@authhero/adapter-interfaces 0.54.0 → 0.56.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),M=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),L=g,B=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let W=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),u=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>W()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),m=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...u.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),Q=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),V=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...m.shape,tenant:y,connections:t.z.array(S)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),I=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),Y=t.z.object({...I.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),X=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),C=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),J=C.extend({...c.shape,hook_id:t.z.string()}),j=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),Z=t.z.object({keys:t.z.array(j)}),$=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),v=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),tt=t.z.object({...v.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var A=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(A||{});const et=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),O=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),nt=t.z.object({type:et,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:O.optional()}),U=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),it=t.z.object({...U.shape,created_at:t.z.string(),updated_at:t.z.string()}),N=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),R=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:N.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),ot=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...R.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var D=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(D||{});const st=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const T=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),x=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),P=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),F=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),H=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),K=t.z.object({borders:T,colors:x,displayName:t.z.string(),fonts:P,page_background:F,widget:H}),rt=K.extend({themeId:t.z.string()}),lt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),ct=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),G=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:N,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),pt=t.z.object({created_at:t.z.string(),...G.shape});function zt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=O;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=D;exports.LogTypes=A;exports.applicationInsertSchema=u;exports.applicationSchema=m;exports.auth0UserResponseSchema=L;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=T;exports.brandingSchema=Q;exports.codeInsertSchema=I;exports.codeSchema=Y;exports.codeTypeSchema=k;exports.colorsSchema=x;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=X;exports.emailProviderSchema=ct;exports.fontDetailsSchema=n;exports.fontsSchema=P;exports.hookInsertSchema=C;exports.hookSchema=J;exports.identitySchema=z;exports.jwksKeySchema=Z;exports.jwksSchema=j;exports.logSchema=nt;exports.loginSessionInsertSchema=v;exports.loginSessionSchema=tt;exports.openIDConfigurationSchema=$;exports.pageBackgroundSchema=F;exports.parseUserId=zt;exports.passwordInsertSchema=U;exports.passwordSchema=it;exports.profileDataSchema=p;exports.promptSettingSchema=lt;exports.refreshTokenInsertSchema=G;exports.refreshTokenSchema=pt;exports.samlpAddon=_;exports.sessionInsertSchema=R;exports.sessionSchema=ot;exports.signingKeySchema=at;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=K;exports.themeSchema=rt;exports.tokenResponseSchema=st;exports.totalsSchema=M;exports.userInsertSchema=d;exports.userResponseSchema=B;exports.userSchema=g;exports.vendorSettingsSchema=V;exports.verificationMethodsSchema=E;exports.widgetSchema=H;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),L=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),a=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=a.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string(),login_count:t.z.number(),identities:t.z.array(z).optional()}),B=g,W=a.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),m=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>Q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),u=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...m.shape});var s=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(s||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(s).