@authhero/adapter-interfaces 0.88.0 → 0.90.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,12 +1,12 @@
1
1
  import { z as e } from "@hono/zod-openapi";
2
- const Me = e.object({
2
+ const xe = e.object({
3
3
  start: e.number(),
4
4
  limit: e.number(),
5
5
  length: e.number()
6
- }), o = e.object({
6
+ }), i = e.object({
7
7
  created_at: e.string(),
8
8
  updated_at: e.string()
9
- }), h = e.object({
9
+ }), f = e.object({
10
10
  email: e.string().optional(),
11
11
  email_verified: e.boolean().optional(),
12
12
  name: e.string().optional(),
@@ -23,8 +23,8 @@ const Me = e.object({
23
23
  access_token: e.string().optional(),
24
24
  access_token_secret: e.string().optional(),
25
25
  refresh_token: e.string().optional(),
26
- profileData: h.optional()
27
- }), l = e.object({
26
+ profileData: f.optional()
27
+ }), c = e.object({
28
28
  email: e.string().optional().transform((t) => t && t.toLowerCase()),
29
29
  username: e.string().optional(),
30
30
  phone_number: e.string().optional(),
@@ -39,7 +39,7 @@ const Me = e.object({
39
39
  user_id: e.string().optional(),
40
40
  app_metadata: e.any().default({}).optional(),
41
41
  user_metadata: e.any().default({}).optional()
42
- }), A = l.extend({
42
+ }), A = c.extend({
43
43
  email_verified: e.boolean().default(!1),
44
44
  verify_email: e.boolean().optional(),
45
45
  last_ip: e.string().optional(),
@@ -48,26 +48,26 @@ const Me = e.object({
48
48
  provider: e.string().default("email"),
49
49
  connection: e.string().default("email"),
50
50
  is_social: e.boolean().optional()
51
- }), f = e.object({
51
+ }), C = e.object({
52
52
  ...A.shape,
53
- ...o.shape,
53
+ ...i.shape,
54
54
  user_id: e.string(),
55
55
  is_social: e.boolean(),
56
56
  email: e.string().optional(),
57
57
  login_count: e.number().default(0),
58
58
  identities: e.array(b).optional()
59
- }), Ge = f, xe = l.extend({
59
+ }), Ge = C, Ke = c.extend({
60
60
  login_count: e.number(),
61
61
  multifactor: e.array(e.string()).optional(),
62
62
  last_ip: e.string().optional(),
63
63
  last_login: e.string().optional(),
64
64
  user_id: e.string()
65
- }).catchall(e.any()), C = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
- let I = (t = 21) => {
67
- let i = "", s = crypto.getRandomValues(new Uint8Array(t));
65
+ }).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
+ let _ = (t = 21) => {
67
+ let n = "", s = crypto.getRandomValues(new Uint8Array(t));
68
68
  for (; t--; )
69
- i += C[s[t] & 63];
70
- return i;
69
+ n += I[s[t] & 63];
70
+ return n;
71
71
  };
72
72
  const O = e.object({
73
73
  audience: e.string().optional(),
@@ -112,24 +112,195 @@ const O = e.object({
112
112
  email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
113
113
  description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
114
114
  }),
115
- client_secret: e.string().default(() => I()).optional(),
115
+ client_secret: e.string().default(() => _()).optional(),
116
116
  disable_sign_ups: e.boolean().optional().default(!1).openapi({
117
117
  description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
118
118
  }),
119
119
  client_metadata: e.record(e.string().length(255)).optional()
120
- }), N = e.object({
120
+ }), Be = e.object({
121
121
  created_at: e.string().transform((t) => t === null ? "" : t),
122
122
  updated_at: e.string().transform((t) => t === null ? "" : t),
123
123
  ...T.shape
124
+ }), N = e.object({
125
+ client_id: e.string().openapi({
126
+ description: "ID of this client."
127
+ }),
128
+ name: e.string().min(1).openapi({
129
+ description: "Name of this client (min length: 1 character, does not allow < or >)."
130
+ }),
131
+ description: e.string().max(140).optional().openapi({
132
+ description: "Free text description of this client (max length: 140 characters)."
133
+ }),
134
+ global: e.boolean().default(!1).openapi({
135
+ description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
136
+ }),
137
+ client_secret: e.string().default(() => _()).optional().openapi({
138
+ description: "Client secret (which you must not make public)."
139
+ }),
140
+ app_type: e.enum([
141
+ "native",
142
+ "spa",
143
+ "regular_web",
144
+ "non_interactive",
145
+ "resource_server",
146
+ "express_configuration",
147
+ "rms",
148
+ "box",
149
+ "cloudbees",
150
+ "concur",
151
+ "dropbox",
152
+ "mscrm",
153
+ "echosign",
154
+ "egnyte",
155
+ "newrelic",
156
+ "office365",
157
+ "salesforce",
158
+ "sentry",
159
+ "sharepoint",
160
+ "slack",
161
+ "springcm",
162
+ "zendesk",
163
+ "zoom",
164
+ "sso_integration",
165
+ "oag"
166
+ ]).default("regular_web").optional().openapi({
167
+ description: "The type of application this client represents"
168
+ }),
169
+ logo_uri: e.string().url().optional().openapi({
170
+ description: "URL of the logo to display for this client. Recommended size is 150x150 pixels."
171
+ }),
172
+ is_first_party: e.boolean().default(!1).openapi({
173
+ description: "Whether this client a first party client (true) or not (false)."
174
+ }),
175
+ oidc_conformant: e.boolean().default(!0).openapi({
176
+ description: "Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."
177
+ }),
178
+ callbacks: e.array(e.string()).default([]).optional().openapi({
179
+ description: "Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."
180
+ }),
181
+ allowed_origins: e.array(e.string()).default([]).optional().openapi({
182
+ description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."
