@authhero/adapter-interfaces 0.45.0 → 0.47.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +92 -85
- package/dist/adapter-interfaces.mjs +113 -108
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),V=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(V),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),X=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(C)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),D=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:T,colors:D,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),rt=H.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...K.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=T;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=y;exports.colorsSchema=D;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=C;exports.logSchema=nt;exports.loginInsertSchema=j;exports.loginSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=H;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const I=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),k=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:I,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...k.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),Y=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({}).optional(),tls_policy:t.z.string().optional()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...c.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),it=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const at=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const D=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:D,colors:T,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),st=H.extend({themeId:t.z.string()}),rt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),lt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),ct=t.z.object({created_at:t.z.string(),...K.shape});function pt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=D;exports.brandingSchema=W;exports.codeInsertSchema=k;exports.codeSchema=V;exports.codeTypeSchema=I;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=Y;exports.emailProviderSchema=lt;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=pt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=rt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=ct;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=H;exports.themeSchema=st;exports.tokenResponseSchema=at;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
|
|
@@ -1116,25 +1116,6 @@ export declare const brandingSchema: z.ZodObject<{
|
|
|
1116
1116
|
}>;
|
|
1117
1117
|
export type Branding = z.infer<typeof brandingSchema>;
|
|
1118
1118
|
declare const ClientSchema: z.ZodObject<{
|
|
1119
|
-
domains: z.ZodArray<z.ZodObject<{
|
|
1120
|
-
domain: z.ZodString;
|
|
1121
|
-
dkim_private_key: z.ZodOptional<z.ZodString>;
|
|
1122
|
-
dkim_public_key: z.ZodOptional<z.ZodString>;
|
|
1123
|
-
email_api_key: z.ZodOptional<z.ZodString>;
|
|
1124
|
-
email_service: z.ZodOptional<z.ZodString>;
|
|
1125
|
-
}, "strip", z.ZodTypeAny, {
|
|
1126
|
-
domain: string;
|
|
1127
|
-
dkim_private_key?: string | undefined;
|
|
1128
|
-
dkim_public_key?: string | undefined;
|
|
1129
|
-
email_api_key?: string | undefined;
|
|
1130
|
-
email_service?: string | undefined;
|
|
1131
|
-
}, {
|
|
1132
|
-
domain: string;
|
|
1133
|
-
dkim_private_key?: string | undefined;
|
|
1134
|
-
dkim_public_key?: string | undefined;
|
|
1135
|
-
email_api_key?: string | undefined;
|
|
1136
|
-
email_service?: string | undefined;
|
|
1137
|
-
}>, "many">;
|
|
1138
1119
|
tenant: z.ZodObject<{
|
|
1139
1120
|
id: z.ZodString;
|
|
1140
1121
|
name: z.ZodString;
|
|
@@ -1392,13 +1373,6 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1392
1373
|
name: string;
|
|
1393
1374
|
id: string;
|
|
1394
1375
|
disable_sign_ups: boolean;
|
|
1395
|
-
domains: {
|
|
1396
|
-
domain: string;
|
|
1397
|
-
dkim_private_key?: string | undefined;
|
|
1398
|
-
dkim_public_key?: string | undefined;
|
|
1399
|
-
email_api_key?: string | undefined;
|
|
1400
|
-
