@tailor-platform/sdk 1.25.1 → 1.25.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (89) hide show
  1. package/CHANGELOG.md +36 -0
  2. package/dist/{application-iRp2OYMz.mjs → application-91Th6tm6.mjs} +127 -128
  3. package/dist/application-91Th6tm6.mjs.map +1 -0
  4. package/dist/application-DegTCDd8.mjs +9 -0
  5. package/dist/{brand-BOaOlsiP.mjs → brand-GZnI4eYb.mjs} +1 -1
  6. package/dist/{brand-BOaOlsiP.mjs.map → brand-GZnI4eYb.mjs.map} +1 -1
  7. package/dist/chunk-Cz-A8uMR.mjs +3 -0
  8. package/dist/cli/index.d.mts +2 -3
  9. package/dist/cli/index.mjs +172 -216
  10. package/dist/cli/index.mjs.map +1 -1
  11. package/dist/cli/lib.d.mts +706 -1108
  12. package/dist/cli/lib.mjs +28 -16
  13. package/dist/cli/lib.mjs.map +1 -1
  14. package/dist/cli/skills.mjs +2 -1
  15. package/dist/cli/skills.mjs.map +1 -1
  16. package/dist/configure/index.d.mts +5 -5
  17. package/dist/configure/index.mjs +4 -3
  18. package/dist/configure/index.mjs.map +1 -1
  19. package/dist/{enum-constants-BxdLbhsW.mjs → enum-constants-6uK0VI_s.mjs} +1 -1
  20. package/dist/{enum-constants-BxdLbhsW.mjs.map → enum-constants-6uK0VI_s.mjs.map} +1 -1
  21. package/dist/{env-jndw86T4.d.mts → env-uBeVwE9B.d.mts} +4 -7
  22. package/dist/{file-utils-C2r3AVbI.mjs → file-utils-2T9w20FP.mjs} +1 -1
  23. package/dist/{file-utils-C2r3AVbI.mjs.map → file-utils-2T9w20FP.mjs.map} +1 -1
  24. package/dist/{index-Do7zo7z-.d.mts → index-BD-K97-C.d.mts} +2 -2
  25. package/dist/{index-BuWllBxZ.d.mts → index-Bu12qy3m.d.mts} +25 -22
  26. package/dist/{index-VZq4IAEK.d.mts → index-CT53egux.d.mts} +2 -2
  27. package/dist/{index-DZRZdh71.d.mts → index-D1J5SfyK.d.mts} +2 -2
  28. package/dist/{index-DoxGF8-i.d.mts → index-cZilKprY.d.mts} +2 -2
  29. package/dist/{interceptor-DVy32eIG.mjs → interceptor-BPiIBTk_.mjs} +2 -1
  30. package/dist/{interceptor-DVy32eIG.mjs.map → interceptor-BPiIBTk_.mjs.map} +1 -1
  31. package/dist/{job-BQDunsd7.mjs → job-DdfW7vH3.mjs} +3 -3
  32. package/dist/{job-BQDunsd7.mjs.map → job-DdfW7vH3.mjs.map} +1 -1
  33. package/dist/kysely/index.d.mts +3 -4
  34. package/dist/kysely/index.mjs +1 -0
  35. package/dist/kysely/index.mjs.map +1 -1
  36. package/dist/{kysely-type-DzLBuVp6.mjs → kysely-type-cMNbsQ6k.mjs} +1 -1
  37. package/dist/{kysely-type-DzLBuVp6.mjs.map → kysely-type-cMNbsQ6k.mjs.map} +1 -1
  38. package/dist/package-json-Bj76LPsV.mjs +4 -0
  39. package/dist/{package-json-DnbGCOkg.mjs → package-json-CVUv8Y9T.mjs} +1 -1
  40. package/dist/{package-json-DnbGCOkg.mjs.map → package-json-CVUv8Y9T.mjs.map} +1 -1
  41. package/dist/plugin/builtin/enum-constants/index.d.mts +1 -2
  42. package/dist/plugin/builtin/enum-constants/index.mjs +2 -1
  43. package/dist/plugin/builtin/file-utils/index.d.mts +1 -2
  44. package/dist/plugin/builtin/file-utils/index.mjs +2 -1
  45. package/dist/plugin/builtin/kysely-type/index.d.mts +1 -2
  46. package/dist/plugin/builtin/kysely-type/index.mjs +2 -1
  47. package/dist/plugin/builtin/seed/index.d.mts +1 -2
  48. package/dist/plugin/builtin/seed/index.mjs +2 -1
  49. package/dist/plugin/index.d.mts +2 -3
  50. package/dist/plugin/index.mjs +5 -4
  51. package/dist/plugin/index.mjs.map +1 -1
  52. package/dist/{plugin-3sT6Tcq0.d.mts → plugin-zY5wvV82.d.mts} +117 -225
  53. package/dist/{query-D3UyoG68.mjs → query-BpppEOzu.mjs} +502 -541
  54. package/dist/query-BpppEOzu.mjs.map +1 -0
  55. package/dist/{schema-Fbfeq9gi.mjs → schema-BePzTFBV.mjs} +9 -9
  56. package/dist/schema-BePzTFBV.mjs.map +1 -0
  57. package/dist/seed/index.d.mts +1 -4
  58. package/dist/seed/index.mjs +1 -0
  59. package/dist/seed/index.mjs.map +1 -1
  60. package/dist/{seed-DkKAheSe.mjs → seed-CCVRLibh.mjs} +24 -10
  61. package/dist/seed-CCVRLibh.mjs.map +1 -0
  62. package/dist/{telemetry-d_lgTL33.mjs → telemetry-0w8OupuQ.mjs} +2 -2
  63. package/dist/{telemetry-d_lgTL33.mjs.map → telemetry-0w8OupuQ.mjs.map} +1 -1
  64. package/dist/telemetry-DDQZRqHK.mjs +4 -0
  65. package/dist/utils/test/index.d.mts +2 -3
  66. package/dist/utils/test/index.mjs +3 -2
  67. package/dist/utils/test/index.mjs.map +1 -1
  68. package/dist/{app-config-QzNOFnEy.d.mts → workflow.generated-v1LXRuB6.d.mts} +19 -22
  69. package/docs/cli/application.md +73 -33
  70. package/docs/cli/auth.md +56 -24
  71. package/docs/cli/completion.md +6 -0
  72. package/docs/cli/executor.md +73 -36
  73. package/docs/cli/function.md +30 -14
  74. package/docs/cli/secret.md +93 -41
  75. package/docs/cli/staticwebsite.md +38 -17
  76. package/docs/cli/tailordb.md +106 -48
  77. package/docs/cli/user.md +74 -10
  78. package/docs/cli/workflow.md +70 -39
  79. package/docs/cli/workspace.md +166 -60
  80. package/docs/cli-reference.md +22 -12
  81. package/docs/services/workflow.md +26 -0
  82. package/package.json +7 -6
  83. package/dist/application-B4ORumjE.mjs +0 -8
  84. package/dist/application-iRp2OYMz.mjs.map +0 -1
  85. package/dist/package-json-BKA36WTo.mjs +0 -3
  86. package/dist/query-D3UyoG68.mjs.map +0 -1
  87. package/dist/schema-Fbfeq9gi.mjs.map +0 -1
  88. package/dist/seed-DkKAheSe.mjs.map +0 -1
