@authhero/adapter-interfaces 0.9.2 → 0.10.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2927,7 +2927,7 @@ var r = /* @__PURE__ */ Object.freeze({
2927
2927
  ZodError: T
2928
2928
  });
2929
2929
  ht(r);
2930
- const Wn = r.object({
2930
+ const qn = r.object({
2931
2931
  start: r.number(),
2932
2932
  limit: r.number(),
2933
2933
  length: r.number()
@@ -2979,7 +2979,7 @@ const Wn = r.object({
2979
2979
  is_social: r.boolean(),
2980
2980
  login_count: r.number(),
2981
2981
  identities: r.array(yn).optional()
2982
- }), qn = bn, Gn = tt.extend({
2982
+ }), Gn = bn, Hn = tt.extend({
2983
2983
  email: r.string(),
2984
2984
  login_count: r.number(),
2985
2985
  multifactor: r.array(r.string()).optional(),
@@ -2995,7 +2995,7 @@ const Wn = r.object({
2995
2995
  email_validation: r.enum(["enabled", "disabled", "enforced"]).default("enforced"),
2996
2996
  client_secret: r.string().default(""),
2997
2997
  disable_sign_ups: r.boolean().default(!1)
2998
- }), Hn = r.object({
2998
+ }), Kn = r.object({
2999
2999
  created_at: r.string().transform((t) => t === null ? "" : t),
3000
3000
  updated_at: r.string().transform((t) => t === null ? "" : t)
3001
3001
  }).extend(kn.shape);
@@ -3013,7 +3013,7 @@ const we = r.object({
3013
3013
  code_challenge_method: r.nativeEnum(st).optional(),
3014
3014
  code_challenge: r.string().optional(),
3015
3015
  username: r.string().optional()
3016
- }), Kn = r.object({
3016
+ }), Yn = r.object({
3017
3017
  colors: r.object({
3018
3018
  primary: r.string(),
3019
3019
  page_background: r.object({
@@ -3079,9 +3079,9 @@ const we = r.object({
3079
3079
  support_url: r.string().optional(),
3080
3080
  language: r.string().length(2).optional()
3081
3081
  })
3082
- }), Yn = it.extend({
3083
- connections: r.array(at)
3084
3082
  }), Jn = it.extend({
3083
+ connections: r.array(at)
3084
+ }), Fn = it.extend({
3085
3085
  connections: r.array(at.partial())
3086
3086
  }), Sn = r.enum([
3087
3087
  "password_reset",
@@ -3090,7 +3090,7 @@ const we = r.object({
3090
3090
  "oauth2",
3091
3091
  "oauth2_state",
3092
3092
  "ticket"
3093
- ]), Fn = r.object({
3093
+ ]), Tn = r.object({
3094
3094
  code_id: r.string().openapi({
3095
3095
  description: "The code that will be used in for instance an email verification flow"
3096
3096
  }),
@@ -3098,36 +3098,38 @@ const we = r.object({
3098
3098
  description: "The id of the login session that the code is connected to"
3099
3099
  }),
3100
3100
  code_type: Sn,
3101
- created_at: r.string(),
3102
3101
  expires_at: r.string(),
3103
3102
  used_at: r.string().optional()
3104
- }), Tn = r.object({
3103
+ }), Xn = r.object({
3104
+ ...Tn.shape,
3105
+ created_at: r.string()
3106
+ }), jn = r.object({
3105
3107
  domain: r.string(),
3106
3108
  dkim_private_key: r.string().optional(),
3107
3109
  dkim_public_key: r.string().optional(),
3108
3110
  email_api_key: r.string().optional(),
3109
3111
  email_service: r.enum(["mailgun", "mailchannels"])
3110
- }), Xn = $e.extend({
3111
- ...Tn.shape,
3112
+ }), Qn = $e.extend({
3113
+ ...jn.shape,
3112
3114
  id: r.string()
3113
- }), jn = r.object({
3115
+ }), On = r.object({
3114
3116
  trigger_id: r.enum(["post-user-registration", "post-user-login"]),
3115
3117
  enabled: r.boolean().default(!1),
3116
3118
  url: r.string(),
3117
3119
  hook_id: r.string().optional()
3118
- }), Qn = jn.extend({
3120
+ }), er = On.extend({
3119
3121
  ...$e.shape,
3120
3122
  hook_id: r.string()
3121
- }), On = r.object({
3123
+ }), En = r.object({
3122
3124
  alg: r.string(),
