@authhero/adapter-interfaces 0.72.0 → 0.74.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +159 -84
- package/dist/adapter-interfaces.mjs +369 -249
- package/package.json +1 -1
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
import { z as t } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const bt = t.object({
|
|
3
3
|
start: t.number(),
|
|
4
4
|
limit: t.number(),
|
|
5
5
|
length: t.number()
|
|
6
6
|
}), s = t.object({
|
|
7
7
|
created_at: t.string(),
|
|
8
8
|
updated_at: t.string()
|
|
9
|
-
}),
|
|
9
|
+
}), A = t.object({
|
|
10
10
|
email: t.string().optional(),
|
|
11
11
|
email_verified: t.boolean().optional(),
|
|
12
12
|
name: t.string().optional(),
|
|
@@ -15,7 +15,7 @@ const Et = t.object({
|
|
|
15
15
|
phone_number: t.string().optional(),
|
|
16
16
|
phone_verified: t.boolean().optional(),
|
|
17
17
|
family_name: t.string().optional()
|
|
18
|
-
}).catchall(t.any()),
|
|
18
|
+
}).catchall(t.any()), h = t.object({
|
|
19
19
|
connection: t.string(),
|
|
20
20
|
user_id: t.string(),
|
|
21
21
|
provider: t.string(),
|
|
@@ -23,8 +23,8 @@ const Et = t.object({
|
|
|
23
23
|
access_token: t.string().optional(),
|
|
24
24
|
access_token_secret: t.string().optional(),
|
|
25
25
|
refresh_token: t.string().optional(),
|
|
26
|
-
profileData:
|
|
27
|
-
}),
|
|
26
|
+
profileData: A.optional()
|
|
27
|
+
}), l = t.object({
|
|
28
28
|
email: t.string().optional().transform((e) => e && e.toLowerCase()),
|
|
29
29
|
username: t.string().optional(),
|
|
30
30
|
phone_number: t.string().optional(),
|
|
@@ -39,7 +39,7 @@ const Et = t.object({
|
|
|
39
39
|
user_id: t.string().optional(),
|
|
40
40
|
app_metadata: t.any().default({}).optional(),
|
|
41
41
|
user_metadata: t.any().default({}).optional()
|
|
42
|
-
}),
|
|
42
|
+
}), b = l.extend({
|
|
43
43
|
email_verified: t.boolean().default(!1),
|
|
44
44
|
verify_email: t.boolean().optional(),
|
|
45
45
|
last_ip: t.string().optional(),
|
|
@@ -48,28 +48,28 @@ const Et = t.object({
|
|
|
48
48
|
provider: t.string().default("email"),
|
|
49
49
|
connection: t.string().default("email"),
|
|
50
50
|
is_social: t.boolean().optional()
|
|
51
|
-
}),
|
|
52
|
-
...
|
|
51
|
+
}), C = t.object({
|
|
52
|
+
...b.shape,
|
|
53
53
|
...s.shape,
|
|
54
54
|
user_id: t.string(),
|
|
55
55
|
is_social: t.boolean(),
|
|
56
56
|
email: t.string().optional(),
|
|
57
57
|
login_count: t.number().default(0),
|
|
58
|
-
identities: t.array(
|
|
59
|
-
}),
|
|
58
|
+
identities: t.array(h).optional()
|
|
59
|
+
}), Ct = C, It = l.extend({
|
|
60
60
|
login_count: t.number(),
|
|
61
61
|
multifactor: t.array(t.string()).optional(),
|
|
62
62
|
last_ip: t.string().optional(),
|
|
63
63
|
last_login: t.string().optional(),
|
|
64
64
|
user_id: t.string()
|
|
65
|
-
}).catchall(t.any()),
|
|
66
|
-
let
|
|
65
|
+
}).catchall(t.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
66
|
+
let O = (e = 21) => {
|
|
67
67
|
let o = "", a = crypto.getRandomValues(new Uint8Array(e));
|
|
68
68
|
for (; e--; )
|
|
69
|
-
o +=
|
|
69
|
+
o += I[a[e] & 63];
|
|
70
70
|
return o;
|
|
71
71
|
};
|
|
72
|
-
const
|
|
72
|
+
const f = t.object({
|
|
73
73
|
audience: t.string().optional(),
|
|
74
74
|
recipient: t.string().optional(),
|
|
75
75
|
createUpnClaim: t.boolean().optional(),
|
|
@@ -86,7 +86,7 @@ const w = t.object({
|
|
|
86
86
|
nameIdentifierProbes: t.array(t.string()).optional(),
|
|
87
87
|
authnContextClassRef: t.string().optional(),
|
|
88
88
|
mappings: t.record(t.string()).optional()
|
|
89
|
-
}),
|
|
89
|
+
}), N = t.object({
|
|
90
90
|
id: t.string(),
|
|
91
91
|
name: t.string(),
|
|
92
92
|
callbacks: t.array(t.string()).default([]).optional().openapi({
|
|
@@ -105,31 +105,31 @@ const w = t.object({
|
|
|
105
105
|
description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
|
|
106
106
|
}),
|
|
107
107
|
addons: t.object({
|
|
108
|
-
samlp:
|
|
108
|
+
samlp: f.optional()
|
|
109
109
|
}).default({}).optional().openapi({
|
|
110
110
|
description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
|
|
111
111
|
}),
|
|
112
112
|
email_validation: t.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
|
|
113
113
|
description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
|
|
114
114
|
}),
|
|
115
|
-
client_secret: t.string().default(() =>
|
|
115
|
+
client_secret: t.string().default(() => O()).optional(),
|
|
116
116
|
disable_sign_ups: t.boolean().optional().default(!1).openapi({
|
|
117
117
|
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
118
118
|
})
|
|
119
|
-
}),
|
|
119
|
+
}), T = t.object({
|
|
120
120
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
121
121
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
122
|
-
...
