@authhero/adapter-interfaces 0.90.0 → 0.91.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +245 -525
- package/dist/adapter-interfaces.mjs +137 -157
- package/package.json +1 -1
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
import { z as e } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const Ge = e.object({
|
|
3
3
|
start: e.number(),
|
|
4
4
|
limit: e.number(),
|
|
5
5
|
length: e.number()
|
|
6
6
|
}), i = e.object({
|
|
7
7
|
created_at: e.string(),
|
|
8
8
|
updated_at: e.string()
|
|
9
|
-
}),
|
|
9
|
+
}), S = e.object({
|
|
10
10
|
email: e.string().optional(),
|
|
11
11
|
email_verified: e.boolean().optional(),
|
|
12
12
|
name: e.string().optional(),
|
|
@@ -15,7 +15,7 @@ const xe = e.object({
|
|
|
15
15
|
phone_number: e.string().optional(),
|
|
16
16
|
phone_verified: e.boolean().optional(),
|
|
17
17
|
family_name: e.string().optional()
|
|
18
|
-
}).catchall(e.any()),
|
|
18
|
+
}).catchall(e.any()), f = e.object({
|
|
19
19
|
connection: e.string(),
|
|
20
20
|
user_id: e.string(),
|
|
21
21
|
provider: e.string(),
|
|
@@ -23,7 +23,7 @@ const xe = e.object({
|
|
|
23
23
|
access_token: e.string().optional(),
|
|
24
24
|
access_token_secret: e.string().optional(),
|
|
25
25
|
refresh_token: e.string().optional(),
|
|
26
|
-
profileData:
|
|
26
|
+
profileData: S.optional()
|
|
27
27
|
}), c = e.object({
|
|
28
28
|
email: e.string().optional().transform((t) => t && t.toLowerCase()),
|
|
29
29
|
username: e.string().optional(),
|
|
@@ -39,7 +39,7 @@ const xe = e.object({
|
|
|
39
39
|
user_id: e.string().optional(),
|
|
40
40
|
app_metadata: e.any().default({}).optional(),
|
|
41
41
|
user_metadata: e.any().default({}).optional()
|
|
42
|
-
}),
|
|
42
|
+
}), b = c.extend({
|
|
43
43
|
email_verified: e.boolean().default(!1),
|
|
44
44
|
verify_email: e.boolean().optional(),
|
|
45
45
|
last_ip: e.string().optional(),
|
|
@@ -48,80 +48,28 @@ const xe = e.object({
|
|
|
48
48
|
provider: e.string().default("email"),
|
|
49
49
|
connection: e.string().default("email"),
|
|
50
50
|
is_social: e.boolean().optional()
|
|
51
|
-
}),
|
|
52
|
-
...
|
|
51
|
+
}), A = e.object({
|
|
52
|
+
...b.shape,
|
|
53
53
|
...i.shape,
|
|
54
54
|
user_id: e.string(),
|
|
55
55
|
is_social: e.boolean(),
|
|
56
56
|
email: e.string().optional(),
|
|
57
57
|
login_count: e.number().default(0),
|
|
58
|
-
identities: e.array(
|
|
59
|
-
}),
|
|
58
|
+
identities: e.array(f).optional()
|
|
59
|
+
}), xe = A, Ke = c.extend({
|
|
60
60
|
login_count: e.number(),
|
|
61
61
|
multifactor: e.array(e.string()).optional(),
|
|
62
62
|
last_ip: e.string().optional(),
|
|
63
63
|
last_login: e.string().optional(),
|
|
64
64
|
user_id: e.string()
|
|
65
65
|
}).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
66
|
-
let
|
|
67
|
-
let n = "",
|
|
66
|
+
let C = (t = 21) => {
|
|
67
|
+
let n = "", r = crypto.getRandomValues(new Uint8Array(t));
|
|
68
68
|
for (; t--; )
|
|
69
|
-
n += I[
|
|
69
|
+
n += I[r[t] & 63];
|
|
70
70
|
return n;
|
|
71
71
|
};
|
|
72
72
|
const O = e.object({
|
|
73
|
-
audience: e.string().optional(),
|
|
74
|
-
recipient: e.string().optional(),
|
|
75
|
-
createUpnClaim: e.boolean().optional(),
|
|
76
|
-
mapUnknownClaimsAsIs: e.boolean().optional(),
|
|
77
|
-
passthroughClaimsWithNoMapping: e.boolean().optional(),
|
|
78
|
-
mapIdentities: e.boolean().optional(),
|
|
79
|
-
signatureAlgorithm: e.string().optional(),
|
|
80
|
-
digestAlgorithm: e.string().optional(),
|
|
81
|
-
issuer: e.string().optional(),
|
|
82
|
-
destination: e.string().optional(),
|
|
83
|
-
lifetimeInSeconds: e.number().optional(),
|
|
84
|
-
signResponse: e.boolean().optional(),
|
|
85
|
-
nameIdentifierFormat: e.string().optional(),
|
|
86
|
-
nameIdentifierProbes: e.array(e.string()).optional(),
|
|
87
|
-
authnContextClassRef: e.string().optional(),
|
|
88
|
-
mappings: e.record(e.string()).optional()
|
|
89
|
-
}), T = e.object({
|
|
90
|
-
id: e.string(),
|
|
91
|
-
name: e.string(),
|
|
92
|
-
callbacks: e.array(e.string()).default([]).optional().openapi({
|
|
93
|
-
description: "Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."
