@authhero/adapter-interfaces 0.85.0 → 0.87.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +130 -6
- package/dist/adapter-interfaces.mjs +138 -112
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Re=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),a=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),m=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),S=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:m.optional()}),l=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),u=l.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().default("email"),connection:e.z.string().default("email"),is_social:e.z.boolean().optional()}),E=e.z.object({...u.shape,...a.shape,user_id:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(S).optional()}),Le=E,De=l.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),ye="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Ue=(t=21)=>{let i="",s=crypto.getRandomValues(new Uint8Array(t));for(;t--;)i+=ye[s[t]&63];return i};const h=e.z.object({audience:e.z.string().optional(),recipient:e.z.string().optional(),createUpnClaim:e.z.boolean().optional(),mapUnknownClaimsAsIs:e.z.boolean().optional(),passthroughClaimsWithNoMapping:e.z.boolean().optional(),mapIdentities:e.z.boolean().optional(),signatureAlgorithm:e.z.string().optional(),digestAlgorithm:e.z.string().optional(),issuer:e.z.string().optional(),destination:e.z.string().optional(),lifetimeInSeconds:e.z.number().optional(),signResponse:e.z.boolean().optional(),nameIdentifierFormat:e.z.string().optional(),nameIdentifierProbes:e.z.array(e.z.string()).optional(),authnContextClassRef:e.z.string().optional(),mappings:e.z.record(e.z.string()).optional()}),b=e.z.object({id:e.z.string(),name:e.z.string(),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:e.z.object({samlp:h.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:e.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:e.z.string().default(()=>Ue()).optional(),disable_sign_ups:e.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"}),client_metadata:e.z.record(e.z.string().length(255)).optional()}),A=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...b.shape}),n=e.z.object({x:e.z.number(),y:e.z.number()});var _=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(_||{}),p=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(p||{});const r=e.z.object({id:e.z.string(),category:e.z.nativeEnum(p),type:e.z.nativeEnum(_)}),f=r.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),C=r.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),I=r.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),O=r.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),T=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),N=e.z.union([f,C,I,O,T]);var R=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(R||{});const L=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:n,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(N),next_node:e.z.string()}).passthrough()}),D=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:n,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),y=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:n}).passthrough(),U=e.z.union([L,D,y]),F=e.z.object({next_node:e.z.string(),coordinates:n}).passthrough(),j=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:n}).passthrough(),k=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(U),start:F,ending:j,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),Fe=k.omit({id:!0,created_at:!0,updated_at:!0});var z=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(z||{}),d=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(d||{}),g=(t=>(t.S256="S256",t.Plain="plain",t))(g||{});const w=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(z).optional(),response_mode:e.z.nativeEnum(d).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(g).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),je=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),P=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional()}),v=e.z.object({id:e.z.string().optional(),name:e.z.string(),strategy:e.z.string(),options:P.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional()}),H=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(v.shape),M=e.z.object({name:e.z.string(),audience:e.z.string(),sender_email:e.z.string().email(),sender_name:e.z.string(),support_url:e.z.string().url().optional(),logo:e.z.string().url().optional(),primary_color:e.z.string().optional(),secondary_color:e.z.string().optional(),language:e.z.string().optional(),id:e.z.string().optional()}),G=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...M.shape,id:e.z.string()});e.z.object({...A.shape,tenant:G,connections:e.z.array(H)});const x=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),K=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:x,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),ke=e.z.object({...K.shape,created_at:e.z.string()}),B=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),W=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),X=e.z.object({...B.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(W)}).optional(),tls_policy:e.z.string().optional()}),we=X.extend({tenant_id:e.z.string()}),Pe=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),V=e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()}),required:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()}),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)})]),Y=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.array(e.z.string())})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(V),next_node:e.z.string()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),ve=e.z.object({...a.shape,...Y.shape,id:e.z.string()}),q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),Q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),c={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},He=e.z.object({...c,trigger_id:q,url:e.z.string()}),Me=e.z.object({...c,trigger_id:Q,form_id:e.z.string()}),Ge=e.z.union([He,Me]),xe=e.z.object({...c,trigger_id:q,...a.shape,hook_id:e.z.string(),url:e.z.string()}),Ke=e.z.object({...c,trigger_id:Q,...a.shape,hook_id:e.z.string(),form_id:e.z.string()}),Be=e.z.union([xe,Ke]),Z=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),We=e.z.object({keys:e.z.array(Z)}),Xe=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),J=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:w,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),Ve=e.z.object({...J.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),$={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},Ye=e.z.string().refine(t=>Object.values($).includes(t),{message:"Invalid log type"}),ee=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),qe=e.z.object({type:Ye,date:e.z.string(),description:e.z.string().optional(),log_id:e.z.string().optional(),_id:e.z.string().optional(),ip:e.z.string(),user_agent:e.z.string(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.array(e.z.string()).optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ee.optional()}),te=e.z.object({user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id")}),Qe=e.z.object({...te.shape,created_at:e.z.string(),updated_at:e.z.string()}),oe=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),ne=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:oe.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),Ze=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...ne.shape}),Je=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var ie=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(ie||{});const $e=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),se=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),o=e.z.object({bold:e.z.boolean(),size:e.z.number()}),re=e.z.object({body_text:o,buttons_text:o,font_url:e.z.string(),input_labels:o,links:o,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:o,title:o}),ce=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),le=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),_e=e.z.object({borders:ae,colors:se,displayName:e.z.string(),fonts:re,page_background:ce,widget:le}),et=_e.extend({themeId:e.z.string()}),tt=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),ot=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),pe=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:oe,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),nt=e.z.object({created_at:e.z.string(),...pe.shape}),it=e.z.object({to:e.z.string(),message:e.z.string()}),at=e.z.object({name:e.z.string(),options:e.z.object({})}),ze=e.z.object({value:e.z.string(),description:e.z.string().optional()}),de=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),ge=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(ze).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:de.optional()}),me=e.z.object({id:e.z.string().optional(),...ge.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),st=e.z.array(me),Se=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ue=e.z.object({...Se.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),rt=e.z.array(ue),Ee=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),ct=e.z.array(Ee),he=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),be=e.z.object({...he.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),lt=e.z.array(be),Ae=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),_t=e.z.array(Ae),fe=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),Ce=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...fe.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),pt=e.z.array(Ce),Ie=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Oe=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Te=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),Ne=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Ie,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Oe).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Te}),zt=e.z.object({...Ne.shape,...a.shape,id:e.z.string()});function dt(t){const[i,s]=t.split("|");if(!i||!s)throw new Error(`Invalid user_id: ${t}`);return{connection:i,id:s}}exports.Auth0Client=ee;exports.AuthorizationResponseMode=d;exports.AuthorizationResponseType=z;exports.CodeChallengeMethod=g;exports.ComponentCategory=p;exports.ComponentType=_;exports.GrantType=ie;exports.LogTypes=$;exports.NodeType=R;exports.applicationInsertSchema=b;exports.applicationSchema=A;exports.auth0FlowInsertSchema=Fe;exports.auth0FlowSchema=k;exports.auth0UserResponseSchema=Le;exports.authParamsSchema=w;exports.baseUserSchema=l;exports.bordersSchema=ae;exports.brandingSchema=je;exports.buttonComponentSchema=C;exports.codeInsertSchema=K;exports.codeSchema=ke;exports.codeTypeSchema=x;exports.colorsSchema=se;exports.componentSchema=N;exports.connectionInsertSchema=v;exports.connectionOptionsSchema=P;exports.connectionSchema=H;exports.coordinatesSchema=n;exports.customDomainInsertSchema=B;exports.customDomainSchema=X;exports.customDomainWithTenantIdSchema=we;exports.emailProviderSchema=ot;exports.endingSchema=j;exports.fieldComponentSchema=O;exports.flowNodeSchema=D;exports.fontDetailsSchema=o;exports.fontsSchema=re;exports.formControlSchema=Pe;exports.formInsertSchema=Y;exports.formNodeComponentDefinition=V;exports.formSchema=ve;exports.genericComponentSchema=T;exports.genericNodeSchema=y;exports.hookInsertSchema=Ge;exports.hookSchema=Be;exports.identitySchema=S;exports.jwksKeySchema=We;exports.jwksSchema=Z;exports.legalComponentSchema=I;exports.logSchema=qe;exports.loginSessionInsertSchema=J;exports.loginSessionSchema=Ve;exports.nodeSchema=U;exports.openIDConfigurationSchema=Xe;exports.organizationBrandingSchema=Ie;exports.organizationEnabledConnectionSchema=Oe;exports.organizationInsertSchema=Ne;exports.organizationSchema=zt;exports.organizationTokenQuotaSchema=Te;exports.pageBackgroundSchema=ce;exports.parseUserId=dt;exports.passwordInsertSchema=te;exports.passwordSchema=Qe;exports.profileDataSchema=m;exports.promptSettingSchema=tt;exports.refreshTokenInsertSchema=pe;exports.refreshTokenSchema=nt;exports.resourceServerInsertSchema=ge;exports.resourceServerListSchema=st;exports.resourceServerOptionsSchema=de;exports.resourceServerSchema=me;exports.resourceServerScopeSchema=ze;exports.richTextComponentSchema=f;exports.roleInsertSchema=fe;exports.roleListSchema=pt;exports.rolePermissionInsertSchema=Se;exports.rolePermissionListSchema=rt;exports.rolePermissionSchema=ue;exports.rolePermissionWithDetailsListSchema=ct;exports.rolePermissionWithDetailsSchema=Ee;exports.roleSchema=Ce;exports.samlpAddon=h;exports.sessionInsertSchema=ne;exports.sessionSchema=Ze;exports.signingKeySchema=Je;exports.smsProviderSchema=at;exports.smsSendParamsSchema=it;exports.startSchema=F;exports.stepNodeSchema=L;exports.tenantInsertSchema=M;exports.tenantSchema=G;exports.themeInsertSchema=_e;exports.themeSchema=et;exports.tokenResponseSchema=$e;exports.totalsSchema=Re;exports.userInsertSchema=u;exports.userPermissionInsertSchema=he;exports.userPermissionListSchema=lt;exports.userPermissionSchema=be;exports.userPermissionWithDetailsListSchema=_t;exports.userPermissionWithDetailsSchema=Ae;exports.userResponseSchema=De;exports.userSchema=E;exports.verificationMethodsSchema=W;exports.widgetSchema=le;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),ye=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),n=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),m=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),S=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:m.optional()}),l=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),u=l.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().default("email"),connection:e.z.string().default("email"),is_social:e.z.boolean().optional()}),h=e.z.object({...u.shape,...n.shape,user_id:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(S).optional()}),Ue=h,Fe=l.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),je="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let ke=(t=21)=>{let a="",s=crypto.getRandomValues(new Uint8Array(t));for(;t--;)a+=je[s[t]&63];return a};const E=e.z.object({audience:e.z.string().optional(),recipient:e.z.string().optional(),createUpnClaim:e.z.boolean().optional(),mapUnknownClaimsAsIs:e.z.boolean().optional(),passthroughClaimsWithNoMapping:e.z.boolean().optional(),mapIdentities:e.z.boolean().optional(),signatureAlgorithm:e.z.string().optional(),digestAlgorithm:e.z.string().optional(),issuer:e.z.string().optional(),destination:e.z.string().optional(),lifetimeInSeconds:e.z.number().optional(),signResponse:e.z.boolean().optional(),nameIdentifierFormat:e.z.string().optional(),nameIdentifierProbes:e.z.array(e.z.string()).optional(),authnContextClassRef:e.z.string().optional(),mappings:e.z.record(e.z.string()).optional()}),b=e.z.object({id:e.z.string(),name:e.z.string(),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:e.z.object({samlp:E.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:e.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:e.z.string().default(()=>ke()).optional(),disable_sign_ups:e.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"}),client_metadata:e.z.record(e.z.string().length(255)).optional()}),f=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...b.shape}),i=e.z.object({x:e.z.number(),y:e.z.number()});var _=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(_||{}),p=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(p||{});const r=e.z.object({id:e.z.string(),category:e.z.nativeEnum(p),type:e.z.nativeEnum(_)}),A=r.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),I=r.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),C=r.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),O=r.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),T=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),N=e.z.union([A,I,C,O,T]);var R=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(R||{});const L=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(N),next_node:e.z.string()}).passthrough()}),D=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),y=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:i}).passthrough(),U=e.z.union([L,D,y]),F=e.z.object({next_node:e.z.string(),coordinates:i}).passthrough(),j=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:i}).passthrough(),k=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(U),start:F,ending:j,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),we=k.omit({id:!0,created_at:!0,updated_at:!0});var z=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(z||{}),d=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(d||{}),g=(t=>(t.S256="S256",t.Plain="plain",t))(g||{});const w=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(z).optional(),response_mode:e.z.nativeEnum(d).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(g).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),Pe=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),P=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional()}),v=e.z.object({id:e.z.string().optional(),name:e.z.string(),strategy:e.z.string(),options:P.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional()}),H=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(v.shape),M=e.z.object({name:e.z.string(),audience:e.z.string(),sender_email:e.z.string().email(),sender_name:e.z.string(),support_url:e.z.string().url().optional(),logo:e.z.string().url().optional(),primary_color:e.z.string().optional(),secondary_color:e.z.string().optional(),language:e.z.string().optional(),id:e.z.string().optional()}),G=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...M.shape,id:e.z.string()});e.z.object({...f.shape,tenant:G,connections:e.z.array(H)});const x=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),K=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:x,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),ve=e.z.object({...K.shape,created_at:e.z.string()}),B=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),W=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),X=e.z.object({...B.