@authhero/adapter-interfaces 0.45.0 → 0.47.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),a=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...a.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var r=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(r||{}),l=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(l||{}),c=(e=>(e.S256="S256",e.Plain="plain",e))(c||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(r).optional(),response_mode:t.z.nativeEnum(l).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(c).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),k=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()}),V=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()});t.z.object({...m.shape,domains:t.z.array(V),tenant:k,connections:t.z.array(S)});const y=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:y,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),dkim_private_key:t.z.string().optional(),dkim_public_key:t.z.string().optional(),email_api_key:t.z.string().optional(),email_service:t.z.string().optional()}),X=a.extend({...w.shape,id:t.z.string()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=E.extend({...a.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(C)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),D=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:T,colors:D,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),rt=H.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...K.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=l;exports.AuthorizationResponseType=r;exports.CodeChallengeMethod=c;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=T;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=y;exports.colorsSchema=D;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.domainInsertSchema=w;exports.domainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=C;exports.logSchema=nt;exports.loginInsertSchema=j;exports.loginSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=P;exports.parseUserId=zt;exports.passwordInsertSchema=O;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=k;exports.themeInsertSchema=H;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),vendor_id:t.z.string().optional(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const I=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),k=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:I,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...k.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),Y=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({}).optional(),tls_policy:t.z.string().optional()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...c.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,login_id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),it=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const at=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const D=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:D,colors:T,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),st=H.extend({themeId:t.z.string()}),rt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),lt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),ct=t.z.object({created_at:t.z.string(),...K.shape});function pt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=D;exports.brandingSchema=W;exports.codeInsertSchema=k;exports.codeSchema=V;exports.codeTypeSchema=I;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=Y;exports.emailProviderSchema=lt;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginInsertSchema=j;exports.loginSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=pt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=rt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=ct;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=H;exports.themeSchema=st;exports.tokenResponseSchema=at;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
@@ -1116,25 +1116,6 @@ export declare const brandingSchema: z.ZodObject<{
1116
1116
  }>;
1117
1117
  export type Branding = z.infer<typeof brandingSchema>;
