@authhero/adapter-interfaces 0.90.0 → 0.92.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +241 -527
- package/dist/adapter-interfaces.mjs +137 -160
- package/package.json +1 -1
|
@@ -1,12 +1,12 @@
|
|
|
1
1
|
import { z as e } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const Ge = e.object({
|
|
3
3
|
start: e.number(),
|
|
4
4
|
limit: e.number(),
|
|
5
5
|
length: e.number()
|
|
6
6
|
}), i = e.object({
|
|
7
7
|
created_at: e.string(),
|
|
8
8
|
updated_at: e.string()
|
|
9
|
-
}),
|
|
9
|
+
}), S = e.object({
|
|
10
10
|
email: e.string().optional(),
|
|
11
11
|
email_verified: e.boolean().optional(),
|
|
12
12
|
name: e.string().optional(),
|
|
@@ -15,7 +15,7 @@ const xe = e.object({
|
|
|
15
15
|
phone_number: e.string().optional(),
|
|
16
16
|
phone_verified: e.boolean().optional(),
|
|
17
17
|
family_name: e.string().optional()
|
|
18
|
-
}).catchall(e.any()),
|
|
18
|
+
}).catchall(e.any()), f = e.object({
|
|
19
19
|
connection: e.string(),
|
|
20
20
|
user_id: e.string(),
|
|
21
21
|
provider: e.string(),
|
|
@@ -23,7 +23,7 @@ const xe = e.object({
|
|
|
23
23
|
access_token: e.string().optional(),
|
|
24
24
|
access_token_secret: e.string().optional(),
|
|
25
25
|
refresh_token: e.string().optional(),
|
|
26
|
-
profileData:
|
|
26
|
+
profileData: S.optional()
|
|
27
27
|
}), c = e.object({
|
|
28
28
|
email: e.string().optional().transform((t) => t && t.toLowerCase()),
|
|
29
29
|
username: e.string().optional(),
|
|
@@ -39,7 +39,7 @@ const xe = e.object({
|
|
|
39
39
|
user_id: e.string().optional(),
|
|
40
40
|
app_metadata: e.any().default({}).optional(),
|
|
41
41
|
user_metadata: e.any().default({}).optional()
|
|
42
|
-
}),
|
|
42
|
+
}), b = c.extend({
|
|
43
43
|
email_verified: e.boolean().default(!1),
|
|
44
44
|
verify_email: e.boolean().optional(),
|
|
45
45
|
last_ip: e.string().optional(),
|
|
@@ -48,80 +48,28 @@ const xe = e.object({
|
|
|
48
48
|
provider: e.string().default("email"),
|
|
49
49
|
connection: e.string().default("email"),
|
|
50
50
|
is_social: e.boolean().optional()
|
|
51
|
-
}),
|
|
52
|
-
...
|
|
51
|
+
}), A = e.object({
|
|
52
|
+
...b.shape,
|
|
53
53
|
...i.shape,
|
|
54
54
|
user_id: e.string(),
|
|
55
55
|
is_social: e.boolean(),
|
|
56
56
|
email: e.string().optional(),
|
|
57
57
|
login_count: e.number().default(0),
|
|
58
|
-
identities: e.array(
|
|
59
|
-
}),
|
|
58
|
+
identities: e.array(f).optional()
|
|
59
|
+
}), xe = A, Ke = c.extend({
|
|
60
60
|
login_count: e.number(),
|
|
61
61
|
multifactor: e.array(e.string()).optional(),
|
|
62
62
|
last_ip: e.string().optional(),
|
|
63
63
|
last_login: e.string().optional(),
|
|
64
64
|
user_id: e.string()
|
|
65
65
|
}).catchall(e.any()), I = "useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";
|
|
66
|
-
let
|
|
67
|
-
let n = "",
|
|
66
|
+
let C = (t = 21) => {
|
|
67
|
+
let n = "", r = crypto.getRandomValues(new Uint8Array(t));
|
|
68
68
|
for (; t--; )
|
|
69
|
-
n += I[
|
|
69
|
+
n += I[r[t] & 63];
|
|
70
70
|
return n;
|
|
71
71
|
};
|
|
72
72
|
const O = e.object({
|
|
73
|
-
audience: e.string().optional(),
|
|
74
|
-
recipient: e.string().optional(),
|
|
75
|
-
createUpnClaim: e.boolean().optional(),
|
|
76
|
-
mapUnknownClaimsAsIs: e.boolean().optional(),
|
|
77
|
-
passthroughClaimsWithNoMapping: e.boolean().optional(),
|
|
78
|
-
mapIdentities: e.boolean().optional(),
|
|
79
|
-
signatureAlgorithm: e.string().optional(),
|
|
80
|
-
digestAlgorithm: e.string().optional(),
|
|
81
|
-
issuer: e.string().optional(),
|
|
82
|
-
destination: e.string().optional(),
|
|
83
|
-
lifetimeInSeconds: e.number().optional(),
|
|
84
|
-
signResponse: e.boolean().optional(),
|
|
85
|
-
nameIdentifierFormat: e.string().optional(),
|
|
86
|
-
nameIdentifierProbes: e.array(e.string()).optional(),
|
|
87
|
-
authnContextClassRef: e.string().optional(),
|
|
88
|
-
mappings: e.record(e.string()).optional()
|
|
89
|
-
}), T = e.object({
|
|
90
|
-
id: e.string(),
|
|
91
|
-
name: e.string(),
|
|
92
|
-
callbacks: e.array(e.string()).default([]).optional().openapi({
|
|
93
|
-
description: "Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."