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(W)}).optional(),tls_policy:e.z.string().optional()}),He=X.extend({tenant_id:e.z.string()}),Me=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),V=e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()}),required:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()}),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)})]),Y=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.array(e.z.string())})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(V),next_node:e.z.string()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),Ge=e.z.object({...n.shape,...Y.shape,id:e.z.string()}),q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),Q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),c={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},xe=e.z.object({...c,trigger_id:q,url:e.z.string()}),Ke=e.z.object({...c,trigger_id:Q,form_id:e.z.string()}),Be=e.z.union([xe,Ke]),We=e.z.object({...c,trigger_id:q,...n.shape,hook_id:e.z.string(),url:e.z.string()}),Xe=e.z.object({...c,trigger_id:Q,...n.shape,hook_id:e.z.string(),form_id:e.z.string()}),Ve=e.z.union([We,Xe]),Z=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),Ye=e.z.object({keys:e.z.array(Z)}),qe=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),J=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:w,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),Qe=e.z.object({...J.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),$={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},Ze=e.z.string().refine(t=>Object.values($).includes(t),{message:"Invalid log type"}),ee=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),Je=e.z.object({type:Ze,date:e.z.string(),description:e.z.string().optional(),log_id:e.z.string().optional(),_id:e.z.string().optional(),ip:e.z.string(),user_agent:e.z.string(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.array(e.z.string()).optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ee.optional()}),te=e.z.object({user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id")}),$e=e.z.object({...te.shape,created_at:e.z.string(),updated_at:e.z.string()}),oe=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),ne=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:oe.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),et=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...ne.shape}),tt=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var ie=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(ie||{});const ot=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),se=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),o=e.z.object({bold:e.z.boolean(),size:e.z.number()}),re=e.z.object({body_text:o,buttons_text:o,font_url:e.z.string(),input_labels:o,links:o,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:o,title:o}),ce=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),le=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),_e=e.z.object({borders:ae,colors:se,displayName:e.z.string(),fonts:re,page_background:ce,widget:le}),nt=_e.extend({themeId:e.z.string()}),it=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),at=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),pe=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:oe,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),st=e.z.object({created_at:e.z.string(),...pe.shape}),rt=e.z.object({to:e.z.string(),message:e.z.string()}),ct=e.z.object({name:e.z.string(),options:e.z.object({})}),ze=e.z.object({value:e.z.string(),description:e.z.string().optional()}),de=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),ge=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(ze).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:de.optional()}),me=e.z.object({id:e.z.string().optional(),...ge.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),lt=e.z.array(me),Se=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ue=e.z.object({...Se.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),_t=e.z.array(ue),he=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),pt=e.z.array(he),Ee=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string(),organization_id:e.z.string().optional()}),be=e.z.object({...Ee.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),zt=e.z.array(be),fe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional(),organization_id:e.z.string().optional()}),dt=e.z.array(fe),Ae=e.z.object({user_id:e.z.string(),role_id:e.z.string(),organization_id:e.z.string().optional()}),Ie=e.z.object({...Ae.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),gt=e.z.array(Ie),Ce=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),Oe=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Ce.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),mt=e.z.array(Oe),Te=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Ne=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Re=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),Le=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Te,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Ne).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Re}),St=e.z.object({...Le.shape,...n.shape,id:e.z.string()}),De=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),ut=e.z.object({...De.shape,...n.shape,id:e.z.string()});function ht(t){const[a,s]=t.split("|");if(!a||!s)throw new Error(`Invalid user_id: ${t}`);return{connection:a,id:s}}exports.Auth0Client=ee;exports.AuthorizationResponseMode=d;exports.AuthorizationResponseType=z;exports.CodeChallengeMethod=g;exports.ComponentCategory=p;exports.ComponentType=_;exports.GrantType=ie;exports.LogTypes=$;exports.NodeType=R;exports.applicationInsertSchema=b;exports.applicationSchema=f;exports.auth0FlowInsertSchema=we;exports.auth0FlowSchema=k;exports.auth0UserResponseSchema=Ue;exports.authParamsSchema=w;exports.baseUserSchema=l;exports.bordersSchema=ae;exports.brandingSchema=Pe;exports.buttonComponentSchema=I;exports.codeInsertSchema=K;exports.codeSchema=ve;exports.codeTypeSchema=x;exports.colorsSchema=se;exports.componentSchema=N;exports.connectionInsertSchema=v;exports.connectionOptionsSchema=P;exports.connectionSchema=H;exports.coordinatesSchema=i;exports.customDomainInsertSchema=B;exports.customDomainSchema=X;exports.customDomainWithTenantIdSchema=He;exports.emailProviderSchema=at;exports.endingSchema=j;exports.fieldComponentSchema=O;exports.flowNodeSchema=D;exports.fontDetailsSchema=o;exports.fontsSchema=re;exports.formControlSchema=Me;exports.formInsertSchema=Y;exports.formNodeComponentDefinition=V;exports.formSchema=Ge;exports.genericComponentSchema=T;exports.genericNodeSchema=y;exports.hookInsertSchema=Be;exports.hookSchema=Ve;exports.identitySchema=S;exports.jwksKeySchema=Ye;exports.jwksSchema=Z;exports.legalComponentSchema=C;exports.logSchema=Je;exports.loginSessionInsertSchema=J;exports.loginSessionSchema=Qe;exports.nodeSchema=U;exports.openIDConfigurationSchema=qe;exports.organizationBrandingSchema=Te;exports.organizationEnabledConnectionSchema=Ne;exports.organizationInsertSchema=Le;exports.organizationSchema=St;exports.organizationTokenQuotaSchema=Re;exports.pageBackgroundSchema=ce;exports.parseUserId=ht;exports.passwordInsertSchema=te;exports.passwordSchema=$e;exports.profileDataSchema=m;exports.promptSettingSchema=it;exports.refreshTokenInsertSchema=pe;exports.refreshTokenSchema=st;exports.resourceServerInsertSchema=ge;exports.resourceServerListSchema=lt;exports.resourceServerOptionsSchema=de;exports.resourceServerSchema=me;exports.resourceServerScopeSchema=ze;exports.richTextComponentSchema=A;exports.roleInsertSchema=Ce;exports.roleListSchema=mt;exports.rolePermissionInsertSchema=Se;exports.rolePermissionListSchema=_t;exports.rolePermissionSchema=ue;exports.rolePermissionWithDetailsListSchema=pt;exports.rolePermissionWithDetailsSchema=he;exports.roleSchema=Oe;exports.samlpAddon=E;exports.sessionInsertSchema=ne;exports.sessionSchema=et;exports.signingKeySchema=tt;exports.smsProviderSchema=ct;exports.smsSendParamsSchema=rt;exports.startSchema=F;exports.stepNodeSchema=L;exports.tenantInsertSchema=M;exports.tenantSchema=G;exports.themeInsertSchema=_e;exports.themeSchema=nt;exports.tokenResponseSchema=ot;exports.totalsSchema=ye;exports.userInsertSchema=u;exports.userOrganizationInsertSchema=De;exports.userOrganizationSchema=ut;exports.userPermissionInsertSchema=Ee;exports.userPermissionListSchema=zt;exports.userPermissionSchema=be;exports.userPermissionWithDetailsListSchema=dt;exports.userPermissionWithDetailsSchema=fe;exports.userResponseSchema=Fe;exports.userRoleInsertSchema=Ae;exports.userRoleListSchema=gt;exports.userRoleSchema=Ie;exports.userSchema=h;exports.verificationMethodsSchema=W;exports.widgetSchema=le;
|
|
