@authhero/adapter-interfaces 0.54.0 → 0.56.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),M=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let W=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>W()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),Q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),V=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),X=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=C.extend({...c.shape,hook_id:t.z.string()}),j=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(j)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),v=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...v.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var A=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(A||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),O=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:O.optional()}),U=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...U.shape,created_at:t.z.string(),updated_at:t.z.string()}),N=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),R=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:N.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...R.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var D=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(D||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),x=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),P=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),F=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),H=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),K=t.z.object({borders:T,colors:x,displayName:t.z.string(),fonts:P,page_background:F,widget:H}),rt=K.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),G=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:N,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...G.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=O;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=D;exports.LogTypes=A;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=T;exports.brandingSchema=Q;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=k;exports.colorsSchema=x;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=P;exports.hookInsertSchema=C;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=j;exports.logSchema=nt;exports.loginSessionInsertSchema=v;exports.loginSessionSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=F;exports.parseUserId=zt;exports.passwordInsertSchema=U;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=G;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=R;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=K;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=M;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=V;exports.verificationMethodsSchema=E;exports.widgetSchema=H;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),L=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),B=g,W=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),m=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>Q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),u=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...m.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),V=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional(),provider:t.z.string().optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Y=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...u.shape,tenant:y,connections:t.z.array(S)});const I=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),k=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:I,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),X=t.z.object({...k.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),C=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),J=C.extend({tenant_id:t.z.string()}),j=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),Z=j.extend({...c.shape,hook_id:t.z.string()}),v=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),$=t.z.object({keys:t.z.array(v)}),tt=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),A=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),et=t.z.object({...A.