@authhero/adapter-interfaces 0.58.0 → 0.59.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),L=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),phone_number:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string().optional(),login_count:t.z.number(),identities:t.z.array(z).optional()}),B=g,W=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Q=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),m=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>Q()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),u=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...m.shape});var a=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(a||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(a).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),V=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().default("").optional(),token_endpoint:t.z.string().default("").optional(),userinfo_endpoint:t.z.string().default("").optional(),jwks_uri:t.z.string().default("").optional(),discovery_url:t.z.string().default("").optional(),issuer:t.z.string().default("").optional(),provider:t.z.string().optional(),from:t.z.string().optional(),twilio_sid:t.z.string().optional(),twilio_token:t.z.string().optional()}).default({}).optional(),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),S=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(b.shape),f=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),y=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...f.shape,id:t.z.string()}),Y=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...u.shape,tenant:y,connections:t.z.array(S)});const I=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),k=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:I,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),X=t.z.object({...k.shape,created_at:t.z.string()}),w=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),E=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),C=t.z.object({...w.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(E)}).optional(),tls_policy:t.z.string().optional()}),J=C.extend({tenant_id:t.z.string()}),j=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),Z=j.extend({...c.shape,hook_id:t.z.string()}),v=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),$=t.z.object({keys:t.z.array(v)}),tt=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),A=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),et=t.z.object({...A.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var O=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(O||{});const nt=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),U=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),it=t.z.object({type:nt,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:U.optional()}),N=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),ot=t.z.object({...N.shape,created_at:t.z.string(),updated_at:t.z.string()}),R=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),D=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:R.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),st=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...D.shape}),at=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var T=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",e))(T||{});const rt=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const x=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),P=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),F=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),H=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),K=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),G=t.z.object({borders:x,colors:P,displayName:t.z.string(),fonts:F,page_background:H,widget:K}),lt=G.extend({themeId:t.z.string()}),ct=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),pt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),M=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:R,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),zt=t.z.object({created_at:t.z.string(),...M.shape}),dt=t.z.object({to:t.z.string(),message:t.z.string()}),gt=t.z.object({name:t.z.string(),options:t.z.object({})});function _t(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=U;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=a;exports.CodeChallengeMethod=l;exports.GrantType=T;exports.LogTypes=O;exports.applicationInsertSchema=m;exports.applicationSchema=u;exports.auth0UserResponseSchema=B;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=x;exports.brandingSchema=V;exports.codeInsertSchema=k;exports.codeSchema=X;exports.codeTypeSchema=I;exports.colorsSchema=P;exports.connectionInsertSchema=b;exports.connectionSchema=S;exports.customDomainInsertSchema=w;exports.customDomainSchema=C;exports.customDomainWithTenantIdSchema=J;exports.emailProviderSchema=pt;exports.fontDetailsSchema=n;exports.fontsSchema=F;exports.hookInsertSchema=j;exports.hookSchema=Z;exports.identitySchema=z;exports.jwksKeySchema=$;exports.jwksSchema=v;exports.logSchema=it;exports.loginSessionInsertSchema=A;exports.loginSessionSchema=et;exports.openIDConfigurationSchema=tt;exports.pageBackgroundSchema=H;exports.parseUserId=_t;exports.passwordInsertSchema=N;exports.passwordSchema=ot;exports.profileDataSchema=p;exports.promptSettingSchema=ct;exports.refreshTokenInsertSchema=M;exports.refreshTokenSchema=zt;exports.samlpAddon=_;exports.sessionInsertSchema=D;exports.sessionSchema=st;exports.signingKeySchema=at;exports.smsProviderSchema=gt;exports.smsSendParamsSchema=dt;exports.tenantInsertSchema=f;exports.tenantSchema=y;exports.themeInsertSchema=G;exports.themeSchema=lt;exports.tokenResponseSchema=rt;exports.totalsSchema=L;exports.userInsertSchema=d;exports.userResponseSchema=W;exports.userSchema=g;exports.vendorSettingsSchema=Y;exports.verificationMethodsSchema=E;exports.widgetSchema=K;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const t=require("@hono/zod-openapi"),B=t.z.object({start:t.z.number(),limit:t.z.number(),length:t.z.number()}),c=t.z.object({created_at:t.z.string(),updated_at:t.z.string()}),p=t.z.object({email:t.z.string().optional(),email_verified:t.z.boolean().optional(),name:t.z.string().optional(),username:t.z.string().optional(),given_name:t.z.string().optional(),phone_number:t.z.string().optional(),phone_verified:t.z.boolean().optional(),family_name:t.z.string().optional()}).catchall(t.z.any()),z=t.z.object({connection:t.z.string(),user_id:t.z.string(),provider:t.z.string(),isSocial:t.z.boolean(),access_token:t.z.string().optional(),access_token_secret:t.z.string().optional(),refresh_token:t.z.string().optional(),profileData:p.optional()}),s=t.z.object({email:t.z.string().optional(),username:t.z.string().optional(),phone_number:t.z.string().optional(),given_name:t.z.string().optional(),family_name:t.z.string().optional(),nickname:t.z.string().optional(),name:t.z.string().optional(),picture:t.z.string().optional(),locale:t.z.string().optional(),linked_to:t.z.string().optional(),profileData:t.z.string().optional(),user_id:t.z.string().optional(),app_metadata:t.z.any().default({}).optional(),user_metadata:t.z.any().default({}).optional()}),d=s.extend({email_verified:t.z.boolean().default(!1),verify_email:t.z.boolean().optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string().optional(),provider:t.z.string().default("email"),connection:t.z.string().default("email"),is_social:t.z.boolean().optional()}),g=t.z.object({...d.shape,...c.shape,user_id:t.z.string(),is_social:t.z.boolean(),email:t.z.string().optional(),login_count:t.z.number(),identities:t.z.array(z).optional()}),W=g,q=s.extend({email:t.z.string(),login_count:t.z.number(),multifactor:t.z.array(t.z.string()).optional(),last_ip:t.z.string().optional(),last_login:t.z.string().optional(),user_id:t.z.string()}).catchall(t.z.any()),Q="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let