@authhero/adapter-interfaces 0.88.0 → 0.90.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +595 -185
- package/dist/adapter-interfaces.mjs +405 -229
- package/package.json +1 -1
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
import { z as e } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const xe = e.object({
|
|
3
3
|
start: e.number(),
|
|
4
4
|
limit: e.number(),
|
|
5
5
|
length: e.number()
|
|
6
|
-
}),
|
|
6
|
+
}), i = e.object({
|
|
7
7
|
created_at: e.string(),
|
|
8
8
|
updated_at: e.string()
|
|
9
|
-
}),
|
|
9
|
+
}), f = e.object({
|
|
10
10
|
email: e.string().optional(),
|
|
11
11
|
email_verified: e.boolean().optional(),
|
|
12
12
|
name: e.string().optional(),
|
|
@@ -23,8 +23,8 @@ const Me = e.object({
|
|
|
23
23
|
access_token: e.string().optional(),
|
|
24
24
|
access_token_secret: e.string().optional(),
|
|
25
25
|
refresh_token: e.string().optional(),
|
|
26
|
-
profileData:
|
|
27
|
-
}),
|
|
26
|
+
profileData: f.optional()
|
|
27
|
+
}), c = e.object({
|
|
28
28
|
email: e.string().optional().transform((t) => t && t.toLowerCase()),
|
|
29
29
|
username: e.string().optional(),
|
|
30
30
|
phone_number: e.string().optional(),
|
|
@@ -39,7 +39,7 @@ const Me = e.object({
|
|
|
39
39
|
user_id: e.string().optional(),
|
|
40
40
|
app_metadata: e.any().default({}).optional(),
|
|
41
41
|
user_metadata: e.any().default({}).optional()
|
|
42
|
-
}), A =
|
|
42
|
+
}), A = c.extend({
|
|
43
43
|
email_verified: e.boolean().default(!1),
|
|
44
44
|
verify_email: e.boolean().optional(),
|
|
45
45
|
last_ip: e.string().optional(),
|
|
@@ -48,26 +48,26 @@ const Me = e.object({
|
|
|
48
48
|
provider: e.string().default("email"),
|
|
49
49
|
connection: e.string().default("email"),
|
|
50
50
|
is_social: e.boolean().optional()
|
|
51
|
-
}),
|
|
51
|
+
}), C = e.object({
|
|
52
52
|
...A.shape,
|
|
53
|
-
...
|
|
53
|
+
...i.shape,
|
|
54
54
|
user_id: e.string(),
|
|
55
55
|
is_social: e.boolean(),
|
|
56
56
|
email: e.string().optional(),
|
|
57
57
|
login_count: e.number().default(0),
|
|
58
58
|
identities: e.array(b).optional()
|
|
59
|
-
}), Ge =
|
|
59
|
+
}), Ge = C, Ke = c.extend({
|
|
60
60
|
login_count: e.number(),
|
|
61
61
|
multifactor: e.array(e.string()).optional(),
|
|
62
62
|
last_ip: e.string().optional(),
|
|
63
63
|
last_login: e.string().optional(),
|
|
64
64
|
user_id: e.string()
|
|
65
|
-
}).catchall(e.any()),
|
|
66
|
-
let
|
|
67
|
-
let
|
|
65
|
+
}).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
66
|
+
let _ = (t = 21) => {
|
|
67
|
+
let n = "", s = crypto.getRandomValues(new Uint8Array(t));
|
|
68
68
|
for (; t--; )
|
|
69
|
-
|
|
70
|
-
return
|
|
69
|
+
n += I[s[t] & 63];
|
|
70
|
+
return n;
|
|
71
71
|
};
|
|
72
72
|
const O = e.object({
|
|
73
73
|
audience: e.string().optional(),
|
|
@@ -112,24 +112,195 @@ const O = e.object({
|
|
|
112
112
|
email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
|
|
113
113
|
description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
|
|
114
114
|
}),
|
|
115
|
-
client_secret: e.string().default(() =>
|
|
115
|
+
client_secret: e.string().default(() => _()).optional(),
|
|
116
116
|
disable_sign_ups: e.boolean().optional().default(!1).openapi({
|
|
117
117
|
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
118
118
|
}),
|
|
119
119
|
client_metadata: e.record(e.string().length(255)).optional()
|
|
120
|
-
}),
|
|
120
|
+
}), Be = e.object({
|
|
121
121
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
122
122
|
updated_at: e.string().transform((t) => t === null ? "" : t),
|
|
123
123
|
...T.shape
|
|
124
|
+
}), N = e.object({
|
|
125
|
+
client_id: e.string().openapi({
|
|
126
|
+
description: "ID of this client."
|
|
127
|
+
}),
|
|
128
|
+
name: e.string().min(1).openapi({
|
|
129
|
+
description: "Name of this client (min length: 1 character, does not allow < or >)."
|
|
130
|
+
}),
|
|
131
|
+
description: e.string().max(140).optional().openapi({
|
|
132
|
+
description: "Free text description of this client (max length: 140 characters)."
|
|
133
|
+
}),
|
|
134
|
+
global: e.boolean().default(!1).openapi({
|
|
135
|
+
description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
|
|
136
|
+
}),
|
|
137
|
+
client_secret: e.string().default(() => _()).optional().openapi({
|
|
138
|
+
description: "Client secret (which you must not make public)."
|
|
139
|
+
}),
|
|
140
|
+
app_type: e.enum([
|
|
141
|
+
"native",
|
|
142
|
+
"spa",
|
|
143
|
+
"regular_web",
|
|
144
|
+
"non_interactive",
|
|
145
|
+
"resource_server",
|
|
146
|
+
"express_configuration",
|
|
147
|
+
"rms",
|
|
148
|
+
"box",
|
|
149
|
+
"cloudbees",
|
|
150
|
+
"concur",
|
|
151
|
+
"dropbox",
|
|
152
|
+
"mscrm",
|
|
153
|
+
"echosign",
|
|
154
|
+
"egnyte",
|
|
155
|
+
"newrelic",
|
|
156
|
+
"office365",
|
|
157
|
+
"salesforce",
|
|
158
|
+
"sentry",
|
|
159
|
+
"sharepoint",
|
|
160
|
+
"slack",
|
|
161
|
+
"springcm",
|
|
162
|
+
"zendesk",
|
|
163
|
+
"zoom",
|
|
164
|
+
"sso_integration",
|
|
165
|
+
"oag"
|
|
166
|
+
]).default("regular_web").optional().openapi({
|
|
167
|
+
description: "The type of application this client represents"
|
|
168
|
+
}),
|
|
169
|
+
logo_uri: e.string().url().optional().openapi({
|
|
170
|
+
description: "URL of the logo to display for this client. Recommended size is 150x150 pixels."
|
|
171
|
+
}),
|
|
172
|
+
is_first_party: e.boolean().default(!1).openapi({
|
|
173
|
+
description: "Whether this client a first party client (true) or not (false)."
|
|
174
|
+
}),
|
|
175
|
+
oidc_conformant: e.boolean().default(!0).openapi({
|
|
176
|
+
description: "Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."
|
|
177
|
+
}),
|
|
178
|
+
callbacks: e.array(e.string()).default([]).optional().openapi({
|
|
179
|
+
description: "Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."
