@authhero/adapter-interfaces 0.90.0 → 0.92.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,12 +1,12 @@
1
1
  import { z as e } from "@hono/zod-openapi";
2
- const xe = e.object({
2
+ const Ge = e.object({
3
3
  start: e.number(),
4
4
  limit: e.number(),
5
5
  length: e.number()
6
6
  }), i = e.object({
7
7
  created_at: e.string(),
8
8
  updated_at: e.string()
9
- }), f = e.object({
9
+ }), S = e.object({
10
10
  email: e.string().optional(),
11
11
  email_verified: e.boolean().optional(),
12
12
  name: e.string().optional(),
@@ -15,7 +15,7 @@ const xe = e.object({
15
15
  phone_number: e.string().optional(),
16
16
  phone_verified: e.boolean().optional(),
17
17
  family_name: e.string().optional()
18
- }).catchall(e.any()), b = e.object({
18
+ }).catchall(e.any()), f = e.object({
19
19
  connection: e.string(),
20
20
  user_id: e.string(),
21
21
  provider: e.string(),
@@ -23,7 +23,7 @@ const xe = e.object({
23
23
  access_token: e.string().optional(),
24
24
  access_token_secret: e.string().optional(),
25
25
  refresh_token: e.string().optional(),
26
- profileData: f.optional()
26
+ profileData: S.optional()
27
27
  }), c = e.object({
28
28
  email: e.string().optional().transform((t) => t && t.toLowerCase()),
29
29
  username: e.string().optional(),
@@ -39,7 +39,7 @@ const xe = e.object({
39
39
  user_id: e.string().optional(),
40
40
  app_metadata: e.any().default({}).optional(),
41
41
  user_metadata: e.any().default({}).optional()
42
- }), A = c.extend({
42
+ }), b = c.extend({
43
43
  email_verified: e.boolean().default(!1),
44
44
  verify_email: e.boolean().optional(),
45
45
  last_ip: e.string().optional(),
@@ -48,80 +48,28 @@ const xe = e.object({
48
48
  provider: e.string().default("email"),
49
49
  connection: e.string().default("email"),
50
50
  is_social: e.boolean().optional()
51
- }), C = e.object({
52
- ...A.shape,
51
+ }), A = e.object({
52
+ ...b.shape,
53
53
  ...i.shape,
54
54
  user_id: e.string(),
55
55
  is_social: e.boolean(),
56
56
  email: e.string().optional(),
57
57
  login_count: e.number().default(0),
58
- identities: e.array(b).optional()
59
- }), Ge = C, Ke = c.extend({
58
+ identities: e.array(f).optional()
59
+ }), xe = A, Ke = c.extend({
60
60
  login_count: e.number(),
61
61
  multifactor: e.array(e.string()).optional(),
62
62
  last_ip: e.string().optional(),
63
63
  last_login: e.string().optional(),
64
64
  user_id: e.string()
65
65
  }).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
66
- let _ = (t = 21) => {
67
- let n = "", s = crypto.getRandomValues(new Uint8Array(t));
66
+ let C = (t = 21) => {
67
+ let n = "", r = crypto.getRandomValues(new Uint8Array(t));
68
68
  for (; t--; )
69
- n += I[s[t] & 63];
69
+ n += I[r[t] & 63];
70
70
  return n;
71
71
  };
72
72
  const O = e.object({
73
- audience: e.string().optional(),
74
- recipient: e.string().optional(),
75
- createUpnClaim: e.boolean().optional(),
76
- mapUnknownClaimsAsIs: e.boolean().optional(),
77
- passthroughClaimsWithNoMapping: e.boolean().optional(),
78
- mapIdentities: e.boolean().optional(),
79
- signatureAlgorithm: e.string().optional(),
80
- digestAlgorithm: e.string().optional(),
81
- issuer: e.string().optional(),
82
- destination: e.string().optional(),
83
- lifetimeInSeconds: e.number().optional(),
84
- signResponse: e.boolean().optional(),
85
- nameIdentifierFormat: e.string().optional(),
86
- nameIdentifierProbes: e.array(e.string()).optional(),
87
- authnContextClassRef: e.string().optional(),
88
- mappings: e.record(e.string()).optional()
89
- }), T = e.object({
90
- id: e.string(),
91
- name: e.string(),
92
- callbacks: e.array(e.string()).default([]).optional().openapi({
93
- description: "Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."
