@authhero/adapter-interfaces 0.52.0 → 0.54.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),Y=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({}).optional(),tls_policy:t.z.string().optional()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...c.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),it=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const at=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const D=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:D,colors:T,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),st=H.extend({themeId:t.z.string()}),rt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),lt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),ct=t.z.object({created_at:t.z.string(),...K.shape});function pt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=D;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=k;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=Y;exports.emailProviderSchema=lt;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginSessionInsertSchema=j;exports.loginSessionSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=pt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=rt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=ct;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=H;exports.themeSchema=st;exports.tokenResponseSchema=at;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),M=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let W=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>W()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),Q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),V=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),X=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=C.extend({...c.shape,hook_id:t.z.string()}),j=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(j)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),v=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...v.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var A=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(A||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),O=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:O.optional()}),U=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...U.shape,created_at:t.z.string(),updated_at:t.z.string()}),N=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),R=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:N.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...R.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var D=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(D||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),x=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),P=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),F=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),H=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),K=t.z.object({borders:T,colors:x,displayName:t.z.string(),fonts:P,page_background:F,widget:H}),rt=K.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),G=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:N,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...G.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=O;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=D;exports.LogTypes=A;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=T;exports.brandingSchema=Q;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=k;exports.colorsSchema=x;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=P;exports.hookInsertSchema=C;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=j;exports.logSchema=nt;exports.loginSessionInsertSchema=v;exports.loginSessionSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=F;exports.parseUserId=zt;exports.passwordInsertSchema=U;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=G;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=R;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=K;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=M;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=V;exports.verificationMethodsSchema=E;exports.widgetSchema=H;
@@ -1802,6 +1802,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1802
1802
  export type Connection = z.infer<typeof connectionSchema>;
1803
1803
  export declare const customDomainInsertSchema: z.ZodObject<{
1804
1804
  domain: z.ZodString;
1805
+ custom_domain_id: z.ZodOptional<z.ZodString>;
1805
1806
  type: z.ZodEnum<[
1806
1807
  "auth0_managed_certs",
