types-auth0-python 4.8.0.20250404__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (62) hide show
  1. auth0-stubs/METADATA.toml +3 -0
  2. auth0-stubs/__init__.pyi +7 -0
  3. auth0-stubs/asyncify.pyi +6 -0
  4. auth0-stubs/authentication/__init__.pyi +10 -0
  5. auth0-stubs/authentication/async_token_verifier.pyi +27 -0
  6. auth0-stubs/authentication/back_channel_login.pyi +4 -0
  7. auth0-stubs/authentication/base.pyi +31 -0
  8. auth0-stubs/authentication/client_authentication.pyi +13 -0
  9. auth0-stubs/authentication/database.pyi +21 -0
  10. auth0-stubs/authentication/delegated.pyi +12 -0
  11. auth0-stubs/authentication/enterprise.pyi +5 -0
  12. auth0-stubs/authentication/get_token.pyi +21 -0
  13. auth0-stubs/authentication/passwordless.pyi +5 -0
  14. auth0-stubs/authentication/pushed_authorization_requests.pyi +4 -0
  15. auth0-stubs/authentication/revoke_token.pyi +4 -0
  16. auth0-stubs/authentication/social.pyi +4 -0
  17. auth0-stubs/authentication/token_verifier.pyi +29 -0
  18. auth0-stubs/authentication/users.pyi +11 -0
  19. auth0-stubs/exceptions.pyi +14 -0
  20. auth0-stubs/management/__init__.pyi +63 -0
  21. auth0-stubs/management/actions.pyi +64 -0
  22. auth0-stubs/management/async_auth0.pyi +15 -0
  23. auth0-stubs/management/attack_protection.pyi +30 -0
  24. auth0-stubs/management/auth0.pyi +67 -0
  25. auth0-stubs/management/blacklists.pyi +21 -0
  26. auth0-stubs/management/branding.pyi +38 -0
  27. auth0-stubs/management/client_credentials.pyi +26 -0
  28. auth0-stubs/management/client_grants.pyi +60 -0
  29. auth0-stubs/management/clients.pyi +44 -0
  30. auth0-stubs/management/connections.pyi +48 -0
  31. auth0-stubs/management/custom_domains.pyi +28 -0
  32. auth0-stubs/management/device_credentials.pyi +44 -0
  33. auth0-stubs/management/email_templates.pyi +24 -0
  34. auth0-stubs/management/emails.pyi +26 -0
  35. auth0-stubs/management/grants.pyi +34 -0
  36. auth0-stubs/management/guardian.pyi +38 -0
  37. auth0-stubs/management/hooks.pyi +52 -0
  38. auth0-stubs/management/jobs.pyi +42 -0
  39. auth0-stubs/management/log_streams.pyi +29 -0
  40. auth0-stubs/management/logs.pyi +44 -0
  41. auth0-stubs/management/organizations.pyi +134 -0
  42. auth0-stubs/management/prompts.pyi +28 -0
  43. auth0-stubs/management/resource_servers.pyi +28 -0
  44. auth0-stubs/management/roles.pyi +63 -0
  45. auth0-stubs/management/rules.pyi +46 -0
  46. auth0-stubs/management/rules_configs.pyi +24 -0
  47. auth0-stubs/management/stats.pyi +24 -0
  48. auth0-stubs/management/tenants.pyi +22 -0
  49. auth0-stubs/management/tickets.pyi +22 -0
  50. auth0-stubs/management/user_blocks.pyi +26 -0
  51. auth0-stubs/management/users.pyi +117 -0
  52. auth0-stubs/management/users_by_email.pyi +24 -0
  53. auth0-stubs/py.typed +0 -0
  54. auth0-stubs/rest.pyi +48 -0
  55. auth0-stubs/rest_async.pyi +29 -0
  56. auth0-stubs/types.pyi +5 -0
  57. auth0-stubs/utils.pyi +1 -0
  58. types_auth0_python-4.8.0.20250404.dist-info/METADATA +45 -0
  59. types_auth0_python-4.8.0.20250404.dist-info/RECORD +62 -0
  60. types_auth0_python-4.8.0.20250404.dist-info/WHEEL +5 -0
  61. types_auth0_python-4.8.0.20250404.dist-info/licenses/LICENSE +237 -0
  62. types_auth0_python-4.8.0.20250404.dist-info/top_level.txt +1 -0
@@ -0,0 +1,3 @@
1
+ version = "4.8.*"
2
+ upstream_repository = "https://github.com/auth0/auth0-python"
3
+ requires = ["cryptography", "types-requests"]
@@ -0,0 +1,7 @@
1
+ from auth0.exceptions import (
2
+ Auth0Error as Auth0Error,
3
+ RateLimitError as RateLimitError,
4
+ TokenValidationError as TokenValidationError,
5
+ )
6
+
7
+ __all__ = ("Auth0Error", "RateLimitError", "TokenValidationError")
@@ -0,0 +1,6 @@
1
+ from auth0.authentication import Users as Users
2
+ from auth0.authentication.base import AuthenticationBase as AuthenticationBase
3
+ from auth0.rest import RestClientOptions as RestClientOptions
4
+ from auth0.rest_async import AsyncRestClient as AsyncRestClient
5
+
6
+ def asyncify(cls): ...
