@authhero/adapter-interfaces 0.98.0 → 0.99.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/adapter-interfaces.cjs +1 -1
- package/dist/adapter-interfaces.d.ts +13 -65
- package/dist/adapter-interfaces.mjs +104 -116
- package/package.json +1 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Ue=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),n=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),u=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),m=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:u.optional()}),c=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),h=c.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().default("email"),connection:e.z.string().default("email"),is_social:e.z.boolean().optional()}),S=e.z.object({...h.shape,...n.shape,user_id:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(m).optional()}),Fe=S,Pe=c.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),Me="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let He=(t=21)=>{let a="",s=crypto.getRandomValues(new Uint8Array(t|=0));for(;t--;)a+=Me[s[t]&63];return a};const b=e.z.object({client_id:e.z.string().openapi({description:"ID of this client."}),name:e.z.string().min(1).openapi({description:"Name of this client (min length: 1 character, does not allow < or >)."}),description:e.z.string().max(140).optional().openapi({description:"Free text description of this client (max length: 140 characters)."}),global:e.z.boolean().default(!1).openapi({description:"Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."}),client_secret:e.z.string().default(()=>He()).optional().openapi({description:"Client secret (which you must not make public)."}),app_type:e.z.enum(["native","spa","regular_web","non_interactive","resource_server","express_configuration","rms","box","cloudbees","concur","dropbox","mscrm","echosign","egnyte","newrelic","office365","salesforce","sentry","sharepoint","slack","springcm","zendesk","zoom","sso_integration","oag"]).default("regular_web").optional().openapi({description:"The type of application this client represents"}),logo_uri:e.z.string().url().optional().openapi({description:"URL of the logo to display for this client. Recommended size is 150x150 pixels."}),is_first_party:e.z.boolean().default(!1).openapi({description:"Whether this client a first party client (true) or not (false)."}),oidc_conformant:e.z.boolean().default(!0).openapi({description:"Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."}),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),client_aliases:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of audiences/realms for SAML protocol. Used by the wsfed addon."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),session_transfer:e.z.record(e.z.any()).default({}).optional().openapi({description:"Native to Web SSO Configuration"}),oidc_logout:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration for OIDC backchannel logout"}),grant_types:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."}),jwt_configuration:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration related to JWTs for the client."}),signing_keys:e.z.array(e.z.record(e.z.any())).default([]).optional().openapi({description:"Signing certificates associated with this client."}),encryption_key:e.z.record(e.z.any()).default({}).optional().openapi({description:"Encryption used for WsFed responses with this client."}),sso:e.z.boolean().default(!1).openapi({description:"Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."}),sso_disabled:e.z.boolean().default(!0).openapi({description:"Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."}),cross_origin_authentication:e.z.boolean().default(!1).openapi({description:"Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."}),cross_origin_loc:e.z.string().url().optional().openapi({description:"URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."}),custom_login_page_on:e.z.boolean().default(!1).openapi({description:"Whether a custom login page is to be used (true) or the default provided login page (false)."}),custom_login_page:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page."}),custom_login_page_preview:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"}),form_template:e.z.string().optional().openapi({description:"HTML form template to be used for WS-Federation."}),addons:e.z.record(e.z.any()).default({}).optional().openapi({description:"Addons enabled for this client and their associated configurations."}),token_endpoint_auth_method:e.z.enum(["none","client_secret_post","client_secret_basic"]).default("client_secret_basic").optional().openapi({description:"Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."}),client_metadata:e.z.record(e.z.string().max(255)).default({}).optional().openapi({description:'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'}),mobile:e.z.record(e.z.any()).default({}).optional().openapi({description:"Additional configuration for native mobile apps."}),initiate_login_uri:e.z.string().url().optional().openapi({description:"Initiate login uri, must be https"}),native_social_login:e.z.record(e.z.any()).default({}).optional(),refresh_token:e.z.record(e.z.any()).default({}).optional().openapi({description:"Refresh token configuration"}),default_organization:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines the default Organization ID and flows"}),organization_usage:e.z.enum(["deny","allow","require"]).default("deny").optional().openapi({description:"Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."}),organization_require_behavior:e.z.enum(["no_prompt","pre_login_prompt","post_login_prompt"]).default("no_prompt").optional().openapi({description:"Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."}),client_authentication_methods:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines client authentication methods."}),require_pushed_authorization_requests:e.z.boolean().default(!1).openapi({description:"Makes the use of Pushed Authorization Requests mandatory for this client"}),require_proof_of_possession:e.z.boolean().default(!1).openapi({description:"Makes the use of Proof-of-Possession mandatory for this client"}),signed_request_object:e.z.record(e.z.any()).default({}).optional().openapi({description:"JWT-secured Authorization Requests (JAR) settings."}),compliance_level:e.z.enum(["none","fapi1_adv_pkj_par","fapi1_adv_mtls_par","fapi2_sp_pkj_mtls","fapi2_sp_mtls_mtls"]).optional().openapi({description:"Defines the compliance level for this client, which may restrict it's capabilities"}),par_request_expiry:e.z.number().optional().openapi({description:"Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"}),token_quota:e.z.record(e.z.any()).default({}).optional()}),E=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),...b.shape}),f=e.z.object({client_id:e.z.string().min(1).openapi({description:"ID of the client."}),audience:e.z.string().min(1).openapi({description:"The audience (API identifier) of this client grant."}),scope:e.z.array(e.z.string()).optional().openapi({description:"Scopes allowed for this client grant."}),organization_usage:e.z.enum(["deny","allow","require"]).optional().openapi({description:"Defines whether organizations can be used with client credentials exchanges for this grant."}),allow_any_organization:e.z.boolean().optional().openapi({description:"If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."}),is_system:e.z.boolean().optional().openapi({description:"If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."}),subject_type:e.z.enum(["client","user"]).optional().openapi({description:"The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."}),authorization_details_types:e.z.array(e.z.string()).optional().openapi({description:"Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."})}),A=e.z.object({id:e.z.string().openapi({description:"ID of the client grant."}),...f.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),xe=e.z.array(A),i=e.z.object({x:e.z.number(),y:e.z.number()});var _=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(_||{}),p=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(p||{});const r=e.z.object({id:e.z.string(),category:e.z.nativeEnum(p),type:e.z.nativeEnum(_)}),I=r.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),C=r.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),O=r.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),T=r.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),y=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),N=e.z.union([I,C,O,T,y]);var R=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(R||{});const L=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(N),next_node:e.z.string()}).passthrough()}),D=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),w=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:i}).passthrough(),j=e.z.union([L,D,w]),k=e.z.object({next_node:e.z.string(),coordinates:i}).passthrough(),v=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:i}).passthrough(),U=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(j),start:k,ending:v,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),Ge=U.omit({id:!0,created_at:!0,updated_at:!0});var d=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(d||{}),z=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(z||{}),g=(t=>(t.S256="S256",t.Plain="plain",t))(g||{});const F=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(d).optional(),response_mode:e.z.nativeEnum(z).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(g).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),Ke=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),powered_by_logo_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),P=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional()}),M=e.z.object({id:e.z.string().optional(),name:e.z.string(),strategy:e.z.string(),options:P.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional()}),H=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(M.shape),x=e.z.object({id:e.z.string().optional(),audience:e.z.string(),friendly_name:e.z.string(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sender_email:e.z.string().email(),sender_name:e.z.string(),session_lifetime:e.z.number().optional(),idle_session_lifetime:e.z.number().optional(),ephemeral_session_lifetime:e.z.number().optional(),idle_ephemeral_session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),allowed_logout_urls:e.z.array(e.z.string()).optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_changing_enable_sso:e.z.boolean().optional(),allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),change_pwd_flow_v1:e.z.boolean().optional(),custom_domains_provisioning:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),disable_impersonation:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),enable_sso:e.z.boolean().optional(),enforce_client_authentication_on_passwordless_start:e.z.boolean().optional(),genai_trial:e.z.boolean().optional(),improved_signup_bot_detection_in_classic:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional(),no_disclose_enterprise_connections:e.z.boolean().optional(),remove_alg_from_jwks:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),trust_azure_adfs_email_verified_connection_property:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional()}).optional(),sandbox_version:e.z.string().optional(),legacy_sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),device_flow:e.z.object({charset:e.z.enum(["base20","digits"]).optional(),mask:e.z.string().max(20).optional()}).optional(),default_token_quota:e.z.object({clients:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional(),organizations:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional(),oidc_logout:e.z.object({rp_logout_end_session_endpoint_discovery:e.z.boolean().optional()}).optional(),allow_organization_name_in_authentication_api:e.z.boolean().optional(),customize_mfa_in_postlogin_action:e.z.boolean().optional(),acr_values_supported:e.z.array(e.z.string()).optional(),mtls:e.z.object({enable_endpoint_aliases:e.z.boolean().optional()}).optional(),pushed_authorization_requests_supported:e.z.boolean().optional(),authorization_response_iss_parameter_supported:e.z.boolean().optional()}),G=e.z.object({created_at:e.z.string().nullable().transform(t=>t??""),updated_at:e.z.string().nullable().transform(t=>t??""),...x.shape,id:e.z.string()});e.z.object({...E.shape,tenant:G,connections:e.z.array(H)});const K=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),W=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:K,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),We=e.z.object({...W.shape,created_at:e.z.string()}),B=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),X=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),V=e.z.object({...B.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(X)}).optional(),tls_policy:e.z.string().optional()}),Be=V.extend({tenant_id:e.z.string()}),Xe=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),q=e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()}),required:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()}),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)})]),Y=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.array(e.z.string())})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(q),next_node:e.z.string()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),Ve=e.z.object({...n.shape,...Y.shape,id:e.z.string()}),Q=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),J=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),l={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},qe=e.z.object({...l,trigger_id:Q,url:e.z.string()}),Ye=e.z.object({...l,trigger_id:J,form_id:e.z.string()}),Qe=e.z.union([qe,Ye]),Je=e.z.object({...l,trigger_id:Q,...n.shape,hook_id:e.z.string(),url:e.z.string()}),Ze=e.z.object({...l,trigger_id:J,...n.shape,hook_id:e.z.string(),form_id:e.z.string()}),$e=e.z.union([Je,Ze]),Z=e.z.object({name:e.z.string().optional()}),$=e.z.object({email:e.z.string().optional()}),ee=e.z.object({organization_id:e.z.string().max(50),inviter:Z,invitee:$,invitation_url:e.z.string().url(),client_id:e.z.string(),connection_id:e.z.string().optional(),app_metadata:e.z.record(e.z.any()).default({}).optional(),user_metadata:e.z.record(e.z.any()).default({}).optional(),ttl_sec:e.z.number().int().max(2592e3).default(604800).optional(),roles:e.z.array(e.z.string()).default([]).optional(),send_invitation_email:e.z.boolean().default(!0).optional()}),et=e.z.object({id:e.z.string(),organization_id:e.z.string().max(50),created_at:e.z.string().datetime(),expires_at:e.z.string().datetime(),ticket_id:e.z.string().optional()}).extend(ee.shape),te=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),tt=e.z.object({keys:e.z.array(te)}),ot=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),oe=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:F,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),nt=e.z.object({...oe.