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),V=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional(),provider:t.z.string().optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Y=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...u.shape,tenant:y,connections:t.z.array(S)});const I=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),k=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:I,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),X=t.z.object({...k.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),C=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),J=C.extend({tenant_id:t.z.string()}),j=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),Z=j.extend({...c.shape,hook_id:t.z.string()}),v=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),$=t.z.object({keys:t.z.array(v)}),tt=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),A=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),et=t.z.object({...A.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var O=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(O||{});const nt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),U=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),it=t.z.object({type:nt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:U.optional()}),N=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),ot=t.z.object({...N.shape,created_at:t.z.string(),updated_at:t.z.string()}),R=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),D=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:R.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),at=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...D.shape}),st=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var T=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e))(T||{});const rt=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const x=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),P=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),F=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),H=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),K=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),G=t.z.object({borders:x,colors:P,displayName:t.z.string(),fonts:F,page_background:H,widget:K}),lt=G.extend({themeId:t.z.string()}),ct=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),pt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),M=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:R,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),zt=t.z.object({created_at:t.z.string(),...M.shape}),dt=t.z.object({to:t.z.string(),message:t.z.string()}),gt=t.z.object({name:t.z.string(),options:t.z.object({})});function _t(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=U;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=s;exports.CodeChallengeMethod=l;exports.GrantType=T;exports.LogTypes=O;exports.applicationInsertSchema=m;exports.applicationSchema=u;exports.auth0UserResponseSchema=B;exports.authParamsSchema=h;exports.baseUserSchema=a;exports.bordersSchema=x;exports.brandingSchema=V;exports.codeInsertSchema=k;exports.codeSchema=X;exports.codeTypeSchema=I;exports.colorsSchema=P;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=C;exports.customDomainWithTenantIdSchema=J;exports.emailProviderSchema=pt;exports.fontDetailsSchema=n;exports.fontsSchema=F;exports.hookInsertSchema=j;exports.hookSchema=Z;exports.identitySchema=z;exports.jwksKeySchema=$;exports.jwksSchema=v;exports.logSchema=it;exports.loginSessionInsertSchema=A;exports.loginSessionSchema=et;exports.openIDConfigurationSchema=tt;exports.pageBackgroundSchema=H;exports.parseUserId=_t;exports.passwordInsertSchema=N;exports.passwordSchema=ot;exports.profileDataSchema=p;exports.promptSettingSchema=ct;exports.refreshTokenInsertSchema=M;exports.refreshTokenSchema=zt;exports.samlpAddon=_;exports.sessionInsertSchema=D;exports.sessionSchema=at;exports.signingKeySchema=st;exports.smsProviderSchema=gt;exports.smsSendParamsSchema=dt;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=G;exports.themeSchema=lt;exports.tokenResponseSchema=rt;exports.totalsSchema=L;exports.userInsertSchema=d;exports.userResponseSchema=W;exports.userSchema=g;exports.vendorSettingsSchema=Y;exports.verificationMethodsSchema=E;exports.widgetSchema=K;
|
|
@@ -1181,7 +1181,9 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1181
1181
|
jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1182
1182
|
discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1183
1183
|
issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1184
|
+
provider: z.ZodOptional<z.ZodString>;
|
|
1184
1185
|
}, "strip", z.ZodTypeAny, {
|
|
1186
|
+
provider?: string | undefined;
|
|
1185
1187
|
issuer?: string | undefined;
|
|
1186
1188
|
client_secret?: string | undefined;
|
|
1187
1189
|
client_id?: string | undefined;
|
|
@@ -1196,6 +1198,7 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1196
1198
|
jwks_uri?: string | undefined;
|
|
1197
1199
|
discovery_url?: string | undefined;
|
|
1198
1200
|
}, {
|
|
1201
|
+
provider?: string | undefined;
|
|
1199
1202
|
issuer?: string | undefined;
|
|