V=(e=21)=>{let i="",o=crypto.getRandomValues(new Uint8Array(e));for(;e--;)i+=Q[o[e]&63];return i};const _=t.z.object({audience:t.z.string().optional(),recipient:t.z.string().optional(),createUpnClaim:t.z.boolean().optional(),mapUnknownClaimsAsIs:t.z.boolean().optional(),passthroughClaimsWithNoMapping:t.z.boolean().optional(),mapIdentities:t.z.boolean().optional(),signatureAlgorithm:t.z.string().optional(),digestAlgorithm:t.z.string().optional(),issuer:t.z.string().optional(),destination:t.z.string().optional(),lifetimeInSeconds:t.z.number().optional(),signResponse:t.z.boolean().optional(),nameIdentifierFormat:t.z.string().optional(),nameIdentifierProbes:t.z.array(t.z.string()).optional(),authnContextClassRef:t.z.string().optional(),mappings:t.z.record(t.z.string()).optional()}),m=t.z.object({id:t.z.string(),name:t.z.string(),callbacks:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:t.z.array(t.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:t.z.array(t.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:t.z.object({samlp:_.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:t.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:t.z.string().default(()=>V()).optional(),disable_sign_ups:t.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"})}),u=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...m.shape});var a=(e=>(e.TOKEN="token",e.TOKEN_ID_TOKEN="token id_token",e.CODE="code",e))(a||{}),r=(e=>(e.QUERY="query",e.FRAGMENT="fragment",e.FORM_POST="form_post",e.WEB_MESSAGE="web_message",e.SAML_POST="saml_post",e))(r||{}),l=(e=>(e.S256="S256",e.Plain="plain",e))(l||{});const h=t.z.object({client_id:t.z.string(),act_as:t.z.string().optional(),response_type:t.z.nativeEnum(a).optional(),response_mode:t.z.nativeEnum(r).optional(),redirect_uri:t.z.string().optional(),audience:t.z.string().optional(),organization:t.z.string().optional(),state:t.z.string().optional(),nonce:t.z.string().optional(),scope:t.z.string().optional(),prompt:t.z.string().optional(),code_challenge_method:t.z.nativeEnum(l).optional(),code_challenge:t.z.string().optional(),username:t.z.string().optional(),ui_locales:t.z.string().optional(),vendor_id:t.z.string().optional()}),Y=t.z.object({colors:t.z.object({primary:t.z.string(),page_background:t.z.object({type:t.z.string().optional(),start:t.z.string().optional(),end:t.z.string().optional(),angle_deg:t.z.number().optional()}).optional()}).optional(),logo_url:t.z.string().optional(),favicon_url:t.z.string().optional(),font:t.z.object({url:t.z.string()}).optional()}),b=t.z.object({kid:t.z.string().optional(),team_id:t.z.string().optional(),realms:t.z.string().optional(),client_id:t.z.string().optional(),client_secret:t.z.string().optional(),app_secret:t.z.string().optional(),scope:t.z.string().optional(),authorization_endpoint:t.z.string().optional(),token_endpoint:t.z.string().optional(),userinfo_endpoint:t.z.string().optional(),jwks_uri:t.z.string().optional(),discovery_url:t.z.string().optional(),issuer:t.z.string().optional(),provider:t.z.string().optional(),from:t.z.string().optional(),twilio_sid:t.z.string().optional(),twilio_token:t.z.string().optional()}),S=t.z.object({id:t.z.string().optional(),name:t.z.string(),strategy:t.z.string(),options:b.default({}),enabled_clients:t.z.array(t.z.string()).default([]).optional(),response_type:t.z.custom().optional(),response_mode:t.z.custom().optional()}),f=t.z.object({id:t.z.string(),created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e)}).extend(S.shape),y=t.z.object({name:t.z.string(),audience:t.z.string(),sender_email:t.z.string().email(),sender_name:t.z.string(),support_url:t.z.string().url().optional(),logo:t.z.string().url().optional(),primary_color:t.z.string().optional(),secondary_color:t.z.string().optional(),language:t.z.string().optional(),id:t.z.string().optional()}),I=t.z.object({created_at:t.z.string().transform(e=>e===null?"":e),updated_at:t.z.string().transform(e=>e===null?"":e),...y.shape,id:t.z.string()}),X=t.z.object({logoUrl:t.z.string(),loginBackgroundImage:t.z.string().nullish(),style:t.z.object({primaryColor:t.z.string(),buttonTextColor:t.z.string(),primaryHoverColor:t.z.string()}),supportEmail:t.z.string().nullable(),supportUrl:t.z.string().nullable(),name:t.z.string(),showGreyishBackground:t.z.boolean().optional(),termsAndConditionsUrl:t.z.string().nullable(),companyName:t.z.string().optional(),checkoutHideSocial:t.z.boolean().optional(),siteUrl:t.z.string().nullable(),manageSubscriptionsUrl:t.z.string().optional()});t.z.object({...u.shape,tenant:I,connections:t.z.array(f)});const k=t.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),w=t.z.object({code_id:t.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:t.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:t.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:k,code_verifier:t.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),expires_at:t.z.string(),used_at:t.z.string().optional(),user_id:t.z.string().optional()}),J=t.z.object({...w.shape,created_at:t.z.string()}),E=t.z.object({domain:t.z.string(),custom_domain_id:t.z.string().optional(),type:t.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:t.z.enum(["txt"]).optional(),tls_policy:t.z.enum(["recommended"]).optional(),custom_client_ip_header:t.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:t.z.record(t.z.string().max(255)).optional()}),C=t.z.object({name:t.z.literal("txt"),record:t.z.string(),domain:t.z.string()}),j=t.z.object({...E.shape,custom_domain_id:t.z.string(),primary:t.z.boolean(),status:t.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:t.z.string().optional(),verification:t.z.object({methods:t.z.array(C)}).optional(),tls_policy:t.z.string().optional()}),Z=j.extend({tenant_id:t.z.string()}),v=t.z.object({trigger_id:t.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),enabled:t.z.boolean().default(!1),url:t.z.string(),hook_id:t.z.string().optional(),synchronous:t.z.boolean().default(!1),priority:t.z.number().optional()}),$=v.extend({...c.shape,hook_id:t.z.string()}),A=t.z.object({alg:t.