183
+ }),
184
+ web_origins: e.array(e.string()).default([]).optional().openapi({
185
+ description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
186
+ }),
187
+ client_aliases: e.array(e.string()).default([]).optional().openapi({
188
+ description: "List of audiences/realms for SAML protocol. Used by the wsfed addon."
189
+ }),
190
+ allowed_clients: e.array(e.string()).default([]).optional().openapi({
191
+ description: "List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."
192
+ }),
193
+ allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
194
+ description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
195
+ }),
196
+ session_transfer: e.record(e.any()).default({}).optional().openapi({
197
+ description: "Native to Web SSO Configuration"
198
+ }),
199
+ oidc_logout: e.record(e.any()).default({}).optional().openapi({
200
+ description: "Configuration for OIDC backchannel logout"
201
+ }),
202
+ grant_types: e.array(e.string()).default([]).optional().openapi({
203
+ description: "List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."
204
+ }),
205
+ jwt_configuration: e.record(e.any()).default({}).optional().openapi({
206
+ description: "Configuration related to JWTs for the client."
207
+ }),
208
+ signing_keys: e.array(e.record(e.any())).default([]).optional().openapi({
209
+ description: "Signing certificates associated with this client."
210
+ }),
211
+ encryption_key: e.record(e.any()).default({}).optional().openapi({
212
+ description: "Encryption used for WsFed responses with this client."
213
+ }),
214
+ sso: e.boolean().default(!1).openapi({
215
+ description: "Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."
216
+ }),
217
+ sso_disabled: e.boolean().default(!0).openapi({
218
+ description: "Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."
219
+ }),
220
+ cross_origin_authentication: e.boolean().default(!1).openapi({
221
+ description: "Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."
222
+ }),
223
+ cross_origin_loc: e.string().url().optional().openapi({
224
+ description: "URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."
225
+ }),
226
+ custom_login_page_on: e.boolean().default(!1).openapi({
227
+ description: "Whether a custom login page is to be used (true) or the default provided login page (false)."
228
+ }),
229
+ custom_login_page: e.string().optional().openapi({
230
+ description: "The content (HTML, CSS, JS) of the custom login page."
231
+ }),
232
+ custom_login_page_preview: e.string().optional().openapi({
233
+ description: "The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"
234
+ }),
235
+ form_template: e.string().optional().openapi({
236
+ description: "HTML form template to be used for WS-Federation."
237
+ }),
238
+ addons: e.record(e.any()).default({}).optional().openapi({
239
+ description: "Addons enabled for this client and their associated configurations."
240
+ }),
241
+ token_endpoint_auth_method: e.enum(["none", "client_secret_post", "client_secret_basic"]).default("client_secret_basic").optional().openapi({
242
+ description: "Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."
243
+ }),
244
+ client_metadata: e.record(e.string().max(255)).default({}).optional().openapi({
245
+ description: 'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'
246
+ }),
247
+ mobile: e.record(e.any()).default({}).optional().openapi({
248
+ description: "Additional configuration for native mobile apps."
249
+ }),
250
+ initiate_login_uri: e.string().url().optional().openapi({
251
+ description: "Initiate login uri, must be https"
252
+ }),
253
+ native_social_login: e.record(e.any()).default({}).optional(),
254
+ refresh_token: e.record(e.any()).default({}).optional().openapi({
255
+ description: "Refresh token configuration"
256
+ }),
257
+ default_organization: e.record(e.any()).default({}).optional().openapi({
258
+ description: "Defines the default Organization ID and flows"
259
+ }),
260
+ organization_usage: e.enum(["deny", "allow", "require"]).default("deny").optional().openapi({
261
+ description: "Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."
262
+ }),
263
+ organization_require_behavior: e.enum(["no_prompt", "pre_login_prompt", "post_login_prompt"]).default("no_prompt").optional().openapi({
264
+ description: "Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."
265
+ }),
266
+ client_authentication_methods: e.record(e.any()).default({}).optional().openapi({
267
+ description: "Defines client authentication methods."
268
+ }),
269
+ require_pushed_authorization_requests: e.boolean().default(!1).openapi({
270
+ description: "Makes the use of Pushed Authorization Requests mandatory for this client"
271
+ }),
272
+ require_proof_of_possession: e.boolean().default(!1).openapi({
273
+ description: "Makes the use of Proof-of-Possession mandatory for this client"
274
+ }),
275
+ signed_request_object: e.record(e.any()).default({}).optional().openapi({
276
+ description: "JWT-secured Authorization Requests (JAR) settings."