@@ -14389,14 +14389,17 @@ export declare const userPermissionInsertSchema: z.ZodObject<{
|
|
|
14389
14389
|
user_id: z.ZodString;
|
|
14390
14390
|
resource_server_identifier: z.ZodString;
|
|
14391
14391
|
permission_name: z.ZodString;
|
|
14392
|
+
organization_id: z.ZodOptional<z.ZodString>;
|
|
14392
14393
|
}, "strip", z.ZodTypeAny, {
|
|
14393
14394
|
user_id: string;
|
|
14394
14395
|
resource_server_identifier: string;
|
|
14395
14396
|
permission_name: string;
|
|
14397
|
+
organization_id?: string | undefined;
|
|
14396
14398
|
}, {
|
|
14397
14399
|
user_id: string;
|
|
14398
14400
|
resource_server_identifier: string;
|
|
14399
14401
|
permission_name: string;
|
|
14402
|
+
organization_id?: string | undefined;
|
|
14400
14403
|
}>;
|
|
14401
14404
|
export type UserPermissionInsert = z.infer<typeof userPermissionInsertSchema>;
|
|
14402
14405
|
export declare const userPermissionSchema: z.ZodObject<{
|
|
@@ -14405,18 +14408,21 @@ export declare const userPermissionSchema: z.ZodObject<{
|
|
|
14405
14408
|
user_id: z.ZodString;
|
|
14406
14409
|
resource_server_identifier: z.ZodString;
|
|
14407
14410
|
permission_name: z.ZodString;
|
|
14411
|
+
organization_id: z.ZodOptional<z.ZodString>;
|
|
14408
14412
|
}, "strip", z.ZodTypeAny, {
|
|
14409
14413
|
user_id: string;
|
|
14410
14414
|
tenant_id: string;
|
|
14411
14415
|
resource_server_identifier: string;
|
|
14412
14416
|
permission_name: string;
|
|
14413
14417
|
created_at?: string | undefined;
|
|
14418
|
+
organization_id?: string | undefined;
|
|
14414
14419
|
}, {
|
|
14415
14420
|
user_id: string;
|
|
14416
14421
|
tenant_id: string;
|
|
14417
14422
|
resource_server_identifier: string;
|
|
14418
14423
|
permission_name: string;
|
|
14419
14424
|
created_at?: string | undefined;
|
|
14425
|
+
organization_id?: string | undefined;
|
|
14420
14426
|
}>;
|
|
14421
14427
|
export type UserPermission = z.infer<typeof userPermissionSchema>;
|
|
14422
14428
|
export declare const userPermissionListSchema: z.ZodArray<z.ZodObject<{
|
|
@@ -14425,18 +14431,21 @@ export declare const userPermissionListSchema: z.ZodArray<z.ZodObject<{
|
|
|
14425
14431
|
user_id: z.ZodString;
|
|
14426
14432
|
resource_server_identifier: z.ZodString;
|
|
14427
14433
|
permission_name: z.ZodString;
|
|
14434
|
+
organization_id: z.ZodOptional<z.ZodString>;
|
|
14428
14435
|
}, "strip", z.ZodTypeAny, {
|
|
14429
14436
|
user_id: string;
|
|
14430
14437
|
tenant_id: string;
|
|
14431
14438
|
resource_server_identifier: string;
|
|
14432
14439
|
permission_name: string;
|
|
14433
14440
|
created_at?: string | undefined;
|
|
14441
|
+
organization_id?: string | undefined;
|
|
14434
14442
|
}, {
|
|
14435
14443
|
user_id: string;
|
|
14436
14444
|
tenant_id: string;
|
|
14437
14445
|
resource_server_identifier: string;
|
|
14438
14446
|
permission_name: string;
|
|
14439
14447
|
created_at?: string | undefined;
|
|
14448
|
+
organization_id?: string | undefined;
|
|
14440
14449
|
}>, "many">;
|
|
14441
14450
|
export type UserPermissionList = z.infer<typeof userPermissionListSchema>;
|
|
14442
14451
|
export declare const userPermissionWithDetailsSchema: z.ZodObject<{
|
|
@@ -14446,6 +14455,7 @@ export declare const userPermissionWithDetailsSchema: z.ZodObject<{
|
|
|
14446
14455
|
permission_name: z.ZodString;
|
|
14447
14456
|
description: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
14448
14457
|
created_at: z.ZodOptional<z.ZodString>;
|
|
14458
|
+
organization_id: z.ZodOptional<z.ZodString>;
|
|
14449
14459
|
}, "strip", z.ZodTypeAny, {
|
|
14450
14460
|
user_id: string;
|
|
14451
14461
|
resource_server_identifier: string;
|
|
@@ -14453,6 +14463,7 @@ export declare const userPermissionWithDetailsSchema: z.ZodObject<{
|
|
|
14453
14463
|
resource_server_name: string;
|
|
14454
14464
|
description?: string | null | undefined;
|
|
14455
14465
|
created_at?: string | undefined;
|
|
14466
|
+
organization_id?: string | undefined;
|
|
14456
14467
|
}, {
|
|
14457
14468
|
user_id: string;
|
|
14458
14469
|
resource_server_identifier: string;
|
|
@@ -14460,6 +14471,7 @@ export declare const userPermissionWithDetailsSchema: z.ZodObject<{
|
|
|
14460
14471
|
resource_server_name: string;
|
|
14461
14472
|
description?: string | null | undefined;
|
|
14462
14473
|
created_at?: string | undefined;
|
|
14474
|
+
organization_id?: string | undefined;
|
|
14463
14475
|
}>;
|
|
14464
14476
|
export type UserPermissionWithDetails = z.infer<typeof userPermissionWithDetailsSchema>;
|
|
14465
14477
|
export declare const userPermissionWithDetailsListSchema: z.ZodArray<z.ZodObject<{
|
|
@@ -14469,6 +14481,7 @@ export declare const userPermissionWithDetailsListSchema: z.ZodArray<z.ZodObject
|
|
|
14469
14481
|
permission_name: z.ZodString;
|
|
14470
14482
|
description: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
14471
14483
|
created_at: z.ZodOptional<z.ZodString>;
|
|
14484
|
+
organization_id: z.ZodOptional<z.ZodString>;
|
|
14472
14485
|
}, "strip", z.ZodTypeAny, {
|
|
14473
14486
|
user_id: string;
|
|
14474
14487
|
resource_server_identifier: string;
|
|
@@ -14476,6 +14489,7 @@ export declare const userPermissionWithDetailsListSchema: z.ZodArray<z.ZodObject
|
|
|
14476
14489
|
resource_server_name: string;
|
|
14477
14490
|
description?: string | null | undefined;
|
|
14478
14491
|
created_at?: string | undefined;
|
|
14492
|
+
organization_id?: string | undefined;
|
|
14479
14493
|
}, {
|
|
14480
14494
|
user_id: string;
|
|
14481
14495
|
resource_server_identifier: string;
|
|
@@ -14483,8 +14497,63 @@ export declare const userPermissionWithDetailsListSchema: z.ZodArray<z.ZodObject
|
|
|
14483
14497
|
resource_server_name: string;
|
|
14484
14498
|
description?: string | null | undefined;
|
|
14485
14499
|
created_at?: string | undefined;
|
|
14500
|
+
organization_id?: string | undefined;
|
|
14486
14501
|
}>, "many">;
|
|
14487
14502
|
export type UserPermissionWithDetailsList = z.infer<typeof userPermissionWithDetailsListSchema>;
|
|
14503
|
+
export declare const userRoleInsertSchema: z.ZodObject<{
|
|
14504
|
+
user_id: z.ZodString;
|
|
14505
|
+
role_id: z.ZodString;
|
|
14506
|
+
organization_id: z.ZodOptional<z.ZodString>;
|
|
14507
|
+
}, "strip", z.ZodTypeAny, {
|
|
14508
|
+
user_id: string;
|
|
14509
|
+
role_id: string;
|
|
14510
|
+
organization_id?: string | undefined;
|
|
14511
|
+
}, {
|
|
14512
|
+
user_id: string;
|
|
14513
|
+
role_id: string;
|
|
14514
|
+
organization_id?: string | undefined;
|
|
14515
|
+
}>;
|
|
14516
|
+
export type UserRoleInsert = z.infer<typeof userRoleInsertSchema>;
|
|
14517
|
+
export declare const userRoleSchema: z.ZodObject<{
|
|
14518
|
+
tenant_id: z.ZodString;
|
|
14519
|
+
created_at: z.ZodOptional<z.ZodString>;
|
|
14520
|
+
user_id: z.ZodString;
|
|
14521
|
+
role_id: z.ZodString;
|
|
14522
|
+
organization_id: z.ZodOptional<z.ZodString>;
|
|
14523
|
+
}, "strip", z.ZodTypeAny, {
|
|
14524
|
+
user_id: string;
|
|
14525
|
+
tenant_id: string;
|
|
14526
|
+
role_id: string;
|
|
14527
|
+
created_at?: string | undefined;
|
|
14528
|
+
organization_id?: string | undefined;
|
|
14529
|
+
}, {
|
|
14530
|
+
user_id: string;
|
|
14531
|
+
tenant_id: string;
|
|
14532
|
+
role_id: string;
|
|
14533
|
+
created_at?: string | undefined;
|
|
14534
|
+
organization_id?: string | undefined;
|
|
14535
|
+
}>;
|
|
14536
|
+
export type UserRole = z.infer<typeof userRoleSchema>;
|
|
14537
|
+
export declare const userRoleListSchema: z.ZodArray<z.ZodObject<{
|
|
14538
|
+
tenant_id: z.ZodString;
|
|
14539
|
+
created_at: z.ZodOptional<z.ZodString>;
|
|
14540
|
+
user_id: z.ZodString;
|
|
14541
|
+
role_id: z.ZodString;
|
|
14542
|
+
organization_id: z.ZodOptional<z.ZodString>;
|
|
14543
|
+
}, "strip", z.ZodTypeAny, {
|
|
14544
|
+
user_id: string;
|
|
14545
|
+
tenant_id: string;
|
|
14546
|
+
role_id: string;
|
|
14547
|
+
created_at?: string | undefined;
|
|
14548
|
+
organization_id?: string | undefined;
|
|
14549
|
+
}, {
|
|
14550
|
+
user_id: string;
|
|
14551
|
+
tenant_id: string;
|
|
14552
|
+
role_id: string;
|
|
14553
|
+
created_at?: string | undefined;
|
|
14554
|
+
organization_id?: string | undefined;
|
|
14555
|
+
}>, "many">;
|
|
14556
|
+
export type UserRoleList = z.infer<typeof userRoleListSchema>;
|
|
14488
14557
|
export declare const roleInsertSchema: z.ZodObject<{
|
|
14489
14558
|
name: z.ZodString;
|
|
14490
14559
|
description: z.ZodOptional<z.ZodString>;
|
|
@@ -14860,6 +14929,37 @@ export declare const organizationSchema: z.ZodObject<{
|
|
|
14860
14929
|
} | undefined;
|
|
14861
14930
|
}>;
|
|
14862
14931
|
export type Organization = z.infer<typeof organizationSchema>;
|
|
14932
|
+
export declare const userOrganizationInsertSchema: z.ZodObject<{
|
|
14933
|
+
user_id: z.ZodString;
|
|
14934
|
+
organization_id: z.ZodString;
|
|
14935
|
+
}, "strip", z.ZodTypeAny, {
|
|
14936
|
+
user_id: string;
|
|
14937
|
+
organization_id: string;
|
|
14938
|
+
}, {
|
|
14939
|
+
user_id: string;
|
|
14940
|
+
organization_id: string;
