@authhero/adapter-interfaces 0.90.0 → 0.91.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,12 +1,12 @@
1
1
  import { z as e } from "@hono/zod-openapi";
2
- const xe = e.object({
2
+ const Ge = e.object({
3
3
  start: e.number(),
4
4
  limit: e.number(),
5
5
  length: e.number()
6
6
  }), i = e.object({
7
7
  created_at: e.string(),
8
8
  updated_at: e.string()
9
- }), f = e.object({
9
+ }), S = e.object({
10
10
  email: e.string().optional(),
11
11
  email_verified: e.boolean().optional(),
12
12
  name: e.string().optional(),
@@ -15,7 +15,7 @@ const xe = e.object({
15
15
  phone_number: e.string().optional(),
16
16
  phone_verified: e.boolean().optional(),
17
17
  family_name: e.string().optional()
18
- }).catchall(e.any()), b = e.object({
18
+ }).catchall(e.any()), f = e.object({
19
19
  connection: e.string(),
20
20
  user_id: e.string(),
21
21
  provider: e.string(),
@@ -23,7 +23,7 @@ const xe = e.object({
23
23
  access_token: e.string().optional(),
24
24
  access_token_secret: e.string().optional(),
25
25
  refresh_token: e.string().optional(),
26
- profileData: f.optional()
26
+ profileData: S.optional()
27
27
  }), c = e.object({
28
28
  email: e.string().optional().transform((t) => t && t.toLowerCase()),
29
29
  username: e.string().optional(),
@@ -39,7 +39,7 @@ const xe = e.object({
39
39
  user_id: e.string().optional(),
40
40
  app_metadata: e.any().default({}).optional(),
41
41
  user_metadata: e.any().default({}).optional()
42
- }), A = c.extend({
42
+ }), b = c.extend({
43
43
  email_verified: e.boolean().default(!1),
44
44
  verify_email: e.boolean().optional(),
45
45
  last_ip: e.string().optional(),
@@ -48,80 +48,28 @@ const xe = e.object({
48
48
  provider: e.string().default("email"),
49
49
  connection: e.string().default("email"),
50
50
  is_social: e.boolean().optional()
51
- }), C = e.object({
52
- ...A.shape,
51
+ }), A = e.object({
52
+ ...b.shape,
53
53
  ...i.shape,
54
54
  user_id: e.string(),
55
55
  is_social: e.boolean(),
56
56
  email: e.string().optional(),
57
57
  login_count: e.number().default(0),
58
- identities: e.array(b).optional()
59
- }), Ge = C, Ke = c.extend({
58
+ identities: e.array(f).optional()
59
+ }), xe = A, Ke = c.extend({
60
60
  login_count: e.number(),
61
61
  multifactor: e.array(e.string()).optional(),
62
62
  last_ip: e.string().optional(),
63
63
  last_login: e.string().optional(),
64
64
  user_id: e.string()
65
65
  }).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
- let _ = (t = 21) => {
67
- let n = "", s = crypto.getRandomValues(new Uint8Array(t));
66
+ let C = (t = 21) => {
67
+ let n = "", r = crypto.getRandomValues(new Uint8Array(t));
68
68
  for (; t--; )
69
- n += I[s[t] & 63];
69
+ n += I[r[t] & 63];
70
70
  return n;
71
71
  };
72
72
  const O = e.object({
73
- audience: e.string().optional(),
74
- recipient: e.string().optional(),
75
- createUpnClaim: e.boolean().optional(),
76
- mapUnknownClaimsAsIs: e.boolean().optional(),
77
- passthroughClaimsWithNoMapping: e.boolean().optional(),
78
- mapIdentities: e.boolean().optional(),
79
- signatureAlgorithm: e.string().optional(),
80
- digestAlgorithm: e.string().optional(),
81
- issuer: e.string().optional(),
82
- destination: e.string().optional(),
83
- lifetimeInSeconds: e.number().optional(),
84
- signResponse: e.boolean().optional(),
85
- nameIdentifierFormat: e.string().optional(),
86
- nameIdentifierProbes: e.array(e.string()).optional(),
87
- authnContextClassRef: e.string().optional(),
88
- mappings: e.record(e.string()).optional()
89
- }), T = e.object({
90
- id: e.string(),
91
- name: e.string(),
92
- callbacks: e.array(e.string()).default([]).optional().openapi({
93
- description: "Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."
