@tailor-platform/sdk 1.17.0 → 1.17.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,4 +1,4 @@
1
1
  import "./chunk-GMkBE123.mjs";
2
- import { n as generatePluginFilesIfNeeded, r as loadApplication, t as defineApplication } from "./application-DYfVZVPT.mjs";
2
+ import { n as generatePluginFilesIfNeeded, r as loadApplication, t as defineApplication } from "./application-BMDE8KqK.mjs";
3
3
 
4
4
  export { defineApplication };
@@ -1,8 +1,8 @@
1
1
  #!/usr/bin/env node
2
2
  import "../chunk-GMkBE123.mjs";
3
3
  import "../schema-R5TxC5Pn.mjs";
4
- import { $ as jobsCommand, A as generateCommand, Bt as getNamespacesWithMigrations, C as resumeCommand, F as removeCommand$1, Ft as loadDiff, G as generateCommand$1, Gt as commonArgs, H as listCommand$6, I as listCommand$7, J as triggerCommand, Jt as jsonArgs, Kt as confirmationArgs, Mt as getMigrationFiles, N as showCommand, O as truncateCommand, Ot as formatMigrationNumber, Pt as isValidMigrationNumber, R as getCommand$2, S as healthCommand, T as listCommand$8, V as tokenCommand, Vt as trnPrefix, Wt as apiCommand, X as listCommand$5, Xt as workspaceArgs, Yt as withCommonArgs, _ as createCommand$3, a as listCommand$10, b as listCommand$9, d as listCommand$11, dt as getCommand$1, h as deleteCommand$3, it as getCommand$3, j as logBetaWarning, jt as getMigrationFilePath, l as restoreCommand, lt as functionExecutionStatusToString, mt as applyCommand, nt as startCommand, ot as executionsCommand, p as getCommand$4, q as webhookCommand, qt as deploymentArgs, r as removeCommand, s as inviteCommand, t as updateCommand$2, ut as formatKeyValueTable, vt as parseMigrationLabelNumber } from "../update-DQKCUNmr.mjs";
5
- import { E as readPackageJson, S as initOperatorClient, Z as PATScope, _ as writePlatformConfig, b as fetchUserInfo, ct as styles, d as fetchLatestToken, f as loadAccessToken, g as readPlatformConfig, h as loadWorkspaceId, i as loadConfig, st as logger, v as fetchAll, x as initOAuth2Client, z as FunctionExecution_Type } from "../application-DYfVZVPT.mjs";
4
+ import { $ as jobsCommand, A as generateCommand, Bt as getNamespacesWithMigrations, C as resumeCommand, F as removeCommand$1, Ft as loadDiff, G as generateCommand$1, Gt as commonArgs, H as listCommand$6, I as listCommand$7, J as triggerCommand, Jt as jsonArgs, Kt as confirmationArgs, Mt as getMigrationFiles, N as showCommand, O as truncateCommand, Ot as formatMigrationNumber, Pt as isValidMigrationNumber, R as getCommand$2, S as healthCommand, T as listCommand$8, V as tokenCommand, Vt as trnPrefix, Wt as apiCommand, X as listCommand$5, Xt as workspaceArgs, Yt as withCommonArgs, _ as createCommand$3, a as listCommand$10, b as listCommand$9, d as listCommand$11, dt as getCommand$1, h as deleteCommand$3, it as getCommand$3, j as logBetaWarning, jt as getMigrationFilePath, l as restoreCommand, lt as functionExecutionStatusToString, mt as applyCommand, nt as startCommand, ot as executionsCommand, p as getCommand$4, q as webhookCommand, qt as deploymentArgs, r as removeCommand, s as inviteCommand, t as updateCommand$2, ut as formatKeyValueTable, vt as parseMigrationLabelNumber } from "../update-CUBVjZbL.mjs";
5
+ import { E as readPackageJson, S as initOperatorClient, Z as PATScope, _ as writePlatformConfig, b as fetchUserInfo, ct as styles, d as fetchLatestToken, f as loadAccessToken, g as readPlatformConfig, h as loadWorkspaceId, i as loadConfig, st as logger, v as fetchAll, x as initOAuth2Client, z as FunctionExecution_Type } from "../application-BMDE8KqK.mjs";
6
6
  import { createRequire, register } from "node:module";
7
7
  import { arg, defineCommand, runCommand, runMain } from "politty";
8
8
  import { withCompletionCommand } from "politty/completion";
@@ -1,7 +1,6 @@
1
1
  /// <reference path="./../user-defined.d.ts" />
2
- import { F as Plugin, I as PluginAttachment, d as IdProviderConfig, lt as Resolver, n as TypeSourceInfoEntry, p as OAuth2ClientInput, t as TailorDBType } from "../types-DzvazVmg.mjs";
3
- import { C as ScheduleTriggerInput, b as IncomingWebhookTrigger, c as CodeGeneratorBase, p as Executor, t as AppConfig } from "../types-BeNtD-fA.mjs";
4
- import "politty";
2
+ import { F as Plugin, I as PluginAttachment, d as IdProviderConfig, lt as Resolver, n as TypeSourceInfoEntry, p as OAuth2ClientInput, t as TailorDBType } from "../types-CZZBCaxB.mjs";
3
+ import { C as ScheduleTriggerInput, b as IncomingWebhookTrigger, c as CodeGeneratorBase, p as Executor, t as AppConfig } from "../types-DthzUFfx.mjs";
5
4
  import { z } from "zod";
6
5
  import { OAuth2Client } from "@badgateway/oauth2-client";
7
6
  import { Duration, FieldMask, Timestamp, Value } from "@bufbuild/protobuf/wkt";
@@ -11309,10 +11308,21 @@ declare type IdPUserAuthPolicy = Message<"tailor.v1.IdPUserAuthPolicy"> & {
11309
11308
  * allow_google_oauth enables "Sign in with Google" for this namespace.
11310
11309
  * When enabled, users can authenticate using their Google account.
11311
11310
  * Cannot be enabled when use_non_email_identifier is true.
11311
+ * Requires allowed_email_domains to be set.
11312
11312
  *
11313
11313
  * @generated from field: bool allow_google_oauth = 10;
11314
11314
  */
11315
11315
  allowGoogleOauth: boolean;
11316
+
11317
+ /**
11318
+ * disable_password_auth disables password-based authentication for this namespace.