1118
1118
  declare const ClientSchema: z.ZodObject<{
1119
- domains: z.ZodArray<z.ZodObject<{
1120
- domain: z.ZodString;
1121
- dkim_private_key: z.ZodOptional<z.ZodString>;
1122
- dkim_public_key: z.ZodOptional<z.ZodString>;
1123
- email_api_key: z.ZodOptional<z.ZodString>;
1124
- email_service: z.ZodOptional<z.ZodString>;
1125
- }, "strip", z.ZodTypeAny, {
1126
- domain: string;
1127
- dkim_private_key?: string | undefined;
1128
- dkim_public_key?: string | undefined;
1129
- email_api_key?: string | undefined;
1130
- email_service?: string | undefined;
1131
- }, {
1132
- domain: string;
1133
- dkim_private_key?: string | undefined;
1134
- dkim_public_key?: string | undefined;
1135
- email_api_key?: string | undefined;
1136
- email_service?: string | undefined;
1137
- }>, "many">;
1138
1119
  tenant: z.ZodObject<{
1139
1120
  id: z.ZodString;
1140
1121
  name: z.ZodString;
@@ -1392,13 +1373,6 @@ declare const ClientSchema: z.ZodObject<{
1392
1373
  name: string;
1393
1374
  id: string;
1394
1375
  disable_sign_ups: boolean;
1395
- domains: {
1396
- domain: string;
1397
- dkim_private_key?: string | undefined;
1398
- dkim_public_key?: string | undefined;
1399
- email_api_key?: string | undefined;
1400
- email_service?: string | undefined;
1401
- }[];
1402
1376
  tenant: {
1403
1377
  created_at: string;
1404
1378
  updated_at: string;
@@ -1470,13 +1444,6 @@ declare const ClientSchema: z.ZodObject<{
1470
1444
  updated_at: string;
1471
1445
  name: string;
1472
1446
  id: string;
1473
- domains: {
1474
- domain: string;
1475
- dkim_private_key?: string | undefined;
1476
- dkim_public_key?: string | undefined;
1477
- email_api_key?: string | undefined;
1478
- email_service?: string | undefined;
1479
- }[];
1480
1447
  tenant: {
1481
1448
  created_at: string;
1482
1449
  updated_at: string;
@@ -1830,56 +1797,96 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1830
1797
  enabled_clients?: string[] | undefined;
1831
1798
  }>;
1832
1799
  export type Connection = z.infer<typeof connectionSchema>;
1833
- export declare const domainInsertSchema: z.ZodObject<{
1800
+ export declare const customDomainInsertSchema: z.ZodObject<{
1834
1801
  domain: z.ZodString;
1835
- dkim_private_key: z.ZodOptional<z.ZodString>;
1836
- dkim_public_key: z.ZodOptional<z.ZodString>;
1837
- email_api_key: z.ZodOptional<z.ZodString>;
1838
- email_service: z.ZodOptional<z.ZodString>;
1802
+ type: z.ZodEnum<[
1803
+ "auth0_managed_certs",
1804
+ "self_managed_certs"
1805
+ ]>;
1806
+ verification_method: z.ZodOptional<z.ZodEnum<[
1807
+ "txt"
1808
+ ]>>;
1809
+ tls_policy: z.ZodOptional<z.ZodEnum<[
1810
+ "recommended"
1811
+ ]>>;
1812
+ custom_client_ip_header: z.ZodOptional<z.ZodEnum<[
1813
+ "true-client-ip",
1814
+ "cf-connecting-ip",
1815
+ "x-forwarded-for",
1816
+ "x-azure-clientip",
1817
+ "null"
1818
+ ]>>;
1819
+ domain_metadata: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
1839
1820
  }, "strip", z.ZodTypeAny, {
1821
+ type: "auth0_managed_certs" | "self_managed_certs";
1840
1822
  domain: string;
1841
- dkim_private_key?: string | undefined;
1842
- dkim_public_key?: string | undefined;
1843
- email_api_key?: string | undefined;
1844
- email_service?: string | undefined;
1823
+ verification_method?: "txt" | undefined;
1824
+ tls_policy?: "recommended" | undefined;
1825
+ custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1826
+ domain_metadata?: Record<string, string> | undefined;
1845
1827
  }, {
1828
+ type: "auth0_managed_certs" | "self_managed_certs";
1846
1829
  domain: string;
1847
- dkim_private_key?: string | undefined;
1848
- dkim_public_key?: string | undefined;
1849
- email_api_key?: string | undefined;
1850
- email_service?: string | undefined;
1830
+ verification_method?: "txt" | undefined;
1831
+ tls_policy?: "recommended" | undefined;
1832
+ custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1833
+ domain_metadata?: Record<string, string> | undefined;
1851
1834
  }>;
1852
- export type DomainInsert = z.infer<typeof domainInsertSchema>;
1853