|
|
14941
|
+
}>;
|
|
14942
|
+
export type UserOrganizationInsert = z.infer<typeof userOrganizationInsertSchema>;
|
|
14943
|
+
export declare const userOrganizationSchema: z.ZodObject<{
|
|
14944
|
+
id: z.ZodString;
|
|
14945
|
+
created_at: z.ZodString;
|
|
14946
|
+
updated_at: z.ZodString;
|
|
14947
|
+
user_id: z.ZodString;
|
|
14948
|
+
organization_id: z.ZodString;
|
|
14949
|
+
}, "strip", z.ZodTypeAny, {
|
|
14950
|
+
created_at: string;
|
|
14951
|
+
updated_at: string;
|
|
14952
|
+
user_id: string;
|
|
14953
|
+
id: string;
|
|
14954
|
+
organization_id: string;
|
|
14955
|
+
}, {
|
|
14956
|
+
created_at: string;
|
|
14957
|
+
updated_at: string;
|
|
14958
|
+
user_id: string;
|
|
14959
|
+
id: string;
|
|
14960
|
+
organization_id: string;
|
|
14961
|
+
}>;
|
|
14962
|
+
export type UserOrganization = z.infer<typeof userOrganizationSchema>;
|
|
14863
14963
|
export declare function parseUserId(user_id: string): {
|
|
14864
14964
|
connection: string;
|
|
14865
14965
|
id: string;
|
|
@@ -15064,9 +15164,9 @@ export interface RolePermissionsAdapter {
|
|
|
15064
15164
|
list(tenant_id: string, role_id: string, params?: ListParams): Promise<RolePermissionWithDetailsList>;
|
|
15065
15165
|
}
|
|
15066
15166
|
export interface UserPermissionsAdapter {
|
|
15067
|
-
|
|
15068
|
-
remove(tenant_id: string, user_id: string,
|
|
15069
|
-
list(tenant_id: string, user_id: string, params?: ListParams): Promise<UserPermissionWithDetailsList>;
|
|
15167
|
+
create(tenant_id: string, user_id: string, permission: UserPermissionInsert, organization_id?: string): Promise<boolean>;
|
|
15168
|
+
remove(tenant_id: string, user_id: string, permission: Pick<UserPermissionInsert, "resource_server_identifier" | "permission_name">, organization_id?: string): Promise<boolean>;
|
|
15169
|
+
list(tenant_id: string, user_id: string, params?: ListParams, organization_id?: string): Promise<UserPermissionWithDetailsList>;
|
|
15070
15170
|
}
|
|
15071
15171
|
export interface ListRolesResponse extends Totals {
|
|
15072
15172
|
roles: Role[];
|
|
@@ -15085,9 +15185,9 @@ export interface ListUserRolesResponse {
|
|
|
15085
15185
|
length: number;
|
|
15086
15186
|
}
|
|
15087
15187
|
export interface UserRolesAdapter {
|
|
15088
|
-
list(tenantId: string, userId: string, params?: ListParams): Promise<Role[]>;
|
|
15089
|
-
|
|
15090
|
-
remove(tenantId: string, userId: string,
|
|
15188
|
+
list(tenantId: string, userId: string, params?: ListParams, organizationId?: string): Promise<Role[]>;
|
|
15189
|
+
create(tenantId: string, userId: string, roleId: string, organizationId?: string): Promise<boolean>;
|
|
15190
|
+
remove(tenantId: string, userId: string, roleId: string, organizationId?: string): Promise<boolean>;
|
|
15091
15191
|
}
|
|
15092
15192
|
export interface ListOrganizationsResponse extends Totals {
|
|
15093
15193
|
organizations: Organization[];
|
|
@@ -15099,6 +15199,29 @@ export interface OrganizationsAdapter {
|
|
|
15099
15199
|
list(tenant_id: string, params?: ListParams): Promise<ListOrganizationsResponse>;
|
|
15100
15200
|
update(tenant_id: string, id: string, params: Partial<OrganizationInsert>): Promise<boolean>;
|
|
15101
15201
|
}
|
|
15202
|
+
export interface UserOrganizationsAdapter {
|
|
15203
|
+
create(tenantId: string, params: UserOrganizationInsert): Promise<UserOrganization>;
|
|
15204
|
+
get(tenantId: string, id: string): Promise<UserOrganization | null>;
|
|
15205
|
+
remove(tenantId: string, id: string): Promise<boolean>;
|
|
15206
|
+
/**
|
|
15207
|
+
* List user-organization relationships
|
|
15208
|
+
* @param tenantId - The tenant ID
|
|
15209
|
+
* @param params - List parameters including query options:
|
|
15210
|
+
* - q: "user_id:{userId}" to get organizations for a specific user
|
|
15211
|
+
* - q: "organization_id:{organizationId}" to get members of a specific organization
|
|
15212
|
+
*/
|
|
15213
|
+
list(tenantId: string, params?: ListParams): Promise<{
|
|
15214
|
+
userOrganizations: UserOrganization[];
|
|
15215
|
+
} & Totals>;
|
|
15216
|
+
/**
|
|
15217
|
+
* List organizations for a specific user (Auth0 compatible API)
|
|
15218
|
+
* Returns full organization objects instead of user-organization relationships
|
|
15219
|
+
*/
|
|
15220
|
+
listUserOrganizations(tenantId: string, userId: string, params?: ListParams): Promise<{
|
|
15221
|
+
organizations: Organization[];
|
|
15222
|
+
} & Totals>;
|
|
15223
|
+
update(tenantId: string, id: string, params: Partial<UserOrganizationInsert>): Promise<boolean>;
|
|
15224
|
+
}
|
|
15102
15225
|
export interface DataAdapters {
|
|
15103
15226
|
applications: ApplicationsAdapter;
|
|
15104
15227
|
branding: BrandingAdapter;
|
|
@@ -15126,6 +15249,7 @@ export interface DataAdapters {
|
|
|
15126
15249
|
users: UserDataAdapter;
|
|
15127
15250
|
userRoles: UserRolesAdapter;
|
|
15128
15251
|
organizations: OrganizationsAdapter;
|
|
15252
|
+
userOrganizations: UserOrganizationsAdapter;
|
|
15129
15253
|
}
|
|
15130
15254
|
|
|
15131
15255
|
export {
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
import { z as e } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const Me = e.object({
|
|
3
3
|
start: e.number(),
|
|
4
4
|
limit: e.number(),
|
|
5
5
|
length: e.number()
|
|
6
|
-
}),
|
|
6
|
+
}), o = e.object({
|
|
7
7
|
created_at: e.string(),
|
|
8
8
|
updated_at: e.string()
|
|
9
9
|
}), h = e.object({
|
|
@@ -50,13 +50,13 @@ const Pe = e.object({
|
|
|
50
50
|
is_social: e.boolean().optional()
|
|
51
51
|
}), f = e.object({
|
|
52
52
|
...A.shape,
|
|
53
|
-
...
|
|
53
|
+
...o.shape,
|
|
54
54
|
user_id: e.string(),
|
|
55
55
|
is_social: e.boolean(),
|
|
56
56
|
email: e.string().optional(),
|
|
57
57
|
login_count: e.number().default(0),
|
|
58
58
|
identities: e.array(b).optional()
|
|
59
|
-
}),
|
|
59
|
+
}), Ge = f, xe = l.extend({
|
|
60
60
|
login_count: e.number(),
|
|
61
61
|
multifactor: e.array(e.string()).optional(),
|
|
62
62
|
last_ip: e.string().optional(),
|
|
@@ -64,10 +64,10 @@ const Pe = e.object({
|
|
|
64
64
|
user_id: e.string()
|
|
65
65
|
}).catchall(e.any()), C = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
66
66
|
let I = (t = 21) => {
|
|
67
|
-
let
|
|
67
|
+
let i = "", s = crypto.getRandomValues(new Uint8Array(t));
|
|
68
68
|
for (; t--; )
|
|
69
|
-
|
|
70
|
-
return
|
|
69
|
+
i += C[s[t] & 63];
|
|
70
|
+
return i;
|
|
71
71
|
};
|
|
72
72
|
const O = e.object({
|
|
73
73
|
audience: e.string().optional(),
|
|
@@ -296,12 +296,12 @@ const k = e.object({
|
|
|
296
296
|
sdkSrc: e.string().optional(),
|
|
297
297
|
sdk_src: e.string().optional()
|
|
298
298
|
}).passthrough()
|
|
299
|
-
}).passthrough(),
|
|
299
|
+
}).passthrough(), Ke = G.omit({
|
|
300
300
|
id: !0,
|
|
301
301
|
created_at: !0,
|
|
302
302
|
updated_at: !0
|
|
303
303
|
});
|
|
304
|
-
var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}),
|
|
304
|
+
var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
|
|
305
305
|
const x = e.object({
|
|
306
306
|
client_id: e.string(),
|
|
307
307
|
act_as: e.string().optional(),
|
|
@@ -314,13 +314,13 @@ const x = e.object({
|
|
|
314
314
|
nonce: e.string().optional(),
|
|
315
315
|
scope: e.string().optional(),
|
|
316
316
|
prompt: e.string().optional(),
|
|
317
|
-
code_challenge_method: e.nativeEnum(
|
|
317
|
+
code_challenge_method: e.nativeEnum(u).optional(),
|
|
318
318
|
code_challenge: e.string().optional(),
|
|
319
319
|
username: e.string().optional(),
|
|
320
320
|
ui_locales: e.string().optional(),
|
|
321
321
|
// The following fields are not available in Auth0
|
|
322
322
|
vendor_id: e.string().optional()
|
|
323
|
-
}),
|
|
323
|
+
}), Be = e.object({
|
|
324
324
|
colors: e.object({
|
|
325
325
|
primary: e.string(),
|
|
326
326
|
page_background: e.object({
|
|
@@ -388,14 +388,14 @@ e.object({
|
|
|
388
388
|
tenant: V,
|
|
389
389
|
connections: e.array(X)
|
|
390
390
|
});
|
|
391
|
-
const
|
|
391
|
+
const z = e.enum([
|
|
392
392
|
"password_reset",
|
|
393
393
|
"email_verification",
|
|
394
394
|
"otp",
|
|
395
395
|
"authorization_code",
|
|
396
396
|
"oauth2_state",
|
|
397
397
|
"ticket"
|
|
398
|
-
]),
|
|
398
|
+
]), Y = e.object({
|
|
399
399
|
code_id: e.string().openapi({
|
|
400
400
|
description: "The code that will be used in for instance an email verification flow"
|
|
401
401
|
}),
|
|
@@ -405,7 +405,7 @@ const Y = e.enum([
|
|
|
405
405
|
connection_id: e.string().optional().openapi({
|
|
406
406
|
description: "The connection that the code is connected to"
|
|
407
407
|
}),
|
|
408
|
-
code_type:
|
|
408
|
+
code_type: z,
|
|
409
409
|
code_verifier: e.string().optional().openapi({
|
|
410
410
|
description: "The code verifier used in PKCE in outbound flows"
|
|
411
411
|
}),
|
|
@@ -427,8 +427,8 @@ const Y = e.enum([
|
|
|
427
427
|
expires_at: e.string(),
|
|
428
428
|
used_at: e.string().optional(),
|
|
429
429
|
user_id: e.string().optional()
|
|
430
|
-
}),
|
|
431
|
-
...