1200
1203
|
client_secret?: string | undefined;
|
|
1201
1204
|
client_id?: string | undefined;
|
|
@@ -1219,6 +1222,7 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1219
1222
|
name: string;
|
|
1220
1223
|
strategy: string;
|
|
1221
1224
|
options?: {
|
|
1225
|
+
provider?: string | undefined;
|
|
1222
1226
|
issuer?: string | undefined;
|
|
1223
1227
|
client_secret?: string | undefined;
|
|
1224
1228
|
client_id?: string | undefined;
|
|
@@ -1243,6 +1247,7 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1243
1247
|
name: string;
|
|
1244
1248
|
strategy: string;
|
|
1245
1249
|
options?: {
|
|
1250
|
+
provider?: string | undefined;
|
|
1246
1251
|
issuer?: string | undefined;
|
|
1247
1252
|
client_secret?: string | undefined;
|
|
1248
1253
|
client_id?: string | undefined;
|
|
@@ -1396,6 +1401,7 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1396
1401
|
name: string;
|
|
1397
1402
|
strategy: string;
|
|
1398
1403
|
options?: {
|
|
1404
|
+
provider?: string | undefined;
|
|
1399
1405
|
issuer?: string | undefined;
|
|
1400
1406
|
client_secret?: string | undefined;
|
|
1401
1407
|
client_id?: string | undefined;
|
|
@@ -1467,6 +1473,7 @@ declare const ClientSchema: z.ZodObject<{
|
|
|
1467
1473
|
name: string;
|
|
1468
1474
|
strategy: string;
|
|
1469
1475
|
options?: {
|
|
1476
|
+
provider?: string | undefined;
|
|
1470
1477
|
issuer?: string | undefined;
|
|
1471
1478
|
client_secret?: string | undefined;
|
|
1472
1479
|
client_id?: string | undefined;
|
|
@@ -1618,7 +1625,9 @@ export declare const connectionInsertSchema: z.ZodObject<{
|
|
|
1618
1625
|
jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1619
1626
|
discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1620
1627
|
issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1628
|
+
provider: z.ZodOptional<z.ZodString>;
|
|
1621
1629
|
}, "strip", z.ZodTypeAny, {
|
|
1630
|
+
provider?: string | undefined;
|
|
1622
1631
|
issuer?: string | undefined;
|
|
1623
1632
|
client_secret?: string | undefined;
|
|
1624
1633
|
client_id?: string | undefined;
|
|
@@ -1633,6 +1642,7 @@ export declare const connectionInsertSchema: z.ZodObject<{
|
|
|
1633
1642
|
jwks_uri?: string | undefined;
|
|
1634
1643
|
discovery_url?: string | undefined;
|
|
1635
1644
|
}, {
|
|
1645
|
+
provider?: string | undefined;
|
|
1636
1646
|
issuer?: string | undefined;
|
|
1637
1647
|
client_secret?: string | undefined;
|
|
1638
1648
|
client_id?: string | undefined;
|
|
@@ -1654,6 +1664,7 @@ export declare const connectionInsertSchema: z.ZodObject<{
|
|
|
1654
1664
|
name: string;
|
|
1655
1665
|
strategy: string;
|
|
1656
1666
|
options?: {
|
|
1667
|
+
provider?: string | undefined;
|
|
1657
1668
|
issuer?: string | undefined;
|
|
1658
1669
|
client_secret?: string | undefined;
|
|
1659
1670
|
client_id?: string | undefined;
|
|
@@ -1676,6 +1687,7 @@ export declare const connectionInsertSchema: z.ZodObject<{
|
|
|
1676
1687
|
name: string;
|
|
1677
1688
|
strategy: string;
|
|
1678
1689
|
options?: {
|
|
1690
|
+
provider?: string | undefined;
|
|
1679
1691
|
issuer?: string | undefined;
|
|
1680
1692
|
client_secret?: string | undefined;
|
|
1681
1693
|
client_id?: string | undefined;
|
|
@@ -1718,7 +1730,9 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
|
|
|
1718
1730
|
jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1719
1731
|
discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1720
1732
|
issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
|
|
1733
|
+
provider: z.ZodOptional<z.ZodString>;
|
|
1721
1734
|
}, "strip", z.ZodTypeAny, {
|
|
1735
|
+
provider?: string | undefined;
|
|
1722
1736
|
issuer?: string | undefined;
|
|
1723
1737
|
client_secret?: string | undefined;
|
|
1724
1738
|
client_id?: string | undefined;
|
|
@@ -1733,6 +1747,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
|
|
|
1733
1747
|
jwks_uri?: string | undefined;
|
|
1734
1748
|
discovery_url?: string | undefined;
|
|
1735
1749
|
}, {
|
|
1750
|
+
provider?: string | undefined;
|
|
1736
1751
|
issuer?: string | undefined;
|
|
1737
1752
|
client_secret?: string | undefined;
|
|
1738
1753
|
client_id?: string | undefined;
|
|
@@ -1756,6 +1771,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
|
|
|
1756
1771
|
name: string;
|
|
1757
1772
|
strategy: string;
|
|
1758
1773
|
options?: {
|
|
1774
|
+
provider?: string | undefined;
|
|
1759
1775
|
issuer?: string | undefined;
|
|
1760
1776
|
client_secret?: string | undefined;
|
|
1761
1777
|
client_id?: string | undefined;
|
|
@@ -1780,6 +1796,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
|
|
|
1780
1796
|
name: string;
|
|
1781
1797
|
strategy: string;
|
|
1782
1798
|
options?: {
|
|
1799
|
+
provider?: string | undefined;
|
|
1783
1800
|
issuer?: string | undefined;
|
|
1784
1801
|
client_secret?: string | undefined;
|
|
1785
1802
|
client_id?: string | undefined;
|
|
@@ -1945,6 +1962,102 @@ export declare const customDomainSchema: z.ZodObject<{
|
|
|
1945
1962
|
} | undefined;
|
|
1946
1963
