@authhero/adapter-interfaces 0.43.0 → 0.44.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +142 -36
- package/dist/adapter-interfaces.mjs +85 -81
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,L=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),it=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),U=t.z.object({id:t.z.string(),session_id:t.z.string().optional(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:it.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...U.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),rt=F.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),pt=t.z.object({created_at:t.z.string(),...H.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=Y;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=L;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),V=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(V),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),X=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(C)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),D=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:T,colors:D,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),rt=H.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({token:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U.optional(),resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...K.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=T;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=y;exports.colorsSchema=D;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=C;exports.logSchema=nt;exports.loginInsertSchema=j;exports.loginSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=H;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
|
|
@@ -2698,7 +2698,6 @@ export declare const passwordSchema: z.ZodObject<{
|
|
|
2698
2698
|
export type Password = z.infer<typeof passwordSchema>;
|
|
2699
2699
|
export declare const sessionInsertSchema: z.ZodObject<{
|
|
2700
2700
|
id: z.ZodString;
|
|
2701
|
-
session_id: z.ZodOptional<z.ZodString>;
|
|
2702
2701
|
client_id: z.ZodString;
|
|
2703
2702
|
revoked_at: z.ZodOptional<z.ZodString>;
|
|
2704
2703
|
used_at: z.ZodString;
|
|
@@ -2743,7 +2742,6 @@ export declare const sessionInsertSchema: z.ZodObject<{
|
|
|
2743
2742
|
};
|
|
2744
2743
|
clients: string[];
|
|
2745
2744
|
expires_at?: string | undefined;
|
|
2746
|
-
session_id?: string | undefined;
|
|
2747
2745
|
revoked_at?: string | undefined;
|
|
2748
2746
|
idle_expires_at?: string | undefined;
|
|
2749
2747
|
}, {
|
|
@@ -2761,14 +2759,12 @@ export declare const sessionInsertSchema: z.ZodObject<{
|
|
|
2761
2759
|
};
|
|
2762
2760
|
clients: string[];
|
|
2763
2761
|
expires_at?: string | undefined;
|
|
2764
|
-
session_id?: string | undefined;
|
|
2765
2762
|
revoked_at?: string | undefined;
|
|
2766
2763
|
idle_expires_at?: string | undefined;
|
|
2767
2764
|
}>;
|
|
2768
2765
|
export type SessionInsert = z.infer<typeof sessionInsertSchema>;
|
|
2769
2766
|
export declare const sessionSchema: z.ZodObject<{
|
|
2770
2767
|
id: z.ZodString;
|
|
2771
|
-
session_id: z.ZodOptional<z.ZodString>;
|
|
2772
2768
|
client_id: z.ZodString;
|
|
2773
2769
|
revoked_at: z.ZodOptional<z.ZodString>;
|
|
2774
2770
|
used_at: z.ZodString;
|
|
@@ -2821,7 +2817,6 @@ export declare const sessionSchema: z.ZodObject<{
|
|
|
2821
2817
|
authenticated_at: string;
|
|
2822
2818
|
last_interaction_at: string;
|
|
2823
2819
|
expires_at?: string | undefined;
|
|
2824
