@authhero/adapter-interfaces 0.53.0 → 0.54.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),Y=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({}).optional(),tls_policy:t.z.string().optional()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...c.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),it=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const at=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const D=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:D,colors:T,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),st=H.extend({themeId:t.z.string()}),rt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),lt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),ct=t.z.object({created_at:t.z.string(),...K.shape});function pt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=D;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=k;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=Y;exports.emailProviderSchema=lt;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginSessionInsertSchema=j;exports.loginSessionSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=pt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=rt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=ct;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=H;exports.themeSchema=st;exports.tokenResponseSchema=at;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),M=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let W=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>W()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),Q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),V=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),X=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=C.extend({...c.shape,hook_id:t.z.string()}),j=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(j)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),v=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...v.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var A=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(A||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),O=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:O.optional()}),U=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...U.shape,created_at:t.z.string(),updated_at:t.z.string()}),N=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),R=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:N.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...R.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var D=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(D||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),x=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),P=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),F=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),H=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),K=t.z.object({borders:T,colors:x,displayName:t.z.string(),fonts:P,page_background:F,widget:H}),rt=K.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),G=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:N,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...G.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=O;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=D;exports.LogTypes=A;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=T;exports.brandingSchema=Q;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=k;exports.colorsSchema=x;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=P;exports.hookInsertSchema=C;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=j;exports.logSchema=nt;exports.loginSessionInsertSchema=v;exports.loginSessionSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=F;exports.parseUserId=zt;exports.passwordInsertSchema=U;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=G;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=R;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=K;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=M;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=V;exports.verificationMethodsSchema=E;exports.widgetSchema=H;
