@authhero/adapter-interfaces 0.53.0 → 0.55.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),G=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),M="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=M[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),W=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Q=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),V=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),Y=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({}).optional(),tls_policy:t.z.string().optional()}),E=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),X=E.extend({...c.shape,hook_id:t.z.string()}),C=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),J=t.z.object({keys:t.z.array(C)}),Z=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),j=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),$=t.z.object({...j.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var v=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(v||{});const tt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),A=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),et=t.z.object({type:tt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:A.optional()}),O=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),nt=t.z.object({...O.shape,created_at:t.z.string(),updated_at:t.z.string()}),U=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),N=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:U.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),it=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...N.shape}),ot=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var R=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(R||{});const at=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const D=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),T=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),x=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),P=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),F=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),H=t.z.object({borders:D,colors:T,displayName:t.z.string(),fonts:x,page_background:P,widget:F}),st=H.extend({themeId:t.z.string()}),rt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),lt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),K=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:U,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),ct=t.z.object({created_at:t.z.string(),...K.shape});function pt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=A;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=R;exports.LogTypes=v;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=D;exports.brandingSchema=W;exports.codeInsertSchema=I;exports.codeSchema=V;exports.codeTypeSchema=k;exports.colorsSchema=T;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=Y;exports.emailProviderSchema=lt;exports.fontDetailsSchema=n;exports.fontsSchema=x;exports.hookInsertSchema=E;exports.hookSchema=X;exports.identitySchema=z;exports.jwksKeySchema=J;exports.jwksSchema=C;exports.logSchema=et;exports.loginSessionInsertSchema=j;exports.loginSessionSchema=$;exports.openIDConfigurationSchema=Z;exports.pageBackgroundSchema=P;exports.parseUserId=pt;exports.passwordInsertSchema=O;exports.passwordSchema=nt;exports.profileDataSchema=p;exports.promptSettingSchema=rt;exports.refreshTokenInsertSchema=K;exports.refreshTokenSchema=ct;exports.samlpAddon=_;exports.sessionInsertSchema=N;exports.sessionSchema=it;exports.signingKeySchema=ot;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=H;exports.themeSchema=st;exports.tokenResponseSchema=at;exports.totalsSchema=G;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=Q;exports.widgetSchema=F;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),L=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),B=g,W=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>Q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),V=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Y=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const I=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),k=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:I,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),X=t.z.object({...k.