94
- }),
95
- allowed_origins: e.array(e.string()).default([]).optional().openapi({
96
- description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."
97
- }),
98
- web_origins: e.array(e.string()).default([]).optional().openapi({
99
- description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
100
- }),
101
- allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
102
- description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
103
- }),
104
- allowed_clients: e.array(e.string()).default([]).optional().openapi({
105
- description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
106
- }),
107
- addons: e.object({
108
- samlp: O.optional()
109
- }).default({}).optional().openapi({
110
- description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
111
- }),
112
- email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
113
- description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
114
- }),
115
- client_secret: e.string().default(() => _()).optional(),
116
- disable_sign_ups: e.boolean().optional().default(!1).openapi({
117
- description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
118
- }),
119
- client_metadata: e.record(e.string().length(255)).optional()
120
- }), Be = e.object({
121
- created_at: e.string().transform((t) => t === null ? "" : t),
122
- updated_at: e.string().transform((t) => t === null ? "" : t),
123
- ...T.shape
124
- }), N = e.object({
125
73
  client_id: e.string().openapi({
126
74
  description: "ID of this client."
127
75
  }),
@@ -134,7 +82,7 @@ const O = e.object({
134
82
  global: e.boolean().default(!1).openapi({
135
83
  description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
136
84
  }),
137
- client_secret: e.string().default(() => _()).optional().openapi({
85
+ client_secret: e.string().default(() => C()).optional().openapi({
138
86
  description: "Client secret (which you must not make public)."
139
87
  }),
140
88
  app_type: e.enum([
@@ -288,20 +236,52 @@ const O = e.object({
288
236
  description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
289
237
  }),
290
238
  token_quota: e.record(e.any()).default({}).optional()
291
- }), y = e.object({
239
+ }), T = e.object({
292
240
  created_at: e.string(),
293
241
  updated_at: e.string(),
294
- ...N.shape
295
- }), a = e.object({
242
+ ...O.shape
243
+ }), N = e.object({
244
+ client_id: e.string().min(1).openapi({
245
+ description: "ID of the client."
246
+ }),
247
+ audience: e.string().min(1).openapi({
248
+ description: "The audience (API identifier) of this client grant."
249
+ }),
250
+ scope: e.array(e.string()).optional().openapi({
251
+ description: "Scopes allowed for this client grant."
252
+ }),
253
+ organization_usage: e.enum(["deny", "allow", "require"]).optional().openapi({
254
+ description: "Defines whether organizations can be used with client credentials exchanges for this grant."
255
+ }),
256
+ allow_any_organization: e.boolean().optional().openapi({
257
+ description: "If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."
258
+ }),
259
+ is_system: e.boolean().optional().openapi({
260
+ description: "If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."
261
+ }),
262
+ subject_type: e.enum(["client", "user"]).optional().openapi({
263
+ description: "The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
264
+ }),
265
+ authorization_details_types: e.array(e.string()).optional().openapi({
266
+ description: "Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
267
+ })
268
+ }), y = e.object({
269
+ id: e.string().openapi({
270
+ description: "ID of the client grant."
