@authhero/adapter-interfaces 0.89.0 → 0.91.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,12 +1,12 @@
1
1
  import { z as e } from "@hono/zod-openapi";
2
- const xe = e.object({
2
+ const Ge = e.object({
3
3
  start: e.number(),
4
4
  limit: e.number(),
5
5
  length: e.number()
6
6
  }), i = e.object({
7
7
  created_at: e.string(),
8
8
  updated_at: e.string()
9
- }), f = e.object({
9
+ }), S = e.object({
10
10
  email: e.string().optional(),
11
11
  email_verified: e.boolean().optional(),
12
12
  name: e.string().optional(),
@@ -15,7 +15,7 @@ const xe = e.object({
15
15
  phone_number: e.string().optional(),
16
16
  phone_verified: e.boolean().optional(),
17
17
  family_name: e.string().optional()
18
- }).catchall(e.any()), b = e.object({
18
+ }).catchall(e.any()), f = e.object({
19
19
  connection: e.string(),
20
20
  user_id: e.string(),
21
21
  provider: e.string(),
@@ -23,7 +23,7 @@ const xe = e.object({
23
23
  access_token: e.string().optional(),
24
24
  access_token_secret: e.string().optional(),
25
25
  refresh_token: e.string().optional(),
26
- profileData: f.optional()
26
+ profileData: S.optional()
27
27
  }), c = e.object({
28
28
  email: e.string().optional().transform((t) => t && t.toLowerCase()),
29
29
  username: e.string().optional(),
@@ -39,7 +39,7 @@ const xe = e.object({
39
39
  user_id: e.string().optional(),
40
40
  app_metadata: e.any().default({}).optional(),
41
41
  user_metadata: e.any().default({}).optional()
42
- }), A = c.extend({
42
+ }), b = c.extend({
43
43
  email_verified: e.boolean().default(!1),
44
44
  verify_email: e.boolean().optional(),
45
45
  last_ip: e.string().optional(),
@@ -48,80 +48,28 @@ const xe = e.object({
48
48
  provider: e.string().default("email"),
49
49
  connection: e.string().default("email"),
50
50
  is_social: e.boolean().optional()
51
- }), C = e.object({
52
- ...A.shape,
51
+ }), A = e.object({
52
+ ...b.shape,
53
53
  ...i.shape,
54
54
  user_id: e.string(),
55
55
  is_social: e.boolean(),
56
56
  email: e.string().optional(),
57
57
  login_count: e.number().default(0),
58
- identities: e.array(b).optional()
59
- }), Ge = C, Ke = c.extend({
58
+ identities: e.array(f).optional()
59
+ }), xe = A, Ke = c.extend({
60
60
  login_count: e.number(),
61
61
  multifactor: e.array(e.string()).optional(),
62
62
  last_ip: e.string().optional(),
63
63
  last_login: e.string().optional(),
64
64
  user_id: e.string()
65
65
  }).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
- let _ = (t = 21) => {
67
- let n = "", s = crypto.getRandomValues(new Uint8Array(t));
66
+ let C = (t = 21) => {
67
+ let n = "", r = crypto.getRandomValues(new Uint8Array(t));
68
68
  for (; t--; )
69
- n += I[s[t] & 63];
69
+ n += I[r[t] & 63];
70
70
  return n;
71
71
  };
72
72
  const O = e.object({
73
- audience: e.string().optional(),
74
- recipient: e.string().optional(),
75
- createUpnClaim: e.boolean().optional(),
76
- mapUnknownClaimsAsIs: e.boolean().optional(),
77
- passthroughClaimsWithNoMapping: e.boolean().optional(),
78
- mapIdentities: e.boolean().optional(),
79
- signatureAlgorithm: e.string().optional(),
80
- digestAlgorithm: e.string().optional(),
81
- issuer: e.string().optional(),
82
- destination: e.string().optional(),
83
- lifetimeInSeconds: e.number().optional(),
84
- signResponse: e.boolean().optional(),
85
- nameIdentifierFormat: e.string().optional(),
86
- nameIdentifierProbes: e.array(e.string()).optional(),
87
- authnContextClassRef: e.string().optional(),
88
- mappings: e.record(e.string()).optional()
89
- }), T = e.object({
90
- id: e.string(),
91
- name: e.string(),
92
- callbacks: e.array(e.string()).default([]).optional().openapi({
93
- description: "Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."