277
+ }),
278
+ compliance_level: e.enum([
279
+ "none",
280
+ "fapi1_adv_pkj_par",
281
+ "fapi1_adv_mtls_par",
282
+ "fapi2_sp_pkj_mtls",
283
+ "fapi2_sp_mtls_mtls"
284
+ ]).optional().openapi({
285
+ description: "Defines the compliance level for this client, which may restrict it's capabilities"
286
+ }),
287
+ par_request_expiry: e.number().optional().openapi({
288
+ description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
289
+ }),
290
+ token_quota: e.record(e.any()).default({}).optional()
291
+ }), y = e.object({
292
+ created_at: e.string(),
293
+ updated_at: e.string(),
294
+ ...N.shape
124
295
  }), a = e.object({
125
296
  x: e.number(),
126
297
  y: e.number()
127
298
  });
128
- var c = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(c || {}), p = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(p || {});
299
+ var p = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(p || {}), d = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(d || {});
129
300
  const r = e.object({
130
301
  id: e.string(),
131
- category: e.nativeEnum(p),
132
- type: e.nativeEnum(c)
302
+ category: e.nativeEnum(d),
303
+ type: e.nativeEnum(p)
133
304
  }), R = r.extend({
134
305
  category: e.literal(
135
306
  "BLOCK"
@@ -178,7 +349,7 @@ const r = e.object({
178
349
  config: e.object({
179
350
  text: e.string()
180
351
  }).passthrough()
181
- }), y = r.extend({
352
+ }), w = r.extend({
182
353
  category: e.literal(
183
354
  "FIELD"
184
355
  /* FIELD */
@@ -239,7 +410,7 @@ const r = e.object({
239
410
  R,
240
411
  L,
241
412
  D,
242
- y,
413
+ w,
243
414
  U
244
415
  ]);
245
416
  var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
@@ -255,7 +426,7 @@ const k = e.object({
255
426
  components: e.array(F),
256
427
  next_node: e.string()
257
428
  }).passthrough()
258
- }), w = e.object({
429
+ }), v = e.object({
259
430
  id: e.string(),
260
431
  type: e.literal(
261
432
  "FLOW"
@@ -271,14 +442,14 @@ const k = e.object({
271
442
  id: e.string(),
272
443
  type: e.string(),
273
444
  coordinates: a
274
- }).passthrough(), v = e.union([
445
+ }).passthrough(), H = e.union([
275
446
  k,
276
- w,
447
+ v,
277
448
  P
278
- ]), H = e.object({
449
+ ]), M = e.object({
279
450
  next_node: e.string(),
280
451
  coordinates: a
281
- }).passthrough(), M = e.object({
452
+ }).passthrough(), x = e.object({
282
453
  resume_flow: e.boolean().optional(),
283
454
  coordinates: a
284
455
  }).passthrough(), G = e.object({
@@ -287,26 +458,26 @@ const k = e.object({
287
458
  languages: e.object({
288
459
  primary: e.string()
289
460
  }).passthrough(),
290
- nodes: e.array(v),
291
- start: H,
292
- ending: M,
461
+ nodes: e.array(H),
462
+ start: M,
463
+ ending: x,
293
464
  created_at: e.string(),
294
465
  updated_at: e.string(),
295
466
  links: e.object({
296
467
  sdkSrc: e.string().optional(),
297
468
  sdk_src: e.string().optional()
298
469
  }).passthrough()
299
- }).passthrough(), Ke = G.omit({
470
+ }).passthrough(), We = G.omit({
300
471
  id: !0,
301
472
  created_at: !0,
302
473
  updated_at: !0
303
474
  });
304
- var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
305
- const x = e.object({
475
+ var g = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(u || {}), m = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(m || {});
476
+ const K = e.object({
306
477
  client_id: e.string(),
307
478
  act_as: e.string().optional(),
308
- response_type: e.nativeEnum(d).optional(),
309
- response_mode: e.nativeEnum(g).optional(),
479
+ response_type: e.nativeEnum(g).optional(),
480
+ response_mode: e.nativeEnum(u).optional(),
310
481
  redirect_uri: e.string().optional(),
311
482
  audience: e.string().optional(),
312
483
  organization: e.string().optional(),
@@ -314,13 +485,13 @@ const x = e.object({
314
485
  nonce: e.string().optional(),
315
486
  scope: e.string().optional(),
316
487
  prompt: e.string().optional(),
317
- code_challenge_method: e.nativeEnum(u).optional(),
488
+ code_challenge_method: e.nativeEnum(m).optional(),
318
489
  code_challenge: e.string().optional(),
319
490
  username: e.string().optional(),
320
491
  ui_locales: e.string().optional(),
321
492
  // The following fields are not available in Auth0
322
493
  vendor_id: e.string().optional()
323
- }), Be = e.object({
494
+ }), Xe = e.object({
324
495
  colors: e.object({
325
496
  primary: e.string(),
326
497
  page_background: e.object({
@@ -335,7 +506,7 @@ const x = e.object({
335
506
  font: e.object({
336
507
  url: e.string()
337
508
  }).optional()
338
- }), K = e.object({
509
+ }), B = e.object({
339
510
  kid: e.string().optional(),
340
511
  team_id: e.string().optional(),
341
512
  realms: e.string().optional(),
@@ -354,11 +525,11 @@ const x = e.object({
354
525
  from: e.string().optional(),
355
526
  twilio_sid: e.string().optional(),
356
527
  twilio_token: e.string().optional()
357
- }), B = e.object({
528
+ }), W = e.object({
358
529
  id: e.string().optional(),
359
530
  name: e.string(),
360
531
  strategy: e.string(),
361
- options: K.default({}),
532
+ options: B.default({}),
362
533