|
|
@@ -1839,6 +1839,20 @@ export declare const customDomainInsertSchema: z.ZodObject<{
|
|
|
1839
1839
|
domain_metadata?: Record<string, string> | undefined;
|
|
1840
1840
|
}>;
|
|
1841
1841
|
export type CustomDomainInsert = z.infer<typeof customDomainInsertSchema>;
|
|
1842
|
+
export declare const verificationMethodsSchema: z.ZodObject<{
|
|
1843
|
+
name: z.ZodLiteral<"txt">;
|
|
1844
|
+
record: z.ZodString;
|
|
1845
|
+
domain: z.ZodString;
|
|
1846
|
+
}, "strip", z.ZodTypeAny, {
|
|
1847
|
+
name: "txt";
|
|
1848
|
+
domain: string;
|
|
1849
|
+
record: string;
|
|
1850
|
+
}, {
|
|
1851
|
+
name: "txt";
|
|
1852
|
+
domain: string;
|
|
1853
|
+
record: string;
|
|
1854
|
+
}>;
|
|
1855
|
+
export type VerificationMethods = z.infer<typeof verificationMethodsSchema>;
|
|
1842
1856
|
export declare const customDomainSchema: z.ZodObject<{
|
|
1843
1857
|
custom_domain_id: z.ZodString;
|
|
1844
1858
|
primary: z.ZodBoolean;
|
|
@@ -1849,7 +1863,33 @@ export declare const customDomainSchema: z.ZodObject<{
|
|
|
1849
1863
|
"ready"
|
|
1850
1864
|
]>;
|
|
1851
1865
|
origin_domain_name: z.ZodOptional<z.ZodString>;
|
|
1852
|
-
verification: z.ZodOptional<z.ZodObject<{
|
|
1866
|
+
verification: z.ZodOptional<z.ZodObject<{
|
|
1867
|
+
methods: z.ZodArray<z.ZodObject<{
|
|
1868
|
+
name: z.ZodLiteral<"txt">;
|
|
1869
|
+
record: z.ZodString;
|
|
1870
|
+
domain: z.ZodString;
|
|
1871
|
+
}, "strip", z.ZodTypeAny, {
|
|
1872
|
+
name: "txt";
|
|
1873
|
+
domain: string;
|
|
1874
|
+
record: string;
|
|
1875
|
+
}, {
|
|
1876
|
+
name: "txt";
|
|
1877
|
+
domain: string;
|
|
1878
|
+
record: string;
|
|
1879
|
+
}>, "many">;
|
|
1880
|
+
}, "strip", z.ZodTypeAny, {
|
|
1881
|
+
methods: {
|
|
1882
|
+
name: "txt";
|
|
1883
|
+
domain: string;
|
|
1884
|
+
record: string;
|
|
1885
|
+
}[];
|
|
1886
|
+
}, {
|
|
1887
|
+
methods: {
|
|
1888
|
+
name: "txt";
|
|
1889
|
+
domain: string;
|
|
1890
|
+
record: string;
|
|
1891
|
+
}[];
|
|
1892
|
+
}>>;
|
|
1853
1893
|
tls_policy: z.ZodOptional<z.ZodString>;
|
|
1854
1894
|
domain: z.ZodString;
|
|
1855
1895
|
type: z.ZodEnum<[
|
|
@@ -1878,7 +1918,13 @@ export declare const customDomainSchema: z.ZodObject<{
|
|
|
1878
1918
|
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1879
1919
|
domain_metadata?: Record<string, string> | undefined;
|
|
1880
1920
|
origin_domain_name?: string | undefined;
|
|
1881
|
-
verification?: {
|
|
1921
|
+
verification?: {
|
|
1922
|
+
methods: {
|
|
1923
|
+
name: "txt";
|
|
1924
|
+
domain: string;
|
|
1925
|
+
record: string;
|
|
1926
|
+
}[];
|
|
1927
|
+
} | undefined;
|
|
1882
1928
|
}, {
|
|
1883
1929
|
type: "auth0_managed_certs" | "self_managed_certs";
|
|
1884
1930
|
status: "disabled" | "pending" | "pending_verification" | "ready";
|
|
@@ -1890,7 +1936,13 @@ export declare const customDomainSchema: z.ZodObject<{
|
|
|
1890
1936
|
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
1891
1937
|
domain_metadata?: Record<string, string> | undefined;
|
|
1892
1938
|
origin_domain_name?: string | undefined;
|
|
1893
|
-
verification?: {
|
|
1939
|
+
verification?: {
|
|
1940
|
+
methods: {
|
|
1941
|
+
name: "txt";
|
|
1942
|
+
domain: string;
|
|
1943
|
+
record: string;
|
|
1944
|
+
}[];
|
|
1945
|
+
} | undefined;
|
|
1894
1946
|
}>;
|
|
1895
1947
|
export type CustomDomain = z.infer<typeof customDomainSchema>;
|
|
1896
1948
|
export declare const hookInsertSchema: z.ZodObject<{
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { z as t } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const z = t.object({
|
|
3
3
|
