@authhero/adapter-interfaces 0.86.0 → 0.87.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Le=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),n=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),m=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),S=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:m.optional()}),l=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),u=l.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().default("email"),connection:e.z.string().default("email"),is_social:e.z.boolean().optional()}),E=e.z.object({...u.shape,...n.shape,user_id:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(S).optional()}),De=E,ye=l.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),Ue="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Fe=(t=21)=>{let a="",s=crypto.getRandomValues(new Uint8Array(t));for(;t--;)a+=Ue[s[t]&63];return a};const h=e.z.object({audience:e.z.string().optional(),recipient:e.z.string().optional(),createUpnClaim:e.z.boolean().optional(),mapUnknownClaimsAsIs:e.z.boolean().optional(),passthroughClaimsWithNoMapping:e.z.boolean().optional(),mapIdentities:e.z.boolean().optional(),signatureAlgorithm:e.z.string().optional(),digestAlgorithm:e.z.string().optional(),issuer:e.z.string().optional(),destination:e.z.string().optional(),lifetimeInSeconds:e.z.number().optional(),signResponse:e.z.boolean().optional(),nameIdentifierFormat:e.z.string().optional(),nameIdentifierProbes:e.z.array(e.z.string()).optional(),authnContextClassRef:e.z.string().optional(),mappings:e.z.record(e.z.string()).optional()}),b=e.z.object({id:e.z.string(),name:e.z.string(),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:e.z.object({samlp:h.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:e.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:e.z.string().default(()=>Fe()).optional(),disable_sign_ups:e.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"}),client_metadata:e.z.record(e.z.string().length(255)).optional()}),f=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...b.shape}),i=e.z.object({x:e.z.number(),y:e.z.number()});var _=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(_||{}),p=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(p||{});const r=e.z.object({id:e.z.string(),category:e.z.nativeEnum(p),type:e.z.nativeEnum(_)}),A=r.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),I=r.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),C=r.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),O=r.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),T=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),N=e.z.union([A,I,C,O,T]);var R=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(R||{});const L=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(N),next_node:e.z.string()}).passthrough()}),D=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),y=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:i}).passthrough(),U=e.z.union([L,D,y]),F=e.z.object({next_node:e.z.string(),coordinates:i}).passthrough(),j=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:i}).passthrough(),k=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(U),start:F,ending:j,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),je=k.omit({id:!0,created_at:!0,updated_at:!0});var z=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(z||{}),d=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(d||{}),g=(t=>(t.S256="S256",t.Plain="plain",t))(g||{});const w=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(z).optional(),response_mode:e.z.nativeEnum(d).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(g).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),ke=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),P=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional()}),v=e.z.object({id:e.z.string().optional(),name:e.z.string(),strategy:e.z.string(),options:P.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional()}),H=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(v.shape),M=e.z.object({name:e.z.string(),audience:e.z.string(),sender_email:e.z.string().email(),sender_name:e.z.string(),support_url:e.z.string().url().optional(),logo:e.z.string().url().optional(),primary_color:e.z.string().optional(),secondary_color:e.z.string().optional(),language:e.z.string().optional(),id:e.z.string().optional()}),G=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...M.shape,id:e.z.string()});e.z.object({...f.shape,tenant:G,connections:e.z.array(H)});const x=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),K=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:x,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),we=e.z.object({...K.shape,created_at:e.z.string()}),B=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),W=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),X=e.z.object({...B.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(W)}).optional(),tls_policy:e.z.string().optional()}),Pe=X.extend({tenant_id:e.z.string()}),ve=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),V=e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()}),required:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()}),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)})]),Y=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.array(e.z.string())})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(V),next_node:e.z.string()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),He=e.z.object({...n.shape,...Y.shape,id:e.z.string()}),q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),Q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),c={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},Me=e.z.object({...c,trigger_id:q,url:e.z.string()}),Ge=e.z.object({...c,trigger_id:Q,form_id:e.z.string()}),xe=e.z.union([Me,Ge]),Ke=e.z.object({...c,trigger_id:q,...n.shape,hook_id:e.z.string(),url:e.z.string()}),Be=e.z.object({...c,trigger_id:Q,...n.shape,hook_id:e.z.string(),form_id:e.z.string()}),We=e.z.union([Ke,Be]),Z=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),Xe=e.z.object({keys:e.z.array(Z)}),Ve=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),J=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:w,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),Ye=e.z.object({...J.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),$={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},qe=e.z.string().refine(t=>Object.values($).includes(t),{message:"Invalid log type"}),ee=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),Qe=e.z.object({type:qe,date:e.z.string(),description:e.z.string().optional(),log_id:e.z.string().optional(),_id:e.z.string().optional(),ip:e.z.string(),user_agent:e.z.string(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.array(e.z.string()).optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ee.optional()}),te=e.z.object({user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id")}),Ze=e.z.object({...te.shape,created_at:e.z.string(),updated_at:e.z.string()}),oe=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),ne=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:oe.