|
|
122
|
+
...N.shape
|
|
123
123
|
}), i = t.object({
|
|
124
124
|
x: t.number(),
|
|
125
125
|
y: t.number()
|
|
126
126
|
});
|
|
127
|
-
var
|
|
127
|
+
var c = /* @__PURE__ */ ((e) => (e.RICH_TEXT = "RICH_TEXT", e.NEXT_BUTTON = "NEXT_BUTTON", e.BACK_BUTTON = "BACK_BUTTON", e.SUBMIT_BUTTON = "SUBMIT_BUTTON", e.DIVIDER = "DIVIDER", e.TEXT = "TEXT", e.EMAIL = "EMAIL", e.PASSWORD = "PASSWORD", e.NUMBER = "NUMBER", e.PHONE = "PHONE", e.DATE = "DATE", e.CHECKBOX = "CHECKBOX", e.RADIO = "RADIO", e.SELECT = "SELECT", e.HIDDEN = "HIDDEN", e.LEGAL = "LEGAL", e))(c || {}), d = /* @__PURE__ */ ((e) => (e.BLOCK = "BLOCK", e.FIELD = "FIELD", e))(d || {});
|
|
128
128
|
const r = t.object({
|
|
129
129
|
id: t.string(),
|
|
130
130
|
category: t.nativeEnum(d),
|
|
131
|
-
type: t.nativeEnum(
|
|
132
|
-
}),
|
|
131
|
+
type: t.nativeEnum(c)
|
|
132
|
+
}), R = r.extend({
|
|
133
133
|
category: t.literal(
|
|
134
134
|
"BLOCK"
|
|
135
135
|
/* BLOCK */
|
|
@@ -141,7 +141,7 @@ const r = t.object({
|
|
|
141
141
|
config: t.object({
|
|
142
142
|
content: t.string()
|
|
143
143
|
}).passthrough()
|
|
144
|
-
}),
|
|
144
|
+
}), L = r.extend({
|
|
145
145
|
category: t.literal(
|
|
146
146
|
"BLOCK"
|
|
147
147
|
/* BLOCK */
|
|
@@ -163,7 +163,7 @@ const r = t.object({
|
|
|
163
163
|
config: t.object({
|
|
164
164
|
text: t.string()
|
|
165
165
|
}).passthrough()
|
|
166
|
-
}),
|
|
166
|
+
}), D = r.extend({
|
|
167
167
|
category: t.literal(
|
|
168
168
|
"FIELD"
|
|
169
169
|
/* FIELD */
|
|
@@ -177,7 +177,7 @@ const r = t.object({
|
|
|
177
177
|
config: t.object({
|
|
178
178
|
text: t.string()
|
|
179
179
|
}).passthrough()
|
|
180
|
-
}),
|
|
180
|
+
}), U = r.extend({
|
|
181
181
|
category: t.literal(
|
|
182
182
|
"FIELD"
|
|
183
183
|
/* FIELD */
|
|
@@ -230,19 +230,19 @@ const r = t.object({
|
|
|
230
230
|
label: t.string().optional(),
|
|
231
231
|
placeholder: t.string().optional()
|
|
232
232
|
}).passthrough()
|
|
233
|
-
}),
|
|
233
|
+
}), y = t.object({
|
|
234
234
|
id: t.string(),
|
|
235
235
|
category: t.string(),
|
|
236
236
|
type: t.string()
|
|
237
|
-
}).passthrough(),
|
|
238
|
-
|
|
239
|
-
|
|
240
|
-
|
|
241
|
-
|
|
242
|
-
|
|
237
|
+
}).passthrough(), F = t.union([
|
|
238
|
+
R,
|
|
239
|
+
L,
|
|
240
|
+
D,
|
|
241
|
+
U,
|
|
242
|
+
y
|
|
243
243
|
]);
|
|
244
|
-
var
|
|
245
|
-
const
|
|
244
|
+
var j = /* @__PURE__ */ ((e) => (e.STEP = "STEP", e.FLOW = "FLOW", e.CONDITION = "CONDITION", e.ACTION = "ACTION", e))(j || {});
|
|
245
|
+
const w = t.object({
|
|
246
246
|
id: t.string(),
|
|
247
247
|
type: t.literal(
|
|
248
248
|
"STEP"
|
|
@@ -251,10 +251,10 @@ const x = t.object({
|
|
|
251
251
|
coordinates: i,
|
|
252
252
|
alias: t.string().optional(),
|
|
253
253
|
config: t.object({
|
|
254
|
-
components: t.array(
|
|
254
|
+
components: t.array(F),
|
|
255
255
|
next_node: t.string()
|
|
256
256
|
}).passthrough()
|
|
257
|
-
}),
|
|
257
|
+
}), k = t.object({
|
|
258
258
|
id: t.string(),
|
|
259
259
|
type: t.literal(
|
|
260
260
|
"FLOW"
|
|
@@ -266,46 +266,46 @@ const x = t.object({
|
|
|
266
266
|
flow_id: t.string(),
|
|
267
267
|
next_node: t.string()
|
|
268
268
|
})
|
|
269
|
-
}),
|
|
269
|
+
}), H = t.object({
|
|
270
270
|
id: t.string(),
|
|
271
271
|
type: t.string(),
|
|
272
272
|
coordinates: i
|
|
273
|
-
}).passthrough(),
|
|
274
|
-
|
|
275
|
-
|
|
276
|
-
|
|
277
|
-
]),
|
|
273
|
+
}).passthrough(), P = t.union([
|
|
274
|
+
w,
|
|
275
|
+
k,
|
|
276
|
+
H
|
|
277
|
+
]), v = t.object({
|
|
278
278
|
next_node: t.string(),
|
|
279
279
|
coordinates: i
|
|
280
|
-
}).passthrough(),
|
|
280
|
+
}).passthrough(), M = t.object({
|
|
281
281
|
resume_flow: t.boolean().optional(),
|
|
282
282
|
coordinates: i
|
|
283
|
-
}).passthrough(),
|
|
283
|
+
}).passthrough(), G = t.object({
|
|
284
284
|
id: t.string(),
|
|
285
285
|
name: t.string(),
|
|
286
286
|
languages: t.object({
|
|
287
287
|
primary: t.string()
|
|
288
288
|
}).passthrough(),
|
|
289
|
-
nodes: t.array(
|
|
290
|
-
start:
|
|
291
|
-
ending:
|
|
289
|
+
nodes: t.array(P),
|
|
290
|
+
start: v,
|
|
291
|
+
ending: M,
|
|
292
292
|
created_at: t.string(),
|
|
293
293
|
updated_at: t.string(),
|
|
294
294
|
links: t.object({
|
|
295
295
|
sdkSrc: t.string().optional(),
|
|
296
296
|
sdk_src: t.string().optional()
|
|
297
297
|
}).passthrough()
|
|
298
|
-
}).passthrough(),
|
|
298
|
+
}).passthrough(), Ot = G.omit({
|
|
299
299
|
id: !0,
|
|
300
300
|
created_at: !0,
|
|
301
301
|
updated_at: !0
|
|
302
302
|
});
|
|
303
|
-
var
|
|
304
|
-
const
|
|
303
|
+
var p = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(p || {}), g = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(g || {}), E = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(E || {});
|
|
304
|
+
const x = t.object({
|
|
305
305
|
client_id: t.string(),
|
|
306
306
|
act_as: t.string().optional(),
|
|
307
|
-
response_type: t.nativeEnum(
|
|
308
|
-
response_mode: t.nativeEnum(
|
|
307
|
+
response_type: t.nativeEnum(p).optional(),
|
|
308
|
+
response_mode: t.nativeEnum(g).optional(),
|
|
309
309
|
redirect_uri: t.string().optional(),
|
|
310
310
|
audience: t.string().optional(),
|
|
311
311
|
organization: t.string().optional(),
|
|
@@ -313,13 +313,13 @@ const K = t.object({
|
|
|
313
313
|
nonce: t.string().optional(),
|
|
314
314
|
scope: t.string().optional(),
|
|
315
315
|
prompt: t.string().optional(),
|
|
316
|
-
code_challenge_method: t.nativeEnum(
|
|
316
|
+
code_challenge_method: t.nativeEnum(E).optional(),
|
|
317
317
|
code_challenge: t.string().optional(),
|
|
318
318
|
username: t.string().optional(),
|
|
319
319
|
ui_locales: t.string().optional(),
|
|
320
320
|
// The following fields are not available in Auth0
|
|
321
321
|
vendor_id: t.string().optional()
|
|
322
|
-
}),
|
|
322
|
+
}), ft = t.object({
|
|
323
323
|
colors: t.object({
|
|
324
324
|
primary: t.string(),
|
|
325
325
|
page_background: t.object({
|
|
@@ -334,7 +334,7 @@ const K = t.object({
|
|
|
334
334
|
font: t.object({
|
|
335
335
|
url: t.string()
|
|
336
336
|
}).optional()
|
|
337
|
-
}),
|
|
337
|
+
}), K = t.object({
|
|
338
338
|
kid: t.string().optional(),
|
|
339
339
|
team_id: t.string().optional(),
|
|
340
340
|
realms: t.string().optional(),
|
|
@@ -353,11 +353,11 @@ const K = t.object({
|
|
|
353
353
|
from: t.string().optional(),
|
|
354
354
|
twilio_sid: t.string().optional(),
|
|
355
355
|
twilio_token: t.string().optional()
|
|
356
|
-
}),
|
|
356
|
+
}), B = t.object({
|
|
357
357
|
id: t.string().optional(),
|
|
358
358
|
name: t.string(),
|
|
359
359
|
strategy: t.string(),
|
|
360
|
-
options:
|
|
360
|
+
options: K.default({}),
|
|
361
361
|
enabled_clients: t.array(t.string()).default([]).optional(),
|
|
362
362
|
response_type: t.custom().optional(),
|
|
363
363
|
response_mode: t.custom().optional()
|
|
@@ -365,7 +365,7 @@ const K = t.object({
|
|
|
365
365
|
id: t.string(),
|
|
366
366
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
367
367
|
updated_at: t.string().transform((e) => e === null ? "" : e)
|
|
368
|
-
}).extend(
|
|
368
|
+
}).extend(B.shape), V = t.object({
|
|
369
369
|
name: t.string(),
|
|
370
370
|
audience: t.string(),
|
|
371
371
|
sender_email: t.string().email(),
|
|
@@ -376,12 +376,12 @@ const K = t.object({
|
|
|
376
376
|
secondary_color: t.string().optional(),
|
|
377
377
|
language: t.string().optional(),
|
|
378
378
|
id: t.string().optional()
|
|
379
|
-
}),
|
|
379
|
+
}), W = t.object({
|
|
380
380
|
created_at: t.string().transform((e) => e === null ? "" : e),
|
|
381
381
|
updated_at: t.string().transform((e) => e === null ? "" : e),
|
|
382
|
-
...
