@authhero/adapter-interfaces 0.85.0 → 0.86.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Re=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),a=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),m=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),S=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:m.optional()}),l=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),u=l.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().default("email"),connection:e.z.string().default("email"),is_social:e.z.boolean().optional()}),E=e.z.object({...u.shape,...a.shape,user_id:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(S).optional()}),Le=E,De=l.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),ye="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Ue=(t=21)=>{let i="",s=crypto.getRandomValues(new Uint8Array(t));for(;t--;)i+=ye[s[t]&63];return i};const h=e.z.object({audience:e.z.string().optional(),recipient:e.z.string().optional(),createUpnClaim:e.z.boolean().optional(),mapUnknownClaimsAsIs:e.z.boolean().optional(),passthroughClaimsWithNoMapping:e.z.boolean().optional(),mapIdentities:e.z.boolean().optional(),signatureAlgorithm:e.z.string().optional(),digestAlgorithm:e.z.string().optional(),issuer:e.z.string().optional(),destination:e.z.string().optional(),lifetimeInSeconds:e.z.number().optional(),signResponse:e.z.boolean().optional(),nameIdentifierFormat:e.z.string().optional(),nameIdentifierProbes:e.z.array(e.z.string()).optional(),authnContextClassRef:e.z.string().optional(),mappings:e.z.record(e.z.string()).optional()}),b=e.z.object({id:e.z.string(),name:e.z.string(),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:e.z.object({samlp:h.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:e.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:e.z.string().default(()=>Ue()).optional(),disable_sign_ups:e.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"}),client_metadata:e.z.record(e.z.string().length(255)).optional()}),A=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...b.shape}),n=e.z.object({x:e.z.number(),y:e.z.number()});var _=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(_||{}),p=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(p||{});const r=e.z.object({id:e.z.string(),category:e.z.nativeEnum(p),type:e.z.nativeEnum(_)}),f=r.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),C=r.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),I=r.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),O=r.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),T=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),N=e.z.union([f,C,I,O,T]);var R=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(R||{});const L=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:n,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(N),next_node:e.z.string()}).passthrough()}),D=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:n,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),y=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:n}).passthrough(),U=e.z.union([L,D,y]),F=e.z.object({next_node:e.z.string(),coordinates:n}).passthrough(),j=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:n}).passthrough(),k=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(U),start:F,ending:j,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),Fe=k.omit({id:!0,created_at:!0,updated_at:!0});var z=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(z||{}),d=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(d||{}),g=(t=>(t.S256="S256",t.Plain="plain",t))(g||{});const w=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(z).optional(),response_mode:e.z.nativeEnum(d).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(g).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),je=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),P=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional()}),v=e.z.object({id:e.z.string().optional(),name:e.z.string(),strategy:e.z.string(),options:P.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional()}),H=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(v.shape),M=e.z.object({name:e.z.string(),audience:e.z.string(),sender_email:e.z.string().email(),sender_name:e.z.string(),support_url:e.z.string().url().optional(),logo:e.z.string().url().optional(),primary_color:e.z.string().optional(),secondary_color:e.z.string().optional(),language:e.z.string().optional(),id:e.z.string().optional()}),G=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...M.shape,id:e.z.string()});e.z.object({...A.shape,tenant:G,connections:e.z.array(H)});const x=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),K=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:x,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),ke=e.z.object({...K.shape,created_at:e.z.string()}),B=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),W=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),X=e.z.object({...B.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(W)}).optional(),tls_policy:e.z.string().optional()}),we=X.extend({tenant_id:e.z.string()}),Pe=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),V=e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()}),required:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()}),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)})]),Y=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.array(e.z.string())})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(V),next_node:e.z.string()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),ve=e.z.object({...a.shape,...Y.shape,id:e.z.string()}),q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),Q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),c={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},He=e.z.object({...c,trigger_id:q,url:e.z.string()}),Me=e.z.object({...c,trigger_id:Q,form_id:e.z.string()}),Ge=e.z.union([He,Me]),xe=e.z.object({...c,trigger_id:q,...a.shape,hook_id:e.z.string(),url:e.z.string()}),Ke=e.z.object({...c,trigger_id:Q,...a.shape,hook_id:e.z.string(),form_id:e.z.string()}),Be=e.z.union([xe,Ke]),Z=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),We=e.z.object({keys:e.z.array(Z)}),Xe=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),J=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:w,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),Ve=e.z.object({...J.