@@ -0,0 +1,10 @@
1
+ from .database import Database as Database
2
+ from .delegated import Delegated as Delegated
3
+ from .enterprise import Enterprise as Enterprise
4
+ from .get_token import GetToken as GetToken
5
+ from .passwordless import Passwordless as Passwordless
6
+ from .revoke_token import RevokeToken as RevokeToken
7
+ from .social import Social as Social
8
+ from .users import Users as Users
9
+
10
+ __all__ = ("Database", "Delegated", "Enterprise", "GetToken", "Passwordless", "RevokeToken", "Social", "Users")
@@ -0,0 +1,27 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from .. import TokenValidationError as TokenValidationError
4
+ from ..rest_async import AsyncRestClient as AsyncRestClient
5
+ from .token_verifier import (
6
+ AsymmetricSignatureVerifier as AsymmetricSignatureVerifier,
7
+ JwksFetcher as JwksFetcher,
8
+ TokenVerifier as TokenVerifier,
9
+ )
10
+
11
+ class AsyncAsymmetricSignatureVerifier(AsymmetricSignatureVerifier):
12
+ def __init__(self, jwks_url: str, algorithm: str = "RS256") -> None: ...
13
+ def set_session(self, session) -> None: ...
14
+
15
+ class AsyncJwksFetcher(JwksFetcher):
16
+ def __init__(self, *args, **kwargs) -> None: ...
17
+ def set_session(self, session) -> None: ...
18
+ async def get_key(self, key_id: str): ...
19
+
20
+ class AsyncTokenVerifier(TokenVerifier):
21
+ iss: Incomplete
22
+ aud: Incomplete
23
+ leeway: Incomplete
24
+ def __init__(
25
+ self, signature_verifier: AsyncAsymmetricSignatureVerifier, issuer: str, audience: str, leeway: int = 0
26
+ ) -> None: ...
27
+ def set_session(self, session) -> None: ...
@@ -0,0 +1,4 @@
1
+ from .base import AuthenticationBase as AuthenticationBase
2
+
3
+ class BackChannelLogin(AuthenticationBase):
4
+ def back_channel_login(self, binding_message: str, login_hint: str, scope: str, **kwargs): ...
@@ -0,0 +1,31 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from auth0.rest import RestClient as RestClient, RestClientOptions as RestClientOptions
4
+ from auth0.types import RequestData as RequestData
5
+
6
+ from .client_authentication import add_client_authentication as add_client_authentication
7
+
8
+ UNKNOWN_ERROR: str
9
+
10
+ class AuthenticationBase:
11
+ domain: Incomplete
12
+ client_id: Incomplete
13
+ client_secret: Incomplete
14
+ client_assertion_signing_key: Incomplete
15
+ client_assertion_signing_alg: Incomplete
16
+ protocol: Incomplete
17
+ client: Incomplete
18
+ def __init__(
19
+ self,
20
+ domain: str,
21
+ client_id: str,
22
+ client_secret: str | None = None,
23
+ client_assertion_signing_key: str | None = None,
24
+ client_assertion_signing_alg: str | None = None,
25
+ telemetry: bool = True,
26
+ timeout: float | tuple[float, float] = 5.0,
27
+ protocol: str = "https",
28
+ ) -> None: ...