- export declare const domainSchema: z.ZodObject<z.objectUtil.extendShape<{
1854
- created_at: z.ZodString;
1855
- updated_at: z.ZodString;
1856
- }, {
1857
- id: z.ZodString;
1835
+ export type CustomDomainInsert = z.infer<typeof customDomainInsertSchema>;
1836
+ export declare const customDomainSchema: z.ZodObject<{
1837
+ custom_domain_id: z.ZodString;
1838
+ primary: z.ZodBoolean;
1839
+ status: z.ZodEnum<[
1840
+ "disabled",
1841
+ "pending",
1842
+ "pending_verification",
1843
+ "ready"
1844
+ ]>;
1845
+ origin_domain_name: z.ZodOptional<z.ZodString>;
1846
+ verification: z.ZodOptional<z.ZodObject<{}, "strip", z.ZodTypeAny, {}, {}>>;
1847
+ tls_policy: z.ZodOptional<z.ZodString>;
1858
1848
  domain: z.ZodString;
1859
- dkim_private_key: z.ZodOptional<z.ZodString>;
1860
- dkim_public_key: z.ZodOptional<z.ZodString>;
1861
- email_api_key: z.ZodOptional<z.ZodString>;
1862
- email_service: z.ZodOptional<z.ZodString>;
1863
- }>, "strip", z.ZodTypeAny, {
1864
- created_at: string;
1865
- updated_at: string;
1866
- id: string;
1849
+ type: z.ZodEnum<[
1850
+ "auth0_managed_certs",
1851
+ "self_managed_certs"
1852
+ ]>;
1853
+ verification_method: z.ZodOptional<z.ZodEnum<[
1854
+ "txt"
1855
+ ]>>;
1856
+ custom_client_ip_header: z.ZodOptional<z.ZodEnum<[
1857
+ "true-client-ip",
1858
+ "cf-connecting-ip",
1859
+ "x-forwarded-for",
1860
+ "x-azure-clientip",
1861
+ "null"
1862
+ ]>>;
1863
+ domain_metadata: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
1864
+ }, "strip", z.ZodTypeAny, {
1865
+ type: "auth0_managed_certs" | "self_managed_certs";
1866
+ status: "disabled" | "pending" | "pending_verification" | "ready";
1867
+ primary: boolean;
1867
1868
  domain: string;
1868
- dkim_private_key?: string | undefined;
1869
- dkim_public_key?: string | undefined;
1870
- email_api_key?: string | undefined;
1871
- email_service?: string | undefined;
1869
+ custom_domain_id: string;
1870
+ verification_method?: "txt" | undefined;
1871
+ tls_policy?: string | undefined;
1872
+ custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1873
+ domain_metadata?: Record<string, string> | undefined;
1874
+ origin_domain_name?: string | undefined;
1875
+ verification?: {} | undefined;
1872
1876
  }, {
1873
- created_at: string;
1874
- updated_at: string;
1875
- id: string;
1877
+ type: "auth0_managed_certs" | "self_managed_certs";
1878
+ status: "disabled" | "pending" | "pending_verification" | "ready";
1879
+ primary: boolean;
1876
1880
  domain: string;
1877
- dkim_private_key?: string | undefined;
1878
- dkim_public_key?: string | undefined;
1879
- email_api_key?: string | undefined;
1880
- email_service?: string | undefined;
1881
+ custom_domain_id: string;
1882
+ verification_method?: "txt" | undefined;
1883
+ tls_policy?: string | undefined;
1884
+ custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1885
+ domain_metadata?: Record<string, string> | undefined;
1886
+ origin_domain_name?: string | undefined;
1887
+ verification?: {} | undefined;
1881
1888
  }>;
1882
- export type Domain = z.infer<typeof domainSchema>;
1889
+ export type CustomDomain = z.infer<typeof customDomainSchema>;
1883
1890
  export declare const hookInsertSchema: z.ZodObject<{
1884
1891
  trigger_id: z.ZodEnum<[
1885
1892
  "pre-user-signup",
@@ -2699,7 +2706,7 @@ export type Password = z.infer<typeof passwordSchema>;
2699
2706
  export declare const sessionInsertSchema: z.ZodObject<{
2700
2707
  id: z.ZodString;
2701
2708
  revoked_at: z.ZodOptional<z.ZodString>;
2702
- used_at: z.ZodString;
2709
+ used_at: z.ZodOptional<z.ZodString>;
2703
2710
  user_id: z.ZodString;
2704
2711
  expires_at: z.ZodOptional<z.ZodString>;
2705
2712
  idle_expires_at: z.ZodOptional<z.ZodString>;
@@ -2729,7 +2736,6 @@ export declare const sessionInsertSchema: z.ZodObject<{
2729
2736
  }, "strip", z.ZodTypeAny, {
2730
2737
  user_id: string;
2731
2738
  id: string;
2732
- used_at: string;
2733
2739
  device: {
2734
2740
  last_ip: string;
2735
2741
  initial_user_agent: string;
@@ -2740,12 +2746,12 @@ export declare const sessionInsertSchema: z.ZodObject<{