1807
1808
  "self_managed_certs"
@@ -1823,6 +1824,7 @@ export declare const customDomainInsertSchema: z.ZodObject<{
1823
1824
  }, "strip", z.ZodTypeAny, {
1824
1825
  type: "auth0_managed_certs" | "self_managed_certs";
1825
1826
  domain: string;
1827
+ custom_domain_id?: string | undefined;
1826
1828
  verification_method?: "txt" | undefined;
1827
1829
  tls_policy?: "recommended" | undefined;
1828
1830
  custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
@@ -1830,12 +1832,27 @@ export declare const customDomainInsertSchema: z.ZodObject<{
1830
1832
  }, {
1831
1833
  type: "auth0_managed_certs" | "self_managed_certs";
1832
1834
  domain: string;
1835
+ custom_domain_id?: string | undefined;
1833
1836
  verification_method?: "txt" | undefined;
1834
1837
  tls_policy?: "recommended" | undefined;
1835
1838
  custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1836
1839
  domain_metadata?: Record<string, string> | undefined;
1837
1840
  }>;
1838
1841
  export type CustomDomainInsert = z.infer<typeof customDomainInsertSchema>;
1842
+ export declare const verificationMethodsSchema: z.ZodObject<{
1843
+ name: z.ZodLiteral<"txt">;
1844
+ record: z.ZodString;
1845
+ domain: z.ZodString;
1846
+ }, "strip", z.ZodTypeAny, {
1847
+ name: "txt";
1848
+ domain: string;
1849
+ record: string;
1850
+ }, {
1851
+ name: "txt";
1852
+ domain: string;
1853
+ record: string;
1854
+ }>;
1855
+ export type VerificationMethods = z.infer<typeof verificationMethodsSchema>;
1839
1856
  export declare const customDomainSchema: z.ZodObject<{
1840
1857
  custom_domain_id: z.ZodString;
1841
1858
  primary: z.ZodBoolean;
@@ -1846,7 +1863,33 @@ export declare const customDomainSchema: z.ZodObject<{
1846
1863
  "ready"
1847
1864
  ]>;
1848
1865
  origin_domain_name: z.ZodOptional<z.ZodString>;
1849
- verification: z.ZodOptional<z.ZodObject<{}, "strip", z.ZodTypeAny, {}, {}>>;
1866
+ verification: z.ZodOptional<z.ZodObject<{
1867
+ methods: z.ZodArray<z.ZodObject<{
1868
+ name: z.ZodLiteral<"txt">;
1869
+ record: z.ZodString;
1870
+ domain: z.ZodString;
1871
+ }, "strip", z.ZodTypeAny, {
1872
+ name: "txt";
1873
+ domain: string;
1874
+ record: string;
1875
+ }, {
1876
+ name: "txt";
1877
+ domain: string;
1878
+ record: string;
1879
+ }>, "many">;
1880
+ }, "strip", z.ZodTypeAny, {
1881
+ methods: {
1882
+ name: "txt";
1883
+ domain: string;
1884
+ record: string;
1885
+ }[];
1886
+ }, {
1887
+ methods: {
1888
+ name: "txt";
1889
+ domain: string;
1890
+ record: string;
1891
+ }[];
1892
+ }>>;
1850
1893
  tls_policy: z.ZodOptional<z.ZodString>;
1851
1894
  domain: z.ZodString;
1852
1895
  type: z.ZodEnum<[
@@ -1875,7 +1918,13 @@ export declare const customDomainSchema: z.ZodObject<{
1875
1918
  custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1876
1919
  domain_metadata?: Record<string, string> | undefined;
1877
1920
  origin_domain_name?: string | undefined;
1878
- verification?: {} | undefined;
1921
+ verification?: {
1922
+ methods: {
1923
+ name: "txt";
1924
+ domain: string;
1925
+ record: string;
1926
+ }[];
1927
+ } | undefined;
1879
1928
  }, {
1880
1929
  type: "auth0_managed_certs" | "self_managed_certs";
1881
1930
  status: "disabled" | "pending" | "pending_verification" | "ready";
@@ -1887,7 +1936,13 @@ export declare const customDomainSchema: z.ZodObject<{
1887
1936
  custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1888
1937
  domain_metadata?: Record<string, string> | undefined;
1889
1938
  origin_domain_name?: string | undefined;
1890
- verification?: {} | undefined;
1939
+ verification?: {
1940
+ methods: {
1941
+ name: "txt";
1942
+ domain: string;
1943
+ record: string;
1944
+ }[];
1945
+ } | undefined;
1891
1946
  }>;
1892
1947
  export type CustomDomain = z.infer<typeof customDomainSchema>;
1893
1948
  export declare const hookInsertSchema: z.ZodObject<{
@@ -1,5 +1,5 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const q = t.object({
2
+ const z = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
@@ -56,7 +56,7 @@ const q = t.object({
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
58
  identities: t.array(g).optional()
59
- }), z = u, Q = a.extend({
59
+ }), Q = u, V = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
@@ -141,7 +141,7 @@ const y = t.object({
141
141
  ui_locales: t.string().optional(),
142
142
  // The following fields are not available in Auth0
143
143
  vendor_id: t.string().optional()
144
- }), V = t.object({
144
+ }), Y = t.object({
145
145