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),Je=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...ne.shape}),$e=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var ie=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(ie||{});const et=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),se=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),o=e.z.object({bold:e.z.boolean(),size:e.z.number()}),re=e.z.object({body_text:o,buttons_text:o,font_url:e.z.string(),input_labels:o,links:o,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:o,title:o}),ce=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),le=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),_e=e.z.object({borders:ae,colors:se,displayName:e.z.string(),fonts:re,page_background:ce,widget:le}),tt=_e.extend({themeId:e.z.string()}),ot=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),nt=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),pe=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:oe,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),it=e.z.object({created_at:e.z.string(),...pe.shape}),at=e.z.object({to:e.z.string(),message:e.z.string()}),st=e.z.object({name:e.z.string(),options:e.z.object({})}),ze=e.z.object({value:e.z.string(),description:e.z.string().optional()}),de=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),ge=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(ze).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:de.optional()}),me=e.z.object({id:e.z.string().optional(),...ge.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),rt=e.z.array(me),Se=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ue=e.z.object({...Se.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),ct=e.z.array(ue),Ee=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),lt=e.z.array(Ee),he=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),be=e.z.object({...he.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),_t=e.z.array(be),fe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),pt=e.z.array(fe),Ae=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),Ie=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Ae.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),zt=e.z.array(Ie),Ce=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Oe=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Te=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),Ne=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Ce,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Oe).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Te}),dt=e.z.object({...Ne.shape,...n.shape,id:e.z.string()}),Re=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),gt=e.z.object({...Re.shape,...n.shape,id:e.z.string()});function mt(t){const[a,s]=t.split("|");if(!a||!s)throw new Error(`Invalid user_id: ${t}`);return{connection:a,id:s}}exports.Auth0Client=ee;exports.AuthorizationResponseMode=d;exports.AuthorizationResponseType=z;exports.CodeChallengeMethod=g;exports.ComponentCategory=p;exports.ComponentType=_;exports.GrantType=ie;exports.LogTypes=$;exports.NodeType=R;exports.applicationInsertSchema=b;exports.applicationSchema=f;exports.auth0FlowInsertSchema=je;exports.auth0FlowSchema=k;exports.auth0UserResponseSchema=De;exports.authParamsSchema=w;exports.baseUserSchema=l;exports.bordersSchema=ae;exports.brandingSchema=ke;exports.buttonComponentSchema=I;exports.codeInsertSchema=K;exports.codeSchema=we;exports.codeTypeSchema=x;exports.colorsSchema=se;exports.componentSchema=N;exports.connectionInsertSchema=v;exports.connectionOptionsSchema=P;exports.connectionSchema=H;exports.coordinatesSchema=i;exports.customDomainInsertSchema=B;exports.customDomainSchema=X;exports.customDomainWithTenantIdSchema=Pe;exports.emailProviderSchema=nt;exports.endingSchema=j;exports.fieldComponentSchema=O;exports.flowNodeSchema=D;exports.fontDetailsSchema=o;exports.fontsSchema=re;exports.formControlSchema=ve;exports.formInsertSchema=Y;exports.formNodeComponentDefinition=V;exports.formSchema=He;exports.genericComponentSchema=T;exports.genericNodeSchema=y;exports.hookInsertSchema=xe;exports.hookSchema=We;exports.identitySchema=S;exports.jwksKeySchema=Xe;exports.jwksSchema=Z;exports.legalComponentSchema=C;exports.logSchema=Qe;exports.loginSessionInsertSchema=J;exports.loginSessionSchema=Ye;exports.nodeSchema=U;exports.openIDConfigurationSchema=Ve;exports.organizationBrandingSchema=Ce;exports.organizationEnabledConnectionSchema=Oe;exports.organizationInsertSchema=Ne;exports.organizationSchema=dt;exports.organizationTokenQuotaSchema=Te;exports.pageBackgroundSchema=ce;exports.parseUserId=mt;exports.passwordInsertSchema=te;exports.passwordSchema=Ze;exports.profileDataSchema=m;exports.promptSettingSchema=ot;exports.refreshTokenInsertSchema=pe;exports.refreshTokenSchema=it;exports.resourceServerInsertSchema=ge;exports.resourceServerListSchema=rt;exports.resourceServerOptionsSchema=de;exports.resourceServerSchema=me;exports.resourceServerScopeSchema=ze;exports.richTextComponentSchema=A;exports.roleInsertSchema=Ae;exports.roleListSchema=zt;exports.rolePermissionInsertSchema=Se;exports.rolePermissionListSchema=ct;exports.rolePermissionSchema=ue;exports.rolePermissionWithDetailsListSchema=lt;exports.rolePermissionWithDetailsSchema=Ee;exports.roleSchema=Ie;exports.samlpAddon=h;exports.sessionInsertSchema=ne;exports.sessionSchema=Je;exports.signingKeySchema=$e;exports.smsProviderSchema=st;exports.smsSendParamsSchema=at;exports.startSchema=F;exports.stepNodeSchema=L;exports.tenantInsertSchema=M;exports.tenantSchema=G;exports.themeInsertSchema=_e;exports.themeSchema=tt;exports.tokenResponseSchema=et;exports.totalsSchema=Le;exports.userInsertSchema=u;exports.userOrganizationInsertSchema=Re;exports.userOrganizationSchema=gt;exports.userPermissionInsertSchema=he;exports.userPermissionListSchema=_t;exports.userPermissionSchema=be;exports.userPermissionWithDetailsListSchema=pt;exports.userPermissionWithDetailsSchema=fe;exports.userResponseSchema=ye;exports.userSchema=E;exports.verificationMethodsSchema=W;exports.widgetSchema=le;
1
+ "use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),ye=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),n=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),m=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),S=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:m.optional()}),l=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),u=l.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().default("email"),connection:e.z.string().default("email"),is_social:e.z.boolean().optional()}),h=e.z.object({...u.shape,...n.shape,user_id:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(S).optional()}),Ue=h,Fe=l.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),je="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let ke=(t=21)=>{let a="",s=crypto.getRandomValues(new Uint8Array(t));for(;t--;)a+=je[s[t]&63];return a};const E=e.z.object({audience:e.z.string().optional(),recipient:e.z.string().optional(),createUpnClaim:e.z.boolean().optional(),mapUnknownClaimsAsIs:e.z.boolean().optional(),passthroughClaimsWithNoMapping:e.z.boolean().optional(),mapIdentities:e.z.boolean().optional(),signatureAlgorithm:e.z.string().optional(),digestAlgorithm:e.z.string().optional(),issuer:e.z.string().optional(),destination:e.z.string().optional(),lifetimeInSeconds:e.z.number().optional(),signResponse:e.z.boolean().optional(),nameIdentifierFormat:e.z.string().optional(),nameIdentifierProbes:e.z.array(e.z.string()).optional(),authnContextClassRef:e.z.string().optional(),mappings:e.z.record(e.z.string()).optional()}),b=e.z.object({id:e.z.string(),name:e.z.string(),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"}),addons:e.z.object({samlp:E.optional()}).default({}).optional().openapi({description:"Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."