94
- }),
95
- allowed_origins: e.array(e.string()).default([]).optional().openapi({
96
- description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."
97
- }),
98
- web_origins: e.array(e.string()).default([]).optional().openapi({
99
- description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
100
- }),
101
- allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
102
- description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
103
- }),
104
- allowed_clients: e.array(e.string()).default([]).optional().openapi({
105
- description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
106
- }),
107
- addons: e.object({
108
- samlp: O.optional()
109
- }).default({}).optional().openapi({
110
- description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
111
- }),
112
- email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
113
- description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
114
- }),
115
- client_secret: e.string().default(() => _()).optional(),
116
- disable_sign_ups: e.boolean().optional().default(!1).openapi({
117
- description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
118
- }),
119
- client_metadata: e.record(e.string().length(255)).optional()
120
- }), Be = e.object({
121
- created_at: e.string().transform((t) => t === null ? "" : t),
122
- updated_at: e.string().transform((t) => t === null ? "" : t),
123
- ...T.shape
124
- }), N = e.object({
125
73
  client_id: e.string().openapi({
126
74
  description: "ID of this client."
127
75
  }),
@@ -134,7 +82,7 @@ const O = e.object({
134
82
  global: e.boolean().default(!1).openapi({
135
83
  description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
136
84
  }),
137
- client_secret: e.string().default(() => _()).optional().openapi({
85
+ client_secret: e.string().default(() => C()).optional().openapi({
138
86
  description: "Client secret (which you must not make public)."
139
87
  }),
140
88
  app_type: e.enum([
@@ -288,20 +236,52 @@ const O = e.object({
288
236
  description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
289
237
  }),
290
238
  token_quota: e.record(e.any()).default({}).optional()
291
- }), y = e.object({
239
+ }), T = e.object({
292
240
  created_at: e.string(),
293
241
  updated_at: e.string(),
294
- ...N.shape
295
- }), a = e.object({
242
+ ...O.shape
243
+ }), N = e.object({
244
+ client_id: e.string().min(1).openapi({
245
+ description: "ID of the client."
246
+ }),
247
+ audience: e.string().min(1).openapi({
248
+ description: "The audience (API identifier) of this client grant."
249
+ }),
250
+ scope: e.array(e.string()).optional().openapi({
251
+ description: "Scopes allowed for this client grant."
252
+ }),
253
+ organization_usage: e.enum(["deny", "allow", "require"]).optional().openapi({
254
+ description: "Defines whether organizations can be used with client credentials exchanges for this grant."
255
+ }),
256
+ allow_any_organization: e.boolean().optional().openapi({
257
+ description: "If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."
258
+ }),
259
+ is_system: e.boolean().optional().openapi({
260
+ description: "If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."
261
+ }),
262
+ subject_type: e.enum(["client", "user"]).optional().openapi({
263
+ description: "The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
264
+ }),
265
+ authorization_details_types: e.array(e.string()).optional().openapi({
266
+ description: "Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
267
+ })
268
+ }), y = e.object({
269
+ id: e.string().openapi({
270
+ description: "ID of the client grant."