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),ne={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},it=e.z.string().refine(t=>Object.values(ne).includes(t),{message:"Invalid log type"}),ie=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),ae=e.z.object({type:it,date:e.z.string(),description:e.z.string().optional(),ip:e.z.string(),user_agent:e.z.string(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.array(e.z.string()).optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ie.optional(),log_id:e.z.string().optional()}),at=e.z.object({...ae.shape,log_id:e.z.string()}),se=e.z.object({user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id")}),st=e.z.object({...se.shape,created_at:e.z.string(),updated_at:e.z.string()}),re=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),le=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:re.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),rt=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...le.shape}),lt=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var ce=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(ce||{});const ct=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const _e=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),pe=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),o=e.z.object({bold:e.z.boolean(),size:e.z.number()}),de=e.z.object({body_text:o,buttons_text:o,font_url:e.z.string(),input_labels:o,links:o,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:o,title:o}),ze=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),ge=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),ue=e.z.object({borders:_e,colors:pe,displayName:e.z.string(),fonts:de,page_background:ze,widget:ge}),_t=ue.extend({themeId:e.z.string()}),pt=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),dt=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),me=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:re,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),zt=e.z.object({created_at:e.z.string(),...me.shape}),gt=e.z.object({to:e.z.string(),message:e.z.string()}),ut=e.z.object({name:e.z.string(),options:e.z.object({})}),he=e.z.object({value:e.z.string(),description:e.z.string().optional()}),Se=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),be=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(he).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:Se.optional()}),Ee=e.z.object({id:e.z.string().optional(),...be.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),mt=e.z.array(Ee),fe=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),Ae=e.z.object({...fe.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),ht=e.z.array(Ae),Ie=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional()}),St=e.z.array(Ie),Ce=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string(),organization_id:e.z.string().optional()}),Oe=e.z.object({...Ce.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),bt=e.z.array(Oe),Te=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional(),organization_id:e.z.string().optional()}),Et=e.z.array(Te),ye=e.z.object({user_id:e.z.string(),role_id:e.z.string(),organization_id:e.z.string().optional()}),Ne=e.z.object({...ye.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),ft=e.z.array(Ne),Re=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),Le=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Re.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),At=e.z.array(Le),De=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),we=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),je=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),ke=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:De,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(we).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:je}),It=e.z.object({...ke.shape,...n.shape,id:e.z.string()}),ve=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),Ct=e.z.object({...ve.shape,...n.shape,id:e.z.string()}),Ot=e.z.object({idle_session_lifetime:e.z.number().optional(),session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),enable_client_connections:e.z.boolean().optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional()}).optional(),friendly_name:e.z.string().optional(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional()});function Tt(t){const[a,s]=t.split("|");if(!a||!s)throw new Error(`Invalid user_id: ${t}`);return{connection:a,id:s}}exports.Auth0Client=ie;exports.AuthorizationResponseMode=z;exports.AuthorizationResponseType=d;exports.CodeChallengeMethod=g;exports.ComponentCategory=p;exports.ComponentType=_;exports.GrantType=ce;exports.LogTypes=ne;exports.NodeType=R;exports.auth0FlowInsertSchema=Ge;exports.auth0FlowSchema=U;exports.auth0UserResponseSchema=Fe;exports.authParamsSchema=F;exports.baseUserSchema=c;exports.bordersSchema=_e;exports.brandingSchema=Ke;exports.buttonComponentSchema=C;exports.clientGrantInsertSchema=f;exports.clientGrantListSchema=xe;exports.clientGrantSchema=A;exports.clientInsertSchema=b;exports.clientSchema=E;exports.codeInsertSchema=W;exports.codeSchema=We;exports.codeTypeSchema=K;exports.colorsSchema=pe;exports.componentSchema=N;exports.connectionInsertSchema=M;exports.connectionOptionsSchema=P;exports.connectionSchema=H;exports.coordinatesSchema=i;exports.customDomainInsertSchema=B;exports.customDomainSchema=V;exports.customDomainWithTenantIdSchema=Be;exports.emailProviderSchema=dt;exports.endingSchema=v;exports.fieldComponentSchema=T;exports.flowNodeSchema=D;exports.fontDetailsSchema=o;exports.fontsSchema=de;exports.formControlSchema=Xe;exports.formInsertSchema=Y;exports.formNodeComponentDefinition=q;exports.formSchema=Ve;exports.genericComponentSchema=y;exports.genericNodeSchema=w;exports.hookInsertSchema=Qe;exports.hookSchema=$e;exports.identitySchema=m;exports.inviteInsertSchema=ee;exports.inviteSchema=et;exports.inviteeSchema=$;exports.inviterSchema=Z;exports.jwksKeySchema=tt;exports.jwksSchema=te;exports.legalComponentSchema=O;exports.logInsertSchema=ae;exports.logSchema=at;exports.loginSessionInsertSchema=oe;exports.loginSessionSchema=nt;exports.nodeSchema=j;exports.openIDConfigurationSchema=ot;exports.organizationBrandingSchema=De;exports.organizationEnabledConnectionSchema=we;exports.organizationInsertSchema=ke;exports.organizationSchema=It;exports.organizationTokenQuotaSchema=je;exports.pageBackgroundSchema=ze;exports.parseUserId=Tt;exports.passwordInsertSchema=se;exports.passwordSchema=st;exports.profileDataSchema=u;exports.promptSettingSchema=pt;exports.refreshTokenInsertSchema=me;exports.refreshTokenSchema=zt;exports.resourceServerInsertSchema=be;exports.resourceServerListSchema=mt;exports.resourceServerOptionsSchema=Se;exports.resourceServerSchema=Ee;exports.resourceServerScopeSchema=he;exports.richTextComponentSchema=I;exports.roleInsertSchema=Re;exports.roleListSchema=At;exports.rolePermissionInsertSchema=fe;exports.rolePermissionListSchema=ht;exports.rolePermissionSchema=Ae;exports.rolePermissionWithDetailsListSchema=St;exports.rolePermissionWithDetailsSchema=Ie;exports.roleSchema=Le;exports.sessionInsertSchema=le;exports.sessionSchema=rt;exports.signingKeySchema=lt;exports.smsProviderSchema=ut;exports.smsSendParamsSchema=gt;exports.startSchema=k;exports.stepNodeSchema=L;exports.tenantInsertSchema=x;exports.tenantSchema=G;exports.tenantSettingsSchema=Ot;exports.themeInsertSchema=ue;exports.themeSchema=_t;exports.tokenResponseSchema=ct;exports.totalsSchema=Ue;exports.userInsertSchema=h;exports.userOrganizationInsertSchema=ve;exports.userOrganizationSchema=Ct;exports.userPermissionInsertSchema=Ce;exports.userPermissionListSchema=bt;exports.userPermissionSchema=Oe;exports.userPermissionWithDetailsListSchema=Et;exports.userPermissionWithDetailsSchema=Te;exports.userResponseSchema=Pe;exports.userRoleInsertSchema=ye;exports.userRoleListSchema=ft;exports.userRoleSchema=Ne;exports.userSchema=S;exports.verificationMethodsSchema=X;exports.widgetSchema=ge;
|
|
1
|
+
"use strict";Object.defineProperty(exports,Symbol.toStringTag,{value:"Module"});const e=require("@hono/zod-openapi"),Ue=e.z.object({start:e.z.number(),limit:e.z.number(),length:e.z.number()}),n=e.z.object({created_at:e.z.string(),updated_at:e.z.string()}),u=e.z.object({email:e.z.string().optional(),email_verified:e.z.boolean().optional(),name:e.z.string().optional(),username:e.z.string().optional(),given_name:e.z.string().optional(),phone_number:e.z.string().optional(),phone_verified:e.z.boolean().optional(),family_name:e.z.string().optional()}).catchall(e.z.any()),m=e.z.object({connection:e.z.string(),user_id:e.z.string(),provider:e.z.string(),isSocial:e.z.boolean(),access_token:e.z.string().optional(),access_token_secret:e.z.string().optional(),refresh_token:e.z.string().optional(),profileData:u.optional()}),c=e.z.object({email:e.z.string().optional().transform(t=>t&&t.toLowerCase()),username:e.z.string().optional(),phone_number:e.z.string().optional(),given_name:e.z.string().optional(),family_name:e.z.string().optional(),nickname:e.z.string().optional(),name:e.z.string().optional(),picture:e.z.string().optional(),locale:e.z.string().optional(),linked_to:e.z.string().optional(),profileData:e.z.string().optional(),user_id:e.z.string().optional(),app_metadata:e.z.any().default({}).optional(),user_metadata:e.z.any().default({}).optional()}),h=c.extend({email_verified:e.z.boolean().default(!1),verify_email:e.z.boolean().optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string().optional(),provider:e.z.string().default("email"),connection:e.z.string().default("email"),is_social:e.z.boolean().optional()}),S=e.z.object({...h.shape,...n.shape,user_id:e.z.string(),is_social:e.z.boolean(),email:e.z.string().optional(),login_count:e.z.number().default(0),identities:e.z.array(m).optional()}),ve=S,Fe=c.extend({login_count:e.z.number(),multifactor:e.z.array(e.z.string()).optional(),last_ip:e.z.string().optional(),last_login:e.z.string().optional(),user_id:e.z.string()}).catchall(e.z.any()),Pe="useandom-26T198340PX75pxJACKVERYMINDBUSHWOLF_GQZbfghjklqvwyzrict";let Me=(t=21)=>{let a="",s=crypto.getRandomValues(new Uint8Array(t|=0));for(;t--;)a+=Pe[s[t]&63];return a};const b=e.z.object({client_id:e.z.string().openapi({description:"ID of this client."}),name:e.z.string().min(1).openapi({description:"Name of this client (min length: 1 character, does not allow < or >)."}),description:e.z.string().max(140).optional().openapi({description:"Free text description of this client (max length: 140 characters)."}),global:e.z.boolean().default(!1).openapi({description:"Whether this is your global 'All Applications' client representing legacy tenant settings (true) or a regular client (false)."}),client_secret:e.z.string().default(()=>Me()).optional().openapi({description:"Client secret (which you must not make public)."}),app_type:e.z.enum(["native","spa","regular_web","non_interactive","resource_server","express_configuration","rms","box","cloudbees","concur","dropbox","mscrm","echosign","egnyte","newrelic","office365","salesforce","sentry","sharepoint","slack","springcm","zendesk","zoom","sso_integration","oag"]).default("regular_web").optional().openapi({description:"The type of application this client represents"}),logo_uri:e.z.string().url().optional().openapi({description:"URL of the logo to display for this client. Recommended size is 150x150 pixels."}),is_first_party:e.z.boolean().default(!1).openapi({description:"Whether this client a first party client (true) or not (false)."}),oidc_conformant:e.z.boolean().default(!0).openapi({description:"Whether this client conforms to strict OIDC specifications (true) or uses legacy features (false)."}),callbacks:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs whitelisted for Auth0 to use as a callback to the client after authentication."}),allowed_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level (e.g., https://*.contoso.com). Query strings and hash information are not taken into account when validating these URLs."}),web_origins:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."}),client_aliases:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of audiences/realms for SAML protocol. Used by the wsfed addon."}),allowed_clients:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of allow clients and API ids that are allowed to make delegation requests. Empty means all all your clients are allowed."}),allowed_logout_urls:e.z.array(e.z.string()).default([]).optional().openapi({description:"Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."}),session_transfer:e.z.record(e.z.any()).default({}).optional().openapi({description:"Native to Web SSO Configuration"}),oidc_logout:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration for OIDC backchannel logout"}),grant_types:e.z.array(e.z.string()).default([]).optional().openapi({description:"List of grant types supported for this application. Can include authorization_code, implicit, refresh_token, client_credentials, password, http://auth0.com/oauth/grant-type/password-realm, http://auth0.com/oauth/grant-type/mfa-oob, http://auth0.com/oauth/grant-type/mfa-otp, http://auth0.com/oauth/grant-type/mfa-recovery-code, urn:openid:params:grant-type:ciba, and urn:ietf:params:oauth:grant-type:device_code."}),jwt_configuration:e.z.record(e.z.any()).default({}).optional().openapi({description:"Configuration related to JWTs for the client."}),signing_keys:e.z.array(e.z.record(e.z.any())).default([]).optional().openapi({description:"Signing certificates associated with this client."}),encryption_key:e.z.record(e.z.any()).default({}).optional().openapi({description:"Encryption used for WsFed responses with this client."}),sso:e.z.boolean().default(!1).openapi({description:"Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false)."}),sso_disabled:e.z.boolean().default(!0).openapi({description:"Whether Single Sign On is disabled (true) or enabled (true). Defaults to true."}),cross_origin_authentication:e.z.boolean().default(!1).openapi({description:"Whether this client can be used to make cross-origin authentication requests (true) or it is not allowed to make such requests (false)."