@logto/schemas 1.18.0 → 1.20.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (257) hide show
  1. package/alterations/1.19.0-1720253939-add-organization-branding.ts +18 -0
  2. package/alterations/1.19.0-1720345784-add-color-to-app-sie.ts +18 -0
  3. package/alterations/1.19.0-1720505152-update-custom-ui-assets.ts +20 -0
  4. package/alterations/1.19.0-1721483240-multiple-app-secrets.ts +77 -0
  5. package/alterations/1.19.0-1721645392-add-application-custom-data-column.ts +18 -0
  6. package/alterations/1.19.0-1722926389-argon2d-argon2id.ts +35 -0
  7. package/alterations/1.20.0-1723448981-personal-access-tokens.ts +35 -0
  8. package/alterations/1.20.0-1724229102-add-report-sub-updates-cloud-scope.ts +102 -0
  9. package/alterations/1.20.0-1724316971-add-verified-identifier-to-verification-statuses.ts +18 -0
  10. package/alterations/1.20.0-1725971571-add-verification-record.ts +35 -0
  11. package/alterations-js/1.19.0-1720253939-add-organization-branding.js +14 -0
  12. package/alterations-js/1.19.0-1720345784-add-color-to-app-sie.js +14 -0
  13. package/alterations-js/1.19.0-1720505152-update-custom-ui-assets.js +16 -0
  14. package/alterations-js/1.19.0-1721483240-multiple-app-secrets.js +72 -0
  15. package/alterations-js/1.19.0-1721645392-add-application-custom-data-column.js +14 -0
  16. package/alterations-js/1.19.0-1722926389-argon2d-argon2id.js +30 -0
  17. package/alterations-js/1.20.0-1723448981-personal-access-tokens.js +30 -0
  18. package/alterations-js/1.20.0-1724229102-add-report-sub-updates-cloud-scope.js +59 -0
  19. package/alterations-js/1.20.0-1724316971-add-verified-identifier-to-verification-statuses.js +14 -0
  20. package/alterations-js/1.20.0-1725971571-add-verification-record.js +30 -0
  21. package/lib/consts/experience.d.ts +8 -5
  22. package/lib/consts/experience.js +3 -0
  23. package/lib/consts/oidc.d.ts +48 -4
  24. package/lib/consts/oidc.js +32 -1
  25. package/lib/consts/subscriptions.d.ts +1 -0
  26. package/lib/consts/subscriptions.js +1 -0
  27. package/lib/consts/system.d.ts +2 -0
  28. package/lib/consts/system.js +2 -0
  29. package/lib/db-entries/application-secret.d.ts +28 -0
  30. package/lib/db-entries/application-secret.js +41 -0
  31. package/lib/db-entries/application-sign-in-experience.d.ts +4 -2
  32. package/lib/db-entries/application-sign-in-experience.js +5 -1
  33. package/lib/db-entries/application.d.ts +6 -2
  34. package/lib/db-entries/application.js +5 -1
  35. package/lib/db-entries/custom-types.d.ts +2 -0
  36. package/lib/db-entries/custom-types.js +2 -0
  37. package/lib/db-entries/index.d.ts +3 -0
  38. package/lib/db-entries/index.js +3 -0
  39. package/lib/db-entries/organization.d.ts +6 -2
  40. package/lib/db-entries/organization.js +5 -1
  41. package/lib/db-entries/personal-access-token.d.ts +26 -0
  42. package/lib/db-entries/personal-access-token.js +41 -0
  43. package/lib/db-entries/sign-in-experience.d.ts +4 -4
  44. package/lib/db-entries/sign-in-experience.js +5 -5
  45. package/lib/db-entries/verification-record.d.ts +26 -0
  46. package/lib/db-entries/verification-record.js +42 -0
  47. package/lib/db-entries/verification-status.d.ts +3 -1
  48. package/lib/db-entries/verification-status.js +4 -0
  49. package/lib/foundations/jsonb-types/index.d.ts +1 -0
  50. package/lib/foundations/jsonb-types/index.js +1 -0
  51. package/lib/foundations/jsonb-types/logs.d.ts +3 -0
  52. package/lib/foundations/jsonb-types/logs.js +1 -0
  53. package/lib/foundations/jsonb-types/sign-in-experience.d.ts +37 -3
  54. package/lib/foundations/jsonb-types/sign-in-experience.js +19 -4
  55. package/lib/foundations/jsonb-types/users.d.ts +6 -6
  56. package/lib/foundations/jsonb-types/users.js +2 -2
  57. package/lib/foundations/jsonb-types/verification-records.d.ts +13 -0
  58. package/lib/foundations/jsonb-types/verification-records.js +14 -0
  59. package/lib/seeds/application.js +1 -0
  60. package/lib/seeds/cloud-api.d.ts +5 -1
  61. package/lib/seeds/cloud-api.js +5 -0
  62. package/lib/seeds/sign-in-experience.d.ts +1 -0
  63. package/lib/seeds/sign-in-experience.js +2 -2
  64. package/lib/types/application.d.ts +80 -122
  65. package/lib/types/connector.d.ts +34 -28
  66. package/lib/types/consent.d.ts +180 -33
  67. package/lib/types/cookie.d.ts +7 -1
  68. package/lib/types/cookie.js +3 -1
  69. package/lib/types/domain.d.ts +2 -10
  70. package/lib/types/hook.d.ts +14 -21
  71. package/lib/types/index.d.ts +1 -0
  72. package/lib/types/index.js +1 -0
  73. package/lib/types/interactions.d.ts +202 -65
  74. package/lib/types/interactions.js +39 -23
  75. package/lib/types/log/interaction.d.ts +4 -3
  76. package/lib/types/log/interaction.js +1 -0
  77. package/lib/types/logto-config/index.d.ts +267 -242
  78. package/lib/types/logto-config/jwt-customizer.d.ts +548 -371
  79. package/lib/types/logto-config/jwt-customizer.js +28 -1
  80. package/lib/types/logto-config/oidc-provider.d.ts +6 -6
  81. package/lib/types/mfa.d.ts +16 -16
  82. package/lib/types/scope.d.ts +7 -6
  83. package/lib/types/sign-in-experience.d.ts +57 -120
  84. package/lib/types/sign-in-experience.js +1 -1
  85. package/lib/types/sso-connector.d.ts +14 -19
  86. package/lib/types/ssr.d.ts +25 -0
  87. package/lib/types/ssr.js +9 -0
  88. package/lib/types/system.d.ts +7 -3
  89. package/lib/types/system.js +4 -0
  90. package/lib/types/user-assets.d.ts +25 -5
  91. package/lib/types/user-assets.js +20 -1
  92. package/lib/types/user.d.ts +84 -120
  93. package/lib/utils/application.d.ts +3 -0
  94. package/lib/utils/application.js +7 -0
  95. package/lib/utils/index.d.ts +1 -0
  96. package/lib/utils/index.js +1 -0
  97. package/package.json +9 -9
  98. package/tables/application_secrets.sql +17 -0
  99. package/tables/application_sign_in_experiences.sql +1 -1
  100. package/tables/applications.sql +7 -2
  101. package/tables/organizations.sql +2 -0
  102. package/tables/personal_access_tokens.sql +16 -0
  103. package/tables/sign_in_experiences.sql +1 -1
  104. package/tables/users.sql +1 -1
  105. package/tables/verification_records.sql +15 -0
  106. package/tables/verification_statuses.sql +1 -0
  107. package/alterations-js/1.0.0-1677208902-update-admin-console-config.d.ts +0 -3
  108. package/alterations-js/1.0.0-1677765137-seed-for-admin-tenant.d.ts +0 -3
  109. package/alterations-js/1.0.0-1677907982-allow-admin-create-multiple-tenants.d.ts +0 -3
  110. package/alterations-js/1.0.0-1678157950-privacy-policy-url.d.ts +0 -3
  111. package/alterations-js/1.0.0-1678199795-add-verification-status-table.d.ts +0 -3
  112. package/alterations-js/1.0.0-1678259693-remove-branding-style-config.d.ts +0 -3
  113. package/alterations-js/1.0.0-1678269972-use-restrictive-policies.d.ts +0 -3
  114. package/alterations-js/1.0.0-1678284778-restrict-internal-roles.d.ts +0 -3
