@authhero/adapter-interfaces 0.73.0 → 0.75.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,12 +1,12 @@
1
1
  import { z as t } from "@hono/zod-openapi";
2
- const Et = t.object({
2
+ const bt = t.object({
3
3
  start: t.number(),
4
4
  limit: t.number(),
5
5
  length: t.number()
6
6
  }), s = t.object({
7
7
  created_at: t.string(),
8
8
  updated_at: t.string()
9
- }), f = t.object({
9
+ }), A = t.object({
10
10
  email: t.string().optional(),
11
11
  email_verified: t.boolean().optional(),
12
12
  name: t.string().optional(),
@@ -15,7 +15,7 @@ const Et = t.object({
15
15
  phone_number: t.string().optional(),
16
16
  phone_verified: t.boolean().optional(),
17
17
  family_name: t.string().optional()
18
- }).catchall(t.any()), S = t.object({
18
+ }).catchall(t.any()), h = t.object({
19
19
  connection: t.string(),
20
20
  user_id: t.string(),
21
21
  provider: t.string(),
@@ -23,8 +23,8 @@ const Et = t.object({
23
23
  access_token: t.string().optional(),
24
24
  access_token_secret: t.string().optional(),
25
25
  refresh_token: t.string().optional(),
26
- profileData: f.optional()
27
- }), c = t.object({
26
+ profileData: A.optional()
27
+ }), l = t.object({
28
28
  email: t.string().optional().transform((e) => e && e.toLowerCase()),
29
29
  username: t.string().optional(),
30
30
  phone_number: t.string().optional(),
@@ -39,7 +39,7 @@ const Et = t.object({
39
39
  user_id: t.string().optional(),
40
40
  app_metadata: t.any().default({}).optional(),
41
41
  user_metadata: t.any().default({}).optional()
42
- }), E = c.extend({
42
+ }), b = l.extend({
43
43
  email_verified: t.boolean().default(!1),
44
44
  verify_email: t.boolean().optional(),
45
45
  last_ip: t.string().optional(),
@@ -48,28 +48,28 @@ const Et = t.object({
48
48
  provider: t.string().default("email"),
49
49
  connection: t.string().default("email"),
50
50
  is_social: t.boolean().optional()
51
- }), j = t.object({
52
- ...E.shape,
51
+ }), C = t.object({
52
+ ...b.shape,
53
53
  ...s.shape,
54
54
  user_id: t.string(),
55
55
  is_social: t.boolean(),
56
56
  email: t.string().optional(),
57
57
  login_count: t.number().default(0),
58
- identities: t.array(S).optional()
59
- }), jt = j, yt = c.extend({
58
+ identities: t.array(h).optional()
59
+ }), Ct = C, It = l.extend({
60
60
  login_count: t.number(),
61
61
  multifactor: t.array(t.string()).optional(),
62
62
  last_ip: t.string().optional(),
63
63
  last_login: t.string().optional(),
64
64
  user_id: t.string()
65
- }).catchall(t.any()), y = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
- let I = (e = 21) => {
65
+ }).catchall(t.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
+ let O = (e = 21) => {
67
67
  let o = "", a = crypto.getRandomValues(new Uint8Array(e));
68
68
  for (; e--; )
69
- o += y[a[e] & 63];
69
+ o += I[a[e] & 63];
70
70
  return o;
71
71
  };
72
- const w = t.object({
72
+ const f = t.object({
73
73
  audience: t.string().optional(),
74
74
  recipient: t.string().optional(),
75
75
  createUpnClaim: t.boolean().optional(),
@@ -86,7 +86,7 @@ const w = t.object({
86
86
  nameIdentifierProbes: t.array(t.string()).optional(),
87
87
  authnContextClassRef: t.string().optional(),
88
88
  mappings: t.record(t.string()).optional()
89
- }), C = t.object({
89
+ }), N = t.object({
90
90
  id: t.string(),
91
91
  name: t.string(),
92
92
  callbacks: t.array(t.string()).default([]).optional().openapi({
@@ -105,31 +105,31 @@ const w = t.object({
105
105
  description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
106
106
  }),
107
107
  addons: t.object({
108
- samlp: w.optional()
108
+ samlp: f.optional()
109
109
  }).default({}).optional().openapi({
110
110
  description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
111
111
  }),
112
112
  email_validation: t.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
113
113
  description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
114
114
  }),
115
- client_secret: t.string().default(() => I()).optional(),
115
+ client_secret: t.string().default(() => O()).optional(),
116
116
  disable_sign_ups: t.boolean().optional().default(!1).openapi({
117
117
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
118
118
  })
119
- }), k = t.object({
119
+ }), T = t.object({
120
120
  created_at: t.string().transform((e) => e === null ? "" : e),
121
121
  updated_at: t.string().transform((e) => e === null ? "" : e),
122
- ...C.shape
122
+ ...N.shape
123
123
  }), i = t.object({
124
124
  x: t.number(),
125
125
  y: t.number()
126
126
  });
127
- var p = /* @__PURE__ */ ((e) => (e.RICH_TEXT = "RICH_TEXT", e.NEXT_BUTTON = "NEXT_BUTTON", e.BACK_BUTTON = "BACK_BUTTON", e.SUBMIT_BUTTON = "SUBMIT_BUTTON", e.DIVIDER = "DIVIDER", e.TEXT = "TEXT", e.EMAIL = "EMAIL", e.PASSWORD = "PASSWORD", e.NUMBER = "NUMBER", e.PHONE = "PHONE", e.DATE = "DATE", e.CHECKBOX = "CHECKBOX", e.RADIO = "RADIO", e.SELECT = "SELECT", e.HIDDEN = "HIDDEN", e.LEGAL = "LEGAL", e))(p || {}), d = /* @__PURE__ */ ((e) => (e.BLOCK = "BLOCK", e.FIELD = "FIELD", e))(d || {});
127