email_service?: string | undefined;
|
|
1401
|
-
}[];
|
|
1402
1376
|
tenant: {
|
|
1403
1377
|
created_at: string;
|
|
1404
1378
|
updated_at: string;
|
|
@@ -1470,13 +1444,6 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1470
1444
|
updated_at: string;
|
|
1471
1445
|
name: string;
|
|
1472
1446
|
id: string;
|
|
1473
|
-
domains: {
|
|
1474
|
-
domain: string;
|
|
1475
|
-
dkim_private_key?: string | undefined;
|
|
1476
|
-
dkim_public_key?: string | undefined;
|
|
1477
|
-
email_api_key?: string | undefined;
|
|
1478
|
-
email_service?: string | undefined;
|
|
1479
|
-
}[];
|
|
1480
1447
|
tenant: {
|
|
1481
1448
|
created_at: string;
|
|
1482
1449
|
updated_at: string;
|
|
@@ -1830,56 +1797,96 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
|
|
|
1830
1797
|
enabled_clients?: string[] | undefined;
|
|
1831
1798
|
}>;
|
|
1832
1799
|
export type Connection = z.infer<typeof connectionSchema>;
|
|
1833
|
-
export declare const
|
|
1800
|
+
export declare const customDomainInsertSchema: z.ZodObject<{
|
|
1834
1801
|
domain: z.ZodString;
|
|
1835
|
-
|
|
1836
|
-
|
|
1837
|
-
|
|
1838
|
-
|
|
1802
|
+
type: z.ZodEnum<[
|
|
1803
|
+
"auth0_managed_certs",
|
|
1804
|
+
"self_managed_certs"
|
|
1805
|
+
]>;
|
|
1806
|
+
verification_method: z.ZodOptional<z.ZodEnum<[
|
|
1807
|
+
"txt"
|
|
1808
|
+
]>>;
|
|
1809
|
+
tls_policy: z.ZodOptional<z.ZodEnum<[
|
|
1810
|
+
"recommended"
|
|
1811
|
+
]>>;
|
|
1812
|
+
custom_client_ip_header: z.ZodOptional<z.ZodEnum<[
|
|
1813
|
+
"true-client-ip",
|
|
1814
|
+
"cf-connecting-ip",
|
|
1815
|
+
"x-forwarded-for",
|
|
1816
|
+
"x-azure-clientip",
|
|
1817
|
+
"null"
|
|
1818
|
+
]>>;
|
|
1819
|
+
domain_metadata: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
|
|
1839
1820
|
}, "strip", z.ZodTypeAny, {
|
|
1821
|
+
type: "auth0_managed_certs" | "self_managed_certs";
|
|
1840
1822
|
domain: string;
|
|
1841
|
-
|
|
1842
|
-
|
|
1843
|
-
|
|
1844
|
-
|
|
1823
|
+
verification_method?: "txt" | undefined;
|
|
1824
|
+
tls_policy?: "recommended" | undefined;
|
|
1825
|
+
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1826
|
+
domain_metadata?: Record<string, string> | undefined;
|
|
1845
1827
|
}, {
|
|
1828
|
+
type: "auth0_managed_certs" | "self_managed_certs";
|
|
1846
1829
|
domain: string;
|
|
1847
|
-
|
|
1848
|
-
|
|
1849
|
-
|
|
1850
|
-
|
|
1830
|
+
verification_method?: "txt" | undefined;
|
|
1831
|
+
tls_policy?: "recommended" | undefined;
|
|
1832
|
+
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1833
|
+
domain_metadata?: Record<string, string> | undefined;
|
|
1851
1834
|
}>;
|
|
1852
|
-
export type
|
|
1853
|
-
export declare const
|
|
1854
|
-
|
|
1855
|
-
|
|
1856
|
-
|
|
1857
|
-
|
|
1835
|
+
export type CustomDomainInsert = z.infer<typeof customDomainInsertSchema>;
|
|
1836
|
+
export declare const customDomainSchema: z.ZodObject<{
|
|
1837
|
+
custom_domain_id: z.ZodString;
|
|
1838
|
+
primary: z.ZodBoolean;
|
|
1839
|
+
status: z.ZodEnum<[
|
|
1840
|
+
"disabled",
|
|
1841
|
+
"pending",
|
|
1842
|
+
"pending_verification",
|
|
1843
|
+
"ready"
|
|
1844
|
+
]>;
|
|
1845
|
+
origin_domain_name: z.ZodOptional<z.ZodString>;
|
|
1846
|
+
verification: z.ZodOptional<z.ZodObject<{}, "strip", z.ZodTypeAny, {}, {}>>;
|
|
1847
|
+
tls_policy: z.ZodOptional<z.ZodString>;
|
|
1858
1848
|
domain: z.ZodString;
|
|
1859
|
-
|
|
1860
|
-
|
|
1861
|
-
|
|
1862
|
-
|
|
1863
|
-
|
|
1864
|
-
|
|
1865
|
-
|
|
1866
|
-
|
|
1849
|
+
type: z.ZodEnum<[
|
|
1850
|
+
"auth0_managed_certs",
|
|
1851
|
+
"self_managed_certs"
|
|
1852
|
+
]>;
|
|
1853
|
+
verification_method: z.ZodOptional<z.ZodEnum<[
|
|
1854
|
+
"txt"
|
|
1855
|
+
]>>;
|
|
1856
|
+
custom_client_ip_header: z.ZodOptional<z.ZodEnum<[
|
|
1857
|
+
"true-client-ip",
|
|
1858
|
+
"cf-connecting-ip",
|
|
1859
|
+
"x-forwarded-for",
|
|
1860
|
+
"x-azure-clientip",
|
|
1861
|
+
"null"
|
|
1862
|
+
]>>;
|
|
1863
|
+
domain_metadata: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
|
|
1864
|
+
}, "strip", z.ZodTypeAny, {
|
|
1865
|
+
type: "auth0_managed_certs" | "self_managed_certs";