2740
2746
  };
2741
2747
  clients: string[];
2742
2748
  expires_at?: string | undefined;
2749
+ used_at?: string | undefined;
2743
2750
  revoked_at?: string | undefined;
2744
2751
  idle_expires_at?: string | undefined;
2745
2752
  }, {
2746
2753
  user_id: string;
2747
2754
  id: string;
2748
- used_at: string;
2749
2755
  device: {
2750
2756
  last_ip: string;
2751
2757
  initial_user_agent: string;
@@ -2756,6 +2762,7 @@ export declare const sessionInsertSchema: z.ZodObject<{
2756
2762
  };
2757
2763
  clients: string[];
2758
2764
  expires_at?: string | undefined;
2765
+ used_at?: string | undefined;
2759
2766
  revoked_at?: string | undefined;
2760
2767
  idle_expires_at?: string | undefined;
2761
2768
  }>;
@@ -2763,7 +2770,7 @@ export type SessionInsert = z.infer<typeof sessionInsertSchema>;
2763
2770
  export declare const sessionSchema: z.ZodObject<{
2764
2771
  id: z.ZodString;
2765
2772
  revoked_at: z.ZodOptional<z.ZodString>;
2766
- used_at: z.ZodString;
2773
+ used_at: z.ZodOptional<z.ZodString>;
2767
2774
  user_id: z.ZodString;
2768
2775
  expires_at: z.ZodOptional<z.ZodString>;
2769
2776
  idle_expires_at: z.ZodOptional<z.ZodString>;
@@ -2799,7 +2806,6 @@ export declare const sessionSchema: z.ZodObject<{
2799
2806
  updated_at: string;
2800
2807
  user_id: string;
2801
2808
  id: string;
2802
- used_at: string;
2803
2809
  device: {
2804
2810
  last_ip: string;
2805
2811
  initial_user_agent: string;
@@ -2812,6 +2818,7 @@ export declare const sessionSchema: z.ZodObject<{
2812
2818
  authenticated_at: string;
2813
2819
  last_interaction_at: string;
2814
2820
  expires_at?: string | undefined;
2821
+ used_at?: string | undefined;
2815
2822
  revoked_at?: string | undefined;
2816
2823
  idle_expires_at?: string | undefined;
2817
2824
  }, {
@@ -2819,7 +2826,6 @@ export declare const sessionSchema: z.ZodObject<{
2819
2826
  updated_at: string;
2820
2827
  user_id: string;
2821
2828
  id: string;
2822
- used_at: string;
2823
2829
  device: {
2824
2830
  last_ip: string;
2825
2831
  initial_user_agent: string;
@@ -2832,6 +2838,7 @@ export declare const sessionSchema: z.ZodObject<{
2832
2838
  authenticated_at: string;
2833
2839
  last_interaction_at: string;
2834
2840
  expires_at?: string | undefined;
2841
+ used_at?: string | undefined;
2835
2842
  revoked_at?: string | undefined;
2836
2843
  idle_expires_at?: string | undefined;
2837
2844
  }>;
@@ -4556,12 +4563,12 @@ export interface ConnectionsAdapter {
4556
4563
  update(tenant_id: string, connection_id: string, params: Partial<ConnectionInsert>): Promise<boolean>;
4557
4564
  list(tenant_id: string, params?: ListParams): Promise<ListConnectionsResponse>;
4558
4565
  }
4559
- export interface ListDomainsResponse extends Totals {
4560
- domains: Domain[];
4561
- }
4562
- export interface DomainsAdapter {
4563
- create(tenant_id: string, params: Domain): Promise<Domain>;
4564
- list(tenant_id: string, params?: ListParams): Promise<ListDomainsResponse>;
4566
+ export interface CustomDomainsAdapter {
4567
+ create: (tenant_id: string, custom_domain: CustomDomainInsert) => Promise<CustomDomain>;
4568
+ get: (tenant_id: string, id: string) => Promise<CustomDomain | null>;
4569
+ list: (tenant_id: string) => Promise<CustomDomain[]>;
4570
+ remove: (tenant_id: string, id: string) => Promise<boolean>;
4571
+ update: (tenant_id: string, id: string, custom_domain: Partial<CustomDomain>) => Promise<boolean>;
4565
4572
  }
4566
4573
  export interface KeysAdapter {
4567
4574
  create: (key: SigningKey) => Promise<void>;
@@ -4622,7 +4629,7 @@ export interface DataAdapters {
4622
4629
  clients: ClientsAdapter;
4623
4630
  codes: CodesAdapter;
4624
4631
  connections: ConnectionsAdapter;
4625
- domains: DomainsAdapter;
4632
+ customDomains: CustomDomainsAdapter;
4626
4633
  emailProviders: EmailProvidersAdapter;
4627
4634
  hooks: HooksAdapter;
4628
4635
  keys: KeysAdapter;
@@ -1,5 +1,5 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const Q = t.object({
2
+ const q = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