  115. package/alterations-js/1.0.0-1678425761-m2m-app-for-tenants.d.ts +0 -3
  116. package/alterations-js/1.0.0-1678450233-support-custom-content.d.ts +0 -3
  117. package/alterations-js/1.0.0-1678716747-service-logs.d.ts +0 -3
  118. package/alterations-js/1.0.0-1678928481-remove-deprecated-logto-config-item.d.ts +0 -3
  119. package/alterations-js/1.0.0-1678953179-update-get-started-task-config.d.ts +0 -3
  120. package/alterations-js/1.0.0-1679209413-drop-connector-database-storage.d.ts +0 -3
  121. package/alterations-js/1.0.0_beta.10-1-logto-config.d.ts +0 -3
  122. package/alterations-js/1.0.0_beta.10-1663923211-machine-to-machine-app.d.ts +0 -3
  123. package/alterations-js/1.0.0_beta.10-1664265197-custom-phrases.d.ts +0 -3
  124. package/alterations-js/1.0.0_beta.11-1664347703-rename-language-key-to-tag.d.ts +0 -3
  125. package/alterations-js/1.0.0_beta.11-1664356000-add-created-at-column-to-users.d.ts +0 -3
  126. package/alterations-js/1.0.0_beta.11-1664462389-correct-user-created-at-column-by-user-logs.d.ts +0 -3
  127. package/alterations-js/1.0.0_beta.14-1665300135-sign-in-sign-up.d.ts +0 -3
  128. package/alterations-js/1.0.0_beta.14-1667283640-remove-forgot-password.d.ts +0 -3
  129. package/alterations-js/1.0.0_beta.14-1667292082-remove-sign-in-method.d.ts +0 -3
  130. package/alterations-js/1.0.0_beta.14-1667374974-user-suspend.d.ts +0 -3
  131. package/alterations-js/1.0.0_beta.14-1667900481-add-passcode-type-continue.d.ts +0 -3
  132. package/alterations-js/1.0.0_beta.18-1668666590-support-multiple-connector-instances.d.ts +0 -3
  133. package/alterations-js/1.0.0_beta.18-1668666600-remove-connector-enabled.d.ts +0 -3
  134. package/alterations-js/1.0.0_beta.18-1669091623-roles-and-scopes.d.ts +0 -3
  135. package/alterations-js/1.0.0_beta.18-1669702299-sign-up.d.ts +0 -3
  136. package/alterations-js/1.0.0_beta.18-1671039448-add-user-name-index.d.ts +0 -3
  137. package/alterations-js/1.0.0_beta.18-1671080370-terms-of-use.d.ts +0 -3
  138. package/alterations-js/1.0.0_beta.18-1671336831-refactor-log-types.d.ts +0 -3
  139. package/alterations-js/1.0.0_beta.18-1671509870-hooks.d.ts +0 -3
  140. package/alterations-js/1.0.0_beta.18-1672119200-align-passcode-type-with-message-type.d.ts +0 -3
  141. package/alterations-js/1.0.0_rc.0-1672815959-user-roles.d.ts +0 -3
  142. package/alterations-js/1.0.0_rc.0-1672820345-scope-resource-id.d.ts +0 -3
  143. package/alterations-js/1.0.0_rc.0-1672901841-roles-and-scopes-not-null.d.ts +0 -3
  144. package/alterations-js/1.0.0_rc.0-1673001922-support-generic-passcode.d.ts +0 -3
  145. package/alterations-js/1.0.0_rc.0-1673165463-scope-name-index.d.ts +0 -3
  146. package/alterations-js/1.0.0_rc.0-1673349501-sms-sign-in-identifier-to-phone.d.ts +0 -3
  147. package/alterations-js/1.0.0_rc.0-1673465463-ac-scope-name.d.ts +0 -3
  148. package/alterations-js/1.0.0_rc.0-1673853579-ac-default-scope.d.ts +0 -3
  149. package/alterations-js/1.0.0_rc.0-1673863835-ac-scope-role.d.ts +0 -3
  150. package/alterations-js/1.0.0_rc.0-1673882867-fix-alteration-issues.d.ts +0 -3
  151. package/alterations-js/1.0.0_rc.0-1673940577-scope-description-not-null.d.ts +0 -3
  152. package/alterations-js/1.0.0_rc.0-1673941897-application-roles.d.ts +0 -3
  153. package/alterations-js/1.0.0_rc.0-1674032095.1-dedup-resources-constraint.d.ts +0 -4
  154. package/alterations-js/1.0.0_rc.0-1674032095.2-oidc-model-pkey.d.ts +0 -3
  155. package/alterations-js/1.0.0_rc.0-1674032095.3-tenant-table.d.ts +0 -3
  156. package/alterations-js/1.0.0_rc.0-1674032095.4-add-id-column.d.ts +0 -3
  157. package/alterations-js/1.0.0_rc.0-1674032095.5-multi-tenancy.d.ts +0 -3
  158. package/alterations-js/1.0.0_rc.0-1674032095.6-add-tenant-id-trigger.d.ts +0 -3
  159. package/alterations-js/1.0.0_rc.0-1674987042-drop-settings-and-create-systems.d.ts +0 -3
  160. package/alterations-js/1.0.0_rc.0-1675316731-update-seed-data.d.ts +0 -3
  161. package/alterations-js/1.0.0_rc.1-1675788753-multi-tenancy-rls.d.ts +0 -3
  162. package/alterations-js/1.0.0_rc.1-1676115897-add-admin-tenant.d.ts +0 -3
  163. package/alterations-js/1.0.0_rc.1-1676185899-fix-logs-index.d.ts +0 -3
  164. package/alterations-js/1.0.0_rc.1-1676190092-migrate-admin-data.d.ts +0 -3
  165. package/alterations-js/1.0.0_rc.1-1676823841-update-sie-primary-key.d.ts +0 -3
  166. package/alterations-js/1.0.0_rc.1-1676874936-support-custom-css.d.ts +0 -3
  167. package/alterations-js/1.0.0_rc.1-1676886855-connector-database-read-write.d.ts +0 -3
  168. package/alterations-js/1.0.0_rc.1-1676906977-remove-demo-app.d.ts +0 -3
  169. package/alterations-js/1.0.0_rc.1-1676956206-move-console-sie-to-database.d.ts +0 -3
  170. package/alterations-js/1.0.0_rc.1-1677059985-move-console-application-to-database.d.ts +0 -3
  171. package/alterations-js/1.10.1-1695647183-update-private-key-type.d.ts +0 -3
  172. package/alterations-js/1.10.1-1696657546-organization-tables.d.ts +0 -3
  173. package/alterations-js/1.10.1-1697683802-add-sso-connectors-table.d.ts +0 -3
  174. package/alterations-js/1.10.1-1698646271-add-organization-created-flag.d.ts +0 -3
  175. package/alterations-js/1.10.1-1698820410-add-user-sso-identities-table.d.ts +0 -4
  176. package/alterations-js/1.10.1-1698910485-user-logto-data.d.ts +0 -3
  177. package/alterations-js/1.11.0-1699422979-add-sso-connector-id-col-to-user-sso-identities-table.d.ts +0 -3
  178. package/alterations-js/1.11.0-1699598903-remove-sso-only-column-in-sso-connectors-table.d.ts +0 -3
  179. package/alterations-js/1.12.0-1700031616-update-org-role-foreign-keys.d.ts +0 -3
  180. package/alterations-js/1.12.0-1701054133-add-unique-constraint-to-the-sso-connector-name.d.ts +0 -3
  181. package/alterations-js/1.12.0-1701245520-add-single-sign-on-enabled-flag-to-sie.d.ts +0 -3
  182. package/alterations-js/1.13.0-1702274830-add-new-third-party-column-to-applications-table.d.ts +0 -3
  183. package/alterations-js/1.13.0-1702372401-add-application-permissions-tables.d.ts +0 -3
  184. package/alterations-js/1.13.0-1702544178-sync-tenant-orgs.d.ts +0 -18
  185. package/alterations-js/1.13.0-1702871078-protected-application-type.d.ts +0 -3
  186. package/alterations-js/1.13.0-1702877515-protected-app-configs.d.ts +0 -3
  187. package/alterations-js/1.13.0-1702978120-application-sign-in-experience-table.d.ts +0 -3
  188. package/alterations-js/1.13.0-1703229996-daily-token-usage.d.ts +0 -3
  189. package/alterations-js/1.13.0-1703230000-update-tenant-roles.d.ts +0 -11
  190. package/alterations-js/1.13.0-1704692973-remove-legacy-resources.d.ts +0 -3
  191. package/alterations-js/1.13.0-1704934999-add-magic-links-table.d.ts +0 -3
  192. package/alterations-js/1.13.0-1704935001-add-organization-invitation-tables.d.ts +0 -3