|
|
180
|
+
}),
|
|
181
|
+
allowed_origins: e.array(e.string()).default([]).optional().openapi({
|
|
182
|
+
description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."
|
|
183
|
+
}),
|
|
184
|
+
web_origins: e.array(e.string()).default([]).optional().openapi({
|
|
185
|
+
description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
|
|
186
|
+
}),
|
|
187
|
+
client_aliases: e.array(e.string()).default([]).optional().openapi({
|
|
188
|
+
description: "List of audiences/realms for SAML protocol. Used by the wsfed addon."
|
|
189
|
+
}),
|
|
190
|
+
allowed_clients: e.array(e.string()).default([]).optional().openapi({
|
|
191
|
+
description: "List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."
|
|
192
|
+
}),
|
|
193
|
+
allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
|
|
194
|
+
description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
|
|
195
|
+
}),
|
|
196
|
+
session_transfer: e.record(e.any()).default({}).optional().openapi({
|
|
197
|
+
description: "Native to Web SSO Configuration"
|
|
198
|
+
}),
|
|
199
|
+
oidc_logout: e.record(e.any()).default({}).optional().openapi({
|
|
200
|
+
description: "Configuration for OIDC backchannel logout"
|
|
201
|
+
}),
|
|
202
|
+
grant_types: e.array(e.string()).default([]).optional().openapi({
|
|
203
|
+
description: "List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."
|
|
204
|
+
}),
|
|
205
|
+
jwt_configuration: e.record(e.any()).default({}).optional().openapi({
|
|
206
|
+
description: "Configuration related to JWTs for the client."
|
|
207
|
+
}),
|
|
208
|
+
signing_keys: e.array(e.record(e.any())).default([]).optional().openapi({
|
|
209
|
+
description: "Signing certificates associated with this client."
|
|
210
|
+
}),
|
|
211
|
+
encryption_key: e.record(e.any()).default({}).optional().openapi({
|
|
212
|
+
description: "Encryption used for WsFed responses with this client."
|
|
213
|
+
}),
|
|
214
|
+
sso: e.boolean().default(!1).openapi({
|
|
215
|
+
description: "Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."
|
|
216
|
+
}),
|
|
217
|
+
sso_disabled: e.boolean().default(!0).openapi({
|
|
218
|
+
description: "Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."
|
|
219
|
+
}),
|
|
220
|
+
cross_origin_authentication: e.boolean().default(!1).openapi({
|
|
221
|
+
description: "Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."
|
|
222
|
+
}),
|
|
223
|
+
cross_origin_loc: e.string().url().optional().openapi({
|
|
224
|
+
description: "URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."
|
|
225
|
+
}),
|
|
226
|
+
custom_login_page_on: e.boolean().default(!1).openapi({
|
|
227
|
+
description: "Whether a custom login page is to be used (true) or the default provided login page (false)."
|
|
228
|
+
}),
|
|
229
|
+
custom_login_page: e.string().optional().openapi({
|
|
230
|
+
description: "The content (HTML, CSS, JS) of the custom login page."
|
|
231
|
+
}),
|
|
232
|
+
custom_login_page_preview: e.string().optional().openapi({
|
|
233
|
+
description: "The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"
|
|
234
|
+
}),
|
|
235
|
+
form_template: e.string().optional().openapi({
|
|
236
|
+
description: "HTML form template to be used for WS-Federation."
|
|
237
|
+
}),
|
|
238
|
+
addons: e.record(e.any()).default({}).optional().openapi({
|
|
239
|
+
description: "Addons enabled for this client and their associated configurations."
|
|
240
|
+
}),
|
|
241
|
+
token_endpoint_auth_method: e.enum(["none", "client_secret_post", "client_secret_basic"]).default("client_secret_basic").optional().openapi({
|
|
242
|
+
description: "Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."
|
|
243
|
+
}),
|
|
244
|
+
client_metadata: e.record(e.string().max(255)).default({}).optional().openapi({
|
|
245
|
+
description: 'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'
|
|
246
|
+
}),
|
|
247
|
+
mobile: e.record(e.any()).default({}).optional().openapi({
|
|
248
|
+
description: "Additional configuration for native mobile apps."
|
|
249
|
+
}),
|
|
250
|
+
initiate_login_uri: e.string().url().optional().openapi({
|
|
251
|
+
description: "Initiate login uri, must be https"
|
|
252
|
+
}),
|
|
253
|
+
native_social_login: e.record(e.any()).default({}).optional(),
|
|
254
|
+
refresh_token: e.record(e.any()).default({}).optional().openapi({
|
|
255
|
+
description: "Refresh token configuration"
|
|
256
|
+
}),
|
|
257
|
+
default_organization: e.record(e.any()).default({}).optional().openapi({
|
|
258
|
+
description: "Defines the default Organization ID and flows"
|
|
259
|
+
}),
|
|
260
|
+
organization_usage: e.enum(["deny", "allow", "require"]).default("deny").optional().openapi({
|
|
261
|
+
description: "Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."
|
|
262
|
+
}),
|
|
263
|
+
organization_require_behavior: e.enum(["no_prompt", "pre_login_prompt", "post_login_prompt"]).default("no_prompt").optional().openapi({
|
|
264
|
+
description: "Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."
|
|
265
|
+
}),
|
|
266
|
+
client_authentication_methods: e.record(e.any()).default({}).optional().openapi({
|
|
267
|
+
description: "Defines client authentication methods."
|
|
268
|
+
}),
|
|
269
|
+
require_pushed_authorization_requests: e.boolean().default(!1).openapi({
|
|
270
|
+
description: "Makes the use of Pushed Authorization Requests mandatory for this client"
|
|
271
|
+
}),
|
|
272
|
+
require_proof_of_possession: e.boolean().default(!1).openapi({
|
|
273
|
+
description: "Makes the use of Proof-of-Possession mandatory for this client"
|
|
274
|
+
}),
|
|
275
|
+
signed_request_object: e.record(e.any()).default({}).optional().openapi({
|
|
276
|
+
description: "JWT-secured Authorization Requests (JAR) settings."