|
|
1866
|
+
status: "disabled" | "pending" | "pending_verification" | "ready";
|
|
1867
|
+
primary: boolean;
|
|
1867
1868
|
domain: string;
|
|
1868
|
-
|
|
1869
|
-
|
|
1870
|
-
|
|
1871
|
-
|
|
1869
|
+
custom_domain_id: string;
|
|
1870
|
+
verification_method?: "txt" | undefined;
|
|
1871
|
+
tls_policy?: string | undefined;
|
|
1872
|
+
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1873
|
+
domain_metadata?: Record<string, string> | undefined;
|
|
1874
|
+
origin_domain_name?: string | undefined;
|
|
1875
|
+
verification?: {} | undefined;
|
|
1872
1876
|
}, {
|
|
1873
|
-
|
|
1874
|
-
|
|
1875
|
-
|
|
1877
|
+
type: "auth0_managed_certs" | "self_managed_certs";
|
|
1878
|
+
status: "disabled" | "pending" | "pending_verification" | "ready";
|
|
1879
|
+
primary: boolean;
|
|
1876
1880
|
domain: string;
|
|
1877
|
-
|
|
1878
|
-
|
|
1879
|
-
|
|
1880
|
-
|
|
1881
|
+
custom_domain_id: string;
|
|
1882
|
+
verification_method?: "txt" | undefined;
|
|
1883
|
+
tls_policy?: string | undefined;
|
|
1884
|
+
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1885
|
+
domain_metadata?: Record<string, string> | undefined;
|
|
1886
|
+
origin_domain_name?: string | undefined;
|
|
1887
|
+
verification?: {} | undefined;
|
|
1881
1888
|
}>;
|
|
1882
|
-
export type
|
|
1889
|
+
export type CustomDomain = z.infer<typeof customDomainSchema>;
|
|
1883
1890
|
export declare const hookInsertSchema: z.ZodObject<{
|
|
1884
1891
|
trigger_id: z.ZodEnum<[
|
|
1885
1892
|
"pre-user-signup",
|
|
@@ -2699,7 +2706,7 @@ export type Password = z.infer<typeof passwordSchema>;
|
|
|
2699
2706
|
export declare const sessionInsertSchema: z.ZodObject<{
|
|
2700
2707
|
id: z.ZodString;
|
|
2701
2708
|
revoked_at: z.ZodOptional<z.ZodString>;
|
|
2702
|
-
used_at: z.ZodString
|
|
2709
|
+
used_at: z.ZodOptional<z.ZodString>;
|
|
2703
2710
|
user_id: z.ZodString;
|
|
2704
2711
|
expires_at: z.ZodOptional<z.ZodString>;
|
|
2705
2712
|
idle_expires_at: z.ZodOptional<z.ZodString>;
|
|
@@ -2729,7 +2736,6 @@ export declare const sessionInsertSchema: z.ZodObject<{
|
|
|
2729
2736
|
}, "strip", z.ZodTypeAny, {
|
|
2730
2737
|
user_id: string;
|
|
2731
2738
|
id: string;
|
|
2732
|
-
used_at: string;
|
|
2733
2739
|
device: {
|
|
2734
2740
|
last_ip: string;
|
|
2735
2741
|
initial_user_agent: string;
|
|
@@ -2740,12 +2746,12 @@ export declare const sessionInsertSchema: z.ZodObject<{
|
|
|
2740
2746
|
};
|
|
2741
2747
|
clients: string[];
|
|
2742
2748
|
expires_at?: string | undefined;
|
|
2749
|
+
used_at?: string | undefined;
|
|
2743
2750
|
revoked_at?: string | undefined;
|
|
2744
2751
|
idle_expires_at?: string | undefined;
|
|
2745
2752
|
}, {
|
|
2746
2753
|
user_id: string;
|
|
2747
2754
|
id: string;
|
|
2748
|
-
used_at: string;
|
|
2749
2755
|
device: {
|
|
2750
2756
|
last_ip: string;
|
|
2751
2757
|
initial_user_agent: string;
|
|
@@ -2756,6 +2762,7 @@ export declare const sessionInsertSchema: z.ZodObject<{
|
|
|
2756
2762
|
};
|
|
2757
2763
|
clients: string[];
|
|
2758
2764
|
expires_at?: string | undefined;
|
|
2765
|
+
used_at?: string | undefined;
|
|
2759
2766
|
revoked_at?: string | undefined;
|
|
2760
2767
|
idle_expires_at?: string | undefined;
|
|
2761
2768
|
}>;
|
|
@@ -2763,7 +2770,7 @@ export type SessionInsert = z.infer<typeof sessionInsertSchema>;
|
|
|
2763
2770
|
export declare const sessionSchema: z.ZodObject<{
|
|
2764
2771
|
id: z.ZodString;
|
|
2765
2772
|
revoked_at: z.ZodOptional<z.ZodString>;
|
|
2766
|
-
used_at: z.ZodString
|
|
2773
|
+
used_at: z.ZodOptional<z.ZodString>;
|
|
2767
2774
|
user_id: z.ZodString;
|
|
2768
2775
|
expires_at: z.ZodOptional<z.ZodString>;
|
|
2769
2776
|
idle_expires_at: z.ZodOptional<z.ZodString>;
|
|
@@ -2799,7 +2806,6 @@ export declare const sessionSchema: z.ZodObject<{
|
|
|
2799
2806
|
updated_at: string;
|
|
2800
2807
|
user_id: string;
|
|
2801
2808
|
id: string;
|
|
2802
|
-
used_at: string;
|
|
2803
2809
|
device: {
|
|
2804
2810
|
last_ip: string;
|
|
2805
2811
|
initial_user_agent: string;
|
|