  colors: t.object({
146
146
  primary: t.string(),
147
147
  page_background: t.object({
@@ -198,7 +198,7 @@ const y = t.object({
198
198
  updated_at: t.string().transform((e) => e === null ? "" : e),
199
199
  ...w.shape,
200
200
  id: t.string()
201
- }), Y = t.object({
201
+ }), X = t.object({
202
202
  logoUrl: t.string(),
203
203
  loginBackgroundImage: t.string().nullish(),
204
204
  style: t.object({
@@ -245,11 +245,12 @@ const I = t.enum([
245
245
  expires_at: t.string(),
246
246
  used_at: t.string().optional(),
247
247
  user_id: t.string().optional()
248
- }), X = t.object({
248
+ }), J = t.object({
249
249
  ...j.shape,
250
250
  created_at: t.string()
251
251
  }), v = t.object({
252
252
  domain: t.string(),
253
+ custom_domain_id: t.string().optional(),
253
254
  type: t.enum(["auth0_managed_certs", "self_managed_certs"]),
254
255
  verification_method: t.enum(["txt"]).optional(),
255
256
  tls_policy: t.enum(["recommended"]).optional(),
@@ -261,15 +262,21 @@ const I = t.enum([
261
262
  "null"
262
263
  ]).optional(),
263
264
  domain_metadata: t.record(t.string().max(255)).optional()
264
- }), J = t.object({
265
+ }), A = t.object({
266
+ name: t.literal("txt"),
267
+ record: t.string(),
268
+ domain: t.string()
269
+ }), Z = t.object({
265
270
  ...v.shape,
266
271
  custom_domain_id: t.string(),
267
272
  primary: t.boolean(),
268
273
  status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
269
274
  origin_domain_name: t.string().optional(),
270
- verification: t.object({}).optional(),
275
+ verification: t.object({
276
+ methods: t.array(A)
277
+ }).optional(),
271
278
  tls_policy: t.string().optional()
272
- }), A = t.object({
279
+ }), O = t.object({
273
280
  trigger_id: t.enum([
274
281
  "pre-user-signup",
275
282
  "post-user-registration",
@@ -280,10 +287,10 @@ const I = t.enum([
280
287
  hook_id: t.string().optional(),
281
288
  synchronous: t.boolean().default(!1),
282
289
  priority: t.number().optional()
283
- }), Z = A.extend({
290
+ }), $ = O.extend({
284
291
  ...s.shape,
285
292
  hook_id: t.string()
286
- }), O = t.object({
293
+ }), N = t.object({
287
294
  alg: t.enum([
288
295
  "RS256",
289
296
  "RS384",
@@ -302,9 +309,9 @@ const I = t.enum([
302
309
  x5t: t.string().optional(),
303
310
  x5c: t.array(t.string()).optional(),
304
311
  use: t.enum(["sig", "enc"]).optional()
305
- }), $ = t.object({
306
- keys: t.array(O)
307
312
  }), tt = t.object({
313
+ keys: t.array(N)
314
+ }), et = t.object({
308
315
  issuer: t.string(),
309
316
  authorization_endpoint: t.string(),
310
317
  token_endpoint: t.string(),
@@ -325,7 +332,7 @@ const I = t.enum([
325
332
  request_uri_parameter_supported: t.boolean(),
326
333
  request_parameter_supported: t.boolean(),
327
334
  token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
328
- }), N = t.object({
335
+ }), U = t.object({
329
336
  csrf_token: t.string(),
330
337
  auth0Client: t.string().optional(),
331
338
  authParams: y,
@@ -337,16 +344,16 @@ const I = t.enum([
337
344
  authorization_url: t.string().optional()
338
345
  }).openapi({
339
346
  description: "This represents a login sesion"
340
- }), et = t.object({
341
- ...N.shape,
347
+ }), nt = t.object({
348
+ ...U.shape,
342
349
  id: t.string().openapi({
343
350
  description: "This is is used as the state in the universal login"
344
351
  }),
345
352
  created_at: t.string(),
346
353
  updated_at: t.string()
347
354
  });
348
- var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
349
- const R = t.enum([
355
+ var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
356
+ const D = t.enum([
350
357
  "cls",
351
358
  // CODE_LINK_SENT
352
359
  "fsa",
@@ -395,14 +402,14 @@ const R = t.enum([
395
402
  // SUCCESS_VERIFICATION_EMAIL
396
403
  "svr"
397
404
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
398
- ]), D = t.object({
405
+ ]), x = t.object({
399
406
  name: t.string(),
400
407
  version: t.string(),
401
408
  env: t.object({
402
409
  node: t.string().optional()
403
410
  }).optional()
404
- }), nt = t.object({
405
- type: R,
411
+ }), it = t.object({
412
+ type: D,
406
413
  date: t.string(),
407
414
  description: t.string().optional(),
408
415
  log_id: t.string().optional(),
@@ -423,13 +430,13 @@ const R = t.enum([
423
430
  strategy: t.string().optional(),
424
431
  strategy_type: t.string().optional(),
425
432
  hostname: t.string().optional(),
426
- auth0_client: D.optional()
427
- }), x = t.object({
433
+ auth0_client: x.optional()