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var O=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(O||{});const nt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),U=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),it=t.z.object({type:nt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:U.optional()}),N=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),ot=t.z.object({...N.shape,created_at:t.z.string(),updated_at:t.z.string()}),R=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),D=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:R.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),at=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...D.shape}),st=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var T=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(T||{});const rt=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const x=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),P=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),F=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),H=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),K=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),G=t.z.object({borders:x,colors:P,displayName:t.z.string(),fonts:F,page_background:H,widget:K}),lt=G.extend({themeId:t.z.string()}),ct=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),pt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),M=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:R,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),zt=t.z.object({created_at:t.z.string(),...M.shape}),dt=t.z.object({to:t.z.string(),message:t.z.string()}),gt=t.z.object({name:t.z.string(),options:t.z.object({})});function _t(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=U;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=T;exports.LogTypes=O;exports.applicationInsertSchema=m;exports.applicationSchema=u;exports.auth0UserResponseSchema=B;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=x;exports.brandingSchema=V;exports.codeInsertSchema=k;exports.codeSchema=X;exports.codeTypeSchema=I;exports.colorsSchema=P;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=C;exports.customDomainWithTenantIdSchema=J;exports.emailProviderSchema=pt;exports.fontDetailsSchema=n;exports.fontsSchema=F;exports.hookInsertSchema=j;exports.hookSchema=Z;exports.identitySchema=z;exports.jwksKeySchema=$;exports.jwksSchema=v;exports.logSchema=it;exports.loginSessionInsertSchema=A;exports.loginSessionSchema=et;exports.openIDConfigurationSchema=tt;exports.pageBackgroundSchema=H;exports.parseUserId=_t;exports.passwordInsertSchema=N;exports.passwordSchema=ot;exports.profileDataSchema=p;exports.promptSettingSchema=ct;exports.refreshTokenInsertSchema=M;exports.refreshTokenSchema=zt;exports.samlpAddon=_;exports.sessionInsertSchema=D;exports.sessionSchema=at;exports.signingKeySchema=st;exports.smsProviderSchema=gt;exports.smsSendParamsSchema=dt;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=G;exports.themeSchema=lt;exports.tokenResponseSchema=rt;exports.totalsSchema=L;exports.userInsertSchema=d;exports.userResponseSchema=W;exports.userSchema=g;exports.vendorSettingsSchema=Y;exports.verificationMethodsSchema=E;exports.widgetSchema=K;
@@ -1181,7 +1181,9 @@ declare const ClientSchema: z.ZodObject<{
1181
1181
  jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1182
1182
  discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1183
1183
  issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1184
+ provider: z.ZodOptional<z.ZodString>;
1184
1185
  }, "strip", z.ZodTypeAny, {
1186
+ provider?: string | undefined;
1185
1187
  issuer?: string | undefined;
1186
1188
  client_secret?: string | undefined;
1187
1189
  client_id?: string | undefined;