|
}>;
|
|
1947
1964
|
export type CustomDomain = z.infer<typeof customDomainSchema>;
|
|
1965
|
+
export declare const customDomainWithTenantIdSchema: z.ZodObject<z.objectUtil.extendShape<{
|
|
1966
|
+
custom_domain_id: z.ZodString;
|
|
1967
|
+
primary: z.ZodBoolean;
|
|
1968
|
+
status: z.ZodEnum<[
|
|
1969
|
+
"disabled",
|
|
1970
|
+
"pending",
|
|
1971
|
+
"pending_verification",
|
|
1972
|
+
"ready"
|
|
1973
|
+
]>;
|
|
1974
|
+
origin_domain_name: z.ZodOptional<z.ZodString>;
|
|
1975
|
+
verification: z.ZodOptional<z.ZodObject<{
|
|
1976
|
+
methods: z.ZodArray<z.ZodObject<{
|
|
1977
|
+
name: z.ZodLiteral<"txt">;
|
|
1978
|
+
record: z.ZodString;
|
|
1979
|
+
domain: z.ZodString;
|
|
1980
|
+
}, "strip", z.ZodTypeAny, {
|
|
1981
|
+
name: "txt";
|
|
1982
|
+
domain: string;
|
|
1983
|
+
record: string;
|
|
1984
|
+
}, {
|
|
1985
|
+
name: "txt";
|
|
1986
|
+
domain: string;
|
|
1987
|
+
record: string;
|
|
1988
|
+
}>, "many">;
|
|
1989
|
+
}, "strip", z.ZodTypeAny, {
|
|
1990
|
+
methods: {
|
|
1991
|
+
name: "txt";
|
|
1992
|
+
domain: string;
|
|
1993
|
+
record: string;
|
|
1994
|
+
}[];
|
|
1995
|
+
}, {
|
|
1996
|
+
methods: {
|
|
1997
|
+
name: "txt";
|
|
1998
|
+
domain: string;
|
|
1999
|
+
record: string;
|
|
2000
|
+
}[];
|
|
2001
|
+
}>>;
|
|
2002
|
+
tls_policy: z.ZodOptional<z.ZodString>;
|
|
2003
|
+
domain: z.ZodString;
|
|
2004
|
+
type: z.ZodEnum<[
|
|
2005
|
+
"auth0_managed_certs",
|
|
2006
|
+
"self_managed_certs"
|
|
2007
|
+
]>;
|
|
2008
|
+
verification_method: z.ZodOptional<z.ZodEnum<[
|
|
2009
|
+
"txt"
|
|
2010
|
+
]>>;
|
|
2011
|
+
custom_client_ip_header: z.ZodOptional<z.ZodEnum<[
|
|
2012
|
+
"true-client-ip",
|
|
2013
|
+
"cf-connecting-ip",
|
|
2014
|
+
"x-forwarded-for",
|
|
2015
|
+
"x-azure-clientip",
|
|
2016
|
+
"null"
|
|
2017
|
+
]>>;
|
|
2018
|
+
domain_metadata: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
|
|
2019
|
+
}, {
|
|
2020
|
+
tenant_id: z.ZodString;
|
|
2021
|
+
}>, "strip", z.ZodTypeAny, {
|
|
2022
|
+
type: "auth0_managed_certs" | "self_managed_certs";
|
|
2023
|
+
status: "disabled" | "pending" | "pending_verification" | "ready";
|
|
2024
|
+
primary: boolean;
|
|
2025
|
+
domain: string;
|
|
2026
|
+
custom_domain_id: string;
|
|
2027
|
+
tenant_id: string;
|
|
2028
|
+
verification_method?: "txt" | undefined;
|
|
2029
|
+
tls_policy?: string | undefined;
|
|
2030
|
+
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
2031
|
+
domain_metadata?: Record<string, string> | undefined;
|
|
2032
|
+
origin_domain_name?: string | undefined;
|
|
2033
|
+
verification?: {
|
|
2034
|
+
methods: {
|
|
2035
|
+
name: "txt";
|
|
2036
|
+
domain: string;
|
|
2037
|
+
record: string;
|
|
2038
|
+
}[];
|
|
2039
|
+
} | undefined;
|
|
2040
|
+
}, {
|
|
2041
|
+
type: "auth0_managed_certs" | "self_managed_certs";
|
|
2042
|
+
status: "disabled" | "pending" | "pending_verification" | "ready";
|
|
2043
|
+
primary: boolean;
|
|
2044
|
+
domain: string;
|
|
2045
|
+
custom_domain_id: string;
|
|
2046
|
+
tenant_id: string;
|
|
2047
|
+
verification_method?: "txt" | undefined;
|
|
2048
|
+
tls_policy?: string | undefined;
|
|
2049
|
+
custom_client_ip_header?: "null" | "true-client-ip" | "cf-connecting-ip" | "x-forwarded-for" | "x-azure-clientip" | undefined;
|
|
2050
|
+
domain_metadata?: Record<string, string> | undefined;
|
|
2051
|
+
origin_domain_name?: string | undefined;
|
|
2052
|
+
verification?: {
|
|
2053
|
+
methods: {
|
|
2054
|
+
name: "txt";
|
|
2055
|
+
domain: string;
|
|
2056
|
+
record: string;
|
|
2057
|
+
}[];
|
|
2058
|
+
} | undefined;
|
|
2059
|
+
}>;
|
|
2060
|
+
export type CustomDomainWithTenantId = z.infer<typeof customDomainWithTenantIdSchema>;
|
|
1948
2061
|
export declare const hookInsertSchema: z.ZodObject<{
|
|
1949
2062
|
trigger_id: z.ZodEnum<[
|
|
1950
2063
|
"pre-user-signup",
|
|
@@ -4564,6 +4677,28 @@ export declare const refreshTokenSchema: z.ZodObject<{
|
|
|
4564
4677
|
last_exchanged_at?: string | undefined;
|
|
4565
4678
|
}>;
|
|
4566
4679
|
export type RefreshToken = z.infer<typeof refreshTokenSchema>;
|
|
4680
|
+
export declare const smsSendParamsSchema: z.ZodObject<{
|
|
4681
|
+
to: z.ZodString;
|
|
4682
|
+
message: z.ZodString;
|
|
4683
|
+
}, "strip", z.ZodTypeAny, {
|
|
4684
|
+
message: string;
|
|
4685
|
+
to: string;
|
|
4686
|
+
}, {
|
|
4687
|
+
message: string;
|
|
4688
|
+
to: string;
|
|
4689
|
+
}>;
|
|
4690
|
+
export type SmsSendParams = z.infer<typeof smsSendParamsSchema>;
|
|
4691
|
+
export declare const smsProviderSchema: z.ZodObject<{
|
|
4692
|
+
name: z.ZodString;
|
|
4693
|
+
options: z.ZodObject<{}, "strip", z.ZodTypeAny, {}, {}>;
|
|
4694
|
+
}, "strip", z.ZodTypeAny, {
|
|
4695
|
+
options: {};
|
|
4696
|
+
name: string;
|
|
4697
|
+
}, {
|
|
4698
|
+
options: {};
|
|
4699
|
+
name: string;
|
|
4700
|
+
}>;
|
|
4701
|
+
export type SmsProvider = z.infer<typeof smsProviderSchema>;
|
|
4567
4702
|
export declare function parseUserId(user_id: string): {
|
|
4568
4703
|
connection: string;
|
|
