@authhero/adapter-interfaces 0.88.0 → 0.89.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,12 +1,12 @@
1
1
  import { z as e } from "@hono/zod-openapi";
2
- const Me = e.object({
2
+ const xe = e.object({
3
3
  start: e.number(),
4
4
  limit: e.number(),
5
5
  length: e.number()
6
- }), o = e.object({
6
+ }), i = e.object({
7
7
  created_at: e.string(),
8
8
  updated_at: e.string()
9
- }), h = e.object({
9
+ }), f = e.object({
10
10
  email: e.string().optional(),
11
11
  email_verified: e.boolean().optional(),
12
12
  name: e.string().optional(),
@@ -23,8 +23,8 @@ const Me = e.object({
23
23
  access_token: e.string().optional(),
24
24
  access_token_secret: e.string().optional(),
25
25
  refresh_token: e.string().optional(),
26
- profileData: h.optional()
27
- }), l = e.object({
26
+ profileData: f.optional()
27
+ }), c = e.object({
28
28
  email: e.string().optional().transform((t) => t && t.toLowerCase()),
29
29
  username: e.string().optional(),
30
30
  phone_number: e.string().optional(),
@@ -39,7 +39,7 @@ const Me = e.object({
39
39
  user_id: e.string().optional(),
40
40
  app_metadata: e.any().default({}).optional(),
41
41
  user_metadata: e.any().default({}).optional()
42
- }), A = l.extend({
42
+ }), A = c.extend({
43
43
  email_verified: e.boolean().default(!1),
44
44
  verify_email: e.boolean().optional(),
45
45
  last_ip: e.string().optional(),
@@ -48,26 +48,26 @@ const Me = e.object({
48
48
  provider: e.string().default("email"),
49
49
  connection: e.string().default("email"),
50
50
  is_social: e.boolean().optional()
51
- }), f = e.object({
51
+ }), C = e.object({
52
52
  ...A.shape,
53
- ...o.shape,
53
+ ...i.shape,
54
54
  user_id: e.string(),
55
55
  is_social: e.boolean(),
56
56
  email: e.string().optional(),
57
57
  login_count: e.number().default(0),
58
58
  identities: e.array(b).optional()
59
- }), Ge = f, xe = l.extend({
59
+ }), Ge = C, Ke = c.extend({
60
60
  login_count: e.number(),
61
61
  multifactor: e.array(e.string()).optional(),
62
62
  last_ip: e.string().optional(),
63
63
  last_login: e.string().optional(),
64
64
  user_id: e.string()
65
- }).catchall(e.any()), C = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
- let I = (t = 21) => {
67
- let i = "", s = crypto.getRandomValues(new Uint8Array(t));
65
+ }).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
+ let _ = (t = 21) => {
67
+ let n = "", s = crypto.getRandomValues(new Uint8Array(t));
68
68
  for (; t--; )
69
- i += C[s[t] & 63];
70
- return i;
69
+ n += I[s[t] & 63];
70
+ return n;
71
71
  };
72
72
  const O = e.object({
73
73
  audience: e.string().optional(),
@@ -112,7 +112,7 @@ const O = e.object({
112
112
  email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
113
113
  description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
114
114
  }),
115
- client_secret: e.string().default(() => I()).optional(),
115
+ client_secret: e.string().default(() => _()).optional(),
116
116
  disable_sign_ups: e.boolean().optional().default(!1).openapi({
117
117
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
118
118
  }),
@@ -121,15 +121,186 @@ const O = e.object({
121
121
  created_at: e.string().transform((t) => t === null ? "" : t),
122
122
  updated_at: e.string().transform((t) => t === null ? "" : t),
123
123
  ...T.shape
124
+ }), y = e.object({
125
+ client_id: e.string().openapi({
126
+ description: "ID of this client."
127
+ }),
128
+ name: e.string().min(1).openapi({
129
+ description: "Name of this client (min length: 1 character, does not allow < or >)."
130
+ }),
131
+ description: e.string().max(140).optional().openapi({
132
+ description: "Free text description of this client (max length: 140 characters)."
133
+ }),
134
+ global: e.boolean().default(!1).openapi({
135
+ description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
136
+ }),
137
+ client_secret: e.string().default(() => _()).optional().openapi({
138
+ description: "Client secret (which you must not make public)."
139
+ }),
140
+ app_type: e.enum([
141
+ "native",
142
+ "spa",
143
+ "regular_web",
144
+ "non_interactive",
145
+ "resource_server",
146
+ "express_configuration",
147
+ "rms",
148
+ "box",
149
+ "cloudbees",
150
+ "concur",
151
+ "dropbox",
152
+ "mscrm",
153
+ "echosign",
154
+ "egnyte",
155
+ "newrelic",
156
+ "office365",
157
+ "salesforce",
158
+ "sentry",
159
+ "sharepoint",
160
+ "slack",
161
+ "springcm",
162
+ "zendesk",
163
+ "zoom",
164
+ "sso_integration",
165
+ "oag"
166
+ ]).default("regular_web").optional().openapi({
167
+ description: "The type of application this client represents"
168
+ }),
169
+ logo_uri: e.string().url().optional().openapi({
170
+ description: "URL of the logo to display for this client. Recommended size is 150x150 pixels."
171
+ }),
172
+ is_first_party: e.boolean().default(!1).openapi({
173
+ description: "Whether this client a first party client (true) or not (false)."
174
+ }),
175
+ oidc_conformant: e.boolean().default(!0).openapi({
176
+ description: "Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."
177
+ }),
178
+ callbacks: e.array(e.string()).default([]).optional().openapi({
179
+ description: "Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."
180
+ }),
181
+ allowed_origins: e.array(e.string()).default([]).optional().openapi({
182
+ description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."
183
+ }),
184
+ web_origins: e.array(e.string()).default([]).optional().openapi({
185
+ description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
186
+ }),
187
+ client_aliases: e.array(e.string()).default([]).optional().openapi({
188
+ description: "List of audiences/realms for SAML protocol. Used by the wsfed addon."