  89. package/dist/telemetry-J6dpByo2.mjs +0 -3
@@ -3,7 +3,6 @@ import { StandardSchemaV1 } from "@standard-schema/spec";
3
3
  import { IsAny, NonEmptyObject } from "type-fest";
4
4
 
5
5
  //#region src/parser/generator-config/index.d.ts
6
-
7
6
  declare const BaseGeneratorConfigSchema: z.ZodUnion<readonly [z.ZodTuple<[z.ZodLiteral<"@tailor-platform/kysely-type">, z.ZodObject<{
8
7
  distPath: z.ZodString;
9
8
  }, z.core.$strip>], null>, z.ZodTuple<[z.ZodLiteral<"@tailor-platform/seed">, z.ZodObject<{
@@ -31,149 +30,97 @@ declare const BaseGeneratorConfigSchema: z.ZodUnion<readonly [z.ZodTuple<[z.ZodL
31
30
  //#endregion
32
31
  //#region src/types/auth.generated.d.ts
33
32
  type AuthInvoker = {
34
- /** Auth namespace */
35
- namespace: string;
36
- /** Machine user name for authentication */
33
+ /** Auth namespace */namespace: string; /** Machine user name for authentication */
37
34
  machineUserName: string;
38
35
  };
39
36
  type OIDC = {
40
- /** Identity provider name */
41
- name: string;
42
- kind: "OIDC";
43
- /** OAuth2 client ID */
44
- clientID: string;
45
- /** OAuth2 client secret */
37
+ /** Identity provider name */name: string;
38
+ kind: "OIDC"; /** OAuth2 client ID */
39
+ clientID: string; /** OAuth2 client secret */
46
40
  clientSecret: {
47
41
  vaultName: string;
48
42
  secretKey: string;
49
- };
50
- /** OIDC provider URL */
51
- providerURL: string;
52
- /** OIDC issuer URL (defaults to providerURL) */
53
- issuerURL?: string | undefined;
54
- /** JWT claim to use as username */
43
+ }; /** OIDC provider URL */
44
+ providerURL: string; /** OIDC issuer URL (defaults to providerURL) */
45
+ issuerURL?: string | undefined; /** JWT claim to use as username */
55
46
  usernameClaim?: string | undefined;
56
47
  };
57
48
  type SAML = {
58
- /** Identity provider name */
59
- name: string;
60
- kind: "SAML";
61
- /** Enable signing of SAML requests */
62
- enableSignRequest: boolean;
63
- /** URL to fetch SAML metadata (mutually exclusive with rawMetadata) */
64
- metadataURL?: string | undefined;
65
- /** Raw SAML metadata XML (mutually exclusive with metadataURL) */
49
+ /** Identity provider name */name: string;
50
+ kind: "SAML"; /** Enable signing of SAML requests */
51
+ enableSignRequest: boolean; /** URL to fetch SAML metadata (mutually exclusive with rawMetadata) */
52
+ metadataURL?: string | undefined; /** Raw SAML metadata XML (mutually exclusive with metadataURL) */
66
53
  rawMetadata?: string | undefined;
67
54
  };
68
55
  type IDToken = {
69
- /** Identity provider name */
70
- name: string;
71
- kind: "IDToken";
72
- /** ID token provider URL */
73
- providerURL: string;
74
- /** Client ID for ID token validation */
75
- clientID: string;
76
- /** ID token issuer URL */
77
- issuerURL?: string | undefined;
78
- /** JWT claim to use as username */
56
+ /** Identity provider name */name: string;
57
+ kind: "IDToken"; /** ID token provider URL */
58
+ providerURL: string; /** Client ID for ID token validation */
59
+ clientID: string; /** ID token issuer URL */
60
+ issuerURL?: string | undefined; /** JWT claim to use as username */
79
61
  usernameClaim?: string | undefined;
80
62
  };
81
63
  type BuiltinIdP = {
82
- /** Identity provider name */
83
- name: string;
84
- kind: "BuiltInIdP";
85
- /** IdP namespace */
86
- namespace: string;
87
- /** OAuth2 client name in the IdP */
64
+ /** Identity provider name */name: string;
65
+ kind: "BuiltInIdP"; /** IdP namespace */
66
+ namespace: string; /** OAuth2 client name in the IdP */
88
67
  clientName: string;
89
68
  };
90
69
  type IdProvider = OIDC | SAML | IDToken | BuiltinIdP;
91
70
  type OAuth2ClientInput = {
92
- /** Allowed redirect URIs */
93
- redirectURIs: (`https://${string}` | `http://${string}` | `${string}:url` | `${string}:url/${string}`)[];
94
- /** Client description */
95
- description?: string | undefined;
96
- /** Allowed OAuth2 grant types */
97
- grantTypes?: ("authorization_code" | "refresh_token")[] | undefined;
98
- /** OAuth2 client type */
99
- clientType?: "confidential" | "public" | "browser" | undefined;
100
- /** Access token lifetime in seconds (60-86400) */
101
- accessTokenLifetimeSeconds?: number | undefined;
102
- /** Refresh token lifetime in seconds (60-604800) */
103
- refreshTokenLifetimeSeconds?: number | undefined;
104
- /** Require DPoP (Demonstrating Proof-of-Possession) for token requests */
71
+ /** Allowed redirect URIs */redirectURIs: (`https://${string}` | `http://${string}` | `${string}:url` | `${string}:url/${string}`)[]; /** Client description */
72
+ description?: string | undefined; /** Allowed OAuth2 grant types */
73
+ grantTypes?: ("authorization_code" | "refresh_token")[] | undefined; /** OAuth2 client type */
74
+ clientType?: "confidential" | "public" | "browser" | undefined; /** Access token lifetime in seconds (60-86400) */
75
+ accessTokenLifetimeSeconds?: number | undefined; /** Refresh token lifetime in seconds (60-604800) */
76