  enabled_clients: e.array(e.string()).default([]).optional(),
363
534
  response_type: e.custom().optional(),
364
535
  response_mode: e.custom().optional()
@@ -366,7 +537,7 @@ const x = e.object({
366
537
  id: e.string(),
367
538
  created_at: e.string().transform((t) => t === null ? "" : t),
368
539
  updated_at: e.string().transform((t) => t === null ? "" : t)
369
- }).extend(B.shape), W = e.object({
540
+ }).extend(W.shape), z = e.object({
370
541
  name: e.string(),
371
542
  audience: e.string(),
372
543
  sender_email: e.string().email(),
@@ -380,15 +551,18 @@ const x = e.object({
380
551
  }), V = e.object({
381
552
  created_at: e.string().transform((t) => t === null ? "" : t),
382
553
  updated_at: e.string().transform((t) => t === null ? "" : t),
383
- ...W.shape,
554
+ ...z.shape,
384
555
  id: e.string()
385
556
  });
386
557
  e.object({
387
- ...N.shape,
558
+ ...y.shape,
388
559
  tenant: V,
389
- connections: e.array(X)
560
+ connections: e.array(X),
561
+ // Legacy fields for backward compatibility - these are now stored in client_metadata
562
+ disable_sign_ups: e.boolean(),
563
+ email_validation: e.string()
390
564
  });
391
- const z = e.enum([
565
+ const q = e.enum([
392
566
  "password_reset",
393
567
  "email_verification",
394
568
  "otp",
@@ -405,7 +579,7 @@ const z = e.enum([
405
579
  connection_id: e.string().optional().openapi({
406
580
  description: "The connection that the code is connected to"
407
581
  }),
408
- code_type: z,
582
+ code_type: q,
409
583
  code_verifier: e.string().optional().openapi({
410
584
  description: "The code verifier used in PKCE in outbound flows"
411
585
  }),
@@ -427,10 +601,10 @@ const z = e.enum([
427
601
  expires_at: e.string(),
428
602
  used_at: e.string().optional(),
429
603
  user_id: e.string().optional()
430
- }), Xe = e.object({
604
+ }), ze = e.object({
431
605
  ...Y.shape,
432
606
  created_at: e.string()
433
- }), q = e.object({
607
+ }), Q = e.object({
434
608
  domain: e.string(),
435
609
  custom_domain_id: e.string().optional(),
436
610
  type: e.enum(["auth0_managed_certs", "self_managed_certs"]),
@@ -444,23 +618,23 @@ const z = e.enum([
444
618
  "null"
445
619
  ]).optional(),
446
620
  domain_metadata: e.record(e.string().max(255)).optional()
447
- }), Q = e.object({
621
+ }), J = e.object({
448
622
  name: e.literal("txt"),
449
623
  record: e.string(),
450
624
  domain: e.string()
451
625
  }), Z = e.object({
452
- ...q.shape,
626
+ ...Q.shape,
453
627
  custom_domain_id: e.string(),
454
628
  primary: e.boolean(),
455
629
  status: e.enum(["disabled", "pending", "pending_verification", "ready"]),
456
630
  origin_domain_name: e.string().optional(),
457
631
  verification: e.object({
458
- methods: e.array(Q)
632
+ methods: e.array(J)
459
633
  }).optional(),
460
634
  tls_policy: e.string().optional()
461
- }), We = Z.extend({
635
+ }), Ve = Z.extend({
462
636
  tenant_id: e.string()
463
- }), Ve = e.object({
637
+ }), qe = e.object({
464
638
  id: e.string(),
465
639
  type: e.literal("submit"),
466
640
  label: e.string(),
@@ -469,7 +643,7 @@ const z = e.enum([
469
643
  order: e.number().optional(),
470
644
  visible: e.boolean().optional().default(!0),
471
645
  customizations: e.record(e.string(), e.any()).optional()
472
- }), J = e.discriminatedUnion("type", [
646
+ }), $ = e.discriminatedUnion("type", [
473
647
  e.object({
474
648
  id: e.string(),
475
649
  type: e.literal("RICH_TEXT"),
@@ -512,7 +686,7 @@ const z = e.enum([
512
686
  visible: e.boolean().optional().default(!0)
513
687
  })
514
688
  // Add more component types as needed
515
- ]), $ = e.object({
689
+ ]), ee = e.object({
516
690
  name: e.string().openapi({
517
691
  description: "The name of the form"
518
692
  }),
@@ -563,7 +737,7 @@ const z = e.enum([
563
737
  coordinates: e.object({ x: e.number(), y: e.number() }),
564
738
  alias: e.string().min(1).max(150).optional(),
565
739
  config: e.object({
566
- components: e.array(J),
740
+ components: e.array($),
567
741
  next_node: e.string()
568
742
  })
569
743
  })
@@ -586,48 +760,48 @@ const z = e.enum([
586
760
  style: e.object({ css: e.string().optional() }).optional()
587
761
  }).openapi({
588
762
  description: "Schema for flow-based forms (matches new JSON structure)"
589
- }), ze = e.object({
590
- ...o.shape,
591
- ...$.shape,
763
+ }), Ye = e.object({
764
+ ...i.shape,
765
+ ...ee.shape,
592
766
  id: e.string()
593
- }), E = e.enum([
767
+ }), h = e.enum([
594
768
  "pre-user-signup",
595
769
  "post-user-registration",
596
770
  "post-user-login"
597
771
  // Potentially other triggers specific to webhooks in the future
598
- ]), m = e.enum([
772
+ ]), E = e.enum([
599
773
  "pre-user-signup",
600
774
  "post-user-registration",
601
775
  "post-user-login"
602
- ]), _ = {
776
+ ]), l = {
603
777
  enabled: e.boolean().default(!1),
604
778
  synchronous: e.boolean().default(!1),
605
779
  priority: e.number().optional(),
606
780
  hook_id: e.string().optional()
607
- }, ee = e.object({
608
- ..._,
609
- trigger_id: E,
781
+ }, te = e.object({
782
+ ...l,
783
+ trigger_id: h,
610
784
  url: e.string()