4569
4704
|
id: string;
|
|
@@ -4652,6 +4787,7 @@ export interface ConnectionsAdapter {
|
|
|
4652
4787
|
export interface CustomDomainsAdapter {
|
|
4653
4788
|
create: (tenant_id: string, custom_domain: CustomDomainInsert) => Promise<CustomDomain>;
|
|
4654
4789
|
get: (tenant_id: string, id: string) => Promise<CustomDomain | null>;
|
|
4790
|
+
getByDomain: (domain: string) => Promise<CustomDomainWithTenantId | null>;
|
|
4655
4791
|
list: (tenant_id: string) => Promise<CustomDomain[]>;
|
|
4656
4792
|
remove: (tenant_id: string, id: string) => Promise<boolean>;
|
|
4657
4793
|
update: (tenant_id: string, id: string, custom_domain: Partial<CustomDomain>) => Promise<boolean>;
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { z as t } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const Q = t.object({
|
|
3
3
|
start: t.number(),
|
|
4
4
|
limit: t.number(),
|
|
5
5
|
length: t.number()
|
|
@@ -56,7 +56,7 @@ const z = t.object({
|
|
|
56
56
|
email: t.string(),
|
|
57
57
|
login_count: t.number(),
|
|
58
58
|
identities: t.array(g).optional()
|
|
59
|
-
}),
|
|
59
|
+
}), V = u, Y = a.extend({
|
|
60
60
|
email: t.string(),
|
|
61
61
|
login_count: t.number(),
|
|
62
62
|
multifactor: t.array(t.string()).optional(),
|
|
@@ -141,7 +141,7 @@ const y = t.object({
|
|
|
141
141
|
ui_locales: t.string().optional(),
|
|
142
142
|
// The following fields are not available in Auth0
|
|
143
143
|
vendor_id: t.string().optional()
|
|
144
|
-
}),
|
|
144
|
+
}), X = t.object({
|
|
145
145
|
colors: t.object({
|
|
146
146
|
primary: t.string(),
|
|
147
147
|
page_background: t.object({
|
|
@@ -173,7 +173,8 @@ const y = t.object({
|
|
|
173
173
|
userinfo_endpoint: t.string().default("").optional(),
|
|
174
174
|
jwks_uri: t.string().default("").optional(),
|
|
175
175
|
discovery_url: t.string().default("").optional(),
|
|
176
|
-
issuer: t.string().default("").optional()
|
|
176
|
+
issuer: t.string().default("").optional(),
|
|
177
|
+
provider: t.string().optional()
|
|
177
178
|
}).default({}).optional(),
|
|
178
179
|
enabled_clients: t.array(t.string()).default([]).optional(),
|
|
179
180
|
response_type: t.custom().optional(),
|
|
@@ -198,7 +199,7 @@ const y = t.object({
|
|
|
198
199
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
199
200
|
...w.shape,
|
|
200
201
|
id: t.string()
|
|
201
|
-
}),
|
|
202
|
+
}), J = t.object({
|
|
202
203
|
logoUrl: t.string(),
|
|
203
204
|
loginBackgroundImage: t.string().nullish(),
|
|
204
205
|
style: t.object({
|
|
@@ -245,7 +246,7 @@ const I = t.enum([
|
|
|
245
246
|
expires_at: t.string(),
|
|
246
247
|
used_at: t.string().optional(),
|
|
247
248
|
user_id: t.string().optional()
|
|
248
|
-
}),
|
|
249
|
+
}), Z = t.object({
|
|
249
250
|
...j.shape,
|
|
250
251
|
created_at: t.string()
|
|
251
252
|
}), v = t.object({
|
|
@@ -266,7 +267,7 @@ const I = t.enum([
|
|
|
266
267
|
name: t.literal("txt"),
|
|
267
268
|
record: t.string(),
|
|
268
269
|
domain: t.string()
|
|
269
|
-
}),
|
|
270
|
+
}), O = t.object({
|
|
270
271
|
...v.shape,
|
|
271
272
|
custom_domain_id: t.string(),
|
|
272
273
|
primary: t.boolean(),
|
|
@@ -276,7 +277,9 @@ const I = t.enum([
|
|
|
276
277
|
methods: t.array(A)
|
|
277
278
|
}).optional(),
|
|
278
279
|
tls_policy: t.string().optional()
|
|
279
|
-
}),
|
|
280
|
+
}), $ = O.extend({
|
|
281
|
+
tenant_id: t.string()
|
|
282
|
+
}), N = t.object({
|
|
280
283
|
trigger_id: t.enum([
|
|
281
284
|
"pre-user-signup",
|
|
282
285
|
"post-user-registration",
|
|
@@ -287,10 +290,10 @@ const I = t.enum([
|
|
|
287
290
|
hook_id: t.string().optional(),
|
|
288
291
|
synchronous: t.boolean().default(!1),
|
|
289
292
|
priority: t.number().optional()
|
|
290
|
-
}),
|
|
293
|
+
}), tt = N.extend({
|
|
291
294
|
...s.shape,
|
|
292
295
|
hook_id: t.string()
|
|
293
|
-
}),
|
|
296
|
+
}), U = t.object({
|
|
294
297
|
alg: t.enum([
|
|
295
298
|
"RS256",
|
|
296
299
|
"RS384",
|
|
@@ -309,9 +312,9 @@ const I = t.enum([
|
|
|
309
312
|
x5t: t.string().optional(),
|
|
310
313
|
x5c: t.array(t.string()).optional(),
|
|
311
314
|
use: t.enum(["sig", "enc"]).optional()
|
|
312
|
-
}), tt = t.object({
|
|
313
|
-
keys: t.array(N)
|
|
314
315
|
}), et = t.object({
|
|
316
|
+
keys: t.array(U)
|
|
317
|
+
}), nt = t.object({
|
|
315
318
|
issuer: t.string(),
|
|
316
319
|
authorization_endpoint: t.string(),
|
|
317
320
|
token_endpoint: t.string(),
|
|
@@ -332,7 +335,7 @@ const I = t.enum([
|
|
|
332
335
|
request_uri_parameter_supported: t.boolean(),
|
|
333
336
|
request_parameter_supported: t.boolean(),
|
|
334
337
|
token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
|
|
335
|
-
}),
|
|
338
|
+
}), R = t.object({
|
|
336
339
|
csrf_token: t.string(),
|
|
337
340
|
auth0Client: t.string().optional(),
|
|
338
341
|
authParams: y,
|
|
@@ -344,16 +347,16 @@ const I = t.enum([
|
|
|
344
347
|
authorization_url: t.string().optional()
|
|
345
348
|
}).openapi({
|
|
346
349
|
description: "This represents a login sesion"
|
|
347
|
-
}),
|
|
348
|
-
...
