diff --git a/reference.md b/reference.md
index 7fe25e4d49..8e106cd1d1 100644
--- a/reference.md
+++ b/reference.md
@@ -31,7 +31,7 @@ Retrieve all actions.
```typescript
const pageableResponse = await client.actions.list({
- triggerId: "triggerId",
+ triggerId: "post-login",
actionName: "actionName",
deployed: true,
page: 1,
@@ -44,7 +44,7 @@ for await (const item of pageableResponse) {
// Or you can manually iterate page-by-page
let page = await client.actions.list({
- triggerId: "triggerId",
+ triggerId: "post-login",
actionName: "actionName",
deployed: true,
page: 1,
@@ -123,7 +123,7 @@ await client.actions.create({
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
});
@@ -746,7 +746,6 @@ Create a client grant for a machine-to-machine login flow. To learn more, read <
```typescript
await client.clientGrants.create({
- client_id: "client_id",
audience: "audience",
});
```
@@ -1051,6 +1050,7 @@ const pageableResponse = await client.clients.list({
is_global: true,
is_first_party: true,
app_type: "app_type",
+ external_client_id: "external_client_id",
q: "q",
});
for await (const item of pageableResponse) {
@@ -1067,6 +1067,7 @@ let page = await client.clients.list({
is_global: true,
is_first_party: true,
app_type: "app_type",
+ external_client_id: "external_client_id",
q: "q",
});
while (page.hasNextPage()) {
@@ -1187,6 +1188,140 @@ await client.clients.create({
+client.clients.previewCimdMetadata({ ...params }) -> Management.PreviewCimdMetadataResponseContent
+
+-
+
+#### 📝 Description
+
+
+-
+
+
+-
+
+ Fetches and validates a Client ID Metadata Document without creating a client.
+ Returns the raw metadata and how it would be mapped to Auth0 client fields.
+ This endpoint is useful for testing metadata URIs before creating CIMD clients.
+
+
+
+
+
+
+#### 🔌 Usage
+
+
+-
+
+
+-
+
+```typescript
+await client.clients.previewCimdMetadata({
+ external_client_id: "external_client_id",
+});
+```
+
+
+
+
+
+
+#### ⚙️ Parameters
+
+
+-
+
+
+-
+
+**request:** `Management.PreviewCimdMetadataRequestContent`
+
+
+
+
+
+-
+
+**requestOptions:** `ClientsClient.RequestOptions`
+
+
+
+
+
+
+
+
+
+
+client.clients.registerCimdClient({ ...params }) -> Management.RegisterCimdClientResponseContent
+
+-
+
+#### 📝 Description
+
+
+-
+
+
+-
+
+ Idempotent registration for Client ID Metadata Document (CIMD) clients.
+ Uses external_client_id as the unique identifier for upsert operations.
+ **Create:** Returns 201 when a new client is created (requires \
+
+
+
+
+
+
+#### 🔌 Usage
+
+
+-
+
+
+-
+
+```typescript
+await client.clients.registerCimdClient({
+ external_client_id: "external_client_id",
+});
+```
+
+
+
+
+
+
+#### ⚙️ Parameters
+
+
+-
+
+
+-
+
+**request:** `Management.RegisterCimdClientRequestContent`
+
+
+
+
+
+-
+
+**requestOptions:** `ClientsClient.RequestOptions`
+
+
+
+
+
+
+
+
+
+
client.clients.get(id, { ...params }) -> Management.GetClientResponseContent
-
@@ -2562,6 +2697,126 @@ await client.customDomains.create({
+client.customDomains.getDefault() -> Management.GetDefaultDomainResponseContent
+
+-
+
+#### 📝 Description
+
+
+-
+
+
+-
+
+Retrieve the tenant's default domain.
+
+
+
+
+
+
+#### 🔌 Usage
+
+
+-
+
+
+-
+
+```typescript
+await client.customDomains.getDefault();
+```
+
+
+
+
+
+
+#### ⚙️ Parameters
+
+
+-
+
+
+-
+
+**requestOptions:** `CustomDomainsClient.RequestOptions`
+
+
+
+
+
+
+
+
+
+
+client.customDomains.setDefault({ ...params }) -> Management.UpdateDefaultDomainResponseContent
+
+-
+
+#### 📝 Description
+
+
+-
+
+
+-
+
+Set the default custom domain for the tenant.
+
+
+
+
+
+
+#### 🔌 Usage
+
+
+-
+
+
+-
+
+```typescript
+await client.customDomains.setDefault({
+ domain: "domain",
+});
+```
+
+
+
+
+
+
+#### ⚙️ Parameters
+
+
+-
+
+
+-
+
+**request:** `Management.SetDefaultCustomDomainRequestContent`
+
+
+
+
+
+-
+
+**requestOptions:** `CustomDomainsClient.RequestOptions`
+
+
+
+
+
+
+
+
+
+
client.customDomains.get(id) -> Management.GetCustomDomainResponseContent
-
@@ -4688,6 +4943,69 @@ await client.groups.get("id");
+client.groups.delete(id) -> void
+
+-
+
+#### 📝 Description
+
+
+-
+
+
+-
+
+Delete a group by its ID.
+
+
+
+
+
+
+#### 🔌 Usage
+
+
+-
+
+
+-
+
+```typescript
+await client.groups.delete("id");
+```
+
+
+
+
+
+
+#### ⚙️ Parameters
+
+
+-
+
+
+-
+
+**id:** `string` — Unique identifier for the group (service-generated).
+
+
+
+
+
+-
+
+**requestOptions:** `GroupsClient.RequestOptions`
+
+
+
+
+
+
+
+
+
+
## Hooks
client.hooks.list({ ...params }) -> core.Page<Management.Hook, Management.ListHooksOffsetPaginatedResponseContent>
@@ -6062,7 +6380,6 @@ Create a new access control list for your client.
await client.networkAcls.create({
description: "description",
active: true,
- priority: 1.1,
rule: {
action: {},
scope: "management",
@@ -6196,7 +6513,6 @@ Update existing access control list for your client.
await client.networkAcls.set("id", {
description: "description",
active: true,
- priority: 1.1,
rule: {
action: {},
scope: "management",
@@ -6932,6 +7248,95 @@ await client.prompts.updateSettings();
## RefreshTokens
+client.refreshTokens.list({ ...params }) -> core.Page<Management.RefreshTokenResponseContent, Management.GetRefreshTokensPaginatedResponseContent>
+
+-
+
+#### 📝 Description
+
+
+-
+
+
+-
+
+Retrieve a paginated list of refresh tokens for a specific user, with optional filtering by client ID. Results are sorted by credential_id ascending.
+
+
+
+
+
+
+#### 🔌 Usage
+
+
+-
+
+
+-
+
+```typescript
+const pageableResponse = await client.refreshTokens.list({
+ user_id: "user_id",
+ client_id: "client_id",
+ from: "from",
+ take: 1,
+ fields: "fields",
+ include_fields: true,
+});
+for await (const item of pageableResponse) {
+ console.log(item);
+}
+
+// Or you can manually iterate page-by-page
+let page = await client.refreshTokens.list({
+ user_id: "user_id",
+ client_id: "client_id",
+ from: "from",
+ take: 1,
+ fields: "fields",
+ include_fields: true,
+});
+while (page.hasNextPage()) {
+ page = page.getNextPage();
+}
+
+// You can also access the underlying response
+const response = page.response;
+```
+
+
+
+
+
+
+#### ⚙️ Parameters
+
+
+-
+
+
+-
+
+**request:** `Management.GetRefreshTokensRequestParameters`
+
+
+
+
+
+-
+
+**requestOptions:** `RefreshTokensClient.RequestOptions`
+
+
+
+
+
+
+
+
+
+
client.refreshTokens.get(id) -> Management.GetRefreshTokenResponseContent
-
@@ -12289,7 +12694,7 @@ Retrieve the actions that are bound to a trigger. Once an action is created and
-
```typescript
-const pageableResponse = await client.actions.triggers.bindings.list("triggerId", {
+const pageableResponse = await client.actions.triggers.bindings.list("post-login", {
page: 1,
per_page: 1,
});
@@ -12298,7 +12703,7 @@ for await (const item of pageableResponse) {
}
// Or you can manually iterate page-by-page
-let page = await client.actions.triggers.bindings.list("triggerId", {
+let page = await client.actions.triggers.bindings.list("post-login", {
page: 1,
per_page: 1,
});
@@ -12378,7 +12783,7 @@ Update the actions that are bound (i.e. attached) to a trigger. Once an action i
-
```typescript
-await client.actions.triggers.bindings.updateMany("triggerId");
+await client.actions.triggers.bindings.updateMany("post-login");
```
@@ -21640,6 +22045,7 @@ await client.organizations.clientGrants.delete("id", "grant_id");
-
Retrieve list of all organization discovery domains associated with the specified organization.
+This endpoint is subject to eventual consistency; newly created, updated, or deleted discovery domains may not immediately appear in the response.
@@ -21802,6 +22208,7 @@ await client.organizations.discoveryDomains.create("id", {
Retrieve details about a single organization discovery domain specified by domain name.
+This endpoint is subject to eventual consistency; newly created, updated, or deleted discovery domains may not immediately appear in the response.
@@ -21873,6 +22280,7 @@ await client.organizations.discoveryDomains.getByName("id", "discovery_domain");
Retrieve details about a single organization discovery domain specified by ID.
+This endpoint is subject to eventual consistency; newly created, updated, or deleted discovery domains may not immediately appear in the response.
diff --git a/src/management/api/requests/requests.ts b/src/management/api/requests/requests.ts
index 60dfff8532..cd0efd66c9 100644
--- a/src/management/api/requests/requests.ts
+++ b/src/management/api/requests/requests.ts
@@ -7,7 +7,7 @@ import * as Management from "../index.js";
/**
* @example
* {
- * triggerId: "triggerId",
+ * triggerId: "post-login",
* actionName: "actionName",
* deployed: true,
* page: 1,
@@ -35,7 +35,7 @@ export interface ListActionsRequestParameters {
* {
* name: "name",
* supported_triggers: [{
- * id: "id"
+ * id: "post-login"
* }]
* }
*/
@@ -144,13 +144,12 @@ export interface ListClientGrantsRequestParameters {
/**
* @example
* {
- * client_id: "client_id",
* audience: "audience"
* }
*/
export interface CreateClientGrantRequestContent {
/** ID of the client. */
- client_id: string;
+ client_id?: string;
/** The audience (API identifier) of this client grant */
audience: string;
organization_usage?: Management.ClientGrantOrganizationUsageEnum;
@@ -171,7 +170,7 @@ export interface CreateClientGrantRequestContent {
*/
export interface UpdateClientGrantRequestContent {
/** Scopes allowed for this client grant. */
- scope?: string[];
+ scope?: string[] | null;
organization_usage?: Management.ClientGrantOrganizationNullableUsageEnum | null;
/** Controls allowing any organization to be used with this grant */
allow_any_organization?: boolean | null;
@@ -192,6 +191,7 @@ export interface UpdateClientGrantRequestContent {
* is_global: true,
* is_first_party: true,
* app_type: "app_type",
+ * external_client_id: "external_client_id",
* q: "q"
* }
*/
@@ -212,7 +212,9 @@ export interface ListClientsRequestParameters {
is_first_party?: boolean | null;
/** Optional filter by a comma-separated list of application types. */
app_type?: string | null;
- /** Advanced Query in Lucene syntax.
Permitted Queries:
- client_grant.organization_id:{organization_id}
- client_grant.allow_any_organization:true
Additional Restrictions:
- Cannot be used in combination with other filters
- Requires use of the from and take paging parameters (checkpoint paginatinon)
- Reduced rate limits apply. See Rate Limit Configurations
Note: Recent updates may not be immediately reflected in query results */
+ /** Optional filter by the Client ID Metadata Document URI for CIMD-registered clients. */
+ external_client_id?: string | null;
+ /** Advanced Query in Lucene syntax.
Permitted Queries:
- client_grant.organization_id:{organization_id}
- client_grant.allow_any_organization:true
Additional Restrictions:
- Cannot be used in combination with other filters
- Requires use of the from and take paging parameters (checkpoint paginatinon)
- Reduced rate limits apply. See Rate Limit Configurations
Note: Recent updates may not be immediately reflected in query results */
q?: string | null;
}
@@ -308,6 +310,28 @@ export interface CreateClientRequestContent {
async_approval_notification_channels?: Management.ClientAsyncApprovalNotificationsChannelsApiPostConfiguration;
}
+/**
+ * @example
+ * {
+ * external_client_id: "external_client_id"
+ * }
+ */
+export interface PreviewCimdMetadataRequestContent {
+ /** URL to the Client ID Metadata Document */
+ external_client_id: string;
+}
+
+/**
+ * @example
+ * {
+ * external_client_id: "external_client_id"
+ * }
+ */
+export interface RegisterCimdClientRequestContent {
+ /** URL to the Client ID Metadata Document. Acts as the unique identifier for upsert operations. */
+ external_client_id: string;
+}
+
/**
* @example
* {
@@ -393,7 +417,7 @@ export interface UpdateClientRequestContent {
organization_usage?: Management.ClientOrganizationUsagePatchEnum | null;
organization_require_behavior?: Management.ClientOrganizationRequireBehaviorPatchEnum | null;
/** Defines the available methods for organization discovery during the `pre_login_prompt`. Users can discover their organization either by `email`, `organization_name` or both. */
- organization_discovery_methods?: Management.ClientOrganizationDiscoveryEnum[];
+ organization_discovery_methods?: Management.ClientOrganizationDiscoveryEnum[] | null;
client_authentication_methods?: Management.ClientAuthenticationMethod | null;
/** Makes the use of Pushed Authorization Requests mandatory for this client */
require_pushed_authorization_requests?: boolean;
@@ -411,7 +435,9 @@ export interface UpdateClientRequestContent {
/** Specifies how long, in seconds, a Pushed Authorization Request URI remains valid */
par_request_expiry?: number | null;
express_configuration?: Management.ExpressConfigurationOrNull | null;
- async_approval_notification_channels?: Management.ClientAsyncApprovalNotificationsChannelsApiPatchConfiguration;
+ async_approval_notification_channels?:
+ | (Management.ClientAsyncApprovalNotificationsChannelsApiPatchConfiguration | undefined)
+ | null;
}
/**
@@ -495,7 +521,7 @@ export interface CreateConnectionRequestContent {
display_name?: string;
strategy: Management.ConnectionIdentityProviderEnum;
options?: Management.ConnectionPropertiesOptions;
- /** DEPRECATED property. Use the PATCH /v2/connections/{id}/clients endpoint to enable the connection for a set of clients. */
+ /** Use of this property is NOT RECOMMENDED. Use the PATCH /v2/connections/{id}/clients endpoint to enable the connection for a set of clients. */
enabled_clients?: string[];
/** true promotes to a domain-level connection so that third-party applications can use it. false does not promote the connection, so only first-party applications with the connection enabled can use it. (Defaults to false.) */
is_domain_connection?: boolean;
@@ -531,7 +557,7 @@ export interface UpdateConnectionRequestContent {
display_name?: string;
options?: Management.UpdateConnectionOptions | null;
/** DEPRECATED property. Use the PATCH /v2/connections/{id}/clients endpoint to enable or disable the connection for any clients. */
- enabled_clients?: string[];
+ enabled_clients?: string[] | null;
/** true promotes to a domain-level connection so that third-party applications can use it. false does not promote the connection, so only first-party applications with the connection enabled can use it. (Defaults to false.) */
is_domain_connection?: boolean;
/** Enables showing a button for the connection in the login page (new experience only). If false, it will be usable only by HRD. (Defaults to false.) */
@@ -553,7 +579,7 @@ export interface UpdateConnectionRequestContent {
* }
*/
export interface ListCustomDomainsRequestParameters {
- /** Query in Lucene query string syntax. */
+ /** Query in Lucene query string syntax. */
q?: string | null;
/** Comma-separated list of fields to include or exclude (based on value provided for include_fields) in the result. Leave empty to retrieve all fields. */
fields?: string | null;
@@ -582,6 +608,17 @@ export interface CreateCustomDomainRequestContent {
relying_party_identifier?: string;
}
+/**
+ * @example
+ * {
+ * domain: "domain"
+ * }
+ */
+export interface SetDefaultCustomDomainRequestContent {
+ /** The domain to set as the default custom domain. Must be a verified custom domain or the canonical domain. */
+ domain: string;
+}
+
/**
* @example
* {}
@@ -814,7 +851,7 @@ export interface GetFlowRequestParameters {
*/
export interface UpdateFlowRequestContent {
name?: string;
- actions?: Management.FlowAction[];
+ actions?: Management.FlowAction[] | null;
}
/**
@@ -1089,7 +1126,6 @@ export interface ListNetworkAclsRequestParameters {
* {
* description: "description",
* active: true,
- * priority: 1.1,
* rule: {
* action: {},
* scope: "management"
@@ -1101,7 +1137,7 @@ export interface CreateNetworkAclRequestContent {
/** Indicates whether or not this access control list is actively being used */
active: boolean;
/** Indicates the order in which the ACL will be evaluated relative to other ACL rules. */
- priority: number;
+ priority?: number;
rule: Management.NetworkAclRule;
}
@@ -1110,7 +1146,6 @@ export interface CreateNetworkAclRequestContent {
* {
* description: "description",
* active: true,
- * priority: 1.1,
* rule: {
* action: {},
* scope: "management"
@@ -1122,7 +1157,7 @@ export interface SetNetworkAclRequestContent {
/** Indicates whether or not this access control list is actively being used */
active: boolean;
/** Indicates the order in which the ACL will be evaluated relative to other ACL rules. */
- priority: number;
+ priority?: number;
rule: Management.NetworkAclRule;
}
@@ -1200,6 +1235,32 @@ export interface UpdateSettingsRequestContent {
webauthn_platform_first_factor?: boolean | null;
}
+/**
+ * @example
+ * {
+ * user_id: "user_id",
+ * client_id: "client_id",
+ * from: "from",
+ * take: 1,
+ * fields: "fields",
+ * include_fields: true
+ * }
+ */
+export interface GetRefreshTokensRequestParameters {
+ /** ID of the user whose refresh tokens to retrieve. Required. */
+ user_id: string;
+ /** Filter results by client ID. Only valid when user_id is provided. */
+ client_id?: string | null;
+ /** An opaque cursor from which to start the selection (exclusive). Expires after 24 hours. Obtained from the next property of a previous response. */
+ from?: string | null;
+ /** Number of results per page. Defaults to 50. */
+ take?: number | null;
+ /** Comma-separated list of fields to include or exclude (based on value provided for include_fields) in the result. Leave empty to retrieve all fields. */
+ fields?: string | null;
+ /** Whether specified fields are to be included (true) or excluded (false). */
+ include_fields?: boolean | null;
+}
+
/**
* @example
* {}
@@ -1249,6 +1310,8 @@ export interface CreateResourceServerRequestContent {
signing_secret?: string;
/** Whether refresh tokens can be issued for this API (true) or not (false). */
allow_offline_access?: boolean;
+ /** Whether Online Refresh Tokens can be issued for this API (true) or not (false). */
+ allow_online_access?: boolean;
/** Expiration value (in seconds) for access tokens issued for this API from the token endpoint. */
token_lifetime?: number;
token_dialect?: Management.ResourceServerTokenDialectSchemaEnum;
@@ -1258,7 +1321,7 @@ export interface CreateResourceServerRequestContent {
enforce_policies?: boolean;
token_encryption?: Management.ResourceServerTokenEncryption | null;
consent_policy?: Management.ResourceServerConsentPolicyEnum | null;
- authorization_details?: unknown[];
+ authorization_details?: unknown[] | null;
proof_of_possession?: Management.ResourceServerProofOfPossession | null;
subject_type_authorization?: Management.ResourceServerSubjectTypeAuthorization;
}
@@ -1290,6 +1353,8 @@ export interface UpdateResourceServerRequestContent {
skip_consent_for_verifiable_first_party_clients?: boolean;
/** Whether refresh tokens can be issued for this API (true) or not (false). */
allow_offline_access?: boolean;
+ /** Whether Online Refresh Tokens can be issued for this API (true) or not (false). */
+ allow_online_access?: boolean;
/** Expiration value (in seconds) for access tokens issued for this API from the token endpoint. */
token_lifetime?: number;
token_dialect?: Management.ResourceServerTokenDialectSchemaEnum;
@@ -1297,7 +1362,7 @@ export interface UpdateResourceServerRequestContent {
enforce_policies?: boolean;
token_encryption?: Management.ResourceServerTokenEncryption | null;
consent_policy?: Management.ResourceServerConsentPolicyEnum | null;
- authorization_details?: unknown[];
+ authorization_details?: unknown[] | null;
proof_of_possession?: Management.ResourceServerProofOfPossession | null;
subject_type_authorization?: Management.ResourceServerSubjectTypeAuthorization;
}
@@ -1727,7 +1792,7 @@ export interface ListUsersRequestParameters {
fields?: string | null;
/** Whether specified fields are to be included (true) or excluded (false). */
include_fields?: boolean | null;
- /** Query in Lucene query string syntax. Some query types cannot be used on metadata fields, for details see Searchable Fields. */
+ /** Query in Lucene query string syntax. Some query types cannot be used on metadata fields, for details see Searchable Fields. */
q?: string | null;
/** The version of the search engine */
search_engine?: Management.SearchEngineVersionsEnum | null;
@@ -2370,6 +2435,8 @@ export interface PostClientCredentialRequestContent {
parse_expiry_from_cert?: boolean;
/** The ISO 8601 formatted date representing the expiration of the credential. If not specified (not recommended), the credential never expires. Applies to `public_key` credential type. */
expires_at?: string;
+ /** Optional kid (Key ID), used to uniquely identify the credential. If not specified, a kid value will be auto-generated. The kid header parameter in JWTs sent by your client should match this value. Valid format is [0-9a-zA-Z-_]{10,64} */
+ kid?: string;
}
/**
@@ -3290,13 +3357,13 @@ export interface BulkUpdateAculRequestContent {
export interface UpdateAculRequestContent {
/** Rendering mode */
rendering_mode?: Management.AculRenderingModeEnum;
- context_configuration?: Management.AculContextConfiguration;
+ context_configuration?: (Management.AculContextConfiguration | undefined) | null;
/** Override Universal Login default head tags */
default_head_tags_disabled?: boolean | null;
/** Use page template with ACUL */
use_page_template?: boolean | null;
/** An array of head tags */
- head_tags?: Management.AculHeadTag[];
+ head_tags?: Management.AculHeadTag[] | null;
filters?: Management.AculFilters | null;
}
@@ -3476,7 +3543,7 @@ export interface UpdateTenantSettingsRequestContent {
/** Whether to accept an organization name instead of an ID on auth endpoints */
allow_organization_name_in_authentication_api?: boolean | null;
/** Supported ACR values */
- acr_values_supported?: string[];
+ acr_values_supported?: string[] | null;
mtls?: Management.TenantSettingsMtls | null;
/** Enables the use of Pushed Authorization Requests */
pushed_authorization_requests_supported?: boolean | null;
diff --git a/src/management/api/resources/actions/client/Client.ts b/src/management/api/resources/actions/client/Client.ts
index 1822ca8234..36ba1e283d 100644
--- a/src/management/api/resources/actions/client/Client.ts
+++ b/src/management/api/resources/actions/client/Client.ts
@@ -59,7 +59,7 @@ export class ActionsClient {
*
* @example
* await client.actions.list({
- * triggerId: "triggerId",
+ * triggerId: "post-login",
* actionName: "actionName",
* deployed: true,
* page: 1,
@@ -77,7 +77,7 @@ export class ActionsClient {
): Promise> => {
const { triggerId, actionName, deployed, page = 0, per_page: perPage = 50, installed } = request;
const _queryParams: Record = {
- triggerId,
+ triggerId: triggerId !== undefined ? triggerId : undefined,
actionName,
deployed,
page,
@@ -171,7 +171,7 @@ export class ActionsClient {
* await client.actions.create({
* name: "name",
* supported_triggers: [{
- * id: "id"
+ * id: "post-login"
* }]
* })
*/
diff --git a/src/management/api/resources/actions/resources/triggers/resources/bindings/client/Client.ts b/src/management/api/resources/actions/resources/triggers/resources/bindings/client/Client.ts
index 375401eccf..d6bed119e9 100644
--- a/src/management/api/resources/actions/resources/triggers/resources/bindings/client/Client.ts
+++ b/src/management/api/resources/actions/resources/triggers/resources/bindings/client/Client.ts
@@ -38,7 +38,7 @@ export class BindingsClient {
* @throws {@link Management.TooManyRequestsError}
*
* @example
- * await client.actions.triggers.bindings.list("triggerId", {
+ * await client.actions.triggers.bindings.list("post-login", {
* page: 1,
* per_page: 1
* })
@@ -147,7 +147,7 @@ export class BindingsClient {
* @throws {@link Management.TooManyRequestsError}
*
* @example
- * await client.actions.triggers.bindings.updateMany("triggerId")
+ * await client.actions.triggers.bindings.updateMany("post-login")
*/
public updateMany(
triggerId: Management.ActionTriggerTypeEnum,
diff --git a/src/management/api/resources/clientGrants/client/Client.ts b/src/management/api/resources/clientGrants/client/Client.ts
index 41575f4b21..b01fd109b3 100644
--- a/src/management/api/resources/clientGrants/client/Client.ts
+++ b/src/management/api/resources/clientGrants/client/Client.ts
@@ -155,7 +155,6 @@ export class ClientGrantsClient {
*
* @example
* await client.clientGrants.create({
- * client_id: "client_id",
* audience: "audience"
* })
*/
diff --git a/src/management/api/resources/clients/client/Client.ts b/src/management/api/resources/clients/client/Client.ts
index 2f4c1e5549..53cc05e2c5 100644
--- a/src/management/api/resources/clients/client/Client.ts
+++ b/src/management/api/resources/clients/client/Client.ts
@@ -87,6 +87,7 @@ export class ClientsClient {
* is_global: true,
* is_first_party: true,
* app_type: "app_type",
+ * external_client_id: "external_client_id",
* q: "q"
* })
*/
@@ -107,6 +108,7 @@ export class ClientsClient {
is_global: isGlobal,
is_first_party: isFirstParty,
app_type: appType,
+ external_client_id: externalClientId,
q,
} = request;
const _queryParams: Record = {
@@ -118,6 +120,7 @@ export class ClientsClient {
is_global: isGlobal,
is_first_party: isFirstParty,
app_type: appType,
+ external_client_id: externalClientId,
q,
};
const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest();
@@ -289,6 +292,181 @@ export class ClientsClient {
return handleNonStatusCodeError(_response.error, _response.rawResponse, "POST", "/clients");
}
+ /**
+ *
+ * Fetches and validates a Client ID Metadata Document without creating a client.