189
+ }),
190
+ allowed_clients: e.array(e.string()).default([]).optional().openapi({
191
+ description: "List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."
192
+ }),
193
+ allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
194
+ description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
195
+ }),
196
+ session_transfer: e.record(e.any()).default({}).optional().openapi({
197
+ description: "Native to Web SSO Configuration"
198
+ }),
199
+ oidc_logout: e.record(e.any()).default({}).optional().openapi({
200
+ description: "Configuration for OIDC backchannel logout"
201
+ }),
202
+ grant_types: e.array(e.string()).default([]).optional().openapi({
203
+ description: "List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."
204
+ }),
205
+ jwt_configuration: e.record(e.any()).default({}).optional().openapi({
206
+ description: "Configuration related to JWTs for the client."
207
+ }),
208
+ signing_keys: e.array(e.record(e.any())).default([]).optional().openapi({
209
+ description: "Signing certificates associated with this client."
210
+ }),
211
+ encryption_key: e.record(e.any()).default({}).optional().openapi({
212
+ description: "Encryption used for WsFed responses with this client."
213
+ }),
214
+ sso: e.boolean().default(!1).openapi({
215
+ description: "Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."
216
+ }),
217
+ sso_disabled: e.boolean().default(!0).openapi({
218
+ description: "Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."
219
+ }),
220
+ cross_origin_authentication: e.boolean().default(!1).openapi({
221
+ description: "Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."
222
+ }),
223
+ cross_origin_loc: e.string().url().optional().openapi({
224
+ description: "URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."
225
+ }),
226
+ custom_login_page_on: e.boolean().default(!1).openapi({
227
+ description: "Whether a custom login page is to be used (true) or the default provided login page (false)."
228
+ }),
229
+ custom_login_page: e.string().optional().openapi({
230
+ description: "The content (HTML, CSS, JS) of the custom login page."
231
+ }),
232
+ custom_login_page_preview: e.string().optional().openapi({
233
+ description: "The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"
234
+ }),
235
+ form_template: e.string().optional().openapi({
236
+ description: "HTML form template to be used for WS-Federation."
237
+ }),
238
+ addons: e.record(e.any()).default({}).optional().openapi({
239
+ description: "Addons enabled for this client and their associated configurations."
240
+ }),
241
+ token_endpoint_auth_method: e.enum(["none", "client_secret_post", "client_secret_basic"]).default("client_secret_basic").optional().openapi({
242
+ description: "Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."
243
+ }),
244
+ client_metadata: e.record(e.string().max(255)).default({}).optional().openapi({
245
+ description: 'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'
246
+ }),
247
+ mobile: e.record(e.any()).default({}).optional().openapi({
248
+ description: "Additional configuration for native mobile apps."
249
+ }),
250
+ initiate_login_uri: e.string().url().optional().openapi({
251
+ description: "Initiate login uri, must be https"
252
+ }),
253
+ native_social_login: e.record(e.any()).default({}).optional(),
254
+ refresh_token: e.record(e.any()).default({}).optional().openapi({
255
+ description: "Refresh token configuration"
256
+ }),
257
+ default_organization: e.record(e.any()).default({}).optional().openapi({
258
+ description: "Defines the default Organization ID and flows"
259
+ }),
260
+ organization_usage: e.enum(["deny", "allow", "require"]).default("deny").optional().openapi({
261
+ description: "Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."
262
+ }),
263
+ organization_require_behavior: e.enum(["no_prompt", "pre_login_prompt", "post_login_prompt"]).default("no_prompt").optional().openapi({
264
+ description: "Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."
265
+ }),
266
+ client_authentication_methods: e.record(e.any()).default({}).optional().openapi({
267
+ description: "Defines client authentication methods."
268
+ }),
269
+ require_pushed_authorization_requests: e.boolean().default(!1).openapi({
270
+ description: "Makes the use of Pushed Authorization Requests mandatory for this client"
271
+ }),
272
+ require_proof_of_possession: e.boolean().default(!1).openapi({
273
+ description: "Makes the use of Proof-of-Possession mandatory for this client"
274
+ }),
275
+ signed_request_object: e.record(e.any()).default({}).optional().openapi({
276
+ description: "JWT-secured Authorization Requests (JAR) settings."