}),email_validation:e.z.enum(["enabled","disabled","enforced"]).default("enforced").optional().openapi({description:"Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"}),client_secret:e.z.string().default(()=>ke()).optional(),disable_sign_ups:e.z.boolean().optional().default(!1).openapi({description:"Prevents users from signing up using the hosted login page. This is not available in auth0"}),client_metadata:e.z.record(e.z.string().length(255)).optional()}),f=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...b.shape}),i=e.z.object({x:e.z.number(),y:e.z.number()});var _=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(_||{}),p=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(p||{});const r=e.z.object({id:e.z.string(),category:e.z.nativeEnum(p),type:e.z.nativeEnum(_)}),A=r.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),I=r.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),C=r.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),O=r.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),T=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),N=e.z.union([A,I,C,O,T]);var R=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(R||{});const L=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(N),next_node:e.z.string()}).passthrough()}),D=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),y=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:i}).passthrough(),U=e.z.union([L,D,y]),F=e.z.object({next_node:e.z.string(),coordinates:i}).passthrough(),j=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:i}).passthrough(),k=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(U),start:F,ending:j,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),we=k.omit({id:!0,created_at:!0,updated_at:!0});var z=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(z||{}),d=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(d||{}),g=(t=>(t.S256="S256",t.Plain="plain",t))(g||{});const w=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(z).optional(),response_mode:e.z.nativeEnum(d).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(g).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),Pe=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),P=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional()}),v=e.z.object({id:e.z.string().optional(),name:e.z.string(),strategy:e.z.string(),options:P.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional()}),H=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(v.shape),M=e.z.object({name:e.z.string(),audience:e.z.string(),sender_email:e.z.string().email(),sender_name:e.z.string(),support_url:e.z.string().url().optional(),logo:e.z.string().url().optional(),primary_color:e.z.string().optional(),secondary_color:e.z.string().optional(),language:e.z.string().optional(),id:e.z.string().optional()}),G=e.z.object({created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t),...M.shape,id:e.z.string()});e.z.object({...f.shape,tenant:G,connections:e.z.array(H)});const x=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),K=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:x,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),ve=e.z.object({...K.shape,created_at:e.z.string()}),B=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),W=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),X=e.z.object({...B.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(W)}).optional(),tls_policy:e.z.string().optional()}),He=X.extend({tenant_id:e.z.string()}),Me=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),V=e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()}),required:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()}),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)})]),Y=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.array(e.z.string())})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(V),next_node:e.z.string()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),Ge=e.z.object({...n.shape,...Y.shape,id:e.z.string()}),q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),Q=e.z.enum(["pre-user-signup","post-user-registration","post-user-login"]),c={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},xe=e.z.object({...c,trigger_id:q,url:e.z.string()}),Ke=e.z.object({...c,trigger_id:Q,form_id:e.z.string()}),Be=e.z.union([xe,Ke]),We=e.z.object({...c,trigger_id:q,...n.shape,hook_id:e.z.string(),url:e.z.string()}),Xe=e.z.object({...c,trigger_id:Q,...n.shape,hook_id:e.z.string(),form_id:e.z.string()}),Ve=e.z.union([We,Xe]),Z=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),Ye=e.z.object({keys:e.z.array(Z)}),qe=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),J=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:w,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),Qe=e.z.object({...J.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),$={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},Ze=e.z.string().refine(t=>Object.values($).includes(t),{message:"Invalid log type"}),ee=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),Je=e.z.object({type:Ze,date:e.z.string(),description:e.z.string().optional(),log_id:e.z.string().optional(),_id:e.z.string().optional(),ip:e.z.string(),user_agent:e.z.string(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.array(e.z.string()).optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ee.optional()}),te=e.z.object({user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id")}),$e=e.z.object({...te.shape,created_at:e.z.string(),updated_at:e.z.string()}),oe=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),ne=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:oe.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),et=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...ne.shape}),tt=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var ie=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(ie||{});const ot=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const ae=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),se=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),o=e.z.object({bold:e.z.boolean(),size:e.z.number()}),re=e.z.object({body_text:o,buttons_text:o,font_url:e.z.string(),input_labels:o,links:o,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:o,title:o}),ce=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),le=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),_e=e.z.object({borders:ae,colors:se,displayName:e.z.string(),fonts:re,page_background:ce,widget:le}),nt=_e.extend({themeId:e.z.string()}),it=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),at=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),pe=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:oe,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),st=e.z.object({created_at:e.z.string(),...pe.shape}),rt=e.z.object({to:e.z.string(),message:e.z.string()}),ct=e.z.object({name:e.z.string(),options:e.z.object({})}),ze=e.z.object({value:e.z.string(),description:e.z.string().optional()}),de=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),ge=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(ze).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:de.optional()}),me=e.z.object({id:e.z.string().optional(),...ge.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),lt=e.z.array(me),Se=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),ue=e.z.object({...Se.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),_t=e.z.array(ue),he=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),pt=e.z.array(he),Ee=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string(),organization_id:e.z.string().optional()}),be=e.z.object({...Ee.