@@ -56,7 +56,7 @@ const Q = t.object({
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
58
  identities: t.array(g).optional()
59
- }), V = u, Y = a.extend({
59
+ }), Q = u, V = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
@@ -123,7 +123,7 @@ const b = t.object({
123
123
  ...f.shape
124
124
  });
125
125
  var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
126
- const k = t.object({
126
+ const y = t.object({
127
127
  client_id: t.string(),
128
128
  vendor_id: t.string().optional(),
129
129
  act_as: t.string().optional(),
@@ -139,7 +139,7 @@ const k = t.object({
139
139
  code_challenge: t.string().optional(),
140
140
  username: t.string().optional(),
141
141
  ui_locales: t.string().optional()
142
- }), X = t.object({
142
+ }), Y = t.object({
143
143
  colors: t.object({
144
144
  primary: t.string(),
145
145
  page_background: t.object({
@@ -154,7 +154,7 @@ const k = t.object({
154
154
  font: t.object({
155
155
  url: t.string()
156
156
  }).optional()
157
- }), y = t.object({
157
+ }), E = t.object({
158
158
  id: t.string().optional(),
159
159
  name: t.string(),
160
160
  strategy: t.string(),
@@ -176,11 +176,11 @@ const k = t.object({
176
176
  enabled_clients: t.array(t.string()).default([]).optional(),
177
177
  response_type: t.custom().optional(),
178
178
  response_mode: t.custom().optional()
179
- }), E = t.object({
179
+ }), k = t.object({
180
180
  id: t.string(),
181
181
  created_at: t.string().transform((e) => e === null ? "" : e),
182
182
  updated_at: t.string().transform((e) => e === null ? "" : e)
183
- }).extend(y.shape), w = t.object({
183
+ }).extend(E.shape), w = t.object({
184
184
  name: t.string(),
185
185
  audience: t.string(),
186
186
  sender_email: t.string().email(),
@@ -213,27 +213,20 @@ const k = t.object({
213
213
  checkoutHideSocial: t.boolean().optional(),
214
214
  siteUrl: t.string().nullable(),
215
215
  manageSubscriptionsUrl: t.string().optional()
216
- }), I = t.object({
217
- domain: t.string(),
218
- dkim_private_key: t.string().optional(),
219
- dkim_public_key: t.string().optional(),
220
- email_api_key: t.string().optional(),
221
- email_service: t.string().optional()
222
216
  });
223
217
  t.object({
224
218
  ...S.shape,
225
- domains: t.array(I),
226
219
  tenant: C,
227
- connections: t.array(E)
220
+ connections: t.array(k)
228
221
  });
229
- const j = t.enum([
222
+ const I = t.enum([
230
223
  "password_reset",
231
224
  "email_verification",
232
225
  "otp",
233
226
  "authorization_code",
234
227
  "oauth2_state",
235
228
  "ticket"
236
- ]), v = t.object({
229
+ ]), j = t.object({
237
230
  code_id: t.string().openapi({
238
231
  description: "The code that will be used in for instance an email verification flow"
239
232
  }),
@@ -243,26 +236,38 @@ const j = t.enum([
243
236
  connection_id: t.string().optional().openapi({
244
237
  description: "The connection that the code is connected to"
245
238
  }),
246
- code_type: j,
239
+ code_type: I,
247
240
  code_verifier: t.string().optional().openapi({
248
241
  description: "The code verifier used in PKCE in outbound flows"
249
242
  }),
250
243
  expires_at: t.string(),
251
244
  used_at: t.string().optional(),
252
245
  user_id: t.string().optional()
246
+ }), X = t.object({
247
+ ...j.shape,
248
+ created_at: t.string()
249
+ }), v = t.object({
250
+ domain: t.string(),
251
+ type: t.enum(["auth0_managed_certs", "self_managed_certs"]),
252
+ verification_method: t.enum(["txt"]).optional(),
253
+ tls_policy: t.enum(["recommended"]).optional(),
254
+ custom_client_ip_header: t.enum([
255
+ "true-client-ip",
256
+ "cf-connecting-ip",
257
+ "x-forwarded-for",
258
+ "x-azure-clientip",
259
+ "null"
260
+ ]).optional(),
261
+ domain_metadata: t.record(t.string().max(255)).optional()
253
262
  }), J = t.object({
254
263
  ...v.shape,
255
- created_at: t.string()
264
+ custom_domain_id: t.string(),
265
+ primary: t.boolean(),
266
+ status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
267
+ origin_domain_name: t.string().optional(),
268