start: t.number(),
|
|
4
4
|
limit: t.number(),
|
|
5
5
|
length: t.number()
|
|
@@ -56,7 +56,7 @@ const q = t.object({
|
|
|
56
56
|
email: t.string(),
|
|
57
57
|
login_count: t.number(),
|
|
58
58
|
identities: t.array(g).optional()
|
|
59
|
-
}),
|
|
59
|
+
}), Q = u, V = a.extend({
|
|
60
60
|
email: t.string(),
|
|
61
61
|
login_count: t.number(),
|
|
62
62
|
multifactor: t.array(t.string()).optional(),
|
|
@@ -141,7 +141,7 @@ const y = t.object({
|
|
|
141
141
|
ui_locales: t.string().optional(),
|
|
142
142
|
// The following fields are not available in Auth0
|
|
143
143
|
vendor_id: t.string().optional()
|
|
144
|
-
}),
|
|
144
|
+
}), Y = t.object({
|
|
145
145
|
colors: t.object({
|
|
146
146
|
primary: t.string(),
|
|
147
147
|
page_background: t.object({
|
|
@@ -198,7 +198,7 @@ const y = t.object({
|
|
|
198
198
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
199
199
|
...w.shape,
|
|
200
200
|
id: t.string()
|
|
201
|
-
}),
|
|
201
|
+
}), X = t.object({
|
|
202
202
|
logoUrl: t.string(),
|
|
203
203
|
loginBackgroundImage: t.string().nullish(),
|
|
204
204
|
style: t.object({
|
|
@@ -245,7 +245,7 @@ const I = t.enum([
|
|
|
245
245
|
expires_at: t.string(),
|
|
246
246
|
used_at: t.string().optional(),
|
|
247
247
|
user_id: t.string().optional()
|
|
248
|
-
}),
|
|
248
|
+
}), J = t.object({
|
|
249
249
|
...j.shape,
|
|
250
250
|
created_at: t.string()
|
|
251
251
|
}), v = t.object({
|
|
@@ -262,15 +262,21 @@ const I = t.enum([
|
|
|
262
262
|
"null"
|
|
263
263
|
]).optional(),
|
|
264
264
|
domain_metadata: t.record(t.string().max(255)).optional()
|
|
265
|
-
}),
|
|
265
|
+
}), A = t.object({
|
|
266
|
+
name: t.literal("txt"),
|
|
267
|
+
record: t.string(),
|
|
268
|
+
domain: t.string()
|
|
269
|
+
}), Z = t.object({
|
|
266
270
|
...v.shape,
|
|
267
271
|
custom_domain_id: t.string(),
|
|
268
272
|
primary: t.boolean(),
|
|
269
273
|
status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
|
|
270
274
|
origin_domain_name: t.string().optional(),
|
|
271
|
-
verification: t.object({
|
|
275
|
+
verification: t.object({
|
|
276
|
+
methods: t.array(A)
|
|
277
|
+
}).optional(),
|
|
272
278
|
tls_policy: t.string().optional()
|
|
273
|
-
}),
|
|
279
|
+
}), O = t.object({
|
|
274
280
|
trigger_id: t.enum([
|
|
275
281
|
"pre-user-signup",
|
|
276
282
|
"post-user-registration",
|
|
@@ -281,10 +287,10 @@ const I = t.enum([
|
|
|
281
287
|
hook_id: t.string().optional(),
|
|
282
288
|
synchronous: t.boolean().default(!1),
|
|
283
289
|
priority: t.number().optional()
|
|
284
|
-
}),
|
|
290
|
+
}), $ = O.extend({
|
|
285
291
|
...s.shape,
|
|
286
292
|
hook_id: t.string()
|
|
287
|
-
}),
|
|
293
|
+
}), N = t.object({
|
|
288
294
|
alg: t.enum([
|
|
289
295
|
"RS256",
|
|
290
296
|
"RS384",
|
|
@@ -303,9 +309,9 @@ const I = t.enum([
|
|
|
303
309
|
x5t: t.string().optional(),
|
|
304
310
|
x5c: t.array(t.string()).optional(),
|
|
305
311
|
use: t.enum(["sig", "enc"]).optional()
|
|
306
|
-
}), $ = t.object({
|
|
307
|
-
keys: t.array(O)
|
|
308
312
|
}), tt = t.object({
|
|
313
|
+
keys: t.array(N)
|
|
314
|
+
}), et = t.object({
|
|
309
315
|
issuer: t.string(),
|
|
310
316
|
authorization_endpoint: t.string(),
|
|
311
317
|
token_endpoint: t.string(),
|
|
@@ -326,7 +332,7 @@ const I = t.enum([
|
|
|
326
332
|
request_uri_parameter_supported: t.boolean(),
|
|
327
333
|
request_parameter_supported: t.boolean(),
|
|
328
334
|
token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
|
|
329
|
-
}),
|
|
335
|
+
}), U = t.object({
|
|
330
336
|
csrf_token: t.string(),
|
|
331
337
|
auth0Client: t.string().optional(),
|
|
332
338
|
authParams: y,
|
|
@@ -338,16 +344,16 @@ const I = t.enum([
|
|
|
338
344
|
authorization_url: t.string().optional()
|
|
339
345
|
}).openapi({
|
|
340
346
|
description: "This represents a login sesion"
|
|
341
|
-
}),
|
|
342
|
-
...