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),zt=e.z.array(be),fe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional(),organization_id:e.z.string().optional()}),dt=e.z.array(fe),Ae=e.z.object({user_id:e.z.string(),role_id:e.z.string(),organization_id:e.z.string().optional()}),Ie=e.z.object({...Ae.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),gt=e.z.array(Ie),Ce=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),Oe=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Ce.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),mt=e.z.array(Oe),Te=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),Ne=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),Re=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),Le=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Te,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(Ne).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:Re}),St=e.z.object({...Le.shape,...n.shape,id:e.z.string()}),De=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),ut=e.z.object({...De.shape,...n.shape,id:e.z.string()});function ht(t){const[a,s]=t.split("|");if(!a||!s)throw new Error(`Invalid user_id: ${t}`);return{connection:a,id:s}}exports.Auth0Client=ee;exports.AuthorizationResponseMode=d;exports.AuthorizationResponseType=z;exports.CodeChallengeMethod=g;exports.ComponentCategory=p;exports.ComponentType=_;exports.GrantType=ie;exports.LogTypes=$;exports.NodeType=R;exports.applicationInsertSchema=b;exports.applicationSchema=f;exports.auth0FlowInsertSchema=we;exports.auth0FlowSchema=k;exports.auth0UserResponseSchema=Ue;exports.authParamsSchema=w;exports.baseUserSchema=l;exports.bordersSchema=ae;exports.brandingSchema=Pe;exports.buttonComponentSchema=I;exports.codeInsertSchema=K;exports.codeSchema=ve;exports.codeTypeSchema=x;exports.colorsSchema=se;exports.componentSchema=N;exports.connectionInsertSchema=v;exports.connectionOptionsSchema=P;exports.connectionSchema=H;exports.coordinatesSchema=i;exports.customDomainInsertSchema=B;exports.customDomainSchema=X;exports.customDomainWithTenantIdSchema=He;exports.emailProviderSchema=at;exports.endingSchema=j;exports.fieldComponentSchema=O;exports.flowNodeSchema=D;exports.fontDetailsSchema=o;exports.fontsSchema=re;exports.formControlSchema=Me;exports.formInsertSchema=Y;exports.formNodeComponentDefinition=V;exports.formSchema=Ge;exports.genericComponentSchema=T;exports.genericNodeSchema=y;exports.hookInsertSchema=Be;exports.hookSchema=Ve;exports.identitySchema=S;exports.jwksKeySchema=Ye;exports.jwksSchema=Z;exports.legalComponentSchema=C;exports.logSchema=Je;exports.loginSessionInsertSchema=J;exports.loginSessionSchema=Qe;exports.nodeSchema=U;exports.openIDConfigurationSchema=qe;exports.organizationBrandingSchema=Te;exports.organizationEnabledConnectionSchema=Ne;exports.organizationInsertSchema=Le;exports.organizationSchema=St;exports.organizationTokenQuotaSchema=Re;exports.pageBackgroundSchema=ce;exports.parseUserId=ht;exports.passwordInsertSchema=te;exports.passwordSchema=$e;exports.profileDataSchema=m;exports.promptSettingSchema=it;exports.refreshTokenInsertSchema=pe;exports.refreshTokenSchema=st;exports.resourceServerInsertSchema=ge;exports.resourceServerListSchema=lt;exports.resourceServerOptionsSchema=de;exports.resourceServerSchema=me;exports.resourceServerScopeSchema=ze;exports.richTextComponentSchema=A;exports.roleInsertSchema=Ce;exports.roleListSchema=mt;exports.rolePermissionInsertSchema=Se;exports.rolePermissionListSchema=_t;exports.rolePermissionSchema=ue;exports.rolePermissionWithDetailsListSchema=pt;exports.rolePermissionWithDetailsSchema=he;exports.roleSchema=Oe;exports.samlpAddon=E;exports.sessionInsertSchema=ne;exports.sessionSchema=et;exports.signingKeySchema=tt;exports.smsProviderSchema=ct;exports.smsSendParamsSchema=rt;exports.startSchema=F;exports.stepNodeSchema=L;exports.tenantInsertSchema=M;exports.tenantSchema=G;exports.themeInsertSchema=_e;exports.themeSchema=nt;exports.tokenResponseSchema=ot;exports.totalsSchema=ye;exports.userInsertSchema=u;exports.userOrganizationInsertSchema=De;exports.userOrganizationSchema=ut;exports.userPermissionInsertSchema=Ee;exports.userPermissionListSchema=zt;exports.userPermissionSchema=be;exports.userPermissionWithDetailsListSchema=dt;exports.userPermissionWithDetailsSchema=fe;exports.userResponseSchema=Fe;exports.userRoleInsertSchema=Ae;exports.userRoleListSchema=gt;exports.userRoleSchema=Ie;exports.userSchema=h;exports.verificationMethodsSchema=W;exports.widgetSchema=le;
@@ -14389,14 +14389,17 @@ export declare const userPermissionInsertSchema: z.ZodObject<{
14389
14389
  user_id: z.ZodString;
14390
14390
  resource_server_identifier: z.ZodString;
14391
14391
  permission_name: z.ZodString;
14392
+ organization_id: z.ZodOptional<z.ZodString>;
14392
14393
  }, "strip", z.ZodTypeAny, {
14393
14394
  user_id: string;
14394
14395
  resource_server_identifier: string;
14395
14396
  permission_name: string;
14397
+ organization_id?: string | undefined;
14396
14398
  }, {
14397
14399
  user_id: string;
14398
14400
  resource_server_identifier: string;
14399
14401
  permission_name: string;
14402
+ organization_id?: string | undefined;
14400
14403
  }>;
14401
14404
  export type UserPermissionInsert = z.infer<typeof userPermissionInsertSchema>;
14402
14405
  export declare const userPermissionSchema: z.ZodObject<{
@@ -14405,18 +14408,21 @@ export declare const userPermissionSchema: z.ZodObject<{
14405
14408
  user_id: z.ZodString;
14406
14409
  resource_server_identifier: z.ZodString;
14407
14410
  permission_name: z.ZodString;
14411
+ organization_id: z.ZodOptional<z.ZodString>;
14408
14412
  }, "strip", z.ZodTypeAny, {
14409
14413
  user_id: string;
14410
14414
  tenant_id: string;
14411
14415
  resource_server_identifier: string;
14412
14416
  permission_name: string;
14413
14417
  created_at?: string | undefined;
14418
+ organization_id?: string | undefined;
14414
14419
  }, {
14415
14420
  user_id: string;
14416
14421
  tenant_id: string;
14417
14422
  resource_server_identifier: string;
14418
14423
  permission_name: string;
14419
14424
  created_at?: string | undefined;
14425
+ organization_id?: string | undefined;
14420
14426
  }>;
14421
14427
  export type UserPermission = z.infer<typeof userPermissionSchema>;
14422
14428
  export declare const userPermissionListSchema: z.ZodArray<z.ZodObject<{
@@ -14425,18 +14431,21 @@ export declare const userPermissionListSchema: z.ZodArray<z.ZodObject<{
14425
14431
  user_id: z.ZodString;
14426
14432
  resource_server_identifier: z.ZodString;
14427
14433
  permission_name: z.ZodString;
14434
+ organization_id: z.ZodOptional<z.ZodString>;
14428
14435
  }, "strip", z.ZodTypeAny, {
14429
14436
  user_id: string;
14430
14437
  tenant_id: string;
14431
14438
  resource_server_identifier: string;
14432
14439
  permission_name: string;
14433
14440
  created_at?: string | undefined;
14441
+ organization_id?: string | undefined;
14434
14442
  }, {
14435
14443
  user_id: string;
14436
14444
  tenant_id: string;
14437
14445
  resource_server_identifier: string;
14438
14446
  permission_name: string;
14439
14447
  created_at?: string | undefined;
14448
+ organization_id?: string | undefined;
14440
14449
  }>, "many">;
14441
14450
  export type UserPermissionList = z.infer<typeof userPermissionListSchema>;
14442
14451
  export declare const userPermissionWithDetailsSchema: z.ZodObject<{
@@ -14446,6 +14455,7 @@ export declare const userPermissionWithDetailsSchema: z.ZodObject<{
14446
14455
  permission_name: z.ZodString;
14447
14456
  description: z.ZodOptional<z.ZodNullable<z.ZodString>>;
14448
14457