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),$={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},Ye=e.z.string().refine(t=>Object.values($).includes(t),{message:"Invalid log type"}),ee=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),qe=e.z.object({type:Ye,date:e.z.string(),description:e.z.string().optional(),log_id:e.z.string().optional(),_id:e.z.string().optional(),ip:e.z.string(),user_agent:e.z.string(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.array(e.z.string()).optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ee.optional()}),te=e.z.object({user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id")}),Qe=e.z.object({...te.shape,created_at:e.z.string(),updated_at:e.z.string()}),oe=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),ne=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:oe.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),Ze=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...ne.shape}),Je=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var ie=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(ie||{});const $e=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),se=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),o=e.z.object({bold:e.z.boolean(),size:e.z.number()}),re=e.z.object({body_text:o,buttons_text:o,font_url:e.z.string(),input_labels:o,links:o,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:o,title:o}),ce=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),le=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),_e=e.z.object({borders:ae,colors:se,displayName:e.z.string(),fonts:re,page_background:ce,widget:le}),et=_e.extend({themeId:e.z.string()}),tt=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),ot=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),pe=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:oe,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),nt=e.z.object({created_at:e.z.string(),...pe.shape}),it=e.z.object({to:e.z.string(),message:e.z.string()}),at=e.z.object({name:e.z.string(),options:e.z.object({})}),ze=e.z.object({value:e.z.string(),description:e.z.string().optional()}),de=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),ge=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(ze).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:de.optional()}),me=e.z.object({id:e.z.string().optional(),...ge.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),st=e.z.array(me),Se=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ue=e.z.object({...Se.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),rt=e.z.array(ue),Ee=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),ct=e.z.array(Ee),he=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),be=e.z.object({...he.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),lt=e.z.array(be),Ae=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),_t=e.z.array(Ae),fe=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),Ce=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...fe.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),pt=e.z.array(Ce),Ie=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Oe=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Te=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),Ne=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Ie,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Oe).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Te}),zt=e.z.object({...Ne.shape,...a.shape,id:e.z.string()});function dt(t){const[i,s]=t.split("|");if(!i||!s)throw new Error(`Invalid user_id: ${t}`);return{connection:i,id:s}}exports.Auth0Client=ee;exports.AuthorizationResponseMode=d;exports.AuthorizationResponseType=z;exports.CodeChallengeMethod=g;exports.ComponentCategory=p;exports.ComponentType=_;exports.GrantType=ie;exports.LogTypes=$;exports.NodeType=R;exports.applicationInsertSchema=b;exports.applicationSchema=A;exports.auth0FlowInsertSchema=Fe;exports.auth0FlowSchema=k;exports.auth0UserResponseSchema=Le;exports.authParamsSchema=w;exports.baseUserSchema=l;exports.bordersSchema=ae;exports.brandingSchema=je;exports.buttonComponentSchema=C;exports.codeInsertSchema=K;exports.codeSchema=ke;exports.codeTypeSchema=x;exports.colorsSchema=se;exports.componentSchema=N;exports.connectionInsertSchema=v;exports.connectionOptionsSchema=P;exports.connectionSchema=H;exports.coordinatesSchema=n;exports.customDomainInsertSchema=B;exports.customDomainSchema=X;exports.customDomainWithTenantIdSchema=we;exports.emailProviderSchema=ot;exports.endingSchema=j;exports.fieldComponentSchema=O;exports.flowNodeSchema=D;exports.fontDetailsSchema=o;exports.fontsSchema=re;exports.formControlSchema=Pe;exports.formInsertSchema=Y;exports.formNodeComponentDefinition=V;exports.formSchema=ve;exports.genericComponentSchema=T;exports.genericNodeSchema=y;exports.hookInsertSchema=Ge;exports.hookSchema=Be;exports.identitySchema=S;exports.jwksKeySchema=We;exports.jwksSchema=Z;exports.legalComponentSchema=I;exports.logSchema=qe;exports.loginSessionInsertSchema=J;exports.loginSessionSchema=Ve;exports.nodeSchema=U;exports.openIDConfigurationSchema=Xe;exports.organizationBrandingSchema=Ie;exports.organizationEnabledConnectionSchema=Oe;exports.organizationInsertSchema=Ne;exports.organizationSchema=zt;exports.organizationTokenQuotaSchema=Te;exports.pageBackgroundSchema=ce;exports.parseUserId=dt;exports.passwordInsertSchema=te;exports.passwordSchema=Qe;exports.profileDataSchema=m;exports.promptSettingSchema=tt;exports.refreshTokenInsertSchema=pe;exports.refreshTokenSchema=nt;exports.resourceServerInsertSchema=ge;exports.resourceServerListSchema=st;exports.resourceServerOptionsSchema=de;exports.resourceServerSchema=me;exports.resourceServerScopeSchema=ze;exports.richTextComponentSchema=f;exports.roleInsertSchema=fe;exports.roleListSchema=pt;exports.rolePermissionInsertSchema=Se;exports.rolePermissionListSchema=rt;exports.rolePermissionSchema=ue;exports.rolePermissionWithDetailsListSchema=ct;exports.rolePermissionWithDetailsSchema=Ee;exports.roleSchema=Ce;exports.samlpAddon=h;exports.sessionInsertSchema=ne;exports.sessionSchema=Ze;exports.signingKeySchema=Je;exports.smsProviderSchema=at;exports.smsSendParamsSchema=it;exports.startSchema=F;exports.stepNodeSchema=L;exports.tenantInsertSchema=M;exports.tenantSchema=G;exports.themeInsertSchema=_e;exports.themeSchema=et;exports.tokenResponseSchema=$e;exports.totalsSchema=Re;exports.userInsertSchema=u;exports.userPermissionInsertSchema=he;exports.userPermissionListSchema=lt;exports.userPermissionSchema=be;exports.userPermissionWithDetailsListSchema=_t;exports.userPermissionWithDetailsSchema=Ae;exports.userResponseSchema=De;exports.userSchema=E;exports.verificationMethodsSchema=W;exports.widgetSchema=le;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Le=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),n=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),m=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),S=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:m.optional()}),l=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),u=l.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().default("email"),connection:e.z.string().default("email"),is_social:e.z.boolean().optional()}),E=e.z.object({...u.shape,...n.shape,user_id:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(S).optional()}),De=E,ye=l.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),Ue="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Fe=(t=21)=>{let a="",s=crypto.getRandomValues(new Uint8Array(t));for(;t--;)a+=Ue[s[t]&63];return a};const h=e.z.object({audience:e.z.string().optional(),recipient:e.z.string().optional(),createUpnClaim:e.z.boolean().optional(),mapUnknownClaimsAsIs:e.z.boolean().optional(),passthroughClaimsWithNoMapping:e.z.boolean().optional(),mapIdentities:e.z.boolean().optional(),signatureAlgorithm:e.z.string().optional(),digestAlgorithm:e.z.string().optional(),issuer:e.z.string().optional(),destination:e.z.string().optional(),lifetimeInSeconds:e.z.number().optional(),signResponse:e.z.boolean().optional(),nameIdentifierFormat:e.z.string().optional(),nameIdentifierProbes:e.z.array(e.z.string()).optional(),authnContextClassRef:e.z.string().optional(),mappings:e.z.record(e.z.string()).optional()}),b=e.z.object({id:e.z.string(),name:e.z.string(),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:e.z.object({samlp:h.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:e.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:e.z.string().default(()=>Fe()).optional(),disable_sign_ups:e.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"}),client_metadata:e.z.record(e.z.string().length(255)).optional()}),f=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...b.shape}),i=e.z.object({x:e.z.number(),y:e.z.number()});var _=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(_||{}),p=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(p||{});const r=e.z.object({id:e.z.string(),category:e.z.nativeEnum(p),type:e.z.nativeEnum(_)}),A=r.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),I=r.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),C=r.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),O=r.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),T=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),N=e.z.union([A,I,C,O,T]);var R=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(R||{});const L=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(N),next_node:e.z.string()}).passthrough()}),D=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),y=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:i}).passthrough(),U=e.z.union([L,D,y]),F=e.z.object({next_node:e.z.string(),coordinates:i}).passthrough(),j=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:i}).passthrough(),k=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(U),start:F,ending:j,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),je=k.omit({id:!0,created_at:!0,updated_at:!0});var z=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(z||{}),d=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(d||{}),g=(t=>(t.S256="S256",t.Plain="plain",t))(g||{});const w=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(z).optional(),response_mode:e.z.nativeEnum(d).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(g).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),ke=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),P=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional()}),v=e.z.object({id:e.z.string().optional(),name:e.z.string(),strategy:e.z.string(),options:P.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional()}),H=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(v.shape),M=e.z.object({name:e.z.string(),audience:e.z.string(),sender_email:e.z.string().email(),sender_name:e.z.string(),support_url:e.z.string().url().optional(),logo:e.z.string().url().optional(),primary_color:e.z.string().optional(),secondary_color:e.z.string().optional(),language:e.z.string().optional(),id:e.z.string().optional()}),G=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...M.shape,id:e.z.string()});e.z.object({...f.shape,tenant:G,connections:e.z.array(H)});const x=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),K=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:x,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),we=e.z.object({...K.shape,created_at:e.z.string()}),B=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),W=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),X=e.z.object({...B.