|
|
94
|
-
}),
|
|
95
|
-
allowed_origins: e.array(e.string()).default([]).optional().openapi({
|
|
96
|
-
description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."
|
|
97
|
-
}),
|
|
98
|
-
web_origins: e.array(e.string()).default([]).optional().openapi({
|
|
99
|
-
description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
|
|
100
|
-
}),
|
|
101
|
-
allowed_logout_urls: e.array(e.string()).default([]).optional().openapi({
|
|
102
|
-
description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
|
|
103
|
-
}),
|
|
104
|
-
allowed_clients: e.array(e.string()).default([]).optional().openapi({
|
|
105
|
-
description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
|
|
106
|
-
}),
|
|
107
|
-
addons: e.object({
|
|
108
|
-
samlp: O.optional()
|
|
109
|
-
}).default({}).optional().openapi({
|
|
110
|
-
description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
|
|
111
|
-
}),
|
|
112
|
-
email_validation: e.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
|
|
113
|
-
description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
|
|
114
|
-
}),
|
|
115
|
-
client_secret: e.string().default(() => _()).optional(),
|
|
116
|
-
disable_sign_ups: e.boolean().optional().default(!1).openapi({
|
|
117
|
-
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
118
|
-
}),
|
|
119
|
-
client_metadata: e.record(e.string().length(255)).optional()
|
|
120
|
-
}), Be = e.object({
|
|
121
|
-
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
122
|
-
updated_at: e.string().transform((t) => t === null ? "" : t),
|
|
123
|
-
...T.shape
|
|
124
|
-
}), N = e.object({
|
|
125
73
|
client_id: e.string().openapi({
|
|
126
74
|
description: "ID of this client."
|
|
127
75
|
}),
|
|
@@ -134,7 +82,7 @@ const O = e.object({
|
|
|
134
82
|
global: e.boolean().default(!1).openapi({
|
|
135
83
|
description: "Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."
|
|
136
84
|
}),
|
|
137
|
-
client_secret: e.string().default(() =>
|
|
85
|
+
client_secret: e.string().default(() => C()).optional().openapi({
|
|
138
86
|
description: "Client secret (which you must not make public)."
|
|
139
87
|
}),
|
|
140
88
|
app_type: e.enum([
|
|
@@ -288,20 +236,52 @@ const O = e.object({
|
|
|
288
236
|
description: "Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"
|
|
289
237
|
}),
|
|
290
238
|
token_quota: e.record(e.any()).default({}).optional()
|
|
291
|
-
}),
|
|
239
|
+
}), T = e.object({
|
|
292
240
|
created_at: e.string(),
|
|
293
241
|
updated_at: e.string(),
|
|
294
|
-
...
|
|
295
|
-
}),
|
|
242
|
+
...O.shape
|
|
243
|
+
}), N = e.object({
|
|
244
|
+
client_id: e.string().min(1).openapi({
|
|
245
|
+
description: "ID of the client."
|
|
246
|
+
}),
|
|
247
|
+
audience: e.string().min(1).openapi({
|
|
248
|
+
description: "The audience (API identifier) of this client grant."
|
|
249
|
+
}),
|
|
250
|
+
scope: e.array(e.string()).optional().openapi({
|
|
251
|
+
description: "Scopes allowed for this client grant."
|
|
252
|
+
}),
|
|
253
|
+
organization_usage: e.enum(["deny", "allow", "require"]).optional().openapi({
|
|
254
|
+
description: "Defines whether organizations can be used with client credentials exchanges for this grant."
|
|
255
|
+
}),
|
|
256
|
+
allow_any_organization: e.boolean().optional().openapi({
|
|
257
|
+
description: "If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."
|
|
258
|
+
}),
|
|
259
|
+
is_system: e.boolean().optional().openapi({
|
|
260
|
+
description: "If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."
|
|
261
|
+
}),
|
|
262
|
+
subject_type: e.enum(["client", "user"]).optional().openapi({
|
|
263
|
+
description: "The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
|
|
264
|
+
}),
|
|
265
|
+
authorization_details_types: e.array(e.string()).optional().openapi({
|
|
266
|
+
description: "Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."