94
- }),
95
- allowed_origins: e.array(e.string()).default([]).optional().openapi({
96
- description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."
97
- }),
98
- web_origins: e.array(e.string()).default([]).optional().openapi({
99
- description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
100
- }),
101
- allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
102
- description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
103
- }),
104
- allowed_clients: e.array(e.string()).default([]).optional().openapi({
105
- description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
106
- }),
107
- addons: e.object({
108
- samlp: O.optional()
109
- }).default({}).optional().openapi({
110
- description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
111
- }),
112
- email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
113
- description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
114
- }),
115
- client_secret: e.string().default(() => _()).optional(),
116
- disable_sign_ups: e.boolean().optional().default(!1).openapi({
117
- description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
118
- }),
119
- client_metadata: e.record(e.string().length(255)).optional()
120
- }), N = e.object({
121
- created_at: e.string().transform((t) => t === null ? "" : t),
122
- updated_at: e.string().transform((t) => t === null ? "" : t),
123
- ...T.shape
124
- }), y = e.object({
125
73
  client_id: e.string().openapi({
126
74
  description: "ID of this client."
127
75
  }),
@@ -134,7 +82,7 @@ const O = e.object({
134
82
  global: e.boolean().default(!1).openapi({
135
83
  description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
136
84
  }),
137
- client_secret: e.string().default(() => _()).optional().openapi({
85
+ client_secret: e.string().default(() => C()).optional().openapi({
138
86
  description: "Client secret (which you must not make public)."
139
87
  }),
140
88
  app_type: e.enum([
@@ -288,20 +236,52 @@ const O = e.object({
288
236
  description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
289
237
  }),
290
238
  token_quota: e.record(e.any()).default({}).optional()
291
- }), Be = e.object({
239
+ }), T = e.object({
292
240
  created_at: e.string(),
293
241
  updated_at: e.string(),
294
- ...y.shape
295
- }), a = e.object({
242
+ ...O.shape
243
+ }), N = e.object({
244
+ client_id: e.string().min(1).openapi({
245
+ description: "ID of the client."
246
+ }),
247
+ audience: e.string().min(1).openapi({
248
+ description: "The audience (API identifier) of this client grant."
249
+ }),
250
+ scope: e.array(e.string()).optional().openapi({
251
+ description: "Scopes allowed for this client grant."
252
+ }),
253
+ organization_usage: e.enum(["deny", "allow", "require"]).optional().openapi({
254
+ description: "Defines whether organizations can be used with client credentials exchanges for this grant."
255
+ }),
256
+ allow_any_organization: e.boolean().optional().openapi({
257
+ description: "If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."
258
+ }),
259
+ is_system: e.boolean().optional().openapi({
260
+ description: "If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."
261
+ }),
262
+ subject_type: e.enum(["client", "user"]).optional().openapi({
263
+ description: "The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
264
+ }),
265
+ authorization_details_types: e.array(e.string()).optional().openapi({
266
+ description: "Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
267
+ })
268
+ }), y = e.object({
269
+ id: e.string().openapi({
270
+ description: "ID of the client grant."