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(W)}).optional(),tls_policy:e.z.string().optional()}),Pe=X.extend({tenant_id:e.z.string()}),ve=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),V=e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()}),required:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()}),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)})]),Y=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.array(e.z.string())})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(V),next_node:e.z.string()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),He=e.z.object({...n.shape,...Y.shape,id:e.z.string()}),q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),Q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),c={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},Me=e.z.object({...c,trigger_id:q,url:e.z.string()}),Ge=e.z.object({...c,trigger_id:Q,form_id:e.z.string()}),xe=e.z.union([Me,Ge]),Ke=e.z.object({...c,trigger_id:q,...n.shape,hook_id:e.z.string(),url:e.z.string()}),Be=e.z.object({...c,trigger_id:Q,...n.shape,hook_id:e.z.string(),form_id:e.z.string()}),We=e.z.union([Ke,Be]),Z=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),Xe=e.z.object({keys:e.z.array(Z)}),Ve=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),J=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:w,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),Ye=e.z.object({...J.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),$={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},qe=e.z.string().refine(t=>Object.values($).includes(t),{message:"Invalid log type"}),ee=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),Qe=e.z.object({type:qe,date:e.z.string(),description:e.z.string().optional(),log_id:e.z.string().optional(),_id:e.z.string().optional(),ip:e.z.string(),user_agent:e.z.string(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.array(e.z.string()).optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ee.optional()}),te=e.z.object({user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id")}),Ze=e.z.object({...te.shape,created_at:e.z.string(),updated_at:e.z.string()}),oe=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),ne=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:oe.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),Je=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...ne.shape}),$e=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var ie=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(ie||{});const et=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),se=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),o=e.z.object({bold:e.z.boolean(),size:e.z.number()}),re=e.z.object({body_text:o,buttons_text:o,font_url:e.z.string(),input_labels:o,links:o,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:o,title:o}),ce=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),le=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),_e=e.z.object({borders:ae,colors:se,displayName:e.z.string(),fonts:re,page_background:ce,widget:le}),tt=_e.extend({themeId:e.z.string()}),ot=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),nt=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),pe=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:oe,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),it=e.z.object({created_at:e.z.string(),...pe.shape}),at=e.z.object({to:e.z.string(),message:e.z.string()}),st=e.z.object({name:e.z.string(),options:e.z.object({})}),ze=e.z.object({value:e.z.string(),description:e.z.string().optional()}),de=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),ge=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(ze).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:de.optional()}),me=e.z.object({id:e.z.string().optional(),...ge.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),rt=e.z.array(me),Se=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ue=e.z.object({...Se.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),ct=e.z.array(ue),Ee=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),lt=e.z.array(Ee),he=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),be=e.z.object({...he.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),_t=e.z.array(be),fe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),pt=e.z.array(fe),Ae=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),Ie=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Ae.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),zt=e.z.array(Ie),Ce=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Oe=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Te=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),Ne=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Ce,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Oe).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Te}),dt=e.z.object({...Ne.shape,...n.shape,id:e.z.string()}),Re=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),gt=e.z.object({...Re.shape,...n.shape,id:e.z.string()});function mt(t){const[a,s]=t.split("|");if(!a||!s)throw new Error(`Invalid user_id: ${t}`);return{connection:a,id:s}}exports.Auth0Client=ee;exports.AuthorizationResponseMode=d;exports.AuthorizationResponseType=z;exports.CodeChallengeMethod=g;exports.ComponentCategory=p;exports.ComponentType=_;exports.GrantType=ie;exports.LogTypes=$;exports.NodeType=R;exports.applicationInsertSchema=b;exports.applicationSchema=f;exports.auth0FlowInsertSchema=je;exports.auth0FlowSchema=k;exports.auth0UserResponseSchema=De;exports.authParamsSchema=w;exports.baseUserSchema=l;exports.bordersSchema=ae;exports.brandingSchema=ke;exports.buttonComponentSchema=I;exports.codeInsertSchema=K;exports.codeSchema=we;exports.codeTypeSchema=x;exports.colorsSchema=se;exports.componentSchema=N;exports.connectionInsertSchema=v;exports.connectionOptionsSchema=P;exports.connectionSchema=H;exports.coordinatesSchema=i;exports.customDomainInsertSchema=B;exports.customDomainSchema=X;exports.customDomainWithTenantIdSchema=Pe;exports.emailProviderSchema=nt;exports.endingSchema=j;exports.fieldComponentSchema=O;exports.flowNodeSchema=D;exports.fontDetailsSchema=o;exports.fontsSchema=re;exports.formControlSchema=ve;exports.formInsertSchema=Y;exports.formNodeComponentDefinition=V;exports.formSchema=He;exports.genericComponentSchema=T;exports.genericNodeSchema=y;exports.hookInsertSchema=xe;exports.hookSchema=We;exports.identitySchema=S;exports.jwksKeySchema=Xe;exports.jwksSchema=Z;exports.legalComponentSchema=C;exports.logSchema=Qe;exports.loginSessionInsertSchema=J;exports.loginSessionSchema=Ye;exports.nodeSchema=U;exports.openIDConfigurationSchema=Ve;exports.organizationBrandingSchema=Ce;exports.organizationEnabledConnectionSchema=Oe;exports.organizationInsertSchema=Ne;exports.organizationSchema=dt;exports.organizationTokenQuotaSchema=Te;exports.pageBackgroundSchema=ce;exports.parseUserId=mt;exports.passwordInsertSchema=te;exports.passwordSchema=Ze;exports.profileDataSchema=m;exports.promptSettingSchema=ot;exports.refreshTokenInsertSchema=pe;exports.refreshTokenSchema=it;exports.resourceServerInsertSchema=ge;exports.resourceServerListSchema=rt;exports.resourceServerOptionsSchema=de;exports.resourceServerSchema=me;exports.resourceServerScopeSchema=ze;exports.richTextComponentSchema=A;exports.roleInsertSchema=Ae;exports.roleListSchema=zt;exports.rolePermissionInsertSchema=Se;exports.rolePermissionListSchema=ct;exports.rolePermissionSchema=ue;exports.rolePermissionWithDetailsListSchema=lt;exports.rolePermissionWithDetailsSchema=Ee;exports.roleSchema=Ie;exports.samlpAddon=h;exports.sessionInsertSchema=ne;exports.sessionSchema=Je;exports.signingKeySchema=$e;exports.smsProviderSchema=st;exports.smsSendParamsSchema=at;exports.startSchema=F;exports.stepNodeSchema=L;exports.tenantInsertSchema=M;exports.tenantSchema=G;exports.themeInsertSchema=_e;exports.themeSchema=tt;exports.tokenResponseSchema=et;exports.totalsSchema=Le;exports.userInsertSchema=u;exports.userOrganizationInsertSchema=Re;exports.userOrganizationSchema=gt;exports.userPermissionInsertSchema=he;exports.userPermissionListSchema=_t;exports.userPermissionSchema=be;exports.userPermissionWithDetailsListSchema=pt;exports.userPermissionWithDetailsSchema=fe;exports.userResponseSchema=ye;exports.userSchema=E;exports.verificationMethodsSchema=W;exports.widgetSchema=le;
@@ -14860,6 +14860,37 @@ export declare const organizationSchema: z.ZodObject<{
14860
14860
  } | undefined;
14861
14861
  }>;
14862
14862
  export type Organization = z.infer<typeof organizationSchema>;
14863
+ export declare const userOrganizationInsertSchema: z.ZodObject<{
14864
+ user_id: z.ZodString;
14865
+ organization_id: z.ZodString;
14866
+ }, "strip", z.ZodTypeAny, {
14867
+ user_id: string;
14868
+ organization_id: string;
14869
+ }, {
14870
+ user_id: string;
14871
+ organization_id: string;
14872
+ }>;
14873
+ export type UserOrganizationInsert = z.infer<typeof userOrganizationInsertSchema>;
14874
+ export declare const userOrganizationSchema: z.ZodObject<{
14875
+ id: z.ZodString;
14876
+ created_at: z.ZodString;
14877
+ updated_at: z.ZodString;
14878
+ user_id: z.ZodString;
14879
+ organization_id: z.ZodString;
14880
+ }, "strip", z.ZodTypeAny, {
14881
+ created_at: string;
14882
+ updated_at: string;
14883
+ user_id: string;
14884
+ id: string;
14885
+ organization_id: string;
14886
+ }, {
14887
+ created_at: string;
14888
+ updated_at: string;
14889
+ user_id: string;
14890
+ id: string;
14891
+ organization_id: string;
14892
+ }>;
14893
+ export type UserOrganization = z.infer<typeof userOrganizationSchema>;
14863
14894
  export declare function parseUserId(user_id: string): {
14864
14895
  connection: string;
14865
14896
  id: string;
@@ -15099,6 +15130,22 @@ export interface OrganizationsAdapter {
15099
15130
  list(tenant_id: string, params?: ListParams): Promise<ListOrganizationsResponse>;
15100
15131
  update(tenant_id: string, id: string, params: Partial<OrganizationInsert>): Promise<boolean>;
15101
15132
  }
15133
+ export interface UserOrganizationsAdapter {
15134
+ create(tenantId: string, params: UserOrganizationInsert): Promise<UserOrganization>;
15135
+ get(tenantId: string, id: string): Promise<UserOrganization | null>;
15136
+ remove(tenantId: string, id: string): Promise<boolean>;
15137
+ /**
15138
+ * List user-organization relationships
15139
+ * @param tenantId - The tenant ID
15140
+ * @param params - List parameters including query options:
15141
+ * - q: "user_id:{userId}" to get organizations for a specific user
15142
+ * - q: "organization_id:{organizationId}" to get members of a specific organization
15143
+ */
15144
+ list(tenantId: string, params?: ListParams): Promise<{
15145
+ userOrganizations: UserOrganization[];
15146
+ } & Totals>;
15147
+ update(tenantId: string, id: string, params: Partial<UserOrganizationInsert>): Promise<boolean>;
15148
+ }
15102
15149
  export interface DataAdapters {
15103
15150
  applications: ApplicationsAdapter;
15104
15151
  branding: BrandingAdapter;
@@ -15126,6 +15173,7 @@ export interface DataAdapters {
15126
15173
  users: UserDataAdapter;
15127
15174
  userRoles: UserRolesAdapter;
15128
15175
  organizations: OrganizationsAdapter;
15176
+ userOrganizations: UserOrganizationsAdapter;
15129
15177
  }
15130
15178
 
15131
15179
  export {
@@ -1,9 +1,9 @@
1
1
  import { z as e } from "@hono/zod-openapi";
2
- const Pe = e.object({
2
+ const ve = e.object({
3
3
  start: e.number(),
4
4
  limit: e.number(),
5
5
  length: e.number()
6
- }), i = e.object({
6
+ }), o = e.object({
7
7
  created_at: e.string(),
8
8
  updated_at: e.string()
9
9
  }), h = e.object({
@@ -50,13 +50,13 @@ const Pe = e.object({
50
50
  is_social: e.boolean().optional()
51
51
  }), f = e.object({
52
52
  ...A.shape,
53
- ...i.shape,
53
+ ...o.shape,
54
54
  user_id: e.string(),
55
55
  is_social: e.boolean(),
56
56
  email: e.string().optional(),
57
57
  login_count: e.number().default(0),
58
58
  identities: e.array(b).optional()
59
- }), ve = f, He = l.extend({
59
+ }), He = f, Me = l.extend({
60
60
  login_count: e.number(),
61
61
  multifactor: e.array(e.string()).optional(),
62
62
  last_ip: e.string().optional(),
@@ -64,10 +64,10 @@ const Pe = e.object({
64
64
  user_id: e.string()
65
65
  }).catchall(e.any()), C = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
66
  let I = (t = 21) => {
67
- let o = "", s = crypto.getRandomValues(new Uint8Array(t));
67
+ let i = "", s = crypto.getRandomValues(new Uint8Array(t));
68
68
  for (; t--; )
69
- o += C[s[t] & 63];
70
- return o;
69
+ i += C[s[t] & 63];
70
+ return i;
71
71
  };
72
72
  const O = e.object({
73
73
  audience: e.string().optional(),
@@ -296,7 +296,7 @@ const k = e.object({
296
296
  sdkSrc: e.string().optional(),
297
297
  sdk_src: e.string().optional()
298
298
  }).passthrough()
299
- }).passthrough(), Me = G.omit({
299
+ }).passthrough(), Ge = G.omit({
300
300
  id: !0,
301
301
  created_at: !0,
302
302
  updated_at: !0
@@ -320,7 +320,7 @@ const x = e.object({
320