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:t.z.string(),kid:t.z.string(),kty:t.z.enum(["RSA","EC","oct"]),n:t.z.string(),x5t:t.z.string().optional(),x5c:t.z.array(t.z.string()).optional(),use:t.z.enum(["sig","enc"]).optional()}),tt=t.z.object({keys:t.z.array(A)}),et=t.z.object({issuer:t.z.string(),authorization_endpoint:t.z.string(),token_endpoint:t.z.string(),device_authorization_endpoint:t.z.string(),userinfo_endpoint:t.z.string(),mfa_challenge_endpoint:t.z.string(),jwks_uri:t.z.string(),registration_endpoint:t.z.string(),revocation_endpoint:t.z.string(),scopes_supported:t.z.array(t.z.string()),response_types_supported:t.z.array(t.z.string()),code_challenge_methods_supported:t.z.array(t.z.string()),response_modes_supported:t.z.array(t.z.string()),subject_types_supported:t.z.array(t.z.string()),id_token_signing_alg_values_supported:t.z.array(t.z.string()),token_endpoint_auth_methods_supported:t.z.array(t.z.string()),claims_supported:t.z.array(t.z.string()),request_uri_parameter_supported:t.z.boolean(),request_parameter_supported:t.z.boolean(),token_endpoint_auth_signing_alg_values_supported:t.z.array(t.z.string())}),O=t.z.object({csrf_token:t.z.string(),auth0Client:t.z.string().optional(),authParams:h,expires_at:t.z.string(),deleted_at:t.z.string().optional(),ip:t.z.string().optional(),useragent:t.z.string().optional(),session_id:t.z.string().optional(),authorization_url:t.z.string().optional()}).openapi({description:"This represents a login sesion"}),nt=t.z.object({...O.shape,id:t.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:t.z.string(),updated_at:t.z.string()});var U=(e=>(e.FAILED_SILENT_AUTH="fsa",e.FAILED_SIGNUP="fs",e.FAILED_LOGIN="f",e.FAILED_LOGIN_INCORRECT_PASSWORD="fp",e.FAILED_CHANGE_PASSWORD="fcp",e.FAILED_BY_CONNECTOR="fc",e.FAILED_LOGIN_INVALID_EMAIL_USERNAME="fu",e.FAILED_HOOK="fh",e.FAILED_CROSS_ORIGIN_AUTHENTICATION="fcoa",e.SUCCESS_API_OPERATION="sapi",e.SUCCESS_CHANGE_PASSWORD="scp",e.SUCCESS_CHANGE_PASSWORD_REQUEST="scpr",e.SUCCESS_CHANGE_USERNAME="scu",e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION="scoa",e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN="seacft",e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN="serft",e.SUCCESS_LOGIN="s",e.SUCCESS_LOGOUT="slo",e.SUCCESS_SIGNUP="ss",e.SUCCESS_SILENT_AUTH="ssa",e.SUCCESS_VERIFICATION_EMAIL="sv",e.SUCCESS_VERIFICATION_EMAIL_REQUEST="svr",e.CODE_LINK_SENT="cls",e.BLOCKED_ACCOUNT_EMAIL="limit_wc",e.BLOCKED_ACCOUNT_IP="limit_sul",e.BLOCKED_IP_ADDRESS="limit_mu",e))(U||{});const it=t.z.enum(["cls","fsa","fs","f","fc","fcoa","fcp","fh","fp","fs","fu","s","sapi","scoa","scp","scpr","scu","seacft","serft","slo","ss","ssa","sv","svr"]),N=t.z.object({name:t.z.string(),version:t.z.string(),env:t.z.object({node:t.z.string().optional()}).optional()}),ot=t.z.object({type:it,date:t.z.string(),description:t.z.string().optional(),log_id:t.z.string().optional(),_id:t.z.string().optional(),ip:t.z.string(),user_agent:t.z.string(),details:t.z.any().optional(),isMobile:t.z.boolean(),user_id:t.z.string().optional(),user_name:t.z.string().optional(),connection:t.z.string().optional(),connection_id:t.z.string().optional(),client_id:t.z.string().optional(),client_name:t.z.string().optional(),audience:t.z.string().optional(),scope:t.z.array(t.z.string()).optional(),strategy:t.z.string().optional(),strategy_type:t.z.string().optional(),hostname:t.z.string().optional(),auth0_client:N.optional()}),R=t.z.object({user_id:t.z.string(),password:t.z.string(),algorithm:t.z.enum(["bcrypt","argon2id"]).default("argon2id")}),st=t.z.object({...R.shape,created_at:t.z.string(),updated_at:t.z.string()}),D=t.z.object({initial_user_agent:t.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:t.z.string().describe("First IP address associated with this session"),initial_asn:t.z.string().describe("First autonomous system number associated with this session"),last_user_agent:t.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:t.z.string().describe("Last IP address from which this user logged in"),last_asn:t.z.string().describe("Last autonomous system number from which this user logged in")}),T=t.z.object({id:t.z.string(),revoked_at:t.z.string().optional(),used_at:t.z.string().optional(),user_id:t.z.string().describe("The user ID associated with the session"),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),device:D.describe("Metadata related to the device used in the session"),clients:t.z.array(t.z.string()).describe("List of client details for the session")}),at=t.z.object({created_at:t.z.string(),updated_at:t.z.string(),authenticated_at:t.z.string(),last_interaction_at:t.z.string(),...T.shape}),rt=t.z.object({kid:t.z.string().openapi({description:"The key id of the signing key"}),cert:t.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:t.z.string().openapi({description:"The cert fingerprint"}),thumbprint:t.z.string().openapi({description:"The cert thumbprint"}),pkcs7:t.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:t.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:t.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:t.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:t.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:t.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:t.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:t.z.string().optional().openapi({description:"The date and time when the key was revoked"})});var x=(e=>(e.RefreshToken="refresh_token",e.AuthorizationCode="authorization_code",e.ClientCredential="client_credentials",e.Passwordless="passwordless",e.Password="password",e.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",e))(x||{});const lt=t.z.object({access_token:t.z.string(),id_token:t.z.string().optional(),scope:t.z.string().optional(),state:t.z.string().optional(),refresh_token:t.z.string().optional(),token_type:t.z.string(),expires_in:t.z.number()});t.z.object({code:t.z.string(),state:t.z.string().optional()});const P=t.z.object({button_border_radius:t.z.number(),button_border_weight:t.z.number(),buttons_style:t.z.enum(["pill"]),input_border_radius:t.z.number(),input_border_weight:t.z.number(),inputs_style:t.z.enum(["pill"]),show_widget_shadow:t.z.boolean(),widget_border_weight:t.z.number(),widget_corner_radius:t.z.number()}),F=t.z.object({base_focus_color:t.z.string(),base_hover_color:t.z.string(),body_text:t.z.string(),captcha_widget_theme:t.z.enum(["auto"]),error:t.z.string(),header:t.z.string(),icons:t.z.string(),input_background:t.z.string(),input_border:t.z.string(),input_filled_text:t.z.string(),input_labels_placeholders:t.z.string(),links_focused_components:t.z.string(),primary_button:t.z.string(),primary_button_label:t.z.string(),secondary_button_border:t.z.string(),secondary_button_label:t.z.string(),success:t.z.string(),widget_background:t.z.string(),widget_border:t.z.string()}),n=t.z.object({bold:t.z.boolean(),size:t.z.number()}),H=t.z.object({body_text:n,buttons_text:n,font_url:t.z.string(),input_labels:n,links:n,links_style:t.z.enum(["normal"]),reference_text_size:t.z.number(),subtitle:n,title:n}),K=t.z.object({background_color:t.z.string(),background_image_url:t.z.string(),page_layout:t.z.enum(["center"])}),G=t.z.object({header_text_alignment:t.z.enum(["center"]),logo_height:t.z.number(),logo_position:t.z.enum(["center"]),logo_url:t.z.string(),social_buttons_layout:t.z.enum(["bottom"])}),M=t.z.object({borders:P,colors:F,displayName:t.z.string(),fonts:H,page_background:K,widget:G}),ct=M.extend({themeId:t.z.string()}),pt=t.z.object({universal_login_experience:t.z.enum(["new","classic"]).default("new"),identifier_first:t.z.boolean().default(!0),password_first:t.z.boolean().default