11319
+ * When enabled, users cannot sign in or reset their password using email/password.
11320
+ * Requires allow_google_oauth to be enabled.
11321
+ * Cannot be used with allow_self_password_reset.
11322
+ *
11323
+ * @generated from field: bool disable_password_auth = 11;
11324
+ */
11325
+ disablePasswordAuth: boolean;
11316
11326
  };
11317
11327
  /**
11318
11328
  * IdPLang represents the IETF BCP 47 language subtag.
package/dist/cli/lib.mjs CHANGED
@@ -1,7 +1,7 @@
1
1
  import "../chunk-GMkBE123.mjs";
2
2
  import "../schema-R5TxC5Pn.mjs";
3
- import { At as getMigrationDirPath, B as getMachineUserToken, Bt as getNamespacesWithMigrations, Ct as MIGRATE_FILE_NAME, D as truncate, Dt as createSnapshotFromLocalTypes, E as listWorkflows, Et as compareSnapshots, Ht as generateUserTypes, It as reconstructSnapshotFromMigrations, K as listWebhookExecutors, L as listOAuth2Clients, Lt as formatDiffSummary, M as show, Mt as getMigrationFiles, Nt as getNextMigrationNumber, P as remove, Q as getExecutorJob, Rt as formatMigrationDiff, St as INITIAL_SCHEMA_NUMBER, Tt as compareLocalTypesWithSnapshot, U as listMachineUsers, Ut as apiCall, W as generate, Y as triggerExecutor, Z as listExecutors, _t as MIGRATION_LABEL_KEY, at as getWorkflow, bt as DB_TYPES_FILE_NAME, c as inviteUser, ct as listWorkflowExecutions, et as listExecutorJobs, f as listWorkspaces, ft as getExecutor, g as deleteWorkspace, gt as waitForExecution, ht as executeScript, i as removeUser, jt as getMigrationFilePath, k as generate$1, kt as getLatestMigrationNumber, m as getWorkspace, n as updateUser, o as listUsers, pt as apply, rt as startWorkflow, st as getWorkflowExecution, tt as watchExecutorJob, u as restoreWorkspace, v as createWorkspace, w as resumeWorkflow, wt as SCHEMA_FILE_NAME, x as getAppHealth, xt as DIFF_FILE_NAME, y as listApps, yt as bundleMigrationScript, z as getOAuth2Client, zt as hasChanges } from "../update-DQKCUNmr.mjs";
4
- import { S as initOperatorClient, f as loadAccessToken, h as loadWorkspaceId, i as loadConfig, o as getDistDir, st as logger } from "../application-DYfVZVPT.mjs";
3
+ import { At as getMigrationDirPath, B as getMachineUserToken, Bt as getNamespacesWithMigrations, Ct as MIGRATE_FILE_NAME, D as truncate, Dt as createSnapshotFromLocalTypes, E as listWorkflows, Et as compareSnapshots, Ht as generateUserTypes, It as reconstructSnapshotFromMigrations, K as listWebhookExecutors, L as listOAuth2Clients, Lt as formatDiffSummary, M as show, Mt as getMigrationFiles, Nt as getNextMigrationNumber, P as remove, Q as getExecutorJob, Rt as formatMigrationDiff, St as INITIAL_SCHEMA_NUMBER, Tt as compareLocalTypesWithSnapshot, U as listMachineUsers, Ut as apiCall, W as generate, Y as triggerExecutor, Z as listExecutors, _t as MIGRATION_LABEL_KEY, at as getWorkflow, bt as DB_TYPES_FILE_NAME, c as inviteUser, ct as listWorkflowExecutions, et as listExecutorJobs, f as listWorkspaces, ft as getExecutor, g as deleteWorkspace, gt as waitForExecution, ht as executeScript, i as removeUser, jt as getMigrationFilePath, k as generate$1, kt as getLatestMigrationNumber, m as getWorkspace, n as updateUser, o as listUsers, pt as apply, rt as startWorkflow, st as getWorkflowExecution, tt as watchExecutorJob, u as restoreWorkspace, v as createWorkspace, w as resumeWorkflow, wt as SCHEMA_FILE_NAME, x as getAppHealth, xt as DIFF_FILE_NAME, y as listApps, yt as bundleMigrationScript, z as getOAuth2Client, zt as hasChanges } from "../update-CUBVjZbL.mjs";
4
+ import { S as initOperatorClient, f as loadAccessToken, h as loadWorkspaceId, i as loadConfig, o as getDistDir, st as logger } from "../application-BMDE8KqK.mjs";
5
5
  import { createRequire, register } from "node:module";
6
6
  import * as fs$1 from "node:fs";
7
7
  import * as path from "pathe";
@@ -1,5 +1,5 @@
1
1
  /// <reference path="./../user-defined.d.ts" />
2
- import { $ as unsafeAllowAllTypePermission, A as TailorDBField, B as PluginGeneratedExecutor, C as UserAttributeKey, Ct as unauthenticatedTailorUser, D as ValueOperand, E as UsernameFieldKey, F as Plugin, G as PluginOutput, H as PluginGeneratedResolver, I as PluginAttachment, J as TypePluginOutput, K as PluginProcessContext, L as PluginConfigs, M as TailorDBType, N as db, O as TailorAnyDBField, P as NamespacePluginOutput, Q as unsafeAllowAllGqlPermission, R as PluginExecutorContext, S as TenantProviderConfig, St as TailorUser, T as UserAttributeMap, U as PluginGeneratedType, V as PluginGeneratedExecutorWithFile, W as PluginNamespaceProcessContext, X as TailorTypeGqlPermission, Y as PermissionCondition, Z as TailorTypePermission, _ as SCIMAttributeMapping, _t as Env, b as SCIMConfig, bt as AttributeList, c as BuiltinIdP, ct as QueryType, d as IdProviderConfig, f as OAuth2ClientGrantType, ft as ResolverServiceConfig, g as SCIMAttribute, h as SAML, i as AuthExternalConfig, j as TailorDBInstance, k as TailorAnyDBType, l as DefinedAuth, lt as Resolver, m as OIDC, o as AuthOwnConfig, p as OAuth2ClientInput, pt as ResolverServiceInput, q as TailorDBTypeForPlugin, r as AuthConfig, s as AuthServiceInput, st as TailorField, u as IDToken, ut as ResolverExternalConfig, v as SCIMAttributeType, w as UserAttributeListKey, x as SCIMResource, xt as AttributeMap, y as SCIMAuthorization, z as PluginExecutorContextBase } from "../types-DzvazVmg.mjs";