271
+ }),
272
+ ...N.shape,
273
+ created_at: e.string().optional(),
274
+ updated_at: e.string().optional()
275
+ }), Be = e.array(y), a = e.object({
296
276
  x: e.number(),
297
277
  y: e.number()
298
278
  });
299
- var p = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(p || {}), d = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(d || {});
300
- const r = e.object({
279
+ var _ = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(_ || {}), p = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(p || {});
280
+ const s = e.object({
301
281
  id: e.string(),
302
- category: e.nativeEnum(d),
303
- type: e.nativeEnum(p)
304
- }), R = r.extend({
282
+ category: e.nativeEnum(p),
283
+ type: e.nativeEnum(_)
284
+ }), R = s.extend({
305
285
  category: e.literal(
306
286
  "BLOCK"
307
287
  /* BLOCK */
@@ -313,7 +293,7 @@ const r = e.object({
313
293
  config: e.object({
314
294
  content: e.string()
315
295
  }).passthrough()
316
- }), L = r.extend({
296
+ }), L = s.extend({
317
297
  category: e.literal(
318
298
  "BLOCK"
319
299
  /* BLOCK */
@@ -335,7 +315,7 @@ const r = e.object({
335
315
  config: e.object({
336
316
  text: e.string()
337
317
  }).passthrough()
338
- }), D = r.extend({
318
+ }), D = s.extend({
339
319
  category: e.literal(
340
320
  "FIELD"
341
321
  /* FIELD */
@@ -349,7 +329,7 @@ const r = e.object({
349
329
  config: e.object({
350
330
  text: e.string()
351
331
  }).passthrough()
352
- }), w = r.extend({
332
+ }), U = s.extend({
353
333
  category: e.literal(
354
334
  "FIELD"
355
335
  /* FIELD */
@@ -402,16 +382,16 @@ const r = e.object({
402
382
  label: e.string().optional(),
403
383
  placeholder: e.string().optional()
404
384
  }).passthrough()
405
- }), U = e.object({
385
+ }), F = e.object({
406
386
  id: e.string(),
407
387
  category: e.string(),
408
388
  type: e.string()
409
- }).passthrough(), F = e.union([
389
+ }).passthrough(), w = e.union([
410
390
  R,
411
391
  L,
412
392
  D,
413
- w,
414
- U
393
+ U,
394
+ F
415
395
  ]);
416
396
  var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
417
397
  const k = e.object({
@@ -423,7 +403,7 @@ const k = e.object({
423
403
  coordinates: a,
424
404
  alias: e.string().optional(),
425
405
  config: e.object({
426
- components: e.array(F),
406
+ components: e.array(w),
427
407
  next_node: e.string()
428
408
  }).passthrough()
429
409
  }), v = e.object({
@@ -449,10 +429,10 @@ const k = e.object({
449
429
  ]), M = e.object({
450
430
  next_node: e.string(),
451
431
  coordinates: a
452
- }).passthrough(), x = e.object({
432
+ }).passthrough(), G = e.object({
453
433
  resume_flow: e.boolean().optional(),
454
434
  coordinates: a
455
- }).passthrough(), G = e.object({
435
+ }).passthrough(), x = e.object({
456
436
  id: e.string(),
457
437
  name: e.string(),
458
438
  languages: e.object({
@@ -460,24 +440,24 @@ const k = e.object({
460
440
  }).passthrough(),
461
441
  nodes: e.array(H),
462
442
  start: M,
463
- ending: x,
443
+ ending: G,
464
444
  created_at: e.string(),
465
445
  updated_at: e.string(),
466
446
  links: e.object({
467
447
  sdkSrc: e.string().optional(),
468
448
  sdk_src: e.string().optional()
469
449
  }).passthrough()
470
- }).passthrough(), We = G.omit({
450
+ }).passthrough(), We = x.omit({
471
451
  id: !0,
472
452
  created_at: !0,
473
453
  updated_at: !0
474
454
  });
475
- var g = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(u || {}), m = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(m || {});
455
+ var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
476
