@authhero/adapter-interfaces 0.88.0 → 0.89.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +428 -37
- package/dist/adapter-interfaces.mjs +398 -225
- package/package.json +1 -1
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
import { z as e } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const xe = e.object({
|
|
3
3
|
start: e.number(),
|
|
4
4
|
limit: e.number(),
|
|
5
5
|
length: e.number()
|
|
6
|
-
}),
|
|
6
|
+
}), i = e.object({
|
|
7
7
|
created_at: e.string(),
|
|
8
8
|
updated_at: e.string()
|
|
9
|
-
}),
|
|
9
|
+
}), f = e.object({
|
|
10
10
|
email: e.string().optional(),
|
|
11
11
|
email_verified: e.boolean().optional(),
|
|
12
12
|
name: e.string().optional(),
|
|
@@ -23,8 +23,8 @@ const Me = e.object({
|
|
|
23
23
|
access_token: e.string().optional(),
|
|
24
24
|
access_token_secret: e.string().optional(),
|
|
25
25
|
refresh_token: e.string().optional(),
|
|
26
|
-
profileData:
|
|
27
|
-
}),
|
|
26
|
+
profileData: f.optional()
|
|
27
|
+
}), c = e.object({
|
|
28
28
|
email: e.string().optional().transform((t) => t && t.toLowerCase()),
|
|
29
29
|
username: e.string().optional(),
|
|
30
30
|
phone_number: e.string().optional(),
|
|
@@ -39,7 +39,7 @@ const Me = e.object({
|
|
|
39
39
|
user_id: e.string().optional(),
|
|
40
40
|
app_metadata: e.any().default({}).optional(),
|
|
41
41
|
user_metadata: e.any().default({}).optional()
|
|
42
|
-
}), A =
|
|
42
|
+
}), A = c.extend({
|
|
43
43
|
email_verified: e.boolean().default(!1),
|
|
44
44
|
verify_email: e.boolean().optional(),
|
|
45
45
|
last_ip: e.string().optional(),
|
|
@@ -48,26 +48,26 @@ const Me = e.object({
|
|
|
48
48
|
provider: e.string().default("email"),
|
|
49
49
|
connection: e.string().default("email"),
|
|
50
50
|
is_social: e.boolean().optional()
|
|
51
|
-
}),
|
|
51
|
+
}), C = e.object({
|
|
52
52
|
...A.shape,
|
|
53
|
-
...
|
|
53
|
+
...i.shape,
|
|
54
54
|
user_id: e.string(),
|
|
55
55
|
is_social: e.boolean(),
|
|
56
56
|
email: e.string().optional(),
|
|
57
57
|
login_count: e.number().default(0),
|
|
58
58
|
identities: e.array(b).optional()
|
|
59
|
-
}), Ge =
|
|
59
|
+
}), Ge = C, Ke = c.extend({
|
|
60
60
|
login_count: e.number(),
|
|
61
61
|
multifactor: e.array(e.string()).optional(),
|
|
62
62
|
last_ip: e.string().optional(),
|
|
63
63
|
last_login: e.string().optional(),
|
|
64
64
|
user_id: e.string()
|
|
65
|
-
}).catchall(e.any()),
|
|
66
|
-
let
|
|
67
|
-
let
|
|
65
|
+
}).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
66
|
+
let _ = (t = 21) => {
|
|
67
|
+
let n = "", s = crypto.getRandomValues(new Uint8Array(t));
|
|
68
68
|
for (; t--; )
|
|
69
|
-
|
|
70
|
-
return
|
|
69
|
+
n += I[s[t] & 63];
|
|
70
|
+
return n;
|
|
71
71
|
};
|
|
72
72
|
const O = e.object({
|
|
73
73
|
audience: e.string().optional(),
|
|
@@ -112,7 +112,7 @@ const O = e.object({
|
|
|
112
112
|
email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
|
|
113
113
|
description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
|
|
114
114
|
}),
|
|
115
|
-
client_secret: e.string().default(() =>
|
|
115
|
+
client_secret: e.string().default(() => _()).optional(),
|
|
116
116
|
disable_sign_ups: e.boolean().optional().default(!1).openapi({
|
|
117
117
|
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
118
118
|
}),
|
|
@@ -121,15 +121,186 @@ const O = e.object({
|
|
|
121
121
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
122
122
|
updated_at: e.string().transform((t) => t === null ? "" : t),
|
|
123
123
|
...T.shape
|
|
124
|
+
}), y = e.object({
|
|
125
|
+
client_id: e.string().openapi({
|
|
126
|
+
description: "ID of this client."
|
|
127
|
+
}),
|
|
128
|
+
name: e.string().min(1).openapi({
|
|
129
|
+
description: "Name of this client (min length: 1 character, does not allow < or >)."
|
|
130
|
+
}),
|
|
131
|
+
description: e.string().max(140).optional().openapi({
|
|
132
|
+
description: "Free text description of this client (max length: 140 characters)."
|
|
133
|
+
}),
|
|
134
|
+
global: e.boolean().default(!1).openapi({
|
|
135
|
+
description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
|
|
136
|
+
}),
|
|
137
|
+
client_secret: e.string().default(() => _()).optional().openapi({
|
|
138
|
+
description: "Client secret (which you must not make public)."
|
|
139
|
+
}),
|
|
140
|
+
app_type: e.enum([
|
|
141
|
+
"native",
|
|
142
|
+
"spa",
|
|
143
|
+
"regular_web",
|
|
144
|
+
"non_interactive",
|
|
145
|
+
"resource_server",
|
|
146
|
+
"express_configuration",
|
|
147
|
+
"rms",
|
|
148
|
+
"box",
|
|
149
|
+
"cloudbees",
|
|
150
|
+
"concur",
|
|
151
|
+
"dropbox",
|
|
152
|
+
"mscrm",
|
|
153
|
+
"echosign",
|
|
154
|
+
"egnyte",
|
|
155
|
+
"newrelic",
|
|
156
|
+
"office365",
|
|
157
|
+
"salesforce",
|
|
158
|
+
"sentry",
|
|
159
|
+
"sharepoint",
|
|
160
|
+
"slack",
|
|
161
|
+
"springcm",
|
|
162
|
+
"zendesk",
|
|
163
|
+
"zoom",
|
|
164
|
+
"sso_integration",
|
|
165
|
+
"oag"
|
|
166
|
+
]).default("regular_web").optional().openapi({
|
|
167
|
+
description: "The type of application this client represents"
|
|
168
|
+
}),
|
|
169
|
+
logo_uri: e.string().url().optional().openapi({
|
|
170
|
+
description: "URL of the logo to display for this client. Recommended size is 150x150 pixels."
|
|
171
|
+
}),
|
|
172
|
+
is_first_party: e.boolean().default(!1).openapi({
|
|
173
|
+
description: "Whether this client a first party client (true) or not (false)."
|
|
174
|
+
}),
|
|
175
|
+
oidc_conformant: e.boolean().default(!0).openapi({
|
|
176
|
+
description: "Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."
|
|
177
|
+
}),
|
|
178
|
+
callbacks: e.array(e.string()).default([]).optional().openapi({
|
|
179
|
+
description: "Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."
|
|
180
|
+
}),
|
|
181
|
+
allowed_origins: e.array(e.string()).default([]).optional().openapi({
|
|
182
|
+
description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."
