@authhero/adapter-interfaces 0.43.0 → 0.45.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),K=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),G=g,L=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),B="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let M=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=B[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>M()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),W=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),Q=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(Q),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),Y=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),it=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),U=t.z.object({id:t.z.string(),session_id:t.z.string().optional(),client_id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:it.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...U.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var N=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(N||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const R=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),D=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),x=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),F=t.z.object({borders:R,colors:T,displayName:t.z.string(),fonts:D,page_background:P,widget:x}),rt=F.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),H=t.z.object({token:t.z.string(),session_id:t.z.string(),scope:t.z.string(),audience:t.z.string(),expires_at:t.z.string(),used_at:t.z.string().optional(),revoked_at:t.z.string().optional()}),pt=t.z.object({created_at:t.z.string(),...H.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=N;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=G;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=R;exports.brandingSchema=q;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=y;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=Y;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=D;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=H;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=U;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=F;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=K;exports.userInsertSchema=d;exports.userResponseSchema=L;exports.userSchema=g;exports.vendorSettingsSchema=W;exports.widgetSchema=x;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),V=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(V),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),X=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(C)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),D=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:T,colors:D,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),rt=H.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...K.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=T;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=y;exports.colorsSchema=D;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=C;exports.logSchema=nt;exports.loginInsertSchema=j;exports.loginSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=H;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
@@ -2698,8 +2698,6 @@ export declare const passwordSchema: z.ZodObject<{
2698
2698
  export type Password = z.infer<typeof passwordSchema>;
2699
2699
  export declare const sessionInsertSchema: z.ZodObject<{
2700
2700
  id: z.ZodString;
2701
- session_id: z.ZodOptional<z.ZodString>;
2702
- client_id: z.ZodString;
2703
2701
  revoked_at: z.ZodOptional<z.ZodString>;
2704
2702
  used_at: z.ZodString;
