@authhero/adapter-interfaces 0.52.0 → 0.54.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),Y=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({}).optional(),tls_policy:t.z.string().optional()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...c.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),it=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const at=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const D=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:D,colors:T,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),st=H.extend({themeId:t.z.string()}),rt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),lt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),ct=t.z.object({created_at:t.z.string(),...K.shape});function pt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=D;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=k;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=Y;exports.emailProviderSchema=lt;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginSessionInsertSchema=j;exports.loginSessionSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=pt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=rt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=ct;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=H;exports.themeSchema=st;exports.tokenResponseSchema=at;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),M=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let W=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>W()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),Q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),V=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),X=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=C.extend({...c.shape,hook_id:t.z.string()}),j=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(j)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),v=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...v.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var A=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(A||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),O=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:O.optional()}),U=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...U.shape,created_at:t.z.string(),updated_at:t.z.string()}),N=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),R=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:N.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...R.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var D=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(D||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),x=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),P=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),F=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),H=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),K=t.z.object({borders:T,colors:x,displayName:t.z.string(),fonts:P,page_background:F,widget:H}),rt=K.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),G=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:N,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...G.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=O;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=D;exports.LogTypes=A;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=T;exports.brandingSchema=Q;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=k;exports.colorsSchema=x;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=P;exports.hookInsertSchema=C;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=j;exports.logSchema=nt;exports.loginSessionInsertSchema=v;exports.loginSessionSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=F;exports.parseUserId=zt;exports.passwordInsertSchema=U;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=G;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=R;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=K;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=M;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=V;exports.verificationMethodsSchema=E;exports.widgetSchema=H;