3
- import { d as WorkflowServiceInput, g as ExecutorServiceInput, h as ExecutorServiceConfig, n as IdPConfig, o as StaticWebsiteConfig, r as IdPExternalConfig, s as defineStaticWebSite, u as WorkflowServiceConfig } from "../types-BeNtD-fA.mjs";
4
- import { $ as defineAuth, A as idpUserCreatedTrigger, B as WebhookOperation, C as RecordTrigger, D as authAccessTokenIssuedTrigger, E as ResolverExecutedTrigger, F as recordUpdatedTrigger, G as WORKFLOW_TEST_ENV_KEY, H as Workflow, I as resolverExecutedTrigger, J as WorkflowJobInput, K as WorkflowJob, L as FunctionOperation, M as idpUserUpdatedTrigger, N as recordCreatedTrigger, O as authAccessTokenRefreshedTrigger, P as recordDeletedTrigger, Q as AuthInvoker, R as GqlOperation, S as RecordDeletedArgs, T as ResolverExecutedArgs, U as WorkflowConfig, V as WorkflowOperation, W as createWorkflow, X as createWorkflowJob, Y as WorkflowJobOutput, Z as createResolver, _ as AuthAccessTokenArgs, a as defineGenerators, b as IdpUserTrigger, c as createExecutor, d as IncomingWebhookRequest, f as IncomingWebhookTrigger, g as scheduleTrigger, h as ScheduleTrigger, i as defineConfig, j as idpUserDeletedTrigger, k as authAccessTokenRevokedTrigger, l as Trigger, m as ScheduleArgs, n as output, o as definePlugins, p as incomingWebhookTrigger, q as WorkflowJobContext, r as t, s as defineIdp, t as infer, u as IncomingWebhookArgs, v as AuthAccessTokenTrigger, w as RecordUpdatedArgs, x as RecordCreatedArgs, y as IdpUserArgs, z as Operation } from "../index-qQXpN674.mjs";
2
+ import { $ as unsafeAllowAllTypePermission, A as TailorDBField, B as PluginGeneratedExecutor, C as UserAttributeKey, Ct as unauthenticatedTailorUser, D as ValueOperand, E as UsernameFieldKey, F as Plugin, G as PluginOutput, H as PluginGeneratedResolver, I as PluginAttachment, J as TypePluginOutput, K as PluginProcessContext, L as PluginConfigs, M as TailorDBType, N as db, O as TailorAnyDBField, P as NamespacePluginOutput, Q as unsafeAllowAllGqlPermission, R as PluginExecutorContext, S as TenantProviderConfig, St as TailorUser, T as UserAttributeMap, U as PluginGeneratedType, V as PluginGeneratedExecutorWithFile, W as PluginNamespaceProcessContext, X as TailorTypeGqlPermission, Y as PermissionCondition, Z as TailorTypePermission, _ as SCIMAttributeMapping, _t as Env, b as SCIMConfig, bt as AttributeList, c as BuiltinIdP, ct as QueryType, d as IdProviderConfig, f as OAuth2ClientGrantType, ft as ResolverServiceConfig, g as SCIMAttribute, h as SAML, i as AuthExternalConfig, j as TailorDBInstance, k as TailorAnyDBType, l as DefinedAuth, lt as Resolver, m as OIDC, o as AuthOwnConfig, p as OAuth2ClientInput, pt as ResolverServiceInput, q as TailorDBTypeForPlugin, r as AuthConfig, s as AuthServiceInput, st as TailorField, u as IDToken, ut as ResolverExternalConfig, v as SCIMAttributeType, w as UserAttributeListKey, x as SCIMResource, xt as AttributeMap, y as SCIMAuthorization, z as PluginExecutorContextBase } from "../types-CZZBCaxB.mjs";
3
+ import { d as WorkflowServiceInput, g as ExecutorServiceInput, h as ExecutorServiceConfig, n as IdPConfig, o as StaticWebsiteConfig, r as IdPExternalConfig, s as defineStaticWebSite, u as WorkflowServiceConfig } from "../types-DthzUFfx.mjs";
4
+ import { $ as defineAuth, A as idpUserCreatedTrigger, B as WebhookOperation, C as RecordTrigger, D as authAccessTokenIssuedTrigger, E as ResolverExecutedTrigger, F as recordUpdatedTrigger, G as WORKFLOW_TEST_ENV_KEY, H as Workflow, I as resolverExecutedTrigger, J as WorkflowJobInput, K as WorkflowJob, L as FunctionOperation, M as idpUserUpdatedTrigger, N as recordCreatedTrigger, O as authAccessTokenRefreshedTrigger, P as recordDeletedTrigger, Q as AuthInvoker, R as GqlOperation, S as RecordDeletedArgs, T as ResolverExecutedArgs, U as WorkflowConfig, V as WorkflowOperation, W as createWorkflow, X as createWorkflowJob, Y as WorkflowJobOutput, Z as createResolver, _ as AuthAccessTokenArgs, a as defineGenerators, b as IdpUserTrigger, c as createExecutor, d as IncomingWebhookRequest, f as IncomingWebhookTrigger, g as scheduleTrigger, h as ScheduleTrigger, i as defineConfig, j as idpUserDeletedTrigger, k as authAccessTokenRevokedTrigger, l as Trigger, m as ScheduleArgs, n as output, o as definePlugins, p as incomingWebhookTrigger, q as WorkflowJobContext, r as t, s as defineIdp, t as infer, u as IncomingWebhookArgs, v as AuthAccessTokenTrigger, w as RecordUpdatedArgs, x as RecordCreatedArgs, y as IdpUserArgs, z as Operation } from "../index-CVcYqZSf.mjs";
5
5