|
|
350
|
+
}), it = t.object({
|
|
351
|
+
...R.shape,
|
|
349
352
|
id: t.string().openapi({
|
|
350
353
|
description: "This is is used as the state in the universal login"
|
|
351
354
|
}),
|
|
352
355
|
created_at: t.string(),
|
|
353
356
|
updated_at: t.string()
|
|
354
357
|
});
|
|
355
|
-
var
|
|
356
|
-
const
|
|
358
|
+
var D = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(D || {});
|
|
359
|
+
const x = t.enum([
|
|
357
360
|
"cls",
|
|
358
361
|
// CODE_LINK_SENT
|
|
359
362
|
"fsa",
|
|
@@ -402,14 +405,14 @@ const D = t.enum([
|
|
|
402
405
|
// SUCCESS_VERIFICATION_EMAIL
|
|
403
406
|
"svr"
|
|
404
407
|
// SUCCESS_VERIFICATION_EMAIL_REQUEST
|
|
405
|
-
]),
|
|
408
|
+
]), T = t.object({
|
|
406
409
|
name: t.string(),
|
|
407
410
|
version: t.string(),
|
|
408
411
|
env: t.object({
|
|
409
412
|
node: t.string().optional()
|
|
410
413
|
}).optional()
|
|
411
|
-
}),
|
|
412
|
-
type:
|
|
414
|
+
}), ot = t.object({
|
|
415
|
+
type: x,
|
|
413
416
|
date: t.string(),
|
|
414
417
|
description: t.string().optional(),
|
|
415
418
|
log_id: t.string().optional(),
|
|
@@ -430,13 +433,13 @@ const D = t.enum([
|
|
|
430
433
|
strategy: t.string().optional(),
|
|
431
434
|
strategy_type: t.string().optional(),
|
|
432
435
|
hostname: t.string().optional(),
|
|
433
|
-
auth0_client:
|
|
434
|
-
}),
|
|
436
|
+
auth0_client: T.optional()
|
|
437
|
+
}), P = t.object({
|
|
435
438
|
user_id: t.string(),
|
|
436
439
|
password: t.string(),
|
|
437
440
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
438
|
-
}),
|
|
439
|
-
...
|
|
441
|
+
}), st = t.object({
|
|
442
|
+
...P.shape,
|
|
440
443
|
created_at: t.string(),
|
|
441
444
|
updated_at: t.string()
|
|
442
445
|
}), p = t.object({
|
|
@@ -446,7 +449,7 @@ const D = t.enum([
|
|
|
446
449
|
last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
|
|
447
450
|
last_ip: t.string().describe("Last IP address from which this user logged in"),
|
|
448
451
|
last_asn: t.string().describe("Last autonomous system number from which this user logged in")
|
|
449
|
-
}),
|
|
452
|
+
}), F = t.object({
|
|
450
453
|
id: t.string(),
|
|
451
454
|
revoked_at: t.string().optional(),
|
|
452
455
|
used_at: t.string().optional(),
|
|
@@ -457,13 +460,13 @@ const D = t.enum([
|
|
|
457
460
|
"Metadata related to the device used in the session"
|
|
458
461
|
),
|
|
459
462
|
clients: t.array(t.string()).describe("List of client details for the session")
|
|
460
|
-
}),
|
|
463
|
+
}), at = t.object({
|
|
461
464
|
created_at: t.string(),
|
|
462
465
|
updated_at: t.string(),
|
|
463
466
|
authenticated_at: t.string(),
|
|
464
467
|
last_interaction_at: t.string(),
|
|
465
|
-
...