}),cross_origin_loc:e.z.string().url().optional().openapi({description:"URL of the location in your site where the cross origin verification takes place for the cross-origin auth flow when performing Auth in your own domain instead of Auth0 hosted login page."}),custom_login_page_on:e.z.boolean().default(!1).openapi({description:"Whether a custom login page is to be used (true) or the default provided login page (false)."}),custom_login_page:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page."}),custom_login_page_preview:e.z.string().optional().openapi({description:"The content (HTML, CSS, JS) of the custom login page. (Used on Previews)"}),form_template:e.z.string().optional().openapi({description:"HTML form template to be used for WS-Federation."}),addons:e.z.record(e.z.any()).default({}).optional().openapi({description:"Addons enabled for this client and their associated configurations."}),token_endpoint_auth_method:e.z.enum(["none","client_secret_post","client_secret_basic"]).default("client_secret_basic").optional().openapi({description:"Defines the requested authentication method for the token endpoint. Can be none (public client without a client secret), client_secret_post (client uses HTTP POST parameters), or client_secret_basic (client uses HTTP Basic)."}),client_metadata:e.z.record(e.z.string().max(255)).default({}).optional().openapi({description:'Metadata associated with the client, in the form of an object with string values (max 255 chars). Maximum of 10 metadata properties allowed. Field names (max 255 chars) are alphanumeric and may only include the following special characters: :,-+=_*?"/()<>@ [Tab][Space]'}),mobile:e.z.record(e.z.any()).default({}).optional().openapi({description:"Additional configuration for native mobile apps."}),initiate_login_uri:e.z.string().url().optional().openapi({description:"Initiate login uri, must be https"}),native_social_login:e.z.record(e.z.any()).default({}).optional(),refresh_token:e.z.record(e.z.any()).default({}).optional().openapi({description:"Refresh token configuration"}),default_organization:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines the default Organization ID and flows"}),organization_usage:e.z.enum(["deny","allow","require"]).default("deny").optional().openapi({description:"Defines how to proceed during an authentication transaction with regards an organization. Can be deny (default), allow or require."}),organization_require_behavior:e.z.enum(["no_prompt","pre_login_prompt","post_login_prompt"]).default("no_prompt").optional().openapi({description:"Defines how to proceed during an authentication transaction when client.organization_usage: 'require'. Can be no_prompt (default), pre_login_prompt or post_login_prompt. post_login_prompt requires oidc_conformant: true."}),client_authentication_methods:e.z.record(e.z.any()).default({}).optional().openapi({description:"Defines client authentication methods."}),require_pushed_authorization_requests:e.z.boolean().default(!1).openapi({description:"Makes the use of Pushed Authorization Requests mandatory for this client"}),require_proof_of_possession:e.z.boolean().default(!1).openapi({description:"Makes the use of Proof-of-Possession mandatory for this client"}),signed_request_object:e.z.record(e.z.any()).default({}).optional().openapi({description:"JWT-secured Authorization Requests (JAR) settings."}),compliance_level:e.z.enum(["none","fapi1_adv_pkj_par","fapi1_adv_mtls_par","fapi2_sp_pkj_mtls","fapi2_sp_mtls_mtls"]).optional().openapi({description:"Defines the compliance level for this client, which may restrict it's capabilities"}),par_request_expiry:e.z.number().optional().openapi({description:"Specifies how long, in seconds, a Pushed Authorization Request URI remains valid"}),token_quota:e.z.record(e.z.any()).default({}).optional()}),E=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),...b.shape}),f=e.z.object({client_id:e.z.string().min(1).openapi({description:"ID of the client."}),audience:e.z.string().min(1).openapi({description:"The audience (API identifier) of this client grant."}),scope:e.z.array(e.z.string()).optional().openapi({description:"Scopes allowed for this client grant."}),organization_usage:e.z.enum(["deny","allow","require"]).optional().openapi({description:"Defines whether organizations can be used with client credentials exchanges for this grant."}),allow_any_organization:e.z.boolean().optional().openapi({description:"If enabled, any organization can be used with this grant. If disabled (default), the grant must be explicitly assigned to the desired organizations."}),is_system:e.z.boolean().optional().openapi({description:"If enabled, this grant is a special grant created by Auth0. It cannot be modified or deleted directly."}),subject_type:e.z.enum(["client","user"]).optional().openapi({description:"The type of application access the client grant allows. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."}),authorization_details_types:e.z.array(e.z.string()).optional().openapi({description:"Types of authorization_details allowed for this client grant. Use of this field is subject to the applicable Free Trial terms in Okta's Master Subscription Agreement."})}),A=e.z.object({id:e.z.string().openapi({description:"ID of the client grant."}),...f.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),He=e.z.array(A),i=e.z.object({x:e.z.number(),y:e.z.number()});var _=(t=>(t.RICH_TEXT="RICH_TEXT",t.NEXT_BUTTON="NEXT_BUTTON",t.BACK_BUTTON="BACK_BUTTON",t.SUBMIT_BUTTON="SUBMIT_BUTTON",t.DIVIDER="DIVIDER",t.TEXT="TEXT",t.EMAIL="EMAIL",t.PASSWORD="PASSWORD",t.NUMBER="NUMBER",t.PHONE="PHONE",t.DATE="DATE",t.CHECKBOX="CHECKBOX",t.RADIO="RADIO",t.SELECT="SELECT",t.HIDDEN="HIDDEN",t.LEGAL="LEGAL",t))(_||{}),p=(t=>(t.BLOCK="BLOCK",t.FIELD="FIELD",t))(p||{});const r=e.z.object({id:e.z.string(),category:e.z.nativeEnum(p),type:e.z.nativeEnum(_)}),I=r.extend({category:e.z.literal("BLOCK"),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}).passthrough()}),C=r.extend({category:e.z.literal("BLOCK"),type:e.z.union([e.z.literal("NEXT_BUTTON"),e.z.literal("BACK_BUTTON"),e.z.literal("SUBMIT_BUTTON")]),config:e.z.object({text:e.z.string()}).passthrough()}),O=r.extend({category:e.z.literal("FIELD"),type:e.z.literal("LEGAL"),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({text:e.z.string()}).passthrough()}),T=r.extend({category:e.z.literal("FIELD"),type:e.z.union([e.z.literal("TEXT"),e.z.literal("EMAIL"),e.z.literal("PASSWORD"),e.z.literal("NUMBER"),e.z.literal("PHONE"),e.z.literal("DATE"),e.z.literal("CHECKBOX"),e.z.literal("RADIO"),e.z.literal("SELECT"),e.z.literal("HIDDEN")]),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),config:e.z.object({label:e.z.string().optional(),placeholder:e.z.string().optional()}).passthrough()}),y=e.z.object({id:e.z.string(),category:e.z.string(),type:e.z.string()}).passthrough(),N=e.z.union([I,C,O,T,y]);var R=(t=>(t.STEP="STEP",t.FLOW="FLOW",t.CONDITION="CONDITION",t.ACTION="ACTION",t))(R||{});const L=e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({components:e.z.array(N),next_node:e.z.string()}).passthrough()}),D=e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:i,alias:e.z.string().optional(),config:e.z.object({flow_id:e.z.string(),next_node:e.z.string()})}),w=e.z.object({id:e.z.string(),type:e.z.string(),coordinates:i}).passthrough(),j=e.z.union([L,D,w]),k=e.z.object({next_node:e.z.string(),coordinates:i}).passthrough(),U=e.z.object({resume_flow:e.z.boolean().optional(),coordinates:i}).passthrough(),v=e.z.object({id:e.z.string(),name:e.z.string(),languages:e.z.object({primary:e.z.string()}).passthrough(),nodes:e.z.array(j),start:k,ending:U,created_at:e.z.string(),updated_at:e.z.string(),links:e.z.object({sdkSrc:e.z.string().optional(),sdk_src:e.z.string().optional()}).passthrough()}).passthrough(),xe=v.omit({id:!0,created_at:!0,updated_at:!0});var d=(t=>(t.TOKEN="token",t.TOKEN_ID_TOKEN="token id_token",t.CODE="code",t))(d||{}),z=(t=>(t.QUERY="query",t.FRAGMENT="fragment",t.FORM_POST="form_post",t.WEB_MESSAGE="web_message",t.SAML_POST="saml_post",t))(z||{}),g=(t=>(t.S256="S256",t.Plain="plain",t))(g||{});const F=e.z.object({client_id:e.z.string(),act_as:e.z.string().optional(),response_type:e.z.nativeEnum(d).optional(),response_mode:e.z.nativeEnum(z).optional(),redirect_uri:e.z.string().optional(),audience:e.z.string().optional(),organization:e.z.string().optional(),state:e.z.string().optional(),nonce:e.z.string().optional(),scope:e.z.string().optional(),prompt:e.z.string().optional(),code_challenge_method:e.z.nativeEnum(g).optional(),code_challenge:e.z.string().optional(),username:e.z.string().optional(),ui_locales:e.z.string().optional(),vendor_id:e.z.string().optional()}),Ge=e.z.object({colors:e.z.object({primary:e.z.string(),page_background:e.z.object({type:e.z.string().optional(),start:e.z.string().optional(),end:e.z.string().optional(),angle_deg:e.z.number().optional()}).optional()}).optional(),logo_url:e.z.string().optional(),favicon_url:e.z.string().optional(),powered_by_logo_url:e.z.string().optional(),font:e.z.object({url:e.z.string()}).optional()}),P=e.z.object({kid:e.z.string().optional(),team_id:e.z.string().optional(),realms:e.z.string().optional(),authentication_method:e.z.string().optional(),client_id:e.z.string().optional(),client_secret:e.z.string().optional(),app_secret:e.z.string().optional(),scope:e.z.string().optional(),authorization_endpoint:e.z.string().optional(),token_endpoint:e.z.string().optional(),userinfo_endpoint:e.z.string().optional(),jwks_uri:e.z.string().optional(),discovery_url:e.z.string().optional(),issuer:e.z.string().optional(),provider:e.z.string().optional(),from:e.z.string().optional(),twilio_sid:e.z.string().optional(),twilio_token:e.z.string().optional()}),M=e.z.object({id:e.z.string().optional(),name:e.z.string(),strategy:e.z.string(),options:P.default({}),enabled_clients:e.z.array(e.z.string()).default([]).optional(),response_type:e.z.custom().optional(),response_mode:e.z.custom().optional()}),H=e.z.object({id:e.z.string(),created_at:e.z.string().transform(t=>t===null?"":t),updated_at:e.z.string().transform(t=>t===null?"":t)}).extend(M.shape),x=e.z.object({id:e.z.string().optional(),audience:e.z.string(),friendly_name:e.z.string(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sender_email:e.z.string().email(),sender_name:e.z.string(),session_lifetime:e.z.number().optional(),idle_session_lifetime:e.z.number().optional(),ephemeral_session_lifetime:e.z.number().optional(),idle_ephemeral_session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),allowed_logout_urls:e.z.array(e.z.string()).optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_changing_enable_sso:e.z.boolean().optional(),allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),change_pwd_flow_v1:e.z.boolean().optional(),custom_domains_provisioning:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),disable_impersonation:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),enable_sso:e.z.boolean().optional(),enforce_client_authentication_on_passwordless_start:e.z.boolean().optional(),genai_trial:e.z.boolean().optional(),improved_signup_bot_detection_in_classic:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional(),no_disclose_enterprise_connections:e.z.boolean().optional(),remove_alg_from_jwks:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),trust_azure_adfs_email_verified_connection_property:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional()}).optional(),sandbox_version:e.z.string().optional(),legacy_sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean().optional(),html:e.z.string().optional()}).optional(),device_flow:e.z.object({charset:e.z.enum(["base20","digits"]).optional(),mask:e.z.string().max(20).optional()}).optional(),default_token_quota:e.z.object({clients:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional(),organizations:e.z.object({client_credentials:e.z.record(e.z.any()).optional()}).optional()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional(),oidc_logout:e.z.object({rp_logout_end_session_endpoint_discovery:e.z.boolean().optional()}).optional(),allow_organization_name_in_authentication_api:e.z.boolean().optional(),customize_mfa_in_postlogin_action:e.z.boolean().optional(),acr_values_supported:e.z.array(e.z.string()).optional(),mtls:e.z.object({enable_endpoint_aliases:e.z.boolean().optional()}).optional(),pushed_authorization_requests_supported:e.z.boolean().optional(),authorization_response_iss_parameter_supported:e.z.boolean().optional()}),G=e.z.object({created_at:e.z.string().nullable().transform(t=>t??""),updated_at:e.z.string().nullable().transform(t=>t??""),...x.shape,id:e.z.string()});e.z.object({...E.shape,tenant:G,connections:e.z.array(H)});const K=e.z.enum(["password_reset","email_verification","otp","authorization_code","oauth2_state","ticket"]),B=e.z.object({code_id:e.z.string().openapi({description:"The code that will be used in for instance an email verification flow"}),login_id:e.z.string().openapi({description:"The id of the login session that the code is connected to"}),connection_id:e.z.string().optional().openapi({description:"The connection that the code is connected to"}),code_type:K,code_verifier:e.z.string().optional().openapi({description:"The code verifier used in PKCE in outbound flows"}),code_challenge:e.z.string().optional().openapi({description:"The code challenge used in PKCE in outbound flows"}),code_challenge_method:e.z.enum(["plain","S256"]).optional().openapi({description:"The code challenge method used in PKCE in outbound flows"}),redirect_uri:e.z.string().optional().openapi({description:"The redirect URI associated with the code"}),nonce:e.z.string().optional().openapi({description:"The nonce value used for security in OIDC flows"}),state:e.z.string().optional().openapi({description:"The state parameter used for CSRF protection in OAuth