|
|
277
|
+
}),
|
|
278
|
+
compliance_level: e.enum([
|
|
279
|
+
"none",
|
|
280
|
+
"fapi1_adv_pkj_par",
|
|
281
|
+
"fapi1_adv_mtls_par",
|
|
282
|
+
"fapi2_sp_pkj_mtls",
|
|
283
|
+
"fapi2_sp_mtls_mtls"
|
|
284
|
+
]).optional().openapi({
|
|
285
|
+
description: "Defines the compliance level for this client, which may restrict it's capabilities"
|
|
286
|
+
}),
|
|
287
|
+
par_request_expiry: e.number().optional().openapi({
|
|
288
|
+
description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
|
|
289
|
+
}),
|
|
290
|
+
token_quota: e.record(e.any()).default({}).optional()
|
|
291
|
+
}), y = e.object({
|
|
292
|
+
created_at: e.string(),
|
|
293
|
+
updated_at: e.string(),
|
|
294
|
+
...N.shape
|
|
124
295
|
}), a = e.object({
|
|
125
296
|
x: e.number(),
|
|
126
297
|
y: e.number()
|
|
127
298
|
});
|
|
128
|
-
var
|
|
299
|
+
var p = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(p || {}), d = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(d || {});
|
|
129
300
|
const r = e.object({
|
|
130
301
|
id: e.string(),
|
|
131
|
-
category: e.nativeEnum(
|
|
132
|
-
type: e.nativeEnum(
|
|
302
|
+
category: e.nativeEnum(d),
|
|
303
|
+
type: e.nativeEnum(p)
|
|
133
304
|
}), R = r.extend({
|
|
134
305
|
category: e.literal(
|
|
135
306
|
"BLOCK"
|
|
@@ -178,7 +349,7 @@ const r = e.object({
|
|
|
178
349
|
config: e.object({
|
|
179
350
|
text: e.string()
|
|
180
351
|
}).passthrough()
|
|
181
|
-
}),
|
|
352
|
+
}), w = r.extend({
|
|
182
353
|
category: e.literal(
|
|
183
354
|
"FIELD"
|
|
184
355
|
/* FIELD */
|
|
@@ -239,7 +410,7 @@ const r = e.object({
|
|
|
239
410
|
R,
|
|
240
411
|
L,
|
|
241
412
|
D,
|
|
242
|
-
|
|
413
|
+
w,
|
|
243
414
|
U
|
|
244
415
|
]);
|
|
245
416
|
var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
|
|
@@ -255,7 +426,7 @@ const k = e.object({
|
|
|
255
426
|
components: e.array(F),
|
|
256
427
|
next_node: e.string()
|
|
257
428
|
}).passthrough()
|
|
258
|
-
}),
|
|
429
|
+
}), v = e.object({
|
|
259
430
|
id: e.string(),
|
|
260
431
|
type: e.literal(
|
|
261
432
|
"FLOW"
|
|
@@ -271,14 +442,14 @@ const k = e.object({
|
|
|
271
442
|
id: e.string(),
|
|
272
443
|
type: e.string(),
|
|
273
444
|
coordinates: a
|
|
274
|
-
}).passthrough(),
|
|
445
|
+
}).passthrough(), H = e.union([
|
|
275
446
|
k,
|
|
276
|
-
|
|
447
|
+
v,
|
|
277
448
|
P
|
|
278
|
-
]),
|
|
449
|
+
]), M = e.object({
|
|
279
450
|
next_node: e.string(),
|
|
280
451
|
coordinates: a
|
|
281
|
-
}).passthrough(),
|
|
452
|
+
}).passthrough(), x = e.object({
|
|
282
453
|
resume_flow: e.boolean().optional(),
|
|
283
454
|
coordinates: a
|
|
284
455
|
}).passthrough(), G = e.object({
|
|
@@ -287,26 +458,26 @@ const k = e.object({
|
|
|
287
458
|
languages: e.object({
|
|
288
459
|
primary: e.string()
|
|
289
460
|
}).passthrough(),
|
|
290
|
-
nodes: e.array(
|
|
291
|
-
start:
|
|
292
|
-
ending:
|
|
461
|
+
nodes: e.array(H),
|
|
462
|
+
start: M,
|
|
463
|
+
ending: x,
|
|
293
464
|
created_at: e.string(),
|
|
294
465
|
updated_at: e.string(),
|
|
295
466
|
links: e.object({
|
|
296
467
|
sdkSrc: e.string().optional(),
|
|
297
468
|
sdk_src: e.string().optional()
|
|
298
469
|
}).passthrough()
|
|
299
|
-
}).passthrough(),
|
|
470
|
+
}).passthrough(), We = G.omit({
|
|
300
471
|
id: !0,
|
|
301
472
|
created_at: !0,
|
|
302
473
|
updated_at: !0
|
|
303
474
|
});
|
|
304
|
-
var
|
|
305
|
-
const
|
|
475
|
+
var g = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(u || {}), m = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(m || {});
|
|
476
|
+
const K = e.object({
|
|
306
477
|
client_id: e.string(),
|
|
307
478
|
act_as: e.string().optional(),
|
|
308
|
-
response_type: e.nativeEnum(
|
|
309
|
-
response_mode: e.nativeEnum(
|
|
479
|
+
response_type: e.nativeEnum(g).optional(),
|
|
480
|
+
response_mode: e.nativeEnum(u).optional(),
|
|
310
481
|
redirect_uri: e.string().optional(),
|
|
311
482
|
audience: e.string().optional(),
|
|
312
483
|
organization: e.string().optional(),
|
|
@@ -314,13 +485,13 @@ const x = e.object({
|
|
|
314
485
|
nonce: e.string().optional(),
|
|
315
486
|
scope: e.string().optional(),
|
|
316
487
|
prompt: e.string().optional(),
|
|
317
|
-
code_challenge_method: e.nativeEnum(
|
|
488
|
+
code_challenge_method: e.nativeEnum(m).optional(),
|
|
318
489
|
code_challenge: e.string().optional(),
|
|
319
490
|
username: e.string().optional(),
|
|
320
491
|
ui_locales: e.string().optional(),
|
|
321
492
|
// The following fields are not available in Auth0
|
|
322
493
|
vendor_id: e.string().optional()
|
|
323
|
-
}),
|
|
494
|
+
}), Xe = e.object({
|
|
324
495
|
colors: e.object({
|
|
325
496
|
primary: e.string(),
|
|
326
497
|
page_background: e.object({
|
|
@@ -335,7 +506,7 @@ const x = e.object({
|
|
|
335
506
|
font: e.object({
|
|
336
507
|
url: e.string()
|
|
337
508
|
}).optional()
|
|
338
|
-
}),
|
|
509
|
+
}), B = e.object({
|
|
339
510
|
kid: e.string().optional(),
|
|
340
511
|
team_id: e.string().optional(),
|
|
341
512
|
realms: e.string().optional(),
|
|
@@ -354,11 +525,11 @@ const x = e.object({
|
|
|
354
525
|
from: e.string().optional(),
|
|
355
526
|
twilio_sid: e.string().optional(),
|
|
356
527
|
twilio_token: e.string().optional()
|
|
357
|
-
}),
|
|
528
|
+
}), W = e.object({
|
|
358
529
|
id: e.string().optional(),
|
|
359
530
|
name: e.string(),
|
|
360
531
|
strategy: e.string(),
|
|
361
|
-
options:
|
|
532
|
+
options: B.default({}),
|
|
362
533
|
enabled_clients: e.array(e.string()).default([]).optional(),
|
|
363
534
|
response_type: e.custom().optional(),
|
|
364
535
|
response_mode: e.custom().optional()
|
|
@@ -366,7 +537,7 @@ const x = e.object({
|
|
|
366
537
|
id: e.string(),
|
|
367
538
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
368
539
|
updated_at: e.string().transform((t) => t === null ? "" : t)
|
|
369
|
-
}).extend(
|
|
540
|
+
}).extend(W.shape), z = e.object({
|
|
370
541
|
name: e.string(),
|
|
371
542
|
audience: e.string(),
|
|
372
543
|
sender_email: e.string().email(),
|
|
@@ -380,15 +551,18 @@ const x = e.object({
|
|
|
380
551
|
}), V = e.object({
|
|
381
552
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
382
553
|
updated_at: e.string().transform((t) => t === null ? "" : t),
|
|
383
|
-
...
|
|
554
|
+
...z.shape,
|
|
384
555
|
id: e.string()
|
|
385
556
|
});
|
|
386
557
|
e.object({
|
|
387
|
-
...
