@authhero/adapter-interfaces 0.72.0 → 0.74.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,12 +1,12 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const Et = t.object({
2
+ const bt = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
6
6
  }), s = t.object({
7
7
  created_at: t.string(),
8
8
  updated_at: t.string()
9
- }), f = t.object({
9
+ }), A = t.object({
10
10
  email: t.string().optional(),
11
11
  email_verified: t.boolean().optional(),
12
12
  name: t.string().optional(),
@@ -15,7 +15,7 @@ const Et = t.object({
15
15
  phone_number: t.string().optional(),
16
16
  phone_verified: t.boolean().optional(),
17
17
  family_name: t.string().optional()
18
- }).catchall(t.any()), S = t.object({
18
+ }).catchall(t.any()), h = t.object({
19
19
  connection: t.string(),
20
20
  user_id: t.string(),
21
21
  provider: t.string(),
@@ -23,8 +23,8 @@ const Et = t.object({
23
23
  access_token: t.string().optional(),
24
24
  access_token_secret: t.string().optional(),
25
25
  refresh_token: t.string().optional(),
26
- profileData: f.optional()
27
- }), c = t.object({
26
+ profileData: A.optional()
27
+ }), l = t.object({
28
28
  email: t.string().optional().transform((e) => e && e.toLowerCase()),
29
29
  username: t.string().optional(),
30
30
  phone_number: t.string().optional(),
@@ -39,7 +39,7 @@ const Et = t.object({
39
39
  user_id: t.string().optional(),
40
40
  app_metadata: t.any().default({}).optional(),
41
41
  user_metadata: t.any().default({}).optional()
42
- }), E = c.extend({
42
+ }), b = l.extend({
43
43
  email_verified: t.boolean().default(!1),
44
44
  verify_email: t.boolean().optional(),
45
45
  last_ip: t.string().optional(),
@@ -48,28 +48,28 @@ const Et = t.object({
48
48
  provider: t.string().default("email"),
49
49
  connection: t.string().default("email"),
50
50
  is_social: t.boolean().optional()
51
- }), j = t.object({
52
- ...E.shape,
51
+ }), C = t.object({
52
+ ...b.shape,
53
53
  ...s.shape,
54
54
  user_id: t.string(),
55
55
  is_social: t.boolean(),
56
56
  email: t.string().optional(),
57
57
  login_count: t.number().default(0),
58
- identities: t.array(S).optional()
59
- }), jt = j, yt = c.extend({
58
+ identities: t.array(h).optional()
59
+ }), Ct = C, It = l.extend({
60
60
  login_count: t.number(),
61
61
  multifactor: t.array(t.string()).optional(),
62
62
  last_ip: t.string().optional(),
63
63
  last_login: t.string().optional(),
64
64
  user_id: t.string()
65
- }).catchall(t.any()), y = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
- let I = (e = 21) => {
65
+ }).catchall(t.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
+ let O = (e = 21) => {
67
67
  let o = "", a = crypto.getRandomValues(new Uint8Array(e));
68
68
  for (; e--; )
69
- o += y[a[e] & 63];
69
+ o += I[a[e] & 63];
70
70
  return o;
71
71
  };
72
- const w = t.object({
72
+ const f = t.object({
73
73
  audience: t.string().optional(),
74
74
  recipient: t.string().optional(),
75
75
  createUpnClaim: t.boolean().optional(),
@@ -86,7 +86,7 @@ const w = t.object({
86
86
  nameIdentifierProbes: t.array(t.string()).optional(),
87
87
  authnContextClassRef: t.string().optional(),
88
88
  mappings: t.record(t.string()).optional()
89
- }), C = t.object({
89
+ }), N = t.object({
90
90
  id: t.string(),
91
91
  name: t.string(),
92
92
  callbacks: t.array(t.string()).default([]).optional().openapi({
@@ -105,31 +105,31 @@ const w = t.object({
105
105
  description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
106
106
  }),
107
107
  addons: t.object({
108
- samlp: w.optional()
108
+ samlp: f.optional()
109
109
  }).default({}).optional().openapi({
110
110
  description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
111
111
  }),
112
112
  email_validation: t.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
113
113
  description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
114
114
  }),
115
- client_secret: t.string().default(() => I()).optional(),
115
+ client_secret: t.string().default(() => O()).optional(),
116
116
  disable_sign_ups: t.boolean().optional().default(!1).openapi({
117
117
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
118
118
  })
119
- }), k = t.object({
119
+ }), T = t.object({
120
120
  created_at: t.string().transform((e) => e === null ? "" : e),
121
121
  updated_at: t.string().transform((e) => e === null ? "" : e),
122
- ...C.shape
122
+ ...N.shape
123
123
  }), i = t.object({
124
124
  x: t.number(),
125
125
  y: t.number()
126
126
  });
127
- var p = /* @__PURE__ */ ((e) => (e.RICH_TEXT = "RICH_TEXT", e.NEXT_BUTTON = "NEXT_BUTTON", e.BACK_BUTTON = "BACK_BUTTON", e.SUBMIT_BUTTON = "SUBMIT_BUTTON", e.DIVIDER = "DIVIDER", e.TEXT = "TEXT", e.EMAIL = "EMAIL", e.PASSWORD = "PASSWORD", e.NUMBER = "NUMBER", e.PHONE = "PHONE", e.DATE = "DATE", e.CHECKBOX = "CHECKBOX", e.RADIO = "RADIO", e.SELECT = "SELECT", e.HIDDEN = "HIDDEN", e.LEGAL = "LEGAL", e))(p || {}), d = /* @__PURE__ */ ((e) => (e.BLOCK = "BLOCK", e.FIELD = "FIELD", e))(d || {});