29
+ def post(self, url: str, data: RequestData | None = None, headers: dict[str, str] | None = None): ...
30
+ def authenticated_post(self, url: str, data: dict[str, Incomplete], headers: dict[str, str] | None = None): ...
31
+ def get(self, url: str, params: dict[str, Incomplete] | None = None, headers: dict[str, str] | None = None): ...
@@ -0,0 +1,13 @@
1
+ from _typeshed import Incomplete
2
+
3
+ def create_client_assertion_jwt(
4
+ domain: str, client_id: str, client_assertion_signing_key: str, client_assertion_signing_alg: str | None
5
+ ) -> str: ...
6
+ def add_client_authentication(
7
+ payload: dict[str, Incomplete],
8
+ domain: str,
9
+ client_id: str,
10
+ client_secret: str | None,
11
+ client_assertion_signing_key: str | None,
12
+ client_assertion_signing_alg: str | None,
13
+ ) -> dict[str, Incomplete]: ...
@@ -0,0 +1,21 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from .base import AuthenticationBase as AuthenticationBase
4
+
5
+ class Database(AuthenticationBase):
6
+ def signup(
7
+ self,
8
+ email: str,
9
+ password: str,
10
+ connection: str,
11
+ username: str | None = None,
12
+ user_metadata: dict[str, Incomplete] | None = None,
13
+ given_name: str | None = None,
14
+ family_name: str | None = None,
15
+ name: str | None = None,
16
+ nickname: str | None = None,
17
+ picture: str | None = None,
18
+ ) -> dict[str, Incomplete]: ...
19
+ def change_password(
20
+ self, email: str, connection: str, password: str | None = None, organization: str | None = None
21
+ ) -> str: ...
@@ -0,0 +1,12 @@
1
+ from .base import AuthenticationBase as AuthenticationBase
2
+
3
+ class Delegated(AuthenticationBase):
4
+ def get_token(
5
+ self,
6
+ target: str,
7
+ api_type: str,
8
+ grant_type: str,
9
+ id_token: str | None = None,
10
+ refresh_token: str | None = None,
11
+ scope: str = "openid",
12
+ ): ...
@@ -0,0 +1,5 @@
1
+ from .base import AuthenticationBase as AuthenticationBase
2
+
3
+ class Enterprise(AuthenticationBase):
4
+ def saml_metadata(self): ...
5
+ def wsfed_metadata(self): ...
@@ -0,0 +1,21 @@
1
+ from .base import AuthenticationBase as AuthenticationBase
2
+
3
+ class GetToken(AuthenticationBase):
4
+ def authorization_code(self, code: str, redirect_uri: str | None, grant_type: str = "authorization_code"): ...
5
+ def authorization_code_pkce(
6
+ self, code_verifier: str, code: str, redirect_uri: str | None, grant_type: str = "authorization_code"
7
+ ): ...
8
+ def client_credentials(self, audience: str, grant_type: str = "client_credentials", organization: str | None = None): ...
9
+ def login(
10
+ self,
11
+ username: str,
12
+ password: str,
13
+ scope: str | None = None,
14
+ realm: str | None = None,
15
+ audience: str | None = None,
16
+ grant_type: str = "http://auth0.com/oauth/grant-type/password-realm",
17
+ forwarded_for: str | None = None,
18
+ ): ...
19
+ def refresh_token(self, refresh_token: str, scope: str = "", grant_type: str = "refresh_token"): ...
20
+ def passwordless_login(self, username: str, otp: str, realm: str, scope: str, audience: str): ...
21
+ def backchannel_login(self, auth_req_id: str, grant_type: str = "urn:openid:params:grant-type:ciba"): ...
@@ -0,0 +1,5 @@
1
+ from .base import AuthenticationBase as AuthenticationBase
2
+
3
+ class Passwordless(AuthenticationBase):
4
+ def email(self, email: str, send: str = "link", auth_params: dict[str, str] | None = None): ...
5
+ def sms(self, phone_number: str): ...