271
+ }),
272
+ ...N.shape,
273
+ created_at: e.string().optional(),
274
+ updated_at: e.string().optional()
275
+ }), Be = e.array(y), a = e.object({
296
276
  x: e.number(),
297
277
  y: e.number()
298
278
  });
299
- var p = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(p || {}), d = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(d || {});
300
- const r = e.object({
279
+ var _ = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(_ || {}), p = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(p || {});
280
+ const s = e.object({
301
281
  id: e.string(),
302
- category: e.nativeEnum(d),
303
- type: e.nativeEnum(p)
304
- }), R = r.extend({
282
+ category: e.nativeEnum(p),
283
+ type: e.nativeEnum(_)
284
+ }), R = s.extend({
305
285
  category: e.literal(
306
286
  "BLOCK"
307
287
  /* BLOCK */
@@ -313,7 +293,7 @@ const r = e.object({
313
293
  config: e.object({
314
294
  content: e.string()
315
295
  }).passthrough()
316
- }), L = r.extend({
296
+ }), L = s.extend({
317
297
  category: e.literal(
318
298
  "BLOCK"
319
299
  /* BLOCK */
@@ -335,7 +315,7 @@ const r = e.object({
335
315
  config: e.object({
336
316
  text: e.string()
337
317
  }).passthrough()
338
- }), D = r.extend({
318
+ }), D = s.extend({
339
319
  category: e.literal(
340
320
  "FIELD"
341
321
  /* FIELD */
@@ -349,7 +329,7 @@ const r = e.object({
349
329
  config: e.object({
350
330
  text: e.string()
351
331
  }).passthrough()
352
- }), w = r.extend({
332
+ }), U = s.extend({
353
333
  category: e.literal(
354
334
  "FIELD"
355
335
  /* FIELD */
@@ -402,16 +382,16 @@ const r = e.object({
402
382
  label: e.string().optional(),
403
383
  placeholder: e.string().optional()
404
384
  }).passthrough()
405
- }), U = e.object({
385
+ }), F = e.object({
406
386
  id: e.string(),
407
387
  category: e.string(),
408
388
  type: e.string()
409
- }).passthrough(), F = e.union([
389
+ }).passthrough(), w = e.union([
410
390
  R,
411
391
  L,
412
392
  D,
413
- w,
414
- U
393
+ U,
394
+ F
415
395
  ]);
416
396
  var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
417
397
  const k = e.object({
@@ -423,7 +403,7 @@ const k = e.object({
423
403
  coordinates: a,
424
404
  alias: e.string().optional(),
425
405
  config: e.object({
426
- components: e.array(F),
406
+ components: e.array(w),
427
407
  next_node: e.string()
428
408
  }).passthrough()
429
409
  }), v = e.object({
@@ -449,10 +429,10 @@ const k = e.object({
449
429
  ]), M = e.object({
450
430
  next_node: e.string(),
451
431
  coordinates: a
452
- }).passthrough(), x = e.object({
432
+ }).passthrough(), G = e.object({
453
433
  resume_flow: e.boolean().optional(),
454
434
  coordinates: a
455
- }).passthrough(), G = e.object({
435
+ }).passthrough(), x = e.object({
456
436
  id: e.string(),
457
437
  name: e.string(),
458
438
  languages: e.object({
@@ -460,24 +440,24 @@ const k = e.object({
460
440
  }).passthrough(),
461
441
  nodes: e.array(H),
462
442
  start: M,
463
- ending: x,
443
+ ending: G,
464
444
  created_at: e.string(),
465
445
  updated_at: e.string(),
466
446
  links: e.object({
467
447
  sdkSrc: e.string().optional(),
468
448
  sdk_src: e.string().optional()
469
449
  }).passthrough()
470
- }).passthrough(), We = G.omit({
450
+ }).passthrough(), We = x.omit({
471
451
  id: !0,
472
452
  created_at: !0,
473
453
  updated_at: !0
474
454
  });
475
- var g = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(u || {}), m = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(m || {});
455
+ var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
476
456
  const K = e.object({