|
|
382
|
+
...V.shape,
|
|
383
383
|
id: t.string()
|
|
384
|
-
}),
|
|
384
|
+
}), Nt = t.object({
|
|
385
385
|
logoUrl: t.string(),
|
|
386
386
|
loginBackgroundImage: t.string().nullish(),
|
|
387
387
|
style: t.object({
|
|
@@ -389,6 +389,7 @@ const K = t.object({
|
|
|
389
389
|
buttonTextColor: t.string(),
|
|
390
390
|
primaryHoverColor: t.string()
|
|
391
391
|
}),
|
|
392
|
+
country: t.string().optional(),
|
|
392
393
|
supportEmail: t.string().nullable(),
|
|
393
394
|
supportUrl: t.string().nullable(),
|
|
394
395
|
name: t.string(),
|
|
@@ -400,18 +401,18 @@ const K = t.object({
|
|
|
400
401
|
manageSubscriptionsUrl: t.string().optional()
|
|
401
402
|
});
|
|
402
403
|
t.object({
|
|
403
|
-
...
|
|
404
|
-
tenant:
|
|
404
|
+
...T.shape,
|
|
405
|
+
tenant: W,
|
|
405
406
|
connections: t.array(X)
|
|
406
407
|
});
|
|
407
|
-
const
|
|
408
|
+
const Y = t.enum([
|
|
408
409
|
"password_reset",
|
|
409
410
|
"email_verification",
|
|
410
411
|
"otp",
|
|
411
412
|
"authorization_code",
|
|
412
413
|
"oauth2_state",
|
|
413
414
|
"ticket"
|
|
414
|
-
]),
|
|
415
|
+
]), q = t.object({
|
|
415
416
|
code_id: t.string().openapi({
|
|
416
417
|
description: "The code that will be used in for instance an email verification flow"
|
|
417
418
|
}),
|
|
@@ -421,7 +422,7 @@ const V = t.enum([
|
|
|
421
422
|
connection_id: t.string().optional().openapi({
|
|
422
423
|
description: "The connection that the code is connected to"
|
|
423
424
|
}),
|
|
424
|
-
code_type:
|
|
425
|
+
code_type: Y,
|
|
425
426
|
code_verifier: t.string().optional().openapi({
|
|
426
427
|
description: "The code verifier used in PKCE in outbound flows"
|
|
427
428
|
}),
|
|
@@ -443,8 +444,8 @@ const V = t.enum([
|
|
|
443
444
|
expires_at: t.string(),
|
|
444
445
|
used_at: t.string().optional(),
|
|
445
446
|
user_id: t.string().optional()
|
|
446
|
-
}),
|
|
447
|
-
...
|
|
447
|
+
}), Tt = t.object({
|
|
448
|
+
...q.shape,
|
|
448
449
|
created_at: t.string()
|
|
449
450
|
}), Q = t.object({
|
|
450
451
|
domain: t.string(),
|
|
@@ -460,23 +461,23 @@ const V = t.enum([
|
|
|
460
461
|
"null"
|
|
461
462
|
]).optional(),
|
|
462
463
|
domain_metadata: t.record(t.string().max(255)).optional()
|
|
463
|
-
}),
|
|
464
|
+
}), z = t.object({
|
|
464
465
|
name: t.literal("txt"),
|
|
465
466
|
record: t.string(),
|
|
466
467
|
domain: t.string()
|
|
467
|
-
}),
|
|
468
|
+
}), Z = t.object({
|
|
468
469
|
...Q.shape,
|
|
469
470
|
custom_domain_id: t.string(),
|
|
470
471
|
primary: t.boolean(),
|
|
471
472
|
status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
|
|
472
473
|
origin_domain_name: t.string().optional(),
|
|
473
474
|
verification: t.object({
|
|
474
|
-
methods: t.array(
|
|
475
|
+
methods: t.array(z)
|
|
475
476
|
}).optional(),
|
|
476
477
|
tls_policy: t.string().optional()
|
|
477
|
-
}),
|
|
478
|
+
}), Rt = Z.extend({
|
|
478
479
|
tenant_id: t.string()
|
|
479
|
-
}),
|
|
480
|
+
}), Lt = t.object({
|
|
480
481
|
id: t.string(),
|
|
481
482
|
type: t.literal("submit"),
|
|
482
483
|
label: t.string(),
|
|
@@ -485,7 +486,7 @@ const V = t.enum([
|
|
|
485
486
|
order: t.number().optional(),
|
|
486
487
|
visible: t.boolean().optional().default(!0),
|
|
487
488
|
customizations: t.record(t.string(), t.any()).optional()
|
|
488
|
-
}),
|
|
489
|
+
}), J = t.discriminatedUnion("type", [
|
|
489
490
|
t.object({
|
|
490
491
|
id: t.string(),
|
|
491
492
|
type: t.literal("RICH_TEXT"),
|
|
@@ -579,7 +580,7 @@ const V = t.enum([
|
|
|
579
580
|
coordinates: t.object({ x: t.number(), y: t.number() }),
|
|
580
581
|
alias: t.string().min(1).max(150).optional(),
|
|
581
582
|
config: t.object({
|
|
582
|
-
components: t.array(
|
|
583
|
+
components: t.array(J),
|
|
583
584
|
next_node: t.string()
|
|
584
585
|
})
|
|
585
586
|
})
|
|
@@ -602,48 +603,48 @@ const V = t.enum([
|
|
|
602
603
|
style: t.object({ css: t.string().optional() }).optional()
|
|
603
604
|
}).openapi({
|
|
604
605
|
description: "Schema for flow-based forms (matches new JSON structure)"
|
|
605
|
-
}),
|
|
606
|
+
}), Dt = t.object({
|
|
606
607
|
...s.shape,
|
|
607
608
|
...$.shape,
|
|
608
609
|
id: t.string()
|
|
609
|
-
}),
|
|
610
|
+
}), u = t.enum([
|
|
610
611
|
"pre-user-signup",
|
|
611
612
|
"post-user-registration",
|
|
612
613
|
"post-user-login"
|
|
613
614
|
// Potentially other triggers specific to webhooks in the future
|
|
614
|
-
]),
|
|
615
|
+
]), S = t.enum([
|
|
615
616
|
"pre-user-signup",
|
|
616
617
|
"post-user-registration",
|
|
617
618
|
"post-user-login"
|
|
618
|
-
]),
|
|
619
|
+
]), _ = {
|
|
619
620
|
enabled: t.boolean().default(!1),
|
|
620
621
|
synchronous: t.boolean().default(!1),
|
|
621
622
|
priority: t.number().optional(),
|
|
622
623
|
hook_id: t.string().optional()
|
|
623
624
|
}, tt = t.object({
|
|
624
|
-
...