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),C=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),J=C.extend({tenant_id:t.z.string()}),j=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),Z=j.extend({...c.shape,hook_id:t.z.string()}),v=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),$=t.z.object({keys:t.z.array(v)}),tt=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),A=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),et=t.z.object({...A.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var O=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(O||{});const nt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),U=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),it=t.z.object({type:nt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:U.optional()}),N=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),ot=t.z.object({...N.shape,created_at:t.z.string(),updated_at:t.z.string()}),R=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),D=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:R.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),at=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...D.shape}),st=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var T=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(T||{});const rt=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const x=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),P=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),F=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),H=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),K=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),G=t.z.object({borders:x,colors:P,displayName:t.z.string(),fonts:F,page_background:H,widget:K}),lt=G.extend({themeId:t.z.string()}),ct=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),pt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),M=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:R,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),zt=t.z.object({created_at:t.z.string(),...M.shape});function dt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=U;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=T;exports.LogTypes=O;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=B;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=x;exports.brandingSchema=V;exports.codeInsertSchema=k;exports.codeSchema=X;exports.codeTypeSchema=I;exports.colorsSchema=P;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=C;exports.customDomainWithTenantIdSchema=J;exports.emailProviderSchema=pt;exports.fontDetailsSchema=n;exports.fontsSchema=F;exports.hookInsertSchema=j;exports.hookSchema=Z;exports.identitySchema=z;exports.jwksKeySchema=$;exports.jwksSchema=v;exports.logSchema=it;exports.loginSessionInsertSchema=A;exports.loginSessionSchema=et;exports.openIDConfigurationSchema=tt;exports.pageBackgroundSchema=H;exports.parseUserId=dt;exports.passwordInsertSchema=N;exports.passwordSchema=ot;exports.profileDataSchema=p;exports.promptSettingSchema=ct;exports.refreshTokenInsertSchema=M;exports.refreshTokenSchema=zt;exports.samlpAddon=_;exports.sessionInsertSchema=D;exports.sessionSchema=at;exports.signingKeySchema=st;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=G;exports.themeSchema=lt;exports.tokenResponseSchema=rt;exports.totalsSchema=L;exports.userInsertSchema=d;exports.userResponseSchema=W;exports.userSchema=g;exports.vendorSettingsSchema=Y;exports.verificationMethodsSchema=E;exports.widgetSchema=K;
@@ -1839,6 +1839,20 @@ export declare const customDomainInsertSchema: z.ZodObject<{
1839
1839
  domain_metadata?: Record<string, string> | undefined;
1840
1840
  }>;
1841
1841
  export type CustomDomainInsert = z.infer<typeof customDomainInsertSchema>;
1842
+ export declare const verificationMethodsSchema: z.ZodObject<{
1843
+ name: z.ZodLiteral<"txt">;