434
+ }), T = t.object({
428
435
  user_id: t.string(),
429
436
  password: t.string(),
430
437
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
431
- }), it = t.object({
432
- ...x.shape,
438
+ }), ot = t.object({
439
+ ...T.shape,
433
440
  created_at: t.string(),
434
441
  updated_at: t.string()
435
442
  }), p = t.object({
@@ -439,7 +446,7 @@ const R = t.enum([
439
446
  last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
440
447
  last_ip: t.string().describe("Last IP address from which this user logged in"),
441
448
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
442
- }), T = t.object({
449
+ }), P = t.object({
443
450
  id: t.string(),
444
451
  revoked_at: t.string().optional(),
445
452
  used_at: t.string().optional(),
@@ -450,13 +457,13 @@ const R = t.enum([
450
457
  "Metadata related to the device used in the session"
451
458
  ),
452
459
  clients: t.array(t.string()).describe("List of client details for the session")
453
- }), ot = t.object({
460
+ }), st = t.object({
454
461
  created_at: t.string(),
455
462
  updated_at: t.string(),
456
463
  authenticated_at: t.string(),
457
464
  last_interaction_at: t.string(),
458
- ...T.shape
459
- }), st = t.object({
465
+ ...P.shape
466
+ }), at = t.object({
460
467
  kid: t.string().openapi({ description: "The key id of the signing key" }),
461
468
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
462
469
  fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
@@ -476,8 +483,8 @@ const R = t.enum([
476
483
  revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
477
484
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
478
485
  });
479
- var P = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(P || {});
480
- const at = t.object({
486
+ var F = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(F || {});
487
+ const rt = t.object({
481
488
  access_token: t.string(),
482
489
  id_token: t.string().optional(),
483
490
  scope: t.string().optional(),
@@ -490,7 +497,7 @@ t.object({
490
497
  code: t.string(),
491
498
  state: t.string().optional()
492
499
  });
493
- const F = t.object({
500
+ const H = t.object({
494
501
  button_border_radius: t.number(),
495
502
  button_border_weight: t.number(),
496
503
  buttons_style: t.enum(["pill"]),
@@ -500,7 +507,7 @@ const F = t.object({
500
507
  show_widget_shadow: t.boolean(),
501
508
  widget_border_weight: t.number(),
502
509
  widget_corner_radius: t.number()
503
- }), H = t.object({
510
+ }), K = t.object({
504
511
  base_focus_color: t.string(),
505
512
  base_hover_color: t.string(),
506
513
  body_text: t.string(),
@@ -523,7 +530,7 @@ const F = t.object({
523
530
  }), n = t.object({
524
531
  bold: t.boolean(),
525
532
  size: t.number()
526
- }), K = t.object({
533
+ }), G = t.object({
527
534
  body_text: n,
528
535
  buttons_text: n,
529
536
  font_url: t.string(),
@@ -533,31 +540,31 @@ const F = t.object({
533
540
  reference_text_size: t.number(),
534
541
  subtitle: n,
535
542
  title: n
536
- }), G = t.object({
543
+ }), L = t.object({
537
544
  background_color: t.string(),
538
545
  background_image_url: t.string(),
539
546
  page_layout: t.enum(["center"])
540
- }), L = t.object({
547
+ }), B = t.object({
541
548
  header_text_alignment: t.enum(["center"]),
542
549
  logo_height: t.number(),
543
550
  logo_position: t.enum(["center"]),
544
551
  logo_url: t.string(),
545
552
  social_buttons_layout: t.enum(["bottom"])
546
- }), B = t.object({
547
- borders: F,
548
- colors: H,
553
+ }), M = t.object({
554
+ borders: H,
555
+ colors: K,
549
556
  displayName: t.string(),
550
- fonts: K,
551
- page_background: G,
552
- widget: L
553
- }), rt = B.extend({
557
+ fonts: G,
558
+ page_background: L,
559
+ widget: B
560
+ }), lt = M.extend({
554
561
  themeId: t.string()
555
- }), lt = t.object({
562
+ }), ct = t.object({
556
563
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
557
564
  identifier_first: t.boolean().default(!0),
558
565
  password_first: t.boolean().default(!1),
559
566
  webauthn_platform_first_factor: t.boolean()
560
- }), ct = t.object({
567
+ }), pt = t.object({
561
568
  name: t.string(),
562
569
  enabled: t.boolean().optional().default(!0),
563
570
  default_from_address: t.string().optional(),
@@ -587,7 +594,7 @@ const F = t.object({
587
594
  })
588
595
  ]),
589
596
  settings: t.object({}).optional()
590
- }), M = t.object({
597
+ }), W = t.object({
591
598
  // The actual refresh token value (primary key).