2705
2703
  user_id: z.ZodString;
@@ -2731,7 +2729,6 @@ export declare const sessionInsertSchema: z.ZodObject<{
2731
2729
  }, "strip", z.ZodTypeAny, {
2732
2730
  user_id: string;
2733
2731
  id: string;
2734
- client_id: string;
2735
2732
  used_at: string;
2736
2733
  device: {
2737
2734
  last_ip: string;
@@ -2743,13 +2740,11 @@ export declare const sessionInsertSchema: z.ZodObject<{
2743
2740
  };
2744
2741
  clients: string[];
2745
2742
  expires_at?: string | undefined;
2746
- session_id?: string | undefined;
2747
2743
  revoked_at?: string | undefined;
2748
2744
  idle_expires_at?: string | undefined;
2749
2745
  }, {
2750
2746
  user_id: string;
2751
2747
  id: string;
2752
- client_id: string;
2753
2748
  used_at: string;
2754
2749
  device: {
2755
2750
  last_ip: string;
@@ -2761,15 +2756,12 @@ export declare const sessionInsertSchema: z.ZodObject<{
2761
2756
  };
2762
2757
  clients: string[];
2763
2758
  expires_at?: string | undefined;
2764
- session_id?: string | undefined;
2765
2759
  revoked_at?: string | undefined;
2766
2760
  idle_expires_at?: string | undefined;
2767
2761
  }>;
2768
2762
  export type SessionInsert = z.infer<typeof sessionInsertSchema>;
2769
2763
  export declare const sessionSchema: z.ZodObject<{
2770
2764
  id: z.ZodString;
2771
- session_id: z.ZodOptional<z.ZodString>;
2772
- client_id: z.ZodString;
2773
2765
  revoked_at: z.ZodOptional<z.ZodString>;
2774
2766
  used_at: z.ZodString;
2775
2767
  user_id: z.ZodString;
@@ -2807,7 +2799,6 @@ export declare const sessionSchema: z.ZodObject<{
2807
2799
  updated_at: string;
2808
2800
  user_id: string;
2809
2801
  id: string;
2810
- client_id: string;
2811
2802
  used_at: string;
2812
2803
  device: {
2813
2804
  last_ip: string;
@@ -2821,7 +2812,6 @@ export declare const sessionSchema: z.ZodObject<{
2821
2812
  authenticated_at: string;
2822
2813
  last_interaction_at: string;
2823
2814
  expires_at?: string | undefined;
2824
- session_id?: string | undefined;
2825
2815
  revoked_at?: string | undefined;
2826
2816
  idle_expires_at?: string | undefined;
2827
2817
  }, {
@@ -2829,7 +2819,6 @@ export declare const sessionSchema: z.ZodObject<{
2829
2819
  updated_at: string;
2830
2820
  user_id: string;
2831
2821
  id: string;
2832
- client_id: string;
2833
2822
  used_at: string;
2834
2823
  device: {
2835
2824
  last_ip: string;
@@ -2843,7 +2832,6 @@ export declare const sessionSchema: z.ZodObject<{
2843
2832
  authenticated_at: string;
2844
2833
  last_interaction_at: string;
2845
2834
  expires_at?: string | undefined;
2846
- session_id?: string | undefined;
2847
2835
  revoked_at?: string | undefined;
2848
2836
  idle_expires_at?: string | undefined;
2849
2837
  }>;
@@ -4311,58 +4299,176 @@ export declare const emailProviderSchema: z.ZodObject<{
4311
4299
  }>;
4312
4300
  export type EmailProvider = z.infer<typeof emailProviderSchema>;
4313
4301
  export declare const refreshTokenInsertSchema: z.ZodObject<{
4314
- token: z.ZodString;
4302
+ id: z.ZodString;
4315
4303
  session_id: z.ZodString;
4316
- scope: z.ZodString;
4317
- audience: z.ZodString;
4318
- expires_at: z.ZodString;
4319
- used_at: z.ZodOptional<z.ZodString>;
4320
- revoked_at: z.ZodOptional<z.ZodString>;
4304
+ user_id: z.ZodString;
4305
+ client_id: z.ZodString;
4306
+ expires_at: z.ZodOptional<z.ZodString>;
4307
+ idle_expires_at: z.ZodOptional<z.ZodString>;
4308
+ last_exchanged_at: z.ZodOptional<z.ZodString>;
4309
+ device: z.ZodObject<{
4310
+ initial_user_agent: z.ZodString;
4311
+ initial_ip: z.ZodString;
4312
+ initial_asn: z.ZodString;
4313
+ last_user_agent: z.ZodString;
4314