|
|
94
|
-
}),
|
|
95
|
-
allowed_origins: e.array(e.string()).default([]).optional().openapi({
|
|
96
|
-
description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."
|
|
97
|
-
}),
|
|
98
|
-
web_origins: e.array(e.string()).default([]).optional().openapi({
|
|
99
|
-
description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
|
|
100
|
-
}),
|
|
101
|
-
allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
|
|
102
|
-
description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
|
|
103
|
-
}),
|
|
104
|
-
allowed_clients: e.array(e.string()).default([]).optional().openapi({
|
|
105
|
-
description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
|
|
106
|
-
}),
|
|
107
|
-
addons: e.object({
|
|
108
|
-
samlp: O.optional()
|
|
109
|
-
}).default({}).optional().openapi({
|
|
110
|
-
description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
|
|
111
|
-
}),
|
|
112
|
-
email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
|
|
113
|
-
description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
|
|
114
|
-
}),
|
|
115
|
-
client_secret: e.string().default(() => _()).optional(),
|
|
116
|
-
disable_sign_ups: e.boolean().optional().default(!1).openapi({
|
|
117
|
-
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
118
|
-
}),
|
|
119
|
-
client_metadata: e.record(e.string().length(255)).optional()
|
|
120
|
-
}), Be = e.object({
|
|
121
|
-
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
122
|
-
updated_at: e.string().transform((t) => t === null ? "" : t),
|
|
123
|
-
...T.shape
|
|
124
|
-
}), N = e.object({
|
|
125
73
|
client_id: e.string().openapi({
|
|
126
74
|
description: "ID of this client."
|
|
127
75
|
}),
|
|
@@ -134,7 +82,7 @@ const O = e.object({
|
|
|
134
82
|
global: e.boolean().default(!1).openapi({
|
|
135
83
|
description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
|
|
136
84
|
}),
|
|
137
|
-
client_secret: e.string().default(() =>
|
|
85
|
+
client_secret: e.string().default(() => C()).optional().openapi({
|
|
138
86
|
description: "Client secret (which you must not make public)."
|
|
139
87
|
}),
|
|
140
88
|
app_type: e.enum([
|
|
@@ -288,20 +236,52 @@ const O = e.object({
|
|
|
288
236
|
description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
|
|
289
237
|
}),
|
|
290
238
|
token_quota: e.record(e.any()).default({}).optional()
|
|
291
|
-
}),
|
|
239
|
+
}), T = e.object({
|
|
292
240
|
created_at: e.string(),
|
|
293
241
|
updated_at: e.string(),
|
|
294
|
-
...
|
|
295
|
-
}),
|
|
242
|
+
...O.shape
|
|
243
|
+
}), N = e.object({
|
|
244
|
+
client_id: e.string().min(1).openapi({
|
|
245
|
+
description: "ID of the client."
|
|
246
|
+
}),
|
|
247
|
+
audience: e.string().min(1).openapi({
|
|
248
|
+
description: "The audience (API identifier) of this client grant."
|
|
249
|
+
}),
|
|
250
|
+
scope: e.array(e.string()).optional().openapi({
|
|
251
|
+
description: "Scopes allowed for this client grant."
|
|
252
|
+
}),
|
|
253
|
+
organization_usage: e.enum(["deny", "allow", "require"]).optional().openapi({
|
|
254
|
+
description: "Defines whether organizations can be used with client credentials exchanges for this grant."
|
|
255
|
+
}),
|
|
256
|
+
allow_any_organization: e.boolean().optional().openapi({
|
|
257
|
+
description: "If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."