|
|
558
|
+
...y.shape,
|
|
388
559
|
tenant: V,
|
|
389
|
-
connections: e.array(X)
|
|
560
|
+
connections: e.array(X),
|
|
561
|
+
// Legacy fields for backward compatibility - these are now stored in client_metadata
|
|
562
|
+
disable_sign_ups: e.boolean(),
|
|
563
|
+
email_validation: e.string()
|
|
390
564
|
});
|
|
391
|
-
const
|
|
565
|
+
const q = e.enum([
|
|
392
566
|
"password_reset",
|
|
393
567
|
"email_verification",
|
|
394
568
|
"otp",
|
|
@@ -405,7 +579,7 @@ const z = e.enum([
|
|
|
405
579
|
connection_id: e.string().optional().openapi({
|
|
406
580
|
description: "The connection that the code is connected to"
|
|
407
581
|
}),
|
|
408
|
-
code_type:
|
|
582
|
+
code_type: q,
|
|
409
583
|
code_verifier: e.string().optional().openapi({
|
|
410
584
|
description: "The code verifier used in PKCE in outbound flows"
|
|
411
585
|
}),
|
|
@@ -427,10 +601,10 @@ const z = e.enum([
|
|
|
427
601
|
expires_at: e.string(),
|
|
428
602
|
used_at: e.string().optional(),
|
|
429
603
|
user_id: e.string().optional()
|
|
430
|
-
}),
|
|
604
|
+
}), ze = e.object({
|
|
431
605
|
...Y.shape,
|
|
432
606
|
created_at: e.string()
|
|
433
|
-
}),
|
|
607
|
+
}), Q = e.object({
|
|
434
608
|
domain: e.string(),
|
|
435
609
|
custom_domain_id: e.string().optional(),
|
|
436
610
|
type: e.enum(["auth0_managed_certs", "self_managed_certs"]),
|
|
@@ -444,23 +618,23 @@ const z = e.enum([
|
|
|
444
618
|
"null"
|
|
445
619
|
]).optional(),
|
|
446
620
|
domain_metadata: e.record(e.string().max(255)).optional()
|
|
447
|
-
}),
|
|
621
|
+
}), J = e.object({
|
|
448
622
|
name: e.literal("txt"),
|
|
449
623
|
record: e.string(),
|
|
450
624
|
domain: e.string()
|
|
451
625
|
}), Z = e.object({
|
|
452
|
-
...
|
|
626
|
+
...Q.shape,
|
|
453
627
|
custom_domain_id: e.string(),
|
|
454
628
|
primary: e.boolean(),
|
|
455
629
|
status: e.enum(["disabled", "pending", "pending_verification", "ready"]),
|
|
456
630
|
origin_domain_name: e.string().optional(),
|
|
457
631
|
verification: e.object({
|
|
458
|
-
methods: e.array(
|
|
632
|
+
methods: e.array(J)
|
|
459
633
|
}).optional(),
|
|
460
634
|
tls_policy: e.string().optional()
|
|
461
|
-
}),
|
|
635
|
+
}), Ve = Z.extend({
|
|
462
636
|
tenant_id: e.string()
|
|
463
|
-
}),
|
|
637
|
+
}), qe = e.object({
|
|
464
638
|
id: e.string(),
|
|
465
639
|
type: e.literal("submit"),
|
|
466
640
|
label: e.string(),
|
|
@@ -469,7 +643,7 @@ const z = e.enum([
|
|
|
469
643
|
order: e.number().optional(),
|
|
470
644
|
visible: e.boolean().optional().default(!0),
|
|
471
645
|
customizations: e.record(e.string(), e.any()).optional()
|
|
472
|
-
}),
|
|
646
|
+
}), $ = e.discriminatedUnion("type", [
|
|
473
647
|
e.object({
|
|
474
648
|
id: e.string(),
|
|
475
649
|
type: e.literal("RICH_TEXT"),
|
|
@@ -512,7 +686,7 @@ const z = e.enum([
|
|
|
512
686
|
visible: e.boolean().optional().default(!0)
|
|
513
687
|
})
|
|
514
688
|
// Add more component types as needed
|
|
515
|
-
]),
|
|
689
|
+
]), ee = e.object({
|
|
516
690
|
name: e.string().openapi({
|
|
517
691
|
description: "The name of the form"
|
|
518
692
|
}),
|
|
@@ -563,7 +737,7 @@ const z = e.enum([
|
|
|
563
737
|
coordinates: e.object({ x: e.number(), y: e.number() }),
|
|
564
738
|
alias: e.string().min(1).max(150).optional(),
|
|
565
739
|
config: e.object({
|
|
566
|
-
components: e.array(
|
|
740
|
+
components: e.array($),
|
|
567
741
|
next_node: e.string()
|
|
568
742
|
})
|
|
569
743
|
})
|
|
@@ -586,48 +760,48 @@ const z = e.enum([
|
|
|
586
760
|
style: e.object({ css: e.string().optional() }).optional()
|
|
587
761
|
}).openapi({
|
|
588
762
|
description: "Schema for flow-based forms (matches new JSON structure)"
|
|
589
|
-
}),
|
|
590
|
-
...
|
|
591
|
-
|
|
763
|
+
}), Ye = e.object({
|
|
764
|
+
...i.shape,
|
|
765
|
+
...ee.shape,
|
|
592
766
|
id: e.string()
|
|
593
|
-
}),
|
|
767
|
+
}), h = e.enum([
|
|
594
768
|
"pre-user-signup",
|
|
595
769
|
"post-user-registration",
|
|
596
770
|
"post-user-login"
|
|
597
771
|
// Potentially other triggers specific to webhooks in the future
|
|
598
|
-
]),
|
|
772
|
+
]), E = e.enum([
|
|
599
773
|
"pre-user-signup",
|
|
600
774
|
"post-user-registration",
|
|
601
775
|
"post-user-login"
|
|
602
|
-
]),
|
|
776
|
+
]), l = {
|
|
603
777
|
enabled: e.boolean().default(!1),
|
|
604
778
|
synchronous: e.boolean().default(!1),
|
|
605
779
|
priority: e.number().optional(),
|
|
606
780
|
hook_id: e.string().optional()
|
|
607
|
-
},
|
|
608
|
-
...
|
|
609
|
-
trigger_id:
|
|
781
|
+
}, te = e.object({
|
|
782
|
+
...l,
|
|
783
|
+
trigger_id: h,
|
|
610
784
|
url: e.string()
|
|
611
|
-
}),
|
|
612
|
-
...
|
|
613
|
-
trigger_id: m,
|
|
614
|
-
form_id: e.string()
|
|
615
|
-
}), Ye = e.union([
|
|
616
|
-
ee,
|
|
617
|
-
te
|
|
618
|
-
]), ne = e.object({
|
|
619
|
-
..._,
|
|
785
|
+
}), oe = e.object({
|
|
786
|
+
...l,
|
|
620
787
|
trigger_id: E,
|
|
621
|
-
|
|
788
|
+
form_id: e.string()
|
|
789
|
+
}), Qe = e.union([
|
|
790
|
+
te,
|
|
791
|
+
oe
|
|
792
|
+
]), ie = e.object({
|
|
793
|
+
...l,
|
|
794
|
+
trigger_id: h,
|
|
795
|
+
...i.shape,
|
|
622
796
|
hook_id: e.string(),
|
|
623
797
|
url: e.string()
|
|
624
|
-
}),
|
|
625
|
-
...
