
  idle_expires_at?: string | undefined;
2827
2822
  }, {
@@ -2843,7 +2838,6 @@ export declare const sessionSchema: z.ZodObject<{
2843
2838
  authenticated_at: string;
2844
2839
  last_interaction_at: string;
2845
2840
  expires_at?: string | undefined;
2846
- session_id?: string | undefined;
2847
2841
  revoked_at?: string | undefined;
2848
2842
  idle_expires_at?: string | undefined;
2849
2843
  }>;
@@ -4313,56 +4307,168 @@ export type EmailProvider = z.infer<typeof emailProviderSchema>;
4313
4307
  export declare const refreshTokenInsertSchema: z.ZodObject<{
4314
4308
  token: z.ZodString;
4315
4309
  session_id: z.ZodString;
4316
- scope: z.ZodString;
4317
- audience: z.ZodString;
4318
- expires_at: z.ZodString;
4319
- used_at: z.ZodOptional<z.ZodString>;
4320
- revoked_at: z.ZodOptional<z.ZodString>;
4310
+ user_id: z.ZodString;
4311
+ expires_at: z.ZodOptional<z.ZodString>;
4312
+ idle_expires_at: z.ZodOptional<z.ZodString>;
4313
+ last_exchanged_at: z.ZodOptional<z.ZodString>;
4314
+ device: z.ZodOptional<z.ZodObject<{
4315
+ initial_user_agent: z.ZodString;
4316
+ initial_ip: z.ZodString;
4317
+ initial_asn: z.ZodString;
4318
+ last_user_agent: z.ZodString;
4319
+ last_ip: z.ZodString;
4320
+ last_asn: z.ZodString;
4321
+ }, "strip", z.ZodTypeAny, {
4322
+ last_ip: string;
4323
+ initial_user_agent: string;
4324
+ initial_ip: string;
4325
+ initial_asn: string;
4326
+ last_user_agent: string;
4327
+ last_asn: string;
4328
+ }, {
4329
+ last_ip: string;
4330
+ initial_user_agent: string;
4331
+ initial_ip: string;
4332
+ initial_asn: string;
4333
+ last_user_agent: string;
4334
+ last_asn: string;
4335
+ }>>;
4336
+ resource_servers: z.ZodArray<z.ZodObject<{
4337
+ audience: z.ZodString;
4338
+ scopes: z.ZodString;
4339
+ }, "strip", z.ZodTypeAny, {
4340
+ audience: string;
4341
+ scopes: string;
4342
+ }, {
4343
+ audience: string;
4344
+ scopes: string;
4345
+ }>, "many">;
4346
+ rotating: z.ZodBoolean;
4321
4347
  }, "strip", z.ZodTypeAny, {
4322
- audience: string;
4348
+ user_id: string;
4323
4349
  token: string;
4324
- scope: string;
4325
- expires_at: string;
4326
4350
  session_id: string;
4327
- used_at?: string | undefined;
4328
- revoked_at?: string | undefined;
4351
+ resource_servers: {
4352
+ audience: string;
4353
+ scopes: string;
4354
+ }[];
4355
+ rotating: boolean;
4356
+ expires_at?: string | undefined;
4357
+ idle_expires_at?: string | undefined;
4358
+ device?: {
4359
+ last_ip: string;
4360
+ initial_user_agent: string;
4361
+ initial_ip: string;
4362
+ initial_asn: string;
4363
+ last_user_agent: string;
4364
+ last_asn: string;
4365
+ } | undefined;
4366
+ last_exchanged_at?: string | undefined;
4329
4367
  }, {
4330
- audience: string;
4368
+ user_id: string;
4331
4369
  token: string;
4332
- scope: string;
4333
- expires_at: string;
4334
4370
  session_id: string;
4335
- used_at?: string | undefined;
4336
- revoked_at?: string | undefined;
4371
+ resource_servers: {
4372
+ audience: string;
4373
+ scopes: string;
4374
+ }[];
4375
+ rotating: boolean;
4376
+ expires_at?: string | undefined;
4377
+ idle_expires_at?: string | undefined;
4378
+ device?: {
4379
+ last_ip: string;
4380
+ initial_user_agent: string;
4381
+ initial_ip: string;
4382
+ initial_asn: string;
4383
+ last_user_agent: string;
4384
+ last_asn: string;
4385
+ } | undefined;
4386
+ last_exchanged_at?: string | undefined;
4337
4387
  }>;
4338
4388
  export type RefreshTokenInsert = z.infer<typeof refreshTokenInsertSchema>;
4339
4389
  export declare const refreshTokenSchema: z.ZodObject<{
4340
4390
  token: z.ZodString;
4341
4391
  session_id: z.ZodString;
4342
- scope: z.ZodString;
4343
- audience: z.ZodString;
4344
- expires_at: z.ZodString;
4345