3123
3125
  e: r.string(),
3124
3126
  kid: r.string(),
3125
3127
  kty: r.string(),
3126
3128
  n: r.string(),
3127
3129
  use: r.string().optional()
3128
- }), er = r.object({
3129
- keys: r.array(On)
3130
3130
  }), tr = r.object({
3131
+ keys: r.array(En)
3132
+ }), nr = r.object({
3131
3133
  issuer: r.string(),
3132
3134
  authorization_endpoint: r.string(),
3133
3135
  token_endpoint: r.string(),
@@ -3148,24 +3150,24 @@ const we = r.object({
3148
3150
  request_uri_parameter_supported: r.boolean(),
3149
3151
  request_parameter_supported: r.boolean(),
3150
3152
  token_endpoint_auth_signing_alg_values_supported: r.array(r.string())
3151
- }), En = r.object({
3152
- login_id: r.string().openapi({
3153
- description: "This is is used as the state in the universal login"
3154
- }),
3153
+ }), Cn = r.object({
3155
3154
  auth0Client: r.string().optional(),
3156
3155
  authParams: we,
3157
3156
  expires_at: r.string(),
3158
- deleted_at: r.string(),
3157
+ deleted_at: r.string().optional(),
3159
3158
  ip: r.string().optional()
3160
3159
  }).openapi({
3161
3160
  description: "This represents a login sesion"
3162
- }), nr = r.object({
3163
- ...En.shape,
3161
+ }), rr = r.object({
3162
+ ...Cn.shape,
3163
+ login_id: r.string().openapi({
3164
+ description: "This is is used as the state in the universal login"
3165
+ }),
3164
3166
  created_at: r.string(),
3165
3167
  updated_at: r.string()
3166
3168
  });
3167
- var Cn = /* @__PURE__ */ ((t) => (t.SUCCESS_API_OPERATION = "sapi", t.SUCCESS_SILENT_AUTH = "ssa", t.FAILED_SILENT_AUTH = "fsa", t.SUCCESS_SIGNUP = "ss", t.FAILED_SIGNUP = "fs", t.SUCCESS_LOGIN = "s", t.FAILED_LOGIN = "f", t.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", t.SUCCESS_LOGOUT = "slo", t.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", t.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", t.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", t.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", t.CODE_LINK_SENT = "cls", t.NOT_IMPLEMENTED_1 = "seccft", t))(Cn || {});
3168
- const Zn = r.enum([
3169
+ var Zn = /* @__PURE__ */ ((t) => (t.SUCCESS_API_OPERATION = "sapi", t.SUCCESS_SILENT_AUTH = "ssa", t.FAILED_SILENT_AUTH = "fsa", t.SUCCESS_SIGNUP = "ss", t.FAILED_SIGNUP = "fs", t.SUCCESS_LOGIN = "s", t.FAILED_LOGIN = "f", t.FAILED_LOGIN_INCORRECT_PASSWORD = "fp", t.SUCCESS_LOGOUT = "slo", t.SUCCESS_CROSS_ORIGIN_AUTHENTICATION = "scoa", t.FAILED_CROSS_ORIGIN_AUTHENTICATION = "fcoa", t.SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN = "seacft", t.SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN = "serft", t.CODE_LINK_SENT = "cls", t.NOT_IMPLEMENTED_1 = "seccft", t))(Zn || {});
3170
+ const Nn = r.enum([
3169
3171
  "sapi",
3170
3172
  // SUCCESS_API_OPERATION
3171
3173
  "ssa",
@@ -3197,14 +3199,14 @@ const Zn = r.enum([
3197
3199
  "seacft",
3198
3200
  // SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN
3199
3201
  "serft"
3200
- ]), Nn = r.object({
3202
+ ]), In = r.object({
3201
3203
  name: r.string(),
3202
3204
  version: r.string(),
3203
3205
  env: r.object({
3204
3206
  node: r.string().optional()
3205
3207
  }).optional()
3206
- }), rr = r.object({
3207
- type: Zn,
3208
+ }), sr = r.object({
3209
+ type: Nn,
3208
3210
  date: r.string(),
3209
3211
  description: r.string().optional(),
3210
3212
  log_id: r.string().optional(),
@@ -3225,32 +3227,32 @@ const Zn = r.enum([
3225
3227
  strategy: r.string().optional(),
3226
3228
  strategy_type: r.string().optional(),
3227
3229
  hostname: r.string().optional(),