@@ -0,0 +1,4 @@
1
+ from .base import AuthenticationBase as AuthenticationBase
2
+
3
+ class PushedAuthorizationRequests(AuthenticationBase):
4
+ def pushed_authorization_request(self, response_type: str, redirect_uri: str, **kwargs): ...
@@ -0,0 +1,4 @@
1
+ from .base import AuthenticationBase as AuthenticationBase
2
+
3
+ class RevokeToken(AuthenticationBase):
4
+ def revoke_refresh_token(self, token: str): ...
@@ -0,0 +1,4 @@
1
+ from .base import AuthenticationBase as AuthenticationBase
2
+
3
+ class Social(AuthenticationBase):
4
+ def login(self, access_token: str, connection: str, scope: str = "openid"): ...
@@ -0,0 +1,29 @@
1
+ from _typeshed import Incomplete
2
+ from typing import ClassVar
3
+
4
+ from auth0.exceptions import TokenValidationError as TokenValidationError
5
+
6
+ class SignatureVerifier:
7
+ DISABLE_JWT_CHECKS: ClassVar[dict[str, bool]]
8
+ def __init__(self, algorithm: str) -> None: ...
9
+ async def verify_signature(self, token: str) -> dict[str, Incomplete]: ...
10
+
11
+ class SymmetricSignatureVerifier(SignatureVerifier):
12
+ def __init__(self, shared_secret: str, algorithm: str = "HS256") -> None: ...
13
+
14
+ class JwksFetcher:
15
+ CACHE_TTL: ClassVar[int]
16
+ def __init__(self, jwks_url: str, cache_ttl: int = ...) -> None: ...
17
+ def get_key(self, key_id: str): ...
18
+
19
+ class AsymmetricSignatureVerifier(SignatureVerifier):
20
+ def __init__(self, jwks_url: str, algorithm: str = "RS256", cache_ttl: int = ...) -> None: ...
21
+
22
+ class TokenVerifier:
23
+ iss: Incomplete
24
+ aud: Incomplete
25
+ leeway: Incomplete
26
+ def __init__(self, signature_verifier: SignatureVerifier, issuer: str, audience: str, leeway: int = 0) -> None: ...
27
+ def verify(
28
+ self, token: str, nonce: str | None = None, max_age: int | None = None, organization: str | None = None
29
+ ) -> dict[str, Incomplete]: ...
@@ -0,0 +1,11 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from auth0.rest import RestClient as RestClient, RestClientOptions as RestClientOptions
4
+ from auth0.types import TimeoutType as TimeoutType
5
+
6
+ class Users:
7
+ domain: Incomplete
8
+ protocol: Incomplete
9
+ client: Incomplete
10
+ def __init__(self, domain: str, telemetry: bool = True, timeout: TimeoutType = 5.0, protocol: str = "https") -> None: ...
11
+ def userinfo(self, access_token: str) -> dict[str, Incomplete]: ...
@@ -0,0 +1,14 @@
1
+ from _typeshed import Incomplete
2
+
3
+ class Auth0Error(Exception):
4
+ status_code: Incomplete
5
+ error_code: Incomplete
6
+ message: Incomplete
7
+ content: Incomplete
8
+ def __init__(self, status_code: int, error_code: str, message: str, content: Incomplete | None = None) -> None: ...
9
+
10
+ class RateLimitError(Auth0Error):
11
+ reset_at: Incomplete
12
+ def __init__(self, error_code: str, message: str, reset_at: int) -> None: ...
13
+
14
+ class TokenValidationError(Exception): ...
@@ -0,0 +1,63 @@
1
+ from .actions import Actions as Actions
2
+ from .attack_protection import AttackProtection as AttackProtection
3
+ from .auth0 import Auth0 as Auth0
4
+ from .blacklists import Blacklists as Blacklists
5
+ from .branding import Branding as Branding
6
+ from .client_credentials import ClientCredentials as ClientCredentials
7
+ from .client_grants import ClientGrants as ClientGrants
8
+ from .clients import Clients as Clients
9
+ from .connections import Connections as Connections
10
+ from .custom_domains import CustomDomains as CustomDomains
11
+ from .device_credentials import DeviceCredentials as DeviceCredentials
12
+ from .email_templates import EmailTemplates as EmailTemplates
13
+ from .emails import Emails as Emails
14
+ from .grants import Grants as Grants
15
+ from .guardian import Guardian as Guardian
16
+ from .hooks import Hooks as Hooks
17
+ from .jobs import Jobs as Jobs
18
+ from .log_streams import LogStreams as LogStreams
19
+ from .logs import Logs as Logs
20
+ from .organizations import Organizations as Organizations
21
+ from .resource_servers import ResourceServers as ResourceServers
22
+ from .roles import Roles as Roles
23
+ from .rules import Rules as Rules
24
+ from .rules_configs import RulesConfigs as RulesConfigs
25
+ from .stats import Stats as Stats
26
+ from .tenants import Tenants as Tenants
27
+ from .tickets import Tickets as Tickets
28
+ from .user_blocks import UserBlocks as UserBlocks
29
+ from .users import Users as Users
30
+ from .users_by_email import UsersByEmail as UsersByEmail
31
+
32
+ __all__ = (
33
+ "Auth0",
34
+ "Actions",
35
+ "AttackProtection",
36
+ "Blacklists",
37
+ "Branding",
38
+ "ClientCredentials",
39
+ "ClientGrants",
40
+ "Clients",
41
+ "Connections",
42
+ "CustomDomains",
43
+ "DeviceCredentials",
44
+ "EmailTemplates",
45
+ "Emails",
46
+ "Grants",
47
+ "Guardian",
48
+ "Hooks",
49
+ "Jobs",
50
+ "LogStreams",
51
+ "Logs",
52
+ "Organizations",
53
+ "ResourceServers",
54
+ "Roles",
55
+ "RulesConfigs",
56
+ "Rules",
57
+ "Stats",
58
+ "Tenants",
59
+ "Tickets",
60
+ "UserBlocks",
61
+ "UsersByEmail",
62
+ "Users",
63
+ )
@@ -0,0 +1,64 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from ..rest import RestClient as RestClient, RestClientOptions as RestClientOptions
4
+ from ..types import TimeoutType as TimeoutType
5
+
6
+ class Actions:
7
+ domain: Incomplete
8
+ protocol: Incomplete
9
+ client: Incomplete
10
+ def __init__(
11
+ self,
12
+ domain: str,
13
+ token: str,
14
+ telemetry: bool = True,
15
+ timeout: TimeoutType = 5.0,
16
+ protocol: str = "https",
17
+ rest_options: RestClientOptions | None = None,
18
+ ) -> None: ...
19
+ def get_actions(
20
+ self,
21
+ trigger_id: str | None = None,
22
+ action_name: str | None = None,
23
+ deployed: bool | None = None,
24
+ installed: bool = False,
25
+ page: int | None = None,
26
+ per_page: int | None = None,
27
+ ): ...
28
+ async def get_actions_async(
29
+ self,
30
+ trigger_id: str | None = None,
31
+ action_name: str | None = None,
32
+ deployed: bool | None = None,
33
+ installed: bool = False,
34
+ page: int | None = None,
35
+ per_page: int | None = None,
36
+ ): ...
37
+ def create_action(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
38
+ async def create_action_async(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
39
+ def update_action(self, id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
40
+ async def update_action_async(self, id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
41
+ def get_action(self, id: str) -> dict[str, Incomplete]: ...
42
+ async def get_action_async(self, id: str) -> dict[str, Incomplete]: ...
43
+ def delete_action(self, id: str, force: bool = False): ...
44
+ async def delete_action_async(self, id: str, force: bool = False): ...
45
+ def get_triggers(self) -> dict[str, Incomplete]: ...
46
+ async def get_triggers_async(self) -> dict[str, Incomplete]: ...
47
+ def get_execution(self, id: str) -> dict[str, Incomplete]: ...
48
+ async def get_execution_async(self, id: str) -> dict[str, Incomplete]: ...
49
+ def get_action_versions(self, id: str, page: int | None = None, per_page: int | None = None) -> dict[str, Incomplete]: ...
50
+ async def get_action_versions_async(
51
+ self, id: str, page: int | None = None, per_page: int | None = None
52
+ ) -> dict[str, Incomplete]: ...