+ refreshTokenLifetimeSeconds?: number | undefined; /** Require DPoP (Demonstrating Proof-of-Possession) for token requests */
105
77
  requireDpop?: boolean | undefined;
106
78
  };
107
79
  type OAuth2Client = {
108
- /** Allowed OAuth2 grant types */
109
- grantTypes: ("authorization_code" | "refresh_token")[];
110
- /** Allowed redirect URIs */
111
- redirectURIs: (`https://${string}` | `http://${string}` | `${string}:url` | `${string}:url/${string}`)[];
112
- /** Access token lifetime in seconds (60-86400) */
80
+ /** Allowed OAuth2 grant types */grantTypes: ("authorization_code" | "refresh_token")[]; /** Allowed redirect URIs */
81
+ redirectURIs: (`https://${string}` | `http://${string}` | `${string}:url` | `${string}:url/${string}`)[]; /** Access token lifetime in seconds (60-86400) */
113
82
  accessTokenLifetimeSeconds: {
114
83
  seconds: bigint;
115
84
  nanos: number;
116
- } | undefined;
117
- /** Refresh token lifetime in seconds (60-604800) */
85
+ } | undefined; /** Refresh token lifetime in seconds (60-604800) */
118
86
  refreshTokenLifetimeSeconds: {
119
87
  seconds: bigint;
120
88
  nanos: number;
121
- } | undefined;
122
- /** Client description */
123
- description?: string | undefined;
124
- /** OAuth2 client type */
125
- clientType?: "confidential" | "public" | "browser" | undefined;
126
- /** Require DPoP (Demonstrating Proof-of-Possession) for token requests */
89
+ } | undefined; /** Client description */
90
+ description?: string | undefined; /** OAuth2 client type */
91
+ clientType?: "confidential" | "public" | "browser" | undefined; /** Require DPoP (Demonstrating Proof-of-Possession) for token requests */
127
92
  requireDpop?: boolean | undefined;
128
93
  };
129
94
  type SCIMAuthorization = {
130
- /** SCIM authorization type */
131
- type: "oauth2" | "bearer";
132
- /** Bearer token secret (required for bearer type) */
95
+ /** SCIM authorization type */type: "oauth2" | "bearer"; /** Bearer token secret (required for bearer type) */
133
96
  bearerSecret?: {
134
97
  vaultName: string;
135
98
  secretKey: string;
136
99
  } | undefined;
137
100
  };
138
101
  type SCIMAttribute = {
139
- /** Attribute data type */
140
- type: "string" | "number" | "boolean" | "datetime" | "complex";
141
- /** Attribute name */
142
- name: string;
143
- /** Attribute description */
144
- description?: string | undefined;
145
- /** Attribute mutability */
146
- mutability?: "readOnly" | "readWrite" | "writeOnly" | undefined;
147
- /** Whether the attribute is required */
148
- required?: boolean | undefined;
149
- /** Whether the attribute can have multiple values */
150
- multiValued?: boolean | undefined;
151
- /** Uniqueness constraint */
152
- uniqueness?: "none" | "server" | "global" | undefined;
153
- /** List of canonical values */
102
+ /** Attribute data type */type: "string" | "number" | "boolean" | "datetime" | "complex"; /** Attribute name */
103
+ name: string; /** Attribute description */
104
+ description?: string | undefined; /** Attribute mutability */
105
+ mutability?: "readOnly" | "readWrite" | "writeOnly" | undefined; /** Whether the attribute is required */
106
+ required?: boolean | undefined; /** Whether the attribute can have multiple values */
107
+ multiValued?: boolean | undefined; /** Uniqueness constraint */
108
+ uniqueness?: "none" | "server" | "global" | undefined; /** List of canonical values */
154
109
  canonicalValues?: string[] | null | undefined;
155
110
  subAttributes?: SCIMAttribute[] | null | undefined;
156
111
  };
157
112
  type SCIMAttributeMapping = {
158
- /** TailorDB field name to map to */
159
- tailorDBField: string;
160
- /** SCIM attribute path */
113
+ /** TailorDB field name to map to */tailorDBField: string; /** SCIM attribute path */
161
114
  scimPath: string;
162
115
  };
163
116
  type SCIMResource = {
164
- /** SCIM resource name */
165
- name: string;
166
- /** TailorDB namespace for the resource */
167
- tailorDBNamespace: string;
168
- /** TailorDB type name for the resource */
169
- tailorDBType: string;
170
- /** Core SCIM schema definition */
117
+ /** SCIM resource name */name: string; /** TailorDB namespace for the resource */
118
+ tailorDBNamespace: string; /** TailorDB type name for the resource */
119
+ tailorDBType: string; /** Core SCIM schema definition */
171
120
  coreSchema: {
172
- /** SCIM resource name */
173
- name: string;
121
+ /** SCIM resource name */name: string;
174
122
  attributes: {
175
- type: "string" | "number" | "boolean" | "datetime" | "complex";
176
- /** SCIM resource name */
123
+ type: "string" | "number" | "boolean" | "datetime" | "complex"; /** SCIM resource name */
177
124
  name: string;
178
125
  description?: string | undefined;
179
126
  mutability?: "readOnly" | "readWrite" | "writeOnly" | undefined;
@@ -183,25 +130,21 @@ type SCIMResource = {
183
130
  canonicalValues?: string[] | null | undefined;
184
131
  subAttributes?: any[] | null | undefined;
185
132
  }[];
186
- };
187
- /** Attribute mapping configuration */
133
+ }; /** Attribute mapping configuration */
188
134
  attributeMapping: {