@@ -1196,6 +1198,7 @@ declare const ClientSchema: z.ZodObject<{
1196
1198
  jwks_uri?: string | undefined;
1197
1199
  discovery_url?: string | undefined;
1198
1200
  }, {
1201
+ provider?: string | undefined;
1199
1202
  issuer?: string | undefined;
1200
1203
  client_secret?: string | undefined;
1201
1204
  client_id?: string | undefined;
@@ -1219,6 +1222,7 @@ declare const ClientSchema: z.ZodObject<{
1219
1222
  name: string;
1220
1223
  strategy: string;
1221
1224
  options?: {
1225
+ provider?: string | undefined;
1222
1226
  issuer?: string | undefined;
1223
1227
  client_secret?: string | undefined;
1224
1228
  client_id?: string | undefined;
@@ -1243,6 +1247,7 @@ declare const ClientSchema: z.ZodObject<{
1243
1247
  name: string;
1244
1248
  strategy: string;
1245
1249
  options?: {
1250
+ provider?: string | undefined;
1246
1251
  issuer?: string | undefined;
1247
1252
  client_secret?: string | undefined;
1248
1253
  client_id?: string | undefined;
@@ -1396,6 +1401,7 @@ declare const ClientSchema: z.ZodObject<{
1396
1401
  name: string;
1397
1402
  strategy: string;
1398
1403
  options?: {
1404
+ provider?: string | undefined;
1399
1405
  issuer?: string | undefined;
1400
1406
  client_secret?: string | undefined;
1401
1407
  client_id?: string | undefined;
@@ -1467,6 +1473,7 @@ declare const ClientSchema: z.ZodObject<{
1467
1473
  name: string;
1468
1474
  strategy: string;
1469
1475
  options?: {
1476
+ provider?: string | undefined;
1470
1477
  issuer?: string | undefined;
1471
1478
  client_secret?: string | undefined;
1472
1479
  client_id?: string | undefined;
@@ -1618,7 +1625,9 @@ export declare const connectionInsertSchema: z.ZodObject<{
1618
1625
  jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1619
1626
  discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1620
1627
  issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1628
+ provider: z.ZodOptional<z.ZodString>;
1621
1629
  }, "strip", z.ZodTypeAny, {
1630
+ provider?: string | undefined;
1622
1631
  issuer?: string | undefined;
1623
1632
  client_secret?: string | undefined;
1624
1633
  client_id?: string | undefined;
@@ -1633,6 +1642,7 @@ export declare const connectionInsertSchema: z.ZodObject<{
1633
1642
  jwks_uri?: string | undefined;
1634
1643
  discovery_url?: string | undefined;
1635
1644
  }, {
1645
+ provider?: string | undefined;
1636
1646
  issuer?: string | undefined;
1637
1647
  client_secret?: string | undefined;
1638
1648
  client_id?: string | undefined;
@@ -1654,6 +1664,7 @@ export declare const connectionInsertSchema: z.ZodObject<{
1654
1664
  name: string;
1655
1665
  strategy: string;
1656
1666
  options?: {
1667
+ provider?: string | undefined;
1657
1668
  issuer?: string | undefined;
1658
1669
  client_secret?: string | undefined;
1659
1670
  client_id?: string | undefined;
@@ -1676,6 +1687,7 @@ export declare const connectionInsertSchema: z.ZodObject<{
1676
1687
  name: string;
1677
1688
  strategy: string;
1678
1689
  options?: {
1690
+ provider?: string | undefined;
1679
1691
  issuer?: string | undefined;
1680
1692
  client_secret?: string | undefined;
1681
1693
  client_id?: string | undefined;
@@ -1718,7 +1730,9 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1718
1730
  jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1719
1731
  discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1720
1732
  issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1733
+ provider: z.ZodOptional<z.ZodString>;
1721
1734
  }, "strip", z.ZodTypeAny, {
1735
+ provider?: string | undefined;
1722
1736
  issuer?: string | undefined;
1723
1737
  client_secret?: string | undefined;
1724
1738
  client_id?: string | undefined;
@@ -1733,6 +1747,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1733
1747
  jwks_uri?: string | undefined;
1734
1748
  discovery_url?: string | undefined;
1735
1749
  }, {
1750
+ provider?: string | undefined;
1736
1751
  issuer?: string | undefined;
1737
1752