|
|
626
|
-
trigger_id:
|
|
627
|
-
...
|
|
798
|
+
}), ne = e.object({
|
|
799
|
+
...l,
|
|
800
|
+
trigger_id: E,
|
|
801
|
+
...i.shape,
|
|
628
802
|
hook_id: e.string(),
|
|
629
803
|
form_id: e.string()
|
|
630
|
-
}),
|
|
804
|
+
}), Je = e.union([ie, ne]), ae = e.object({
|
|
631
805
|
alg: e.enum([
|
|
632
806
|
"RS256",
|
|
633
807
|
"RS384",
|
|
@@ -646,9 +820,9 @@ const z = e.enum([
|
|
|
646
820
|
x5t: e.string().optional(),
|
|
647
821
|
x5c: e.array(e.string()).optional(),
|
|
648
822
|
use: e.enum(["sig", "enc"]).optional()
|
|
649
|
-
}), Qe = e.object({
|
|
650
|
-
keys: e.array(ie)
|
|
651
823
|
}), Ze = e.object({
|
|
824
|
+
keys: e.array(ae)
|
|
825
|
+
}), $e = e.object({
|
|
652
826
|
issuer: e.string(),
|
|
653
827
|
authorization_endpoint: e.string(),
|
|
654
828
|
token_endpoint: e.string(),
|
|
@@ -669,10 +843,10 @@ const z = e.enum([
|
|
|
669
843
|
request_uri_parameter_supported: e.boolean(),
|
|
670
844
|
request_parameter_supported: e.boolean(),
|
|
671
845
|
token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
|
|
672
|
-
}),
|
|
846
|
+
}), se = e.object({
|
|
673
847
|
csrf_token: e.string(),
|
|
674
848
|
auth0Client: e.string().optional(),
|
|
675
|
-
authParams:
|
|
849
|
+
authParams: K,
|
|
676
850
|
expires_at: e.string(),
|
|
677
851
|
deleted_at: e.string().optional(),
|
|
678
852
|
ip: e.string().optional(),
|
|
@@ -682,14 +856,14 @@ const z = e.enum([
|
|
|
682
856
|
login_completed: e.boolean().optional().default(!1)
|
|
683
857
|
}).openapi({
|
|
684
858
|
description: "This represents a login sesion"
|
|
685
|
-
}),
|
|
686
|
-
...
|
|
859
|
+
}), et = e.object({
|
|
860
|
+
...se.shape,
|
|
687
861
|
id: e.string().openapi({
|
|
688
862
|
description: "This is is used as the state in the universal login"
|
|
689
863
|
}),
|
|
690
864
|
created_at: e.string(),
|
|
691
865
|
updated_at: e.string()
|
|
692
|
-
}),
|
|
866
|
+
}), re = {
|
|
693
867
|
// Network & System
|
|
694
868
|
ACLS_SUMMARY: "acls_summary",
|
|
695
869
|
ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
|
|
@@ -856,17 +1030,17 @@ const z = e.enum([
|
|
|
856
1030
|
WARNING_DURING_LOGIN: "w",
|
|
857
1031
|
WARNING_SENDING_NOTIFICATION: "wn",
|
|
858
1032
|
WARNING_USER_MANAGEMENT: "wum"
|
|
859
|
-
},
|
|
860
|
-
(t) => Object.values(
|
|
1033
|
+
}, le = e.string().refine(
|
|
1034
|
+
(t) => Object.values(re).includes(t),
|
|
861
1035
|
{ message: "Invalid log type" }
|
|
862
|
-
),
|
|
1036
|
+
), ce = e.object({
|
|
863
1037
|
name: e.string(),
|
|
864
1038
|
version: e.string(),
|
|
865
1039
|
env: e.object({
|
|
866
1040
|
node: e.string().optional()
|
|
867
1041
|
}).optional()
|
|
868
|
-
}),
|
|
869
|
-
type:
|
|
1042
|
+
}), tt = e.object({
|
|
1043
|
+
type: le,
|
|
870
1044
|
date: e.string(),
|
|
871
1045
|
description: e.string().optional(),
|
|
872
1046
|
log_id: e.string().optional(),
|
|
@@ -887,13 +1061,13 @@ const z = e.enum([
|
|
|
887
1061
|
strategy: e.string().optional(),
|
|
888
1062
|
strategy_type: e.string().optional(),
|
|
889
1063
|
hostname: e.string().optional(),
|
|
890
|
-
auth0_client:
|
|
891
|
-
}),
|
|
1064
|
+
auth0_client: ce.optional()
|
|
1065
|
+
}), _e = e.object({
|
|
892
1066
|
user_id: e.string(),
|
|
893
1067
|
password: e.string(),
|
|
894
1068
|
algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
895
|
-
}),
|
|
896
|
-
...
|
|
1069
|
+
}), ot = e.object({
|
|
1070
|
+
..._e.shape,
|
|
897
1071
|
created_at: e.string(),
|
|
898
1072
|
updated_at: e.string()
|
|
899
1073
|
}), S = e.object({
|
|
@@ -903,7 +1077,7 @@ const z = e.enum([
|
|
|
903
1077
|
last_user_agent: e.string().describe("Last user agent of the device from which this user logged in"),
|
|
904
1078
|
last_ip: e.string().describe("Last IP address from which this user logged in"),
|
|
905
1079
|
last_asn: e.string().describe("Last autonomous system number from which this user logged in")
|
|
906
|
-
}),
|
|
1080
|
+
}), pe = e.object({
|
|
907
1081
|
id: e.string(),
|
|
908
1082
|
revoked_at: e.string().optional(),
|
|
909
1083
|
used_at: e.string().optional(),
|
|
@@ -915,12 +1089,12 @@ const z = e.enum([
|
|
|
915
1089
|
"Metadata related to the device used in the session"
|
|
916
1090
|
),
|
|
917
1091
|
clients: e.array(e.string()).describe("List of client details for the session")
|
|
918
|
-
}),
|
|
1092
|
+
}), it = e.object({
|
|
919
1093
|
created_at: e.string(),
|
|
920
1094
|
updated_at: e.string(),
|
|
921
1095
|
authenticated_at: e.string(),
|
|
922
1096
|
last_interaction_at: e.string(),
|
|
923
|
-
...