|
|
@@ -1802,6 +1802,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
|
|
|
1802
1802
|
export type Connection = z.infer<typeof connectionSchema>;
|
|
1803
1803
|
export declare const customDomainInsertSchema: z.ZodObject<{
|
|
1804
1804
|
domain: z.ZodString;
|
|
1805
|
+
custom_domain_id: z.ZodOptional<z.ZodString>;
|
|
1805
1806
|
type: z.ZodEnum<[
|
|
1806
1807
|
"auth0_managed_certs",
|
|
1807
1808
|
"self_managed_certs"
|
|
@@ -1823,6 +1824,7 @@ export declare const customDomainInsertSchema: z.ZodObject<{
|
|
|
1823
1824
|
}, "strip", z.ZodTypeAny, {
|
|
1824
1825
|
type: "auth0_managed_certs" | "self_managed_certs";
|
|
1825
1826
|
domain: string;
|
|
1827
|
+
custom_domain_id?: string | undefined;
|
|
1826
1828
|
verification_method?: "txt" | undefined;
|
|
1827
1829
|
tls_policy?: "recommended" | undefined;
|
|
1828
1830
|
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
@@ -1830,12 +1832,27 @@ export declare const customDomainInsertSchema: z.ZodObject<{
|
|
|
1830
1832
|
}, {
|
|
1831
1833
|
type: "auth0_managed_certs" | "self_managed_certs";
|
|
1832
1834
|
domain: string;
|
|
1835
|
+
custom_domain_id?: string | undefined;
|
|
1833
1836
|
verification_method?: "txt" | undefined;
|
|
1834
1837
|
tls_policy?: "recommended" | undefined;
|
|
1835
1838
|
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1836
1839
|
domain_metadata?: Record<string, string> | undefined;
|
|
1837
1840
|
}>;
|
|
1838
1841
|
export type CustomDomainInsert = z.infer<typeof customDomainInsertSchema>;
|
|
1842
|
+
export declare const verificationMethodsSchema: z.ZodObject<{
|
|
1843
|
+
name: z.ZodLiteral<"txt">;
|
|
1844
|
+
record: z.ZodString;
|
|
1845
|
+
domain: z.ZodString;
|
|
1846
|
+
}, "strip", z.ZodTypeAny, {
|
|
1847
|
+
name: "txt";
|
|
1848
|
+
domain: string;
|
|
1849
|
+
record: string;
|
|
1850
|
+
}, {
|
|
1851
|
+
name: "txt";
|
|
1852
|
+
domain: string;
|
|
1853
|
+
record: string;
|
|
1854
|
+
}>;
|
|
1855
|
+
export type VerificationMethods = z.infer<typeof verificationMethodsSchema>;
|
|
1839
1856
|
export declare const customDomainSchema: z.ZodObject<{
|
|
1840
1857
|
custom_domain_id: z.ZodString;
|
|
1841
1858
|
primary: z.ZodBoolean;
|
|
@@ -1846,7 +1863,33 @@ export declare const customDomainSchema: z.ZodObject<{
|
|
|
1846
1863
|
"ready"
|
|
1847
1864
|
]>;
|
|
1848
1865
|
origin_domain_name: z.ZodOptional<z.ZodString>;
|
|
1849
|
-
verification: z.ZodOptional<z.ZodObject<{
|
|
1866
|
+
verification: z.ZodOptional<z.ZodObject<{
|
|
1867
|
+
methods: z.ZodArray<z.ZodObject<{
|
|
1868
|
+
name: z.ZodLiteral<"txt">;
|
|
1869
|
+
record: z.ZodString;
|
|
1870
|
+
domain: z.ZodString;
|
|
1871
|
+
}, "strip", z.ZodTypeAny, {
|
|
1872
|
+
name: "txt";
|
|
1873
|
+
domain: string;
|
|
1874
|
+
record: string;
|
|
1875
|
+
}, {
|
|
1876
|
+
name: "txt";
|
|
1877
|
+
domain: string;
|
|
1878
|
+
record: string;
|
|
1879
|
+
}>, "many">;
|
|
1880
|
+
}, "strip", z.ZodTypeAny, {
|
|
1881
|
+
methods: {
|
|
1882
|
+
name: "txt";
|
|
1883
|
+
domain: string;
|
|
1884
|
+
record: string;
|
|
1885
|
+
}[];
|
|
1886
|
+
}, {
|
|
1887
|
+
methods: {
|
|
1888
|
+
name: "txt";
|
|
1889
|
+
domain: string;
|
|
1890
|
+
record: string;
|
|