- used_at: z.ZodOptional<z.ZodString>;
4346
- revoked_at: z.ZodOptional<z.ZodString>;
4392
+ user_id: z.ZodString;
4393
+ expires_at: z.ZodOptional<z.ZodString>;
4394
+ idle_expires_at: z.ZodOptional<z.ZodString>;
4395
+ last_exchanged_at: z.ZodOptional<z.ZodString>;
4396
+ device: z.ZodOptional<z.ZodObject<{
4397
+ initial_user_agent: z.ZodString;
4398
+ initial_ip: z.ZodString;
4399
+ initial_asn: z.ZodString;
4400
+ last_user_agent: z.ZodString;
4401
+ last_ip: z.ZodString;
4402
+ last_asn: z.ZodString;
4403
+ }, "strip", z.ZodTypeAny, {
4404
+ last_ip: string;
4405
+ initial_user_agent: string;
4406
+ initial_ip: string;
4407
+ initial_asn: string;
4408
+ last_user_agent: string;
4409
+ last_asn: string;
4410
+ }, {
4411
+ last_ip: string;
4412
+ initial_user_agent: string;
4413
+ initial_ip: string;
4414
+ initial_asn: string;
4415
+ last_user_agent: string;
4416
+ last_asn: string;
4417
+ }>>;
4418
+ resource_servers: z.ZodArray<z.ZodObject<{
4419
+ audience: z.ZodString;
4420
+ scopes: z.ZodString;
4421
+ }, "strip", z.ZodTypeAny, {
4422
+ audience: string;
4423
+ scopes: string;
4424
+ }, {
4425
+ audience: string;
4426
+ scopes: string;
4427
+ }>, "many">;
4428
+ rotating: z.ZodBoolean;
4347
4429
  created_at: z.ZodString;
4348
4430
  }, "strip", z.ZodTypeAny, {
4349
4431
  created_at: string;
4350
- audience: string;
4432
+ user_id: string;
4351
4433
  token: string;
4352
- scope: string;
4353
- expires_at: string;
4354
4434
  session_id: string;
4355
- used_at?: string | undefined;
4356
- revoked_at?: string | undefined;
4435
+ resource_servers: {
4436
+ audience: string;
4437
+ scopes: string;
4438
+ }[];
4439
+ rotating: boolean;
4440
+ expires_at?: string | undefined;
4441
+ idle_expires_at?: string | undefined;
4442
+ device?: {
4443
+ last_ip: string;
4444
+ initial_user_agent: string;
4445
+ initial_ip: string;
4446
+ initial_asn: string;
4447
+ last_user_agent: string;
4448
+ last_asn: string;
4449
+ } | undefined;
4450
+ last_exchanged_at?: string | undefined;
4357
4451
  }, {
4358
4452
  created_at: string;
4359
- audience: string;
4453
+ user_id: string;
4360
4454
  token: string;
4361
- scope: string;
4362
- expires_at: string;
4363
4455
  session_id: string;
4364
- used_at?: string | undefined;
4365
- revoked_at?: string | undefined;
4456
+ resource_servers: {
4457
+ audience: string;
4458
+ scopes: string;
4459
+ }[];
4460
+ rotating: boolean;
4461
+ expires_at?: string | undefined;
4462
+ idle_expires_at?: string | undefined;
4463
+ device?: {
4464
+ last_ip: string;
4465
+ initial_user_agent: string;
4466
+ initial_ip: string;
4467
+ initial_asn: string;
4468
+ last_user_agent: string;
4469
+ last_asn: string;
4470
+ } | undefined;
4471
+ last_exchanged_at?: string | undefined;
4366
4472
  }>;
4367
4473
  export type RefreshToken = z.infer<typeof refreshTokenSchema>;
4368
4474
  export declare function parseUserId(user_id: string): {
@@ -6,7 +6,7 @@ const Q = t.object({
6
6
  }), s = t.object({
7
7
  created_at: t.string(),
8
8
  updated_at: t.string()
9
- }), p = t.object({
9
+ }), d = t.object({
10
10
  email: t.string().optional(),
11
11
  email_verified: t.boolean().optional(),
12
12
  name: t.string().optional(),
@@ -15,7 +15,7 @@ const Q = t.object({
15
15
  phone_number: t.string().optional(),
16
16
  phone_verified: t.boolean().optional(),
17
17
  family_name: t.string().optional()
18
- }).catchall(t.any()), d = t.object({
18
+ }).catchall(t.any()), g = t.object({
19
19
  connection: t.string(),
20
20
  user_id: t.string(),
21
21
  provider: t.string(),
@@ -23,7 +23,7 @@ const Q = t.object({
23
23
  access_token: t.string().optional(),
24
24
  access_token_secret: t.string().optional(),
25
25
  refresh_token: t.string().optional(),