|
|
347
|
+
}), nt = t.object({
|
|
348
|
+
...U.shape,
|
|
343
349
|
id: t.string().openapi({
|
|
344
350
|
description: "This is is used as the state in the universal login"
|
|
345
351
|
}),
|
|
346
352
|
created_at: t.string(),
|
|
347
353
|
updated_at: t.string()
|
|
348
354
|
});
|
|
349
|
-
var
|
|
350
|
-
const
|
|
355
|
+
var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
|
|
356
|
+
const D = t.enum([
|
|
351
357
|
"cls",
|
|
352
358
|
// CODE_LINK_SENT
|
|
353
359
|
"fsa",
|
|
@@ -396,14 +402,14 @@ const R = t.enum([
|
|
|
396
402
|
// SUCCESS_VERIFICATION_EMAIL
|
|
397
403
|
"svr"
|
|
398
404
|
// SUCCESS_VERIFICATION_EMAIL_REQUEST
|
|
399
|
-
]),
|
|
405
|
+
]), x = t.object({
|
|
400
406
|
name: t.string(),
|
|
401
407
|
version: t.string(),
|
|
402
408
|
env: t.object({
|
|
403
409
|
node: t.string().optional()
|
|
404
410
|
}).optional()
|
|
405
|
-
}),
|
|
406
|
-
type:
|
|
411
|
+
}), it = t.object({
|
|
412
|
+
type: D,
|
|
407
413
|
date: t.string(),
|
|
408
414
|
description: t.string().optional(),
|
|
409
415
|
log_id: t.string().optional(),
|
|
@@ -424,13 +430,13 @@ const R = t.enum([
|
|
|
424
430
|
strategy: t.string().optional(),
|
|
425
431
|
strategy_type: t.string().optional(),
|
|
426
432
|
hostname: t.string().optional(),
|
|
427
|
-
auth0_client:
|
|
428
|
-
}),
|
|
433
|
+
auth0_client: x.optional()
|
|
434
|
+
}), T = t.object({
|
|
429
435
|
user_id: t.string(),
|
|
430
436
|
password: t.string(),
|
|
431
437
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
432
|
-
}),
|
|
433
|
-
...
|
|
438
|
+
}), ot = t.object({
|
|
439
|
+
...T.shape,
|
|
434
440
|
created_at: t.string(),
|
|
435
441
|
updated_at: t.string()
|
|
436
442
|
}), p = t.object({
|
|
@@ -440,7 +446,7 @@ const R = t.enum([
|
|
|
440
446
|
last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
|
|
441
447
|
last_ip: t.string().describe("Last IP address from which this user logged in"),
|
|
442
448
|
last_asn: t.string().describe("Last autonomous system number from which this user logged in")
|
|
443
|
-
}),
|
|
449
|
+
}), P = t.object({
|
|
444
450
|
id: t.string(),
|
|
445
451
|
revoked_at: t.string().optional(),
|
|
446
452
|
used_at: t.string().optional(),
|
|
@@ -451,13 +457,13 @@ const R = t.enum([
|
|
|
451
457
|
"Metadata related to the device used in the session"
|
|
452
458
|
),
|
|
453
459
|
clients: t.array(t.string()).describe("List of client details for the session")
|
|
454
|
-
}),
|
|
460
|
+
}), st = t.object({
|
|
455
461
|
created_at: t.string(),
|
|
456
462
|
updated_at: t.string(),
|
|
457
463
|
authenticated_at: t.string(),
|
|
458
464
|
last_interaction_at: t.string(),
|
|
459
|
-
...
|
|
460
|
-
}),
|
|
465
|
+
...P.shape
|
|
466
|
+
}), at = t.object({
|
|
461
467
|
kid: t.string().openapi({ description: "The key id of the signing key" }),
|
|
462
468
|
cert: t.string().openapi({ description: "The public certificate of the signing key" }),
|
|
463
469
|
fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -477,8 +483,8 @@ const R = t.enum([
|
|
|
477
483
|
revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
|
|
478
484
|
revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
|
|
479
485
|
});
|
|
480
|
-
var
|
|
481
|
-
const
|
|
486
|
+
var F = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(F || {});
|