+ var c = /* @__PURE__ */ ((e) => (e.RICH_TEXT = "RICH_TEXT", e.NEXT_BUTTON = "NEXT_BUTTON", e.BACK_BUTTON = "BACK_BUTTON", e.SUBMIT_BUTTON = "SUBMIT_BUTTON", e.DIVIDER = "DIVIDER", e.TEXT = "TEXT", e.EMAIL = "EMAIL", e.PASSWORD = "PASSWORD", e.NUMBER = "NUMBER", e.PHONE = "PHONE", e.DATE = "DATE", e.CHECKBOX = "CHECKBOX", e.RADIO = "RADIO", e.SELECT = "SELECT", e.HIDDEN = "HIDDEN", e.LEGAL = "LEGAL", e))(c || {}), d = /* @__PURE__ */ ((e) => (e.BLOCK = "BLOCK", e.FIELD = "FIELD", e))(d || {});
128
128
  const r = t.object({
129
129
  id: t.string(),
130
130
  category: t.nativeEnum(d),
131
- type: t.nativeEnum(p)
132
- }), O = r.extend({
131
+ type: t.nativeEnum(c)
132
+ }), R = r.extend({
133
133
  category: t.literal(
134
134
  "BLOCK"
135
135
  /* BLOCK */
@@ -141,7 +141,7 @@ const r = t.object({
141
141
  config: t.object({
142
142
  content: t.string()
143
143
  }).passthrough()
144
- }), T = r.extend({
144
+ }), L = r.extend({
145
145
  category: t.literal(
146
146
  "BLOCK"
147
147
  /* BLOCK */
@@ -163,7 +163,7 @@ const r = t.object({
163
163
  config: t.object({
164
164
  text: t.string()
165
165
  }).passthrough()
166
- }), v = r.extend({
166
+ }), D = r.extend({
167
167
  category: t.literal(
168
168
  "FIELD"
169
169
  /* FIELD */
@@ -177,7 +177,7 @@ const r = t.object({
177
177
  config: t.object({
178
178
  text: t.string()
179
179
  }).passthrough()
180
- }), A = r.extend({
180
+ }), U = r.extend({
181
181
  category: t.literal(
182
182
  "FIELD"
183
183
  /* FIELD */
@@ -230,19 +230,19 @@ const r = t.object({
230
230
  label: t.string().optional(),
231
231
  placeholder: t.string().optional()
232
232
  }).passthrough()
233
- }), N = t.object({
233
+ }), y = t.object({
234
234
  id: t.string(),
235
235
  category: t.string(),
236
236
  type: t.string()
237
- }).passthrough(), U = t.union([
238
- O,
239
- T,
240
- v,
241
- A,
242
- N
237
+ }).passthrough(), F = t.union([
238
+ R,
239
+ L,
240
+ D,
241
+ U,
242
+ y
243
243
  ]);
244
- var D = /* @__PURE__ */ ((e) => (e.STEP = "STEP", e.FLOW = "FLOW", e.CONDITION = "CONDITION", e.ACTION = "ACTION", e))(D || {});
245
- const x = t.object({
244
+ var j = /* @__PURE__ */ ((e) => (e.STEP = "STEP", e.FLOW = "FLOW", e.CONDITION = "CONDITION", e.ACTION = "ACTION", e))(j || {});
245
+ const w = t.object({
246
246
  id: t.string(),
247
247
  type: t.literal(
248
248
  "STEP"
@@ -251,10 +251,10 @@ const x = t.object({
251
251
  coordinates: i,
252
252
  alias: t.string().optional(),
253
253
  config: t.object({
254
- components: t.array(U),
254
+ components: t.array(F),
255
255
  next_node: t.string()
256
256
  }).passthrough()
257
- }), R = t.object({
257
+ }), k = t.object({
258
258
  id: t.string(),
259
259
  type: t.literal(
260
260
  "FLOW"
@@ -266,46 +266,46 @@ const x = t.object({
266
266
  flow_id: t.string(),
267
267
  next_node: t.string()
268
268
  })
269
- }), P = t.object({
269
+ }), H = t.object({
270
270
  id: t.string(),
271
271
  type: t.string(),
272
272
  coordinates: i
273
- }).passthrough(), L = t.union([
274
- x,
275
- R,
276
- P
277
- ]), B = t.object({
273
+ }).passthrough(), P = t.union([
274
+ w,
275
+ k,
276
+ H
277
+ ]), v = t.object({
278
278
  next_node: t.string(),
279
279
  coordinates: i
280
- }).passthrough(), H = t.object({
280
+ }).passthrough(), M = t.object({
281
281
  resume_flow: t.boolean().optional(),
282
282
  coordinates: i
283
- }).passthrough(), F = t.object({
283
+ }).passthrough(), G = t.object({
284
284
  id: t.string(),
285
285
  name: t.string(),
286
286
  languages: t.object({
287
287
  primary: t.string()
288
288
  }).passthrough(),
289
- nodes: t.array(L),
290
- start: B,
291
- ending: H,
289
+ nodes: t.array(P),
290
+ start: v,
291
+ ending: M,
292
292
  created_at: t.string(),
293
293
  updated_at: t.string(),
294
294
  links: t.object({
295
295
  sdkSrc: t.string().optional(),
296
296
  sdk_src: t.string().optional()
297
297
  }).passthrough()
298
- }).passthrough(), It = F.omit({
298
+ }).passthrough(), Ot = G.omit({
299
299
  id: !0,
300
300
  created_at: !0,
301
301
  updated_at: !0
302
302
  });
303
- var g = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(g || {}), u = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(u || {}), _ = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(_ || {});
304
- const K = t.object({
303
+ var p = /* @__PURE__ */ ((e) => (e.TOKEN = "token", e.TOKEN_ID_TOKEN = "token id_token", e.CODE = "code", e))(p || {}), g = /* @__PURE__ */ ((e) => (e.QUERY = "query", e.FRAGMENT = "fragment", e.FORM_POST = "form_post", e.WEB_MESSAGE = "web_message", e.SAML_POST = "saml_post", e))(g || {}), E = /* @__PURE__ */ ((e) => (e.S256 = "S256", e.Plain = "plain", e))(E || {});
304
+ const x = t.object({
305
305
  client_id: t.string(),
306
306
  act_as: t.string().optional(),
307
- response_type: t.nativeEnum(g).optional(),
308
- response_mode: t.nativeEnum(u).optional(),
307
+ response_type: t.nativeEnum(p).optional(),
308
+ response_mode: t.nativeEnum(g).optional(),
309
309
  redirect_uri: t.string().optional(),
310
310
  audience: t.string().optional(),
311
311
  organization: t.string().optional(),
@@ -313,13 +313,13 @@ const K = t.object({
313
313