26
- profileData: p.optional()
26
+ profileData: d.optional()
27
27
  }), a = t.object({
28
28
  email: t.string().optional(),
29
29
  username: t.string().optional(),
@@ -38,7 +38,7 @@ const Q = t.object({
38
38
  user_id: t.string().optional(),
39
39
  app_metadata: t.any().default({}).optional(),
40
40
  user_metadata: t.any().default({}).optional()
41
- }), g = a.extend({
41
+ }), _ = a.extend({
42
42
  email_verified: t.boolean().default(!1),
43
43
  verify_email: t.boolean().optional(),
44
44
  last_ip: t.string().optional(),
@@ -47,30 +47,30 @@ const Q = t.object({
47
47
  provider: t.string().default("email"),
48
48
  connection: t.string().default("email"),
49
49
  is_social: t.boolean().optional()
50
- }), _ = t.object({
51
- ...g.shape,
50
+ }), u = t.object({
51
+ ..._.shape,
52
52
  ...s.shape,
53
53
  user_id: t.string(),
54
54
  is_social: t.boolean(),
55
55
  // TODO: this not might be correct if you use the username
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
- identities: t.array(d).optional()
59
- }), V = _, Y = a.extend({
58
+ identities: t.array(g).optional()
59
+ }), V = u, Y = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
63
63
  last_ip: t.string().optional(),
64
64
  last_login: t.string().optional(),
65
65
  user_id: t.string()
66
- }).catchall(t.any()), u = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
67
- let m = (e = 21) => {
66
+ }).catchall(t.any()), m = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
67
+ let h = (e = 21) => {
68
68
  let i = "", o = crypto.getRandomValues(new Uint8Array(e));
69
69
  for (; e--; )
70
- i += u[o[e] & 63];
70
+ i += m[o[e] & 63];
71
71
  return i;
72
72
  };
73
- const h = t.object({
73
+ const b = t.object({
74
74
  audience: t.string().optional(),
75
75
  recipient: t.string().optional(),
76
76
  createUpnClaim: t.boolean().optional(),
@@ -87,7 +87,7 @@ const h = t.object({
87
87
  nameIdentifierProbes: t.array(t.string()).optional(),
88
88
  authnContextClassRef: t.string().optional(),
89
89
  mappings: t.record(t.string()).optional()
90
- }), b = t.object({
90
+ }), f = t.object({
91
91
  id: t.string(),
92
92
  name: t.string(),
93
93
  callbacks: t.array(t.string()).default([]).optional().openapi({
@@ -106,24 +106,24 @@ const h = t.object({
106
106
  description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
107
107
  }),
108
108
  addons: t.object({
109
- samlp: h.optional()
109
+ samlp: b.optional()
110
110
  }).default({}).optional().openapi({
111
111
  description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
112
112
  }),
113
113
  email_validation: t.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
114
114
  description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
115
115
  }),
116
- client_secret: t.string().default(() => m()).optional(),
116
+ client_secret: t.string().default(() => h()).optional(),
117
117
  disable_sign_ups: t.boolean().optional().default(!1).openapi({
118
118
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
119
119
  })
120
- }), f = t.object({
120
+ }), S = t.object({
121
121
  created_at: t.string().transform((e) => e === null ? "" : e),
122
122
  updated_at: t.string().transform((e) => e === null ? "" : e),
123
- ...b.shape
123
+ ...f.shape
124
124
  });
125
125
  var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
126
- const S = t.object({
126
+ const k = t.object({
127
127
  client_id: t.string(),
128
128
  vendor_id: t.string().optional(),
129
129
  act_as: t.string().optional(),
@@ -154,7 +154,7 @@ const S = t.object({
154
154
  font: t.object({
155
155
  url: t.string()
156
156
  }).optional()
157
- }), k = t.object({
157
+ }), y = t.object({
158
158
  id: t.string().optional(),