  created_at: z.ZodOptional<z.ZodString>;
14458
+ organization_id: z.ZodOptional<z.ZodString>;
14449
14459
  }, "strip", z.ZodTypeAny, {
14450
14460
  user_id: string;
14451
14461
  resource_server_identifier: string;
@@ -14453,6 +14463,7 @@ export declare const userPermissionWithDetailsSchema: z.ZodObject<{
14453
14463
  resource_server_name: string;
14454
14464
  description?: string | null | undefined;
14455
14465
  created_at?: string | undefined;
14466
+ organization_id?: string | undefined;
14456
14467
  }, {
14457
14468
  user_id: string;
14458
14469
  resource_server_identifier: string;
@@ -14460,6 +14471,7 @@ export declare const userPermissionWithDetailsSchema: z.ZodObject<{
14460
14471
  resource_server_name: string;
14461
14472
  description?: string | null | undefined;
14462
14473
  created_at?: string | undefined;
14474
+ organization_id?: string | undefined;
14463
14475
  }>;
14464
14476
  export type UserPermissionWithDetails = z.infer<typeof userPermissionWithDetailsSchema>;
14465
14477
  export declare const userPermissionWithDetailsListSchema: z.ZodArray<z.ZodObject<{
@@ -14469,6 +14481,7 @@ export declare const userPermissionWithDetailsListSchema: z.ZodArray<z.ZodObject
14469
14481
  permission_name: z.ZodString;
14470
14482
  description: z.ZodOptional<z.ZodNullable<z.ZodString>>;
14471
14483
  created_at: z.ZodOptional<z.ZodString>;
14484
+ organization_id: z.ZodOptional<z.ZodString>;
14472
14485
  }, "strip", z.ZodTypeAny, {
14473
14486
  user_id: string;
14474
14487
  resource_server_identifier: string;
@@ -14476,6 +14489,7 @@ export declare const userPermissionWithDetailsListSchema: z.ZodArray<z.ZodObject
14476
14489
  resource_server_name: string;
14477
14490
  description?: string | null | undefined;
14478
14491
  created_at?: string | undefined;
14492
+ organization_id?: string | undefined;
14479
14493
  }, {
14480
14494
  user_id: string;
14481
14495
  resource_server_identifier: string;
@@ -14483,8 +14497,63 @@ export declare const userPermissionWithDetailsListSchema: z.ZodArray<z.ZodObject
14483
14497
  resource_server_name: string;
14484
14498
  description?: string | null | undefined;
14485
14499
  created_at?: string | undefined;
14500
+ organization_id?: string | undefined;
14486
14501
  }>, "many">;
14487
14502
  export type UserPermissionWithDetailsList = z.infer<typeof userPermissionWithDetailsListSchema>;
14503
+ export declare const userRoleInsertSchema: z.ZodObject<{
14504
+ user_id: z.ZodString;
14505
+ role_id: z.ZodString;
14506
+ organization_id: z.ZodOptional<z.ZodString>;
14507
+ }, "strip", z.ZodTypeAny, {
14508
+ user_id: string;
14509
+ role_id: string;
14510
+ organization_id?: string | undefined;
14511
+ }, {
14512
+ user_id: string;
14513
+ role_id: string;
14514
+ organization_id?: string | undefined;
14515
+ }>;
14516
+ export type UserRoleInsert = z.infer<typeof userRoleInsertSchema>;
14517
+ export declare const userRoleSchema: z.ZodObject<{
14518
+ tenant_id: z.ZodString;
14519
+ created_at: z.ZodOptional<z.ZodString>;
14520
+ user_id: z.ZodString;
14521
+ role_id: z.ZodString;
14522
+ organization_id: z.ZodOptional<z.ZodString>;
14523
+ }, "strip", z.ZodTypeAny, {
14524
+ user_id: string;
14525
+ tenant_id: string;
14526
+ role_id: string;
14527
+ created_at?: string | undefined;
14528
+ organization_id?: string | undefined;
14529
+ }, {
14530
+ user_id: string;
14531
+ tenant_id: string;
14532
+ role_id: string;
14533
+ created_at?: string | undefined;
14534
+ organization_id?: string | undefined;
14535
+ }>;
14536
+ export type UserRole = z.infer<typeof userRoleSchema>;
14537
+ export declare const userRoleListSchema: z.ZodArray<z.ZodObject<{
14538
+ tenant_id: z.ZodString;
14539
+ created_at: z.ZodOptional<z.ZodString>;
14540
+ user_id: z.ZodString;
14541
+ role_id: z.ZodString;
14542
+ organization_id: z.ZodOptional<z.ZodString>;
14543
+ }, "strip", z.ZodTypeAny, {
14544
+ user_id: string;
14545
+ tenant_id: string;
14546
+ role_id: string;
14547
+ created_at?: string | undefined;
14548
+ organization_id?: string | undefined;
14549
+ }, {
14550
+ user_id: string;
14551
+ tenant_id: string;
14552
+ role_id: string;
14553
+ created_at?: string | undefined;
14554
+ organization_id?: string | undefined;
14555
+ }>, "many">;
14556
+ export type UserRoleList = z.infer<typeof userRoleListSchema>;
14488
14557
  export declare const roleInsertSchema: z.ZodObject<{
14489
14558
  name: z.ZodString;
14490
14559
  description: z.ZodOptional<z.ZodString>;
@@ -15095,9 +15164,9 @@ export interface RolePermissionsAdapter {
15095
15164
  list(tenant_id: string, role_id: string, params?: ListParams): Promise<RolePermissionWithDetailsList>;
15096
15165
  }
15097
15166
  export interface UserPermissionsAdapter {
15098
- assign(tenant_id: string, user_id: string, permissions: UserPermissionInsert[]): Promise<boolean>;
15099
- remove(tenant_id: string, user_id: string, permissions: Pick<UserPermissionInsert, "resource_server_identifier" | "permission_name">[]): Promise<boolean>;
15100
- list(tenant_id: string, user_id: string, params?: ListParams): Promise<UserPermissionWithDetailsList>;
15167
+ create(tenant_id: string, user_id: string, permission: UserPermissionInsert, organization_id?: string): Promise<boolean>;
15168
+ remove(tenant_id: string, user_id: string, permission: Pick<UserPermissionInsert, "resource_server_identifier" | "permission_name">, organization_id?: string): Promise<boolean>;
15169
+ list(tenant_id: string, user_id: string, params?: ListParams, organization_id?: string): Promise<UserPermissionWithDetailsList>;
15101
15170
  }
15102
15171
  export interface ListRolesResponse extends Totals {
15103
15172
  roles: Role[];
@@ -15116,9 +15185,9 @@ export interface ListUserRolesResponse {
15116
15185
  length: number;
15117
15186
  }
15118
15187
  export interface UserRolesAdapter {
15119
- list(tenantId: string, userId: string, params?: ListParams): Promise<Role[]>;
15120
- assign(tenantId: string, userId: string, roles: string[]): Promise<boolean>;
15121
- remove(tenantId: string, userId: string, roles: string[]): Promise<boolean>;
15188
+ list(tenantId: string, userId: string, params?: ListParams, organizationId?: string): Promise<Role[]>;
15189
+ create(tenantId: string, userId: string, roleId: string, organizationId?: string): Promise<boolean>;
15190
+ remove(tenantId: string, userId: string, roleId: string, organizationId?: string): Promise<boolean>;
15122
15191
  }
15123
15192
  export interface ListOrganizationsResponse extends Totals {
15124
15193
  organizations: Organization[];
@@ -15144,6 +15213,13 @@ export interface UserOrganizationsAdapter {
15144
15213
  list(tenantId: string, params?: ListParams): Promise<{
15145
15214
  userOrganizations: UserOrganization[];
15146
15215
  } & Totals>;
15216
+ /**
15217
+ * List organizations for a specific user (Auth0 compatible API)
15218
+ * Returns full organization objects instead of user-organization relationships
15219
+ */
15220
+ listUserOrganizations(tenantId: string, userId: string, params?: ListParams): Promise<{
15221
+ organizations: Organization[];
15222
+ } & Totals>;
15147
15223
  update(tenantId: string, id: string, params: Partial<UserOrganizationInsert>): Promise<boolean>;
15148
15224
  }
15149
15225
  export interface DataAdapters {
@@ -1,5 +1,5 @@
1
1
  import { z as e } from "@hono/zod-openapi";
2
- const ve = e.object({
2
+ const Me = e.object({
3
3
  start: e.number(),
4
4
  limit: e.number(),
5
5
  length: e.number()
@@ -56,7 +56,7 @@ const ve = e.object({
56
56
  email: e.string().optional(),
57
57
  login_count: e.number().default(0),