|
-
session_id?: string | undefined;
|
|
2825
2820
|
revoked_at?: string | undefined;
|
|
2826
2821
|
idle_expires_at?: string | undefined;
|
|
2827
2822
|
}, {
|
|
@@ -2843,7 +2838,6 @@ export declare const sessionSchema: z.ZodObject<{
|
|
|
2843
2838
|
authenticated_at: string;
|
|
2844
2839
|
last_interaction_at: string;
|
|
2845
2840
|
expires_at?: string | undefined;
|
|
2846
|
-
session_id?: string | undefined;
|
|
2847
2841
|
revoked_at?: string | undefined;
|
|
2848
2842
|
idle_expires_at?: string | undefined;
|
|
2849
2843
|
}>;
|
|
@@ -4313,56 +4307,168 @@ export type EmailProvider = z.infer<typeof emailProviderSchema>;
|
|
|
4313
4307
|
export declare const refreshTokenInsertSchema: z.ZodObject<{
|
|
4314
4308
|
token: z.ZodString;
|
|
4315
4309
|
session_id: z.ZodString;
|
|
4316
|
-
|
|
4317
|
-
|
|
4318
|
-
|
|
4319
|
-
|
|
4320
|
-
|
|
4310
|
+
user_id: z.ZodString;
|
|
4311
|
+
expires_at: z.ZodOptional<z.ZodString>;
|
|
4312
|
+
idle_expires_at: z.ZodOptional<z.ZodString>;
|
|
4313
|
+
last_exchanged_at: z.ZodOptional<z.ZodString>;
|
|
4314
|
+
device: z.ZodOptional<z.ZodObject<{
|
|
4315
|
+
initial_user_agent: z.ZodString;
|
|
4316
|
+
initial_ip: z.ZodString;
|
|
4317
|
+
initial_asn: z.ZodString;
|
|
4318
|
+
last_user_agent: z.ZodString;
|
|
4319
|
+
last_ip: z.ZodString;
|
|
4320
|
+
last_asn: z.ZodString;
|
|
4321
|
+
}, "strip", z.ZodTypeAny, {
|
|
4322
|
+
last_ip: string;
|
|
4323
|
+
initial_user_agent: string;
|
|
4324
|
+
initial_ip: string;
|
|
4325
|
+
initial_asn: string;
|
|
4326
|
+
last_user_agent: string;
|
|
4327
|
+
last_asn: string;
|
|
4328
|
+
}, {
|
|
4329
|
+
last_ip: string;
|
|
4330
|
+
initial_user_agent: string;
|
|
4331
|
+
initial_ip: string;
|
|
4332
|
+
initial_asn: string;
|
|
4333
|
+
last_user_agent: string;
|
|
4334
|
+
last_asn: string;
|
|
4335
|
+
}>>;
|
|
4336
|
+
resource_servers: z.ZodArray<z.ZodObject<{
|
|
4337
|
+
audience: z.ZodString;
|
|
4338
|
+
scopes: z.ZodString;
|
|
4339
|
+
}, "strip", z.ZodTypeAny, {
|
|
4340
|
+
audience: string;
|
|
4341
|
+
scopes: string;
|
|
4342
|
+
}, {
|
|
4343
|
+
audience: string;
|
|
4344
|
+
scopes: string;
|
|
4345
|
+
}>, "many">;
|
|
4346
|
+
rotating: z.ZodBoolean;
|
|
4321
4347
|
}, "strip", z.ZodTypeAny, {
|
|
4322
|
-
|
|
4348
|
+
user_id: string;
|
|
4323
4349
|
token: string;
|
|
4324
|
-
scope: string;
|
|
4325
|
-
expires_at: string;
|
|
4326
4350
|
session_id: string;
|
|
4327
|
-
|
|
4328
|
-
|
|
4351
|
+
resource_servers: {
|
|
4352
|
+
audience: string;
|
|
4353
|
+
scopes: string;
|
|
4354
|
+
}[];
|
|
4355
|
+
rotating: boolean;
|
|
4356
|
+
expires_at?: string | undefined;
|
|
4357
|
+
idle_expires_at?: string | undefined;
|
|
4358
|
+
device?: {
|
|
4359
|
+
last_ip: string;
|
|
4360
|
+
initial_user_agent: string;
|
|
4361
|
+
initial_ip: string;
|
|
4362
|
+
initial_asn: string;
|
|
4363
|
+
last_user_agent: string;
|
|
4364
|
+
last_asn: string;
|
|
4365
|
+
} | undefined;
|
|
4366
|
+
last_exchanged_at?: string | undefined;
|
|
4329
4367
|
}, {
|
|
4330
|
-
|
|
4368
|
+
user_id: string;
|
|
4331
4369
|
token: string;
|
|
4332
|
-
scope: string;
|
|
4333
|
-
expires_at: string;
|
|
4334
4370
|
session_id: string;
|
|
4335
|
-
|
|
4336
|
-
|
|
4371
|
+
resource_servers: {
|
|
4372
|
+
audience: string;
|
|
4373
|
+
scopes: string;
|
|
4374
|
+
}[];
|
|
4375
|
+
rotating: boolean;
|
|
4376
|
+
expires_at?: string | undefined;
|
|
4377
|
+
idle_expires_at?: string | undefined;
|
|
4378
|