271
+ }),
272
+ ...N.shape,
273
+ created_at: e.string().optional(),
274
+ updated_at: e.string().optional()
275
+ }), Be = e.array(y), a = e.object({
296
276
  x: e.number(),
297
277
  y: e.number()
298
278
  });
299
- var p = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(p || {}), d = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(d || {});
300
- const r = e.object({
279
+ var _ = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(_ || {}), p = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(p || {});
280
+ const s = e.object({
301
281
  id: e.string(),
302
- category: e.nativeEnum(d),
303
- type: e.nativeEnum(p)
304
- }), R = r.extend({
282
+ category: e.nativeEnum(p),
283
+ type: e.nativeEnum(_)
284
+ }), R = s.extend({
305
285
  category: e.literal(
306
286
  "BLOCK"
307
287
  /* BLOCK */
@@ -313,7 +293,7 @@ const r = e.object({
313
293
  config: e.object({
314
294
  content: e.string()
315
295
  }).passthrough()
316
- }), L = r.extend({
296
+ }), L = s.extend({
317
297
  category: e.literal(
318
298
  "BLOCK"
319
299
  /* BLOCK */
@@ -335,7 +315,7 @@ const r = e.object({
335
315
  config: e.object({
336
316
  text: e.string()
337
317
  }).passthrough()
338
- }), D = r.extend({
318
+ }), D = s.extend({
339
319
  category: e.literal(
340
320
  "FIELD"
341
321
  /* FIELD */
@@ -349,7 +329,7 @@ const r = e.object({
349
329
  config: e.object({
350
330
  text: e.string()
351
331
  }).passthrough()
352
- }), w = r.extend({
332
+ }), U = s.extend({
353
333
  category: e.literal(
354
334
  "FIELD"
355
335
  /* FIELD */
@@ -402,16 +382,16 @@ const r = e.object({
402
382
  label: e.string().optional(),
403
383
  placeholder: e.string().optional()
404
384
  }).passthrough()
405
- }), U = e.object({
385
+ }), F = e.object({
406
386
  id: e.string(),
407
387
  category: e.string(),
408
388
  type: e.string()
409
- }).passthrough(), F = e.union([
389
+ }).passthrough(), w = e.union([
410
390
  R,
411
391
  L,
412
392
  D,
413
- w,
414
- U
393
+ U,
394
+ F
415
395
  ]);
416
396
  var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
417
397
  const k = e.object({
@@ -423,7 +403,7 @@ const k = e.object({
423
403
  coordinates: a,
424
404
  alias: e.string().optional(),
425
405
  config: e.object({
426
- components: e.array(F),
406
+ components: e.array(w),
427
407
  next_node: e.string()
428
408
  }).passthrough()
429
409
  }), v = e.object({
@@ -449,10 +429,10 @@ const k = e.object({
449
429
  ]), M = e.object({
450
430
  next_node: e.string(),
451
431
  coordinates: a
452
- }).passthrough(), x = e.object({
432
+ }).passthrough(), G = e.object({
453
433
  resume_flow: e.boolean().optional(),
454
434
  coordinates: a
455
- }).passthrough(), G = e.object({
435
+ }).passthrough(), x = e.object({
456
436
  id: e.string(),
457
437
  name: e.string(),
458
438
  languages: e.object({
@@ -460,24 +440,24 @@ const k = e.object({
460
440
  }).passthrough(),
461
441
  nodes: e.array(H),
462
442
  start: M,
463
- ending: x,
443
+ ending: G,
464
444
  created_at: e.string(),
465
445
  updated_at: e.string(),
466
446
  links: e.object({
467
447
  sdkSrc: e.string().optional(),
468
448
  sdk_src: e.string().optional()
469
449
  }).passthrough()
470
- }).passthrough(), We = G.omit({
450
+ }).passthrough(), We = x.omit({
471
451
  id: !0,
472
452
  created_at: !0,
473
453
  updated_at: !0
474
454
  });
475
- var g = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(u || {}), m = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(m || {});
455
+ var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