|
|
430
|
+
}), Xe = e.object({
|
|
431
|
+
...Y.shape,
|
|
432
432
|
created_at: e.string()
|
|
433
433
|
}), q = e.object({
|
|
434
434
|
domain: e.string(),
|
|
@@ -458,9 +458,9 @@ const Y = e.enum([
|
|
|
458
458
|
methods: e.array(Q)
|
|
459
459
|
}).optional(),
|
|
460
460
|
tls_policy: e.string().optional()
|
|
461
|
-
}),
|
|
461
|
+
}), We = Z.extend({
|
|
462
462
|
tenant_id: e.string()
|
|
463
|
-
}),
|
|
463
|
+
}), Ve = e.object({
|
|
464
464
|
id: e.string(),
|
|
465
465
|
type: e.literal("submit"),
|
|
466
466
|
label: e.string(),
|
|
@@ -586,11 +586,11 @@ const Y = e.enum([
|
|
|
586
586
|
style: e.object({ css: e.string().optional() }).optional()
|
|
587
587
|
}).openapi({
|
|
588
588
|
description: "Schema for flow-based forms (matches new JSON structure)"
|
|
589
|
-
}),
|
|
590
|
-
...
|
|
589
|
+
}), ze = e.object({
|
|
590
|
+
...o.shape,
|
|
591
591
|
...$.shape,
|
|
592
592
|
id: e.string()
|
|
593
|
-
}),
|
|
593
|
+
}), E = e.enum([
|
|
594
594
|
"pre-user-signup",
|
|
595
595
|
"post-user-registration",
|
|
596
596
|
"post-user-login"
|
|
@@ -606,28 +606,28 @@ const Y = e.enum([
|
|
|
606
606
|
hook_id: e.string().optional()
|
|
607
607
|
}, ee = e.object({
|
|
608
608
|
..._,
|
|
609
|
-
trigger_id:
|
|
609
|
+
trigger_id: E,
|
|
610
610
|
url: e.string()
|
|
611
611
|
}), te = e.object({
|
|
612
612
|
..._,
|
|
613
613
|
trigger_id: m,
|
|
614
614
|
form_id: e.string()
|
|
615
|
-
}),
|
|
615
|
+
}), Ye = e.union([
|
|
616
616
|
ee,
|
|
617
617
|
te
|
|
618
618
|
]), ne = e.object({
|
|
619
619
|
..._,
|
|
620
|
-
trigger_id:
|
|
621
|
-
...
|
|
620
|
+
trigger_id: E,
|
|
621
|
+
...o.shape,
|
|
622
622
|
hook_id: e.string(),
|
|
623
623
|
url: e.string()
|
|
624
624
|
}), oe = e.object({
|
|
625
625
|
..._,
|
|
626
626
|
trigger_id: m,
|
|
627
|
-
...
|
|
627
|
+
...o.shape,
|
|
628
628
|
hook_id: e.string(),
|
|
629
629
|
form_id: e.string()
|
|
630
|
-
}),
|
|
630
|
+
}), qe = e.union([ne, oe]), ie = e.object({
|
|
631
631
|
alg: e.enum([
|
|
632
632
|
"RS256",
|
|
633
633
|
"RS384",
|
|
@@ -646,9 +646,9 @@ const Y = e.enum([
|
|
|
646
646
|
x5t: e.string().optional(),
|
|
647
647
|
x5c: e.array(e.string()).optional(),
|
|
648
648
|
use: e.enum(["sig", "enc"]).optional()
|
|
649
|
-
}),
|
|
649
|
+
}), Qe = e.object({
|
|
650
650
|
keys: e.array(ie)
|
|
651
|
-
}),
|
|
651
|
+
}), Ze = e.object({
|
|
652
652
|
issuer: e.string(),
|
|
653
653
|
authorization_endpoint: e.string(),
|
|
654
654
|
token_endpoint: e.string(),
|
|
@@ -682,7 +682,7 @@ const Y = e.enum([
|
|
|
682
682
|
login_completed: e.boolean().optional().default(!1)
|
|
683
683
|
}).openapi({
|
|
684
684
|
description: "This represents a login sesion"
|
|
685
|
-
}),
|
|
685
|
+
}), Je = e.object({
|
|
686
686
|
...ae.shape,
|
|
687
687
|
id: e.string().openapi({
|
|
688
688
|
description: "This is is used as the state in the universal login"
|
|
@@ -865,7 +865,7 @@ const Y = e.enum([
|
|
|
865
865
|
env: e.object({
|
|
866
866
|
node: e.string().optional()
|
|
867
867
|
}).optional()
|
|
868
|
-
}),
|
|
868
|
+
}), $e = e.object({
|
|
869
869
|
type: re,
|
|
870
870
|
date: e.string(),
|
|
871
871
|
description: e.string().optional(),
|
|
@@ -892,7 +892,7 @@ const Y = e.enum([
|
|
|
892
892
|
user_id: e.string(),
|
|
893
893
|
password: e.string(),
|
|
894
894
|
algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
895
|
-
}),
|
|
895
|
+
}), et = e.object({
|
|
896
896
|
...le.shape,
|
|
897
897
|
created_at: e.string(),
|
|
898
898
|
updated_at: e.string()
|
|
@@ -915,13 +915,13 @@ const Y = e.enum([
|
|
|
915
915
|
"Metadata related to the device used in the session"
|
|
916
916
|
),
|
|
917
917
|
clients: e.array(e.string()).describe("List of client details for the session")
|
|
918
|
-
}),
|
|
918
|
+
}), tt = e.object({
|
|
919
919
|
created_at: e.string(),
|
|
920
920
|
updated_at: e.string(),
|
|
921
921
|
authenticated_at: e.string(),
|
|
922
922
|
last_interaction_at: e.string(),
|
|
923
923
|
...ce.shape
|
|
924
|
-
}),
|
|
924
|
+
}), nt = e.object({
|
|
925
925
|
kid: e.string().openapi({ description: "The key id of the signing key" }),
|
|
926
926
|
cert: e.string().openapi({ description: "The public certificate of the signing key" }),
|
|
927
927
|
fingerprint: e.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -948,7 +948,7 @@ const Y = e.enum([
|
|
|
948
948
|
})
|
|
949
949
|
});
|
|
950
950
|
var pe = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(pe || {});
|
|
951
|
-
const
|
|
951
|
+
const ot = e.object({
|
|
952
952
|
access_token: e.string(),
|
|
953
953
|
id_token: e.string().optional(),
|
|
954
954
|
scope: e.string().optional(),
|
|
@@ -994,7 +994,7 @@ const de = e.object({
|
|
|
994
994
|
}), n = e.object({
|
|
995
995
|
bold: e.boolean(),
|
|
996
996
|
size: e.number()
|
|
997
|
-
}),
|
|
997
|
+
}), ue = e.object({
|
|
998
998
|
body_text: n,
|
|
999
999
|
buttons_text: n,
|
|
1000
1000
|
font_url: e.string(),
|
|
@@ -1004,7 +1004,7 @@ const de = e.object({
|
|
|
1004
1004
|
reference_text_size: e.number(),
|
|
1005
1005
|
subtitle: n,
|
|
1006
1006
|
title: n
|
|
1007
|
-
}),
|
|
1007
|
+
}), Ee = e.object({
|
|
1008
1008
|
background_color: e.string(),
|
|
1009
1009
|
background_image_url: e.string(),
|
|
1010
1010
|
page_layout: e.enum(["center", "left", "right"])
|
|
@@ -1018,17 +1018,17 @@ const de = e.object({
|
|
|
1018
1018
|
borders: de,
|
|
1019
1019
|
colors: ge,
|
|
1020
1020
|
displayName: e.string(),
|
|
1021
|
-
fonts:
|
|
1022
|
-
page_background:
|
|
1021
|
+
fonts: ue,
|
|
1022
|
+
page_background: Ee,
|
|
1023
1023
|
widget: me
|
|
1024
|
-
}),
|
|
1024
|
+
}), it = Se.extend({
|
|
1025
1025
|
themeId: e.string()
|
|
1026
|
-
}),
|
|
1026
|
+
}), at = e.object({
|
|
1027
1027
|
universal_login_experience: e.enum(["new", "classic"]).default("new"),
|
|
1028
1028
|
identifier_first: e.boolean().default(!0),
|
|
1029
1029
|
password_first: e.boolean().default(!1),
|
|
1030
1030
|
webauthn_platform_first_factor: e.boolean()
|
|
1031
|
-
}),
|
|
1031
|
+
}), st = e.object({
|
|
1032
1032
|
name: e.string(),
|
|
1033
1033
|
enabled: e.boolean().optional().default(!0),
|
|
1034
1034
|
default_from_address: e.string().optional(),
|
|
@@ -1079,15 +1079,15 @@ const de = e.object({
|
|
|
1079
1079
|
})
|
|
1080
1080
|
),
|
|
1081
1081
|
rotating: e.boolean()
|
|
1082
|
-
}),
|
|
1082
|
+
}), rt = e.object({
|
|
1083
1083
|
// When the refresh token record was created.