|
|
1097
|
+
...pe.shape
|
|
924
1098
|
}), nt = e.object({
|
|
925
1099
|
kid: e.string().openapi({ description: "The key id of the signing key" }),
|
|
926
1100
|
cert: e.string().openapi({ description: "The public certificate of the signing key" }),
|
|
@@ -947,8 +1121,8 @@ const z = e.enum([
|
|
|
947
1121
|
description: "The type of the signing key"
|
|
948
1122
|
})
|
|
949
1123
|
});
|
|
950
|
-
var
|
|
951
|
-
const
|
|
1124
|
+
var de = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(de || {});
|
|
1125
|
+
const at = e.object({
|
|
952
1126
|
access_token: e.string(),
|
|
953
1127
|
id_token: e.string().optional(),
|
|
954
1128
|
scope: e.string().optional(),
|
|
@@ -961,7 +1135,7 @@ e.object({
|
|
|
961
1135
|
code: e.string(),
|
|
962
1136
|
state: e.string().optional()
|
|
963
1137
|
});
|
|
964
|
-
const
|
|
1138
|
+
const ge = e.object({
|
|
965
1139
|
button_border_radius: e.number(),
|
|
966
1140
|
button_border_weight: e.number(),
|
|
967
1141
|
buttons_style: e.enum(["pill", "rounded", "sharp"]),
|
|
@@ -971,7 +1145,7 @@ const de = e.object({
|
|
|
971
1145
|
show_widget_shadow: e.boolean(),
|
|
972
1146
|
widget_border_weight: e.number(),
|
|
973
1147
|
widget_corner_radius: e.number()
|
|
974
|
-
}),
|
|
1148
|
+
}), ue = e.object({
|
|
975
1149
|
base_focus_color: e.string(),
|
|
976
1150
|
base_hover_color: e.string(),
|
|
977
1151
|
body_text: e.string(),
|
|
@@ -991,44 +1165,44 @@ const de = e.object({
|
|
|
991
1165
|
success: e.string(),
|
|
992
1166
|
widget_background: e.string(),
|
|
993
1167
|
widget_border: e.string()
|
|
994
|
-
}),
|
|
1168
|
+
}), o = e.object({
|
|
995
1169
|
bold: e.boolean(),
|
|
996
1170
|
size: e.number()
|
|
997
|
-
}),
|
|
998
|
-
body_text:
|
|
999
|
-
buttons_text:
|
|
1171
|
+
}), me = e.object({
|
|
1172
|
+
body_text: o,
|
|
1173
|
+
buttons_text: o,
|
|
1000
1174
|
font_url: e.string(),
|
|
1001
|
-
input_labels:
|
|
1002
|
-
links:
|
|
1175
|
+
input_labels: o,
|
|
1176
|
+
links: o,
|
|
1003
1177
|
links_style: e.enum(["normal", "underlined"]),
|
|
1004
1178
|
reference_text_size: e.number(),
|
|
1005
|
-
subtitle:
|
|
1006
|
-
title:
|
|
1007
|
-
}),
|
|
1179
|
+
subtitle: o,
|
|
1180
|
+
title: o
|
|
1181
|
+
}), he = e.object({
|
|
1008
1182
|
background_color: e.string(),
|
|
1009
1183
|
background_image_url: e.string(),
|
|
1010
1184
|
page_layout: e.enum(["center", "left", "right"])
|
|
1011
|
-
}),
|
|
1185
|
+
}), Ee = e.object({
|
|
1012
1186
|
header_text_alignment: e.enum(["center", "left", "right"]),
|
|
1013
1187
|
logo_height: e.number(),
|
|
1014
1188
|
logo_position: e.enum(["center", "left", "none", "right"]),
|
|
1015
1189
|
logo_url: e.string(),
|
|
1016
1190
|
social_buttons_layout: e.enum(["bottom", "top"])
|
|
1017
1191
|
}), Se = e.object({
|
|
1018
|
-
borders:
|
|
1019
|
-
colors:
|
|
1192
|
+
borders: ge,
|
|
1193
|
+
colors: ue,
|
|
1020
1194
|
displayName: e.string(),
|
|
1021
|
-
fonts:
|
|
1022
|
-
page_background:
|
|
1023
|
-
widget:
|
|
1024
|
-
}),
|
|
1195
|
+
fonts: me,
|
|
1196
|
+
page_background: he,
|
|
1197
|
+
widget: Ee
|
|
1198
|
+
}), st = Se.extend({
|
|
1025
1199
|
themeId: e.string()
|
|
1026
|
-
}),
|
|
1200
|
+
}), rt = e.object({
|
|
1027
1201
|
universal_login_experience: e.enum(["new", "classic"]).default("new"),
|
|
1028
1202
|
identifier_first: e.boolean().default(!0),
|
|
1029
1203
|
password_first: e.boolean().default(!1),
|
|
1030
1204
|
webauthn_platform_first_factor: e.boolean()
|
|
1031
|
-
}),
|
|
1205
|
+
}), lt = e.object({
|
|
1032
1206
|
name: e.string(),
|
|
1033
1207
|
enabled: e.boolean().optional().default(!0),
|
|
1034
1208
|
default_from_address: e.string().optional(),
|
|
@@ -1058,7 +1232,7 @@ const de = e.object({
|
|
|
1058
1232
|
})
|
|
1059
1233
|
]),
|
|
1060
1234
|
settings: e.object({}).optional()
|
|
1061
|
-
}),
|
|
1235
|
+
}), fe = e.object({
|
|
1062
1236
|
// The actual refresh token value (primary key).
|
|
1063
1237
|
id: e.string(),
|
|
1064
1238
|
// Link to the session record
|
|
@@ -1079,15 +1253,15 @@ const de = e.object({
|
|
|
1079
1253
|
})
|
|
1080
1254
|
),
|
|
1081
1255
|
rotating: e.boolean()
|
|
1082
|
-
}),
|
|
1256
|
+
}), ct = e.object({
|
|
1083
1257
|
// When the refresh token record was created.
|
|
1084
1258
|
created_at: e.string(),
|
|
1085
1259
|
// Spread in the rest of the refresh token properties.
|
|
1086
|
-
...
|
|
1260
|
+
...fe.shape
|
|
1087
1261
|
}), _t = e.object({
|
|
1088
1262
|
to: e.string(),
|
|
1089
1263
|
message: e.string()
|
|
1090
|
-
}),
|
|
1264
|
+
}), pt = e.object({
|
|
1091
1265
|
name: e.string(),
|
|
1092
1266
|
options: e.object({})
|
|
1093
1267
|
}), be = e.object({
|
|
@@ -1103,7 +1277,7 @@ const de = e.object({
|
|
|
1103
1277
|
mtls: e.object({
|
|
1104
1278
|
bound_access_tokens: e.boolean().optional()
|
|
1105
1279
|
}).optional()
|
|
1106
|
-
}),
|
|
1280
|
+
}), Ce = e.object({
|
|
1107
1281
|
name: e.string(),
|
|
1108
1282
|
identifier: e.string(),
|
|
1109
1283
|
scopes: e.array(be).optional(),
|
|
@@ -1115,38 +1289,38 @@ const de = e.object({
|
|
|
1115
1289
|
allow_offline_access: e.boolean().optional(),
|
|
1116
1290
|
verificationKey: e.string().optional(),
|
|
1117
1291
|
options: Ae.optional()
|
|
1118
|
-
}),
|
|
1292
|
+
}), Ie = e.object({
|
|
1119
1293
|
id: e.string().optional(),
|
|
1120
|
-
...
|
|
1294
|
+
...Ce.shape,
|
|
1121
1295
|
created_at: e.string().optional(),
|
|
1122
1296
|
updated_at: e.string().optional()
|
|
1123
|
-
}),
|
|
1297
|
+
}), dt = e.array(Ie), Oe = e.object({
|
|
1124
1298
|
role_id: e.string(),
|
|
1125
1299
|
resource_server_identifier: e.string(),
|
|
1126
1300
|
permission_name: e.string()
|
|
1127
|
-
}),
|
|
1128
|
-
...