476
456
  const K = e.object({
477
457
  client_id: e.string(),
478
458
  act_as: e.string().optional(),
479
- response_type: e.nativeEnum(g).optional(),
480
- response_mode: e.nativeEnum(u).optional(),
459
+ response_type: e.nativeEnum(d).optional(),
460
+ response_mode: e.nativeEnum(g).optional(),
481
461
  redirect_uri: e.string().optional(),
482
462
  audience: e.string().optional(),
483
463
  organization: e.string().optional(),
@@ -485,13 +465,13 @@ const K = e.object({
485
465
  nonce: e.string().optional(),
486
466
  scope: e.string().optional(),
487
467
  prompt: e.string().optional(),
488
- code_challenge_method: e.nativeEnum(m).optional(),
468
+ code_challenge_method: e.nativeEnum(u).optional(),
489
469
  code_challenge: e.string().optional(),
490
470
  username: e.string().optional(),
491
471
  ui_locales: e.string().optional(),
492
472
  // The following fields are not available in Auth0
493
473
  vendor_id: e.string().optional()
494
- }), Xe = e.object({
474
+ }), ze = e.object({
495
475
  colors: e.object({
496
476
  primary: e.string(),
497
477
  page_background: e.object({
@@ -533,11 +513,11 @@ const K = e.object({
533
513
  enabled_clients: e.array(e.string()).default([]).optional(),
534
514
  response_type: e.custom().optional(),
535
515
  response_mode: e.custom().optional()
536
- }), X = e.object({
516
+ }), z = e.object({
537
517
  id: e.string(),
538
518
  created_at: e.string().transform((t) => t === null ? "" : t),
539
519
  updated_at: e.string().transform((t) => t === null ? "" : t)
540
- }).extend(W.shape), z = e.object({
520
+ }).extend(W.shape), X = e.object({
541
521
  name: e.string(),
542
522
  audience: e.string(),
543
523
  sender_email: e.string().email(),
@@ -551,13 +531,13 @@ const K = e.object({
551
531
  }), V = e.object({
552
532
  created_at: e.string().transform((t) => t === null ? "" : t),
553
533
  updated_at: e.string().transform((t) => t === null ? "" : t),
554
- ...z.shape,
534
+ ...X.shape,
555
535
  id: e.string()
556
536
  });
557
537
  e.object({
558
- ...y.shape,
538
+ ...T.shape,
559
539
  tenant: V,
560
- connections: e.array(X),
540
+ connections: e.array(z),
561
541
  // Legacy fields for backward compatibility - these are now stored in client_metadata
562
542
  disable_sign_ups: e.boolean(),
563
543
  email_validation: e.string()
@@ -601,7 +581,7 @@ const q = e.enum([
601
581
  expires_at: e.string(),
602
582
  used_at: e.string().optional(),
603
583
  user_id: e.string().optional()
604
- }), ze = e.object({
584
+ }), Xe = e.object({
605
585
  ...Y.shape,
606
586
  created_at: e.string()
607
587
  }), Q = e.object({
@@ -764,12 +744,12 @@ const q = e.enum([
764
744
  ...i.shape,
765
745
  ...ee.shape,
766
746
  id: e.string()
767
- }), h = e.enum([
747
+ }), m = e.enum([
768
748
  "pre-user-signup",
769
749
  "post-user-registration",
770
750
  "post-user-login"
771
751
  // Potentially other triggers specific to webhooks in the future
772
- ]), E = e.enum([
752
+ ]), h = e.enum([
773
753
  "pre-user-signup",
774
754
  "post-user-registration",
775
755
  "post-user-login"
@@ -780,24 +760,24 @@ const q = e.enum([
780
760
  hook_id: e.string().optional()
781
761
  }, te = e.object({
782
762
  ...l,
783
- trigger_id: h,
763
+ trigger_id: m,
784
764
  url: e.string()
785
765
  }), oe = e.object({
786
766
  ...l,
787
- trigger_id: E,
767
+ trigger_id: h,
788
768
  form_id: e.string()
789
769
  }), Qe = e.union([
790
770
  te,
791
771
  oe
792
772
  ]), ie = e.object({
793
773
  ...l,
794
- trigger_id: h,
774
+ trigger_id: m,
795
775