|
|
258
|
+
}),
|
|
259
|
+
is_system: e.boolean().optional().openapi({
|
|
260
|
+
description: "If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."
|
|
261
|
+
}),
|
|
262
|
+
subject_type: e.enum(["client", "user"]).optional().openapi({
|
|
263
|
+
description: "The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
|
|
264
|
+
}),
|
|
265
|
+
authorization_details_types: e.array(e.string()).optional().openapi({
|
|
266
|
+
description: "Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
|
|
267
|
+
})
|
|
268
|
+
}), y = e.object({
|
|
269
|
+
id: e.string().openapi({
|
|
270
|
+
description: "ID of the client grant."
|
|
271
|
+
}),
|
|
272
|
+
...N.shape,
|
|
273
|
+
created_at: e.string().optional(),
|
|
274
|
+
updated_at: e.string().optional()
|
|
275
|
+
}), Be = e.array(y), a = e.object({
|
|
296
276
|
x: e.number(),
|
|
297
277
|
y: e.number()
|
|
298
278
|
});
|
|
299
|
-
var
|
|
300
|
-
const
|
|
279
|
+
var _ = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(_ || {}), p = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(p || {});
|
|
280
|
+
const s = e.object({
|
|
301
281
|
id: e.string(),
|
|
302
|
-
category: e.nativeEnum(
|
|
303
|
-
type: e.nativeEnum(
|
|
304
|
-
}), R =
|
|
282
|
+
category: e.nativeEnum(p),
|
|
283
|
+
type: e.nativeEnum(_)
|
|
284
|
+
}), R = s.extend({
|
|
305
285
|
category: e.literal(
|
|
306
286
|
"BLOCK"
|
|
307
287
|
/* BLOCK */
|
|
@@ -313,7 +293,7 @@ const r = e.object({
|
|
|
313
293
|
config: e.object({
|
|
314
294
|
content: e.string()
|
|
315
295
|
}).passthrough()
|
|
316
|
-
}), L =
|
|
296
|
+
}), L = s.extend({
|
|
317
297
|
category: e.literal(
|
|
318
298
|
"BLOCK"
|
|
319
299
|
/* BLOCK */
|
|
@@ -335,7 +315,7 @@ const r = e.object({
|
|
|
335
315
|
config: e.object({
|
|
336
316
|
text: e.string()
|
|
337
317
|
}).passthrough()
|
|
338
|
-
}), D =
|
|
318
|
+
}), D = s.extend({
|
|
339
319
|
category: e.literal(
|
|
340
320
|
"FIELD"
|
|
341
321
|
/* FIELD */
|
|
@@ -349,7 +329,7 @@ const r = e.object({
|
|
|
349
329
|
config: e.object({
|
|
350
330
|
text: e.string()
|
|
351
331
|
}).passthrough()
|
|
352
|
-
}),
|
|
332
|
+
}), U = s.extend({
|
|
353
333
|
category: e.literal(
|
|
354
334
|
"FIELD"
|
|
355
335
|
/* FIELD */
|
|
@@ -402,16 +382,16 @@ const r = e.object({
|
|
|
402
382
|
label: e.string().optional(),
|
|
403
383
|
placeholder: e.string().optional()
|
|
404
384
|
}).passthrough()
|
|
405
|
-
}),
|
|
385
|
+
}), F = e.object({
|
|
406
386
|
id: e.string(),
|
|
407
387
|
category: e.string(),
|
|
408
388
|
type: e.string()
|
|
409
|
-
}).passthrough(),
|
|
389
|
+
}).passthrough(), w = e.union([
|
|
410
390
|
R,
|
|
411
391
|
L,
|
|
412
392
|
D,
|
|
413
|
-
|
|
414
|
-
|
|
393
|
+
U,
|
|
394
|
+
F
|
|
415
395
|
]);
|
|
416
396
|
var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
|
|
417
397
|
const k = e.object({
|
|
@@ -423,7 +403,7 @@ const k = e.object({
|
|
|
423
403
|
coordinates: a,
|
|
424
404
|
alias: e.string().optional(),
|
|
425
405
|
config: e.object({
|
|
426
|
-
components: e.array(
|
|
406
|
+
components: e.array(w),
|
|
427
407
|
next_node: e.string()
|
|
428
408
|
}).passthrough()
|
|
429
409
|
}), v = e.object({
|
|
@@ -449,10 +429,10 @@ const k = e.object({
|
|
|
449