1891
|
+
}[];
|
|
1892
|
+
}>>;
|
|
1850
1893
|
tls_policy: z.ZodOptional<z.ZodString>;
|
|
1851
1894
|
domain: z.ZodString;
|
|
1852
1895
|
type: z.ZodEnum<[
|
|
@@ -1875,7 +1918,13 @@ export declare const customDomainSchema: z.ZodObject<{
|
|
|
1875
1918
|
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1876
1919
|
domain_metadata?: Record<string, string> | undefined;
|
|
1877
1920
|
origin_domain_name?: string | undefined;
|
|
1878
|
-
verification?: {
|
|
1921
|
+
verification?: {
|
|
1922
|
+
methods: {
|
|
1923
|
+
name: "txt";
|
|
1924
|
+
domain: string;
|
|
1925
|
+
record: string;
|
|
1926
|
+
}[];
|
|
1927
|
+
} | undefined;
|
|
1879
1928
|
}, {
|
|
1880
1929
|
type: "auth0_managed_certs" | "self_managed_certs";
|
|
1881
1930
|
status: "disabled" | "pending" | "pending_verification" | "ready";
|
|
@@ -1887,7 +1936,13 @@ export declare const customDomainSchema: z.ZodObject<{
|
|
|
1887
1936
|
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1888
1937
|
domain_metadata?: Record<string, string> | undefined;
|
|
1889
1938
|
origin_domain_name?: string | undefined;
|
|
1890
|
-
verification?: {
|
|
1939
|
+
verification?: {
|
|
1940
|
+
methods: {
|
|
1941
|
+
name: "txt";
|
|
1942
|
+
domain: string;
|
|
1943
|
+
record: string;
|
|
1944
|
+
}[];
|
|
1945
|
+
} | undefined;
|
|
1891
1946
|
}>;
|
|
1892
1947
|
export type CustomDomain = z.infer<typeof customDomainSchema>;
|
|
1893
1948
|
export declare const hookInsertSchema: z.ZodObject<{
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { z as t } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const z = t.object({
|
|
3
3
|
start: t.number(),
|
|
4
4
|
limit: t.number(),
|
|
5
5
|
length: t.number()
|
|
@@ -56,7 +56,7 @@ const q = t.object({
|
|
|
56
56
|
email: t.string(),
|
|
57
57
|
login_count: t.number(),
|
|
58
58
|
identities: t.array(g).optional()
|
|
59
|
-
}),
|
|
59
|
+
}), Q = u, V = a.extend({
|
|
60
60
|
email: t.string(),
|
|
61
61
|
login_count: t.number(),
|
|
62
62
|
multifactor: t.array(t.string()).optional(),
|
|
@@ -141,7 +141,7 @@ const y = t.object({
|
|
|
141
141
|
ui_locales: t.string().optional(),
|
|
142
142
|
// The following fields are not available in Auth0
|
|
143
143
|
vendor_id: t.string().optional()
|
|
144
|
-
}),
|
|
144
|
+
}), Y = t.object({
|
|
145
145
|
colors: t.object({
|
|
146
146
|
primary: t.string(),
|
|
147
147
|
page_background: t.object({
|
|
@@ -198,7 +198,7 @@ const y = t.object({
|
|
|
198
198
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
199
199
|
...w.shape,
|
|
200
200
|
id: t.string()
|
|
201
|
-
}),
|
|
201
|
+
}), X = t.object({
|
|
202
202
|
logoUrl: t.string(),
|
|
203
203
|
loginBackgroundImage: t.string().nullish(),
|
|
204
204
|
style: t.object({
|
|
@@ -245,11 +245,12 @@ const I = t.enum([
|
|
|
245
245
|
expires_at: t.string(),
|
|
246
246
|
used_at: t.string().optional(),
|
|
247
247
|
user_id: t.string().optional()
|
|
248
|
-
}),
|
|
248
|
+
}), J = t.object({
|
|
249
249
|
...j.shape,
|
|
250
250
|
created_at: t.string()
|
|
251
251
|
}), v = t.object({
|
|
252
252
|
domain: t.string(),
|
|
253
|
+
custom_domain_id: t.string().optional(),
|
|
253
254
|
type: t.enum(["auth0_managed_certs", "self_managed_certs"]),
|
|
254
255
|
verification_method: t.enum(["txt"]).optional(),
|
|
255
256
|
tls_policy: t.enum(["recommended"]).optional(),
|
|
@@ -261,15 +262,21 @@ const I = t.enum([
|
|
|
261
262
|
"null"
|
|
262
263
|
]).optional(),
|
|
263
264
|
domain_metadata: t.record(t.string().max(255)).optional()
|
|
264
|
-
}),
|
|
265
|
+
}), A = t.object({
|
|
266
|
+
name: t.literal("txt"),
|
|
267
|
+
record: t.string(),
|
|
268
|
+
domain: t.string()
|
|