+ last_ip: z.ZodString;
4315
+ last_asn: z.ZodString;
4316
+ }, "strip", z.ZodTypeAny, {
4317
+ last_ip: string;
4318
+ initial_user_agent: string;
4319
+ initial_ip: string;
4320
+ initial_asn: string;
4321
+ last_user_agent: string;
4322
+ last_asn: string;
4323
+ }, {
4324
+ last_ip: string;
4325
+ initial_user_agent: string;
4326
+ initial_ip: string;
4327
+ initial_asn: string;
4328
+ last_user_agent: string;
4329
+ last_asn: string;
4330
+ }>;
4331
+ resource_servers: z.ZodArray<z.ZodObject<{
4332
+ audience: z.ZodString;
4333
+ scopes: z.ZodString;
4334
+ }, "strip", z.ZodTypeAny, {
4335
+ audience: string;
4336
+ scopes: string;
4337
+ }, {
4338
+ audience: string;
4339
+ scopes: string;
4340
+ }>, "many">;
4341
+ rotating: z.ZodBoolean;
4321
4342
  }, "strip", z.ZodTypeAny, {
4322
- audience: string;
4323
- token: string;
4324
- scope: string;
4325
- expires_at: string;
4343
+ user_id: string;
4344
+ id: string;
4345
+ client_id: string;
4346
+ device: {
4347
+ last_ip: string;
4348
+ initial_user_agent: string;
4349
+ initial_ip: string;
4350
+ initial_asn: string;
4351
+ last_user_agent: string;
4352
+ last_asn: string;
4353
+ };
4326
4354
  session_id: string;
4327
- used_at?: string | undefined;
4328
- revoked_at?: string | undefined;
4355
+ resource_servers: {
4356
+ audience: string;
4357
+ scopes: string;
4358
+ }[];
4359
+ rotating: boolean;
4360
+ expires_at?: string | undefined;
4361
+ idle_expires_at?: string | undefined;
4362
+ last_exchanged_at?: string | undefined;
4329
4363
  }, {
4330
- audience: string;
4331
- token: string;
4332
- scope: string;
4333
- expires_at: string;
4364
+ user_id: string;
4365
+ id: string;
4366
+ client_id: string;
4367
+ device: {
4368
+ last_ip: string;
4369
+ initial_user_agent: string;
4370
+ initial_ip: string;
4371
+ initial_asn: string;
4372
+ last_user_agent: string;
4373
+ last_asn: string;
4374
+ };
4334
4375
  session_id: string;
4335
- used_at?: string | undefined;
4336
- revoked_at?: string | undefined;
4376
+ resource_servers: {
4377
+ audience: string;
4378
+ scopes: string;
4379
+ }[];
4380
+ rotating: boolean;
4381
+ expires_at?: string | undefined;
4382
+ idle_expires_at?: string | undefined;
4383
+ last_exchanged_at?: string | undefined;
4337
4384
  }>;
4338
4385
  export type RefreshTokenInsert = z.infer<typeof refreshTokenInsertSchema>;
4339
4386
  export declare const refreshTokenSchema: z.ZodObject<{
4340
- token: z.ZodString;
4387
+ id: z.ZodString;
4341
4388
  session_id: z.ZodString;
4342
- scope: z.ZodString;
4343
- audience: z.ZodString;
4344
- expires_at: z.ZodString;
4345
- used_at: z.ZodOptional<z.ZodString>;
4346
- revoked_at: z.ZodOptional<z.ZodString>;
4389
+ user_id: z.ZodString;
4390
+ client_id: z.ZodString;
4391
+ expires_at: z.ZodOptional<z.ZodString>;
4392
+ idle_expires_at: z.ZodOptional<z.ZodString>;
4393
+ last_exchanged_at: z.ZodOptional<z.ZodString>;
4394
+ device: z.ZodObject<{
4395
+ initial_user_agent: z.ZodString;
4396
+ initial_ip: z.ZodString;
4397
+ initial_asn: z.ZodString;
4398
+ last_user_agent: z.ZodString;
4399
+ last_ip: z.ZodString;
4400
+ last_asn: z.ZodString;
4401
+ }, "strip", z.ZodTypeAny, {
4402
+ last_ip: string;
4403
+ initial_user_agent: string;
4404
+ initial_ip: string;
4405
+ initial_asn: string;
4406
+ last_user_agent: string;
4407
+ last_asn: string;
4408
+ }, {
4409
+ last_ip: string;
4410
+ initial_user_agent: string;
4411
+ initial_ip: string;
4412
+ initial_asn: string;
4413
+ last_user_agent: string;
4414
+ last_asn: string;
4415
+ }>;
4416
+ resource_servers: z.ZodArray<z.ZodObject<{
4417
+ audience: z.ZodString;
4418