277
+ }),
278
+ compliance_level: e.enum([
279
+ "none",
280
+ "fapi1_adv_pkj_par",
281
+ "fapi1_adv_mtls_par",
282
+ "fapi2_sp_pkj_mtls",
283
+ "fapi2_sp_mtls_mtls"
284
+ ]).optional().openapi({
285
+ description: "Defines the compliance level for this client, which may restrict it's capabilities"
286
+ }),
287
+ par_request_expiry: e.number().optional().openapi({
288
+ description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
289
+ }),
290
+ token_quota: e.record(e.any()).default({}).optional()
291
+ }), Be = e.object({
292
+ created_at: e.string(),
293
+ updated_at: e.string(),
294
+ ...y.shape
124
295
  }), a = e.object({
125
296
  x: e.number(),
126
297
  y: e.number()
127
298
  });
128
- var c = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(c || {}), p = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(p || {});
299
+ var p = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(p || {}), d = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(d || {});
129
300
  const r = e.object({
130
301
  id: e.string(),
131
- category: e.nativeEnum(p),
132
- type: e.nativeEnum(c)
302
+ category: e.nativeEnum(d),
303
+ type: e.nativeEnum(p)
133
304
  }), R = r.extend({
134
305
  category: e.literal(
135
306
  "BLOCK"
@@ -178,7 +349,7 @@ const r = e.object({
178
349
  config: e.object({
179
350
  text: e.string()
180
351
  }).passthrough()
181
- }), y = r.extend({
352
+ }), w = r.extend({
182
353
  category: e.literal(
183
354
  "FIELD"
184
355
  /* FIELD */
@@ -239,7 +410,7 @@ const r = e.object({
239
410
  R,
240
411
  L,
241
412
  D,
242
- y,
413
+ w,
243
414
  U
244
415
  ]);
245
416
  var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
@@ -255,7 +426,7 @@ const k = e.object({
255
426
  components: e.array(F),
256
427
  next_node: e.string()
257
428
  }).passthrough()
258
- }), w = e.object({
429
+ }), v = e.object({
259
430
  id: e.string(),
260
431
  type: e.literal(
261
432
  "FLOW"
@@ -271,14 +442,14 @@ const k = e.object({
271
442
  id: e.string(),
272
443
  type: e.string(),
273
444
  coordinates: a
274
- }).passthrough(), v = e.union([
445
+ }).passthrough(), H = e.union([
275
446
  k,
276
- w,
447
+ v,
277
448
  P
278
- ]), H = e.object({
449
+ ]), M = e.object({
279
450
  next_node: e.string(),
280
451
  coordinates: a
281
- }).passthrough(), M = e.object({
452
+ }).passthrough(), x = e.object({
282
453
  resume_flow: e.boolean().optional(),
283
454
  coordinates: a
284
455
  }).passthrough(), G = e.object({
@@ -287,26 +458,26 @@ const k = e.object({
287
458
  languages: e.object({
288
459
  primary: e.string()
289
460
  }).passthrough(),
290
- nodes: e.array(v),
291
- start: H,
292
- ending: M,
461
+ nodes: e.array(H),
462
+ start: M,
463
+ ending: x,
293
464
  created_at: e.string(),
294
465
  updated_at: e.string(),
295
466
  links: e.object({
296
467
  sdkSrc: e.string().optional(),
297
468
  sdk_src: e.string().optional()
298
469
  }).passthrough()
299
- }).passthrough(), Ke = G.omit({
470
+ }).passthrough(), We = G.omit({
300
471
  id: !0,
301
472
  created_at: !0,
302
473
  updated_at: !0
303
474
  });
304
- var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
305
- const x = e.object({
475
+ var g = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(u || {}), m = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(m || {});
476
+ const K = e.object({
306
477
  client_id: e.string(),
307
478
  act_as: e.string().optional(),
308
- response_type: e.nativeEnum(d).optional(),
309
- response_mode: e.nativeEnum(g).optional(),
479
+ response_type: e.nativeEnum(g).optional(),
480
+ response_mode: e.nativeEnum(u).optional(),
310
481
  redirect_uri: e.string().optional(),
311
482
  audience: e.string().optional(),
312
483
  organization: e.string().optional(),
@@ -314,13 +485,13 @@ const x = e.object({
314
485
  nonce: e.string().optional(),
315
486
  scope: e.string().optional(),
316
487
  prompt: e.string().optional(),
317
- code_challenge_method: e.nativeEnum(u).optional(),
488
+ code_challenge_method: e.nativeEnum(m).optional(),
318
489
  code_challenge: e.string().optional(),
319
490
  username: e.string().optional(),
320
491
  ui_locales: e.string().optional(),
321
492
  // The following fields are not available in Auth0
322
493
  vendor_id: e.string().optional()
323
- }), Be = e.object({
494
+ }), Xe = e.object({
324
495
  colors: e.object({
325
496
  primary: e.string(),
326
497
  page_background: e.object({
@@ -335,7 +506,7 @@ const x = e.object({
335
506
  font: e.object({
336
507
  url: e.string()
337
508
  }).optional()
338
- }), K = e.object({
509
+ }), B = e.object({
339
510
  kid: e.string().optional(),
340
511
  team_id: e.string().optional(),
341
512
  realms: e.string().optional(),
@@ -354,11 +525,11 @@ const x = e.object({
354
525
  from: e.string().optional(),
355
526
  twilio_sid: e.string().optional(),
356
527
  twilio_token: e.string().optional()
357
- }), B = e.object({
528
+ }), W = e.object({
358
529
  id: e.string().optional(),
359
530
  name: e.string(),
360
531
  strategy: e.string(),
361
- options: K.default({}),
532