3228
- auth0_client: Nn.optional()
3229
- }), In = r.object({
3230
+ auth0_client: In.optional()
3231
+ }), Rn = r.object({
3230
3232
  user_id: r.string(),
3231
3233
  password: r.string(),
3232
3234
  algorithm: r.enum(["bcrypt", "argon2id"]).default("argon2id")
3233
- }), sr = r.object({
3234
- ...In.shape,
3235
+ }), ar = r.object({
3236
+ ...Rn.shape,
3235
3237
  created_at: r.string(),
3236
3238
  updated_at: r.string()
3237
- }), Rn = r.object({
3239
+ }), An = r.object({
3238
3240
  session_id: r.string(),
3239
3241
  client_id: r.string(),
3240
3242
  expires_at: r.string(),
3241
3243
  used_at: r.string(),
3242
3244
  deleted_at: r.string().optional(),
3243
3245
  user_id: r.string()
3244
- }), ar = r.object({
3245
- created_at: r.string(),
3246
- ...Rn.shape
3247
3246
  }), ir = r.object({
3247
+ created_at: r.string(),
3248
+ ...An.shape
3249
+ }), or = r.object({
3248
3250
  private_key: r.string(),
3249
3251
  public_key: r.string(),
3250
3252
  kid: r.string(),
3251
3253
  created_at: r.string(),
3252
3254
  revoked_at: r.string().optional()
3253
- }), or = r.object({
3255
+ }), cr = r.object({
3254
3256
  kid: r.string().openapi({ description: "The key id of the signing key" }),
3255
3257
  cert: r.string().openapi({ description: "The public certificate of the signing key" }),
3256
3258
  fingerprint: r.string().openapi({ description: "The cert fingerprint" }),
@@ -3269,7 +3271,7 @@ const Zn = r.enum([
3269
3271
  }),
3270
3272
  revoked: r.boolean().optional().openapi({ description: "True if the key is revoked" }),
3271
3273
  revoked_at: r.string().optional().openapi({ description: "The date and time when the key was revoked" })
3272
- }), An = r.object({
3274
+ }), Pn = r.object({
3273
3275
  name: r.string(),
3274
3276
  audience: r.string(),
3275
3277
  sender_email: r.string().email(),
@@ -3279,10 +3281,10 @@ const Zn = r.enum([
3279
3281
  primary_color: r.string().optional(),
3280
3282
  secondary_color: r.string().optional(),
3281
3283
  language: r.string().optional()
3282
- }), cr = An.extend({
3284
+ }), dr = Pn.extend({
3283
3285
  created_at: r.string().transform((t) => t === null ? "" : t),
3284
3286
  updated_at: r.string().transform((t) => t === null ? "" : t)
3285
- }), dr = r.object({
3287
+ }), lr = r.object({
3286
3288
  logoUrl: r.string(),
3287
3289
  loginBackgroundImage: r.string().nullish(),
3288
3290
  style: r.object({
@@ -3301,7 +3303,7 @@ const Zn = r.enum([
3301
3303
  manageSubscriptionsUrl: r.string().optional()
3302
3304
  });
3303
3305
  var ot = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t))(ot || {});
3304
- const De = r.nativeEnum(ot), lr = r.object({
3306
+ const De = r.nativeEnum(ot), ur = r.object({
3305
3307
  grant_type: De.refine(
3306
3308
  (t) => t === "authorization_code"
3307
3309
  /* AuthorizationCode */
@@ -3309,7 +3311,7 @@ const De = r.nativeEnum(ot), lr = r.object({
3309
3311
  code: r.string(),
3310
3312
  client_secret: r.string(),
3311
3313
  client_id: r.string()
3312
- }), ur = r.object({
3314
+ }), pr = r.object({
3313
3315
  grant_type: De.refine(
3314
3316
  (t) => t === "authorization_code"
3315
3317
  /* AuthorizationCode */
@@ -3318,7 +3320,7 @@ const De = r.nativeEnum(ot), lr = r.object({
3318
3320
  code_verifier: r.string(),
3319
3321
  client_id: r.string().optional(),
3320
3322
  redirect_uri: r.string()
3321
- }), pr = r.object({
3323
+ }), hr = r.object({
3322
3324
  grant_type: De.refine(
3323
3325
  (t) => t === "client_credentials"
3324
3326
  /* ClientCredential */