flows"}),expires_at:e.z.string(),used_at:e.z.string().optional(),user_id:e.z.string().optional()}),Ke=e.z.object({...B.shape,created_at:e.z.string()}),W=e.z.object({domain:e.z.string(),custom_domain_id:e.z.string().optional(),type:e.z.enum(["auth0_managed_certs","self_managed_certs"]),verification_method:e.z.enum(["txt"]).optional(),tls_policy:e.z.enum(["recommended"]).optional(),custom_client_ip_header:e.z.enum(["true-client-ip","cf-connecting-ip","x-forwarded-for","x-azure-clientip","null"]).optional(),domain_metadata:e.z.record(e.z.string().max(255)).optional()}),X=e.z.object({name:e.z.literal("txt"),record:e.z.string(),domain:e.z.string()}),V=e.z.object({...W.shape,custom_domain_id:e.z.string(),primary:e.z.boolean(),status:e.z.enum(["disabled","pending","pending_verification","ready"]),origin_domain_name:e.z.string().optional(),verification:e.z.object({methods:e.z.array(X)}).optional(),tls_policy:e.z.string().optional()}),Be=V.extend({tenant_id:e.z.string()}),We=e.z.object({id:e.z.string(),type:e.z.literal("submit"),label:e.z.string(),className:e.z.string().optional(),disabled:e.z.boolean().optional().default(!1),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0),customizations:e.z.record(e.z.string(),e.z.any()).optional()}),q=e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("RICH_TEXT"),config:e.z.object({content:e.z.string()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("LEGAL"),config:e.z.object({text:e.z.string(),html:e.z.boolean().optional()}),required:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("TEXT"),config:e.z.object({placeholder:e.z.string().optional(),multiline:e.z.boolean().optional()}),required:e.z.boolean().optional(),sensitive:e.z.boolean().optional(),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)}),e.z.object({id:e.z.string(),type:e.z.literal("NEXT_BUTTON"),config:e.z.object({text:e.z.string().optional()}),order:e.z.number().optional(),visible:e.z.boolean().optional().default(!0)})]),Y=e.z.object({name:e.z.string().openapi({description:"The name of the form"}),messages:e.z.object({errors:e.z.record(e.z.string(),e.z.any()).optional(),custom:e.z.record(e.z.string(),e.z.any()).optional()}).optional(),languages:e.z.object({primary:e.z.string().optional(),default:e.z.string().optional()}).optional(),translations:e.z.record(e.z.string(),e.z.any()).optional(),nodes:e.z.array(e.z.discriminatedUnion("type",[e.z.object({id:e.z.string(),type:e.z.literal("FLOW"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({flow_id:e.z.string().max(30),next_node:e.z.string()})}),e.z.object({id:e.z.string(),type:e.z.literal("ROUTER"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150),config:e.z.object({rules:e.z.array(e.z.object({id:e.z.string(),alias:e.z.string().min(1).max(150).optional(),condition:e.z.any(),next_node:e.z.string()})),fallback:e.z.array(e.z.string())})}),e.z.object({id:e.z.string(),type:e.z.literal("STEP"),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}),alias:e.z.string().min(1).max(150).optional(),config:e.z.object({components:e.z.array(q),next_node:e.z.string()})})])).optional(),start:e.z.object({hidden_fields:e.z.array(e.z.object({key:e.z.string(),value:e.z.string()})).optional(),next_node:e.z.string().optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional()}).optional(),ending:e.z.object({redirection:e.z.object({delay:e.z.number().optional(),target:e.z.string().optional()}).optional(),after_submit:e.z.object({flow_id:e.z.string().optional()}).optional(),coordinates:e.z.object({x:e.z.number(),y:e.z.number()}).optional(),resume_flow:e.z.boolean().optional()}).optional(),style:e.z.object({css:e.z.string().optional()}).optional()}).openapi({description:"Schema for flow-based forms (matches new JSON structure)"}),Xe=e.z.object({...n.shape,...Y.shape,id:e.z.string()}),Q=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),J=e.z.enum(["pre-user-registration","post-user-registration","post-user-login","validate-registration-username","pre-user-deletion","post-user-deletion"]),l={enabled:e.z.boolean().default(!1),synchronous:e.z.boolean().default(!1),priority:e.z.number().optional(),hook_id:e.z.string().optional()},Ve=e.z.object({...l,trigger_id:Q,url:e.z.string()}),qe=e.z.object({...l,trigger_id:J,form_id:e.z.string()}),Ye=e.z.union([Ve,qe]),Qe=e.z.object({...l,trigger_id:Q,...n.shape,hook_id:e.z.string(),url:e.z.string()}),Je=e.z.object({...l,trigger_id:J,...n.shape,hook_id:e.z.string(),form_id:e.z.string()}),Ze=e.z.union([Qe,Je]),Z=e.z.object({name:e.z.string().optional()}),$=e.z.object({email:e.z.string().optional()}),ee=e.z.object({organization_id:e.z.string().max(50),inviter:Z,invitee:$,invitation_url:e.z.string().url(),client_id:e.z.string(),connection_id:e.z.string().optional(),app_metadata:e.z.record(e.z.any()).default({}).optional(),user_metadata:e.z.record(e.z.any()).default({}).optional(),ttl_sec:e.z.number().int().max(2592e3).default(604800).optional(),roles:e.z.array(e.z.string()).default([]).optional(),send_invitation_email:e.z.boolean().default(!0).optional()}),$e=e.z.object({id:e.z.string(),organization_id:e.z.string().max(50),created_at:e.z.string().datetime(),expires_at:e.z.string().datetime(),ticket_id:e.z.string().optional()}).extend(ee.shape),te=e.z.object({alg:e.z.enum(["RS256","RS384","RS512","ES256","ES384","ES512","HS256","HS384","HS512"]),e:e.z.string(),kid:e.z.string(),kty:e.z.enum(["RSA","EC","oct"]),n:e.z.string(),x5t:e.z.string().optional(),x5c:e.z.array(e.z.string()).optional(),use:e.z.enum(["sig","enc"]).optional()}),et=e.z.object({keys:e.z.array(te)}),tt=e.z.object({issuer:e.z.string(),authorization_endpoint:e.z.string(),token_endpoint:e.z.string(),device_authorization_endpoint:e.z.string(),userinfo_endpoint:e.z.string(),mfa_challenge_endpoint:e.z.string(),jwks_uri:e.z.string(),registration_endpoint:e.z.string(),revocation_endpoint:e.z.string(),scopes_supported:e.z.array(e.z.string()),response_types_supported:e.z.array(e.z.string()),code_challenge_methods_supported:e.z.array(e.z.string()),response_modes_supported:e.z.array(e.z.string()),subject_types_supported:e.z.array(e.z.string()),id_token_signing_alg_values_supported:e.z.array(e.z.string()),token_endpoint_auth_methods_supported:e.z.array(e.z.string()),claims_supported:e.z.array(e.z.string()),request_uri_parameter_supported:e.z.boolean(),request_parameter_supported:e.z.boolean(),token_endpoint_auth_signing_alg_values_supported:e.z.array(e.z.string())}),oe=e.z.object({csrf_token:e.z.string(),auth0Client:e.z.string().optional(),authParams:F,expires_at:e.z.string(),deleted_at:e.z.string().optional(),ip:e.z.string().optional(),useragent:e.z.string().optional(),session_id:e.z.string().optional(),authorization_url:e.z.string().optional(),login_completed:e.z.boolean().optional().default(!1)}).openapi({description:"This represents a login sesion"}),ot=e.z.object({...oe.shape,id:e.z.string().openapi({description:"This is is used as the state in the universal login"}),created_at:e.z.string(),updated_at:e.z.string()}),ne={ACLS_SUMMARY:"acls_summary",ACTIONS_EXECUTION_FAILED:"actions_execution_failed",API_LIMIT:"api_limit",API_LIMIT_WARNING:"api_limit_warning",APPI:"appi",CIBA_EXCHANGE_FAILED:"ciba_exchange_failed",CIBA_EXCHANGE_SUCCEEDED:"ciba_exchange_succeeded",CIBA_START_FAILED:"ciba_start_failed",CIBA_START_SUCCEEDED:"ciba_start_succeeded",CODE_LINK_SENT:"cls",CODE_SENT:"cs",DEPRECATION_NOTICE:"depnote",FAILED_LOGIN:"f",FAILED_BY_CONNECTOR:"fc",FAILED_CHANGE_EMAIL:"fce",FAILED_BY_CORS:"fco",FAILED_CROSS_ORIGIN_AUTHENTICATION:"fcoa",FAILED_CHANGE_PASSWORD:"fcp",FAILED_POST_CHANGE_PASSWORD_HOOK:"fcph",FAILED_CHANGE_PHONE_NUMBER:"fcpn",FAILED_CHANGE_PASSWORD_REQUEST:"fcpr",FAILED_CONNECTOR_PROVISIONING:"fcpro",FAILED_CHANGE_USERNAME:"fcu",FAILED_DELEGATION:"fd",FAILED_DEVICE_ACTIVATION:"fdeac",FAILED_DEVICE_AUTHORIZATION_REQUEST:"fdeaz",USER_CANCELED_DEVICE_CONFIRMATION:"fdecc",FAILED_USER_DELETION:"fdu",FAILED_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"feacft",FAILED_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"feccft",FAILED_EXCHANGE_CUSTOM_TOKEN:"fecte",FAILED_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"fede",FAILED_FEDERATED_LOGOUT:"federated_logout_failed",FAILED_EXCHANGE_NATIVE_SOCIAL_LOGIN:"fens",FAILED_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"feoobft",FAILED_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"feotpft",FAILED_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"fepft",FAILED_EXCHANGE_PASSWORDLESS_OTP_FOR_ACCESS_TOKEN:"fepotpft",FAILED_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"fercft",FAILED_EXCHANGE_ROTATING_REFRESH_TOKEN:"ferrt",FAILED_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"fertft",FAILED_HOOK:"fh",FAILED_INVITE_ACCEPT:"fi",FAILED_LOGOUT:"flo",FLOWS_EXECUTION_COMPLETED:"flows_execution_completed",FLOWS_EXECUTION_FAILED:"flows_execution_failed",FAILED_SENDING_NOTIFICATION:"fn",FORMS_SUBMISSION_FAILED:"forms_submission_failed",FORMS_SUBMISSION_SUCCEEDED:"forms_submission_succeeded",FAILED_LOGIN_INCORRECT_PASSWORD:"fp",FAILED_PUSHED_AUTHORIZATION_REQUEST:"fpar",FAILED_POST_USER_REGISTRATION_HOOK:"fpurh",FAILED_SIGNUP:"fs",FAILED_SILENT_AUTH:"fsa",FAILED_LOGIN_INVALID_EMAIL_USERNAME:"fu",FAILED_USERS_IMPORT:"fui",FAILED_VERIFICATION_EMAIL:"fv",FAILED_VERIFICATION_EMAIL_REQUEST:"fvr",EMAIL_VERIFICATION_CONFIRMED:"gd_auth_email_verification",EMAIL_VERIFICATION_FAILED:"gd_auth_fail_email_verification",MFA_AUTH_FAILED:"gd_auth_failed",MFA_AUTH_REJECTED:"gd_auth_rejected",MFA_AUTH_SUCCESS:"gd_auth_succeed",MFA_ENROLLMENT_COMPLETE:"gd_enrollment_complete",TOO_MANY_MFA_FAILURES:"gd_otp_rate_limit_exceed",MFA_RECOVERY_FAILED:"gd_recovery_failed",MFA_RECOVERY_RATE_LIMIT_EXCEED:"gd_recovery_rate_limit_exceed",MFA_RECOVERY_SUCCESS:"gd_recovery_succeed",MFA_EMAIL_SENT:"gd_send_email",EMAIL_VERIFICATION_SENT:"gd_send_email_verification",EMAIL_VERIFICATION_SEND_FAILURE:"gd_send_email_verification_failure",PUSH_NOTIFICATION_SENT:"gd_send_pn",ERROR_SENDING_MFA_PUSH_NOTIFICATION:"gd_send_pn_failure",MFA_SMS_SENT:"gd_send_sms",ERROR_SENDING_MFA_SMS:"gd_send_sms_failure",MFA_VOICE_CALL_SUCCESS:"gd_send_voice",MFA_VOICE_CALL_FAILED:"gd_send_voice_failure",SECOND_FACTOR_STARTED:"gd_start_auth",MFA_ENROLL_STARTED:"gd_start_enroll",MFA_ENROLLMENT_FAILED:"gd_start_enroll_failed",GUARDIAN_TENANT_UPDATE:"gd_tenant_update",UNENROLL_DEVICE_ACCOUNT:"gd_unenroll",UPDATE_DEVICE_ACCOUNT:"gd_update_device_account",WEBAUTHN_CHALLENGE_FAILED:"gd_webauthn_challenge_failed",WEBAUTHN_ENROLLMENT_FAILED:"gd_webauthn_enrollment_failed",FAILED_KMS_API_OPERATION:"kms_key_management_failure",SUCCESS_KMS_API_OPERATION:"kms_key_management_success",KMS_KEY_STATE_CHANGED:"kms_key_state_changed",TOO_MANY_CALLS_TO_DELEGATION:"limit_delegation",BLOCKED_IP_ADDRESS:"limit_mu",BLOCKED_ACCOUNT_IP:"limit_sul",BLOCKED_ACCOUNT_EMAIL:"limit_wc",MFA_REQUIRED:"mfar",MANAGEMENT_API_READ_OPERATION:"mgmt_api_read",FAILED_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_failed",SUCCESSFUL_AUTHENTICATION_METHOD_OPERATION_MY_ACCOUNT:"my_account_authentication_method_succeeded",FAILED_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_failed",SUCCESSFUL_OIDC_BACKCHANNEL_LOGOUT:"oidc_backchannel_logout_succeeded",ORGANIZATION_MEMBER_ADDED:"organization_member_added",PASSKEY_CHALLENGE_FAILED:"passkey_challenge_failed",PASSKEY_CHALLENGE_STARTED:"passkey_challenge_started",PRE_LOGIN_ASSESSMENT:"pla",BREACHED_PASSWORD:"pwd_leak",BREACHED_PASSWORD_ON_RESET:"reset_pwd_leak",SUCCESS_RESOURCE_CLEANUP:"resource_cleanup",RICH_CONSENTS_ACCESS_ERROR:"rich_consents_access_error",SUCCESS_LOGIN:"s",SUCCESS_API_OPERATION:"sapi",SUCCESS_CHANGE_EMAIL:"sce",SUCCESS_CROSS_ORIGIN_AUTHENTICATION:"scoa",SUCCESS_CHANGE_PASSWORD:"scp",SUCCESS_CHANGE_PHONE_NUMBER:"scpn",SUCCESS_CHANGE_PASSWORD_REQUEST:"scpr",SUCCESS_CHANGE_USERNAME:"scu",SUCCESS_CREDENTIAL_VALIDATION:"scv",SUCCESS_DELEGATION:"sd",SUCCESS_USER_DELETION:"sdu",SUCCESS_EXCHANGE_AUTHORIZATION_CODE_FOR_ACCESS_TOKEN:"seacft",SUCCESS_EXCHANGE_ACCESS_TOKEN_FOR_CLIENT_CREDENTIALS:"seccft",SUCCESS_EXCHANGE_CUSTOM_TOKEN:"secte",SUCCESS_EXCHANGE_DEVICE_CODE_FOR_ACCESS_TOKEN:"sede",SUCCESS_EXCHANGE_NATIVE_SOCIAL_LOGIN:"sens",SUCCESS_EXCHANGE_PASSWORD_OOB_FOR_ACCESS_TOKEN:"seoobft",SUCCESS_EXCHANGE_PASSWORD_OTP_FOR_ACCESS_TOKEN:"seotpft",SUCCESS_EXCHANGE_PASSWORD_FOR_ACCESS_TOKEN:"sepft",SUCCESS_EXCHANGE_PASSKEY_OOB_FOR_ACCESS_TOKEN:"sepkoobft",SUCCESS_EXCHANGE_PASSKEY_OTP_FOR_ACCESS_TOKEN:"sepkotpft",SUCCESS_EXCHANGE_PASSKEY_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sepkrcft",SUCCESS_EXCHANGE_PASSWORD_MFA_RECOVERY_FOR_ACCESS_TOKEN:"sercft",SUCCESS_EXCHANGE_REFRESH_TOKEN_FOR_ACCESS_TOKEN:"sertft",SUCCESSFULLY_ACCEPTED_USER_INVITE:"si",BREACHED_PASSWORD_ON_SIGNUP:"signup_pwd_leak",SUCCESS_LOGOUT:"slo",SUCCESS_REVOCATION:"srrt",SUCCESS_SIGNUP:"ss",FAILED_SS_SSO_OPERATION:"ss_sso_failure",INFORMATION_FROM_SS_SSO_OPERATION:"ss_sso_info",SUCCESS_SS_SSO_OPERATION:"ss_sso_success",SUCCESS_SILENT_AUTH:"ssa",SUCCESSFUL_SCIM_OPERATION:"sscim",SUCCESSFULLY_IMPORTED_USERS:"sui",SUCCESS_VERIFICATION_EMAIL:"sv",SUCCESS_VERIFICATION_EMAIL_REQUEST:"svr",MAX_AMOUNT_OF_AUTHENTICATORS:"too_many_records",USER_LOGIN_BLOCK_RELEASED:"ublkdu",FAILED_UNIVERSAL_LOGOUT:"universal_logout_failed",SUCCESSFUL_UNIVERSAL_LOGOUT:"universal_logout_succeeded",WARNING_DURING_LOGIN:"w",WARNING_SENDING_NOTIFICATION:"wn",WARNING_USER_MANAGEMENT:"wum"},nt=e.z.string().refine(t=>Object.values(ne).includes(t),{message:"Invalid log type"}),ie=e.z.object({name:e.z.string(),version:e.z.string(),env:e.z.object({node:e.z.string().optional()}).optional()}),ae=e.z.object({type:nt,date:e.z.string(),description:e.z.string().optional(),ip:e.z.string().optional(),user_agent:e.z.string(),details:e.z.any().optional(),isMobile:e.z.boolean(),user_id:e.z.string().optional(),user_name:e.z.string().optional(),connection:e.z.string().optional(),connection_id:e.z.string().optional(),client_id:e.z.string().optional(),client_name:e.z.string().optional(),audience:e.z.string().optional(),scope:e.z.array(e.z.string()).optional(),strategy:e.z.string().optional(),strategy_type:e.z.string().optional(),hostname:e.z.string().optional(),auth0_client:ie.optional(),log_id:e.z.string().optional()}),it=e.z.object({...ae.shape,log_id:e.z.string()}),se=e.z.object({user_id:e.z.string(),password:e.z.string(),algorithm:e.z.enum(["bcrypt","argon2id"]).default("argon2id")}),at=e.z.object({...se.shape,created_at:e.z.string(),updated_at:e.z.string()}),re=e.z.object({initial_user_agent:e.z.string().describe("First user agent of the device from which this user logged in"),initial_ip:e.z.string().describe("First IP address associated with this session"),initial_asn:e.z.string().describe("First autonomous system number associated with this session"),last_user_agent:e.z.string().describe("Last user agent of the device from which this user logged in"),last_ip:e.z.string().describe("Last IP address from which this user logged in"),last_asn:e.z.string().describe("Last autonomous system number from which this user logged in")}),le=e.z.object({id:e.z.string(),revoked_at:e.z.string().optional(),used_at:e.z.string().optional(),user_id:e.z.string().describe("The user ID associated with the