|
|
625
|
-
trigger_id:
|
|
625
|
+
..._,
|
|
626
|
+
trigger_id: u,
|
|
626
627
|
url: t.string()
|
|
627
628
|
}), et = t.object({
|
|
628
|
-
...
|
|
629
|
-
trigger_id:
|
|
629
|
+
..._,
|
|
630
|
+
trigger_id: S,
|
|
630
631
|
form_id: t.string()
|
|
631
|
-
}),
|
|
632
|
+
}), Ut = t.union([
|
|
632
633
|
tt,
|
|
633
634
|
et
|
|
634
635
|
]), nt = t.object({
|
|
635
|
-
...
|
|
636
|
-
trigger_id:
|
|
636
|
+
..._,
|
|
637
|
+
trigger_id: u,
|
|
637
638
|
...s.shape,
|
|
638
639
|
hook_id: t.string(),
|
|
639
640
|
url: t.string()
|
|
640
641
|
}), ot = t.object({
|
|
641
|
-
...
|
|
642
|
-
trigger_id:
|
|
642
|
+
..._,
|
|
643
|
+
trigger_id: S,
|
|
643
644
|
...s.shape,
|
|
644
645
|
hook_id: t.string(),
|
|
645
646
|
form_id: t.string()
|
|
646
|
-
}),
|
|
647
|
+
}), yt = t.union([nt, ot]), it = t.object({
|
|
647
648
|
alg: t.enum([
|
|
648
649
|
"RS256",
|
|
649
650
|
"RS384",
|
|
@@ -662,9 +663,9 @@ const V = t.enum([
|
|
|
662
663
|
x5t: t.string().optional(),
|
|
663
664
|
x5c: t.array(t.string()).optional(),
|
|
664
665
|
use: t.enum(["sig", "enc"]).optional()
|
|
665
|
-
}),
|
|
666
|
+
}), Ft = t.object({
|
|
666
667
|
keys: t.array(it)
|
|
667
|
-
}),
|
|
668
|
+
}), jt = t.object({
|
|
668
669
|
issuer: t.string(),
|
|
669
670
|
authorization_endpoint: t.string(),
|
|
670
671
|
token_endpoint: t.string(),
|
|
@@ -688,7 +689,7 @@ const V = t.enum([
|
|
|
688
689
|
}), at = t.object({
|
|
689
690
|
csrf_token: t.string(),
|
|
690
691
|
auth0Client: t.string().optional(),
|
|
691
|
-
authParams:
|
|
692
|
+
authParams: x,
|
|
692
693
|
expires_at: t.string(),
|
|
693
694
|
deleted_at: t.string().optional(),
|
|
694
695
|
ip: t.string().optional(),
|
|
@@ -698,71 +699,190 @@ const V = t.enum([
|
|
|
698
699
|
login_completed: t.boolean().optional().default(!1)
|
|
699
700
|
}).openapi({
|
|
700
701
|
description: "This represents a login sesion"
|
|
701
|
-
}),
|
|
702
|
+
}), wt = t.object({
|
|
702
703
|
...at.shape,
|
|
703
704
|
id: t.string().openapi({
|
|
704
705
|
description: "This is is used as the state in the universal login"
|
|
705
706
|
}),
|
|
706
707
|
created_at: t.string(),
|
|
707
708
|
updated_at: t.string()
|
|
708
|
-
})
|
|
709
|
-
|
|
710
|
-
|
|
711
|
-
"
|
|
712
|
-
|
|
713
|
-
"
|
|
714
|
-
|
|
715
|
-
|
|
716
|
-
|
|
717
|
-
"
|
|
718
|
-
|
|
719
|
-
"
|
|
720
|
-
//
|
|
721
|
-
"
|
|
722
|
-
|
|
723
|
-
|
|
724
|
-
|
|
725
|
-
|
|
726
|
-
|
|
727
|
-
"
|
|
728
|
-
|
|
729
|
-
"
|
|
730
|
-
|
|
731
|
-
"
|
|
732
|
-
|
|
733
|
-
"
|
|
734
|
-
|
|
735
|
-
"
|
|
736
|
-
|
|
737
|
-
"
|
|
738
|
-
|
|
739
|
-
"
|
|
740
|
-
|
|
741
|
-
"
|
|
742
|
-
|
|
743
|
-
"
|
|
744
|
-
|
|
745
|
-
"
|
|
746
|
-
|
|
747
|
-
"
|
|
748
|
-
|
|
749
|
-
"
|
|
750
|
-
|
|
751
|
-
"
|
|
752
|
-
|
|
753
|
-
"
|
|
754
|
-
|
|
755
|
-
"
|
|
756
|
-
//
|
|
757
|
-
"
|
|
758
|
-
|
|
759
|
-
|
|
709
|
+
}), st = {
|
|
710
|
+
// Network & System
|
|
711
|
+
ACLS_SUMMARY: "acls_summary",
|
|
712
|
+
ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
|
|
713
|
+
API_LIMIT: "api_limit",
|
|
714
|
+
API_LIMIT_WARNING: "api_limit_warning",
|
|
715
|
+
APPI: "appi",
|
|
716
|
+
// CIBA (Client-Initiated Backchannel Authentication)
|
|
717
|
+
CIBA_EXCHANGE_FAILED: "ciba_exchange_failed",
|
|
718
|
+
CIBA_EXCHANGE_SUCCEEDED: "ciba_exchange_succeeded",
|
|
719
|
+
CIBA_START_FAILED: "ciba_start_failed",
|
|
720
|
+
CIBA_START_SUCCEEDED: "ciba_start_succeeded",
|
|
721
|
+
// Code/Link sending
|
|
722
|
+
CODE_LINK_SENT: "cls",
|
|
723
|
+
CODE_SENT: "cs",
|
|
724
|
+
// Deprecation & System notices
|
|
725
|
+
DEPRECATION_NOTICE: "depnote",
|
|
726
|
+
// Failed operations
|
|
727
|
+
FAILED_LOGIN: "f",
|
|
728
|
+
FAILED_BY_CONNECTOR: "fc",
|
|
729
|
+
FAILED_CHANGE_EMAIL: "fce",
|
|
730
|
+
FAILED_BY_CORS: "fco",
|
|
731
|
+
FAILED_CROSS_ORIGIN_AUTHENTICATION: "fcoa",
|
|
732
|
+
FAILED_CHANGE_PASSWORD: "fcp",
|
|
733
|
+
FAILED_POST_CHANGE_PASSWORD_HOOK: "fcph",
|
|
734
|
+
FAILED_CHANGE_PHONE_NUMBER: "fcpn",
|
|
735
|
+
FAILED_CHANGE_PASSWORD_REQUEST: "fcpr",
|
|
736
|
+
FAILED_CONNECTOR_PROVISIONING: "fcpro",
|
|
737
|
+
FAILED_CHANGE_USERNAME: "fcu",
|
|
738
|
+
FAILED_DELEGATION: "fd",
|
|
739
|
+
FAILED_DEVICE_ACTIVATION: "fdeac",
|
|
740
|
+
FAILED_DEVICE_AUTHORIZATION_REQUEST: "fdeaz",
|
|
741
|
+
USER_CANCELED_DEVICE_CONFIRMATION: "fdecc",
|
|
742