+ options: B.default({}),
362
533
  enabled_clients: e.array(e.string()).default([]).optional(),
363
534
  response_type: e.custom().optional(),
364
535
  response_mode: e.custom().optional()
@@ -366,7 +537,7 @@ const x = e.object({
366
537
  id: e.string(),
367
538
  created_at: e.string().transform((t) => t === null ? "" : t),
368
539
  updated_at: e.string().transform((t) => t === null ? "" : t)
369
- }).extend(B.shape), W = e.object({
540
+ }).extend(W.shape), z = e.object({
370
541
  name: e.string(),
371
542
  audience: e.string(),
372
543
  sender_email: e.string().email(),
@@ -380,7 +551,7 @@ const x = e.object({
380
551
  }), V = e.object({
381
552
  created_at: e.string().transform((t) => t === null ? "" : t),
382
553
  updated_at: e.string().transform((t) => t === null ? "" : t),
383
- ...W.shape,
554
+ ...z.shape,
384
555
  id: e.string()
385
556
  });
386
557
  e.object({
@@ -388,7 +559,7 @@ e.object({
388
559
  tenant: V,
389
560
  connections: e.array(X)
390
561
  });
391
- const z = e.enum([
562
+ const q = e.enum([
392
563
  "password_reset",
393
564
  "email_verification",
394
565
  "otp",
@@ -405,7 +576,7 @@ const z = e.enum([
405
576
  connection_id: e.string().optional().openapi({
406
577
  description: "The connection that the code is connected to"
407
578
  }),
408
- code_type: z,
579
+ code_type: q,
409
580
  code_verifier: e.string().optional().openapi({
410
581
  description: "The code verifier used in PKCE in outbound flows"
411
582
  }),
@@ -427,10 +598,10 @@ const z = e.enum([
427
598
  expires_at: e.string(),
428
599
  used_at: e.string().optional(),
429
600
  user_id: e.string().optional()
430
- }), Xe = e.object({
601
+ }), ze = e.object({
431
602
  ...Y.shape,
432
603
  created_at: e.string()
433
- }), q = e.object({
604
+ }), Q = e.object({
434
605
  domain: e.string(),
435
606
  custom_domain_id: e.string().optional(),
436
607
  type: e.enum(["auth0_managed_certs", "self_managed_certs"]),
@@ -444,23 +615,23 @@ const z = e.enum([
444
615
  "null"
445
616
  ]).optional(),
446
617
  domain_metadata: e.record(e.string().max(255)).optional()
447
- }), Q = e.object({
618
+ }), J = e.object({
448
619
  name: e.literal("txt"),
449
620
  record: e.string(),
450
621
  domain: e.string()
451
622
  }), Z = e.object({
452
- ...q.shape,
623
+ ...Q.shape,
453
624
  custom_domain_id: e.string(),
454
625
  primary: e.boolean(),
455
626
  status: e.enum(["disabled", "pending", "pending_verification", "ready"]),
456
627
  origin_domain_name: e.string().optional(),
457
628
  verification: e.object({
458
- methods: e.array(Q)
629
+ methods: e.array(J)
459
630
  }).optional(),
460
631
  tls_policy: e.string().optional()
461
- }), We = Z.extend({
632
+ }), Ve = Z.extend({
462
633
  tenant_id: e.string()
463
- }), Ve = e.object({
634
+ }), qe = e.object({
464
635
  id: e.string(),
465
636
  type: e.literal("submit"),
466
637
  label: e.string(),
@@ -469,7 +640,7 @@ const z = e.enum([
469
640
  order: e.number().optional(),
470
641
  visible: e.boolean().optional().default(!0),
471
642
  customizations: e.record(e.string(), e.any()).optional()
472
- }), J = e.discriminatedUnion("type", [
643
+ }), $ = e.discriminatedUnion("type", [
473
644
  e.object({
474
645
  id: e.string(),
475
646
  type: e.literal("RICH_TEXT"),
@@ -512,7 +683,7 @@ const z = e.enum([
512
683
  visible: e.boolean().optional().default(!0)
513
684
  })
514
685
  // Add more component types as needed
515
- ]), $ = e.object({
686
+ ]), ee = e.object({
516
687
  name: e.string().openapi({
517
688
  description: "The name of the form"
518
689
  }),
@@ -563,7 +734,7 @@ const z = e.enum([
563
734
  coordinates: e.object({ x: e.number(), y: e.number() }),
564
735
  alias: e.string().min(1).max(150).optional(),
565
736
  config: e.object({
566
- components: e.array(J),
737
+ components: e.array($),
567
738
  next_node: e.string()
568
739
  })
569
740
  })
@@ -586,48 +757,48 @@ const z = e.enum([
586
757
  style: e.object({ css: e.string().optional() }).optional()
587
758
  }).openapi({
588
759
  description: "Schema for flow-based forms (matches new JSON structure)"
589
- }), ze = e.object({
590
- ...o.shape,
591
- ...$.shape,
760
+ }), Ye = e.object({
761
+ ...i.shape,
762
+ ...ee.shape,
592
763
  id: e.string()
593
- }), E = e.enum([
764
+ }), h = e.enum([
594
765
  "pre-user-signup",
595
766
  "post-user-registration",
596
767
  "post-user-login"
597
768
  // Potentially other triggers specific to webhooks in the future
598
- ]), m = e.enum([
769
+ ]), E = e.enum([
599
770
  "pre-user-signup",
600
771
  "post-user-registration",
601
772
  "post-user-login"
602
- ]), _ = {
773
+ ]), l = {
603
774
  enabled: e.boolean().default(!1),
604
775
  synchronous: e.boolean().default(!1),
605
776
  priority: e.number().optional(),
606
777
  hook_id: e.string().optional()
607
- }, ee = e.object({
608
- ..._,
609
- trigger_id: E,
778
+ }, te = e.object({
779
+ ...l,
780
+ trigger_id: h,
610
781
  url: e.string()
611
- }), te = e.object({
612
- ..._,
613
- trigger_id: m,
614
- form_id: e.string()
615
- }), Ye = e.union([
616
- ee,