|
|
1084
1084
|
created_at: e.string(),
|
|
1085
1085
|
// Spread in the rest of the refresh token properties.
|
|
1086
1086
|
...he.shape
|
|
1087
|
-
}),
|
|
1087
|
+
}), _t = e.object({
|
|
1088
1088
|
to: e.string(),
|
|
1089
1089
|
message: e.string()
|
|
1090
|
-
}),
|
|
1090
|
+
}), lt = e.object({
|
|
1091
1091
|
name: e.string(),
|
|
1092
1092
|
options: e.object({})
|
|
1093
1093
|
}), be = e.object({
|
|
@@ -1120,7 +1120,7 @@ const de = e.object({
|
|
|
1120
1120
|
...fe.shape,
|
|
1121
1121
|
created_at: e.string().optional(),
|
|
1122
1122
|
updated_at: e.string().optional()
|
|
1123
|
-
}),
|
|
1123
|
+
}), ct = e.array(Ce), Ie = e.object({
|
|
1124
1124
|
role_id: e.string(),
|
|
1125
1125
|
resource_server_identifier: e.string(),
|
|
1126
1126
|
permission_name: e.string()
|
|
@@ -1128,47 +1128,57 @@ const de = e.object({
|
|
|
1128
1128
|
...Ie.shape,
|
|
1129
1129
|
tenant_id: e.string(),
|
|
1130
1130
|
created_at: e.string().optional()
|
|
1131
|
-
}),
|
|
1131
|
+
}), pt = e.array(Oe), Te = e.object({
|
|
1132
1132
|
role_id: e.string(),
|
|
1133
1133
|
resource_server_identifier: e.string(),
|
|
1134
1134
|
resource_server_name: e.string(),
|
|
1135
1135
|
permission_name: e.string(),
|
|
1136
1136
|
description: e.string().nullable().optional(),
|
|
1137
1137
|
created_at: e.string().optional()
|
|
1138
|
-
}),
|
|
1138
|
+
}), dt = e.array(
|
|
1139
1139
|
Te
|
|
1140
1140
|
), Ne = e.object({
|
|
1141
1141
|
user_id: e.string(),
|
|
1142
1142
|
resource_server_identifier: e.string(),
|
|
1143
|
-
permission_name: e.string()
|
|
1143
|
+
permission_name: e.string(),
|
|
1144
|
+
organization_id: e.string().optional()
|
|
1144
1145
|
}), Re = e.object({
|
|
1145
1146
|
...Ne.shape,
|
|
1146
1147
|
tenant_id: e.string(),
|
|
1147
1148
|
created_at: e.string().optional()
|
|
1148
|
-
}),
|
|
1149
|
+
}), gt = e.array(Re), Le = e.object({
|
|
1149
1150
|
user_id: e.string(),
|
|
1150
1151
|
resource_server_identifier: e.string(),
|
|
1151
1152
|
resource_server_name: e.string(),
|
|
1152
1153
|
permission_name: e.string(),
|
|
1153
1154
|
description: e.string().nullable().optional(),
|
|
1154
|
-
created_at: e.string().optional()
|
|
1155
|
-
|
|
1155
|
+
created_at: e.string().optional(),
|
|
1156
|
+
organization_id: e.string().optional()
|
|
1157
|
+
}), ut = e.array(
|
|
1156
1158
|
Le
|
|
1157
1159
|
), De = e.object({
|
|
1160
|
+
user_id: e.string(),
|
|
1161
|
+
role_id: e.string(),
|
|
1162
|
+
organization_id: e.string().optional()
|
|
1163
|
+
}), ye = e.object({
|
|
1164
|
+
...De.shape,
|
|
1165
|
+
tenant_id: e.string(),
|
|
1166
|
+
created_at: e.string().optional()
|
|
1167
|
+
}), Et = e.array(ye), Ue = e.object({
|
|
1158
1168
|
name: e.string().min(1).max(50).openapi({
|
|
1159
1169
|
description: "The name of the role. Cannot include '<' or '>'"
|
|
1160
1170
|
}),
|
|
1161
1171
|
description: e.string().max(255).optional().openapi({
|
|
1162
1172
|
description: "The description of the role"
|
|
1163
1173
|
})
|
|
1164
|
-
}),
|
|
1174
|
+
}), Fe = e.object({
|
|
1165
1175
|
id: e.string().openapi({
|
|
1166
1176
|
description: "The unique identifier of the role"
|
|
1167
1177
|
}),
|
|
1168
|
-
...
|
|
1178
|
+
...Ue.shape,
|
|
1169
1179
|
created_at: e.string().optional(),
|
|
1170
1180
|
updated_at: e.string().optional()
|
|
1171
|
-
}),
|
|
1181
|
+
}), mt = e.array(Fe), je = e.object({
|
|
1172
1182
|
logo_url: e.string().optional().openapi({
|
|
1173
1183
|
description: "URL of the organization's logo"
|
|
1174
1184
|
}),
|
|
@@ -1180,7 +1190,7 @@ const de = e.object({
|
|
|
1180
1190
|
description: "Page background color in hex format (e.g., #FFFFFF)"
|
|
1181
1191
|
})
|
|
1182
1192
|
}).optional()
|
|
1183
|
-
}).optional(),
|
|
1193
|
+
}).optional(), ke = e.object({
|
|
1184
1194
|
connection_id: e.string().openapi({
|
|
1185
1195
|
description: "ID of the connection"
|
|
1186
1196
|
}),
|
|
@@ -1193,7 +1203,7 @@ const de = e.object({
|
|
|
1193
1203
|
is_signup_enabled: e.boolean().default(!0).openapi({
|
|
1194
1204
|
description: "Whether signup is enabled for this connection"
|
|
1195
1205
|
})
|
|
1196
|
-
}),
|
|
1206
|
+
}), we = e.object({
|
|
1197
1207
|
client_credentials: e.object({
|
|
1198
1208
|
enforce: e.boolean().default(!1).openapi({
|
|
1199
1209
|
description: "Whether to enforce token quota limits"
|
|
@@ -1205,7 +1215,7 @@ const de = e.object({
|
|
|
1205
1215
|
description: "Maximum tokens per hour (0 = unlimited)"
|
|
1206
1216
|
})
|
|
1207
1217
|
}).optional()
|
|
1208
|
-
}).optional(),
|
|
1218
|
+
}).optional(), Pe = e.object({
|
|
1209
1219
|
id: e.string().optional(),
|
|
1210
1220
|
name: e.string().min(1).openapi({
|
|
1211
1221
|
description: "The name of the organization"
|
|
@@ -1213,30 +1223,41 @@ const de = e.object({
|
|
|
1213
1223
|
display_name: e.string().optional().openapi({
|
|
1214
1224
|
description: "The display name of the organization"
|
|
1215
1225
|
}),
|
|
1216
|
-
branding:
|
|
1226
|
+
branding: je,
|
|
1217
1227
|
metadata: e.record(e.any()).default({}).optional().openapi({
|
|
1218
1228
|
description: "Custom metadata for the organization"
|
|
1219
1229
|
}),
|
|
1220
|
-
enabled_connections: e.array(
|
|
1230
|
+
enabled_connections: e.array(ke).default([]).optional().openapi({
|
|
1221
1231
|
description: "List of enabled connections for the organization"
|
|
1222
1232
|
}),
|
|
1223
|
-
token_quota:
|
|
1224
|
-
}),
|
|
1225
|
-
...
|
|
1226
|
-
...