|
|
183
|
+
}),
|
|
184
|
+
web_origins: e.array(e.string()).default([]).optional().openapi({
|
|
185
|
+
description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
|
|
186
|
+
}),
|
|
187
|
+
client_aliases: e.array(e.string()).default([]).optional().openapi({
|
|
188
|
+
description: "List of audiences/realms for SAML protocol. Used by the wsfed addon."
|
|
189
|
+
}),
|
|
190
|
+
allowed_clients: e.array(e.string()).default([]).optional().openapi({
|
|
191
|
+
description: "List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."
|
|
192
|
+
}),
|
|
193
|
+
allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
|
|
194
|
+
description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
|
|
195
|
+
}),
|
|
196
|
+
session_transfer: e.record(e.any()).default({}).optional().openapi({
|
|
197
|
+
description: "Native to Web SSO Configuration"
|
|
198
|
+
}),
|
|
199
|
+
oidc_logout: e.record(e.any()).default({}).optional().openapi({
|
|
200
|
+
description: "Configuration for OIDC backchannel logout"
|
|
201
|
+
}),
|
|
202
|
+
grant_types: e.array(e.string()).default([]).optional().openapi({
|
|
203
|
+
description: "List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."
|
|
204
|
+
}),
|
|
205
|
+
jwt_configuration: e.record(e.any()).default({}).optional().openapi({
|
|
206
|
+
description: "Configuration related to JWTs for the client."
|
|
207
|
+
}),
|
|
208
|
+
signing_keys: e.array(e.record(e.any())).default([]).optional().openapi({
|
|
209
|
+
description: "Signing certificates associated with this client."
|
|
210
|
+
}),
|
|
211
|
+
encryption_key: e.record(e.any()).default({}).optional().openapi({
|
|
212
|
+
description: "Encryption used for WsFed responses with this client."
|
|
213
|
+
}),
|
|
214
|
+
sso: e.boolean().default(!1).openapi({
|
|
215
|
+
description: "Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."
|
|
216
|
+
}),
|
|
217
|
+
sso_disabled: e.boolean().default(!0).openapi({
|
|
218
|
+
description: "Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."
|
|
219
|
+
}),
|
|
220
|
+
cross_origin_authentication: e.boolean().default(!1).openapi({
|
|
221
|
+
description: "Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."
|
|
222
|
+
}),
|
|
223
|
+
cross_origin_loc: e.string().url().optional().openapi({
|
|
224
|
+
description: "URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."
|
|
225
|
+
}),
|
|
226
|
+
custom_login_page_on: e.boolean().default(!1).openapi({
|
|
227
|
+
description: "Whether a custom login page is to be used (true) or the default provided login page (false)."
|
|
228
|
+
}),
|
|
229
|
+
custom_login_page: e.string().optional().openapi({
|
|
230
|
+
description: "The content (HTML, CSS, JS) of the custom login page."
|
|
231
|
+
}),
|
|
232
|
+
custom_login_page_preview: e.string().optional().openapi({
|
|
233
|
+
description: "The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"
|
|
234
|
+
}),
|
|
235
|
+
form_template: e.string().optional().openapi({
|
|
236
|
+
description: "HTML form template to be used for WS-Federation."
|
|
237
|
+
}),
|
|
238
|
+
addons: e.record(e.any()).default({}).optional().openapi({
|
|
239
|
+
description: "Addons enabled for this client and their associated configurations."
|
|
240
|
+
}),
|
|
241
|
+
token_endpoint_auth_method: e.enum(["none", "client_secret_post", "client_secret_basic"]).default("client_secret_basic").optional().openapi({
|
|
242
|
+
description: "Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."
|
|
243
|
+
}),
|
|
244
|
+
client_metadata: e.record(e.string().max(255)).default({}).optional().openapi({
|
|
245
|
+
description: 'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'
|
|
246
|
+
}),
|
|
247
|
+
mobile: e.record(e.any()).default({}).optional().openapi({
|
|
248
|
+
description: "Additional configuration for native mobile apps."
|
|
249
|
+
}),
|
|
250
|
+
initiate_login_uri: e.string().url().optional().openapi({
|
|
251
|
+
description: "Initiate login uri, must be https"
|
|
252
|
+
}),
|
|
253
|
+
native_social_login: e.record(e.any()).default({}).optional(),
|
|
254
|
+
refresh_token: e.record(e.any()).default({}).optional().openapi({
|
|
255
|
+
description: "Refresh token configuration"
|
|
256
|
+
}),
|
|
257
|
+
default_organization: e.record(e.any()).default({}).optional().openapi({
|
|
258
|
+
description: "Defines the default Organization ID and flows"
|
|
259
|
+
}),
|
|
260
|
+
organization_usage: e.enum(["deny", "allow", "require"]).default("deny").optional().openapi({
|
|
261
|
+
description: "Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."
|
|
262
|
+
}),
|
|
263
|
+
organization_require_behavior: e.enum(["no_prompt", "pre_login_prompt", "post_login_prompt"]).default("no_prompt").optional().openapi({
|
|
264
|
+
description: "Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."
|
|
265
|
+
}),
|
|
266
|
+
client_authentication_methods: e.record(e.any()).default({}).optional().openapi({
|
|
267
|
+
description: "Defines client authentication methods."
|
|
268
|
+
}),
|
|
269
|
+
require_pushed_authorization_requests: e.boolean().default(!1).openapi({
|
|
270
|
+
description: "Makes the use of Pushed Authorization Requests mandatory for this client"
|
|
271
|
+
}),
|
|
272
|
+
require_proof_of_possession: e.boolean().default(!1).openapi({
|
|
273
|
+
description: "Makes the use of Proof-of-Possession mandatory for this client"
|
|
274
|
+
}),
|
|
275
|
+
signed_request_object: e.record(e.any()).default({}).optional().openapi({
|
|
276
|
+
description: "JWT-secured Authorization Requests (JAR) settings."