+ * Returns the raw metadata and how it would be mapped to Auth0 client fields.
+ * This endpoint is useful for testing metadata URIs before creating CIMD clients.
+ *
+ *
+ * @param {Management.PreviewCimdMetadataRequestContent} request
+ * @param {ClientsClient.RequestOptions} requestOptions - Request-specific configuration.
+ *
+ * @throws {@link Management.BadRequestError}
+ * @throws {@link Management.UnauthorizedError}
+ * @throws {@link Management.ForbiddenError}
+ * @throws {@link Management.TooManyRequestsError}
+ * @throws {@link Management.InternalServerError}
+ *
+ * @example
+ * await client.clients.previewCimdMetadata({
+ * external_client_id: "external_client_id"
+ * })
+ */
+ public previewCimdMetadata(
+ request: Management.PreviewCimdMetadataRequestContent,
+ requestOptions?: ClientsClient.RequestOptions,
+ ): core.HttpResponsePromise {
+ return core.HttpResponsePromise.fromPromise(this.__previewCimdMetadata(request, requestOptions));
+ }
+
+ private async __previewCimdMetadata(
+ request: Management.PreviewCimdMetadataRequestContent,
+ requestOptions?: ClientsClient.RequestOptions,
+ ): Promise> {
+ const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest();
+ let _headers: core.Fetcher.Args["headers"] = mergeHeaders(
+ _authRequest.headers,
+ this._options?.headers,
+ requestOptions?.headers,
+ );
+ const _response = await (this._options.fetcher ?? core.fetcher)({
+ url: core.url.join(
+ (await core.Supplier.get(this._options.baseUrl)) ??
+ (await core.Supplier.get(this._options.environment)) ??
+ environments.ManagementEnvironment.Default,
+ "clients/cimd/preview",
+ ),
+ method: "POST",
+ headers: _headers,
+ contentType: "application/json",
+ queryParameters: requestOptions?.queryParams,
+ requestType: "json",
+ body: request,
+ timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000,
+ maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries,
+ abortSignal: requestOptions?.abortSignal,
+ fetchFn: this._options?.fetch,
+ logging: this._options.logging,
+ });
+ if (_response.ok) {
+ return {
+ data: _response.body as Management.PreviewCimdMetadataResponseContent,
+ rawResponse: _response.rawResponse,
+ };
+ }
+
+ if (_response.error.reason === "status-code") {
+ switch (_response.error.statusCode) {
+ case 400:
+ throw new Management.BadRequestError(_response.error.body as unknown, _response.rawResponse);
+ case 401:
+ throw new Management.UnauthorizedError(_response.error.body as unknown, _response.rawResponse);
+ case 403:
+ throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse);
+ case 429:
+ throw new Management.TooManyRequestsError(_response.error.body as unknown, _response.rawResponse);
+ case 500:
+ throw new Management.InternalServerError(_response.error.body as unknown, _response.rawResponse);
+ default:
+ throw new errors.ManagementError({
+ statusCode: _response.error.statusCode,
+ body: _response.error.body,
+ rawResponse: _response.rawResponse,
+ });
+ }
+ }
+
+ return handleNonStatusCodeError(_response.error, _response.rawResponse, "POST", "/clients/cimd/preview");
+ }
+
+ /**
+ *
+ * Idempotent registration for Client ID Metadata Document (CIMD) clients.
+ * Uses external_client_id as the unique identifier for upsert operations.
+ * **Create:** Returns 201 when a new client is created (requires \
+ *
+ * @param {Management.RegisterCimdClientRequestContent} request
+ * @param {ClientsClient.RequestOptions} requestOptions - Request-specific configuration.
+ *
+ * @throws {@link Management.BadRequestError}
+ * @throws {@link Management.UnauthorizedError}
+ * @throws {@link Management.ForbiddenError}
+ * @throws {@link Management.TooManyRequestsError}
+ * @throws {@link Management.InternalServerError}
+ *
+ * @example
+ * await client.clients.registerCimdClient({
+ * external_client_id: "external_client_id"
+ * })
+ */
+ public registerCimdClient(
+ request: Management.RegisterCimdClientRequestContent,
+ requestOptions?: ClientsClient.RequestOptions,
+ ): core.HttpResponsePromise {
+ return core.HttpResponsePromise.fromPromise(this.__registerCimdClient(request, requestOptions));
+ }
+
+ private async __registerCimdClient(
+ request: Management.RegisterCimdClientRequestContent,
+ requestOptions?: ClientsClient.RequestOptions,
+ ): Promise> {
+ const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest();
+ let _headers: core.Fetcher.Args["headers"] = mergeHeaders(
+ _authRequest.headers,
+ this._options?.headers,
+ requestOptions?.headers,
+ );
+ const _response = await (this._options.fetcher ?? core.fetcher)({
+ url: core.url.join(
+ (await core.Supplier.get(this._options.baseUrl)) ??
+ (await core.Supplier.get(this._options.environment)) ??
+ environments.ManagementEnvironment.Default,
+ "clients/cimd/register",
+ ),
+ method: "POST",
+ headers: _headers,
+ contentType: "application/json",
+ queryParameters: requestOptions?.queryParams,
+ requestType: "json",
+ body: request,
+ timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000,
+ maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries,
+ abortSignal: requestOptions?.abortSignal,
+ fetchFn: this._options?.fetch,
+ logging: this._options.logging,
+ });
+ if (_response.ok) {
+ return {
+ data: _response.body as Management.RegisterCimdClientResponseContent,
+ rawResponse: _response.rawResponse,
+ };
+ }
+
+ if (_response.error.reason === "status-code") {
+ switch (_response.error.statusCode) {
+ case 400:
+ throw new Management.BadRequestError(_response.error.body as unknown, _response.rawResponse);
+ case 401:
+ throw new Management.UnauthorizedError(_response.error.body as unknown, _response.rawResponse);
+ case 403:
+ throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse);
+ case 429:
+ throw new Management.TooManyRequestsError(_response.error.body as unknown, _response.rawResponse);
+ case 500:
+ throw new Management.InternalServerError(_response.error.body as unknown, _response.rawResponse);
+ default:
+ throw new errors.ManagementError({
+ statusCode: _response.error.statusCode,
+ body: _response.error.body,
+ rawResponse: _response.rawResponse,
+ });
+ }
+ }
+
+ return handleNonStatusCodeError(_response.error, _response.rawResponse, "POST", "/clients/cimd/register");
+ }
+
/**
* Retrieve client details by ID. Clients are SSO connections or Applications linked with your Auth0 tenant. A list of fields to include or exclude may also be specified.
* For more information, read Applications in Auth0 and Single Sign-On.
diff --git a/src/management/api/resources/customDomains/client/Client.ts b/src/management/api/resources/customDomains/client/Client.ts
index 1a7d5a151a..c14ef7541b 100644
--- a/src/management/api/resources/customDomains/client/Client.ts
+++ b/src/management/api/resources/customDomains/client/Client.ts
@@ -205,6 +205,151 @@ export class CustomDomainsClient {
return handleNonStatusCodeError(_response.error, _response.rawResponse, "POST", "/custom-domains");
}
+ /**
+ * Retrieve the tenant's default domain.
+ *
+ * @param {CustomDomainsClient.RequestOptions} requestOptions - Request-specific configuration.
+ *
+ * @throws {@link Management.UnauthorizedError}
+ * @throws {@link Management.ForbiddenError}
+ * @throws {@link Management.TooManyRequestsError}
+ *
+ * @example
+ * await client.customDomains.getDefault()
+ */
+ public getDefault(
+ requestOptions?: CustomDomainsClient.RequestOptions,
+ ): core.HttpResponsePromise {
+ return core.HttpResponsePromise.fromPromise(this.__getDefault(requestOptions));
+ }
+
+ private async __getDefault(
+ requestOptions?: CustomDomainsClient.RequestOptions,
+ ): Promise> {
+ const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest();
+ let _headers: core.Fetcher.Args["headers"] = mergeHeaders(
+ _authRequest.headers,
+ this._options?.headers,
+ requestOptions?.headers,
+ );
+ const _response = await (this._options.fetcher ?? core.fetcher)({
+ url: core.url.join(
+ (await core.Supplier.get(this._options.baseUrl)) ??
+ (await core.Supplier.get(this._options.environment)) ??
+ environments.ManagementEnvironment.Default,
+ "custom-domains/default",
+ ),
+ method: "GET",
+ headers: _headers,
+ queryParameters: requestOptions?.queryParams,
+ timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000,
+ maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries,
+ abortSignal: requestOptions?.abortSignal,
+ fetchFn: this._options?.fetch,
+ logging: this._options.logging,
+ });
+ if (_response.ok) {
+ return {
+ data: _response.body as Management.GetDefaultDomainResponseContent,
+ rawResponse: _response.rawResponse,
+ };
+ }
+
+ if (_response.error.reason === "status-code") {
+ switch (_response.error.statusCode) {
+ case 401:
+ throw new Management.UnauthorizedError(_response.error.body as unknown, _response.rawResponse);
+ case 403:
+ throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse);
+ case 429:
+ throw new Management.TooManyRequestsError(_response.error.body as unknown, _response.rawResponse);
+ default:
+ throw new errors.ManagementError({
+ statusCode: _response.error.statusCode,
+ body: _response.error.body,
+ rawResponse: _response.rawResponse,
+ });
+ }
+ }
+
+ return handleNonStatusCodeError(_response.error, _response.rawResponse, "GET", "/custom-domains/default");
+ }
+
+ /**
+ * Set the default custom domain for the tenant.
+ *
+ * @param {Management.SetDefaultCustomDomainRequestContent} request
+ * @param {CustomDomainsClient.RequestOptions} requestOptions - Request-specific configuration.
+ *
+ * @throws {@link Management.BadRequestError}
+ * @throws {@link Management.ForbiddenError}
+ *
+ * @example
+ * await client.customDomains.setDefault({
+ * domain: "domain"
+ * })
+ */
+ public setDefault(
+ request: Management.SetDefaultCustomDomainRequestContent,
+ requestOptions?: CustomDomainsClient.RequestOptions,
+ ): core.HttpResponsePromise {
+ return core.HttpResponsePromise.fromPromise(this.__setDefault(request, requestOptions));
+ }
+
+ private async __setDefault(
+ request: Management.SetDefaultCustomDomainRequestContent,
+ requestOptions?: CustomDomainsClient.RequestOptions,
+ ): Promise> {
+ const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest();
+ let _headers: core.Fetcher.Args["headers"] = mergeHeaders(
+ _authRequest.headers,
+ this._options?.headers,
+ requestOptions?.headers,
+ );
+ const _response = await (this._options.fetcher ?? core.fetcher)({
+ url: core.url.join(
+ (await core.Supplier.get(this._options.baseUrl)) ??
+ (await core.Supplier.get(this._options.environment)) ??
+ environments.ManagementEnvironment.Default,
+ "custom-domains/default",
+ ),
+ method: "PATCH",
+ headers: _headers,
+ contentType: "application/json",
+ queryParameters: requestOptions?.queryParams,
+ requestType: "json",
+ body: request,
+ timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000,
+ maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries,
+ abortSignal: requestOptions?.abortSignal,
+ fetchFn: this._options?.fetch,
+ logging: this._options.logging,
+ });
+ if (_response.ok) {
+ return {
+ data: _response.body as Management.UpdateDefaultDomainResponseContent,
+ rawResponse: _response.rawResponse,
+ };
+ }
+
+ if (_response.error.reason === "status-code") {
+ switch (_response.error.statusCode) {
+ case 400:
+ throw new Management.BadRequestError(_response.error.body as unknown, _response.rawResponse);
+ case 403:
+ throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse);
+ default:
+ throw new errors.ManagementError({
+ statusCode: _response.error.statusCode,
+ body: _response.error.body,
+ rawResponse: _response.rawResponse,
+ });
+ }
+ }
+
+ return handleNonStatusCodeError(_response.error, _response.rawResponse, "PATCH", "/custom-domains/default");
+ }
+
/**
* Retrieve a custom domain configuration and status.
*
diff --git a/src/management/api/resources/groups/client/Client.ts b/src/management/api/resources/groups/client/Client.ts
index dbef810b27..b0c46f2df6 100644
--- a/src/management/api/resources/groups/client/Client.ts
+++ b/src/management/api/resources/groups/client/Client.ts
@@ -222,4 +222,74 @@ export class GroupsClient {
return handleNonStatusCodeError(_response.error, _response.rawResponse, "GET", "/groups/{id}");
}
+
+ /**
+ * Delete a group by its ID.
+ *
+ * @param {string} id - Unique identifier for the group (service-generated).
+ * @param {GroupsClient.RequestOptions} requestOptions - Request-specific configuration.
+ *
+ * @throws {@link Management.UnauthorizedError}
+ * @throws {@link Management.ForbiddenError}
+ * @throws {@link Management.NotFoundError}
+ * @throws {@link Management.TooManyRequestsError}
+ *
+ * @example
+ * await client.groups.delete("id")
+ */
+ public delete(id: string, requestOptions?: GroupsClient.RequestOptions): core.HttpResponsePromise {
+ return core.HttpResponsePromise.fromPromise(this.__delete(id, requestOptions));
+ }
+
+ private async __delete(
+ id: string,
+ requestOptions?: GroupsClient.RequestOptions,
+ ): Promise> {
+ const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest();
+ let _headers: core.Fetcher.Args["headers"] = mergeHeaders(
+ _authRequest.headers,
+ this._options?.headers,
+ requestOptions?.headers,
+ );
+ const _response = await (this._options.fetcher ?? core.fetcher)({
+ url: core.url.join(
+ (await core.Supplier.get(this._options.baseUrl)) ??
+ (await core.Supplier.get(this._options.environment)) ??
+ environments.ManagementEnvironment.Default,
+ `groups/${core.url.encodePathParam(id)}`,
+ ),
+ method: "DELETE",
+ headers: _headers,
+ queryParameters: requestOptions?.queryParams,
+ timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000,
+ maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries,
+ abortSignal: requestOptions?.abortSignal,
+ fetchFn: this._options?.fetch,
+ logging: this._options.logging,
+ });
+ if (_response.ok) {
+ return { data: undefined, rawResponse: _response.rawResponse };
+ }
+
+ if (_response.error.reason === "status-code") {
+ switch (_response.error.statusCode) {
+ case 401:
+ throw new Management.UnauthorizedError(_response.error.body as unknown, _response.rawResponse);
+ case 403:
+ throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse);
+ case 404:
+ throw new Management.NotFoundError(_response.error.body as unknown, _response.rawResponse);
+ case 429:
+ throw new Management.TooManyRequestsError(_response.error.body as unknown, _response.rawResponse);
+ default:
+ throw new errors.ManagementError({
+ statusCode: _response.error.statusCode,
+ body: _response.error.body,
+ rawResponse: _response.rawResponse,
+ });
+ }
+ }
+
+ return handleNonStatusCodeError(_response.error, _response.rawResponse, "DELETE", "/groups/{id}");
+ }
}
diff --git a/src/management/api/resources/networkAcls/client/Client.ts b/src/management/api/resources/networkAcls/client/Client.ts
index 6001c4bd56..f640c6ee35 100644
--- a/src/management/api/resources/networkAcls/client/Client.ts
+++ b/src/management/api/resources/networkAcls/client/Client.ts
@@ -145,7 +145,6 @@ export class NetworkAclsClient {
* await client.networkAcls.create({
* description: "description",
* active: true,
- * priority: 1.1,
* rule: {
* action: {},
* scope: "management"
@@ -311,7 +310,6 @@ export class NetworkAclsClient {
* await client.networkAcls.set("id", {
* description: "description",
* active: true,
- * priority: 1.1,
* rule: {
* action: {},
* scope: "management"
diff --git a/src/management/api/resources/organizations/resources/discoveryDomains/client/Client.ts b/src/management/api/resources/organizations/resources/discoveryDomains/client/Client.ts
index 9e084c6dee..8d1089aa45 100644
--- a/src/management/api/resources/organizations/resources/discoveryDomains/client/Client.ts
+++ b/src/management/api/resources/organizations/resources/discoveryDomains/client/Client.ts
@@ -24,6 +24,7 @@ export class DiscoveryDomainsClient {
/**
* Retrieve list of all organization discovery domains associated with the specified organization.
+ * This endpoint is subject to eventual consistency; newly created, updated, or deleted discovery domains may not immediately appear in the response.
*
* @param {string} id - ID of the organization.
* @param {Management.ListOrganizationDiscoveryDomainsRequestParameters} request
@@ -235,7 +236,7 @@ export class DiscoveryDomainsClient {
/**
* Retrieve details about a single organization discovery domain specified by domain name.
- *
+ * This endpoint is subject to eventual consistency; newly created, updated, or deleted discovery domains may not immediately appear in the response.
*
* @param {string} id - ID of the organization.
* @param {string} discovery_domain - Domain name of the discovery domain.
@@ -323,6 +324,7 @@ export class DiscoveryDomainsClient {
/**
* Retrieve details about a single organization discovery domain specified by ID.
+ * This endpoint is subject to eventual consistency; newly created, updated, or deleted discovery domains may not immediately appear in the response.
*
* @param {string} id - ID of the organization.
* @param {string} discovery_domain_id - ID of the discovery domain.
diff --git a/src/management/api/resources/refreshTokens/client/Client.ts b/src/management/api/resources/refreshTokens/client/Client.ts
index 77403d0ee1..d5b9082647 100644
--- a/src/management/api/resources/refreshTokens/client/Client.ts
+++ b/src/management/api/resources/refreshTokens/client/Client.ts
@@ -22,6 +22,128 @@ export class RefreshTokensClient {
this._options = normalizeClientOptionsWithAuth(options);
}
+ /**
+ * Retrieve a paginated list of refresh tokens for a specific user, with optional filtering by client ID. Results are sorted by credential_id ascending.
+ *
+ * @param {Management.GetRefreshTokensRequestParameters} request
+ * @param {RefreshTokensClient.RequestOptions} requestOptions - Request-specific configuration.
+ *
+ * @throws {@link Management.BadRequestError}
+ * @throws {@link Management.UnauthorizedError}
+ * @throws {@link Management.ForbiddenError}
+ * @throws {@link Management.NotFoundError}
+ * @throws {@link Management.TooManyRequestsError}
+ *
+ * @example
+ * await client.refreshTokens.list({
+ * user_id: "user_id",
+ * client_id: "client_id",
+ * from: "from",
+ * take: 1,
+ * fields: "fields",
+ * include_fields: true
+ * })
+ */
+ public async list(
+ request: Management.GetRefreshTokensRequestParameters,
+ requestOptions?: RefreshTokensClient.RequestOptions,
+ ): Promise> {
+ const list = core.HttpResponsePromise.interceptFunction(
+ async (
+ request: Management.GetRefreshTokensRequestParameters,
+ ): Promise> => {
+ const {
+ user_id: userId,
+ client_id: clientId,
+ from: from_,
+ take = 50,
+ fields,
+ include_fields: includeFields,
+ } = request;
+ const _queryParams: Record = {
+ user_id: userId,
+ client_id: clientId,
+ from: from_,
+ take,
+ fields,
+ include_fields: includeFields,
+ };
+ const _authRequest: core.AuthRequest = await this._options.authProvider.getAuthRequest();
+ let _headers: core.Fetcher.Args["headers"] = mergeHeaders(
+ _authRequest.headers,
+ this._options?.headers,
+ requestOptions?.headers,
+ );
+ const _response = await (this._options.fetcher ?? core.fetcher)({
+ url: core.url.join(
+ (await core.Supplier.get(this._options.baseUrl)) ??
+ (await core.Supplier.get(this._options.environment)) ??
+ environments.ManagementEnvironment.Default,
+ "refresh-tokens",
+ ),
+ method: "GET",
+ headers: _headers,
+ queryParameters: { ..._queryParams, ...requestOptions?.queryParams },
+ timeoutMs: (requestOptions?.timeoutInSeconds ?? this._options?.timeoutInSeconds ?? 60) * 1000,
+ maxRetries: requestOptions?.maxRetries ?? this._options?.maxRetries,
+ abortSignal: requestOptions?.abortSignal,
+ fetchFn: this._options?.fetch,
+ logging: this._options.logging,
+ });
+ if (_response.ok) {
+ return {
+ data: _response.body as Management.GetRefreshTokensPaginatedResponseContent,
+ rawResponse: _response.rawResponse,
+ };
+ }
+ if (_response.error.reason === "status-code") {
+ switch (_response.error.statusCode) {
+ case 400:
+ throw new Management.BadRequestError(
+ _response.error.body as unknown,
+ _response.rawResponse,
+ );
+ case 401:
+ throw new Management.UnauthorizedError(
+ _response.error.body as unknown,
+ _response.rawResponse,
+ );
+ case 403:
+ throw new Management.ForbiddenError(_response.error.body as unknown, _response.rawResponse);
+ case 404:
+ throw new Management.NotFoundError(_response.error.body as unknown, _response.rawResponse);
+ case 429:
+ throw new Management.TooManyRequestsError(
+ _response.error.body as unknown,
+ _response.rawResponse,
+ );
+ default:
+ throw new errors.ManagementError({
+ statusCode: _response.error.statusCode,
+ body: _response.error.body,
+ rawResponse: _response.rawResponse,
+ });
+ }
+ }
+ return handleNonStatusCodeError(_response.error, _response.rawResponse, "GET", "/refresh-tokens");
+ },
+ );
+ const dataWithRawResponse = await list(request).withRawResponse();
+ return new core.Page<
+ Management.RefreshTokenResponseContent,
+ Management.GetRefreshTokensPaginatedResponseContent
+ >({
+ response: dataWithRawResponse.data,
+ rawResponse: dataWithRawResponse.rawResponse,
+ hasNextPage: (response) =>
+ response?.next != null && !(typeof response?.next === "string" && response?.next === ""),
+ getItems: (response) => response?.refresh_tokens ?? [],
+ loadPage: (response) => {
+ return list(core.setObjectProperty(request, "from", response?.next));
+ },
+ });
+ }
+
/**
* Retrieve refresh token information.
*
diff --git a/src/management/api/types/types.ts b/src/management/api/types/types.ts
index 59293979f2..4a03a606f7 100644
--- a/src/management/api/types/types.ts
+++ b/src/management/api/types/types.ts
@@ -300,6 +300,9 @@ export const OauthScope = {
/**
* Read Groups */
ReadGroups: "read:groups",
+ /**
+ * Delete Groups */
+ DeleteGroups: "delete:groups",
/**
* Create Guardian Enrollment Tickets */
CreateGuardianEnrollmentTickets: "create:guardian_enrollment_tickets",
@@ -999,10 +1002,24 @@ export interface ActionTriggerCompatibleTrigger {
[key: string]: any;
}
-/**
- * An actions extensibility point.