(!1),webauthn_platform_first_factor:t.z.boolean()}),zt=t.z.object({name:t.z.string(),enabled:t.z.boolean().optional().default(!0),default_from_address:t.z.string().optional(),credentials:t.z.union([t.z.object({accessKeyId:t.z.string(),secretAccessKey:t.z.string(),region:t.z.string()}),t.z.object({smtp_host:t.z.array(t.z.string()),smtp_port:t.z.number(),smtp_user:t.z.string(),smtp_pass:t.z.string()}),t.z.object({api_key:t.z.string(),domain:t.z.string().optional()}),t.z.object({connectionString:t.z.string()}),t.z.object({tenantId:t.z.string(),clientId:t.z.string(),clientSecret:t.z.string()})]),settings:t.z.object({}).optional()}),L=t.z.object({id:t.z.string(),session_id:t.z.string(),user_id:t.z.string(),client_id:t.z.string(),expires_at:t.z.string().optional(),idle_expires_at:t.z.string().optional(),last_exchanged_at:t.z.string().optional(),device:D,resource_servers:t.z.array(t.z.object({audience:t.z.string(),scopes:t.z.string()})),rotating:t.z.boolean()}),dt=t.z.object({created_at:t.z.string(),...L.shape}),gt=t.z.object({to:t.z.string(),message:t.z.string()}),_t=t.z.object({name:t.z.string(),options:t.z.object({})});function mt(e){const[i,o]=e.split("|");if(!i||!o)throw new Error(`Invalid user_id: ${e}`);return{connection:i,id:o}}exports.Auth0Client=N;exports.AuthorizationResponseMode=r;exports.AuthorizationResponseType=a;exports.CodeChallengeMethod=l;exports.GrantType=x;exports.LogTypes=U;exports.applicationInsertSchema=m;exports.applicationSchema=u;exports.auth0UserResponseSchema=W;exports.authParamsSchema=h;exports.baseUserSchema=s;exports.bordersSchema=P;exports.brandingSchema=Y;exports.codeInsertSchema=w;exports.codeSchema=J;exports.codeTypeSchema=k;exports.colorsSchema=F;exports.connectionInsertSchema=S;exports.connectionOptionsSchema=b;exports.connectionSchema=f;exports.customDomainInsertSchema=E;exports.customDomainSchema=j;exports.customDomainWithTenantIdSchema=Z;exports.emailProviderSchema=zt;exports.fontDetailsSchema=n;exports.fontsSchema=H;exports.hookInsertSchema=v;exports.hookSchema=$;exports.identitySchema=z;exports.jwksKeySchema=tt;exports.jwksSchema=A;exports.logSchema=ot;exports.loginSessionInsertSchema=O;exports.loginSessionSchema=nt;exports.openIDConfigurationSchema=et;exports.pageBackgroundSchema=K;exports.parseUserId=mt;exports.passwordInsertSchema=R;exports.passwordSchema=st;exports.profileDataSchema=p;exports.promptSettingSchema=pt;exports.refreshTokenInsertSchema=L;exports.refreshTokenSchema=dt;exports.samlpAddon=_;exports.sessionInsertSchema=T;exports.sessionSchema=at;exports.signingKeySchema=rt;exports.smsProviderSchema=_t;exports.smsSendParamsSchema=gt;exports.tenantInsertSchema=y;exports.tenantSchema=I;exports.themeInsertSchema=M;exports.themeSchema=ct;exports.tokenResponseSchema=lt;exports.totalsSchema=B;exports.userInsertSchema=d;exports.userResponseSchema=q;exports.userSchema=g;exports.vendorSettingsSchema=X;exports.verificationMethodsSchema=C;exports.widgetSchema=G;
@@ -1182,7 +1182,7 @@ declare const ClientSchema: z.ZodObject<{
1182
1182
  id: z.ZodOptional<z.ZodString>;
1183
1183
  name: z.ZodString;
1184
1184
  strategy: z.ZodString;
1185
- options: z.ZodOptional<z.ZodDefault<z.ZodObject<{
1185
+ options: z.ZodDefault<z.ZodObject<{
1186
1186
  kid: z.ZodOptional<z.ZodString>;
1187
1187
  team_id: z.ZodOptional<z.ZodString>;
1188
1188
  realms: z.ZodOptional<z.ZodString>;
@@ -1190,12 +1190,12 @@ declare const ClientSchema: z.ZodObject<{
1190
1190
  client_secret: z.ZodOptional<z.ZodString>;
1191
1191
  app_secret: z.ZodOptional<z.ZodString>;
1192
1192
  scope: z.ZodOptional<z.ZodString>;
1193
- authorization_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1194
- token_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1195
- userinfo_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1196
- jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1197
- discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1198
- issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1193
+ authorization_endpoint: z.ZodOptional<z.ZodString>;
1194
+ token_endpoint: z.ZodOptional<z.ZodString>;
1195
+ userinfo_endpoint: z.ZodOptional<z.ZodString>;
1196
+ jwks_uri: z.ZodOptional<z.ZodString>;
1197
+ discovery_url: z.ZodOptional<z.ZodString>;
1198
+ issuer: z.ZodOptional<z.ZodString>;
1199
1199
  provider: z.ZodOptional<z.ZodString>;
1200
1200
  from: z.ZodOptional<z.ZodString>;
1201
1201
  twilio_sid: z.ZodOptional<z.ZodString>;
@@ -1236,16 +1236,12 @@ declare const ClientSchema: z.ZodObject<{
1236
1236
  from?: string | undefined;
1237
1237
  twilio_sid?: string | undefined;
1238
1238
  twilio_token?: string | undefined;
1239
- }>>>;
1239
+ }>>;
1240
1240
  enabled_clients: z.ZodOptional<z.ZodDefault<z.ZodArray<z.ZodString, "many">>>;
1241
1241
  response_type: z.ZodOptional<z.ZodType<AuthorizationResponseType, z.ZodTypeDef, AuthorizationResponseType>>;
1242
1242
  response_mode: z.ZodOptional<z.ZodType<AuthorizationResponseMode, z.ZodTypeDef, AuthorizationResponseMode>>;
1243
1243
  }>, "strip", z.ZodTypeAny, {
1244
- created_at: string;
1245
- updated_at: string;
1246
- name: string;
1247
- strategy: string;
1248
- options?: {
1244
+ options: {
1249
1245
  provider?: string | undefined;
1250
1246
  issuer?: string | undefined;
1251
1247
  client_secret?: string | undefined;
@@ -1263,7 +1259,11 @@ declare const ClientSchema: z.ZodObject<{
1263
1259
  from?: string | undefined;
1264
1260
  twilio_sid?: string | undefined;
1265
1261
  twilio_token?: string | undefined;
1266
- } | undefined;
1262
+ };
1263
+ created_at: string;
1264
+ updated_at: string;
1265
+ name: string;
1266
+ strategy: string;
1267
1267
  id?: string | undefined;
1268
1268
  response_type?: AuthorizationResponseType | undefined;
1269
1269
  response_mode?: AuthorizationResponseMode | undefined;
@@ -1426,11 +1426,7 @@ declare const ClientSchema: z.ZodObject<{
1426
1426
  language?: string | undefined;
1427
1427
  };
1428
1428
  connections: {
1429
- created_at: string;
1430
- updated_at: string;
1431
- name: string;
1432
- strategy: string;
1433
- options?: {
1429
+ options: {
1434
1430
  provider?: string | undefined;
1435
1431
  issuer?: string | undefined;
1436
1432
  client_secret?: string | undefined;
@@ -1448,7 +1444,11 @@ declare const ClientSchema: z.ZodObject<{
1448
1444
  from?: string | undefined;
1449
1445
  twilio_sid?: string | undefined;
1450
1446
  twilio_token?: string | undefined;
1451
- } | undefined;
1447
+ };
1448
+ created_at: string;
1449
+ updated_at: string;
1450
+ name: string;
1451
+ strategy: string;
1452
1452
  id?: string | undefined;
1453
1453
  response_type?: AuthorizationResponseType | undefined;
1454
1454
  response_mode?: AuthorizationResponseMode | undefined;
@@ -1643,11 +1643,66 @@ export declare const codeSchema: z.ZodObject<{
1643
1643
  used_at?: string | undefined;
1644
1644
  }>;
1645
1645
  export type Code = z.infer<typeof codeSchema>;
1646
+ export declare const connectionOptionsSchema: z.ZodObject<{
1647
+ kid: z.ZodOptional<z.ZodString>;
1648
+ team_id: z.ZodOptional<z.ZodString>;
1649
+ realms: z.ZodOptional<z.ZodString>;
1650
+ client_id: z.ZodOptional<z.ZodString>;
1651
+ client_secret: z.ZodOptional<z.ZodString>;
1652