58
58
  identities: e.array(b).optional()
59
- }), He = f, Me = l.extend({
59
+ }), Ge = f, xe = l.extend({
60
60
  login_count: e.number(),
61
61
  multifactor: e.array(e.string()).optional(),
62
62
  last_ip: e.string().optional(),
@@ -296,12 +296,12 @@ const k = e.object({
296
296
  sdkSrc: e.string().optional(),
297
297
  sdk_src: e.string().optional()
298
298
  }).passthrough()
299
- }).passthrough(), Ge = G.omit({
299
+ }).passthrough(), Ke = G.omit({
300
300
  id: !0,
301
301
  created_at: !0,
302
302
  updated_at: !0
303
303
  });
304
- var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), E = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(E || {});
304
+ var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
305
305
  const x = e.object({
306
306
  client_id: e.string(),
307
307
  act_as: e.string().optional(),
@@ -314,13 +314,13 @@ const x = e.object({
314
314
  nonce: e.string().optional(),
315
315
  scope: e.string().optional(),
316
316
  prompt: e.string().optional(),
317
- code_challenge_method: e.nativeEnum(E).optional(),
317
+ code_challenge_method: e.nativeEnum(u).optional(),
318
318
  code_challenge: e.string().optional(),
319
319
  username: e.string().optional(),
320
320
  ui_locales: e.string().optional(),
321
321
  // The following fields are not available in Auth0
322
322
  vendor_id: e.string().optional()
323
- }), xe = e.object({
323
+ }), Be = e.object({
324
324
  colors: e.object({
325
325
  primary: e.string(),
326
326
  page_background: e.object({
@@ -427,7 +427,7 @@ const z = e.enum([
427
427
  expires_at: e.string(),
428
428
  used_at: e.string().optional(),
429
429
  user_id: e.string().optional()
430
- }), Ke = e.object({
430
+ }), Xe = e.object({
431
431
  ...Y.shape,
432
432
  created_at: e.string()
433
433
  }), q = e.object({
@@ -458,9 +458,9 @@ const z = e.enum([
458
458
  methods: e.array(Q)
459
459
  }).optional(),
460
460
  tls_policy: e.string().optional()
461
- }), Be = Z.extend({
461
+ }), We = Z.extend({
462
462
  tenant_id: e.string()
463
- }), Xe = e.object({
463
+ }), Ve = e.object({
464
464
  id: e.string(),
465
465
  type: e.literal("submit"),
466
466
  label: e.string(),
@@ -586,11 +586,11 @@ const z = e.enum([
586
586
  style: e.object({ css: e.string().optional() }).optional()
587
587
  }).openapi({
588
588
  description: "Schema for flow-based forms (matches new JSON structure)"
589
- }), We = e.object({
589
+ }), ze = e.object({
590
590
  ...o.shape,
591
591
  ...$.shape,
592
592
  id: e.string()
593
- }), u = e.enum([
593
+ }), E = e.enum([
594
594
  "pre-user-signup",
595
595
  "post-user-registration",
596
596
  "post-user-login"
@@ -606,18 +606,18 @@ const z = e.enum([
606
606
  hook_id: e.string().optional()
607
607
  }, ee = e.object({
608
608
  ..._,
609
- trigger_id: u,
609
+ trigger_id: E,
610
610
  url: e.string()
611
611
  }), te = e.object({
612
612
  ..._,
613
613
  trigger_id: m,
614
614
  form_id: e.string()
615
- }), Ve = e.union([
615
+ }), Ye = e.union([
616
616
  ee,
617
617
  te
618
618
  ]), ne = e.object({
619
619
  ..._,
620
- trigger_id: u,
620
+ trigger_id: E,
621
621
  ...o.shape,
622
622
  hook_id: e.string(),
623
623
  url: e.string()
@@ -627,7 +627,7 @@ const z = e.enum([
627
627
  ...o.shape,
628
628
  hook_id: e.string(),
629
629
  form_id: e.string()
630
- }), ze = e.union([ne, oe]), ie = e.object({
630
+ }), qe = e.union([ne, oe]), ie = e.object({
631
631
  alg: e.enum([
632
632
  "RS256",
633
633
  "RS384",
@@ -646,9 +646,9 @@ const z = e.enum([
646
646
  x5t: e.string().optional(),
647
647
  x5c: e.array(e.string()).optional(),
648
648
  use: e.enum(["sig", "enc"]).optional()
649
- }), Ye = e.object({
649
+ }), Qe = e.object({
650
650
  keys: e.array(ie)
651
- }), qe = e.object({
651
+ }), Ze = e.object({
652
652
  issuer: e.string(),
653
653
  authorization_endpoint: e.string(),
654
654
  token_endpoint: e.string(),
@@ -682,7 +682,7 @@ const z = e.enum([
682
682
  login_completed: e.boolean().optional().default(!1)
683
683
  }).openapi({
684
684
  description: "This represents a login sesion"
685
- }), Qe = e.object({
685
+ }), Je = e.object({
686
686
  ...ae.shape,
687
687
  id: e.string().openapi({
688
688
  description: "This is is used as the state in the universal login"
@@ -865,7 +865,7 @@ const z = e.enum([
865
865
  env: e.object({
866
866
  node: e.string().optional()
867
867
  }).optional()
868
- }), Ze = e.object({
868
+ }), $e = e.object({
869
869
  type: re,
870
870
  date: e.string(),
871
871
  description: e.string().optional(),
@@ -892,7 +892,7 @@ const z = e.enum([
892
892
  user_id: e.string(),
893
893
  password: e.string(),
894
894
  algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id")
895
- }), Je = e.object({
895
+ }), et = e.object({
896
896
  ...le.shape,
897
897
  created_at: e.string(),
898
898
  updated_at: e.string()
@@ -915,13 +915,13 @@ const z = e.enum([
915
915
  "Metadata related to the device used in the session"
916
916
  ),
917
917
  clients: e.array(e.string()).describe("List of client details for the session")
918
- }), $e = e.object({
918
+ }), tt = e.object({
919
919
  created_at: e.string(),
920
920
  updated_at: e.string(),
921
921
  authenticated_at: e.string(),
922
922
  last_interaction_at: e.string(),
923
923
  ...ce.shape
924
- }), et = e.object({
924
+ }), nt = e.object({
925
925
  kid: e.string().openapi({ description: "The key id of the signing key" }),
926
926
  cert: e.string().openapi({ description: "The public certificate of the signing key" }),
927
927
  fingerprint: e.string().openapi({ description: "The cert fingerprint" }),
@@ -948,7 +948,7 @@ const z = e.enum([
948
948
  })
949
949
  });
950
950
  var pe = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(pe || {});
951
- const tt = e.object({
951
+ const ot = e.object({
952
952
  access_token: e.string(),
953
953
  id_token: e.string().optional(),
954
954
  scope: e.string().optional(),
@@ -994,7 +994,7 @@ const de = e.object({
994
994
  }), n = e.object({
995
995
  bold: e.boolean(),
996
996
  size: e.number()
997
- }), Ee = e.object({
997
+ }), ue = e.object({
998
998
  body_text: n,
999
999
  buttons_text: n,
1000
1000
  font_url: e.string(),
@@ -1004,7 +1004,7 @@ const de = e.object({
1004
1004
  reference_text_size: e.number(),
1005
1005
  subtitle: n,
1006
1006
  title: n
1007
- }), ue = e.object({
1007
+ }), Ee = e.object({
1008
1008
  background_color: e.string(),
1009
1009
  background_image_url: e.string(),
1010
1010
  page_layout: e.enum(["center", "left", "right"])
@@ -1018,17 +1018,17 @@ const de = e.object({
1018
1018
  borders: de,
1019
1019
  colors: ge,
1020
1020
  displayName: e.string(),
1021
- fonts: Ee,
1022
- page_background: ue,
1021
+ fonts: ue,
1022
+ page_background: Ee,
1023
1023
  widget: me
1024
- }), nt = Se.extend({
1024
+ }), it = Se.extend({
1025
1025
  themeId: e.string()
1026
- }), ot = e.object({
1026
+ }), at = e.object({
1027
1027
  universal_login_experience: e.enum(["new", "classic"]).default("new"),
1028
1028
  identifier_first: e.boolean().default(!0),
1029
1029
  password_first: e.boolean().default(!1),
1030
1030
  webauthn_platform_first_factor: e.boolean()
1031
- }), it = e.object({
1031
+ }), st = e.object({
1032
1032
  name: e.string(),
1033
1033
  enabled: e.boolean().optional().default(!0),
1034
1034
  default_from_address: e.string().optional(),
@@ -1079,15 +1079,15 @@ const de = e.object({
1079
1079
  })
1080
1080
  ),
1081
1081
  rotating: e.boolean()
1082
- }), at = e.object({
1082
+ }), rt = e.object({
1083
1083
  // When the refresh token record was created.