  ...i.shape,
796
776
  hook_id: e.string(),
797
777
  url: e.string()
798
778
  }), ne = e.object({
799
779
  ...l,
800
- trigger_id: E,
780
+ trigger_id: h,
801
781
  ...i.shape,
802
782
  hook_id: e.string(),
803
783
  form_id: e.string()
@@ -843,7 +823,7 @@ const q = e.enum([
843
823
  request_uri_parameter_supported: e.boolean(),
844
824
  request_parameter_supported: e.boolean(),
845
825
  token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
846
- }), se = e.object({
826
+ }), re = e.object({
847
827
  csrf_token: e.string(),
848
828
  auth0Client: e.string().optional(),
849
829
  authParams: K,
@@ -857,13 +837,13 @@ const q = e.enum([
857
837
  }).openapi({
858
838
  description: "This represents a login sesion"
859
839
  }), et = e.object({
860
- ...se.shape,
840
+ ...re.shape,
861
841
  id: e.string().openapi({
862
842
  description: "This is is used as the state in the universal login"
863
843
  }),
864
844
  created_at: e.string(),
865
845
  updated_at: e.string()
866
- }), re = {
846
+ }), se = {
867
847
  // Network & System
868
848
  ACLS_SUMMARY: "acls_summary",
869
849
  ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
@@ -1031,7 +1011,7 @@ const q = e.enum([
1031
1011
  WARNING_SENDING_NOTIFICATION: "wn",
1032
1012
  WARNING_USER_MANAGEMENT: "wum"
1033
1013
  }, le = e.string().refine(
1034
- (t) => Object.values(re).includes(t),
1014
+ (t) => Object.values(se).includes(t),
1035
1015
  { message: "Invalid log type" }
1036
1016
  ), ce = e.object({
1037
1017
  name: e.string(),
@@ -1070,7 +1050,7 @@ const q = e.enum([
1070
1050
  ..._e.shape,
1071
1051
  created_at: e.string(),
1072
1052
  updated_at: e.string()
1073
- }), S = e.object({
1053
+ }), E = e.object({
1074
1054
  initial_user_agent: e.string().describe("First user agent of the device from which this user logged in"),
1075
1055
  initial_ip: e.string().describe("First IP address associated with this session"),
1076
1056
  initial_asn: e.string().describe("First autonomous system number associated with this session"),
@@ -1085,7 +1065,7 @@ const q = e.enum([
1085
1065
  expires_at: e.string().optional(),
1086
1066
  login_session_id: e.string(),
1087
1067
  idle_expires_at: e.string().optional(),
1088
- device: S.describe(
1068
+ device: E.describe(
1089
1069
  "Metadata related to the device used in the session"
1090
1070
  ),
1091
1071
  clients: e.array(e.string()).describe("List of client details for the session")
@@ -1195,9 +1175,9 @@ const ge = e.object({
1195
1175
  fonts: me,
1196
1176
  page_background: he,
1197
1177
  widget: Ee
1198
- }), st = Se.extend({
1178
+ }), rt = Se.extend({
1199
1179
  themeId: e.string()
1200
- }), rt = e.object({
1180
+ }), st = e.object({
1201
1181
  universal_login_experience: e.enum(["new", "classic"]).default("new"),
1202
1182
  identifier_first: e.boolean().default(!0),
1203
1183
  password_first: e.boolean().default(!1),
@@ -1245,7 +1225,7 @@ const ge = e.object({
1245
1225
  idle_expires_at: e.string().optional(),
1246
1226
  // When the token was last used.
1247
1227
  last_exchanged_at: e.string().optional(),
1248
- device: S,
1228
+ device: E,
1249
1229
  resource_servers: e.array(
1250
1230
  e.object({
1251
1231
  audience: e.string(),
@@ -1277,7 +1257,7 @@ const ge = e.object({
1277
1257
  mtls: e.object({
1278
1258
  bound_access_tokens: e.boolean().optional()
1279
1259
  }).optional()
1280
- }), Ce = e.object({
1260
+ }), Ie = e.object({
1281
1261
  name: e.string(),
1282
1262
  identifier: e.string(),
1283
1263
  scopes: e.array(be).optional(),