  193. package/alterations-js/1.13.0-1705288654-add-application-user-consent-organizations-table.d.ts +0 -3
  194. package/alterations-js/1.13.0-1705991158-update-invitation-indices.d.ts +0 -7
  195. package/alterations-js/1.13.0-1706449174-update-organization-invitation-column.d.ts +0 -3
  196. package/alterations-js/1.13.0-1706510290-protected-app-host-index.d.ts +0 -3
  197. package/alterations-js/1.13.0-1706512952-restore-get-started-page.d.ts +0 -3
  198. package/alterations-js/1.13.0-1706528755-remove-magic-links.d.ts +0 -3
  199. package/alterations-js/1.13.0-1706585206-protected-app-custom-domain-unique.d.ts +0 -3
  200. package/alterations-js/1.13.1-1707360939-grant-is-suspended-read-permission.d.ts +0 -6
  201. package/alterations-js/1.14.0-1708916601-remove-management-api-scopes-assigned-to-user-role.d.ts +0 -3
  202. package/alterations-js/1.14.0-1709190131-enhance-dau-data-accuracy.d.ts +0 -3
  203. package/alterations-js/1.15.0-1709521416-user-password-encrypt-method.d.ts +0 -3
  204. package/alterations-js/1.15.0-1709528944-regenerate-dau-data.d.ts +0 -3
  205. package/alterations-js/1.15.0-1710223946-add-fetch-custom-jwt-cloud-scope.d.ts +0 -3
  206. package/alterations-js/1.15.0-1710408335-make-resource-scopes-description-nullable.d.ts +0 -3
  207. package/alterations-js/1.15.0-1710859622-add-oidc-standard-claim-properties.d.ts +0 -3
  208. package/alterations-js/1.15.0-1711607772-remove-invite-member-scope-from-tenant-member-role.d.ts +0 -3
  209. package/alterations-js/1.15.0-1711624564-add-read-member-scope-to-tenant-roles.d.ts +0 -3
  210. package/alterations-js/1.15.0-1711955211-organization-resource-scope.d.ts +0 -3
  211. package/alterations-js/1.15.0-1712041436-rename-organization-member-role-to-collaborator.d.ts +0 -3
  212. package/alterations-js/1.15.0-1712545011-fix-organization-resource-scope.d.ts +0 -8
  213. package/alterations-js/1.15.0-1712559358-fix-down-organization-resource-scope.d.ts +0 -8
  214. package/alterations-js/1.16.0-1712912361-delete-jwt-customier-with-empty-script.d.ts +0 -3
  215. package/alterations-js/1.16.0-1713942039-add-organization-custom-data.d.ts +0 -4
  216. package/alterations-js/1.16.0-1714270244-application-org-resource-scope.d.ts +0 -3
  217. package/alterations-js/1.17.0-1715826336-add-default-user-role-config.d.ts +0 -3
  218. package/alterations-js/1.17.0-1715829731-rename-data-hook-schema-update-event.d.ts +0 -3
  219. package/alterations-js/1.17.0-1716278409-remove-internal-role-database-policies.d.ts +0 -3
  220. package/alterations-js/1.17.0-1716291265-create-pre-configured-m-api-role.d.ts +0 -7
  221. package/alterations-js/1.17.0-1717148078-remove-service-log-reference.d.ts +0 -3
  222. package/alterations-js/1.18.0-1717567857-social-sign-in-linking.d.ts +0 -3
  223. package/alterations-js/1.18.0-1717597875-add-organization-email-domains-table.d.ts +0 -3
  224. package/alterations-js/1.18.0-1717818597-organization-mfa-requirement.d.ts +0 -3
  225. package/alterations-js/1.18.0-1718340884-rename-org-email-domains-and-add-jit-roles-table.d.ts +0 -3
  226. package/alterations-js/1.18.0-1718594164-add-agree-to-terms-policy.d.ts +0 -3
  227. package/alterations-js/1.18.0-1718785576-organization-application-relations.d.ts +0 -3
  228. package/alterations-js/1.18.0-1718786576-organization-jit-sso-connectors.d.ts +0 -3
  229. package/alterations-js/1.18.0-1718807616-organization-role-application-relations.d.ts +0 -3
  230. package/alterations-js/1.18.0-1718865814-add-subject-tokens.d.ts +0 -3
  231. package/alterations-js/1.18.0-1719014832-organization-role-types.d.ts +0 -3
  232. package/alterations-js/1.18.0-1719221205-fix-functions.d.ts +0 -7
  233. package/alterations-js/1.18.0-1719312694-custom-ui-assets.d.ts +0 -3
  234. package/alterations-js/1.2.0-1681267285-fix-get-started-passwordless-status.d.ts +0 -3
  235. package/alterations-js/1.3.0-1683292832-update-hooks.d.ts +0 -3
  236. package/alterations-js/1.5.0-1684382842-add-name-tag-created-at-for-tenants-table.d.ts +0 -3
  237. package/alterations-js/1.5.0-1684739802-create-hook-id-index-for-logs.d.ts +0 -3
  238. package/alterations-js/1.5.0-1684822341-init-domains.d.ts +0 -3
  239. package/alterations-js/1.5.0-1684837981-add-manage-tenant-self-scope-to-user-role.d.ts +0 -3
  240. package/alterations-js/1.5.0-1685285719-support-default-resource.d.ts +0 -3
  241. package/alterations-js/1.6.0-1685691718-domain-unique.d.ts +0 -3
  242. package/alterations-js/1.7.0-1688375200-sync-cloud-m2m-to-logto-config.d.ts +0 -3
  243. package/alterations-js/1.7.0-1688613459-remove-m2m-credentials-from-existing-logto-email-connector-config.d.ts +0 -3
  244. package/alterations-js/1.7.0-1688627407-daily-active-users.d.ts +0 -3
  245. package/alterations-js/1.8.0-1692088012-add-is-suspend-column-to-tenants-table.d.ts +0 -3
  246. package/alterations-js/1.8.0-1692194751-add-affiliate-scopes.d.ts +0 -3
  247. package/alterations-js/1.9.0-1693554904-add-possword-policy.d.ts +0 -4
  248. package/alterations-js/1.9.0-1694399696-add-type-col-to-roles-table.d.ts +0 -3
  249. package/alterations-js/1.9.0-1694418765-specify-check-role-type-function-to-be-public-schema.d.ts +0 -9
  250. package/alterations-js/1.9.0-1694484927-remove-deprecated-challenge-flag.d.ts +0 -3
  251. package/alterations-js/1.9.0-1694487524-sie-mfa.d.ts +0 -3
  252. package/alterations-js/1.9.0-1694509714-keep-existing-password-policy.d.ts +0 -3
  253. package/alterations-js/1.9.0-1694746763-user-verifications.d.ts +0 -3
  254. package/alterations-js/1.9.2-1694854226-init-sentinel.d.ts +0 -3
  255. package/alterations-js/1.9.2-1695198741-remove-m2m-app-admin-access-switch.d.ts +0 -3
  256. package/alterations-js/utils/1704934999-tables.d.ts +0 -11
  257. package/alterations-js/utils/1716643968-id-generation.d.ts +0 -19
@@ -58,9 +58,11 @@ export declare const jwtCustomizerConfigGuard: Readonly<{
58
58
  }>;
59
59
  export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [z.ZodObject<{
60
60
  key: z.ZodLiteral<LogtoJwtTokenKey.AccessToken>;
61
- value: z.ZodObject<{
61
+ value: z.ZodObject<z.objectUtil.extendShape<{
62
62
  script: z.ZodString;
63
63
  environmentVariables: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
64
+ contextSample: z.ZodOptional<z.ZodRecord<z.ZodString, ZodType<import("@withtyped/server").Json, z.ZodTypeDef, import("@withtyped/server").Json>>>;
65
+ }, {
64
66
  tokenSample: z.ZodOptional<z.ZodObject<{
65
67
  accountId: z.ZodOptional<z.ZodString>;
66
68
  expiresWithSession: z.ZodOptional<z.ZodOptional<z.ZodBoolean>>;
@@ -74,28 +76,28 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
74
76
  scope: z.ZodOptional<z.ZodOptional<z.ZodString>>;
75
77
  clientId: z.ZodOptional<z.ZodOptional<z.ZodString>>;
76
78
  }, "strict", z.ZodTypeAny, {
79
+ grantId?: string | undefined;
80
+ scope?: string | undefined;