@@ -2812,6 +2818,7 @@ export declare const sessionSchema: z.ZodObject<{
|
|
|
2812
2818
|
authenticated_at: string;
|
|
2813
2819
|
last_interaction_at: string;
|
|
2814
2820
|
expires_at?: string | undefined;
|
|
2821
|
+
used_at?: string | undefined;
|
|
2815
2822
|
revoked_at?: string | undefined;
|
|
2816
2823
|
idle_expires_at?: string | undefined;
|
|
2817
2824
|
}, {
|
|
@@ -2819,7 +2826,6 @@ export declare const sessionSchema: z.ZodObject<{
|
|
|
2819
2826
|
updated_at: string;
|
|
2820
2827
|
user_id: string;
|
|
2821
2828
|
id: string;
|
|
2822
|
-
used_at: string;
|
|
2823
2829
|
device: {
|
|
2824
2830
|
last_ip: string;
|
|
2825
2831
|
initial_user_agent: string;
|
|
@@ -2832,6 +2838,7 @@ export declare const sessionSchema: z.ZodObject<{
|
|
|
2832
2838
|
authenticated_at: string;
|
|
2833
2839
|
last_interaction_at: string;
|
|
2834
2840
|
expires_at?: string | undefined;
|
|
2841
|
+
used_at?: string | undefined;
|
|
2835
2842
|
revoked_at?: string | undefined;
|
|
2836
2843
|
idle_expires_at?: string | undefined;
|
|
2837
2844
|
}>;
|
|
@@ -4556,12 +4563,12 @@ export interface ConnectionsAdapter {
|
|
|
4556
4563
|
update(tenant_id: string, connection_id: string, params: Partial<ConnectionInsert>): Promise<boolean>;
|
|
4557
4564
|
list(tenant_id: string, params?: ListParams): Promise<ListConnectionsResponse>;
|
|
4558
4565
|
}
|
|
4559
|
-
export interface
|
|
4560
|
-
|
|
4561
|
-
|
|
4562
|
-
|
|
4563
|
-
|
|
4564
|
-
|
|
4566
|
+
export interface CustomDomainsAdapter {
|
|
4567
|
+
create: (tenant_id: string, custom_domain: CustomDomainInsert) => Promise<CustomDomain>;
|
|
4568
|
+
get: (tenant_id: string, id: string) => Promise<CustomDomain | null>;
|
|
4569
|
+
list: (tenant_id: string) => Promise<CustomDomain[]>;
|
|
4570
|
+
remove: (tenant_id: string, id: string) => Promise<boolean>;
|
|
4571
|
+
update: (tenant_id: string, id: string, custom_domain: Partial<CustomDomain>) => Promise<boolean>;
|
|
4565
4572
|
}
|
|
4566
4573
|
export interface KeysAdapter {
|
|
4567
4574
|
create: (key: SigningKey) => Promise<void>;
|
|
@@ -4622,7 +4629,7 @@ export interface DataAdapters {
|
|
|
4622
4629
|
clients: ClientsAdapter;
|
|
4623
4630
|
codes: CodesAdapter;
|
|
4624
4631
|
connections: ConnectionsAdapter;
|
|
4625
|
-
|
|
4632
|
+
customDomains: CustomDomainsAdapter;
|
|
4626
4633
|
emailProviders: EmailProvidersAdapter;
|
|
4627
4634
|
hooks: HooksAdapter;
|
|
4628
4635
|
keys: KeysAdapter;
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { z as t } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const q = t.object({
|
|
3
3
|
start: t.number(),
|
|
4
4
|
limit: t.number(),
|
|
5
5
|
length: t.number()
|
|
@@ -56,7 +56,7 @@ const Q = t.object({
|
|
|
56
56
|
email: t.string(),
|
|
57
57
|
login_count: t.number(),
|
|
58
58
|
identities: t.array(g).optional()
|
|
59
|
-
}),
|
|
59
|
+
}), Q = u, V = a.extend({
|
|
60
60
|
email: t.string(),
|
|
61
61
|
login_count: t.number(),
|
|
62
62
|
multifactor: t.array(t.string()).optional(),
|
|
@@ -123,7 +123,7 @@ const b = t.object({
|
|
|
123
123
|
...f.shape
|
|
124
124
|
});
|
|
125
125
|
var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
|
|
126
|
-
const
|
|
126
|
+
const y = t.object({
|
|
127
127
|
client_id: t.string(),
|
|
128
128
|
vendor_id: t.string().optional(),
|
|
129
129
|
act_as: t.string().optional(),
|
|
@@ -139,7 +139,7 @@ const k = t.object({
|
|
|
139
139
|
code_challenge: t.string().optional(),
|
|
140
140
|
username: t.string().optional(),
|
|
141
141
|
ui_locales: t.string().optional()
|
|
142
|
-
}),
|
|
142
|
+
}), Y = t.object({
|
|
143
143
|
colors: t.object({
|
|
144
144
|
primary: t.string(),
|
|
145
145
|
page_background: t.object({
|
|
@@ -154,7 +154,7 @@ const k = t.object({
|
|
|
154
154
|
font: t.object({
|
|
155
155
|
url: t.string()
|
|
156
156
|
}).optional()
|
|
157
|
-
}),
|
|
157
|
+
}), E = t.object({
|
|
158
158
|
id: t.string().optional(),
|
|
159
159
|
name: t.string(),
|
|
160
160
|
strategy: t.string(),
|
|
@@ -176,11 +176,11 @@ const k = t.object({
|
|
|
176
176
|