159
159
  name: t.string(),
160
160
  strategy: t.string(),
@@ -176,11 +176,11 @@ const S = t.object({
176
176
  enabled_clients: t.array(t.string()).default([]).optional(),
177
177
  response_type: t.custom().optional(),
178
178
  response_mode: t.custom().optional()
179
- }), y = t.object({
179
+ }), E = t.object({
180
180
  id: t.string(),
181
181
  created_at: t.string().transform((e) => e === null ? "" : e),
182
182
  updated_at: t.string().transform((e) => e === null ? "" : e)
183
- }).extend(k.shape), E = t.object({
183
+ }).extend(y.shape), w = t.object({
184
184
  name: t.string(),
185
185
  audience: t.string(),
186
186
  sender_email: t.string().email(),
@@ -191,10 +191,10 @@ const S = t.object({
191
191
  secondary_color: t.string().optional(),
192
192
  language: t.string().optional(),
193
193
  id: t.string().optional()
194
- }), w = t.object({
194
+ }), C = t.object({
195
195
  created_at: t.string().transform((e) => e === null ? "" : e),
196
196
  updated_at: t.string().transform((e) => e === null ? "" : e),
197
- ...E.shape,
197
+ ...w.shape,
198
198
  id: t.string()
199
199
  }), z = t.object({
200
200
  logoUrl: t.string(),
@@ -213,7 +213,7 @@ const S = t.object({
213
213
  checkoutHideSocial: t.boolean().optional(),
214
214
  siteUrl: t.string().nullable(),
215
215
  manageSubscriptionsUrl: t.string().optional()
216
- }), C = t.object({
216
+ }), I = t.object({
217
217
  domain: t.string(),
218
218
  dkim_private_key: t.string().optional(),
219
219
  dkim_public_key: t.string().optional(),
@@ -221,19 +221,19 @@ const S = t.object({
221
221
  email_service: t.string().optional()
222
222
  });
223
223
  t.object({
224
- ...f.shape,
225
- domains: t.array(C),
226
- tenant: w,
227
- connections: t.array(y)
224
+ ...S.shape,
225
+ domains: t.array(I),
226
+ tenant: C,
227
+ connections: t.array(E)
228
228
  });
229
- const I = t.enum([
229
+ const j = t.enum([
230
230
  "password_reset",
231
231
  "email_verification",
232
232
  "otp",
233
233
  "authorization_code",
234
234
  "oauth2_state",
235
235
  "ticket"
236
- ]), j = t.object({
236
+ ]), v = t.object({
237
237
  code_id: t.string().openapi({
238
238
  description: "The code that will be used in for instance an email verification flow"
239
239
  }),
@@ -243,7 +243,7 @@ const I = t.enum([
243
243
  connection_id: t.string().optional().openapi({
244
244
  description: "The connection that the code is connected to"
245
245
  }),
246
- code_type: I,
246
+ code_type: j,
247
247
  code_verifier: t.string().optional().openapi({
248
248
  description: "The code verifier used in PKCE in outbound flows"
249
249
  }),
@@ -251,18 +251,18 @@ const I = t.enum([
251
251
  used_at: t.string().optional(),
252
252
  user_id: t.string().optional()
253
253
  }), J = t.object({
254
- ...j.shape,
254
+ ...v.shape,
255
255
  created_at: t.string()
256
- }), v = t.object({
256
+ }), A = t.object({
257
257
  domain: t.string(),
258
258
  dkim_private_key: t.string().optional(),
259
259
  dkim_public_key: t.string().optional(),
260
260
  email_api_key: t.string().optional(),
261
261
  email_service: t.string().optional()
262
262
  }), Z = s.extend({
263
- ...v.shape,
263
+ ...A.shape,
264
264
  id: t.string()
265
- }), A = t.object({
265
+ }), O = t.object({
266
266
  trigger_id: t.enum([
267
267
  "pre-user-signup",
268
268
  "post-user-registration",
@@ -273,10 +273,10 @@ const I = t.enum([
273
273
  hook_id: t.string().optional(),
274
274
  synchronous: t.boolean().default(!1),
275
275
  priority: t.number().optional()
276
- }), $ = A.extend({
276
+ }), $ = O.extend({
277
277
  ...s.shape,
278
278
  hook_id: t.string()
279
- }), O = t.object({
279
+ }), N = t.object({
280
280
  alg: t.enum([
281
281