53
+ def get_trigger_bindings(self, id: str, page: int | None = None, per_page: int | None = None) -> dict[str, Incomplete]: ...
54
+ async def get_trigger_bindings_async(
55
+ self, id: str, page: int | None = None, per_page: int | None = None
56
+ ) -> dict[str, Incomplete]: ...
57
+ def get_action_version(self, action_id: str, version_id: str) -> dict[str, Incomplete]: ...
58
+ async def get_action_version_async(self, action_id: str, version_id: str) -> dict[str, Incomplete]: ...
59
+ def deploy_action(self, id: str) -> dict[str, Incomplete]: ...
60
+ async def deploy_action_async(self, id: str) -> dict[str, Incomplete]: ...
61
+ def rollback_action_version(self, action_id: str, version_id: str) -> dict[str, Incomplete]: ...
62
+ async def rollback_action_version_async(self, action_id: str, version_id: str) -> dict[str, Incomplete]: ...
63
+ def update_trigger_bindings(self, id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
64
+ async def update_trigger_bindings_async(self, id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
@@ -0,0 +1,15 @@
1
+ from types import TracebackType
2
+ from typing_extensions import Self
3
+
4
+ from auth0.rest import RestClientOptions as RestClientOptions
5
+
6
+ from ..asyncify import asyncify as asyncify
7
+ from .auth0 import Auth0 as Auth0
8
+
9
+ class AsyncAuth0:
10
+ def __init__(self, domain: str, token: str, rest_options: RestClientOptions | None = None) -> None: ...
11
+ def set_session(self, session) -> None: ...
12
+ async def __aenter__(self) -> Self: ...
13
+ async def __aexit__(
14
+ self, exc_type: type[BaseException] | None, exc_val: BaseException | None, exc_tb: TracebackType | None
15
+ ) -> None: ...
@@ -0,0 +1,30 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from ..rest import RestClient as RestClient, RestClientOptions as RestClientOptions
4
+ from ..types import TimeoutType as TimeoutType
5
+
6
+ class AttackProtection:
7
+ domain: Incomplete
8
+ protocol: Incomplete
9
+ client: Incomplete
10
+ def __init__(
11
+ self,
12
+ domain: str,
13
+ token: str,
14
+ telemetry: bool = True,
15
+ timeout: TimeoutType = 5.0,
16
+ protocol: str = "https",
17
+ rest_options: RestClientOptions | None = None,
18
+ ) -> None: ...
19
+ def get_breached_password_detection(self) -> dict[str, Incomplete]: ...
20
+ async def get_breached_password_detection_async(self) -> dict[str, Incomplete]: ...
21
+ def update_breached_password_detection(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
22
+ async def update_breached_password_detection_async(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
23
+ def get_brute_force_protection(self) -> dict[str, Incomplete]: ...
24
+ async def get_brute_force_protection_async(self) -> dict[str, Incomplete]: ...
25
+ def update_brute_force_protection(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
26
+ async def update_brute_force_protection_async(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
27
+ def get_suspicious_ip_throttling(self) -> dict[str, Incomplete]: ...
28
+ async def get_suspicious_ip_throttling_async(self) -> dict[str, Incomplete]: ...