1844
+ record: z.ZodString;
1845
+ domain: z.ZodString;
1846
+ }, "strip", z.ZodTypeAny, {
1847
+ name: "txt";
1848
+ domain: string;
1849
+ record: string;
1850
+ }, {
1851
+ name: "txt";
1852
+ domain: string;
1853
+ record: string;
1854
+ }>;
1855
+ export type VerificationMethods = z.infer<typeof verificationMethodsSchema>;
1842
1856
  export declare const customDomainSchema: z.ZodObject<{
1843
1857
  custom_domain_id: z.ZodString;
1844
1858
  primary: z.ZodBoolean;
@@ -1849,7 +1863,33 @@ export declare const customDomainSchema: z.ZodObject<{
1849
1863
  "ready"
1850
1864
  ]>;
1851
1865
  origin_domain_name: z.ZodOptional<z.ZodString>;
1852
- verification: z.ZodOptional<z.ZodObject<{}, "strip", z.ZodTypeAny, {}, {}>>;
1866
+ verification: z.ZodOptional<z.ZodObject<{
1867
+ methods: z.ZodArray<z.ZodObject<{
1868
+ name: z.ZodLiteral<"txt">;
1869
+ record: z.ZodString;
1870
+ domain: z.ZodString;
1871
+ }, "strip", z.ZodTypeAny, {
1872
+ name: "txt";
1873
+ domain: string;
1874
+ record: string;
1875
+ }, {
1876
+ name: "txt";
1877
+ domain: string;
1878
+ record: string;
1879
+ }>, "many">;
1880
+ }, "strip", z.ZodTypeAny, {
1881
+ methods: {
1882
+ name: "txt";
1883
+ domain: string;
1884
+ record: string;
1885
+ }[];
1886
+ }, {
1887
+ methods: {
1888
+ name: "txt";
1889
+ domain: string;
1890
+ record: string;
1891
+ }[];
1892
+ }>>;
1853
1893
  tls_policy: z.ZodOptional<z.ZodString>;
1854
1894
  domain: z.ZodString;
1855
1895
  type: z.ZodEnum<[
@@ -1878,7 +1918,13 @@ export declare const customDomainSchema: z.ZodObject<{
1878
1918
  custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1879
1919
  domain_metadata?: Record<string, string> | undefined;
1880
1920
  origin_domain_name?: string | undefined;
1881
- verification?: {} | undefined;
1921
+ verification?: {
1922
+ methods: {
1923
+ name: "txt";
1924
+ domain: string;
1925
+ record: string;
1926
+ }[];
1927
+ } | undefined;
1882
1928
  }, {
1883
1929
  type: "auth0_managed_certs" | "self_managed_certs";
1884
1930
  status: "disabled" | "pending" | "pending_verification" | "ready";
@@ -1890,9 +1936,111 @@ export declare const customDomainSchema: z.ZodObject<{
1890
1936
  custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
1891
1937
  domain_metadata?: Record<string, string> | undefined;
1892
1938
  origin_domain_name?: string | undefined;
1893
- verification?: {} | undefined;
1939
+ verification?: {
1940
+ methods: {
1941
+ name: "txt";
1942
+ domain: string;
1943
+ record: string;
1944
+ }[];
1945
+ } | undefined;
1894
1946
  }>;
1895
1947
  export type CustomDomain = z.infer<typeof customDomainSchema>;
1948
+ export declare const customDomainWithTenantIdSchema: z.ZodObject<z.objectUtil.extendShape<{
1949
+ custom_domain_id: z.ZodString;
1950
+ primary: z.ZodBoolean;
1951
+ status: z.ZodEnum<[
1952
+ "disabled",
1953
+ "pending",
1954
+ "pending_verification",
1955
+ "ready"
1956
+ ]>;
1957
+ origin_domain_name: z.ZodOptional<z.ZodString>;
1958
+ verification: z.ZodOptional<z.ZodObject<{
1959
+ methods: z.ZodArray<z.ZodObject<{
1960
+ name: z.ZodLiteral<"txt">;
1961
+ record: z.ZodString;
1962
+ domain: z.ZodString;
1963
+ }, "strip", z.ZodTypeAny, {
1964
+ name: "txt";
1965
+ domain: string;
1966
+ record: string;
1967
+ }, {
1968
+ name: "txt";
1969
+ domain: string;
1970
+ record: string;
1971
+ }>, "many">;
1972
+ }, "strip", z.ZodTypeAny, {
1973
+ methods: {
1974
+ name: "txt";
1975
+ domain: string;
1976
+ record: string;
1977
+ }[];
1978
+ }, {
1979
+ methods: {
1980
+ name: "txt";
1981
+ domain: string;
1982
+ record: string;
1983
+ }[];
1984
+ }>>;
1985
+ tls_policy: z.ZodOptional<z.ZodString>;
1986
+ domain: z.ZodString;
1987
+ type: z.ZodEnum<[
1988
+ "auth0_managed_certs",
1989
+ "self_managed_certs"
1990
+ ]>;
1991
+ verification_method: z.ZodOptional<z.ZodEnum<[
1992
+ "txt"
1993
+ ]>>;
1994
+ custom_client_ip_header: z.ZodOptional<z.ZodEnum<[
1995
+ "true-client-ip",
1996
+ "cf-connecting-ip",
1997
+ "x-forwarded-for",
1998
+ "x-azure-clientip",
1999
+ "null"
2000
+ ]>>;
2001