|
487
|
+
const rt = t.object({
|
|
482
488
|
access_token: t.string(),
|
|
483
489
|
id_token: t.string().optional(),
|
|
484
490
|
scope: t.string().optional(),
|
|
@@ -491,7 +497,7 @@ t.object({
|
|
|
491
497
|
code: t.string(),
|
|
492
498
|
state: t.string().optional()
|
|
493
499
|
});
|
|
494
|
-
const
|
|
500
|
+
const H = t.object({
|
|
495
501
|
button_border_radius: t.number(),
|
|
496
502
|
button_border_weight: t.number(),
|
|
497
503
|
buttons_style: t.enum(["pill"]),
|
|
@@ -501,7 +507,7 @@ const F = t.object({
|
|
|
501
507
|
show_widget_shadow: t.boolean(),
|
|
502
508
|
widget_border_weight: t.number(),
|
|
503
509
|
widget_corner_radius: t.number()
|
|
504
|
-
}),
|
|
510
|
+
}), K = t.object({
|
|
505
511
|
base_focus_color: t.string(),
|
|
506
512
|
base_hover_color: t.string(),
|
|
507
513
|
body_text: t.string(),
|
|
@@ -524,7 +530,7 @@ const F = t.object({
|
|
|
524
530
|
}), n = t.object({
|
|
525
531
|
bold: t.boolean(),
|
|
526
532
|
size: t.number()
|
|
527
|
-
}),
|
|
533
|
+
}), G = t.object({
|
|
528
534
|
body_text: n,
|
|
529
535
|
buttons_text: n,
|
|
530
536
|
font_url: t.string(),
|
|
@@ -534,31 +540,31 @@ const F = t.object({
|
|
|
534
540
|
reference_text_size: t.number(),
|
|
535
541
|
subtitle: n,
|
|
536
542
|
title: n
|
|
537
|
-
}),
|
|
543
|
+
}), L = t.object({
|
|
538
544
|
background_color: t.string(),
|
|
539
545
|
background_image_url: t.string(),
|
|
540
546
|
page_layout: t.enum(["center"])
|
|
541
|
-
}),
|
|
547
|
+
}), B = t.object({
|
|
542
548
|
header_text_alignment: t.enum(["center"]),
|
|
543
549
|
logo_height: t.number(),
|
|
544
550
|
logo_position: t.enum(["center"]),
|
|
545
551
|
logo_url: t.string(),
|
|
546
552
|
social_buttons_layout: t.enum(["bottom"])
|
|
547
|
-
}),
|
|
548
|
-
borders:
|
|
549
|
-
colors:
|
|
553
|
+
}), M = t.object({
|
|
554
|
+
borders: H,
|
|
555
|
+
colors: K,
|
|
550
556
|
displayName: t.string(),
|
|
551
|
-
fonts:
|
|
552
|
-
page_background:
|
|
553
|
-
widget:
|
|
554
|
-
}),
|
|
557
|
+
fonts: G,
|
|
558
|
+
page_background: L,
|
|
559
|
+
widget: B
|
|
560
|
+
}), lt = M.extend({
|
|
555
561
|
themeId: t.string()
|
|
556
|
-
}),
|
|
562
|
+
}), ct = t.object({
|
|
557
563
|
universal_login_experience: t.enum(["new", "classic"]).default("new"),
|
|
558
564
|
identifier_first: t.boolean().default(!0),
|
|
559
565
|
password_first: t.boolean().default(!1),
|
|
560
566
|
webauthn_platform_first_factor: t.boolean()
|
|
561
|
-
}),
|
|
567
|
+
}), pt = t.object({
|
|
562
568
|
name: t.string(),
|
|
563
569
|
enabled: t.boolean().optional().default(!0),
|
|
564
570
|
default_from_address: t.string().optional(),
|
|
@@ -588,7 +594,7 @@ const F = t.object({
|
|
|
588
594
|
})
|
|
589
595
|
]),
|
|
590
596
|
settings: t.object({}).optional()
|
|
591
|
-
}),
|
|
597
|
+
}), W = t.object({
|
|
592
598
|
// The actual refresh token value (primary key).
|
|
593
599
|
id: t.string(),
|
|
594
600
|
// Link to the session record
|
|
@@ -609,73 +615,74 @@ const F = t.object({
|
|
|
609
615
|
})
|
|
610
616
|
),
|
|
611
617
|
rotating: t.boolean()
|
|
612
|
-
}),
|
|
618
|
+
}), dt = t.object({
|
|
613
619
|
// When the refresh token record was created.
|
|
614
620
|
created_at: t.string(),
|
|
615
621
|
// Spread in the rest of the refresh token properties.
|
|
616
|
-
...