|
|
277
|
+
}),
|
|
278
|
+
compliance_level: e.enum([
|
|
279
|
+
"none",
|
|
280
|
+
"fapi1_adv_pkj_par",
|
|
281
|
+
"fapi1_adv_mtls_par",
|
|
282
|
+
"fapi2_sp_pkj_mtls",
|
|
283
|
+
"fapi2_sp_mtls_mtls"
|
|
284
|
+
]).optional().openapi({
|
|
285
|
+
description: "Defines the compliance level for this client, which may restrict it's capabilities"
|
|
286
|
+
}),
|
|
287
|
+
par_request_expiry: e.number().optional().openapi({
|
|
288
|
+
description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
|
|
289
|
+
}),
|
|
290
|
+
token_quota: e.record(e.any()).default({}).optional()
|
|
291
|
+
}), Be = e.object({
|
|
292
|
+
created_at: e.string(),
|
|
293
|
+
updated_at: e.string(),
|
|
294
|
+
...y.shape
|
|
124
295
|
}), a = e.object({
|
|
125
296
|
x: e.number(),
|
|
126
297
|
y: e.number()
|
|
127
298
|
});
|
|
128
|
-
var
|
|
299
|
+
var p = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(p || {}), d = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(d || {});
|
|
129
300
|
const r = e.object({
|
|
130
301
|
id: e.string(),
|
|
131
|
-
category: e.nativeEnum(
|
|
132
|
-
type: e.nativeEnum(
|
|
302
|
+
category: e.nativeEnum(d),
|
|
303
|
+
type: e.nativeEnum(p)
|
|
133
304
|
}), R = r.extend({
|
|
134
305
|
category: e.literal(
|
|
135
306
|
"BLOCK"
|
|
@@ -178,7 +349,7 @@ const r = e.object({
|
|
|
178
349
|
config: e.object({
|
|
179
350
|
text: e.string()
|
|
180
351
|
}).passthrough()
|
|
181
|
-
}),
|
|
352
|
+
}), w = r.extend({
|
|
182
353
|
category: e.literal(
|
|
183
354
|
"FIELD"
|
|
184
355
|
/* FIELD */
|
|
@@ -239,7 +410,7 @@ const r = e.object({
|
|
|
239
410
|
R,
|
|
240
411
|
L,
|
|
241
412
|
D,
|
|
242
|
-
|
|
413
|
+
w,
|
|
243
414
|
U
|
|
244
415
|
]);
|
|
245
416
|
var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
|
|
@@ -255,7 +426,7 @@ const k = e.object({
|
|
|
255
426
|
components: e.array(F),
|
|
256
427
|
next_node: e.string()
|
|
257
428
|
}).passthrough()
|
|
258
|
-
}),
|
|
429
|
+
}), v = e.object({
|
|
259
430
|
id: e.string(),
|
|
260
431
|
type: e.literal(
|
|
261
432
|
"FLOW"
|
|
@@ -271,14 +442,14 @@ const k = e.object({
|
|
|
271
442
|
id: e.string(),
|
|
272
443
|
type: e.string(),
|
|
273
444
|
coordinates: a
|
|
274
|
-
}).passthrough(),
|
|
445
|
+
}).passthrough(), H = e.union([
|
|
275
446
|
k,
|
|
276
|
-
|
|
447
|
+
v,
|
|
277
448
|
P
|
|
278
|
-
]),
|
|
449
|
+
]), M = e.object({
|
|
279
450
|
next_node: e.string(),
|
|
280
451
|
coordinates: a
|
|
281
|
-
}).passthrough(),
|
|
452
|
+
}).passthrough(), x = e.object({
|
|
282
453
|
resume_flow: e.boolean().optional(),
|
|
283
454
|
coordinates: a
|
|
284
455
|
}).passthrough(), G = e.object({
|
|
@@ -287,26 +458,26 @@ const k = e.object({
|
|
|
287
458
|
languages: e.object({
|
|
288
459
|
primary: e.string()
|
|
289
460
|
}).passthrough(),
|
|
290
|
-
nodes: e.array(
|
|
291
|
-
start:
|
|
292
|
-
ending:
|
|
461
|
+
nodes: e.array(H),
|
|
462
|
+
start: M,
|
|
463
|
+
ending: x,
|
|
293
464
|
created_at: e.string(),
|
|
294
465
|
updated_at: e.string(),
|
|
295
466
|
links: e.object({
|
|
296
467
|
sdkSrc: e.string().optional(),
|
|
297
468
|
sdk_src: e.string().optional()
|
|
298
469
|
}).passthrough()
|
|
299
|
-
}).passthrough(),
|
|
470
|
+
}).passthrough(), We = G.omit({
|
|
300
471
|
id: !0,
|
|
301
472
|
created_at: !0,
|
|
302
473
|
updated_at: !0
|
|
303
474
|
});
|
|
304
|
-
var
|
|
305
|
-
const
|
|
475
|
+
var g = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(u || {}), m = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(m || {});
|
|
476
|
+
const K = e.object({
|
|
306
477
|
client_id: e.string(),
|
|
307
478
|
act_as: e.string().optional(),
|
|
308
|
-
response_type: e.nativeEnum(
|
|
309
|
-
response_mode: e.nativeEnum(
|
|
479
|
+
response_type: e.nativeEnum(g).optional(),
|
|
480
|
+
response_mode: e.nativeEnum(u).optional(),
|
|
310
481
|
redirect_uri: e.string().optional(),
|
|
311
482
|
audience: e.string().optional(),
|
|
312
483
|
organization: e.string().optional(),
|
|
@@ -314,13 +485,13 @@ const x = e.object({
|
|
|
314
485
|
nonce: e.string().optional(),
|
|
315
486
|
scope: e.string().optional(),
|
|
316
487
|
prompt: e.string().optional(),
|
|
317
|
-
code_challenge_method: e.nativeEnum(
|
|
488
|
+
code_challenge_method: e.nativeEnum(m).optional(),
|
|
318
489
|
code_challenge: e.string().optional(),
|
|
319
490
|
username: e.string().optional(),
|
|
320
491
|
ui_locales: e.string().optional(),
|
|
321
492
|
// The following fields are not available in Auth0
|
|
322
493
|
vendor_id: e.string().optional()
|
|
323
|
-
}),
|
|
494
|
+
}), Xe = e.object({
|
|
324
495
|
colors: e.object({
|
|
325
496
|
primary: e.string(),
|
|
326
497
|
page_background: e.object({
|
|
@@ -335,7 +506,7 @@ const x = e.object({
|
|
|
335
506
|
font: e.object({
|
|
336
507
|
url: e.string()
|
|
337
508
|
}).optional()
|
|
338
|
-
}),
|
|
509
|
+
}), B = e.object({
|
|
339
510
|
kid: e.string().optional(),
|
|
340
511
|
team_id: e.string().optional(),
|
|
341
512
|
realms: e.string().optional(),
|
|
@@ -354,11 +525,11 @@ const x = e.object({
|
|
|
354
525
|
from: e.string().optional(),
|
|
355
526
|
twilio_sid: e.string().optional(),
|
|
356
527
|
twilio_token: e.string().optional()
|
|
357
|
-
}),
|
|
528
|
+
}), W = e.object({
|
|
358
529
|
id: e.string().optional(),
|
|
359
530
|
name: e.string(),
|
|
360
531
|
strategy: e.string(),
|
|
361
|
-
options:
|
|
532
|
+
options: B.default({}),
|
|
362
533
|
enabled_clients: e.array(e.string()).default([]).optional(),
|
|
363
534
|
response_type: e.custom().optional(),
|
|
364
535
|
response_mode: e.custom().optional()
|
|
@@ -366,7 +537,7 @@ const x = e.object({
|
|
|
366
537
|
id: e.string(),
|
|
367
538
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
368
539
|
updated_at: e.string().transform((t) => t === null ? "" : t)
|
|
369
|
-
}).extend(
|
|
540
|
+
}).extend(W.shape), z = e.object({
|
|
370
541
|
name: e.string(),
|
|
371
542
|
audience: e.string(),
|
|
372
543
|
sender_email: e.string().email(),
|
|
@@ -380,7 +551,7 @@ const x = e.object({
|
|
|
380
551
|
}), V = e.object({
|
|
381
552
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
382
553
|
updated_at: e.string().transform((t) => t === null ? "" : t),
|
|
383
|
-
...