- */
-export type ActionTriggerTypeEnum = string;
+/** An actions extensibility point. */
+export const ActionTriggerTypeEnum = {
+ PostLogin: "post-login",
+ CredentialsExchange: "credentials-exchange",
+ PreUserRegistration: "pre-user-registration",
+ PostUserRegistration: "post-user-registration",
+ PostChangePassword: "post-change-password",
+ SendPhoneMessage: "send-phone-message",
+ CustomPhoneProvider: "custom-phone-provider",
+ CustomEmailProvider: "custom-email-provider",
+ PasswordResetPostChallenge: "password-reset-post-challenge",
+ CustomTokenExchange: "custom-token-exchange",
+ EventStream: "event-stream",
+ PasswordHashMigration: "password-hash-migration",
+ LoginPostIdentifier: "login-post-identifier",
+ SignupPostIdentifier: "signup-post-identifier",
+} as const;
+export type ActionTriggerTypeEnum = (typeof ActionTriggerTypeEnum)[keyof typeof ActionTriggerTypeEnum];
export interface ActionVersion {
/** The unique id of an action version. */
@@ -1085,13 +1102,13 @@ export interface AculConfigsItem {
screen: Management.ScreenGroupNameEnum;
/** Rendering mode */
rendering_mode?: Management.AculRenderingModeEnum | undefined;
- context_configuration?: Management.AculContextConfiguration | undefined;
+ context_configuration?: ((Management.AculContextConfiguration | undefined) | null) | undefined;
/** Override Universal Login default head tags */
default_head_tags_disabled?: (boolean | null) | undefined;
/** Use page template with ACUL */
use_page_template?: (boolean | null) | undefined;
/** An array of head tags */
- head_tags?: Management.AculHeadTag[] | undefined;
+ head_tags?: (Management.AculHeadTag[] | null) | undefined;
filters?: (Management.AculFilters | null) | undefined;
}
@@ -1103,7 +1120,7 @@ export type AculConfigs = Management.AculConfigsItem[];
/**
* Context values to make available
*/
-export type AculContextConfiguration = Management.AculContextConfigurationItem[];
+export type AculContextConfiguration = (Management.AculContextConfigurationItem[] | null) | undefined;
export type AculContextConfigurationItem =
| Management.AculContextEnum
@@ -1852,6 +1869,77 @@ export interface ChangePasswordTicketResponseContent {
[key: string]: any;
}
+/**
+ * Client authentication methods derived from the JWKS document
+ */
+export interface CimdMappedClientAuthenticationMethods {
+ private_key_jwt?: Management.CimdMappedClientAuthenticationMethodsPrivateKeyJwt | undefined;
+ /** Accepts any additional properties */
+ [key: string]: any;
+}
+
+/**
+ * Private Key JWT authentication configuration
+ */
+export interface CimdMappedClientAuthenticationMethodsPrivateKeyJwt {
+ /** Credentials derived from the JWKS document */
+ credentials: Management.CimdMappedPrivateKeyJwtCredential[];
+ /** Accepts any additional properties */
+ [key: string]: any;
+}
+
+/**
+ * Auth0 client fields mapped from the Client ID Metadata Document
+ */
+export interface CimdMappedClientFields {
+ /** The URL of the Client ID Metadata Document */
+ external_client_id?: string | undefined;
+ /** Client name */
+ name?: string | undefined;
+ /** Application type (e.g., web, native) */
+ app_type?: string | undefined;
+ /** Callback URLs */
+ callbacks?: string[] | undefined;
+ /** Logo URI */
+ logo_uri?: string | undefined;
+ /** Human-readable brief description of this client presentable to the end-user */
+ description?: string | undefined;
+ /** List of grant types */
+ grant_types?: string[] | undefined;
+ /** Token endpoint authentication method */
+ token_endpoint_auth_method?: string | undefined;
+ /** URL for the JSON Web Key Set containing the public keys for private_key_jwt authentication */
+ jwks_uri?: string | undefined;
+ client_authentication_methods?: Management.CimdMappedClientAuthenticationMethods | undefined;
+ /** Accepts any additional properties */
+ [key: string]: any;
+}
+
+export interface CimdMappedPrivateKeyJwtCredential {
+ /** Type of credential (e.g., public_key) */
+ credential_type: string;
+ /** Key identifier from JWKS or calculated thumbprint */
+ kid: string;
+ /** Algorithm (e.g., RS256, RS384, PS256) */
+ alg: string;
+ /** Accepts any additional properties */
+ [key: string]: any;
+}
+
+/**
+ * Validation result for the Client ID Metadata Document
+ */
+export interface CimdValidationResult {
+ /** Whether the metadata document passed validation */
+ valid: boolean;
+ /** Array of validation violation messages (if any) */
+ violations: string[];
+ /** Array of warning messages (if any) */
+ warnings: string[];
+ /** Accepts any additional properties */
+ [key: string]: any;
+}
+
export interface Client {
/** ID of this client. */
client_id?: string | undefined;
@@ -1889,7 +1977,7 @@ export interface Client {
/** List of grant types supported for this application. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`. */
grant_types?: string[] | undefined;
jwt_configuration?: Management.ClientJwtConfiguration | undefined;
- signing_keys?: Management.ClientSigningKeys | undefined;
+ signing_keys?: ((Management.ClientSigningKeys | undefined) | null) | undefined;
encryption_key?: (Management.ClientEncryptionKey | null) | undefined;
/** Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). */
sso?: boolean | undefined;
@@ -1944,6 +2032,12 @@ export interface Client {
async_approval_notification_channels?:
| Management.ClientAsyncApprovalNotificationsChannelsApiPostConfiguration
| undefined;
+ external_metadata_type?: Management.ClientExternalMetadataTypeEnum | undefined;
+ external_metadata_created_by?: Management.ClientExternalMetadataCreatedByEnum | undefined;
+ /** An alternate client identifier to be used during authorization flows. Only supports CIMD-based client identifiers. */
+ external_client_id?: string | undefined;
+ /** URL for the JSON Web Key Set (JWKS) containing the public keys used for private_key_jwt authentication. Only present for CIMD clients using private_key_jwt authentication. */
+ jwks_uri?: string | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
@@ -2387,7 +2481,8 @@ export type ClientAppTypeEnum = (typeof ClientAppTypeEnum)[keyof typeof ClientAp
* Array of notification channels for contacting the user when their approval is required. Valid values are `guardian-push`, `email`.
*/
export type ClientAsyncApprovalNotificationsChannelsApiPatchConfiguration =
- Management.AsyncApprovalNotificationsChannelsEnum[];
+ | (Management.AsyncApprovalNotificationsChannelsEnum[] | null)
+ | undefined;
/**
* Array of notification channels for contacting the user when their approval is required. Valid values are `guardian-push`, `email`.
@@ -2553,6 +2648,21 @@ export interface ClientEncryptionKey {
[key: string]: any;
}
+/** Indicates who created the external metadata client. The value admin indicates the client was registered via the Management API. The value client indicates the client was registered dynamically. This field is only present when external_metadata_type is set. */
+export const ClientExternalMetadataCreatedByEnum = {
+ Admin: "admin",
+ Client: "client",
+} as const;
+export type ClientExternalMetadataCreatedByEnum =
+ (typeof ClientExternalMetadataCreatedByEnum)[keyof typeof ClientExternalMetadataCreatedByEnum];
+
+/** Indicates the type of external metadata used to register the client. This field is omitted for regular clients. The value cimd identifies clients registered via a Client ID Metadata Document. */
+export const ClientExternalMetadataTypeEnum = {
+ Cimd: "cimd",
+} as const;
+export type ClientExternalMetadataTypeEnum =
+ (typeof ClientExternalMetadataTypeEnum)[keyof typeof ClientExternalMetadataTypeEnum];
+
/**
* Optional filter on allow_any_organization.
*/
@@ -2778,7 +2888,7 @@ export interface ClientRefreshTokenConfiguration {
/** Prevents tokens from expiring without use when `true` (takes precedence over `idle_token_lifetime` values) */
infinite_idle_token_lifetime?: boolean | undefined;
/** A collection of policies governing multi-resource refresh token exchange (MRRT), defining how refresh tokens can be used across different resource servers */
- policies?: Management.ClientRefreshTokenPolicy[] | undefined;
+ policies?: (Management.ClientRefreshTokenPolicy[] | null) | undefined;
}
export interface ClientRefreshTokenPolicy {
@@ -2804,7 +2914,9 @@ export interface ClientSessionTransferConfiguration {
/** Indicates whether revoking the parent Refresh Token that initiated a Native to Web flow and was used to issue a Session Transfer Token should trigger a cascade revocation affecting its dependent child entities. Usually configured in the native application. Default value is `true`, applicable only in Native to Web SSO context. */
enforce_cascade_revocation?: boolean | undefined;
/** Indicates whether an app can create a session from a Session Transfer Token received via indicated methods. Can include `cookie` and/or `query`. Usually configured in the web application. Default value is an empty array []. */
- allowed_authentication_methods?: Management.ClientSessionTransferAllowedAuthenticationMethodsEnum[] | undefined;
+ allowed_authentication_methods?:
+ | (Management.ClientSessionTransferAllowedAuthenticationMethodsEnum[] | null)
+ | undefined;
enforce_device_binding?: Management.ClientSessionTransferDeviceBindingEnum | undefined;
/** Indicates whether Refresh Tokens are allowed to be issued when authenticating with a Session Transfer Token. Usually configured in the web application. Default value is `false`. */
allow_refresh_token?: boolean | undefined;
@@ -2853,7 +2965,7 @@ export interface ClientSigningKey {
/**
* Signing certificates associated with this client.
*/
-export type ClientSigningKeys = Management.ClientSigningKey[];
+export type ClientSigningKeys = (Management.ClientSigningKey[] | null) | undefined;
/** Defines the requested authentication method for the token endpoint. Can be `none` (public client without a client secret), `client_secret_post` (client uses HTTP POST parameters), or `client_secret_basic` (client uses HTTP Basic). */
export const ClientTokenEndpointAuthMethodEnum = {
@@ -2973,6 +3085,13 @@ export const ConnectionApiBehaviorEnum = {
} as const;
export type ConnectionApiBehaviorEnum = (typeof ConnectionApiBehaviorEnum)[keyof typeof ConnectionApiBehaviorEnum];
+export type ConnectionApiEnableGroups = boolean;
+
+/**
+ * Enables integration with the Google Workspace Admin SDK Directory API for groups. When true, Auth0 can synchronize groups & group memberships and supports inbound directory provisioning for groups. Defaults to false.
+ */
+export type ConnectionApiEnableGroupsGoogleApps = Management.ConnectionApiEnableGroups;
+
export type ConnectionApiEnableUsers = boolean;
/**
@@ -3067,8 +3186,6 @@ export interface ConnectionAuthenticationPurpose {
export type ConnectionAuthorizationEndpoint = string;
-export type ConnectionAuthorizationEndpointOAuth2 = Management.ConnectionAuthorizationEndpoint;
-
/**
* Base URL override for the Exact Online API endpoint used for OAuth2 authorization and API requests. Defaults to https://start.exactonline.nl.
*/
@@ -3421,14 +3538,6 @@ export type ConnectionDomainGoogleApps = string;
*/
export type ConnectionDomainOkta = string;
-/** Algorithm used for DPoP proof JWT signing. */
-export const ConnectionDpopSigningAlgEnum = {
- Es256: "ES256",
- Ed25519: "Ed25519",
-} as const;
-export type ConnectionDpopSigningAlgEnum =
- (typeof ConnectionDpopSigningAlgEnum)[keyof typeof ConnectionDpopSigningAlgEnum];
-
/**
* JSON array containing a list of the JWS signing algorithms (alg values) supported for DPoP proof JWT signing.
*/
@@ -3503,8 +3612,6 @@ export type ConnectionEnabledDatabaseCustomization = boolean;
*/
export type ConnectionEndSessionEndpoint = string;
-export type ConnectionEndSessionEndpointOAuth2 = Management.ConnectionEndSessionEndpoint;
-
/**
* The entity identifier (Issuer) for the SAML Service Provider. When not provided, defaults to 'urn:auth0:{tenant}:{connection}'. This value is included in SAML AuthnRequest messages sent to the identity provider.
*/
@@ -3843,7 +3950,6 @@ export const ConnectionIdentityProviderEnum = {
Apple: "apple",
Dropbox: "dropbox",
Bitbucket: "bitbucket",
- Aol: "aol",
Auth0Oidc: "auth0-oidc",
Auth0: "auth0",
Baidu: "baidu",
@@ -3866,7 +3972,6 @@ export const ConnectionIdentityProviderEnum = {
Ip: "ip",
Line: "line",
Linkedin: "linkedin",
- Miicard: "miicard",
Oauth1: "oauth1",
Oauth2: "oauth2",
Office365: "office365",
@@ -3876,7 +3981,6 @@ export const ConnectionIdentityProviderEnum = {
PaypalSandbox: "paypal-sandbox",
Pingfederate: "pingfederate",
Planningcenter: "planningcenter",
- Renren: "renren",
SalesforceCommunity: "salesforce-community",
SalesforceSandbox: "salesforce-sandbox",
Salesforce: "salesforce",
@@ -3886,8 +3990,6 @@ export const ConnectionIdentityProviderEnum = {
Shop: "shop",
Sms: "sms",
Soundcloud: "soundcloud",
- ThecitySandbox: "thecity-sandbox",
- Thecity: "thecity",
Thirtysevensignals: "thirtysevensignals",
Twitter: "twitter",
Untappd: "untappd",
@@ -3897,7 +3999,6 @@ export const ConnectionIdentityProviderEnum = {
Windowslive: "windowslive",
Wordpress: "wordpress",
Yahoo: "yahoo",
- Yammer: "yammer",
Yandex: "yandex",
} as const;
export type ConnectionIdentityProviderEnum =
@@ -4082,21 +4183,13 @@ export interface ConnectionOptionsAdfs extends Management.ConnectionOptionsCommo
signInEndpoint?: Management.ConnectionSignInEndpointAdfs | undefined;
tenant_domain?: Management.ConnectionTenantDomain | undefined;
thumbprints?: Management.ConnectionThumbprints | undefined;
- upstream_params?: ((Management.ConnectionUpstreamParamsAdfs | undefined) | null) | undefined;
+ upstream_params?: ((Management.ConnectionUpstreamParams | undefined) | null) | undefined;
/** Custom ADFS claim to use as the unique user identifier. When provided, this attribute is prepended to the default user_id mapping list with highest priority. Accepts a string (single ADFS claim name). */
user_id_attribute?: string | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
-/**
- * Options for the 'aol' connection
- */
-export interface ConnectionOptionsAol extends Management.ConnectionOptionsOAuth2Common {
- /** Accepts any additional properties */
- [key: string]: any;
-}
-
/**
* Options for the 'amazon' connection
*/
@@ -4162,6 +4255,7 @@ export interface ConnectionOptionsAuth0 extends Management.ConnectionOptionsComm
password_dictionary?: (Management.ConnectionPasswordDictionaryOptions | null) | undefined;
password_history?: (Management.ConnectionPasswordHistoryOptions | null) | undefined;
password_no_personal_info?: (Management.ConnectionPasswordNoPersonalInfoOptions | null) | undefined;
+ password_options?: Management.ConnectionPasswordOptions | undefined;
precedence?: Management.ConnectionIdentifierPrecedence | undefined;
realm_fallback?: Management.ConnectionRealmFallback | undefined;
requires_username?: Management.ConnectionRequiresUsername | undefined;
@@ -4191,7 +4285,7 @@ export interface ConnectionOptionsAzureAd extends Management.ConnectionOptionsCo
app_id?: string | undefined;
/** Includes basic user profile information from Azure AD (name, email, given_name, family_name). Always enabled and required - represents the minimum profile data retrieved during authentication. */
basic_profile?: boolean | undefined;
- client_id?: Management.ConnectionClientIdAzureAd | undefined;
+ client_id: Management.ConnectionClientIdAzureAd;
client_secret?: Management.ConnectionClientSecretAzureAd | undefined;
domain_aliases?: Management.ConnectionDomainAliasesAzureAd | undefined;
/** When false, prevents storing the user's Azure AD access token in the Auth0 user profile. When true (default), the access token is persisted for API access. */
@@ -4372,7 +4466,6 @@ export interface ConnectionOptionsCommonOidc {
client_secret?: Management.ConnectionClientSecretOidc | undefined;
connection_settings?: Management.ConnectionConnectionSettings | undefined;
domain_aliases?: Management.ConnectionDomainAliases | undefined;
- dpop_signing_alg?: Management.ConnectionDpopSigningAlgEnum | undefined;
federated_connections_access_tokens?: (Management.ConnectionFederatedConnectionsAccessTokens | null) | undefined;
icon_url?: Management.ConnectionIconUrl | undefined;
id_token_signed_response_algs?: ((Management.ConnectionIdTokenSignedResponseAlgs | undefined) | null) | undefined;
@@ -4383,11 +4476,11 @@ export interface ConnectionOptionsCommonOidc {
send_back_channel_nonce?: Management.ConnectionSendBackChannelNonce | undefined;
set_user_root_attributes?: Management.ConnectionSetUserRootAttributesEnum | undefined;
tenant_domain?: Management.ConnectionTenantDomain | undefined;
- token_endpoint?: Management.ConnectionTokenEndpointOidc | undefined;
+ token_endpoint?: Management.ConnectionTokenEndpoint | undefined;
token_endpoint_auth_method?: (Management.ConnectionTokenEndpointAuthMethodEnum | null) | undefined;
token_endpoint_auth_signing_alg?: (Management.ConnectionTokenEndpointAuthSigningAlgEnum | null) | undefined;
upstream_params?: ((Management.ConnectionUpstreamParams | undefined) | null) | undefined;
- userinfo_endpoint?: Management.ConnectionUserinfoEndpointOidc | undefined;
+ userinfo_endpoint?: Management.ConnectionUserinfoEndpoint | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
@@ -4665,6 +4758,7 @@ export interface ConnectionOptionsGoogleApps extends Management.ConnectionOption
admin_refresh_token?: Management.ConnectionAdminRefreshTokenGoogleApps | undefined;
/** When true, allows customization of OAuth scopes requested during user login. Custom scopes are appended to the mandatory email and profile scopes. When false or omitted, only the default email and profile scopes are used. This property is automatically enabled when Token Vault or Connected Accounts features are activated. */
allow_setting_login_scopes?: boolean | undefined;
+ api_enable_groups?: Management.ConnectionApiEnableGroupsGoogleApps | undefined;
api_enable_users?: Management.ConnectionApiEnableUsersGoogleApps | undefined;
client_id: Management.ConnectionClientIdGoogleApps;
client_secret?: Management.ConnectionClientSecretGoogleApps | undefined;
@@ -4920,14 +5014,6 @@ export interface ConnectionOptionsLinkedin extends Management.ConnectionOptionsC
[key: string]: any;
}
-/**
- * Options for the 'miicard' connection
- */
-export interface ConnectionOptionsMiicard extends Management.ConnectionOptionsOAuth2Common {
- /** Accepts any additional properties */
- [key: string]: any;
-}
-
/**
* Options for the 'oauth1' connection
*/
@@ -4959,19 +5045,19 @@ export interface ConnectionOptionsOAuth1Common extends Management.ConnectionOpti
export interface ConnectionOptionsOAuth2 extends Management.ConnectionOptionsCommon {
authParams?: Management.ConnectionAuthParamsOAuth2 | undefined;
authParamsMap?: Management.ConnectionAuthParamsMap | undefined;
- authorizationURL?: Management.ConnectionAuthorizationEndpointOAuth2 | undefined;
+ authorizationURL?: Management.ConnectionAuthorizationEndpoint | undefined;
client_id?: Management.ConnectionClientIdOAuth2 | undefined;
client_secret?: Management.ConnectionClientSecretOAuth2 | undefined;
customHeaders?: Management.ConnectionCustomHeadersOAuth2 | undefined;
fieldsMap?: Management.ConnectionFieldsMap | undefined;
icon_url?: Management.ConnectionIconUrl | undefined;
- logoutUrl?: Management.ConnectionEndSessionEndpointOAuth2 | undefined;
+ logoutUrl?: Management.ConnectionEndSessionEndpoint | undefined;
/** When true, enables Proof Key for Code Exchange (PKCE) for the authorization code flow. PKCE provides additional security by preventing authorization code interception attacks. */
pkce_enabled?: boolean | undefined;
scope?: Management.ConnectionScopeOAuth2 | undefined;
scripts?: Management.ConnectionScriptsOAuth2 | undefined;
set_user_root_attributes?: Management.ConnectionSetUserRootAttributesEnum | undefined;
- tokenURL?: Management.ConnectionTokenEndpointOAuth2 | undefined;
+ tokenURL?: Management.ConnectionTokenEndpoint | undefined;
upstream_params?: ((Management.ConnectionUpstreamParams | undefined) | null) | undefined;
/** When true, uses space-delimited scopes (per OAuth 2.0 spec) instead of comma-delimited when calling the identity provider's authorization endpoint. Only relevant when using the connection_scope parameter. See https://auth0.com/docs/authenticate/identity-providers/adding-scopes-for-an-external-idp#pass-scopes-to-authorize-endpoint */
useOauthSpecScope?: boolean | undefined;
@@ -5122,14 +5208,6 @@ export const ConnectionOptionsProtocolEnumTwitter = {
export type ConnectionOptionsProtocolEnumTwitter =
(typeof ConnectionOptionsProtocolEnumTwitter)[keyof typeof ConnectionOptionsProtocolEnumTwitter];
-/**
- * Options for the 'renren' connection
- */
-export interface ConnectionOptionsRenren extends Management.ConnectionOptionsOAuth2Common {
- /** Accepts any additional properties */
- [key: string]: any;
-}
-
/**
* Options for the 'samlp' connection
*/
@@ -5448,14 +5526,6 @@ export interface ConnectionOptionsYahoo extends Management.ConnectionOptionsOAut
[key: string]: any;
}
-/**
- * Options for the 'yammer' connection
- */
-export interface ConnectionOptionsYammer extends Management.ConnectionOptionsOAuth2Common {
- /** Accepts any additional properties */
- [key: string]: any;
-}
-
/**
* Options for the 'yandex' connection
*/
@@ -5534,6 +5604,61 @@ export interface ConnectionPasswordNoPersonalInfoOptions {
enable: boolean;
}
+/**
+ * Password policy options for flexible password policy configuration
+ */
+export interface ConnectionPasswordOptions {
+ complexity?: Management.ConnectionPasswordOptionsComplexity | undefined;
+ dictionary?: Management.ConnectionPasswordOptionsDictionary | undefined;
+ history?: Management.ConnectionPasswordOptionsHistory | undefined;
+ profile_data?: Management.ConnectionPasswordOptionsProfileData | undefined;
+}
+
+/**
+ * Password complexity requirements configuration
+ */
+export interface ConnectionPasswordOptionsComplexity {
+ /** Minimum password length required (1-72 characters) */
+ min_length?: number | undefined;
+ /** Required character types that must be present in passwords. Valid options: uppercase, lowercase, number, special */
+ character_types?: Management.PasswordCharacterTypeEnum[] | undefined;
+ character_type_rule?: Management.PasswordCharacterTypeRulePolicyEnum | undefined;
+ identical_characters?: Management.PasswordIdenticalCharactersPolicyEnum | undefined;
+ sequential_characters?: Management.PasswordSequentialCharactersPolicyEnum | undefined;
+ max_length_exceeded?: Management.PasswordMaxLengthExceededPolicyEnum | undefined;
+}
+
+/**
+ * Dictionary-based password restriction policy to prevent common passwords
+ */
+export interface ConnectionPasswordOptionsDictionary {
+ /** Enables dictionary checking to prevent use of common passwords and custom blocked words */
+ active?: boolean | undefined;
+ /** Array of custom words to block in passwords. Maximum 200 items, each up to 50 characters */
+ custom?: string[] | undefined;
+ default?: Management.PasswordDefaultDictionariesEnum | undefined;
+}
+
+/**
+ * Password history policy configuration to prevent password reuse
+ */
+export interface ConnectionPasswordOptionsHistory {
+ /** Enables password history checking to prevent users from reusing recent passwords */
+ active?: boolean | undefined;
+ /** Number of previous passwords to remember and prevent reuse (1-24) */
+ size?: number | undefined;
+}
+
+/**
+ * Personal information restriction policy to prevent use of profile data in passwords
+ */
+export interface ConnectionPasswordOptionsProfileData {
+ /** Prevents users from including profile data (like name, email) in their passwords */
+ active?: boolean | undefined;
+ /** Blocked profile fields. An array of up to 12 entries. */
+ blocked_fields?: string[] | undefined;
+}
+
/** Password strength level */
export const ConnectionPasswordPolicyEnum = {
None: "none",
@@ -5682,7 +5807,7 @@ export interface ConnectionProfileTemplateItem {
export interface ConnectionPropertiesOptions {
validation?: (Management.ConnectionValidationOptions | null) | undefined;
/** An array of user fields that should not be stored in the Auth0 database (https://auth0.com/docs/security/data-security/denylist) */
- non_persistent_attrs?: string[] | undefined;
+ non_persistent_attrs?: (string[] | null) | undefined;
/** Order of precedence for attribute types. If the property is not specified, the default precedence of attributes will be used. */
precedence?: Management.ConnectionIdentifierPrecedenceEnum[] | undefined;
attributes?: Management.ConnectionAttributes | undefined;
@@ -5692,6 +5817,8 @@ export interface ConnectionPropertiesOptions {
enabledDatabaseCustomization?: boolean | undefined;
/** Enable this if you have a legacy user store and you want to gradually migrate those users to the Auth0 user store */
import_mode?: boolean | undefined;
+ /** Stores encrypted string only configurations for connections */
+ configuration?: (Record | null) | undefined;
customScripts?: Management.ConnectionCustomScripts | undefined;
authentication_methods?: (Management.ConnectionAuthenticationMethods | null) | undefined;
passkey_options?: (Management.ConnectionPasskeyOptions | null) | undefined;
@@ -5713,6 +5840,7 @@ export interface ConnectionPropertiesOptions {
set_user_root_attributes?: Management.ConnectionSetUserRootAttributesEnum | undefined;
gateway_authentication?: (Management.ConnectionGatewayAuthentication | null) | undefined;
federated_connections_access_tokens?: (Management.ConnectionFederatedConnectionsAccessTokens | null) | undefined;
+ password_options?: Management.ConnectionPasswordOptions | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
@@ -5818,7 +5946,7 @@ export type ConnectionRequireRequestUriRegistration = boolean;
export type ConnectionRequiresUsername = boolean;
export interface ConnectionResponseCommon extends Management.CreateConnectionCommon {
- id?: Management.ConnectionId | undefined;
+ id: Management.ConnectionId;
realms?: Management.ConnectionRealms | undefined;
}
@@ -5857,22 +5985,6 @@ export namespace ConnectionResponseContentAdfs {
export type Strategy = (typeof Strategy)[keyof typeof Strategy];
}
-/**
- * Response for connections with strategy=aol
- */
-export interface ConnectionResponseContentAol
- extends Management.ConnectionPurposes, Management.ConnectionResponseCommon {
- strategy: ConnectionResponseContentAol.Strategy;
- options?: Management.ConnectionOptionsAol | undefined;
-}
-
-export namespace ConnectionResponseContentAol {
- export const Strategy = {
- Aol: "aol",
- } as const;
- export type Strategy = (typeof Strategy)[keyof typeof Strategy];
-}
-
/**
* Response for connections with strategy=amazon
*/
@@ -6311,22 +6423,6 @@ export namespace ConnectionResponseContentLinkedin {
export type Strategy = (typeof Strategy)[keyof typeof Strategy];
}
-/**
- * Response for connections with strategy=miicard
- */
-export interface ConnectionResponseContentMiicard
- extends Management.ConnectionPurposes, Management.ConnectionResponseCommon {
- strategy: ConnectionResponseContentMiicard.Strategy;
- options?: Management.ConnectionOptionsMiicard | undefined;
-}
-
-export namespace ConnectionResponseContentMiicard {
- export const Strategy = {
- Miicard: "miicard",
- } as const;
- export type Strategy = (typeof Strategy)[keyof typeof Strategy];
-}
-
/**
* Response for connections with strategy=oauth1
*/
@@ -6478,22 +6574,6 @@ export namespace ConnectionResponseContentPlanningCenter {
export type Strategy = (typeof Strategy)[keyof typeof Strategy];
}
-/**
- * Response for connections with strategy=renren
- */
-export interface ConnectionResponseContentRenren
- extends Management.ConnectionPurposes, Management.ConnectionResponseCommon {
- strategy: ConnectionResponseContentRenren.Strategy;
- options?: Management.ConnectionOptionsRenren | undefined;
-}
-
-export namespace ConnectionResponseContentRenren {
- export const Strategy = {
- Renren: "renren",
- } as const;
- export type Strategy = (typeof Strategy)[keyof typeof Strategy];
-}
-
/**
* Response for connections with strategy=samlp
*/
@@ -6769,22 +6849,6 @@ export namespace ConnectionResponseContentYahoo {
export type Strategy = (typeof Strategy)[keyof typeof Strategy];
}
-/**
- * Response for connections with strategy=yammer
- */
-export interface ConnectionResponseContentYammer
- extends Management.ConnectionPurposes, Management.ConnectionResponseCommon {
- strategy: ConnectionResponseContentYammer.Strategy;
- options?: Management.ConnectionOptionsYammer | undefined;
-}
-
-export namespace ConnectionResponseContentYammer {
- export const Strategy = {
- Yammer: "yammer",
- } as const;
- export type Strategy = (typeof Strategy)[keyof typeof Strategy];
-}
-
/**
* Response for connections with strategy=yandex
*/
@@ -7033,7 +7097,6 @@ export const ConnectionStrategyEnum = {
Apple: "apple",
Dropbox: "dropbox",
Bitbucket: "bitbucket",
- Aol: "aol",
Auth0Oidc: "auth0-oidc",
Auth0: "auth0",
Baidu: "baidu",
@@ -7056,7 +7119,6 @@ export const ConnectionStrategyEnum = {
Ip: "ip",
Line: "line",
Linkedin: "linkedin",
- Miicard: "miicard",
Oauth1: "oauth1",
Oauth2: "oauth2",
Office365: "office365",
@@ -7066,7 +7128,6 @@ export const ConnectionStrategyEnum = {
PaypalSandbox: "paypal-sandbox",
Pingfederate: "pingfederate",
Planningcenter: "planningcenter",
- Renren: "renren",
SalesforceCommunity: "salesforce-community",
SalesforceSandbox: "salesforce-sandbox",
Salesforce: "salesforce",
@@ -7076,8 +7137,6 @@ export const ConnectionStrategyEnum = {
Shop: "shop",
Sms: "sms",
Soundcloud: "soundcloud",
- ThecitySandbox: "thecity-sandbox",
- Thecity: "thecity",
Thirtysevensignals: "thirtysevensignals",
Twitter: "twitter",
Untappd: "untappd",
@@ -7087,7 +7146,6 @@ export const ConnectionStrategyEnum = {
Windowslive: "windowslive",
Wordpress: "wordpress",
Yahoo: "yahoo",
- Yammer: "yammer",
Yandex: "yandex",
Auth0Adldap: "auth0-adldap",
} as const;
@@ -7190,10 +7248,6 @@ export type ConnectionTokenEndpointAuthSigningAlgEnum =
*/
export type ConnectionTokenEndpointAuthSigningAlgValuesSupported = string[];
-export type ConnectionTokenEndpointOAuth2 = Management.ConnectionTokenEndpoint;
-
-export type ConnectionTokenEndpointOidc = Management.ConnectionTokenEndpoint;
-
export interface ConnectionTotpEmail {
length?: Management.ConnectionTotpLengthEmail | undefined;
time_step?: Management.ConnectionTotpTimeStepEmail | undefined;
@@ -7297,8 +7351,6 @@ export type ConnectionUpstreamParams =
| (Record | null)
| undefined;
-export type ConnectionUpstreamParamsAdfs = ((Management.ConnectionUpstreamParams | undefined) | null) | undefined;
-
/**
* Options for adding parameters in the request to the upstream IdP. See https://auth0.com/docs/authenticate/identity-providers/pass-parameters-to-idps
*/
@@ -7348,8 +7400,6 @@ export type ConnectionUserinfoEncryptionEncValuesSupported = string[];
export type ConnectionUserinfoEndpoint = Management.ConnectionHttpsUrlWithHttpFallback255;
-export type ConnectionUserinfoEndpointOidc = Management.ConnectionUserinfoEndpoint;
-
/**
* JSON array containing a list of the JWS [JWS] signing algorithms (alg values) [JWA] supported by the UserInfo Endpoint to encode the Claims in a JWT [JWT]. The value none MAY be included.