+
device?: {
|
|
4379
|
+
last_ip: string;
|
|
4380
|
+
initial_user_agent: string;
|
|
4381
|
+
initial_ip: string;
|
|
4382
|
+
initial_asn: string;
|
|
4383
|
+
last_user_agent: string;
|
|
4384
|
+
last_asn: string;
|
|
4385
|
+
} | undefined;
|
|
4386
|
+
last_exchanged_at?: string | undefined;
|
|
4337
4387
|
}>;
|
|
4338
4388
|
export type RefreshTokenInsert = z.infer<typeof refreshTokenInsertSchema>;
|
|
4339
4389
|
export declare const refreshTokenSchema: z.ZodObject<{
|
|
4340
4390
|
token: z.ZodString;
|
|
4341
4391
|
session_id: z.ZodString;
|
|
4342
|
-
|
|
4343
|
-
|
|
4344
|
-
|
|
4345
|
-
|
|
4346
|
-
|
|
4392
|
+
user_id: z.ZodString;
|
|
4393
|
+
expires_at: z.ZodOptional<z.ZodString>;
|
|
4394
|
+
idle_expires_at: z.ZodOptional<z.ZodString>;
|
|
4395
|
+
last_exchanged_at: z.ZodOptional<z.ZodString>;
|
|
4396
|
+
device: z.ZodOptional<z.ZodObject<{
|
|
4397
|
+
initial_user_agent: z.ZodString;
|
|
4398
|
+
initial_ip: z.ZodString;
|
|
4399
|
+
initial_asn: z.ZodString;
|
|
4400
|
+
last_user_agent: z.ZodString;
|
|
4401
|
+
last_ip: z.ZodString;
|
|
4402
|
+
last_asn: z.ZodString;
|
|
4403
|
+
}, "strip", z.ZodTypeAny, {
|
|
4404
|
+
last_ip: string;
|
|
4405
|
+
initial_user_agent: string;
|
|
4406
|
+
initial_ip: string;
|
|
4407
|
+
initial_asn: string;
|
|
4408
|
+
last_user_agent: string;
|
|
4409
|
+
last_asn: string;
|
|
4410
|
+
}, {
|
|
4411
|
+
last_ip: string;
|
|
4412
|
+
initial_user_agent: string;
|
|
4413
|
+
initial_ip: string;
|
|
4414
|
+
initial_asn: string;
|
|
4415
|
+
last_user_agent: string;
|
|
4416
|
+
last_asn: string;
|
|
4417
|
+
}>>;
|
|
4418
|
+
resource_servers: z.ZodArray<z.ZodObject<{
|
|
4419
|
+
audience: z.ZodString;
|
|
4420
|
+
scopes: z.ZodString;
|
|
4421
|
+
}, "strip", z.ZodTypeAny, {
|
|
4422
|
+
audience: string;
|
|
4423
|
+
scopes: string;
|
|
4424
|
+
}, {
|
|
4425
|
+
audience: string;
|
|
4426
|
+
scopes: string;
|
|
4427
|
+
}>, "many">;
|
|
4428
|
+
rotating: z.ZodBoolean;
|
|
4347
4429
|
created_at: z.ZodString;
|
|
4348
4430
|
}, "strip", z.ZodTypeAny, {
|
|
4349
4431
|
created_at: string;
|
|
4350
|
-
|
|
4432
|
+
user_id: string;
|
|
4351
4433
|
token: string;
|
|
4352
|
-
scope: string;
|
|
4353
|
-
expires_at: string;
|
|
4354
4434
|
session_id: string;
|
|
4355
|
-
|
|
4356
|
-
|
|
4435
|
+
resource_servers: {
|
|
4436
|
+
audience: string;
|
|
4437
|
+
scopes: string;
|
|
4438
|
+
}[];
|
|
4439
|
+
rotating: boolean;
|
|
4440
|
+
expires_at?: string | undefined;
|
|
4441
|
+
idle_expires_at?: string | undefined;
|
|
4442
|
+
device?: {
|
|
4443
|
+
last_ip: string;
|
|
4444
|
+
initial_user_agent: string;
|
|
4445
|
+
initial_ip: string;
|
|
4446
|
+
initial_asn: string;
|
|
4447
|
+
last_user_agent: string;
|
|
4448
|
+
last_asn: string;
|
|
4449
|
+
} | undefined;
|
|
4450
|
+
last_exchanged_at?: string | undefined;
|
|
4357
4451
|
}, {
|
|
4358
4452
|
created_at: string;
|
|
4359
|
-
|
|
4453
|
+
user_id: string;
|
|
4360
4454
|
token: string;
|
|
4361
|
-
scope: string;
|
|
4362
|
-
expires_at: string;
|
|
4363
4455
|
session_id: string;
|
|
4364
|
-
|
|
4365
|
-
|
|
4456
|
+
resource_servers: {
|
|
4457
|
+
audience: string;
|
|
4458
|
+
scopes: string;
|
|
4459
|
+
}[];
|
|
4460
|
+
rotating: boolean;
|
|
4461
|
+
expires_at?: string | undefined;
|
|
4462
|
+
idle_expires_at?: string | undefined;
|
|
4463
|
+
device?: {
|
|
4464
|
+
last_ip: string;
|
|
4465
|
+
initial_user_agent: string;
|
|
4466
|
+
initial_ip: string;
|
|
4467