|
+
FAILED_USER_DELETION: "fdu",
|
|
743
|
+
FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN: "feacft",
|
|
744
|
+
FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS: "feccft",
|
|
745
|
+
FAILED_EXCHANGE_CUSTOM_TOKEN: "fecte",
|
|
746
|
+
FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN: "fede",
|
|
747
|
+
FAILED_FEDERATED_LOGOUT: "federated_logout_failed",
|
|
748
|
+
FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN: "fens",
|
|
749
|
+
FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN: "feoobft",
|
|
750
|
+
FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN: "feotpft",
|
|
751
|
+
FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN: "fepft",
|
|
752
|
+
FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN: "fepotpft",
|
|
753
|
+
FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN: "fercft",
|
|
754
|
+
FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN: "ferrt",
|
|
755
|
+
FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN: "fertft",
|
|
756
|
+
FAILED_HOOK: "fh",
|
|
757
|
+
// Custom AuthHero-specific
|
|
758
|
+
FAILED_INVITE_ACCEPT: "fi",
|
|
759
|
+
FAILED_LOGOUT: "flo",
|
|
760
|
+
FLOWS_EXECUTION_COMPLETED: "flows_execution_completed",
|
|
761
|
+
FLOWS_EXECUTION_FAILED: "flows_execution_failed",
|
|
762
|
+
FAILED_SENDING_NOTIFICATION: "fn",
|
|
763
|
+
FORMS_SUBMISSION_FAILED: "forms_submission_failed",
|
|
764
|
+
FORMS_SUBMISSION_SUCCEEDED: "forms_submission_succeeded",
|
|
765
|
+
FAILED_LOGIN_INCORRECT_PASSWORD: "fp",
|
|
766
|
+
FAILED_PUSHED_AUTHORIZATION_REQUEST: "fpar",
|
|
767
|
+
FAILED_POST_USER_REGISTRATION_HOOK: "fpurh",
|
|
768
|
+
FAILED_SIGNUP: "fs",
|
|
769
|
+
FAILED_SILENT_AUTH: "fsa",
|
|
770
|
+
FAILED_LOGIN_INVALID_EMAIL_USERNAME: "fu",
|
|
771
|
+
FAILED_USERS_IMPORT: "fui",
|
|
772
|
+
FAILED_VERIFICATION_EMAIL: "fv",
|
|
773
|
+
FAILED_VERIFICATION_EMAIL_REQUEST: "fvr",
|
|
774
|
+
// Guardian/MFA events
|
|
775
|
+
EMAIL_VERIFICATION_CONFIRMED: "gd_auth_email_verification",
|
|
776
|
+
EMAIL_VERIFICATION_FAILED: "gd_auth_fail_email_verification",
|
|
777
|
+
MFA_AUTH_FAILED: "gd_auth_failed",
|
|
778
|
+
MFA_AUTH_REJECTED: "gd_auth_rejected",
|
|
779
|
+
MFA_AUTH_SUCCESS: "gd_auth_succeed",
|
|
780
|
+
MFA_ENROLLMENT_COMPLETE: "gd_enrollment_complete",
|
|
781
|
+
TOO_MANY_MFA_FAILURES: "gd_otp_rate_limit_exceed",
|
|
782
|
+
MFA_RECOVERY_FAILED: "gd_recovery_failed",
|
|
783
|
+
MFA_RECOVERY_RATE_LIMIT_EXCEED: "gd_recovery_rate_limit_exceed",
|
|
784
|
+
MFA_RECOVERY_SUCCESS: "gd_recovery_succeed",
|
|
785
|
+
MFA_EMAIL_SENT: "gd_send_email",
|
|
786
|
+
EMAIL_VERIFICATION_SENT: "gd_send_email_verification",
|
|
787
|
+
EMAIL_VERIFICATION_SEND_FAILURE: "gd_send_email_verification_failure",
|
|
788
|
+
PUSH_NOTIFICATION_SENT: "gd_send_pn",
|
|
789
|
+
ERROR_SENDING_MFA_PUSH_NOTIFICATION: "gd_send_pn_failure",
|
|
790
|
+
MFA_SMS_SENT: "gd_send_sms",
|
|
791
|
+
ERROR_SENDING_MFA_SMS: "gd_send_sms_failure",
|
|
792
|
+
MFA_VOICE_CALL_SUCCESS: "gd_send_voice",
|
|
793
|
+
MFA_VOICE_CALL_FAILED: "gd_send_voice_failure",
|
|
794
|
+
SECOND_FACTOR_STARTED: "gd_start_auth",
|
|
795
|
+
MFA_ENROLL_STARTED: "gd_start_enroll",
|
|
796
|
+
MFA_ENROLLMENT_FAILED: "gd_start_enroll_failed",
|
|
797
|
+
GUARDIAN_TENANT_UPDATE: "gd_tenant_update",
|
|
798
|
+
UNENROLL_DEVICE_ACCOUNT: "gd_unenroll",
|
|
799
|
+
UPDATE_DEVICE_ACCOUNT: "gd_update_device_account",
|
|
800
|
+
WEBAUTHN_CHALLENGE_FAILED: "gd_webauthn_challenge_failed",
|
|
801
|
+
WEBAUTHN_ENROLLMENT_FAILED: "gd_webauthn_enrollment_failed",
|
|
802
|
+
// KMS operations
|
|
803
|
+
FAILED_KMS_API_OPERATION: "kms_key_management_failure",
|
|
804
|
+
SUCCESS_KMS_API_OPERATION: "kms_key_management_success",
|
|
805
|
+
KMS_KEY_STATE_CHANGED: "kms_key_state_changed",
|
|
806
|
+
// Rate limiting & blocking
|
|
807
|
+
TOO_MANY_CALLS_TO_DELEGATION: "limit_delegation",
|
|
808
|
+
BLOCKED_IP_ADDRESS: "limit_mu",
|
|
809
|
+
BLOCKED_ACCOUNT_IP: "limit_sul",
|
|
810
|
+
BLOCKED_ACCOUNT_EMAIL: "limit_wc",
|
|
811
|
+
// MFA & My Account
|
|
812
|
+
MFA_REQUIRED: "mfar",
|
|
813
|
+
MANAGEMENT_API_READ_OPERATION: "mgmt_api_read",
|
|
814
|
+
FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT: "my_account_authentication_method_failed",
|
|
815
|
+
SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT: "my_account_authentication_method_succeeded",