77
81
  accountId?: string | undefined;
78
82
  expiresWithSession?: boolean | undefined;
79
- grantId?: string | undefined;
80
83
  gty?: string | undefined;
81
84
  sessionUid?: string | undefined;
82
85
  sid?: string | undefined;
83
86
  kind?: "AccessToken" | undefined;
84
87
  jti?: string | undefined;
85
88
  aud?: string | string[] | undefined;
86
- scope?: string | undefined;
87
89
  clientId?: string | undefined;
88
90
  }, {
91
+ grantId?: string | undefined;
92
+ scope?: string | undefined;
89
93
  accountId?: string | undefined;
90
94
  expiresWithSession?: boolean | undefined;
91
- grantId?: string | undefined;
92
95
  gty?: string | undefined;
93
96
  sessionUid?: string | undefined;
94
97
  sid?: string | undefined;
95
98
  kind?: "AccessToken" | undefined;
96
99
  jti?: string | undefined;
97
100
  aud?: string | string[] | undefined;
98
- scope?: string | undefined;
99
101
  clientId?: string | undefined;
100
102
  }>>;
101
103
  contextSample: z.ZodOptional<z.ZodObject<{
@@ -104,6 +106,7 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
104
106
  id: z.ZodOptional<ZodType<string, z.ZodTypeDef, string>>;
105
107
  applicationId: z.ZodOptional<ZodType<string | null, z.ZodTypeDef, string | null>>;
106
108
  username: z.ZodOptional<ZodType<string | null, z.ZodTypeDef, string | null>>;
109
+ createdAt: z.ZodOptional<ZodType<number, z.ZodTypeDef, number>>;
107
110
  profile: z.ZodOptional<ZodType<Partial<{
108
111
  familyName: string;
109
112
  givenName: string;
@@ -120,9 +123,6 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
120
123
  formatted: string;
121
124
  streetAddress: string;
122
125
  locality: string;
123
- /**
124
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
125
- */
126
126
  region: string;
127
127
  postalCode: string;
128
128
  country: string;
@@ -143,17 +143,13 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
143
143
  formatted: string;
144
144
  streetAddress: string;
145
145
  locality: string;
146
- /**
147
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
148
- */
149
146
  region: string;
150
147
  postalCode: string;
151
148
  country: string;
152
149
  }>;
153
150
  }>>>;
154
- createdAt: z.ZodOptional<ZodType<number, z.ZodTypeDef, number>>;
155
- updatedAt: z.ZodOptional<ZodType<number, z.ZodTypeDef, number>>;
156
151
  customData: z.ZodOptional<ZodType<import("@withtyped/server").JsonObject, z.ZodTypeDef, import("@withtyped/server").JsonObject>>;
152
+ updatedAt: z.ZodOptional<ZodType<number, z.ZodTypeDef, number>>;
157
153
  primaryEmail: z.ZodOptional<ZodType<string | null, z.ZodTypeDef, string | null>>;
158
154
  primaryPhone: z.ZodOptional<ZodType<string | null, z.ZodTypeDef, string | null>>;
159
155
  avatar: z.ZodOptional<ZodType<string | null, z.ZodTypeDef, string | null>>;
@@ -186,19 +182,24 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
186
182
  detail: import("@withtyped/server").JsonObject;
187
183
  }>, "many">>;
188
184
  mfaVerificationFactors: z.ZodOptional<z.ZodArray<z.ZodNativeEnum<typeof import("../../index.js").MfaFactor>, "many">>;
189
- roles: z.ZodOptional<z.ZodArray<z.ZodObject<{
190
- name: ZodType<string, z.ZodTypeDef, string>;
185
+ roles: z.ZodOptional<z.ZodArray<z.ZodObject<z.objectUtil.extendShape<Pick<{
186
+ tenantId: ZodType<string, z.ZodTypeDef, string>;
191
187
  id: ZodType<string, z.ZodTypeDef, string>;
188
+ name: ZodType<string, z.ZodTypeDef, string>;
192
189
  description: ZodType<string, z.ZodTypeDef, string>;
193
- scopes: z.ZodArray<z.ZodObject<Pick<{
194
- name: ZodType<string, z.ZodTypeDef, string>;
195
- id: ZodType<string, z.ZodTypeDef, string>;
190
+ type: ZodType<import("../../index.js").RoleType, z.ZodTypeDef, import("../../index.js").RoleType>;
191
+ isDefault: ZodType<boolean, z.ZodTypeDef, boolean>;
192
+ }, "name" | "id" | "description">, {
193
+ scopes: z.ZodArray<z.ZodObject<Pick<z.objectUtil.extendShape<{
196
194
  tenantId: ZodType<string, z.ZodTypeDef, string>;
197
- createdAt: ZodType<number, z.ZodTypeDef, number>;
198
- description: ZodType<string | null, z.ZodTypeDef, string | null>;
195
+ id: ZodType<string, z.ZodTypeDef, string>;
199
196
  resourceId: ZodType<string, z.ZodTypeDef, string>;
197
+ name: ZodType<string, z.ZodTypeDef, string>;
198
+ description: ZodType<string | null, z.ZodTypeDef, string | null>;
199
+ createdAt: ZodType<number, z.ZodTypeDef, number>;
200
+ }, {
200
201
  resource: import("../../index.js").Guard<import("../../index.js").Resource>;
201
- }, "name" | "id" | "description" | "resource" | "resourceId">, "strip", z.ZodTypeAny, {
202
+ }>, "name" | "id" | "description" | "resource" | "resourceId">, "strip", z.ZodTypeAny, {
202
203
  name: string;
203
204
  id: string;
204
205
  description: string | null;
@@ -211,7 +212,7 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
211
212
  resource: import("../../index.js").Resource;
212
213
  resourceId: string;
213
214
  }>, "many">;
214
- }, "strip", z.ZodTypeAny, {
215
+ }>, "strip", z.ZodTypeAny, {
215
216
  name: string;
216
217
  id: string;
217
218
  description: string;
@@ -241,6 +242,17 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
241
242
  description: ZodType<string | null, z.ZodTypeDef, string | null>;
242
243
  customData: ZodType<import("@withtyped/server").JsonObject, z.ZodTypeDef, import("@withtyped/server").JsonObject>;
243
244
  isMfaRequired: ZodType<boolean, z.ZodTypeDef, boolean>;
245
+ branding: ZodType<{
246
+ logoUrl?: string | undefined;
247
+ darkLogoUrl?: string | undefined;
248
+ favicon?: string | undefined;
249
+ darkFavicon?: string | undefined;
250
+ }, z.ZodTypeDef, {
251
+ logoUrl?: string | undefined;
252
+ darkLogoUrl?: string | undefined;
253
+ favicon?: string | undefined;
254
+ darkFavicon?: string | undefined;
255
+ }>;
244
256
  createdAt: ZodType<number, z.ZodTypeDef, number>;
245
257
  }, "name" | "id" | "description">, "strip", z.ZodTypeAny, {
246
258
  name: string;
@@ -269,6 +281,7 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
269
281
  id?: string | undefined;
270
282
  applicationId?: string | null | undefined;
271
283
  username?: string | null | undefined;
284
+ createdAt?: number | undefined;
272
285
  profile?: Partial<{
273
286
  familyName: string;
274
287
  givenName: string;
@@ -285,17 +298,30 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
285
298
  formatted: string;
286
299
  streetAddress: string;
287
300
  locality: string;
288
- /**
289
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
290
- */
291
301
  region: string;
292
302
  postalCode: string;
293
303
  country: string;
294
304
  }>;
295
305
  }> | undefined;
296
- createdAt?: number | undefined;
297
- updatedAt?: number | undefined;
298
306
  customData?: import("@withtyped/server").JsonObject | undefined;