|
+
initial_asn: string;
|
|
4468
|
+
last_user_agent: string;
|
|
4469
|
+
last_asn: string;
|
|
4470
|
+
} | undefined;
|
|
4471
|
+
last_exchanged_at?: string | undefined;
|
|
4366
4472
|
}>;
|
|
4367
4473
|
export type RefreshToken = z.infer<typeof refreshTokenSchema>;
|
|
4368
4474
|
export declare function parseUserId(user_id: string): {
|
|
@@ -6,7 +6,7 @@ const Q = t.object({
|
|
|
6
6
|
}), s = t.object({
|
|
7
7
|
created_at: t.string(),
|
|
8
8
|
updated_at: t.string()
|
|
9
|
-
}),
|
|
9
|
+
}), d = t.object({
|
|
10
10
|
email: t.string().optional(),
|
|
11
11
|
email_verified: t.boolean().optional(),
|
|
12
12
|
name: t.string().optional(),
|
|
@@ -15,7 +15,7 @@ const Q = t.object({
|
|
|
15
15
|
phone_number: t.string().optional(),
|
|
16
16
|
phone_verified: t.boolean().optional(),
|
|
17
17
|
family_name: t.string().optional()
|
|
18
|
-
}).catchall(t.any()),
|
|
18
|
+
}).catchall(t.any()), g = t.object({
|
|
19
19
|
connection: t.string(),
|
|
20
20
|
user_id: t.string(),
|
|
21
21
|
provider: t.string(),
|
|
@@ -23,7 +23,7 @@ const Q = t.object({
|
|
|
23
23
|
access_token: t.string().optional(),
|
|
24
24
|
access_token_secret: t.string().optional(),
|
|
25
25
|
refresh_token: t.string().optional(),
|
|
26
|
-
profileData:
|
|
26
|
+
profileData: d.optional()
|
|
27
27
|
}), a = t.object({
|
|
28
28
|
email: t.string().optional(),
|
|
29
29
|
username: t.string().optional(),
|
|
@@ -38,7 +38,7 @@ const Q = t.object({
|
|
|
38
38
|
user_id: t.string().optional(),
|
|
39
39
|
app_metadata: t.any().default({}).optional(),
|
|
40
40
|
user_metadata: t.any().default({}).optional()
|
|
41
|
-
}),
|
|
41
|
+
}), _ = a.extend({
|
|
42
42
|
email_verified: t.boolean().default(!1),
|
|
43
43
|
verify_email: t.boolean().optional(),
|
|
44
44
|
last_ip: t.string().optional(),
|
|
@@ -47,30 +47,30 @@ const Q = t.object({
|
|
|
47
47
|
provider: t.string().default("email"),
|
|
48
48
|
connection: t.string().default("email"),
|
|
49
49
|
is_social: t.boolean().optional()
|
|
50
|
-
}),
|
|
51
|
-
...
|
|
50
|
+
}), u = t.object({
|
|
51
|
+
..._.shape,
|
|
52
52
|
...s.shape,
|
|
53
53
|
user_id: t.string(),
|
|
54
54
|
is_social: t.boolean(),
|
|
55
55
|
// TODO: this not might be correct if you use the username
|
|
56
56
|
email: t.string(),
|
|
57
57
|
login_count: t.number(),
|
|
58
|
-
identities: t.array(
|
|
59
|
-
}), V =
|
|
58
|
+
identities: t.array(g).optional()
|
|
59
|
+
}), V = u, Y = a.extend({
|
|
60
60
|
email: t.string(),
|
|
61
61
|
login_count: t.number(),
|
|
62
62
|
multifactor: t.array(t.string()).optional(),
|
|
63
63
|
last_ip: t.string().optional(),
|
|
64
64
|
last_login: t.string().optional(),
|
|
65
65
|
user_id: t.string()
|
|
66
|
-
}).catchall(t.any()),
|
|
67
|
-
let
|
|
66
|
+
}).catchall(t.any()), m = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
67
|
+
let h = (e = 21) => {
|
|
68
68
|
let i = "", o = crypto.getRandomValues(new Uint8Array(e));
|
|
69
69
|
for (; e--; )
|
|
70
|
-
i +=
|
|
70
|
+
i += m[o[e] & 63];
|
|
71
71
|
return i;
|
|
72
72
|
};
|
|
73
|
-
const
|
|
73
|
+
const b = t.object({
|
|
74
74
|
audience: t.string().optional(),
|
|
75
75
|
recipient: t.string().optional(),
|
|
76
76
|
createUpnClaim: t.boolean().optional(),
|
|
@@ -87,7 +87,7 @@ const h = t.object({
|
|
|
87
87
|
nameIdentifierProbes: t.array(t.string()).optional(),
|
|
88
88
|
authnContextClassRef: t.string().optional(),
|
|
89
89
|
mappings: t.record(t.string()).optional()
|