  export { AttributeList, AttributeMap, AuthAccessTokenArgs, AuthAccessTokenTrigger, AuthConfig, AuthExternalConfig, AuthInvoker, AuthOwnConfig, AuthServiceInput, BuiltinIdP, DefinedAuth, Env, ExecutorServiceConfig, ExecutorServiceInput, FunctionOperation, GqlOperation, IDToken, IdPConfig, IdPExternalConfig, IdProviderConfig, IdpUserArgs, IdpUserTrigger, IncomingWebhookArgs, IncomingWebhookRequest, IncomingWebhookTrigger, NamespacePluginOutput, OAuth2ClientInput as OAuth2Client, OAuth2ClientGrantType, OIDC, Operation, PermissionCondition, Plugin, PluginAttachment, PluginConfigs, PluginExecutorContext, PluginExecutorContextBase, PluginGeneratedExecutor, PluginGeneratedExecutorWithFile, PluginGeneratedResolver, PluginGeneratedType, PluginNamespaceProcessContext, PluginOutput, PluginProcessContext, QueryType, RecordCreatedArgs, RecordDeletedArgs, RecordTrigger, RecordUpdatedArgs, Resolver, ResolverExecutedArgs, ResolverExecutedTrigger, ResolverExternalConfig, ResolverServiceConfig, ResolverServiceInput, SAML, SCIMAttribute, SCIMAttributeMapping, SCIMAttributeType, SCIMAuthorization, SCIMConfig, SCIMResource, ScheduleArgs, ScheduleTrigger, StaticWebsiteConfig, TailorAnyDBField, TailorAnyDBType, TailorDBField, TailorDBInstance, TailorDBType, TailorDBTypeForPlugin, TailorField, TailorTypeGqlPermission, TailorTypePermission, TailorUser, TenantProviderConfig, Trigger, TypePluginOutput, UserAttributeKey, UserAttributeListKey, UserAttributeMap, UsernameFieldKey, ValueOperand, WORKFLOW_TEST_ENV_KEY, WebhookOperation, Workflow, WorkflowConfig, WorkflowJob, WorkflowJobContext, WorkflowJobInput, WorkflowJobOutput, WorkflowOperation, WorkflowServiceConfig, WorkflowServiceInput, authAccessTokenIssuedTrigger, authAccessTokenRefreshedTrigger, authAccessTokenRevokedTrigger, createExecutor, createResolver, createWorkflow, createWorkflowJob, db, defineAuth, defineConfig, defineGenerators, defineIdp, definePlugins, defineStaticWebSite, idpUserCreatedTrigger, idpUserDeletedTrigger, idpUserUpdatedTrigger, incomingWebhookTrigger, infer, output, recordCreatedTrigger, recordDeletedTrigger, recordUpdatedTrigger, resolverExecutedTrigger, scheduleTrigger, t, unauthenticatedTailorUser, unsafeAllowAllGqlPermission, unsafeAllowAllTypePermission };
@@ -1,6 +1,6 @@
1
1
  /// <reference path="./user-defined.d.ts" />
2
- import { F as Plugin, M as TailorDBType, St as TailorUser, T as UserAttributeMap, Tt as AllowedValuesOutput, a as AuthInvoker$1, at as TailorFieldType, dt as ResolverInput, et as ArrayFieldOutput, gt as output$1, ht as JsonCompatible, it as FieldOutput, j as TailorDBInstance, l as DefinedAuth, mt as InferFieldsOutput, nt as FieldMetadata, ot as TailorAnyField, rt as FieldOptions, s as AuthServiceInput, st as TailorField, tt as DefinedFieldMetadata, vt as TailorEnv, w as UserAttributeListKey, wt as AllowedValues, yt as TailorActor } from "./types-DzvazVmg.mjs";
3
- import { C as ScheduleTriggerInput, S as ResolverExecutedTrigger$1, T as WorkflowOperation$1, _ as FunctionOperation$1, a as IdpDefinitionBrand, b as IncomingWebhookTrigger$1, f as AuthAccessTokenTrigger$1, i as IdPInput, l as GeneratorConfig, m as ExecutorInput, t as AppConfig, v as GqlOperation$1, w as WebhookOperation$1, x as RecordTrigger$1, y as IdpUserTrigger$1 } from "./types-BeNtD-fA.mjs";
2
+ import { F as Plugin, M as TailorDBType, St as TailorUser, T as UserAttributeMap, Tt as AllowedValuesOutput, a as AuthInvoker$1, at as TailorFieldType, dt as ResolverInput, et as ArrayFieldOutput, gt as output$1, ht as JsonCompatible, it as FieldOutput, j as TailorDBInstance, l as DefinedAuth, mt as InferFieldsOutput, nt as FieldMetadata, ot as TailorAnyField, rt as FieldOptions, s as AuthServiceInput, st as TailorField, tt as DefinedFieldMetadata, vt as TailorEnv, w as UserAttributeListKey, wt as AllowedValues, yt as TailorActor } from "./types-CZZBCaxB.mjs";
3
+ import { C as ScheduleTriggerInput, S as ResolverExecutedTrigger$1, T as WorkflowOperation$1, _ as FunctionOperation$1, a as IdpDefinitionBrand, b as IncomingWebhookTrigger$1, f as AuthAccessTokenTrigger$1, i as IdPInput, l as GeneratorConfig, m as ExecutorInput, t as AppConfig, v as GqlOperation$1, w as WebhookOperation$1, x as RecordTrigger$1, y as IdpUserTrigger$1 } from "./types-DthzUFfx.mjs";
4
4
  import * as zod0 from "zod";
5
5
  import { JsonPrimitive, Jsonifiable, Jsonify } from "type-fest";
6
6
  import { Client } from "@urql/core";
@@ -611,6 +611,7 @@ declare function defineIdp<const TClients extends string[]>(name: string, config
611
611
  passwordMaxLength?: number | undefined;
612
612
  allowedEmailDomains?: string[] | undefined;
613
613
  allowGoogleOauth?: boolean | undefined;
614
+ disablePasswordAuth?: boolean | undefined;
614
615
  } | undefined;
615
616
  readonly publishUserEvents?: boolean | undefined;
616
617
  readonly clients: TClients;
@@ -730,4 +731,4 @@ declare namespace t {
730
731
  }
731
732
  //#endregion
732
733
  export { defineAuth as $, idpUserCreatedTrigger as A, WebhookOperation as B, RecordTrigger as C, authAccessTokenIssuedTrigger as D, ResolverExecutedTrigger as E, recordUpdatedTrigger as F, WORKFLOW_TEST_ENV_KEY as G, Workflow as H, resolverExecutedTrigger as I, WorkflowJobInput as J, WorkflowJob as K, FunctionOperation as L, idpUserUpdatedTrigger as M, recordCreatedTrigger as N, authAccessTokenRefreshedTrigger as O, recordDeletedTrigger as P, AuthInvoker as Q, GqlOperation as R, RecordDeletedArgs as S, ResolverExecutedArgs as T, WorkflowConfig as U, WorkflowOperation as V, createWorkflow as W, createWorkflowJob as X, WorkflowJobOutput as Y, createResolver as Z, AuthAccessTokenArgs as _, defineGenerators as a, IdpUserTrigger as b, createExecutor as c, IncomingWebhookRequest as d, IncomingWebhookTrigger as f, scheduleTrigger as g, ScheduleTrigger as h, defineConfig as i, idpUserDeletedTrigger as j, authAccessTokenRevokedTrigger as k, Trigger as l, ScheduleArgs as m, output as n, definePlugins as o, incomingWebhookTrigger as p, WorkflowJobContext as q, t as r, defineIdp as s, infer as t, IncomingWebhookArgs as u, AuthAccessTokenTrigger as v, RecordUpdatedArgs as w, RecordCreatedArgs as x, IdpUserArgs as y, Operation as z };