29
+ def update_suspicious_ip_throttling(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
30
+ async def update_suspicious_ip_throttling_async(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
@@ -0,0 +1,67 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from auth0.rest import RestClientOptions as RestClientOptions
4
+
5
+ from .actions import Actions as Actions
6
+ from .attack_protection import AttackProtection as AttackProtection
7
+ from .blacklists import Blacklists as Blacklists
8
+ from .branding import Branding as Branding
9
+ from .client_credentials import ClientCredentials as ClientCredentials
10
+ from .client_grants import ClientGrants as ClientGrants
11
+ from .clients import Clients as Clients
12
+ from .connections import Connections as Connections
13
+ from .custom_domains import CustomDomains as CustomDomains
14
+ from .device_credentials import DeviceCredentials as DeviceCredentials
15
+ from .email_templates import EmailTemplates as EmailTemplates
16
+ from .emails import Emails as Emails
17
+ from .grants import Grants as Grants
18
+ from .guardian import Guardian as Guardian
19
+ from .hooks import Hooks as Hooks
20
+ from .jobs import Jobs as Jobs
21
+ from .log_streams import LogStreams as LogStreams
22
+ from .logs import Logs as Logs
23
+ from .organizations import Organizations as Organizations
24
+ from .prompts import Prompts as Prompts
25
+ from .resource_servers import ResourceServers as ResourceServers
26
+ from .roles import Roles as Roles
27
+ from .rules import Rules as Rules
28
+ from .rules_configs import RulesConfigs as RulesConfigs
29
+ from .stats import Stats as Stats
30
+ from .tenants import Tenants as Tenants
31
+ from .tickets import Tickets as Tickets
32
+ from .user_blocks import UserBlocks as UserBlocks
33
+ from .users import Users as Users
34
+ from .users_by_email import UsersByEmail as UsersByEmail
35
+
36
+ class Auth0:
37
+ actions: Incomplete
38
+ attack_protection: Incomplete
39
+ blacklists: Incomplete
40
+ branding: Incomplete
41
+ client_credentials: Incomplete
42
+ client_grants: Incomplete
43
+ clients: Incomplete
44
+ connections: Incomplete
45
+ custom_domains: Incomplete
46
+ device_credentials: Incomplete
47
+ email_templates: Incomplete
48
+ emails: Incomplete
49
+ grants: Incomplete
50
+ guardian: Incomplete
51
+ hooks: Incomplete
52
+ jobs: Incomplete
53
+ log_streams: Incomplete
54
+ logs: Incomplete
55
+ organizations: Incomplete
56
+ prompts: Incomplete
57
+ resource_servers: Incomplete
58
+ roles: Incomplete
59
+ rules_configs: Incomplete
60
+ rules: Incomplete
61
+ stats: Incomplete
62
+ tenants: Incomplete
63
+ tickets: Incomplete
64
+ user_blocks: Incomplete
65
+ users_by_email: Incomplete
66
+ users: Incomplete
67
+ def __init__(self, domain: str, token: str, rest_options: RestClientOptions | None = None) -> None: ...
@@ -0,0 +1,21 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from ..rest import RestClient as RestClient, RestClientOptions as RestClientOptions
4
+ from ..types import TimeoutType as TimeoutType
5
+
6
+ class Blacklists:
7
+ url: Incomplete
8
+ client: Incomplete
9
+ def __init__(
10
+ self,
11
+ domain: str,
12
+ token: str,
13
+ telemetry: bool = True,
14
+ timeout: TimeoutType = 5.0,
15
+ protocol: str = "https",
16
+ rest_options: RestClientOptions | None = None,
17
+ ) -> None: ...
18
+ def get(self, aud: str | None = None) -> list[dict[str, str]]: ...
19
+ async def get_async(self, aud: str | None = None) -> list[dict[str, str]]: ...
20
+ def create(self, jti: str, aud: str | None = None) -> dict[str, str]: ...
21
+ async def create_async(self, jti: str, aud: str | None = None) -> dict[str, str]: ...
@@ -0,0 +1,38 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from ..rest import RestClient as RestClient, RestClientOptions as RestClientOptions
4
+ from ..types import TimeoutType as TimeoutType
5
+
6
+ class Branding:
7
+ domain: Incomplete
8
+ protocol: Incomplete
9
+ client: Incomplete
10
+ def __init__(
11
+ self,
12
+ domain: str,
13
+ token: str,
14
+ telemetry: bool = True,
15
+ timeout: TimeoutType = 5.0,
16
+ protocol: str = "https",
17
+ rest_options: RestClientOptions | None = None,
18
+ ) -> None: ...
19
+ def get(self) -> dict[str, Incomplete]: ...
20
+ async def get_async(self) -> dict[str, Incomplete]: ...
21
+ def update(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
22
+ async def update_async(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
23
+ def get_template_universal_login(self) -> dict[str, Incomplete]: ...
24
+ async def get_template_universal_login_async(self) -> dict[str, Incomplete]: ...
25
+ def delete_template_universal_login(self): ...
26
+ async def delete_template_universal_login_async(self): ...
27
+ def update_template_universal_login(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
28
+ async def update_template_universal_login_async(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
29
+ def get_default_branding_theme(self) -> dict[str, Incomplete]: ...