|
|
1301
|
+
}), Te = e.object({
|
|
1302
|
+
...Oe.shape,
|
|
1129
1303
|
tenant_id: e.string(),
|
|
1130
1304
|
created_at: e.string().optional()
|
|
1131
|
-
}),
|
|
1305
|
+
}), gt = e.array(Te), Ne = e.object({
|
|
1132
1306
|
role_id: e.string(),
|
|
1133
1307
|
resource_server_identifier: e.string(),
|
|
1134
1308
|
resource_server_name: e.string(),
|
|
1135
1309
|
permission_name: e.string(),
|
|
1136
1310
|
description: e.string().nullable().optional(),
|
|
1137
1311
|
created_at: e.string().optional()
|
|
1138
|
-
}),
|
|
1139
|
-
|
|
1140
|
-
),
|
|
1312
|
+
}), ut = e.array(
|
|
1313
|
+
Ne
|
|
1314
|
+
), ye = e.object({
|
|
1141
1315
|
user_id: e.string(),
|
|
1142
1316
|
resource_server_identifier: e.string(),
|
|
1143
1317
|
permission_name: e.string(),
|
|
1144
1318
|
organization_id: e.string().optional()
|
|
1145
1319
|
}), Re = e.object({
|
|
1146
|
-
...
|
|
1320
|
+
...ye.shape,
|
|
1147
1321
|
tenant_id: e.string(),
|
|
1148
1322
|
created_at: e.string().optional()
|
|
1149
|
-
}),
|
|
1323
|
+
}), mt = e.array(Re), Le = e.object({
|
|
1150
1324
|
user_id: e.string(),
|
|
1151
1325
|
resource_server_identifier: e.string(),
|
|
1152
1326
|
resource_server_name: e.string(),
|
|
@@ -1154,17 +1328,17 @@ const de = e.object({
|
|
|
1154
1328
|
description: e.string().nullable().optional(),
|
|
1155
1329
|
created_at: e.string().optional(),
|
|
1156
1330
|
organization_id: e.string().optional()
|
|
1157
|
-
}),
|
|
1331
|
+
}), ht = e.array(
|
|
1158
1332
|
Le
|
|
1159
1333
|
), De = e.object({
|
|
1160
1334
|
user_id: e.string(),
|
|
1161
1335
|
role_id: e.string(),
|
|
1162
1336
|
organization_id: e.string().optional()
|
|
1163
|
-
}),
|
|
1337
|
+
}), we = e.object({
|
|
1164
1338
|
...De.shape,
|
|
1165
1339
|
tenant_id: e.string(),
|
|
1166
1340
|
created_at: e.string().optional()
|
|
1167
|
-
}), Et = e.array(
|
|
1341
|
+
}), Et = e.array(we), Ue = e.object({
|
|
1168
1342
|
name: e.string().min(1).max(50).openapi({
|
|
1169
1343
|
description: "The name of the role. Cannot include '<' or '>'"
|
|
1170
1344
|
}),
|
|
@@ -1178,7 +1352,7 @@ const de = e.object({
|
|
|
1178
1352
|
...Ue.shape,
|
|
1179
1353
|
created_at: e.string().optional(),
|
|
1180
1354
|
updated_at: e.string().optional()
|
|
1181
|
-
}),
|
|
1355
|
+
}), St = e.array(Fe), je = e.object({
|
|
1182
1356
|
logo_url: e.string().optional().openapi({
|
|
1183
1357
|
description: "URL of the organization's logo"
|
|
1184
1358
|
}),
|
|
@@ -1203,7 +1377,7 @@ const de = e.object({
|
|
|
1203
1377
|
is_signup_enabled: e.boolean().default(!0).openapi({
|
|
1204
1378
|
description: "Whether signup is enabled for this connection"
|
|
1205
1379
|
})
|
|
1206
|
-
}),
|
|
1380
|
+
}), ve = e.object({
|
|
1207
1381
|
client_credentials: e.object({
|
|
1208
1382
|
enforce: e.boolean().default(!1).openapi({
|
|
1209
1383
|
description: "Whether to enforce token quota limits"
|
|
@@ -1230,138 +1404,140 @@ const de = e.object({
|
|
|
1230
1404
|
enabled_connections: e.array(ke).default([]).optional().openapi({
|
|
1231
1405
|
description: "List of enabled connections for the organization"
|
|
1232
1406
|
}),
|
|
1233
|
-
token_quota:
|
|
1234
|
-
}),
|
|
1407
|
+
token_quota: ve
|
|
1408
|
+
}), ft = e.object({
|
|
1235
1409
|
...Pe.shape,
|
|
1236
|
-
...
|
|
1410
|
+
...i.shape,
|
|
1237
1411
|
id: e.string()
|
|
1238
|
-
}),
|
|
1412
|
+
}), He = e.object({
|
|
1239
1413
|
user_id: e.string().openapi({
|
|
1240
1414
|
description: "ID of the user"
|
|
1241
1415
|
}),
|
|
1242
1416
|
organization_id: e.string().openapi({
|
|
1243
1417
|
description: "ID of the organization"
|
|
1244
1418
|
})
|
|
1245
|
-
}),
|
|
1246
|
-
...
|
|
1247
|
-
...
|
|
1419
|
+
}), bt = e.object({
|
|
1420
|
+
...He.shape,
|
|
1421
|
+
...i.shape,
|
|
1248
1422
|
id: e.string()
|
|
1249
1423
|
});
|
|
1250
|
-
function
|
|
1251
|
-
const [
|
|
1252
|
-
if (!