617
- te
618
- ]), ne = e.object({
619
- ..._,
782
+ }), oe = e.object({
783
+ ...l,
620
784
  trigger_id: E,
621
- ...o.shape,
785
+ form_id: e.string()
786
+ }), Qe = e.union([
787
+ te,
788
+ oe
789
+ ]), ie = e.object({
790
+ ...l,
791
+ trigger_id: h,
792
+ ...i.shape,
622
793
  hook_id: e.string(),
623
794
  url: e.string()
624
- }), oe = e.object({
625
- ..._,
626
- trigger_id: m,
627
- ...o.shape,
795
+ }), ne = e.object({
796
+ ...l,
797
+ trigger_id: E,
798
+ ...i.shape,
628
799
  hook_id: e.string(),
629
800
  form_id: e.string()
630
- }), qe = e.union([ne, oe]), ie = e.object({
801
+ }), Je = e.union([ie, ne]), ae = e.object({
631
802
  alg: e.enum([
632
803
  "RS256",
633
804
  "RS384",
@@ -646,9 +817,9 @@ const z = e.enum([
646
817
  x5t: e.string().optional(),
647
818
  x5c: e.array(e.string()).optional(),
648
819
  use: e.enum(["sig", "enc"]).optional()
649
- }), Qe = e.object({
650
- keys: e.array(ie)
651
820
  }), Ze = e.object({
821
+ keys: e.array(ae)
822
+ }), $e = e.object({
652
823
  issuer: e.string(),
653
824
  authorization_endpoint: e.string(),
654
825
  token_endpoint: e.string(),
@@ -669,10 +840,10 @@ const z = e.enum([
669
840
  request_uri_parameter_supported: e.boolean(),
670
841
  request_parameter_supported: e.boolean(),
671
842
  token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
672
- }), ae = e.object({
843
+ }), se = e.object({
673
844
  csrf_token: e.string(),
674
845
  auth0Client: e.string().optional(),
675
- authParams: x,
846
+ authParams: K,
676
847
  expires_at: e.string(),
677
848
  deleted_at: e.string().optional(),
678
849
  ip: e.string().optional(),
@@ -682,14 +853,14 @@ const z = e.enum([
682
853
  login_completed: e.boolean().optional().default(!1)
683
854
  }).openapi({
684
855
  description: "This represents a login sesion"
685
- }), Je = e.object({
686
- ...ae.shape,
856
+ }), et = e.object({
857
+ ...se.shape,
687
858
  id: e.string().openapi({
688
859
  description: "This is is used as the state in the universal login"
689
860
  }),
690
861
  created_at: e.string(),
691
862
  updated_at: e.string()
692
- }), se = {
863
+ }), re = {
693
864
  // Network & System
694
865
  ACLS_SUMMARY: "acls_summary",
695
866
  ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
@@ -856,17 +1027,17 @@ const z = e.enum([
856
1027
  WARNING_DURING_LOGIN: "w",
857
1028
  WARNING_SENDING_NOTIFICATION: "wn",
858
1029
  WARNING_USER_MANAGEMENT: "wum"
859
- }, re = e.string().refine(
860
- (t) => Object.values(se).includes(t),
1030
+ }, le = e.string().refine(
1031
+ (t) => Object.values(re).includes(t),
861
1032
  { message: "Invalid log type" }
862
- ), _e = e.object({
1033
+ ), ce = e.object({
863
1034
  name: e.string(),
864
1035
  version: e.string(),
865
1036
  env: e.object({
866
1037
  node: e.string().optional()
867
1038
  }).optional()
868
- }), $e = e.object({
869
- type: re,
1039
+ }), tt = e.object({
1040
+ type: le,
870
1041
  date: e.string(),
871
1042
  description: e.string().optional(),
872
1043
  log_id: e.string().optional(),
@@ -887,13 +1058,13 @@ const z = e.enum([
887
1058
  strategy: e.string().optional(),
888
1059
  strategy_type: e.string().optional(),
889
1060
  hostname: e.string().optional(),
890
- auth0_client: _e.optional()
891
- }), le = e.object({
1061
+ auth0_client: ce.optional()
1062
+ }), _e = e.object({
892
1063
  user_id: e.string(),
893
1064
  password: e.string(),
894
1065
  algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id")
895
- }), et = e.object({
896
- ...le.shape,
1066
+ }), ot = e.object({
1067
+ ..._e.shape,
897
1068
  created_at: e.string(),
898
1069
  updated_at: e.string()
899
1070
  }), S = e.object({
@@ -903,7 +1074,7 @@ const z = e.enum([
903
1074
  last_user_agent: e.string().describe("Last user agent of the device from which this user logged in"),
904
1075
  last_ip: e.string().describe("Last IP address from which this user logged in"),
905
1076
  last_asn: e.string().describe("Last autonomous system number from which this user logged in")
906
- }), ce = e.object({
1077
+ }), pe = e.object({
907
1078
  id: e.string(),
908
1079
  revoked_at: e.string().optional(),
909
1080
  used_at: e.string().optional(),
@@ -915,12 +1086,12 @@ const z = e.enum([
915
1086
  "Metadata related to the device used in the session"
916
1087
  ),
917
1088
  clients: e.array(e.string()).describe("List of client details for the session")
918
- }), tt = e.object({
1089
+ }), it = e.object({
919
1090
  created_at: e.string(),
920
1091
  updated_at: e.string(),
921
1092
  authenticated_at: e.string(),
922
1093
  last_interaction_at: e.string(),
923
- ...ce.shape
1094
+ ...pe.shape
924
1095
  }), nt = e.object({
925
1096
  kid: e.string().openapi({ description: "The key id of the signing key" }),
926
1097
  cert: e.string().openapi({ description: "The public certificate of the signing key" }),
@@ -947,8 +1118,8 @@ const z = e.enum([
947
1118
  description: "The type of the signing key"
948
1119
  })
949
1120
  });
950
- var pe = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(pe || {});
951
- const ot = e.object({