  nonce: t.string().optional(),
314
314
  scope: t.string().optional(),
315
315
  prompt: t.string().optional(),
316
- code_challenge_method: t.nativeEnum(_).optional(),
316
+ code_challenge_method: t.nativeEnum(E).optional(),
317
317
  code_challenge: t.string().optional(),
318
318
  username: t.string().optional(),
319
319
  ui_locales: t.string().optional(),
320
320
  // The following fields are not available in Auth0
321
321
  vendor_id: t.string().optional()
322
- }), wt = t.object({
322
+ }), ft = t.object({
323
323
  colors: t.object({
324
324
  primary: t.string(),
325
325
  page_background: t.object({
@@ -334,7 +334,7 @@ const K = t.object({
334
334
  font: t.object({
335
335
  url: t.string()
336
336
  }).optional()
337
- }), M = t.object({
337
+ }), K = t.object({
338
338
  kid: t.string().optional(),
339
339
  team_id: t.string().optional(),
340
340
  realms: t.string().optional(),
@@ -353,11 +353,11 @@ const K = t.object({
353
353
  from: t.string().optional(),
354
354
  twilio_sid: t.string().optional(),
355
355
  twilio_token: t.string().optional()
356
- }), G = t.object({
356
+ }), B = t.object({
357
357
  id: t.string().optional(),
358
358
  name: t.string(),
359
359
  strategy: t.string(),
360
- options: M.default({}),
360
+ options: K.default({}),
361
361
  enabled_clients: t.array(t.string()).default([]).optional(),
362
362
  response_type: t.custom().optional(),
363
363
  response_mode: t.custom().optional()
@@ -365,7 +365,7 @@ const K = t.object({
365
365
  id: t.string(),
366
366
  created_at: t.string().transform((e) => e === null ? "" : e),
367
367
  updated_at: t.string().transform((e) => e === null ? "" : e)
368
- }).extend(G.shape), W = t.object({
368
+ }).extend(B.shape), V = t.object({
369
369
  name: t.string(),
370
370
  audience: t.string(),
371
371
  sender_email: t.string().email(),
@@ -376,12 +376,12 @@ const K = t.object({
376
376
  secondary_color: t.string().optional(),
377
377
  language: t.string().optional(),
378
378
  id: t.string().optional()
379
- }), q = t.object({
379
+ }), W = t.object({
380
380
  created_at: t.string().transform((e) => e === null ? "" : e),
381
381
  updated_at: t.string().transform((e) => e === null ? "" : e),
382
- ...W.shape,
382
+ ...V.shape,
383
383
  id: t.string()
384
- }), Ct = t.object({
384
+ }), Nt = t.object({
385
385
  logoUrl: t.string(),
386
386
  loginBackgroundImage: t.string().nullish(),
387
387
  style: t.object({
@@ -401,18 +401,18 @@ const K = t.object({
401
401
  manageSubscriptionsUrl: t.string().optional()
402
402
  });
403
403
  t.object({
404
- ...k.shape,
405
- tenant: q,
404
+ ...T.shape,
405
+ tenant: W,
406
406
  connections: t.array(X)
407
407
  });
408
- const V = t.enum([
408
+ const Y = t.enum([
409
409
  "password_reset",
410
410
  "email_verification",
411
411
  "otp",
412
412
  "authorization_code",
413
413
  "oauth2_state",
414
414
  "ticket"
415
- ]), z = t.object({
415
+ ]), q = t.object({
416
416
  code_id: t.string().openapi({
417
417
  description: "The code that will be used in for instance an email verification flow"
418
418
  }),
@@ -422,7 +422,7 @@ const V = t.enum([
422
422
  connection_id: t.string().optional().openapi({
423
423
  description: "The connection that the code is connected to"
424
424
  }),
425
- code_type: V,
425
+ code_type: Y,
426
426
  code_verifier: t.string().optional().openapi({
427
427
  description: "The code verifier used in PKCE in outbound flows"
428
428
  }),
@@ -444,8 +444,8 @@ const V = t.enum([
444
444
  expires_at: t.string(),
445
445
  used_at: t.string().optional(),
446
446
  user_id: t.string().optional()
447
- }), kt = t.object({
448
- ...z.shape,
447
+ }), Tt = t.object({
448
+ ...q.shape,
449
449
  created_at: t.string()
450
450
  }), Q = t.object({
451
451
  domain: t.string(),
@@ -461,23 +461,23 @@ const V = t.enum([
461
461
  "null"
462
462
  ]).optional(),
463
463
  domain_metadata: t.record(t.string().max(255)).optional()
464
- }), Y = t.object({
464
+ }), z = t.object({
465
465
  name: t.literal("txt"),
466
466
  record: t.string(),
467
467
  domain: t.string()
468
- }), J = t.object({
468
+ }), Z = t.object({
469
469
  ...Q.shape,
470
470
  custom_domain_id: t.string(),
471
471
  primary: t.boolean(),
472
472
  status: t.enum(["disabled", "pending", "pending_verification", "ready"]),
473
473
  origin_domain_name: t.string().optional(),
474
474
  verification: t.object({
475
- methods: t.array(Y)
475
+ methods: t.array(z)
476
476
  }).optional(),
477
477
  tls_policy: t.string().optional()
478
- }), Ot = J.extend({
478
+ }), Rt = Z.extend({
479
479
  tenant_id: t.string()
480
- }), Tt = t.object({
480
+ }), Lt = t.object({
481
481
  id: t.string(),
482
482
  type: t.literal("submit"),
483
483
  label: t.string(),
@@ -486,7 +486,7 @@ const V = t.enum([
486
486
  order: t.number().optional(),
487
487
  visible: t.boolean().optional().default(!0),
488
488
  customizations: t.record(t.string(), t.any()).optional()
489
- }), Z = t.discriminatedUnion("type", [
489
+ }), J = t.discriminatedUnion("type", [
490
490
  t.object({
491
491
  id: t.string(),
492
492