|
|
267
|
+
})
|
|
268
|
+
}), y = e.object({
|
|
269
|
+
id: e.string().openapi({
|
|
270
|
+
description: "ID of the client grant."
|
|
271
|
+
}),
|
|
272
|
+
...N.shape,
|
|
273
|
+
created_at: e.string().optional(),
|
|
274
|
+
updated_at: e.string().optional()
|
|
275
|
+
}), Be = e.array(y), a = e.object({
|
|
296
276
|
x: e.number(),
|
|
297
277
|
y: e.number()
|
|
298
278
|
});
|
|
299
|
-
var
|
|
300
|
-
const
|
|
279
|
+
var _ = /* @__PURE__ */ ((t) => (t.RICH_TEXT = "RICH_TEXT", t.NEXT_BUTTON = "NEXT_BUTTON", t.BACK_BUTTON = "BACK_BUTTON", t.SUBMIT_BUTTON = "SUBMIT_BUTTON", t.DIVIDER = "DIVIDER", t.TEXT = "TEXT", t.EMAIL = "EMAIL", t.PASSWORD = "PASSWORD", t.NUMBER = "NUMBER", t.PHONE = "PHONE", t.DATE = "DATE", t.CHECKBOX = "CHECKBOX", t.RADIO = "RADIO", t.SELECT = "SELECT", t.HIDDEN = "HIDDEN", t.LEGAL = "LEGAL", t))(_ || {}), p = /* @__PURE__ */ ((t) => (t.BLOCK = "BLOCK", t.FIELD = "FIELD", t))(p || {});
|
|
280
|
+
const s = e.object({
|
|
301
281
|
id: e.string(),
|
|
302
|
-
category: e.nativeEnum(
|
|
303
|
-
type: e.nativeEnum(
|
|
304
|
-
}), R =
|
|
282
|
+
category: e.nativeEnum(p),
|
|
283
|
+
type: e.nativeEnum(_)
|
|
284
|
+
}), R = s.extend({
|
|
305
285
|
category: e.literal(
|
|
306
286
|
"BLOCK"
|
|
307
287
|
/* BLOCK */
|
|
@@ -313,7 +293,7 @@ const r = e.object({
|
|
|
313
293
|
config: e.object({
|
|
314
294
|
content: e.string()
|
|
315
295
|
}).passthrough()
|
|
316
|
-
}), L =
|
|
296
|
+
}), L = s.extend({
|
|
317
297
|
category: e.literal(
|
|
318
298
|
"BLOCK"
|
|
319
299
|
/* BLOCK */
|
|
@@ -335,7 +315,7 @@ const r = e.object({
|
|
|
335
315
|
config: e.object({
|
|
336
316
|
text: e.string()
|
|
337
317
|
}).passthrough()
|
|
338
|
-
}), D =
|
|
318
|
+
}), D = s.extend({
|
|
339
319
|
category: e.literal(
|
|
340
320
|
"FIELD"
|
|
341
321
|
/* FIELD */
|
|
@@ -349,7 +329,7 @@ const r = e.object({
|
|
|
349
329
|
config: e.object({
|
|
350
330
|
text: e.string()
|
|
351
331
|
}).passthrough()
|
|
352
|
-
}),
|
|
332
|
+
}), U = s.extend({
|
|
353
333
|
category: e.literal(
|
|
354
334
|
"FIELD"
|
|
355
335
|
/* FIELD */
|
|
@@ -402,16 +382,16 @@ const r = e.object({
|
|
|
402
382
|
label: e.string().optional(),
|
|
403
383
|
placeholder: e.string().optional()
|
|
404
384
|
}).passthrough()
|
|
405
|
-
}),
|
|
385
|
+
}), F = e.object({
|
|
406
386
|
id: e.string(),
|
|
407
387
|
category: e.string(),
|
|
408
388
|
type: e.string()
|
|
409
|
-
}).passthrough(),
|
|
389
|
+
}).passthrough(), w = e.union([
|
|
410
390
|
R,
|
|
411
391
|
L,
|
|
412
392
|
D,
|
|
413
|
-
|
|
414
|
-
|
|
393
|
+
U,
|
|
394
|
+
F
|
|
415
395
|
]);
|
|
416
396
|
var j = /* @__PURE__ */ ((t) => (t.STEP = "STEP", t.FLOW = "FLOW", t.CONDITION = "CONDITION", t.ACTION = "ACTION", t))(j || {});
|
|
417
397
|
const k = e.object({
|
|
@@ -423,7 +403,7 @@ const k = e.object({
|
|
|
423
403
|
coordinates: a,
|
|
424
404
|
alias: e.string().optional(),
|
|
425
405
|
config: e.object({
|
|
426
|
-
components: e.array(
|
|
406
|
+
components: e.array(w),
|
|
427
407
|
next_node: e.string()
|
|
428
408
|
}).passthrough()
|
|
429
409
|
}), v = e.object({
|
|
@@ -449,10 +429,10 @@ const k = e.object({
|
|
|
449
429
|
]), M = e.object({
|
|
450
430
|
next_node: e.string(),
|
|
451
431
|
coordinates: a
|
|
452
|
-
}).passthrough(),
|
|
432
|
+