477
457
  client_id: e.string(),
478
458
  act_as: e.string().optional(),
479
- response_type: e.nativeEnum(g).optional(),
480
- response_mode: e.nativeEnum(u).optional(),
459
+ response_type: e.nativeEnum(d).optional(),
460
+ response_mode: e.nativeEnum(g).optional(),
481
461
  redirect_uri: e.string().optional(),
482
462
  audience: e.string().optional(),
483
463
  organization: e.string().optional(),
@@ -485,13 +465,13 @@ const K = e.object({
485
465
  nonce: e.string().optional(),
486
466
  scope: e.string().optional(),
487
467
  prompt: e.string().optional(),
488
- code_challenge_method: e.nativeEnum(m).optional(),
468
+ code_challenge_method: e.nativeEnum(u).optional(),
489
469
  code_challenge: e.string().optional(),
490
470
  username: e.string().optional(),
491
471
  ui_locales: e.string().optional(),
492
472
  // The following fields are not available in Auth0
493
473
  vendor_id: e.string().optional()
494
- }), Xe = e.object({
474
+ }), ze = e.object({
495
475
  colors: e.object({
496
476
  primary: e.string(),
497
477
  page_background: e.object({
@@ -533,11 +513,11 @@ const K = e.object({
533
513
  enabled_clients: e.array(e.string()).default([]).optional(),
534
514
  response_type: e.custom().optional(),
535
515
  response_mode: e.custom().optional()
536
- }), X = e.object({
516
+ }), z = e.object({
537
517
  id: e.string(),
538
518
  created_at: e.string().transform((t) => t === null ? "" : t),
539
519
  updated_at: e.string().transform((t) => t === null ? "" : t)
540
- }).extend(W.shape), z = e.object({
520
+ }).extend(W.shape), X = e.object({
541
521
  name: e.string(),
542
522
  audience: e.string(),
543
523
  sender_email: e.string().email(),
@@ -551,16 +531,13 @@ const K = e.object({
551
531
  }), V = e.object({
552
532
  created_at: e.string().transform((t) => t === null ? "" : t),
553
533
  updated_at: e.string().transform((t) => t === null ? "" : t),
554
- ...z.shape,
534
+ ...X.shape,
555
535
  id: e.string()
556
536
  });
557
537
  e.object({
558
- ...y.shape,
538
+ ...T.shape,
559
539
  tenant: V,
560
- connections: e.array(X),
561
- // Legacy fields for backward compatibility - these are now stored in client_metadata
562
- disable_sign_ups: e.boolean(),
563
- email_validation: e.string()
540
+ connections: e.array(z)
564
541
  });
565
542
  const q = e.enum([
566
543
  "password_reset",
@@ -601,7 +578,7 @@ const q = e.enum([
601
578
  expires_at: e.string(),
602
579
  used_at: e.string().optional(),
603
580
  user_id: e.string().optional()
604
- }), ze = e.object({
581
+ }), Xe = e.object({
605
582
  ...Y.shape,
606
583
  created_at: e.string()
607
584
  }), Q = e.object({
@@ -764,12 +741,12 @@ const q = e.enum([
764
741
  ...i.shape,
765
742
  ...ee.shape,
766
743
  id: e.string()
767
- }), h = e.enum([
744
+ }), m = e.enum([
768
745
  "pre-user-signup",
769
746
  "post-user-registration",
770
747
  "post-user-login"
771
748
  // Potentially other triggers specific to webhooks in the future
772
- ]), E = e.enum([
749
+ ]), h = e.enum([
773
750
  "pre-user-signup",
774
751
  "post-user-registration",
775
752
  "post-user-login"
@@ -780,24 +757,24 @@ const q = e.enum([
780
757
  hook_id: e.string().optional()
781
758
  }, te = e.object({
782
759
  ...l,
783
- trigger_id: h,
760
+ trigger_id: m,
784
761
  url: e.string()
785
762
  }), oe = e.object({
786
763
  ...l,
787
- trigger_id: E,
764
+ trigger_id: h,
788
765
  form_id: e.string()
789
766
  }), Qe = e.union([
790
767
  te,
791
768
  oe
792
769
  ]), ie = e.object({
793
770
  ...l,
794
- trigger_id: h,
771
+ trigger_id: m,
795
772
  ...i.shape,