*/
@@ -7560,7 +7610,7 @@ export interface CreateClientResponseContent {
/** List of grant types supported for this application. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`. */
grant_types?: string[] | undefined;
jwt_configuration?: Management.ClientJwtConfiguration | undefined;
- signing_keys?: Management.ClientSigningKeys | undefined;
+ signing_keys?: ((Management.ClientSigningKeys | undefined) | null) | undefined;
encryption_key?: (Management.ClientEncryptionKey | null) | undefined;
/** Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). */
sso?: boolean | undefined;
@@ -7615,12 +7665,23 @@ export interface CreateClientResponseContent {
async_approval_notification_channels?:
| Management.ClientAsyncApprovalNotificationsChannelsApiPostConfiguration
| undefined;
+ external_metadata_type?: Management.ClientExternalMetadataTypeEnum | undefined;
+ external_metadata_created_by?: Management.ClientExternalMetadataCreatedByEnum | undefined;
+ /** An alternate client identifier to be used during authorization flows. Only supports CIMD-based client identifiers. */
+ external_client_id?: string | undefined;
+ /** URL for the JSON Web Key Set (JWKS) containing the public keys used for private_key_jwt authentication. Only present for CIMD clients using private_key_jwt authentication. */
+ jwks_uri?: string | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
-export interface CreateConnectionCommon extends Management.ConnectionCommon {
- name?: Management.ConnectionName | undefined;
+export interface CreateConnectionCommon {
+ name: Management.ConnectionName;
+ /** Use of this property is NOT RECOMMENDED. Use the PATCH /v2/connections/{id}/clients endpoint to enable the connection for a set of clients. */
+ enabled_clients?: string[] | undefined;
+ display_name?: Management.ConnectionDisplayName | undefined;
+ is_domain_connection?: Management.ConnectionIsDomainConnection | undefined;
+ metadata?: Management.ConnectionsMetadata | undefined;
}
export interface CreateConnectionProfileResponseContent {
@@ -7664,21 +7725,6 @@ export namespace CreateConnectionRequestContentAdfs {
export type Strategy = (typeof Strategy)[keyof typeof Strategy];
}
-/**
- * Create a connection with strategy=aol
- */
-export interface CreateConnectionRequestContentAol extends Management.CreateConnectionCommon {
- strategy: CreateConnectionRequestContentAol.Strategy;
- options?: Management.ConnectionOptionsAol | undefined;
-}
-
-export namespace CreateConnectionRequestContentAol {
- export const Strategy = {
- Aol: "aol",
- } as const;
- export type Strategy = (typeof Strategy)[keyof typeof Strategy];
-}
-
/**
* Create a connection with strategy=amazon
*/
@@ -8091,21 +8137,6 @@ export namespace CreateConnectionRequestContentLinkedin {
export type Strategy = (typeof Strategy)[keyof typeof Strategy];
}
-/**
- * Create a connection with strategy=miicard
- */
-export interface CreateConnectionRequestContentMiicard extends Management.CreateConnectionCommon {
- strategy: CreateConnectionRequestContentMiicard.Strategy;
- options?: Management.ConnectionOptionsMiicard | undefined;
-}
-
-export namespace CreateConnectionRequestContentMiicard {
- export const Strategy = {
- Miicard: "miicard",
- } as const;
- export type Strategy = (typeof Strategy)[keyof typeof Strategy];
-}
-
/**
* Create a connection with strategy=oauth1
*/
@@ -8248,21 +8279,6 @@ export namespace CreateConnectionRequestContentPlanningCenter {
export type Strategy = (typeof Strategy)[keyof typeof Strategy];
}
-/**
- * Create a connection with strategy=renren
- */
-export interface CreateConnectionRequestContentRenren extends Management.CreateConnectionCommon {
- strategy: CreateConnectionRequestContentRenren.Strategy;
- options?: Management.ConnectionOptionsRenren | undefined;
-}
-
-export namespace CreateConnectionRequestContentRenren {
- export const Strategy = {
- Renren: "renren",
- } as const;
- export type Strategy = (typeof Strategy)[keyof typeof Strategy];
-}
-
/**
* Create a connection with strategy=samlp
*/
@@ -8521,21 +8537,6 @@ export namespace CreateConnectionRequestContentYahoo {
export type Strategy = (typeof Strategy)[keyof typeof Strategy];
}
-/**
- * Create a connection with strategy=yammer
- */
-export interface CreateConnectionRequestContentYammer extends Management.CreateConnectionCommon {
- strategy: CreateConnectionRequestContentYammer.Strategy;
- options?: Management.ConnectionOptionsYammer | undefined;
-}
-
-export namespace CreateConnectionRequestContentYammer {
- export const Strategy = {
- Yammer: "yammer",
- } as const;
- export type Strategy = (typeof Strategy)[keyof typeof Strategy];
-}
-
/**
* Create a connection with strategy=yandex
*/
@@ -8601,6 +8602,7 @@ export interface CreateDirectoryProvisioningRequestContent {
mapping?: Management.DirectoryProvisioningMappingItem[] | undefined;
/** Whether periodic automatic synchronization is enabled */
synchronize_automatically?: boolean | undefined;
+ synchronize_groups?: Management.SynchronizeGroupsEnum | undefined;
}
export interface CreateDirectoryProvisioningResponseContent {
@@ -8614,6 +8616,7 @@ export interface CreateDirectoryProvisioningResponseContent {
mapping: Management.DirectoryProvisioningMappingItem[];
/** Whether periodic automatic synchronization is enabled */
synchronize_automatically: boolean;
+ synchronize_groups?: Management.SynchronizeGroupsEnum | undefined;
/** The timestamp at which the directory provisioning configuration was created */
created_at: string;
/** The timestamp at which the directory provisioning configuration was last updated */
@@ -9553,6 +9556,8 @@ export interface CreateResourceServerResponseContent {
signing_secret?: string | undefined;
/** Whether refresh tokens can be issued for this API (true) or not (false). */
allow_offline_access?: boolean | undefined;
+ /** Whether Online Refresh Tokens can be issued for this API (true) or not (false). */
+ allow_online_access?: boolean | undefined;
/** Whether to skip user consent for applications flagged as first party (true) or not (false). */
skip_consent_for_verifiable_first_party_clients?: boolean | undefined;
/** Expiration value (in seconds) for access tokens issued for this API from the token endpoint. */
@@ -9564,7 +9569,7 @@ export interface CreateResourceServerResponseContent {
token_dialect?: Management.ResourceServerTokenDialectResponseEnum | undefined;
token_encryption?: (Management.ResourceServerTokenEncryption | null) | undefined;
consent_policy?: (Management.ResourceServerConsentPolicyEnum | null) | undefined;
- authorization_details?: unknown[] | undefined;
+ authorization_details?: (unknown[] | null) | undefined;
proof_of_possession?: (Management.ResourceServerProofOfPossession | null) | undefined;
subject_type_authorization?: Management.ResourceServerSubjectTypeAuthorization | undefined;
/** The client ID of the client that this resource server is linked to */
@@ -10151,6 +10156,7 @@ export interface DirectoryProvisioning {
mapping: Management.DirectoryProvisioningMappingItem[];
/** Whether periodic automatic synchronization is enabled */
synchronize_automatically: boolean;
+ synchronize_groups?: Management.SynchronizeGroupsEnum | undefined;
/** The timestamp at which the directory provisioning configuration was created */
created_at: string;
/** The timestamp at which the directory provisioning configuration was last updated */
@@ -10674,7 +10680,8 @@ export type EventStreamTestEventTypeEnum =
export type EventStreamWebhookAuthorizationResponse =
| Management.EventStreamWebhookBasicAuth
- | Management.EventStreamWebhookBearerAuth;
+ | Management.EventStreamWebhookBearerAuth
+ | Management.EventStreamWebhookCustomHeaderAuth;
/**
* Basic Authorization for HTTP requests (e.g., 'Basic credentials').
@@ -10715,6 +10722,22 @@ export interface EventStreamWebhookConfiguration {
webhook_authorization: Management.EventStreamWebhookAuthorizationResponse;
}
+/**
+ * Custom header authorization for HTTP requests.
+ */
+export interface EventStreamWebhookCustomHeaderAuth {
+ method: Management.EventStreamWebhookCustomHeaderAuthMethodEnum;
+ /** HTTP header name. */
+ header_key: string;
+}
+
+/** Type of authorization. */
+export const EventStreamWebhookCustomHeaderAuthMethodEnum = {
+ CustomHeader: "custom_header",
+} as const;
+export type EventStreamWebhookCustomHeaderAuthMethodEnum =
+ (typeof EventStreamWebhookCustomHeaderAuthMethodEnum)[keyof typeof EventStreamWebhookCustomHeaderAuthMethodEnum];
+
export interface EventStreamWebhookDestination {
type: Management.EventStreamWebhookDestinationTypeEnum;
configuration: Management.EventStreamWebhookConfiguration;
@@ -14390,13 +14413,13 @@ export interface GetAculResponseContent {
screen?: string | undefined;
/** Rendering mode */
rendering_mode?: Management.AculRenderingModeEnum | undefined;
- context_configuration?: Management.AculContextConfiguration | undefined;
+ context_configuration?: ((Management.AculContextConfiguration | undefined) | null) | undefined;
/** Override Universal Login default head tags */
default_head_tags_disabled?: (boolean | null) | undefined;
/** Use page template with ACUL */
use_page_template?: (boolean | null) | undefined;
/** An array of head tags */
- head_tags?: Management.AculHeadTag[] | undefined;
+ head_tags?: (Management.AculHeadTag[] | null) | undefined;
filters?: (Management.AculFilters | null) | undefined;
/** Accepts any additional properties */
[key: string]: any;
@@ -14590,7 +14613,7 @@ export interface GetClientResponseContent {
/** List of grant types supported for this application. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`. */
grant_types?: string[] | undefined;
jwt_configuration?: Management.ClientJwtConfiguration | undefined;
- signing_keys?: Management.ClientSigningKeys | undefined;
+ signing_keys?: ((Management.ClientSigningKeys | undefined) | null) | undefined;
encryption_key?: (Management.ClientEncryptionKey | null) | undefined;
/** Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). */
sso?: boolean | undefined;
@@ -14645,6 +14668,12 @@ export interface GetClientResponseContent {
async_approval_notification_channels?:
| Management.ClientAsyncApprovalNotificationsChannelsApiPostConfiguration
| undefined;
+ external_metadata_type?: Management.ClientExternalMetadataTypeEnum | undefined;
+ external_metadata_created_by?: Management.ClientExternalMetadataCreatedByEnum | undefined;
+ /** An alternate client identifier to be used during authorization flows. Only supports CIMD-based client identifiers. */
+ external_client_id?: string | undefined;
+ /** URL for the JSON Web Key Set (JWKS) containing the public keys used for private_key_jwt authentication. Only present for CIMD clients using private_key_jwt authentication. */
+ jwks_uri?: string | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
@@ -14736,6 +14765,39 @@ export interface GetCustomSigningKeysResponseContent {
*/
export type GetCustomTextsByLanguageResponseContent = Record;
+export interface GetDefaultCanonicalDomainResponseContent {
+ /** Domain name. */
+ domain: string;
+}
+
+export interface GetDefaultCustomDomainResponseContent {
+ /** ID of the custom domain. */
+ custom_domain_id: string;
+ /** Domain name. */
+ domain: string;
+ /** Whether this is a primary domain (true) or not (false). */
+ primary: boolean;
+ /** Whether this is the default custom domain (true) or not (false). */
+ is_default?: boolean | undefined;
+ status: Management.CustomDomainStatusFilterEnum;
+ type: Management.CustomDomainTypeEnum;
+ /** Intermediate address. */
+ origin_domain_name?: string | undefined;
+ verification?: Management.DomainVerification | undefined;
+ /** The HTTP header to fetch the client's IP address */
+ custom_client_ip_header?: (string | null) | undefined;
+ /** The TLS version policy */
+ tls_policy?: string | undefined;
+ domain_metadata?: Management.DomainMetadata | undefined;
+ certificate?: Management.DomainCertificate | undefined;
+ /** Relying Party ID (rpId) to be used for Passkeys on this custom domain. If not present, the full domain will be used. */
+ relying_party_identifier?: string | undefined;
+}
+
+export type GetDefaultDomainResponseContent =
+ | Management.GetDefaultCustomDomainResponseContent
+ | Management.GetDefaultCanonicalDomainResponseContent;
+
export interface GetDirectoryProvisioningDefaultMappingResponseContent {
/** The mapping between Auth0 and IDP user attributes */
mapping?: Management.DirectoryProvisioningMappingItem[] | undefined;
@@ -14752,6 +14814,7 @@ export interface GetDirectoryProvisioningResponseContent {
mapping: Management.DirectoryProvisioningMappingItem[];
/** Whether periodic automatic synchronization is enabled */
synchronize_automatically: boolean;
+ synchronize_groups?: Management.SynchronizeGroupsEnum | undefined;
/** The timestamp at which the directory provisioning configuration was created */
created_at: string;
/** The timestamp at which the directory provisioning configuration was last updated */
@@ -14925,17 +14988,14 @@ export interface GetGroupMembersResponseContent {
export interface GetGroupResponseContent {
/** Unique identifier for the group (service-generated). */
id: string;
- /** Name of the group. Must be unique within its scope (connection, organization, or tenant). Must contain between 1 and 128 printable ASCII characters. */
+ /** Name of the group. Must be unique within its connection. Must contain between 1 and 128 printable ASCII characters. */
name: string;
/** External identifier for the group, often used for SCIM synchronization. Max length of 256 characters. */
external_id?: string | undefined;
/** Identifier for the connection this group belongs to (if a connection group). */
connection_id?: string | undefined;
- /** Identifier for the organization this group belongs to (if an organization group). */
- organization_id?: (string | null) | undefined;
/** Identifier for the tenant this group belongs to. */
tenant_name: string;
- description?: (string | null) | undefined;
/** Timestamp of when the group was created. */
created_at: string;
/** Timestamp of when the group was last updated. */
@@ -15328,6 +15388,14 @@ export interface GetRefreshTokenResponseContent {
[key: string]: any;
}
+export interface GetRefreshTokensPaginatedResponseContent {
+ refresh_tokens?: Management.RefreshTokenResponseContent[] | undefined;
+ /** A cursor to be used as the "from" query parameter for the next page of results. */
+ next?: string | undefined;
+ /** Accepts any additional properties */
+ [key: string]: any;
+}
+
export interface GetResourceServerResponseContent {
/** ID of the API (resource server). */
id?: string | undefined;
@@ -15344,6 +15412,8 @@ export interface GetResourceServerResponseContent {
signing_secret?: string | undefined;
/** Whether refresh tokens can be issued for this API (true) or not (false). */
allow_offline_access?: boolean | undefined;
+ /** Whether Online Refresh Tokens can be issued for this API (true) or not (false). */
+ allow_online_access?: boolean | undefined;
/** Whether to skip user consent for applications flagged as first party (true) or not (false). */
skip_consent_for_verifiable_first_party_clients?: boolean | undefined;
/** Expiration value (in seconds) for access tokens issued for this API from the token endpoint. */
@@ -15355,7 +15425,7 @@ export interface GetResourceServerResponseContent {
token_dialect?: Management.ResourceServerTokenDialectResponseEnum | undefined;
token_encryption?: (Management.ResourceServerTokenEncryption | null) | undefined;
consent_policy?: (Management.ResourceServerConsentPolicyEnum | null) | undefined;
- authorization_details?: unknown[] | undefined;
+ authorization_details?: (unknown[] | null) | undefined;
proof_of_possession?: (Management.ResourceServerProofOfPossession | null) | undefined;
subject_type_authorization?: Management.ResourceServerSubjectTypeAuthorization | undefined;
/** The client ID of the client that this resource server is linked to */
@@ -15566,7 +15636,7 @@ export interface GetTenantSettingsResponseContent {
/** Whether to enable flexible factors for MFA in the PostLogin action */
customize_mfa_in_postlogin_action?: boolean | undefined;
/** Supported ACR values */
- acr_values_supported?: string[] | undefined;
+ acr_values_supported?: (string[] | null) | undefined;
mtls?: (Management.TenantSettingsMtls | null) | undefined;
/** Enables the use of Pushed Authorization Requests */
pushed_authorization_requests_supported?: boolean | undefined;
@@ -15748,17 +15818,14 @@ export interface GetVerifiableCredentialTemplateResponseContent {
export interface Group {
/** Unique identifier for the group (service-generated). */
id?: string | undefined;
- /** Name of the group. Must be unique within its scope (connection, organization, or tenant). Must contain between 1 and 128 printable ASCII characters. */
+ /** Name of the group. Must be unique within its connection. Must contain between 1 and 128 printable ASCII characters. */
name?: string | undefined;
/** External identifier for the group, often used for SCIM synchronization. Max length of 256 characters. */
external_id?: string | undefined;
/** Identifier for the connection this group belongs to (if a connection group). */
connection_id?: string | undefined;
- /** Identifier for the organization this group belongs to (if an organization group). */
- organization_id?: (string | null) | undefined;
/** Identifier for the tenant this group belongs to. */
tenant_name?: string | undefined;
- description?: (string | null) | undefined;
/** Timestamp of when the group was created. */
created_at?: string | undefined;
/** Timestamp of when the group was last updated. */
@@ -15923,7 +15990,6 @@ export const IdentityProviderEnum = {
Apple: "apple",
Dropbox: "dropbox",
Bitbucket: "bitbucket",
- Aol: "aol",
Auth0Oidc: "auth0-oidc",
Auth0: "auth0",
Baidu: "baidu",
@@ -15946,7 +16012,6 @@ export const IdentityProviderEnum = {
Ip: "ip",
Line: "line",
Linkedin: "linkedin",
- Miicard: "miicard",
Oauth1: "oauth1",
Oauth2: "oauth2",
Office365: "office365",
@@ -15956,7 +16021,6 @@ export const IdentityProviderEnum = {
PaypalSandbox: "paypal-sandbox",
Pingfederate: "pingfederate",
Planningcenter: "planningcenter",
- Renren: "renren",
SalesforceCommunity: "salesforce-community",
SalesforceSandbox: "salesforce-sandbox",
Salesforce: "salesforce",
@@ -15966,8 +16030,6 @@ export const IdentityProviderEnum = {
Shop: "shop",
Sms: "sms",
Soundcloud: "soundcloud",
- ThecitySandbox: "thecity-sandbox",
- Thecity: "thecity",
Thirtysevensignals: "thirtysevensignals",
Twitter: "twitter",
Untappd: "untappd",
@@ -15977,7 +16039,6 @@ export const IdentityProviderEnum = {
Windowslive: "windowslive",
Wordpress: "wordpress",
Yahoo: "yahoo",
- Yammer: "yammer",
Yandex: "yandex",
} as const;
export type IdentityProviderEnum = (typeof IdentityProviderEnum)[keyof typeof IdentityProviderEnum];
@@ -16200,13 +16261,13 @@ export interface ListAculsResponseContentItem {
screen?: string | undefined;
/** Rendering mode */
rendering_mode?: Management.AculRenderingModeEnum | undefined;
- context_configuration?: Management.AculContextConfiguration | undefined;
+ context_configuration?: ((Management.AculContextConfiguration | undefined) | null) | undefined;
/** Override Universal Login default head tags */
default_head_tags_disabled?: (boolean | null) | undefined;
/** Use page template with ACUL */
use_page_template?: (boolean | null) | undefined;
/** An array of head tags */
- head_tags?: Management.AculHeadTag[] | undefined;
+ head_tags?: (Management.AculHeadTag[] | null) | undefined;
filters?: (Management.AculFilters | null) | undefined;
/** Accepts any additional properties */
[key: string]: any;
@@ -17211,6 +17272,10 @@ export interface NativeSocialLoginGoogle {
enabled?: boolean | undefined;
}
+export type NetworkAclMatchConnectingIpv4Cidr = string;
+
+export type NetworkAclMatchConnectingIpv6Cidr = string;
+
export type NetworkAclMatchIpv4Cidr = string;
export type NetworkAclMatchIpv6Cidr = string;
@@ -17254,6 +17319,9 @@ export interface NetworkAclMatch {
ja3_fingerprints?: string[] | undefined;
ja4_fingerprints?: string[] | undefined;
user_agents?: string[] | undefined;
+ hostnames?: string[] | undefined;
+ connecting_ipv4_cidrs?: Management.NetworkAclMatchConnectingIpv4Cidr[] | undefined;
+ connecting_ipv6_cidrs?: Management.NetworkAclMatchConnectingIpv6Cidr[] | undefined;
}
export interface NetworkAclRule {
@@ -17477,6 +17545,54 @@ export interface PartialPhoneTemplateContent {
body?: Management.PhoneTemplateBody | undefined;
}
+export const PasswordCharacterTypeEnum = {
+ Uppercase: "uppercase",
+ Lowercase: "lowercase",
+ Number: "number",
+ Special: "special",
+} as const;
+export type PasswordCharacterTypeEnum = (typeof PasswordCharacterTypeEnum)[keyof typeof PasswordCharacterTypeEnum];
+
+/** When enabled, passwords must contain at least 3 out of 4 character types. Can only be enabled when all 4 character types are specified */
+export const PasswordCharacterTypeRulePolicyEnum = {
+ All: "all",
+ ThreeOfFour: "three_of_four",
+} as const;
+export type PasswordCharacterTypeRulePolicyEnum =
+ (typeof PasswordCharacterTypeRulePolicyEnum)[keyof typeof PasswordCharacterTypeRulePolicyEnum];
+
+/** Default dictionary to use for password validation. Options: "en_10k" (10,000 common words) or "en_100k" (100,000 common words) */
+export const PasswordDefaultDictionariesEnum = {
+ En10K: "en_10k",
+ En100K: "en_100k",
+} as const;
+export type PasswordDefaultDictionariesEnum =
+ (typeof PasswordDefaultDictionariesEnum)[keyof typeof PasswordDefaultDictionariesEnum];
+
+/** Controls whether identical consecutive characters are allowed in passwords */
+export const PasswordIdenticalCharactersPolicyEnum = {
+ Allow: "allow",
+ Block: "block",
+} as const;
+export type PasswordIdenticalCharactersPolicyEnum =
+ (typeof PasswordIdenticalCharactersPolicyEnum)[keyof typeof PasswordIdenticalCharactersPolicyEnum];
+
+/** Controls whether passwords that exceed the maximum length are truncated or rejected */
+export const PasswordMaxLengthExceededPolicyEnum = {
+ Truncate: "truncate",
+ Error: "error",
+} as const;
+export type PasswordMaxLengthExceededPolicyEnum =
+ (typeof PasswordMaxLengthExceededPolicyEnum)[keyof typeof PasswordMaxLengthExceededPolicyEnum];
+
+/** Controls whether sequential characters are allowed in passwords */
+export const PasswordSequentialCharactersPolicyEnum = {
+ Allow: "allow",
+ Block: "block",
+} as const;
+export type PasswordSequentialCharactersPolicyEnum =
+ (typeof PasswordSequentialCharactersPolicyEnum)[keyof typeof PasswordSequentialCharactersPolicyEnum];
+
export interface PatchClientCredentialResponseContent {
/** ID of the credential. Generated on creation. */
id?: string | undefined;
@@ -17692,6 +17808,17 @@ export const PreferredAuthenticationMethodEnum = {
export type PreferredAuthenticationMethodEnum =
(typeof PreferredAuthenticationMethodEnum)[keyof typeof PreferredAuthenticationMethodEnum];