733
- //# sourceMappingURL=index-qQXpN674.d.mts.map
734
+ //# sourceMappingURL=index-CVcYqZSf.d.mts.map
@@ -1,5 +1,5 @@
1
1
  /// <reference path="./../user-defined.d.ts" />
2
- import { k as TailorAnyDBType, vt as TailorEnv, yt as TailorActor } from "../types-DzvazVmg.mjs";
2
+ import { k as TailorAnyDBType, vt as TailorEnv, yt as TailorActor } from "../types-CZZBCaxB.mjs";
3
3
 
4
4
  //#region src/plugin/with-context.d.ts
5
5
 
@@ -677,11 +677,11 @@ declare const TailorFieldSchema: z.ZodObject<{
677
677
  type: z.ZodEnum<{
678
678
  string: "string";
679
679
  boolean: "boolean";
680
+ date: "date";
681
+ enum: "enum";
680
682
  uuid: "uuid";
681
683
  integer: "integer";
682
684
  float: "float";
683
- enum: "enum";
684
- date: "date";
685
685
  datetime: "datetime";
686
686
  time: "time";
687
687
  nested: "nested";
@@ -710,11 +710,11 @@ declare const ResolverSchema: z.ZodObject<{
710
710
  type: z.ZodEnum<{
711
711
  string: "string";
712
712
  boolean: "boolean";
713
+ date: "date";
714
+ enum: "enum";
713
715
  uuid: "uuid";
714
716
  integer: "integer";
715
717
  float: "float";
716
- enum: "enum";
717
- date: "date";
718
718
  datetime: "datetime";
719
719
  time: "time";
720
720
  nested: "nested";
@@ -740,11 +740,11 @@ declare const ResolverSchema: z.ZodObject<{
740
740
  type: z.ZodEnum<{
741
741
  string: "string";
742
742
  boolean: "boolean";
743
+ date: "date";
744
+ enum: "enum";
743
745
  uuid: "uuid";
744
746
  integer: "integer";
745
747
  float: "float";
746
- enum: "enum";
747
- date: "date";
748
748
  datetime: "datetime";
749
749
  time: "time";
750
750
  nested: "nested";
@@ -2439,4 +2439,4 @@ interface TailorDBType {
2439
2439
  }
2440
2440
  //#endregion
2441
2441
  export { unsafeAllowAllTypePermission as $, TailorDBField as A, PluginGeneratedExecutor as B, UserAttributeKey as C, unauthenticatedTailorUser as Ct, ValueOperand as D, UsernameFieldKey as E, TailorDBServiceInput as Et, Plugin as F, PluginOutput as G, PluginGeneratedResolver as H, PluginAttachment as I, TypePluginOutput as J, PluginProcessContext as K, PluginConfigs as L, TailorDBType$1 as M, db as N, TailorAnyDBField as O, NamespacePluginOutput as P, unsafeAllowAllGqlPermission as Q, PluginExecutorContext as R, TenantProviderConfig as S, TailorUser as St, UserAttributeMap as T, AllowedValuesOutput as Tt, PluginGeneratedType as U, PluginGeneratedExecutorWithFile as V, PluginNamespaceProcessContext as W, TailorTypeGqlPermission as X, PermissionCondition as Y, TailorTypePermission as Z, SCIMAttributeMapping as _, Env as _t, AuthInvoker as a, TailorFieldType as at, SCIMConfig as b, AttributeList as bt, BuiltinIdP as c, QueryType as ct, IdProviderConfig as d, ResolverInput as dt, ArrayFieldOutput as et, OAuth2ClientGrantType as f, ResolverServiceConfig as ft, SCIMAttribute as g, output as gt, SAML as h, JsonCompatible as ht, AuthExternalConfig as i, FieldOutput$1 as it, TailorDBInstance as j, TailorAnyDBType as k, DefinedAuth as l, Resolver as lt, OIDC as m, InferFieldsOutput as mt, TypeSourceInfoEntry as n, FieldMetadata as nt, AuthOwnConfig as o, TailorAnyField as ot, OAuth2ClientInput as p, ResolverServiceInput as pt, TailorDBTypeForPlugin as q, AuthConfig as r, FieldOptions as rt, AuthServiceInput as s, TailorField as st, TailorDBType as t, DefinedFieldMetadata as tt, IDToken as u, ResolverExternalConfig as ut, SCIMAttributeType as v, TailorEnv as vt, UserAttributeListKey as w, AllowedValues as wt, SCIMResource as x, AttributeMap as xt, SCIMAuthorization as y, TailorActor as yt, PluginExecutorContextBase as z };
2442
- //# sourceMappingURL=types-DzvazVmg.d.mts.map
2442
+ //# sourceMappingURL=types-CZZBCaxB.d.mts.map
@@ -1,5 +1,5 @@
1
1
  /// <reference path="./user-defined.d.ts" />
2
- import { Et as TailorDBServiceInput, c as BuiltinIdP, pt as ResolverServiceInput, r as AuthConfig } from "./types-DzvazVmg.mjs";
2
+ import { Et as TailorDBServiceInput, c as BuiltinIdP, pt as ResolverServiceInput, r as AuthConfig } from "./types-CZZBCaxB.mjs";
3
3
  import { z } from "zod";
4
4
 
5
5
  //#region src/parser/service/executor/schema.d.ts
@@ -283,6 +283,7 @@ declare const IdPSchema: z.core.$ZodBranded<z.ZodObject<{
283
283
  passwordMaxLength: z.ZodOptional<z.ZodNumber>;
284
284
  allowedEmailDomains: z.ZodOptional<z.ZodArray<z.ZodString>>;
285
285
  allowGoogleOauth: z.ZodOptional<z.ZodBoolean>;
286
+ disablePasswordAuth: z.ZodOptional<z.ZodBoolean>;
286
287
  }, z.core.$strip>, z.ZodTransform<{
287
288
  useNonEmailIdentifier?: boolean | undefined;
288
289
  allowSelfPasswordReset?: boolean | undefined;
@@ -294,6 +295,7 @@ declare const IdPSchema: z.core.$ZodBranded<z.ZodObject<{
294