+ scopes: z.ZodString;
4419
+ }, "strip", z.ZodTypeAny, {
4420
+ audience: string;
4421
+ scopes: string;
4422
+ }, {
4423
+ audience: string;
4424
+ scopes: string;
4425
+ }>, "many">;
4426
+ rotating: z.ZodBoolean;
4347
4427
  created_at: z.ZodString;
4348
4428
  }, "strip", z.ZodTypeAny, {
4349
4429
  created_at: string;
4350
- audience: string;
4351
- token: string;
4352
- scope: string;
4353
- expires_at: string;
4430
+ user_id: string;
4431
+ id: string;
4432
+ client_id: string;
4433
+ device: {
4434
+ last_ip: string;
4435
+ initial_user_agent: string;
4436
+ initial_ip: string;
4437
+ initial_asn: string;
4438
+ last_user_agent: string;
4439
+ last_asn: string;
4440
+ };
4354
4441
  session_id: string;
4355
- used_at?: string | undefined;
4356
- revoked_at?: string | undefined;
4442
+ resource_servers: {
4443
+ audience: string;
4444
+ scopes: string;
4445
+ }[];
4446
+ rotating: boolean;
4447
+ expires_at?: string | undefined;
4448
+ idle_expires_at?: string | undefined;
4449
+ last_exchanged_at?: string | undefined;
4357
4450
  }, {
4358
4451
  created_at: string;
4359
- audience: string;
4360
- token: string;
4361
- scope: string;
4362
- expires_at: string;
4452
+ user_id: string;
4453
+ id: string;
4454
+ client_id: string;
4455
+ device: {
4456
+ last_ip: string;
4457
+ initial_user_agent: string;
4458
+ initial_ip: string;
4459
+ initial_asn: string;
4460
+ last_user_agent: string;
4461
+ last_asn: string;
4462
+ };
4363
4463
  session_id: string;
4364
- used_at?: string | undefined;
4365
- revoked_at?: string | undefined;
4464
+ resource_servers: {
4465
+ audience: string;
4466
+ scopes: string;
4467
+ }[];
4468
+ rotating: boolean;
4469
+ expires_at?: string | undefined;
4470
+ idle_expires_at?: string | undefined;
4471
+ last_exchanged_at?: string | undefined;
4366
4472
  }>;
4367
4473
  export type RefreshToken = z.infer<typeof refreshTokenSchema>;
4368
4474
  export declare function parseUserId(user_id: string): {
@@ -6,7 +6,7 @@ const Q = t.object({
6
6
  }), s = t.object({
7
7
  created_at: t.string(),
8
8
  updated_at: t.string()
9
- }), p = t.object({
9
+ }), d = t.object({
10
10
  email: t.string().optional(),
11
11
  email_verified: t.boolean().optional(),
12
12
  name: t.string().optional(),
@@ -15,7 +15,7 @@ const Q = t.object({
15
15
  phone_number: t.string().optional(),
16
16
  phone_verified: t.boolean().optional(),
17
17
  family_name: t.string().optional()
18
- }).catchall(t.any()), d = t.object({
18
+ }).catchall(t.any()), g = t.object({
19
19
  connection: t.string(),
20
20
  user_id: t.string(),
21
21
  provider: t.string(),
@@ -23,7 +23,7 @@ const Q = t.object({
23
23
  access_token: t.string().optional(),
24
24
  access_token_secret: t.string().optional(),
25
25
  refresh_token: t.string().optional(),
26
- profileData: p.optional()
26
+ profileData: d.optional()
27
27
  }), a = t.object({
28
28
  email: t.string().optional(),
29
29
  username: t.string().optional(),
@@ -38,7 +38,7 @@ const Q = t.object({
38
38
  user_id: t.string().optional(),
39
39
  app_metadata: t.any().default({}).optional(),
40
40
  user_metadata: t.any().default({}).optional()
41
- }), g = a.extend({
41
+ }), _ = a.extend({
42
42
  email_verified: t.boolean().default(!1),
43
43
  verify_email: t.boolean().optional(),
44
44
  last_ip: t.string().optional(),
@@ -47,30 +47,30 @@ const Q = t.object({
47
47
  provider: t.string().default("email"),
48
48
  connection: t.string().default("email"),
49
49
  is_social: t.boolean().optional()
50
- }), _ = t.object({
51
- ...g.shape,
50
+ }), u = t.object({
51
+ ..._.shape,
52
52
  ...s.shape,