|
90
|
-
}),
|
|
90
|
+
}), f = t.object({
|
|
91
91
|
id: t.string(),
|
|
92
92
|
name: t.string(),
|
|
93
93
|
callbacks: t.array(t.string()).default([]).optional().openapi({
|
|
@@ -106,24 +106,24 @@ const h = t.object({
|
|
|
106
106
|
description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
|
|
107
107
|
}),
|
|
108
108
|
addons: t.object({
|
|
109
|
-
samlp:
|
|
109
|
+
samlp: b.optional()
|
|
110
110
|
}).default({}).optional().openapi({
|
|
111
111
|
description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
|
|
112
112
|
}),
|
|
113
113
|
email_validation: t.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
|
|
114
114
|
description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
|
|
115
115
|
}),
|
|
116
|
-
client_secret: t.string().default(() =>
|
|
116
|
+
client_secret: t.string().default(() => h()).optional(),
|
|
117
117
|
disable_sign_ups: t.boolean().optional().default(!1).openapi({
|
|
118
118
|
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
119
119
|
})
|
|
120
|
-
}),
|
|
120
|
+
}), S = t.object({
|
|
121
121
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
122
122
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
123
|
-
...
|
|
123
|
+
...f.shape
|
|
124
124
|
});
|
|
125
125
|
var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
|
|
126
|
-
const
|
|
126
|
+
const k = t.object({
|
|
127
127
|
client_id: t.string(),
|
|
128
128
|
vendor_id: t.string().optional(),
|
|
129
129
|
act_as: t.string().optional(),
|
|
@@ -154,7 +154,7 @@ const S = t.object({
|
|
|
154
154
|
font: t.object({
|
|
155
155
|
url: t.string()
|
|
156
156
|
}).optional()
|
|
157
|
-
}),
|
|
157
|
+
}), y = t.object({
|
|
158
158
|
id: t.string().optional(),
|
|
159
159
|
name: t.string(),
|
|
160
160
|
strategy: t.string(),
|
|
@@ -176,11 +176,11 @@ const S = t.object({
|
|
|
176
176
|
enabled_clients: t.array(t.string()).default([]).optional(),
|
|
177
177
|
response_type: t.custom().optional(),
|
|
178
178
|
response_mode: t.custom().optional()
|
|
179
|
-
}),
|
|
179
|
+
}), E = t.object({
|
|
180
180
|
id: t.string(),
|
|
181
181
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
182
182
|
updated_at: t.string().transform((e) => e === null ? "" : e)
|
|
183
|
-
}).extend(
|
|
183
|
+
}).extend(y.shape), w = t.object({
|
|
184
184
|
name: t.string(),
|
|
185
185
|
audience: t.string(),
|
|
186
186
|
sender_email: t.string().email(),
|
|
@@ -191,10 +191,10 @@ const S = t.object({
|
|
|
191
191
|
secondary_color: t.string().optional(),
|
|
192
192
|
language: t.string().optional(),
|
|
193
193
|
id: t.string().optional()
|
|
194
|
-
}),
|
|
194
|
+
}), C = t.object({
|
|
195
195
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
196
196
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
197
|
-
...
|
|
197
|
+
...w.shape,
|
|
198
198
|
id: t.string()
|
|
199
199
|
}), z = t.object({
|
|
200
200
|
logoUrl: t.string(),
|
|
@@ -213,7 +213,7 @@ const S = t.object({
|
|
|
213
213
|
checkoutHideSocial: t.boolean().optional(),
|
|
214
214
|
siteUrl: t.string().nullable(),
|
|
215
215
|
manageSubscriptionsUrl: t.string().optional()
|
|
216
|
-
}),
|
|
216
|
+
}), I = t.object({
|
|
217
217
|
domain: t.string(),
|
|
218
218
|
dkim_private_key: t.string().optional(),
|
|
219
219
|
dkim_public_key: t.string().optional(),
|
|
@@ -221,19 +221,19 @@ const S = t.object({
|
|
|
221
221
|
email_service: t.string().optional()
|
|
222
222
|
});
|
|
223
223
|
t.object({
|
|
224
|
-
...