|
|
1233
|
+
token_quota: we
|
|
1234
|
+
}), St = e.object({
|
|
1235
|
+
...Pe.shape,
|
|
1236
|
+
...o.shape,
|
|
1237
|
+
id: e.string()
|
|
1238
|
+
}), ve = e.object({
|
|
1239
|
+
user_id: e.string().openapi({
|
|
1240
|
+
description: "ID of the user"
|
|
1241
|
+
}),
|
|
1242
|
+
organization_id: e.string().openapi({
|
|
1243
|
+
description: "ID of the organization"
|
|
1244
|
+
})
|
|
1245
|
+
}), ht = e.object({
|
|
1246
|
+
...ve.shape,
|
|
1247
|
+
...o.shape,
|
|
1227
1248
|
id: e.string()
|
|
1228
1249
|
});
|
|
1229
|
-
function
|
|
1230
|
-
const [
|
|
1231
|
-
if (!
|
|
1250
|
+
function bt(t) {
|
|
1251
|
+
const [i, s] = t.split("|");
|
|
1252
|
+
if (!i || !s)
|
|
1232
1253
|
throw new Error(`Invalid user_id: ${t}`);
|
|
1233
|
-
return { connection:
|
|
1254
|
+
return { connection: i, id: s };
|
|
1234
1255
|
}
|
|
1235
1256
|
export {
|
|
1236
1257
|
_e as Auth0Client,
|
|
1237
1258
|
g as AuthorizationResponseMode,
|
|
1238
1259
|
d as AuthorizationResponseType,
|
|
1239
|
-
|
|
1260
|
+
u as CodeChallengeMethod,
|
|
1240
1261
|
p as ComponentCategory,
|
|
1241
1262
|
c as ComponentType,
|
|
1242
1263
|
pe as GrantType,
|
|
@@ -1244,17 +1265,17 @@ export {
|
|
|
1244
1265
|
j as NodeType,
|
|
1245
1266
|
T as applicationInsertSchema,
|
|
1246
1267
|
N as applicationSchema,
|
|
1247
|
-
|
|
1268
|
+
Ke as auth0FlowInsertSchema,
|
|
1248
1269
|
G as auth0FlowSchema,
|
|
1249
|
-
|
|
1270
|
+
Ge as auth0UserResponseSchema,
|
|
1250
1271
|
x as authParamsSchema,
|
|
1251
1272
|
l as baseUserSchema,
|
|
1252
1273
|
de as bordersSchema,
|
|
1253
|
-
|
|
1274
|
+
Be as brandingSchema,
|
|
1254
1275
|
L as buttonComponentSchema,
|
|
1255
|
-
|
|
1256
|
-
|
|
1257
|
-
|
|
1276
|
+
Y as codeInsertSchema,
|
|
1277
|
+
Xe as codeSchema,
|
|
1278
|
+
z as codeTypeSchema,
|
|
1258
1279
|
ge as colorsSchema,
|
|
1259
1280
|
F as componentSchema,
|
|
1260
1281
|
B as connectionInsertSchema,
|
|
@@ -1263,78 +1284,83 @@ export {
|
|
|
1263
1284
|
a as coordinatesSchema,
|
|
1264
1285
|
q as customDomainInsertSchema,
|
|
1265
1286
|
Z as customDomainSchema,
|
|
1266
|
-
|
|
1267
|
-
|
|
1287
|
+
We as customDomainWithTenantIdSchema,
|
|
1288
|
+
st as emailProviderSchema,
|
|
1268
1289
|
M as endingSchema,
|
|
1269
1290
|
y as fieldComponentSchema,
|
|
1270
1291
|
w as flowNodeSchema,
|
|
1271
1292
|
n as fontDetailsSchema,
|
|
1272
|
-
|
|
1273
|
-
|
|
1293
|
+
ue as fontsSchema,
|
|
1294
|
+
Ve as formControlSchema,
|
|
1274
1295
|
$ as formInsertSchema,
|
|
1275
1296
|
J as formNodeComponentDefinition,
|
|
1276
|
-
|
|
1297
|
+
ze as formSchema,
|
|
1277
1298
|
U as genericComponentSchema,
|
|
1278
1299
|
P as genericNodeSchema,
|
|
1279
|
-
|
|
1280
|
-
|
|
1300
|
+
Ye as hookInsertSchema,
|
|
1301
|
+
qe as hookSchema,
|
|
1281
1302
|
b as identitySchema,
|
|
1282
|
-
|
|
1303
|
+
Qe as jwksKeySchema,
|
|
1283
1304
|
ie as jwksSchema,
|
|
1284
1305
|
D as legalComponentSchema,
|
|
1285
|
-
|
|
1306
|
+
$e as logSchema,
|
|
1286
1307
|
ae as loginSessionInsertSchema,
|
|
1287
|
-
|
|
1308
|
+
Je as loginSessionSchema,
|
|
1288
1309
|
v as nodeSchema,
|
|
1289
|
-
|
|
1290
|
-
|
|
1291
|
-
|
|
1292
|
-
|
|
1293
|
-
|
|
1294
|
-
|
|
1295
|
-
|
|
1296
|
-
|
|
1310
|
+
Ze as openIDConfigurationSchema,
|
|
1311
|
+
je as organizationBrandingSchema,
|
|
1312
|
+
ke as organizationEnabledConnectionSchema,
|
|
1313
|
+
Pe as organizationInsertSchema,
|
|
1314
|
+
St as organizationSchema,
|
|
1315
|
+
we as organizationTokenQuotaSchema,
|
|
1316
|
+
Ee as pageBackgroundSchema,
|
|
1317
|
+
bt as parseUserId,
|
|
1297
1318
|
le as passwordInsertSchema,
|
|
1298
|
-
|
|
1319
|
+
et as passwordSchema,
|
|
1299
1320
|
h as profileDataSchema,
|
|
1300
|
-
|
|
1321
|
+
at as promptSettingSchema,
|
|
1301
1322
|
he as refreshTokenInsertSchema,
|
|
1302
|
-
|
|
1323
|
+
rt as refreshTokenSchema,
|
|
1303
1324
|
fe as resourceServerInsertSchema,
|
|
1304
|
-
|
|
1325
|
+
ct as resourceServerListSchema,
|
|
1305
1326
|
Ae as resourceServerOptionsSchema,
|
|
1306
1327
|
Ce as resourceServerSchema,
|
|
1307
1328
|
be as resourceServerScopeSchema,
|
|
1308
1329
|
R as richTextComponentSchema,
|
|
1309
|
-
|
|
1310
|
-
|
|
1330
|
+
Ue as roleInsertSchema,
|
|
1331
|
+
mt as roleListSchema,
|
|
1311
1332
|
Ie as rolePermissionInsertSchema,
|
|
1312
|
-
|
|
1333
|
+
pt as rolePermissionListSchema,
|
|
1313
1334
|
Oe as rolePermissionSchema,
|
|
1314
|
-
|
|
1335
|
+
dt as rolePermissionWithDetailsListSchema,
|
|
1315
1336
|
Te as rolePermissionWithDetailsSchema,
|
|
1316
|
-
|
|
1337
|
+
Fe as roleSchema,
|
|
1317
1338
|
O as samlpAddon,
|
|
1318
1339
|
ce as sessionInsertSchema,
|
|
1319
|
-
|
|
1320
|
-
|
|
1321
|
-
|
|
1322
|
-
|
|
1340
|
+
tt as sessionSchema,
|
|
1341
|
+
nt as signingKeySchema,
|
|
1342
|
+
lt as smsProviderSchema,
|
|
1343
|
+
_t as smsSendParamsSchema,
|
|
1323
1344
|
H as startSchema,
|
|
1324
1345
|
k as stepNodeSchema,
|
|
1325
1346
|
W as tenantInsertSchema,
|
|
1326
1347
|
V as tenantSchema,
|
|
1327
1348
|
Se as themeInsertSchema,
|
|
1328
|
-
|
|
1329
|
-
|
|
1330
|
-
|
|
1349
|
+
it as themeSchema,
|
|
1350
|
+
ot as tokenResponseSchema,
|
|
1351
|
+
Me as totalsSchema,
|
|
1331
1352
|
A as userInsertSchema,
|
|
1353
|
+
ve as userOrganizationInsertSchema,
|
|
1354
|
+
ht as userOrganizationSchema,
|
|
1332
1355
|
Ne as userPermissionInsertSchema,
|
|
1333
|
-
|
|
1356
|
+
gt as userPermissionListSchema,
|
|
1334
1357
|
Re as userPermissionSchema,
|
|
1335
|
-
|
|
1358
|
+
ut as userPermissionWithDetailsListSchema,
|
|
1336
1359
|
Le as userPermissionWithDetailsSchema,
|
|
1337
|
-
|
|
1360
|
+
xe as userResponseSchema,
|
|
1361
|
+
De as userRoleInsertSchema,
|
|
1362
|
+
Et as userRoleListSchema,
|
|
1363
|
+
ye as userRoleSchema,
|
|
1338
1364
|
f as userSchema,
|
|
1339
1365
|
Q as verificationMethodsSchema,
|
|
1340
1366
|
me as widgetSchema
|