|
|
816
|
+
// OIDC operations
|
|
817
|
+
FAILED_OIDC_BACKCHANNEL_LOGOUT: "oidc_backchannel_logout_failed",
|
|
818
|
+
SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT: "oidc_backchannel_logout_succeeded",
|
|
819
|
+
// Organization
|
|
820
|
+
ORGANIZATION_MEMBER_ADDED: "organization_member_added",
|
|
821
|
+
// Passkey operations
|
|
822
|
+
PASSKEY_CHALLENGE_FAILED: "passkey_challenge_failed",
|
|
823
|
+
PASSKEY_CHALLENGE_STARTED: "passkey_challenge_started",
|
|
824
|
+
// Security & password events
|
|
825
|
+
PRE_LOGIN_ASSESSMENT: "pla",
|
|
826
|
+
BREACHED_PASSWORD: "pwd_leak",
|
|
827
|
+
BREACHED_PASSWORD_ON_RESET: "reset_pwd_leak",
|
|
828
|
+
SUCCESS_RESOURCE_CLEANUP: "resource_cleanup",
|
|
829
|
+
RICH_CONSENTS_ACCESS_ERROR: "rich_consents_access_error",
|
|
830
|
+
// Successful operations
|
|
831
|
+
SUCCESS_LOGIN: "s",
|
|
832
|
+
SUCCESS_API_OPERATION: "sapi",
|
|
833
|
+
SUCCESS_CHANGE_EMAIL: "sce",
|
|
834
|
+
SUCCESS_CROSS_ORIGIN_AUTHENTICATION: "scoa",
|
|
835
|
+
SUCCESS_CHANGE_PASSWORD: "scp",
|
|
836
|
+
SUCCESS_CHANGE_PHONE_NUMBER: "scpn",
|
|
837
|
+
SUCCESS_CHANGE_PASSWORD_REQUEST: "scpr",
|
|
838
|
+
SUCCESS_CHANGE_USERNAME: "scu",
|
|
839
|
+
SUCCESS_CREDENTIAL_VALIDATION: "scv",
|
|
840
|
+
SUCCESS_DELEGATION: "sd",
|
|
841
|
+
SUCCESS_USER_DELETION: "sdu",
|
|
842
|
+
SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN: "seacft",
|
|
843
|
+
SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS: "seccft",
|
|
844
|
+
SUCCESS_EXCHANGE_CUSTOM_TOKEN: "secte",
|
|
845
|
+
SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN: "sede",
|
|
846
|
+
SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN: "sens",
|
|
847
|
+
SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN: "seoobft",
|
|
848
|
+
SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN: "seotpft",
|
|
849
|
+
SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN: "sepft",
|
|
850
|
+
SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN: "sepkoobft",
|
|
851
|
+
SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN: "sepkotpft",
|
|
852
|
+
SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN: "sepkrcft",
|
|
853
|
+
SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN: "sercft",
|
|
854
|
+
SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN: "sertft",
|
|
855
|
+
SUCCESSFULLY_ACCEPTED_USER_INVITE: "si",
|
|
856
|
+
BREACHED_PASSWORD_ON_SIGNUP: "signup_pwd_leak",
|
|
857
|
+
SUCCESS_LOGOUT: "slo",
|
|
858
|
+
SUCCESS_REVOCATION: "srrt",
|
|
859
|
+
SUCCESS_SIGNUP: "ss",
|
|
860
|
+
FAILED_SS_SSO_OPERATION: "ss_sso_failure",
|
|
861
|
+
INFORMATION_FROM_SS_SSO_OPERATION: "ss_sso_info",
|
|
862
|
+
SUCCESS_SS_SSO_OPERATION: "ss_sso_success",
|
|
863
|
+
SUCCESS_SILENT_AUTH: "ssa",
|
|
864
|
+
SUCCESSFUL_SCIM_OPERATION: "sscim",
|
|
865
|
+
SUCCESSFULLY_IMPORTED_USERS: "sui",
|
|
866
|
+
SUCCESS_VERIFICATION_EMAIL: "sv",
|
|
867
|
+
SUCCESS_VERIFICATION_EMAIL_REQUEST: "svr",
|
|
868
|
+
// Warnings & misc
|
|
869
|
+
MAX_AMOUNT_OF_AUTHENTICATORS: "too_many_records",
|
|
870
|
+
USER_LOGIN_BLOCK_RELEASED: "ublkdu",
|
|
871
|
+
FAILED_UNIVERSAL_LOGOUT: "universal_logout_failed",
|
|
872
|
+
SUCCESSFUL_UNIVERSAL_LOGOUT: "universal_logout_succeeded",
|
|
873
|
+
WARNING_DURING_LOGIN: "w",
|
|
874
|
+
WARNING_SENDING_NOTIFICATION: "wn",
|
|
875
|
+
WARNING_USER_MANAGEMENT: "wum"
|
|
876
|
+
}, rt = t.string().refine(
|
|
877
|
+
(e) => Object.values(st).includes(e),
|
|
878
|
+
{ message: "Invalid log type" }
|
|
879
|
+
), _t = t.object({
|
|
760
880
|
name: t.string(),
|
|
761
881
|
version: t.string(),
|
|
762
882
|
env: t.object({
|
|
763
883
|
node: t.string().optional()
|
|
764
884
|
}).optional()
|
|
765
|
-
}),
|
|
885
|
+
}), kt = t.object({
|
|
766
886
|
type: rt,
|
|
767
887
|
date: t.string(),
|
|
768
888
|
description: t.string().optional(),
|
|
@@ -784,23 +904,23 @@ const rt = t.enum([
|
|
|
784
904
|
strategy: t.string().optional(),
|
|
785
905
|
strategy_type: t.string().optional(),
|
|
786
906
|
hostname: t.string().optional(),
|
|
787
|
-
auth0_client:
|
|
788
|
-
}),
|
|
907
|
+
auth0_client: _t.optional()
|
|
908
|
+
}), lt = t.object({
|
|
789
909
|
user_id: t.string(),
|
|
790
910
|
password: t.string(),
|
|
791
911
|
algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
792
|
-
}),
|
|
793
|
-
...