456
  const K = e.object({
477
457
  client_id: e.string(),
478
458
  act_as: e.string().optional(),
479
- response_type: e.nativeEnum(g).optional(),
480
- response_mode: e.nativeEnum(u).optional(),
459
+ response_type: e.nativeEnum(d).optional(),
460
+ response_mode: e.nativeEnum(g).optional(),
481
461
  redirect_uri: e.string().optional(),
482
462
  audience: e.string().optional(),
483
463
  organization: e.string().optional(),
@@ -485,13 +465,13 @@ const K = e.object({
485
465
  nonce: e.string().optional(),
486
466
  scope: e.string().optional(),
487
467
  prompt: e.string().optional(),
488
- code_challenge_method: e.nativeEnum(m).optional(),
468
+ code_challenge_method: e.nativeEnum(u).optional(),
489
469
  code_challenge: e.string().optional(),
490
470
  username: e.string().optional(),
491
471
  ui_locales: e.string().optional(),
492
472
  // The following fields are not available in Auth0
493
473
  vendor_id: e.string().optional()
494
- }), Xe = e.object({
474
+ }), ze = e.object({
495
475
  colors: e.object({
496
476
  primary: e.string(),
497
477
  page_background: e.object({
@@ -533,11 +513,11 @@ const K = e.object({
533
513
  enabled_clients: e.array(e.string()).default([]).optional(),
534
514
  response_type: e.custom().optional(),
535
515
  response_mode: e.custom().optional()
536
- }), X = e.object({
516
+ }), z = e.object({
537
517
  id: e.string(),
538
518
  created_at: e.string().transform((t) => t === null ? "" : t),
539
519
  updated_at: e.string().transform((t) => t === null ? "" : t)
540
- }).extend(W.shape), z = e.object({
520
+ }).extend(W.shape), X = e.object({
541
521
  name: e.string(),
542
522
  audience: e.string(),
543
523
  sender_email: e.string().email(),
@@ -551,13 +531,16 @@ const K = e.object({
551
531
  }), V = e.object({
552
532
  created_at: e.string().transform((t) => t === null ? "" : t),
553
533
  updated_at: e.string().transform((t) => t === null ? "" : t),
554
- ...z.shape,
534
+ ...X.shape,
555
535
  id: e.string()
556
536
  });
557
537
  e.object({
558
- ...N.shape,
538
+ ...T.shape,
559
539
  tenant: V,
560
- connections: e.array(X)
540
+ connections: e.array(z),
541
+ // Legacy fields for backward compatibility - these are now stored in client_metadata
542
+ disable_sign_ups: e.boolean(),
543
+ email_validation: e.string()
561
544
  });
562
545
  const q = e.enum([
563
546
  "password_reset",
@@ -598,7 +581,7 @@ const q = e.enum([
598
581
  expires_at: e.string(),
599
582
  used_at: e.string().optional(),
600
583
  user_id: e.string().optional()
601
- }), ze = e.object({
584
+ }), Xe = e.object({
602
585
  ...Y.shape,
603
586
  created_at: e.string()
604
587
  }), Q = e.object({
@@ -761,12 +744,12 @@ const q = e.enum([
761
744
  ...i.shape,
762
745
  ...ee.shape,
763
746
  id: e.string()
764
- }), h = e.enum([
747
+ }), m = e.enum([
765
748
  "pre-user-signup",
766
749
  "post-user-registration",
767
750
  "post-user-login"
768
751
  // Potentially other triggers specific to webhooks in the future
769
- ]), E = e.enum([
752
+ ]), h = e.enum([
770
753
  "pre-user-signup",
771
754
  "post-user-registration",
772
755
  "post-user-login"
@@ -777,24 +760,24 @@ const q = e.enum([
777
760
  hook_id: e.string().optional()
778
761
  }, te = e.object({
779
762
  ...l,
780
- trigger_id: h,
763
+ trigger_id: m,
781
764
  url: e.string()
782
765
  }), oe = e.object({
783
766
  ...l,
784
- trigger_id: E,
767
+ trigger_id: h,
785
768
  form_id: e.string()
786
769
  }), Qe = e.union([
787
770
  te,
788
771
  oe
789
772
  ]), ie = e.object({
790
773
  ...l,
791
- trigger_id: h,