307
+ updatedAt?: number | undefined;
308
+ organizations?: {
309
+ name: string;
310
+ id: string;
311
+ description: string | null;
312
+ }[] | undefined;
313
+ roles?: {
314
+ name: string;
315
+ id: string;
316
+ description: string;
317
+ scopes: {
318
+ name: string;
319
+ id: string;
320
+ description: string | null;
321
+ resource: import("../../index.js").Resource;
322
+ resourceId: string;
323
+ }[];
324
+ }[] | undefined;
299
325
  primaryEmail?: string | null | undefined;
300
326
  primaryPhone?: string | null | undefined;
301
327
  avatar?: string | null | undefined;
@@ -312,23 +338,6 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
312
338
  detail: import("@withtyped/server").JsonObject;
313
339
  }[] | undefined;
314
340
  mfaVerificationFactors?: import("../../index.js").MfaFactor[] | undefined;
315
- roles?: {
316
- name: string;
317
- id: string;
318
- description: string;
319
- scopes: {
320
- name: string;
321
- id: string;
322
- description: string | null;
323
- resource: import("../../index.js").Resource;
324
- resourceId: string;
325
- }[];
326
- }[] | undefined;
327
- organizations?: {
328
- name: string;
329
- id: string;
330
- description: string | null;
331
- }[] | undefined;
332
341
  organizationRoles?: {
333
342
  organizationId: string;
334
343
  roleId: string;
@@ -339,6 +348,7 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
339
348
  id?: string | undefined;
340
349
  applicationId?: string | null | undefined;
341
350
  username?: string | null | undefined;
351
+ createdAt?: number | undefined;
342
352
  profile?: Partial<{
343
353
  familyName: string;
344
354
  givenName: string;
@@ -355,17 +365,30 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
355
365
  formatted: string;
356
366
  streetAddress: string;
357
367
  locality: string;
358
- /**
359
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
360
- */
361
368
  region: string;
362
369
  postalCode: string;
363
370
  country: string;
364
371
  }>;
365
372
  }> | undefined;
366
- createdAt?: number | undefined;
367
- updatedAt?: number | undefined;
368
373
  customData?: import("@withtyped/server").JsonObject | undefined;
374
+ updatedAt?: number | undefined;
375
+ organizations?: {
376
+ name: string;
377
+ id: string;
378
+ description: string | null;
379
+ }[] | undefined;
380
+ roles?: {
381
+ name: string;
382
+ id: string;
383
+ description: string;
384
+ scopes: {
385
+ name: string;
386
+ id: string;
387
+ description: string | null;
388
+ resource: import("../../index.js").Resource;
389
+ resourceId: string;
390
+ }[];
391
+ }[] | undefined;
369
392
  primaryEmail?: string | null | undefined;
370
393
  primaryPhone?: string | null | undefined;
371
394
  avatar?: string | null | undefined;
@@ -382,35 +405,29 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
382
405
  detail: import("@withtyped/server").JsonObject;
383
406
  }[] | undefined;
384
407
  mfaVerificationFactors?: import("../../index.js").MfaFactor[] | undefined;
385
- roles?: {
386
- name: string;
387
- id: string;
388
- description: string;
389
- scopes: {
390
- name: string;
391
- id: string;
392
- description: string | null;
393
- resource: import("../../index.js").Resource;
394
- resourceId: string;
395
- }[];
396
- }[] | undefined;
397
- organizations?: {
398
- name: string;
399
- id: string;
400
- description: string | null;
401
- }[] | undefined;
402
408
  organizationRoles?: {
403
409
  organizationId: string;
404
410
  roleId: string;
405
411
  roleName: string;
406
412
  }[] | undefined;
407
413
  }>;
414
+ grant: z.ZodOptional<z.ZodObject<{
415
+ type: z.ZodOptional<z.ZodLiteral<import("../oidc-config.js").GrantType.TokenExchange>>;
416
+ subjectTokenContext: z.ZodOptional<z.ZodRecord<z.ZodString, ZodType<import("@withtyped/server").Json, z.ZodTypeDef, import("@withtyped/server").Json>>>;
417
+ }, "strip", z.ZodTypeAny, {
418
+ type?: import("../oidc-config.js").GrantType.TokenExchange | undefined;
419
+ subjectTokenContext?: Record<string, import("@withtyped/server").Json> | undefined;
420
+ }, {
421
+ type?: import("../oidc-config.js").GrantType.TokenExchange | undefined;
422
+ subjectTokenContext?: Record<string, import("@withtyped/server").Json> | undefined;
423
+ }>>;
408
424
  }, "strip", z.ZodTypeAny, {
409
425
  user: {
410
426
  name?: string | null | undefined;
411
427
  id?: string | undefined;
412
428
  applicationId?: string | null | undefined;
413
429
  username?: string | null | undefined;
430
+ createdAt?: number | undefined;
414
431
  profile?: Partial<{
415
432
  familyName: string;
416
433
  givenName: string;
@@ -427,17 +444,30 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
427
444
  formatted: string;
428
445
  streetAddress: string;
429
446
  locality: string;
430
- /**
431
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
432
- */
433
447
  region: string;
434
448
  postalCode: string;
435
449
  country: string;
436
450
  }>;
437
451
  }> | undefined;
438
- createdAt?: number | undefined;
439
- updatedAt?: number | undefined;
440
452
  customData?: import("@withtyped/server").JsonObject | undefined;
453
+ updatedAt?: number | undefined;
454
+ organizations?: {
455
+ name: string;
456
+ id: string;
457
+ description: string | null;
458
+ }[] | undefined;
459
+ roles?: {
460
+ name: string;
461
+ id: string;
462
+ description: string;
463
+ scopes: {
464
+ name: string;
465
+ id: string;
466
+ description: string | null;
467
+ resource: import("../../index.js").Resource;
468
+ resourceId: string;
469
+ }[];
470
+ }[] | undefined;
441
471
  primaryEmail?: string | null | undefined;
442
472
  primaryPhone?: string | null | undefined;
443
473
  avatar?: string | null | undefined;
@@ -454,35 +484,23 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
454
484
  detail: import("@withtyped/server").JsonObject;
455
485
  }[] | undefined;
456
486
  mfaVerificationFactors?: import("../../index.js").MfaFactor[] | undefined;
457
- roles?: {
458
- name: string;
459
- id: string;
460
- description: string;
461
- scopes: {
462
- name: string;
463
- id: string;
464
- description: string | null;
465
- resource: import("../../index.js").Resource;
466
- resourceId: string;
467
- }[];
468
- }[] | undefined;
469
- organizations?: {
470
- name: string;
471
- id: string;
472
- description: string | null;
473
- }[] | undefined;
474
487
  organizationRoles?: {
475
488
  organizationId: string;
476
489
  roleId: string;
477
490
  roleName: string;
478
491
  }[] | undefined;
479
492
  };
493
+ grant?: {
494
+ type?: import("../oidc-config.js").GrantType.TokenExchange | undefined;
495
+ subjectTokenContext?: Record<string, import("@withtyped/server").Json> | undefined;
496
+ } | undefined;
480
497
  }, {
481
498
  user: {
482
499
  name?: string | null | undefined;
483
500