session"),expires_at:e.z.string().optional(),login_session_id:e.z.string(),idle_expires_at:e.z.string().optional(),device:re.describe("Metadata related to the device used in the session"),clients:e.z.array(e.z.string()).describe("List of client details for the session")}),st=e.z.object({created_at:e.z.string(),updated_at:e.z.string(),authenticated_at:e.z.string(),last_interaction_at:e.z.string(),...le.shape}),rt=e.z.object({kid:e.z.string().openapi({description:"The key id of the signing key"}),cert:e.z.string().openapi({description:"The public certificate of the signing key"}),fingerprint:e.z.string().openapi({description:"The cert fingerprint"}),thumbprint:e.z.string().openapi({description:"The cert thumbprint"}),pkcs7:e.z.string().optional().openapi({description:"The private key in pkcs7 format"}),current:e.z.boolean().optional().openapi({description:"True if the key is the current key"}),next:e.z.boolean().optional().openapi({description:"True if the key is the next key"}),previous:e.z.boolean().optional().openapi({description:"True if the key is the previous key"}),current_since:e.z.string().optional().openapi({description:"The date and time when the key became the current key"}),current_until:e.z.string().optional().openapi({description:"The date and time when the current key was rotated"}),revoked:e.z.boolean().optional().openapi({description:"True if the key is revoked"}),revoked_at:e.z.string().optional().openapi({description:"The date and time when the key was revoked"}),connection:e.z.string().optional().openapi({description:"The connection identifier associated with the key"}),type:e.z.enum(["jwt_signing","saml_encryption"]).openapi({description:"The type of the signing key"})});var ce=(t=>(t.RefreshToken="refresh_token",t.AuthorizationCode="authorization_code",t.ClientCredential="client_credentials",t.Passwordless="passwordless",t.Password="password",t.OTP="http://auth0.com/oauth/grant-type/passwordless/otp",t))(ce||{});const lt=e.z.object({access_token:e.z.string(),id_token:e.z.string().optional(),scope:e.z.string().optional(),state:e.z.string().optional(),refresh_token:e.z.string().optional(),token_type:e.z.string(),expires_in:e.z.number()});e.z.object({code:e.z.string(),state:e.z.string().optional()});const _e=e.z.object({button_border_radius:e.z.number(),button_border_weight:e.z.number(),buttons_style:e.z.enum(["pill","rounded","sharp"]),input_border_radius:e.z.number(),input_border_weight:e.z.number(),inputs_style:e.z.enum(["pill","rounded","sharp"]),show_widget_shadow:e.z.boolean(),widget_border_weight:e.z.number(),widget_corner_radius:e.z.number()}),pe=e.z.object({base_focus_color:e.z.string(),base_hover_color:e.z.string(),body_text:e.z.string(),captcha_widget_theme:e.z.enum(["auto","dark","light"]),error:e.z.string(),header:e.z.string(),icons:e.z.string(),input_background:e.z.string(),input_border:e.z.string(),input_filled_text:e.z.string(),input_labels_placeholders:e.z.string(),links_focused_components:e.z.string(),primary_button:e.z.string(),primary_button_label:e.z.string(),secondary_button_border:e.z.string(),secondary_button_label:e.z.string(),success:e.z.string(),widget_background:e.z.string(),widget_border:e.z.string()}),o=e.z.object({bold:e.z.boolean(),size:e.z.number()}),de=e.z.object({body_text:o,buttons_text:o,font_url:e.z.string(),input_labels:o,links:o,links_style:e.z.enum(["normal","underlined"]),reference_text_size:e.z.number(),subtitle:o,title:o}),ze=e.z.object({background_color:e.z.string(),background_image_url:e.z.string(),page_layout:e.z.enum(["center","left","right"])}),ge=e.z.object({header_text_alignment:e.z.enum(["center","left","right"]),logo_height:e.z.number(),logo_position:e.z.enum(["center","left","none","right"]),logo_url:e.z.string(),social_buttons_layout:e.z.enum(["bottom","top"])}),ue=e.z.object({borders:_e,colors:pe,displayName:e.z.string(),fonts:de,page_background:ze,widget:ge}),ct=ue.extend({themeId:e.z.string()}),_t=e.z.object({universal_login_experience:e.z.enum(["new","classic"]).default("new"),identifier_first:e.z.boolean().default(!0),password_first:e.z.boolean().default(!1),webauthn_platform_first_factor:e.z.boolean()}),pt=e.z.object({name:e.z.string(),enabled:e.z.boolean().optional().default(!0),default_from_address:e.z.string().optional(),credentials:e.z.union([e.z.object({accessKeyId:e.z.string(),secretAccessKey:e.z.string(),region:e.z.string()}),e.z.object({smtp_host:e.z.array(e.z.string()),smtp_port:e.z.number(),smtp_user:e.z.string(),smtp_pass:e.z.string()}),e.z.object({api_key:e.z.string(),domain:e.z.string().optional()}),e.z.object({connectionString:e.z.string()}),e.z.object({tenantId:e.z.string(),clientId:e.z.string(),clientSecret:e.z.string()})]),settings:e.z.object({}).optional()}),me=e.z.object({id:e.z.string(),session_id:e.z.string(),user_id:e.z.string(),client_id:e.z.string(),expires_at:e.z.string().optional(),idle_expires_at:e.z.string().optional(),last_exchanged_at:e.z.string().optional(),device:re,resource_servers:e.z.array(e.z.object({audience:e.z.string(),scopes:e.z.string()})),rotating:e.z.boolean()}),dt=e.z.object({created_at:e.z.string(),...me.shape}),zt=e.z.object({to:e.z.string(),message:e.z.string()}),gt=e.z.object({name:e.z.string(),options:e.z.object({})}),he=e.z.object({value:e.z.string(),description:e.z.string().optional()}),Se=e.z.object({token_dialect:e.z.enum(["access_token","access_token_authz"]).optional(),enforce_policies:e.z.boolean().optional(),allow_skipping_userinfo:e.z.boolean().optional(),skip_userinfo:e.z.boolean().optional(),persist_client_authorization:e.z.boolean().optional(),enable_introspection_endpoint:e.z.boolean().optional(),mtls:e.z.object({bound_access_tokens:e.z.boolean().optional()}).optional()}),be=e.z.object({name:e.z.string(),identifier:e.z.string(),scopes:e.z.array(he).optional(),signing_alg:e.z.string().optional(),signing_secret:e.z.string().optional(),token_lifetime:e.z.number().optional(),token_lifetime_for_web:e.z.number().optional(),skip_consent_for_verifiable_first_party_clients:e.z.boolean().optional(),allow_offline_access:e.z.boolean().optional(),verificationKey:e.z.string().optional(),options:Se.optional()}),Ee=e.z.object({id:e.z.string().optional(),...be.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),ut=e.z.array(Ee),fe=e.z.object({role_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string()}),Ae=e.z.object({...fe.shape,created_at:e.z.string()}),mt=e.z.array(Ae),Ie=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),permission_name:e.z.string(),organization_id:e.z.string().optional()}),Ce=e.z.object({...Ie.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),ht=e.z.array(Ce),Oe=e.z.object({user_id:e.z.string(),resource_server_identifier:e.z.string(),resource_server_name:e.z.string(),permission_name:e.z.string(),description:e.z.string().nullable().optional(),created_at:e.z.string().optional(),organization_id:e.z.string().optional()}),St=e.z.array(Oe),Te=e.z.object({user_id:e.z.string(),role_id:e.z.string(),organization_id:e.z.string().optional()}),ye=e.z.object({...Te.shape,tenant_id:e.z.string(),created_at:e.z.string().optional()}),bt=e.z.array(ye),Ne=e.z.object({name:e.z.string().min(1).max(50).openapi({description:"The name of the role. Cannot include '<' or '>'"}),description:e.z.string().max(255).optional().openapi({description:"The description of the role"})}),Re=e.z.object({id:e.z.string().openapi({description:"The unique identifier of the role"}),...Ne.shape,created_at:e.z.string().optional(),updated_at:e.z.string().optional()}),Et=e.z.array(Re),Le=e.z.object({logo_url:e.z.string().optional().openapi({description:"URL of the organization's logo"}),colors:e.z.object({primary:e.z.string().optional().openapi({description:"Primary color in hex format (e.g., #FF0000)"}),page_background:e.z.string().optional().openapi({description:"Page background color in hex format (e.g., #FFFFFF)"})}).optional()}).optional(),De=e.z.object({connection_id:e.z.string().openapi({description:"ID of the connection"}),assign_membership_on_login:e.z.boolean().default(!1).openapi({description:"Whether to assign membership to the organization on login"}),show_as_button:e.z.boolean().default(!0).openapi({description:"Whether to show this connection as a button in the login screen"}),is_signup_enabled:e.z.boolean().default(!0).openapi({description:"Whether signup is enabled for this connection"})}),we=e.z.object({client_credentials:e.z.object({enforce:e.z.boolean().default(!1).openapi({description:"Whether to enforce token quota limits"}),per_day:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per day (0 = unlimited)"}),per_hour:e.z.number().min(0).default(0).openapi({description:"Maximum tokens per hour (0 = unlimited)"})}).optional()}).optional(),je=e.z.object({id:e.z.string().optional(),name:e.z.string().min(1).openapi({description:"The name of the organization"}),display_name:e.z.string().optional().openapi({description:"The display name of the organization"}),branding:Le,metadata:e.z.record(e.z.any()).default({}).optional().openapi({description:"Custom metadata for the organization"}),enabled_connections:e.z.array(De).default([]).optional().openapi({description:"List of enabled connections for the organization"}),token_quota:we}),ft=e.z.object({...je.shape,...n.shape,id:e.z.string()}),ke=e.z.object({user_id:e.z.string().openapi({description:"ID of the user"}),organization_id:e.z.string().openapi({description:"ID of the organization"})}),At=e.z.object({...ke.shape,...n.shape,id:e.z.string()}),It=e.z.object({idle_session_lifetime:e.z.number().optional(),session_lifetime:e.z.number().optional(),session_cookie:e.z.object({mode:e.z.enum(["persistent","non-persistent"]).optional()}).optional(),enable_client_connections:e.z.boolean().optional(),default_redirection_uri:e.z.string().optional(),enabled_locales:e.z.array(e.z.string()).optional(),default_directory:e.z.string().optional(),error_page:e.z.object({html:e.z.string().optional(),show_log_link:e.z.boolean().optional(),url:e.z.string().optional()}).optional(),flags:e.z.object({allow_legacy_delegation_grant_types:e.z.boolean().optional(),allow_legacy_ro_grant_types:e.z.boolean().optional(),allow_legacy_tokeninfo_endpoint:e.z.boolean().optional(),disable_clickjack_protection_headers:e.z.boolean().optional(),enable_apis_section:e.z.boolean().optional(),enable_client_connections:e.z.boolean().optional(),enable_custom_domain_in_emails:e.z.boolean().optional(),enable_dynamic_client_registration:e.z.boolean().optional(),enable_idtoken_api2:e.z.boolean().optional(),enable_legacy_logs_search_v2:e.z.boolean().optional(),enable_legacy_profile:e.z.boolean().optional(),enable_pipeline2:e.z.boolean().optional(),enable_public_signup_user_exists_error:e.z.boolean().optional(),use_scope_descriptions_for_consent:e.z.boolean().optional(),disable_management_api_sms_obfuscation:e.z.boolean().optional(),enable_adfs_waad_email_verification:e.z.boolean().optional(),revoke_refresh_token_grant:e.z.boolean().optional(),dashboard_log_streams_next:e.z.boolean().optional(),dashboard_insights_view:e.z.boolean().optional(),disable_fields_map_fix:e.z.boolean().optional(),mfa_show_factor_list_on_enrollment:e.z.boolean().optional()}).optional(),friendly_name:e.z.string().optional(),picture_url:e.z.string().optional(),support_email:e.z.string().optional(),support_url:e.z.string().optional(),sandbox_version:e.z.string().optional(),sandbox_versions_available:e.z.array(e.z.string()).optional(),change_password:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),guardian_mfa_page:e.z.object({enabled:e.z.boolean(),html:e.z.string()}).optional(),default_audience:e.z.string().optional(),default_organization:e.z.string().optional(),sessions:e.z.object({oidc_logout_prompt_enabled:e.z.boolean().optional()}).optional()});function Ct(t){const[a,s]=t.split("|");if(!a||!s)throw new Error(`Invalid user_id: ${t}`);return{connection:a,id:s}}exports.Auth0Client=ie;exports.AuthorizationResponseMode=z;exports.AuthorizationResponseType=d;exports.CodeChallengeMethod=g;exports.ComponentCategory=p;exports.ComponentType=_;exports.GrantType=ce;exports.LogTypes=ne;exports.NodeType=R;exports.auth0FlowInsertSchema=xe;exports.auth0FlowSchema=v;exports.auth0UserResponseSchema=ve;exports.authParamsSchema=F;exports.baseUserSchema=c;exports.bordersSchema=_e;exports.brandingSchema=Ge;exports.buttonComponentSchema=C;exports.clientGrantInsertSchema=f;exports.clientGrantListSchema=He;exports.clientGrantSchema=A;exports.clientInsertSchema=b;exports.clientSchema=E;exports.codeInsertSchema=B;exports.codeSchema=Ke;exports.codeTypeSchema=K;exports.colorsSchema=pe;exports.componentSchema=N;exports.connectionInsertSchema=M;exports.connectionOptionsSchema=P;exports.connectionSchema=H;exports.coordinatesSchema=i;exports.customDomainInsertSchema=W;exports.customDomainSchema=V;exports.customDomainWithTenantIdSchema=Be;exports.emailProviderSchema=pt;exports.endingSchema=U;exports.fieldComponentSchema=T;exports.flowNodeSchema=D;exports.fontDetailsSchema=o;exports.fontsSchema=de;exports.formControlSchema=We;exports.formInsertSchema=Y;exports.formNodeComponentDefinition=q;exports.formSchema=Xe;exports.genericComponentSchema=y;exports.genericNodeSchema=w;exports.hookInsertSchema=Ye;exports.hookSchema=Ze;exports.identitySchema=m;exports.inviteInsertSchema=ee;exports.inviteSchema=$e;exports.inviteeSchema=$;exports.inviterSchema=Z;exports.jwksKeySchema=et;exports.jwksSchema=te;exports.legalComponentSchema=O;exports.logInsertSchema=ae;exports.logSchema=it;exports.loginSessionInsertSchema=oe;exports.loginSessionSchema=ot;exports.nodeSchema=j;exports.openIDConfigurationSchema=tt;exports.organizationBrandingSchema=Le;exports.organizationEnabledConnectionSchema=De;exports.organizationInsertSchema=je;exports.organizationSchema=ft;exports.organizationTokenQuotaSchema=we;exports.pageBackgroundSchema=ze;exports.parseUserId=Ct;exports.passwordInsertSchema=se;exports.passwordSchema=at;exports.profileDataSchema=u;exports.promptSettingSchema=_t;exports.refreshTokenInsertSchema=me;exports.refreshTokenSchema=dt;exports.resourceServerInsertSchema=be;exports.resourceServerListSchema=ut;exports.resourceServerOptionsSchema=Se;exports.resourceServerSchema=Ee;exports.resourceServerScopeSchema=he;exports.richTextComponentSchema=I;exports.roleInsertSchema=Ne;exports.roleListSchema=Et;exports.rolePermissionInsertSchema=fe;exports.rolePermissionListSchema=mt;exports.rolePermissionSchema=Ae;exports.roleSchema=Re;exports.sessionInsertSchema=le;exports.sessionSchema=st;exports.signingKeySchema=rt;exports.smsProviderSchema=gt;exports.smsSendParamsSchema=zt;exports.startSchema=k;exports.stepNodeSchema=L;exports.tenantInsertSchema=x;exports.tenantSchema=G;exports.tenantSettingsSchema=It;exports.themeInsertSchema=ue;exports.themeSchema=ct;exports.tokenResponseSchema=lt;exports.totalsSchema=Ue;exports.userInsertSchema=h;exports.userOrganizationInsertSchema=ke;exports.userOrganizationSchema=At;exports.userPermissionInsertSchema=Ie;exports.userPermissionListSchema=ht;exports.userPermissionSchema=Ce;exports.userPermissionWithDetailsListSchema=St;exports.userPermissionWithDetailsSchema=Oe;exports.userResponseSchema=Fe;exports.userRoleInsertSchema=Te;exports.userRoleListSchema=bt;exports.userRoleSchema=ye;exports.userSchema=S;exports.verificationMethodsSchema=X;exports.widgetSchema=ge;