|
|
912
|
+
}), Ht = t.object({
|
|
913
|
+
...lt.shape,
|
|
794
914
|
created_at: t.string(),
|
|
795
915
|
updated_at: t.string()
|
|
796
|
-
}),
|
|
916
|
+
}), m = t.object({
|
|
797
917
|
initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
|
|
798
918
|
initial_ip: t.string().describe("First IP address associated with this session"),
|
|
799
919
|
initial_asn: t.string().describe("First autonomous system number associated with this session"),
|
|
800
920
|
last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
|
|
801
921
|
last_ip: t.string().describe("Last IP address from which this user logged in"),
|
|
802
922
|
last_asn: t.string().describe("Last autonomous system number from which this user logged in")
|
|
803
|
-
}),
|
|
923
|
+
}), ct = t.object({
|
|
804
924
|
id: t.string(),
|
|
805
925
|
revoked_at: t.string().optional(),
|
|
806
926
|
used_at: t.string().optional(),
|
|
@@ -808,17 +928,17 @@ const rt = t.enum([
|
|
|
808
928
|
expires_at: t.string().optional(),
|
|
809
929
|
login_session_id: t.string(),
|
|
810
930
|
idle_expires_at: t.string().optional(),
|
|
811
|
-
device:
|
|
931
|
+
device: m.describe(
|
|
812
932
|
"Metadata related to the device used in the session"
|
|
813
933
|
),
|
|
814
934
|
clients: t.array(t.string()).describe("List of client details for the session")
|
|
815
|
-
}),
|
|
935
|
+
}), Pt = t.object({
|
|
816
936
|
created_at: t.string(),
|
|
817
937
|
updated_at: t.string(),
|
|
818
938
|
authenticated_at: t.string(),
|
|
819
939
|
last_interaction_at: t.string(),
|
|
820
|
-
...
|
|
821
|
-
}),
|
|
940
|
+
...ct.shape
|
|
941
|
+
}), vt = t.object({
|
|
822
942
|
kid: t.string().openapi({ description: "The key id of the signing key" }),
|
|
823
943
|
cert: t.string().openapi({ description: "The public certificate of the signing key" }),
|
|
824
944
|
fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -839,7 +959,7 @@ const rt = t.enum([
|
|
|
839
959
|
revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
|
|
840
960
|
});
|
|
841
961
|
var dt = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", e))(dt || {});
|
|
842
|
-
const
|
|
962
|
+
const Mt = t.object({
|
|
843
963
|
access_token: t.string(),
|
|
844
964
|
id_token: t.string().optional(),
|
|
845
965
|
scope: t.string().optional(),
|
|
@@ -852,7 +972,7 @@ t.object({
|
|
|
852
972
|
code: t.string(),
|
|
853
973
|
state: t.string().optional()
|
|
854
974
|
});
|
|
855
|
-
const
|
|
975
|
+
const pt = t.object({
|
|
856
976
|
button_border_radius: t.number(),
|
|
857
977
|
button_border_weight: t.number(),
|
|
858
978
|
buttons_style: t.enum(["pill"]),
|
|
@@ -862,7 +982,7 @@ const gt = t.object({
|
|
|
862
982
|
show_widget_shadow: t.boolean(),
|
|
863
983
|
widget_border_weight: t.number(),
|
|
864
984
|
widget_corner_radius: t.number()
|
|
865
|
-
}),
|
|
985
|
+
}), gt = t.object({
|
|
866
986
|
base_focus_color: t.string(),
|
|
867
987
|
base_hover_color: t.string(),
|
|
868
988
|
body_text: t.string(),
|
|
@@ -885,7 +1005,7 @@ const gt = t.object({
|
|
|
885
1005
|
}), n = t.object({
|
|
886
1006
|
bold: t.boolean(),
|
|
887
1007
|
size: t.number()
|
|
888
|
-
}),
|
|
1008
|
+
}), Et = t.object({
|
|
889
1009
|
body_text: n,
|
|
890
1010
|
buttons_text: n,
|
|
891
1011
|
font_url: t.string(),
|
|
@@ -895,31 +1015,31 @@ const gt = t.object({
|
|
|
895
1015
|
reference_text_size: t.number(),
|
|
896
1016
|
subtitle: n,
|
|
897
1017
|
title: n
|
|
898
|
-
}),
|
|
1018
|
+
}), ut = t.object({
|
|
899
1019
|
background_color: t.string(),
|
|
900
1020
|
background_image_url: t.string(),
|
|
901
1021
|
page_layout: t.enum(["center"])
|
|
902
|
-
}),
|
|
1022
|
+
}), St = t.object({
|
|
903
1023
|
header_text_alignment: t.enum(["center"]),
|
|
904
1024
|
logo_height: t.number(),
|
|
905
1025
|
logo_position: t.enum(["center"]),
|
|
906
1026
|
logo_url: t.string(),
|
|
907
1027
|
social_buttons_layout: t.enum(["bottom"])
|
|
908
|
-
}),
|
|
909
|
-
borders:
|
|
910
|
-
colors:
|
|
1028
|
+
}), mt = t.object({
|
|
1029
|
+
borders: pt,
|
|
1030
|
+
colors: gt,
|
|
911
1031
|
displayName: t.string(),
|
|
912
|
-
fonts:
|
|
913
|
-
page_background:
|
|
914
|
-
widget:
|
|
915
|
-
}),
|
|
1032
|
+
fonts: Et,
|
|
1033
|
+
page_background: ut,
|
|
1034
|
+
widget: St
|
|
1035
|
+
}), Gt = mt.extend({
|
|
916
1036
|
themeId: t.string()
|
|
917
|
-
}),
|
|
1037
|
+
}), xt = t.object({
|
|
918
1038
|
universal_login_experience: t.enum(["new", "classic"]).default("new"),
|
|
919
1039
|
identifier_first: t.boolean().default(!0),
|
|
920
1040
|
password_first: t.boolean().default(!1),
|
|
921
1041
|
webauthn_platform_first_factor: t.boolean()
|
|
922
|
-
}),
|
|
1042
|
+
}), Kt = t.object({
|
|
923
1043
|
name: t.string(),
|
|
924
1044
|
enabled: t.boolean().optional().default(!0),
|
|
925
1045
|
default_from_address: t.string().optional(),
|
|
@@ -949,7 +1069,7 @@ const gt = t.object({
|
|
|
949
1069
|
})
|
|
950
1070
|
]),
|
|
951
1071
|
settings: t.object({}).optional()
|
|
952
|
-
}),
|
|
1072
|
+
}), At = t.object({
|
|
953
1073
|
// The actual refresh token value (primary key).
|
|
954
1074
|
id: t.string(),
|
|
955
1075
|
// Link to the session record
|
|
@@ -962,7 +1082,7 @@ const gt = t.object({
|
|
|
962
1082
|
idle_expires_at: t.string().optional(),
|
|
963
1083
|
// When the token was last used.
|
|
964
1084
|
last_exchanged_at: t.string().optional(),
|
|
965
|
-
device:
|
|
1085
|
+
device: m,
|
|
966
1086
|
resource_servers: t.array(
|
|
967
1087
|
t.object({
|
|
968
1088
|
audience: t.string(),
|
|
@@ -970,106 +1090,106 @@ const gt = t.object({
|
|
|
970
1090
|
})
|
|
971
1091
|
),
|
|
972
1092
|
rotating: t.boolean()
|
|
973
|
-
}),
|
|
1093
|
+
}), Bt = t.object({
|
|
974
1094
|
// When the refresh token record was created.
|
|
975
1095
|
created_at: t.string(),
|
|
976
1096
|
// Spread in the rest of the refresh token properties.
|
|
977
|
-
...