|
|
554
|
+
...z.shape,
|
|
384
555
|
id: e.string()
|
|
385
556
|
});
|
|
386
557
|
e.object({
|
|
@@ -388,7 +559,7 @@ e.object({
|
|
|
388
559
|
tenant: V,
|
|
389
560
|
connections: e.array(X)
|
|
390
561
|
});
|
|
391
|
-
const
|
|
562
|
+
const q = e.enum([
|
|
392
563
|
"password_reset",
|
|
393
564
|
"email_verification",
|
|
394
565
|
"otp",
|
|
@@ -405,7 +576,7 @@ const z = e.enum([
|
|
|
405
576
|
connection_id: e.string().optional().openapi({
|
|
406
577
|
description: "The connection that the code is connected to"
|
|
407
578
|
}),
|
|
408
|
-
code_type:
|
|
579
|
+
code_type: q,
|
|
409
580
|
code_verifier: e.string().optional().openapi({
|
|
410
581
|
description: "The code verifier used in PKCE in outbound flows"
|
|
411
582
|
}),
|
|
@@ -427,10 +598,10 @@ const z = e.enum([
|
|
|
427
598
|
expires_at: e.string(),
|
|
428
599
|
used_at: e.string().optional(),
|
|
429
600
|
user_id: e.string().optional()
|
|
430
|
-
}),
|
|
601
|
+
}), ze = e.object({
|
|
431
602
|
...Y.shape,
|
|
432
603
|
created_at: e.string()
|
|
433
|
-
}),
|
|
604
|
+
}), Q = e.object({
|
|
434
605
|
domain: e.string(),
|
|
435
606
|
custom_domain_id: e.string().optional(),
|
|
436
607
|
type: e.enum(["auth0_managed_certs", "self_managed_certs"]),
|
|
@@ -444,23 +615,23 @@ const z = e.enum([
|
|
|
444
615
|
"null"
|
|
445
616
|
]).optional(),
|
|
446
617
|
domain_metadata: e.record(e.string().max(255)).optional()
|
|
447
|
-
}),
|
|
618
|
+
}), J = e.object({
|
|
448
619
|
name: e.literal("txt"),
|
|
449
620
|
record: e.string(),
|
|
450
621
|
domain: e.string()
|
|
451
622
|
}), Z = e.object({
|
|
452
|
-
...
|
|
623
|
+
...Q.shape,
|
|
453
624
|
custom_domain_id: e.string(),
|
|
454
625
|
primary: e.boolean(),
|
|
455
626
|
status: e.enum(["disabled", "pending", "pending_verification", "ready"]),
|
|
456
627
|
origin_domain_name: e.string().optional(),
|
|
457
628
|
verification: e.object({
|
|
458
|
-
methods: e.array(
|
|
629
|
+
methods: e.array(J)
|
|
459
630
|
}).optional(),
|
|
460
631
|
tls_policy: e.string().optional()
|
|
461
|
-
}),
|
|
632
|
+
}), Ve = Z.extend({
|
|
462
633
|
tenant_id: e.string()
|
|
463
|
-
}),
|
|
634
|
+
}), qe = e.object({
|
|
464
635
|
id: e.string(),
|
|
465
636
|
type: e.literal("submit"),
|
|
466
637
|
label: e.string(),
|
|
@@ -469,7 +640,7 @@ const z = e.enum([
|
|
|
469
640
|
order: e.number().optional(),
|
|
470
641
|
visible: e.boolean().optional().default(!0),
|
|
471
642
|
customizations: e.record(e.string(), e.any()).optional()
|
|
472
|
-
}),
|
|
643
|
+
}), $ = e.discriminatedUnion("type", [
|
|
473
644
|
e.object({
|
|
474
645
|
id: e.string(),
|
|
475
646
|
type: e.literal("RICH_TEXT"),
|
|
@@ -512,7 +683,7 @@ const z = e.enum([
|
|
|
512
683
|
visible: e.boolean().optional().default(!0)
|
|
513
684
|
})
|
|
514
685
|
// Add more component types as needed
|
|
515
|
-
]),
|
|
686
|
+
]), ee = e.object({
|
|
516
687
|
name: e.string().openapi({
|
|
517
688
|
description: "The name of the form"
|
|
518
689
|
}),
|
|
@@ -563,7 +734,7 @@ const z = e.enum([
|
|
|
563
734
|
coordinates: e.object({ x: e.number(), y: e.number() }),
|
|
564
735
|
alias: e.string().min(1).max(150).optional(),
|
|
565
736
|
config: e.object({
|
|
566
|
-
components: e.array(
|
|
737
|
+
components: e.array($),
|
|
567
738
|
next_node: e.string()
|
|
568
739
|
})
|
|
569
740
|
})
|
|
@@ -586,48 +757,48 @@ const z = e.enum([
|
|
|
586
757
|
style: e.object({ css: e.string().optional() }).optional()
|
|
587
758
|
}).openapi({
|
|
588
759
|
description: "Schema for flow-based forms (matches new JSON structure)"
|
|
589
|
-
}),
|
|
590
|
-
...
|
|
591
|
-
|
|
760
|
+
}), Ye = e.object({
|
|
761
|
+
...i.shape,
|
|
762
|
+
...ee.shape,
|
|
592
763
|
id: e.string()
|
|
593
|
-
}),
|
|
764
|
+
}), h = e.enum([
|
|
594
765
|
"pre-user-signup",
|
|
595
766
|
"post-user-registration",
|
|
596
767
|
"post-user-login"
|
|
597
768
|
// Potentially other triggers specific to webhooks in the future
|
|
598
|
-
]),
|
|
769
|
+
]), E = e.enum([
|
|
599
770
|
"pre-user-signup",
|
|
600
771
|
"post-user-registration",
|
|
601
772
|
"post-user-login"
|
|
602
|
-
]),
|
|
773
|
+
]), l = {
|
|
603
774
|
enabled: e.boolean().default(!1),
|
|
604
775
|
synchronous: e.boolean().default(!1),
|
|
605
776
|
priority: e.number().optional(),
|
|
606
777
|
hook_id: e.string().optional()
|
|
607
|
-
},
|
|
608
|
-
...
|
|
609
|
-
trigger_id:
|
|
778
|
+
}, te = e.object({
|
|
779
|
+
...l,
|
|
780
|
+
trigger_id: h,
|
|
610
781
|
url: e.string()
|
|
611
|
-
}),
|
|
612
|
-
...
|
|
613
|
-
trigger_id: m,
|
|
614
|
-
form_id: e.string()
|
|
615
|
-
}), Ye = e.union([
|
|
616
|
-
ee,
|
|
617
|
-
te
|
|
618
|
-
]), ne = e.object({
|
|
619
|
-
..._,
|
|
782
|
+
}), oe = e.object({
|
|
783
|
+
...l,
|
|
620
784
|
trigger_id: E,
|
|
621
|
-
|
|
785
|
+
form_id: e.string()
|
|
786
|
+
}), Qe = e.union([
|
|
787
|
+
te,
|
|
788
|
+
oe
|
|
789
|
+
]), ie = e.object({
|
|
790
|
+
...l,
|
|
791
|
+
trigger_id: h,
|
|
792
|
+
...i.shape,
|
|
622
793
|
hook_id: e.string(),
|
|
623
794
|
url: e.string()
|
|
624
|
-
}),
|
|
625
|
-
...
|
|
626
|
-
trigger_id:
|
|
627
|
-
...