429
|
]), M = e.object({
|
|
450
430
|
next_node: e.string(),
|
|
451
431
|
coordinates: a
|
|
452
|
-
}).passthrough(),
|
|
432
|
+
}).passthrough(), G = e.object({
|
|
453
433
|
resume_flow: e.boolean().optional(),
|
|
454
434
|
coordinates: a
|
|
455
|
-
}).passthrough(),
|
|
435
|
+
}).passthrough(), x = e.object({
|
|
456
436
|
id: e.string(),
|
|
457
437
|
name: e.string(),
|
|
458
438
|
languages: e.object({
|
|
@@ -460,24 +440,24 @@ const k = e.object({
|
|
|
460
440
|
}).passthrough(),
|
|
461
441
|
nodes: e.array(H),
|
|
462
442
|
start: M,
|
|
463
|
-
ending:
|
|
443
|
+
ending: G,
|
|
464
444
|
created_at: e.string(),
|
|
465
445
|
updated_at: e.string(),
|
|
466
446
|
links: e.object({
|
|
467
447
|
sdkSrc: e.string().optional(),
|
|
468
448
|
sdk_src: e.string().optional()
|
|
469
449
|
}).passthrough()
|
|
470
|
-
}).passthrough(), We =
|
|
450
|
+
}).passthrough(), We = x.omit({
|
|
471
451
|
id: !0,
|
|
472
452
|
created_at: !0,
|
|
473
453
|
updated_at: !0
|
|
474
454
|
});
|
|
475
|
-
var
|
|
455
|
+
var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
|
|
476
456
|
const K = e.object({
|
|
477
457
|
client_id: e.string(),
|
|
478
458
|
act_as: e.string().optional(),
|
|
479
|
-
response_type: e.nativeEnum(
|
|
480
|
-
response_mode: e.nativeEnum(
|
|
459
|
+
response_type: e.nativeEnum(d).optional(),
|
|
460
|
+
response_mode: e.nativeEnum(g).optional(),
|
|
481
461
|
redirect_uri: e.string().optional(),
|
|
482
462
|
audience: e.string().optional(),
|
|
483
463
|
organization: e.string().optional(),
|
|
@@ -485,13 +465,13 @@ const K = e.object({
|
|
|
485
465
|
nonce: e.string().optional(),
|
|
486
466
|
scope: e.string().optional(),
|
|
487
467
|
prompt: e.string().optional(),
|
|
488
|
-
code_challenge_method: e.nativeEnum(
|
|
468
|
+
code_challenge_method: e.nativeEnum(u).optional(),
|
|
489
469
|
code_challenge: e.string().optional(),
|
|
490
470
|
username: e.string().optional(),
|
|
491
471
|
ui_locales: e.string().optional(),
|
|
492
472
|
// The following fields are not available in Auth0
|
|
493
473
|
vendor_id: e.string().optional()
|
|
494
|
-
}),
|
|
474
|
+
}), ze = e.object({
|
|
495
475
|
colors: e.object({
|
|
496
476
|
primary: e.string(),
|
|
497
477
|
page_background: e.object({
|
|
@@ -533,11 +513,11 @@ const K = e.object({
|
|
|
533
513
|
enabled_clients: e.array(e.string()).default([]).optional(),
|
|
534
514
|
response_type: e.custom().optional(),
|
|
535
515
|
response_mode: e.custom().optional()
|
|
536
|
-
}),
|
|
516
|
+
}), z = e.object({
|
|
537
517
|
id: e.string(),
|
|
538
518
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
539
519
|
updated_at: e.string().transform((t) => t === null ? "" : t)
|
|
540
|
-
}).extend(W.shape),
|
|
520
|
+
}).extend(W.shape), X = e.object({
|
|
541
521
|
name: e.string(),
|
|
542
522
|
audience: e.string(),
|
|
543
523
|
sender_email: e.string().email(),
|
|
@@ -551,13 +531,13 @@ const K = e.object({
|
|
|
551
531
|
}), V = e.object({
|
|
552
532
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
553
533
|
updated_at: e.string().transform((t) => t === null ? "" : t),
|
|
554
|
-
...
|
|
534
|
+
...X.shape,
|
|
555
535
|
id: e.string()
|
|
556
536
|
});
|
|
557
537
|
e.object({
|
|
558
|
-
...