+export interface PreviewCimdMetadataResponseContent {
+ /** The client_id of an existing client registered with this external_client_id, if one exists. */
+ client_id?: string | undefined;
+ /** Array of retrieval errors (populated when the metadata document could not be fetched). When present, validation is omitted. */
+ errors?: string[] | undefined;
+ validation?: Management.CimdValidationResult | undefined;
+ mapped_fields?: Management.CimdMappedClientFields | undefined;
+ /** Accepts any additional properties */
+ [key: string]: any;
+}
+
/** Name of the prompt */
export const PromptGroupNameEnum = {
Login: "login",
@@ -17815,6 +17942,7 @@ export const PromptLanguageEnum = {
Zgh: "zgh",
ZhCn: "zh-CN",
ZhHk: "zh-HK",
+ ZhMo: "zh-MO",
ZhTw: "zh-TW",
} as const;
export type PromptLanguageEnum = (typeof PromptLanguageEnum)[keyof typeof PromptLanguageEnum];
@@ -17830,6 +17958,8 @@ export interface PublicKeyCredential {
parse_expiry_from_cert?: boolean | undefined;
/** The ISO 8601 formatted date representing the expiration of the credential. If not specified (not recommended), the credential never expires. Applies to `public_key` credential type. */
expires_at?: string | undefined;
+ /** Optional kid (Key ID), used to uniquely identify the credential. If not specified, a kid value will be auto-generated. The kid header parameter in JWTs sent by your client should match this value. Valid format is [0-9a-zA-Z-_]{10,64} */
+ kid?: string | undefined;
}
/** Algorithm which will be used with the credential. Can be one of RS256, RS384, PS256. If not specified, RS256 will be used. Applies to `public_key` credential type. */
@@ -17942,6 +18072,18 @@ export interface RegenerateUsersRecoveryCodeResponseContent {
[key: string]: any;
}
+/**
+ * Response after successfully registering or updating a CIMD client
+ */
+export interface RegisterCimdClientResponseContent {
+ /** The Auth0 client_id of the created or updated client */
+ client_id: string;
+ mapped_fields: Management.CimdMappedClientFields;
+ validation: Management.CimdValidationResult;
+ /** Accepts any additional properties */
+ [key: string]: any;
+}
+
export type ResetPhoneTemplateRequestContent = unknown;
export interface ResetPhoneTemplateResponseContent {
@@ -17971,6 +18113,8 @@ export interface ResourceServer {
signing_secret?: string | undefined;
/** Whether refresh tokens can be issued for this API (true) or not (false). */
allow_offline_access?: boolean | undefined;
+ /** Whether Online Refresh Tokens can be issued for this API (true) or not (false). */
+ allow_online_access?: boolean | undefined;
/** Whether to skip user consent for applications flagged as first party (true) or not (false). */
skip_consent_for_verifiable_first_party_clients?: boolean | undefined;
/** Expiration value (in seconds) for access tokens issued for this API from the token endpoint. */
@@ -17982,7 +18126,7 @@ export interface ResourceServer {
token_dialect?: Management.ResourceServerTokenDialectResponseEnum | undefined;
token_encryption?: (Management.ResourceServerTokenEncryption | null) | undefined;
consent_policy?: (Management.ResourceServerConsentPolicyEnum | null) | undefined;
- authorization_details?: unknown[] | undefined;
+ authorization_details?: (unknown[] | null) | undefined;
proof_of_possession?: (Management.ResourceServerProofOfPossession | null) | undefined;
subject_type_authorization?: Management.ResourceServerSubjectTypeAuthorization | undefined;
/** The client ID of the client that this resource server is linked to */
@@ -18217,7 +18361,7 @@ export interface RotateClientSecretResponseContent {
/** List of grant types supported for this application. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`. */
grant_types?: string[] | undefined;
jwt_configuration?: Management.ClientJwtConfiguration | undefined;
- signing_keys?: Management.ClientSigningKeys | undefined;
+ signing_keys?: ((Management.ClientSigningKeys | undefined) | null) | undefined;
encryption_key?: (Management.ClientEncryptionKey | null) | undefined;
/** Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). */
sso?: boolean | undefined;
@@ -18272,6 +18416,12 @@ export interface RotateClientSecretResponseContent {
async_approval_notification_channels?:
| Management.ClientAsyncApprovalNotificationsChannelsApiPostConfiguration
| undefined;
+ external_metadata_type?: Management.ClientExternalMetadataTypeEnum | undefined;
+ external_metadata_created_by?: Management.ClientExternalMetadataCreatedByEnum | undefined;
+ /** An alternate client identifier to be used during authorization flows. Only supports CIMD-based client identifiers. */
+ external_client_id?: string | undefined;
+ /** URL for the JSON Web Key Set (JWKS) containing the public keys used for private_key_jwt authentication. Only present for CIMD clients using private_key_jwt authentication. */
+ jwks_uri?: string | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
@@ -18582,7 +18732,7 @@ export interface SelfServiceProfileSsoTicketConnectionOptions {
/** URL for the icon. Must use HTTPS. */
icon_url?: (string | null) | undefined;
/** List of domain_aliases that can be authenticated in the Identity Provider */
- domain_aliases?: string[] | undefined;
+ domain_aliases?: (string[] | null) | undefined;
idpinitiated?: (Management.SelfServiceProfileSsoTicketIdpInitiatedOptions | null) | undefined;
}
@@ -19145,6 +19295,7 @@ export const SupportedLocales = {
Zgh: "zgh",
ZhCn: "zh-CN",
ZhHk: "zh-HK",
+ ZhMo: "zh-MO",
ZhTw: "zh-TW",
} as const;
export type SupportedLocales = (typeof SupportedLocales)[keyof typeof SupportedLocales];
@@ -19191,6 +19342,17 @@ export interface SuspiciousIpThrottlingStage {
"pre-user-registration"?: Management.SuspiciousIpThrottlingPreUserRegistrationStage | undefined;
}
+export const SynchronizeGroupsEaEnum = {
+ All: "all",
+ Off: "off",
+} as const;
+export type SynchronizeGroupsEaEnum = (typeof SynchronizeGroupsEaEnum)[keyof typeof SynchronizeGroupsEaEnum];
+
+/**
+ * Group synchronization configuration
+ */
+export type SynchronizeGroupsEnum = string;
+
/**
* Settings related to OIDC RP-initiated Logout
*/
@@ -19417,6 +19579,7 @@ export const TenantSettingsSupportedLocalesEnum = {
Zgh: "zgh",
ZhCn: "zh-CN",
ZhHk: "zh-HK",
+ ZhMo: "zh-MO",
ZhTw: "zh-TW",
} as const;
export type TenantSettingsSupportedLocalesEnum =
@@ -19586,13 +19749,13 @@ export interface UpdateActionResponseContent {
export interface UpdateAculResponseContent {
/** Rendering mode */
rendering_mode?: Management.AculRenderingModeEnum | undefined;
- context_configuration?: Management.AculContextConfiguration | undefined;
+ context_configuration?: ((Management.AculContextConfiguration | undefined) | null) | undefined;
/** Override Universal Login default head tags */
default_head_tags_disabled?: (boolean | null) | undefined;
/** Use page template with ACUL */
use_page_template?: (boolean | null) | undefined;
/** An array of head tags */
- head_tags?: Management.AculHeadTag[] | undefined;
+ head_tags?: (Management.AculHeadTag[] | null) | undefined;
filters?: (Management.AculFilters | null) | undefined;
/** Accepts any additional properties */
[key: string]: any;
@@ -19783,7 +19946,7 @@ export interface UpdateClientResponseContent {
/** List of grant types supported for this application. Can include `authorization_code`, `implicit`, `refresh_token`, `client_credentials`, `password`, `http://auth0.com/oauth/grant-type/password-realm`, `http://auth0.com/oauth/grant-type/mfa-oob`, `http://auth0.com/oauth/grant-type/mfa-otp`, `http://auth0.com/oauth/grant-type/mfa-recovery-code`, `urn:openid:params:grant-type:ciba`, `urn:ietf:params:oauth:grant-type:device_code`, and `urn:auth0:params:oauth:grant-type:token-exchange:federated-connection-access-token`. */
grant_types?: string[] | undefined;
jwt_configuration?: Management.ClientJwtConfiguration | undefined;
- signing_keys?: Management.ClientSigningKeys | undefined;
+ signing_keys?: ((Management.ClientSigningKeys | undefined) | null) | undefined;
encryption_key?: (Management.ClientEncryptionKey | null) | undefined;
/** Applies only to SSO clients and determines whether Auth0 will handle Single Sign On (true) or whether the Identity Provider will (false). */
sso?: boolean | undefined;
@@ -19838,6 +20001,12 @@ export interface UpdateClientResponseContent {
async_approval_notification_channels?:
| Management.ClientAsyncApprovalNotificationsChannelsApiPostConfiguration
| undefined;
+ external_metadata_type?: Management.ClientExternalMetadataTypeEnum | undefined;
+ external_metadata_created_by?: Management.ClientExternalMetadataCreatedByEnum | undefined;
+ /** An alternate client identifier to be used during authorization flows. Only supports CIMD-based client identifiers. */
+ external_client_id?: string | undefined;
+ /** URL for the JSON Web Key Set (JWKS) containing the public keys used for private_key_jwt authentication. Only present for CIMD clients using private_key_jwt authentication. */
+ jwks_uri?: string | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
@@ -19848,7 +20017,7 @@ export interface UpdateClientResponseContent {
export interface UpdateConnectionOptions {
validation?: (Management.ConnectionValidationOptions | null) | undefined;
/** An array of user fields that should not be stored in the Auth0 database (https://auth0.com/docs/security/data-security/denylist) */
- non_persistent_attrs?: string[] | undefined;
+ non_persistent_attrs?: (string[] | null) | undefined;
/** Order of precedence for attribute types. If the property is not specified, the default precedence of attributes will be used. */
precedence?: Management.ConnectionIdentifierPrecedenceEnum[] | undefined;
attributes?: Management.ConnectionAttributes | undefined;
@@ -19858,6 +20027,8 @@ export interface UpdateConnectionOptions {
enabledDatabaseCustomization?: boolean | undefined;
/** Enable this if you have a legacy user store and you want to gradually migrate those users to the Auth0 user store */
import_mode?: boolean | undefined;
+ /** Stores encrypted string only configurations for connections */
+ configuration?: (Record | null) | undefined;
customScripts?: Management.ConnectionCustomScripts | undefined;
authentication_methods?: (Management.ConnectionAuthenticationMethods | null) | undefined;
passkey_options?: (Management.ConnectionPasskeyOptions | null) | undefined;
@@ -19879,6 +20050,7 @@ export interface UpdateConnectionOptions {
set_user_root_attributes?: Management.ConnectionSetUserRootAttributesEnum | undefined;
gateway_authentication?: (Management.ConnectionGatewayAuthentication | null) | undefined;
federated_connections_access_tokens?: (Management.ConnectionFederatedConnectionsAccessTokens | null) | undefined;
+ password_options?: Management.ConnectionPasswordOptions | undefined;
/** Accepts any additional properties */
[key: string]: any;
}
@@ -19908,13 +20080,6 @@ export interface UpdateConnectionRequestContentAdfs extends Management.Connectio
show_as_button?: Management.ConnectionShowAsButton | undefined;
}
-/**
- * Update a connection with strategy=aol
- */
-export interface UpdateConnectionRequestContentAol extends Management.ConnectionCommon {
- options?: Management.ConnectionOptionsAol | undefined;
-}
-
/**
* Update a connection with strategy=amazon
*/
@@ -20110,13 +20275,6 @@ export interface UpdateConnectionRequestContentLinkedin extends Management.Conne
options?: Management.ConnectionOptionsLinkedin | undefined;
}
-/**
- * Update a connection with strategy=miicard
- */
-export interface UpdateConnectionRequestContentMiicard extends Management.ConnectionCommon {
- options?: Management.ConnectionOptionsMiicard | undefined;
-}
-
/**
* Update a connection with strategy=oauth1
*/
@@ -20187,13 +20345,6 @@ export interface UpdateConnectionRequestContentPlanningCenter extends Management
options?: Management.ConnectionOptionsPlanningCenter | undefined;
}
-/**
- * Update a connection with strategy=renren
- */
-export interface UpdateConnectionRequestContentRenren extends Management.ConnectionCommon {
- options?: Management.ConnectionOptionsRenren | undefined;
-}
-
/**
* Update a connection with strategy=samlp
*/
@@ -20316,13 +20467,6 @@ export interface UpdateConnectionRequestContentYahoo extends Management.Connecti
options?: Management.ConnectionOptionsYahoo | undefined;
}
-/**
- * Update a connection with strategy=yammer
- */
-export interface UpdateConnectionRequestContentYammer extends Management.ConnectionCommon {
- options?: Management.ConnectionOptionsYammer | undefined;
-}
-
/**
* Update a connection with strategy=yandex
*/
@@ -20375,11 +20519,45 @@ export interface UpdateCustomDomainResponseContent {
relying_party_identifier?: string | undefined;
}
+export interface UpdateDefaultCanonicalDomainResponseContent {
+ /** Domain name. */
+ domain: string;
+}
+
+export interface UpdateDefaultCustomDomainResponseContent {
+ /** ID of the custom domain. */
+ custom_domain_id: string;
+ /** Domain name. */
+ domain: string;
+ /** Whether this is a primary domain (true) or not (false). */
+ primary: boolean;
+ /** Whether this is the default custom domain (true) or not (false). */
+ is_default?: boolean | undefined;
+ status: Management.CustomDomainStatusFilterEnum;
+ type: Management.CustomDomainTypeEnum;
+ /** Intermediate address. */
+ origin_domain_name?: string | undefined;
+ verification?: Management.DomainVerification | undefined;
+ /** The HTTP header to fetch the client's IP address */
+ custom_client_ip_header?: (string | null) | undefined;
+ /** The TLS version policy */
+ tls_policy?: string | undefined;
+ domain_metadata?: Management.DomainMetadata | undefined;
+ certificate?: Management.DomainCertificate | undefined;
+ /** Relying Party ID (rpId) to be used for Passkeys on this custom domain. If not present, the full domain will be used. */
+ relying_party_identifier?: string | undefined;
+}
+
+export type UpdateDefaultDomainResponseContent =
+ | Management.UpdateDefaultCustomDomainResponseContent
+ | Management.UpdateDefaultCanonicalDomainResponseContent;
+
export interface UpdateDirectoryProvisioningRequestContent {
/** The mapping between Auth0 and IDP user attributes */
mapping?: Management.DirectoryProvisioningMappingItem[] | undefined;
/** Whether periodic automatic synchronization is enabled */
synchronize_automatically?: boolean | undefined;
+ synchronize_groups?: Management.SynchronizeGroupsEnum | undefined;
}
export interface UpdateDirectoryProvisioningResponseContent {
@@ -20393,6 +20571,7 @@ export interface UpdateDirectoryProvisioningResponseContent {
mapping: Management.DirectoryProvisioningMappingItem[];
/** Whether periodic automatic synchronization is enabled */
synchronize_automatically: boolean;
+ synchronize_groups?: Management.SynchronizeGroupsEnum | undefined;
/** The timestamp at which the directory provisioning configuration was created */
created_at: string;
/** The timestamp at which the directory provisioning configuration was last updated */
@@ -20674,6 +20853,8 @@ export interface UpdateResourceServerResponseContent {
signing_secret?: string | undefined;
/** Whether refresh tokens can be issued for this API (true) or not (false). */
allow_offline_access?: boolean | undefined;
+ /** Whether Online Refresh Tokens can be issued for this API (true) or not (false). */
+ allow_online_access?: boolean | undefined;
/** Whether to skip user consent for applications flagged as first party (true) or not (false). */
skip_consent_for_verifiable_first_party_clients?: boolean | undefined;
/** Expiration value (in seconds) for access tokens issued for this API from the token endpoint. */
@@ -20685,7 +20866,7 @@ export interface UpdateResourceServerResponseContent {
token_dialect?: Management.ResourceServerTokenDialectResponseEnum | undefined;
token_encryption?: (Management.ResourceServerTokenEncryption | null) | undefined;
consent_policy?: (Management.ResourceServerConsentPolicyEnum | null) | undefined;
- authorization_details?: unknown[] | undefined;
+ authorization_details?: (unknown[] | null) | undefined;
proof_of_possession?: (Management.ResourceServerProofOfPossession | null) | undefined;
subject_type_authorization?: Management.ResourceServerSubjectTypeAuthorization | undefined;
/** The client ID of the client that this resource server is linked to */
@@ -20855,7 +21036,7 @@ export interface UpdateTenantSettingsResponseContent {
/** Whether to enable flexible factors for MFA in the PostLogin action */
customize_mfa_in_postlogin_action?: boolean | undefined;
/** Supported ACR values */
- acr_values_supported?: string[] | undefined;
+ acr_values_supported?: (string[] | null) | undefined;
mtls?: (Management.TenantSettingsMtls | null) | undefined;
/** Enables the use of Pushed Authorization Requests */
pushed_authorization_requests_supported?: boolean | undefined;
@@ -21282,7 +21463,6 @@ export const UserIdentityProviderEnum = {
Apple: "apple",
Dropbox: "dropbox",
Bitbucket: "bitbucket",
- Aol: "aol",
Auth0Oidc: "auth0-oidc",
Auth0: "auth0",
Baidu: "baidu",
@@ -21305,7 +21485,6 @@ export const UserIdentityProviderEnum = {
Ip: "ip",
Line: "line",
Linkedin: "linkedin",
- Miicard: "miicard",
Oauth1: "oauth1",
Oauth2: "oauth2",
Office365: "office365",
@@ -21315,7 +21494,6 @@ export const UserIdentityProviderEnum = {
PaypalSandbox: "paypal-sandbox",
Pingfederate: "pingfederate",
Planningcenter: "planningcenter",
- Renren: "renren",
SalesforceCommunity: "salesforce-community",
SalesforceSandbox: "salesforce-sandbox",
Salesforce: "salesforce",
@@ -21325,8 +21503,6 @@ export const UserIdentityProviderEnum = {
Shop: "shop",
Sms: "sms",
Soundcloud: "soundcloud",
- ThecitySandbox: "thecity-sandbox",
- Thecity: "thecity",
Thirtysevensignals: "thirtysevensignals",
Twitter: "twitter",
Untappd: "untappd",
@@ -21336,7 +21512,6 @@ export const UserIdentityProviderEnum = {
Windowslive: "windowslive",
Wordpress: "wordpress",
Yahoo: "yahoo",
- Yammer: "yammer",
Yandex: "yandex",
} as const;
export type UserIdentityProviderEnum = (typeof UserIdentityProviderEnum)[keyof typeof UserIdentityProviderEnum];
diff --git a/src/management/tests/wire/actions.test.ts b/src/management/tests/wire/actions.test.ts
index f7c48732ae..5fc84b8f47 100644
--- a/src/management/tests/wire/actions.test.ts
+++ b/src/management/tests/wire/actions.test.ts
@@ -17,7 +17,7 @@ describe("ActionsClient", () => {
{
id: "id",
name: "name",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
all_changes_deployed: true,
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -51,7 +51,7 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
all_changes_deployed: true,
@@ -70,7 +70,7 @@ describe("ActionsClient", () => {
],
};
const page = await client.actions.list({
- triggerId: "triggerId",
+ triggerId: "post-login",
actionName: "actionName",
deployed: true,
page: 1,
@@ -159,18 +159,18 @@ describe("ActionsClient", () => {
test("create (1)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { name: "name", supported_triggers: [{ id: "id" }] };
+ const rawRequestBody = { name: "name", supported_triggers: [{ id: "post-login" }] };
const rawResponseBody = {
id: "id",
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
- compatible_triggers: [{ id: "id", version: "version" }],
+ compatible_triggers: [{ id: "post-login", version: "version" }],
binding_policy: "trigger-bound",
},
],
@@ -195,7 +195,7 @@ describe("ActionsClient", () => {
action: {
id: "id",
name: "name",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
all_changes_deployed: true,
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -203,7 +203,7 @@ describe("ActionsClient", () => {
built_at: "2024-01-15T09:30:00Z",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
modules: [{}],
},
installed_integration_id: "installed_integration_id",
@@ -222,7 +222,7 @@ describe("ActionsClient", () => {
public_support_link: "public_support_link",
current_release: {
id: "id",
- trigger: { id: "id" },
+ trigger: { id: "post-login" },
required_secrets: [{}],
required_configuration: [{}],
},
@@ -254,7 +254,7 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
});
@@ -263,14 +263,14 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
compatible_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
},
],
@@ -311,7 +311,7 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
all_changes_deployed: true,
@@ -323,7 +323,7 @@ describe("ActionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
modules: [{}],
@@ -345,7 +345,7 @@ describe("ActionsClient", () => {
current_release: {
id: "id",
trigger: {
- id: "id",
+ id: "post-login",
},
required_secrets: [{}],
required_configuration: [{}],
@@ -370,7 +370,7 @@ describe("ActionsClient", () => {
test("create (2)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { name: "my-action", supported_triggers: [{ id: "id" }, { id: "id" }] };
+ const rawRequestBody = { name: "my-action", supported_triggers: [{ id: "post-login" }, { id: "post-login" }] };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -386,10 +386,10 @@ describe("ActionsClient", () => {
name: "my-action",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
{
- id: "id",
+ id: "post-login",
},
],
});
@@ -399,7 +399,7 @@ describe("ActionsClient", () => {
test("create (3)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { name: "my-action", supported_triggers: [{ id: "id" }, { id: "id" }] };
+ const rawRequestBody = { name: "my-action", supported_triggers: [{ id: "post-login" }, { id: "post-login" }] };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -415,10 +415,10 @@ describe("ActionsClient", () => {
name: "my-action",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
{
- id: "id",
+ id: "post-login",
},
],
});
@@ -428,7 +428,7 @@ describe("ActionsClient", () => {
test("create (4)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { name: "my-action", supported_triggers: [{ id: "id" }, { id: "id" }] };
+ const rawRequestBody = { name: "my-action", supported_triggers: [{ id: "post-login" }, { id: "post-login" }] };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -444,10 +444,10 @@ describe("ActionsClient", () => {
name: "my-action",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
{
- id: "id",
+ id: "post-login",
},
],
});
@@ -457,7 +457,7 @@ describe("ActionsClient", () => {
test("create (5)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { name: "my-action", supported_triggers: [{ id: "id" }, { id: "id" }] };
+ const rawRequestBody = { name: "my-action", supported_triggers: [{ id: "post-login" }, { id: "post-login" }] };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -473,10 +473,10 @@ describe("ActionsClient", () => {
name: "my-action",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
{
- id: "id",
+ id: "post-login",
},
],
});
@@ -492,12 +492,12 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
- compatible_triggers: [{ id: "id", version: "version" }],
+ compatible_triggers: [{ id: "post-login", version: "version" }],
binding_policy: "trigger-bound",