+ app_secret: z.ZodOptional<z.ZodString>;
1653
+ scope: z.ZodOptional<z.ZodString>;
1654
+ authorization_endpoint: z.ZodOptional<z.ZodString>;
1655
+ token_endpoint: z.ZodOptional<z.ZodString>;
1656
+ userinfo_endpoint: z.ZodOptional<z.ZodString>;
1657
+ jwks_uri: z.ZodOptional<z.ZodString>;
1658
+ discovery_url: z.ZodOptional<z.ZodString>;
1659
+ issuer: z.ZodOptional<z.ZodString>;
1660
+ provider: z.ZodOptional<z.ZodString>;
1661
+ from: z.ZodOptional<z.ZodString>;
1662
+ twilio_sid: z.ZodOptional<z.ZodString>;
1663
+ twilio_token: z.ZodOptional<z.ZodString>;
1664
+ }, "strip", z.ZodTypeAny, {
1665
+ provider?: string | undefined;
1666
+ issuer?: string | undefined;
1667
+ client_secret?: string | undefined;
1668
+ client_id?: string | undefined;
1669
+ scope?: string | undefined;
1670
+ kid?: string | undefined;
1671
+ team_id?: string | undefined;
1672
+ realms?: string | undefined;
1673
+ app_secret?: string | undefined;
1674
+ authorization_endpoint?: string | undefined;
1675
+ token_endpoint?: string | undefined;
1676
+ userinfo_endpoint?: string | undefined;
1677
+ jwks_uri?: string | undefined;
1678
+ discovery_url?: string | undefined;
1679
+ from?: string | undefined;
1680
+ twilio_sid?: string | undefined;
1681
+ twilio_token?: string | undefined;
1682
+ }, {
1683
+ provider?: string | undefined;
1684
+ issuer?: string | undefined;
1685
+ client_secret?: string | undefined;
1686
+ client_id?: string | undefined;
1687
+ scope?: string | undefined;
1688
+ kid?: string | undefined;
1689
+ team_id?: string | undefined;
1690
+ realms?: string | undefined;
1691
+ app_secret?: string | undefined;
1692
+ authorization_endpoint?: string | undefined;
1693
+ token_endpoint?: string | undefined;
1694
+ userinfo_endpoint?: string | undefined;
1695
+ jwks_uri?: string | undefined;
1696
+ discovery_url?: string | undefined;
1697
+ from?: string | undefined;
1698
+ twilio_sid?: string | undefined;
1699
+ twilio_token?: string | undefined;
1700
+ }>;
1646
1701
  export declare const connectionInsertSchema: z.ZodObject<{
1647
1702
  id: z.ZodOptional<z.ZodString>;
1648
1703
  name: z.ZodString;
1649
1704
  strategy: z.ZodString;
1650
- options: z.ZodOptional<z.ZodDefault<z.ZodObject<{
1705
+ options: z.ZodDefault<z.ZodObject<{
1651
1706
  kid: z.ZodOptional<z.ZodString>;
1652
1707
  team_id: z.ZodOptional<z.ZodString>;
1653
1708
  realms: z.ZodOptional<z.ZodString>;
@@ -1655,12 +1710,12 @@ export declare const connectionInsertSchema: z.ZodObject<{
1655
1710
  client_secret: z.ZodOptional<z.ZodString>;
1656
1711
  app_secret: z.ZodOptional<z.ZodString>;
1657
1712
  scope: z.ZodOptional<z.ZodString>;
1658
- authorization_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1659
- token_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1660
- userinfo_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1661
- jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1662
- discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1663
- issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1713
+ authorization_endpoint: z.ZodOptional<z.ZodString>;
1714
+ token_endpoint: z.ZodOptional<z.ZodString>;
1715
+ userinfo_endpoint: z.ZodOptional<z.ZodString>;
1716
+ jwks_uri: z.ZodOptional<z.ZodString>;
1717
+ discovery_url: z.ZodOptional<z.ZodString>;
1718
+ issuer: z.ZodOptional<z.ZodString>;
1664
1719
  provider: z.ZodOptional<z.ZodString>;
1665
1720
  from: z.ZodOptional<z.ZodString>;
1666
1721
  twilio_sid: z.ZodOptional<z.ZodString>;
@@ -1701,14 +1756,12 @@ export declare const connectionInsertSchema: z.ZodObject<{
1701
1756
  from?: string | undefined;
1702
1757
  twilio_sid?: string | undefined;
1703
1758
  twilio_token?: string | undefined;
1704
- }>>>;
1759
+ }>>;
1705
1760
  enabled_clients: z.ZodOptional<z.ZodDefault<z.ZodArray<z.ZodString, "many">>>;
1706
1761
  response_type: z.ZodOptional<z.ZodType<AuthorizationResponseType, z.ZodTypeDef, AuthorizationResponseType>>;
1707
1762
  response_mode: z.ZodOptional<z.ZodType<AuthorizationResponseMode, z.ZodTypeDef, AuthorizationResponseMode>>;
1708
1763
  }, "strip", z.ZodTypeAny, {
1709
- name: string;
1710
- strategy: string;
1711
- options?: {
1764
+ options: {
1712
1765
  provider?: string | undefined;
1713
1766
  issuer?: string | undefined;
1714
1767
  client_secret?: string | undefined;
@@ -1726,7 +1779,9 @@ export declare const connectionInsertSchema: z.ZodObject<{
1726
1779
  from?: string | undefined;
1727
1780
  twilio_sid?: string | undefined;
1728
1781
  twilio_token?: string | undefined;
1729
- } | undefined;
1782
+ };
1783
+ name: string;
1784
+ strategy: string;
1730
1785
  id?: string | undefined;
1731
1786
  response_type?: AuthorizationResponseType | undefined;
1732
1787
  response_mode?: AuthorizationResponseMode | undefined;
@@ -1767,7 +1822,7 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1767
1822
  id: z.ZodOptional<z.ZodString>;
1768
1823
  name: z.ZodString;
1769
1824
  strategy: z.ZodString;
1770
- options: z.ZodOptional<z.ZodDefault<z.ZodObject<{
1825
+ options: z.ZodDefault<z.ZodObject<{
1771
1826
  kid: z.ZodOptional<z.ZodString>;
1772
1827
  team_id: z.ZodOptional<z.ZodString>;
1773
1828
  realms: z.ZodOptional<z.ZodString>;
@@ -1775,12 +1830,12 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1775
1830
  client_secret: z.ZodOptional<z.ZodString>;
1776
1831
  app_secret: z.ZodOptional<z.ZodString>;
1777
1832
  scope: z.ZodOptional<z.ZodString>;
1778
- authorization_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1779
- token_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1780
- userinfo_endpoint: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1781
- jwks_uri: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1782
- discovery_url: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1783
- issuer: z.ZodOptional<z.ZodDefault<z.ZodString>>;
1833
+ authorization_endpoint: z.ZodOptional<z.ZodString>;
1834
+ token_endpoint: z.ZodOptional<z.ZodString>;
1835
+ userinfo_endpoint: z.ZodOptional<z.ZodString>;
1836
+ jwks_uri: z.ZodOptional<z.ZodString>;
1837
+ discovery_url: z.ZodOptional<z.ZodString>;
1838
+ issuer: z.ZodOptional<z.ZodString>;
1784
1839
  provider: z.ZodOptional<z.ZodString>;
1785
1840
  from: z.ZodOptional<z.ZodString>;
1786
1841
  twilio_sid: z.ZodOptional<z.ZodString>;
@@ -1821,16 +1876,12 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1821
1876
  from?: string | undefined;
1822
1877
  twilio_sid?: string | undefined;
1823
1878
  twilio_token?: string | undefined;
1824
- }>>>;
1879
+ }>>;
1825
1880
  enabled_clients: z.ZodOptional<z.ZodDefault<z.ZodArray<z.ZodString, "many">>>;
1826
1881
  response_type: z.ZodOptional<z.ZodType<AuthorizationResponseType, z.ZodTypeDef, AuthorizationResponseType>>;
1827
1882
  response_mode: z.ZodOptional<z.ZodType<AuthorizationResponseMode, z.ZodTypeDef, AuthorizationResponseMode>>;
1828
1883
  }>, "strip", z.ZodTypeAny, {
1829
- created_at: string;
1830
- updated_at: string;
1831
- name: string;
1832
- strategy: string;
1833
- options?: {
1884
+ options: {
1834
1885
  provider?: string | undefined;
1835
1886
  issuer?: string | undefined;
1836
1887
  client_secret?: string | undefined;