320
  ui_locales: e.string().optional(),
321
321
  // The following fields are not available in Auth0
322
322
  vendor_id: e.string().optional()
323
- }), Ge = e.object({
323
+ }), xe = e.object({
324
324
  colors: e.object({
325
325
  primary: e.string(),
326
326
  page_background: e.object({
@@ -388,14 +388,14 @@ e.object({
388
388
  tenant: V,
389
389
  connections: e.array(X)
390
390
  });
391
- const Y = e.enum([
391
+ const z = e.enum([
392
392
  "password_reset",
393
393
  "email_verification",
394
394
  "otp",
395
395
  "authorization_code",
396
396
  "oauth2_state",
397
397
  "ticket"
398
- ]), z = e.object({
398
+ ]), Y = e.object({
399
399
  code_id: e.string().openapi({
400
400
  description: "The code that will be used in for instance an email verification flow"
401
401
  }),
@@ -405,7 +405,7 @@ const Y = e.enum([
405
405
  connection_id: e.string().optional().openapi({
406
406
  description: "The connection that the code is connected to"
407
407
  }),
408
- code_type: Y,
408
+ code_type: z,
409
409
  code_verifier: e.string().optional().openapi({
410
410
  description: "The code verifier used in PKCE in outbound flows"
411
411
  }),
@@ -427,8 +427,8 @@ const Y = e.enum([
427
427
  expires_at: e.string(),
428
428
  used_at: e.string().optional(),
429
429
  user_id: e.string().optional()
430
- }), xe = e.object({
431
- ...z.shape,
430
+ }), Ke = e.object({
431
+ ...Y.shape,
432
432
  created_at: e.string()
433
433
  }), q = e.object({
434
434
  domain: e.string(),
@@ -458,9 +458,9 @@ const Y = e.enum([
458
458
  methods: e.array(Q)
459
459
  }).optional(),
460
460
  tls_policy: e.string().optional()
461
- }), Ke = Z.extend({
461
+ }), Be = Z.extend({
462
462
  tenant_id: e.string()
463
- }), Be = e.object({
463
+ }), Xe = e.object({
464
464
  id: e.string(),
465
465
  type: e.literal("submit"),
466
466
  label: e.string(),
@@ -586,8 +586,8 @@ const Y = e.enum([
586
586
  style: e.object({ css: e.string().optional() }).optional()
587
587
  }).openapi({
588
588
  description: "Schema for flow-based forms (matches new JSON structure)"
589
- }), Xe = e.object({
590
- ...i.shape,
589
+ }), We = e.object({
590
+ ...o.shape,
591
591
  ...$.shape,
592
592
  id: e.string()
593
593
  }), u = e.enum([
@@ -612,22 +612,22 @@ const Y = e.enum([
612
612
  ..._,
613
613
  trigger_id: m,
614
614
  form_id: e.string()
615
- }), We = e.union([
615
+ }), Ve = e.union([
616
616
  ee,
617
617
  te
618
618
  ]), ne = e.object({
619
619
  ..._,
620
620
  trigger_id: u,
621
- ...i.shape,
621
+ ...o.shape,
622
622
  hook_id: e.string(),
623
623
  url: e.string()
624
624
  }), oe = e.object({
625
625
  ..._,
626
626
  trigger_id: m,
627
- ...i.shape,
627
+ ...o.shape,
628
628
  hook_id: e.string(),
629
629
  form_id: e.string()
630
- }), Ve = e.union([ne, oe]), ie = e.object({
630
+ }), ze = e.union([ne, oe]), ie = e.object({
631
631
  alg: e.enum([
632
632
  "RS256",
633
633
  "RS384",
@@ -648,7 +648,7 @@ const Y = e.enum([
648
648
  use: e.enum(["sig", "enc"]).optional()
649
649
  }), Ye = e.object({
650
650
  keys: e.array(ie)
651
- }), ze = e.object({
651
+ }), qe = e.object({
652
652
  issuer: e.string(),
653
653
  authorization_endpoint: e.string(),
654
654
  token_endpoint: e.string(),
@@ -682,7 +682,7 @@ const Y = e.enum([
682
682
  login_completed: e.boolean().optional().default(!1)
683
683
  }).openapi({
684
684
  description: "This represents a login sesion"
685
- }), qe = e.object({
685
+ }), Qe = e.object({
686
686
  ...ae.shape,
687
687
  id: e.string().openapi({
688
688
  description: "This is is used as the state in the universal login"
@@ -865,7 +865,7 @@ const Y = e.enum([
865
865
  env: e.object({
866
866
  node: e.string().optional()
867
867
  }).optional()
868
- }), Qe = e.object({
868
+ }), Ze = e.object({
869
869
  type: re,
870
870
  date: e.string(),
871
871
  description: e.string().optional(),
@@ -892,7 +892,7 @@ const Y = e.enum([
892
892
  user_id: e.string(),
893
893
  password: e.string(),
894
894
  algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id")
895
- }), Ze = e.object({
895
+ }), Je = e.object({
896
896
  ...le.shape,
897
897
  created_at: e.string(),
898
898
  updated_at: e.string()
@@ -915,13 +915,13 @@ const Y = e.enum([
915
915
  "Metadata related to the device used in the session"
916
916
  ),
917
917
  clients: e.array(e.string()).describe("List of client details for the session")
918
- }), Je = e.object({
918
+ }), $e = e.object({
919
919
  created_at: e.string(),
920
920
  updated_at: e.string(),
921
921
  authenticated_at: e.string(),
922
922
  last_interaction_at: e.string(),
923
923
  ...ce.shape
924
- }), $e = e.object({
924
+ }), et = e.object({
925
925
  kid: e.string().openapi({ description: "The key id of the signing key" }),
926
926
  cert: e.string().openapi({ description: "The public certificate of the signing key" }),
927
927
  fingerprint: e.string().openapi({ description: "The cert fingerprint" }),
@@ -948,7 +948,7 @@ const Y = e.enum([
948
948
  })
949
949
  });
950
950
  var pe = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(pe || {});
951
- const et = e.object({
951
+ const tt = e.object({
952
952
  access_token: e.string(),
953
953
  id_token: e.string().optional(),
954
954
  scope: e.string().optional(),
@@ -1021,14 +1021,14 @@ const de = e.object({
1021
1021
  fonts: Ee,
1022
1022
  page_background: ue,
1023
1023
  widget: me
1024
- }), tt = Se.extend({
1024
+ }), nt = Se.extend({
1025
1025
  themeId: e.string()
1026
- }), nt = e.object({
1026
+ }), ot = e.object({
1027
1027
  universal_login_experience: e.enum(["new", "classic"]).default("new"),
1028
1028
  identifier_first: e.boolean().default(!0),
1029
1029
  password_first: e.boolean().default(!1),
1030
1030
  webauthn_platform_first_factor: e.boolean()
1031
- }), ot = e.object({
1031
+ }), it = e.object({
1032
1032
  name: e.string(),
1033
1033
  enabled: e.boolean().optional().default(!0),
1034
1034
  default_from_address: e.string().optional(),
@@ -1079,15 +1079,15 @@ const de = e.object({
1079
1079
  })
1080
1080
  ),
1081
1081
  rotating: e.boolean()
1082
- }), it = e.object({
1082
+ }), at = e.object({
1083
1083
  // When the refresh token record was created.