  id?: string | undefined;
484
501
  applicationId?: string | null | undefined;
485
502
  username?: string | null | undefined;
503
+ createdAt?: number | undefined;
486
504
  profile?: Partial<{
487
505
  familyName: string;
488
506
  givenName: string;
@@ -499,17 +517,30 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
499
517
  formatted: string;
500
518
  streetAddress: string;
501
519
  locality: string;
502
- /**
503
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
504
- */
505
520
  region: string;
506
521
  postalCode: string;
507
522
  country: string;
508
523
  }>;
509
524
  }> | undefined;
510
- createdAt?: number | undefined;
511
- updatedAt?: number | undefined;
512
525
  customData?: import("@withtyped/server").JsonObject | undefined;
526
+ updatedAt?: number | undefined;
527
+ organizations?: {
528
+ name: string;
529
+ id: string;
530
+ description: string | null;
531
+ }[] | undefined;
532
+ roles?: {
533
+ name: string;
534
+ id: string;
535
+ description: string;
536
+ scopes: {
537
+ name: string;
538
+ id: string;
539
+ description: string | null;
540
+ resource: import("../../index.js").Resource;
541
+ resourceId: string;
542
+ }[];
543
+ }[] | undefined;
513
544
  primaryEmail?: string | null | undefined;
514
545
  primaryPhone?: string | null | undefined;
515
546
  avatar?: string | null | undefined;
@@ -526,52 +557,27 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
526
557
  detail: import("@withtyped/server").JsonObject;
527
558
  }[] | undefined;
528
559
  mfaVerificationFactors?: import("../../index.js").MfaFactor[] | undefined;
529
- roles?: {
530
- name: string;
531
- id: string;
532
- description: string;
533
- scopes: {
534
- name: string;
535
- id: string;
536
- description: string | null;
537
- resource: import("../../index.js").Resource;
538
- resourceId: string;
539
- }[];
540
- }[] | undefined;
541
- organizations?: {
542
- name: string;
543
- id: string;
544
- description: string | null;
545
- }[] | undefined;
546
560
  organizationRoles?: {
547
561
  organizationId: string;
548
562
  roleId: string;
549
563
  roleName: string;
550
564
  }[] | undefined;
551
565
  };
566
+ grant?: {
567
+ type?: import("../oidc-config.js").GrantType.TokenExchange | undefined;
568
+ subjectTokenContext?: Record<string, import("@withtyped/server").Json> | undefined;
569
+ } | undefined;
552
570
  }>>;
553
- }, "strict", z.ZodTypeAny, {
571
+ }>, "strict", z.ZodTypeAny, {
554
572
  script: string;
555
573
  environmentVariables?: Record<string, string> | undefined;
556
- tokenSample?: {
557
- accountId?: string | undefined;
558
- expiresWithSession?: boolean | undefined;
559
- grantId?: string | undefined;
560
- gty?: string | undefined;
561
- sessionUid?: string | undefined;
562
- sid?: string | undefined;
563
- kind?: "AccessToken" | undefined;
564
- jti?: string | undefined;
565
- aud?: string | string[] | undefined;
566
- scope?: string | undefined;
567
- clientId?: string | undefined;
568
- } | undefined;
569
574
  contextSample?: {
570
575
  user: {
571
576
  name?: string | null | undefined;
572
577
  id?: string | undefined;
573
578
  applicationId?: string | null | undefined;
574
579
  username?: string | null | undefined;
580
+ createdAt?: number | undefined;
575
581
  profile?: Partial<{
576
582
  familyName: string;
577
583
  givenName: string;
@@ -588,17 +594,30 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
588
594
  formatted: string;
589
595
  streetAddress: string;
590
596
  locality: string;
591
- /**
592
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
593
- */
594
597
  region: string;
595
598
  postalCode: string;
596
599
  country: string;
597
600
  }>;
598
601
  }> | undefined;
599
- createdAt?: number | undefined;
600
- updatedAt?: number | undefined;
601
602
  customData?: import("@withtyped/server").JsonObject | undefined;
603
+ updatedAt?: number | undefined;
604
+ organizations?: {
605
+ name: string;
606
+ id: string;
607
+ description: string | null;
608
+ }[] | undefined;
609
+ roles?: {
610
+ name: string;
611
+ id: string;
612
+ description: string;
613
+ scopes: {
614
+ name: string;
615
+ id: string;
616
+ description: string | null;
617
+ resource: import("../../index.js").Resource;
618
+ resourceId: string;
619
+ }[];
620
+ }[] | undefined;
602
621
  primaryEmail?: string | null | undefined;
603
622
  primaryPhone?: string | null | undefined;
604
623
  avatar?: string | null | undefined;
@@ -615,52 +634,40 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
615
634
  detail: import("@withtyped/server").JsonObject;
616
635
  }[] | undefined;
617
636
  mfaVerificationFactors?: import("../../index.js").MfaFactor[] | undefined;
618
- roles?: {
619
- name: string;
620
- id: string;
621
- description: string;
622
- scopes: {
623
- name: string;
624
- id: string;
625
- description: string | null;
626
- resource: import("../../index.js").Resource;
627
- resourceId: string;
628
- }[];
629
- }[] | undefined;
630
- organizations?: {
631
- name: string;
632
- id: string;
633
- description: string | null;
634
- }[] | undefined;
635
637
  organizationRoles?: {
636
638
  organizationId: string;
637
639
  roleId: string;
638
640
  roleName: string;
639
641
  }[] | undefined;
640
642
  };
643
+ grant?: {
644
+ type?: import("../oidc-config.js").GrantType.TokenExchange | undefined;
645
+ subjectTokenContext?: Record<string, import("@withtyped/server").Json> | undefined;
646
+ } | undefined;
641
647
  } | undefined;
642
- }, {
643
- script: string;
644
- environmentVariables?: Record<string, string> | undefined;
645
648
  tokenSample?: {
649
+ grantId?: string | undefined;
650
+ scope?: string | undefined;
646
651
  accountId?: string | undefined;
647
652
  expiresWithSession?: boolean | undefined;
648
- grantId?: string | undefined;
649
653
  gty?: string | undefined;
650
654
  sessionUid?: string | undefined;
651
655
  sid?: string | undefined;
652
656
  kind?: "AccessToken" | undefined;
653
657
  jti?: string | undefined;
654
658
  aud?: string | string[] | undefined;
655
- scope?: string | undefined;
656
659
  clientId?: string | undefined;
657
660
  } | undefined;
661
+ }, {
662
+ script: string;
663
+ environmentVariables?: Record<string, string> | undefined;
658
664
  contextSample?: {
659
665
  user: {
660
666
  name?: string | null | undefined;
661
667
  id?: string | undefined;
662
668
  applicationId?: string | null | undefined;
663
669
  username?: string | null | undefined;
670
+ createdAt?: number | undefined;
664
671
  profile?: Partial<{
665
672
  familyName: string;
666
673
  givenName: string;
@@ -677,17 +684,30 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
677
684
  formatted: string;
678
685
  streetAddress: string;
679
686
  locality: string;
680
- /**
681