269
|
+
}), Z = t.object({
|
|
265
270
|
...v.shape,
|
|
266
271
|
custom_domain_id: t.string(),
|
|
267
272
|
primary: t.boolean(),
|
|
268
273
|
status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
|
|
269
274
|
origin_domain_name: t.string().optional(),
|
|
270
|
-
verification: t.object({
|
|
275
|
+
verification: t.object({
|
|
276
|
+
methods: t.array(A)
|
|
277
|
+
}).optional(),
|
|
271
278
|
tls_policy: t.string().optional()
|
|
272
|
-
}),
|
|
279
|
+
}), O = t.object({
|
|
273
280
|
trigger_id: t.enum([
|
|
274
281
|
"pre-user-signup",
|
|
275
282
|
"post-user-registration",
|
|
@@ -280,10 +287,10 @@ const I = t.enum([
|
|
|
280
287
|
hook_id: t.string().optional(),
|
|
281
288
|
synchronous: t.boolean().default(!1),
|
|
282
289
|
priority: t.number().optional()
|
|
283
|
-
}),
|
|
290
|
+
}), $ = O.extend({
|
|
284
291
|
...s.shape,
|
|
285
292
|
hook_id: t.string()
|
|
286
|
-
}),
|
|
293
|
+
}), N = t.object({
|
|
287
294
|
alg: t.enum([
|
|
288
295
|
"RS256",
|
|
289
296
|
"RS384",
|
|
@@ -302,9 +309,9 @@ const I = t.enum([
|
|
|
302
309
|
x5t: t.string().optional(),
|
|
303
310
|
x5c: t.array(t.string()).optional(),
|
|
304
311
|
use: t.enum(["sig", "enc"]).optional()
|
|
305
|
-
}), $ = t.object({
|
|
306
|
-
keys: t.array(O)
|
|
307
312
|
}), tt = t.object({
|
|
313
|
+
keys: t.array(N)
|
|
314
|
+
}), et = t.object({
|
|
308
315
|
issuer: t.string(),
|
|
309
316
|
authorization_endpoint: t.string(),
|
|
310
317
|
token_endpoint: t.string(),
|
|
@@ -325,7 +332,7 @@ const I = t.enum([
|
|
|
325
332
|
request_uri_parameter_supported: t.boolean(),
|
|
326
333
|
request_parameter_supported: t.boolean(),
|
|
327
334
|
token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
|
|
328
|
-
}),
|
|
335
|
+
}), U = t.object({
|
|
329
336
|
csrf_token: t.string(),
|
|
330
337
|
auth0Client: t.string().optional(),
|
|
331
338
|
authParams: y,
|
|
@@ -337,16 +344,16 @@ const I = t.enum([
|
|
|
337
344
|
authorization_url: t.string().optional()
|
|
338
345
|
}).openapi({
|
|
339
346
|
description: "This represents a login sesion"
|
|
340
|
-
}),
|
|
341
|
-
...
|
|
347
|
+
}), nt = t.object({
|
|
348
|
+
...U.shape,
|
|
342
349
|
id: t.string().openapi({
|
|
343
350
|
description: "This is is used as the state in the universal login"
|
|
344
351
|
}),
|
|
345
352
|
created_at: t.string(),
|
|
346
353
|
updated_at: t.string()
|
|
347
354
|
});
|
|
348
|
-
var
|
|
349
|
-
const
|
|
355
|
+
var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
|
|
356
|
+
const D = t.enum([
|
|
350
357
|
"cls",
|
|
351
358
|
// CODE_LINK_SENT
|
|
352
359
|
"fsa",
|
|
@@ -395,14 +402,14 @@ const R = t.enum([
|
|
|
395
402
|
// SUCCESS_VERIFICATION_EMAIL
|
|
396
403
|
"svr"
|
|
397
404
|
// SUCCESS_VERIFICATION_EMAIL_REQUEST
|
|
398
|
-
]),
|
|
405
|
+
]), x = t.object({
|
|
399
406
|
name: t.string(),
|
|
400
407
|
version: t.string(),
|
|
401
408
|
env: t.object({
|
|
402
409
|
node: t.string().optional()
|
|
403
410
|
}).optional()
|
|
404
|
-
}),
|
|
405
|
-
type:
|
|
411
|
+
}), it = t.object({
|
|
412
|
+
type: D,
|
|
406
413
|
date: t.string(),
|
|
407
414
|
description: t.string().optional(),
|
|
408
415
|
log_id: t.string().optional(),
|
|
@@ -423,13 +430,13 @@ const R = t.enum([
|
|
|
423
430
|
strategy: t.string().optional(),
|
|
424
431
|
strategy_type: t.string().optional(),
|
|
425
432
|
hostname: t.string().optional(),
|
|
426
|
-
auth0_client:
|
|
427
|
-
}),
|
|
433
|
+
auth0_client: x.optional()
|
|
434
|
+
}), T = t.object({
|
|
428
435
|
user_id: t.string(),
|
|
429
436
|
password: t.string(),
|
|
430
437
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
431
|
-
}),
|
|
432
|
-
...