  client_secret?: string | undefined;
1738
1753
  client_id?: string | undefined;
@@ -1756,6 +1771,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1756
1771
  name: string;
1757
1772
  strategy: string;
1758
1773
  options?: {
1774
+ provider?: string | undefined;
1759
1775
  issuer?: string | undefined;
1760
1776
  client_secret?: string | undefined;
1761
1777
  client_id?: string | undefined;
@@ -1780,6 +1796,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1780
1796
  name: string;
1781
1797
  strategy: string;
1782
1798
  options?: {
1799
+ provider?: string | undefined;
1783
1800
  issuer?: string | undefined;
1784
1801
  client_secret?: string | undefined;
1785
1802
  client_id?: string | undefined;
@@ -1945,6 +1962,102 @@ export declare const customDomainSchema: z.ZodObject<{
1945
1962
  } | undefined;
1946
1963
  }>;
1947
1964
  export type CustomDomain = z.infer<typeof customDomainSchema>;
1965
+ export declare const customDomainWithTenantIdSchema: z.ZodObject<z.objectUtil.extendShape<{
1966
+ custom_domain_id: z.ZodString;
1967
+ primary: z.ZodBoolean;
1968
+ status: z.ZodEnum<[
1969
+ "disabled",
1970
+ "pending",
1971
+ "pending_verification",
1972
+ "ready"
1973
+ ]>;
1974
+ origin_domain_name: z.ZodOptional<z.ZodString>;
1975
+ verification: z.ZodOptional<z.ZodObject<{
1976
+ methods: z.ZodArray<z.ZodObject<{
1977
+ name: z.ZodLiteral<"txt">;
1978
+ record: z.ZodString;
1979
+ domain: z.ZodString;
1980
+ }, "strip", z.ZodTypeAny, {
1981
+ name: "txt";
1982
+ domain: string;
1983
+ record: string;
1984
+ }, {
1985
+ name: "txt";
1986
+ domain: string;
1987
+ record: string;
1988
+ }>, "many">;
1989
+ }, "strip", z.ZodTypeAny, {
1990
+ methods: {
1991
+ name: "txt";
1992
+ domain: string;
1993
+ record: string;
1994
+ }[];
1995
+ }, {
1996
+ methods: {
1997
+ name: "txt";
1998
+ domain: string;
1999
+ record: string;
2000
+ }[];
2001
+ }>>;
2002
+ tls_policy: z.ZodOptional<z.ZodString>;
2003
+ domain: z.ZodString;
2004
+ type: z.ZodEnum<[
2005
+ "auth0_managed_certs",
2006
+ "self_managed_certs"
2007
+ ]>;
2008
+ verification_method: z.ZodOptional<z.ZodEnum<[
2009
+ "txt"
2010
+ ]>>;
2011
+ custom_client_ip_header: z.ZodOptional<z.ZodEnum<[
2012
+ "true-client-ip",
2013
+ "cf-connecting-ip",
2014
+ "x-forwarded-for",
2015
+ "x-azure-clientip",
2016
+ "null"
2017
+ ]>>;
2018
+ domain_metadata: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
2019
+ }, {
2020
+ tenant_id: z.ZodString;
2021
+ }>, "strip", z.ZodTypeAny, {
2022
+ type: "auth0_managed_certs" | "self_managed_certs";
2023
+ status: "disabled" | "pending" | "pending_verification" | "ready";
2024
+ primary: boolean;
2025
+ domain: string;
2026
+ custom_domain_id: string;
2027
+ tenant_id: string;
2028
+ verification_method?: "txt" | undefined;
2029
+ tls_policy?: string | undefined;
2030
+ custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
2031
+ domain_metadata?: Record<string, string> | undefined;
2032
+ origin_domain_name?: string | undefined;
2033
+ verification?: {
2034
+ methods: {
2035
+ name: "txt";
2036
+ domain: string;
2037
+ record: string;
2038
+ }[];
2039
+ } | undefined;
2040
+ }, {
2041
+ type: "auth0_managed_certs" | "self_managed_certs";
2042
+ status: "disabled" | "pending" | "pending_verification" | "ready";
2043
+ primary: boolean;
2044
+ domain: string;
2045
+ custom_domain_id: string;
2046
+ tenant_id: string;
2047
+ verification_method?: "txt" | undefined;
2048
+ tls_policy?: string | undefined;
2049
+ custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
2050
+ domain_metadata?: Record<string, string> | undefined;
2051
+ origin_domain_name?: string | undefined;
2052
+ verification?: {
2053
+ methods: {
2054
+ name: "txt";
2055
+ domain: string;
2056
+ record: string;
2057
+ }[];
2058
+ } | undefined;
2059
+ }>;
2060
+ export type CustomDomainWithTenantId = z.infer<typeof customDomainWithTenantIdSchema>;
1948
2061
  export declare const hookInsertSchema: z.ZodObject<{