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
682
- */
683
687
  region: string;
684
688
  postalCode: string;
685
689
  country: string;
686
690
  }>;
687
691
  }> | undefined;
688
- createdAt?: number | undefined;
689
- updatedAt?: number | undefined;
690
692
  customData?: import("@withtyped/server").JsonObject | undefined;
693
+ updatedAt?: number | undefined;
694
+ organizations?: {
695
+ name: string;
696
+ id: string;
697
+ description: string | null;
698
+ }[] | undefined;
699
+ roles?: {
700
+ name: string;
701
+ id: string;
702
+ description: string;
703
+ scopes: {
704
+ name: string;
705
+ id: string;
706
+ description: string | null;
707
+ resource: import("../../index.js").Resource;
708
+ resourceId: string;
709
+ }[];
710
+ }[] | undefined;
691
711
  primaryEmail?: string | null | undefined;
692
712
  primaryPhone?: string | null | undefined;
693
713
  avatar?: string | null | undefined;
@@ -704,54 +724,42 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
704
724
  detail: import("@withtyped/server").JsonObject;
705
725
  }[] | undefined;
706
726
  mfaVerificationFactors?: import("../../index.js").MfaFactor[] | undefined;
707
- roles?: {
708
- name: string;
709
- id: string;
710
- description: string;
711
- scopes: {
712
- name: string;
713
- id: string;
714
- description: string | null;
715
- resource: import("../../index.js").Resource;
716
- resourceId: string;
717
- }[];
718
- }[] | undefined;
719
- organizations?: {
720
- name: string;
721
- id: string;
722
- description: string | null;
723
- }[] | undefined;
724
727
  organizationRoles?: {
725
728
  organizationId: string;
726
729
  roleId: string;
727
730
  roleName: string;
728
731
  }[] | undefined;
729
732
  };
733
+ grant?: {
734
+ type?: import("../oidc-config.js").GrantType.TokenExchange | undefined;
735
+ subjectTokenContext?: Record<string, import("@withtyped/server").Json> | undefined;
736
+ } | undefined;
730
737
  } | undefined;
731
- }>;
732
- }, "strip", z.ZodTypeAny, {
733
- value: {
734
- script: string;
735
- environmentVariables?: Record<string, string> | undefined;
736
738
  tokenSample?: {
739
+ grantId?: string | undefined;
740
+ scope?: string | undefined;
737
741
  accountId?: string | undefined;
738
742
  expiresWithSession?: boolean | undefined;
739
- grantId?: string | undefined;
740
743
  gty?: string | undefined;
741
744
  sessionUid?: string | undefined;
742
745
  sid?: string | undefined;
743
746
  kind?: "AccessToken" | undefined;
744
747
  jti?: string | undefined;
745
748
  aud?: string | string[] | undefined;
746
- scope?: string | undefined;
747
749
  clientId?: string | undefined;
748
750
  } | undefined;
751
+ }>;
752
+ }, "strip", z.ZodTypeAny, {
753
+ value: {
754
+ script: string;
755
+ environmentVariables?: Record<string, string> | undefined;
749
756
  contextSample?: {
750
757
  user: {
751
758
  name?: string | null | undefined;
752
759
  id?: string | undefined;
753
760
  applicationId?: string | null | undefined;
754
761
  username?: string | null | undefined;
762
+ createdAt?: number | undefined;
755
763
  profile?: Partial<{
756
764
  familyName: string;
757
765
  givenName: string;
@@ -768,17 +776,30 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
768
776
  formatted: string;
769
777
  streetAddress: string;
770
778
  locality: string;
771
- /**
772
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
773
- */
774
779
  region: string;
775
780
  postalCode: string;
776
781
  country: string;
777
782
  }>;
778
783
  }> | undefined;
779
- createdAt?: number | undefined;
780
- updatedAt?: number | undefined;
781
784
  customData?: import("@withtyped/server").JsonObject | undefined;
785
+ updatedAt?: number | undefined;
786
+ organizations?: {
787
+ name: string;
788
+ id: string;
789
+ description: string | null;
790
+ }[] | undefined;
791
+ roles?: {
792
+ name: string;
793
+ id: string;
794
+ description: string;
795
+ scopes: {
796
+ name: string;
797
+ id: string;
798
+ description: string | null;
799
+ resource: import("../../index.js").Resource;
800
+ resourceId: string;
801
+ }[];
802
+ }[] | undefined;
782
803
  primaryEmail?: string | null | undefined;
783
804
  primaryPhone?: string | null | undefined;
784
805
  avatar?: string | null | undefined;
@@ -795,55 +816,43 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
795
816
  detail: import("@withtyped/server").JsonObject;
796
817
  }[] | undefined;
797
818
  mfaVerificationFactors?: import("../../index.js").MfaFactor[] | undefined;
798
- roles?: {
799
- name: string;
800
- id: string;
801
- description: string;
802
- scopes: {
803
- name: string;
804
- id: string;
805
- description: string | null;
806
- resource: import("../../index.js").Resource;
807
- resourceId: string;
808
- }[];
809
- }[] | undefined;
810
- organizations?: {
811
- name: string;
812
- id: string;
813
- description: string | null;
814
- }[] | undefined;
815
819
  organizationRoles?: {
816
820
  organizationId: string;
817
821
  roleId: string;
818
822
  roleName: string;
819
823
  }[] | undefined;
820
824
  };
825
+ grant?: {
826
+ type?: import("../oidc-config.js").GrantType.TokenExchange | undefined;
827
+ subjectTokenContext?: Record<string, import("@withtyped/server").Json> | undefined;
828
+ } | undefined;
821
829
  } | undefined;
822
- };
823
- key: LogtoJwtTokenKey.AccessToken;
824
- }, {
825
- value: {
826
- script: string;
827
- environmentVariables?: Record<string, string> | undefined;
828
830
  tokenSample?: {
831
+ grantId?: string | undefined;
832
+ scope?: string | undefined;
829
833
  accountId?: string | undefined;
830
834
  expiresWithSession?: boolean | undefined;
831
- grantId?: string | undefined;
832
835
  gty?: string | undefined;
833
836
  sessionUid?: string | undefined;
834
837
  sid?: string | undefined;
835
838
  kind?: "AccessToken" | undefined;
836
839
  jti?: string | undefined;
837
840
  aud?: string | string[] | undefined;
838
- scope?: string | undefined;
839
841
  clientId?: string | undefined;
840
842
  } | undefined;
843
+ };
844
+ key: LogtoJwtTokenKey.AccessToken;
845
+ }, {
846
+ value: {
847
+ script: string;
848
+ environmentVariables?: Record<string, string> | undefined;
841
849
  contextSample?: {
842
850
  user: {
843
851
  name?: string | null | undefined;
844
852
  id?: string | undefined;
845
853
  applicationId?: string | null | undefined;
846
854
  username?: string | null | undefined;
855
+ createdAt?: number | undefined;
847
856
  profile?: Partial<{
848
857
  familyName: string;
849
858
  givenName: string;
@@ -860,17 +869,30 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
860
869
  formatted: string;
861
870
  streetAddress: string;
862
871
  locality: string;
863
- /**
864
- * Value maps to config key names in `logto_configs` table. Used mainly in DB SQL related scenarios.