|
|
438
|
+
}), ot = t.object({
|
|
439
|
+
...T.shape,
|
|
433
440
|
created_at: t.string(),
|
|
434
441
|
updated_at: t.string()
|
|
435
442
|
}), p = t.object({
|
|
@@ -439,7 +446,7 @@ const R = t.enum([
|
|
|
439
446
|
last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
|
|
440
447
|
last_ip: t.string().describe("Last IP address from which this user logged in"),
|
|
441
448
|
last_asn: t.string().describe("Last autonomous system number from which this user logged in")
|
|
442
|
-
}),
|
|
449
|
+
}), P = t.object({
|
|
443
450
|
id: t.string(),
|
|
444
451
|
revoked_at: t.string().optional(),
|
|
445
452
|
used_at: t.string().optional(),
|
|
@@ -450,13 +457,13 @@ const R = t.enum([
|
|
|
450
457
|
"Metadata related to the device used in the session"
|
|
451
458
|
),
|
|
452
459
|
clients: t.array(t.string()).describe("List of client details for the session")
|
|
453
|
-
}),
|
|
460
|
+
}), st = t.object({
|
|
454
461
|
created_at: t.string(),
|
|
455
462
|
updated_at: t.string(),
|
|
456
463
|
authenticated_at: t.string(),
|
|
457
464
|
last_interaction_at: t.string(),
|
|
458
|
-
...
|
|
459
|
-
}),
|
|
465
|
+
...P.shape
|
|
466
|
+
}), at = t.object({
|
|
460
467
|
kid: t.string().openapi({ description: "The key id of the signing key" }),
|
|
461
468
|
cert: t.string().openapi({ description: "The public certificate of the signing key" }),
|
|
462
469
|
fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -476,8 +483,8 @@ const R = t.enum([
|
|
|
476
483
|
revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
|
|
477
484
|
revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
|
|
478
485
|
});
|
|
479
|
-
var
|
|
480
|
-
const
|
|
486
|
+
var F = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(F || {});
|
|
487
|
+
const rt = t.object({
|
|
481
488
|
access_token: t.string(),
|
|
482
489
|
id_token: t.string().optional(),
|
|
483
490
|
scope: t.string().optional(),
|
|
@@ -490,7 +497,7 @@ t.object({
|
|
|
490
497
|
code: t.string(),
|
|
491
498
|
state: t.string().optional()
|
|
492
499
|
});
|
|
493
|
-
const
|
|
500
|
+
const H = t.object({
|
|
494
501
|
button_border_radius: t.number(),
|
|
495
502
|
button_border_weight: t.number(),
|
|
496
503
|
buttons_style: t.enum(["pill"]),
|
|
@@ -500,7 +507,7 @@ const F = t.object({
|
|
|
500
507
|
show_widget_shadow: t.boolean(),
|
|
501
508
|
widget_border_weight: t.number(),
|
|
502
509
|
widget_corner_radius: t.number()
|
|
503
|
-
}),
|
|
510
|
+
}), K = t.object({
|
|
504
511
|
base_focus_color: t.string(),
|
|
505
512