189
135
  tailorDBField: string;
190
136
  scimPath: string;
191
137
  }[];
192
138
  };
193
139
  type SCIMConfig = {
194
- /** Machine user name for SCIM operations */
195
- machineUserName: string;
196
- /** SCIM authorization configuration */
140
+ /** Machine user name for SCIM operations */machineUserName: string; /** SCIM authorization configuration */
197
141
  authorization: {
198
142
  type: "oauth2" | "bearer";
199
143
  bearerSecret?: {
200
144
  vaultName: string;
201
145
  secretKey: string;
202
146
  } | undefined;
203
- };
204
- /** SCIM resource definitions */
147
+ }; /** SCIM resource definitions */
205
148
  resources: {
206
149
  name: string;
207
150
  tailorDBNamespace: string;
@@ -227,53 +170,39 @@ type SCIMConfig = {
227
170
  }[];
228
171
  };
229
172
  type TenantProvider = {
230
- /** TailorDB namespace for the tenant type */
231
- namespace: string;
232
- /** TailorDB type name for tenants */
233
- type: string;
234
- /** Field used as the tenant signature */
173
+ /** TailorDB namespace for the tenant type */namespace: string; /** TailorDB type name for tenants */
174
+ type: string; /** Field used as the tenant signature */
235
175
  signatureField: string;
236
176
  };
237
177
  //#endregion
238
178
  //#region src/types/executor.generated.d.ts
239
179
  type RecordTrigger = {
240
- /** Record event type */
241
- kind: "recordCreated" | "recordUpdated" | "recordDeleted";
242
- /** TailorDB type name to watch for events */
243
- typeName: string;
244
- /** Condition function to filter events */
180
+ /** Record event type */kind: "recordCreated" | "recordUpdated" | "recordDeleted"; /** TailorDB type name to watch for events */
181
+ typeName: string; /** Condition function to filter events */
245
182
  condition?: Function | undefined;
246
183
  };
247
184
  type ResolverExecutedTrigger = {
248
- kind: "resolverExecuted";
249
- /** Name of the resolver to trigger on */
250
- resolverName: string;
251
- /** Condition function to filter events */
185
+ kind: "resolverExecuted"; /** Name of the resolver to trigger on */
186
+ resolverName: string; /** Condition function to filter events */
252
187
  condition?: Function | undefined;
253
188
  };
254
189
  type ScheduleTriggerInput = {
255
- kind: "schedule";
256
- /** CRON expression for the schedule */
257
- cron: string;
258
- /** Timezone for the CRON schedule (default: UTC) */
190
+ kind: "schedule"; /** CRON expression for the schedule */
191
+ cron: string; /** Timezone for the CRON schedule (default: UTC) */
259
192
  timezone?: string | undefined;
260
193
  };
261
194
  type IncomingWebhookTrigger = {
262
195
  kind: "incomingWebhook";
263
196
  };
264
197
  type IdpUserTrigger = {
265
- /** IdP user event type */
266
- kind: "idpUserCreated" | "idpUserUpdated" | "idpUserDeleted";
198
+ /** IdP user event type */kind: "idpUserCreated" | "idpUserUpdated" | "idpUserDeleted";
267
199
  };
268
200
  type AuthAccessTokenTrigger = {
269
- /** Auth access token event type */
270
- kind: "authAccessTokenIssued" | "authAccessTokenRefreshed" | "authAccessTokenRevoked";
201
+ /** Auth access token event type */kind: "authAccessTokenIssued" | "authAccessTokenRefreshed" | "authAccessTokenRevoked";
271
202
  };
272
203
  type FunctionOperation = {
273
- kind: "function" | "jobFunction";
274
- /** Function implementation */
275
- body: Function;
276
- /** Auth invoker for the function execution */
204
+ kind: "function" | "jobFunction"; /** Function implementation */
205
+ body: Function; /** Auth invoker for the function execution */
277
206
  authInvoker?: {
278
207
  namespace: string;
279
208
  machineUserName: string;
@@ -281,24 +210,18 @@ type FunctionOperation = {
281
210
  };
282
211
  type GqlOperation = {
283
212
  kind: "graphql";
284
- query: string;
285
- /** Target application name for the GraphQL query */
286
- appName?: string | undefined;
287
- /** Function to compute GraphQL variables */
288
- variables?: Function | undefined;
289
- /** Auth invoker for the GraphQL execution */
213
+ query: string; /** Target application name for the GraphQL query */
214
+ appName?: string | undefined; /** Function to compute GraphQL variables */
215
+ variables?: Function | undefined; /** Auth invoker for the GraphQL execution */
290
216
  authInvoker?: {
291
217
  namespace: string;
292
218
  machineUserName: string;
293
219
  } | undefined;
294
220
  };
295
221
  type WebhookOperation = {
296
- kind: "webhook";
297
- /** Function returning the webhook URL */
298
- url: Function;
299
- /** Function to compute the request body */
300
- requestBody?: Function | undefined;
301
- /** HTTP headers for the webhook request */
222
+ kind: "webhook"; /** Function returning the webhook URL */
223
+ url: Function; /** Function to compute the request body */
224
+ requestBody?: Function | undefined; /** HTTP headers for the webhook request */
302
225
  headers?: {
303
226
  [x: string]: string | {
304
227
  vault: string;
@@ -318,9 +241,7 @@ type WorkflowOperation = {
318
241
  } | undefined;
319