|
|
622
|
+
...W.shape
|
|
617
623
|
});
|
|
618
|
-
function
|
|
624
|
+
function gt(e) {
|
|
619
625
|
const [i, o] = e.split("|");
|
|
620
626
|
if (!i || !o)
|
|
621
627
|
throw new Error(`Invalid user_id: ${e}`);
|
|
622
628
|
return { connection: i, id: o };
|
|
623
629
|
}
|
|
624
630
|
export {
|
|
625
|
-
|
|
631
|
+
x as Auth0Client,
|
|
626
632
|
l as AuthorizationResponseMode,
|
|
627
633
|
r as AuthorizationResponseType,
|
|
628
634
|
c as CodeChallengeMethod,
|
|
629
|
-
|
|
630
|
-
|
|
635
|
+
F as GrantType,
|
|
636
|
+
R as LogTypes,
|
|
631
637
|
f as applicationInsertSchema,
|
|
632
638
|
S as applicationSchema,
|
|
633
|
-
|
|
639
|
+
Q as auth0UserResponseSchema,
|
|
634
640
|
y as authParamsSchema,
|
|
635
641
|
a as baseUserSchema,
|
|
636
|
-
|
|
637
|
-
|
|
642
|
+
H as bordersSchema,
|
|
643
|
+
Y as brandingSchema,
|
|
638
644
|
j as codeInsertSchema,
|
|
639
|
-
|
|
645
|
+
J as codeSchema,
|
|
640
646
|
I as codeTypeSchema,
|
|
641
|
-
|
|
647
|
+
K as colorsSchema,
|
|
642
648
|
E as connectionInsertSchema,
|
|
643
649
|
k as connectionSchema,
|
|
644
650
|
v as customDomainInsertSchema,
|
|
645
|
-
|
|
646
|
-
|
|
651
|
+
Z as customDomainSchema,
|
|
652
|
+
pt as emailProviderSchema,
|
|
647
653
|
n as fontDetailsSchema,
|
|
648
|
-
|
|
649
|
-
|
|
650
|
-
|
|
654
|
+
G as fontsSchema,
|
|
655
|
+
O as hookInsertSchema,
|
|
656
|
+
$ as hookSchema,
|
|
651
657
|
g as identitySchema,
|
|
652
|
-
|
|
653
|
-
|
|
654
|
-
|
|
655
|
-
|
|
656
|
-
|
|
657
|
-
|
|
658
|
-
|
|
659
|
-
|
|
660
|
-
|
|
661
|
-
|
|
658
|
+
tt as jwksKeySchema,
|
|
659
|
+
N as jwksSchema,
|
|
660
|
+
it as logSchema,
|
|
661
|
+
U as loginSessionInsertSchema,
|
|
662
|
+
nt as loginSessionSchema,
|
|
663
|
+
et as openIDConfigurationSchema,
|
|
664
|
+
L as pageBackgroundSchema,
|
|
665
|
+
gt as parseUserId,
|
|
666
|
+
T as passwordInsertSchema,
|
|
667
|
+
ot as passwordSchema,
|
|
662
668
|
d as profileDataSchema,
|
|
663
|
-
|
|
664
|
-
|
|
665
|
-
|
|
669
|
+
ct as promptSettingSchema,
|
|
670
|
+
W as refreshTokenInsertSchema,
|
|
671
|
+
dt as refreshTokenSchema,
|
|
666
672
|
b as samlpAddon,
|
|
667
|
-
|
|
668
|
-
|
|
669
|
-
|
|
673
|
+
P as sessionInsertSchema,
|
|
674
|
+
st as sessionSchema,
|
|
675
|
+
at as signingKeySchema,
|
|
670
676
|
w as tenantInsertSchema,
|
|
671
677
|
C as tenantSchema,
|
|
672
|
-
|
|
673
|
-
|
|
674
|
-
|
|
675
|
-
|
|
678
|
+
M as themeInsertSchema,
|
|
679
|
+
lt as themeSchema,
|
|
680
|
+
rt as tokenResponseSchema,
|
|
681
|
+
z as totalsSchema,
|
|
676
682
|
_ as userInsertSchema,
|
|
677
|
-
|
|
683
|
+
V as userResponseSchema,
|
|
678
684
|
u as userSchema,
|
|
679
|
-
|
|
680
|
-
|
|
685
|
+
X as vendorSettingsSchema,
|
|
686
|
+
A as verificationMethodsSchema,
|
|
687
|
+
B as widgetSchema
|
|
681
688
|
};
|