}).passthrough(), G = e.object({
|
|
453
433
|
resume_flow: e.boolean().optional(),
|
|
454
434
|
coordinates: a
|
|
455
|
-
}).passthrough(),
|
|
435
|
+
}).passthrough(), x = e.object({
|
|
456
436
|
id: e.string(),
|
|
457
437
|
name: e.string(),
|
|
458
438
|
languages: e.object({
|
|
@@ -460,24 +440,24 @@ const k = e.object({
|
|
|
460
440
|
}).passthrough(),
|
|
461
441
|
nodes: e.array(H),
|
|
462
442
|
start: M,
|
|
463
|
-
ending:
|
|
443
|
+
ending: G,
|
|
464
444
|
created_at: e.string(),
|
|
465
445
|
updated_at: e.string(),
|
|
466
446
|
links: e.object({
|
|
467
447
|
sdkSrc: e.string().optional(),
|
|
468
448
|
sdk_src: e.string().optional()
|
|
469
449
|
}).passthrough()
|
|
470
|
-
}).passthrough(), We =
|
|
450
|
+
}).passthrough(), We = x.omit({
|
|
471
451
|
id: !0,
|
|
472
452
|
created_at: !0,
|
|
473
453
|
updated_at: !0
|
|
474
454
|
});
|
|
475
|
-
var
|
|
455
|
+
var d = /* @__PURE__ */ ((t) => (t.TOKEN = "token", t.TOKEN_ID_TOKEN = "token id_token", t.CODE = "code", t))(d || {}), g = /* @__PURE__ */ ((t) => (t.QUERY = "query", t.FRAGMENT = "fragment", t.FORM_POST = "form_post", t.WEB_MESSAGE = "web_message", t.SAML_POST = "saml_post", t))(g || {}), u = /* @__PURE__ */ ((t) => (t.S256 = "S256", t.Plain = "plain", t))(u || {});
|
|
476
456
|
const K = e.object({
|
|
477
457
|
client_id: e.string(),
|
|
478
458
|
act_as: e.string().optional(),
|
|
479
|
-
response_type: e.nativeEnum(
|
|
480
|
-
response_mode: e.nativeEnum(
|
|
459
|
+
response_type: e.nativeEnum(d).optional(),
|
|
460
|
+
response_mode: e.nativeEnum(g).optional(),
|
|
481
461
|
redirect_uri: e.string().optional(),
|
|
482
462
|
audience: e.string().optional(),
|
|
483
463
|
organization: e.string().optional(),
|
|
@@ -485,13 +465,13 @@ const K = e.object({
|
|
|
485
465
|
nonce: e.string().optional(),
|
|
486
466
|
scope: e.string().optional(),
|
|
487
467
|
prompt: e.string().optional(),
|
|
488
|
-
code_challenge_method: e.nativeEnum(
|
|
468
|
+
code_challenge_method: e.nativeEnum(u).optional(),
|
|
489
469
|
code_challenge: e.string().optional(),
|
|
490
470
|
username: e.string().optional(),
|
|
491
471
|
ui_locales: e.string().optional(),
|
|
492
472
|
// The following fields are not available in Auth0
|
|
493
473
|
vendor_id: e.string().optional()
|
|
494
|
-
}),
|
|
474
|
+
}), ze = e.object({
|
|
495
475
|
colors: e.object({
|
|
496
476
|
primary: e.string(),
|
|
497
477
|
page_background: e.object({
|
|
@@ -533,11 +513,11 @@ const K = e.object({
|
|
|
533
513
|
enabled_clients: e.array(e.string()).default([]).optional(),
|
|
534
514
|
response_type: e.custom().optional(),
|
|
535
515
|
response_mode: e.custom().optional()
|
|
536
|
-
}),
|
|
516
|
+
}), z = e.object({
|
|
537
517
|
id: e.string(),
|
|
538
518
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
539
519
|
updated_at: e.string().transform((t) => t === null ? "" : t)
|
|
540
|
-
}).extend(W.shape),
|
|
520
|
+
}).extend(W.shape), X = e.object({
|
|
541
521
|
name: e.string(),
|
|
542
522
|
audience: e.string(),
|
|
543
523
|
sender_email: e.string().email(),
|
|
@@ -551,16 +531,13 @@ const K = e.object({
|
|
|
551
531
|
}), V = e.object({
|
|
552
532
|
created_at: e.string().transform((t) => t === null ? "" : t),
|
|
553
533
|
updated_at: e.string().transform((t) => t === null ? "" : t),
|
|
554
|
-
...