|
|
795
|
+
}), ne = e.object({
|
|
796
|
+
...l,
|
|
797
|
+
trigger_id: E,
|
|
798
|
+
...i.shape,
|
|
628
799
|
hook_id: e.string(),
|
|
629
800
|
form_id: e.string()
|
|
630
|
-
}),
|
|
801
|
+
}), Je = e.union([ie, ne]), ae = e.object({
|
|
631
802
|
alg: e.enum([
|
|
632
803
|
"RS256",
|
|
633
804
|
"RS384",
|
|
@@ -646,9 +817,9 @@ const z = e.enum([
|
|
|
646
817
|
x5t: e.string().optional(),
|
|
647
818
|
x5c: e.array(e.string()).optional(),
|
|
648
819
|
use: e.enum(["sig", "enc"]).optional()
|
|
649
|
-
}), Qe = e.object({
|
|
650
|
-
keys: e.array(ie)
|
|
651
820
|
}), Ze = e.object({
|
|
821
|
+
keys: e.array(ae)
|
|
822
|
+
}), $e = e.object({
|
|
652
823
|
issuer: e.string(),
|
|
653
824
|
authorization_endpoint: e.string(),
|
|
654
825
|
token_endpoint: e.string(),
|
|
@@ -669,10 +840,10 @@ const z = e.enum([
|
|
|
669
840
|
request_uri_parameter_supported: e.boolean(),
|
|
670
841
|
request_parameter_supported: e.boolean(),
|
|
671
842
|
token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
|
|
672
|
-
}),
|
|
843
|
+
}), se = e.object({
|
|
673
844
|
csrf_token: e.string(),
|
|
674
845
|
auth0Client: e.string().optional(),
|
|
675
|
-
authParams:
|
|
846
|
+
authParams: K,
|
|
676
847
|
expires_at: e.string(),
|
|
677
848
|
deleted_at: e.string().optional(),
|
|
678
849
|
ip: e.string().optional(),
|
|
@@ -682,14 +853,14 @@ const z = e.enum([
|
|
|
682
853
|
login_completed: e.boolean().optional().default(!1)
|
|
683
854
|
}).openapi({
|
|
684
855
|
description: "This represents a login sesion"
|
|
685
|
-
}),
|
|
686
|
-
...
|
|
856
|
+
}), et = e.object({
|
|
857
|
+
...se.shape,
|
|
687
858
|
id: e.string().openapi({
|
|
688
859
|
description: "This is is used as the state in the universal login"
|
|
689
860
|
}),
|
|
690
861
|
created_at: e.string(),
|
|
691
862
|
updated_at: e.string()
|
|
692
|
-
}),
|
|
863
|
+
}), re = {
|
|
693
864
|
// Network & System
|
|
694
865
|
ACLS_SUMMARY: "acls_summary",
|
|
695
866
|
ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
|
|
@@ -856,17 +1027,17 @@ const z = e.enum([
|
|
|
856
1027
|
WARNING_DURING_LOGIN: "w",
|
|
857
1028
|
WARNING_SENDING_NOTIFICATION: "wn",
|
|
858
1029
|
WARNING_USER_MANAGEMENT: "wum"
|
|
859
|
-
},
|
|
860
|
-
(t) => Object.values(
|
|
1030
|
+
}, le = e.string().refine(
|
|
1031
|
+
(t) => Object.values(re).includes(t),
|
|
861
1032
|
{ message: "Invalid log type" }
|
|
862
|
-
),
|
|
1033
|
+
), ce = e.object({
|
|
863
1034
|
name: e.string(),
|
|
864
1035
|
version: e.string(),
|
|
865
1036
|
env: e.object({
|
|
866
1037
|
node: e.string().optional()
|
|
867
1038
|
}).optional()
|
|
868
|
-
}),
|
|
869
|
-
type:
|
|
1039
|
+
}), tt = e.object({
|
|
1040
|
+
type: le,
|
|
870
1041
|
date: e.string(),
|
|
871
1042
|
description: e.string().optional(),
|
|
872
1043
|
log_id: e.string().optional(),
|
|
@@ -887,13 +1058,13 @@ const z = e.enum([
|
|
|
887
1058
|
strategy: e.string().optional(),
|
|
888
1059
|
strategy_type: e.string().optional(),
|
|
889
1060
|
hostname: e.string().optional(),
|
|
890
|
-
auth0_client:
|
|
891
|
-
}),
|
|
1061
|
+
auth0_client: ce.optional()
|
|
1062
|
+
}), _e = e.object({
|
|
892
1063
|
user_id: e.string(),
|
|
893
1064
|
password: e.string(),
|
|
894
1065
|
algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
895
|
-
}),
|
|
896
|
-
...
|
|
1066
|
+
}), ot = e.object({
|
|
1067
|
+
..._e.shape,
|
|
897
1068
|
created_at: e.string(),
|
|
898
1069
|
updated_at: e.string()
|
|
899
1070
|
}), S = e.object({
|
|
@@ -903,7 +1074,7 @@ const z = e.enum([
|
|
|
903
1074
|
last_user_agent: e.string().describe("Last user agent of the device from which this user logged in"),
|
|
904
1075
|
last_ip: e.string().describe("Last IP address from which this user logged in"),
|
|
905
1076
|
last_asn: e.string().describe("Last autonomous system number from which this user logged in")
|
|
906
|
-
}),
|
|
1077
|
+
}), pe = e.object({
|
|
907
1078
|
id: e.string(),
|
|
908
1079
|
revoked_at: e.string().optional(),
|
|
909
1080
|
used_at: e.string().optional(),
|
|
@@ -915,12 +1086,12 @@ const z = e.enum([
|
|
|
915
1086
|
"Metadata related to the device used in the session"
|
|
916
1087
|
),
|
|
917
1088
|
clients: e.array(e.string()).describe("List of client details for the session")
|
|
918
|
-
}),
|
|
1089
|
+
}), it = e.object({
|
|
919
1090
|
created_at: e.string(),
|
|
920
1091
|
updated_at: e.string(),
|
|
921
1092
|
authenticated_at: e.string(),
|
|
922
1093
|
last_interaction_at: e.string(),
|
|
923
|
-
...