242
  };
320
243
  type ExecutorInput = {
321
- /** Executor name */
322
- name: string;
323
- /** Event trigger configuration */
244
+ /** Executor name */name: string; /** Event trigger configuration */
324
245
  trigger: {
325
246
  kind: "recordCreated" | "recordUpdated" | "recordDeleted";
326
247
  typeName: string;
@@ -339,20 +260,14 @@ type ExecutorInput = {
339
260
  kind: "idpUserCreated" | "idpUserUpdated" | "idpUserDeleted";
340
261
  } | {
341
262
  kind: "authAccessTokenIssued" | "authAccessTokenRefreshed" | "authAccessTokenRevoked";
342
- };
343
- /** Operation to execute when triggered */
344
- operation: unknown;
345
- /** Executor description */
346
- description?: string | undefined;
347
- /** Whether the executor is disabled */
263
+ }; /** Operation to execute when triggered */
264
+ operation: unknown; /** Executor description */
265
+ description?: string | undefined; /** Whether the executor is disabled */
348
266
  disabled?: boolean | undefined;
349
267
  };
350
268
  type Executor = {
351
- /** Executor name */
352
- name: string;
353
- /** Whether the executor is disabled */
354
- disabled: boolean;
355
- /** Event trigger configuration */
269
+ /** Executor name */name: string; /** Whether the executor is disabled */
270
+ disabled: boolean; /** Event trigger configuration */
356
271
  trigger: {
357
272
  kind: "recordCreated" | "recordUpdated" | "recordDeleted";
358
273
  typeName: string;
@@ -371,8 +286,7 @@ type Executor = {
371
286
  kind: "idpUserCreated" | "idpUserUpdated" | "idpUserDeleted";
372
287
  } | {
373
288
  kind: "authAccessTokenIssued" | "authAccessTokenRefreshed" | "authAccessTokenRevoked";
374
- };
375
- /** Operation to execute when triggered */
289
+ }; /** Operation to execute when triggered */
376
290
  operation: {
377
291
  kind: "workflow";
378
292
  workflowName: string;
@@ -409,8 +323,7 @@ type Executor = {
409
323
  key: string;
410
324
  };
411
325
  } | undefined;
412
- };
413
- /** Executor description */
326
+ }; /** Executor description */
414
327
  description?: string | undefined;
415
328
  };
416
329
  //#endregion
@@ -419,9 +332,7 @@ type GeneratorConfig = z.input<typeof BaseGeneratorConfigSchema>;
419
332
  //#endregion
420
333
  //#region src/types/resolver.generated.d.ts
421
334
  type TailorFieldInput = {
422
- /** Field data type */
423
- type: "string" | "boolean" | "uuid" | "integer" | "float" | "decimal" | "enum" | "date" | "datetime" | "time" | "nested";
424
- /** Field metadata configuration */
335
+ /** Field data type */type: "string" | "boolean" | "uuid" | "integer" | "float" | "decimal" | "enum" | "date" | "datetime" | "time" | "nested"; /** Field metadata configuration */
425
336
  metadata: {
426
337
  required?: boolean | undefined;
427
338
  array?: boolean | undefined;
@@ -441,23 +352,17 @@ type TailorFieldInput = {
441
352
  };
442
353
  };
443
354
  type Resolver = {
444
- /** GraphQL operation type (query or mutation) */
445
- operation: "query" | "mutation";
446
- /** Resolver name */
447
- name: string;
448
- /** Resolver implementation function */
449
- body: Function;
450
- /** Output field definition */
355
+ /** GraphQL operation type (query or mutation) */operation: "query" | "mutation"; /** Resolver name */
356
+ name: string; /** Resolver implementation function */
357
+ body: Function; /** Output field definition */
451
358
  output: {
452
359
  type: "string" | "boolean" | "date" | "enum" | "uuid" | "integer" | "float" | "decimal" | "datetime" | "time" | "nested";
453
360
  metadata: {
454
361
  required?: boolean | undefined;
455
- array?: boolean | undefined;
456
- /** Resolver description */
362
+ array?: boolean | undefined; /** Resolver description */
457
363
  description?: string | undefined;
458
364
  allowedValues?: {
459
- value: string;
460
- /** Resolver description */
365
+ value: string; /** Resolver description */
461
366
  description?: string | undefined;
462
367
  }[] | undefined;
463
368
  hooks?: {
@@ -469,14 +374,11 @@ type Resolver = {
469
374
  fields: {
470
375
  [x: string]: any;
471
376
  };
472
- };
473
- /** Resolver description */
474
- description?: string | undefined;
475
- /** Input field definitions */
377
+ }; /** Resolver description */
378
+ description?: string | undefined; /** Input field definitions */
476
379
  input?: {
477
380
  [x: string]: any;
478
- } | undefined;
479
- /** Enable publishing events from this resolver */
381
+ } | undefined; /** Enable publishing events from this resolver */
480
382
  publishEvents?: boolean | undefined;
481
383
  };
482
384
  type ResolverInput = Resolver;
@@ -506,8 +408,7 @@ type TailorUser = {
506
408
  * The type of the user.
507
409
  * For unauthenticated users, this will be an empty string.
508
410
  */
509
- type: "user" | "machine_user" | "";
510
- /** The ID of the workspace the user belongs to. */
411
+ type: "user" | "machine_user" | ""; /** The ID of the workspace the user belongs to. */
511
412
  workspaceId: string;
512
413
  /**
513
414
  * A map of the user's attributes.