|
|
1097
|
+
...At.shape
|
|
978
1098
|
}), Xt = t.object({
|
|
979
1099
|
to: t.string(),
|
|
980
1100
|
message: t.string()
|
|
981
|
-
}),
|
|
1101
|
+
}), Vt = t.object({
|
|
982
1102
|
name: t.string(),
|
|
983
1103
|
options: t.object({})
|
|
984
1104
|
});
|
|
985
|
-
function
|
|
1105
|
+
function Wt(e) {
|
|
986
1106
|
const [o, a] = e.split("|");
|
|
987
1107
|
if (!o || !a)
|
|
988
1108
|
throw new Error(`Invalid user_id: ${e}`);
|
|
989
1109
|
return { connection: o, id: a };
|
|
990
1110
|
}
|
|
991
1111
|
export {
|
|
992
|
-
|
|
993
|
-
|
|
994
|
-
|
|
995
|
-
|
|
1112
|
+
_t as Auth0Client,
|
|
1113
|
+
g as AuthorizationResponseMode,
|
|
1114
|
+
p as AuthorizationResponseType,
|
|
1115
|
+
E as CodeChallengeMethod,
|
|
996
1116
|
d as ComponentCategory,
|
|
997
|
-
|
|
1117
|
+
c as ComponentType,
|
|
998
1118
|
dt as GrantType,
|
|
999
1119
|
st as LogTypes,
|
|
1000
|
-
|
|
1001
|
-
|
|
1002
|
-
|
|
1003
|
-
|
|
1004
|
-
|
|
1005
|
-
|
|
1006
|
-
|
|
1007
|
-
|
|
1008
|
-
|
|
1009
|
-
|
|
1010
|
-
|
|
1011
|
-
|
|
1012
|
-
|
|
1013
|
-
|
|
1014
|
-
|
|
1015
|
-
|
|
1016
|
-
|
|
1017
|
-
|
|
1120
|
+
j as NodeType,
|
|
1121
|
+
N as applicationInsertSchema,
|
|
1122
|
+
T as applicationSchema,
|
|
1123
|
+
Ot as auth0FlowInsertSchema,
|
|
1124
|
+
G as auth0FlowSchema,
|
|
1125
|
+
Ct as auth0UserResponseSchema,
|
|
1126
|
+
x as authParamsSchema,
|
|
1127
|
+
l as baseUserSchema,
|
|
1128
|
+
pt as bordersSchema,
|
|
1129
|
+
ft as brandingSchema,
|
|
1130
|
+
L as buttonComponentSchema,
|
|
1131
|
+
q as codeInsertSchema,
|
|
1132
|
+
Tt as codeSchema,
|
|
1133
|
+
Y as codeTypeSchema,
|
|
1134
|
+
gt as colorsSchema,
|
|
1135
|
+
F as componentSchema,
|
|
1136
|
+
B as connectionInsertSchema,
|
|
1137
|
+
K as connectionOptionsSchema,
|
|
1018
1138
|
X as connectionSchema,
|
|
1019
1139
|
i as coordinatesSchema,
|
|
1020
1140
|
Q as customDomainInsertSchema,
|
|
1021
|
-
|
|
1022
|
-
|
|
1023
|
-
|
|
1024
|
-
|
|
1025
|
-
|
|
1026
|
-
|
|
1141
|
+
Z as customDomainSchema,
|
|
1142
|
+
Rt as customDomainWithTenantIdSchema,
|
|
1143
|
+
Kt as emailProviderSchema,
|
|
1144
|
+
M as endingSchema,
|
|
1145
|
+
U as fieldComponentSchema,
|
|
1146
|
+
k as flowNodeSchema,
|
|
1027
1147
|
n as fontDetailsSchema,
|
|
1028
|
-
|
|
1029
|
-
|
|
1148
|
+
Et as fontsSchema,
|
|
1149
|
+
Lt as formControlSchema,
|
|
1030
1150
|
$ as formInsertSchema,
|
|
1031
|
-
|
|
1032
|
-
|
|
1033
|
-
|
|
1034
|
-
|
|
1035
|
-
|
|
1036
|
-
|
|
1037
|
-
|
|
1038
|
-
|
|
1151
|
+
J as formNodeComponentDefinition,
|
|
1152
|
+
Dt as formSchema,
|
|
1153
|
+
y as genericComponentSchema,
|
|
1154
|
+
H as genericNodeSchema,
|
|
1155
|
+
Ut as hookInsertSchema,
|
|
1156
|
+
yt as hookSchema,
|
|
1157
|
+
h as identitySchema,
|
|
1158
|
+
Ft as jwksKeySchema,
|
|
1039
1159
|
it as jwksSchema,
|
|
1040
|
-
|
|
1041
|
-
|
|
1160
|
+
D as legalComponentSchema,
|
|
1161
|
+
kt as logSchema,
|
|
1042
1162
|
at as loginSessionInsertSchema,
|
|
1043
|
-
|
|
1044
|
-
|
|
1045
|
-
|
|
1046
|
-
|
|
1047
|
-
|
|
1048
|
-
|
|
1049
|
-
|
|
1050
|
-
|
|
1051
|
-
|
|
1052
|
-
|
|
1053
|
-
|
|
1054
|
-
|
|
1055
|
-
|
|
1056
|
-
|
|
1057
|
-
|
|
1058
|
-
|
|
1059
|
-
|
|
1163
|
+
wt as loginSessionSchema,
|
|
1164
|
+
P as nodeSchema,
|
|
1165
|
+
jt as openIDConfigurationSchema,
|
|
1166
|
+
ut as pageBackgroundSchema,
|
|
1167
|
+
Wt as parseUserId,
|
|
1168
|
+
lt as passwordInsertSchema,
|
|
1169
|
+
Ht as passwordSchema,
|
|
1170
|
+
A as profileDataSchema,
|
|
1171
|
+
xt as promptSettingSchema,
|
|
1172
|
+
At as refreshTokenInsertSchema,
|
|
1173
|
+
Bt as refreshTokenSchema,
|
|
1174
|
+
R as richTextComponentSchema,
|
|
1175
|
+
f as samlpAddon,
|
|
1176
|
+
ct as sessionInsertSchema,
|
|
1177
|
+
Pt as sessionSchema,
|
|
1178
|
+
vt as signingKeySchema,
|
|
1179
|
+
Vt as smsProviderSchema,
|
|
1060
1180
|
Xt as smsSendParamsSchema,
|
|
1061
|
-
|
|
1062
|
-
|
|
1063
|
-
|
|
1064
|
-
|
|
1065
|
-
|
|
1066
|
-
|
|
1067
|
-
|
|
1068
|
-
|
|
1069
|
-
|
|
1070
|
-
|
|
1071
|
-
|
|
1072
|
-
|
|
1073
|
-
|
|
1074
|
-
|
|
1181
|
+
v as startSchema,
|
|
1182
|
+
w as stepNodeSchema,
|
|
1183
|
+
V as tenantInsertSchema,
|
|
1184
|
+
W as tenantSchema,
|
|
1185
|
+
mt as themeInsertSchema,
|
|
1186
|
+
Gt as themeSchema,
|
|
1187
|
+
Mt as tokenResponseSchema,
|
|
1188
|
+
bt as totalsSchema,
|
|
1189
|
+
b as userInsertSchema,
|
|
1190
|
+
It as userResponseSchema,
|
|
1191
|
+
C as userSchema,
|
|
1192
|
+
Nt as vendorSettingsSchema,
|
|
1193
|
+
z as verificationMethodsSchema,
|
|
1194
|
+
St as widgetSchema
|
|
1075
1195
|
};
|