796
773
  hook_id: e.string(),
797
774
  url: e.string()
798
775
  }), ne = e.object({
799
776
  ...l,
800
- trigger_id: E,
777
+ trigger_id: h,
801
778
  ...i.shape,
802
779
  hook_id: e.string(),
803
780
  form_id: e.string()
@@ -843,7 +820,7 @@ const q = e.enum([
843
820
  request_uri_parameter_supported: e.boolean(),
844
821
  request_parameter_supported: e.boolean(),
845
822
  token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
846
- }), se = e.object({
823
+ }), re = e.object({
847
824
  csrf_token: e.string(),
848
825
  auth0Client: e.string().optional(),
849
826
  authParams: K,
@@ -857,13 +834,13 @@ const q = e.enum([
857
834
  }).openapi({
858
835
  description: "This represents a login sesion"
859
836
  }), et = e.object({
860
- ...se.shape,
837
+ ...re.shape,
861
838
  id: e.string().openapi({
862
839
  description: "This is is used as the state in the universal login"
863
840
  }),
864
841
  created_at: e.string(),
865
842
  updated_at: e.string()
866
- }), re = {
843
+ }), se = {
867
844
  // Network & System
868
845
  ACLS_SUMMARY: "acls_summary",
869
846
  ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
@@ -1031,7 +1008,7 @@ const q = e.enum([
1031
1008
  WARNING_SENDING_NOTIFICATION: "wn",
1032
1009
  WARNING_USER_MANAGEMENT: "wum"
1033
1010
  }, le = e.string().refine(
1034
- (t) => Object.values(re).includes(t),
1011
+ (t) => Object.values(se).includes(t),
1035
1012
  { message: "Invalid log type" }
1036
1013
  ), ce = e.object({
1037
1014
  name: e.string(),
@@ -1070,7 +1047,7 @@ const q = e.enum([
1070
1047
  ..._e.shape,
1071
1048
  created_at: e.string(),
1072
1049
  updated_at: e.string()
1073
- }), S = e.object({
1050
+ }), E = e.object({
1074
1051
  initial_user_agent: e.string().describe("First user agent of the device from which this user logged in"),
1075
1052
  initial_ip: e.string().describe("First IP address associated with this session"),
1076
1053
  initial_asn: e.string().describe("First autonomous system number associated with this session"),
@@ -1085,7 +1062,7 @@ const q = e.enum([
1085
1062
  expires_at: e.string().optional(),
1086
1063
  login_session_id: e.string(),
1087
1064
  idle_expires_at: e.string().optional(),
1088
- device: S.describe(
1065
+ device: E.describe(
1089
1066
  "Metadata related to the device used in the session"
1090
1067
  ),
1091
1068
  clients: e.array(e.string()).describe("List of client details for the session")
@@ -1195,9 +1172,9 @@ const ge = e.object({
1195
1172
  fonts: me,
1196
1173
  page_background: he,
1197
1174
  widget: Ee
1198
- }), st = Se.extend({
1175
+ }), rt = Se.extend({
1199
1176
  themeId: e.string()
1200
- }), rt = e.object({
1177
+ }), st = e.object({
1201
1178
  universal_login_experience: e.enum(["new", "classic"]).default("new"),
1202
1179
  identifier_first: e.boolean().default(!0),
1203
1180
  password_first: e.boolean().default(!1),
@@ -1245,7 +1222,7 @@ const ge = e.object({
1245
1222
  idle_expires_at: e.string().optional(),
1246
1223
  // When the token was last used.
1247
1224
  last_exchanged_at: e.string().optional(),
1248
- device: S,
1225
+ device: E,
1249
1226
  resource_servers: e.array(
1250
1227
  e.object({
1251
1228
  audience: e.string(),
@@ -1277,7 +1254,7 @@ const ge = e.object({
1277
1254
  mtls: e.object({
1278
1255
  bound_access_tokens: e.boolean().optional()
1279
1256
  }).optional()
1280
- }), Ce = e.object({
1257
+ }), Ie = e.object({
1281
1258
  name: e.string(),
1282
1259
  identifier: e.string(),
1283
1260
  scopes: e.array(be).optional(),
@@ -1289,12 +1266,12 @@ const ge = e.object({
1289