@@ -1289,12 +1269,12 @@ const ge = e.object({
1289
1269
  allow_offline_access: e.boolean().optional(),
1290
1270
  verificationKey: e.string().optional(),
1291
1271
  options: Ae.optional()
1292
- }), Ie = e.object({
1272
+ }), Ce = e.object({
1293
1273
  id: e.string().optional(),
1294
- ...Ce.shape,
1274
+ ...Ie.shape,
1295
1275
  created_at: e.string().optional(),
1296
1276
  updated_at: e.string().optional()
1297
- }), dt = e.array(Ie), Oe = e.object({
1277
+ }), dt = e.array(Ce), Oe = e.object({
1298
1278
  role_id: e.string(),
1299
1279
  resource_server_identifier: e.string(),
1300
1280
  permission_name: e.string()
@@ -1334,25 +1314,25 @@ const ge = e.object({
1334
1314
  user_id: e.string(),
1335
1315
  role_id: e.string(),
1336
1316
  organization_id: e.string().optional()
1337
- }), we = e.object({
1317
+ }), Ue = e.object({
1338
1318
  ...De.shape,
1339
1319
  tenant_id: e.string(),
1340
1320
  created_at: e.string().optional()
1341
- }), Et = e.array(we), Ue = e.object({
1321
+ }), Et = e.array(Ue), Fe = e.object({
1342
1322
  name: e.string().min(1).max(50).openapi({
1343
1323
  description: "The name of the role. Cannot include '<' or '>'"
1344
1324
  }),
1345
1325
  description: e.string().max(255).optional().openapi({
1346
1326
  description: "The description of the role"
1347
1327
  })
1348
- }), Fe = e.object({
1328
+ }), we = e.object({
1349
1329
  id: e.string().openapi({
1350
1330
  description: "The unique identifier of the role"
1351
1331
  }),
1352
- ...Ue.shape,
1332
+ ...Fe.shape,
1353
1333
  created_at: e.string().optional(),
1354
1334
  updated_at: e.string().optional()
1355
- }), St = e.array(Fe), je = e.object({
1335
+ }), St = e.array(we), je = e.object({
1356
1336
  logo_url: e.string().optional().openapi({
1357
1337
  description: "URL of the organization's logo"
1358
1338
  }),
@@ -1422,48 +1402,49 @@ const ge = e.object({
1422
1402
  id: e.string()
1423
1403
  });
1424
1404
  function At(t) {
1425
- const [n, s] = t.split("|");
1426
- if (!n || !s)
1405
+ const [n, r] = t.split("|");
1406
+ if (!n || !r)
1427
1407
  throw new Error(`Invalid user_id: ${t}`);
1428
- return { connection: n, id: s };
1408
+ return { connection: n, id: r };
1429
1409
  }
1430
1410
  export {
1431
1411
  ce as Auth0Client,
1432
- u as AuthorizationResponseMode,
1433
- g as AuthorizationResponseType,
1434
- m as CodeChallengeMethod,
1435
- d as ComponentCategory,
1436
- p as ComponentType,
1412
+ g as AuthorizationResponseMode,
1413
+ d as AuthorizationResponseType,
1414
+ u as CodeChallengeMethod,
1415
+ p as ComponentCategory,
1416
+ _ as ComponentType,
1437
1417
  de as GrantType,
1438
- re as LogTypes,
1418
+ se as LogTypes,
1439
1419
  j as NodeType,
1440
- T as applicationInsertSchema,
1441
- Be as applicationSchema,
1442
1420
  We as auth0FlowInsertSchema,
1443
- G as auth0FlowSchema,
1444
- Ge as auth0UserResponseSchema,
1421
+ x as auth0FlowSchema,
1422
+ xe as auth0UserResponseSchema,
1445
1423
  K as authParamsSchema,
1446
1424
  c as baseUserSchema,
1447
1425
  ge as bordersSchema,
1448
- Xe as brandingSchema,
1426
+ ze as brandingSchema,
1449
1427
  L as buttonComponentSchema,
1450
- N as clientInsertSchema,
1451
- y as clientSchema,
1428
+ N as clientGrantInsertSchema,
1429
+ Be as clientGrantListSchema,
1430
+ y as clientGrantSchema,
1431
+ O as clientInsertSchema,
1432
+ T as clientSchema,
1452
1433
  Y as codeInsertSchema,
1453
- ze as codeSchema,
1434
+ Xe as codeSchema,
1454
1435
  q as codeTypeSchema,
1455
1436
  ue as colorsSchema,
1456
- F as componentSchema,
1437