|
|
538
|
+
...T.shape,
|
|
559
539
|
tenant: V,
|
|
560
|
-
connections: e.array(
|
|
540
|
+
connections: e.array(z),
|
|
561
541
|
// Legacy fields for backward compatibility - these are now stored in client_metadata
|
|
562
542
|
disable_sign_ups: e.boolean(),
|
|
563
543
|
email_validation: e.string()
|
|
@@ -601,7 +581,7 @@ const q = e.enum([
|
|
|
601
581
|
expires_at: e.string(),
|
|
602
582
|
used_at: e.string().optional(),
|
|
603
583
|
user_id: e.string().optional()
|
|
604
|
-
}),
|
|
584
|
+
}), Xe = e.object({
|
|
605
585
|
...Y.shape,
|
|
606
586
|
created_at: e.string()
|
|
607
587
|
}), Q = e.object({
|
|
@@ -764,12 +744,12 @@ const q = e.enum([
|
|
|
764
744
|
...i.shape,
|
|
765
745
|
...ee.shape,
|
|
766
746
|
id: e.string()
|
|
767
|
-
}),
|
|
747
|
+
}), m = e.enum([
|
|
768
748
|
"pre-user-signup",
|
|
769
749
|
"post-user-registration",
|
|
770
750
|
"post-user-login"
|
|
771
751
|
// Potentially other triggers specific to webhooks in the future
|
|
772
|
-
]),
|
|
752
|
+
]), h = e.enum([
|
|
773
753
|
"pre-user-signup",
|
|
774
754
|
"post-user-registration",
|
|
775
755
|
"post-user-login"
|
|
@@ -780,24 +760,24 @@ const q = e.enum([
|
|
|
780
760
|
hook_id: e.string().optional()
|
|
781
761
|
}, te = e.object({
|
|
782
762
|
...l,
|
|
783
|
-
trigger_id:
|
|
763
|
+
trigger_id: m,
|
|
784
764
|
url: e.string()
|
|
785
765
|
}), oe = e.object({
|
|
786
766
|
...l,
|
|
787
|
-
trigger_id:
|
|
767
|
+
trigger_id: h,
|
|
788
768
|
form_id: e.string()
|
|
789
769
|
}), Qe = e.union([
|
|
790
770
|
te,
|
|
791
771
|
oe
|
|
792
772
|
]), ie = e.object({
|
|
793
773
|
...l,
|
|
794
|
-
trigger_id:
|
|
774
|
+
trigger_id: m,
|
|
795
775
|
...i.shape,
|
|
796
776
|
hook_id: e.string(),
|
|
797
777
|
url: e.string()
|
|
798
778
|
}), ne = e.object({
|
|
799
779
|
...l,
|
|
800
|
-
trigger_id:
|
|
780
|
+
trigger_id: h,
|
|
801
781
|
...i.shape,
|
|
802
782
|
hook_id: e.string(),
|
|
803
783
|
form_id: e.string()
|
|
@@ -843,7 +823,7 @@ const q = e.enum([
|
|
|
843
823
|
request_uri_parameter_supported: e.boolean(),
|
|
844
824
|
request_parameter_supported: e.boolean(),
|
|
845
825
|
token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
|
|
846
|
-
}),
|
|
826
|
+
}), re = e.object({
|
|
847
827
|
csrf_token: e.string(),
|
|
848
828
|
auth0Client: e.string().optional(),
|
|
849
829
|
authParams: K,
|
|
@@ -857,13 +837,13 @@ const q = e.enum([
|
|
|
857
837
|
}).openapi({
|
|
858
838
|
description: "This represents a login sesion"
|
|
859
839
|
}), et = e.object({
|
|
860
|
-
...