1949
2062
  trigger_id: z.ZodEnum<[
1950
2063
  "pre-user-signup",
@@ -4564,6 +4677,28 @@ export declare const refreshTokenSchema: z.ZodObject<{
4564
4677
  last_exchanged_at?: string | undefined;
4565
4678
  }>;
4566
4679
  export type RefreshToken = z.infer<typeof refreshTokenSchema>;
4680
+ export declare const smsSendParamsSchema: z.ZodObject<{
4681
+ to: z.ZodString;
4682
+ message: z.ZodString;
4683
+ }, "strip", z.ZodTypeAny, {
4684
+ message: string;
4685
+ to: string;
4686
+ }, {
4687
+ message: string;
4688
+ to: string;
4689
+ }>;
4690
+ export type SmsSendParams = z.infer<typeof smsSendParamsSchema>;
4691
+ export declare const smsProviderSchema: z.ZodObject<{
4692
+ name: z.ZodString;
4693
+ options: z.ZodObject<{}, "strip", z.ZodTypeAny, {}, {}>;
4694
+ }, "strip", z.ZodTypeAny, {
4695
+ options: {};
4696
+ name: string;
4697
+ }, {
4698
+ options: {};
4699
+ name: string;
4700
+ }>;
4701
+ export type SmsProvider = z.infer<typeof smsProviderSchema>;
4567
4702
  export declare function parseUserId(user_id: string): {
4568
4703
  connection: string;
4569
4704
  id: string;
@@ -4652,6 +4787,7 @@ export interface ConnectionsAdapter {
4652
4787
  export interface CustomDomainsAdapter {
4653
4788
  create: (tenant_id: string, custom_domain: CustomDomainInsert) => Promise<CustomDomain>;
4654
4789
  get: (tenant_id: string, id: string) => Promise<CustomDomain | null>;
4790
+ getByDomain: (domain: string) => Promise<CustomDomainWithTenantId | null>;
4655
4791
  list: (tenant_id: string) => Promise<CustomDomain[]>;
4656
4792
  remove: (tenant_id: string, id: string) => Promise<boolean>;
4657
4793
  update: (tenant_id: string, id: string, custom_domain: Partial<CustomDomain>) => Promise<boolean>;
@@ -1,5 +1,5 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const z = t.object({
2
+ const Q = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
@@ -56,7 +56,7 @@ const z = t.object({
56
56
  email: t.string(),
57
57
  login_count: t.number(),
58
58
  identities: t.array(g).optional()
59
- }), Q = u, V = a.extend({
59
+ }), V = u, Y = a.extend({
60
60
  email: t.string(),
61
61
  login_count: t.number(),
62
62
  multifactor: t.array(t.string()).optional(),
@@ -141,7 +141,7 @@ const y = t.object({
141
141
  ui_locales: t.string().optional(),
142
142
  // The following fields are not available in Auth0
143
143
  vendor_id: t.string().optional()
144
- }), Y = t.object({
144
+ }), X = t.object({
145
145
  colors: t.object({
146
146
  primary: t.string(),
147
147
  page_background: t.object({
@@ -173,7 +173,8 @@ const y = t.object({
173
173
  userinfo_endpoint: t.string().default("").optional(),
174
174
  jwks_uri: t.string().default("").optional(),
175
175
  discovery_url: t.string().default("").optional(),
176
- issuer: t.string().default("").optional()
176
+ issuer: t.string().default("").optional(),
177
+ provider: t.string().optional()
177
178
  }).default({}).optional(),
178
179
  enabled_clients: t.array(t.string()).default([]).optional(),
179
180
  response_type: t.custom().optional(),
@@ -198,7 +199,7 @@ const y = t.object({
198
199
  updated_at: t.string().transform((e) => e === null ? "" : e),
199
200
  ...w.shape,
200
201
  id: t.string()
201
- }), X = t.object({
202
+ }), J = t.object({
202
203
  logoUrl: t.string(),
203
204
  loginBackgroundImage: t.string().nullish(),
204
205
  style: t.object({
@@ -245,7 +246,7 @@ const I = t.enum([
245
246
  expires_at: t.string(),
246
247
  used_at: t.string().optional(),
247
248
  user_id: t.string().optional()
248
- }), J = t.object({
249
+ }), Z = t.object({
249
250
  ...j.shape,
250
251
  created_at: t.string()
251
252
  }), v = t.object({
@@ -266,7 +267,7 @@ const I = t.enum([
266
267
  name: t.literal("txt"),
267
268
  record: t.string(),
268
269
  domain: t.string()
269
- }), Z = t.object({
270
+ }), O = t.object({
270
271
  ...v.shape,
271
272
  custom_domain_id: t.string(),
272
273
  primary: t.boolean(),