|
|
1094
|
+
...pe.shape
|
|
924
1095
|
}), nt = e.object({
|
|
925
1096
|
kid: e.string().openapi({ description: "The key id of the signing key" }),
|
|
926
1097
|
cert: e.string().openapi({ description: "The public certificate of the signing key" }),
|
|
@@ -947,8 +1118,8 @@ const z = e.enum([
|
|
|
947
1118
|
description: "The type of the signing key"
|
|
948
1119
|
})
|
|
949
1120
|
});
|
|
950
|
-
var
|
|
951
|
-
const
|
|
1121
|
+
var de = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(de || {});
|
|
1122
|
+
const at = e.object({
|
|
952
1123
|
access_token: e.string(),
|
|
953
1124
|
id_token: e.string().optional(),
|
|
954
1125
|
scope: e.string().optional(),
|
|
@@ -961,7 +1132,7 @@ e.object({
|
|
|
961
1132
|
code: e.string(),
|
|
962
1133
|
state: e.string().optional()
|
|
963
1134
|
});
|
|
964
|
-
const
|
|
1135
|
+
const ge = e.object({
|
|
965
1136
|
button_border_radius: e.number(),
|
|
966
1137
|
button_border_weight: e.number(),
|
|
967
1138
|
buttons_style: e.enum(["pill", "rounded", "sharp"]),
|
|
@@ -971,7 +1142,7 @@ const de = e.object({
|
|
|
971
1142
|
show_widget_shadow: e.boolean(),
|
|
972
1143
|
widget_border_weight: e.number(),
|
|
973
1144
|
widget_corner_radius: e.number()
|
|
974
|
-
}),
|
|
1145
|
+
}), ue = e.object({
|
|
975
1146
|
base_focus_color: e.string(),
|
|
976
1147
|
base_hover_color: e.string(),
|
|
977
1148
|
body_text: e.string(),
|
|
@@ -991,44 +1162,44 @@ const de = e.object({
|
|
|
991
1162
|
success: e.string(),
|
|
992
1163
|
widget_background: e.string(),
|
|
993
1164
|
widget_border: e.string()
|
|
994
|
-
}),
|
|
1165
|
+
}), o = e.object({
|
|
995
1166
|
bold: e.boolean(),
|
|
996
1167
|
size: e.number()
|
|
997
|
-
}),
|
|
998
|
-
body_text:
|
|
999
|
-
buttons_text:
|
|
1168
|
+
}), me = e.object({
|
|
1169
|
+
body_text: o,
|
|
1170
|
+
buttons_text: o,
|
|
1000
1171
|
font_url: e.string(),
|
|
1001
|
-
input_labels:
|
|
1002
|
-
links:
|
|
1172
|
+
input_labels: o,
|
|
1173
|
+
links: o,
|
|
1003
1174
|
links_style: e.enum(["normal", "underlined"]),
|
|
1004
1175
|
reference_text_size: e.number(),
|
|
1005
|
-
subtitle:
|
|
1006
|
-
title:
|
|
1007
|
-
}),
|
|
1176
|
+
subtitle: o,
|
|
1177
|
+
title: o
|
|
1178
|
+
}), he = e.object({
|
|
1008
1179
|
background_color: e.string(),
|
|
1009
1180
|
background_image_url: e.string(),
|
|
1010
1181
|
page_layout: e.enum(["center", "left", "right"])
|
|
1011
|
-
}),
|
|
1182
|
+
}), Ee = e.object({
|
|
1012
1183
|
header_text_alignment: e.enum(["center", "left", "right"]),
|
|
1013
1184
|
logo_height: e.number(),
|
|
1014
1185
|
logo_position: e.enum(["center", "left", "none", "right"]),
|
|
1015
1186
|
logo_url: e.string(),
|
|
1016
1187
|
social_buttons_layout: e.enum(["bottom", "top"])
|
|
1017
1188
|
}), Se = e.object({
|
|
1018
|
-
borders:
|
|
1019
|
-
colors:
|
|
1189
|
+
borders: ge,
|
|
1190
|
+
colors: ue,
|
|
1020
1191
|
displayName: e.string(),
|
|
1021
|
-
fonts:
|
|
1022
|
-
page_background:
|
|
1023
|
-
widget:
|
|
1024
|
-
}),
|
|
1192
|
+
fonts: me,
|
|
1193
|
+
page_background: he,
|
|
1194
|
+
widget: Ee
|
|
1195
|
+
}), st = Se.extend({
|
|
1025
1196
|
themeId: e.string()
|
|
1026
|
-
}),
|
|
1197
|
+
}), rt = e.object({
|
|
1027
1198
|
universal_login_experience: e.enum(["new", "classic"]).default("new"),
|
|
1028
1199
|
identifier_first: e.boolean().default(!0),
|
|
1029
1200
|
password_first: e.boolean().default(!1),
|
|
1030
1201
|
webauthn_platform_first_factor: e.boolean()
|
|
1031
|
-
}),
|
|
1202
|
+
}), lt = e.object({
|
|
1032
1203
|
name: e.string(),
|
|
1033
1204
|
enabled: e.boolean().optional().default(!0),
|
|
1034
1205
|
default_from_address: e.string().optional(),
|
|
@@ -1058,7 +1229,7 @@ const de = e.object({
|
|
|
1058
1229
|
})
|
|
1059
1230
|
]),
|
|
1060
1231
|
settings: e.object({}).optional()
|
|
1061
|
-
}),
|
|
1232
|
+
}), fe = e.object({
|
|
1062
1233
|
// The actual refresh token value (primary key).
|
|
1063
1234
|
id: e.string(),
|
|
1064
1235
|
// Link to the session record
|
|
@@ -1079,15 +1250,15 @@ const de = e.object({
|
|
|
1079
1250
|
})
|
|
1080
1251
|
),
|
|
1081
1252
|
rotating: e.boolean()
|
|
1082
|
-
}),
|
|
1253
|
+
}), ct = e.object({
|
|
1083
1254
|
// When the refresh token record was created.
|
|
1084
1255
|
created_at: e.string(),
|
|
1085
1256
|
// Spread in the rest of the refresh token properties.
|
|
1086
|
-
...
|
|
1257
|
+
...fe.shape
|
|
1087
1258
|
}), _t = e.object({
|
|
1088
1259
|
to: e.string(),
|
|
1089
1260
|
message: e.string()
|
|
1090
|
-
}),
|
|
1261
|
+
}), pt = e.object({
|
|
1091
1262
|
name: e.string(),
|
|
1092
1263
|
options: e.object({})
|
|
1093
1264
|
}), be = e.object({
|
|
@@ -1103,7 +1274,7 @@ const de = e.object({
|
|
|
1103
1274
|
mtls: e.object({
|
|
1104
1275
|
bound_access_tokens: e.boolean().optional()
|
|
1105
1276
|
}).optional()
|
|
1106
|
-
}),
|
|
1277
|
+
}), Ce = e.object({
|
|
1107
1278
|
name: e.string(),
|
|
1108
1279
|
identifier: e.string(),
|
|
1109
1280
|
scopes: e.array(be).optional(),
|
|
@@ -1115,38 +1286,38 @@ const de = e.object({
|
|
|
1115
1286
|
allow_offline_access: e.boolean().optional(),
|
|
1116
1287
|
verificationKey: e.string().optional(),
|
|
1117
1288
|
options: Ae.optional()
|
|
1118
|
-
}),
|
|
1289
|
+
}), Ie = e.object({
|
|
1119
1290
|
id: e.string().optional(),
|
|
1120
|
-
...
|
|
1291
|
+
...Ce.shape,
|
|
1121
1292
|
created_at: e.string().optional(),
|
|
1122
1293
|
updated_at: e.string().optional()
|
|
1123
|
-
}),
|
|
1294
|
+
}), dt = e.array(Ie), Oe = e.object({
|
|
1124
1295
|
role_id: e.string(),
|
|
1125
1296
|
resource_server_identifier: e.string(),
|
|
1126
1297
|
permission_name: e.string()
|
|
1127
|
-
}),
|
|
1128
|
-
...