|
|
840
|
+
...re.shape,
|
|
861
841
|
id: e.string().openapi({
|
|
862
842
|
description: "This is is used as the state in the universal login"
|
|
863
843
|
}),
|
|
864
844
|
created_at: e.string(),
|
|
865
845
|
updated_at: e.string()
|
|
866
|
-
}),
|
|
846
|
+
}), se = {
|
|
867
847
|
// Network & System
|
|
868
848
|
ACLS_SUMMARY: "acls_summary",
|
|
869
849
|
ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
|
|
@@ -1031,7 +1011,7 @@ const q = e.enum([
|
|
|
1031
1011
|
WARNING_SENDING_NOTIFICATION: "wn",
|
|
1032
1012
|
WARNING_USER_MANAGEMENT: "wum"
|
|
1033
1013
|
}, le = e.string().refine(
|
|
1034
|
-
(t) => Object.values(
|
|
1014
|
+
(t) => Object.values(se).includes(t),
|
|
1035
1015
|
{ message: "Invalid log type" }
|
|
1036
1016
|
), ce = e.object({
|
|
1037
1017
|
name: e.string(),
|
|
@@ -1070,7 +1050,7 @@ const q = e.enum([
|
|
|
1070
1050
|
..._e.shape,
|
|
1071
1051
|
created_at: e.string(),
|
|
1072
1052
|
updated_at: e.string()
|
|
1073
|
-
}),
|
|
1053
|
+
}), E = e.object({
|
|
1074
1054
|
initial_user_agent: e.string().describe("First user agent of the device from which this user logged in"),
|
|
1075
1055
|
initial_ip: e.string().describe("First IP address associated with this session"),
|
|
1076
1056
|
initial_asn: e.string().describe("First autonomous system number associated with this session"),
|
|
@@ -1085,7 +1065,7 @@ const q = e.enum([
|
|
|
1085
1065
|
expires_at: e.string().optional(),
|
|
1086
1066
|
login_session_id: e.string(),
|
|
1087
1067
|
idle_expires_at: e.string().optional(),
|
|
1088
|
-
device:
|
|
1068
|
+
device: E.describe(
|
|
1089
1069
|
"Metadata related to the device used in the session"
|
|
1090
1070
|
),
|
|
1091
1071
|
clients: e.array(e.string()).describe("List of client details for the session")
|
|
@@ -1195,9 +1175,9 @@ const ge = e.object({
|
|
|
1195
1175
|
fonts: me,
|
|
1196
1176
|
page_background: he,
|
|
1197
1177
|
widget: Ee
|
|
1198
|
-
}),
|
|
1178
|
+
}), rt = Se.extend({
|
|
1199
1179
|
themeId: e.string()
|
|
1200
|
-
}),
|
|
1180
|
+
}), st = e.object({
|
|
1201
1181
|
universal_login_experience: e.enum(["new", "classic"]).default("new"),
|
|
1202
1182
|
identifier_first: e.boolean().default(!0),
|
|
1203
1183
|
password_first: e.boolean().default(!1),
|
|
@@ -1245,7 +1225,7 @@ const ge = e.object({
|
|
|
1245
1225
|
idle_expires_at: e.string().optional(),
|
|
1246
1226
|
// When the token was last used.
|
|
1247
1227
|
last_exchanged_at: e.string().optional(),
|
|
1248
|
-
device:
|
|
1228
|
+
device: E,
|
|
1249
1229
|
resource_servers: e.array(
|
|
1250
1230
|
e.object({
|
|
1251
1231
|
audience: e.string(),
|
|
@@ -1277,7 +1257,7 @@ const ge = e.object({
|
|
|
1277
1257
|
mtls: e.object({
|
|
1278
1258
|
bound_access_tokens: e.boolean().optional()
|
|
1279
1259
|
}).optional()
|
|
1280
|
-
}),
|
|
1260
|
+
}), Ie = e.object({
|
|
1281
1261
|
name: e.string(),
|
|
1282
1262
|
identifier: e.string(),
|
|
1283
1263
|
scopes: e.array(be).optional(),
|
|
@@ -1289,12 +1269,12 @@ const ge = e.object({
|
|
|
1289
1269
|
allow_offline_access: e.boolean().optional(),
|
|
1290
1270
|
verificationKey: e.string().optional(),
|
|
1291
1271
|
options: Ae.optional()
|
|
1292
|
-
}),
|
|
1272
|
+
}), Ce = e.object({
|
|
1293
1273
|
id: e.string().optional(),
|
|
1294
|
-
...
|
|
1274
|
+
...Ie.shape,
|
|
1295
1275
|
created_at: e.string().optional(),
|
|
1296
1276
|
updated_at: e.string().optional()
|
|
1297
|
-
}), dt = e.array(
|
|
1277
|
+
}), dt = e.array(Ce), Oe = e.object({
|
|
1298
1278
|
role_id: e.string(),
|
|
1299
1279
|
resource_server_identifier: e.string(),
|
|
1300
1280
|
permission_name: e.string()
|
|
@@ -1334,25 +1314,25 @@ const ge = e.object({
|
|
|
1334
1314
|
user_id: e.string(),
|
|
1335
1315
|
role_id: e.string(),
|
|
1336
1316
|
organization_id: e.string().optional()
|
|
1337
|
-
}),
|
|
1317
|
+
}), Ue = e.object({
|
|
1338
1318
|
...De.shape,
|
|
1339
1319
|
tenant_id: e.string(),
|
|
1340
1320
|
created_at: e.string().optional()
|
|
1341
|
-
}), Et = e.array(
|
|
1321
|
+
}), Et = e.array(Ue), Fe = e.object({
|
|
1342
1322
|
name: e.string().min(1).max(50).openapi({
|
|
1343
1323
|
description: "The name of the role. Cannot include '<' or '>'"
|
|
1344
1324
|
}),
|
|
1345
1325
|
description: e.string().max(255).optional().openapi({
|
|
1346
1326
|
description: "The description of the role"
|
|
1347
1327
|
})
|
|
1348
|
-
}),
|
|
1328
|
+
}), we = e.object({
|
|
1349
1329
|
id: e.string().openapi({
|
|
1350
1330
|
description: "The unique identifier of the role"
|
|
1351
1331
|
}),
|
|
1352
|
-
...