@@ -276,7 +277,9 @@ const I = t.enum([
276
277
  methods: t.array(A)
277
278
  }).optional(),
278
279
  tls_policy: t.string().optional()
279
- }), O = t.object({
280
+ }), $ = O.extend({
281
+ tenant_id: t.string()
282
+ }), N = t.object({
280
283
  trigger_id: t.enum([
281
284
  "pre-user-signup",
282
285
  "post-user-registration",
@@ -287,10 +290,10 @@ const I = t.enum([
287
290
  hook_id: t.string().optional(),
288
291
  synchronous: t.boolean().default(!1),
289
292
  priority: t.number().optional()
290
- }), $ = O.extend({
293
+ }), tt = N.extend({
291
294
  ...s.shape,
292
295
  hook_id: t.string()
293
- }), N = t.object({
296
+ }), U = t.object({
294
297
  alg: t.enum([
295
298
  "RS256",
296
299
  "RS384",
@@ -309,9 +312,9 @@ const I = t.enum([
309
312
  x5t: t.string().optional(),
310
313
  x5c: t.array(t.string()).optional(),
311
314
  use: t.enum(["sig", "enc"]).optional()
312
- }), tt = t.object({
313
- keys: t.array(N)
314
315
  }), et = t.object({
316
+ keys: t.array(U)
317
+ }), nt = t.object({
315
318
  issuer: t.string(),
316
319
  authorization_endpoint: t.string(),
317
320
  token_endpoint: t.string(),
@@ -332,7 +335,7 @@ const I = t.enum([
332
335
  request_uri_parameter_supported: t.boolean(),
333
336
  request_parameter_supported: t.boolean(),
334
337
  token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
335
- }), U = t.object({
338
+ }), R = t.object({
336
339
  csrf_token: t.string(),
337
340
  auth0Client: t.string().optional(),
338
341
  authParams: y,
@@ -344,16 +347,16 @@ const I = t.enum([
344
347
  authorization_url: t.string().optional()
345
348
  }).openapi({
346
349
  description: "This represents a login sesion"
347
- }), nt = t.object({
348
- ...U.shape,
350
+ }), it = t.object({
351
+ ...R.shape,
349
352
  id: t.string().openapi({
350
353
  description: "This is is used as the state in the universal login"
351
354
  }),
352
355
  created_at: t.string(),
353
356
  updated_at: t.string()
354
357
  });
355
- var R = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(R || {});
356
- const D = t.enum([
358
+ var D = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(D || {});
359
+ const x = t.enum([
357
360
  "cls",
358
361
  // CODE_LINK_SENT
359
362
  "fsa",
@@ -402,14 +405,14 @@ const D = t.enum([
402
405
  // SUCCESS_VERIFICATION_EMAIL
403
406
  "svr"
404
407
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
405
- ]), x = t.object({
408
+ ]), T = t.object({
406
409
  name: t.string(),
407
410
  version: t.string(),
408
411
  env: t.object({
409
412
  node: t.string().optional()
410
413
  }).optional()
411
- }), it = t.object({
412
- type: D,
414
+ }), ot = t.object({
415
+ type: x,
413
416
  date: t.string(),
414
417
  description: t.string().optional(),
415
418
  log_id: t.string().optional(),
@@ -430,13 +433,13 @@ const D = t.enum([
430
433
  strategy: t.string().optional(),
431
434
  strategy_type: t.string().optional(),
432
435
  hostname: t.string().optional(),
433
- auth0_client: x.optional()
434
- }), T = t.object({
436
+ auth0_client: T.optional()
437
+ }), P = t.object({
435
438
  user_id: t.string(),
436
439
  password: t.string(),
437
440
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
438
- }), ot = t.object({
439
- ...T.shape,
441
+ }), st = t.object({
442
+ ...P.shape,
440
443
  created_at: t.string(),
441
444
  updated_at: t.string()
442
445
  }), p = t.object({
@@ -446,7 +449,7 @@ const D = t.enum([
446
449
  last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
447
450
  last_ip: t.string().describe("Last IP address from which this user logged in"),
448
451
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
449
- }), P = t.object({
452
+ }), F = t.object({
450
453
  id: t.string(),
451
454
  revoked_at: t.string().optional(),
452
455
  used_at: t.string().optional(),
@@ -457,13 +460,13 @@ const D = t.enum([
457
460
  "Metadata related to the device used in the session"
458
461
  ),
459
462