|
|
225
|
-
domains: t.array(
|
|
226
|
-
tenant:
|
|
227
|
-
connections: t.array(
|
|
224
|
+
...S.shape,
|
|
225
|
+
domains: t.array(I),
|
|
226
|
+
tenant: C,
|
|
227
|
+
connections: t.array(E)
|
|
228
228
|
});
|
|
229
|
-
const
|
|
229
|
+
const j = t.enum([
|
|
230
230
|
"password_reset",
|
|
231
231
|
"email_verification",
|
|
232
232
|
"otp",
|
|
233
233
|
"authorization_code",
|
|
234
234
|
"oauth2_state",
|
|
235
235
|
"ticket"
|
|
236
|
-
]),
|
|
236
|
+
]), v = t.object({
|
|
237
237
|
code_id: t.string().openapi({
|
|
238
238
|
description: "The code that will be used in for instance an email verification flow"
|
|
239
239
|
}),
|
|
@@ -243,7 +243,7 @@ const I = t.enum([
|
|
|
243
243
|
connection_id: t.string().optional().openapi({
|
|
244
244
|
description: "The connection that the code is connected to"
|
|
245
245
|
}),
|
|
246
|
-
code_type:
|
|
246
|
+
code_type: j,
|
|
247
247
|
code_verifier: t.string().optional().openapi({
|
|
248
248
|
description: "The code verifier used in PKCE in outbound flows"
|
|
249
249
|
}),
|
|
@@ -251,18 +251,18 @@ const I = t.enum([
|
|
|
251
251
|
used_at: t.string().optional(),
|
|
252
252
|
user_id: t.string().optional()
|
|
253
253
|
}), J = t.object({
|
|
254
|
-
...
|
|
254
|
+
...v.shape,
|
|
255
255
|
created_at: t.string()
|
|
256
|
-
}),
|
|
256
|
+
}), A = t.object({
|
|
257
257
|
domain: t.string(),
|
|
258
258
|
dkim_private_key: t.string().optional(),
|
|
259
259
|
dkim_public_key: t.string().optional(),
|
|
260
260
|
email_api_key: t.string().optional(),
|
|
261
261
|
email_service: t.string().optional()
|
|
262
262
|
}), Z = s.extend({
|
|
263
|
-
...
|
|
263
|
+
...A.shape,
|
|
264
264
|
id: t.string()
|
|
265
|
-
}),
|
|
265
|
+
}), O = t.object({
|
|
266
266
|
trigger_id: t.enum([
|
|
267
267
|
"pre-user-signup",
|
|
268
268
|
"post-user-registration",
|
|
@@ -273,10 +273,10 @@ const I = t.enum([
|
|
|
273
273
|
hook_id: t.string().optional(),
|
|
274
274
|
synchronous: t.boolean().default(!1),
|
|
275
275
|
priority: t.number().optional()
|
|
276
|
-
}), $ =
|
|
276
|
+
}), $ = O.extend({
|
|
277
277
|
...s.shape,
|
|
278
278
|
hook_id: t.string()
|
|
279
|
-
}),
|
|
279
|
+
}), N = t.object({
|
|
280
280
|
alg: t.enum([
|
|
281
281
|
"RS256",
|
|
282
282
|
"RS384",
|
|
@@ -296,7 +296,7 @@ const I = t.enum([
|
|
|
296
296
|
x5c: t.array(t.string()).optional(),
|
|
297
297
|
use: t.enum(["sig", "enc"]).optional()
|
|
298
298
|
}), tt = t.object({
|
|
299
|
-
keys: t.array(
|
|
299
|
+
keys: t.array(N)
|
|
300
300
|
}), et = t.object({
|
|
301
301
|
issuer: t.string(),
|
|
302
302
|
authorization_endpoint: t.string(),
|
|
@@ -318,9 +318,9 @@ const I = t.enum([
|
|
|
318
318
|
request_uri_parameter_supported: t.boolean(),
|
|
319
319
|
request_parameter_supported: t.boolean(),
|
|
320
320
|
token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
|
|
321
|
-
}),
|
|
321
|
+
}), U = t.object({
|
|
322
322
|
auth0Client: t.string().optional(),
|
|
323
|
-
authParams:
|
|
323
|
+
authParams: k,
|
|
324
324
|
expires_at: t.string(),
|
|
325
325
|
deleted_at: t.string().optional(),
|
|
326
326
|
ip: t.string().optional(),
|
|
@@ -328,15 +328,15 @@ const I = t.enum([
|
|
|
328
328
|
}).openapi({
|
|
329
329
|
description: "This represents a login sesion"
|
|
330
330
|
}), nt = t.object({
|
|
331
|
-
...