127
+ var c = /* @__PURE__ */ ((e) => (e.RICH_TEXT = "RICH_TEXT", e.NEXT_BUTTON = "NEXT_BUTTON", e.BACK_BUTTON = "BACK_BUTTON", e.SUBMIT_BUTTON = "SUBMIT_BUTTON", e.DIVIDER = "DIVIDER", e.TEXT = "TEXT", e.EMAIL = "EMAIL", e.PASSWORD = "PASSWORD", e.NUMBER = "NUMBER", e.PHONE = "PHONE", e.DATE = "DATE", e.CHECKBOX = "CHECKBOX", e.RADIO = "RADIO", e.SELECT = "SELECT", e.HIDDEN = "HIDDEN", e.LEGAL = "LEGAL", e))(c || {}), d = /* @__PURE__ */ ((e) => (e.BLOCK = "BLOCK", e.FIELD = "FIELD", e))(d || {});
128
128
  const r = t.object({
129
129
  id: t.string(),
130
130
  category: t.nativeEnum(d),
131
- type: t.nativeEnum(p)
132
- }), O = r.extend({
131
+ type: t.nativeEnum(c)
132
+ }), R = r.extend({
133
133
  category: t.literal(
134
134
  "BLOCK"
135
135
  /* BLOCK */
@@ -141,7 +141,7 @@ const r = t.object({
141
141
  config: t.object({
142
142
  content: t.string()
143
143
  }).passthrough()
144
- }), T = r.extend({
144
+ }), L = r.extend({
145
145
  category: t.literal(
146
146
  "BLOCK"
147
147
  /* BLOCK */
@@ -163,7 +163,7 @@ const r = t.object({
163
163
  config: t.object({
164
164
  text: t.string()
165
165
  }).passthrough()
166
- }), v = r.extend({
166
+ }), D = r.extend({
167
167
  category: t.literal(
168
168
  "FIELD"
169
169
  /* FIELD */
@@ -177,7 +177,7 @@ const r = t.object({
177
177
  config: t.object({
178
178
  text: t.string()
179
179
  }).passthrough()
180
- }), A = r.extend({
180
+ }), U = r.extend({
181
181
  category: t.literal(
182
182
  "FIELD"
183
183
  /* FIELD */
@@ -230,19 +230,19 @@ const r = t.object({
230
230
  label: t.string().optional(),
231
231
  placeholder: t.string().optional()
232
232
  }).passthrough()
233
- }), N = t.object({
233
+ }), y = t.object({
234
234
  id: t.string(),
235
235
  category: t.string(),
236
236
  type: t.string()
237
- }).passthrough(), U = t.union([
238
- O,
239
- T,
240
- v,
241
- A,
242
- N
237
+ }).passthrough(), F = t.union([
238
+ R,
239
+ L,
240
+ D,
241
+ U,
242
+ y
243
243
  ]);
244
- var D = /* @__PURE__ */ ((e) => (e.STEP = "STEP", e.FLOW = "FLOW", e.CONDITION = "CONDITION", e.ACTION = "ACTION", e))(D || {});
245
- const x = t.object({
244
+ var j = /* @__PURE__ */ ((e) => (e.STEP = "STEP", e.FLOW = "FLOW", e.CONDITION = "CONDITION", e.ACTION = "ACTION", e))(j || {});
245
+ const w = t.object({
246
246
  id: t.string(),
247
247
  type: t.literal(
248
248
  "STEP"
@@ -251,10 +251,10 @@ const x = t.object({
251
251
  coordinates: i,
252
252
  alias: t.string().optional(),
253
253
  config: t.object({
254
- components: t.array(U),
254
+ components: t.array(F),
255
255
  next_node: t.string()
256
256
  }).passthrough()
257
- }), R = t.object({
257
+ }), k = t.object({
258
258
  id: t.string(),
259
259
  type: t.literal(
260
260
  "FLOW"
@@ -266,46 +266,46 @@ const x = t.object({
266
266
  flow_id: t.string(),
267
267
  next_node: t.string()
268
268
  })
269
- }), P = t.object({
269
+ }), H = t.object({
270
270
  id: t.string(),
271
271
  type: t.string(),
272
272
  coordinates: i
273
- }).passthrough(), L = t.union([
274
- x,
275
- R,
276
- P
277
- ]), B = t.object({
273
+ }).passthrough(), P = t.union([
274
+ w,
275
+ k,
276
+ H
277
+ ]), v = t.object({
278
278
  next_node: t.string(),
279
279
  coordinates: i
280
- }).passthrough(), H = t.object({
280
+ }).passthrough(), M = t.object({
281
281
  resume_flow: t.boolean().optional(),
282
282
  coordinates: i
283
- }).passthrough(), F = t.object({
283
+ }).passthrough(), G = t.object({
284
284
  id: t.string(),
285
285
  name: t.string(),
286
286
  languages: t.object({
287
287
  primary: t.string()
288
288
  }).passthrough(),
289
- nodes: t.array(L),
290
- start: B,
291
- ending: H,
289
+ nodes: t.array(P),
290
+ start: v,
291
+ ending: M,
292
292
  created_at: t.string(),
293
293
  updated_at: t.string(),
294
294
  links: t.object({
295
295
  sdkSrc: t.string().optional(),
296
296
  sdk_src: t.string().optional()
297
297
  }).passthrough()
298
- }).passthrough(), It = F.omit({
298
+ }).passthrough(), Ot = G.omit({
299
299
  id: !0,
300
300
  created_at: !0,
301
301
  updated_at: !0
302
302
  });
303
- var g = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(g || {}), u = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(u || {}), _ = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(_ || {});
304
- const K = t.object({
303
+ var p = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(p || {}), g = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(g || {}), E = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(E || {});
304
+ const x = t.object({
305
305
  client_id: t.string(),
306
306
  act_as: t.string().optional(),
307
- response_type: t.nativeEnum(g).optional(),
308
- response_mode: t.nativeEnum(u).optional(),
307
+ response_type: t.nativeEnum(p).optional(),
308
+ response_mode: t.nativeEnum(g).optional(),
309
309