+ domain_metadata: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
2002
+ }, {
2003
+ tenant_id: z.ZodString;
2004
+ }>, "strip", z.ZodTypeAny, {
2005
+ type: "auth0_managed_certs" | "self_managed_certs";
2006
+ status: "disabled" | "pending" | "pending_verification" | "ready";
2007
+ primary: boolean;
2008
+ domain: string;
2009
+ custom_domain_id: string;
2010
+ tenant_id: string;
2011
+ verification_method?: "txt" | undefined;
2012
+ tls_policy?: string | undefined;
2013
+ custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
2014
+ domain_metadata?: Record<string, string> | undefined;
2015
+ origin_domain_name?: string | undefined;
2016
+ verification?: {
2017
+ methods: {
2018
+ name: "txt";
2019
+ domain: string;
2020
+ record: string;
2021
+ }[];
2022
+ } | undefined;
2023
+ }, {
2024
+ type: "auth0_managed_certs" | "self_managed_certs";
2025
+ status: "disabled" | "pending" | "pending_verification" | "ready";
2026
+ primary: boolean;
2027
+ domain: string;
2028
+ custom_domain_id: string;
2029
+ tenant_id: string;
2030
+ verification_method?: "txt" | undefined;
2031
+ tls_policy?: string | undefined;
2032
+ custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
2033
+ domain_metadata?: Record<string, string> | undefined;
2034
+ origin_domain_name?: string | undefined;
2035
+ verification?: {
2036
+ methods: {
2037
+ name: "txt";
2038
+ domain: string;
2039
+ record: string;
2040
+ }[];
2041
+ } | undefined;
2042
+ }>;
2043
+ export type CustomDomainWithTenantId = z.infer<typeof customDomainWithTenantIdSchema>;
1896
2044
  export declare const hookInsertSchema: z.ZodObject<{
1897
2045
  trigger_id: z.ZodEnum<[
1898
2046
  "pre-user-signup",
@@ -4600,6 +4748,7 @@ export interface ConnectionsAdapter {
4600
4748
  export interface CustomDomainsAdapter {
4601
4749
  create: (tenant_id: string, custom_domain: CustomDomainInsert) => Promise<CustomDomain>;
4602
4750
  get: (tenant_id: string, id: string) => Promise<CustomDomain | null>;
4751
+ getByDomain: (domain: string) => Promise<CustomDomainWithTenantId | null>;
4603
4752
  list: (tenant_id: string) => Promise<CustomDomain[]>;
4604
4753
  remove: (tenant_id: string, id: string) => Promise<boolean>;
4605
4754
  update: (tenant_id: string, id: string, custom_domain: Partial<CustomDomain>) => Promise<boolean>;
@@ -1,5 +1,5 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const q = t.object({
2
+ const Q = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
@@ -56,7 +56,7 @@ const q = t.object({
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
58
  identities: t.array(g).optional()
59
- }), z = u, Q = a.extend({
59
+ }), V = u, Y = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
@@ -141,7 +141,7 @@ const y = t.object({
141
141
  ui_locales: t.string().optional(),
142
142
  // The following fields are not available in Auth0
143
143
  vendor_id: t.string().optional()
144
- }), V = t.object({
144
+ }), X = t.object({
145
145
  colors: t.object({
146
146
  primary: t.string(),
147
147
  page_background: t.object({
@@ -198,7 +198,7 @@ const y = t.object({
198
198
  updated_at: t.string().transform((e) => e === null ? "" : e),
199
199
  ...w.shape,
200
200
  id: t.string()
201
- }), Y = t.object({
201
+ }), J = t.object({
202
202
  logoUrl: t.string(),
203
203
  loginBackgroundImage: t.string().nullish(),
204
204
  style: t.object({
@@ -245,7 +245,7 @@ const I = t.enum([
245
245
  expires_at: t.string(),
246
246
  used_at: t.string().optional(),
247
247
  user_id: t.string().optional()
248
- }), X = t.object({
248
+ }), Z = t.object({
249
249
  ...j.shape,
250
250
  created_at: t.string()
251
251
  }), v = t.object({
@@ -262,15 +262,23 @@ const I = t.enum([
262
262
  "null"
263
263
  ]).optional(),
264
264
  domain_metadata: t.record(t.string().max(255)).optional()
265
- }), J = t.object({
265
+ }), A = t.object({
266
+ name: t.literal("txt"),
267
+ record: t.string(),
268
+ domain: t.string()
269
+ }), O = t.object({
266
270
  ...v.shape,
267
271
  custom_domain_id: t.string(),
268
272
  primary: t.boolean(),