592
599
  id: t.string(),
593
600
  // Link to the session record
@@ -608,73 +615,74 @@ const F = t.object({
608
615
  })
609
616
  ),
610
617
  rotating: t.boolean()
611
- }), pt = t.object({
618
+ }), dt = t.object({
612
619
  // When the refresh token record was created.
613
620
  created_at: t.string(),
614
621
  // Spread in the rest of the refresh token properties.
615
- ...M.shape
622
+ ...W.shape
616
623
  });
617
- function dt(e) {
624
+ function gt(e) {
618
625
  const [i, o] = e.split("|");
619
626
  if (!i || !o)
620
627
  throw new Error(`Invalid user_id: ${e}`);
621
628
  return { connection: i, id: o };
622
629
  }
623
630
  export {
624
- D as Auth0Client,
631
+ x as Auth0Client,
625
632
  l as AuthorizationResponseMode,
626
633
  r as AuthorizationResponseType,
627
634
  c as CodeChallengeMethod,
628
- P as GrantType,
629
- U as LogTypes,
635
+ F as GrantType,
636
+ R as LogTypes,
630
637
  f as applicationInsertSchema,
631
638
  S as applicationSchema,
632
- z as auth0UserResponseSchema,
639
+ Q as auth0UserResponseSchema,
633
640
  y as authParamsSchema,
634
641
  a as baseUserSchema,
635
- F as bordersSchema,
636
- V as brandingSchema,
642
+ H as bordersSchema,
643
+ Y as brandingSchema,
637
644
  j as codeInsertSchema,
638
- X as codeSchema,
645
+ J as codeSchema,
639
646
  I as codeTypeSchema,
640
- H as colorsSchema,
647
+ K as colorsSchema,
641
648
  E as connectionInsertSchema,
642
649
  k as connectionSchema,
643
650
  v as customDomainInsertSchema,
644
- J as customDomainSchema,
645
- ct as emailProviderSchema,
651
+ Z as customDomainSchema,
652
+ pt as emailProviderSchema,
646
653
  n as fontDetailsSchema,
647
- K as fontsSchema,
648
- A as hookInsertSchema,
649
- Z as hookSchema,
654
+ G as fontsSchema,
655
+ O as hookInsertSchema,
656
+ $ as hookSchema,
650
657
  g as identitySchema,
651
- $ as jwksKeySchema,
652
- O as jwksSchema,
653
- nt as logSchema,
654
- N as loginSessionInsertSchema,
655
- et as loginSessionSchema,
656
- tt as openIDConfigurationSchema,
657
- G as pageBackgroundSchema,
658
- dt as parseUserId,
659
- x as passwordInsertSchema,
660
- it as passwordSchema,
658
+ tt as jwksKeySchema,
659
+ N as jwksSchema,
660
+ it as logSchema,
661
+ U as loginSessionInsertSchema,
662
+ nt as loginSessionSchema,
663
+ et as openIDConfigurationSchema,
664
+ L as pageBackgroundSchema,
665
+ gt as parseUserId,
666
+ T as passwordInsertSchema,
667
+ ot as passwordSchema,
661
668
  d as profileDataSchema,
662
- lt as promptSettingSchema,
663
- M as refreshTokenInsertSchema,
664
- pt as refreshTokenSchema,
669
+ ct as promptSettingSchema,
670
+ W as refreshTokenInsertSchema,
671
+ dt as refreshTokenSchema,
665
672
  b as samlpAddon,
666
- T as sessionInsertSchema,
667
- ot as sessionSchema,
668
- st as signingKeySchema,
673
+ P as sessionInsertSchema,
674
+ st as sessionSchema,
675
+ at as signingKeySchema,
669
676
  w as tenantInsertSchema,
670
677
  C as tenantSchema,
671
- B as themeInsertSchema,
672
- rt as themeSchema,
673
- at as tokenResponseSchema,
674
- q as totalsSchema,
678
+ M as themeInsertSchema,
679
+ lt as themeSchema,
680
+ rt as tokenResponseSchema,
681
+ z as totalsSchema,
675
682
  _ as userInsertSchema,
676
- Q as userResponseSchema,
683
+ V as userResponseSchema,
677
684
  u as userSchema,
678
- Y as vendorSettingsSchema,
679
- L as widgetSchema
685
+ X as vendorSettingsSchema,
686
+ A as verificationMethodsSchema,
687
+ B as widgetSchema
680
688
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.52.0",
14
+ "version": "0.54.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],