+ verification: t.object({}).optional(),
269
+ tls_policy: t.string().optional()
256
270
  }), A = t.object({
257
- domain: t.string(),
258
- dkim_private_key: t.string().optional(),
259
- dkim_public_key: t.string().optional(),
260
- email_api_key: t.string().optional(),
261
- email_service: t.string().optional()
262
- }), Z = s.extend({
263
- ...A.shape,
264
- id: t.string()
265
- }), O = t.object({
266
271
  trigger_id: t.enum([
267
272
  "pre-user-signup",
268
273
  "post-user-registration",
@@ -273,10 +278,10 @@ const j = t.enum([
273
278
  hook_id: t.string().optional(),
274
279
  synchronous: t.boolean().default(!1),
275
280
  priority: t.number().optional()
276
- }), $ = O.extend({
281
+ }), Z = A.extend({
277
282
  ...s.shape,
278
283
  hook_id: t.string()
279
- }), N = t.object({
284
+ }), O = t.object({
280
285
  alg: t.enum([
281
286
  "RS256",
282
287
  "RS384",
@@ -295,9 +300,9 @@ const j = t.enum([
295
300
  x5t: t.string().optional(),
296
301
  x5c: t.array(t.string()).optional(),
297
302
  use: t.enum(["sig", "enc"]).optional()
303
+ }), $ = t.object({
304
+ keys: t.array(O)
298
305
  }), tt = t.object({
299
- keys: t.array(N)
300
- }), et = t.object({
301
306
  issuer: t.string(),
302
307
  authorization_endpoint: t.string(),
303
308
  token_endpoint: t.string(),
@@ -318,25 +323,25 @@ const j = t.enum([
318
323
  request_uri_parameter_supported: t.boolean(),
319
324
  request_parameter_supported: t.boolean(),
320
325
  token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
321
- }), U = t.object({
326
+ }), N = t.object({
322
327
  auth0Client: t.string().optional(),
323
- authParams: k,
328
+ authParams: y,
324
329
  expires_at: t.string(),
325
330
  deleted_at: t.string().optional(),
326
331
  ip: t.string().optional(),
327
332
  useragent: t.string().optional()
328
333
  }).openapi({
329
334
  description: "This represents a login sesion"
330
- }), nt = t.object({
331
- ...U.shape,
335
+ }), et = t.object({
336
+ ...N.shape,
332
337
  login_id: t.string().openapi({
333
338
  description: "This is is used as the state in the universal login"
334
339
  }),
335
340
  created_at: t.string(),
336
341
  updated_at: t.string()
337
342
  });
338
- var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
339
- const D = t.enum([
343
+ var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
344
+ const R = t.enum([
340
345
  "cls",
341
346
  // CODE_LINK_SENT
342
347
  "fsa",
@@ -385,14 +390,14 @@ const D = t.enum([
385
390
  // SUCCESS_VERIFICATION_EMAIL
386
391
  "svr"
387
392
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
388
- ]), T = t.object({
393
+ ]), D = t.object({
389
394
  name: t.string(),
390
395
  version: t.string(),
391
396
  env: t.object({
392
397
  node: t.string().optional()
393
398
  }).optional()
394
- }), it = t.object({
395
- type: D,
399
+ }), nt = t.object({
400
+ type: R,
396
401
  date: t.string(),
397
402
  description: t.string().optional(),
398
403
  log_id: t.string().optional(),
@@ -413,12 +418,12 @@ const D = t.enum([
413
418
  strategy: t.string().optional(),
414
419
  strategy_type: t.string().optional(),
415
420
  hostname: t.string().optional(),
416
- auth0_client: T.optional()
421
+ auth0_client: D.optional()
417
422
  }), x = t.object({
418
423
  user_id: t.string(),
419
424
  password: t.string(),
420
425
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
421
- }), ot = t.object({
426
+ }), it = t.object({
422
427
  ...x.shape,
423
428
  created_at: t.string(),
424
429
  updated_at: t.string()
@@ -429,10 +434,10 @@ const D = t.enum([
429
434
  last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
430
435
  last_ip: t.string().describe("Last IP address from which this user logged in"),
431
436
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
432
- }), P = t.object({
437
+ }), T = t.object({
433
438
  id: t.string(),
434
439
  revoked_at: t.string().optional(),
435
- used_at: t.string(),
440
+ used_at: t.string().optional(),
436
441
  user_id: t.string().describe("The user ID associated with the session"),
437
442