53
53
  user_id: t.string(),
54
54
  is_social: t.boolean(),
55
55
  // TODO: this not might be correct if you use the username
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
- identities: t.array(d).optional()
59
- }), V = _, Y = a.extend({
58
+ identities: t.array(g).optional()
59
+ }), V = u, Y = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
63
63
  last_ip: t.string().optional(),
64
64
  last_login: t.string().optional(),
65
65
  user_id: t.string()
66
- }).catchall(t.any()), u = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
67
- let m = (e = 21) => {
66
+ }).catchall(t.any()), m = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
67
+ let h = (e = 21) => {
68
68
  let i = "", o = crypto.getRandomValues(new Uint8Array(e));
69
69
  for (; e--; )
70
- i += u[o[e] & 63];
70
+ i += m[o[e] & 63];
71
71
  return i;
72
72
  };
73
- const h = t.object({
73
+ const b = t.object({
74
74
  audience: t.string().optional(),
75
75
  recipient: t.string().optional(),
76
76
  createUpnClaim: t.boolean().optional(),
@@ -87,7 +87,7 @@ const h = t.object({
87
87
  nameIdentifierProbes: t.array(t.string()).optional(),
88
88
  authnContextClassRef: t.string().optional(),
89
89
  mappings: t.record(t.string()).optional()
90
- }), b = t.object({
90
+ }), f = t.object({
91
91
  id: t.string(),
92
92
  name: t.string(),
93
93
  callbacks: t.array(t.string()).default([]).optional().openapi({
@@ -106,24 +106,24 @@ const h = t.object({
106
106
  description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
107
107
  }),
108
108
  addons: t.object({
109
- samlp: h.optional()
109
+ samlp: b.optional()
110
110
  }).default({}).optional().openapi({
111
111
  description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
112
112
  }),
113
113
  email_validation: t.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
114
114
  description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
115
115
  }),
116
- client_secret: t.string().default(() => m()).optional(),
116
+ client_secret: t.string().default(() => h()).optional(),
117
117
  disable_sign_ups: t.boolean().optional().default(!1).openapi({
118
118
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
119
119
  })
120
- }), f = t.object({
120
+ }), S = t.object({
121
121
  created_at: t.string().transform((e) => e === null ? "" : e),
122
122
  updated_at: t.string().transform((e) => e === null ? "" : e),
123
- ...b.shape
123
+ ...f.shape
124
124
  });
125
125
  var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
126
- const S = t.object({
126
+ const k = t.object({
127
127
  client_id: t.string(),
128
128
  vendor_id: t.string().optional(),
129
129
  act_as: t.string().optional(),
@@ -154,7 +154,7 @@ const S = t.object({
154
154
  font: t.object({
155
155
  url: t.string()
156
156
  }).optional()
157
- }), k = t.object({
157
+ }), y = t.object({
158
158
  id: t.string().optional(),
159
159
  name: t.string(),
160
160
  strategy: t.string(),
@@ -176,11 +176,11 @@ const S = t.object({
176
176
  enabled_clients: t.array(t.string()).default([]).optional(),
177
177
  response_type: t.custom().optional(),
178
178
  response_mode: t.custom().optional()
179
- }), y = t.object({
179
+ }), E = t.object({
180
180
  id: t.string(),
181
181
  created_at: t.string().transform((e) => e === null ? "" : e),
182
182
  updated_at: t.string().transform((e) => e === null ? "" : e)
183
- }).extend(k.shape), E = t.object({
183
+ }).extend(y.shape), w = t.object({
184
184
  name: t.string(),
185
185
  audience: t.string(),
186
186
  sender_email: t.string().email(),
@@ -191,10 +191,10 @@ const S = t.object({