295
  passwordMaxLength?: number | undefined;
295
296
  allowedEmailDomains?: string[] | undefined;
296
297
  allowGoogleOauth?: boolean | undefined;
298
+ disablePasswordAuth?: boolean | undefined;
297
299
  }, {
298
300
  useNonEmailIdentifier?: boolean | undefined;
299
301
  allowSelfPasswordReset?: boolean | undefined;
@@ -305,6 +307,7 @@ declare const IdPSchema: z.core.$ZodBranded<z.ZodObject<{
305
307
  passwordMaxLength?: number | undefined;
306
308
  allowedEmailDomains?: string[] | undefined;
307
309
  allowGoogleOauth?: boolean | undefined;
310
+ disablePasswordAuth?: boolean | undefined;
308
311
  }>>>;
309
312
  publishUserEvents: z.ZodOptional<z.ZodBoolean>;
310
313
  }, z.core.$strip>, "IdPConfig", "out">;
@@ -366,4 +369,4 @@ interface AppConfig<Auth extends AuthConfig = AuthConfig, Idp extends IdPConfig[
366
369
  }
367
370
  //#endregion
368
371
  export { ScheduleTriggerInput as C, ResolverExecutedTrigger as S, WorkflowOperation as T, FunctionOperation as _, IdpDefinitionBrand as a, IncomingWebhookTrigger as b, CodeGeneratorBase as c, WorkflowServiceInput as d, AuthAccessTokenTrigger as f, ExecutorServiceInput as g, ExecutorServiceConfig as h, IdPInput as i, GeneratorConfig as l, ExecutorInput as m, IdPConfig as n, StaticWebsiteConfig as o, Executor as p, IdPExternalConfig as r, defineStaticWebSite as s, AppConfig as t, WorkflowServiceConfig as u, GqlOperation as v, WebhookOperation as w, RecordTrigger as x, IdpUserTrigger as y };
369
- //# sourceMappingURL=types-BeNtD-fA.d.mts.map
372
+ //# sourceMappingURL=types-DthzUFfx.d.mts.map
@@ -1,5 +1,5 @@
1
1
  import { t as db } from "./schema-R5TxC5Pn.mjs";
2
- import { $ as UserProfileProviderConfig_UserProfileProviderType, A as TailorDBGQLPermission_Action, B as ExecutorJobStatus, C as platformBaseUrl, D as WorkspacePlatformUserRole, E as readPackageJson, F as TailorDBType_PermitAction, G as AuthOAuth2Client_ClientType, H as ExecutorTriggerType, I as PipelineResolver_OperationType, J as AuthSCIMAttribute_Type, K as AuthOAuth2Client_GrantType, L as IdPLang, M as TailorDBGQLPermission_Permit, N as TailorDBType_Permission_Operator, O as WorkflowExecution_Status, P as TailorDBType_Permission_Permit, Q as TenantProviderConfig_TenantProviderType, R as FunctionExecution_Status, S as initOperatorClient, T as userAgent, U as AuthIDPConfig_AuthType, V as ExecutorTargetType, W as AuthInvokerSchema, X as AuthSCIMConfig_AuthorizationType, Y as AuthSCIMAttribute_Uniqueness, _ as writePlatformConfig, a as hasDependency, at as ApplicationSchemaUpdateAttemptStatus, c as OAuth2ClientSchema, ct as styles, et as GetApplicationSchemaHealthResponse_ApplicationSchemaHealthStatus, f as loadAccessToken, g as readPlatformConfig, h as loadWorkspaceId, i as loadConfig, it as PageDirection, j as TailorDBGQLPermission_Operator, k as WorkflowJobExecution_Status, l as stringifyFunction, lt as symbols, m as loadOrganizationId, n as generatePluginFilesIfNeeded, nt as Condition_Operator, o as getDistDir, ot as Subgraph_ServiceType, p as loadFolderId, q as AuthSCIMAttribute_Mutability, r as loadApplication, rt as FilterSchema, s as createExecutorService, st as logger, t as defineApplication, tt as ConditionSchema, u as tailorUserMap, v as fetchAll, w as resolveStaticWebsiteUrls, y as fetchMachineUserToken } from "./application-DYfVZVPT.mjs";
2
+ import { $ as UserProfileProviderConfig_UserProfileProviderType, A as TailorDBGQLPermission_Action, B as ExecutorJobStatus, C as platformBaseUrl, D as WorkspacePlatformUserRole, E as readPackageJson, F as TailorDBType_PermitAction, G as AuthOAuth2Client_ClientType, H as ExecutorTriggerType, I as PipelineResolver_OperationType, J as AuthSCIMAttribute_Type, K as AuthOAuth2Client_GrantType, L as IdPLang, M as TailorDBGQLPermission_Permit, N as TailorDBType_Permission_Operator, O as WorkflowExecution_Status, P as TailorDBType_Permission_Permit, Q as TenantProviderConfig_TenantProviderType, R as FunctionExecution_Status, S as initOperatorClient, T as userAgent, U as AuthIDPConfig_AuthType, V as ExecutorTargetType, W as AuthInvokerSchema, X as AuthSCIMConfig_AuthorizationType, Y as AuthSCIMAttribute_Uniqueness, _ as writePlatformConfig, a as hasDependency, at as ApplicationSchemaUpdateAttemptStatus, c as OAuth2ClientSchema, ct as styles, et as GetApplicationSchemaHealthResponse_ApplicationSchemaHealthStatus, f as loadAccessToken, g as readPlatformConfig, h as loadWorkspaceId, i as loadConfig, it as PageDirection, j as TailorDBGQLPermission_Operator, k as WorkflowJobExecution_Status, l as stringifyFunction, lt as symbols, m as loadOrganizationId, n as generatePluginFilesIfNeeded, nt as Condition_Operator, o as getDistDir, ot as Subgraph_ServiceType, p as loadFolderId, q as AuthSCIMAttribute_Mutability, r as loadApplication, rt as FilterSchema, s as createExecutorService, st as logger, t as defineApplication, tt as ConditionSchema, u as tailorUserMap, v as fetchAll, w as resolveStaticWebsiteUrls, y as fetchMachineUserToken } from "./application-BMDE8KqK.mjs";
3
3
  import { createRequire } from "node:module";
4
4
  import { arg, defineCommand, runCommand } from "politty";
5
5
  import { z } from "zod";