|
|
331
|
+
...U.shape,
|
|
332
332
|
login_id: t.string().openapi({
|
|
333
333
|
description: "This is is used as the state in the universal login"
|
|
334
334
|
}),
|
|
335
335
|
created_at: t.string(),
|
|
336
336
|
updated_at: t.string()
|
|
337
337
|
});
|
|
338
|
-
var
|
|
339
|
-
const
|
|
338
|
+
var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
|
|
339
|
+
const D = t.enum([
|
|
340
340
|
"cls",
|
|
341
341
|
// CODE_LINK_SENT
|
|
342
342
|
"fsa",
|
|
@@ -385,14 +385,14 @@ const R = t.enum([
|
|
|
385
385
|
// SUCCESS_VERIFICATION_EMAIL
|
|
386
386
|
"svr"
|
|
387
387
|
// SUCCESS_VERIFICATION_EMAIL_REQUEST
|
|
388
|
-
]),
|
|
388
|
+
]), T = t.object({
|
|
389
389
|
name: t.string(),
|
|
390
390
|
version: t.string(),
|
|
391
391
|
env: t.object({
|
|
392
392
|
node: t.string().optional()
|
|
393
393
|
}).optional()
|
|
394
394
|
}), it = t.object({
|
|
395
|
-
type:
|
|
395
|
+
type: D,
|
|
396
396
|
date: t.string(),
|
|
397
397
|
description: t.string().optional(),
|
|
398
398
|
log_id: t.string().optional(),
|
|
@@ -413,16 +413,16 @@ const R = t.enum([
|
|
|
413
413
|
strategy: t.string().optional(),
|
|
414
414
|
strategy_type: t.string().optional(),
|
|
415
415
|
hostname: t.string().optional(),
|
|
416
|
-
auth0_client:
|
|
417
|
-
}),
|
|
416
|
+
auth0_client: T.optional()
|
|
417
|
+
}), x = t.object({
|
|
418
418
|
user_id: t.string(),
|
|
419
419
|
password: t.string(),
|
|
420
420
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
421
421
|
}), ot = t.object({
|
|
422
|
-
...
|
|
422
|
+
...x.shape,
|
|
423
423
|
created_at: t.string(),
|
|
424
424
|
updated_at: t.string()
|
|
425
|
-
}),
|
|
425
|
+
}), p = t.object({
|
|
426
426
|
initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
|
|
427
427
|
initial_ip: t.string().describe("First IP address associated with this session"),
|
|
428
428
|
initial_asn: t.string().describe("First autonomous system number associated with this session"),
|
|
@@ -431,15 +431,13 @@ const R = t.enum([
|
|
|
431
431
|
last_asn: t.string().describe("Last autonomous system number from which this user logged in")
|
|
432
432
|
}), P = t.object({
|
|
433
433
|
id: t.string(),
|
|
434
|
-
// TODO: Remove once data migrated
|
|
435
|
-
session_id: t.string().optional(),
|
|
436
434
|
client_id: t.string(),
|
|
437
435
|
revoked_at: t.string().optional(),
|
|
438
436
|
used_at: t.string(),
|
|
439
437
|
user_id: t.string().describe("The user ID associated with the session"),
|
|
440
438
|
expires_at: t.string().optional(),
|
|
441
439
|
idle_expires_at: t.string().optional(),
|
|
442
|
-
device:
|
|
440
|
+
device: p.describe(
|
|
443
441
|
"Metadata related to the device used in the session"
|
|
444
442
|
),
|
|
445
443
|
clients: t.array(t.string()).describe("List of client details for the session")
|
|
@@ -583,17 +581,23 @@ const H = t.object({
|
|
|
583
581
|
}), W = t.object({
|
|
584
582
|
// The actual refresh token value (primary key).
|
|
585
583
|
token: t.string(),
|
|
586
|
-
// Link to the session record
|
|
584
|
+
// Link to the session record
|
|
587
585
|
session_id: t.string(),
|
|
588
|
-
//
|
|
589
|
-
|
|
590
|
-
audience: t.string(),
|
|
586
|
+
// Link to user (foreign key)
|
|
587
|
+
user_id: t.string(),
|
|
591
588
|
// When the refresh token expires.
|
|
592
|
-
expires_at: t.string(),
|
|
589
|
+
expires_at: t.string().optional(),
|
|
590
|
+
idle_expires_at: t.string().optional(),
|
|
593
591
|
// When the token was last used.