  type: t.literal("RICH_TEXT"),
@@ -580,7 +580,7 @@ const V = t.enum([
580
580
  coordinates: t.object({ x: t.number(), y: t.number() }),
581
581
  alias: t.string().min(1).max(150).optional(),
582
582
  config: t.object({
583
- components: t.array(Z),
583
+ components: t.array(J),
584
584
  next_node: t.string()
585
585
  })
586
586
  })
@@ -603,48 +603,48 @@ const V = t.enum([
603
603
  style: t.object({ css: t.string().optional() }).optional()
604
604
  }).openapi({
605
605
  description: "Schema for flow-based forms (matches new JSON structure)"
606
- }), vt = t.object({
606
+ }), Dt = t.object({
607
607
  ...s.shape,
608
608
  ...$.shape,
609
609
  id: t.string()
610
- }), m = t.enum([
610
+ }), u = t.enum([
611
611
  "pre-user-signup",
612
612
  "post-user-registration",
613
613
  "post-user-login"
614
614
  // Potentially other triggers specific to webhooks in the future
615
- ]), h = t.enum([
615
+ ]), S = t.enum([
616
616
  "pre-user-signup",
617
617
  "post-user-registration",
618
618
  "post-user-login"
619
- ]), l = {
619
+ ]), _ = {
620
620
  enabled: t.boolean().default(!1),
621
621
  synchronous: t.boolean().default(!1),
622
622
  priority: t.number().optional(),
623
623
  hook_id: t.string().optional()
624
624
  }, tt = t.object({
625
- ...l,
626
- trigger_id: m,
625
+ ..._,
626
+ trigger_id: u,
627
627
  url: t.string()
628
628
  }), et = t.object({
629
- ...l,
630
- trigger_id: h,
629
+ ..._,
630
+ trigger_id: S,
631
631
  form_id: t.string()
632
- }), At = t.union([
632
+ }), Ut = t.union([
633
633
  tt,
634
634
  et
635
635
  ]), nt = t.object({
636
- ...l,
637
- trigger_id: m,
636
+ ..._,
637
+ trigger_id: u,
638
638
  ...s.shape,
639
639
  hook_id: t.string(),
640
640
  url: t.string()
641
641
  }), ot = t.object({
642
- ...l,
643
- trigger_id: h,
642
+ ..._,
643
+ trigger_id: S,
644
644
  ...s.shape,
645
645
  hook_id: t.string(),
646
646
  form_id: t.string()
647
- }), Nt = t.union([nt, ot]), it = t.object({
647
+ }), yt = t.union([nt, ot]), it = t.object({
648
648
  alg: t.enum([
649
649
  "RS256",
650
650
  "RS384",
@@ -663,9 +663,9 @@ const V = t.enum([
663
663
  x5t: t.string().optional(),
664
664
  x5c: t.array(t.string()).optional(),
665
665
  use: t.enum(["sig", "enc"]).optional()
666
- }), Ut = t.object({
666
+ }), Ft = t.object({
667
667
  keys: t.array(it)
668
- }), Dt = t.object({
668
+ }), jt = t.object({
669
669
  issuer: t.string(),
670
670
  authorization_endpoint: t.string(),
671
671
  token_endpoint: t.string(),
@@ -689,7 +689,7 @@ const V = t.enum([
689
689
  }), at = t.object({
690
690
  csrf_token: t.string(),
691
691
  auth0Client: t.string().optional(),
692
- authParams: K,
692
+ authParams: x,
693
693
  expires_at: t.string(),
694
694
  deleted_at: t.string().optional(),
695
695
  ip: t.string().optional(),
@@ -699,71 +699,190 @@ const V = t.enum([
699
699
  login_completed: t.boolean().optional().default(!1)
700
700
  }).openapi({
701
701
  description: "This represents a login sesion"
702
- }), xt = t.object({
702
+ }), wt = t.object({
703
703
  ...at.shape,
704
704
  id: t.string().openapi({
705
705
  description: "This is is used as the state in the universal login"
706
706
  }),
707
707
  created_at: t.string(),
708
708
  updated_at: t.string()
709
- });
710
- var st = /* @__PURE__ */ ((e) => (e.FAILED_SILENT_AUTH = "fsa", e.FAILED_SIGNUP = "fs", e.FAILED_LOGIN = "f", e.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", e.FAILED_CHANGE_PASSWORD = "fcp", e.FAILED_BY_CONNECTOR = "fc", e.FAILED_LOGIN_INVALID_EMAIL_USERNAME = "fu", e.FAILED_HOOK = "fh", e.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", e.SUCCESS_API_OPERATION = "sapi", e.SUCCESS_CHANGE_PASSWORD = "scp", e.SUCCESS_CHANGE_PASSWORD_REQUEST = "scpr", e.SUCCESS_CHANGE_USERNAME = "scu", e.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", e.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", e.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", e.SUCCESS_LOGIN = "s", e.SUCCESS_LOGOUT = "slo", e.SUCCESS_SIGNUP = "ss", e.SUCCESS_SILENT_AUTH = "ssa", e.SUCCESS_VERIFICATION_EMAIL = "sv", e.SUCCESS_VERIFICATION_EMAIL_REQUEST = "svr", e.CODE_LINK_SENT = "cls", e.BLOCKED_ACCOUNT_EMAIL = "limit_wc", e.BLOCKED_ACCOUNT_IP = "limit_sul", e.BLOCKED_IP_ADDRESS = "limit_mu", e))(st || {});
711
- const rt = t.enum([
712
- "cls",
713
- // CODE_LINK_SENT
714
- "fsa",
715
- // FAILED_SILENT_AUTH
716
- "fs",
717
- // FAILED_SIGNUP
718
- "f",
719
- // FAILED_LOGIN
720
- "fc",
721
- // FAILED_BY_CONNECTOR
722
- "fcoa",
723
- // FAILED_CROSS_ORIGIN_AUTHENTICATION
724
- "fcp",
725
- // FAILED_CHANGE_PASSWORD
726
- "fh",
727
- // FAILED_HOOK
728
- "fp",
729
- // FAILED_LOGIN_INCORRECT_PASSWORD
730
- "fs",
731
- // FAILED_SIGNUP
732
- "fu",
733
- // FAILED_LOGIN_INVALID_EMAIL_USERNAME
734
- "s",
735
- // SUCCESS_LOGIN
736
- "sapi",
737
- // SUCCESS_API_OPERATION
738
- "scoa",
739
- // SUCCESS_CROSS_ORIGIN_AUTHENTICATION
740
- "scp",
741
- // SUCCESS_CHANGE_PASSWORD
742
- "scpr",
743
- // SUCCESS_CHANGE_PASSWORD_REQUEST
744
- "scu",
745
- // SUCCESS_CHANGE_USERNAME
746
- "seacft",
747
- // SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN
748
- "serft",
749
- // SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN
750
- "slo",
751
- // SUCCESS_LOGOUT
752
- "ss",
753
- // SUCCESS_SIGNUP
754
- "ssa",
755
- // SUCCESS_SILENT_AUTH,
756
- "sv",
757
- // SUCCESS_VERIFICATION_EMAIL
758
- "svr"
759
- // SUCCESS_VERIFICATION_EMAIL_REQUEST
760
- ]), lt = t.object({
709
+ }), st = {
710
+ // Network & System
711
+ ACLS_SUMMARY: "acls_summary",
712
+ ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
713
+ API_LIMIT: "api_limit",
714
+ API_LIMIT_WARNING: "api_limit_warning",
715
+ APPI: "appi",
716
+ // CIBA (Client-Initiated Backchannel Authentication)
717
+ CIBA_EXCHANGE_FAILED: "ciba_exchange_failed",
718
+ CIBA_EXCHANGE_SUCCEEDED: "ciba_exchange_succeeded",
719
+ CIBA_START_FAILED: "ciba_start_failed",
720
+ CIBA_START_SUCCEEDED: "ciba_start_succeeded",
721
+ // Code/Link sending
722
+ CODE_LINK_SENT: "cls",
723
+ CODE_SENT: "cs",
724
+ // Deprecation & System notices
725
+ DEPRECATION_NOTICE: "depnote",
726
+ // Failed operations
727
+ FAILED_LOGIN: "f",
728
+ FAILED_BY_CONNECTOR: "fc",
729
+ FAILED_CHANGE_EMAIL: "fce",
730
+ FAILED_BY_CORS: "fco",
731
+ FAILED_CROSS_ORIGIN_AUTHENTICATION: "fcoa",
732
+ FAILED_CHANGE_PASSWORD: "fcp",
733
+ FAILED_POST_CHANGE_PASSWORD_HOOK: "fcph",
734
+ FAILED_CHANGE_PHONE_NUMBER: "fcpn",
735
+ FAILED_CHANGE_PASSWORD_REQUEST: "fcpr",
736
+ FAILED_CONNECTOR_PROVISIONING: "fcpro",
737
+ FAILED_CHANGE_USERNAME: "fcu",
738
+ FAILED_DELEGATION: "fd",
739
+ FAILED_DEVICE_ACTIVATION: "fdeac",
740
+ FAILED_DEVICE_AUTHORIZATION_REQUEST: "fdeaz",
741
+ USER_CANCELED_DEVICE_CONFIRMATION: "fdecc",
742
+ FAILED_USER_DELETION: "fdu",
743
+ FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN: "feacft",
744
+ FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS: "feccft",
745
+ FAILED_EXCHANGE_CUSTOM_TOKEN: "fecte",
746
+ FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN: "fede",
747
+ FAILED_FEDERATED_LOGOUT: "federated_logout_failed",
748
+ FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN: "fens",
749
+ FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN: "feoobft",
750
+ FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN: "feotpft",
751
+ FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN: "fepft",
752
+ FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN: "fepotpft",
753
+ FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN: "fercft",
754
+ FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN: "ferrt",
755
+ FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN: "fertft",
756
+ FAILED_HOOK: "fh",
757
+ // Custom AuthHero-specific
758
+ FAILED_INVITE_ACCEPT: "fi",
759
+ FAILED_LOGOUT: "flo",
760
+ FLOWS_EXECUTION_COMPLETED: "flows_execution_completed",
761
+ FLOWS_EXECUTION_FAILED: "flows_execution_failed",
762
+ FAILED_SENDING_NOTIFICATION: "fn",
763
+ FORMS_SUBMISSION_FAILED: "forms_submission_failed",
764
+ FORMS_SUBMISSION_SUCCEEDED: "forms_submission_succeeded",
765
+ FAILED_LOGIN_INCORRECT_PASSWORD: "fp",
766
+ FAILED_PUSHED_AUTHORIZATION_REQUEST: "fpar",
767
+ FAILED_POST_USER_REGISTRATION_HOOK: "fpurh",
768
+ FAILED_SIGNUP: "fs",
769
+ FAILED_SILENT_AUTH: "fsa",
770
+ FAILED_LOGIN_INVALID_EMAIL_USERNAME: "fu",
771
+ FAILED_USERS_IMPORT: "fui",
772
+ FAILED_VERIFICATION_EMAIL: "fv",
773
+ FAILED_VERIFICATION_EMAIL_REQUEST: "fvr",
774
+ // Guardian/MFA events
775
+ EMAIL_VERIFICATION_CONFIRMED: "gd_auth_email_verification",
776
+ EMAIL_VERIFICATION_FAILED: "gd_auth_fail_email_verification",
777
+ MFA_AUTH_FAILED: "gd_auth_failed",
778
+ MFA_AUTH_REJECTED: "gd_auth_rejected",
779
+ MFA_AUTH_SUCCESS: "gd_auth_succeed",
780
+ MFA_ENROLLMENT_COMPLETE: "gd_enrollment_complete",
781
+ TOO_MANY_MFA_FAILURES: "gd_otp_rate_limit_exceed",
782
+ MFA_RECOVERY_FAILED: "gd_recovery_failed",
783
+ MFA_RECOVERY_RATE_LIMIT_EXCEED: "gd_recovery_rate_limit_exceed",
784
+ MFA_RECOVERY_SUCCESS: "gd_recovery_succeed",
785
+ MFA_EMAIL_SENT: "gd_send_email",
786
+ EMAIL_VERIFICATION_SENT: "gd_send_email_verification",
787
+ EMAIL_VERIFICATION_SEND_FAILURE: "gd_send_email_verification_failure",
788
+ PUSH_NOTIFICATION_SENT: "gd_send_pn",
789
+ ERROR_SENDING_MFA_PUSH_NOTIFICATION: "gd_send_pn_failure",
790
+ MFA_SMS_SENT: "gd_send_sms",
791
+ ERROR_SENDING_MFA_SMS: "gd_send_sms_failure",
792
+ MFA_VOICE_CALL_SUCCESS: "gd_send_voice",
793
+ MFA_VOICE_CALL_FAILED: "gd_send_voice_failure",
794
+ SECOND_FACTOR_STARTED: "gd_start_auth",
795
+ MFA_ENROLL_STARTED: "gd_start_enroll",
796
+ MFA_ENROLLMENT_FAILED: "gd_start_enroll_failed",
797
+ GUARDIAN_TENANT_UPDATE: "gd_tenant_update",
798
+ UNENROLL_DEVICE_ACCOUNT: "gd_unenroll",
799
+ UPDATE_DEVICE_ACCOUNT: "gd_update_device_account",
800
+ WEBAUTHN_CHALLENGE_FAILED: "gd_webauthn_challenge_failed",
801
+ WEBAUTHN_ENROLLMENT_FAILED: "gd_webauthn_enrollment_failed",
802
+ // KMS operations
803
+ FAILED_KMS_API_OPERATION: "kms_key_management_failure",
804
+ SUCCESS_KMS_API_OPERATION: "kms_key_management_success",
805
+ KMS_KEY_STATE_CHANGED: "kms_key_state_changed",
806
+ // Rate limiting & blocking
807
+ TOO_MANY_CALLS_TO_DELEGATION: "limit_delegation",