enabled_clients: t.array(t.string()).default([]).optional(),
|
|
177
177
|
response_type: t.custom().optional(),
|
|
178
178
|
response_mode: t.custom().optional()
|
|
179
|
-
}),
|
|
179
|
+
}), k = t.object({
|
|
180
180
|
id: t.string(),
|
|
181
181
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
182
182
|
updated_at: t.string().transform((e) => e === null ? "" : e)
|
|
183
|
-
}).extend(
|
|
183
|
+
}).extend(E.shape), w = t.object({
|
|
184
184
|
name: t.string(),
|
|
185
185
|
audience: t.string(),
|
|
186
186
|
sender_email: t.string().email(),
|
|
@@ -213,27 +213,20 @@ const k = t.object({
|
|
|
213
213
|
checkoutHideSocial: t.boolean().optional(),
|
|
214
214
|
siteUrl: t.string().nullable(),
|
|
215
215
|
manageSubscriptionsUrl: t.string().optional()
|
|
216
|
-
}), I = t.object({
|
|
217
|
-
domain: t.string(),
|
|
218
|
-
dkim_private_key: t.string().optional(),
|
|
219
|
-
dkim_public_key: t.string().optional(),
|
|
220
|
-
email_api_key: t.string().optional(),
|
|
221
|
-
email_service: t.string().optional()
|
|
222
216
|
});
|
|
223
217
|
t.object({
|
|
224
218
|
...S.shape,
|
|
225
|
-
domains: t.array(I),
|
|
226
219
|
tenant: C,
|
|
227
|
-
connections: t.array(
|
|
220
|
+
connections: t.array(k)
|
|
228
221
|
});
|
|
229
|
-
const
|
|
222
|
+
const I = t.enum([
|
|
230
223
|
"password_reset",
|
|
231
224
|
"email_verification",
|
|
232
225
|
"otp",
|
|
233
226
|
"authorization_code",
|
|
234
227
|
"oauth2_state",
|
|
235
228
|
"ticket"
|
|
236
|
-
]),
|
|
229
|
+
]), j = t.object({
|
|
237
230
|
code_id: t.string().openapi({
|
|
238
231
|
description: "The code that will be used in for instance an email verification flow"
|
|
239
232
|
}),
|
|
@@ -243,26 +236,38 @@ const j = t.enum([
|
|
|
243
236
|
connection_id: t.string().optional().openapi({
|
|
244
237
|
description: "The connection that the code is connected to"
|
|
245
238
|
}),
|
|
246
|
-
code_type:
|
|
239
|
+
code_type: I,
|
|
247
240
|
code_verifier: t.string().optional().openapi({
|
|
248
241
|
description: "The code verifier used in PKCE in outbound flows"
|
|
249
242
|
}),
|
|
250
243
|
expires_at: t.string(),
|
|
251
244
|
used_at: t.string().optional(),
|
|
252
245
|
user_id: t.string().optional()
|
|
246
|
+
}), X = t.object({
|
|
247
|
+
...j.shape,
|
|
248
|
+
created_at: t.string()
|
|
249
|
+
}), v = t.object({
|
|
250
|
+
domain: t.string(),
|
|
251
|
+
type: t.enum(["auth0_managed_certs", "self_managed_certs"]),
|
|
252
|
+
verification_method: t.enum(["txt"]).optional(),
|
|
253
|
+
tls_policy: t.enum(["recommended"]).optional(),
|
|
254
|
+
custom_client_ip_header: t.enum([
|
|
255
|
+
"true-client-ip",
|
|
256
|
+
"cf-connecting-ip",
|
|
257
|
+
"x-forwarded-for",
|
|
258
|
+
"x-azure-clientip",
|
|
259
|
+
"null"
|
|
260
|
+
]).optional(),
|
|
261
|
+
domain_metadata: t.record(t.string().max(255)).optional()
|
|
253
262
|
}), J = t.object({
|
|
254
263
|
...v.shape,
|
|
255
|
-
|
|
264
|
+
custom_domain_id: t.string(),
|
|
265
|
+
primary: t.boolean(),
|
|
266
|
+
status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
|
|
267
|
+
origin_domain_name: t.string().optional(),
|
|
268
|
+
verification: t.object({}).optional(),
|
|
269
|
+
tls_policy: t.string().optional()
|
|
256
270
|
}), A = t.object({
|
|
257
|
-
domain: t.string(),
|
|
258
|
-
dkim_private_key: t.string().optional(),
|
|
259
|
-
dkim_public_key: t.string().optional(),
|
|
260
|
-
email_api_key: t.string().optional(),
|
|
261
|
-
email_service: t.string().optional()
|
|
262
|
-
}), Z = s.extend({
|
|
263
|
-
...A.shape,
|
|
264
|
-
id: t.string()
|
|
265
|
-
}), O = t.object({
|
|
266
271
|
trigger_id: t.enum([
|
|
267
272
|
"pre-user-signup",
|
|
268
273
|
"post-user-registration",
|
|
@@ -273,10 +278,10 @@ const j = t.enum([
|
|
|
273
278
|
hook_id: t.string().optional(),
|
|
274
279
|
synchronous: t.boolean().default(!1),
|
|
275
280
|
priority: t.number().optional()
|
|
276
|
-
}),
|
|
281
|
+
}), Z = A.extend({
|
|
277
282
|
...s.shape,
|
|
278
283
|
hook_id: t.string()
|
|
279
|
-
}),
|
|
284
|
+
}), O = t.object({
|