191
191
  secondary_color: t.string().optional(),
192
192
  language: t.string().optional(),
193
193
  id: t.string().optional()
194
- }), w = t.object({
194
+ }), C = t.object({
195
195
  created_at: t.string().transform((e) => e === null ? "" : e),
196
196
  updated_at: t.string().transform((e) => e === null ? "" : e),
197
- ...E.shape,
197
+ ...w.shape,
198
198
  id: t.string()
199
199
  }), z = t.object({
200
200
  logoUrl: t.string(),
@@ -213,7 +213,7 @@ const S = t.object({
213
213
  checkoutHideSocial: t.boolean().optional(),
214
214
  siteUrl: t.string().nullable(),
215
215
  manageSubscriptionsUrl: t.string().optional()
216
- }), C = t.object({
216
+ }), I = t.object({
217
217
  domain: t.string(),
218
218
  dkim_private_key: t.string().optional(),
219
219
  dkim_public_key: t.string().optional(),
@@ -221,19 +221,19 @@ const S = t.object({
221
221
  email_service: t.string().optional()
222
222
  });
223
223
  t.object({
224
- ...f.shape,
225
- domains: t.array(C),
226
- tenant: w,
227
- connections: t.array(y)
224
+ ...S.shape,
225
+ domains: t.array(I),
226
+ tenant: C,
227
+ connections: t.array(E)
228
228
  });
229
- const I = t.enum([
229
+ const j = t.enum([
230
230
  "password_reset",
231
231
  "email_verification",
232
232
  "otp",
233
233
  "authorization_code",
234
234
  "oauth2_state",
235
235
  "ticket"
236
- ]), j = t.object({
236
+ ]), v = t.object({
237
237
  code_id: t.string().openapi({
238
238
  description: "The code that will be used in for instance an email verification flow"
239
239
  }),
@@ -243,7 +243,7 @@ const I = t.enum([
243
243
  connection_id: t.string().optional().openapi({
244
244
  description: "The connection that the code is connected to"
245
245
  }),
246
- code_type: I,
246
+ code_type: j,
247
247
  code_verifier: t.string().optional().openapi({
248
248
  description: "The code verifier used in PKCE in outbound flows"
249
249
  }),
@@ -251,18 +251,18 @@ const I = t.enum([
251
251
  used_at: t.string().optional(),
252
252
  user_id: t.string().optional()
253
253
  }), J = t.object({
254
- ...j.shape,
254
+ ...v.shape,
255
255
  created_at: t.string()
256
- }), v = t.object({
256
+ }), A = t.object({
257
257
  domain: t.string(),
258
258
  dkim_private_key: t.string().optional(),
259
259
  dkim_public_key: t.string().optional(),
260
260
  email_api_key: t.string().optional(),
261
261
  email_service: t.string().optional()
262
262
  }), Z = s.extend({
263
- ...v.shape,
263
+ ...A.shape,
264
264
  id: t.string()
265
- }), A = t.object({
265
+ }), O = t.object({
266
266
  trigger_id: t.enum([
267
267
  "pre-user-signup",
268
268
  "post-user-registration",
@@ -273,10 +273,10 @@ const I = t.enum([
273
273
  hook_id: t.string().optional(),
274
274
  synchronous: t.boolean().default(!1),
275
275
  priority: t.number().optional()
276
- }), $ = A.extend({
276
+ }), $ = O.extend({
277
277
  ...s.shape,
278
278
  hook_id: t.string()
279
- }), O = t.object({
279
+ }), N = t.object({
280
280
  alg: t.enum([
281
281
  "RS256",
282
282
  "RS384",
@@ -296,7 +296,7 @@ const I = t.enum([
296
296
  x5c: t.array(t.string()).optional(),
297
297
  use: t.enum(["sig", "enc"]).optional()
298
298
  }), tt = t.object({
299
- keys: t.array(O)
299
+ keys: t.array(N)
300
300
  }), et = t.object({
301
301
  issuer: t.string(),
302
302
  authorization_endpoint: t.string(),
@@ -318,9 +318,9 @@ const I = t.enum([
318
318
  request_uri_parameter_supported: t.boolean(),
319
319
  request_parameter_supported: t.boolean(),
320
320
  token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
321
- }), N = t.object({
321