@@ -622,15 +523,15 @@ interface TailorField<Defined extends DefinedFieldMetadata = DefinedFieldMetadat
622
523
  /**
623
524
  * Validation function type
624
525
  */
625
- type ValidateFn<O, D$1 = unknown> = (args: {
526
+ type ValidateFn<O, D = unknown> = (args: {
626
527
  value: O;
627
- data: D$1;
528
+ data: D;
628
529
  user: TailorUser;
629
530
  }) => boolean;
630
531
  /**
631
532
  * Validation configuration with custom error message
632
533
  */
633
- type ValidateConfig<O, D$1 = unknown> = [ValidateFn<O, D$1>, string];
534
+ type ValidateConfig<O, D = unknown> = [ValidateFn<O, D>, string];
634
535
  /**
635
536
  * Field-level validation function
636
537
  */
@@ -831,13 +732,9 @@ type GqlOperationsInput = "query" | {
831
732
  read?: boolean | undefined;
832
733
  };
833
734
  type TailorDBTypeParsedSettings = {
834
- /** Custom plural form of the type name for GraphQL */
835
- pluralForm?: string | undefined;
836
- /** Enable aggregation queries for this type */
837
- aggregation?: boolean | undefined;
838
- /** Enable bulk upsert mutation for this type */
839
- bulkUpsert?: boolean | undefined;
840
- /** Configure GraphQL operations for this type. Use "query" for read-only mode, or an object for granular control. */
735
+ /** Custom plural form of the type name for GraphQL */pluralForm?: string | undefined; /** Enable aggregation queries for this type */
736
+ aggregation?: boolean | undefined; /** Enable bulk upsert mutation for this type */
737
+ bulkUpsert?: boolean | undefined; /** Configure GraphQL operations for this type. Use "query" for read-only mode, or an object for granular control. */
841
738
  gqlOperations?: {
842
739
  create?: boolean | undefined;
843
740
  update?: boolean | undefined;
@@ -1014,18 +911,13 @@ type RawPermissions = {
1014
911
  }[] | undefined;
1015
912
  };
1016
913
  type TailorDBServiceConfigInput = {
1017
- /** Glob patterns for TailorDB type definition files */
1018
- files: string[];
1019
- /** Glob patterns to exclude from type discovery */
1020
- ignores?: string[] | undefined;
1021
- /** URL for the ERD (Entity Relationship Diagram) site */
1022
- erdSite?: string | undefined;
1023
- /** Migration configuration */
914
+ /** Glob patterns for TailorDB type definition files */files: string[]; /** Glob patterns to exclude from type discovery */
915
+ ignores?: string[] | undefined; /** URL for the ERD (Entity Relationship Diagram) site */
916
+ erdSite?: string | undefined; /** Migration configuration */
1024
917
  migration?: {
1025
918
  directory: string;
1026
919
  machineUser?: string | undefined;
1027
- } | undefined;
1028
- /** Default GraphQL operations for all types in this service */
920
+ } | undefined; /** Default GraphQL operations for all types in this service */
1029
921
  gqlOperations?: "query" | {
1030
922
  create?: boolean | undefined;
1031
923
  update?: boolean | undefined;
@@ -1479,7 +1371,7 @@ interface TailorDBType$1<Fields extends Record<string, TailorAnyDBField> = any,
1479
1371
  * delete: [{ conditions: [[{ record: "ownerId" }, "=", { user: "id" }]], permit: true }],
1480
1372
  * })
1481
1373
  */
1482
- permission<U$1 extends object = User, P$1 extends TailorTypePermission<U$1, output<TailorDBType$1<Fields, User>>> = TailorTypePermission<U$1, output<TailorDBType$1<Fields, User>>>>(permission: P$1): TailorDBType$1<Fields, U$1>;
1374
+ permission<U extends object = User, P extends TailorTypePermission<U, output<TailorDBType$1<Fields, User>>> = TailorTypePermission<U, output<TailorDBType$1<Fields, User>>>>(permission: P): TailorDBType$1<Fields, U>;
1483
1375
  /**
1484
1376
  * Set GraphQL-level permissions controlling access to GraphQL operations.
1485
1377
  * @example
@@ -1491,7 +1383,7 @@ interface TailorDBType$1<Fields extends Record<string, TailorAnyDBField> = any,
1491
1383
  * },
1492
1384
  * ])
1493
1385
  */
1494
- gqlPermission<U$1 extends object = User, P$1 extends TailorTypeGqlPermission<U$1> = TailorTypeGqlPermission<U$1>>(permission: P$1): TailorDBType$1<Fields, U$1>;
1386
+ gqlPermission<U extends object = User, P extends TailorTypeGqlPermission<U> = TailorTypeGqlPermission<U>>(permission: P): TailorDBType$1<Fields, U>;
1495
1387
  /**
1496
1388
  * Set type description
1497
1389
  */
@@ -1499,7 +1391,7 @@ interface TailorDBType$1<Fields extends Record<string, TailorAnyDBField> = any,
1499
1391
  /**
1500
1392
  * Pick specific fields from the type
1501
1393
  */
1502
- pickFields<K$1 extends keyof Fields, const Opt extends FieldOptions>(keys: K$1[], options: Opt): { [P in K$1]: Fields[P$1] extends TailorDBField<infer D, infer _O> ? TailorDBField<Omit<D, "array"> & {
1394
+ pickFields<K extends keyof Fields, const Opt extends FieldOptions>(keys: K[], options: Opt): { [P in K]: Fields[P] extends TailorDBField<infer D, infer _O> ? TailorDBField<Omit<D, "array"> & {
1503
1395
  array: Opt extends {
1504
1396
  array: true;
1505
1397
  } ? true : D["array"];
@@ -1507,7 +1399,7 @@ interface TailorDBType$1<Fields extends Record<string, TailorAnyDBField> = any,
1507
1399
  /**
1508
1400
  * Omit specific fields from the type
1509
1401
  */
1510
- omitFields<K$1 extends keyof Fields>(keys: K$1[]): Omit<Fields, K$1>;
1402