|
|
466
|
-
}),
|
|
468
|
+
...F.shape
|
|
469
|
+
}), rt = t.object({
|
|
467
470
|
kid: t.string().openapi({ description: "The key id of the signing key" }),
|
|
468
471
|
cert: t.string().openapi({ description: "The public certificate of the signing key" }),
|
|
469
472
|
fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -483,8 +486,8 @@ const D = t.enum([
|
|
|
483
486
|
revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
|
|
484
487
|
revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
|
|
485
488
|
});
|
|
486
|
-
var
|
|
487
|
-
const
|
|
489
|
+
var H = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e))(H || {});
|
|
490
|
+
const lt = t.object({
|
|
488
491
|
access_token: t.string(),
|
|
489
492
|
id_token: t.string().optional(),
|
|
490
493
|
scope: t.string().optional(),
|
|
@@ -497,7 +500,7 @@ t.object({
|
|
|
497
500
|
code: t.string(),
|
|
498
501
|
state: t.string().optional()
|
|
499
502
|
});
|
|
500
|
-
const
|
|
503
|
+
const K = t.object({
|
|
501
504
|
button_border_radius: t.number(),
|
|
502
505
|
button_border_weight: t.number(),
|
|
503
506
|
buttons_style: t.enum(["pill"]),
|
|
@@ -507,7 +510,7 @@ const H = t.object({
|
|
|
507
510
|
show_widget_shadow: t.boolean(),
|
|
508
511
|
widget_border_weight: t.number(),
|
|
509
512
|
widget_corner_radius: t.number()
|
|
510
|
-
}),
|
|
513
|
+
}), G = t.object({
|
|
511
514
|
base_focus_color: t.string(),
|
|
512
515
|
base_hover_color: t.string(),
|
|
513
516
|
body_text: t.string(),
|
|
@@ -530,7 +533,7 @@ const H = t.object({
|
|
|
530
533
|
}), n = t.object({
|
|
531
534
|
bold: t.boolean(),
|
|
532
535
|
size: t.number()
|
|
533
|
-
}),
|
|
536
|
+
}), L = t.object({
|
|
534
537
|
body_text: n,
|
|
535
538
|
buttons_text: n,
|
|
536
539
|
font_url: t.string(),
|
|
@@ -540,31 +543,31 @@ const H = t.object({
|
|
|
540
543
|
reference_text_size: t.number(),
|
|
541
544
|
subtitle: n,
|
|
542
545
|
title: n
|
|
543
|
-
}),
|
|
546
|
+
}), B = t.object({
|
|
544
547
|
background_color: t.string(),
|
|
545
548
|
background_image_url: t.string(),
|
|
546
549
|
page_layout: t.enum(["center"])
|
|
547
|
-
}),
|
|
550
|
+
}), M = t.object({
|
|
548
551
|
header_text_alignment: t.enum(["center"]),
|
|
549
552
|
logo_height: t.number(),
|
|
550
553
|
logo_position: t.enum(["center"]),
|
|
551
554
|
logo_url: t.string(),
|
|
552
555
|
social_buttons_layout: t.enum(["bottom"])
|
|
553
|
-
}),
|
|
554
|
-
borders:
|
|
555
|
-
colors:
|
|
556
|
+
}), W = t.object({
|
|
557
|
+
borders: K,
|
|
558
|
+
colors: G,
|
|
556
559
|
displayName: t.string(),
|
|
557
|
-
fonts:
|
|
558
|
-
page_background:
|
|
559
|
-
widget:
|
|
560
|
-
}),
|
|
560
|
+
fonts: L,
|
|
561
|
+
page_background: B,
|
|
562
|
+
widget: M
|
|
563
|
+
}), ct = W.extend({
|
|
561
564
|
themeId: t.string()
|
|
562
|
-
}),
|
|
565
|
+
}), pt = t.object({
|
|
563
566
|
universal_login_experience: t.enum(["new", "classic"]).default("new"),
|
|
564
567
|
identifier_first: t.boolean().default(!0),
|
|
565
568
|
password_first: t.boolean().default(!1),
|
|
566
569
|
webauthn_platform_first_factor: t.boolean()
|
|
567
|
-
}),
|
|
570
|
+
}), dt = t.object({
|
|
568
571
|
name: t.string(),
|
|
569
572
|
enabled: t.boolean().optional().default(!0),
|
|
570
573
|
default_from_address: t.string().optional(),
|
|
@@ -594,7 +597,7 @@ const H = t.object({
|
|
|
594
597
|
})
|
|
595
598
|
]),
|
|
596
599
|
settings: t.object({}).optional()
|
|
597
|
-
}),
|
|
600
|
+
}), q = t.object({
|
|
598
601
|
// The actual refresh token value (primary key).
|
|
599
602
|
id: t.string(),
|
|
600
603
|
// Link to the session record
|
|
@@ -615,74 +618,83 @@ const H = t.object({
|
|
|
615
618
|
})
|
|
616
619
|
),
|
|
617
620
|
rotating: t.boolean()
|
|
618
|
-
}),
|
|
621
|
+
}), gt = t.object({
|
|
619
622
|
// When the refresh token record was created.
|
|
620
623
|
created_at: t.string(),
|
|
621
624
|
// Spread in the rest of the refresh token properties.
|
|
622
|
-
...