1121
+ var de = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(de || {});
1122
+ const at = e.object({
952
1123
  access_token: e.string(),
953
1124
  id_token: e.string().optional(),
954
1125
  scope: e.string().optional(),
@@ -961,7 +1132,7 @@ e.object({
961
1132
  code: e.string(),
962
1133
  state: e.string().optional()
963
1134
  });
964
- const de = e.object({
1135
+ const ge = e.object({
965
1136
  button_border_radius: e.number(),
966
1137
  button_border_weight: e.number(),
967
1138
  buttons_style: e.enum(["pill", "rounded", "sharp"]),
@@ -971,7 +1142,7 @@ const de = e.object({
971
1142
  show_widget_shadow: e.boolean(),
972
1143
  widget_border_weight: e.number(),
973
1144
  widget_corner_radius: e.number()
974
- }), ge = e.object({
1145
+ }), ue = e.object({
975
1146
  base_focus_color: e.string(),
976
1147
  base_hover_color: e.string(),
977
1148
  body_text: e.string(),
@@ -991,44 +1162,44 @@ const de = e.object({
991
1162
  success: e.string(),
992
1163
  widget_background: e.string(),
993
1164
  widget_border: e.string()
994
- }), n = e.object({
1165
+ }), o = e.object({
995
1166
  bold: e.boolean(),
996
1167
  size: e.number()
997
- }), ue = e.object({
998
- body_text: n,
999
- buttons_text: n,
1168
+ }), me = e.object({
1169
+ body_text: o,
1170
+ buttons_text: o,
1000
1171
  font_url: e.string(),
1001
- input_labels: n,
1002
- links: n,
1172
+ input_labels: o,
1173
+ links: o,
1003
1174
  links_style: e.enum(["normal", "underlined"]),
1004
1175
  reference_text_size: e.number(),
1005
- subtitle: n,
1006
- title: n
1007
- }), Ee = e.object({
1176
+ subtitle: o,
1177
+ title: o
1178
+ }), he = e.object({
1008
1179
  background_color: e.string(),
1009
1180
  background_image_url: e.string(),
1010
1181
  page_layout: e.enum(["center", "left", "right"])
1011
- }), me = e.object({
1182
+ }), Ee = e.object({
1012
1183
  header_text_alignment: e.enum(["center", "left", "right"]),
1013
1184
  logo_height: e.number(),
1014
1185
  logo_position: e.enum(["center", "left", "none", "right"]),
1015
1186
  logo_url: e.string(),
1016
1187
  social_buttons_layout: e.enum(["bottom", "top"])
1017
1188
  }), Se = e.object({
1018
- borders: de,
1019
- colors: ge,
1189
+ borders: ge,
1190
+ colors: ue,
1020
1191
  displayName: e.string(),
1021
- fonts: ue,
1022
- page_background: Ee,
1023
- widget: me
1024
- }), it = Se.extend({
1192
+ fonts: me,
1193
+ page_background: he,
1194
+ widget: Ee
1195
+ }), st = Se.extend({
1025
1196
  themeId: e.string()
1026
- }), at = e.object({
1197
+ }), rt = e.object({
1027
1198
  universal_login_experience: e.enum(["new", "classic"]).default("new"),
1028
1199
  identifier_first: e.boolean().default(!0),
1029
1200
  password_first: e.boolean().default(!1),
1030
1201
  webauthn_platform_first_factor: e.boolean()
1031
- }), st = e.object({
1202
+ }), lt = e.object({
1032
1203
  name: e.string(),
1033
1204
  enabled: e.boolean().optional().default(!0),
1034
1205
  default_from_address: e.string().optional(),
@@ -1058,7 +1229,7 @@ const de = e.object({
1058
1229
  })
1059
1230
  ]),
1060
1231
  settings: e.object({}).optional()
1061
- }), he = e.object({
1232
+ }), fe = e.object({
1062
1233
  // The actual refresh token value (primary key).
1063
1234
  id: e.string(),
1064
1235
  // Link to the session record
@@ -1079,15 +1250,15 @@ const de = e.object({
1079
1250
  })
1080
1251
  ),
1081
1252
  rotating: e.boolean()
1082
- }), rt = e.object({
1253
+ }), ct = e.object({
1083
1254
  // When the refresh token record was created.
1084
1255
  created_at: e.string(),
1085
1256
  // Spread in the rest of the refresh token properties.
1086
- ...he.shape
1257
+ ...fe.shape
1087
1258
  }), _t = e.object({
1088
1259
  to: e.string(),
1089
1260
  message: e.string()
1090
- }), lt = e.object({
1261
+ }), pt = e.object({
1091
1262
  name: e.string(),
1092
1263
  options: e.object({})
1093
1264
  }), be = e.object({
@@ -1103,7 +1274,7 @@ const de = e.object({
1103
1274
  mtls: e.object({
1104
1275
  bound_access_tokens: e.boolean().optional()
1105
1276
  }).optional()
1106
- }), fe = e.object({
1277
+ }), Ce = e.object({
1107
1278
  name: e.string(),
1108
1279
  identifier: e.string(),
1109
1280
  scopes: e.array(be).optional(),
@@ -1115,38 +1286,38 @@ const de = e.object({
1115
1286
  allow_offline_access: e.boolean().optional(),
1116
1287
  verificationKey: e.string().optional(),
1117
1288
  options: Ae.optional()
1118
- }), Ce = e.object({
1289
+ }), Ie = e.object({
1119
1290
  id: e.string().optional(),
1120
- ...fe.shape,
1291
+ ...Ce.shape,
1121
1292
  created_at: e.string().optional(),
1122
1293
  updated_at: e.string().optional()
1123
- }), ct = e.array(Ce), Ie = e.object({
1294
+ }), dt = e.array(Ie), Oe = e.object({
1124
1295
  role_id: e.string(),
1125
1296
  resource_server_identifier: e.string(),
1126
1297
  permission_name: e.string()
1127
- }), Oe = e.object({
1128
- ...Ie.shape,
1298
+ }), Te = e.object({
1299
+ ...Oe.shape,
1129
1300
  tenant_id: e.string(),
1130
1301
  created_at: e.string().optional()
1131
- }), pt = e.array(Oe), Te = e.object({