|
|
534
|
+
...X.shape,
|
|
555
535
|
id: e.string()
|
|
556
536
|
});
|
|
557
537
|
e.object({
|
|
558
|
-
...
|
|
538
|
+
...T.shape,
|
|
559
539
|
tenant: V,
|
|
560
|
-
connections: e.array(
|
|
561
|
-
// Legacy fields for backward compatibility - these are now stored in client_metadata
|
|
562
|
-
disable_sign_ups: e.boolean(),
|
|
563
|
-
email_validation: e.string()
|
|
540
|
+
connections: e.array(z)
|
|
564
541
|
});
|
|
565
542
|
const q = e.enum([
|
|
566
543
|
"password_reset",
|
|
@@ -601,7 +578,7 @@ const q = e.enum([
|
|
|
601
578
|
expires_at: e.string(),
|
|
602
579
|
used_at: e.string().optional(),
|
|
603
580
|
user_id: e.string().optional()
|
|
604
|
-
}),
|
|
581
|
+
}), Xe = e.object({
|
|
605
582
|
...Y.shape,
|
|
606
583
|
created_at: e.string()
|
|
607
584
|
}), Q = e.object({
|
|
@@ -764,12 +741,12 @@ const q = e.enum([
|
|
|
764
741
|
...i.shape,
|
|
765
742
|
...ee.shape,
|
|
766
743
|
id: e.string()
|
|
767
|
-
}),
|
|
744
|
+
}), m = e.enum([
|
|
768
745
|
"pre-user-signup",
|
|
769
746
|
"post-user-registration",
|
|
770
747
|
"post-user-login"
|
|
771
748
|
// Potentially other triggers specific to webhooks in the future
|
|
772
|
-
]),
|
|
749
|
+
]), h = e.enum([
|
|
773
750
|
"pre-user-signup",
|
|
774
751
|
"post-user-registration",
|
|
775
752
|
"post-user-login"
|
|
@@ -780,24 +757,24 @@ const q = e.enum([
|
|
|
780
757
|
hook_id: e.string().optional()
|
|
781
758
|
}, te = e.object({
|
|
782
759
|
...l,
|
|
783
|
-
trigger_id:
|
|
760
|
+
trigger_id: m,
|
|
784
761
|
url: e.string()
|
|
785
762
|
}), oe = e.object({
|
|
786
763
|
...l,
|
|
787
|
-
trigger_id:
|
|
764
|
+
trigger_id: h,
|
|
788
765
|
form_id: e.string()
|
|
789
766
|
}), Qe = e.union([
|
|
790
767
|
te,
|
|
791
768
|
oe
|
|
792
769
|
]), ie = e.object({
|
|
793
770
|
...l,
|
|
794
|
-
trigger_id:
|
|
771
|
+
trigger_id: m,
|
|
795
772
|
...i.shape,
|
|
796
773
|
hook_id: e.string(),
|
|
797
774
|
url: e.string()
|
|
798
775
|
}), ne = e.object({
|
|
799
776
|
...l,
|
|
800
|
-
trigger_id:
|
|
777
|
+
trigger_id: h,
|
|
801
778
|
...i.shape,
|
|
802
779
|
hook_id: e.string(),
|
|
803
780
|
form_id: e.string()
|
|
@@ -843,7 +820,7 @@ const q = e.enum([
|
|
|
843
820
|
request_uri_parameter_supported: e.boolean(),
|
|
844
821
|
request_parameter_supported: e.boolean(),
|
|
845
822
|
token_endpoint_auth_signing_alg_values_supported: e.array(e.string())
|
|
846
|
-
}),
|
|
823
|
+
}), re = e.object({
|
|
847
824
|
csrf_token: e.string(),
|
|
848
825
|
auth0Client: e.string().optional(),
|
|
849
826
|
authParams: K,
|
|
@@ -857,13 +834,13 @@ const q = e.enum([
|
|
|
857
834
|
}).openapi({
|
|
858
835
|
description: "This represents a login sesion"
|
|
859
836
|
}), et = e.object({
|
|
860
|
-
...