  redirect_uri: t.string().optional(),
310
310
  audience: t.string().optional(),
311
311
  organization: t.string().optional(),
@@ -313,13 +313,13 @@ const K = t.object({
313
313
  nonce: t.string().optional(),
314
314
  scope: t.string().optional(),
315
315
  prompt: t.string().optional(),
316
- code_challenge_method: t.nativeEnum(_).optional(),
316
+ code_challenge_method: t.nativeEnum(E).optional(),
317
317
  code_challenge: t.string().optional(),
318
318
  username: t.string().optional(),
319
319
  ui_locales: t.string().optional(),
320
320
  // The following fields are not available in Auth0
321
321
  vendor_id: t.string().optional()
322
- }), wt = t.object({
322
+ }), ft = t.object({
323
323
  colors: t.object({
324
324
  primary: t.string(),
325
325
  page_background: t.object({
@@ -334,7 +334,7 @@ const K = t.object({
334
334
  font: t.object({
335
335
  url: t.string()
336
336
  }).optional()
337
- }), M = t.object({
337
+ }), K = t.object({
338
338
  kid: t.string().optional(),
339
339
  team_id: t.string().optional(),
340
340
  realms: t.string().optional(),
@@ -353,11 +353,11 @@ const K = t.object({
353
353
  from: t.string().optional(),
354
354
  twilio_sid: t.string().optional(),
355
355
  twilio_token: t.string().optional()
356
- }), G = t.object({
356
+ }), B = t.object({
357
357
  id: t.string().optional(),
358
358
  name: t.string(),
359
359
  strategy: t.string(),
360
- options: M.default({}),
360
+ options: K.default({}),
361
361
  enabled_clients: t.array(t.string()).default([]).optional(),
362
362
  response_type: t.custom().optional(),
363
363
  response_mode: t.custom().optional()
@@ -365,7 +365,7 @@ const K = t.object({
365
365
  id: t.string(),
366
366
  created_at: t.string().transform((e) => e === null ? "" : e),
367
367
  updated_at: t.string().transform((e) => e === null ? "" : e)
368
- }).extend(G.shape), W = t.object({
368
+ }).extend(B.shape), V = t.object({
369
369
  name: t.string(),
370
370
  audience: t.string(),
371
371
  sender_email: t.string().email(),
@@ -376,12 +376,12 @@ const K = t.object({
376
376
  secondary_color: t.string().optional(),
377
377
  language: t.string().optional(),
378
378
  id: t.string().optional()
379
- }), q = t.object({
379
+ }), W = t.object({
380
380
  created_at: t.string().transform((e) => e === null ? "" : e),
381
381
  updated_at: t.string().transform((e) => e === null ? "" : e),
382
- ...W.shape,
382
+ ...V.shape,
383
383
  id: t.string()
384
- }), Ct = t.object({
384
+ }), Nt = t.object({
385
385
  logoUrl: t.string(),
386
386
  loginBackgroundImage: t.string().nullish(),
387
387
  style: t.object({
@@ -389,6 +389,7 @@ const K = t.object({
389
389
  buttonTextColor: t.string(),
390
390
  primaryHoverColor: t.string()
391
391
  }),
392
+ country: t.string().optional(),
392
393
  supportEmail: t.string().nullable(),
393
394
  supportUrl: t.string().nullable(),
394
395
  name: t.string(),
@@ -400,18 +401,18 @@ const K = t.object({
400
401
  manageSubscriptionsUrl: t.string().optional()
401
402
  });
402
403
  t.object({
403
- ...k.shape,
404
- tenant: q,
404
+ ...T.shape,
405
+ tenant: W,
405
406
  connections: t.array(X)
406
407
  });
407
- const V = t.enum([
408
+ const Y = t.enum([
408
409
  "password_reset",
409
410
  "email_verification",
410
411
  "otp",
411
412
  "authorization_code",
412
413
  "oauth2_state",
413
414
  "ticket"
414
- ]), z = t.object({
415
+ ]), q = t.object({
415
416
  code_id: t.string().openapi({
416
417
  description: "The code that will be used in for instance an email verification flow"
417
418
  }),
@@ -421,7 +422,7 @@ const V = t.enum([
421
422
  connection_id: t.string().optional().openapi({
422
423
  description: "The connection that the code is connected to"
423
424
  }),
424
- code_type: V,
425
+ code_type: Y,
425
426
  code_verifier: t.string().optional().openapi({
426
427
  description: "The code verifier used in PKCE in outbound flows"
427
428
  }),
@@ -443,8 +444,8 @@ const V = t.enum([
443
444
  expires_at: t.string(),
444
445
  used_at: t.string().optional(),
445
446
  user_id: t.string().optional()
446
- }), kt = t.object({
447
- ...z.shape,
447
+ }), Tt = t.object({
448
+ ...q.shape,
448
449
  created_at: t.string()
449
450
  }), Q = t.object({
450
451
  domain: t.string(),
@@ -460,23 +461,23 @@ const V = t.enum([
460
461
  "null"
461
462
  ]).optional(),
462
463
  domain_metadata: t.record(t.string().max(255)).optional()
463
- }), Y = t.object({
464
+ }), z = t.object({
464
465
  name: t.literal("txt"),
465
466
  record: t.string(),
466
467
  domain: t.string()
467
- }), J = t.object({
468
+ }), Z = t.object({
468
469
  ...Q.shape,
469
470
  custom_domain_id: t.string(),
470
471
  primary: t.boolean(),
471
472
  status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
472
473
  origin_domain_name: t.string().optional(),
473
474
  verification: t.object({
474
- methods: t.array(Y)
475
+ methods: t.array(z)