|
280
285
|
alg: t.enum([
|
|
281
286
|
"RS256",
|
|
282
287
|
"RS384",
|
|
@@ -295,9 +300,9 @@ const j = t.enum([
|
|
|
295
300
|
x5t: t.string().optional(),
|
|
296
301
|
x5c: t.array(t.string()).optional(),
|
|
297
302
|
use: t.enum(["sig", "enc"]).optional()
|
|
303
|
+
}), $ = t.object({
|
|
304
|
+
keys: t.array(O)
|
|
298
305
|
}), tt = t.object({
|
|
299
|
-
keys: t.array(N)
|
|
300
|
-
}), et = t.object({
|
|
301
306
|
issuer: t.string(),
|
|
302
307
|
authorization_endpoint: t.string(),
|
|
303
308
|
token_endpoint: t.string(),
|
|
@@ -318,25 +323,25 @@ const j = t.enum([
|
|
|
318
323
|
request_uri_parameter_supported: t.boolean(),
|
|
319
324
|
request_parameter_supported: t.boolean(),
|
|
320
325
|
token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
|
|
321
|
-
}),
|
|
326
|
+
}), N = t.object({
|
|
322
327
|
auth0Client: t.string().optional(),
|
|
323
|
-
authParams:
|
|
328
|
+
authParams: y,
|
|
324
329
|
expires_at: t.string(),
|
|
325
330
|
deleted_at: t.string().optional(),
|
|
326
331
|
ip: t.string().optional(),
|
|
327
332
|
useragent: t.string().optional()
|
|
328
333
|
}).openapi({
|
|
329
334
|
description: "This represents a login sesion"
|
|
330
|
-
}),
|
|
331
|
-
...
|
|
335
|
+
}), et = t.object({
|
|
336
|
+
...N.shape,
|
|
332
337
|
login_id: t.string().openapi({
|
|
333
338
|
description: "This is is used as the state in the universal login"
|
|
334
339
|
}),
|
|
335
340
|
created_at: t.string(),
|
|
336
341
|
updated_at: t.string()
|
|
337
342
|
});
|
|
338
|
-
var
|
|
339
|
-
const
|
|
343
|
+
var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
|
|
344
|
+
const R = t.enum([
|
|
340
345
|
"cls",
|
|
341
346
|
// CODE_LINK_SENT
|
|
342
347
|
"fsa",
|
|
@@ -385,14 +390,14 @@ const D = t.enum([
|
|
|
385
390
|
// SUCCESS_VERIFICATION_EMAIL
|
|
386
391
|
"svr"
|
|
387
392
|
// SUCCESS_VERIFICATION_EMAIL_REQUEST
|
|
388
|
-
]),
|
|
393
|
+
]), D = t.object({
|
|
389
394
|
name: t.string(),
|
|
390
395
|
version: t.string(),
|
|
391
396
|
env: t.object({
|
|
392
397
|
node: t.string().optional()
|
|
393
398
|
}).optional()
|
|
394
|
-
}),
|
|
395
|
-
type:
|
|
399
|
+
}), nt = t.object({
|
|
400
|
+
type: R,
|
|
396
401
|
date: t.string(),
|
|
397
402
|
description: t.string().optional(),
|
|
398
403
|
log_id: t.string().optional(),
|
|
@@ -413,12 +418,12 @@ const D = t.enum([
|
|
|
413
418
|
strategy: t.string().optional(),
|
|
414
419
|
strategy_type: t.string().optional(),
|
|
415
420
|
hostname: t.string().optional(),
|
|
416
|
-
auth0_client:
|
|
421
|
+
auth0_client: D.optional()
|
|
417
422
|
}), x = t.object({
|
|
418
423
|
user_id: t.string(),
|
|
419
424
|
password: t.string(),
|
|
420
425
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
421
|
-
}),
|
|
426
|
+
}), it = t.object({
|
|
422
427
|
...x.shape,
|
|
423
428
|
created_at: t.string(),
|
|
424
429
|
updated_at: t.string()
|
|
@@ -429,10 +434,10 @@ const D = t.enum([
|
|
|
429
434
|
last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
|
|
430
435
|
last_ip: t.string().describe("Last IP address from which this user logged in"),
|
|
431
436
|
last_asn: t.string().describe("Last autonomous system number from which this user logged in")
|
|
432
|
-
}),
|
|
437
|
+
}), T = t.object({
|
|
433
438
|
id: t.string(),
|
|
434
439
|
revoked_at: t.string().optional(),
|
|
435
|
-
used_at: t.string(),
|
|
440
|
+
used_at: t.string().optional(),
|
|
436
441
|
user_id: t.string().describe("The user ID associated with the session"),
|
|
437
442
|
expires_at: t.string().optional(),
|
|
438
443
|
idle_expires_at: t.string().optional(),
|
|
@@ -440,13 +445,13 @@ const D = t.enum([
|
|
|
440
445
|
"Metadata related to the device used in the session"
|
|
441
446
|
),
|
|
442
447
|
clients: t.array(t.string()).describe("List of client details for the session")
|
|
443
|
-
}),
|
|
448
|
+
}), ot = t.object({
|
|
444
449
|
created_at: t.string(),
|
|
445
450
|
updated_at: t.string(),
|
|
446
451
|
authenticated_at: t.string(),
|
|
447
452
|
last_interaction_at: t.string(),
|
|
448
|
-
...