269
273
  status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
270
274
  origin_domain_name: t.string().optional(),
271
- verification: t.object({}).optional(),
275
+ verification: t.object({
276
+ methods: t.array(A)
277
+ }).optional(),
272
278
  tls_policy: t.string().optional()
273
- }), A = t.object({
279
+ }), $ = O.extend({
280
+ tenant_id: t.string()
281
+ }), N = t.object({
274
282
  trigger_id: t.enum([
275
283
  "pre-user-signup",
276
284
  "post-user-registration",
@@ -281,10 +289,10 @@ const I = t.enum([
281
289
  hook_id: t.string().optional(),
282
290
  synchronous: t.boolean().default(!1),
283
291
  priority: t.number().optional()
284
- }), Z = A.extend({
292
+ }), tt = N.extend({
285
293
  ...s.shape,
286
294
  hook_id: t.string()
287
- }), O = t.object({
295
+ }), U = t.object({
288
296
  alg: t.enum([
289
297
  "RS256",
290
298
  "RS384",
@@ -303,9 +311,9 @@ const I = t.enum([
303
311
  x5t: t.string().optional(),
304
312
  x5c: t.array(t.string()).optional(),
305
313
  use: t.enum(["sig", "enc"]).optional()
306
- }), $ = t.object({
307
- keys: t.array(O)
308
- }), tt = t.object({
314
+ }), et = t.object({
315
+ keys: t.array(U)
316
+ }), nt = t.object({
309
317
  issuer: t.string(),
310
318
  authorization_endpoint: t.string(),
311
319
  token_endpoint: t.string(),
@@ -326,7 +334,7 @@ const I = t.enum([
326
334
  request_uri_parameter_supported: t.boolean(),
327
335
  request_parameter_supported: t.boolean(),
328
336
  token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
329
- }), N = t.object({
337
+ }), R = t.object({
330
338
  csrf_token: t.string(),
331
339
  auth0Client: t.string().optional(),
332
340
  authParams: y,
@@ -338,16 +346,16 @@ const I = t.enum([
338
346
  authorization_url: t.string().optional()
339
347
  }).openapi({
340
348
  description: "This represents a login sesion"
341
- }), et = t.object({
342
- ...N.shape,
349
+ }), it = t.object({
350
+ ...R.shape,
343
351
  id: t.string().openapi({
344
352
  description: "This is is used as the state in the universal login"
345
353
  }),
346
354
  created_at: t.string(),
347
355
  updated_at: t.string()
348
356
  });
349
- var U = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(U || {});
350
- const R = t.enum([
357
+ var D = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(D || {});
358
+ const x = t.enum([
351
359
  "cls",
352
360
  // CODE_LINK_SENT
353
361
  "fsa",
@@ -396,14 +404,14 @@ const R = t.enum([
396
404
  // SUCCESS_VERIFICATION_EMAIL
397
405
  "svr"
398
406
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
399
- ]), D = t.object({
407
+ ]), T = t.object({
400
408
  name: t.string(),
401
409
  version: t.string(),
402
410
  env: t.object({
403
411
  node: t.string().optional()
404
412
  }).optional()
405
- }), nt = t.object({
406
- type: R,
413
+ }), ot = t.object({
414
+ type: x,
407
415
  date: t.string(),
408
416
  description: t.string().optional(),
409
417
  log_id: t.string().optional(),
@@ -424,13 +432,13 @@ const R = t.enum([
424
432
  strategy: t.string().optional(),
425
433
  strategy_type: t.string().optional(),
426
434
  hostname: t.string().optional(),
427
- auth0_client: D.optional()
428
- }), x = t.object({
435
+ auth0_client: T.optional()
436
+ }), P = t.object({
429
437
  user_id: t.string(),
430
438
  password: t.string(),
431
439
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
432
- }), it = t.object({
433
- ...x.shape,
440
+ }), st = t.object({
441
+ ...P.shape,
434
442
  created_at: t.string(),
435
443
  updated_at: t.string()
436
444
  }), p = t.object({
@@ -440,7 +448,7 @@ const R = t.enum([
440
448
  last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
441
449
  last_ip: t.string().describe("Last IP address from which this user logged in"),
442
450
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
443
- }), T = t.object({
451
+ }), F = t.object({
444
452
  id: t.string(),
445
453
  revoked_at: t.string().optional(),
446
454
  used_at: t.string().optional(),
@@ -451,13 +459,13 @@ const R = t.enum([
451