475
476
  }).optional(),
476
477
  tls_policy: t.string().optional()
477
- }), Ot = J.extend({
478
+ }), Rt = Z.extend({
478
479
  tenant_id: t.string()
479
- }), Tt = t.object({
480
+ }), Lt = t.object({
480
481
  id: t.string(),
481
482
  type: t.literal("submit"),
482
483
  label: t.string(),
@@ -485,7 +486,7 @@ const V = t.enum([
485
486
  order: t.number().optional(),
486
487
  visible: t.boolean().optional().default(!0),
487
488
  customizations: t.record(t.string(), t.any()).optional()
488
- }), Z = t.discriminatedUnion("type", [
489
+ }), J = t.discriminatedUnion("type", [
489
490
  t.object({
490
491
  id: t.string(),
491
492
  type: t.literal("RICH_TEXT"),
@@ -579,7 +580,7 @@ const V = t.enum([
579
580
  coordinates: t.object({ x: t.number(), y: t.number() }),
580
581
  alias: t.string().min(1).max(150).optional(),
581
582
  config: t.object({
582
- components: t.array(Z),
583
+ components: t.array(J),
583
584
  next_node: t.string()
584
585
  })
585
586
  })
@@ -602,48 +603,48 @@ const V = t.enum([
602
603
  style: t.object({ css: t.string().optional() }).optional()
603
604
  }).openapi({
604
605
  description: "Schema for flow-based forms (matches new JSON structure)"
605
- }), vt = t.object({
606
+ }), Dt = t.object({
606
607
  ...s.shape,
607
608
  ...$.shape,
608
609
  id: t.string()
609
- }), m = t.enum([
610
+ }), u = t.enum([
610
611
  "pre-user-signup",
611
612
  "post-user-registration",
612
613
  "post-user-login"
613
614
  // Potentially other triggers specific to webhooks in the future
614
- ]), h = t.enum([
615
+ ]), S = t.enum([
615
616
  "pre-user-signup",
616
617
  "post-user-registration",
617
618
  "post-user-login"
618
- ]), l = {
619
+ ]), _ = {
619
620
  enabled: t.boolean().default(!1),
620
621
  synchronous: t.boolean().default(!1),
621
622
  priority: t.number().optional(),
622
623
  hook_id: t.string().optional()
623
624
  }, tt = t.object({
624
- ...l,
625
- trigger_id: m,
625
+ ..._,
626
+ trigger_id: u,
626
627
  url: t.string()
627
628
  }), et = t.object({
628
- ...l,
629
- trigger_id: h,
629
+ ..._,
630
+ trigger_id: S,
630
631
  form_id: t.string()
631
- }), At = t.union([
632
+ }), Ut = t.union([
632
633
  tt,
633
634
  et
634
635
  ]), nt = t.object({
635
- ...l,
636
- trigger_id: m,
636
+ ..._,
637
+ trigger_id: u,
637
638
  ...s.shape,
638
639
  hook_id: t.string(),
639
640
  url: t.string()
640
641
  }), ot = t.object({
641
- ...l,
642
- trigger_id: h,
642
+ ..._,
643
+ trigger_id: S,
643
644
  ...s.shape,
644
645
  hook_id: t.string(),
645
646
  form_id: t.string()
646
- }), Nt = t.union([nt, ot]), it = t.object({
647
+ }), yt = t.union([nt, ot]), it = t.object({
647
648
  alg: t.enum([
648
649
  "RS256",
649
650
  "RS384",
@@ -662,9 +663,9 @@ const V = t.enum([
662
663
  x5t: t.string().optional(),
663
664
  x5c: t.array(t.string()).optional(),
664
665
  use: t.enum(["sig", "enc"]).optional()
665
- }), Ut = t.object({
666
+ }), Ft = t.object({
666
667
  keys: t.array(it)
667
- }), Dt = t.object({
668
+ }), jt = t.object({
668
669
  issuer: t.string(),
669
670
  authorization_endpoint: t.string(),
670
671
  token_endpoint: t.string(),
@@ -688,7 +689,7 @@ const V = t.enum([
688
689
  }), at = t.object({
689
690
  csrf_token: t.string(),
690
691
  auth0Client: t.string().optional(),
691
- authParams: K,
692
+ authParams: x,
692
693
  expires_at: t.string(),
693
694
  deleted_at: t.string().optional(),
694
695
  ip: t.string().optional(),
@@ -698,71 +699,190 @@ const V = t.enum([
698
699
  login_completed: t.boolean().optional().default(!1)
699
700
  }).openapi({
700
701
  description: "This represents a login sesion"
701
- }), xt = t.object({
702
+ }), wt = t.object({
702
703
  ...at.shape,
703
704
  id: t.string().openapi({
704
705
  description: "This is is used as the state in the universal login"
705
706
  }),
706
707
  created_at: t.string(),
707
708
  updated_at: t.string()
708
- });
709
- var st = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(st || {});
710
- const rt = t.enum([
711
- "cls",
712
- // CODE_LINK_SENT
713
- "fsa",
714
- // FAILED_SILENT_AUTH
715
- "fs",
716
- // FAILED_SIGNUP
717
- "f",
718
- // FAILED_LOGIN
719
- "fc",
720
- // FAILED_BY_CONNECTOR
721
- "fcoa",
722
- // FAILED_CROSS_ORIGIN_AUTHENTICATION
723
- "fcp",
724
- // FAILED_CHANGE_PASSWORD
725
- "fh",
726
- // FAILED_HOOK
727
- "fp",
728
- // FAILED_LOGIN_INCORRECT_PASSWORD
729
- "fs",
730
- // FAILED_SIGNUP
731
- "fu",
732
- // FAILED_LOGIN_INVALID_EMAIL_USERNAME
733
- "s",
734
- // SUCCESS_LOGIN
735
- "sapi",
736
- // SUCCESS_API_OPERATION
737
- "scoa",
738
- // SUCCESS_CROSS_ORIGIN_AUTHENTICATION
739
- "scp",
740
- // SUCCESS_CHANGE_PASSWORD
741
- "scpr",
742
- // SUCCESS_CHANGE_PASSWORD_REQUEST
743
- "scu",
744
- // SUCCESS_CHANGE_USERNAME
745
- "seacft",
746
- // SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN
747
- "serft",
748
- // SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN
749
- "slo",
750
- // SUCCESS_LOGOUT
751
- "ss",
752
- // SUCCESS_SIGNUP
753
- "ssa",
754
- // SUCCESS_SILENT_AUTH,
755
- "sv",
756
- // SUCCESS_VERIFICATION_EMAIL
757
- "svr"
758
- // SUCCESS_VERIFICATION_EMAIL_REQUEST
759
- ]), lt = t.object({
709
+ }), st = {
710
+ // Network & System
711
+ ACLS_SUMMARY: "acls_summary",
712
+ ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
713
+ API_LIMIT: "api_limit",
714
+ API_LIMIT_WARNING: "api_limit_warning",
715
+ APPI: "appi",
716
+ // CIBA (Client-Initiated Backchannel Authentication)
717
+ CIBA_EXCHANGE_FAILED: "ciba_exchange_failed",
718
+ CIBA_EXCHANGE_SUCCEEDED: "ciba_exchange_succeeded",
719
+ CIBA_START_FAILED: "ciba_start_failed",
720
+ CIBA_START_SUCCEEDED: "ciba_start_succeeded",
721
+ // Code/Link sending
722
+ CODE_LINK_SENT: "cls",
723
+ CODE_SENT: "cs",
724
+ // Deprecation & System notices
725
+ DEPRECATION_NOTICE: "depnote",
726
+ // Failed operations
727
+ FAILED_LOGIN: "f",
728
+ FAILED_BY_CONNECTOR: "fc",
729
+ FAILED_CHANGE_EMAIL: "fce",
730
+ FAILED_BY_CORS: "fco",
731
+ FAILED_CROSS_ORIGIN_AUTHENTICATION: "fcoa",
732
+ FAILED_CHANGE_PASSWORD: "fcp",
733
+ FAILED_POST_CHANGE_PASSWORD_HOOK: "fcph",
734
+ FAILED_CHANGE_PHONE_NUMBER: "fcpn",
735
+ FAILED_CHANGE_PASSWORD_REQUEST: "fcpr",
736
+ FAILED_CONNECTOR_PROVISIONING: "fcpro",
737
+ FAILED_CHANGE_USERNAME: "fcu",
738
+ FAILED_DELEGATION: "fd",
739
+ FAILED_DEVICE_ACTIVATION: "fdeac",
740
+ FAILED_DEVICE_AUTHORIZATION_REQUEST: "fdeaz",
741
+ USER_CANCELED_DEVICE_CONFIRMATION: "fdecc",
742
+ FAILED_USER_DELETION: "fdu",
743
+ FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN: "feacft",
744
+ FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS: "feccft",
745
+ FAILED_EXCHANGE_CUSTOM_TOKEN: "fecte",
746
+ FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN: "fede",
747
+ FAILED_FEDERATED_LOGOUT: "federated_logout_failed",
748
+ FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN: "fens",
749
+ FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN: "feoobft",
750
+ FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN: "feotpft",
751
+ FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN: "fepft",
752
+ FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN: "fepotpft",
753
+ FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN: "fercft",
754
+ FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN: "ferrt",
755
+ FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN: "fertft",
756
+ FAILED_HOOK: "fh",
757
+ // Custom AuthHero-specific
758
+ FAILED_INVITE_ACCEPT: "fi",
759
+ FAILED_LOGOUT: "flo",
760
+ FLOWS_EXECUTION_COMPLETED: "flows_execution_completed",
761
+ FLOWS_EXECUTION_FAILED: "flows_execution_failed",
762
+ FAILED_SENDING_NOTIFICATION: "fn",
763
+ FORMS_SUBMISSION_FAILED: "forms_submission_failed",
764
+ FORMS_SUBMISSION_SUCCEEDED: "forms_submission_succeeded",
765
+ FAILED_LOGIN_INCORRECT_PASSWORD: "fp",
766
+ FAILED_PUSHED_AUTHORIZATION_REQUEST: "fpar",
767
+ FAILED_POST_USER_REGISTRATION_HOOK: "fpurh",
768
+ FAILED_SIGNUP: "fs",
769
+ FAILED_SILENT_AUTH: "fsa",
770
+ FAILED_LOGIN_INVALID_EMAIL_USERNAME: "fu",
771
+ FAILED_USERS_IMPORT: "fui",
772
+ FAILED_VERIFICATION_EMAIL: "fv",
773
+ FAILED_VERIFICATION_EMAIL_REQUEST: "fvr",
774
+ // Guardian/MFA events
775
+ EMAIL_VERIFICATION_CONFIRMED: "gd_auth_email_verification",
776
+ EMAIL_VERIFICATION_FAILED: "gd_auth_fail_email_verification",
777
+ MFA_AUTH_FAILED: "gd_auth_failed",
778
+ MFA_AUTH_REJECTED: "gd_auth_rejected",
779
+ MFA_AUTH_SUCCESS: "gd_auth_succeed",
780
+ MFA_ENROLLMENT_COMPLETE: "gd_enrollment_complete",
781
+ TOO_MANY_MFA_FAILURES: "gd_otp_rate_limit_exceed",
782
+ MFA_RECOVERY_FAILED: "gd_recovery_failed",
783
+ MFA_RECOVERY_RATE_LIMIT_EXCEED: "gd_recovery_rate_limit_exceed",
784
+ MFA_RECOVERY_SUCCESS: "gd_recovery_succeed",
785
+ MFA_EMAIL_SENT: "gd_send_email",
786
+ EMAIL_VERIFICATION_SENT: "gd_send_email_verification",
787
+ EMAIL_VERIFICATION_SEND_FAILURE: "gd_send_email_verification_failure",
788
+ PUSH_NOTIFICATION_SENT: "gd_send_pn",
789
+ ERROR_SENDING_MFA_PUSH_NOTIFICATION: "gd_send_pn_failure",
790
+ MFA_SMS_SENT: "gd_send_sms",
791
+ ERROR_SENDING_MFA_SMS: "gd_send_sms_failure",
792
+ MFA_VOICE_CALL_SUCCESS: "gd_send_voice",
793
+ MFA_VOICE_CALL_FAILED: "gd_send_voice_failure",
794
+ SECOND_FACTOR_STARTED: "gd_start_auth",
795
+ MFA_ENROLL_STARTED: "gd_start_enroll",
796
+ MFA_ENROLLMENT_FAILED: "gd_start_enroll_failed",
797
+ GUARDIAN_TENANT_UPDATE: "gd_tenant_update",
798
+ UNENROLL_DEVICE_ACCOUNT: "gd_unenroll",
799
+ UPDATE_DEVICE_ACCOUNT: "gd_update_device_account",
800
+ WEBAUTHN_CHALLENGE_FAILED: "gd_webauthn_challenge_failed",
801
+ WEBAUTHN_ENROLLMENT_FAILED: "gd_webauthn_enrollment_failed",
802
+ // KMS operations
803
+ FAILED_KMS_API_OPERATION: "kms_key_management_failure",
804
+ SUCCESS_KMS_API_OPERATION: "kms_key_management_success",
805