808
+ BLOCKED_IP_ADDRESS: "limit_mu",
809
+ BLOCKED_ACCOUNT_IP: "limit_sul",
810
+ BLOCKED_ACCOUNT_EMAIL: "limit_wc",
811
+ // MFA & My Account
812
+ MFA_REQUIRED: "mfar",
813
+ MANAGEMENT_API_READ_OPERATION: "mgmt_api_read",
814
+ FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT: "my_account_authentication_method_failed",
815
+ SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT: "my_account_authentication_method_succeeded",
816
+ // OIDC operations
817
+ FAILED_OIDC_BACKCHANNEL_LOGOUT: "oidc_backchannel_logout_failed",
818
+ SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT: "oidc_backchannel_logout_succeeded",
819
+ // Organization
820
+ ORGANIZATION_MEMBER_ADDED: "organization_member_added",
821
+ // Passkey operations
822
+ PASSKEY_CHALLENGE_FAILED: "passkey_challenge_failed",
823
+ PASSKEY_CHALLENGE_STARTED: "passkey_challenge_started",
824
+ // Security & password events
825
+ PRE_LOGIN_ASSESSMENT: "pla",
826
+ BREACHED_PASSWORD: "pwd_leak",
827
+ BREACHED_PASSWORD_ON_RESET: "reset_pwd_leak",
828
+ SUCCESS_RESOURCE_CLEANUP: "resource_cleanup",
829
+ RICH_CONSENTS_ACCESS_ERROR: "rich_consents_access_error",
830
+ // Successful operations
831
+ SUCCESS_LOGIN: "s",
832
+ SUCCESS_API_OPERATION: "sapi",
833
+ SUCCESS_CHANGE_EMAIL: "sce",
834
+ SUCCESS_CROSS_ORIGIN_AUTHENTICATION: "scoa",
835
+ SUCCESS_CHANGE_PASSWORD: "scp",
836
+ SUCCESS_CHANGE_PHONE_NUMBER: "scpn",
837
+ SUCCESS_CHANGE_PASSWORD_REQUEST: "scpr",
838
+ SUCCESS_CHANGE_USERNAME: "scu",
839
+ SUCCESS_CREDENTIAL_VALIDATION: "scv",
840
+ SUCCESS_DELEGATION: "sd",
841
+ SUCCESS_USER_DELETION: "sdu",
842
+ SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN: "seacft",
843
+ SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS: "seccft",
844
+ SUCCESS_EXCHANGE_CUSTOM_TOKEN: "secte",
845
+ SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN: "sede",
846
+ SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN: "sens",
847
+ SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN: "seoobft",
848
+ SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN: "seotpft",
849
+ SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN: "sepft",
850
+ SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN: "sepkoobft",
851
+ SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN: "sepkotpft",
852
+ SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN: "sepkrcft",
853
+ SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN: "sercft",
854
+ SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN: "sertft",
855
+ SUCCESSFULLY_ACCEPTED_USER_INVITE: "si",
856
+ BREACHED_PASSWORD_ON_SIGNUP: "signup_pwd_leak",
857
+ SUCCESS_LOGOUT: "slo",
858
+ SUCCESS_REVOCATION: "srrt",
859
+ SUCCESS_SIGNUP: "ss",
860
+ FAILED_SS_SSO_OPERATION: "ss_sso_failure",
861
+ INFORMATION_FROM_SS_SSO_OPERATION: "ss_sso_info",
862
+ SUCCESS_SS_SSO_OPERATION: "ss_sso_success",
863
+ SUCCESS_SILENT_AUTH: "ssa",
864
+ SUCCESSFUL_SCIM_OPERATION: "sscim",
865
+ SUCCESSFULLY_IMPORTED_USERS: "sui",
866
+ SUCCESS_VERIFICATION_EMAIL: "sv",
867
+ SUCCESS_VERIFICATION_EMAIL_REQUEST: "svr",
868
+ // Warnings & misc
869
+ MAX_AMOUNT_OF_AUTHENTICATORS: "too_many_records",
870
+ USER_LOGIN_BLOCK_RELEASED: "ublkdu",
871
+ FAILED_UNIVERSAL_LOGOUT: "universal_logout_failed",
872
+ SUCCESSFUL_UNIVERSAL_LOGOUT: "universal_logout_succeeded",
873
+ WARNING_DURING_LOGIN: "w",
874
+ WARNING_SENDING_NOTIFICATION: "wn",
875
+ WARNING_USER_MANAGEMENT: "wum"
876
+ }, rt = t.string().refine(
877
+ (e) => Object.values(st).includes(e),
878
+ { message: "Invalid log type" }
879
+ ), _t = t.object({
761
880
  name: t.string(),
762
881
  version: t.string(),
763
882
  env: t.object({
764
883
  node: t.string().optional()
765
884
  }).optional()
766
- }), Rt = t.object({
885
+ }), kt = t.object({
767
886
  type: rt,
768
887
  date: t.string(),
769
888
  description: t.string().optional(),
@@ -785,23 +904,23 @@ const rt = t.enum([
785
904
  strategy: t.string().optional(),
786
905
  strategy_type: t.string().optional(),
787
906
  hostname: t.string().optional(),
788
- auth0_client: lt.optional()
789
- }), ct = t.object({
907
+ auth0_client: _t.optional()
908
+ }), lt = t.object({
790
909
  user_id: t.string(),
791
910
  password: t.string(),
792
911
  algorithm: t.enum(["bcrypt", "argon2id"]).default("argon2id")
793
- }), Pt = t.object({
794
- ...ct.shape,
912
+ }), Ht = t.object({
913
+ ...lt.shape,
795
914
  created_at: t.string(),
796
915
  updated_at: t.string()
797
- }), b = t.object({
916
+ }), m = t.object({
798
917
  initial_user_agent: t.string().describe("First user agent of the device from which this user logged in"),
799
918
  initial_ip: t.string().describe("First IP address associated with this session"),
800
919
  initial_asn: t.string().describe("First autonomous system number associated with this session"),
801
920
  last_user_agent: t.string().describe("Last user agent of the device from which this user logged in"),
802
921
  last_ip: t.string().describe("Last IP address from which this user logged in"),
803
922