+ omitFields<K extends keyof Fields>(keys: K[]): Omit<Fields, K>;
1511
1403
  /**
1512
1404
  * Plugin attachments for this type
1513
1405
  */
@@ -1517,7 +1409,7 @@ interface TailorDBType$1<Fields extends Record<string, TailorAnyDBField> = any,
1517
1409
  * @param config - Plugin configuration in the format { pluginId: config }
1518
1410
  * @returns The type with the plugin attached
1519
1411
  */
1520
- plugin<P$1 extends keyof PluginConfigs<keyof Fields & string>>(config: { [K in P$1]: PluginConfigs<keyof Fields & string>[K$1] }): TailorDBType$1<Fields, User>;
1412
+ plugin<P extends keyof PluginConfigs<keyof Fields & string>>(config: { [K in P]: PluginConfigs<keyof Fields & string>[K] }): TailorDBType$1<Fields, User>;
1521
1413
  }
1522
1414
  type TailorDBInstance<Fields extends Record<string, TailorAnyDBField> = any, User extends object = InferredAttributeMap> = TailorDBType$1<Fields, User>;
1523
1415
  declare const idField: TailorDBField<{
@@ -1640,9 +1532,9 @@ type UserAttributeListKey<User extends TailorDBInstance> = { [K in UserFieldKeys
1640
1532
  type UserAttributeMap<User extends TailorDBInstance> = { [K in UserAttributeKey<User>]?: true };
1641
1533
  type DisallowExtraKeys<T, Allowed extends PropertyKey> = T & { [K in Exclude<keyof T, Allowed>]: never };
1642
1534
  type AttributeListValue<User extends TailorDBInstance, Key extends UserAttributeListKey<User>> = Key extends keyof output<User> ? output<User>[Key] : never;
1643
- type AttributeListToTuple<User extends TailorDBInstance, AttributeList$1 extends readonly UserAttributeListKey<User>[]> = { [Index in keyof AttributeList$1]: AttributeList$1[Index] extends UserAttributeListKey<User> ? AttributeListValue<User, AttributeList$1[Index]> : never };
1644
- type AttributeMapSelectedKeys<User extends TailorDBInstance, AttributeMap$1 extends UserAttributeMap<User>> = Extract<{ [K in keyof AttributeMap$1]-?: undefined extends AttributeMap$1[K] ? never : K }[keyof AttributeMap$1], UserAttributeKey<User>>;
1645
- type UserProfile<User extends TailorDBInstance, AttributeMap$1 extends UserAttributeMap<User>, AttributeList$1 extends UserAttributeListKey<User>[]> = {
1535
+ type AttributeListToTuple<User extends TailorDBInstance, AttributeList extends readonly UserAttributeListKey<User>[]> = { [Index in keyof AttributeList]: AttributeList[Index] extends UserAttributeListKey<User> ? AttributeListValue<User, AttributeList[Index]> : never };
1536
+ type AttributeMapSelectedKeys<User extends TailorDBInstance, AttributeMap extends UserAttributeMap<User>> = Extract<{ [K in keyof AttributeMap]-?: undefined extends AttributeMap[K] ? never : K }[keyof AttributeMap], UserAttributeKey<User>>;
1537
+ type UserProfile<User extends TailorDBInstance, AttributeMap extends UserAttributeMap<User>, AttributeList extends UserAttributeListKey<User>[]> = {
1646
1538
  /**
1647
1539
  * TailorDB namespace where the user type is defined.
1648
1540
  *
@@ -1652,8 +1544,8 @@ type UserProfile<User extends TailorDBInstance, AttributeMap$1 extends UserAttri
1652
1544
  namespace?: string;
1653
1545
  type: User;
1654
1546
  usernameField: UsernameFieldKey<User>;
1655
- attributes?: DisallowExtraKeys<AttributeMap$1, UserAttributeKey<User>>;
1656
- attributeList?: AttributeList$1;
1547
+ attributes?: DisallowExtraKeys<AttributeMap, UserAttributeKey<User>>;
1548
+ attributeList?: AttributeList;
1657
1549
  };
1658
1550
  type MachineUserAttributeFields = Record<string, TailorField<DefinedFieldMetadata, unknown, FieldMetadata, TailorFieldType>>;
1659
1551
  type TailorFieldOutputValue<Field> = Field extends TailorField<DefinedFieldMetadata, infer Output, FieldMetadata, TailorFieldType> ? Output : never;
@@ -1665,33 +1557,33 @@ type MachineUserFromAttributes<Fields extends MachineUserAttributeFields> = (key
1665
1557
  }) & {
1666
1558
  attributeList?: string[];
1667
1559
  };
1668
- type MachineUser<User extends TailorDBInstance, AttributeMap$1 extends UserAttributeMap<User> = UserAttributeMap<User>, AttributeList$1 extends UserAttributeListKey<User>[] = [], MachineUserAttributes extends MachineUserAttributeFields | undefined = undefined> = IsAny<MachineUserAttributes> extends true ? IsAny<User> extends true ? {
1560
+ type MachineUser<User extends TailorDBInstance, AttributeMap extends UserAttributeMap<User> = UserAttributeMap<User>, AttributeList extends UserAttributeListKey<User>[] = [], MachineUserAttributes extends MachineUserAttributeFields | undefined = undefined> = IsAny<MachineUserAttributes> extends true ? IsAny<User> extends true ? {
1669
1561
  attributes: Record<string, AuthAttributeValue>;
1670
1562
  attributeList?: string[];
1671
- } : (AttributeMapSelectedKeys<User, AttributeMap$1> extends never ? {
1563
+ } : (AttributeMapSelectedKeys<User, AttributeMap> extends never ? {
1672
1564
  attributes?: never;
1673
1565
  } : {
1674
- attributes: { [K in AttributeMapSelectedKeys<User, AttributeMap$1>]: K extends keyof output<User> ? output<User>[K] : never } & { [K in Exclude<keyof output<User>, AttributeMapSelectedKeys<User, AttributeMap$1>>]?: never };
1675
- }) & ([] extends AttributeList$1 ? {
1566