459
  "Metadata related to the device used in the session"
452
460
  ),
453
461
  clients: t.array(t.string()).describe("List of client details for the session")
454
- }), ot = t.object({
462
+ }), at = t.object({
455
463
  created_at: t.string(),
456
464
  updated_at: t.string(),
457
465
  authenticated_at: t.string(),
458
466
  last_interaction_at: t.string(),
459
- ...T.shape
460
- }), st = t.object({
467
+ ...F.shape
468
+ }), rt = t.object({
461
469
  kid: t.string().openapi({ description: "The key id of the signing key" }),
462
470
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
463
471
  fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
@@ -477,8 +485,8 @@ const R = t.enum([
477
485
  revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
478
486
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
479
487
  });
480
- var P = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(P || {});
481
- const at = t.object({
488
+ var H = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(H || {});
489
+ const lt = t.object({
482
490
  access_token: t.string(),
483
491
  id_token: t.string().optional(),
484
492
  scope: t.string().optional(),
@@ -491,7 +499,7 @@ t.object({
491
499
  code: t.string(),
492
500
  state: t.string().optional()
493
501
  });
494
- const F = t.object({
502
+ const K = t.object({
495
503
  button_border_radius: t.number(),
496
504
  button_border_weight: t.number(),
497
505
  buttons_style: t.enum(["pill"]),
@@ -501,7 +509,7 @@ const F = t.object({
501
509
  show_widget_shadow: t.boolean(),
502
510
  widget_border_weight: t.number(),
503
511
  widget_corner_radius: t.number()
504
- }), H = t.object({
512
+ }), G = t.object({
505
513
  base_focus_color: t.string(),
506
514
  base_hover_color: t.string(),
507
515
  body_text: t.string(),
@@ -524,7 +532,7 @@ const F = t.object({
524
532
  }), n = t.object({
525
533
  bold: t.boolean(),
526
534
  size: t.number()
527
- }), K = t.object({
535
+ }), L = t.object({
528
536
  body_text: n,
529
537
  buttons_text: n,
530
538
  font_url: t.string(),
@@ -534,31 +542,31 @@ const F = t.object({
534
542
  reference_text_size: t.number(),
535
543
  subtitle: n,
536
544
  title: n
537
- }), G = t.object({
545
+ }), B = t.object({
538
546
  background_color: t.string(),
539
547
  background_image_url: t.string(),
540
548
  page_layout: t.enum(["center"])
541
- }), L = t.object({
549
+ }), M = t.object({
542
550
  header_text_alignment: t.enum(["center"]),
543
551
  logo_height: t.number(),
544
552
  logo_position: t.enum(["center"]),
545
553
  logo_url: t.string(),
546
554
  social_buttons_layout: t.enum(["bottom"])
547
- }), B = t.object({
548
- borders: F,
549
- colors: H,
555
+ }), W = t.object({
556
+ borders: K,
557
+ colors: G,
550
558
  displayName: t.string(),
551
- fonts: K,
552
- page_background: G,
553
- widget: L
554
- }), rt = B.extend({
559
+ fonts: L,
560
+ page_background: B,
561
+ widget: M
562
+ }), ct = W.extend({
555
563
  themeId: t.string()
556
- }), lt = t.object({
564
+ }), pt = t.object({
557
565
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
558
566
  identifier_first: t.boolean().default(!0),
559
567
  password_first: t.boolean().default(!1),
560
568
  webauthn_platform_first_factor: t.boolean()
561
- }), ct = t.object({
569
+ }), dt = t.object({
562
570
  name: t.string(),
563
571
  enabled: t.boolean().optional().default(!0),
564
572
  default_from_address: t.string().optional(),
@@ -588,7 +596,7 @@ const F = t.object({
588
596
  })
589
597
  ]),
590
598
  settings: t.object({}).optional()
591
- }), M = t.object({
599
+ }), q = t.object({
592
600
  // The actual refresh token value (primary key).
593
601
  id: t.string(),
594
602
  // Link to the session record
@@ -609,73 +617,75 @@ const F = t.object({
609
617
  })
610
618
  ),
611
619
  rotating: t.boolean()
612
- }), pt = t.object({
620
+ }), gt = t.object({
613
621
  // When the refresh token record was created.
614
622
  created_at: t.string(),
615
623
  // Spread in the rest of the refresh token properties.