  last_asn: t.string().describe("Last autonomous system number from which this user logged in")
804
- }), pt = t.object({
923
+ }), ct = t.object({
805
924
  id: t.string(),
806
925
  revoked_at: t.string().optional(),
807
926
  used_at: t.string().optional(),
@@ -809,17 +928,17 @@ const rt = t.enum([
809
928
  expires_at: t.string().optional(),
810
929
  login_session_id: t.string(),
811
930
  idle_expires_at: t.string().optional(),
812
- device: b.describe(
931
+ device: m.describe(
813
932
  "Metadata related to the device used in the session"
814
933
  ),
815
934
  clients: t.array(t.string()).describe("List of client details for the session")
816
- }), Lt = t.object({
935
+ }), Pt = t.object({
817
936
  created_at: t.string(),
818
937
  updated_at: t.string(),
819
938
  authenticated_at: t.string(),
820
939
  last_interaction_at: t.string(),
821
- ...pt.shape
822
- }), Bt = t.object({
940
+ ...ct.shape
941
+ }), vt = t.object({
823
942
  kid: t.string().openapi({ description: "The key id of the signing key" }),
824
943
  cert: t.string().openapi({ description: "The public certificate of the signing key" }),
825
944
  fingerprint: t.string().openapi({ description: "The cert fingerprint" }),
@@ -840,7 +959,7 @@ const rt = t.enum([
840
959
  revoked_at: t.string().optional().openapi({ description: "The date and time when the key was revoked" })
841
960
  });
842
961
  var dt = /* @__PURE__ */ ((e) => (e.RefreshToken = "refresh_token", e.AuthorizationCode = "authorization_code", e.ClientCredential = "client_credentials", e.Passwordless = "passwordless", e.Password = "password", e.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", e))(dt || {});
843
- const Ht = t.object({
962
+ const Mt = t.object({
844
963
  access_token: t.string(),
845
964
  id_token: t.string().optional(),
846
965
  scope: t.string().optional(),
@@ -853,7 +972,7 @@ t.object({
853
972
  code: t.string(),
854
973
  state: t.string().optional()
855
974
  });
856
- const gt = t.object({
975
+ const pt = t.object({
857
976
  button_border_radius: t.number(),
858
977
  button_border_weight: t.number(),
859
978
  buttons_style: t.enum(["pill"]),
@@ -863,7 +982,7 @@ const gt = t.object({
863
982
  show_widget_shadow: t.boolean(),
864
983
  widget_border_weight: t.number(),
865
984
  widget_corner_radius: t.number()
866
- }), ut = t.object({
985
+ }), gt = t.object({
867
986
  base_focus_color: t.string(),
868
987
  base_hover_color: t.string(),
869
988
  body_text: t.string(),
@@ -886,7 +1005,7 @@ const gt = t.object({
886
1005
  }), n = t.object({
887
1006
  bold: t.boolean(),
888
1007
  size: t.number()
889
- }), _t = t.object({
1008
+ }), Et = t.object({
890
1009
  body_text: n,
891
1010
  buttons_text: n,
892
1011
  font_url: t.string(),
@@ -896,31 +1015,31 @@ const gt = t.object({
896
1015
  reference_text_size: t.number(),
897
1016
  subtitle: n,
898
1017
  title: n
899
- }), mt = t.object({
1018
+ }), ut = t.object({
900
1019
  background_color: t.string(),
901
1020
  background_image_url: t.string(),
902
1021
  page_layout: t.enum(["center"])
903
- }), ht = t.object({
1022
+ }), St = t.object({
904
1023
  header_text_alignment: t.enum(["center"]),
905
1024
  logo_height: t.number(),
906
1025
  logo_position: t.enum(["center"]),
907
1026
  logo_url: t.string(),
908
1027
  social_buttons_layout: t.enum(["bottom"])
909
- }), bt = t.object({
910
- borders: gt,
911
- colors: ut,
1028
+ }), mt = t.object({
1029
+ borders: pt,
1030
+ colors: gt,
912
1031
  displayName: t.string(),
913
- fonts: _t,
914
- page_background: mt,
915
- widget: ht
916
- }), Ft = bt.extend({
1032
+ fonts: Et,
1033
+ page_background: ut,
1034
+ widget: St
1035
+ }), Gt = mt.extend({
917
1036
  themeId: t.string()
918
- }), Kt = t.object({
1037
+ }), xt = t.object({
919
1038
  universal_login_experience: t.enum(["new", "classic"]).default("new"),
920
1039
  identifier_first: t.boolean().default(!0),
921
1040
  password_first: t.boolean().default(!1),
922
1041
  webauthn_platform_first_factor: t.boolean()
923
- }), Mt = t.object({
1042
+ }), Kt = t.object({
924
1043
  name: t.string(),
925
1044
  enabled: t.boolean().optional().default(!0),
926
1045
  default_from_address: t.string().optional(),
@@ -950,7 +1069,7 @@ const gt = t.object({
950
1069
  })
951
1070
  ]),
952
1071
  settings: t.object({}).optional()
953
- }), ft = t.object({
1072
+ }), At = t.object({
954
1073
  // The actual refresh token value (primary key).
955
1074
  id: t.string(),
956
1075
  // Link to the session record
@@ -963,7 +1082,7 @@ const gt = t.object({
963
1082
  idle_expires_at: t.string().optional(),
964
1083
  // When the token was last used.
965
1084
  last_exchanged_at: t.string().optional(),
966
- device: b,
1085
+ device: m,
967
1086
  resource_servers: t.array(
968
1087
  t.object({
969
1088
  audience: t.string(),
@@ -971,106 +1090,106 @@ const gt = t.object({
971
1090
  })
972
1091
  ),
973
1092
  rotating: t.boolean()
974
- }), Gt = t.object({
1093
+ }), Bt = t.object({
975
1094
  // When the refresh token record was created.
976
1095
  created_at: t.string(),
977
1096
  // Spread in the rest of the refresh token properties.