},
],
@@ -522,7 +522,7 @@ describe("ActionsClient", () => {
action: {
id: "id",
name: "name",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
all_changes_deployed: true,
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -530,7 +530,7 @@ describe("ActionsClient", () => {
built_at: "2024-01-15T09:30:00Z",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
modules: [{}],
},
installed_integration_id: "installed_integration_id",
@@ -549,7 +549,7 @@ describe("ActionsClient", () => {
public_support_link: "public_support_link",
current_release: {
id: "id",
- trigger: { id: "id" },
+ trigger: { id: "post-login" },
required_secrets: [{}],
required_configuration: [{}],
},
@@ -582,14 +582,14 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
compatible_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
},
],
@@ -630,7 +630,7 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
all_changes_deployed: true,
@@ -642,7 +642,7 @@ describe("ActionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
modules: [{}],
@@ -664,7 +664,7 @@ describe("ActionsClient", () => {
current_release: {
id: "id",
trigger: {
- id: "id",
+ id: "post-login",
},
required_secrets: [{}],
required_configuration: [{}],
@@ -887,12 +887,12 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
- compatible_triggers: [{ id: "id", version: "version" }],
+ compatible_triggers: [{ id: "post-login", version: "version" }],
binding_policy: "trigger-bound",
},
],
@@ -917,7 +917,7 @@ describe("ActionsClient", () => {
action: {
id: "id",
name: "name",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
all_changes_deployed: true,
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -925,7 +925,7 @@ describe("ActionsClient", () => {
built_at: "2024-01-15T09:30:00Z",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
modules: [{}],
},
installed_integration_id: "installed_integration_id",
@@ -944,7 +944,7 @@ describe("ActionsClient", () => {
public_support_link: "public_support_link",
current_release: {
id: "id",
- trigger: { id: "id" },
+ trigger: { id: "post-login" },
required_secrets: [{}],
required_configuration: [{}],
},
@@ -978,14 +978,14 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
compatible_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
},
],
@@ -1026,7 +1026,7 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
all_changes_deployed: true,
@@ -1038,7 +1038,7 @@ describe("ActionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
modules: [{}],
@@ -1060,7 +1060,7 @@ describe("ActionsClient", () => {
current_release: {
id: "id",
trigger: {
- id: "id",
+ id: "post-login",
},
required_secrets: [{}],
required_configuration: [{}],
@@ -1195,7 +1195,7 @@ describe("ActionsClient", () => {
action: {
id: "id",
name: "name",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
all_changes_deployed: true,
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -1205,12 +1205,12 @@ describe("ActionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
- compatible_triggers: [{ id: "id", version: "version" }],
+ compatible_triggers: [{ id: "post-login", version: "version" }],
binding_policy: "trigger-bound",
},
],
@@ -1265,7 +1265,7 @@ describe("ActionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
all_changes_deployed: true,
@@ -1277,14 +1277,14 @@ describe("ActionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
compatible_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
},
],
diff --git a/src/management/tests/wire/actions/executions.test.ts b/src/management/tests/wire/actions/executions.test.ts
index 1823e694cc..ee51a45acb 100644
--- a/src/management/tests/wire/actions/executions.test.ts
+++ b/src/management/tests/wire/actions/executions.test.ts
@@ -11,7 +11,7 @@ describe("ExecutionsClient", () => {
const rawResponseBody = {
id: "id",
- trigger_id: "trigger_id",
+ trigger_id: "post-login",
status: "unspecified",
results: [
{ action_name: "action_name", started_at: "2024-01-15T09:30:00Z", ended_at: "2024-01-15T09:30:00Z" },
@@ -30,7 +30,7 @@ describe("ExecutionsClient", () => {
const response = await client.actions.executions.get("id");
expect(response).toEqual({
id: "id",
- trigger_id: "trigger_id",
+ trigger_id: "post-login",
status: "unspecified",
results: [
{
diff --git a/src/management/tests/wire/actions/modules.test.ts b/src/management/tests/wire/actions/modules.test.ts
index c541c32459..f6ad23e77c 100644
--- a/src/management/tests/wire/actions/modules.test.ts
+++ b/src/management/tests/wire/actions/modules.test.ts
@@ -781,7 +781,7 @@ describe("ModulesClient", () => {
action_name: "action_name",
module_version_id: "module_version_id",
module_version_number: 1,
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
},
],
total: 1,
@@ -805,7 +805,7 @@ describe("ModulesClient", () => {
module_version_number: 1,
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
},
diff --git a/src/management/tests/wire/actions/triggers.test.ts b/src/management/tests/wire/actions/triggers.test.ts
index 24bc96baa4..6c4911e690 100644
--- a/src/management/tests/wire/actions/triggers.test.ts
+++ b/src/management/tests/wire/actions/triggers.test.ts
@@ -12,12 +12,12 @@ describe("TriggersClient", () => {
const rawResponseBody = {
triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
- compatible_triggers: [{ id: "id", version: "version" }],
+ compatible_triggers: [{ id: "post-login", version: "version" }],
binding_policy: "trigger-bound",
},
],
@@ -28,14 +28,14 @@ describe("TriggersClient", () => {
expect(response).toEqual({
triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
compatible_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
},
],
diff --git a/src/management/tests/wire/actions/triggers/bindings.test.ts b/src/management/tests/wire/actions/triggers/bindings.test.ts
index 0e2dc05e2e..bf3b483ae3 100644
--- a/src/management/tests/wire/actions/triggers/bindings.test.ts
+++ b/src/management/tests/wire/actions/triggers/bindings.test.ts
@@ -16,7 +16,7 @@ describe("BindingsClient", () => {
bindings: [
{
id: "id",
- trigger_id: "trigger_id",
+ trigger_id: "post-login",
display_name: "display_name",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -25,7 +25,7 @@ describe("BindingsClient", () => {
};
server
.mockEndpoint({ once: false })
- .get("/actions/triggers/triggerId/bindings")
+ .get("/actions/triggers/post-login/bindings")
.respondWith()
.statusCode(200)
.jsonBody(rawResponseBody)
@@ -38,14 +38,14 @@ describe("BindingsClient", () => {
bindings: [
{
id: "id",
- trigger_id: "trigger_id",
+ trigger_id: "post-login",
display_name: "display_name",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
},
],
};
- const page = await client.actions.triggers.bindings.list("triggerId", {
+ const page = await client.actions.triggers.bindings.list("post-login", {
page: 1,
per_page: 1,
});
@@ -63,14 +63,14 @@ describe("BindingsClient", () => {
const rawResponseBody = { key: "value" };
server
.mockEndpoint({ once: false })
- .get("/actions/triggers/triggerId/bindings")
+ .get("/actions/triggers/post-login/bindings")
.respondWith()
.statusCode(400)
.jsonBody(rawResponseBody)
.build();
await expect(async () => {
- return await client.actions.triggers.bindings.list("triggerId");
+ return await client.actions.triggers.bindings.list("post-login");
}).rejects.toThrow(Management.BadRequestError);
});
@@ -81,14 +81,14 @@ describe("BindingsClient", () => {
const rawResponseBody = { key: "value" };
server
.mockEndpoint({ once: false })
- .get("/actions/triggers/triggerId/bindings")
+ .get("/actions/triggers/post-login/bindings")
.respondWith()
.statusCode(401)
.jsonBody(rawResponseBody)
.build();
await expect(async () => {
- return await client.actions.triggers.bindings.list("triggerId");
+ return await client.actions.triggers.bindings.list("post-login");
}).rejects.toThrow(Management.UnauthorizedError);
});
@@ -99,14 +99,14 @@ describe("BindingsClient", () => {
const rawResponseBody = { key: "value" };
server
.mockEndpoint({ once: false })
- .get("/actions/triggers/triggerId/bindings")
+ .get("/actions/triggers/post-login/bindings")
.respondWith()
.statusCode(403)
.jsonBody(rawResponseBody)
.build();
await expect(async () => {
- return await client.actions.triggers.bindings.list("triggerId");
+ return await client.actions.triggers.bindings.list("post-login");
}).rejects.toThrow(Management.ForbiddenError);
});
@@ -117,14 +117,14 @@ describe("BindingsClient", () => {
const rawResponseBody = { key: "value" };
server
.mockEndpoint({ once: false })
- .get("/actions/triggers/triggerId/bindings")
+ .get("/actions/triggers/post-login/bindings")
.respondWith()
.statusCode(429)
.jsonBody(rawResponseBody)
.build();
await expect(async () => {
- return await client.actions.triggers.bindings.list("triggerId");
+ return await client.actions.triggers.bindings.list("post-login");
}).rejects.toThrow(Management.TooManyRequestsError);
});
@@ -136,7 +136,7 @@ describe("BindingsClient", () => {
bindings: [
{
id: "id",
- trigger_id: "trigger_id",
+ trigger_id: "post-login",
display_name: "display_name",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -145,19 +145,19 @@ describe("BindingsClient", () => {
};
server
.mockEndpoint()
- .patch("/actions/triggers/triggerId/bindings")
+ .patch("/actions/triggers/post-login/bindings")
.jsonBody(rawRequestBody)
.respondWith()
.statusCode(200)
.jsonBody(rawResponseBody)
.build();
- const response = await client.actions.triggers.bindings.updateMany("triggerId");
+ const response = await client.actions.triggers.bindings.updateMany("post-login");
expect(response).toEqual({
bindings: [
{
id: "id",
- trigger_id: "trigger_id",
+ trigger_id: "post-login",
display_name: "display_name",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -173,7 +173,7 @@ describe("BindingsClient", () => {
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
- .patch("/actions/triggers/triggerId/bindings")
+ .patch("/actions/triggers/post-login/bindings")
.jsonBody(rawRequestBody)
.respondWith()
.statusCode(400)
@@ -181,7 +181,7 @@ describe("BindingsClient", () => {
.build();
await expect(async () => {
- return await client.actions.triggers.bindings.updateMany("triggerId");
+ return await client.actions.triggers.bindings.updateMany("post-login");
}).rejects.toThrow(Management.BadRequestError);
});
@@ -192,7 +192,7 @@ describe("BindingsClient", () => {
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
- .patch("/actions/triggers/triggerId/bindings")
+ .patch("/actions/triggers/post-login/bindings")
.jsonBody(rawRequestBody)
.respondWith()
.statusCode(401)
@@ -200,7 +200,7 @@ describe("BindingsClient", () => {
.build();
await expect(async () => {
- return await client.actions.triggers.bindings.updateMany("triggerId");
+ return await client.actions.triggers.bindings.updateMany("post-login");
}).rejects.toThrow(Management.UnauthorizedError);
});
@@ -211,7 +211,7 @@ describe("BindingsClient", () => {
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
- .patch("/actions/triggers/triggerId/bindings")
+ .patch("/actions/triggers/post-login/bindings")
.jsonBody(rawRequestBody)
.respondWith()
.statusCode(403)
@@ -219,7 +219,7 @@ describe("BindingsClient", () => {
.build();
await expect(async () => {
- return await client.actions.triggers.bindings.updateMany("triggerId");
+ return await client.actions.triggers.bindings.updateMany("post-login");
}).rejects.toThrow(Management.ForbiddenError);
});
@@ -230,7 +230,7 @@ describe("BindingsClient", () => {
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
- .patch("/actions/triggers/triggerId/bindings")
+ .patch("/actions/triggers/post-login/bindings")
.jsonBody(rawRequestBody)
.respondWith()
.statusCode(429)
@@ -238,7 +238,7 @@ describe("BindingsClient", () => {
.build();
await expect(async () => {
- return await client.actions.triggers.bindings.updateMany("triggerId");
+ return await client.actions.triggers.bindings.updateMany("post-login");
}).rejects.toThrow(Management.TooManyRequestsError);
});
});
diff --git a/src/management/tests/wire/actions/versions.test.ts b/src/management/tests/wire/actions/versions.test.ts
index f9075face2..331bf1e47c 100644
--- a/src/management/tests/wire/actions/versions.test.ts
+++ b/src/management/tests/wire/actions/versions.test.ts
@@ -28,7 +28,7 @@ describe("VersionsClient", () => {
built_at: "2024-01-15T09:30:00Z",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
modules: [{}],
},
],
@@ -62,7 +62,7 @@ describe("VersionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
modules: [{}],
@@ -170,7 +170,7 @@ describe("VersionsClient", () => {
action: {
id: "id",
name: "name",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
all_changes_deployed: true,
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -180,12 +180,12 @@ describe("VersionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
- compatible_triggers: [{ id: "id", version: "version" }],
+ compatible_triggers: [{ id: "post-login", version: "version" }],
binding_policy: "trigger-bound",
},
],
@@ -240,7 +240,7 @@ describe("VersionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
all_changes_deployed: true,
@@ -252,14 +252,14 @@ describe("VersionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
compatible_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
},
],
@@ -385,7 +385,7 @@ describe("VersionsClient", () => {
action: {
id: "id",
name: "name",
- supported_triggers: [{ id: "id" }],
+ supported_triggers: [{ id: "post-login" }],
all_changes_deployed: true,
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
@@ -395,12 +395,12 @@ describe("VersionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
- compatible_triggers: [{ id: "id", version: "version" }],
+ compatible_triggers: [{ id: "post-login", version: "version" }],
binding_policy: "trigger-bound",
},
],
@@ -455,7 +455,7 @@ describe("VersionsClient", () => {
name: "name",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
},
],
all_changes_deployed: true,
@@ -467,14 +467,14 @@ describe("VersionsClient", () => {
updated_at: "2024-01-15T09:30:00Z",
supported_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
status: "status",
runtimes: ["runtimes"],
default_runtime: "default_runtime",
compatible_triggers: [
{
- id: "id",
+ id: "post-login",
version: "version",
},
],
diff --git a/src/management/tests/wire/clientGrants.test.ts b/src/management/tests/wire/clientGrants.test.ts
index feb865e627..205c14b02a 100644
--- a/src/management/tests/wire/clientGrants.test.ts
+++ b/src/management/tests/wire/clientGrants.test.ts
@@ -105,7 +105,7 @@ describe("ClientGrantsClient", () => {
test("create (1)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { client_id: "client_id", audience: "audience" };
+ const rawRequestBody = { audience: "audience" };
const rawResponseBody = {
id: "id",
client_id: "client_id",
@@ -128,7 +128,6 @@ describe("ClientGrantsClient", () => {
.build();
const response = await client.clientGrants.create({
- client_id: "client_id",
audience: "audience",
});
expect(response).toEqual({
@@ -148,7 +147,7 @@ describe("ClientGrantsClient", () => {
test("create (2)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { client_id: "client_id", audience: "x" };
+ const rawRequestBody = { audience: "x" };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -161,7 +160,6 @@ describe("ClientGrantsClient", () => {
await expect(async () => {
return await client.clientGrants.create({
- client_id: "client_id",
audience: "x",
});
}).rejects.toThrow(Management.BadRequestError);
@@ -170,7 +168,7 @@ describe("ClientGrantsClient", () => {
test("create (3)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { client_id: "client_id", audience: "x" };
+ const rawRequestBody = { audience: "x" };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -183,7 +181,6 @@ describe("ClientGrantsClient", () => {
await expect(async () => {
return await client.clientGrants.create({
- client_id: "client_id",
audience: "x",
});
}).rejects.toThrow(Management.UnauthorizedError);
@@ -192,7 +189,7 @@ describe("ClientGrantsClient", () => {
test("create (4)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { client_id: "client_id", audience: "x" };
+ const rawRequestBody = { audience: "x" };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -205,7 +202,6 @@ describe("ClientGrantsClient", () => {
await expect(async () => {
return await client.clientGrants.create({
- client_id: "client_id",
audience: "x",
});
}).rejects.toThrow(Management.ForbiddenError);
@@ -214,7 +210,7 @@ describe("ClientGrantsClient", () => {
test("create (5)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { client_id: "client_id", audience: "x" };
+ const rawRequestBody = { audience: "x" };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -227,7 +223,6 @@ describe("ClientGrantsClient", () => {
await expect(async () => {
return await client.clientGrants.create({
- client_id: "client_id",
audience: "x",
});
}).rejects.toThrow(Management.NotFoundError);
@@ -236,7 +231,7 @@ describe("ClientGrantsClient", () => {
test("create (6)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { client_id: "client_id", audience: "x" };
+ const rawRequestBody = { audience: "x" };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -249,7 +244,6 @@ describe("ClientGrantsClient", () => {
await expect(async () => {
return await client.clientGrants.create({
- client_id: "client_id",
audience: "x",
});
}).rejects.toThrow(Management.ConflictError);
@@ -258,7 +252,7 @@ describe("ClientGrantsClient", () => {
test("create (7)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = { client_id: "client_id", audience: "x" };
+ const rawRequestBody = { audience: "x" };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -271,7 +265,6 @@ describe("ClientGrantsClient", () => {
await expect(async () => {
return await client.clientGrants.create({
- client_id: "client_id",
audience: "x",
});
}).rejects.toThrow(Management.TooManyRequestsError);
diff --git a/src/management/tests/wire/clients.test.ts b/src/management/tests/wire/clients.test.ts
index a39572e646..d72b795d74 100644
--- a/src/management/tests/wire/clients.test.ts
+++ b/src/management/tests/wire/clients.test.ts
@@ -67,6 +67,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
},
],
};
@@ -146,6 +150,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
},
],
};
@@ -158,6 +166,7 @@ describe("ClientsClient", () => {
is_global: true,
is_first_party: true,
app_type: "app_type",
+ external_client_id: "external_client_id",
q: "q",
});
@@ -433,6 +442,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
};
server
.mockEndpoint()
@@ -758,6 +771,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
});
});
@@ -866,6 +883,350 @@ describe("ClientsClient", () => {
}).rejects.toThrow(Management.TooManyRequestsError);
});
+ test("previewCimdMetadata (1)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "external_client_id" };
+ const rawResponseBody = {
+ client_id: "client_id",
+ errors: ["errors"],
+ validation: { valid: true, violations: ["violations"], warnings: ["warnings"] },
+ mapped_fields: {
+ external_client_id: "external_client_id",
+ name: "name",
+ app_type: "app_type",
+ callbacks: ["callbacks"],
+ logo_uri: "logo_uri",
+ description: "description",
+ grant_types: ["grant_types"],
+ token_endpoint_auth_method: "token_endpoint_auth_method",
+ jwks_uri: "jwks_uri",
+ client_authentication_methods: {
+ private_key_jwt: { credentials: [{ credential_type: "credential_type", kid: "kid", alg: "alg" }] },
+ },
+ },
+ };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/preview")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(200)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ const response = await client.clients.previewCimdMetadata({
+ external_client_id: "external_client_id",
+ });
+ expect(response).toEqual({
+ client_id: "client_id",
+ errors: ["errors"],
+ validation: {
+ valid: true,
+ violations: ["violations"],
+ warnings: ["warnings"],
+ },
+ mapped_fields: {
+ external_client_id: "external_client_id",
+ name: "name",
+ app_type: "app_type",
+ callbacks: ["callbacks"],
+ logo_uri: "logo_uri",
+ description: "description",
+ grant_types: ["grant_types"],
+ token_endpoint_auth_method: "token_endpoint_auth_method",
+ jwks_uri: "jwks_uri",
+ client_authentication_methods: {
+ private_key_jwt: {
+ credentials: [
+ {
+ credential_type: "credential_type",
+ kid: "kid",
+ alg: "alg",
+ },
+ ],
+ },
+ },
+ },
+ });
+ });
+
+ test("previewCimdMetadata (2)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/preview")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(400)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.previewCimdMetadata({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.BadRequestError);
+ });
+
+ test("previewCimdMetadata (3)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/preview")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(401)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.previewCimdMetadata({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.UnauthorizedError);
+ });
+
+ test("previewCimdMetadata (4)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/preview")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(403)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.previewCimdMetadata({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.ForbiddenError);
+ });
+
+ test("previewCimdMetadata (5)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/preview")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(429)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.previewCimdMetadata({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.TooManyRequestsError);
+ });
+
+ test("previewCimdMetadata (6)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/preview")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(500)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.previewCimdMetadata({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.InternalServerError);
+ });
+
+ test("registerCimdClient (1)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "external_client_id" };
+ const rawResponseBody = {
+ client_id: "client_id",
+ mapped_fields: {
+ external_client_id: "external_client_id",
+ name: "name",
+ app_type: "app_type",
+ callbacks: ["callbacks"],
+ logo_uri: "logo_uri",
+ description: "description",
+ grant_types: ["grant_types"],
+ token_endpoint_auth_method: "token_endpoint_auth_method",
+ jwks_uri: "jwks_uri",
+ client_authentication_methods: {
+ private_key_jwt: { credentials: [{ credential_type: "credential_type", kid: "kid", alg: "alg" }] },
+ },
+ },
+ validation: { valid: true, violations: ["violations"], warnings: ["warnings"] },
+ };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/register")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(200)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ const response = await client.clients.registerCimdClient({
+ external_client_id: "external_client_id",
+ });
+ expect(response).toEqual({
+ client_id: "client_id",