|
|
1298
|
+
}), Te = e.object({
|
|
1299
|
+
...Oe.shape,
|
|
1129
1300
|
tenant_id: e.string(),
|
|
1130
1301
|
created_at: e.string().optional()
|
|
1131
|
-
}),
|
|
1302
|
+
}), gt = e.array(Te), Ne = e.object({
|
|
1132
1303
|
role_id: e.string(),
|
|
1133
1304
|
resource_server_identifier: e.string(),
|
|
1134
1305
|
resource_server_name: e.string(),
|
|
1135
1306
|
permission_name: e.string(),
|
|
1136
1307
|
description: e.string().nullable().optional(),
|
|
1137
1308
|
created_at: e.string().optional()
|
|
1138
|
-
}),
|
|
1139
|
-
|
|
1140
|
-
),
|
|
1309
|
+
}), ut = e.array(
|
|
1310
|
+
Ne
|
|
1311
|
+
), ye = e.object({
|
|
1141
1312
|
user_id: e.string(),
|
|
1142
1313
|
resource_server_identifier: e.string(),
|
|
1143
1314
|
permission_name: e.string(),
|
|
1144
1315
|
organization_id: e.string().optional()
|
|
1145
1316
|
}), Re = e.object({
|
|
1146
|
-
...
|
|
1317
|
+
...ye.shape,
|
|
1147
1318
|
tenant_id: e.string(),
|
|
1148
1319
|
created_at: e.string().optional()
|
|
1149
|
-
}),
|
|
1320
|
+
}), mt = e.array(Re), Le = e.object({
|
|
1150
1321
|
user_id: e.string(),
|
|
1151
1322
|
resource_server_identifier: e.string(),
|
|
1152
1323
|
resource_server_name: e.string(),
|
|
@@ -1154,17 +1325,17 @@ const de = e.object({
|
|
|
1154
1325
|
description: e.string().nullable().optional(),
|
|
1155
1326
|
created_at: e.string().optional(),
|
|
1156
1327
|
organization_id: e.string().optional()
|
|
1157
|
-
}),
|
|
1328
|
+
}), ht = e.array(
|
|
1158
1329
|
Le
|
|
1159
1330
|
), De = e.object({
|
|
1160
1331
|
user_id: e.string(),
|
|
1161
1332
|
role_id: e.string(),
|
|
1162
1333
|
organization_id: e.string().optional()
|
|
1163
|
-
}),
|
|
1334
|
+
}), we = e.object({
|
|
1164
1335
|
...De.shape,
|
|
1165
1336
|
tenant_id: e.string(),
|
|
1166
1337
|
created_at: e.string().optional()
|
|
1167
|
-
}), Et = e.array(
|
|
1338
|
+
}), Et = e.array(we), Ue = e.object({
|
|
1168
1339
|
name: e.string().min(1).max(50).openapi({
|
|
1169
1340
|
description: "The name of the role. Cannot include '<' or '>'"
|
|
1170
1341
|
}),
|
|
@@ -1178,7 +1349,7 @@ const de = e.object({
|
|
|
1178
1349
|
...Ue.shape,
|
|
1179
1350
|
created_at: e.string().optional(),
|
|
1180
1351
|
updated_at: e.string().optional()
|
|
1181
|
-
}),
|
|
1352
|
+
}), St = e.array(Fe), je = e.object({
|
|
1182
1353
|
logo_url: e.string().optional().openapi({
|
|
1183
1354
|
description: "URL of the organization's logo"
|
|
1184
1355
|
}),
|
|
@@ -1203,7 +1374,7 @@ const de = e.object({
|
|
|
1203
1374
|
is_signup_enabled: e.boolean().default(!0).openapi({
|
|
1204
1375
|
description: "Whether signup is enabled for this connection"
|
|
1205
1376
|
})
|
|
1206
|
-
}),
|
|
1377
|
+
}), ve = e.object({
|
|
1207
1378
|
client_credentials: e.object({
|
|
1208
1379
|
enforce: e.boolean().default(!1).openapi({
|
|
1209
1380
|
description: "Whether to enforce token quota limits"
|
|
@@ -1230,138 +1401,140 @@ const de = e.object({
|
|
|
1230
1401
|
enabled_connections: e.array(ke).default([]).optional().openapi({
|
|
1231
1402
|
description: "List of enabled connections for the organization"
|
|
1232
1403
|
}),
|
|
1233
|
-
token_quota:
|
|
1234
|
-
}),
|
|
1404
|
+
token_quota: ve
|
|
1405
|
+
}), ft = e.object({
|
|
1235
1406
|
...Pe.shape,
|
|
1236
|
-
...
|
|
1407
|
+
...i.shape,
|
|
1237
1408
|
id: e.string()
|
|
1238
|
-
}),
|
|
1409
|
+
}), He = e.object({
|
|
1239
1410
|
user_id: e.string().openapi({
|
|
1240
1411
|
description: "ID of the user"
|
|
1241
1412
|
}),
|
|
1242
1413
|
organization_id: e.string().openapi({
|
|
1243
1414
|
description: "ID of the organization"
|
|
1244
1415
|
})
|
|
1245
|
-
}),
|
|
1246
|
-
...
|
|
1247
|
-
...
|
|
1416
|
+
}), bt = e.object({
|
|
1417
|
+
...He.shape,
|
|
1418
|
+
...i.shape,
|
|
1248
1419
|
id: e.string()
|
|
1249
1420
|
});
|
|
1250
|
-
function
|
|
1251
|
-
const [
|
|
1252
|
-
if (!