  "RS256",
282
282
  "RS384",
@@ -296,7 +296,7 @@ const I = t.enum([
296
296
  x5c: t.array(t.string()).optional(),
297
297
  use: t.enum(["sig", "enc"]).optional()
298
298
  }), tt = t.object({
299
- keys: t.array(O)
299
+ keys: t.array(N)
300
300
  }), et = t.object({
301
301
  issuer: t.string(),
302
302
  authorization_endpoint: t.string(),
@@ -318,9 +318,9 @@ const I = t.enum([
318
318
  request_uri_parameter_supported: t.boolean(),
319
319
  request_parameter_supported: t.boolean(),
320
320
  token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
321
- }), N = t.object({
321
+ }), U = t.object({
322
322
  auth0Client: t.string().optional(),
323
- authParams: S,
323
+ authParams: k,
324
324
  expires_at: t.string(),
325
325
  deleted_at: t.string().optional(),
326
326
  ip: t.string().optional(),
@@ -328,15 +328,15 @@ const I = t.enum([
328
328
  }).openapi({
329
329
  description: "This represents a login sesion"
330
330
  }), nt = t.object({
331
- ...N.shape,
331
+ ...U.shape,
332
332
  login_id: t.string().openapi({
333
333
  description: "This is is used as the state in the universal login"
334
334
  }),
335
335
  created_at: t.string(),
336
336
  updated_at: t.string()
337
337
  });
338
- var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
339
- const R = t.enum([
338
+ var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
339
+ const D = t.enum([
340
340
  "cls",
341
341
  // CODE_LINK_SENT
342
342
  "fsa",
@@ -385,14 +385,14 @@ const R = t.enum([
385
385
  // SUCCESS_VERIFICATION_EMAIL
386
386
  "svr"
387
387
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
388
- ]), D = t.object({
388
+ ]), T = t.object({
389
389
  name: t.string(),
390
390
  version: t.string(),
391
391
  env: t.object({
392
392
  node: t.string().optional()
393
393
  }).optional()
394
394
  }), it = t.object({
395
- type: R,
395
+ type: D,
396
396
  date: t.string(),
397
397
  description: t.string().optional(),
398
398
  log_id: t.string().optional(),
@@ -413,16 +413,16 @@ const R = t.enum([
413
413
  strategy: t.string().optional(),
414
414
  strategy_type: t.string().optional(),
415
415
  hostname: t.string().optional(),
416
- auth0_client: D.optional()
417
- }), T = t.object({
416
+ auth0_client: T.optional()
417
+ }), x = t.object({
418
418
  user_id: t.string(),
419
419
  password: t.string(),
420
420
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
421
421
  }), ot = t.object({
422
- ...T.shape,
422
+ ...x.shape,
423
423
  created_at: t.string(),
424
424
  updated_at: t.string()
425
- }), x = t.object({
425
+ }), p = t.object({
426
426
  initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
427
427
  initial_ip: t.string().describe("First IP address associated with this session"),
428
428
  initial_asn: t.string().describe("First autonomous system number associated with this session"),
@@ -431,15 +431,13 @@ const R = t.enum([
431
431
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
432
432
  }), P = t.object({
433
433
  id: t.string(),
434
- // TODO: Remove once data migrated
435
- session_id: t.string().optional(),
436
434
  client_id: t.string(),
437
435
  revoked_at: t.string().optional(),
438
436
  used_at: t.string(),
439
437
  user_id: t.string().describe("The user ID associated with the session"),
440
438
  expires_at: t.string().optional(),
441
439
  idle_expires_at: t.string().optional(),
442
- device: x.describe(
440
+ device: p.describe(
443
441
  "Metadata related to the device used in the session"
444
442
  ),
445
443
  clients: t.array(t.string()).describe("List of client details for the session")
@@ -583,17 +581,23 @@ const H = t.object({
583
581
  }), W = t.object({
584
582
  // The actual refresh token value (primary key).