@@ -2135,7 +2135,7 @@ function workflowJobFunctionName(jobName) {
2135
2135
  function collectFunctionEntries(application, workflowJobs) {
2136
2136
  const entries = [];
2137
2137
  const distDir = getDistDir();
2138
- for (const app of application.applications) for (const pipeline of app.resolverServices) for (const resolver of Object.values(pipeline.getResolvers())) {
2138
+ for (const app of application.applications) for (const pipeline of app.resolverServices) for (const resolver of Object.values(pipeline.resolvers)) {
2139
2139
  const scriptPath = path.join(distDir, "resolvers", `${resolver.name}.js`);
2140
2140
  try {
2141
2141
  const content = fs$2.readFileSync(scriptPath, "utf-8");
@@ -2150,7 +2150,7 @@ function collectFunctionEntries(application, workflowJobs) {
2150
2150
  }
2151
2151
  }
2152
2152
  if (application.executorService) {
2153
- const executors = application.executorService.getExecutors();
2153
+ const executors = application.executorService.executors;
2154
2154
  for (const executor of Object.values(executors)) if (executor.operation.kind === "function" || executor.operation.kind === "jobFunction") {
2155
2155
  const scriptPath = path.join(distDir, "executors", `${executor.name}.js`);
2156
2156
  try {
@@ -2796,7 +2796,7 @@ async function planResolvers(client, workspaceId, pipelines, executors, deletedS
2796
2796
  existingResolvers.forEach((resolver) => {
2797
2797
  existingNameSet.add(resolver.name);
2798
2798
  });
2799
- for (const resolver of Object.values(pipeline.getResolvers())) if (existingNameSet.has(resolver.name)) {
2799
+ for (const resolver of Object.values(pipeline.resolvers)) if (existingNameSet.has(resolver.name)) {
2800
2800
  changeSet.updates.push({
2801
2801
  name: resolver.name,
2802
2802
  request: {
@@ -4824,7 +4824,7 @@ async function applyTailorDB(client, result, phase = "create-update") {
4824
4824
  let pendingMigrations = [];
4825
4825
  const typesByNamespace = /* @__PURE__ */ new Map();
4826
4826
  for (const tailordb of migrationContext.application.tailorDBServices) {
4827
- const types = tailordb.getTypes();
4827
+ const types = tailordb.types;
4828
4828
  if (types) typesByNamespace.set(tailordb.namespace, types);
4829
4829
  }
4830
4830
  pendingMigrations = await validateAndDetectMigrations(client, migrationContext.workspaceId, typesByNamespace, migrationContext.config, migrationContext.noSchemaCheck);
@@ -5244,7 +5244,7 @@ async function planTypes(client, workspaceId, tailordbs, executors, deletedServi
5244
5244
  const existingTypes = await fetchTypes(tailordb.namespace);
5245
5245
  const existingNameSet = /* @__PURE__ */ new Set();
5246
5246
  existingTypes.forEach((type) => existingNameSet.add(type.name));
5247
- const types = filteredTypesByNamespace?.get(tailordb.namespace) ?? tailordb.getTypes();
5247
+ const types = filteredTypesByNamespace?.get(tailordb.namespace) ?? tailordb.types;
5248
5248
  for (const typeName of Object.keys(types)) {
5249
5249
  const tailordbType = generateTailorDBTypeManifest(types[typeName], executorUsedTypes, tailordb.config.gqlOperations);
5250
5250
  if (existingNameSet.has(typeName)) {
@@ -5544,7 +5544,7 @@ async function planGqlPermissions(client, workspaceId, tailordbs, deletedService
5544
5544
  existingGqlPermissions.forEach((gqlPermission) => {
5545
5545
  existingNameSet.add(gqlPermission.typeName);
5546
5546
  });
5547
- const types = tailordb.getTypes();
5547
+ const types = tailordb.types;
5548
5548
  for (const typeName of Object.keys(types)) {
5549
5549
  const gqlPermission = types[typeName].permissions.gql;
5550
5550
  if (!gqlPermission) continue;
@@ -5950,7 +5950,7 @@ async function apply(options) {
5950
5950
  config,
5951
5951
  configPath: config.path
5952
5952
  });
5953
- const { application, workflowResult, workflowBuildResult } = await loadApplication({
5953
+ const { application, workflowBuildResult } = await loadApplication({
5954
5954
  config,
5955
5955
  pluginManager
5956
5956
  });
@@ -5963,7 +5963,8 @@ async function apply(options) {
5963
5963
  workspaceId: options?.workspaceId,
5964
5964
  profile: options?.profile
5965
5965
  });
5966
- const functionEntries = collectFunctionEntries(application, workflowResult?.jobs ?? []);
5966
+ const workflowService = application.workflowService;
5967
+ const functionEntries = collectFunctionEntries(application, workflowService?.jobs ?? []);
5967
5968
  const ctx = {
5968
5969
  client,
5969
5970
  workspaceId,
@@ -5980,7 +5981,7 @@ async function apply(options) {
5980
5981
  const pipeline = await planPipeline(ctx);
5981
5982
  const app = await planApplication(ctx);
5982
5983
  const executor = await planExecutor(ctx);
5983
- const workflow = await planWorkflow(client, workspaceId, application.name, workflowResult?.workflows ?? {}, workflowBuildResult?.mainJobDeps ?? {});
5984
+ const workflow = await planWorkflow(client, workspaceId, application.name, workflowService?.workflows ?? {}, workflowBuildResult?.mainJobDeps ?? {});
5984
5985
  const allConflicts = [
5985
5986
  ...functionRegistry.conflicts,
5986
5987
  ...tailorDB.conflicts,
@@ -8417,9 +8418,9 @@ function createGenerationManager(params) {