611
- }), te = e.object({
612
- ..._,
613
- trigger_id: m,
614
- form_id: e.string()
615
- }), Ye = e.union([
616
- ee,
617
- te
618
- ]), ne = e.object({
619
- ..._,
785
+ }), oe = e.object({
786
+ ...l,
620
787
  trigger_id: E,
621
- ...o.shape,
788
+ form_id: e.string()
789
+ }), Qe = e.union([
790
+ te,
791
+ oe
792
+ ]), ie = e.object({
793
+ ...l,
794
+ trigger_id: h,
795
+ ...i.shape,
622
796
  hook_id: e.string(),
623
797
  url: e.string()
624
- }), oe = e.object({
625
- ..._,
626
- trigger_id: m,
627
- ...o.shape,
798
+ }), ne = e.object({
799
+ ...l,
800
+ trigger_id: E,
801
+ ...i.shape,
628
802
  hook_id: e.string(),
629
803
  form_id: e.string()
630
- }), qe = e.union([ne, oe]), ie = e.object({
804
+ }), Je = e.union([ie, ne]), ae = e.object({
631
805
  alg: e.enum([
632
806
  "RS256",
633
807
  "RS384",
@@ -646,9 +820,9 @@ const z = e.enum([
646
820
  x5t: e.string().optional(),
647
821
  x5c: e.array(e.string()).optional(),
648
822
  use: e.enum(["sig", "enc"]).optional()
649
- }), Qe = e.object({
650
- keys: e.array(ie)
651
823
  }), Ze = e.object({
824
+ keys: e.array(ae)
825
+ }), $e = e.object({
652
826
  issuer: e.string(),
653
827
  authorization_endpoint: e.string(),
654
828
  token_endpoint: e.string(),
@@ -669,10 +843,10 @@ const z = e.enum([
669
843
  request_uri_parameter_supported: e.boolean(),
670
844
  request_parameter_supported: e.boolean(),
671
845
  token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
672
- }), ae = e.object({
846
+ }), se = e.object({
673
847
  csrf_token: e.string(),
674
848
  auth0Client: e.string().optional(),
675
- authParams: x,
849
+ authParams: K,
676
850
  expires_at: e.string(),
677
851
  deleted_at: e.string().optional(),
678
852
  ip: e.string().optional(),
@@ -682,14 +856,14 @@ const z = e.enum([
682
856
  login_completed: e.boolean().optional().default(!1)
683
857
  }).openapi({
684
858
  description: "This represents a login sesion"
685
- }), Je = e.object({
686
- ...ae.shape,
859
+ }), et = e.object({
860
+ ...se.shape,
687
861
  id: e.string().openapi({
688
862
  description: "This is is used as the state in the universal login"
689
863
  }),
690
864
  created_at: e.string(),
691
865
  updated_at: e.string()
692
- }), se = {
866
+ }), re = {
693
867
  // Network & System
694
868
  ACLS_SUMMARY: "acls_summary",
695
869
  ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
@@ -856,17 +1030,17 @@ const z = e.enum([
856
1030
  WARNING_DURING_LOGIN: "w",
857
1031
  WARNING_SENDING_NOTIFICATION: "wn",
858
1032
  WARNING_USER_MANAGEMENT: "wum"
859
- }, re = e.string().refine(
860
- (t) => Object.values(se).includes(t),
1033
+ }, le = e.string().refine(
1034
+ (t) => Object.values(re).includes(t),
861
1035
  { message: "Invalid log type" }
862
- ), _e = e.object({
1036
+ ), ce = e.object({
863
1037
  name: e.string(),
864
1038
  version: e.string(),
865
1039
  env: e.object({
866
1040
  node: e.string().optional()
867
1041
  }).optional()
868
- }), $e = e.object({
869
- type: re,
1042
+ }), tt = e.object({
1043
+ type: le,
870
1044
  date: e.string(),
871
1045
  description: e.string().optional(),
872
1046
  log_id: e.string().optional(),
@@ -887,13 +1061,13 @@ const z = e.enum([
887
1061
  strategy: e.string().optional(),
888
1062
  strategy_type: e.string().optional(),
889
1063
  hostname: e.string().optional(),
890
- auth0_client: _e.optional()
891
- }), le = e.object({
1064
+ auth0_client: ce.optional()
1065
+ }), _e = e.object({
892
1066
  user_id: e.string(),
893
1067
  password: e.string(),
894
1068
  algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id")
895
- }), et = e.object({
896
- ...le.shape,
1069
+ }), ot = e.object({
1070
+ ..._e.shape,
897
1071
  created_at: e.string(),
898
1072
  updated_at: e.string()
899
1073
  }), S = e.object({
@@ -903,7 +1077,7 @@ const z = e.enum([
903
1077
  last_user_agent: e.string().describe("Last user agent of the device from which this user logged in"),
904
1078
  last_ip: e.string().describe("Last IP address from which this user logged in"),
905
1079
  last_asn: e.string().describe("Last autonomous system number from which this user logged in")
906
- }), ce = e.object({
1080
+ }), pe = e.object({
907
1081
  id: e.string(),
908
1082
  revoked_at: e.string().optional(),
909
1083
  used_at: e.string().optional(),
@@ -915,12 +1089,12 @@ const z = e.enum([
915
1089
  "Metadata related to the device used in the session"
916
1090
  ),
917
1091
  clients: e.array(e.string()).describe("List of client details for the session")
918
- }), tt = e.object({
1092
+ }), it = e.object({
919
1093
  created_at: e.string(),
920
1094
  updated_at: e.string(),
921
1095
  authenticated_at: e.string(),
922
1096
  last_interaction_at: e.string(),
923
- ...ce.shape
1097
+ ...pe.shape
924
1098
  }), nt = e.object({
925
1099
  kid: e.string().openapi({ description: "The key id of the signing key" }),
926
1100
  cert: e.string().openapi({ description: "The public certificate of the signing key" }),
@@ -947,8 +1121,8 @@ const z = e.enum([
947
1121
  description: "The type of the signing key"
948
1122
  })
949
1123
  });
950