30
+ async def get_default_branding_theme_async(self) -> dict[str, Incomplete]: ...
31
+ def get_branding_theme(self, theme_id: str) -> dict[str, Incomplete]: ...
32
+ async def get_branding_theme_async(self, theme_id: str) -> dict[str, Incomplete]: ...
33
+ def delete_branding_theme(self, theme_id: str): ...
34
+ async def delete_branding_theme_async(self, theme_id: str): ...
35
+ def update_branding_theme(self, theme_id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
36
+ async def update_branding_theme_async(self, theme_id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
37
+ def create_branding_theme(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
38
+ async def create_branding_theme_async(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
@@ -0,0 +1,26 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from ..rest import RestClient as RestClient, RestClientOptions as RestClientOptions
4
+ from ..types import TimeoutType as TimeoutType
5
+
6
+ class ClientCredentials:
7
+ domain: Incomplete
8
+ protocol: Incomplete
9
+ client: Incomplete
10
+ def __init__(
11
+ self,
12
+ domain: str,
13
+ token: str,
14
+ telemetry: bool = True,
15
+ timeout: TimeoutType = 5.0,
16
+ protocol: str = "https",
17
+ rest_options: RestClientOptions | None = None,
18
+ ) -> None: ...
19
+ def all(self, client_id: str) -> list[dict[str, Incomplete]]: ...
20
+ async def all_async(self, client_id: str) -> list[dict[str, Incomplete]]: ...
21
+ def get(self, client_id: str, id: str) -> dict[str, Incomplete]: ...
22
+ async def get_async(self, client_id: str, id: str) -> dict[str, Incomplete]: ...
23
+ def create(self, client_id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
24
+ async def create_async(self, client_id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
25
+ def delete(self, client_id: str, id: str) -> dict[str, Incomplete]: ...
26
+ async def delete_async(self, client_id: str, id: str) -> dict[str, Incomplete]: ...
@@ -0,0 +1,60 @@
1
+ from _typeshed import Incomplete
2
+
3
+ from ..rest import RestClient as RestClient, RestClientOptions as RestClientOptions
4
+ from ..types import TimeoutType as TimeoutType
5
+
6
+ class ClientGrants:
7
+ domain: Incomplete
8
+ protocol: Incomplete
9
+ client: Incomplete
10
+ def __init__(
11
+ self,
12
+ domain: str,
13
+ token: str,
14
+ telemetry: bool = True,
15
+ timeout: TimeoutType = 5.0,
16
+ protocol: str = "https",
17
+ rest_options: RestClientOptions | None = None,
18
+ ) -> None: ...
19
+ def all(
20
+ self,
21
+ audience: str | None = None,
22
+ page: int | None = None,
23
+ per_page: int | None = None,
24
+ include_totals: bool = False,
25
+ client_id: str | None = None,
26
+ allow_any_organization: bool | None = None,
27
+ ) -> dict[str, Incomplete]: ...
28
+ async def all_async(
29
+ self,
30
+ audience: str | None = None,
31
+ page: int | None = None,
32
+ per_page: int | None = None,
33
+ include_totals: bool = False,
34
+ client_id: str | None = None,
35
+ allow_any_organization: bool | None = None,
36
+ ) -> dict[str, Incomplete]: ...
37
+ def create(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
38
+ async def create_async(self, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
39
+ def delete(self, id: str): ...
40
+ async def delete_async(self, id: str): ...
41
+ def update(self, id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
42
+ async def update_async(self, id: str, body: dict[str, Incomplete]) -> dict[str, Incomplete]: ...
43
+ def get_organizations(
44
+ self,
45
+ id: str,
46
+ page: int | None = None,
47
+ per_page: int | None = None,
48
+ include_totals: bool = False,
49
+ from_param: str | None = None,
50
+ take: int | None = None,
51
+ ) -> dict[str, Incomplete]: ...
52
+ async def get_organizations_async(
53
+ self,
54
+ id: str,
55
+ page: int | None = None,
56
+ per_page: int | None = None,
57
+ include_totals: bool = False,
58
+ from_param: str | None = None,
59
+ take: int | None = None,
60
+ ) -> dict[str, Incomplete]: ...