1302
+ }), gt = e.array(Te), Ne = e.object({
1132
1303
  role_id: e.string(),
1133
1304
  resource_server_identifier: e.string(),
1134
1305
  resource_server_name: e.string(),
1135
1306
  permission_name: e.string(),
1136
1307
  description: e.string().nullable().optional(),
1137
1308
  created_at: e.string().optional()
1138
- }), dt = e.array(
1139
- Te
1140
- ), Ne = e.object({
1309
+ }), ut = e.array(
1310
+ Ne
1311
+ ), ye = e.object({
1141
1312
  user_id: e.string(),
1142
1313
  resource_server_identifier: e.string(),
1143
1314
  permission_name: e.string(),
1144
1315
  organization_id: e.string().optional()
1145
1316
  }), Re = e.object({
1146
- ...Ne.shape,
1317
+ ...ye.shape,
1147
1318
  tenant_id: e.string(),
1148
1319
  created_at: e.string().optional()
1149
- }), gt = e.array(Re), Le = e.object({
1320
+ }), mt = e.array(Re), Le = e.object({
1150
1321
  user_id: e.string(),
1151
1322
  resource_server_identifier: e.string(),
1152
1323
  resource_server_name: e.string(),
@@ -1154,17 +1325,17 @@ const de = e.object({
1154
1325
  description: e.string().nullable().optional(),
1155
1326
  created_at: e.string().optional(),
1156
1327
  organization_id: e.string().optional()
1157
- }), ut = e.array(
1328
+ }), ht = e.array(
1158
1329
  Le
1159
1330
  ), De = e.object({
1160
1331
  user_id: e.string(),
1161
1332
  role_id: e.string(),
1162
1333
  organization_id: e.string().optional()
1163
- }), ye = e.object({
1334
+ }), we = e.object({
1164
1335
  ...De.shape,
1165
1336
  tenant_id: e.string(),
1166
1337
  created_at: e.string().optional()
1167
- }), Et = e.array(ye), Ue = e.object({
1338
+ }), Et = e.array(we), Ue = e.object({
1168
1339
  name: e.string().min(1).max(50).openapi({
1169
1340
  description: "The name of the role. Cannot include '<' or '>'"
1170
1341
  }),
@@ -1178,7 +1349,7 @@ const de = e.object({
1178
1349
  ...Ue.shape,
1179
1350
  created_at: e.string().optional(),
1180
1351
  updated_at: e.string().optional()
1181
- }), mt = e.array(Fe), je = e.object({
1352
+ }), St = e.array(Fe), je = e.object({
1182
1353
  logo_url: e.string().optional().openapi({
1183
1354
  description: "URL of the organization's logo"
1184
1355
  }),
@@ -1203,7 +1374,7 @@ const de = e.object({
1203
1374
  is_signup_enabled: e.boolean().default(!0).openapi({
1204
1375
  description: "Whether signup is enabled for this connection"
1205
1376
  })
1206
- }), we = e.object({
1377
+ }), ve = e.object({
1207
1378
  client_credentials: e.object({
1208
1379
  enforce: e.boolean().default(!1).openapi({
1209
1380
  description: "Whether to enforce token quota limits"
@@ -1230,138 +1401,140 @@ const de = e.object({
1230
1401
  enabled_connections: e.array(ke).default([]).optional().openapi({
1231
1402
  description: "List of enabled connections for the organization"
1232
1403
  }),
1233
- token_quota: we
1234
- }), St = e.object({
1404
+ token_quota: ve
1405
+ }), ft = e.object({
1235
1406
  ...Pe.shape,
1236
- ...o.shape,
1407
+ ...i.shape,
1237
1408
  id: e.string()
1238
- }), ve = e.object({
1409
+ }), He = e.object({
1239
1410
  user_id: e.string().openapi({
1240
1411
  description: "ID of the user"
1241
1412
  }),
1242
1413
  organization_id: e.string().openapi({
1243
1414
  description: "ID of the organization"
1244
1415
  })
1245
- }), ht = e.object({
1246
- ...ve.shape,
1247
- ...o.shape,
1416
+ }), bt = e.object({
1417
+ ...He.shape,
1418
+ ...i.shape,
1248
1419
  id: e.string()
1249
1420
  });
1250
- function bt(t) {
1251
- const [i, s] = t.split("|");
1252
- if (!i || !s)
1421
+ function At(t) {
1422
+ const [n, s] = t.split("|");
1423
+ if (!n || !s)
1253
1424
  throw new Error(`Invalid user_id: ${t}`);
1254
- return { connection: i, id: s };
1425
+ return { connection: n, id: s };
1255
1426
  }
1256
1427
  export {
1257
- _e as Auth0Client,
1258
- g as AuthorizationResponseMode,
1259
- d as AuthorizationResponseType,
1260
- u as CodeChallengeMethod,
1261
- p as ComponentCategory,
1262
- c as ComponentType,
1263
- pe as GrantType,
1264
- se as LogTypes,
1428
+ ce as Auth0Client,
1429
+ u as AuthorizationResponseMode,
1430
+ g as AuthorizationResponseType,
1431
+ m as CodeChallengeMethod,
1432
+ d as ComponentCategory,
1433
+ p as ComponentType,
1434
+ de as GrantType,
1435
+ re as LogTypes,
1265
1436
  j as NodeType,
1266
1437
  T as applicationInsertSchema,
1267
1438
  N as applicationSchema,
1268
- Ke as auth0FlowInsertSchema,
1439
+ We as auth0FlowInsertSchema,
1269
1440
  G as auth0FlowSchema,
1270
1441
  Ge as auth0UserResponseSchema,
1271
- x as authParamsSchema,
1272
- l as baseUserSchema,
1273
- de as bordersSchema,
1274
- Be as brandingSchema,
1442
+ K as authParamsSchema,
1443
+ c as baseUserSchema,
1444
+ ge as bordersSchema,
1445
+ Xe as brandingSchema,
1275
1446
  L as buttonComponentSchema,
1447
+ y as clientInsertSchema,
1448
+ Be as clientSchema,
1276
1449
  Y as codeInsertSchema,
1277
- Xe as codeSchema,
1278
- z as codeTypeSchema,
1279
- ge as colorsSchema,
1450
+ ze as codeSchema,
1451
+ q as codeTypeSchema,
1452
+ ue as colorsSchema,
1280
1453
  F as componentSchema,