|
|
@@ -12792,7 +12792,7 @@ export declare const logInsertSchema: z.ZodObject<{
|
|
|
12792
12792
|
type: z.ZodEffects<z.ZodString, "acls_summary" | "actions_execution_failed" | "api_limit" | "api_limit_warning" | "appi" | "ciba_exchange_failed" | "ciba_exchange_succeeded" | "ciba_start_failed" | "ciba_start_succeeded" | "cls" | "cs" | "depnote" | "f" | "fc" | "fce" | "fco" | "fcoa" | "fcp" | "fcph" | "fcpn" | "fcpr" | "fcpro" | "fcu" | "fd" | "fdeac" | "fdeaz" | "fdecc" | "fdu" | "feacft" | "feccft" | "fecte" | "fede" | "federated_logout_failed" | "fens" | "feoobft" | "feotpft" | "fepft" | "fepotpft" | "fercft" | "ferrt" | "fertft" | "fh" | "fi" | "flo" | "flows_execution_completed" | "flows_execution_failed" | "fn" | "forms_submission_failed" | "forms_submission_succeeded" | "fp" | "fpar" | "fpurh" | "fs" | "fsa" | "fu" | "fui" | "fv" | "fvr" | "gd_auth_email_verification" | "gd_auth_fail_email_verification" | "gd_auth_failed" | "gd_auth_rejected" | "gd_auth_succeed" | "gd_enrollment_complete" | "gd_otp_rate_limit_exceed" | "gd_recovery_failed" | "gd_recovery_rate_limit_exceed" | "gd_recovery_succeed" | "gd_send_email" | "gd_send_email_verification" | "gd_send_email_verification_failure" | "gd_send_pn" | "gd_send_pn_failure" | "gd_send_sms" | "gd_send_sms_failure" | "gd_send_voice" | "gd_send_voice_failure" | "gd_start_auth" | "gd_start_enroll" | "gd_start_enroll_failed" | "gd_tenant_update" | "gd_unenroll" | "gd_update_device_account" | "gd_webauthn_challenge_failed" | "gd_webauthn_enrollment_failed" | "kms_key_management_failure" | "kms_key_management_success" | "kms_key_state_changed" | "limit_delegation" | "limit_mu" | "limit_sul" | "limit_wc" | "mfar" | "mgmt_api_read" | "my_account_authentication_method_failed" | "my_account_authentication_method_succeeded" | "oidc_backchannel_logout_failed" | "oidc_backchannel_logout_succeeded" | "organization_member_added" | "passkey_challenge_failed" | "passkey_challenge_started" | "pla" | "pwd_leak" | "reset_pwd_leak" | "resource_cleanup" | "rich_consents_access_error" | "s" | "sapi" | "sce" | "scoa" | "scp" | "scpn" | "scpr" | "scu" | "scv" | "sd" | "sdu" | "seacft" | "seccft" | "secte" | "sede" | "sens" | "seoobft" | "seotpft" | "sepft" | "sepkoobft" | "sepkotpft" | "sepkrcft" | "sercft" | "sertft" | "si" | "signup_pwd_leak" | "slo" | "srrt" | "ss" | "ss_sso_failure" | "ss_sso_info" | "ss_sso_success" | "ssa" | "sscim" | "sui" | "sv" | "svr" | "too_many_records" | "ublkdu" | "universal_logout_failed" | "universal_logout_succeeded" | "w" | "wn" | "wum", string>;
|
|
12793
12793
|
date: z.ZodString;
|
|
12794
12794
|
description: z.ZodOptional<z.ZodString>;
|
|
12795
|
-
ip: z.ZodString
|
|
12795
|
+
ip: z.ZodOptional<z.ZodString>;
|
|
12796
12796
|
user_agent: z.ZodString;
|
|
12797
12797
|
details: z.ZodOptional<z.ZodAny>;
|
|
12798
12798
|
isMobile: z.ZodBoolean;
|
|
@@ -12834,7 +12834,6 @@ export declare const logInsertSchema: z.ZodObject<{
|
|
|
12834
12834
|
}, "strip", z.ZodTypeAny, {
|
|
12835
12835
|
type: "acls_summary" | "actions_execution_failed" | "api_limit" | "api_limit_warning" | "appi" | "ciba_exchange_failed" | "ciba_exchange_succeeded" | "ciba_start_failed" | "ciba_start_succeeded" | "cls" | "cs" | "depnote" | "f" | "fc" | "fce" | "fco" | "fcoa" | "fcp" | "fcph" | "fcpn" | "fcpr" | "fcpro" | "fcu" | "fd" | "fdeac" | "fdeaz" | "fdecc" | "fdu" | "feacft" | "feccft" | "fecte" | "fede" | "federated_logout_failed" | "fens" | "feoobft" | "feotpft" | "fepft" | "fepotpft" | "fercft" | "ferrt" | "fertft" | "fh" | "fi" | "flo" | "flows_execution_completed" | "flows_execution_failed" | "fn" | "forms_submission_failed" | "forms_submission_succeeded" | "fp" | "fpar" | "fpurh" | "fs" | "fsa" | "fu" | "fui" | "fv" | "fvr" | "gd_auth_email_verification" | "gd_auth_fail_email_verification" | "gd_auth_failed" | "gd_auth_rejected" | "gd_auth_succeed" | "gd_enrollment_complete" | "gd_otp_rate_limit_exceed" | "gd_recovery_failed" | "gd_recovery_rate_limit_exceed" | "gd_recovery_succeed" | "gd_send_email" | "gd_send_email_verification" | "gd_send_email_verification_failure" | "gd_send_pn" | "gd_send_pn_failure" | "gd_send_sms" | "gd_send_sms_failure" | "gd_send_voice" | "gd_send_voice_failure" | "gd_start_auth" | "gd_start_enroll" | "gd_start_enroll_failed" | "gd_tenant_update" | "gd_unenroll" | "gd_update_device_account" | "gd_webauthn_challenge_failed" | "gd_webauthn_enrollment_failed" | "kms_key_management_failure" | "kms_key_management_success" | "kms_key_state_changed" | "limit_delegation" | "limit_mu" | "limit_sul" | "limit_wc" | "mfar" | "mgmt_api_read" | "my_account_authentication_method_failed" | "my_account_authentication_method_succeeded" | "oidc_backchannel_logout_failed" | "oidc_backchannel_logout_succeeded" | "organization_member_added" | "passkey_challenge_failed" | "passkey_challenge_started" | "pla" | "pwd_leak" | "reset_pwd_leak" | "resource_cleanup" | "rich_consents_access_error" | "s" | "sapi" | "sce" | "scoa" | "scp" | "scpn" | "scpr" | "scu" | "scv" | "sd" | "sdu" | "seacft" | "seccft" | "secte" | "sede" | "sens" | "seoobft" | "seotpft" | "sepft" | "sepkoobft" | "sepkotpft" | "sepkrcft" | "sercft" | "sertft" | "si" | "signup_pwd_leak" | "slo" | "srrt" | "ss" | "ss_sso_failure" | "ss_sso_info" | "ss_sso_success" | "ssa" | "sscim" | "sui" | "sv" | "svr" | "too_many_records" | "ublkdu" | "universal_logout_failed" | "universal_logout_succeeded" | "w" | "wn" | "wum";
|
|
12836
12836
|
date: string;
|
|
12837
|
-
ip: string;
|
|
12838
12837
|
user_agent: string;
|
|
12839
12838
|
isMobile: boolean;
|
|
12840
12839
|
description?: string | undefined;
|
|
@@ -12845,6 +12844,7 @@ export declare const logInsertSchema: z.ZodObject<{
|
|
|
12845
12844
|
scope?: string[] | undefined;
|
|
12846
12845
|
strategy?: string | undefined;
|
|
12847
12846
|
connection_id?: string | undefined;
|
|
12847
|
+
ip?: string | undefined;
|
|
12848
12848
|
details?: any;
|
|
12849
12849
|
user_name?: string | undefined;
|
|
12850
12850
|
client_name?: string | undefined;
|
|
@@ -12861,7 +12861,6 @@ export declare const logInsertSchema: z.ZodObject<{
|
|
|
12861
12861
|
}, {
|
|
12862
12862
|
type: string;
|
|
12863
12863
|
date: string;
|
|
12864
|
-
ip: string;
|
|
12865
12864
|
user_agent: string;
|
|
12866
12865
|
isMobile: boolean;
|
|
12867
12866
|
description?: string | undefined;
|
|
@@ -12872,6 +12871,7 @@ export declare const logInsertSchema: z.ZodObject<{
|
|
|
12872
12871
|
scope?: string[] | undefined;
|
|
12873
12872
|
strategy?: string | undefined;
|
|
12874
12873
|
connection_id?: string | undefined;
|
|
12874
|
+
ip?: string | undefined;
|
|
12875
12875
|
details?: any;
|
|
12876
12876
|
user_name?: string | undefined;
|
|
12877
12877
|
client_name?: string | undefined;
|
|
@@ -12892,7 +12892,7 @@ export declare const logSchema: z.ZodObject<{
|
|
|
12892
12892
|
type: z.ZodEffects<z.ZodString, "acls_summary" | "actions_execution_failed" | "api_limit" | "api_limit_warning" | "appi" | "ciba_exchange_failed" | "ciba_exchange_succeeded" | "ciba_start_failed" | "ciba_start_succeeded" | "cls" | "cs" | "depnote" | "f" | "fc" | "fce" | "fco" | "fcoa" | "fcp" | "fcph" | "fcpn" | "fcpr" | "fcpro" | "fcu" | "fd" | "fdeac" | "fdeaz" | "fdecc" | "fdu" | "feacft" | "feccft" | "fecte" | "fede" | "federated_logout_failed" | "fens" | "feoobft" | "feotpft" | "fepft" | "fepotpft" | "fercft" | "ferrt" | "fertft" | "fh" | "fi" | "flo" | "flows_execution_completed" | "flows_execution_failed" | "fn" | "forms_submission_failed" | "forms_submission_succeeded" | "fp" | "fpar" | "fpurh" | "fs" | "fsa" | "fu" | "fui" | "fv" | "fvr" | "gd_auth_email_verification" | "gd_auth_fail_email_verification" | "gd_auth_failed" | "gd_auth_rejected" | "gd_auth_succeed" | "gd_enrollment_complete" | "gd_otp_rate_limit_exceed" | "gd_recovery_failed" | "gd_recovery_rate_limit_exceed" | "gd_recovery_succeed" | "gd_send_email" | "gd_send_email_verification" | "gd_send_email_verification_failure" | "gd_send_pn" | "gd_send_pn_failure" | "gd_send_sms" | "gd_send_sms_failure" | "gd_send_voice" | "gd_send_voice_failure" | "gd_start_auth" | "gd_start_enroll" | "gd_start_enroll_failed" | "gd_tenant_update" | "gd_unenroll" | "gd_update_device_account" | "gd_webauthn_challenge_failed" | "gd_webauthn_enrollment_failed" | "kms_key_management_failure" | "kms_key_management_success" | "kms_key_state_changed" | "limit_delegation" | "limit_mu" | "limit_sul" | "limit_wc" | "mfar" | "mgmt_api_read" | "my_account_authentication_method_failed" | "my_account_authentication_method_succeeded" | "oidc_backchannel_logout_failed" | "oidc_backchannel_logout_succeeded" | "organization_member_added" | "passkey_challenge_failed" | "passkey_challenge_started" | "pla" | "pwd_leak" | "reset_pwd_leak" | "resource_cleanup" | "rich_consents_access_error" | "s" | "sapi" | "sce" | "scoa" | "scp" | "scpn" | "scpr" | "scu" | "scv" | "sd" | "sdu" | "seacft" | "seccft" | "secte" | "sede" | "sens" | "seoobft" | "seotpft" | "sepft" | "sepkoobft" | "sepkotpft" | "sepkrcft" | "sercft" | "sertft" | "si" | "signup_pwd_leak" | "slo" | "srrt" | "ss" | "ss_sso_failure" | "ss_sso_info" | "ss_sso_success" | "ssa" | "sscim" | "sui" | "sv" | "svr" | "too_many_records" | "ublkdu" | "universal_logout_failed" | "universal_logout_succeeded" | "w" | "wn" | "wum", string>;
|
|
12893
12893
|
date: z.ZodString;
|
|
12894
12894
|
description: z.ZodOptional<z.ZodString>;
|
|
12895
|
-
ip: z.ZodString
|
|
12895
|
+
ip: z.ZodOptional<z.ZodString>;
|
|
12896
12896
|
user_agent: z.ZodString;
|
|
12897
12897
|
details: z.ZodOptional<z.ZodAny>;
|
|
12898
12898
|
isMobile: z.ZodBoolean;
|
|
@@ -12933,7 +12933,6 @@ export declare const logSchema: z.ZodObject<{
|
|
|
12933
12933
|
}, "strip", z.ZodTypeAny, {
|
|
12934
12934
|
type: "acls_summary" | "actions_execution_failed" | "api_limit" | "api_limit_warning" | "appi" | "ciba_exchange_failed" | "ciba_exchange_succeeded" | "ciba_start_failed" | "ciba_start_succeeded" | "cls" | "cs" | "depnote" | "f" | "fc" | "fce" | "fco" | "fcoa" | "fcp" | "fcph" | "fcpn" | "fcpr" | "fcpro" | "fcu" | "fd" | "fdeac" | "fdeaz" | "fdecc" | "fdu" | "feacft" | "feccft" | "fecte" | "fede" | "federated_logout_failed" | "fens" | "feoobft" | "feotpft" | "fepft" | "fepotpft" | "fercft" | "ferrt" | "fertft" | "fh" | "fi" | "flo" | "flows_execution_completed" | "flows_execution_failed" | "fn" | "forms_submission_failed" | "forms_submission_succeeded" | "fp" | "fpar" | "fpurh" | "fs" | "fsa" | "fu" | "fui" | "fv" | "fvr" | "gd_auth_email_verification" | "gd_auth_fail_email_verification" | "gd_auth_failed" | "gd_auth_rejected" | "gd_auth_succeed" | "gd_enrollment_complete" | "gd_otp_rate_limit_exceed" | "gd_recovery_failed" | "gd_recovery_rate_limit_exceed" | "gd_recovery_succeed" | "gd_send_email" | "gd_send_email_verification" | "gd_send_email_verification_failure" | "gd_send_pn" | "gd_send_pn_failure" | "gd_send_sms" | "gd_send_sms_failure" | "gd_send_voice" | "gd_send_voice_failure" | "gd_start_auth" | "gd_start_enroll" | "gd_start_enroll_failed" | "gd_tenant_update" | "gd_unenroll" | "gd_update_device_account" | "gd_webauthn_challenge_failed" | "gd_webauthn_enrollment_failed" | "kms_key_management_failure" | "kms_key_management_success" | "kms_key_state_changed" | "limit_delegation" | "limit_mu" | "limit_sul" | "limit_wc" | "mfar" | "mgmt_api_read" | "my_account_authentication_method_failed" | "my_account_authentication_method_succeeded" | "oidc_backchannel_logout_failed" | "oidc_backchannel_logout_succeeded" | "organization_member_added" | "passkey_challenge_failed" | "passkey_challenge_started" | "pla" | "pwd_leak" | "reset_pwd_leak" | "resource_cleanup" | "rich_consents_access_error" | "s" | "sapi" | "sce" | "scoa" | "scp" | "scpn" | "scpr" | "scu" | "scv" | "sd" | "sdu" | "seacft" | "seccft" | "secte" | "sede" | "sens" | "seoobft" | "seotpft" | "sepft" | "sepkoobft" | "sepkotpft" | "sepkrcft" | "sercft" | "sertft" | "si" | "signup_pwd_leak" | "slo" | "srrt" | "ss" | "ss_sso_failure" | "ss_sso_info" | "ss_sso_success" | "ssa" | "sscim" | "sui" | "sv" | "svr" | "too_many_records" | "ublkdu" | "universal_logout_failed" | "universal_logout_succeeded" | "w" | "wn" | "wum";
|
|
12935
12935
|
date: string;
|
|
12936
|
-
ip: string;
|
|
12937
12936
|
user_agent: string;
|
|
12938
12937
|
isMobile: boolean;
|
|
12939
12938
|
log_id: string;
|
|
@@ -12945,6 +12944,7 @@ export declare const logSchema: z.ZodObject<{
|
|
|
12945
12944
|
scope?: string[] | undefined;
|
|
12946
12945
|
strategy?: string | undefined;
|
|
12947
12946
|
connection_id?: string | undefined;
|
|
12947
|
+
ip?: string | undefined;
|
|
12948
12948
|
details?: any;
|
|
12949
12949
|
user_name?: string | undefined;
|
|
12950
12950
|
client_name?: string | undefined;
|
|
@@ -12960,7 +12960,6 @@ export declare const logSchema: z.ZodObject<{
|
|
|
12960
12960
|
}, {
|
|
12961
12961
|
type: string;
|
|
12962
12962
|
date: string;
|
|
12963
|
-
ip: string;
|
|
12964
12963
|
user_agent: string;
|
|
12965
12964
|
isMobile: boolean;
|
|
12966
12965
|
log_id: string;
|
|
@@ -12972,6 +12971,7 @@ export declare const logSchema: z.ZodObject<{
|
|
|
12972
12971
|
scope?: string[] | undefined;
|
|
12973
12972
|
strategy?: string | undefined;
|
|
12974
12973
|
connection_id?: string | undefined;
|
|
12974
|
+
ip?: string | undefined;
|
|
12975
12975
|
details?: any;
|
|
12976
12976
|
user_name?: string | undefined;
|
|
12977
12977
|
client_name?: string | undefined;
|
|
@@ -16030,91 +16030,39 @@ export declare const rolePermissionInsertSchema: z.ZodObject<{
|
|
|
16030
16030
|
}>;
|
|
16031
16031
|
export type RolePermissionInsert = z.infer<typeof rolePermissionInsertSchema>;
|
|
16032
16032
|
export declare const rolePermissionSchema: z.ZodObject<{
|
|
16033
|
-
|
|
16034
|
-
created_at: z.ZodOptional<z.ZodString>;
|
|
16033
|
+
created_at: z.ZodString;
|
|
16035
16034