1084
1084
  created_at: e.string(),
1085
1085
  // Spread in the rest of the refresh token properties.
1086
1086
  ...he.shape
1087
- }), at = e.object({
1087
+ }), st = e.object({
1088
1088
  to: e.string(),
1089
1089
  message: e.string()
1090
- }), st = e.object({
1090
+ }), rt = e.object({
1091
1091
  name: e.string(),
1092
1092
  options: e.object({})
1093
1093
  }), be = e.object({
@@ -1120,7 +1120,7 @@ const de = e.object({
1120
1120
  ...fe.shape,
1121
1121
  created_at: e.string().optional(),
1122
1122
  updated_at: e.string().optional()
1123
- }), rt = e.array(Ce), Ie = e.object({
1123
+ }), _t = e.array(Ce), Ie = e.object({
1124
1124
  role_id: e.string(),
1125
1125
  resource_server_identifier: e.string(),
1126
1126
  permission_name: e.string()
@@ -1128,14 +1128,14 @@ const de = e.object({
1128
1128
  ...Ie.shape,
1129
1129
  tenant_id: e.string(),
1130
1130
  created_at: e.string().optional()
1131
- }), _t = e.array(Oe), Te = e.object({
1131
+ }), lt = e.array(Oe), Te = e.object({
1132
1132
  role_id: e.string(),
1133
1133
  resource_server_identifier: e.string(),
1134
1134
  resource_server_name: e.string(),
1135
1135
  permission_name: e.string(),
1136
1136
  description: e.string().nullable().optional(),
1137
1137
  created_at: e.string().optional()
1138
- }), lt = e.array(
1138
+ }), ct = e.array(
1139
1139
  Te
1140
1140
  ), Ne = e.object({
1141
1141
  user_id: e.string(),
@@ -1145,14 +1145,14 @@ const de = e.object({
1145
1145
  ...Ne.shape,
1146
1146
  tenant_id: e.string(),
1147
1147
  created_at: e.string().optional()
1148
- }), ct = e.array(Re), Le = e.object({
1148
+ }), pt = e.array(Re), Le = e.object({
1149
1149
  user_id: e.string(),
1150
1150
  resource_server_identifier: e.string(),
1151
1151
  resource_server_name: e.string(),
1152
1152
  permission_name: e.string(),
1153
1153
  description: e.string().nullable().optional(),
1154
1154
  created_at: e.string().optional()
1155
- }), pt = e.array(
1155
+ }), dt = e.array(
1156
1156
  Le
1157
1157
  ), De = e.object({
1158
1158
  name: e.string().min(1).max(50).openapi({
@@ -1168,7 +1168,7 @@ const de = e.object({
1168
1168
  ...De.shape,
1169
1169
  created_at: e.string().optional(),
1170
1170
  updated_at: e.string().optional()
1171
- }), dt = e.array(ye), Ue = e.object({
1171
+ }), gt = e.array(ye), Ue = e.object({
1172
1172
  logo_url: e.string().optional().openapi({
1173
1173
  description: "URL of the organization's logo"
1174
1174
  }),
@@ -1221,16 +1221,27 @@ const de = e.object({
1221
1221
  description: "List of enabled connections for the organization"
1222
1222
  }),
1223
1223
  token_quota: je
1224
- }), gt = e.object({
1224
+ }), Et = e.object({
1225
1225
  ...ke.shape,
1226
- ...i.shape,
1226
+ ...o.shape,
1227
+ id: e.string()
1228
+ }), we = e.object({
1229
+ user_id: e.string().openapi({
1230
+ description: "ID of the user"
1231
+ }),
1232
+ organization_id: e.string().openapi({
1233
+ description: "ID of the organization"
1234
+ })
1235
+ }), ut = e.object({
1236
+ ...we.shape,
1237
+ ...o.shape,
1227
1238
  id: e.string()
1228
1239
  });
1229
- function Et(t) {
1230
- const [o, s] = t.split("|");
1231
- if (!o || !s)
1240
+ function mt(t) {
1241
+ const [i, s] = t.split("|");
1242
+ if (!i || !s)
1232
1243
  throw new Error(`Invalid user_id: ${t}`);
1233
- return { connection: o, id: s };
1244
+ return { connection: i, id: s };
1234
1245
  }
1235
1246
  export {
1236
1247
  _e as Auth0Client,
@@ -1244,17 +1255,17 @@ export {
1244
1255
  j as NodeType,
1245
1256
  T as applicationInsertSchema,
1246
1257
  N as applicationSchema,
1247
- Me as auth0FlowInsertSchema,
1258
+ Ge as auth0FlowInsertSchema,
1248
1259
  G as auth0FlowSchema,
1249
- ve as auth0UserResponseSchema,
1260
+ He as auth0UserResponseSchema,
1250
1261
  x as authParamsSchema,
1251
1262
  l as baseUserSchema,
1252
1263
  de as bordersSchema,
1253
- Ge as brandingSchema,
1264
+ xe as brandingSchema,
1254
1265
  L as buttonComponentSchema,
1255
- z as codeInsertSchema,
1256
- xe as codeSchema,
1257
- Y as codeTypeSchema,
1266
+ Y as codeInsertSchema,
1267
+ Ke as codeSchema,
1268
+ z as codeTypeSchema,
1258
1269