|
base_hover_color: t.string(),
|
|
506
513
|
body_text: t.string(),
|
|
@@ -523,7 +530,7 @@ const F = t.object({
|
|
|
523
530
|
}), n = t.object({
|
|
524
531
|
bold: t.boolean(),
|
|
525
532
|
size: t.number()
|
|
526
|
-
}),
|
|
533
|
+
}), G = t.object({
|
|
527
534
|
body_text: n,
|
|
528
535
|
buttons_text: n,
|
|
529
536
|
font_url: t.string(),
|
|
@@ -533,31 +540,31 @@ const F = t.object({
|
|
|
533
540
|
reference_text_size: t.number(),
|
|
534
541
|
subtitle: n,
|
|
535
542
|
title: n
|
|
536
|
-
}),
|
|
543
|
+
}), L = t.object({
|
|
537
544
|
background_color: t.string(),
|
|
538
545
|
background_image_url: t.string(),
|
|
539
546
|
page_layout: t.enum(["center"])
|
|
540
|
-
}),
|
|
547
|
+
}), B = t.object({
|
|
541
548
|
header_text_alignment: t.enum(["center"]),
|
|
542
549
|
logo_height: t.number(),
|
|
543
550
|
logo_position: t.enum(["center"]),
|
|
544
551
|
logo_url: t.string(),
|
|
545
552
|
social_buttons_layout: t.enum(["bottom"])
|
|
546
|
-
}),
|
|
547
|
-
borders:
|
|
548
|
-
colors:
|
|
553
|
+
}), M = t.object({
|
|
554
|
+
borders: H,
|
|
555
|
+
colors: K,
|
|
549
556
|
displayName: t.string(),
|
|
550
|
-
fonts:
|
|
551
|
-
page_background:
|
|
552
|
-
widget:
|
|
553
|
-
}),
|
|
557
|
+
fonts: G,
|
|
558
|
+
page_background: L,
|
|
559
|
+
widget: B
|
|
560
|
+
}), lt = M.extend({
|
|
554
561
|
themeId: t.string()
|
|
555
|
-
}),
|
|
562
|
+
}), ct = t.object({
|
|
556
563
|
universal_login_experience: t.enum(["new", "classic"]).default("new"),
|
|
557
564
|
identifier_first: t.boolean().default(!0),
|
|
558
565
|
password_first: t.boolean().default(!1),
|
|
559
566
|
webauthn_platform_first_factor: t.boolean()
|
|
560
|
-
}),
|
|
567
|
+
}), pt = t.object({
|
|
561
568
|
name: t.string(),
|
|
562
569
|
enabled: t.boolean().optional().default(!0),
|
|
563
570
|
default_from_address: t.string().optional(),
|
|
@@ -587,7 +594,7 @@ const F = t.object({
|
|
|
587
594
|
})
|
|
588
595
|
]),
|
|
589
596
|
settings: t.object({}).optional()
|
|
590
|
-
}),
|
|
597
|
+
}), W = t.object({
|
|
591
598
|
// The actual refresh token value (primary key).
|
|
592
599
|
id: t.string(),
|
|
593
600
|
// Link to the session record
|
|
@@ -608,73 +615,74 @@ const F = t.object({
|
|
|
608
615
|
})
|
|
609
616
|
),
|
|
610
617
|
rotating: t.boolean()
|
|
611
|
-
}),
|
|
618
|
+
}), dt = t.object({
|
|
612
619
|
// When the refresh token record was created.
|
|
613
620
|
created_at: t.string(),
|
|
614
621
|
// Spread in the rest of the refresh token properties.
|
|
615
|
-
...