|
role_id: z.ZodString;
|
|
16036
16035
|
resource_server_identifier: z.ZodString;
|
|
16037
16036
|
permission_name: z.ZodString;
|
|
16038
16037
|
}, "strip", z.ZodTypeAny, {
|
|
16039
|
-
|
|
16038
|
+
created_at: string;
|
|
16040
16039
|
role_id: string;
|
|
16041
16040
|
resource_server_identifier: string;
|
|
16042
16041
|
permission_name: string;
|
|
16043
|
-
created_at?: string | undefined;
|
|
16044
16042
|
}, {
|
|
16045
|
-
|
|
16043
|
+
created_at: string;
|
|
16046
16044
|
role_id: string;
|
|
16047
16045
|
resource_server_identifier: string;
|
|
16048
16046
|
permission_name: string;
|
|
16049
|
-
created_at?: string | undefined;
|
|
16050
16047
|
}>;
|
|
16051
16048
|
export type RolePermission = z.infer<typeof rolePermissionSchema>;
|
|
16052
16049
|
export declare const rolePermissionListSchema: z.ZodArray<z.ZodObject<{
|
|
16053
|
-
|
|
16054
|
-
created_at: z.ZodOptional<z.ZodString>;
|
|
16050
|
+
created_at: z.ZodString;
|
|
16055
16051
|
role_id: z.ZodString;
|
|
16056
16052
|
resource_server_identifier: z.ZodString;
|
|
16057
16053
|
permission_name: z.ZodString;
|
|
16058
16054
|
}, "strip", z.ZodTypeAny, {
|
|
16059
|
-
|
|
16055
|
+
created_at: string;
|
|
16060
16056
|
role_id: string;
|
|
16061
16057
|
resource_server_identifier: string;
|
|
16062
16058
|
permission_name: string;
|
|
16063
|
-
created_at?: string | undefined;
|
|
16064
16059
|
}, {
|
|
16065
|
-
|
|
16060
|
+
created_at: string;
|
|
16066
16061
|
role_id: string;
|
|
16067
16062
|
resource_server_identifier: string;
|
|
16068
16063
|
permission_name: string;
|
|
16069
|
-
created_at?: string | undefined;
|
|
16070
16064
|
}>, "many">;
|
|
16071
16065
|
export type RolePermissionList = z.infer<typeof rolePermissionListSchema>;
|
|
16072
|
-
export declare const rolePermissionWithDetailsSchema: z.ZodObject<{
|
|
16073
|
-
role_id: z.ZodString;
|
|
16074
|
-
resource_server_identifier: z.ZodString;
|
|
16075
|
-
resource_server_name: z.ZodString;
|
|
16076
|
-
permission_name: z.ZodString;
|
|
16077
|
-
description: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
16078
|
-
created_at: z.ZodOptional<z.ZodString>;
|
|
16079
|
-
}, "strip", z.ZodTypeAny, {
|
|
16080
|
-
role_id: string;
|
|
16081
|
-
resource_server_identifier: string;
|
|
16082
|
-
permission_name: string;
|
|
16083
|
-
resource_server_name: string;
|
|
16084
|
-
description?: string | null | undefined;
|
|
16085
|
-
created_at?: string | undefined;
|
|
16086
|
-
}, {
|
|
16087
|
-
role_id: string;
|
|
16088
|
-
resource_server_identifier: string;
|
|
16089
|
-
permission_name: string;
|
|
16090
|
-
resource_server_name: string;
|
|
16091
|
-
description?: string | null | undefined;
|
|
16092
|
-
created_at?: string | undefined;
|
|
16093
|
-
}>;
|
|
16094
|
-
export type RolePermissionWithDetails = z.infer<typeof rolePermissionWithDetailsSchema>;
|
|
16095
|
-
export declare const rolePermissionWithDetailsListSchema: z.ZodArray<z.ZodObject<{
|
|
16096
|
-
role_id: z.ZodString;
|
|
16097
|
-
resource_server_identifier: z.ZodString;
|
|
16098
|
-
resource_server_name: z.ZodString;
|
|
16099
|
-
permission_name: z.ZodString;
|
|
16100
|
-
description: z.ZodOptional<z.ZodNullable<z.ZodString>>;
|
|
16101
|
-
created_at: z.ZodOptional<z.ZodString>;
|
|
16102
|
-
}, "strip", z.ZodTypeAny, {
|
|
16103
|
-
role_id: string;
|
|
16104
|
-
resource_server_identifier: string;
|
|
16105
|
-
permission_name: string;
|
|
16106
|
-
resource_server_name: string;
|
|
16107
|
-
description?: string | null | undefined;
|
|
16108
|
-
created_at?: string | undefined;
|
|
16109
|
-
}, {
|
|
16110
|
-
role_id: string;
|
|
16111
|
-
resource_server_identifier: string;
|
|
16112
|
-
permission_name: string;
|
|
16113
|
-
resource_server_name: string;
|
|
16114
|
-
description?: string | null | undefined;
|
|
16115
|
-
created_at?: string | undefined;
|
|
16116
|
-
}>, "many">;
|
|
16117
|
-
export type RolePermissionWithDetailsList = z.infer<typeof rolePermissionWithDetailsListSchema>;
|
|
16118
16066
|
export declare const userPermissionInsertSchema: z.ZodObject<{
|
|
16119
16067
|
user_id: z.ZodString;
|
|
16120
16068
|
resource_server_identifier: z.ZodString;
|
|
@@ -17149,7 +17097,7 @@ export interface ResourceServersAdapter {
|
|
|
17149
17097
|
export interface RolePermissionsAdapter {
|
|
17150
17098
|
assign(tenant_id: string, role_id: string, permissions: RolePermissionInsert[]): Promise<boolean>;
|
|
17151
17099
|
remove(tenant_id: string, role_id: string, permissions: Pick<RolePermissionInsert, "resource_server_identifier" | "permission_name">[]): Promise<boolean>;
|
|
17152
|
-
list(tenant_id: string, role_id: string, params?: ListParams): Promise<
|
|
17100
|
+
list(tenant_id: string, role_id: string, params?: ListParams): Promise<RolePermissionList>;
|
|
17153
17101
|
}
|
|
17154
17102
|
export interface UserPermissionsAdapter {
|
|
17155
17103
|
create(tenant_id: string, user_id: string, permission: UserPermissionInsert, organization_id?: string): Promise<boolean>;
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { z as e } from "@hono/zod-openapi";
|
|
2
|
-
const
|
|
2
|
+
const ze = e.object({
|
|
3
3
|
start: e.number(),
|
|
4
4
|
limit: e.number(),
|
|
5
5
|
length: e.number()
|
|
@@ -56,7 +56,7 @@ const Be = e.object({
|
|
|
56
56
|
email: e.string().optional(),
|
|
57
57
|
login_count: e.number().default(0),
|
|
58
58
|
identities: e.array(f).optional()
|
|
59
|
-
}),
|
|
59
|
+
}), Be = A, We = _.extend({
|
|
60
60
|
login_count: e.number(),
|
|
61
61
|
multifactor: e.array(e.string()).optional(),
|
|
62
62
|
last_ip: e.string().optional(),
|
|
@@ -272,7 +272,7 @@ const O = e.object({
|
|
|
272
272
|
...N.shape,
|
|
273
273
|
created_at: e.string().optional(),
|
|
274
274
|
updated_at: e.string().optional()
|
|
275
|
-
}),
|
|
275
|
+
}), Xe = e.array(y), a = e.object({
|
|
276
276
|
x: e.number(),
|
|
277
277
|
y: e.number()
|
|
278
278
|
});
|
|
@@ -447,7 +447,7 @@ const F = e.object({
|
|
|
447
447
|
sdkSrc: e.string().optional(),
|
|
448
448
|
sdk_src: e.string().optional()
|
|
449
449
|
}).passthrough()
|
|
450
|
-
}).passthrough(),
|
|
450
|
+
}).passthrough(), Ve = G.omit({
|
|
451
451
|
id: !0,
|
|
452
452
|
created_at: !0,
|
|
453
453
|
updated_at: !0
|
|
@@ -471,7 +471,7 @@ const K = e.object({
|
|
|
471
471
|
ui_locales: e.string().optional(),
|
|
472
472
|
// The following fields are not available in Auth0
|
|
473
473
|
vendor_id: e.string().optional()
|
|
474
|
-
}),
|
|
474
|
+
}), qe = e.object({
|
|
475
475
|
colors: e.object({
|
|
476
476
|
primary: e.string(),
|
|
477
477
|
page_background: e.object({
|
|
@@ -688,7 +688,7 @@ const q = e.enum([
|
|
|
688
688
|
expires_at: e.string(),
|
|
689
689
|
used_at: e.string().optional(),
|
|
690
690
|
user_id: e.string().optional()
|
|
691
|
-
}),
|
|
691
|
+
}), Ye = e.object({
|
|
692
692
|
...Y.shape,
|
|
693
693
|
created_at: e.string()
|
|
694
694
|
}), Q = e.object({
|
|
@@ -719,9 +719,9 @@ const q = e.enum([
|
|
|
719
719
|
methods: e.array(J)
|
|
720
720
|
}).optional(),
|
|
721
721
|
tls_policy: e.string().optional()
|
|
722
|
-
}),
|
|
722
|
+
}), Qe = Z.extend({
|
|
723
723
|
tenant_id: e.string()
|
|
724
|
-
}),
|
|
724
|
+
}), Je = e.object({
|
|
725
725
|
id: e.string(),
|
|
726
726
|
type: e.literal("submit"),
|
|
727
727
|
label: e.string(),
|
|
@@ -847,7 +847,7 @@ const q = e.enum([
|
|
|
847
847
|
style: e.object({ css: e.string().optional() }).optional()
|
|
848
848
|
}).openapi({
|
|
849
849
|
description: "Schema for flow-based forms (matches new JSON structure)"
|
|
850
|
-
}),
|
|
850
|
+
}), Ze = e.object({
|
|
851
851
|
...n.shape,
|
|
852
852
|
...ee.shape,
|
|
853
853
|
id: e.string()
|
|
@@ -879,7 +879,7 @@ const q = e.enum([
|
|
|
879
879
|
...l,
|
|
880
880
|
trigger_id: h,
|
|
881
881
|
form_id: e.string()
|
|
882
|
-
}),
|
|
882
|
+
}), $e = e.union([
|
|
883
883
|
te,
|
|
884
884
|
oe
|
|
885
885
|
]), ne = e.object({
|
|
@@ -894,7 +894,7 @@ const q = e.enum([
|
|
|
894
894
|
...n.shape,
|
|
895
895
|
hook_id: e.string(),
|
|
896
896
|
form_id: e.string()
|
|
897
|
-
}),
|
|
897
|
+
}), et = e.union([ne, ie]), ae = e.object({
|
|
898
898
|
name: e.string().optional()
|
|
899
899
|
}), se = e.object({
|
|
900
900
|
email: e.string().optional()
|
|
@@ -910,7 +910,7 @@ const q = e.enum([
|
|
|
910
910
|
ttl_sec: e.number().int().max(2592e3).default(604800).optional(),
|
|
911
911
|
roles: e.array(e.string()).default([]).optional(),
|
|
912
912
|
send_invitation_email: e.boolean().default(!0).optional()
|
|
913
|
-
}),
|
|
913
|
+
}), tt = e.object({
|
|
914
914
|
id: e.string(),
|
|
915
915
|
organization_id: e.string().max(50),
|
|
916
916
|
created_at: e.string().datetime(),
|
|
@@ -935,9 +935,9 @@ const q = e.enum([
|
|
|
935
935
|
x5t: e.string().optional(),
|
|
936
936
|
x5c: e.array(e.string()).optional(),
|
|
937
937
|
use: e.enum(["sig", "enc"]).optional()
|
|
938
|
-
}),
|
|
938
|
+
}), ot = e.object({
|
|
939
939
|
keys: e.array(le)
|
|
940
|
-
}),
|
|
940
|
+
}), nt = e.object({
|
|
941
941
|
issuer: e.string(),
|
|
942
942
|
authorization_endpoint: e.string(),
|
|
943
943
|
token_endpoint: e.string(),
|
|
@@ -971,7 +971,7 @@ const q = e.enum([
|
|
|
971
971
|
login_completed: e.boolean().optional().default(!1)
|
|
972
972
|
}).openapi({
|
|
973
973
|
description: "This represents a login sesion"
|
|
974
|
-
}),
|
|
974
|
+
}), it = e.object({
|
|
975
975
|
..._e.shape,
|
|
976
976
|
id: e.string().openapi({
|
|
977
977
|
description: "This is is used as the state in the universal login"
|
|
@@ -1158,7 +1158,7 @@ const q = e.enum([
|
|
|
1158
1158
|
type: pe,
|
|
1159
1159
|
date: e.string(),
|
|
1160
1160
|
description: e.string().optional(),
|
|
1161
|
-
ip: e.string(),
|
|
1161
|
+
ip: e.string().optional(),
|
|
1162
1162
|
user_agent: e.string(),
|
|
1163
1163
|
details: e.any().optional(),
|
|
1164
1164
|
// Using z.any() as a placeholder for "details" type
|
|
@@ -1176,14 +1176,14 @@ const q = e.enum([
|
|
|
1176
1176
|
hostname: e.string().optional(),
|
|
1177
1177
|
auth0_client: de.optional(),
|
|
1178
1178
|
log_id: e.string().optional()
|
|
1179
|
-
}),
|
|
1179
|
+
}), at = e.object({
|
|
1180
1180
|
...ge.shape,
|
|
1181
1181
|
log_id: e.string()
|
|
1182
1182
|
}), ue = e.object({
|
|
1183
1183
|
user_id: e.string(),
|
|
1184
1184
|
password: e.string(),
|
|
1185
1185
|
algorithm: e.enum(["bcrypt", "argon2id"]).default("argon2id")
|
|
1186
|
-
}),
|
|
1186
|
+
}), st = e.object({
|
|
1187
1187
|
...ue.shape,
|
|
1188
1188
|
created_at: e.string(),
|
|
1189
1189
|
updated_at: e.string()
|
|
@@ -1206,13 +1206,13 @@ const q = e.enum([
|
|
|
1206
1206
|
"Metadata related to the device used in the session"
|
|
1207
1207
|
),
|
|
1208
1208
|
clients: e.array(e.string()).describe("List of client details for the session")
|
|
1209
|
-
}),
|
|
1209
|
+
}), rt = e.object({
|
|
1210
1210
|
created_at: e.string(),
|
|
1211
1211
|
updated_at: e.string(),
|
|
1212
1212
|
authenticated_at: e.string(),
|
|
1213
1213
|
last_interaction_at: e.string(),
|
|
1214
1214
|
...me.shape
|
|
1215
|
-
}),
|
|
1215
|
+
}), lt = e.object({
|
|
1216
1216
|
kid: e.string().openapi({ description: "The key id of the signing key" }),
|
|
1217
1217
|
cert: e.string().openapi({ description: "The public certificate of the signing key" }),
|
|
1218
1218
|
fingerprint: e.string().openapi({ description: "The cert fingerprint" }),
|
|
@@ -1239,7 +1239,7 @@ const q = e.enum([
|
|
|
1239
1239
|
})
|
|
1240
1240
|
});
|
|
1241
1241
|
var he = /* @__PURE__ */ ((t) => (t.RefreshToken = "refresh_token", t.AuthorizationCode = "authorization_code", t.ClientCredential = "client_credentials", t.Passwordless = "passwordless", t.Password = "password", t.OTP = "http://auth0.com/oauth/grant-type/passwordless/otp", t))(he || {});
|
|
1242
|
-
const
|
|
1242
|
+
const _t = e.object({
|
|
1243
1243
|
access_token: e.string(),
|
|
1244
1244
|
id_token: e.string().optional(),
|
|
1245
1245
|
scope: e.string().optional(),
|
|
@@ -1312,14 +1312,14 @@ const be = e.object({
|
|
|
1312
1312
|
fonts: fe,
|
|
1313
1313
|
page_background: Se,
|
|
1314
1314
|
widget: Ae
|
|
1315
|
-
}),
|
|
1315
|
+
}), ct = Ie.extend({
|
|
1316
1316
|
themeId: e.string()
|
|
1317
|
-
}),
|
|
1317
|
+
}), pt = e.object({
|
|
1318
1318
|
universal_login_experience: e.enum(["new", "classic"]).default("new"),
|
|
1319
1319
|
identifier_first: e.boolean().default(!0),
|
|
1320
1320
|
password_first: e.boolean().default(!1),
|
|
1321
1321
|
webauthn_platform_first_factor: e.boolean()
|
|
1322
|
-
}),
|
|
1322
|
+
}), dt = e.object({
|
|
1323
1323
|
name: e.string(),
|
|
1324
1324
|
enabled: e.boolean().optional().default(!0),
|
|
1325
1325
|
default_from_address: e.string().optional(),
|
|
@@ -1370,15 +1370,15 @@ const be = e.object({
|
|
|
1370
1370
|
})
|
|
1371
1371
|
),
|
|
1372
1372
|
rotating: e.boolean()
|
|
1373
|
-
}),
|
|
1373
|
+
}), gt = e.object({
|
|
1374
1374
|
// When the refresh token record was created.
|
|
1375
1375
|
created_at: e.string(),
|
|
1376
1376
|
// Spread in the rest of the refresh token properties.
|
|
1377
1377
|
...Ce.shape
|
|
1378
|
-
}),
|
|
1378
|
+
}), ut = e.object({
|
|
1379
1379
|
to: e.string(),
|
|
1380
1380
|
message: e.string()
|
|
1381
|
-
}),
|
|
1381
|
+
}), mt = e.object({
|
|
1382
1382
|
name: e.string(),
|
|
1383
1383
|
options: e.object({})
|
|
1384
1384
|
}), Oe = e.object({
|
|
@@ -1411,33 +1411,23 @@ const be = e.object({
|
|
|
1411
1411
|
...Ne.shape,
|
|
1412
1412
|
created_at: e.string().optional(),
|
|
1413
1413
|
updated_at: e.string().optional()
|
|
1414
|
-
}),
|
|
1414
|
+
}), ht = e.array(ye), Re = e.object({
|
|
1415
1415
|
role_id: e.string(),
|
|
1416
1416
|
resource_server_identifier: e.string(),
|
|
1417
1417
|
permission_name: e.string()
|
|
1418
1418
|
}), Le = e.object({
|
|
1419
1419
|
...Re.shape,
|
|
1420
|
-
|
|
1421
|
-
|
|
1422
|
-
}), Et = e.array(Le), De = e.object({
|
|
1423
|
-
role_id: e.string(),
|
|
1424
|
-
resource_server_identifier: e.string(),
|
|
1425
|
-
resource_server_name: e.string(),
|
|
1426
|
-
permission_name: e.string(),
|
|
1427
|
-
description: e.string().nullable().optional(),
|
|
1428
|
-
created_at: e.string().optional()
|
|
1429
|
-
}), ft = e.array(
|
|
1430
|
-
De
|
|
1431
|
-
), je = e.object({
|
|
1420
|
+
created_at: e.string()
|
|
1421
|
+
}), bt = e.array(Le), De = e.object({
|
|
1432
1422
|
user_id: e.string(),
|
|
1433
1423
|
resource_server_identifier: e.string(),
|
|
1434
1424
|
permission_name: e.string(),
|
|
1435
1425
|
organization_id: e.string().optional()
|
|
1436
|
-
}),
|
|
1437
|
-
...