|
|
1424
|
+
function At(t) {
|
|
1425
|
+
const [n, s] = t.split("|");
|
|
1426
|
+
if (!n || !s)
|
|
1253
1427
|
throw new Error(`Invalid user_id: ${t}`);
|
|
1254
|
-
return { connection:
|
|
1428
|
+
return { connection: n, id: s };
|
|
1255
1429
|
}
|
|
1256
1430
|
export {
|
|
1257
|
-
|
|
1258
|
-
|
|
1259
|
-
|
|
1260
|
-
|
|
1261
|
-
|
|
1262
|
-
|
|
1263
|
-
|
|
1264
|
-
|
|
1431
|
+
ce as Auth0Client,
|
|
1432
|
+
u as AuthorizationResponseMode,
|
|
1433
|
+
g as AuthorizationResponseType,
|
|
1434
|
+
m as CodeChallengeMethod,
|
|
1435
|
+
d as ComponentCategory,
|
|
1436
|
+
p as ComponentType,
|
|
1437
|
+
de as GrantType,
|
|
1438
|
+
re as LogTypes,
|
|
1265
1439
|
j as NodeType,
|
|
1266
1440
|
T as applicationInsertSchema,
|
|
1267
|
-
|
|
1268
|
-
|
|
1441
|
+
Be as applicationSchema,
|
|
1442
|
+
We as auth0FlowInsertSchema,
|
|
1269
1443
|
G as auth0FlowSchema,
|
|
1270
1444
|
Ge as auth0UserResponseSchema,
|
|
1271
|
-
|
|
1272
|
-
|
|
1273
|
-
|
|
1274
|
-
|
|
1445
|
+
K as authParamsSchema,
|
|
1446
|
+
c as baseUserSchema,
|
|
1447
|
+
ge as bordersSchema,
|
|
1448
|
+
Xe as brandingSchema,
|
|
1275
1449
|
L as buttonComponentSchema,
|
|
1450
|
+
N as clientInsertSchema,
|
|
1451
|
+
y as clientSchema,
|
|
1276
1452
|
Y as codeInsertSchema,
|
|
1277
|
-
|
|
1278
|
-
|
|
1279
|
-
|
|
1453
|
+
ze as codeSchema,
|
|
1454
|
+
q as codeTypeSchema,
|
|
1455
|
+
ue as colorsSchema,
|
|
1280
1456
|
F as componentSchema,
|
|
1281
|
-
|
|
1282
|
-
|
|
1457
|
+
W as connectionInsertSchema,
|
|
1458
|
+
B as connectionOptionsSchema,
|
|
1283
1459
|
X as connectionSchema,
|
|
1284
1460
|
a as coordinatesSchema,
|
|
1285
|
-
|
|
1461
|
+
Q as customDomainInsertSchema,
|
|
1286
1462
|
Z as customDomainSchema,
|
|
1287
|
-
|
|
1288
|
-
|
|
1289
|
-
|
|
1290
|
-
|
|
1291
|
-
|
|
1292
|
-
|
|
1293
|
-
|
|
1294
|
-
|
|
1295
|
-
|
|
1296
|
-
|
|
1297
|
-
|
|
1463
|
+
Ve as customDomainWithTenantIdSchema,
|
|
1464
|
+
lt as emailProviderSchema,
|
|
1465
|
+
x as endingSchema,
|
|
1466
|
+
w as fieldComponentSchema,
|
|
1467
|
+
v as flowNodeSchema,
|
|
1468
|
+
o as fontDetailsSchema,
|
|
1469
|
+
me as fontsSchema,
|
|
1470
|
+
qe as formControlSchema,
|
|
1471
|
+
ee as formInsertSchema,
|
|
1472
|
+
$ as formNodeComponentDefinition,
|
|
1473
|
+
Ye as formSchema,
|
|
1298
1474
|
U as genericComponentSchema,
|
|
1299
1475
|
P as genericNodeSchema,
|
|
1300
|
-
|
|
1301
|
-
|
|
1476
|
+
Qe as hookInsertSchema,
|
|
1477
|
+
Je as hookSchema,
|
|
1302
1478
|
b as identitySchema,
|
|
1303
|
-
|
|
1304
|
-
|
|
1479
|
+
Ze as jwksKeySchema,
|
|
1480
|
+
ae as jwksSchema,
|
|
1305
1481
|
D as legalComponentSchema,
|
|
1306
|
-
|
|
1307
|
-
|
|
1308
|
-
|
|
1309
|
-
|
|
1310
|
-
|
|
1482
|
+
tt as logSchema,
|
|
1483
|
+
se as loginSessionInsertSchema,
|
|
1484
|
+
et as loginSessionSchema,
|
|
1485
|
+
H as nodeSchema,
|
|
1486
|
+
$e as openIDConfigurationSchema,
|
|
1311
1487
|
je as organizationBrandingSchema,
|
|
1312
1488
|
ke as organizationEnabledConnectionSchema,
|
|
1313
1489
|
Pe as organizationInsertSchema,
|
|
1314
|
-
|
|
1315
|
-
|
|
1316
|
-
|
|
1317
|
-
|
|
1318
|
-
|
|
1319
|
-
|
|
1320
|
-
|
|
1321
|
-
|
|
1322
|
-
|
|
1323
|
-
|
|
1324
|
-
|
|
1325
|
-
|
|
1490
|
+
ft as organizationSchema,
|
|
1491
|
+
ve as organizationTokenQuotaSchema,
|
|
1492
|
+
he as pageBackgroundSchema,
|
|
1493
|
+
At as parseUserId,
|
|
1494
|
+
_e as passwordInsertSchema,
|
|
1495
|
+
ot as passwordSchema,
|
|
1496
|
+
f as profileDataSchema,
|
|
1497
|
+
rt as promptSettingSchema,
|
|
1498
|
+
fe as refreshTokenInsertSchema,
|
|
1499
|
+
ct as refreshTokenSchema,
|
|
1500
|
+
Ce as resourceServerInsertSchema,
|
|
1501
|
+
dt as resourceServerListSchema,
|
|
1326
1502
|
Ae as resourceServerOptionsSchema,
|
|
1327
|
-
|
|
1503
|
+
Ie as resourceServerSchema,
|
|
1328
1504
|
be as resourceServerScopeSchema,
|
|
1329
1505
|
R as richTextComponentSchema,
|
|
1330
1506
|
Ue as roleInsertSchema,
|
|
1331
|
-
|
|
1332
|
-
|
|
1333
|
-
|
|
1334
|
-
|
|
1335
|
-
|
|
1336
|
-
|
|
1507
|
+
St as roleListSchema,
|
|
1508
|
+
Oe as rolePermissionInsertSchema,
|
|
1509
|
+
gt as rolePermissionListSchema,
|
|
1510
|
+
Te as rolePermissionSchema,
|
|
1511
|
+
ut as rolePermissionWithDetailsListSchema,
|
|
1512
|
+
Ne as rolePermissionWithDetailsSchema,
|
|
1337
1513
|
Fe as roleSchema,
|
|
1338
1514
|
O as samlpAddon,
|
|
1339
|
-
|
|
1340
|
-
|
|
1515
|
+
pe as sessionInsertSchema,
|
|
1516
|
+
it as sessionSchema,
|
|
1341
1517
|
nt as signingKeySchema,
|
|
1342
|
-
|
|
1518
|
+
pt as smsProviderSchema,
|
|
1343
1519
|
_t as smsSendParamsSchema,
|
|
1344
|
-
|
|
1520
|
+
M as startSchema,
|
|
1345
1521
|
k as stepNodeSchema,
|
|
1346
|
-
|
|
1522
|
+
z as tenantInsertSchema,
|
|
1347
1523
|
V as tenantSchema,
|
|
1348
1524
|
Se as themeInsertSchema,
|
|
1349
|
-
|
|
1350
|
-
|
|
1351
|
-
|
|
1525
|
+
st as themeSchema,
|
|
1526
|
+
at as tokenResponseSchema,
|
|
1527
|
+
xe as totalsSchema,
|
|
1352
1528
|
A as userInsertSchema,
|
|
1353
|
-
|
|
1354
|
-
|
|
1355
|
-
|
|
1356
|
-
|
|
1529
|
+
He as userOrganizationInsertSchema,
|
|
1530
|
+
bt as userOrganizationSchema,
|
|
1531
|
+
ye as userPermissionInsertSchema,
|
|
1532
|
+
mt as userPermissionListSchema,
|
|
1357
1533
|
Re as userPermissionSchema,
|
|
1358
|
-
|
|
1534
|
+
ht as userPermissionWithDetailsListSchema,
|
|
1359
1535
|
Le as userPermissionWithDetailsSchema,
|
|
1360
|
-
|
|
1536
|
+
Ke as userResponseSchema,
|
|
1361
1537
|
De as userRoleInsertSchema,
|
|
1362
1538
|
Et as userRoleListSchema,
|
|
1363
|
-
|
|
1364
|
-
|
|
1365
|
-
|
|
1366
|
-
|
|
1539
|
+
we as userRoleSchema,
|
|
1540
|
+
C as userSchema,
|
|
1541
|
+
J as verificationMethodsSchema,
|
|
1542
|
+
Ee as widgetSchema
|
|
1367
1543
|
};
|