865
- */
866
872
  region: string;
867
873
  postalCode: string;
868
874
  country: string;
869
875
  }>;
870
876
  }> | undefined;
871
- createdAt?: number | undefined;
872
- updatedAt?: number | undefined;
873
877
  customData?: import("@withtyped/server").JsonObject | undefined;
878
+ updatedAt?: number | undefined;
879
+ organizations?: {
880
+ name: string;
881
+ id: string;
882
+ description: string | null;
883
+ }[] | undefined;
884
+ roles?: {
885
+ name: string;
886
+ id: string;
887
+ description: string;
888
+ scopes: {
889
+ name: string;
890
+ id: string;
891
+ description: string | null;
892
+ resource: import("../../index.js").Resource;
893
+ resourceId: string;
894
+ }[];
895
+ }[] | undefined;
874
896
  primaryEmail?: string | null | undefined;
875
897
  primaryPhone?: string | null | undefined;
876
898
  avatar?: string | null | undefined;
@@ -887,38 +909,39 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
887
909
  detail: import("@withtyped/server").JsonObject;
888
910
  }[] | undefined;
889
911
  mfaVerificationFactors?: import("../../index.js").MfaFactor[] | undefined;
890
- roles?: {
891
- name: string;
892
- id: string;
893
- description: string;
894
- scopes: {
895
- name: string;
896
- id: string;
897
- description: string | null;
898
- resource: import("../../index.js").Resource;
899
- resourceId: string;
900
- }[];
901
- }[] | undefined;
902
- organizations?: {
903
- name: string;
904
- id: string;
905
- description: string | null;
906
- }[] | undefined;
907
912
  organizationRoles?: {
908
913
  organizationId: string;
909
914
  roleId: string;
910
915
  roleName: string;
911
916
  }[] | undefined;
912
917
  };
918
+ grant?: {
919
+ type?: import("../oidc-config.js").GrantType.TokenExchange | undefined;
920
+ subjectTokenContext?: Record<string, import("@withtyped/server").Json> | undefined;
921
+ } | undefined;
922
+ } | undefined;
923
+ tokenSample?: {
924
+ grantId?: string | undefined;
925
+ scope?: string | undefined;
926
+ accountId?: string | undefined;
927
+ expiresWithSession?: boolean | undefined;
928
+ gty?: string | undefined;
929
+ sessionUid?: string | undefined;
930
+ sid?: string | undefined;
931
+ kind?: "AccessToken" | undefined;
932
+ jti?: string | undefined;
933
+ aud?: string | string[] | undefined;
934
+ clientId?: string | undefined;
913
935
  } | undefined;
914
936
  };
915
937
  key: LogtoJwtTokenKey.AccessToken;
916
938
  }>, z.ZodObject<{
917
939
  key: z.ZodLiteral<LogtoJwtTokenKey.ClientCredentials>;
918
- value: z.ZodObject<{
940
+ value: z.ZodObject<z.objectUtil.extendShape<{
919
941
  script: z.ZodString;
920
942
  environmentVariables: z.ZodOptional<z.ZodRecord<z.ZodString, z.ZodString>>;
921
943
  contextSample: z.ZodOptional<z.ZodRecord<z.ZodString, ZodType<import("@withtyped/server").Json, z.ZodTypeDef, import("@withtyped/server").Json>>>;
944
+ }, {
922
945
  tokenSample: z.ZodOptional<z.ZodObject<{
923
946
  kind: z.ZodOptional<z.ZodLiteral<"ClientCredentials">>;
924
947
  jti: z.ZodOptional<z.ZodString>;
@@ -926,27 +949,27 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
926
949
  scope: z.ZodOptional<z.ZodOptional<z.ZodString>>;
927
950
  clientId: z.ZodOptional<z.ZodOptional<z.ZodString>>;
928
951
  }, "strict", z.ZodTypeAny, {
952
+ scope?: string | undefined;
929
953
  kind?: "ClientCredentials" | undefined;
930
954
  jti?: string | undefined;
931
955
  aud?: string | string[] | undefined;
932
- scope?: string | undefined;
933
956
  clientId?: string | undefined;
934
957
  }, {
958
+ scope?: string | undefined;
935
959
  kind?: "ClientCredentials" | undefined;
936
960
  jti?: string | undefined;
937
961
  aud?: string | string[] | undefined;
938
- scope?: string | undefined;
939
962
  clientId?: string | undefined;
940
963
  }>>;
941
- }, "strict", z.ZodTypeAny, {
964
+ }>, "strict", z.ZodTypeAny, {
942
965
  script: string;
943
966
  environmentVariables?: Record<string, string> | undefined;
944
967
  contextSample?: Record<string, import("@withtyped/server").Json> | undefined;
945
968
  tokenSample?: {
969
+ scope?: string | undefined;
946
970
  kind?: "ClientCredentials" | undefined;
947
971
  jti?: string | undefined;
948
972
  aud?: string | string[] | undefined;
949
- scope?: string | undefined;
950
973
  clientId?: string | undefined;
951
974
  } | undefined;
952
975
  }, {
@@ -954,10 +977,10 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
954
977
  environmentVariables?: Record<string, string> | undefined;
955
978
  contextSample?: Record<string, import("@withtyped/server").Json> | undefined;
956
979
  tokenSample?: {
980
+ scope?: string | undefined;
957
981
  kind?: "ClientCredentials" | undefined;
958
982
  jti?: string | undefined;
959
983
  aud?: string | string[] | undefined;
960
- scope?: string | undefined;
961
984
  clientId?: string | undefined;
962
985
  } | undefined;
963
986
  }>;
@@ -967,10 +990,10 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
967
990
  environmentVariables?: Record<string, string> | undefined;
968
991
  contextSample?: Record<string, import("@withtyped/server").Json> | undefined;
969
992
  tokenSample?: {
993
+ scope?: string | undefined;
970
994
  kind?: "ClientCredentials" | undefined;
971
995
  jti?: string | undefined;
972
996
  aud?: string | string[] | undefined;
973
- scope?: string | undefined;
974
997
  clientId?: string | undefined;
975
998
  } | undefined;
976
999
  };
@@ -981,10 +1004,10 @@ export declare const jwtCustomizerConfigsGuard: z.ZodDiscriminatedUnion<"key", [
981
1004
  environmentVariables?: Record<string, string> | undefined;
982
1005
  contextSample?: Record<string, import("@withtyped/server").Json> | undefined;
983
1006
  tokenSample?: {
1007
+ scope?: string | undefined;
984
1008
  kind?: "ClientCredentials" | undefined;
985
1009
  jti?: string | undefined;
986
1010
  aud?: string | string[] | undefined;
987
- scope?: string | undefined;
988
1011
  clientId?: string | undefined;
989
1012
  } | undefined;
990
1013
  };
@@ -1092,11 +1115,13 @@ export type LogtoConfigType = LogtoOidcConfigType | JwtCustomizerType | LogtoTen
1092
1115
  export type LogtoConfigGuard = typeof logtoOidcConfigGuard & typeof jwtCustomizerConfigGuard & typeof logtoTenantConfigGuard;
1093
1116
  export declare const logtoConfigKeys: readonly LogtoConfigKey[];
1094
1117
  export declare const logtoConfigGuards: LogtoConfigGuard;
1095
- export declare const oidcConfigKeysResponseGuard: z.ZodObject<{
1118
+ export declare const oidcConfigKeysResponseGuard: z.ZodObject<z.objectUtil.extendShape<Omit<{
1096
1119
  id: z.ZodString;
1120
+ value: z.ZodString;
1097
1121
  createdAt: z.ZodNumber;
1122
+ }, "value">, {
1098
1123
  signingKeyAlgorithm: z.ZodOptional<z.ZodNativeEnum<typeof SupportedSigningKeyAlgorithm>>;
1099
- }, "strip", z.ZodTypeAny, {
1124
+ }>, "strip", z.ZodTypeAny, {
1100
1125
  id: string;
1101
1126
  createdAt: number;
1102
1127
  signingKeyAlgorithm?: SupportedSigningKeyAlgorithm | undefined;