|
|
837
|
+
...re.shape,
|
|
861
838
|
id: e.string().openapi({
|
|
862
839
|
description: "This is is used as the state in the universal login"
|
|
863
840
|
}),
|
|
864
841
|
created_at: e.string(),
|
|
865
842
|
updated_at: e.string()
|
|
866
|
-
}),
|
|
843
|
+
}), se = {
|
|
867
844
|
// Network & System
|
|
868
845
|
ACLS_SUMMARY: "acls_summary",
|
|
869
846
|
ACTIONS_EXECUTION_FAILED: "actions_execution_failed",
|
|
@@ -1031,7 +1008,7 @@ const q = e.enum([
|
|
|
1031
1008
|
WARNING_SENDING_NOTIFICATION: "wn",
|
|
1032
1009
|
WARNING_USER_MANAGEMENT: "wum"
|
|
1033
1010
|
}, le = e.string().refine(
|
|
1034
|
-
(t) => Object.values(
|
|
1011
|
+
(t) => Object.values(se).includes(t),
|
|
1035
1012
|
{ message: "Invalid log type" }
|
|
1036
1013
|
), ce = e.object({
|
|
1037
1014
|
name: e.string(),
|
|
@@ -1070,7 +1047,7 @@ const q = e.enum([
|
|
|
1070
1047
|
..._e.shape,
|
|
1071
1048
|
created_at: e.string(),
|
|
1072
1049
|
updated_at: e.string()
|
|
1073
|
-
}),
|
|
1050
|
+
}), E = e.object({
|
|
1074
1051
|
initial_user_agent: e.string().describe("First user agent of the device from which this user logged in"),
|
|
1075
1052
|
initial_ip: e.string().describe("First IP address associated with this session"),
|
|
1076
1053
|
initial_asn: e.string().describe("First autonomous system number associated with this session"),
|
|
@@ -1085,7 +1062,7 @@ const q = e.enum([
|
|
|
1085
1062
|
expires_at: e.string().optional(),
|
|
1086
1063
|
login_session_id: e.string(),
|
|
1087
1064
|
idle_expires_at: e.string().optional(),
|
|
1088
|
-
device:
|
|
1065
|
+
device: E.describe(
|
|
1089
1066
|
"Metadata related to the device used in the session"
|
|
1090
1067
|
),
|
|
1091
1068
|
clients: e.array(e.string()).describe("List of client details for the session")
|
|
@@ -1195,9 +1172,9 @@ const ge = e.object({
|
|
|
1195
1172
|
fonts: me,
|
|
1196
1173
|
page_background: he,
|
|
1197
1174
|
widget: Ee
|
|
1198
|
-
}),
|
|
1175
|
+
}), rt = Se.extend({
|
|
1199
1176
|
themeId: e.string()
|
|
1200
|
-
}),
|
|
1177
|
+
}), st = e.object({
|
|
1201
1178
|
universal_login_experience: e.enum(["new", "classic"]).default("new"),
|
|
1202
1179
|
identifier_first: e.boolean().default(!0),
|
|
1203
1180
|
password_first: e.boolean().default(!1),
|
|
@@ -1245,7 +1222,7 @@ const ge = e.object({
|
|
|
1245
1222
|
idle_expires_at: e.string().optional(),
|
|
1246
1223
|
// When the token was last used.
|
|
1247
1224
|
last_exchanged_at: e.string().optional(),
|
|
1248
|
-
device:
|
|
1225
|
+
device: E,
|
|
1249
1226
|
resource_servers: e.array(
|
|
1250
1227
|
e.object({
|
|
1251
1228
|
audience: e.string(),
|
|
@@ -1277,7 +1254,7 @@ const ge = e.object({
|
|
|
1277
1254
|
mtls: e.object({
|
|
1278
1255
|
bound_access_tokens: e.boolean().optional()
|
|
1279
1256
|
}).optional()
|
|
1280
|
-
}),
|
|
1257
|
+
}), Ie = e.object({
|
|
1281
1258
|
name: e.string(),
|
|
1282
1259
|
identifier: e.string(),
|
|
1283
1260
|
scopes: e.array(be).optional(),
|
|
@@ -1289,12 +1266,12 @@ const ge = e.object({
|
|
|
1289
1266
|
allow_offline_access: e.boolean().optional(),
|
|
1290
1267
|
verificationKey: e.string().optional(),
|
|
1291
1268
|
options: Ae.optional()
|
|
1292
|
-
}),
|
|
1269
|
+
}), Ce = e.object({
|
|
1293
1270
|
id: e.string().optional(),
|
|
1294
|
-
...