8417
8418
  await db$1.loadTypes();
8418
8419
  await db$1.processNamespacePlugins();
8419
8420
  services.tailordb[namespace] = {
8420
- types: db$1.getTypes(),
8421
- sourceInfo: db$1.getTypeSourceInfo(),
8422
- pluginAttachments: db$1.getPluginAttachments()
8421
+ types: db$1.types,
8422
+ sourceInfo: db$1.typeSourceInfo,
8423
+ pluginAttachments: db$1.pluginAttachments
8423
8424
  };
8424
8425
  } catch (error) {
8425
8426
  logger.error(`Error loading types for TailorDB service ${styles.bold(namespace)}`);
@@ -8441,7 +8442,7 @@ function createGenerationManager(params) {
8441
8442
  try {
8442
8443
  await resolverService.loadResolvers();
8443
8444
  services.resolver[namespace] = {};
8444
- Object.entries(resolverService.getResolvers()).forEach(([_, resolver]) => {
8445
+ Object.entries(resolverService.resolvers).forEach(([_, resolver]) => {
8445
8446
  services.resolver[namespace][resolver.name] = resolver;
8446
8447
  });
8447
8448
  } catch (error) {
@@ -8459,7 +8460,7 @@ function createGenerationManager(params) {
8459
8460
  await executorService.loadExecutors();
8460
8461
  if (pluginExecutorFiles.length > 0) await executorService.loadPluginExecutorFiles([...pluginExecutorFiles]);
8461
8462
  }
8462
- const allExecutors = executorService?.getExecutors() ?? {};
8463
+ const allExecutors = executorService?.executors ?? {};
8463
8464
  Object.entries(allExecutors).forEach(([key, executor]) => {
8464
8465
  services.executor[key] = executor;
8465
8466
  });
@@ -9487,7 +9488,7 @@ async function generate(options) {
9487
9488
  if (options.init) await handleInitOption(namespacesWithMigrations, options.yes);
9488
9489
  let pluginManager;
9489
9490
  if (plugins.length > 0) pluginManager = new PluginManager(plugins);
9490
- const { defineApplication: defineApplication$1 } = await import("./application-D5ZEr4zk.mjs");
9491
+ const { defineApplication: defineApplication$1 } = await import("./application-Dni_W16P.mjs");
9491
9492
  const application = defineApplication$1({
9492
9493
  config,
9493
9494
  pluginManager
@@ -9502,7 +9503,8 @@ async function generate(options) {
9502
9503
  }
9503
9504
  await tailordbService.loadTypes();
9504
9505
  await tailordbService.processNamespacePlugins();
9505
- const currentSnapshot = createSnapshotFromLocalTypes(tailordbService.getTypes(), namespace);
9506
+ const localTypesObj = tailordbService.types;
9507
+ const currentSnapshot = createSnapshotFromLocalTypes(localTypesObj, namespace);
9506
9508
  let previousSnapshot = null;
9507
9509
  try {
9508
9510
  previousSnapshot = reconstructSnapshotFromMigrations(migrationsDir);
@@ -10698,4 +10700,4 @@ const updateCommand = defineCommand({
10698
10700
 
10699
10701
  //#endregion
10700
10702
  export { jobsCommand as $, generateCommand as A, getMigrationDirPath as At, getMachineUserToken as B, getNamespacesWithMigrations as Bt, resumeCommand as C, MIGRATE_FILE_NAME as Ct, truncate as D, createSnapshotFromLocalTypes as Dt, listWorkflows as E, compareSnapshots as Et, removeCommand$1 as F, loadDiff as Ft, generateCommand$1 as G, commonArgs as Gt, listCommand$5 as H, generateUserTypes as Ht, listCommand$4 as I, reconstructSnapshotFromMigrations as It, triggerCommand as J, jsonArgs as Jt, listWebhookExecutors as K, confirmationArgs as Kt, listOAuth2Clients as L, formatDiffSummary as Lt, show as M, getMigrationFiles as Mt, showCommand as N, getNextMigrationNumber as Nt, truncateCommand as O, formatMigrationNumber as Ot, remove as P, isValidMigrationNumber as Pt, getExecutorJob as Q, getCommand$1 as R, formatMigrationDiff as Rt, healthCommand as S, INITIAL_SCHEMA_NUMBER as St, listCommand$3 as T, compareLocalTypesWithSnapshot as Tt, listMachineUsers as U, apiCall as Ut, tokenCommand as V, trnPrefix as Vt, generate$1 as W, apiCommand as Wt, listCommand$6 as X, workspaceArgs as Xt, triggerExecutor as Y, withCommonArgs as Yt, listExecutors as Z, createCommand as _, MIGRATION_LABEL_KEY as _t, listCommand as a, getWorkflow as at, listCommand$2 as b, DB_TYPES_FILE_NAME as bt, inviteUser as c, listWorkflowExecutions as ct, listCommand$1 as d, getCommand$3 as dt, listExecutorJobs as et, listWorkspaces as f, getExecutor as ft, deleteWorkspace as g, waitForExecution$1 as gt, deleteCommand as h, executeScript as ht, removeUser as i, getCommand$2 as it, logBetaWarning as j, getMigrationFilePath as jt, generate as k, getLatestMigrationNumber as kt, restoreCommand as l, functionExecutionStatusToString as lt, getWorkspace as m, applyCommand as mt, updateUser as n, startCommand as nt, listUsers as o, executionsCommand as ot, getCommand as p, apply as pt, webhookCommand as q, deploymentArgs as qt, removeCommand as r, startWorkflow as rt, inviteCommand as s, getWorkflowExecution as st, updateCommand as t, watchExecutorJob as tt, restoreWorkspace as u, formatKeyValueTable as ut, createWorkspace as v, parseMigrationLabelNumber as vt, resumeWorkflow as w, SCHEMA_FILE_NAME as wt, getAppHealth as x, DIFF_FILE_NAME as xt, listApps as y, bundleMigrationScript as yt, getOAuth2Client as z, hasChanges as zt };
10701
- //# sourceMappingURL=update-DQKCUNmr.mjs.map
10703
+ //# sourceMappingURL=update-CUBVjZbL.mjs.map