616
- ...M.shape
624
+ ...q.shape
617
625
  });
618
- function dt(e) {
626
+ function _t(e) {
619
627
  const [i, o] = e.split("|");
620
628
  if (!i || !o)
621
629
  throw new Error(`Invalid user_id: ${e}`);
622
630
  return { connection: i, id: o };
623
631
  }
624
632
  export {
625
- D as Auth0Client,
633
+ T as Auth0Client,
626
634
  l as AuthorizationResponseMode,
627
635
  r as AuthorizationResponseType,
628
636
  c as CodeChallengeMethod,
629
- P as GrantType,
630
- U as LogTypes,
637
+ H as GrantType,
638
+ D as LogTypes,
631
639
  f as applicationInsertSchema,
632
640
  S as applicationSchema,
633
- z as auth0UserResponseSchema,
641
+ V as auth0UserResponseSchema,
634
642
  y as authParamsSchema,
635
643
  a as baseUserSchema,
636
- F as bordersSchema,
637
- V as brandingSchema,
644
+ K as bordersSchema,
645
+ X as brandingSchema,
638
646
  j as codeInsertSchema,
639
- X as codeSchema,
647
+ Z as codeSchema,
640
648
  I as codeTypeSchema,
641
- H as colorsSchema,
649
+ G as colorsSchema,
642
650
  E as connectionInsertSchema,
643
651
  k as connectionSchema,
644
652
  v as customDomainInsertSchema,
645
- J as customDomainSchema,
646
- ct as emailProviderSchema,
653
+ O as customDomainSchema,
654
+ $ as customDomainWithTenantIdSchema,
655
+ dt as emailProviderSchema,
647
656
  n as fontDetailsSchema,
648
- K as fontsSchema,
649
- A as hookInsertSchema,
650
- Z as hookSchema,
657
+ L as fontsSchema,
658
+ N as hookInsertSchema,
659
+ tt as hookSchema,
651
660
  g as identitySchema,
652
- $ as jwksKeySchema,
653
- O as jwksSchema,
654
- nt as logSchema,
655
- N as loginSessionInsertSchema,
656
- et as loginSessionSchema,
657
- tt as openIDConfigurationSchema,
658
- G as pageBackgroundSchema,
659
- dt as parseUserId,
660
- x as passwordInsertSchema,
661
- it as passwordSchema,
661
+ et as jwksKeySchema,
662
+ U as jwksSchema,
663
+ ot as logSchema,
664
+ R as loginSessionInsertSchema,
665
+ it as loginSessionSchema,
666
+ nt as openIDConfigurationSchema,
667
+ B as pageBackgroundSchema,
668
+ _t as parseUserId,
669
+ P as passwordInsertSchema,
670
+ st as passwordSchema,
662
671
  d as profileDataSchema,
663
- lt as promptSettingSchema,
664
- M as refreshTokenInsertSchema,
665
- pt as refreshTokenSchema,
672
+ pt as promptSettingSchema,
673
+ q as refreshTokenInsertSchema,
674
+ gt as refreshTokenSchema,
666
675
  b as samlpAddon,
667
- T as sessionInsertSchema,
668
- ot as sessionSchema,
669
- st as signingKeySchema,
676
+ F as sessionInsertSchema,
677
+ at as sessionSchema,
678
+ rt as signingKeySchema,
670
679
  w as tenantInsertSchema,
671
680
  C as tenantSchema,
672
- B as themeInsertSchema,
673
- rt as themeSchema,
674
- at as tokenResponseSchema,
675
- q as totalsSchema,
681
+ W as themeInsertSchema,
682
+ ct as themeSchema,
683
+ lt as tokenResponseSchema,
684
+ Q as totalsSchema,
676
685
  _ as userInsertSchema,
677
- Q as userResponseSchema,
686
+ Y as userResponseSchema,
678
687
  u as userSchema,
679
- Y as vendorSettingsSchema,
680
- L as widgetSchema
688
+ J as vendorSettingsSchema,
689
+ A as verificationMethodsSchema,
690
+ M as widgetSchema
681
691
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.53.0",
14
+ "version": "0.55.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],