- var pe = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(pe || {});
951
- const ot = e.object({
1124
+ var de = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(de || {});
1125
+ const at = e.object({
952
1126
  access_token: e.string(),
953
1127
  id_token: e.string().optional(),
954
1128
  scope: e.string().optional(),
@@ -961,7 +1135,7 @@ e.object({
961
1135
  code: e.string(),
962
1136
  state: e.string().optional()
963
1137
  });
964
- const de = e.object({
1138
+ const ge = e.object({
965
1139
  button_border_radius: e.number(),
966
1140
  button_border_weight: e.number(),
967
1141
  buttons_style: e.enum(["pill", "rounded", "sharp"]),
@@ -971,7 +1145,7 @@ const de = e.object({
971
1145
  show_widget_shadow: e.boolean(),
972
1146
  widget_border_weight: e.number(),
973
1147
  widget_corner_radius: e.number()
974
- }), ge = e.object({
1148
+ }), ue = e.object({
975
1149
  base_focus_color: e.string(),
976
1150
  base_hover_color: e.string(),
977
1151
  body_text: e.string(),
@@ -991,44 +1165,44 @@ const de = e.object({
991
1165
  success: e.string(),
992
1166
  widget_background: e.string(),
993
1167
  widget_border: e.string()
994
- }), n = e.object({
1168
+ }), o = e.object({
995
1169
  bold: e.boolean(),
996
1170
  size: e.number()
997
- }), ue = e.object({
998
- body_text: n,
999
- buttons_text: n,
1171
+ }), me = e.object({
1172
+ body_text: o,
1173
+ buttons_text: o,
1000
1174
  font_url: e.string(),
1001
- input_labels: n,
1002
- links: n,
1175
+ input_labels: o,
1176
+ links: o,
1003
1177
  links_style: e.enum(["normal", "underlined"]),
1004
1178
  reference_text_size: e.number(),
1005
- subtitle: n,
1006
- title: n
1007
- }), Ee = e.object({
1179
+ subtitle: o,
1180
+ title: o
1181
+ }), he = e.object({
1008
1182
  background_color: e.string(),
1009
1183
  background_image_url: e.string(),
1010
1184
  page_layout: e.enum(["center", "left", "right"])
1011
- }), me = e.object({
1185
+ }), Ee = e.object({
1012
1186
  header_text_alignment: e.enum(["center", "left", "right"]),
1013
1187
  logo_height: e.number(),
1014
1188
  logo_position: e.enum(["center", "left", "none", "right"]),
1015
1189
  logo_url: e.string(),
1016
1190
  social_buttons_layout: e.enum(["bottom", "top"])
1017
1191
  }), Se = e.object({
1018
- borders: de,
1019
- colors: ge,
1192
+ borders: ge,
1193
+ colors: ue,
1020
1194
  displayName: e.string(),
1021
- fonts: ue,
1022
- page_background: Ee,
1023
- widget: me
1024
- }), it = Se.extend({
1195
+ fonts: me,
1196
+ page_background: he,
1197
+ widget: Ee
1198
+ }), st = Se.extend({
1025
1199
  themeId: e.string()
1026
- }), at = e.object({
1200
+ }), rt = e.object({
1027
1201
  universal_login_experience: e.enum(["new", "classic"]).default("new"),
1028
1202
  identifier_first: e.boolean().default(!0),
1029
1203
  password_first: e.boolean().default(!1),
1030
1204
  webauthn_platform_first_factor: e.boolean()
1031
- }), st = e.object({
1205
+ }), lt = e.object({
1032
1206
  name: e.string(),
1033
1207
  enabled: e.boolean().optional().default(!0),
1034
1208
  default_from_address: e.string().optional(),
@@ -1058,7 +1232,7 @@ const de = e.object({
1058
1232
  })
1059
1233
  ]),
1060
1234
  settings: e.object({}).optional()
1061
- }), he = e.object({
1235
+ }), fe = e.object({
1062
1236
  // The actual refresh token value (primary key).
1063
1237
  id: e.string(),
1064
1238
  // Link to the session record
@@ -1079,15 +1253,15 @@ const de = e.object({
1079
1253
  })
1080
1254
  ),
1081
1255
  rotating: e.boolean()
1082
- }), rt = e.object({
1256
+ }), ct = e.object({
1083
1257
  // When the refresh token record was created.
1084
1258
  created_at: e.string(),
1085
1259
  // Spread in the rest of the refresh token properties.
1086
- ...he.shape
1260
+ ...fe.shape
1087
1261
  }), _t = e.object({
1088
1262
  to: e.string(),
1089
1263
  message: e.string()
1090
- }), lt = e.object({
1264
+ }), pt = e.object({
1091
1265
  name: e.string(),
1092
1266
  options: e.object({})
1093
1267
  }), be = e.object({
@@ -1103,7 +1277,7 @@ const de = e.object({
1103
1277
  mtls: e.object({
1104
1278
  bound_access_tokens: e.boolean().optional()
1105
1279
  }).optional()
1106
- }), fe = e.object({
1280
+ }), Ce = e.object({
1107
1281
  name: e.string(),
1108
1282
  identifier: e.string(),
1109
1283
  scopes: e.array(be).optional(),
@@ -1115,38 +1289,38 @@ const de = e.object({
1115
1289
  allow_offline_access: e.boolean().optional(),
1116
1290
  verificationKey: e.string().optional(),
1117
1291
  options: Ae.optional()
1118
- }), Ce = e.object({
1292
+ }), Ie = e.object({
1119
1293
  id: e.string().optional(),
1120
- ...fe.shape,
1294
+ ...Ce.shape,
1121
1295
  created_at: e.string().optional(),
1122
1296
  updated_at: e.string().optional()
1123
- }), ct = e.array(Ce), Ie = e.object({
1297
+ }), dt = e.array(Ie), Oe = e.object({
1124
1298
  role_id: e.string(),
1125
1299
  resource_server_identifier: e.string(),
1126
1300
  permission_name: e.string()
1127
- }), Oe = e.object({
1128
- ...Ie.shape,
1301
+ }), Te = e.object({
1302
+ ...Oe.shape,
1129
1303
  tenant_id: e.string(),
1130
1304
  created_at: e.string().optional()