@@ -1848,7 +1899,11 @@ export declare const connectionSchema: z.ZodObject<z.objectUtil.extendShape<{
1848
1899
  from?: string | undefined;
1849
1900
  twilio_sid?: string | undefined;
1850
1901
  twilio_token?: string | undefined;
1851
- } | undefined;
1902
+ };
1903
+ created_at: string;
1904
+ updated_at: string;
1905
+ name: string;
1906
+ strategy: string;
1852
1907
  id?: string | undefined;
1853
1908
  response_type?: AuthorizationResponseType | undefined;
1854
1909
  response_mode?: AuthorizationResponseMode | undefined;
@@ -1,5 +1,5 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const Q = t.object({
2
+ const V = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
@@ -57,7 +57,7 @@ const Q = t.object({
57
57
  email: t.string().optional(),
58
58
  login_count: t.number(),
59
59
  identities: t.array(g).optional()
60
- }), V = u, Y = a.extend({
60
+ }), Y = u, X = a.extend({
61
61
  email: t.string(),
62
62
  login_count: t.number(),
63
63
  multifactor: t.array(t.string()).optional(),
@@ -65,10 +65,10 @@ const Q = t.object({
65
65
  last_login: t.string().optional(),
66
66
  user_id: t.string()
67
67
  }).catchall(t.any()), m = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
68
- let h = (e = 21) => {
69
- let i = "", o = crypto.getRandomValues(new Uint8Array(e));
70
- for (; e--; )
71
- i += m[o[e] & 63];
68
+ let h = (n = 21) => {
69
+ let i = "", o = crypto.getRandomValues(new Uint8Array(n));
70
+ for (; n--; )
71
+ i += m[o[n] & 63];
72
72
  return i;
73
73
  };
74
74
  const b = t.object({
@@ -119,11 +119,11 @@ const b = t.object({
119
119
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
120
120
  })
121
121
  }), S = t.object({
122
- created_at: t.string().transform((e) => e === null ? "" : e),
123
- updated_at: t.string().transform((e) => e === null ? "" : e),
122
+ created_at: t.string().transform((n) => n === null ? "" : n),
123
+ updated_at: t.string().transform((n) => n === null ? "" : n),
124
124
  ...f.shape
125
125
  });
126
- var r = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(r || {}), l = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(l || {}), c = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(c || {});
126
+ var r = /* @__PURE__ */ ((n) => (n.TOKEN = "token", n.TOKEN_ID_TOKEN = "token id_token", n.CODE = "code", n))(r || {}), l = /* @__PURE__ */ ((n) => (n.QUERY = "query", n.FRAGMENT = "fragment", n.FORM_POST = "form_post", n.WEB_MESSAGE = "web_message", n.SAML_POST = "saml_post", n))(l || {}), c = /* @__PURE__ */ ((n) => (n.S256 = "S256", n.Plain = "plain", n))(c || {});
127
127
  const y = t.object({
128
128
  client_id: t.string(),
129
129
  act_as: t.string().optional(),
@@ -142,7 +142,7 @@ const y = t.object({
142
142
  ui_locales: t.string().optional(),
143
143
  // The following fields are not available in Auth0
144
144
  vendor_id: t.string().optional()
145
- }), X = t.object({
145
+ }), J = t.object({
146
146
  colors: t.object({
147
147
  primary: t.string(),
148
148
  page_background: t.object({
@@ -158,36 +158,36 @@ const y = t.object({
158
158
  url: t.string()
159
159
  }).optional()
160
160
  }), E = t.object({
161
+ kid: t.string().optional(),
162
+ team_id: t.string().optional(),
163
+ realms: t.string().optional(),
164
+ client_id: t.string().optional(),
165
+ client_secret: t.string().optional(),
166
+ app_secret: t.string().optional(),
167
+ scope: t.string().optional(),
168
+ authorization_endpoint: t.string().optional(),
169
+ token_endpoint: t.string().optional(),
170
+ userinfo_endpoint: t.string().optional(),
171
+ jwks_uri: t.string().optional(),
172
+ discovery_url: t.string().optional(),
173
+ issuer: t.string().optional(),
174
+ provider: t.string().optional(),
175
+ from: t.string().optional(),
176
+ twilio_sid: t.string().optional(),
177
+ twilio_token: t.string().optional()
178
+ }), w = t.object({
161
179
  id: t.string().optional(),
162
180
  name: t.string(),
163
181
  strategy: t.string(),
164
- options: t.object({
165
- kid: t.string().optional(),
166
- team_id: t.string().optional(),
167
- realms: t.string().optional(),
168
- client_id: t.string().optional(),
169
- client_secret: t.string().optional(),
170
- app_secret: t.string().optional(),
171
- scope: t.string().optional(),
172
- authorization_endpoint: t.string().default("").optional(),
173
- token_endpoint: t.string().default("").optional(),
174
- userinfo_endpoint: t.string().default("").optional(),
175
- jwks_uri: t.string().default("").optional(),
176
- discovery_url: t.string().default("").optional(),
177
- issuer: t.string().default("").optional(),
178
- provider: t.string().optional(),
179
- from: t.string().optional(),
180
- twilio_sid: t.string().optional(),
181
- twilio_token: t.string().optional()
182
- }).default({}).optional(),
182
+ options: E.default({}),
183
183
  enabled_clients: t.array(t.string()).default([]).optional(),
184
184
  response_type: t.custom().optional(),
185
185
  response_mode: t.custom().optional()
186
- }), w = t.object({
186
+ }), k = t.object({
187
187
  id: t.string(),
188
- created_at: t.string().transform((e) => e === null ? "" : e),
189
- updated_at: t.string().transform((e) => e === null ? "" : e)
190
- }).extend(E.shape), k = t.object({
188
+ created_at: t.string().transform((n) => n === null ? "" : n),
189
+ updated_at: t.string().transform((n) => n === null ? "" : n)
190
+ }).extend(w.shape), C = t.object({
191
191
  name: t.string(),
192
192
  audience: t.string(),
193
193
  sender_email: t.string().email(),
@@ -198,12 +198,12 @@ const y = t.object({
198
198
  secondary_color: t.string().optional(),
199
199
  language: t.string().optional(),
200
200
  id: t.string().optional()
201
- }), C = t.object({
202
- created_at: t.string().transform((e) => e === null ? "" : e),
203
- updated_at: t.string().transform((e) => e === null ? "" : e),
204
- ...k.shape,
201
+ }), I = t.object({
202
+ created_at: t.string().transform((n) => n === null ? "" : n),
203
+ updated_at: t.string().transform((n) => n === null ? "" : n),
204
+ ...C.shape,
205
205
  id: t.string()
206
- }), J = t.object({
206
+ }), Z = t.object({
207
207
  logoUrl: t.string(),
208
208
  loginBackgroundImage: t.string().nullish(),
209
209
  style: t.object({
@@ -223,17 +223,17 @@ const y = t.object({
223
223
  });
224
224
  t.object({
225
225
  ...S.shape,
226
- tenant: C,
227
- connections: t.array(w)
226
+ tenant: I,
227
+ connections: t.array(k)
228
228
  });
229
- const I = t.enum([
229
+ const j = t.enum([
230
230
  "password_reset",
231
231
  "email_verification",
232
232
  "otp",
233
233
  "authorization_code",
234
234
  "oauth2_state",
235
235
  "ticket"
236
- ]), j = t.object({
236
+ ]), v = t.object({
237
237
  code_id: t.string().openapi({
238
238
  description: "The code that will be used in for instance an email verification flow"
239
239
  }),
@@ -243,17 +243,17 @@ const I = t.enum([
243
243
  connection_id: t.string().optional().openapi({
244
244
  description: "The connection that the code is connected to"
245
245
  }),
246
- code_type: I,
246
+ code_type: j,
247
247
  code_verifier: t.string().optional().openapi({
248
248
  description: "The code verifier used in PKCE in outbound flows"
249
249
  }),
250
250
  expires_at: t.string(),