+ }), U = t.object({
322
322
  auth0Client: t.string().optional(),
323
- authParams: S,
323
+ authParams: k,
324
324
  expires_at: t.string(),
325
325
  deleted_at: t.string().optional(),
326
326
  ip: t.string().optional(),
@@ -328,15 +328,15 @@ const I = t.enum([
328
328
  }).openapi({
329
329
  description: "This represents a login sesion"
330
330
  }), nt = t.object({
331
- ...N.shape,
331
+ ...U.shape,
332
332
  login_id: t.string().openapi({
333
333
  description: "This is is used as the state in the universal login"
334
334
  }),
335
335
  created_at: t.string(),
336
336
  updated_at: t.string()
337
337
  });
338
- var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
339
- const R = t.enum([
338
+ var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
339
+ const D = t.enum([
340
340
  "cls",
341
341
  // CODE_LINK_SENT
342
342
  "fsa",
@@ -385,14 +385,14 @@ const R = t.enum([
385
385
  // SUCCESS_VERIFICATION_EMAIL
386
386
  "svr"
387
387
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
388
- ]), D = t.object({
388
+ ]), T = t.object({
389
389
  name: t.string(),
390
390
  version: t.string(),
391
391
  env: t.object({
392
392
  node: t.string().optional()
393
393
  }).optional()
394
394
  }), it = t.object({
395
- type: R,
395
+ type: D,
396
396
  date: t.string(),
397
397
  description: t.string().optional(),
398
398
  log_id: t.string().optional(),
@@ -413,16 +413,16 @@ const R = t.enum([
413
413
  strategy: t.string().optional(),
414
414
  strategy_type: t.string().optional(),
415
415
  hostname: t.string().optional(),
416
- auth0_client: D.optional()
417
- }), T = t.object({
416
+ auth0_client: T.optional()
417
+ }), x = t.object({
418
418
  user_id: t.string(),
419
419
  password: t.string(),
420
420
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
421
421
  }), ot = t.object({
422
- ...T.shape,
422
+ ...x.shape,
423
423
  created_at: t.string(),
424
424
  updated_at: t.string()
425
- }), x = t.object({
425
+ }), p = t.object({
426
426
  initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
427
427
  initial_ip: t.string().describe("First IP address associated with this session"),
428
428
  initial_asn: t.string().describe("First autonomous system number associated with this session"),
@@ -431,15 +431,12 @@ const R = t.enum([
431
431
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
432
432
  }), P = t.object({
433
433
  id: t.string(),
434
- // TODO: Remove once data migrated
435
- session_id: t.string().optional(),
436
- client_id: t.string(),
437
434
  revoked_at: t.string().optional(),
438
435
  used_at: t.string(),
439
436
  user_id: t.string().describe("The user ID associated with the session"),
440
437
  expires_at: t.string().optional(),
441
438
  idle_expires_at: t.string().optional(),
442
- device: x.describe(
439
+ device: p.describe(
443
440
  "Metadata related to the device used in the session"
444
441
  ),
445
442
  clients: t.array(t.string()).describe("List of client details for the session")
@@ -582,18 +579,25 @@ const H = t.object({
582
579
  settings: t.object({}).optional()
583
580
  }), W = t.object({
584
581
  // The actual refresh token value (primary key).
585
- token: t.string(),
586
- // Link to the session record (foreign key).
582
+ id: t.string(),
583
+ // Link to the session record
587
584
  session_id: t.string(),
588
- // The scope and audience that was requested when the token was created.
589
- scope: t.string(),
590
- audience: t.string(),
585
+ // Link to user (foreign key)
586
+ user_id: t.string(),
587
+ client_id: t.string(),
591
588
  // When the refresh token expires.