  clients: t.array(t.string()).describe("List of client details for the session")
460
- }), st = t.object({
463
+ }), at = t.object({
461
464
  created_at: t.string(),
462
465
  updated_at: t.string(),
463
466
  authenticated_at: t.string(),
464
467
  last_interaction_at: t.string(),
465
- ...P.shape
466
- }), at = t.object({
468
+ ...F.shape
469
+ }), rt = t.object({
467
470
  kid: t.string().openapi({ description: "The key id of the signing key" }),
468
471
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
469
472
  fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
@@ -483,8 +486,8 @@ const D = t.enum([
483
486
  revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
484
487
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
485
488
  });
486
- var F = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(F || {});
487
- const rt = t.object({
489
+ var H = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(H || {});
490
+ const lt = t.object({
488
491
  access_token: t.string(),
489
492
  id_token: t.string().optional(),
490
493
  scope: t.string().optional(),
@@ -497,7 +500,7 @@ t.object({
497
500
  code: t.string(),
498
501
  state: t.string().optional()
499
502
  });
500
- const H = t.object({
503
+ const K = t.object({
501
504
  button_border_radius: t.number(),
502
505
  button_border_weight: t.number(),
503
506
  buttons_style: t.enum(["pill"]),
@@ -507,7 +510,7 @@ const H = t.object({
507
510
  show_widget_shadow: t.boolean(),
508
511
  widget_border_weight: t.number(),
509
512
  widget_corner_radius: t.number()
510
- }), K = t.object({
513
+ }), G = t.object({
511
514
  base_focus_color: t.string(),
512
515
  base_hover_color: t.string(),
513
516
  body_text: t.string(),
@@ -530,7 +533,7 @@ const H = t.object({
530
533
  }), n = t.object({
531
534
  bold: t.boolean(),
532
535
  size: t.number()
533
- }), G = t.object({
536
+ }), L = t.object({
534
537
  body_text: n,
535
538
  buttons_text: n,
536
539
  font_url: t.string(),
@@ -540,31 +543,31 @@ const H = t.object({
540
543
  reference_text_size: t.number(),
541
544
  subtitle: n,
542
545
  title: n
543
- }), L = t.object({
546
+ }), B = t.object({
544
547
  background_color: t.string(),
545
548
  background_image_url: t.string(),
546
549
  page_layout: t.enum(["center"])
547
- }), B = t.object({
550
+ }), M = t.object({
548
551
  header_text_alignment: t.enum(["center"]),
549
552
  logo_height: t.number(),
550
553
  logo_position: t.enum(["center"]),
551
554
  logo_url: t.string(),
552
555
  social_buttons_layout: t.enum(["bottom"])
553
- }), M = t.object({
554
- borders: H,
555
- colors: K,
556
+ }), W = t.object({
557
+ borders: K,
558
+ colors: G,
556
559
  displayName: t.string(),
557
- fonts: G,
558
- page_background: L,
559
- widget: B
560
- }), lt = M.extend({
560
+ fonts: L,
561
+ page_background: B,
562
+ widget: M
563
+ }), ct = W.extend({
561
564
  themeId: t.string()
562
- }), ct = t.object({
565
+ }), pt = t.object({
563
566
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
564
567
  identifier_first: t.boolean().default(!0),
565
568
  password_first: t.boolean().default(!1),
566
569
  webauthn_platform_first_factor: t.boolean()
567
- }), pt = t.object({
570
+ }), dt = t.object({
568
571
  name: t.string(),
569
572
  enabled: t.boolean().optional().default(!0),
570
573
  default_from_address: t.string().optional(),
@@ -594,7 +597,7 @@ const H = t.object({
594
597
  })
595
598
  ]),
596
599
  settings: t.object({}).optional()
597
- }), W = t.object({
600
+ }), q = t.object({
598
601
  // The actual refresh token value (primary key).
599
602
  id: t.string(),
600
603
  // Link to the session record
@@ -615,74 +618,83 @@ const H = t.object({
615
618
  })
616
619
  ),
617
620
  rotating: t.boolean()
618
- }), dt = t.object({
621
+ }), gt = t.object({
619
622
  // When the refresh token record was created.
620
623
  created_at: t.string(),
621
624
  // Spread in the rest of the refresh token properties.