+ attributes: { [K in AttributeMapSelectedKeys<User, AttributeMap>]: K extends keyof output<User> ? output<User>[K] : never } & { [K in Exclude<keyof output<User>, AttributeMapSelectedKeys<User, AttributeMap>>]?: never };
1567
+ }) & ([] extends AttributeList ? {
1676
1568
  attributeList?: never;
1677
1569
  } : {
1678
- attributeList: AttributeListToTuple<User, AttributeList$1>;
1570
+ attributeList: AttributeListToTuple<User, AttributeList>;
1679
1571
  }) : [MachineUserAttributes] extends [MachineUserAttributeFields] ? MachineUserFromAttributes<MachineUserAttributes> : IsAny<User> extends true ? {
1680
1572
  attributes: Record<string, AuthAttributeValue>;
1681
1573
  attributeList?: string[];
1682
- } : (AttributeMapSelectedKeys<User, AttributeMap$1> extends never ? {
1574
+ } : (AttributeMapSelectedKeys<User, AttributeMap> extends never ? {
1683
1575
  attributes?: never;
1684
1576
  } : {
1685
- attributes: { [K in AttributeMapSelectedKeys<User, AttributeMap$1>]: K extends keyof output<User> ? output<User>[K] : never } & { [K in Exclude<keyof output<User>, AttributeMapSelectedKeys<User, AttributeMap$1>>]?: never };
1686
- }) & ([] extends AttributeList$1 ? {
1577
+ attributes: { [K in AttributeMapSelectedKeys<User, AttributeMap>]: K extends keyof output<User> ? output<User>[K] : never } & { [K in Exclude<keyof output<User>, AttributeMapSelectedKeys<User, AttributeMap>>]?: never };
1578
+ }) & ([] extends AttributeList ? {
1687
1579
  attributeList?: never;
1688
1580
  } : {
1689
- attributeList: AttributeListToTuple<User, AttributeList$1>;
1581
+ attributeList: AttributeListToTuple<User, AttributeList>;
1690
1582
  });
1691
- type AuthServiceInput<User extends TailorDBInstance, AttributeMap$1 extends UserAttributeMap<User>, AttributeList$1 extends UserAttributeListKey<User>[], MachineUserNames extends string, MachineUserAttributes extends MachineUserAttributeFields | undefined = MachineUserAttributeFields | undefined> = {
1692
- userProfile?: UserProfile<User, AttributeMap$1, AttributeList$1>;
1583
+ type AuthServiceInput<User extends TailorDBInstance, AttributeMap extends UserAttributeMap<User>, AttributeList extends UserAttributeListKey<User>[], MachineUserNames extends string, MachineUserAttributes extends MachineUserAttributeFields | undefined = MachineUserAttributeFields | undefined> = {
1584
+ userProfile?: UserProfile<User, AttributeMap, AttributeList>;
1693
1585
  machineUserAttributes?: MachineUserAttributes;
1694
- machineUsers?: Record<MachineUserNames, MachineUser<User, AttributeMap$1, AttributeList$1, MachineUserAttributes>>;
1586
+ machineUsers?: Record<MachineUserNames, MachineUser<User, AttributeMap, AttributeList, MachineUserAttributes>>;
1695
1587
  oauth2Clients?: Record<string, OAuth2ClientInput>;
1696
1588
  idProvider?: IdProvider;
1697
1589
  scim?: SCIMConfig;
@@ -2116,4 +2008,4 @@ interface Plugin<TypeConfig = unknown, PluginConfig = unknown> {
2116
2008
  }
2117
2009
  //#endregion
2118
2010
  export { TailorFieldType as $, OAuth2ClientGrantType as A, IDToken as At, TailorDBInstance as B, TenantProvider as Bt, TailorDBType as C, RecordTrigger as Ct, AuthOwnConfig as D, WorkflowOperation as Dt, AuthExternalConfig as E, WebhookOperation as Et, UsernameFieldKey as F, SCIMAttribute as Ft, TailorTypePermission as G, db as H, ValueOperand as I, SCIMAttributeMapping as It, ArrayFieldOutput as J, unsafeAllowAllGqlPermission as K, TailorAnyDBField as L, SCIMAuthorization as Lt, UserAttributeKey as M, OAuth2ClientInput as Mt, UserAttributeListKey as N, OIDC as Nt, AuthServiceInput as O, AuthInvoker as Ot, UserAttributeMap as P, SAML as Pt, FieldOutput$1 as Q, TailorAnyDBType as R, SCIMConfig as Rt, TailorDBServiceInput as S, IncomingWebhookTrigger as St, AuthConfig as T, ScheduleTriggerInput as Tt, PermissionCondition as U, TailorDBType$1 as V, TailorTypeGqlPermission as W, FieldMetadata as X, DefinedFieldMetadata as Y, FieldOptions as Z, GeneratorResult as _, Executor as _t, PluginExecutorContext as a, AttributeList as at, TailorDBNamespaceData as b, GqlOperation as bt, PluginGeneratedExecutorWithFile as c, InferredAttributeMap as ct, PluginNamespaceProcessContext as d, AllowedValues as dt, TailorAnyField as et, PluginOutput as f, AllowedValuesOutput as ft, ExecutorReadyContext as g, AuthAccessTokenTrigger as gt, TypePluginOutput as h, GeneratorConfig as ht, PluginConfigs as i, output as it, SCIMAttributeType as j, IdProvider as jt, DefinedAuth as k, BuiltinIdP as kt, PluginGeneratedResolver as l, TailorUser as lt, TailorDBTypeForPlugin as m, ResolverInput as mt, Plugin as n, InferFieldsOutput as nt, PluginExecutorContextBase as o, AttributeMap as ot, PluginProcessContext as p, Resolver as pt, unsafeAllowAllTypePermission as q, PluginAttachment as r, JsonCompatible as rt, PluginGeneratedExecutor as s, InferredAttributeList as st, NamespacePluginOutput as t, TailorField as tt, PluginGeneratedType as u, unauthenticatedTailorUser as ut, ResolverNamespaceData as v, ExecutorInput as vt, TypeSourceInfoEntry as w, ResolverExecutedTrigger as wt, TailorDBReadyContext as x, IdpUserTrigger as xt, ResolverReadyContext as y, FunctionOperation as yt, TailorDBField as z, SCIMResource as zt };
2119
- //# sourceMappingURL=plugin-3sT6Tcq0.d.mts.map
2011
+ //# sourceMappingURL=plugin-zY5wvV82.d.mts.map