|
|
625
|
+
...q.shape
|
|
626
|
+
}), _t = t.object({
|
|
627
|
+
to: t.string(),
|
|
628
|
+
message: t.string()
|
|
629
|
+
}), ut = t.object({
|
|
630
|
+
name: t.string(),
|
|
631
|
+
options: t.object({})
|
|
623
632
|
});
|
|
624
|
-
function
|
|
633
|
+
function mt(e) {
|
|
625
634
|
const [i, o] = e.split("|");
|
|
626
635
|
if (!i || !o)
|
|
627
636
|
throw new Error(`Invalid user_id: ${e}`);
|
|
628
637
|
return { connection: i, id: o };
|
|
629
638
|
}
|
|
630
639
|
export {
|
|
631
|
-
|
|
640
|
+
T as Auth0Client,
|
|
632
641
|
l as AuthorizationResponseMode,
|
|
633
642
|
r as AuthorizationResponseType,
|
|
634
643
|
c as CodeChallengeMethod,
|
|
635
|
-
|
|
636
|
-
|
|
644
|
+
H as GrantType,
|
|
645
|
+
D as LogTypes,
|
|
637
646
|
f as applicationInsertSchema,
|
|
638
647
|
S as applicationSchema,
|
|
639
|
-
|
|
648
|
+
V as auth0UserResponseSchema,
|
|
640
649
|
y as authParamsSchema,
|
|
641
650
|
a as baseUserSchema,
|
|
642
|
-
|
|
643
|
-
|
|
651
|
+
K as bordersSchema,
|
|
652
|
+
X as brandingSchema,
|
|
644
653
|
j as codeInsertSchema,
|
|
645
|
-
|
|
654
|
+
Z as codeSchema,
|
|
646
655
|
I as codeTypeSchema,
|
|
647
|
-
|
|
656
|
+
G as colorsSchema,
|
|
648
657
|
E as connectionInsertSchema,
|
|
649
658
|
k as connectionSchema,
|
|
650
659
|
v as customDomainInsertSchema,
|
|
651
|
-
|
|
652
|
-
|
|
660
|
+
O as customDomainSchema,
|
|
661
|
+
$ as customDomainWithTenantIdSchema,
|
|
662
|
+
dt as emailProviderSchema,
|
|
653
663
|
n as fontDetailsSchema,
|
|
654
|
-
|
|
655
|
-
|
|
656
|
-
|
|
664
|
+
L as fontsSchema,
|
|
665
|
+
N as hookInsertSchema,
|
|
666
|
+
tt as hookSchema,
|
|
657
667
|
g as identitySchema,
|
|
658
|
-
|
|
659
|
-
|
|
660
|
-
|
|
661
|
-
|
|
662
|
-
|
|
663
|
-
|
|
664
|
-
|
|
665
|
-
|
|
666
|
-
|
|
667
|
-
|
|
668
|
+
et as jwksKeySchema,
|
|
669
|
+
U as jwksSchema,
|
|
670
|
+
ot as logSchema,
|
|
671
|
+
R as loginSessionInsertSchema,
|
|
672
|
+
it as loginSessionSchema,
|
|
673
|
+
nt as openIDConfigurationSchema,
|
|
674
|
+
B as pageBackgroundSchema,
|
|
675
|
+
mt as parseUserId,
|
|
676
|
+
P as passwordInsertSchema,
|
|
677
|
+
st as passwordSchema,
|
|
668
678
|
d as profileDataSchema,
|
|
669
|
-
|
|
670
|
-
|
|
671
|
-
|
|
679
|
+
pt as promptSettingSchema,
|
|
680
|
+
q as refreshTokenInsertSchema,
|
|
681
|
+
gt as refreshTokenSchema,
|
|
672
682
|
b as samlpAddon,
|
|
673
|
-
|
|
674
|
-
|
|
675
|
-
|
|
683
|
+
F as sessionInsertSchema,
|
|
684
|
+
at as sessionSchema,
|
|
685
|
+
rt as signingKeySchema,
|
|
686
|
+
ut as smsProviderSchema,
|
|
687
|
+
_t as smsSendParamsSchema,
|
|
676
688
|
w as tenantInsertSchema,
|
|
677
689
|
C as tenantSchema,
|
|
678
|
-
|
|
679
|
-
|
|
680
|
-
|
|
681
|
-
|
|
690
|
+
W as themeInsertSchema,
|
|
691
|
+
ct as themeSchema,
|
|
692
|
+
lt as tokenResponseSchema,
|
|
693
|
+
Q as totalsSchema,
|
|
682
694
|
_ as userInsertSchema,
|
|
683
|
-
|
|
695
|
+
Y as userResponseSchema,
|
|
684
696
|
u as userSchema,
|
|
685
|
-
|
|
697
|
+
J as vendorSettingsSchema,
|
|
686
698
|
A as verificationMethodsSchema,
|
|
687
|
-
|
|
699
|
+
M as widgetSchema
|
|
688
700
|
};
|
package/package.json
CHANGED
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"type": "git",
|
|
12
12
|
"url": "https://github.com/markusahlstrand/authhero"
|
|
13
13
|
},
|
|
14
|
-
"version": "0.
|
|
14
|
+
"version": "0.56.0",
|
|
15
15
|
"files": [
|
|
16
16
|
"dist"
|
|
17
17
|
],
|
|
@@ -26,7 +26,7 @@
|
|
|
26
26
|
}
|
|
27
27
|
},
|
|
28
28
|
"devDependencies": {
|
|
29
|
-
"@hono/zod-openapi": "^0.
|
|
29
|
+
"@hono/zod-openapi": "^0.19.2",
|
|
30
30
|
"@rollup/plugin-commonjs": "^28.0.1",
|
|
31
31
|
"@rollup/plugin-node-resolve": "^15.3.0",
|
|
32
32
|
"@types/node": "^22.9.1",
|
|
@@ -35,7 +35,7 @@
|
|
|
35
35
|
"vite": "^5.4.11"
|
|
36
36
|
},
|
|
37
37
|
"peerDependencies": {
|
|
38
|
-
"@hono/zod-openapi": "^0.
|
|
38
|
+
"@hono/zod-openapi": "^0.19.2"
|
|
39
39
|
},
|
|
40
40
|
"dependencies": {
|
|
41
41
|
"nanoid": "^5.0.8"
|