  ge as colorsSchema,
1259
1270
  F as componentSchema,
1260
1271
  B as connectionInsertSchema,
@@ -1263,78 +1274,80 @@ export {
1263
1274
  a as coordinatesSchema,
1264
1275
  q as customDomainInsertSchema,
1265
1276
  Z as customDomainSchema,
1266
- Ke as customDomainWithTenantIdSchema,
1267
- ot as emailProviderSchema,
1277
+ Be as customDomainWithTenantIdSchema,
1278
+ it as emailProviderSchema,
1268
1279
  M as endingSchema,
1269
1280
  y as fieldComponentSchema,
1270
1281
  w as flowNodeSchema,
1271
1282
  n as fontDetailsSchema,
1272
1283
  Ee as fontsSchema,
1273
- Be as formControlSchema,
1284
+ Xe as formControlSchema,
1274
1285
  $ as formInsertSchema,
1275
1286
  J as formNodeComponentDefinition,
1276
- Xe as formSchema,
1287
+ We as formSchema,
1277
1288
  U as genericComponentSchema,
1278
1289
  P as genericNodeSchema,
1279
- We as hookInsertSchema,
1280
- Ve as hookSchema,
1290
+ Ve as hookInsertSchema,
1291
+ ze as hookSchema,
1281
1292
  b as identitySchema,
1282
1293
  Ye as jwksKeySchema,
1283
1294
  ie as jwksSchema,
1284
1295
  D as legalComponentSchema,
1285
- Qe as logSchema,
1296
+ Ze as logSchema,
1286
1297
  ae as loginSessionInsertSchema,
1287
- qe as loginSessionSchema,
1298
+ Qe as loginSessionSchema,
1288
1299
  v as nodeSchema,
1289
- ze as openIDConfigurationSchema,
1300
+ qe as openIDConfigurationSchema,
1290
1301
  Ue as organizationBrandingSchema,
1291
1302
  Fe as organizationEnabledConnectionSchema,
1292
1303
  ke as organizationInsertSchema,
1293
- gt as organizationSchema,
1304
+ Et as organizationSchema,
1294
1305
  je as organizationTokenQuotaSchema,
1295
1306
  ue as pageBackgroundSchema,
1296
- Et as parseUserId,
1307
+ mt as parseUserId,
1297
1308
  le as passwordInsertSchema,
1298
- Ze as passwordSchema,
1309
+ Je as passwordSchema,
1299
1310
  h as profileDataSchema,
1300
- nt as promptSettingSchema,
1311
+ ot as promptSettingSchema,
1301
1312
  he as refreshTokenInsertSchema,
1302
- it as refreshTokenSchema,
1313
+ at as refreshTokenSchema,
1303
1314
  fe as resourceServerInsertSchema,
1304
- rt as resourceServerListSchema,
1315
+ _t as resourceServerListSchema,
1305
1316
  Ae as resourceServerOptionsSchema,
1306
1317
  Ce as resourceServerSchema,
1307
1318
  be as resourceServerScopeSchema,
1308
1319
  R as richTextComponentSchema,
1309
1320
  De as roleInsertSchema,
1310
- dt as roleListSchema,
1321
+ gt as roleListSchema,
1311
1322
  Ie as rolePermissionInsertSchema,
1312
- _t as rolePermissionListSchema,
1323
+ lt as rolePermissionListSchema,
1313
1324
  Oe as rolePermissionSchema,
1314
- lt as rolePermissionWithDetailsListSchema,
1325
+ ct as rolePermissionWithDetailsListSchema,
1315
1326
  Te as rolePermissionWithDetailsSchema,
1316
1327
  ye as roleSchema,
1317
1328
  O as samlpAddon,
1318
1329
  ce as sessionInsertSchema,
1319
- Je as sessionSchema,
1320
- $e as signingKeySchema,
1321
- st as smsProviderSchema,
1322
- at as smsSendParamsSchema,
1330
+ $e as sessionSchema,
1331
+ et as signingKeySchema,
1332
+ rt as smsProviderSchema,
1333
+ st as smsSendParamsSchema,
1323
1334
  H as startSchema,
1324
1335
  k as stepNodeSchema,
1325
1336
  W as tenantInsertSchema,
1326
1337
  V as tenantSchema,
1327
1338
  Se as themeInsertSchema,
1328
- tt as themeSchema,
1329
- et as tokenResponseSchema,
1330
- Pe as totalsSchema,
1339
+ nt as themeSchema,
1340
+ tt as tokenResponseSchema,
1341
+ ve as totalsSchema,
1331
1342
  A as userInsertSchema,
1343
+ we as userOrganizationInsertSchema,
1344
+ ut as userOrganizationSchema,
1332
1345
  Ne as userPermissionInsertSchema,
1333
- ct as userPermissionListSchema,
1346
+ pt as userPermissionListSchema,
1334
1347
  Re as userPermissionSchema,
1335
- pt as userPermissionWithDetailsListSchema,
1348
+ dt as userPermissionWithDetailsListSchema,
1336
1349
  Le as userPermissionWithDetailsSchema,
1337
- He as userResponseSchema,
1350
+ Me as userResponseSchema,
1338
1351
  f as userSchema,
1339
1352
  Q as verificationMethodsSchema,
1340
1353
  me as widgetSchema
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.85.0",
14
+ "version": "0.86.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],