251
251
  used_at: t.string().optional(),
252
252
  user_id: t.string().optional()
253
- }), Z = t.object({
254
- ...j.shape,
253
+ }), $ = t.object({
254
+ ...v.shape,
255
255
  created_at: t.string()
256
- }), v = t.object({
256
+ }), A = t.object({
257
257
  domain: t.string(),
258
258
  custom_domain_id: t.string().optional(),
259
259
  type: t.enum(["auth0_managed_certs", "self_managed_certs"]),
@@ -267,23 +267,23 @@ const I = t.enum([
267
267
  "null"
268
268
  ]).optional(),
269
269
  domain_metadata: t.record(t.string().max(255)).optional()
270
- }), A = t.object({
270
+ }), O = t.object({
271
271
  name: t.literal("txt"),
272
272
  record: t.string(),
273
273
  domain: t.string()
274
- }), O = t.object({
275
- ...v.shape,
274
+ }), N = t.object({
275
+ ...A.shape,
276
276
  custom_domain_id: t.string(),
277
277
  primary: t.boolean(),
278
278
  status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
279
279
  origin_domain_name: t.string().optional(),
280
280
  verification: t.object({
281
- methods: t.array(A)
281
+ methods: t.array(O)
282
282
  }).optional(),
283
283
  tls_policy: t.string().optional()
284
- }), $ = O.extend({
284
+ }), tt = N.extend({
285
285
  tenant_id: t.string()
286
- }), N = t.object({
286
+ }), U = t.object({
287
287
  trigger_id: t.enum([
288
288
  "pre-user-signup",
289
289
  "post-user-registration",
@@ -294,10 +294,10 @@ const I = t.enum([
294
294
  hook_id: t.string().optional(),
295
295
  synchronous: t.boolean().default(!1),
296
296
  priority: t.number().optional()
297
- }), tt = N.extend({
297
+ }), nt = U.extend({
298
298
  ...s.shape,
299
299
  hook_id: t.string()
300
- }), U = t.object({
300
+ }), R = t.object({
301
301
  alg: t.enum([
302
302
  "RS256",
303
303
  "RS384",
@@ -317,8 +317,8 @@ const I = t.enum([
317
317
  x5c: t.array(t.string()).optional(),
318
318
  use: t.enum(["sig", "enc"]).optional()
319
319
  }), et = t.object({
320
- keys: t.array(U)
321
- }), nt = t.object({
320
+ keys: t.array(R)
321
+ }), it = t.object({
322
322
  issuer: t.string(),
323
323
  authorization_endpoint: t.string(),
324
324
  token_endpoint: t.string(),
@@ -339,7 +339,7 @@ const I = t.enum([
339
339
  request_uri_parameter_supported: t.boolean(),
340
340
  request_parameter_supported: t.boolean(),
341
341
  token_endpoint_auth_signing_alg_values_supported: t.array(t.string())
342
- }), R = t.object({
342
+ }), D = t.object({
343
343
  csrf_token: t.string(),
344
344
  auth0Client: t.string().optional(),
345
345
  authParams: y,
@@ -351,16 +351,16 @@ const I = t.enum([
351
351
  authorization_url: t.string().optional()
352
352
  }).openapi({
353
353
  description: "This represents a login sesion"
354
- }), it = t.object({
355
- ...R.shape,
354
+ }), ot = t.object({
355
+ ...D.shape,
356
356
  id: t.string().openapi({
357
357
  description: "This is is used as the state in the universal login"
358
358
  }),
359
359
  created_at: t.string(),
360
360
  updated_at: t.string()
361
361
  });
362
- var D = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(D || {});
363
- const x = t.enum([
362
+ var x = /* @__PURE__ */ ((n) => (n.FAILED_SILENT_AUTH = "fsa", n.FAILED_SIGNUP = "fs", n.FAILED_LOGIN = "f", n.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", n.FAILED_CHANGE_PASSWORD = "fcp", n.FAILED_BY_CONNECTOR = "fc", n.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", n.FAILED_HOOK = "fh", n.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", n.SUCCESS_API_OPERATION = "sapi", n.SUCCESS_CHANGE_PASSWORD = "scp", n.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", n.SUCCESS_CHANGE_USERNAME = "scu", n.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", n.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", n.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", n.SUCCESS_LOGIN = "s", n.SUCCESS_LOGOUT = "slo", n.SUCCESS_SIGNUP = "ss", n.SUCCESS_SILENT_AUTH = "ssa", n.SUCCESS_VERIFICATION_EMAIL = "sv", n.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", n.CODE_LINK_SENT = "cls", n.BLOCKED_ACCOUNT_EMAIL = "limit_wc", n.BLOCKED_ACCOUNT_IP = "limit_sul", n.BLOCKED_IP_ADDRESS = "limit_mu", n))(x || {});
363
+ const T = t.enum([
364
364
  "cls",
365
365
  // CODE_LINK_SENT
366
366
  "fsa",
@@ -409,14 +409,14 @@ const x = t.enum([
409
409
  // SUCCESS_VERIFICATION_EMAIL
410
410
  "svr"
411
411
  // SUCCESS_VERIFICATION_EMAIL_REQUEST
412
- ]), T = t.object({
412
+ ]), P = t.object({
413
413
  name: t.string(),
414
414
  version: t.string(),
415
415
  env: t.object({
416
416
  node: t.string().optional()
417
417
  }).optional()
418
- }), ot = t.object({
419
- type: x,
418
+ }), st = t.object({
419
+ type: T,
420
420
  date: t.string(),
421
421
  description: t.string().optional(),
422
422
  log_id: t.string().optional(),
@@ -437,13 +437,13 @@ const x = t.enum([
437
437
  strategy: t.string().optional(),
438
438
  strategy_type: t.string().optional(),
439
439
  hostname: t.string().optional(),
440
- auth0_client: T.optional()
441
- }), P = t.object({
440
+ auth0_client: P.optional()
441
+ }), F = t.object({
442
442
  user_id: t.string(),
443
443
  password: t.string(),
444
444
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
445
- }), st = t.object({
446
- ...P.shape,
445
+ }), at = t.object({
446
+ ...F.shape,
447
447
  created_at: t.string(),
448
448
  updated_at: t.string()
449
449
  }), p = t.object({
@@ -453,7 +453,7 @@ const x = t.enum([
453
453
  last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
454
454
  last_ip: t.string().describe("Last IP address from which this user logged in"),
455
455
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
456
- }), F = t.object({
456
+ }), H = t.object({
457
457
  id: t.string(),
458
458
  revoked_at: t.string().optional(),
459
459
  used_at: t.string().optional(),
@@ -464,13 +464,13 @@ const x = t.enum([
464
464
  "Metadata related to the device used in the session"
465
465
  ),
466
466
  clients: t.array(t.string()).describe("List of client details for the session")
467
- }), at = t.object({
467
+ }), rt = t.object({
468
468
  created_at: t.string(),
469
469
  updated_at: t.string(),
470
470
  authenticated_at: t.string(),
471
471
  last_interaction_at: t.string(),
472
- ...F.shape
473
- }), rt = t.object({
472
+ ...H.shape
473
+ }), lt = t.object({
474
474
  kid: t.string().openapi({ description: "The key id of the signing key" }),
475
475
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
476
476
  fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
@@ -490,8 +490,8 @@ const x = t.enum([
490
490
  revoked: t.boolean().optional().openapi({ description: "True if the key is revoked" }),
491
491
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
492
492
  });
493
- var H = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", e))(H || {});
494
- const lt = t.object({
493
+ var K = /* @__PURE__ */ ((n) => (n.RefreshToken = "refresh_token", n.AuthorizationCode = "authorization_code", n.ClientCredential = "client_credentials", n.Passwordless = "passwordless", n.Password = "password", n.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", n))(K || {});
494
+ const ct = t.object({
495
495
  access_token: t.string(),
496
496
