@authhero/kysely-adapter 0.9.2 → 0.9.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/kysely-adapter.cjs +1 -1
- package/dist/kysely-adapter.d.ts +99 -99
- package/dist/kysely-adapter.iife.js +1 -1
- package/dist/kysely-adapter.mjs +18 -18
- package/package.json +2 -2
package/dist/kysely-adapter.mjs
CHANGED
|
@@ -3066,31 +3066,31 @@ const or = i.object({
|
|
|
3066
3066
|
}), cr = i.object({
|
|
3067
3067
|
id: i.string(),
|
|
3068
3068
|
name: i.string(),
|
|
3069
|
-
callbacks: i.array(i.string()).openapi({
|
|
3069
|
+
callbacks: i.array(i.string()).default([]).optional().openapi({
|
|
3070
3070
|
description: "Comma-separated list of URLs whitelisted to use as a callback to the client after authentication."
|
|
3071
|
-
})
|
|
3072
|
-
allowed_origins: i.array(i.string()).openapi({
|
|
3071
|
+
}),
|
|
3072
|
+
allowed_origins: i.array(i.string()).default([]).optional().openapi({
|
|
3073
3073
|
description: "Comma-separated list of URLs allowed to make requests from JavaScript to Auth0 API (typically used with CORS). By default, all your callback URLs will be allowed. This field allows you to enter other origins if necessary. You can also use wildcards at the subdomain level. Query strings and hash information are not taken into account when validating these URLs."
|
|
3074
|
-
})
|
|
3075
|
-
web_origins: i.array(i.string()).openapi({
|
|
3074
|
+
}),
|
|
3075
|
+
web_origins: i.array(i.string()).default([]).optional().openapi({
|
|
3076
3076
|
description: "Comma-separated list of allowed origins for use with Cross-Origin Authentication, Device Flow, and web message response mode."
|
|
3077
|
-
})
|
|
3078
|
-
allowed_logout_urls: i.array(i.string()).openapi({
|
|
3077
|
+
}),
|
|
3078
|
+
allowed_logout_urls: i.array(i.string()).default([]).optional().openapi({
|
|
3079
3079
|
description: "Comma-separated list of URLs that are valid to redirect to after logout from Auth0. Wildcards are allowed for subdomains."
|
|
3080
|
-
})
|
|
3081
|
-
allowed_clients: i.array(i.string()).openapi({
|
|
3080
|
+
}),
|
|
3081
|
+
allowed_clients: i.array(i.string()).default([]).optional().openapi({
|
|
3082
3082
|
description: "Ids of clients that will be allowed to perform delegation requests. Clients that will be allowed to make delegation request. By default, all your clients will be allowed. This field allows you to specify specific clients"
|
|
3083
|
-
})
|
|
3083
|
+
}),
|
|
3084
3084
|
addons: i.object({
|
|
3085
3085
|
samlp: or.optional()
|
|
3086
|
-
}).openapi({
|
|
3086
|
+
}).default({}).optional().openapi({
|
|
3087
3087
|
description: "Addons associated with the client. The key is the addon's package name and the value is an object with the configuration for the addon."
|
|
3088
|
-
})
|
|
3089
|
-
email_validation: i.enum(["enabled", "disabled", "enforced"]).default("enforced").openapi({
|
|
3088
|
+
}),
|
|
3089
|
+
email_validation: i.enum(["enabled", "disabled", "enforced"]).default("enforced").optional().openapi({
|
|
3090
3090
|
description: "Defines if it possible to sign in with an unverified email and if verification emails will be sent. This is not available in auth0"
|
|
3091
3091
|
}),
|
|
3092
|
-
client_secret: i.string().default(() => ir()),
|
|
3093
|
-
disable_sign_ups: i.boolean().default(!1).openapi({
|
|
3092
|
+
client_secret: i.string().default(() => ir()).optional(),
|
|
3093
|
+
disable_sign_ups: i.boolean().optional().default(!1).openapi({
|
|
3094
3094
|
description: "Prevents users from signing up using the hosted login page. This is not available in auth0"
|
|
3095
3095
|
})
|
|
3096
3096
|
}), dr = i.object({
|
|
@@ -3151,9 +3151,9 @@ const lr = i.object({
|
|
|
3151
3151
|
client_secret: i.string().optional(),
|
|
3152
3152
|
app_secret: i.string().optional(),
|
|
3153
3153
|
scope: i.string().optional()
|
|
3154
|
-
}).optional(),
|
|
3155
|
-
enabled_clients: i.array(i.string()).optional(),
|
|
3156
|
-
authorization_endpoint: i.string().optional(),
|
|
3154
|
+
}).default({}).optional(),
|
|
3155
|
+
enabled_clients: i.array(i.string()).default([]).optional(),
|
|
3156
|
+
authorization_endpoint: i.string().default("").optional(),
|
|
3157
3157
|
response_type: i.custom().optional(),
|
|
3158
3158
|
response_mode: i.custom().optional(),
|
|
3159
3159
|
// Deprecated
|
package/package.json
CHANGED
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"type": "git",
|
|
12
12
|
"url": "https://github.com/markusahlstrand/authhero"
|
|
13
13
|
},
|
|
14
|
-
"version": "0.9.
|
|
14
|
+
"version": "0.9.4",
|
|
15
15
|
"files": [
|
|
16
16
|
"dist"
|
|
17
17
|
],
|
|
@@ -41,7 +41,7 @@
|
|
|
41
41
|
"kysely-bun-sqlite": "^0.3.2",
|
|
42
42
|
"kysely-planetscale": "^1.4.0",
|
|
43
43
|
"nanoid": "^5.0.7",
|
|
44
|
-
"@authhero/adapter-interfaces": "^0.15.
|
|
44
|
+
"@authhero/adapter-interfaces": "^0.15.4"
|
|
45
45
|
},
|
|
46
46
|
"scripts": {
|
|
47
47
|
"build": "tsc && vite build && dts-bundle-generator --config ./dts-bundle-generator.config.ts",
|