592
- expires_at: t.string(),
589
+ expires_at: t.string().optional(),
590
+ idle_expires_at: t.string().optional(),
593
591
  // When the token was last used.
594
- used_at: t.string().optional(),
595
- // If the token is revoked or deleted.
596
- revoked_at: t.string().optional()
592
+ last_exchanged_at: t.string().optional(),
593
+ device: p,
594
+ resource_servers: t.array(
595
+ t.object({
596
+ audience: t.string(),
597
+ scopes: t.string()
598
+ })
599
+ ),
600
+ rotating: t.boolean()
597
601
  }), dt = t.object({
598
602
  // When the refresh token record was created.
599
603
  created_at: t.string(),
@@ -607,60 +611,60 @@ function gt(e) {
607
611
  return { connection: i, id: o };
608
612
  }
609
613
  export {
610
- D as Auth0Client,
614
+ T as Auth0Client,
611
615
  l as AuthorizationResponseMode,
612
616
  r as AuthorizationResponseType,
613
617
  c as CodeChallengeMethod,
614
618
  F as GrantType,
615
- U as LogTypes,
616
- b as applicationInsertSchema,
617
- f as applicationSchema,
619
+ R as LogTypes,
620
+ f as applicationInsertSchema,
621
+ S as applicationSchema,
618
622
  V as auth0UserResponseSchema,
619
- S as authParamsSchema,
623
+ k as authParamsSchema,
620
624
  a as baseUserSchema,
621
625
  H as bordersSchema,
622
626
  X as brandingSchema,
623
- j as codeInsertSchema,
627
+ v as codeInsertSchema,
624
628
  J as codeSchema,
625
- I as codeTypeSchema,
629
+ j as codeTypeSchema,
626
630
  K as colorsSchema,
627
- k as connectionInsertSchema,
628
- y as connectionSchema,
629
- v as domainInsertSchema,
631
+ y as connectionInsertSchema,
632
+ E as connectionSchema,
633
+ A as domainInsertSchema,
630
634
  Z as domainSchema,
631
635
  pt as emailProviderSchema,
632
636
  n as fontDetailsSchema,
633
637
  G as fontsSchema,
634
- A as hookInsertSchema,
638
+ O as hookInsertSchema,
635
639
  $ as hookSchema,
636
- d as identitySchema,
640
+ g as identitySchema,
637
641
  tt as jwksKeySchema,
638
- O as jwksSchema,
642
+ N as jwksSchema,
639
643
  it as logSchema,
640
- N as loginInsertSchema,
644
+ U as loginInsertSchema,
641
645
  nt as loginSchema,
642
646
  et as openIDConfigurationSchema,
643
647
  L as pageBackgroundSchema,
644
648
  gt as parseUserId,
645
- T as passwordInsertSchema,
649
+ x as passwordInsertSchema,
646
650
  ot as passwordSchema,
647
- p as profileDataSchema,
651
+ d as profileDataSchema,
648
652
  ct as promptSettingSchema,
649
653
  W as refreshTokenInsertSchema,
650
654
  dt as refreshTokenSchema,
651
- h as samlpAddon,
655
+ b as samlpAddon,
652
656
  P as sessionInsertSchema,
653
657
  st as sessionSchema,
654
658
  at as signingKeySchema,
655
- E as tenantInsertSchema,
656
- w as tenantSchema,
659
+ w as tenantInsertSchema,
660
+ C as tenantSchema,
657
661
  M as themeInsertSchema,
658
662
  lt as themeSchema,
659
663
  rt as tokenResponseSchema,
660
664
  Q as totalsSchema,
661
- g as userInsertSchema,
665
+ _ as userInsertSchema,
662
666
  Y as userResponseSchema,
663
- _ as userSchema,
667
+ u as userSchema,
664
668
  z as vendorSettingsSchema,
665
669
  B as widgetSchema
666
670
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.43.0",
14
+ "version": "0.45.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],