  id_token: t.string().optional(),
497
497
  scope: t.string().optional(),
@@ -504,7 +504,7 @@ t.object({
504
504
  code: t.string(),
505
505
  state: t.string().optional()
506
506
  });
507
- const K = t.object({
507
+ const G = t.object({
508
508
  button_border_radius: t.number(),
509
509
  button_border_weight: t.number(),
510
510
  buttons_style: t.enum(["pill"]),
@@ -514,7 +514,7 @@ const K = t.object({
514
514
  show_widget_shadow: t.boolean(),
515
515
  widget_border_weight: t.number(),
516
516
  widget_corner_radius: t.number()
517
- }), G = t.object({
517
+ }), L = t.object({
518
518
  base_focus_color: t.string(),
519
519
  base_hover_color: t.string(),
520
520
  body_text: t.string(),
@@ -534,44 +534,44 @@ const K = t.object({
534
534
  success: t.string(),
535
535
  widget_background: t.string(),
536
536
  widget_border: t.string()
537
- }), n = t.object({
537
+ }), e = t.object({
538
538
  bold: t.boolean(),
539
539
  size: t.number()
540
- }), L = t.object({
541
- body_text: n,
542
- buttons_text: n,
540
+ }), B = t.object({
541
+ body_text: e,
542
+ buttons_text: e,
543
543
  font_url: t.string(),
544
- input_labels: n,
545
- links: n,
544
+ input_labels: e,
545
+ links: e,
546
546
  links_style: t.enum(["normal"]),
547
547
  reference_text_size: t.number(),
548
- subtitle: n,
549
- title: n
550
- }), B = t.object({
548
+ subtitle: e,
549
+ title: e
550
+ }), M = t.object({
551
551
  background_color: t.string(),
552
552
  background_image_url: t.string(),
553
553
  page_layout: t.enum(["center"])
554
- }), M = t.object({
554
+ }), W = t.object({
555
555
  header_text_alignment: t.enum(["center"]),
556
556
  logo_height: t.number(),
557
557
  logo_position: t.enum(["center"]),
558
558
  logo_url: t.string(),
559
559
  social_buttons_layout: t.enum(["bottom"])
560
- }), W = t.object({
561
- borders: K,
562
- colors: G,
560
+ }), q = t.object({
561
+ borders: G,
562
+ colors: L,
563
563
  displayName: t.string(),
564
- fonts: L,
565
- page_background: B,
566
- widget: M
567
- }), ct = W.extend({
564
+ fonts: B,
565
+ page_background: M,
566
+ widget: W
567
+ }), pt = q.extend({
568
568
  themeId: t.string()
569
- }), pt = t.object({
569
+ }), dt = t.object({
570
570
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
571
571
  identifier_first: t.boolean().default(!0),
572
572
  password_first: t.boolean().default(!1),
573
573
  webauthn_platform_first_factor: t.boolean()
574
- }), dt = t.object({
574
+ }), gt = t.object({
575
575
  name: t.string(),
576
576
  enabled: t.boolean().optional().default(!0),
577
577
  default_from_address: t.string().optional(),
@@ -601,7 +601,7 @@ const K = t.object({
601
601
  })
602
602
  ]),
603
603
  settings: t.object({}).optional()
604
- }), q = t.object({
604
+ }), z = t.object({
605
605
  // The actual refresh token value (primary key).
606
606
  id: t.string(),
607
607
  // Link to the session record
@@ -622,83 +622,84 @@ const K = t.object({
622
622
  })
623
623
  ),
624
624
  rotating: t.boolean()
625
- }), gt = t.object({
625
+ }), _t = t.object({
626
626
  // When the refresh token record was created.
627
627
  created_at: t.string(),
628
628
  // Spread in the rest of the refresh token properties.
629
- ...q.shape
630
- }), _t = t.object({
629
+ ...z.shape
630
+ }), ut = t.object({
631
631
  to: t.string(),
632
632
  message: t.string()
633
- }), ut = t.object({
633
+ }), mt = t.object({
634
634
  name: t.string(),
635
635
  options: t.object({})
636
636
  });
637
- function mt(e) {
638
- const [i, o] = e.split("|");
637
+ function ht(n) {
638
+ const [i, o] = n.split("|");
639
639
  if (!i || !o)
640
- throw new Error(`Invalid user_id: ${e}`);
640
+ throw new Error(`Invalid user_id: ${n}`);
641
641
  return { connection: i, id: o };
642
642
  }
643
643
  export {
644
- T as Auth0Client,
644
+ P as Auth0Client,
645
645
  l as AuthorizationResponseMode,
646
646
  r as AuthorizationResponseType,
647
647
  c as CodeChallengeMethod,
648
- H as GrantType,
649
- D as LogTypes,
648
+ K as GrantType,
649
+ x as LogTypes,
650
650
  f as applicationInsertSchema,
651
651
  S as applicationSchema,
652
- V as auth0UserResponseSchema,
652
+ Y as auth0UserResponseSchema,
653
653
  y as authParamsSchema,
654
654
  a as baseUserSchema,
655
- K as bordersSchema,
656
- X as brandingSchema,
657
- j as codeInsertSchema,
658
- Z as codeSchema,
659
- I as codeTypeSchema,
660
- G as colorsSchema,
661
- E as connectionInsertSchema,
662
- w as connectionSchema,
663
- v as customDomainInsertSchema,
664
- O as customDomainSchema,
665
- $ as customDomainWithTenantIdSchema,
666
- dt as emailProviderSchema,
667
- n as fontDetailsSchema,
668
- L as fontsSchema,
669
- N as hookInsertSchema,
670
- tt as hookSchema,
655
+ G as bordersSchema,
656
+ J as brandingSchema,
657
+ v as codeInsertSchema,
658
+ $ as codeSchema,
659
+ j as codeTypeSchema,
660
+ L as colorsSchema,
661
+ w as connectionInsertSchema,
662
+ E as connectionOptionsSchema,
663
+ k as connectionSchema,
664
+ A as customDomainInsertSchema,
665
+ N as customDomainSchema,
666
+ tt as customDomainWithTenantIdSchema,
667
+ gt as emailProviderSchema,
668
+ e as fontDetailsSchema,
669
+ B as fontsSchema,
670
+ U as hookInsertSchema,
671
+ nt as hookSchema,
671
672
  g as identitySchema,
672
673
  et as jwksKeySchema,
673
- U as jwksSchema,
674
- ot as logSchema,
675
- R as loginSessionInsertSchema,
676
- it as loginSessionSchema,
677
- nt as openIDConfigurationSchema,
678
- B as pageBackgroundSchema,
679
- mt as parseUserId,
680
- P as passwordInsertSchema,
681
- st as passwordSchema,
674
+ R as jwksSchema,
675
+ st as logSchema,
676
+ D as loginSessionInsertSchema,
677
+ ot as loginSessionSchema,
678
+ it as openIDConfigurationSchema,
679
+ M as pageBackgroundSchema,
680
+ ht as parseUserId,
681
+ F as passwordInsertSchema,
682
+ at as passwordSchema,
682
683
  d as profileDataSchema,
683
- pt as promptSettingSchema,
684
- q as refreshTokenInsertSchema,
685
- gt as refreshTokenSchema,
684
+ dt as promptSettingSchema,
685
+ z as refreshTokenInsertSchema,
686
+ _t as refreshTokenSchema,
686
687
  b as samlpAddon,
687
- F as sessionInsertSchema,
688
- at as sessionSchema,
689
- rt as signingKeySchema,
690
- ut as smsProviderSchema,
691
- _t as smsSendParamsSchema,
692
- k as tenantInsertSchema,
693
- C as tenantSchema,
694
- W as themeInsertSchema,
695
- ct as themeSchema,
696
- lt as tokenResponseSchema,
697
- Q as totalsSchema,
688
+ H as sessionInsertSchema,
689
+ rt as sessionSchema,
690
+ lt as signingKeySchema,
691
+ mt as smsProviderSchema,
692
+ ut as smsSendParamsSchema,
693
+ C as tenantInsertSchema,
694
+ I as tenantSchema,
695
+ q as themeInsertSchema,
696
+ pt as themeSchema,
697
+ ct as tokenResponseSchema,
698
+ V as totalsSchema,
698
699
  _ as userInsertSchema,
699
- Y as userResponseSchema,
700
+ X as userResponseSchema,
700
701
  u as userSchema,
701
- J as vendorSettingsSchema,
702
- A as verificationMethodsSchema,
703
- M as widgetSchema
702
+ Z as vendorSettingsSchema,
703
+ O as verificationMethodsSchema,
704
+ W as widgetSchema
704
705
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.58.0",
14
+ "version": "0.59.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],