+ KMS_KEY_STATE_CHANGED: "kms_key_state_changed",
806
+ // Rate limiting & blocking
807
+ TOO_MANY_CALLS_TO_DELEGATION: "limit_delegation",
808
+ BLOCKED_IP_ADDRESS: "limit_mu",
809
+ BLOCKED_ACCOUNT_IP: "limit_sul",
810
+ BLOCKED_ACCOUNT_EMAIL: "limit_wc",
811
+ // MFA & My Account
812
+ MFA_REQUIRED: "mfar",
813
+ MANAGEMENT_API_READ_OPERATION: "mgmt_api_read",
814
+ FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT: "my_account_authentication_method_failed",
815
+ SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT: "my_account_authentication_method_succeeded",
816
+ // OIDC operations
817
+ FAILED_OIDC_BACKCHANNEL_LOGOUT: "oidc_backchannel_logout_failed",
818
+ SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT: "oidc_backchannel_logout_succeeded",
819
+ // Organization
820
+ ORGANIZATION_MEMBER_ADDED: "organization_member_added",
821
+ // Passkey operations
822
+ PASSKEY_CHALLENGE_FAILED: "passkey_challenge_failed",
823
+ PASSKEY_CHALLENGE_STARTED: "passkey_challenge_started",
824
+ // Security & password events
825
+ PRE_LOGIN_ASSESSMENT: "pla",
826
+ BREACHED_PASSWORD: "pwd_leak",
827
+ BREACHED_PASSWORD_ON_RESET: "reset_pwd_leak",
828
+ SUCCESS_RESOURCE_CLEANUP: "resource_cleanup",
829
+ RICH_CONSENTS_ACCESS_ERROR: "rich_consents_access_error",
830
+ // Successful operations
831
+ SUCCESS_LOGIN: "s",
832
+ SUCCESS_API_OPERATION: "sapi",
833
+ SUCCESS_CHANGE_EMAIL: "sce",
834
+ SUCCESS_CROSS_ORIGIN_AUTHENTICATION: "scoa",
835
+ SUCCESS_CHANGE_PASSWORD: "scp",
836
+ SUCCESS_CHANGE_PHONE_NUMBER: "scpn",
837
+ SUCCESS_CHANGE_PASSWORD_REQUEST: "scpr",
838
+ SUCCESS_CHANGE_USERNAME: "scu",
839
+ SUCCESS_CREDENTIAL_VALIDATION: "scv",
840
+ SUCCESS_DELEGATION: "sd",
841
+ SUCCESS_USER_DELETION: "sdu",
842
+ SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN: "seacft",
843
+ SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS: "seccft",
844
+ SUCCESS_EXCHANGE_CUSTOM_TOKEN: "secte",
845
+ SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN: "sede",
846
+ SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN: "sens",
847
+ SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN: "seoobft",
848
+ SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN: "seotpft",
849
+ SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN: "sepft",
850
+ SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN: "sepkoobft",
851
+ SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN: "sepkotpft",
852
+ SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN: "sepkrcft",
853
+ SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN: "sercft",
854
+ SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN: "sertft",
855
+ SUCCESSFULLY_ACCEPTED_USER_INVITE: "si",
856
+ BREACHED_PASSWORD_ON_SIGNUP: "signup_pwd_leak",
857
+ SUCCESS_LOGOUT: "slo",
858
+ SUCCESS_REVOCATION: "srrt",
859
+ SUCCESS_SIGNUP: "ss",
860
+ FAILED_SS_SSO_OPERATION: "ss_sso_failure",
861
+ INFORMATION_FROM_SS_SSO_OPERATION: "ss_sso_info",
862
+ SUCCESS_SS_SSO_OPERATION: "ss_sso_success",
863
+ SUCCESS_SILENT_AUTH: "ssa",
864
+ SUCCESSFUL_SCIM_OPERATION: "sscim",
865
+ SUCCESSFULLY_IMPORTED_USERS: "sui",
866
+ SUCCESS_VERIFICATION_EMAIL: "sv",
867
+ SUCCESS_VERIFICATION_EMAIL_REQUEST: "svr",
868
+ // Warnings & misc
869
+ MAX_AMOUNT_OF_AUTHENTICATORS: "too_many_records",
870
+ USER_LOGIN_BLOCK_RELEASED: "ublkdu",
871
+ FAILED_UNIVERSAL_LOGOUT: "universal_logout_failed",
872
+ SUCCESSFUL_UNIVERSAL_LOGOUT: "universal_logout_succeeded",
873
+ WARNING_DURING_LOGIN: "w",
874
+ WARNING_SENDING_NOTIFICATION: "wn",
875
+ WARNING_USER_MANAGEMENT: "wum"
876
+ }, rt = t.string().refine(
877
+ (e) => Object.values(st).includes(e),
878
+ { message: "Invalid log type" }
879
+ ), _t = t.object({
760
880
  name: t.string(),
761
881
  version: t.string(),
762
882
  env: t.object({
763
883
  node: t.string().optional()
764
884
  }).optional()
765
- }), Rt = t.object({
885
+ }), kt = t.object({
766
886
  type: rt,
767
887
  date: t.string(),
768
888
  description: t.string().optional(),
@@ -784,23 +904,23 @@ const rt = t.enum([
784
904
  strategy: t.string().optional(),
785
905
  strategy_type: t.string().optional(),
786
906
  hostname: t.string().optional(),
787
- auth0_client: lt.optional()
788
- }), ct = t.object({
907
+ auth0_client: _t.optional()
908
+ }), lt = t.object({
789
909
  user_id: t.string(),
790
910
  password: t.string(),
791
911
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
792
- }), Pt = t.object({
793
- ...ct.shape,
912
+ }), Ht = t.object({
913
+ ...lt.shape,
794
914
  created_at: t.string(),
795
915
  updated_at: t.string()
796
- }), b = t.object({
916
+ }), m = t.object({
797
917
  initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
798
918
  initial_ip: t.string().describe("First IP address associated with this session"),
799
919
  initial_asn: t.string().describe("First autonomous system number associated with this session"),
800
920