1084
1084
  created_at: e.string(),
1085
1085
  // Spread in the rest of the refresh token properties.
1086
1086
  ...he.shape
1087
- }), st = e.object({
1087
+ }), _t = e.object({
1088
1088
  to: e.string(),
1089
1089
  message: e.string()
1090
- }), rt = e.object({
1090
+ }), lt = e.object({
1091
1091
  name: e.string(),
1092
1092
  options: e.object({})
1093
1093
  }), be = e.object({
@@ -1120,7 +1120,7 @@ const de = e.object({
1120
1120
  ...fe.shape,
1121
1121
  created_at: e.string().optional(),
1122
1122
  updated_at: e.string().optional()
1123
- }), _t = e.array(Ce), Ie = e.object({
1123
+ }), ct = e.array(Ce), Ie = e.object({
1124
1124
  role_id: e.string(),
1125
1125
  resource_server_identifier: e.string(),
1126
1126
  permission_name: e.string()
@@ -1128,47 +1128,57 @@ const de = e.object({
1128
1128
  ...Ie.shape,
1129
1129
  tenant_id: e.string(),
1130
1130
  created_at: e.string().optional()
1131
- }), lt = e.array(Oe), Te = e.object({
1131
+ }), pt = e.array(Oe), Te = e.object({
1132
1132
  role_id: e.string(),
1133
1133
  resource_server_identifier: e.string(),
1134
1134
  resource_server_name: e.string(),
1135
1135
  permission_name: e.string(),
1136
1136
  description: e.string().nullable().optional(),
1137
1137
  created_at: e.string().optional()
1138
- }), ct = e.array(
1138
+ }), dt = e.array(
1139
1139
  Te
1140
1140
  ), Ne = e.object({
1141
1141
  user_id: e.string(),
1142
1142
  resource_server_identifier: e.string(),
1143
- permission_name: e.string()
1143
+ permission_name: e.string(),
1144
+ organization_id: e.string().optional()
1144
1145
  }), Re = e.object({
1145
1146
  ...Ne.shape,
1146
1147
  tenant_id: e.string(),
1147
1148
  created_at: e.string().optional()
1148
- }), pt = e.array(Re), Le = e.object({
1149
+ }), gt = e.array(Re), Le = e.object({
1149
1150
  user_id: e.string(),
1150
1151
  resource_server_identifier: e.string(),
1151
1152
  resource_server_name: e.string(),
1152
1153
  permission_name: e.string(),
1153
1154
  description: e.string().nullable().optional(),
1154
- created_at: e.string().optional()
1155
- }), dt = e.array(
1155
+ created_at: e.string().optional(),
1156
+ organization_id: e.string().optional()
1157
+ }), ut = e.array(
1156
1158
  Le
1157
1159
  ), De = e.object({
1160
+ user_id: e.string(),
1161
+ role_id: e.string(),
1162
+ organization_id: e.string().optional()
1163
+ }), ye = e.object({
1164
+ ...De.shape,
1165
+ tenant_id: e.string(),
1166
+ created_at: e.string().optional()
1167
+ }), Et = e.array(ye), Ue = e.object({
1158
1168
  name: e.string().min(1).max(50).openapi({
1159
1169
  description: "The name of the role. Cannot include '<' or '>'"
1160
1170
  }),
1161
1171
  description: e.string().max(255).optional().openapi({
1162
1172
  description: "The description of the role"
1163
1173
  })
1164
- }), ye = e.object({
1174
+ }), Fe = e.object({
1165
1175
  id: e.string().openapi({
1166
1176
  description: "The unique identifier of the role"
1167
1177
  }),
1168
- ...De.shape,
1178
+ ...Ue.shape,
1169
1179
  created_at: e.string().optional(),
1170
1180
  updated_at: e.string().optional()
1171
- }), gt = e.array(ye), Ue = e.object({
1181
+ }), mt = e.array(Fe), je = e.object({
1172
1182
  logo_url: e.string().optional().openapi({
1173
1183
  description: "URL of the organization's logo"
1174
1184
  }),
@@ -1180,7 +1190,7 @@ const de = e.object({
1180
1190
  description: "Page background color in hex format (e.g., #FFFFFF)"
1181
1191
  })
1182
1192
  }).optional()
1183
- }).optional(), Fe = e.object({
1193
+ }).optional(), ke = e.object({
1184
1194
  connection_id: e.string().openapi({
1185
1195
  description: "ID of the connection"
1186
1196
  }),
@@ -1193,7 +1203,7 @@ const de = e.object({
1193
1203
  is_signup_enabled: e.boolean().default(!0).openapi({
1194
1204
  description: "Whether signup is enabled for this connection"
1195
1205
  })
1196
- }), je = e.object({
1206
+ }), we = e.object({
1197
1207
  client_credentials: e.object({
1198
1208
  enforce: e.boolean().default(!1).openapi({
1199
1209
  description: "Whether to enforce token quota limits"
@@ -1205,7 +1215,7 @@ const de = e.object({
1205
1215
  description: "Maximum tokens per hour (0 = unlimited)"
1206
1216
  })
1207
1217
  }).optional()
1208
- }).optional(), ke = e.object({
1218
+ }).optional(), Pe = e.object({
1209
1219
  id: e.string().optional(),
1210
1220
  name: e.string().min(1).openapi({
1211
1221
  description: "The name of the organization"
@@ -1213,31 +1223,31 @@ const de = e.object({
1213
1223
  display_name: e.string().optional().openapi({
1214
1224
  description: "The display name of the organization"
1215
1225
  }),
1216
- branding: Ue,
1226
+ branding: je,
1217
1227
  metadata: e.record(e.any()).default({}).optional().openapi({
1218
1228
  description: "Custom metadata for the organization"
1219
1229
  }),
1220
- enabled_connections: e.array(Fe).default([]).optional().openapi({
1230
+ enabled_connections: e.array(ke).default([]).optional().openapi({
1221
1231
  description: "List of enabled connections for the organization"
1222
1232
  }),
1223
- token_quota: je
1224
- }), Et = e.object({
1225
- ...ke.shape,
1233
+ token_quota: we
1234
+ }), St = e.object({
1235
+ ...Pe.shape,
1226
1236
  ...o.shape,
1227
1237
  id: e.string()
1228
- }), we = e.object({
1238
+ }), ve = e.object({
1229
1239
  user_id: e.string().openapi({
1230
1240
  description: "ID of the user"
1231
1241
  }),
1232
1242
  organization_id: e.string().openapi({
1233
1243
  description: "ID of the organization"
1234
1244
  })
1235
- }), ut = e.object({
1236
- ...we.shape,
1245
+ }), ht = e.object({
1246
+ ...ve.shape,
1237
1247
  ...o.shape,
1238
1248
  id: e.string()
1239
1249