1281
- B as connectionInsertSchema,
1282
- K as connectionOptionsSchema,
1454
+ W as connectionInsertSchema,
1455
+ B as connectionOptionsSchema,
1283
1456
  X as connectionSchema,
1284
1457
  a as coordinatesSchema,
1285
- q as customDomainInsertSchema,
1458
+ Q as customDomainInsertSchema,
1286
1459
  Z as customDomainSchema,
1287
- We as customDomainWithTenantIdSchema,
1288
- st as emailProviderSchema,
1289
- M as endingSchema,
1290
- y as fieldComponentSchema,
1291
- w as flowNodeSchema,
1292
- n as fontDetailsSchema,
1293
- ue as fontsSchema,
1294
- Ve as formControlSchema,
1295
- $ as formInsertSchema,
1296
- J as formNodeComponentDefinition,
1297
- ze as formSchema,
1460
+ Ve as customDomainWithTenantIdSchema,
1461
+ lt as emailProviderSchema,
1462
+ x as endingSchema,
1463
+ w as fieldComponentSchema,
1464
+ v as flowNodeSchema,
1465
+ o as fontDetailsSchema,
1466
+ me as fontsSchema,
1467
+ qe as formControlSchema,
1468
+ ee as formInsertSchema,
1469
+ $ as formNodeComponentDefinition,
1470
+ Ye as formSchema,
1298
1471
  U as genericComponentSchema,
1299
1472
  P as genericNodeSchema,
1300
- Ye as hookInsertSchema,
1301
- qe as hookSchema,
1473
+ Qe as hookInsertSchema,
1474
+ Je as hookSchema,
1302
1475
  b as identitySchema,
1303
- Qe as jwksKeySchema,
1304
- ie as jwksSchema,
1476
+ Ze as jwksKeySchema,
1477
+ ae as jwksSchema,
1305
1478
  D as legalComponentSchema,
1306
- $e as logSchema,
1307
- ae as loginSessionInsertSchema,
1308
- Je as loginSessionSchema,
1309
- v as nodeSchema,
1310
- Ze as openIDConfigurationSchema,
1479
+ tt as logSchema,
1480
+ se as loginSessionInsertSchema,
1481
+ et as loginSessionSchema,
1482
+ H as nodeSchema,
1483
+ $e as openIDConfigurationSchema,
1311
1484
  je as organizationBrandingSchema,
1312
1485
  ke as organizationEnabledConnectionSchema,
1313
1486
  Pe as organizationInsertSchema,
1314
- St as organizationSchema,
1315
- we as organizationTokenQuotaSchema,
1316
- Ee as pageBackgroundSchema,
1317
- bt as parseUserId,
1318
- le as passwordInsertSchema,
1319
- et as passwordSchema,
1320
- h as profileDataSchema,
1321
- at as promptSettingSchema,
1322
- he as refreshTokenInsertSchema,
1323
- rt as refreshTokenSchema,
1324
- fe as resourceServerInsertSchema,
1325
- ct as resourceServerListSchema,
1487
+ ft as organizationSchema,
1488
+ ve as organizationTokenQuotaSchema,
1489
+ he as pageBackgroundSchema,
1490
+ At as parseUserId,
1491
+ _e as passwordInsertSchema,
1492
+ ot as passwordSchema,
1493
+ f as profileDataSchema,
1494
+ rt as promptSettingSchema,
1495
+ fe as refreshTokenInsertSchema,
1496
+ ct as refreshTokenSchema,
1497
+ Ce as resourceServerInsertSchema,
1498
+ dt as resourceServerListSchema,
1326
1499
  Ae as resourceServerOptionsSchema,
1327
- Ce as resourceServerSchema,
1500
+ Ie as resourceServerSchema,
1328
1501
  be as resourceServerScopeSchema,
1329
1502
  R as richTextComponentSchema,
1330
1503
  Ue as roleInsertSchema,
1331
- mt as roleListSchema,
1332
- Ie as rolePermissionInsertSchema,
1333
- pt as rolePermissionListSchema,
1334
- Oe as rolePermissionSchema,
1335
- dt as rolePermissionWithDetailsListSchema,
1336
- Te as rolePermissionWithDetailsSchema,
1504
+ St as roleListSchema,
1505
+ Oe as rolePermissionInsertSchema,
1506
+ gt as rolePermissionListSchema,
1507
+ Te as rolePermissionSchema,
1508
+ ut as rolePermissionWithDetailsListSchema,
1509
+ Ne as rolePermissionWithDetailsSchema,
1337
1510
  Fe as roleSchema,
1338
1511
  O as samlpAddon,
1339
- ce as sessionInsertSchema,
1340
- tt as sessionSchema,
1512
+ pe as sessionInsertSchema,
1513
+ it as sessionSchema,
1341
1514
  nt as signingKeySchema,
1342
- lt as smsProviderSchema,
1515
+ pt as smsProviderSchema,
1343
1516
  _t as smsSendParamsSchema,
1344
- H as startSchema,
1517
+ M as startSchema,
1345
1518
  k as stepNodeSchema,
1346
- W as tenantInsertSchema,
1519
+ z as tenantInsertSchema,
1347
1520
  V as tenantSchema,
1348
1521
  Se as themeInsertSchema,
1349
- it as themeSchema,
1350
- ot as tokenResponseSchema,
1351
- Me as totalsSchema,
1522
+ st as themeSchema,
1523
+ at as tokenResponseSchema,
1524
+ xe as totalsSchema,
1352
1525
  A as userInsertSchema,
1353
- ve as userOrganizationInsertSchema,
1354
- ht as userOrganizationSchema,
1355
- Ne as userPermissionInsertSchema,
1356
- gt as userPermissionListSchema,
1526
+ He as userOrganizationInsertSchema,
1527
+ bt as userOrganizationSchema,
1528
+ ye as userPermissionInsertSchema,
1529
+ mt as userPermissionListSchema,
1357
1530
  Re as userPermissionSchema,
1358
- ut as userPermissionWithDetailsListSchema,
1531
+ ht as userPermissionWithDetailsListSchema,
1359
1532
  Le as userPermissionWithDetailsSchema,
1360
- xe as userResponseSchema,
1533
+ Ke as userResponseSchema,
1361
1534
  De as userRoleInsertSchema,
1362
1535
  Et as userRoleListSchema,
1363
- ye as userRoleSchema,
1364
- f as userSchema,
1365
- Q as verificationMethodsSchema,
1366
- me as widgetSchema
1536
+ we as userRoleSchema,
1537
+ C as userSchema,
1538
+ J as verificationMethodsSchema,
1539
+ Ee as widgetSchema
1367
1540
  };