  expires_at: t.string().optional(),
438
443
  idle_expires_at: t.string().optional(),
@@ -440,13 +445,13 @@ const D = t.enum([
440
445
  "Metadata related to the device used in the session"
441
446
  ),
442
447
  clients: t.array(t.string()).describe("List of client details for the session")
443
- }), st = t.object({
448
+ }), ot = t.object({
444
449
  created_at: t.string(),
445
450
  updated_at: t.string(),
446
451
  authenticated_at: t.string(),
447
452
  last_interaction_at: t.string(),
448
- ...P.shape
449
- }), at = t.object({
453
+ ...T.shape
454
+ }), st = t.object({
450
455
  kid: t.string().openapi({ description: "The key id of the signing key" }),
451
456
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
452
457
  fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
@@ -466,8 +471,8 @@ const D = t.enum([
466
471
  revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
467
472
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
468
473
  });
469
- var F = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(F || {});
470
- const rt = t.object({
474
+ var P = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(P || {});
475
+ const at = t.object({
471
476
  access_token: t.string(),
472
477
  id_token: t.string().optional(),
473
478
  scope: t.string().optional(),
@@ -480,7 +485,7 @@ t.object({
480
485
  code: t.string(),
481
486
  state: t.string().optional()
482
487
  });
483
- const H = t.object({
488
+ const F = t.object({
484
489
  button_border_radius: t.number(),
485
490
  button_border_weight: t.number(),
486
491
  buttons_style: t.enum(["pill"]),
@@ -490,7 +495,7 @@ const H = t.object({
490
495
  show_widget_shadow: t.boolean(),
491
496
  widget_border_weight: t.number(),
492
497
  widget_corner_radius: t.number()
493
- }), K = t.object({
498
+ }), H = t.object({
494
499
  base_focus_color: t.string(),
495
500
  base_hover_color: t.string(),
496
501
  body_text: t.string(),
@@ -513,7 +518,7 @@ const H = t.object({
513
518
  }), n = t.object({
514
519
  bold: t.boolean(),
515
520
  size: t.number()
516
- }), G = t.object({
521
+ }), K = t.object({
517
522
  body_text: n,
518
523
  buttons_text: n,
519
524
  font_url: t.string(),
@@ -523,31 +528,31 @@ const H = t.object({
523
528
  reference_text_size: t.number(),
524
529
  subtitle: n,
525
530
  title: n
526
- }), L = t.object({
531
+ }), G = t.object({
527
532
  background_color: t.string(),
528
533
  background_image_url: t.string(),
529
534
  page_layout: t.enum(["center"])
530
- }), B = t.object({
535
+ }), L = t.object({
531
536
  header_text_alignment: t.enum(["center"]),
532
537
  logo_height: t.number(),
533
538
  logo_position: t.enum(["center"]),
534
539
  logo_url: t.string(),
535
540
  social_buttons_layout: t.enum(["bottom"])
536
- }), M = t.object({
537
- borders: H,
538
- colors: K,
541
+ }), B = t.object({
542
+ borders: F,
543
+ colors: H,
539
544
  displayName: t.string(),
540
- fonts: G,
541
- page_background: L,
542
- widget: B
543
- }), lt = M.extend({
545
+ fonts: K,
546
+ page_background: G,
547
+ widget: L
548
+ }), rt = B.extend({
544
549
  themeId: t.string()
545
- }), ct = t.object({
550
+ }), lt = t.object({
546
551
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
547
552
  identifier_first: t.boolean().default(!0),
548
553
  password_first: t.boolean().default(!1),
549
554
  webauthn_platform_first_factor: t.boolean()
550
- }), pt = t.object({
555
+ }), ct = t.object({
551
556
  name: t.string(),
552
557
  enabled: t.boolean().optional().default(!0),
553
558
  default_from_address: t.string().optional(),
@@ -577,7 +582,7 @@ const H = t.object({
577
582
  })
578
583
  ]),
579
584
  settings: t.object({}).optional()
580
- }), W = t.object({
585
+ }), M = t.object({
581
586
  // The actual refresh token value (primary key).
582
587
  id: t.string(),
583
588
  // Link to the session record
@@ -598,73 +603,73 @@ const H = t.object({
598
603
  })
599
604
  ),
600
605
  rotating: t.boolean()
601
- }), dt = t.object({
606
+ }), pt = t.object({
602
607
  // When the refresh token record was created.