@@ -3341,7 +3343,7 @@ r.object({
3341
3343
  code: r.string(),
3342
3344
  state: r.string().optional()
3343
3345
  });
3344
- const Pn = r.object({
3346
+ const Mn = r.object({
3345
3347
  button_border_radius: r.number(),
3346
3348
  button_border_weight: r.number(),
3347
3349
  buttons_style: r.enum(["pill"]),
@@ -3351,7 +3353,7 @@ const Pn = r.object({
3351
3353
  show_widget_shadow: r.boolean(),
3352
3354
  widget_border_weight: r.number(),
3353
3355
  widget_corner_radius: r.number()
3354
- }), Mn = r.object({
3356
+ }), $n = r.object({
3355
3357
  base_focus_color: r.string(),
3356
3358
  base_hover_color: r.string(),
3357
3359
  body_text: r.string(),
@@ -3374,7 +3376,7 @@ const Pn = r.object({
3374
3376
  }), W = r.object({
3375
3377
  bold: r.boolean(),
3376
3378
  size: r.number()
3377
- }), $n = r.object({
3379
+ }), Dn = r.object({
3378
3380
  body_text: W,
3379
3381
  buttons_text: W,
3380
3382
  font_url: r.string(),
@@ -3384,35 +3386,35 @@ const Pn = r.object({
3384
3386
  reference_text_size: r.number(),
3385
3387
  subtitle: W,
3386
3388
  title: W
3387
- }), Dn = r.object({
3389
+ }), Un = r.object({
3388
3390
  background_color: r.string(),
3389
3391
  background_image_url: r.string(),
3390
3392
  page_layout: r.enum(["center"])
3391
- }), Un = r.object({
3393
+ }), Vn = r.object({
3392
3394
  header_text_alignment: r.enum(["center"]),
3393
3395
  logo_height: r.number(),
3394
3396
  logo_position: r.enum(["center"]),
3395
3397
  logo_url: r.string(),
3396
3398
  social_buttons_layout: r.enum(["bottom"])
3397
- }), Vn = r.object({
3398
- borders: Pn,
3399
- colors: Mn,
3399
+ }), Ln = r.object({
3400
+ borders: Mn,
3401
+ colors: $n,
3400
3402
  displayName: r.string(),
3401
- fonts: $n,
3402
- page_background: Dn,
3403
- widget: Un
3404
- }), hr = Vn.extend({
3403
+ fonts: Dn,
3404
+ page_background: Un,
3405
+ widget: Vn
3406
+ }), fr = Ln.extend({
3405
3407
  themeId: r.string()
3406
- }), Ln = r.object({
3408
+ }), zn = r.object({
3407
3409
  id: r.string(),
3408
3410
  expires_at: r.string(),
3409
3411
  auth0Client: r.string().optional(),
3410
3412
  authParams: we
3411
- }), fr = r.object({
3412
- ...Ln.shape,
3413
+ }), mr = r.object({
3414
+ ...zn.shape,
3413
3415
  created_at: r.string(),
3414
3416
  updated_at: r.string()
3415
- }), zn = r.object({
3417
+ }), Bn = r.object({
3416
3418
  id: r.string(),
3417
3419
  email: r.string(),
3418
3420
  code: r.string(),
@@ -3422,86 +3424,87 @@ const Pn = r.object({
3422
3424
  expires_at: r.string(),
3423
3425
  used_at: r.string().optional(),
3424
3426
  user_id: r.string().optional()
3425
- }), mr = r.object({
3427
+ }), _r = r.object({
3426
3428
  created_at: r.string(),
3427
- ...zn.shape
3428
- }), Bn = r.object({
3429
+ ...Bn.shape
3430
+ }), Wn = r.object({
3429
3431
  authParams: we,
3430
3432
  code: r.string(),
3431
3433
  user_id: r.string(),
3432
3434
  created_at: r.string(),
3433
3435
  expires_at: r.string(),
3434
3436
  used_at: r.string().optional()
3435
- }), _r = r.object({
3436
- ...Bn.shape,
3437
+ }), gr = r.object({
3438
+ ...Wn.shape,
3437
3439
  created_at: r.string()
3438
3440
  });
3439
- function gr(t) {
3441
+ function yr(t) {
3440
3442
  const [e, n] = t.split("|");
3441
3443
  if (!e || !n)
3442
3444
  throw new Error(`Invalid user_id: ${t}`);
3443
3445
  return { connection: e, id: n };
3444
3446
  }
3445
3447
  export {
3446
- Nn as Auth0Client,
3448
+ In as Auth0Client,
3447
3449
  rt as AuthorizationResponseMode,
3448
3450
  nt as AuthorizationResponseType,
3449