|
|
1426
|
+
}), je = e.object({
|
|
1427
|
+
...De.shape,
|
|
1438
1428
|
tenant_id: e.string(),
|
|
1439
1429
|
created_at: e.string().optional()
|
|
1440
|
-
}),
|
|
1430
|
+
}), Et = e.array(je), we = e.object({
|
|
1441
1431
|
user_id: e.string(),
|
|
1442
1432
|
resource_server_identifier: e.string(),
|
|
1443
1433
|
resource_server_name: e.string(),
|
|
@@ -1445,31 +1435,31 @@ const be = e.object({
|
|
|
1445
1435
|
description: e.string().nullable().optional(),
|
|
1446
1436
|
created_at: e.string().optional(),
|
|
1447
1437
|
organization_id: e.string().optional()
|
|
1448
|
-
}),
|
|
1449
|
-
|
|
1450
|
-
),
|
|
1438
|
+
}), ft = e.array(
|
|
1439
|
+
we
|
|
1440
|
+
), ke = e.object({
|
|
1451
1441
|
user_id: e.string(),
|
|
1452
1442
|
role_id: e.string(),
|
|
1453
1443
|
organization_id: e.string().optional()
|
|
1454
|
-
}),
|
|
1455
|
-
...
|
|
1444
|
+
}), Ue = e.object({
|
|
1445
|
+
...ke.shape,
|
|
1456
1446
|
tenant_id: e.string(),
|
|
1457
1447
|
created_at: e.string().optional()
|
|
1458
|
-
}),
|
|
1448
|
+
}), St = e.array(Ue), Fe = e.object({
|
|
1459
1449
|
name: e.string().min(1).max(50).openapi({
|
|
1460
1450
|
description: "The name of the role. Cannot include '<' or '>'"
|
|
1461
1451
|
}),
|
|
1462
1452
|
description: e.string().max(255).optional().openapi({
|
|
1463
1453
|
description: "The description of the role"
|
|
1464
1454
|
})
|
|
1465
|
-
}),
|
|
1455
|
+
}), ve = e.object({
|
|
1466
1456
|
id: e.string().openapi({
|
|
1467
1457
|
description: "The unique identifier of the role"
|
|
1468
1458
|
}),
|
|
1469
|
-
...
|
|
1459
|
+
...Fe.shape,
|
|
1470
1460
|
created_at: e.string().optional(),
|
|
1471
1461
|
updated_at: e.string().optional()
|
|
1472
|
-
}),
|
|
1462
|
+
}), At = e.array(ve), Pe = e.object({
|
|
1473
1463
|
logo_url: e.string().optional().openapi({
|
|
1474
1464
|
description: "URL of the organization's logo"
|
|
1475
1465
|
}),
|
|
@@ -1481,7 +1471,7 @@ const be = e.object({
|
|
|
1481
1471
|
description: "Page background color in hex format (e.g., #FFFFFF)"
|
|
1482
1472
|
})
|
|
1483
1473
|
}).optional()
|
|
1484
|
-
}).optional(),
|
|
1474
|
+
}).optional(), He = e.object({
|
|
1485
1475
|
connection_id: e.string().openapi({
|
|
1486
1476
|
description: "ID of the connection"
|
|
1487
1477
|
}),
|
|
@@ -1494,7 +1484,7 @@ const be = e.object({
|
|
|
1494
1484
|
is_signup_enabled: e.boolean().default(!0).openapi({
|
|
1495
1485
|
description: "Whether signup is enabled for this connection"
|
|
1496
1486
|
})
|
|
1497
|
-
}),
|
|
1487
|
+
}), Me = e.object({
|
|
1498
1488
|
client_credentials: e.object({
|
|
1499
1489
|
enforce: e.boolean().default(!1).openapi({
|
|
1500
1490
|
description: "Whether to enforce token quota limits"
|
|
@@ -1506,7 +1496,7 @@ const be = e.object({
|
|
|
1506
1496
|
description: "Maximum tokens per hour (0 = unlimited)"
|
|
1507
1497
|
})
|
|
1508
1498
|
}).optional()
|
|
1509
|
-
}).optional(),
|
|
1499
|
+
}).optional(), xe = e.object({
|
|
1510
1500
|
id: e.string().optional(),
|
|
1511
1501
|
name: e.string().min(1).openapi({
|
|
1512
1502
|
description: "The name of the organization"
|
|
@@ -1514,30 +1504,30 @@ const be = e.object({
|
|
|
1514
1504
|
display_name: e.string().optional().openapi({
|
|
1515
1505
|
description: "The display name of the organization"
|
|
1516
1506
|
}),
|
|
1517
|
-
branding:
|
|
1507
|
+
branding: Pe,
|
|
1518
1508
|
metadata: e.record(e.any()).default({}).optional().openapi({
|
|
1519
1509
|
description: "Custom metadata for the organization"
|
|
1520
1510
|
}),
|
|
1521
|
-
enabled_connections: e.array(
|
|
1511
|
+
enabled_connections: e.array(He).default([]).optional().openapi({
|
|
1522
1512
|
description: "List of enabled connections for the organization"
|
|
1523
1513
|
}),
|
|
1524
|
-
token_quota:
|
|
1525
|
-
}),
|
|
1526
|
-
...
|
|
1514
|
+
token_quota: Me
|
|
1515
|
+
}), It = e.object({
|
|
1516
|
+
...xe.shape,
|
|
1527
1517
|
...n.shape,
|
|
1528
1518
|
id: e.string()
|
|
1529
|
-
}),
|
|
1519
|
+
}), Ge = e.object({
|
|
1530
1520
|
user_id: e.string().openapi({
|
|
1531
1521
|
description: "ID of the user"
|
|
1532
1522
|
}),
|
|
1533
1523
|
organization_id: e.string().openapi({
|
|
1534
1524
|
description: "ID of the organization"
|
|
1535
1525
|
})
|
|
1536
|
-
}),
|
|
1537
|
-
...
|
|
1526
|
+
}), Ct = e.object({
|
|
1527
|
+
...Ge.shape,
|
|
1538
1528
|
...n.shape,
|
|
1539
1529
|
id: e.string()
|
|
1540
|
-
}),
|
|
1530
|
+
}), Ot = e.object({
|
|
1541
1531
|
// Session settings
|
|
1542
1532
|
idle_session_lifetime: e.number().optional(),
|
|
1543
1533
|
session_lifetime: e.number().optional(),
|
|
@@ -1607,7 +1597,7 @@ const be = e.object({
|
|
|
1607
1597
|
oidc_logout_prompt_enabled: e.boolean().optional()
|
|
1608
1598
|
}).optional()
|
|
1609
1599
|
});
|
|
1610
|
-
function
|
|
1600
|
+
function Tt(t) {
|
|
1611
1601
|
const [i, s] = t.split("|");
|
|
1612
1602
|
if (!i || !s)
|
|
1613
1603
|
throw new Error(`Invalid user_id: ${t}`);
|
|
@@ -1623,21 +1613,21 @@ export {
|
|
|
1623
1613
|
he as GrantType,
|
|
1624
1614
|
ce as LogTypes,
|
|
1625
1615
|
U as NodeType,
|
|
1626
|
-
|
|
1616
|
+
Ve as auth0FlowInsertSchema,
|
|
1627
1617
|
G as auth0FlowSchema,
|
|
1628
|
-
|
|
1618
|
+
Be as auth0UserResponseSchema,
|
|
1629
1619
|
K as authParamsSchema,
|
|
1630
1620
|
_ as baseUserSchema,
|
|
1631
1621
|
be as bordersSchema,
|
|
1632
|
-
|
|
1622
|
+
qe as brandingSchema,
|
|
1633
1623
|
L as buttonComponentSchema,
|
|
1634
1624
|
N as clientGrantInsertSchema,
|
|
1635
|
-
|
|
1625
|
+
Xe as clientGrantListSchema,
|
|
1636
1626
|
y as clientGrantSchema,
|
|
1637
1627
|
O as clientInsertSchema,
|
|
1638
1628
|
T as clientSchema,
|
|
1639
1629
|
Y as codeInsertSchema,
|
|
1640
|
-
|
|
1630
|
+
Ye as codeSchema,
|
|
1641
1631
|
q as codeTypeSchema,
|
|
1642
1632
|
Ee as colorsSchema,
|
|
1643
1633
|
k as componentSchema,
|
|
@@ -1647,88 +1637,86 @@ export {
|
|
|
1647
1637
|
a as coordinatesSchema,
|
|
1648
1638
|
Q as customDomainInsertSchema,
|
|
1649
1639
|
Z as customDomainSchema,
|
|
1650
|
-
|
|
1651
|
-
|
|
1640
|
+
Qe as customDomainWithTenantIdSchema,
|
|
1641
|
+
dt as emailProviderSchema,
|
|
1652
1642
|
x as endingSchema,
|
|
1653
1643
|
j as fieldComponentSchema,
|
|
1654
1644
|
v as flowNodeSchema,
|
|
1655
1645
|
o as fontDetailsSchema,
|
|
1656
1646
|
fe as fontsSchema,
|
|
1657
|
-
|
|
1647
|
+
Je as formControlSchema,
|
|
1658
1648
|
ee as formInsertSchema,
|
|
1659
1649
|
$ as formNodeComponentDefinition,
|
|
1660
|
-
|
|
1650
|
+
Ze as formSchema,
|
|
1661
1651
|
w as genericComponentSchema,
|
|
1662
1652
|
P as genericNodeSchema,
|
|
1663
|
-
|
|
1664
|
-
|
|
1653
|
+
$e as hookInsertSchema,
|
|
1654
|
+
et as hookSchema,
|
|
1665
1655
|
f as identitySchema,
|
|
1666
1656
|
re as inviteInsertSchema,
|
|
1667
|
-
|
|
1657
|
+
tt as inviteSchema,
|
|
1668
1658
|
se as inviteeSchema,
|
|
1669
1659
|
ae as inviterSchema,
|
|
1670
|
-
|
|
1660
|
+
ot as jwksKeySchema,
|
|
1671
1661
|
le as jwksSchema,
|
|
1672
1662
|
D as legalComponentSchema,
|
|
1673
1663
|
ge as logInsertSchema,
|
|
1674
|
-
|
|
1664
|
+
at as logSchema,
|
|
1675
1665
|
_e as loginSessionInsertSchema,
|
|
1676
|
-
|
|
1666
|
+
it as loginSessionSchema,
|
|
1677
1667
|
H as nodeSchema,
|
|
1678
|
-
|
|
1679
|
-
|
|
1680
|
-
|
|
1681
|
-
|
|
1682
|
-
|
|
1683
|
-
|
|
1668
|
+
nt as openIDConfigurationSchema,
|
|
1669
|
+
Pe as organizationBrandingSchema,
|
|
1670
|
+
He as organizationEnabledConnectionSchema,
|
|
1671
|
+
xe as organizationInsertSchema,
|
|
1672
|
+
It as organizationSchema,
|
|
1673
|
+
Me as organizationTokenQuotaSchema,
|
|
1684
1674
|
Se as pageBackgroundSchema,
|
|
1685
|
-
|
|
1675
|
+
Tt as parseUserId,
|
|
1686
1676
|
ue as passwordInsertSchema,
|
|
1687
|
-
|
|
1677
|
+
st as passwordSchema,
|
|
1688
1678
|
E as profileDataSchema,
|
|
1689
|
-
|
|
1679
|
+
pt as promptSettingSchema,
|
|
1690
1680
|
Ce as refreshTokenInsertSchema,
|
|
1691
|
-
|
|
1681
|
+
gt as refreshTokenSchema,
|
|
1692
1682
|
Ne as resourceServerInsertSchema,
|
|
1693
|
-
|
|
1683
|
+
ht as resourceServerListSchema,
|
|
1694
1684
|
Te as resourceServerOptionsSchema,
|
|
1695
1685
|
ye as resourceServerSchema,
|
|
1696
1686
|
Oe as resourceServerScopeSchema,
|
|
1697
1687
|
R as richTextComponentSchema,
|
|
1698
|
-
|
|
1699
|
-
|
|
1688
|
+
Fe as roleInsertSchema,
|
|
1689
|
+
At as roleListSchema,
|
|
1700
1690
|
Re as rolePermissionInsertSchema,
|
|
1701
|
-
|
|
1691
|
+
bt as rolePermissionListSchema,
|
|
1702
1692
|
Le as rolePermissionSchema,
|
|
1703
|
-
|
|
1704
|
-
De as rolePermissionWithDetailsSchema,
|
|
1705
|
-
Pe as roleSchema,
|
|
1693
|
+
ve as roleSchema,
|
|
1706
1694
|
me as sessionInsertSchema,
|
|
1707
|
-
|
|
1708
|
-
|
|
1709
|
-
|
|
1710
|
-
|
|
1695
|
+
rt as sessionSchema,
|
|
1696
|
+
lt as signingKeySchema,
|
|
1697
|
+
mt as smsProviderSchema,
|
|
1698
|
+
ut as smsSendParamsSchema,
|
|
1711
1699
|
M as startSchema,
|
|
1712
1700
|
F as stepNodeSchema,
|
|
1713
1701
|
X as tenantInsertSchema,
|
|
1714
1702
|
V as tenantSchema,
|
|
1715
|
-
|
|
1703
|
+
Ot as tenantSettingsSchema,
|
|
1716
1704
|
Ie as themeInsertSchema,
|
|
1717
|
-
|
|
1718
|
-
|
|
1719
|
-
|
|
1705
|
+
ct as themeSchema,
|
|
1706
|
+
_t as tokenResponseSchema,
|
|
1707
|
+
ze as totalsSchema,
|
|
1720
1708
|
S as userInsertSchema,
|
|
1721
|
-
|
|
1722
|
-
|
|
1723
|
-
|
|
1724
|
-
|
|
1725
|
-
|
|
1726
|
-
|
|
1727
|
-
|
|
1728
|
-
|
|
1729
|
-
|
|
1730
|
-
|
|
1731
|
-
|
|
1709
|
+
Ge as userOrganizationInsertSchema,
|
|
1710
|
+
Ct as userOrganizationSchema,
|
|
1711
|
+
De as userPermissionInsertSchema,
|
|
1712
|
+
Et as userPermissionListSchema,
|
|
1713
|
+
je as userPermissionSchema,
|
|
1714
|
+
ft as userPermissionWithDetailsListSchema,
|
|
1715
|
+
we as userPermissionWithDetailsSchema,
|
|
1716
|
+
We as userResponseSchema,
|
|
1717
|
+
ke as userRoleInsertSchema,
|
|
1718
|
+
St as userRoleListSchema,
|
|
1719
|
+
Ue as userRoleSchema,
|
|
1732
1720
|
A as userSchema,
|
|
1733
1721
|
J as verificationMethodsSchema,
|
|
1734
1722
|
Ae as widgetSchema
|