|
|
622
|
+
...W.shape
|
|
616
623
|
});
|
|
617
|
-
function
|
|
624
|
+
function gt(e) {
|
|
618
625
|
const [i, o] = e.split("|");
|
|
619
626
|
if (!i || !o)
|
|
620
627
|
throw new Error(`Invalid user_id: ${e}`);
|
|
621
628
|
return { connection: i, id: o };
|
|
622
629
|
}
|
|
623
630
|
export {
|
|
624
|
-
|
|
631
|
+
x as Auth0Client,
|
|
625
632
|
l as AuthorizationResponseMode,
|
|
626
633
|
r as AuthorizationResponseType,
|
|
627
634
|
c as CodeChallengeMethod,
|
|
628
|
-
|
|
629
|
-
|
|
635
|
+
F as GrantType,
|
|
636
|
+
R as LogTypes,
|
|
630
637
|
f as applicationInsertSchema,
|
|
631
638
|
S as applicationSchema,
|
|
632
|
-
|
|
639
|
+
Q as auth0UserResponseSchema,
|
|
633
640
|
y as authParamsSchema,
|
|
634
641
|
a as baseUserSchema,
|
|
635
|
-
|
|
636
|
-
|
|
642
|
+
H as bordersSchema,
|
|
643
|
+
Y as brandingSchema,
|
|
637
644
|
j as codeInsertSchema,
|
|
638
|
-
|
|
645
|
+
J as codeSchema,
|
|
639
646
|
I as codeTypeSchema,
|
|
640
|
-
|
|
647
|
+
K as colorsSchema,
|
|
641
648
|
E as connectionInsertSchema,
|
|
642
649
|
k as connectionSchema,
|
|
643
650
|
v as customDomainInsertSchema,
|
|
644
|
-
|
|
645
|
-
|
|
651
|
+
Z as customDomainSchema,
|
|
652
|
+
pt as emailProviderSchema,
|
|
646
653
|
n as fontDetailsSchema,
|
|
647
|
-
|
|
648
|
-
|
|
649
|
-
|
|
654
|
+
G as fontsSchema,
|
|
655
|
+
O as hookInsertSchema,
|
|
656
|
+
$ as hookSchema,
|
|
650
657
|
g as identitySchema,
|
|
651
|
-
|
|
652
|
-
|
|
653
|
-
|
|
654
|
-
|
|
655
|
-
|
|
656
|
-
|
|
657
|
-
|
|
658
|
-
|
|
659
|
-
|
|
660
|
-
|
|
658
|
+
tt as jwksKeySchema,
|
|
659
|
+
N as jwksSchema,
|
|
660
|
+
it as logSchema,
|
|
661
|
+
U as loginSessionInsertSchema,
|
|
662
|
+
nt as loginSessionSchema,
|
|
663
|
+
et as openIDConfigurationSchema,
|
|
664
|
+
L as pageBackgroundSchema,
|
|
665
|
+
gt as parseUserId,
|
|
666
|
+
T as passwordInsertSchema,
|
|
667
|
+
ot as passwordSchema,
|
|
661
668
|
d as profileDataSchema,
|
|
662
|
-
|
|
663
|
-
|
|
664
|
-
|
|
669
|
+
ct as promptSettingSchema,
|
|
670
|
+
W as refreshTokenInsertSchema,
|
|
671
|
+
dt as refreshTokenSchema,
|
|
665
672
|
b as samlpAddon,
|
|
666
|
-
|
|
667
|
-
|
|
668
|
-
|
|
673
|
+
P as sessionInsertSchema,
|
|
674
|
+
st as sessionSchema,
|
|
675
|
+
at as signingKeySchema,
|
|
669
676
|
w as tenantInsertSchema,
|
|
670
677
|
C as tenantSchema,
|
|
671
|
-
|
|
672
|
-
|
|
673
|
-
|
|
674
|
-
|
|
678
|
+
M as themeInsertSchema,
|
|
679
|
+
lt as themeSchema,
|
|
680
|
+
rt as tokenResponseSchema,
|
|
681
|
+
z as totalsSchema,
|
|
675
682
|
_ as userInsertSchema,
|
|
676
|
-
|
|
683
|
+
V as userResponseSchema,
|
|
677
684
|
u as userSchema,
|
|
678
|
-
|
|
679
|
-
|
|
685
|
+
X as vendorSettingsSchema,
|
|
686
|
+
A as verificationMethodsSchema,
|
|
687
|
+
B as widgetSchema
|
|
680
688
|
};
|