774
+ trigger_id: m,
792
775
  ...i.shape,
793
776
  hook_id: e.string(),
794
777
  url: e.string()
795
778
  }), ne = e.object({
796
779
  ...l,
797
- trigger_id: E,
780
+ trigger_id: h,
798
781
  ...i.shape,
799
782
  hook_id: e.string(),
800
783
  form_id: e.string()
@@ -840,7 +823,7 @@ const q = e.enum([
840
823
  request_uri_parameter_supported: e.boolean(),
841
824
  request_parameter_supported: e.boolean(),
842
825
  token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
843
- }), se = e.object({
826
+ }), re = e.object({
844
827
  csrf_token: e.string(),
845
828
  auth0Client: e.string().optional(),
846
829
  authParams: K,
@@ -854,13 +837,13 @@ const q = e.enum([
854
837
  }).openapi({
855
838
  description: "This represents a login sesion"
856
839
  }), et = e.object({
857
- ...se.shape,
840
+ ...re.shape,
858
841
  id: e.string().openapi({
859
842
  description: "This is is used as the state in the universal login"
860
843
  }),
861
844
  created_at: e.string(),
862
845
  updated_at: e.string()
863
- }), re = {
846
+ }), se = {
864
847
  // Network & System
865
848
  ACLS_SUMMARY: "acls_summary",
866
849
  ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
@@ -1028,7 +1011,7 @@ const q = e.enum([
1028
1011
  WARNING_SENDING_NOTIFICATION: "wn",
1029
1012
  WARNING_USER_MANAGEMENT: "wum"
1030
1013
  }, le = e.string().refine(
1031
- (t) => Object.values(re).includes(t),
1014
+ (t) => Object.values(se).includes(t),
1032
1015
  { message: "Invalid log type" }
1033
1016
  ), ce = e.object({
1034
1017
  name: e.string(),
@@ -1067,7 +1050,7 @@ const q = e.enum([
1067
1050
  ..._e.shape,
1068
1051
  created_at: e.string(),
1069
1052
  updated_at: e.string()
1070
- }), S = e.object({
1053
+ }), E = e.object({
1071
1054
  initial_user_agent: e.string().describe("First user agent of the device from which this user logged in"),
1072
1055
  initial_ip: e.string().describe("First IP address associated with this session"),
1073
1056
  initial_asn: e.string().describe("First autonomous system number associated with this session"),
@@ -1082,7 +1065,7 @@ const q = e.enum([
1082
1065
  expires_at: e.string().optional(),
1083
1066
  login_session_id: e.string(),
1084
1067
  idle_expires_at: e.string().optional(),
1085
- device: S.describe(
1068
+ device: E.describe(
1086
1069
  "Metadata related to the device used in the session"
1087
1070
  ),
1088
1071
  clients: e.array(e.string()).describe("List of client details for the session")
@@ -1192,9 +1175,9 @@ const ge = e.object({
1192
1175
  fonts: me,
1193
1176
  page_background: he,
1194
1177
  widget: Ee
1195
- }), st = Se.extend({
1178
+ }), rt = Se.extend({
1196
1179
  themeId: e.string()
1197
- }), rt = e.object({
1180
+ }), st = e.object({
1198
1181
  universal_login_experience: e.enum(["new", "classic"]).default("new"),
1199
1182
  identifier_first: e.boolean().default(!0),
1200
1183
  password_first: e.boolean().default(!1),
@@ -1242,7 +1225,7 @@ const ge = e.object({
1242
1225
  idle_expires_at: e.string().optional(),
1243
1226
  // When the token was last used.
1244
1227
  last_exchanged_at: e.string().optional(),
1245
- device: S,
1228
+ device: E,
1246
1229
  resource_servers: e.array(
1247
1230
  e.object({
1248
1231
  audience: e.string(),
@@ -1274,7 +1257,7 @@ const ge = e.object({
1274
1257
  mtls: e.object({
1275
1258
  bound_access_tokens: e.boolean().optional()
1276
1259
  }).optional()
1277
- }), Ce = e.object({
1260
+ }), Ie = e.object({
1278
1261
  name: e.string(),
1279
1262
  identifier: e.string(),
1280
1263
  scopes: e.array(be).optional(),