  });
1240
- function mt(t) {
1250
+ function bt(t) {
1241
1251
  const [i, s] = t.split("|");
1242
1252
  if (!i || !s)
1243
1253
  throw new Error(`Invalid user_id: ${t}`);
@@ -1247,7 +1257,7 @@ export {
1247
1257
  _e as Auth0Client,
1248
1258
  g as AuthorizationResponseMode,
1249
1259
  d as AuthorizationResponseType,
1250
- E as CodeChallengeMethod,
1260
+ u as CodeChallengeMethod,
1251
1261
  p as ComponentCategory,
1252
1262
  c as ComponentType,
1253
1263
  pe as GrantType,
@@ -1255,16 +1265,16 @@ export {
1255
1265
  j as NodeType,
1256
1266
  T as applicationInsertSchema,
1257
1267
  N as applicationSchema,
1258
- Ge as auth0FlowInsertSchema,
1268
+ Ke as auth0FlowInsertSchema,
1259
1269
  G as auth0FlowSchema,
1260
- He as auth0UserResponseSchema,
1270
+ Ge as auth0UserResponseSchema,
1261
1271
  x as authParamsSchema,
1262
1272
  l as baseUserSchema,
1263
1273
  de as bordersSchema,
1264
- xe as brandingSchema,
1274
+ Be as brandingSchema,
1265
1275
  L as buttonComponentSchema,
1266
1276
  Y as codeInsertSchema,
1267
- Ke as codeSchema,
1277
+ Xe as codeSchema,
1268
1278
  z as codeTypeSchema,
1269
1279
  ge as colorsSchema,
1270
1280
  F as componentSchema,
@@ -1274,80 +1284,83 @@ export {
1274
1284
  a as coordinatesSchema,
1275
1285
  q as customDomainInsertSchema,
1276
1286
  Z as customDomainSchema,
1277
- Be as customDomainWithTenantIdSchema,
1278
- it as emailProviderSchema,
1287
+ We as customDomainWithTenantIdSchema,
1288
+ st as emailProviderSchema,
1279
1289
  M as endingSchema,
1280
1290
  y as fieldComponentSchema,
1281
1291
  w as flowNodeSchema,
1282
1292
  n as fontDetailsSchema,
1283
- Ee as fontsSchema,
1284
- Xe as formControlSchema,
1293
+ ue as fontsSchema,
1294
+ Ve as formControlSchema,
1285
1295
  $ as formInsertSchema,
1286
1296
  J as formNodeComponentDefinition,
1287
- We as formSchema,
1297
+ ze as formSchema,
1288
1298
  U as genericComponentSchema,
1289
1299
  P as genericNodeSchema,
1290
- Ve as hookInsertSchema,
1291
- ze as hookSchema,
1300
+ Ye as hookInsertSchema,
1301
+ qe as hookSchema,
1292
1302
  b as identitySchema,
1293
- Ye as jwksKeySchema,
1303
+ Qe as jwksKeySchema,
1294
1304
  ie as jwksSchema,
1295
1305
  D as legalComponentSchema,
1296
- Ze as logSchema,
1306
+ $e as logSchema,
1297
1307
  ae as loginSessionInsertSchema,
1298
- Qe as loginSessionSchema,
1308
+ Je as loginSessionSchema,
1299
1309
  v as nodeSchema,
1300
- qe as openIDConfigurationSchema,
1301
- Ue as organizationBrandingSchema,
1302
- Fe as organizationEnabledConnectionSchema,
1303
- ke as organizationInsertSchema,
1304
- Et as organizationSchema,
1305
- je as organizationTokenQuotaSchema,
1306
- ue as pageBackgroundSchema,
1307
- mt as parseUserId,
1310
+ Ze as openIDConfigurationSchema,
1311
+ je as organizationBrandingSchema,
1312
+ ke as organizationEnabledConnectionSchema,
1313
+ Pe as organizationInsertSchema,
1314
+ St as organizationSchema,
1315
+ we as organizationTokenQuotaSchema,
1316
+ Ee as pageBackgroundSchema,
1317
+ bt as parseUserId,
1308
1318
  le as passwordInsertSchema,
1309
- Je as passwordSchema,
1319
+ et as passwordSchema,
1310
1320
  h as profileDataSchema,
1311
- ot as promptSettingSchema,
1321
+ at as promptSettingSchema,
1312
1322
  he as refreshTokenInsertSchema,
1313
- at as refreshTokenSchema,
1323
+ rt as refreshTokenSchema,
1314
1324
  fe as resourceServerInsertSchema,
1315
- _t as resourceServerListSchema,
1325
+ ct as resourceServerListSchema,
1316
1326
  Ae as resourceServerOptionsSchema,
1317
1327
  Ce as resourceServerSchema,
1318
1328
  be as resourceServerScopeSchema,
1319
1329
  R as richTextComponentSchema,
1320
- De as roleInsertSchema,
1321
- gt as roleListSchema,
1330
+ Ue as roleInsertSchema,
1331
+ mt as roleListSchema,
1322
1332
  Ie as rolePermissionInsertSchema,
1323
- lt as rolePermissionListSchema,
1333
+ pt as rolePermissionListSchema,
1324
1334
  Oe as rolePermissionSchema,
1325
- ct as rolePermissionWithDetailsListSchema,
1335
+ dt as rolePermissionWithDetailsListSchema,
1326
1336
  Te as rolePermissionWithDetailsSchema,
1327
- ye as roleSchema,
1337
+ Fe as roleSchema,
1328
1338
  O as samlpAddon,
1329
1339
  ce as sessionInsertSchema,
1330
- $e as sessionSchema,
1331
- et as signingKeySchema,
1332
- rt as smsProviderSchema,
1333
- st as smsSendParamsSchema,
1340
+ tt as sessionSchema,
1341
+ nt as signingKeySchema,
1342
+ lt as smsProviderSchema,
1343
+ _t as smsSendParamsSchema,
1334
1344
  H as startSchema,
1335
1345
  k as stepNodeSchema,
1336
1346
  W as tenantInsertSchema,
1337
1347
  V as tenantSchema,
1338
1348
  Se as themeInsertSchema,
1339
- nt as themeSchema,
1340
- tt as tokenResponseSchema,
1341
- ve as totalsSchema,
1349
+ it as themeSchema,
1350
+ ot as tokenResponseSchema,
1351
+ Me as totalsSchema,
1342
1352
  A as userInsertSchema,
1343
- we as userOrganizationInsertSchema,
1344
- ut as userOrganizationSchema,
1353
+ ve as userOrganizationInsertSchema,
1354
+ ht as userOrganizationSchema,
1345
1355
  Ne as userPermissionInsertSchema,
1346
- pt as userPermissionListSchema,
1356
+ gt as userPermissionListSchema,
1347
1357
  Re as userPermissionSchema,
1348
- dt as userPermissionWithDetailsListSchema,
1358
+ ut as userPermissionWithDetailsListSchema,
1349
1359
  Le as userPermissionWithDetailsSchema,
1350
- Me as userResponseSchema,
1360
+ xe as userResponseSchema,
1361
+ De as userRoleInsertSchema,
1362
+ Et as userRoleListSchema,
1363
+ ye as userRoleSchema,
1351
1364
  f as userSchema,
1352
1365
  Q as verificationMethodsSchema,
1353
1366
  me as widgetSchema
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.86.0",
14
+ "version": "0.87.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],