  last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
801
921
  last_ip: t.string().describe("Last IP address from which this user logged in"),
802
922
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
803
- }), pt = t.object({
923
+ }), ct = t.object({
804
924
  id: t.string(),
805
925
  revoked_at: t.string().optional(),
806
926
  used_at: t.string().optional(),
@@ -808,17 +928,17 @@ const rt = t.enum([
808
928
  expires_at: t.string().optional(),
809
929
  login_session_id: t.string(),
810
930
  idle_expires_at: t.string().optional(),
811
- device: b.describe(
931
+ device: m.describe(
812
932
  "Metadata related to the device used in the session"
813
933
  ),
814
934
  clients: t.array(t.string()).describe("List of client details for the session")
815
- }), Lt = t.object({
935
+ }), Pt = t.object({
816
936
  created_at: t.string(),
817
937
  updated_at: t.string(),
818
938
  authenticated_at: t.string(),
819
939
  last_interaction_at: t.string(),
820
- ...pt.shape
821
- }), Bt = t.object({
940
+ ...ct.shape
941
+ }), vt = t.object({
822
942
  kid: t.string().openapi({ description: "The key id of the signing key" }),
823
943
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
824
944
  fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
@@ -839,7 +959,7 @@ const rt = t.enum([
839
959
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
840
960
  });
841
961
  var dt = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", e))(dt || {});
842
- const Ht = t.object({
962
+ const Mt = t.object({
843
963
  access_token: t.string(),
844
964
  id_token: t.string().optional(),
845
965
  scope: t.string().optional(),
@@ -852,7 +972,7 @@ t.object({
852
972
  code: t.string(),
853
973
  state: t.string().optional()
854
974
  });
855
- const gt = t.object({
975
+ const pt = t.object({
856
976
  button_border_radius: t.number(),
857
977
  button_border_weight: t.number(),
858
978
  buttons_style: t.enum(["pill"]),
@@ -862,7 +982,7 @@ const gt = t.object({
862
982
  show_widget_shadow: t.boolean(),
863
983
  widget_border_weight: t.number(),
864
984
  widget_corner_radius: t.number()
865
- }), ut = t.object({
985
+ }), gt = t.object({
866
986
  base_focus_color: t.string(),
867
987
  base_hover_color: t.string(),
868
988
  body_text: t.string(),
@@ -885,7 +1005,7 @@ const gt = t.object({
885
1005
  }), n = t.object({
886
1006
  bold: t.boolean(),
887
1007
  size: t.number()
888
- }), _t = t.object({
1008
+ }), Et = t.object({
889
1009
  body_text: n,
890
1010
  buttons_text: n,
891
1011
  font_url: t.string(),
@@ -895,31 +1015,31 @@ const gt = t.object({
895
1015
  reference_text_size: t.number(),
896
1016
  subtitle: n,
897
1017
  title: n
898
- }), mt = t.object({
1018
+ }), ut = t.object({
899
1019
  background_color: t.string(),
900
1020
  background_image_url: t.string(),
901
1021
  page_layout: t.enum(["center"])
902
- }), ht = t.object({
1022
+ }), St = t.object({
903
1023
  header_text_alignment: t.enum(["center"]),
904
1024
  logo_height: t.number(),
905
1025
  logo_position: t.enum(["center"]),
906
1026
  logo_url: t.string(),
907
1027
  social_buttons_layout: t.enum(["bottom"])
908
- }), bt = t.object({
909
- borders: gt,
910
- colors: ut,
1028
+ }), mt = t.object({
1029
+ borders: pt,
1030
+ colors: gt,
911
1031
  displayName: t.string(),
912
- fonts: _t,
913
- page_background: mt,
914
- widget: ht
915
- }), Ft = bt.extend({
1032
+ fonts: Et,
1033
+ page_background: ut,
1034
+ widget: St
1035
+ }), Gt = mt.extend({
916
1036
  themeId: t.string()
917
- }), Kt = t.object({
1037
+ }), xt = t.object({
918
1038
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
919
1039
  identifier_first: t.boolean().default(!0),
920
1040
  password_first: t.boolean().default(!1),
921
1041
  webauthn_platform_first_factor: t.boolean()
922
- }), Mt = t.object({
1042
+ }), Kt = t.object({
923
1043
  name: t.string(),
924
1044
  enabled: t.boolean().optional().default(!0),
925
1045
  default_from_address: t.string().optional(),
@@ -949,7 +1069,7 @@ const gt = t.object({
949
1069
  })
950
1070
  ]),
951
1071
  settings: t.object({}).optional()
952
- }), ft = t.object({
1072
+ }), At = t.object({
953
1073
  // The actual refresh token value (primary key).
954
1074
  id: t.string(),
955
1075
  // Link to the session record
@@ -962,7 +1082,7 @@ const gt = t.object({
962
1082
  idle_expires_at: t.string().optional(),
963
1083
  // When the token was last used.
964
1084
  last_exchanged_at: t.string().optional(),
965
- device: b,
1085
+ device: m,
966
1086
  resource_servers: t.array(
967
1087
  t.object({
968
1088
  audience: t.string(),
@@ -970,106 +1090,106 @@ const gt = t.object({
970
1090
  })
971
1091
  ),
972
1092
  rotating: t.boolean()
973
- }), Gt = t.object({
1093
+ }), Bt = t.object({
974
1094
  // When the refresh token record was created.
975
1095
  created_at: t.string(),
976
1096
  // Spread in the rest of the refresh token properties.