+ mapped_fields: {
+ external_client_id: "external_client_id",
+ name: "name",
+ app_type: "app_type",
+ callbacks: ["callbacks"],
+ logo_uri: "logo_uri",
+ description: "description",
+ grant_types: ["grant_types"],
+ token_endpoint_auth_method: "token_endpoint_auth_method",
+ jwks_uri: "jwks_uri",
+ client_authentication_methods: {
+ private_key_jwt: {
+ credentials: [
+ {
+ credential_type: "credential_type",
+ kid: "kid",
+ alg: "alg",
+ },
+ ],
+ },
+ },
+ },
+ validation: {
+ valid: true,
+ violations: ["violations"],
+ warnings: ["warnings"],
+ },
+ });
+ });
+
+ test("registerCimdClient (2)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/register")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(400)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.registerCimdClient({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.BadRequestError);
+ });
+
+ test("registerCimdClient (3)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/register")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(401)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.registerCimdClient({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.UnauthorizedError);
+ });
+
+ test("registerCimdClient (4)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/register")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(403)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.registerCimdClient({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.ForbiddenError);
+ });
+
+ test("registerCimdClient (5)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/register")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(429)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.registerCimdClient({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.TooManyRequestsError);
+ });
+
+ test("registerCimdClient (6)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { external_client_id: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .post("/clients/cimd/register")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(500)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.clients.registerCimdClient({
+ external_client_id: "x",
+ });
+ }).rejects.toThrow(Management.InternalServerError);
+ });
+
test("get (1)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
@@ -1060,6 +1421,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
};
server.mockEndpoint().get("/clients/id").respondWith().statusCode(200).jsonBody(rawResponseBody).build();
@@ -1379,6 +1744,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
});
});
@@ -1694,6 +2063,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
};
server
.mockEndpoint()
@@ -2017,6 +2390,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
});
});
@@ -2309,6 +2686,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
};
server
.mockEndpoint()
@@ -2631,6 +3012,10 @@ describe("ClientsClient", () => {
},
resource_server_identifier: "resource_server_identifier",
async_approval_notification_channels: ["guardian-push"],
+ external_metadata_type: "cimd",
+ external_metadata_created_by: "admin",
+ external_client_id: "external_client_id",
+ jwks_uri: "jwks_uri",
});
});
diff --git a/src/management/tests/wire/connections/directoryProvisioning.test.ts b/src/management/tests/wire/connections/directoryProvisioning.test.ts
index 061161a2fe..f057642b37 100644
--- a/src/management/tests/wire/connections/directoryProvisioning.test.ts
+++ b/src/management/tests/wire/connections/directoryProvisioning.test.ts
@@ -17,6 +17,7 @@ describe("DirectoryProvisioningClient", () => {
strategy: "strategy",
mapping: [{ auth0: "auth0", idp: "idp" }],
synchronize_automatically: true,
+ synchronize_groups: "synchronize_groups",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
last_synchronization_at: "2024-01-15T09:30:00Z",
@@ -47,6 +48,7 @@ describe("DirectoryProvisioningClient", () => {
},
],
synchronize_automatically: true,
+ synchronize_groups: "synchronize_groups",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
last_synchronization_at: "2024-01-15T09:30:00Z",
@@ -149,6 +151,7 @@ describe("DirectoryProvisioningClient", () => {
strategy: "strategy",
mapping: [{ auth0: "auth0", idp: "idp" }],
synchronize_automatically: true,
+ synchronize_groups: "synchronize_groups",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
last_synchronization_at: "2024-01-15T09:30:00Z",
@@ -175,6 +178,7 @@ describe("DirectoryProvisioningClient", () => {
},
],
synchronize_automatically: true,
+ synchronize_groups: "synchronize_groups",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
last_synchronization_at: "2024-01-15T09:30:00Z",
@@ -283,6 +287,7 @@ describe("DirectoryProvisioningClient", () => {
strategy: "strategy",
mapping: [{ auth0: "auth0", idp: "idp" }],
synchronize_automatically: true,
+ synchronize_groups: "synchronize_groups",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
last_synchronization_at: "2024-01-15T09:30:00Z",
@@ -309,6 +314,7 @@ describe("DirectoryProvisioningClient", () => {
},
],
synchronize_automatically: true,
+ synchronize_groups: "synchronize_groups",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
last_synchronization_at: "2024-01-15T09:30:00Z",
@@ -535,6 +541,7 @@ describe("DirectoryProvisioningClient", () => {
strategy: "strategy",
mapping: [{ auth0: "auth0", idp: "idp" }],
synchronize_automatically: true,
+ synchronize_groups: "synchronize_groups",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
last_synchronization_at: "2024-01-15T09:30:00Z",
@@ -561,6 +568,7 @@ describe("DirectoryProvisioningClient", () => {
},
],
synchronize_automatically: true,
+ synchronize_groups: "synchronize_groups",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
last_synchronization_at: "2024-01-15T09:30:00Z",
diff --git a/src/management/tests/wire/customDomains.test.ts b/src/management/tests/wire/customDomains.test.ts
index dc4a904568..b650d9977e 100644
--- a/src/management/tests/wire/customDomains.test.ts
+++ b/src/management/tests/wire/customDomains.test.ts
@@ -300,6 +300,249 @@ describe("CustomDomainsClient", () => {
}).rejects.toThrow(Management.TooManyRequestsError);
});
+ test("getDefault (1)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = {
+ custom_domain_id: "custom_domain_id",
+ domain: "domain",
+ primary: true,
+ is_default: true,
+ status: "pending_verification",
+ type: "auth0_managed_certs",
+ origin_domain_name: "origin_domain_name",
+ verification: {
+ methods: [{ name: "cname", record: "record" }],
+ status: "verified",
+ error_msg: "error_msg",
+ last_verified_at: "last_verified_at",
+ },
+ custom_client_ip_header: "custom_client_ip_header",
+ tls_policy: "tls_policy",
+ domain_metadata: { key: "value" },
+ certificate: {
+ status: "provisioning",
+ error_msg: "error_msg",
+ certificate_authority: "letsencrypt",
+ renews_before: "renews_before",
+ },
+ relying_party_identifier: "relying_party_identifier",
+ };
+ server
+ .mockEndpoint()
+ .get("/custom-domains/default")
+ .respondWith()
+ .statusCode(200)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ const response = await client.customDomains.getDefault();
+ expect(response).toEqual({
+ custom_domain_id: "custom_domain_id",
+ domain: "domain",
+ primary: true,
+ is_default: true,
+ status: "pending_verification",
+ type: "auth0_managed_certs",
+ origin_domain_name: "origin_domain_name",
+ verification: {
+ methods: [
+ {
+ name: "cname",
+ record: "record",
+ },
+ ],
+ status: "verified",
+ error_msg: "error_msg",
+ last_verified_at: "last_verified_at",
+ },
+ custom_client_ip_header: "custom_client_ip_header",
+ tls_policy: "tls_policy",
+ domain_metadata: {
+ key: "value",
+ },
+ certificate: {
+ status: "provisioning",
+ error_msg: "error_msg",
+ certificate_authority: "letsencrypt",
+ renews_before: "renews_before",
+ },
+ relying_party_identifier: "relying_party_identifier",
+ });
+ });
+
+ test("getDefault (2)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .get("/custom-domains/default")
+ .respondWith()
+ .statusCode(401)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.customDomains.getDefault();
+ }).rejects.toThrow(Management.UnauthorizedError);
+ });
+
+ test("getDefault (3)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .get("/custom-domains/default")
+ .respondWith()
+ .statusCode(403)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.customDomains.getDefault();
+ }).rejects.toThrow(Management.ForbiddenError);
+ });
+
+ test("getDefault (4)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .get("/custom-domains/default")
+ .respondWith()
+ .statusCode(429)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.customDomains.getDefault();
+ }).rejects.toThrow(Management.TooManyRequestsError);
+ });
+
+ test("setDefault (1)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { domain: "domain" };
+ const rawResponseBody = {
+ custom_domain_id: "custom_domain_id",
+ domain: "domain",
+ primary: true,
+ is_default: true,
+ status: "pending_verification",
+ type: "auth0_managed_certs",
+ origin_domain_name: "origin_domain_name",
+ verification: {
+ methods: [{ name: "cname", record: "record" }],
+ status: "verified",
+ error_msg: "error_msg",
+ last_verified_at: "last_verified_at",
+ },
+ custom_client_ip_header: "custom_client_ip_header",
+ tls_policy: "tls_policy",
+ domain_metadata: { key: "value" },
+ certificate: {
+ status: "provisioning",
+ error_msg: "error_msg",
+ certificate_authority: "letsencrypt",
+ renews_before: "renews_before",
+ },
+ relying_party_identifier: "relying_party_identifier",
+ };
+ server
+ .mockEndpoint()
+ .patch("/custom-domains/default")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(200)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ const response = await client.customDomains.setDefault({
+ domain: "domain",
+ });
+ expect(response).toEqual({
+ custom_domain_id: "custom_domain_id",
+ domain: "domain",
+ primary: true,
+ is_default: true,
+ status: "pending_verification",
+ type: "auth0_managed_certs",
+ origin_domain_name: "origin_domain_name",
+ verification: {
+ methods: [
+ {
+ name: "cname",
+ record: "record",
+ },
+ ],
+ status: "verified",
+ error_msg: "error_msg",
+ last_verified_at: "last_verified_at",
+ },
+ custom_client_ip_header: "custom_client_ip_header",
+ tls_policy: "tls_policy",
+ domain_metadata: {
+ key: "value",
+ },
+ certificate: {
+ status: "provisioning",
+ error_msg: "error_msg",
+ certificate_authority: "letsencrypt",
+ renews_before: "renews_before",
+ },
+ relying_party_identifier: "relying_party_identifier",
+ });
+ });
+
+ test("setDefault (2)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { domain: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .patch("/custom-domains/default")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(400)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.customDomains.setDefault({
+ domain: "x",
+ });
+ }).rejects.toThrow(Management.BadRequestError);
+ });
+
+ test("setDefault (3)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+ const rawRequestBody = { domain: "x" };
+ const rawResponseBody = { key: "value" };
+ server
+ .mockEndpoint()
+ .patch("/custom-domains/default")
+ .jsonBody(rawRequestBody)
+ .respondWith()
+ .statusCode(403)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ await expect(async () => {
+ return await client.customDomains.setDefault({
+ domain: "x",
+ });
+ }).rejects.toThrow(Management.ForbiddenError);
+ });
+
test("get (1)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
diff --git a/src/management/tests/wire/groups.test.ts b/src/management/tests/wire/groups.test.ts
index 67cc20ca49..af7a713263 100644
--- a/src/management/tests/wire/groups.test.ts
+++ b/src/management/tests/wire/groups.test.ts
@@ -16,9 +16,7 @@ describe("GroupsClient", () => {
name: "name",
external_id: "external_id",
connection_id: "connection_id",
- organization_id: "organization_id",
tenant_name: "tenant_name",
- description: "description",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
},
@@ -43,9 +41,7 @@ describe("GroupsClient", () => {
name: "name",
external_id: "external_id",
connection_id: "connection_id",
- organization_id: "organization_id",
tenant_name: "tenant_name",
- description: "description",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
},
@@ -128,9 +124,7 @@ describe("GroupsClient", () => {
name: "name",
external_id: "external_id",
connection_id: "connection_id",
- organization_id: "organization_id",
tenant_name: "tenant_name",
- description: "description",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
};
@@ -142,9 +136,7 @@ describe("GroupsClient", () => {
name: "name",
external_id: "external_id",
connection_id: "connection_id",
- organization_id: "organization_id",
tenant_name: "tenant_name",
- description: "description",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
});
@@ -209,4 +201,62 @@ describe("GroupsClient", () => {
return await client.groups.get("id");
}).rejects.toThrow(Management.TooManyRequestsError);
});
+
+ test("delete (1)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ server.mockEndpoint().delete("/groups/id").respondWith().statusCode(200).build();
+
+ const response = await client.groups.delete("id");
+ expect(response).toEqual(undefined);
+ });
+
+ test("delete (2)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().delete("/groups/id").respondWith().statusCode(401).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.groups.delete("id");
+ }).rejects.toThrow(Management.UnauthorizedError);
+ });
+
+ test("delete (3)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().delete("/groups/id").respondWith().statusCode(403).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.groups.delete("id");
+ }).rejects.toThrow(Management.ForbiddenError);
+ });
+
+ test("delete (4)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().delete("/groups/id").respondWith().statusCode(404).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.groups.delete("id");
+ }).rejects.toThrow(Management.NotFoundError);
+ });
+
+ test("delete (5)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().delete("/groups/id").respondWith().statusCode(429).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.groups.delete("id");
+ }).rejects.toThrow(Management.TooManyRequestsError);
+ });
});
diff --git a/src/management/tests/wire/networkAcls.test.ts b/src/management/tests/wire/networkAcls.test.ts
index 40886afc20..8f02ab2247 100644
--- a/src/management/tests/wire/networkAcls.test.ts
+++ b/src/management/tests/wire/networkAcls.test.ts
@@ -139,19 +139,13 @@ describe("NetworkAclsClient", () => {
test("create (1)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 1.1,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
server.mockEndpoint().post("/network-acls").jsonBody(rawRequestBody).respondWith().statusCode(200).build();
const response = await client.networkAcls.create({
description: "description",
active: true,
- priority: 1.1,
rule: {
action: {},
scope: "management",
@@ -163,12 +157,7 @@ describe("NetworkAclsClient", () => {
test("create (2)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -183,7 +172,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.create({
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -195,12 +183,7 @@ describe("NetworkAclsClient", () => {
test("create (3)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -215,7 +198,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.create({
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -227,12 +209,7 @@ describe("NetworkAclsClient", () => {
test("create (4)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -247,7 +224,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.create({
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -259,12 +235,7 @@ describe("NetworkAclsClient", () => {
test("create (5)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -279,7 +250,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.create({
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -291,12 +261,7 @@ describe("NetworkAclsClient", () => {
test("create (6)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -311,7 +276,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.create({
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -323,12 +287,7 @@ describe("NetworkAclsClient", () => {
test("create (7)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -343,7 +302,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.create({
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -373,6 +331,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
not_match: {
asns: [1],
@@ -384,6 +345,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
scope: "management",
},
@@ -416,6 +380,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
not_match: {
asns: [1],
@@ -427,6 +394,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
scope: "management",
},
@@ -486,12 +456,7 @@ describe("NetworkAclsClient", () => {
test("set (1)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 1.1,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = {
id: "id",
description: "description",
@@ -509,6 +474,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
not_match: {
asns: [1],
@@ -520,6 +488,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
scope: "management",
},
@@ -538,7 +509,6 @@ describe("NetworkAclsClient", () => {
const response = await client.networkAcls.set("id", {
description: "description",
active: true,
- priority: 1.1,
rule: {
action: {},
scope: "management",
@@ -567,6 +537,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
not_match: {
asns: [1],
@@ -578,6 +551,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
scope: "management",
},
@@ -589,12 +565,7 @@ describe("NetworkAclsClient", () => {
test("set (2)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -609,7 +580,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.set("id", {
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -621,12 +591,7 @@ describe("NetworkAclsClient", () => {
test("set (3)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -641,7 +606,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.set("id", {
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -653,12 +617,7 @@ describe("NetworkAclsClient", () => {
test("set (4)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -673,7 +632,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.set("id", {
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -685,12 +643,7 @@ describe("NetworkAclsClient", () => {
test("set (5)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -705,7 +658,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.set("id", {
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -717,12 +669,7 @@ describe("NetworkAclsClient", () => {
test("set (6)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
- const rawRequestBody = {
- description: "description",
- active: true,
- priority: 100,
- rule: { action: {}, scope: "management" },
- };
+ const rawRequestBody = { description: "description", active: true, rule: { action: {}, scope: "management" } };
const rawResponseBody = { key: "value" };
server
.mockEndpoint()
@@ -737,7 +684,6 @@ describe("NetworkAclsClient", () => {
return await client.networkAcls.set("id", {
description: "description",
active: true,
- priority: 100,
rule: {
action: {},
scope: "management",
@@ -867,6 +813,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
not_match: {
asns: [1],
@@ -878,6 +827,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
scope: "management",
},
@@ -917,6 +869,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
not_match: {
asns: [1],
@@ -928,6 +883,9 @@ describe("NetworkAclsClient", () => {
ja3_fingerprints: ["ja3_fingerprints"],
ja4_fingerprints: ["ja4_fingerprints"],
user_agents: ["user_agents"],
+ hostnames: ["hostnames"],
+ connecting_ipv4_cidrs: ["connecting_ipv4_cidrs"],
+ connecting_ipv6_cidrs: ["connecting_ipv6_cidrs"],
},
scope: "management",
},
diff --git a/src/management/tests/wire/refreshTokens.test.ts b/src/management/tests/wire/refreshTokens.test.ts
index b80d99f673..f829175cb2 100644
--- a/src/management/tests/wire/refreshTokens.test.ts
+++ b/src/management/tests/wire/refreshTokens.test.ts
@@ -5,6 +5,141 @@ import { ManagementClient } from "../../Client";
import { mockServerPool } from "../mock-server/MockServerPool";
describe("RefreshTokensClient", () => {
+ test("list (1)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = {
+ refresh_tokens: [
+ {
+ id: "id",
+ user_id: "user_id",
+ created_at: "2024-01-15T09:30:00Z",
+ idle_expires_at: "2024-01-15T09:30:00Z",
+ expires_at: "2024-01-15T09:30:00Z",
+ client_id: "client_id",
+ session_id: "session_id",
+ rotating: true,
+ resource_servers: [{}],
+ refresh_token_metadata: { key: "value" },
+ last_exchanged_at: "2024-01-15T09:30:00Z",
+ },
+ ],
+ next: "next",
+ };
+ server
+ .mockEndpoint({ once: false })
+ .get("/refresh-tokens")
+ .respondWith()
+ .statusCode(200)
+ .jsonBody(rawResponseBody)
+ .build();
+
+ const expected = {
+ refresh_tokens: [
+ {
+ id: "id",
+ user_id: "user_id",
+ created_at: "2024-01-15T09:30:00Z",
+ idle_expires_at: "2024-01-15T09:30:00Z",
+ expires_at: "2024-01-15T09:30:00Z",
+ client_id: "client_id",
+ session_id: "session_id",
+ rotating: true,
+ resource_servers: [{}],
+ refresh_token_metadata: {
+ key: "value",
+ },
+ last_exchanged_at: "2024-01-15T09:30:00Z",
+ },
+ ],
+ next: "next",
+ };
+ const page = await client.refreshTokens.list({
+ user_id: "user_id",
+ client_id: "client_id",
+ from: "from",
+ take: 1,
+ fields: "fields",
+ include_fields: true,
+ });
+
+ expect(expected.refresh_tokens).toEqual(page.data);
+ expect(page.hasNextPage()).toBe(true);
+ const nextPage = await page.getNextPage();
+ expect(expected.refresh_tokens).toEqual(nextPage.data);
+ });
+
+ test("list (2)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().get("/refresh-tokens").respondWith().statusCode(400).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.refreshTokens.list({
+ user_id: "user_id",
+ });
+ }).rejects.toThrow(Management.BadRequestError);
+ });
+
+ test("list (3)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().get("/refresh-tokens").respondWith().statusCode(401).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.refreshTokens.list({
+ user_id: "user_id",
+ });
+ }).rejects.toThrow(Management.UnauthorizedError);
+ });
+
+ test("list (4)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().get("/refresh-tokens").respondWith().statusCode(403).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.refreshTokens.list({
+ user_id: "user_id",
+ });
+ }).rejects.toThrow(Management.ForbiddenError);
+ });
+
+ test("list (5)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().get("/refresh-tokens").respondWith().statusCode(404).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.refreshTokens.list({
+ user_id: "user_id",
+ });
+ }).rejects.toThrow(Management.NotFoundError);
+ });
+
+ test("list (6)", async () => {