622
- ...W.shape
625
+ ...q.shape
626
+ }), _t = t.object({
627
+ to: t.string(),
628
+ message: t.string()
629
+ }), ut = t.object({
630
+ name: t.string(),
631
+ options: t.object({})
623
632
  });
624
- function gt(e) {
633
+ function mt(e) {
625
634
  const [i, o] = e.split("|");
626
635
  if (!i || !o)
627
636
  throw new Error(`Invalid user_id: ${e}`);
628
637
  return { connection: i, id: o };
629
638
  }
630
639
  export {
631
- x as Auth0Client,
640
+ T as Auth0Client,
632
641
  l as AuthorizationResponseMode,
633
642
  r as AuthorizationResponseType,
634
643
  c as CodeChallengeMethod,
635
- F as GrantType,
636
- R as LogTypes,
644
+ H as GrantType,
645
+ D as LogTypes,
637
646
  f as applicationInsertSchema,
638
647
  S as applicationSchema,
639
- Q as auth0UserResponseSchema,
648
+ V as auth0UserResponseSchema,
640
649
  y as authParamsSchema,
641
650
  a as baseUserSchema,
642
- H as bordersSchema,
643
- Y as brandingSchema,
651
+ K as bordersSchema,
652
+ X as brandingSchema,
644
653
  j as codeInsertSchema,
645
- J as codeSchema,
654
+ Z as codeSchema,
646
655
  I as codeTypeSchema,
647
- K as colorsSchema,
656
+ G as colorsSchema,
648
657
  E as connectionInsertSchema,
649
658
  k as connectionSchema,
650
659
  v as customDomainInsertSchema,
651
- Z as customDomainSchema,
652
- pt as emailProviderSchema,
660
+ O as customDomainSchema,
661
+ $ as customDomainWithTenantIdSchema,
662
+ dt as emailProviderSchema,
653
663
  n as fontDetailsSchema,
654
- G as fontsSchema,
655
- O as hookInsertSchema,
656
- $ as hookSchema,
664
+ L as fontsSchema,
665
+ N as hookInsertSchema,
666
+ tt as hookSchema,
657
667
  g as identitySchema,
658
- tt as jwksKeySchema,
659
- N as jwksSchema,
660
- it as logSchema,
661
- U as loginSessionInsertSchema,
662
- nt as loginSessionSchema,
663
- et as openIDConfigurationSchema,
664
- L as pageBackgroundSchema,
665
- gt as parseUserId,
666
- T as passwordInsertSchema,
667
- ot as passwordSchema,
668
+ et as jwksKeySchema,
669
+ U as jwksSchema,
670
+ ot as logSchema,
671
+ R as loginSessionInsertSchema,
672
+ it as loginSessionSchema,
673
+ nt as openIDConfigurationSchema,
674
+ B as pageBackgroundSchema,
675
+ mt as parseUserId,
676
+ P as passwordInsertSchema,
677
+ st as passwordSchema,
668
678
  d as profileDataSchema,
669
- ct as promptSettingSchema,
670
- W as refreshTokenInsertSchema,
671
- dt as refreshTokenSchema,
679
+ pt as promptSettingSchema,
680
+ q as refreshTokenInsertSchema,
681
+ gt as refreshTokenSchema,
672
682
  b as samlpAddon,
673
- P as sessionInsertSchema,
674
- st as sessionSchema,
675
- at as signingKeySchema,
683
+ F as sessionInsertSchema,
684
+ at as sessionSchema,
685
+ rt as signingKeySchema,
686
+ ut as smsProviderSchema,
687
+ _t as smsSendParamsSchema,
676
688
  w as tenantInsertSchema,
677
689
  C as tenantSchema,
678
- M as themeInsertSchema,
679
- lt as themeSchema,
680
- rt as tokenResponseSchema,
681
- z as totalsSchema,
690
+ W as themeInsertSchema,
691
+ ct as themeSchema,
692
+ lt as tokenResponseSchema,
693
+ Q as totalsSchema,
682
694
  _ as userInsertSchema,
683
- V as userResponseSchema,
695
+ Y as userResponseSchema,
684
696
  u as userSchema,
685
- X as vendorSettingsSchema,
697
+ J as vendorSettingsSchema,
686
698
  A as verificationMethodsSchema,
687
- B as widgetSchema
699
+ M as widgetSchema
688
700
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.54.0",
14
+ "version": "0.56.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],
@@ -26,7 +26,7 @@
26
26
  }
27
27
  },
28
28
  "devDependencies": {
29
- "@hono/zod-openapi": "^0.18.0",
29
+ "@hono/zod-openapi": "^0.19.2",
30
30
  "@rollup/plugin-commonjs": "^28.0.1",
31
31
  "@rollup/plugin-node-resolve": "^15.3.0",
32
32
  "@types/node": "^22.9.1",
@@ -35,7 +35,7 @@
35
35
  "vite": "^5.4.11"
36
36
  },
37
37
  "peerDependencies": {
38
- "@hono/zod-openapi": "^0.16.4"
38
+ "@hono/zod-openapi": "^0.19.2"
39
39
  },
40
40
  "dependencies": {
41
41
  "nanoid": "^5.0.8"