1131
- }), pt = e.array(Oe), Te = e.object({
1305
+ }), gt = e.array(Te), Ne = e.object({
1132
1306
  role_id: e.string(),
1133
1307
  resource_server_identifier: e.string(),
1134
1308
  resource_server_name: e.string(),
1135
1309
  permission_name: e.string(),
1136
1310
  description: e.string().nullable().optional(),
1137
1311
  created_at: e.string().optional()
1138
- }), dt = e.array(
1139
- Te
1140
- ), Ne = e.object({
1312
+ }), ut = e.array(
1313
+ Ne
1314
+ ), ye = e.object({
1141
1315
  user_id: e.string(),
1142
1316
  resource_server_identifier: e.string(),
1143
1317
  permission_name: e.string(),
1144
1318
  organization_id: e.string().optional()
1145
1319
  }), Re = e.object({
1146
- ...Ne.shape,
1320
+ ...ye.shape,
1147
1321
  tenant_id: e.string(),
1148
1322
  created_at: e.string().optional()
1149
- }), gt = e.array(Re), Le = e.object({
1323
+ }), mt = e.array(Re), Le = e.object({
1150
1324
  user_id: e.string(),
1151
1325
  resource_server_identifier: e.string(),
1152
1326
  resource_server_name: e.string(),
@@ -1154,17 +1328,17 @@ const de = e.object({
1154
1328
  description: e.string().nullable().optional(),
1155
1329
  created_at: e.string().optional(),
1156
1330
  organization_id: e.string().optional()
1157
- }), ut = e.array(
1331
+ }), ht = e.array(
1158
1332
  Le
1159
1333
  ), De = e.object({
1160
1334
  user_id: e.string(),
1161
1335
  role_id: e.string(),
1162
1336
  organization_id: e.string().optional()
1163
- }), ye = e.object({
1337
+ }), we = e.object({
1164
1338
  ...De.shape,
1165
1339
  tenant_id: e.string(),
1166
1340
  created_at: e.string().optional()
1167
- }), Et = e.array(ye), Ue = e.object({
1341
+ }), Et = e.array(we), Ue = e.object({
1168
1342
  name: e.string().min(1).max(50).openapi({
1169
1343
  description: "The name of the role. Cannot include '<' or '>'"
1170
1344
  }),
@@ -1178,7 +1352,7 @@ const de = e.object({
1178
1352
  ...Ue.shape,
1179
1353
  created_at: e.string().optional(),
1180
1354
  updated_at: e.string().optional()
1181
- }), mt = e.array(Fe), je = e.object({
1355
+ }), St = e.array(Fe), je = e.object({
1182
1356
  logo_url: e.string().optional().openapi({
1183
1357
  description: "URL of the organization's logo"
1184
1358
  }),
@@ -1203,7 +1377,7 @@ const de = e.object({
1203
1377
  is_signup_enabled: e.boolean().default(!0).openapi({
1204
1378
  description: "Whether signup is enabled for this connection"
1205
1379
  })
1206
- }), we = e.object({
1380
+ }), ve = e.object({
1207
1381
  client_credentials: e.object({
1208
1382
  enforce: e.boolean().default(!1).openapi({
1209
1383
  description: "Whether to enforce token quota limits"
@@ -1230,138 +1404,140 @@ const de = e.object({
1230
1404
  enabled_connections: e.array(ke).default([]).optional().openapi({
1231
1405
  description: "List of enabled connections for the organization"
1232
1406
  }),
1233
- token_quota: we
1234
- }), St = e.object({
1407
+ token_quota: ve
1408
+ }), ft = e.object({
1235
1409
  ...Pe.shape,
1236
- ...o.shape,
1410
+ ...i.shape,
1237
1411
  id: e.string()
1238
- }), ve = e.object({
1412
+ }), He = e.object({
1239
1413
  user_id: e.string().openapi({
1240
1414
  description: "ID of the user"
1241
1415
  }),
1242
1416
  organization_id: e.string().openapi({
1243
1417
  description: "ID of the organization"
1244
1418
  })
1245
- }), ht = e.object({
1246
- ...ve.shape,
1247
- ...o.shape,
1419
+ }), bt = e.object({
1420
+ ...He.shape,
1421
+ ...i.shape,
1248
1422
  id: e.string()
1249
1423
  });
1250
- function bt(t) {
1251
- const [i, s] = t.split("|");
1252
- if (!i || !s)
1424
+ function At(t) {
1425
+ const [n, s] = t.split("|");
1426
+ if (!n || !s)
1253
1427
  throw new Error(`Invalid user_id: ${t}`);
1254
- return { connection: i, id: s };
1428
+ return { connection: n, id: s };
1255
1429
  }
1256
1430
  export {
1257
- _e as Auth0Client,
1258
- g as AuthorizationResponseMode,
1259
- d as AuthorizationResponseType,
1260
- u as CodeChallengeMethod,
1261
- p as ComponentCategory,
1262
- c as ComponentType,
1263
- pe as GrantType,
1264
- se as LogTypes,
1431
+ ce as Auth0Client,
1432
+ u as AuthorizationResponseMode,
1433
+ g as AuthorizationResponseType,
1434
+ m as CodeChallengeMethod,
1435
+ d as ComponentCategory,
1436
+ p as ComponentType,
1437
+ de as GrantType,
1438
+ re as LogTypes,
1265
1439
  j as NodeType,
1266
1440
  T as applicationInsertSchema,
1267
- N as applicationSchema,
1268
- Ke as auth0FlowInsertSchema,
1441
+ Be as applicationSchema,
1442
+ We as auth0FlowInsertSchema,
1269
1443
  G as auth0FlowSchema,
1270
1444
  Ge as auth0UserResponseSchema,
1271
- x as authParamsSchema,
1272
- l as baseUserSchema,
1273
- de as bordersSchema,
1274
- Be as brandingSchema,
1445
+ K as authParamsSchema,
1446
+ c as baseUserSchema,
1447
+ ge as bordersSchema,
1448
+ Xe as brandingSchema,
1275
1449
  L as buttonComponentSchema,
1450
+ N as clientInsertSchema,
1451
+ y as clientSchema,
1276
1452
  Y as codeInsertSchema,
1277
- Xe as codeSchema,
1278
- z as codeTypeSchema,
1279
- ge as colorsSchema,
1453
+ ze as codeSchema,
1454
+ q as codeTypeSchema,
1455
+ ue as colorsSchema,