|
|
1271
|
+
...Ie.shape,
|
|
1295
1272
|
created_at: e.string().optional(),
|
|
1296
1273
|
updated_at: e.string().optional()
|
|
1297
|
-
}), dt = e.array(
|
|
1274
|
+
}), dt = e.array(Ce), Oe = e.object({
|
|
1298
1275
|
role_id: e.string(),
|
|
1299
1276
|
resource_server_identifier: e.string(),
|
|
1300
1277
|
permission_name: e.string()
|
|
@@ -1334,25 +1311,25 @@ const ge = e.object({
|
|
|
1334
1311
|
user_id: e.string(),
|
|
1335
1312
|
role_id: e.string(),
|
|
1336
1313
|
organization_id: e.string().optional()
|
|
1337
|
-
}),
|
|
1314
|
+
}), Ue = e.object({
|
|
1338
1315
|
...De.shape,
|
|
1339
1316
|
tenant_id: e.string(),
|
|
1340
1317
|
created_at: e.string().optional()
|
|
1341
|
-
}), Et = e.array(
|
|
1318
|
+
}), Et = e.array(Ue), Fe = e.object({
|
|
1342
1319
|
name: e.string().min(1).max(50).openapi({
|
|
1343
1320
|
description: "The name of the role. Cannot include '<' or '>'"
|
|
1344
1321
|
}),
|
|
1345
1322
|
description: e.string().max(255).optional().openapi({
|
|
1346
1323
|
description: "The description of the role"
|
|
1347
1324
|
})
|
|
1348
|
-
}),
|
|
1325
|
+
}), we = e.object({
|
|
1349
1326
|
id: e.string().openapi({
|
|
1350
1327
|
description: "The unique identifier of the role"
|
|
1351
1328
|
}),
|
|
1352
|
-
...
|
|
1329
|
+
...Fe.shape,
|
|
1353
1330
|
created_at: e.string().optional(),
|
|
1354
1331
|
updated_at: e.string().optional()
|
|
1355
|
-
}), St = e.array(
|
|
1332
|
+
}), St = e.array(we), je = e.object({
|
|
1356
1333
|
logo_url: e.string().optional().openapi({
|
|
1357
1334
|
description: "URL of the organization's logo"
|
|
1358
1335
|
}),
|
|
@@ -1422,48 +1399,49 @@ const ge = e.object({
|
|
|
1422
1399
|
id: e.string()
|
|
1423
1400
|
});
|
|
1424
1401
|
function At(t) {
|
|
1425
|
-
const [n,
|
|
1426
|
-
if (!n || !
|
|
1402
|
+
const [n, r] = t.split("|");
|
|
1403
|
+
if (!n || !r)
|
|
1427
1404
|
throw new Error(`Invalid user_id: ${t}`);
|
|
1428
|
-
return { connection: n, id:
|
|
1405
|
+
return { connection: n, id: r };
|
|
1429
1406
|
}
|
|
1430
1407
|
export {
|
|
1431
1408
|
ce as Auth0Client,
|
|
1432
|
-
|
|
1433
|
-
|
|
1434
|
-
|
|
1435
|
-
|
|
1436
|
-
|
|
1409
|
+
g as AuthorizationResponseMode,
|
|
1410
|
+
d as AuthorizationResponseType,
|
|
1411
|
+
u as CodeChallengeMethod,
|
|
1412
|
+
p as ComponentCategory,
|
|
1413
|
+
_ as ComponentType,
|
|
1437
1414
|
de as GrantType,
|
|
1438
|
-
|
|
1415
|
+
se as LogTypes,
|
|
1439
1416
|
j as NodeType,
|
|
1440
|
-
T as applicationInsertSchema,
|
|
1441
|
-
Be as applicationSchema,
|
|
1442
1417
|
We as auth0FlowInsertSchema,
|
|
1443
|
-
|
|
1444
|
-
|
|
1418
|
+
x as auth0FlowSchema,
|
|
1419
|
+
xe as auth0UserResponseSchema,
|
|
1445
1420
|
K as authParamsSchema,
|
|
1446
1421
|
c as baseUserSchema,
|
|
1447
1422
|
ge as bordersSchema,
|
|
1448
|
-
|
|
1423
|
+
ze as brandingSchema,
|
|
1449
1424
|
L as buttonComponentSchema,
|
|
1450
|
-
N as
|
|
1451
|
-
|
|
1425
|
+
N as clientGrantInsertSchema,
|
|
1426
|
+
Be as clientGrantListSchema,
|
|
1427
|
+
y as clientGrantSchema,
|
|
1428
|
+
O as clientInsertSchema,
|
|
1429
|
+
T as clientSchema,
|
|
1452
1430
|
Y as codeInsertSchema,
|
|
1453
|
-
|
|
1431
|
+
Xe as codeSchema,
|
|
1454
1432
|
q as codeTypeSchema,
|
|
1455
1433
|
ue as colorsSchema,
|
|
1456
|
-
|
|
1434
|
+
w as componentSchema,
|
|
1457
1435
|
W as connectionInsertSchema,
|
|
1458
1436