|
|
1421
|
+
function At(t) {
|
|
1422
|
+
const [n, s] = t.split("|");
|
|
1423
|
+
if (!n || !s)
|
|
1253
1424
|
throw new Error(`Invalid user_id: ${t}`);
|
|
1254
|
-
return { connection:
|
|
1425
|
+
return { connection: n, id: s };
|
|
1255
1426
|
}
|
|
1256
1427
|
export {
|
|
1257
|
-
|
|
1258
|
-
|
|
1259
|
-
|
|
1260
|
-
|
|
1261
|
-
|
|
1262
|
-
|
|
1263
|
-
|
|
1264
|
-
|
|
1428
|
+
ce as Auth0Client,
|
|
1429
|
+
u as AuthorizationResponseMode,
|
|
1430
|
+
g as AuthorizationResponseType,
|
|
1431
|
+
m as CodeChallengeMethod,
|
|
1432
|
+
d as ComponentCategory,
|
|
1433
|
+
p as ComponentType,
|
|
1434
|
+
de as GrantType,
|
|
1435
|
+
re as LogTypes,
|
|
1265
1436
|
j as NodeType,
|
|
1266
1437
|
T as applicationInsertSchema,
|
|
1267
1438
|
N as applicationSchema,
|
|
1268
|
-
|
|
1439
|
+
We as auth0FlowInsertSchema,
|
|
1269
1440
|
G as auth0FlowSchema,
|
|
1270
1441
|
Ge as auth0UserResponseSchema,
|
|
1271
|
-
|
|
1272
|
-
|
|
1273
|
-
|
|
1274
|
-
|
|
1442
|
+
K as authParamsSchema,
|
|
1443
|
+
c as baseUserSchema,
|
|
1444
|
+
ge as bordersSchema,
|
|
1445
|
+
Xe as brandingSchema,
|
|
1275
1446
|
L as buttonComponentSchema,
|
|
1447
|
+
y as clientInsertSchema,
|
|
1448
|
+
Be as clientSchema,
|
|
1276
1449
|
Y as codeInsertSchema,
|
|
1277
|
-
|
|
1278
|
-
|
|
1279
|
-
|
|
1450
|
+
ze as codeSchema,
|
|
1451
|
+
q as codeTypeSchema,
|
|
1452
|
+
ue as colorsSchema,
|
|
1280
1453
|
F as componentSchema,
|
|
1281
|
-
|
|
1282
|
-
|
|
1454
|
+
W as connectionInsertSchema,
|
|
1455
|
+
B as connectionOptionsSchema,
|
|
1283
1456
|
X as connectionSchema,
|
|
1284
1457
|
a as coordinatesSchema,
|
|
1285
|
-
|
|
1458
|
+
Q as customDomainInsertSchema,
|
|
1286
1459
|
Z as customDomainSchema,
|
|
1287
|
-
|
|
1288
|
-
|
|
1289
|
-
|
|
1290
|
-
|
|
1291
|
-
|
|
1292
|
-
|
|
1293
|
-
|
|
1294
|
-
|
|
1295
|
-
|
|
1296
|
-
|
|
1297
|
-
|
|
1460
|
+
Ve as customDomainWithTenantIdSchema,
|
|
1461
|
+
lt as emailProviderSchema,
|
|
1462
|
+
x as endingSchema,
|
|
1463
|
+
w as fieldComponentSchema,
|
|
1464
|
+
v as flowNodeSchema,
|
|
1465
|
+
o as fontDetailsSchema,
|
|
1466
|
+
me as fontsSchema,
|
|
1467
|
+
qe as formControlSchema,
|
|
1468
|
+
ee as formInsertSchema,
|
|
1469
|
+
$ as formNodeComponentDefinition,
|
|
1470
|
+
Ye as formSchema,
|
|
1298
1471
|
U as genericComponentSchema,
|
|
1299
1472
|
P as genericNodeSchema,
|
|
1300
|
-
|
|
1301
|
-
|
|
1473
|
+
Qe as hookInsertSchema,
|
|
1474
|
+
Je as hookSchema,
|
|
1302
1475
|
b as identitySchema,
|
|
1303
|
-
|
|
1304
|
-
|
|
1476
|
+
Ze as jwksKeySchema,
|
|
1477
|
+
ae as jwksSchema,
|
|
1305
1478
|
D as legalComponentSchema,
|
|
1306
|
-
|
|
1307
|
-
|
|
1308
|
-
|
|
1309
|
-
|
|
1310
|
-
|
|
1479
|
+
tt as logSchema,
|
|
1480
|
+
se as loginSessionInsertSchema,
|
|
1481
|
+
et as loginSessionSchema,
|
|
1482
|
+
H as nodeSchema,
|
|
1483
|
+
$e as openIDConfigurationSchema,
|
|
1311
1484
|
je as organizationBrandingSchema,
|
|
1312
1485
|
ke as organizationEnabledConnectionSchema,
|
|
1313
1486
|
Pe as organizationInsertSchema,
|
|
1314
|
-
|
|
1315
|
-
|
|
1316
|
-
|
|
1317
|
-
|
|
1318
|
-
|
|
1319
|
-
|
|
1320
|
-
|
|
1321
|
-
|
|
1322
|
-
|
|
1323
|
-
|
|
1324
|
-
|
|
1325
|
-
|
|
1487
|
+
ft as organizationSchema,
|
|
1488
|
+
ve as organizationTokenQuotaSchema,
|
|
1489
|
+
he as pageBackgroundSchema,
|
|
1490
|
+
At as parseUserId,
|
|
1491
|
+
_e as passwordInsertSchema,
|
|
1492
|
+
ot as passwordSchema,
|
|
1493
|
+
f as profileDataSchema,
|
|
1494
|
+
rt as promptSettingSchema,
|
|
1495
|
+
fe as refreshTokenInsertSchema,
|
|
1496
|
+
ct as refreshTokenSchema,
|
|
1497
|
+
Ce as resourceServerInsertSchema,
|
|
1498
|
+
dt as resourceServerListSchema,
|
|
1326
1499
|
Ae as resourceServerOptionsSchema,
|
|
1327
|
-
|
|
1500
|
+
Ie as resourceServerSchema,
|
|
1328
1501
|
be as resourceServerScopeSchema,
|
|
1329
1502
|
R as richTextComponentSchema,
|
|
1330
1503
|
Ue as roleInsertSchema,
|
|
1331
|
-
|
|
1332
|
-
|
|
1333
|
-
|
|
1334
|
-
|
|
1335
|
-
|
|
1336
|
-
|
|
1504
|
+
St as roleListSchema,
|
|
1505
|
+
Oe as rolePermissionInsertSchema,
|
|
1506
|
+
gt as rolePermissionListSchema,
|
|
1507
|
+
Te as rolePermissionSchema,
|
|
1508
|
+
ut as rolePermissionWithDetailsListSchema,
|
|
1509
|
+
Ne as rolePermissionWithDetailsSchema,
|
|
1337
1510
|
Fe as roleSchema,
|
|
1338
1511
|
O as samlpAddon,
|
|
1339
|
-
|
|
1340
|
-
|
|
1512
|
+
pe as sessionInsertSchema,
|
|
1513
|
+
it as sessionSchema,
|
|
1341
1514
|
nt as signingKeySchema,
|
|
1342
|
-
|
|
1515
|
+
pt as smsProviderSchema,
|
|
1343
1516
|
_t as smsSendParamsSchema,
|
|
1344
|
-
|
|
1517
|
+
M as startSchema,
|
|
1345
1518
|
k as stepNodeSchema,
|
|
1346
|
-
|
|
1519
|
+
z as tenantInsertSchema,
|
|
1347
1520
|
V as tenantSchema,
|
|
1348
1521
|
Se as themeInsertSchema,
|
|
1349
|
-
|
|
1350
|
-
|
|
1351
|
-
|
|
1522
|
+
st as themeSchema,
|
|
1523
|
+
at as tokenResponseSchema,
|
|
1524
|
+
xe as totalsSchema,
|
|
1352
1525
|
A as userInsertSchema,
|
|
1353
|
-
|
|
1354
|
-
|
|
1355
|
-
|
|
1356
|
-
|
|
1526
|
+
He as userOrganizationInsertSchema,
|
|
1527
|
+
bt as userOrganizationSchema,
|
|
1528
|
+
ye as userPermissionInsertSchema,
|
|
1529
|
+
mt as userPermissionListSchema,
|
|
1357
1530
|
Re as userPermissionSchema,
|
|
1358
|
-
|
|
1531
|
+
ht as userPermissionWithDetailsListSchema,
|
|
1359
1532
|
Le as userPermissionWithDetailsSchema,
|
|
1360
|
-
|
|
1533
|
+
Ke as userResponseSchema,
|
|
1361
1534
|
De as userRoleInsertSchema,
|
|
1362
1535
|
Et as userRoleListSchema,
|
|
1363
|
-
|
|
1364
|
-
|
|
1365
|
-
|
|
1366
|
-
|
|
1536
|
+
we as userRoleSchema,
|
|
1537
|
+
C as userSchema,
|
|
1538
|
+
J as verificationMethodsSchema,
|
|
1539
|
+
Ee as widgetSchema
|
|
1367
1540
|
};
|