585
583
  token: t.string(),
586
- // Link to the session record (foreign key).
584
+ // Link to the session record
587
585
  session_id: t.string(),
588
- // The scope and audience that was requested when the token was created.
589
- scope: t.string(),
590
- audience: t.string(),
586
+ // Link to user (foreign key)
587
+ user_id: t.string(),
591
588
  // When the refresh token expires.
592
- expires_at: t.string(),
589
+ expires_at: t.string().optional(),
590
+ idle_expires_at: t.string().optional(),
593
591
  // When the token was last used.
594
- used_at: t.string().optional(),
595
- // If the token is revoked or deleted.
596
- revoked_at: t.string().optional()
592
+ last_exchanged_at: t.string().optional(),
593
+ device: p.optional(),
594
+ resource_servers: t.array(
595
+ t.object({
596
+ audience: t.string(),
597
+ scopes: t.string()
598
+ })
599
+ ),
600
+ rotating: t.boolean()
597
601
  }), dt = t.object({
598
602
  // When the refresh token record was created.
599
603
  created_at: t.string(),
@@ -607,60 +611,60 @@ function gt(e) {
607
611
  return { connection: i, id: o };
608
612
  }
609
613
  export {
610
- D as Auth0Client,
614
+ T as Auth0Client,
611
615
  l as AuthorizationResponseMode,
612
616
  r as AuthorizationResponseType,
613
617
  c as CodeChallengeMethod,
614
618
  F as GrantType,
615
- U as LogTypes,
616
- b as applicationInsertSchema,
617
- f as applicationSchema,
619
+ R as LogTypes,
620
+ f as applicationInsertSchema,
621
+ S as applicationSchema,
618
622
  V as auth0UserResponseSchema,
619
- S as authParamsSchema,
623
+ k as authParamsSchema,
620
624
  a as baseUserSchema,
621
625
  H as bordersSchema,
622
626
  X as brandingSchema,
623
- j as codeInsertSchema,
627
+ v as codeInsertSchema,
624
628
  J as codeSchema,
625
- I as codeTypeSchema,
629
+ j as codeTypeSchema,
626
630
  K as colorsSchema,
627
- k as connectionInsertSchema,
628
- y as connectionSchema,
629
- v as domainInsertSchema,
631
+ y as connectionInsertSchema,
632
+ E as connectionSchema,
633
+ A as domainInsertSchema,
630
634
  Z as domainSchema,
631
635
  pt as emailProviderSchema,
632
636
  n as fontDetailsSchema,
633
637
  G as fontsSchema,
634
- A as hookInsertSchema,
638
+ O as hookInsertSchema,
635
639
  $ as hookSchema,
636
- d as identitySchema,
640
+ g as identitySchema,
637
641
  tt as jwksKeySchema,
638
- O as jwksSchema,
642
+ N as jwksSchema,
639
643
  it as logSchema,
640
- N as loginInsertSchema,
644
+ U as loginInsertSchema,
641
645
  nt as loginSchema,
642
646
  et as openIDConfigurationSchema,
643
647
  L as pageBackgroundSchema,
644
648
  gt as parseUserId,
645
- T as passwordInsertSchema,
649
+ x as passwordInsertSchema,
646
650
  ot as passwordSchema,
647
- p as profileDataSchema,
651
+ d as profileDataSchema,
648
652
  ct as promptSettingSchema,
649
653
  W as refreshTokenInsertSchema,
650
654
  dt as refreshTokenSchema,
651
- h as samlpAddon,
655
+ b as samlpAddon,
652
656
  P as sessionInsertSchema,
653
657
  st as sessionSchema,
654
658
  at as signingKeySchema,
655
- E as tenantInsertSchema,
656
- w as tenantSchema,
659
+ w as tenantInsertSchema,
660
+ C as tenantSchema,
657
661
  M as themeInsertSchema,
658
662
  lt as themeSchema,
659
663
  rt as tokenResponseSchema,
660
664
  Q as totalsSchema,
661
- g as userInsertSchema,
665
+ _ as userInsertSchema,
662
666
  Y as userResponseSchema,
663
- _ as userSchema,
667
+ u as userSchema,
664
668
  z as vendorSettingsSchema,
665
669
  B as widgetSchema
666
670
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.43.0",
14
+ "version": "0.44.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],