|
|
594
|
-
|
|
595
|
-
|
|
596
|
-
|
|
592
|
+
last_exchanged_at: t.string().optional(),
|
|
593
|
+
device: p.optional(),
|
|
594
|
+
resource_servers: t.array(
|
|
595
|
+
t.object({
|
|
596
|
+
audience: t.string(),
|
|
597
|
+
scopes: t.string()
|
|
598
|
+
})
|
|
599
|
+
),
|
|
600
|
+
rotating: t.boolean()
|
|
597
601
|
}), dt = t.object({
|
|
598
602
|
// When the refresh token record was created.
|
|
599
603
|
created_at: t.string(),
|
|
@@ -607,60 +611,60 @@ function gt(e) {
|
|
|
607
611
|
return { connection: i, id: o };
|
|
608
612
|
}
|
|
609
613
|
export {
|
|
610
|
-
|
|
614
|
+
T as Auth0Client,
|
|
611
615
|
l as AuthorizationResponseMode,
|
|
612
616
|
r as AuthorizationResponseType,
|
|
613
617
|
c as CodeChallengeMethod,
|
|
614
618
|
F as GrantType,
|
|
615
|
-
|
|
616
|
-
|
|
617
|
-
|
|
619
|
+
R as LogTypes,
|
|
620
|
+
f as applicationInsertSchema,
|
|
621
|
+
S as applicationSchema,
|
|
618
622
|
V as auth0UserResponseSchema,
|
|
619
|
-
|
|
623
|
+
k as authParamsSchema,
|
|
620
624
|
a as baseUserSchema,
|
|
621
625
|
H as bordersSchema,
|
|
622
626
|
X as brandingSchema,
|
|
623
|
-
|
|
627
|
+
v as codeInsertSchema,
|
|
624
628
|
J as codeSchema,
|
|
625
|
-
|
|
629
|
+
j as codeTypeSchema,
|
|
626
630
|
K as colorsSchema,
|
|
627
|
-
|
|
628
|
-
|
|
629
|
-
|
|
631
|
+
y as connectionInsertSchema,
|
|
632
|
+
E as connectionSchema,
|
|
633
|
+
A as domainInsertSchema,
|
|
630
634
|
Z as domainSchema,
|
|
631
635
|
pt as emailProviderSchema,
|
|
632
636
|
n as fontDetailsSchema,
|
|
633
637
|
G as fontsSchema,
|
|
634
|
-
|
|
638
|
+
O as hookInsertSchema,
|
|
635
639
|
$ as hookSchema,
|
|
636
|
-
|
|
640
|
+
g as identitySchema,
|
|
637
641
|
tt as jwksKeySchema,
|
|
638
|
-
|
|
642
|
+
N as jwksSchema,
|
|
639
643
|
it as logSchema,
|
|
640
|
-
|
|
644
|
+
U as loginInsertSchema,
|
|
641
645
|
nt as loginSchema,
|
|
642
646
|
et as openIDConfigurationSchema,
|
|
643
647
|
L as pageBackgroundSchema,
|
|
644
648
|
gt as parseUserId,
|
|
645
|
-
|
|
649
|
+
x as passwordInsertSchema,
|
|
646
650
|
ot as passwordSchema,
|
|
647
|
-
|
|
651
|
+
d as profileDataSchema,
|
|
648
652
|
ct as promptSettingSchema,
|
|
649
653
|
W as refreshTokenInsertSchema,
|
|
650
654
|
dt as refreshTokenSchema,
|
|
651
|
-
|
|
655
|
+
b as samlpAddon,
|
|
652
656
|
P as sessionInsertSchema,
|
|
653
657
|
st as sessionSchema,
|
|
654
658
|
at as signingKeySchema,
|
|
655
|
-
|
|
656
|
-
|
|
659
|
+
w as tenantInsertSchema,
|
|
660
|
+
C as tenantSchema,
|
|
657
661
|
M as themeInsertSchema,
|
|
658
662
|
lt as themeSchema,
|
|
659
663
|
rt as tokenResponseSchema,
|
|
660
664
|
Q as totalsSchema,
|
|
661
|
-
|
|
665
|
+
_ as userInsertSchema,
|
|
662
666
|
Y as userResponseSchema,
|
|
663
|
-
|
|
667
|
+
u as userSchema,
|
|
664
668
|
z as vendorSettingsSchema,
|
|
665
669
|
B as widgetSchema
|
|
666
670
|
};
|