977
- ...ft.shape
1097
+ ...At.shape
978
1098
  }), Xt = t.object({
979
1099
  to: t.string(),
980
1100
  message: t.string()
981
- }), Wt = t.object({
1101
+ }), Vt = t.object({
982
1102
  name: t.string(),
983
1103
  options: t.object({})
984
1104
  });
985
- function qt(e) {
1105
+ function Wt(e) {
986
1106
  const [o, a] = e.split("|");
987
1107
  if (!o || !a)
988
1108
  throw new Error(`Invalid user_id: ${e}`);
989
1109
  return { connection: o, id: a };
990
1110
  }
991
1111
  export {
992
- lt as Auth0Client,
993
- u as AuthorizationResponseMode,
994
- g as AuthorizationResponseType,
995
- _ as CodeChallengeMethod,
1112
+ _t as Auth0Client,
1113
+ g as AuthorizationResponseMode,
1114
+ p as AuthorizationResponseType,
1115
+ E as CodeChallengeMethod,
996
1116
  d as ComponentCategory,
997
- p as ComponentType,
1117
+ c as ComponentType,
998
1118
  dt as GrantType,
999
1119
  st as LogTypes,
1000
- D as NodeType,
1001
- C as applicationInsertSchema,
1002
- k as applicationSchema,
1003
- It as auth0FlowInsertSchema,
1004
- F as auth0FlowSchema,
1005
- jt as auth0UserResponseSchema,
1006
- K as authParamsSchema,
1007
- c as baseUserSchema,
1008
- gt as bordersSchema,
1009
- wt as brandingSchema,
1010
- T as buttonComponentSchema,
1011
- z as codeInsertSchema,
1012
- kt as codeSchema,
1013
- V as codeTypeSchema,
1014
- ut as colorsSchema,
1015
- U as componentSchema,
1016
- G as connectionInsertSchema,
1017
- M as connectionOptionsSchema,
1120
+ j as NodeType,
1121
+ N as applicationInsertSchema,
1122
+ T as applicationSchema,
1123
+ Ot as auth0FlowInsertSchema,
1124
+ G as auth0FlowSchema,
1125
+ Ct as auth0UserResponseSchema,
1126
+ x as authParamsSchema,
1127
+ l as baseUserSchema,
1128
+ pt as bordersSchema,
1129
+ ft as brandingSchema,
1130
+ L as buttonComponentSchema,
1131
+ q as codeInsertSchema,
1132
+ Tt as codeSchema,
1133
+ Y as codeTypeSchema,
1134
+ gt as colorsSchema,
1135
+ F as componentSchema,
1136
+ B as connectionInsertSchema,
1137
+ K as connectionOptionsSchema,
1018
1138
  X as connectionSchema,
1019
1139
  i as coordinatesSchema,
1020
1140
  Q as customDomainInsertSchema,
1021
- J as customDomainSchema,
1022
- Ot as customDomainWithTenantIdSchema,
1023
- Mt as emailProviderSchema,
1024
- H as endingSchema,
1025
- A as fieldComponentSchema,
1026
- R as flowNodeSchema,
1141
+ Z as customDomainSchema,
1142
+ Rt as customDomainWithTenantIdSchema,
1143
+ Kt as emailProviderSchema,
1144
+ M as endingSchema,
1145
+ U as fieldComponentSchema,
1146
+ k as flowNodeSchema,
1027
1147
  n as fontDetailsSchema,
1028
- _t as fontsSchema,
1029
- Tt as formControlSchema,
1148
+ Et as fontsSchema,
1149
+ Lt as formControlSchema,
1030
1150
  $ as formInsertSchema,
1031
- Z as formNodeComponentDefinition,
1032
- vt as formSchema,
1033
- N as genericComponentSchema,
1034
- P as genericNodeSchema,
1035
- At as hookInsertSchema,
1036
- Nt as hookSchema,
1037
- S as identitySchema,
1038
- Ut as jwksKeySchema,
1151
+ J as formNodeComponentDefinition,
1152
+ Dt as formSchema,
1153
+ y as genericComponentSchema,
1154
+ H as genericNodeSchema,
1155
+ Ut as hookInsertSchema,
1156
+ yt as hookSchema,
1157
+ h as identitySchema,
1158
+ Ft as jwksKeySchema,
1039
1159
  it as jwksSchema,
1040
- v as legalComponentSchema,
1041
- Rt as logSchema,
1160
+ D as legalComponentSchema,
1161
+ kt as logSchema,
1042
1162
  at as loginSessionInsertSchema,
1043
- xt as loginSessionSchema,
1044
- L as nodeSchema,
1045
- Dt as openIDConfigurationSchema,
1046
- mt as pageBackgroundSchema,
1047
- qt as parseUserId,
1048
- ct as passwordInsertSchema,
1049
- Pt as passwordSchema,
1050
- f as profileDataSchema,
1051
- Kt as promptSettingSchema,
1052
- ft as refreshTokenInsertSchema,
1053
- Gt as refreshTokenSchema,
1054
- O as richTextComponentSchema,
1055
- w as samlpAddon,
1056
- pt as sessionInsertSchema,
1057
- Lt as sessionSchema,
1058
- Bt as signingKeySchema,
1059
- Wt as smsProviderSchema,
1163
+ wt as loginSessionSchema,
1164
+ P as nodeSchema,
1165
+ jt as openIDConfigurationSchema,
1166
+ ut as pageBackgroundSchema,
1167
+ Wt as parseUserId,
1168
+ lt as passwordInsertSchema,
1169
+ Ht as passwordSchema,
1170
+ A as profileDataSchema,
1171
+ xt as promptSettingSchema,
1172
+ At as refreshTokenInsertSchema,
1173
+ Bt as refreshTokenSchema,
1174
+ R as richTextComponentSchema,
1175
+ f as samlpAddon,
1176
+ ct as sessionInsertSchema,
1177
+ Pt as sessionSchema,
1178
+ vt as signingKeySchema,
1179
+ Vt as smsProviderSchema,
1060
1180
  Xt as smsSendParamsSchema,
1061
- B as startSchema,
1062
- x as stepNodeSchema,
1063
- W as tenantInsertSchema,
1064
- q as tenantSchema,
1065
- bt as themeInsertSchema,
1066
- Ft as themeSchema,
1067
- Ht as tokenResponseSchema,
1068
- Et as totalsSchema,
1069
- E as userInsertSchema,
1070
- yt as userResponseSchema,
1071
- j as userSchema,
1072
- Ct as vendorSettingsSchema,
1073
- Y as verificationMethodsSchema,
1074
- ht as widgetSchema
1181
+ v as startSchema,
1182
+ w as stepNodeSchema,
1183
+ V as tenantInsertSchema,
1184
+ W as tenantSchema,
1185
+ mt as themeInsertSchema,
1186
+ Gt as themeSchema,
1187
+ Mt as tokenResponseSchema,
1188
+ bt as totalsSchema,
1189
+ b as userInsertSchema,
1190
+ It as userResponseSchema,
1191
+ C as userSchema,
1192
+ Nt as vendorSettingsSchema,
1193
+ z as verificationMethodsSchema,
1194
+ St as widgetSchema
1075
1195
  };