1266
  allow_offline_access: e.boolean().optional(),
1290
1267
  verificationKey: e.string().optional(),
1291
1268
  options: Ae.optional()
1292
- }), Ie = e.object({
1269
+ }), Ce = e.object({
1293
1270
  id: e.string().optional(),
1294
- ...Ce.shape,
1271
+ ...Ie.shape,
1295
1272
  created_at: e.string().optional(),
1296
1273
  updated_at: e.string().optional()
1297
- }), dt = e.array(Ie), Oe = e.object({
1274
+ }), dt = e.array(Ce), Oe = e.object({
1298
1275
  role_id: e.string(),
1299
1276
  resource_server_identifier: e.string(),
1300
1277
  permission_name: e.string()
@@ -1334,25 +1311,25 @@ const ge = e.object({
1334
1311
  user_id: e.string(),
1335
1312
  role_id: e.string(),
1336
1313
  organization_id: e.string().optional()
1337
- }), we = e.object({
1314
+ }), Ue = e.object({
1338
1315
  ...De.shape,
1339
1316
  tenant_id: e.string(),
1340
1317
  created_at: e.string().optional()
1341
- }), Et = e.array(we), Ue = e.object({
1318
+ }), Et = e.array(Ue), Fe = e.object({
1342
1319
  name: e.string().min(1).max(50).openapi({
1343
1320
  description: "The name of the role. Cannot include '<' or '>'"
1344
1321
  }),
1345
1322
  description: e.string().max(255).optional().openapi({
1346
1323
  description: "The description of the role"
1347
1324
  })
1348
- }), Fe = e.object({
1325
+ }), we = e.object({
1349
1326
  id: e.string().openapi({
1350
1327
  description: "The unique identifier of the role"
1351
1328
  }),
1352
- ...Ue.shape,
1329
+ ...Fe.shape,
1353
1330
  created_at: e.string().optional(),
1354
1331
  updated_at: e.string().optional()
1355
- }), St = e.array(Fe), je = e.object({
1332
+ }), St = e.array(we), je = e.object({
1356
1333
  logo_url: e.string().optional().openapi({
1357
1334
  description: "URL of the organization's logo"
1358
1335
  }),
@@ -1422,48 +1399,49 @@ const ge = e.object({
1422
1399
  id: e.string()
1423
1400
  });
1424
1401
  function At(t) {
1425
- const [n, s] = t.split("|");
1426
- if (!n || !s)
1402
+ const [n, r] = t.split("|");
1403
+ if (!n || !r)
1427
1404
  throw new Error(`Invalid user_id: ${t}`);
1428
- return { connection: n, id: s };
1405
+ return { connection: n, id: r };
1429
1406
  }
1430
1407
  export {
1431
1408
  ce as Auth0Client,
1432
- u as AuthorizationResponseMode,
1433
- g as AuthorizationResponseType,
1434
- m as CodeChallengeMethod,
1435
- d as ComponentCategory,
1436
- p as ComponentType,
1409
+ g as AuthorizationResponseMode,
1410
+ d as AuthorizationResponseType,
1411
+ u as CodeChallengeMethod,
1412
+ p as ComponentCategory,
1413
+ _ as ComponentType,
1437
1414
  de as GrantType,
1438
- re as LogTypes,
1415
+ se as LogTypes,
1439
1416
  j as NodeType,
1440
- T as applicationInsertSchema,
1441
- Be as applicationSchema,
1442
1417
  We as auth0FlowInsertSchema,
1443
- G as auth0FlowSchema,
1444
- Ge as auth0UserResponseSchema,
1418
+ x as auth0FlowSchema,
1419
+ xe as auth0UserResponseSchema,
1445
1420
  K as authParamsSchema,
1446
1421
  c as baseUserSchema,
1447
1422
  ge as bordersSchema,
1448
- Xe as brandingSchema,
1423
+ ze as brandingSchema,
1449
1424
  L as buttonComponentSchema,
1450
- N as clientInsertSchema,
1451
- y as clientSchema,
1425
+ N as clientGrantInsertSchema,
1426
+ Be as clientGrantListSchema,
1427
+ y as clientGrantSchema,
1428
+ O as clientInsertSchema,
1429
+ T as clientSchema,
1452
1430
  Y as codeInsertSchema,
1453
- ze as codeSchema,
1431
+ Xe as codeSchema,
1454
1432
  q as codeTypeSchema,
1455
1433
  ue as colorsSchema,
1456
- F as componentSchema,
1434
+ w as componentSchema,
1457
1435
  W as connectionInsertSchema,
1458
1436