|
|
1332
|
+
...Fe.shape,
|
|
1353
1333
|
created_at: e.string().optional(),
|
|
1354
1334
|
updated_at: e.string().optional()
|
|
1355
|
-
}), St = e.array(
|
|
1335
|
+
}), St = e.array(we), je = e.object({
|
|
1356
1336
|
logo_url: e.string().optional().openapi({
|
|
1357
1337
|
description: "URL of the organization's logo"
|
|
1358
1338
|
}),
|
|
@@ -1422,48 +1402,49 @@ const ge = e.object({
|
|
|
1422
1402
|
id: e.string()
|
|
1423
1403
|
});
|
|
1424
1404
|
function At(t) {
|
|
1425
|
-
const [n,
|
|
1426
|
-
if (!n || !
|
|
1405
|
+
const [n, r] = t.split("|");
|
|
1406
|
+
if (!n || !r)
|
|
1427
1407
|
throw new Error(`Invalid user_id: ${t}`);
|
|
1428
|
-
return { connection: n, id:
|
|
1408
|
+
return { connection: n, id: r };
|
|
1429
1409
|
}
|
|
1430
1410
|
export {
|
|
1431
1411
|
ce as Auth0Client,
|
|
1432
|
-
|
|
1433
|
-
|
|
1434
|
-
|
|
1435
|
-
|
|
1436
|
-
|
|
1412
|
+
g as AuthorizationResponseMode,
|
|
1413
|
+
d as AuthorizationResponseType,
|
|
1414
|
+
u as CodeChallengeMethod,
|
|
1415
|
+
p as ComponentCategory,
|
|
1416
|
+
_ as ComponentType,
|
|
1437
1417
|
de as GrantType,
|
|
1438
|
-
|
|
1418
|
+
se as LogTypes,
|
|
1439
1419
|
j as NodeType,
|
|
1440
|
-
T as applicationInsertSchema,
|
|
1441
|
-
Be as applicationSchema,
|
|
1442
1420
|
We as auth0FlowInsertSchema,
|
|
1443
|
-
|
|
1444
|
-
|
|
1421
|
+
x as auth0FlowSchema,
|
|
1422
|
+
xe as auth0UserResponseSchema,
|
|
1445
1423
|
K as authParamsSchema,
|
|
1446
1424
|
c as baseUserSchema,
|
|
1447
1425
|
ge as bordersSchema,
|
|
1448
|
-
|
|
1426
|
+
ze as brandingSchema,
|
|
1449
1427
|
L as buttonComponentSchema,
|
|
1450
|
-
N as
|
|
1451
|
-
|
|
1428
|
+
N as clientGrantInsertSchema,
|
|
1429
|
+
Be as clientGrantListSchema,
|
|
1430
|
+
y as clientGrantSchema,
|
|
1431
|
+
O as clientInsertSchema,
|
|
1432
|
+
T as clientSchema,
|
|
1452
1433
|
Y as codeInsertSchema,
|
|
1453
|
-
|
|
1434
|
+
Xe as codeSchema,
|
|
1454
1435
|
q as codeTypeSchema,
|
|
1455
1436
|
ue as colorsSchema,
|
|
1456
|
-
|
|
1437
|
+
w as componentSchema,
|
|
1457
1438
|
W as connectionInsertSchema,
|
|
1458
1439
|
B as connectionOptionsSchema,
|
|
1459
|
-
|
|
1440
|
+
z as connectionSchema,
|
|
1460
1441
|
a as coordinatesSchema,
|
|
1461
1442
|
Q as customDomainInsertSchema,
|
|
1462
1443
|
Z as customDomainSchema,
|
|
1463
1444
|
Ve as customDomainWithTenantIdSchema,
|
|
1464
1445
|
lt as emailProviderSchema,
|
|
1465
|
-
|
|
1466
|
-
|
|
1446
|
+
G as endingSchema,
|
|
1447
|
+
U as fieldComponentSchema,
|
|
1467
1448
|
v as flowNodeSchema,
|
|
1468
1449
|
o as fontDetailsSchema,
|
|
1469
1450
|
me as fontsSchema,
|
|
@@ -1471,16 +1452,16 @@ export {
|
|
|
1471
1452
|
ee as formInsertSchema,
|
|
1472
1453
|
$ as formNodeComponentDefinition,