@@ -1286,12 +1269,12 @@ const ge = e.object({
1286
1269
  allow_offline_access: e.boolean().optional(),
1287
1270
  verificationKey: e.string().optional(),
1288
1271
  options: Ae.optional()
1289
- }), Ie = e.object({
1272
+ }), Ce = e.object({
1290
1273
  id: e.string().optional(),
1291
- ...Ce.shape,
1274
+ ...Ie.shape,
1292
1275
  created_at: e.string().optional(),
1293
1276
  updated_at: e.string().optional()
1294
- }), dt = e.array(Ie), Oe = e.object({
1277
+ }), dt = e.array(Ce), Oe = e.object({
1295
1278
  role_id: e.string(),
1296
1279
  resource_server_identifier: e.string(),
1297
1280
  permission_name: e.string()
@@ -1331,25 +1314,25 @@ const ge = e.object({
1331
1314
  user_id: e.string(),
1332
1315
  role_id: e.string(),
1333
1316
  organization_id: e.string().optional()
1334
- }), we = e.object({
1317
+ }), Ue = e.object({
1335
1318
  ...De.shape,
1336
1319
  tenant_id: e.string(),
1337
1320
  created_at: e.string().optional()
1338
- }), Et = e.array(we), Ue = e.object({
1321
+ }), Et = e.array(Ue), Fe = e.object({
1339
1322
  name: e.string().min(1).max(50).openapi({
1340
1323
  description: "The name of the role. Cannot include '<' or '>'"
1341
1324
  }),
1342
1325
  description: e.string().max(255).optional().openapi({
1343
1326
  description: "The description of the role"
1344
1327
  })
1345
- }), Fe = e.object({
1328
+ }), we = e.object({
1346
1329
  id: e.string().openapi({
1347
1330
  description: "The unique identifier of the role"
1348
1331
  }),
1349
- ...Ue.shape,
1332
+ ...Fe.shape,
1350
1333
  created_at: e.string().optional(),
1351
1334
  updated_at: e.string().optional()
1352
- }), St = e.array(Fe), je = e.object({
1335
+ }), St = e.array(we), je = e.object({
1353
1336
  logo_url: e.string().optional().openapi({
1354
1337
  description: "URL of the organization's logo"
1355
1338
  }),
@@ -1419,48 +1402,49 @@ const ge = e.object({
1419
1402
  id: e.string()
1420
1403
  });
1421
1404
  function At(t) {
1422
- const [n, s] = t.split("|");
1423
- if (!n || !s)
1405
+ const [n, r] = t.split("|");
1406
+ if (!n || !r)
1424
1407
  throw new Error(`Invalid user_id: ${t}`);
1425
- return { connection: n, id: s };
1408
+ return { connection: n, id: r };
1426
1409
  }
1427
1410
  export {
1428
1411
  ce as Auth0Client,
1429
- u as AuthorizationResponseMode,
1430
- g as AuthorizationResponseType,
1431
- m as CodeChallengeMethod,
1432
- d as ComponentCategory,
1433
- p as ComponentType,
1412
+ g as AuthorizationResponseMode,
1413
+ d as AuthorizationResponseType,
1414
+ u as CodeChallengeMethod,
1415
+ p as ComponentCategory,
1416
+ _ as ComponentType,
1434
1417
  de as GrantType,
1435
- re as LogTypes,
1418
+ se as LogTypes,
1436
1419
  j as NodeType,
1437
- T as applicationInsertSchema,
1438
- N as applicationSchema,
1439
1420
  We as auth0FlowInsertSchema,
1440
- G as auth0FlowSchema,
1441
- Ge as auth0UserResponseSchema,
1421
+ x as auth0FlowSchema,
1422
+ xe as auth0UserResponseSchema,
1442
1423
  K as authParamsSchema,
1443
1424
  c as baseUserSchema,
1444
1425
  ge as bordersSchema,
1445
- Xe as brandingSchema,
1426
+ ze as brandingSchema,
1446
1427
  L as buttonComponentSchema,
1447
- y as clientInsertSchema,
1448
- Be as clientSchema,
1428
+ N as clientGrantInsertSchema,
1429
+ Be as clientGrantListSchema,
1430
+ y as clientGrantSchema,
1431
+ O as clientInsertSchema,
1432
+ T as clientSchema,
1449
1433
  Y as codeInsertSchema,
1450
- ze as codeSchema,
1434
+ Xe as codeSchema,
1451
1435
  q as codeTypeSchema,
1452
1436
  ue as colorsSchema,
1453
- F as componentSchema,