978
- ...ft.shape
1097
+ ...At.shape
979
1098
  }), Xt = t.object({
980
1099
  to: t.string(),
981
1100
  message: t.string()
982
- }), Wt = t.object({
1101
+ }), Vt = t.object({
983
1102
  name: t.string(),
984
1103
  options: t.object({})
985
1104
  });
986
- function qt(e) {
1105
+ function Wt(e) {
987
1106
  const [o, a] = e.split("|");
988
1107
  if (!o || !a)
989
1108
  throw new Error(`Invalid user_id: ${e}`);
990
1109
  return { connection: o, id: a };
991
1110
  }
992
1111
  export {
993
- lt as Auth0Client,
994
- u as AuthorizationResponseMode,
995
- g as AuthorizationResponseType,
996
- _ as CodeChallengeMethod,
1112
+ _t as Auth0Client,
1113
+ g as AuthorizationResponseMode,
1114
+ p as AuthorizationResponseType,
1115
+ E as CodeChallengeMethod,
997
1116
  d as ComponentCategory,
998
- p as ComponentType,
1117
+ c as ComponentType,
999
1118
  dt as GrantType,
1000
1119
  st as LogTypes,
1001
- D as NodeType,
1002
- C as applicationInsertSchema,
1003
- k as applicationSchema,
1004
- It as auth0FlowInsertSchema,
1005
- F as auth0FlowSchema,
1006
- jt as auth0UserResponseSchema,
1007
- K as authParamsSchema,
1008
- c as baseUserSchema,
1009
- gt as bordersSchema,
1010
- wt as brandingSchema,
1011
- T as buttonComponentSchema,
1012
- z as codeInsertSchema,
1013
- kt as codeSchema,
1014
- V as codeTypeSchema,
1015
- ut as colorsSchema,
1016
- U as componentSchema,
1017
- G as connectionInsertSchema,
1018
- M as connectionOptionsSchema,
1120
+ j as NodeType,
1121
+ N as applicationInsertSchema,
1122
+ T as applicationSchema,
1123
+ Ot as auth0FlowInsertSchema,
1124
+ G as auth0FlowSchema,
1125
+ Ct as auth0UserResponseSchema,
1126
+ x as authParamsSchema,
1127
+ l as baseUserSchema,
1128
+ pt as bordersSchema,
1129
+ ft as brandingSchema,
1130
+ L as buttonComponentSchema,
1131
+ q as codeInsertSchema,
1132
+ Tt as codeSchema,
1133
+ Y as codeTypeSchema,
1134
+ gt as colorsSchema,
1135
+ F as componentSchema,
1136
+ B as connectionInsertSchema,
1137
+ K as connectionOptionsSchema,
1019
1138
  X as connectionSchema,
1020
1139
  i as coordinatesSchema,
1021
1140
  Q as customDomainInsertSchema,
1022
- J as customDomainSchema,
1023
- Ot as customDomainWithTenantIdSchema,
1024
- Mt as emailProviderSchema,
1025
- H as endingSchema,
1026
- A as fieldComponentSchema,
1027
- R as flowNodeSchema,
1141
+ Z as customDomainSchema,
1142
+ Rt as customDomainWithTenantIdSchema,
1143
+ Kt as emailProviderSchema,
1144
+ M as endingSchema,
1145
+ U as fieldComponentSchema,
1146
+ k as flowNodeSchema,
1028
1147
  n as fontDetailsSchema,
1029
- _t as fontsSchema,
1030
- Tt as formControlSchema,
1148
+ Et as fontsSchema,
1149
+ Lt as formControlSchema,
1031
1150
  $ as formInsertSchema,
1032
- Z as formNodeComponentDefinition,
1033
- vt as formSchema,
1034
- N as genericComponentSchema,
1035
- P as genericNodeSchema,
1036
- At as hookInsertSchema,
1037
- Nt as hookSchema,
1038
- S as identitySchema,
1039
- Ut as jwksKeySchema,
1151
+ J as formNodeComponentDefinition,
1152
+ Dt as formSchema,
1153
+ y as genericComponentSchema,
1154
+ H as genericNodeSchema,
1155
+ Ut as hookInsertSchema,
1156
+ yt as hookSchema,
1157
+ h as identitySchema,
1158
+ Ft as jwksKeySchema,
1040
1159
  it as jwksSchema,
1041
- v as legalComponentSchema,
1042
- Rt as logSchema,
1160
+ D as legalComponentSchema,
1161
+ kt as logSchema,
1043
1162
  at as loginSessionInsertSchema,
1044
- xt as loginSessionSchema,
1045
- L as nodeSchema,
1046
- Dt as openIDConfigurationSchema,
1047
- mt as pageBackgroundSchema,
1048
- qt as parseUserId,
1049
- ct as passwordInsertSchema,
1050
- Pt as passwordSchema,
1051
- f as profileDataSchema,
1052
- Kt as promptSettingSchema,
1053
- ft as refreshTokenInsertSchema,
1054
- Gt as refreshTokenSchema,
1055
- O as richTextComponentSchema,
1056
- w as samlpAddon,
1057
- pt as sessionInsertSchema,
1058
- Lt as sessionSchema,
1059
- Bt as signingKeySchema,
1060
- Wt as smsProviderSchema,
1163
+ wt as loginSessionSchema,
1164
+ P as nodeSchema,
1165
+ jt as openIDConfigurationSchema,
1166
+ ut as pageBackgroundSchema,
1167
+ Wt as parseUserId,
1168
+ lt as passwordInsertSchema,
1169
+ Ht as passwordSchema,
1170
+ A as profileDataSchema,
1171
+ xt as promptSettingSchema,
1172
+ At as refreshTokenInsertSchema,
1173
+ Bt as refreshTokenSchema,
1174
+ R as richTextComponentSchema,
1175
+ f as samlpAddon,
1176
+ ct as sessionInsertSchema,
1177
+ Pt as sessionSchema,
1178
+ vt as signingKeySchema,
1179
+ Vt as smsProviderSchema,
1061
1180
  Xt as smsSendParamsSchema,
1062
- B as startSchema,
1063
- x as stepNodeSchema,
1064
- W as tenantInsertSchema,
1065
- q as tenantSchema,
1066
- bt as themeInsertSchema,
1067
- Ft as themeSchema,
1068
- Ht as tokenResponseSchema,
1069
- Et as totalsSchema,
1070
- E as userInsertSchema,
1071
- yt as userResponseSchema,
1072
- j as userSchema,
1073
- Ct as vendorSettingsSchema,
1074
- Y as verificationMethodsSchema,
1075
- ht as widgetSchema
1181
+ v as startSchema,
1182
+ w as stepNodeSchema,
1183
+ V as tenantInsertSchema,
1184
+ W as tenantSchema,
1185
+ mt as themeInsertSchema,
1186
+ Gt as themeSchema,
1187
+ Mt as tokenResponseSchema,
1188
+ bt as totalsSchema,
1189
+ b as userInsertSchema,
1190
+ It as userResponseSchema,
1191
+ C as userSchema,
1192
+ Nt as vendorSettingsSchema,
1193
+ z as verificationMethodsSchema,
1194
+ St as widgetSchema
1076
1195
  };