+ w as componentSchema,
1457
1438
  W as connectionInsertSchema,
1458
1439
  B as connectionOptionsSchema,
1459
- X as connectionSchema,
1440
+ z as connectionSchema,
1460
1441
  a as coordinatesSchema,
1461
1442
  Q as customDomainInsertSchema,
1462
1443
  Z as customDomainSchema,
1463
1444
  Ve as customDomainWithTenantIdSchema,
1464
1445
  lt as emailProviderSchema,
1465
- x as endingSchema,
1466
- w as fieldComponentSchema,
1446
+ G as endingSchema,
1447
+ U as fieldComponentSchema,
1467
1448
  v as flowNodeSchema,
1468
1449
  o as fontDetailsSchema,
1469
1450
  me as fontsSchema,
@@ -1471,16 +1452,16 @@ export {
1471
1452
  ee as formInsertSchema,
1472
1453
  $ as formNodeComponentDefinition,
1473
1454
  Ye as formSchema,
1474
- U as genericComponentSchema,
1455
+ F as genericComponentSchema,
1475
1456
  P as genericNodeSchema,
1476
1457
  Qe as hookInsertSchema,
1477
1458
  Je as hookSchema,
1478
- b as identitySchema,
1459
+ f as identitySchema,
1479
1460
  Ze as jwksKeySchema,
1480
1461
  ae as jwksSchema,
1481
1462
  D as legalComponentSchema,
1482
1463
  tt as logSchema,
1483
- se as loginSessionInsertSchema,
1464
+ re as loginSessionInsertSchema,
1484
1465
  et as loginSessionSchema,
1485
1466
  H as nodeSchema,
1486
1467
  $e as openIDConfigurationSchema,
@@ -1493,25 +1474,24 @@ export {
1493
1474
  At as parseUserId,
1494
1475
  _e as passwordInsertSchema,
1495
1476
  ot as passwordSchema,
1496
- f as profileDataSchema,
1497
- rt as promptSettingSchema,
1477
+ S as profileDataSchema,
1478
+ st as promptSettingSchema,
1498
1479
  fe as refreshTokenInsertSchema,
1499
1480
  ct as refreshTokenSchema,
1500
- Ce as resourceServerInsertSchema,
1481
+ Ie as resourceServerInsertSchema,
1501
1482
  dt as resourceServerListSchema,
1502
1483
  Ae as resourceServerOptionsSchema,
1503
- Ie as resourceServerSchema,
1484
+ Ce as resourceServerSchema,
1504
1485
  be as resourceServerScopeSchema,
1505
1486
  R as richTextComponentSchema,
1506
- Ue as roleInsertSchema,
1487
+ Fe as roleInsertSchema,
1507
1488
  St as roleListSchema,
1508
1489
  Oe as rolePermissionInsertSchema,
1509
1490
  gt as rolePermissionListSchema,
1510
1491
  Te as rolePermissionSchema,
1511
1492
  ut as rolePermissionWithDetailsListSchema,
1512
1493
  Ne as rolePermissionWithDetailsSchema,
1513
- Fe as roleSchema,
1514
- O as samlpAddon,
1494
+ we as roleSchema,
1515
1495
  pe as sessionInsertSchema,
1516
1496
  it as sessionSchema,
1517
1497
  nt as signingKeySchema,
@@ -1519,13 +1499,13 @@ export {
1519
1499
  _t as smsSendParamsSchema,
1520
1500
  M as startSchema,
1521
1501
  k as stepNodeSchema,
1522
- z as tenantInsertSchema,
1502
+ X as tenantInsertSchema,
1523
1503
  V as tenantSchema,
1524
1504
  Se as themeInsertSchema,
1525
- st as themeSchema,
1505
+ rt as themeSchema,
1526
1506
  at as tokenResponseSchema,
1527
- xe as totalsSchema,
1528
- A as userInsertSchema,
1507
+ Ge as totalsSchema,
1508
+ b as userInsertSchema,
1529
1509
  He as userOrganizationInsertSchema,
1530
1510
  bt as userOrganizationSchema,
1531
1511
  ye as userPermissionInsertSchema,
@@ -1536,8 +1516,8 @@ export {
1536
1516
  Ke as userResponseSchema,
1537
1517
  De as userRoleInsertSchema,
1538
1518
  Et as userRoleListSchema,
1539
- we as userRoleSchema,
1540
- C as userSchema,
1519
+ Ue as userRoleSchema,
1520
+ A as userSchema,
1541
1521
  J as verificationMethodsSchema,
1542
1522
  Ee as widgetSchema
1543
1523
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.90.0",
14
+ "version": "0.91.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],