1437
+ w as componentSchema,
1454
1438
  W as connectionInsertSchema,
1455
1439
  B as connectionOptionsSchema,
1456
- X as connectionSchema,
1440
+ z as connectionSchema,
1457
1441
  a as coordinatesSchema,
1458
1442
  Q as customDomainInsertSchema,
1459
1443
  Z as customDomainSchema,
1460
1444
  Ve as customDomainWithTenantIdSchema,
1461
1445
  lt as emailProviderSchema,
1462
- x as endingSchema,
1463
- w as fieldComponentSchema,
1446
+ G as endingSchema,
1447
+ U as fieldComponentSchema,
1464
1448
  v as flowNodeSchema,
1465
1449
  o as fontDetailsSchema,
1466
1450
  me as fontsSchema,
@@ -1468,16 +1452,16 @@ export {
1468
1452
  ee as formInsertSchema,
1469
1453
  $ as formNodeComponentDefinition,
1470
1454
  Ye as formSchema,
1471
- U as genericComponentSchema,
1455
+ F as genericComponentSchema,
1472
1456
  P as genericNodeSchema,
1473
1457
  Qe as hookInsertSchema,
1474
1458
  Je as hookSchema,
1475
- b as identitySchema,
1459
+ f as identitySchema,
1476
1460
  Ze as jwksKeySchema,
1477
1461
  ae as jwksSchema,
1478
1462
  D as legalComponentSchema,
1479
1463
  tt as logSchema,
1480
- se as loginSessionInsertSchema,
1464
+ re as loginSessionInsertSchema,
1481
1465
  et as loginSessionSchema,
1482
1466
  H as nodeSchema,
1483
1467
  $e as openIDConfigurationSchema,
@@ -1490,25 +1474,24 @@ export {
1490
1474
  At as parseUserId,
1491
1475
  _e as passwordInsertSchema,
1492
1476
  ot as passwordSchema,
1493
- f as profileDataSchema,
1494
- rt as promptSettingSchema,
1477
+ S as profileDataSchema,
1478
+ st as promptSettingSchema,
1495
1479
  fe as refreshTokenInsertSchema,
1496
1480
  ct as refreshTokenSchema,
1497
- Ce as resourceServerInsertSchema,
1481
+ Ie as resourceServerInsertSchema,
1498
1482
  dt as resourceServerListSchema,
1499
1483
  Ae as resourceServerOptionsSchema,
1500
- Ie as resourceServerSchema,
1484
+ Ce as resourceServerSchema,
1501
1485
  be as resourceServerScopeSchema,
1502
1486
  R as richTextComponentSchema,
1503
- Ue as roleInsertSchema,
1487
+ Fe as roleInsertSchema,
1504
1488
  St as roleListSchema,
1505
1489
  Oe as rolePermissionInsertSchema,
1506
1490
  gt as rolePermissionListSchema,
1507
1491
  Te as rolePermissionSchema,
1508
1492
  ut as rolePermissionWithDetailsListSchema,
1509
1493
  Ne as rolePermissionWithDetailsSchema,
1510
- Fe as roleSchema,
1511
- O as samlpAddon,
1494
+ we as roleSchema,
1512
1495
  pe as sessionInsertSchema,
1513
1496
  it as sessionSchema,
1514
1497
  nt as signingKeySchema,
@@ -1516,13 +1499,13 @@ export {
1516
1499
  _t as smsSendParamsSchema,
1517
1500
  M as startSchema,
1518
1501
  k as stepNodeSchema,
1519
- z as tenantInsertSchema,
1502
+ X as tenantInsertSchema,
1520
1503
  V as tenantSchema,
1521
1504
  Se as themeInsertSchema,
1522
- st as themeSchema,
1505
+ rt as themeSchema,
1523
1506
  at as tokenResponseSchema,
1524
- xe as totalsSchema,
1525
- A as userInsertSchema,
1507
+ Ge as totalsSchema,
1508
+ b as userInsertSchema,
1526
1509
  He as userOrganizationInsertSchema,
1527
1510
  bt as userOrganizationSchema,
1528
1511
  ye as userPermissionInsertSchema,
@@ -1533,8 +1516,8 @@ export {
1533
1516
  Ke as userResponseSchema,
1534
1517
  De as userRoleInsertSchema,
1535
1518
  Et as userRoleListSchema,
1536
- we as userRoleSchema,
1537
- C as userSchema,
1519
+ Ue as userRoleSchema,
1520
+ A as userSchema,
1538
1521
  J as verificationMethodsSchema,
1539
1522
  Ee as widgetSchema
1540
1523
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.89.0",
14
+ "version": "0.91.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],