|
B as connectionOptionsSchema,
|
|
1459
|
-
|
|
1437
|
+
z as connectionSchema,
|
|
1460
1438
|
a as coordinatesSchema,
|
|
1461
1439
|
Q as customDomainInsertSchema,
|
|
1462
1440
|
Z as customDomainSchema,
|
|
1463
1441
|
Ve as customDomainWithTenantIdSchema,
|
|
1464
1442
|
lt as emailProviderSchema,
|
|
1465
|
-
|
|
1466
|
-
|
|
1443
|
+
G as endingSchema,
|
|
1444
|
+
U as fieldComponentSchema,
|
|
1467
1445
|
v as flowNodeSchema,
|
|
1468
1446
|
o as fontDetailsSchema,
|
|
1469
1447
|
me as fontsSchema,
|
|
@@ -1471,16 +1449,16 @@ export {
|
|
|
1471
1449
|
ee as formInsertSchema,
|
|
1472
1450
|
$ as formNodeComponentDefinition,
|
|
1473
1451
|
Ye as formSchema,
|
|
1474
|
-
|
|
1452
|
+
F as genericComponentSchema,
|
|
1475
1453
|
P as genericNodeSchema,
|
|
1476
1454
|
Qe as hookInsertSchema,
|
|
1477
1455
|
Je as hookSchema,
|
|
1478
|
-
|
|
1456
|
+
f as identitySchema,
|
|
1479
1457
|
Ze as jwksKeySchema,
|
|
1480
1458
|
ae as jwksSchema,
|
|
1481
1459
|
D as legalComponentSchema,
|
|
1482
1460
|
tt as logSchema,
|
|
1483
|
-
|
|
1461
|
+
re as loginSessionInsertSchema,
|
|
1484
1462
|
et as loginSessionSchema,
|
|
1485
1463
|
H as nodeSchema,
|
|
1486
1464
|
$e as openIDConfigurationSchema,
|
|
@@ -1493,25 +1471,24 @@ export {
|
|
|
1493
1471
|
At as parseUserId,
|
|
1494
1472
|
_e as passwordInsertSchema,
|
|
1495
1473
|
ot as passwordSchema,
|
|
1496
|
-
|
|
1497
|
-
|
|
1474
|
+
S as profileDataSchema,
|
|
1475
|
+
st as promptSettingSchema,
|
|
1498
1476
|
fe as refreshTokenInsertSchema,
|
|
1499
1477
|
ct as refreshTokenSchema,
|
|
1500
|
-
|
|
1478
|
+
Ie as resourceServerInsertSchema,
|
|
1501
1479
|
dt as resourceServerListSchema,
|
|
1502
1480
|
Ae as resourceServerOptionsSchema,
|
|
1503
|
-
|
|
1481
|
+
Ce as resourceServerSchema,
|
|
1504
1482
|
be as resourceServerScopeSchema,
|
|
1505
1483
|
R as richTextComponentSchema,
|
|
1506
|
-
|
|
1484
|
+
Fe as roleInsertSchema,
|
|
1507
1485
|
St as roleListSchema,
|
|
1508
1486
|
Oe as rolePermissionInsertSchema,
|
|
1509
1487
|
gt as rolePermissionListSchema,
|
|
1510
1488
|
Te as rolePermissionSchema,
|
|
1511
1489
|
ut as rolePermissionWithDetailsListSchema,
|
|
1512
1490
|
Ne as rolePermissionWithDetailsSchema,
|
|
1513
|
-
|
|
1514
|
-
O as samlpAddon,
|
|
1491
|
+
we as roleSchema,
|
|
1515
1492
|
pe as sessionInsertSchema,
|
|
1516
1493
|
it as sessionSchema,
|
|
1517
1494
|
nt as signingKeySchema,
|
|
@@ -1519,13 +1496,13 @@ export {
|
|
|
1519
1496
|
_t as smsSendParamsSchema,
|
|
1520
1497
|
M as startSchema,
|
|
1521
1498
|
k as stepNodeSchema,
|
|
1522
|
-
|
|
1499
|
+
X as tenantInsertSchema,
|
|
1523
1500
|
V as tenantSchema,
|
|
1524
1501
|
Se as themeInsertSchema,
|
|
1525
|
-
|
|
1502
|
+
rt as themeSchema,
|
|
1526
1503
|
at as tokenResponseSchema,
|
|
1527
|
-
|
|
1528
|
-
|
|
1504
|
+
Ge as totalsSchema,
|
|
1505
|
+
b as userInsertSchema,
|
|
1529
1506
|
He as userOrganizationInsertSchema,
|
|
1530
1507
|
bt as userOrganizationSchema,
|
|
1531
1508
|
ye as userPermissionInsertSchema,
|
|
@@ -1536,8 +1513,8 @@ export {
|
|
|
1536
1513
|
Ke as userResponseSchema,
|
|
1537
1514
|
De as userRoleInsertSchema,
|
|
1538
1515
|
Et as userRoleListSchema,
|
|
1539
|
-
|
|
1540
|
-
|
|
1516
|
+
Ue as userRoleSchema,
|
|
1517
|
+
A as userSchema,
|
|
1541
1518
|
J as verificationMethodsSchema,
|
|
1542
1519
|
Ee as widgetSchema
|
|
1543
1520
|
};
|