  B as connectionOptionsSchema,
1459
- X as connectionSchema,
1437
+ z as connectionSchema,
1460
1438
  a as coordinatesSchema,
1461
1439
  Q as customDomainInsertSchema,
1462
1440
  Z as customDomainSchema,
1463
1441
  Ve as customDomainWithTenantIdSchema,
1464
1442
  lt as emailProviderSchema,
1465
- x as endingSchema,
1466
- w as fieldComponentSchema,
1443
+ G as endingSchema,
1444
+ U as fieldComponentSchema,
1467
1445
  v as flowNodeSchema,
1468
1446
  o as fontDetailsSchema,
1469
1447
  me as fontsSchema,
@@ -1471,16 +1449,16 @@ export {
1471
1449
  ee as formInsertSchema,
1472
1450
  $ as formNodeComponentDefinition,
1473
1451
  Ye as formSchema,
1474
- U as genericComponentSchema,
1452
+ F as genericComponentSchema,
1475
1453
  P as genericNodeSchema,
1476
1454
  Qe as hookInsertSchema,
1477
1455
  Je as hookSchema,
1478
- b as identitySchema,
1456
+ f as identitySchema,
1479
1457
  Ze as jwksKeySchema,
1480
1458
  ae as jwksSchema,
1481
1459
  D as legalComponentSchema,
1482
1460
  tt as logSchema,
1483
- se as loginSessionInsertSchema,
1461
+ re as loginSessionInsertSchema,
1484
1462
  et as loginSessionSchema,
1485
1463
  H as nodeSchema,
1486
1464
  $e as openIDConfigurationSchema,
@@ -1493,25 +1471,24 @@ export {
1493
1471
  At as parseUserId,
1494
1472
  _e as passwordInsertSchema,
1495
1473
  ot as passwordSchema,
1496
- f as profileDataSchema,
1497
- rt as promptSettingSchema,
1474
+ S as profileDataSchema,
1475
+ st as promptSettingSchema,
1498
1476
  fe as refreshTokenInsertSchema,
1499
1477
  ct as refreshTokenSchema,
1500
- Ce as resourceServerInsertSchema,
1478
+ Ie as resourceServerInsertSchema,
1501
1479
  dt as resourceServerListSchema,
1502
1480
  Ae as resourceServerOptionsSchema,
1503
- Ie as resourceServerSchema,
1481
+ Ce as resourceServerSchema,
1504
1482
  be as resourceServerScopeSchema,
1505
1483
  R as richTextComponentSchema,
1506
- Ue as roleInsertSchema,
1484
+ Fe as roleInsertSchema,
1507
1485
  St as roleListSchema,
1508
1486
  Oe as rolePermissionInsertSchema,
1509
1487
  gt as rolePermissionListSchema,
1510
1488
  Te as rolePermissionSchema,
1511
1489
  ut as rolePermissionWithDetailsListSchema,
1512
1490
  Ne as rolePermissionWithDetailsSchema,
1513
- Fe as roleSchema,
1514
- O as samlpAddon,
1491
+ we as roleSchema,
1515
1492
  pe as sessionInsertSchema,
1516
1493
  it as sessionSchema,
1517
1494
  nt as signingKeySchema,
@@ -1519,13 +1496,13 @@ export {
1519
1496
  _t as smsSendParamsSchema,
1520
1497
  M as startSchema,
1521
1498
  k as stepNodeSchema,
1522
- z as tenantInsertSchema,
1499
+ X as tenantInsertSchema,
1523
1500
  V as tenantSchema,
1524
1501
  Se as themeInsertSchema,
1525
- st as themeSchema,
1502
+ rt as themeSchema,
1526
1503
  at as tokenResponseSchema,
1527
- xe as totalsSchema,
1528
- A as userInsertSchema,
1504
+ Ge as totalsSchema,
1505
+ b as userInsertSchema,
1529
1506
  He as userOrganizationInsertSchema,
1530
1507
  bt as userOrganizationSchema,
1531
1508
  ye as userPermissionInsertSchema,
@@ -1536,8 +1513,8 @@ export {
1536
1513
  Ke as userResponseSchema,
1537
1514
  De as userRoleInsertSchema,
1538
1515
  Et as userRoleListSchema,
1539
- we as userRoleSchema,
1540
- C as userSchema,
1516
+ Ue as userRoleSchema,
1517
+ A as userSchema,
1541
1518
  J as verificationMethodsSchema,
1542
1519
  Ee as widgetSchema
1543
1520
  };
package/package.json CHANGED
@@ -11,7 +11,7 @@
11
11
  "type": "git",
12
12
  "url": "https://github.com/markusahlstrand/authhero"
13
13
  },
14
- "version": "0.90.0",
14
+ "version": "0.92.0",
15
15
  "files": [
16
16
  "dist"
17
17
  ],