- Yn as ClientSchema,
3451
+ Jn as ClientSchema,
3450
3452
  st as CodeChallengeMethod,
3451
3453
  ot as GrantType,
3452
- Cn as LogTypes,
3453
- Jn as PartialClientSchema,
3454
+ Zn as LogTypes,
3455
+ Fn as PartialClientSchema,
3454
3456
  kn as applicationInsertSchema,
3455
- Hn as applicationSchema,
3456
- qn as auth0UserResponseSchema,
3457
+ Kn as applicationSchema,
3458
+ Gn as auth0UserResponseSchema,
3457
3459
  we as authParamsSchema,
3458
- Bn as authenticationCodeInsertSchema,
3459
- _r as authenticationCodeSchema,
3460
- lr as authorizationCodeGrantTypeParamsSchema,
3460
+ Wn as authenticationCodeInsertSchema,
3461
+ gr as authenticationCodeSchema,
3462
+ ur as authorizationCodeGrantTypeParamsSchema,
3461
3463
  tt as baseUserSchema,
3462
- Pn as bordersSchema,
3463
- Kn as brandingSchema,
3464
- ir as certificateSchema,
3465
- pr as clientCredentialGrantTypeParamsSchema,
3466
- Fn as codeSchema,
3464
+ Mn as bordersSchema,
3465
+ Yn as brandingSchema,
3466
+ or as certificateSchema,
3467
+ hr as clientCredentialGrantTypeParamsSchema,
3468
+ Tn as codeInsertSchema,
3469
+ Xn as codeSchema,
3467
3470
  Sn as codeTypeSchema,
3468
- Mn as colorsSchema,
3471
+ $n as colorsSchema,
3469
3472
  xn as connectionInsertSchema,
3470
3473
  at as connectionSchema,
3471
- Tn as domainInsertSchema,
3472
- Xn as domainSchema,
3474
+ jn as domainInsertSchema,
3475
+ Qn as domainSchema,
3473
3476
  W as fontDetailsSchema,
3474
- $n as fontsSchema,
3475
- jn as hookInsertSchema,
3476
- Qn as hookSchema,
3477
+ Dn as fontsSchema,
3478
+ On as hookInsertSchema,
3479
+ er as hookSchema,
3477
3480
  yn as identitySchema,
3478
- er as jwksKeySchema,
3479
- On as jwksSchema,
3480
- rr as logSchema,
3481
- En as loginInsertSchema,
3482
- nr as loginSchema,
3483
- tr as openIDConfigurationSchema,
3484
- zn as otpInsertSchema,
3485
- mr as otpSchema,
3486
- Dn as pageBackgroundSchema,
3487
- gr as parseUserId,
3488
- In as passwordInsertSchema,
3489
- sr as passwordSchema,
3490
- ur as pkceAuthorizationCodeGrantTypeParamsSchema,
3481
+ tr as jwksKeySchema,
3482
+ En as jwksSchema,
3483
+ sr as logSchema,
3484
+ Cn as loginInsertSchema,
3485
+ rr as loginSchema,
3486
+ nr as openIDConfigurationSchema,
3487
+ Bn as otpInsertSchema,
3488
+ _r as otpSchema,
3489
+ Un as pageBackgroundSchema,
3490
+ yr as parseUserId,
3491
+ Rn as passwordInsertSchema,
3492
+ ar as passwordSchema,
3493
+ pr as pkceAuthorizationCodeGrantTypeParamsSchema,
3491
3494
  gn as profileDataSchema,
3492
- Rn as sessionInsertSchema,
3493
- ar as sessionSchema,
3494
- or as signingKeySchema,
3495
- An as tenantInsertSchema,
3496
- cr as tenantSchema,
3497
- Vn as themeInsertSchema,
3498
- hr as themeSchema,
3499
- Wn as totalsSchema,
3500
- Ln as universalLoginSessionInsertSchema,
3501
- fr as universalLoginSessionSchema,
3495
+ An as sessionInsertSchema,
3496
+ ir as sessionSchema,
3497
+ cr as signingKeySchema,
3498
+ Pn as tenantInsertSchema,
3499
+ dr as tenantSchema,
3500
+ Ln as themeInsertSchema,
3501
+ fr as themeSchema,
3502
+ qn as totalsSchema,
3503
+ zn as universalLoginSessionInsertSchema,
3504
+ mr as universalLoginSessionSchema,
3502
3505
  vn as userInsertSchema,
3503
- Gn as userResponseSchema,
3506
+ Hn as userResponseSchema,
3504
3507
  bn as userSchema,
3505
- dr as vendorSettingsSchema,
3506
- Un as widgetSchema
3508
+ lr as vendorSettingsSchema,
3509
+ Vn as widgetSchema
3507
3510
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.9.2",
14
+ "version": "0.10.1",
15
15
  "files": [
16
16
  "dist"
17
17
  ],