|
|
1473
1454
|
Ye as formSchema,
|
|
1474
|
-
|
|
1455
|
+
F as genericComponentSchema,
|
|
1475
1456
|
P as genericNodeSchema,
|
|
1476
1457
|
Qe as hookInsertSchema,
|
|
1477
1458
|
Je as hookSchema,
|
|
1478
|
-
|
|
1459
|
+
f as identitySchema,
|
|
1479
1460
|
Ze as jwksKeySchema,
|
|
1480
1461
|
ae as jwksSchema,
|
|
1481
1462
|
D as legalComponentSchema,
|
|
1482
1463
|
tt as logSchema,
|
|
1483
|
-
|
|
1464
|
+
re as loginSessionInsertSchema,
|
|
1484
1465
|
et as loginSessionSchema,
|
|
1485
1466
|
H as nodeSchema,
|
|
1486
1467
|
$e as openIDConfigurationSchema,
|
|
@@ -1493,25 +1474,24 @@ export {
|
|
|
1493
1474
|
At as parseUserId,
|
|
1494
1475
|
_e as passwordInsertSchema,
|
|
1495
1476
|
ot as passwordSchema,
|
|
1496
|
-
|
|
1497
|
-
|
|
1477
|
+
S as profileDataSchema,
|
|
1478
|
+
st as promptSettingSchema,
|
|
1498
1479
|
fe as refreshTokenInsertSchema,
|
|
1499
1480
|
ct as refreshTokenSchema,
|
|
1500
|
-
|
|
1481
|
+
Ie as resourceServerInsertSchema,
|
|
1501
1482
|
dt as resourceServerListSchema,
|
|
1502
1483
|
Ae as resourceServerOptionsSchema,
|
|
1503
|
-
|
|
1484
|
+
Ce as resourceServerSchema,
|
|
1504
1485
|
be as resourceServerScopeSchema,
|
|
1505
1486
|
R as richTextComponentSchema,
|
|
1506
|
-
|
|
1487
|
+
Fe as roleInsertSchema,
|
|
1507
1488
|
St as roleListSchema,
|
|
1508
1489
|
Oe as rolePermissionInsertSchema,
|
|
1509
1490
|
gt as rolePermissionListSchema,
|
|
1510
1491
|
Te as rolePermissionSchema,
|
|
1511
1492
|
ut as rolePermissionWithDetailsListSchema,
|
|
1512
1493
|
Ne as rolePermissionWithDetailsSchema,
|
|
1513
|
-
|
|
1514
|
-
O as samlpAddon,
|
|
1494
|
+
we as roleSchema,
|
|
1515
1495
|
pe as sessionInsertSchema,
|
|
1516
1496
|
it as sessionSchema,
|
|
1517
1497
|
nt as signingKeySchema,
|
|
@@ -1519,13 +1499,13 @@ export {
|
|
|
1519
1499
|
_t as smsSendParamsSchema,
|
|
1520
1500
|
M as startSchema,
|
|
1521
1501
|
k as stepNodeSchema,
|
|
1522
|
-
|
|
1502
|
+
X as tenantInsertSchema,
|
|
1523
1503
|
V as tenantSchema,
|
|
1524
1504
|
Se as themeInsertSchema,
|
|
1525
|
-
|
|
1505
|
+
rt as themeSchema,
|
|
1526
1506
|
at as tokenResponseSchema,
|
|
1527
|
-
|
|
1528
|
-
|
|
1507
|
+
Ge as totalsSchema,
|
|
1508
|
+
b as userInsertSchema,
|
|
1529
1509
|
He as userOrganizationInsertSchema,
|
|
1530
1510
|
bt as userOrganizationSchema,
|
|
1531
1511
|
ye as userPermissionInsertSchema,
|
|
@@ -1536,8 +1516,8 @@ export {
|
|
|
1536
1516
|
Ke as userResponseSchema,
|
|
1537
1517
|
De as userRoleInsertSchema,
|
|
1538
1518
|
Et as userRoleListSchema,
|
|
1539
|
-
|
|
1540
|
-
|
|
1519
|
+
Ue as userRoleSchema,
|
|
1520
|
+
A as userSchema,
|
|
1541
1521
|
J as verificationMethodsSchema,
|
|
1542
1522
|
Ee as widgetSchema
|
|
1543
1523
|
};
|