603
608
  created_at: t.string(),
604
609
  // Spread in the rest of the refresh token properties.
605
- ...W.shape
610
+ ...M.shape
606
611
  });
607
- function gt(e) {
612
+ function dt(e) {
608
613
  const [i, o] = e.split("|");
609
614
  if (!i || !o)
610
615
  throw new Error(`Invalid user_id: ${e}`);
611
616
  return { connection: i, id: o };
612
617
  }
613
618
  export {
614
- T as Auth0Client,
619
+ D as Auth0Client,
615
620
  l as AuthorizationResponseMode,
616
621
  r as AuthorizationResponseType,
617
622
  c as CodeChallengeMethod,
618
- F as GrantType,
619
- R as LogTypes,
623
+ P as GrantType,
624
+ U as LogTypes,
620
625
  f as applicationInsertSchema,
621
626
  S as applicationSchema,
622
- V as auth0UserResponseSchema,
623
- k as authParamsSchema,
627
+ Q as auth0UserResponseSchema,
628
+ y as authParamsSchema,
624
629
  a as baseUserSchema,
625
- H as bordersSchema,
626
- X as brandingSchema,
627
- v as codeInsertSchema,
628
- J as codeSchema,
629
- j as codeTypeSchema,
630
- K as colorsSchema,
631
- y as connectionInsertSchema,
632
- E as connectionSchema,
633
- A as domainInsertSchema,
634
- Z as domainSchema,
635
- pt as emailProviderSchema,
630
+ F as bordersSchema,
631
+ Y as brandingSchema,
632
+ j as codeInsertSchema,
633
+ X as codeSchema,
634
+ I as codeTypeSchema,
635
+ H as colorsSchema,
636
+ E as connectionInsertSchema,
637
+ k as connectionSchema,
638
+ v as customDomainInsertSchema,
639
+ J as customDomainSchema,
640
+ ct as emailProviderSchema,
636
641
  n as fontDetailsSchema,
637
- G as fontsSchema,
638
- O as hookInsertSchema,
639
- $ as hookSchema,
642
+ K as fontsSchema,
643
+ A as hookInsertSchema,
644
+ Z as hookSchema,
640
645
  g as identitySchema,
641
- tt as jwksKeySchema,
642
- N as jwksSchema,
643
- it as logSchema,
644
- U as loginInsertSchema,
645
- nt as loginSchema,
646
- et as openIDConfigurationSchema,
647
- L as pageBackgroundSchema,
648
- gt as parseUserId,
646
+ $ as jwksKeySchema,
647
+ O as jwksSchema,
648
+ nt as logSchema,
649
+ N as loginInsertSchema,
650
+ et as loginSchema,
651
+ tt as openIDConfigurationSchema,
652
+ G as pageBackgroundSchema,
653
+ dt as parseUserId,
649
654
  x as passwordInsertSchema,
650
- ot as passwordSchema,
655
+ it as passwordSchema,
651
656
  d as profileDataSchema,
652
- ct as promptSettingSchema,
653
- W as refreshTokenInsertSchema,
654
- dt as refreshTokenSchema,
657
+ lt as promptSettingSchema,
658
+ M as refreshTokenInsertSchema,
659
+ pt as refreshTokenSchema,
655
660
  b as samlpAddon,
656
- P as sessionInsertSchema,
657
- st as sessionSchema,
658
- at as signingKeySchema,
661
+ T as sessionInsertSchema,
662
+ ot as sessionSchema,
663
+ st as signingKeySchema,
659
664
  w as tenantInsertSchema,
660
665
  C as tenantSchema,
661
- M as themeInsertSchema,
662
- lt as themeSchema,
663
- rt as tokenResponseSchema,
664
- Q as totalsSchema,
666
+ B as themeInsertSchema,
667
+ rt as themeSchema,
668
+ at as tokenResponseSchema,
669
+ q as totalsSchema,
665
670
  _ as userInsertSchema,
666
- Y as userResponseSchema,
671
+ V as userResponseSchema,
667
672
  u as userSchema,
668
673
  z as vendorSettingsSchema,
669
- B as widgetSchema
674
+ L as widgetSchema
670
675
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.45.0",
14
+ "version": "0.47.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],