1280
1456
  F as componentSchema,
1281
- B as connectionInsertSchema,
1282
- K as connectionOptionsSchema,
1457
+ W as connectionInsertSchema,
1458
+ B as connectionOptionsSchema,
1283
1459
  X as connectionSchema,
1284
1460
  a as coordinatesSchema,
1285
- q as customDomainInsertSchema,
1461
+ Q as customDomainInsertSchema,
1286
1462
  Z as customDomainSchema,
1287
- We as customDomainWithTenantIdSchema,
1288
- st as emailProviderSchema,
1289
- M as endingSchema,
1290
- y as fieldComponentSchema,
1291
- w as flowNodeSchema,
1292
- n as fontDetailsSchema,
1293
- ue as fontsSchema,
1294
- Ve as formControlSchema,
1295
- $ as formInsertSchema,
1296
- J as formNodeComponentDefinition,
1297
- ze as formSchema,
1463
+ Ve as customDomainWithTenantIdSchema,
1464
+ lt as emailProviderSchema,
1465
+ x as endingSchema,
1466
+ w as fieldComponentSchema,
1467
+ v as flowNodeSchema,
1468
+ o as fontDetailsSchema,
1469
+ me as fontsSchema,
1470
+ qe as formControlSchema,
1471
+ ee as formInsertSchema,
1472
+ $ as formNodeComponentDefinition,
1473
+ Ye as formSchema,
1298
1474
  U as genericComponentSchema,
1299
1475
  P as genericNodeSchema,
1300
- Ye as hookInsertSchema,
1301
- qe as hookSchema,
1476
+ Qe as hookInsertSchema,
1477
+ Je as hookSchema,
1302
1478
  b as identitySchema,
1303
- Qe as jwksKeySchema,
1304
- ie as jwksSchema,
1479
+ Ze as jwksKeySchema,
1480
+ ae as jwksSchema,
1305
1481
  D as legalComponentSchema,
1306
- $e as logSchema,
1307
- ae as loginSessionInsertSchema,
1308
- Je as loginSessionSchema,
1309
- v as nodeSchema,
1310
- Ze as openIDConfigurationSchema,
1482
+ tt as logSchema,
1483
+ se as loginSessionInsertSchema,
1484
+ et as loginSessionSchema,
1485
+ H as nodeSchema,
1486
+ $e as openIDConfigurationSchema,
1311
1487
  je as organizationBrandingSchema,
1312
1488
  ke as organizationEnabledConnectionSchema,
1313
1489
  Pe as organizationInsertSchema,
1314
- St as organizationSchema,
1315
- we as organizationTokenQuotaSchema,
1316
- Ee as pageBackgroundSchema,
1317
- bt as parseUserId,
1318
- le as passwordInsertSchema,
1319
- et as passwordSchema,
1320
- h as profileDataSchema,
1321
- at as promptSettingSchema,
1322
- he as refreshTokenInsertSchema,
1323
- rt as refreshTokenSchema,
1324
- fe as resourceServerInsertSchema,
1325
- ct as resourceServerListSchema,
1490
+ ft as organizationSchema,
1491
+ ve as organizationTokenQuotaSchema,
1492
+ he as pageBackgroundSchema,
1493
+ At as parseUserId,
1494
+ _e as passwordInsertSchema,
1495
+ ot as passwordSchema,
1496
+ f as profileDataSchema,
1497
+ rt as promptSettingSchema,
1498
+ fe as refreshTokenInsertSchema,
1499
+ ct as refreshTokenSchema,
1500
+ Ce as resourceServerInsertSchema,
1501
+ dt as resourceServerListSchema,
1326
1502
  Ae as resourceServerOptionsSchema,
1327
- Ce as resourceServerSchema,
1503
+ Ie as resourceServerSchema,
1328
1504
  be as resourceServerScopeSchema,
1329
1505
  R as richTextComponentSchema,
1330
1506
  Ue as roleInsertSchema,
1331
- mt as roleListSchema,
1332
- Ie as rolePermissionInsertSchema,
1333
- pt as rolePermissionListSchema,
1334
- Oe as rolePermissionSchema,
1335
- dt as rolePermissionWithDetailsListSchema,
1336
- Te as rolePermissionWithDetailsSchema,
1507
+ St as roleListSchema,
1508
+ Oe as rolePermissionInsertSchema,
1509
+ gt as rolePermissionListSchema,
1510
+ Te as rolePermissionSchema,
1511
+ ut as rolePermissionWithDetailsListSchema,
1512
+ Ne as rolePermissionWithDetailsSchema,
1337
1513
  Fe as roleSchema,
1338
1514
  O as samlpAddon,
1339
- ce as sessionInsertSchema,
1340
- tt as sessionSchema,
1515
+ pe as sessionInsertSchema,
1516
+ it as sessionSchema,
1341
1517
  nt as signingKeySchema,
1342
- lt as smsProviderSchema,
1518
+ pt as smsProviderSchema,
1343
1519
  _t as smsSendParamsSchema,
1344
- H as startSchema,
1520
+ M as startSchema,
1345
1521
  k as stepNodeSchema,
1346
- W as tenantInsertSchema,
1522
+ z as tenantInsertSchema,
1347
1523
  V as tenantSchema,
1348
1524
  Se as themeInsertSchema,
1349
- it as themeSchema,
1350
- ot as tokenResponseSchema,
1351
- Me as totalsSchema,
1525
+ st as themeSchema,
1526
+ at as tokenResponseSchema,
1527
+ xe as totalsSchema,
1352
1528
  A as userInsertSchema,
1353
- ve as userOrganizationInsertSchema,
1354
- ht as userOrganizationSchema,
1355
- Ne as userPermissionInsertSchema,
1356
- gt as userPermissionListSchema,
1529
+ He as userOrganizationInsertSchema,
1530
+ bt as userOrganizationSchema,
1531
+ ye as userPermissionInsertSchema,
1532
+ mt as userPermissionListSchema,
1357
1533
  Re as userPermissionSchema,
1358
- ut as userPermissionWithDetailsListSchema,
1534
+ ht as userPermissionWithDetailsListSchema,
1359
1535
  Le as userPermissionWithDetailsSchema,
1360
- xe as userResponseSchema,
1536
+ Ke as userResponseSchema,
1361
1537
  De as userRoleInsertSchema,
1362
1538
  Et as userRoleListSchema,
1363
- ye as userRoleSchema,
1364
- f as userSchema,
1365
- Q as verificationMethodsSchema,
1366
- me as widgetSchema
1539
+ we as userRoleSchema,
1540
+ C as userSchema,
1541
+ J as verificationMethodsSchema,
1542
+ Ee as widgetSchema
1367
1543
  };