|
|
449
|
-
}),
|
|
453
|
+
...T.shape
|
|
454
|
+
}), st = t.object({
|
|
450
455
|
kid: t.string().openapi({ description: "The key id of the signing key" }),
|
|
451
456
|
cert: t.string().openapi({ description: "The public certificate of the signing key" }),
|
|
452
457
|
fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -466,8 +471,8 @@ const D = t.enum([
|
|
|
466
471
|
revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
|
|
467
472
|
revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
|
|
468
473
|
});
|
|
469
|
-
var
|
|
470
|
-
const
|
|
474
|
+
var P = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(P || {});
|
|
475
|
+
const at = t.object({
|
|
471
476
|
access_token: t.string(),
|
|
472
477
|
id_token: t.string().optional(),
|
|
473
478
|
scope: t.string().optional(),
|
|
@@ -480,7 +485,7 @@ t.object({
|
|
|
480
485
|
code: t.string(),
|
|
481
486
|
state: t.string().optional()
|
|
482
487
|
});
|
|
483
|
-
const
|
|
488
|
+
const F = t.object({
|
|
484
489
|
button_border_radius: t.number(),
|
|
485
490
|
button_border_weight: t.number(),
|
|
486
491
|
buttons_style: t.enum(["pill"]),
|
|
@@ -490,7 +495,7 @@ const H = t.object({
|
|
|
490
495
|
show_widget_shadow: t.boolean(),
|
|
491
496
|
widget_border_weight: t.number(),
|
|
492
497
|
widget_corner_radius: t.number()
|
|
493
|
-
}),
|
|
498
|
+
}), H = t.object({
|
|
494
499
|
base_focus_color: t.string(),
|
|
495
500
|
base_hover_color: t.string(),
|
|
496
501
|
body_text: t.string(),
|
|
@@ -513,7 +518,7 @@ const H = t.object({
|
|
|
513
518
|
}), n = t.object({
|
|
514
519
|
bold: t.boolean(),
|
|
515
520
|
size: t.number()
|
|
516
|
-
}),
|
|
521
|
+
}), K = t.object({
|
|
517
522
|
body_text: n,
|
|
518
523
|
buttons_text: n,
|
|
519
524
|
font_url: t.string(),
|
|
@@ -523,31 +528,31 @@ const H = t.object({
|
|
|
523
528
|
reference_text_size: t.number(),
|
|
524
529
|
subtitle: n,
|
|
525
530
|
title: n
|
|
526
|
-
}),
|
|
531
|
+
}), G = t.object({
|
|
527
532
|
background_color: t.string(),
|
|
528
533
|
background_image_url: t.string(),
|
|
529
534
|
page_layout: t.enum(["center"])
|
|
530
|
-
}),
|
|
535
|
+
}), L = t.object({
|
|
531
536
|
header_text_alignment: t.enum(["center"]),
|
|
532
537
|
logo_height: t.number(),
|
|
533
538
|
logo_position: t.enum(["center"]),
|
|
534
539
|
logo_url: t.string(),
|
|
535
540
|
social_buttons_layout: t.enum(["bottom"])
|
|
536
|
-
}),
|
|
537
|
-
borders:
|
|
538
|
-
colors:
|
|
541
|
+
}), B = t.object({
|
|
542
|
+
borders: F,
|
|
543
|
+
colors: H,
|
|
539
544
|
displayName: t.string(),
|
|
540
|
-
fonts:
|
|
541
|
-
page_background:
|
|
542
|
-
widget:
|
|
543
|
-
}),
|
|
545
|
+
fonts: K,
|
|
546
|
+
page_background: G,
|
|
547
|
+
widget: L
|
|
548
|
+
}), rt = B.extend({
|
|
544
549
|
themeId: t.string()
|
|
545
|
-
}),
|
|
550
|
+
}), lt = t.object({
|
|
546
551
|
universal_login_experience: t.enum(["new", "classic"]).default("new"),
|
|
547
552
|
identifier_first: t.boolean().default(!0),
|
|
548
553
|
password_first: t.boolean().default(!1),
|
|
549
554
|
webauthn_platform_first_factor: t.boolean()
|
|
550
|
-
}),
|
|
555
|
+
}), ct = t.object({
|
|
551
556
|
name: t.string(),
|
|
552
557
|
enabled: t.boolean().optional().default(!0),
|
|
553
558
|
default_from_address: t.string().optional(),
|
|
@@ -577,7 +582,7 @@ const H = t.object({
|
|
|
577
582
|
})
|
|
578
583
|
]),
|
|
579
584
|
settings: t.object({}).optional()
|
|
580
|
-
}),
|
|
585
|
+
}), M = t.object({
|
|
581
586
|
// The actual refresh token value (primary key).
|
|
582
587
|
id: t.string(),
|
|
583
588
|
// Link to the session record
|
|
@@ -598,73 +603,73 @@ const H = t.object({
|
|
|
598
603
|
})
|
|
599
604
|
),
|
|
600
605
|
rotating: t.boolean()
|
|
601
|
-
}),
|
|
606
|
+
}), pt = t.object({
|
|
602
607
|
// When the refresh token record was created.
|
|
603
608
|
created_at: t.string(),
|
|
604
609
|
// Spread in the rest of the refresh token properties.
|
|
605
|
-
...
|
|
610
|
+
...M.shape
|
|
606
611
|
});
|
|
607
|
-
function
|
|
612
|
+
function dt(e) {
|
|
608
613
|
const [i, o] = e.split("|");
|
|
609
614
|
if (!i || !o)
|
|
610
615
|
throw new Error(`Invalid user_id: ${e}`);
|
|
611
616
|
return { connection: i, id: o };
|
|
612
617
|
}
|
|
613
618
|
export {
|
|
614
|
-
|
|
619
|
+
D as Auth0Client,
|
|
615
620
|
l as AuthorizationResponseMode,
|
|
616
621
|
r as AuthorizationResponseType,
|
|
617
622
|
c as CodeChallengeMethod,
|
|
618
|
-
|
|
619
|
-
|
|
623
|
+
P as GrantType,
|
|
624
|
+
U as LogTypes,
|
|
620
625
|
f as applicationInsertSchema,
|
|
621
626
|
S as applicationSchema,
|
|
622
|
-
|
|
623
|
-
|
|
627
|
+
Q as auth0UserResponseSchema,
|
|
628
|
+
y as authParamsSchema,
|
|
624
629
|
a as baseUserSchema,
|
|
625
|
-
|
|
626
|
-
|
|
627
|
-
|
|
628
|
-
|
|
629
|
-
|
|
630
|
-
|
|
631
|
-
|
|
632
|
-
|
|
633
|
-
|
|
634
|
-
|
|
635
|
-
|
|
630
|
+
F as bordersSchema,
|
|
631
|
+
Y as brandingSchema,
|
|
632
|
+
j as codeInsertSchema,
|
|
633
|
+
X as codeSchema,
|
|
634
|
+
I as codeTypeSchema,
|
|
635
|
+
H as colorsSchema,
|
|
636
|
+
E as connectionInsertSchema,
|
|
637
|
+
k as connectionSchema,
|
|
638
|
+
v as customDomainInsertSchema,
|
|
639
|
+
J as customDomainSchema,
|
|
640
|
+
ct as emailProviderSchema,
|
|
636
641
|
n as fontDetailsSchema,
|
|
637
|
-
|
|
638
|
-
|
|
639
|
-
|
|
642
|
+
K as fontsSchema,
|
|
643
|
+
A as hookInsertSchema,
|
|
644
|
+
Z as hookSchema,
|
|
640
645
|
g as identitySchema,
|
|
641
|
-
|
|
642
|
-
|
|
643
|
-
|
|
644
|
-
|
|
645
|
-
|
|
646
|
-
|
|
647
|
-
|
|
648
|
-
|
|
646
|
+
$ as jwksKeySchema,
|
|
647
|
+
O as jwksSchema,
|
|
648
|
+
nt as logSchema,
|
|
649
|
+
N as loginInsertSchema,
|
|
650
|
+
et as loginSchema,
|
|
651
|
+
tt as openIDConfigurationSchema,
|
|
652
|
+
G as pageBackgroundSchema,
|
|
653
|
+
dt as parseUserId,
|
|
649
654
|
x as passwordInsertSchema,
|
|
650
|
-
|
|
655
|
+
it as passwordSchema,
|
|
651
656
|
d as profileDataSchema,
|
|
652
|
-
|
|
653
|
-
|
|
654
|
-
|
|
657
|
+
lt as promptSettingSchema,
|
|
658
|
+
M as refreshTokenInsertSchema,
|
|
659
|
+
pt as refreshTokenSchema,
|
|
655
660
|
b as samlpAddon,
|
|
656
|
-
|
|
657
|
-
|
|
658
|
-
|
|
661
|
+
T as sessionInsertSchema,
|
|
662
|
+
ot as sessionSchema,
|
|
663
|
+
st as signingKeySchema,
|
|
659
664
|
w as tenantInsertSchema,
|
|
660
665
|
C as tenantSchema,
|
|
661
|
-
|
|
662
|
-
|
|
663
|
-
|
|
664
|
-
|
|
666
|
+
B as themeInsertSchema,
|
|
667
|
+
rt as themeSchema,
|
|
668
|
+
at as tokenResponseSchema,
|
|
669
|
+
q as totalsSchema,
|
|
665
670
|
_ as userInsertSchema,
|
|
666
|
-
|
|
671
|
+
V as userResponseSchema,
|
|
667
672
|
u as userSchema,
|
|
668
673
|
z as vendorSettingsSchema,
|
|
669
|
-
|
|
674
|
+
L as widgetSchema
|
|
670
675
|
};
|