+ const server = mockServerPool.createServer();
+ const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
+
+ const rawResponseBody = { key: "value" };
+ server.mockEndpoint().get("/refresh-tokens").respondWith().statusCode(429).jsonBody(rawResponseBody).build();
+
+ await expect(async () => {
+ return await client.refreshTokens.list({
+ user_id: "user_id",
+ });
+ }).rejects.toThrow(Management.TooManyRequestsError);
+ });
+
test("get (1)", async () => {
const server = mockServerPool.createServer();
const client = new ManagementClient({ maxRetries: 0, token: "test", environment: server.baseUrl });
diff --git a/src/management/tests/wire/resourceServers.test.ts b/src/management/tests/wire/resourceServers.test.ts
index f7086cff3f..f3f7bba16f 100644
--- a/src/management/tests/wire/resourceServers.test.ts
+++ b/src/management/tests/wire/resourceServers.test.ts
@@ -23,6 +23,7 @@ describe("ResourceServersClient", () => {
signing_alg: "HS256",
signing_secret: "signing_secret",
allow_offline_access: true,
+ allow_online_access: true,
skip_consent_for_verifiable_first_party_clients: true,
token_lifetime: 1,
token_lifetime_for_web: 1,
@@ -64,6 +65,7 @@ describe("ResourceServersClient", () => {
signing_alg: "HS256",
signing_secret: "signing_secret",
allow_offline_access: true,
+ allow_online_access: true,
skip_consent_for_verifiable_first_party_clients: true,
token_lifetime: 1,
token_lifetime_for_web: 1,
@@ -183,6 +185,7 @@ describe("ResourceServersClient", () => {
signing_alg: "HS256",
signing_secret: "signing_secret",
allow_offline_access: true,
+ allow_online_access: true,
skip_consent_for_verifiable_first_party_clients: true,
token_lifetime: 1,
token_lifetime_for_web: 1,
@@ -224,6 +227,7 @@ describe("ResourceServersClient", () => {
signing_alg: "HS256",
signing_secret: "signing_secret",
allow_offline_access: true,
+ allow_online_access: true,
skip_consent_for_verifiable_first_party_clients: true,
token_lifetime: 1,
token_lifetime_for_web: 1,
@@ -379,6 +383,7 @@ describe("ResourceServersClient", () => {
signing_alg: "HS256",
signing_secret: "signing_secret",
allow_offline_access: true,
+ allow_online_access: true,
skip_consent_for_verifiable_first_party_clients: true,
token_lifetime: 1,
token_lifetime_for_web: 1,
@@ -419,6 +424,7 @@ describe("ResourceServersClient", () => {
signing_alg: "HS256",
signing_secret: "signing_secret",
allow_offline_access: true,
+ allow_online_access: true,
skip_consent_for_verifiable_first_party_clients: true,
token_lifetime: 1,
token_lifetime_for_web: 1,
@@ -641,6 +647,7 @@ describe("ResourceServersClient", () => {
signing_alg: "HS256",
signing_secret: "signing_secret",
allow_offline_access: true,
+ allow_online_access: true,
skip_consent_for_verifiable_first_party_clients: true,
token_lifetime: 1,
token_lifetime_for_web: 1,
@@ -680,6 +687,7 @@ describe("ResourceServersClient", () => {
signing_alg: "HS256",
signing_secret: "signing_secret",
allow_offline_access: true,
+ allow_online_access: true,
skip_consent_for_verifiable_first_party_clients: true,
token_lifetime: 1,
token_lifetime_for_web: 1,
diff --git a/src/management/tests/wire/users/groups.test.ts b/src/management/tests/wire/users/groups.test.ts
index c40db0fa78..55577ae8c6 100644
--- a/src/management/tests/wire/users/groups.test.ts
+++ b/src/management/tests/wire/users/groups.test.ts
@@ -16,9 +16,7 @@ describe("GroupsClient", () => {
name: "name",
external_id: "external_id",
connection_id: "connection_id",
- organization_id: "organization_id",
tenant_name: "tenant_name",
- description: "description",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
membership_created_at: "2024-01-15T09:30:00Z",
@@ -44,9 +42,7 @@ describe("GroupsClient", () => {
name: "name",
external_id: "external_id",
connection_id: "connection_id",
- organization_id: "organization_id",
tenant_name: "tenant_name",
- description: "description",
created_at: "2024-01-15T09:30:00Z",
updated_at: "2024-01-15T09:30:00Z",
membership_created_at: "2024-01-15T09:30:00Z",
diff --git a/yarn.lock b/yarn.lock
index 2b937318e7..420f0fcfa8 100644
--- a/yarn.lock
+++ b/yarn.lock
@@ -102,17 +102,17 @@
integrity sha512-YvjJow9FxbhFFKDSuFnVCe2WxXk1zWc22fFePVNEaWJEu8IrZVlda6N0uHwzZrUM1il7NC9Mlp4MaJYbYd9JSg==
"@babel/helpers@^7.28.6":
- version "7.28.6"
- resolved "https://registry.yarnpkg.com/@babel/helpers/-/helpers-7.28.6.tgz#fca903a313ae675617936e8998b814c415cbf5d7"
- integrity sha512-xOBvwq86HHdB7WUDTfKfT/Vuxh7gElQ+Sfti2Cy6yIWNW05P8iUslOVcZ4/sKbE+/jQaukQAdz/gf3724kYdqw==
+ version "7.29.2"
+ resolved "https://registry.yarnpkg.com/@babel/helpers/-/helpers-7.29.2.tgz#9cfbccb02b8e229892c0b07038052cc1a8709c49"
+ integrity sha512-HoGuUs4sCZNezVEKdVcwqmZN8GoHirLUcLaYVNBK2J0DadGtdcqgr3BCbvH8+XUo4NGjNl3VOtSjEKNzqfFgKw==
dependencies:
"@babel/template" "^7.28.6"
- "@babel/types" "^7.28.6"
+ "@babel/types" "^7.29.0"
"@babel/parser@^7.1.0", "@babel/parser@^7.14.7", "@babel/parser@^7.20.7", "@babel/parser@^7.23.9", "@babel/parser@^7.28.6", "@babel/parser@^7.29.0":
- version "7.29.0"
- resolved "https://registry.yarnpkg.com/@babel/parser/-/parser-7.29.0.tgz#669ef345add7d057e92b7ed15f0bac07611831b6"
- integrity sha512-IyDgFV5GeDUVX4YdF/3CPULtVGSXXMLh1xVIgdCgxApktqnQV0r7/8Nqthg+8YLGaAtdyIlo2qIdZrbCv4+7ww==
+ version "7.29.2"
+ resolved "https://registry.yarnpkg.com/@babel/parser/-/parser-7.29.2.tgz#58bd50b9a7951d134988a1ae177a35ef9a703ba1"
+ integrity sha512-4GgRzy/+fsBa72/RZVJmGKPmZu9Byn8o4MoLpmNe1m8ZfYnz5emHLQz3U4gLud6Zwl0RZIcgiLD7Uq7ySFuDLA==
dependencies:
"@babel/types" "^7.29.0"
@@ -352,7 +352,7 @@
"@eslint/core" "^0.17.0"
levn "^0.4.1"
-"@gerrit0/mini-shiki@^3.17.0":
+"@gerrit0/mini-shiki@^3.23.0":
version "3.23.0"
resolved "https://registry.yarnpkg.com/@gerrit0/mini-shiki/-/mini-shiki-3.23.0.tgz#d9414f3080b88303b18f3a311846e37e424d800c"
integrity sha512-bEMORlG0cqdjVyCEuU0cDQbORWX+kYCeo0kV1lbxF5bt4r7SID2l9bqsxJEM0zndaxpOUT7riCyIVEuqq/Ynxg==
@@ -899,9 +899,9 @@
integrity sha512-5+fP8P8MFNC+AyZCDxrB2pkZFPGzqQWUzpSeuuVLvm8VMcorNYavBqoFcxK8bQz4Qsbn4oUEEem4wDLfcysGHA==
"@types/node@*":
- version "25.4.0"
- resolved "https://registry.yarnpkg.com/@types/node/-/node-25.4.0.tgz#f25d8467984d6667cc4c1be1e2f79593834aaedb"
- integrity sha512-9wLpoeWuBlcbBpOY3XmzSTG3oscB6xjBEEtn+pYXTfhyXhIxC5FsBer2KTopBlvKEiW9l13po9fq+SJY/5lkhw==
+ version "25.5.2"
+ resolved "https://registry.yarnpkg.com/@types/node/-/node-25.5.2.tgz#94861e32f9ffd8de10b52bbec403465c84fff762"
+ integrity sha512-tO4ZIRKNC+MDWV4qKVZe3Ql/woTnmHDr5JD8UI5hn2pwBrHEwOEMZK7WlNb5RKB6EoJ02gwmQS9OrjuFnZYdpg==
dependencies:
undici-types "~7.18.0"
@@ -945,99 +945,99 @@
"@types/yargs-parser" "*"
"@typescript-eslint/eslint-plugin@^8.38.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/eslint-plugin/-/eslint-plugin-8.57.0.tgz#6e4085604ab63f55b3dcc61ce2c16965b2c36374"
- integrity sha512-qeu4rTHR3/IaFORbD16gmjq9+rEs9fGKdX0kF6BKSfi+gCuG3RCKLlSBYzn/bGsY9Tj7KE/DAQStbp8AHJGHEQ==
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/eslint-plugin/-/eslint-plugin-8.58.1.tgz#cb53038b83d165ca0ef96d67d875efbd56c50fa8"
+ integrity sha512-eSkwoemjo76bdXl2MYqtxg51HNwUSkWfODUOQ3PaTLZGh9uIWWFZIjyjaJnex7wXDu+TRx+ATsnSxdN9YWfRTQ==
dependencies:
"@eslint-community/regexpp" "^4.12.2"
- "@typescript-eslint/scope-manager" "8.57.0"
- "@typescript-eslint/type-utils" "8.57.0"
- "@typescript-eslint/utils" "8.57.0"
- "@typescript-eslint/visitor-keys" "8.57.0"
+ "@typescript-eslint/scope-manager" "8.58.1"
+ "@typescript-eslint/type-utils" "8.58.1"
+ "@typescript-eslint/utils" "8.58.1"
+ "@typescript-eslint/visitor-keys" "8.58.1"
ignore "^7.0.5"
natural-compare "^1.4.0"
- ts-api-utils "^2.4.0"
+ ts-api-utils "^2.5.0"
"@typescript-eslint/parser@^8.38.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/parser/-/parser-8.57.0.tgz#444c57a943e8b04f255cda18a94c8e023b46b08c"
- integrity sha512-XZzOmihLIr8AD1b9hL9ccNMzEMWt/dE2u7NyTY9jJG6YNiNthaD5XtUHVF2uCXZ15ng+z2hT3MVuxnUYhq6k1g==
- dependencies:
- "@typescript-eslint/scope-manager" "8.57.0"
- "@typescript-eslint/types" "8.57.0"
- "@typescript-eslint/typescript-estree" "8.57.0"
- "@typescript-eslint/visitor-keys" "8.57.0"
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/parser/-/parser-8.58.1.tgz#0943eca522ac408bcdd649882c3d95b10ff00f62"
+ integrity sha512-gGkiNMPqerb2cJSVcruigx9eHBlLG14fSdPdqMoOcBfh+vvn4iCq2C8MzUB89PrxOXk0y3GZ1yIWb9aOzL93bw==
+ dependencies:
+ "@typescript-eslint/scope-manager" "8.58.1"
+ "@typescript-eslint/types" "8.58.1"
+ "@typescript-eslint/typescript-estree" "8.58.1"
+ "@typescript-eslint/visitor-keys" "8.58.1"
debug "^4.4.3"
-"@typescript-eslint/project-service@8.57.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/project-service/-/project-service-8.57.0.tgz#2014ed527bcd0eff8aecb7e44879ae3150604ab3"
- integrity sha512-pR+dK0BlxCLxtWfaKQWtYr7MhKmzqZxuii+ZjuFlZlIGRZm22HnXFqa2eY+90MUz8/i80YJmzFGDUsi8dMOV5w==
+"@typescript-eslint/project-service@8.58.1":
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/project-service/-/project-service-8.58.1.tgz#c78781b1ca1ec1e7bc6522efba89318c6d249feb"
+ integrity sha512-gfQ8fk6cxhtptek+/8ZIqw8YrRW5048Gug8Ts5IYcMLCw18iUgrZAEY/D7s4hkI0FxEfGakKuPK/XUMPzPxi5g==
dependencies:
- "@typescript-eslint/tsconfig-utils" "^8.57.0"
- "@typescript-eslint/types" "^8.57.0"
+ "@typescript-eslint/tsconfig-utils" "^8.58.1"
+ "@typescript-eslint/types" "^8.58.1"
debug "^4.4.3"
-"@typescript-eslint/scope-manager@8.57.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/scope-manager/-/scope-manager-8.57.0.tgz#7d2a2aeaaef2ae70891b21939fadb4cb0b19f840"
- integrity sha512-nvExQqAHF01lUM66MskSaZulpPL5pgy5hI5RfrxviLgzZVffB5yYzw27uK/ft8QnKXI2X0LBrHJFr1TaZtAibw==
+"@typescript-eslint/scope-manager@8.58.1":
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/scope-manager/-/scope-manager-8.58.1.tgz#35168f561bab4e3fd10dd6b03e8b83c157479211"
+ integrity sha512-TPYUEqJK6avLcEjumWsIuTpuYODTTDAtoMdt8ZZa93uWMTX13Nb8L5leSje1NluammvU+oI3QRr5lLXPgihX3w==
dependencies:
- "@typescript-eslint/types" "8.57.0"
- "@typescript-eslint/visitor-keys" "8.57.0"
+ "@typescript-eslint/types" "8.58.1"
+ "@typescript-eslint/visitor-keys" "8.58.1"
-"@typescript-eslint/tsconfig-utils@8.57.0", "@typescript-eslint/tsconfig-utils@^8.57.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/tsconfig-utils/-/tsconfig-utils-8.57.0.tgz#cf2f2822af3887d25dd325b6bea6c3f60a83a0b4"
- integrity sha512-LtXRihc5ytjJIQEH+xqjB0+YgsV4/tW35XKX3GTZHpWtcC8SPkT/d4tqdf1cKtesryHm2bgp6l555NYcT2NLvA==
+"@typescript-eslint/tsconfig-utils@8.58.1", "@typescript-eslint/tsconfig-utils@^8.58.1":
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/tsconfig-utils/-/tsconfig-utils-8.58.1.tgz#eb16792c579300c7bfb3c74b0f5e1dfbb0a2454d"
+ integrity sha512-JAr2hOIct2Q+qk3G+8YFfqkqi7sC86uNryT+2i5HzMa2MPjw4qNFvtjnw1IiA1rP7QhNKVe21mSSLaSjwA1Olw==
-"@typescript-eslint/type-utils@8.57.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/type-utils/-/type-utils-8.57.0.tgz#2877af4c2e8f0998b93a07dad1c34ce1bb669448"
- integrity sha512-yjgh7gmDcJ1+TcEg8x3uWQmn8ifvSupnPfjP21twPKrDP/pTHlEQgmKcitzF/rzPSmv7QjJ90vRpN4U+zoUjwQ==
+"@typescript-eslint/type-utils@8.58.1":
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/type-utils/-/type-utils-8.58.1.tgz#b21085a233087bde94c92ba6f5b4dfb77ca56730"
+ integrity sha512-HUFxvTJVroT+0rXVJC7eD5zol6ID+Sn5npVPWoFuHGg9Ncq5Q4EYstqR+UOqaNRFXi5TYkpXXkLhoCHe3G0+7w==
dependencies:
- "@typescript-eslint/types" "8.57.0"
- "@typescript-eslint/typescript-estree" "8.57.0"
- "@typescript-eslint/utils" "8.57.0"
+ "@typescript-eslint/types" "8.58.1"
+ "@typescript-eslint/typescript-estree" "8.58.1"
+ "@typescript-eslint/utils" "8.58.1"
debug "^4.4.3"
- ts-api-utils "^2.4.0"
-
-"@typescript-eslint/types@8.57.0", "@typescript-eslint/types@^8.57.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/types/-/types-8.57.0.tgz#4fa5385ffd1cd161fa5b9dce93e0493d491b8dc6"
- integrity sha512-dTLI8PEXhjUC7B9Kre+u0XznO696BhXcTlOn0/6kf1fHaQW8+VjJAVHJ3eTI14ZapTxdkOmc80HblPQLaEeJdg==
-
-"@typescript-eslint/typescript-estree@8.57.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/typescript-estree/-/typescript-estree-8.57.0.tgz#e0e4a89bfebb207de314826df876e2dabc7dea04"
- integrity sha512-m7faHcyVg0BT3VdYTlX8GdJEM7COexXxS6KqGopxdtkQRvBanK377QDHr4W/vIPAR+ah9+B/RclSW5ldVniO1Q==
- dependencies:
- "@typescript-eslint/project-service" "8.57.0"
- "@typescript-eslint/tsconfig-utils" "8.57.0"
- "@typescript-eslint/types" "8.57.0"
- "@typescript-eslint/visitor-keys" "8.57.0"
+ ts-api-utils "^2.5.0"
+
+"@typescript-eslint/types@8.58.1", "@typescript-eslint/types@^8.58.1":
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/types/-/types-8.58.1.tgz#9dfb4723fcd2b13737d8b03d941354cf73190313"
+ integrity sha512-io/dV5Aw5ezwzfPBBWLoT+5QfVtP8O7q4Kftjn5azJ88bYyp/ZMCsyW1lpKK46EXJcaYMZ1JtYj+s/7TdzmQMw==
+
+"@typescript-eslint/typescript-estree@8.58.1":
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/typescript-estree/-/typescript-estree-8.58.1.tgz#8230cc9628d2cffef101e298c62807c4b9bf2fe9"
+ integrity sha512-w4w7WR7GHOjqqPnvAYbazq+Y5oS68b9CzasGtnd6jIeOIeKUzYzupGTB2T4LTPSv4d+WPeccbxuneTFHYgAAWg==
+ dependencies:
+ "@typescript-eslint/project-service" "8.58.1"
+ "@typescript-eslint/tsconfig-utils" "8.58.1"
+ "@typescript-eslint/types" "8.58.1"
+ "@typescript-eslint/visitor-keys" "8.58.1"
debug "^4.4.3"
minimatch "^10.2.2"
semver "^7.7.3"
tinyglobby "^0.2.15"
- ts-api-utils "^2.4.0"
+ ts-api-utils "^2.5.0"
-"@typescript-eslint/utils@8.57.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/utils/-/utils-8.57.0.tgz#c7193385b44529b788210d20c94c11de79ad3498"
- integrity sha512-5iIHvpD3CZe06riAsbNxxreP+MuYgVUsV0n4bwLH//VJmgtt54sQeY2GszntJ4BjYCpMzrfVh2SBnUQTtys2lQ==
+"@typescript-eslint/utils@8.58.1":
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/utils/-/utils-8.58.1.tgz#099a327b04ed921e6ee3988cde9ef34bc4b5435a"
+ integrity sha512-Ln8R0tmWC7pTtLOzgJzYTXSCjJ9rDNHAqTaVONF4FEi2qwce8mD9iSOxOpLFFvWp/wBFlew0mjM1L1ihYWfBdQ==
dependencies:
"@eslint-community/eslint-utils" "^4.9.1"
- "@typescript-eslint/scope-manager" "8.57.0"
- "@typescript-eslint/types" "8.57.0"
- "@typescript-eslint/typescript-estree" "8.57.0"
+ "@typescript-eslint/scope-manager" "8.58.1"
+ "@typescript-eslint/types" "8.58.1"
+ "@typescript-eslint/typescript-estree" "8.58.1"
-"@typescript-eslint/visitor-keys@8.57.0":
- version "8.57.0"
- resolved "https://registry.yarnpkg.com/@typescript-eslint/visitor-keys/-/visitor-keys-8.57.0.tgz#23aea662279bb66209700854453807a119350f85"
- integrity sha512-zm6xx8UT/Xy2oSr2ZXD0pZo7Jx2XsCoID2IUh9YSTFRu7z+WdwYTRk6LhUftm1crwqbuoF6I8zAFeCMw0YjwDg==
+"@typescript-eslint/visitor-keys@8.58.1":
+ version "8.58.1"
+ resolved "https://registry.yarnpkg.com/@typescript-eslint/visitor-keys/-/visitor-keys-8.58.1.tgz#7c197533177f1ba9b8249f55f7f685e32bb6f204"
+ integrity sha512-y+vH7QE8ycjoa0bWciFg7OpFcipUuem1ujhrdLtq1gByKwfbC7bPeKsiny9e0urg93DqwGcHey+bGRKCnF1nZQ==
dependencies:
- "@typescript-eslint/types" "8.57.0"
+ "@typescript-eslint/types" "8.58.1"
eslint-visitor-keys "^5.0.0"
"@webassemblyjs/ast@1.14.1", "@webassemblyjs/ast@^1.14.1":
@@ -1395,30 +1395,23 @@ balanced-match@^4.0.2:
resolved "https://registry.yarnpkg.com/balanced-match/-/balanced-match-4.0.4.tgz#bfb10662feed8196a2c62e7c68e17720c274179a"
integrity sha512-BLrgEcRTwX2o6gGxGOCNyMvGSp35YofuYzw9h1IMTRmKqttAZZVU67bdb9Pr2vUHA8+j3i2tJfjO6C6+4myGTA==
-baseline-browser-mapping@^2.9.0:
- version "2.10.0"
- resolved "https://registry.yarnpkg.com/baseline-browser-mapping/-/baseline-browser-mapping-2.10.0.tgz#5b09935025bf8a80e29130251e337c6a7fc8cbb9"
- integrity sha512-lIyg0szRfYbiy67j9KN8IyeD7q7hcmqnJ1ddWmNt19ItGpNN64mnllmxUNFIOdOm6by97jlL6wfpTTJrmnjWAA==
+baseline-browser-mapping@^2.10.12:
+ version "2.10.16"
+ resolved "https://registry.yarnpkg.com/baseline-browser-mapping/-/baseline-browser-mapping-2.10.16.tgz#ef80cf218a53f165689a6e32ffffdca1f35d979c"
+ integrity sha512-Lyf3aK28zpsD1yQMiiHD4RvVb6UdMoo8xzG2XzFIfR9luPzOpcBlAsT/qfB1XWS1bxWT+UtE4WmQgsp297FYOA==
brace-expansion@^1.1.7:
- version "1.1.12"
- resolved "https://registry.yarnpkg.com/brace-expansion/-/brace-expansion-1.1.12.tgz#ab9b454466e5a8cc3a187beaad580412a9c5b843"
- integrity sha512-9T9UjW3r0UW5c1Q7GTwllptXwhvYmEzFhzMfZ9H7FQWt+uZePjZPjBP/W1ZEyZ1twGWom5/56TF4lPcqjnDHcg==
+ version "1.1.13"
+ resolved "https://registry.yarnpkg.com/brace-expansion/-/brace-expansion-1.1.13.tgz#d37875c01dc9eff988dd49d112a57cb67b54efe6"
+ integrity sha512-9ZLprWS6EENmhEOpjCYW2c8VkmOvckIJZfkr7rBW6dObmfgJ/L1GpSYW5Hpo9lDz4D1+n0Ckz8rU7FwHDQiG/w==
dependencies:
balanced-match "^1.0.0"
concat-map "0.0.1"
-brace-expansion@^2.0.2:
- version "2.0.2"
- resolved "https://registry.yarnpkg.com/brace-expansion/-/brace-expansion-2.0.2.tgz#54fc53237a613d854c7bd37463aad17df87214e7"
- integrity sha512-Jt0vHyM+jmUBqojB7E1NIYadt0vI0Qxjxd2TErW94wDz+E2LAm5vKMXXwg6ZZBTHPuUlDgQHKXvjGBdfcF1ZDQ==
- dependencies:
- balanced-match "^1.0.0"
-
-brace-expansion@^5.0.2:
- version "5.0.4"
- resolved "https://registry.yarnpkg.com/brace-expansion/-/brace-expansion-5.0.4.tgz#614daaecd0a688f660bbbc909a8748c3d80d4336"
- integrity sha512-h+DEnpVvxmfVefa4jFbCf5HdH5YMDXRsmKflpf1pILZWRFlTbJpxeU55nJl4Smt5HQaGzg1o6RHFPJaOqnmBDg==
+brace-expansion@^5.0.5:
+ version "5.0.5"
+ resolved "https://registry.yarnpkg.com/brace-expansion/-/brace-expansion-5.0.5.tgz#dcc3a37116b79f3e1b46db994ced5d570e930fdb"
+ integrity sha512-VZznLgtwhn+Mact9tfiwx64fA9erHH/MCXEUfB/0bX/6Fz6ny5EGTXYltMocqg4xFAQZtnO3DHWWXi8RiuN7cQ==
dependencies:
balanced-match "^4.0.2"
@@ -1430,15 +1423,15 @@ braces@^3.0.3:
fill-range "^7.1.1"
browserslist@^4.24.0, browserslist@^4.28.1:
- version "4.28.1"
- resolved "https://registry.yarnpkg.com/browserslist/-/browserslist-4.28.1.tgz#7f534594628c53c63101079e27e40de490456a95"
- integrity sha512-ZC5Bd0LgJXgwGqUknZY/vkUQ04r8NXnJZ3yYi4vDmSiZmC/pdSN0NbNRPxZpbtO4uAfDUAFffO8IZoM3Gj8IkA==
+ version "4.28.2"
+ resolved "https://registry.yarnpkg.com/browserslist/-/browserslist-4.28.2.tgz#f50b65362ef48974ca9f50b3680566d786b811d2"
+ integrity sha512-48xSriZYYg+8qXna9kwqjIVzuQxi+KYWp2+5nCYnYKPTr0LvD89Jqk2Or5ogxz0NUMfIjhh2lIUX/LyX9B4oIg==
dependencies:
- baseline-browser-mapping "^2.9.0"
- caniuse-lite "^1.0.30001759"
- electron-to-chromium "^1.5.263"
- node-releases "^2.0.27"
- update-browserslist-db "^1.2.0"
+ baseline-browser-mapping "^2.10.12"
+ caniuse-lite "^1.0.30001782"
+ electron-to-chromium "^1.5.328"
+ node-releases "^2.0.36"
+ update-browserslist-db "^1.2.3"
bs-logger@^0.2.6:
version "0.2.6"
@@ -1482,10 +1475,10 @@ camelcase@^6.2.0:
resolved "https://registry.yarnpkg.com/camelcase/-/camelcase-6.3.0.tgz#5685b95eb209ac9c0c177467778c9c84df58ba9a"
integrity sha512-Gmy6FhYlCY7uOElZUSbxo2UCDH8owEk996gkbrpsgGtrJLM3J7jGxl9Ic7Qwwj4ivOE5AWZWRMecDdF7hqGjFA==
-caniuse-lite@^1.0.30001759:
- version "1.0.30001777"
- resolved "https://registry.yarnpkg.com/caniuse-lite/-/caniuse-lite-1.0.30001777.tgz#028f21e4b2718d138b55e692583e6810ccf60691"
- integrity sha512-tmN+fJxroPndC74efCdp12j+0rk0RHwV5Jwa1zWaFVyw2ZxAuPeG8ZgWC3Wz7uSjT3qMRQ5XHZ4COgQmsCMJAQ==
+caniuse-lite@^1.0.30001782:
+ version "1.0.30001787"
+ resolved "https://registry.yarnpkg.com/caniuse-lite/-/caniuse-lite-1.0.30001787.tgz#fd25c5e42e2d35df5c75eddda00d15d9c0c68f81"
+ integrity sha512-mNcrMN9KeI68u7muanUpEejSLghOKlVhRqS/Za2IeyGllJ9I9otGpR9g3nsw7n4W378TE/LyIteA0+/FOZm4Kg==
chalk@^4.0.0, chalk@^4.1.0:
version "4.1.2"
@@ -1709,10 +1702,10 @@ dunder-proto@^1.0.1:
es-errors "^1.3.0"
gopd "^1.2.0"
-electron-to-chromium@^1.5.263:
- version "1.5.307"
- resolved "https://registry.yarnpkg.com/electron-to-chromium/-/electron-to-chromium-1.5.307.tgz#09f8973100c39fb0d003b890393cd1d58932b1c8"
- integrity sha512-5z3uFKBWjiNR44nFcYdkcXjKMbg5KXNdciu7mhTPo9tB7NbqSNP2sSnGR+fqknZSCwKkBN+oxiiajWs4dT6ORg==
+electron-to-chromium@^1.5.328:
+ version "1.5.333"
+ resolved "https://registry.yarnpkg.com/electron-to-chromium/-/electron-to-chromium-1.5.333.tgz#1a9f02e181c16af470639cf0da41c6db93f65123"
+ integrity sha512-skNh4FsE+IpCJV7xAQGbQ4eyOGvcEctVBAk7a5KPzxC3alES9rLrT+2IsPRPgeQr8LVxdJr8BHQ9481+TOr0xg==
emittery@^0.13.1:
version "0.13.1"
@@ -1730,9 +1723,9 @@ emoji-regex@^8.0.0:
integrity sha512-MSjYzcWNOA0ewAHpz0MxpYFvwg6yjy1NG3xteoqz644VCo/RPgnr1/GGt+ic3iJTzQ8Eu3TdM14SawnVUmGE6A==
enhanced-resolve@^5.0.0, enhanced-resolve@^5.20.0:
- version "5.20.0"
- resolved "https://registry.yarnpkg.com/enhanced-resolve/-/enhanced-resolve-5.20.0.tgz#323c2a70d2aa7fb4bdfd6d3c24dfc705c581295d"
- integrity sha512-/ce7+jQ1PQ6rVXwe+jKEg5hW5ciicHwIQUagZkp6IufBoY3YDgdTTY1azVs0qoRgVmvsNB+rbjLJxDAeHHtwsQ==
+ version "5.20.1"
+ resolved "https://registry.yarnpkg.com/enhanced-resolve/-/enhanced-resolve-5.20.1.tgz#eeeb3966bea62c348c40a0cc9e7912e2557d0be0"
+ integrity sha512-Qohcme7V1inbAfvjItgw0EaxVX5q2rdVEZHRBrEQdRZTssLDGsL8Lwrznl8oQ/6kuTJONLaDcGjkNP247XEhcA==
dependencies:
graceful-fs "^4.2.4"
tapable "^2.3.0"
@@ -2180,11 +2173,11 @@ graceful-fs@^4.1.2, graceful-fs@^4.2.11, graceful-fs@^4.2.4, graceful-fs@^4.2.9:
integrity sha512-RbJ5/jmFcNNCcDV5o9eTnBLJ/HszWV0P73bc+Ff4nS/rJj+YaS6IGyiOL0VoBYX+l1Wrl3k63h/KrH+nhJ0XvQ==
graphql@^16.8.1:
- version "16.13.1"
- resolved "https://registry.yarnpkg.com/graphql/-/graphql-16.13.1.tgz#38ae5c76fbc4a009e0004dca6c76c370a1da7b54"
- integrity sha512-gGgrVCoDKlIZ8fIqXBBb0pPKqDgki0Z/FSKNiQzSGj2uEYHr1tq5wmBegGwJx6QB5S5cM0khSBpi/JFHMCvsmQ==
+ version "16.13.2"
+ resolved "https://registry.yarnpkg.com/graphql/-/graphql-16.13.2.tgz#4d2b73df5796b201f1bc2765f5d7067f689cb55f"
+ integrity sha512-5bJ+nf/UCpAjHM8i06fl7eLyVC9iuNAjm9qzkiu2ZGhM0VscSvS6WDPfAwkdkBuoXGM9FJSbKl6wylMwP9Ktig==
-handlebars@^4.7.8:
+handlebars@^4.7.9:
version "4.7.9"
resolved "https://registry.yarnpkg.com/handlebars/-/handlebars-4.7.9.tgz#6f139082ab58dc4e5a0e51efe7db5ae890d56a0f"
integrity sha512-4E71E0rpOaQuJR2A3xDZ+GM1HyWYv1clR58tC8emQNeQe3RH7MAzSbat+V0wG78LQBo6m6bzSG/L4pBuCsgnUQ==
@@ -2950,15 +2943,15 @@ linkify-it@^5.0.0:
uc.micro "^2.0.0"
lint-staged@^16.1.4:
- version "16.3.3"
- resolved "https://registry.yarnpkg.com/lint-staged/-/lint-staged-16.3.3.tgz#ce5c95b5623cca295f8f4251f00c0642c7e84976"
- integrity sha512-RLq2koZ5fGWrx7tcqx2tSTMQj4lRkfNJaebO/li/uunhCJbtZqwTuwPHpgIimAHHi/2nZIiGrkCHDCOeR1onxA==
+ version "16.4.0"
+ resolved "https://registry.yarnpkg.com/lint-staged/-/lint-staged-16.4.0.tgz#a00b0e3abff59239cef6d7d9341e8f8473308e23"
+ integrity sha512-lBWt8hujh/Cjysw5GYVmZpFHXDCgZzhrOm8vbcUdobADZNOK/bRshr2kM3DfgrrtR1DQhfupW9gnIXOfiFi+bw==
dependencies:
commander "^14.0.3"
listr2 "^9.0.5"
- micromatch "^4.0.8"
+ picomatch "^4.0.3"
string-argv "^0.3.2"
- tinyexec "^1.0.2"
+ tinyexec "^1.0.4"
yaml "^2.8.2"
listr2@^9.0.5:
@@ -3044,7 +3037,7 @@ makeerror@1.0.12:
dependencies:
tmpl "1.0.5"
-markdown-it@^14.1.0:
+markdown-it@^14.1.1:
version "14.1.1"
resolved "https://registry.yarnpkg.com/markdown-it/-/markdown-it-14.1.1.tgz#856f90b66fc39ae70affd25c1b18b581d7deee1f"
integrity sha512-BuU2qnTti9YKgK5N+IeMubp14ZUKUUw7yeJbkjtosvHiP0AZ5c8IAgEMk79D0eC8F23r4Ac/q8cAIFdm2FtyoA==
@@ -3071,7 +3064,7 @@ merge-stream@^2.0.0:
resolved "https://registry.yarnpkg.com/merge-stream/-/merge-stream-2.0.0.tgz#52823629a14dd00c9770fb6ad47dc6310f2c1f60"
integrity sha512-abv/qOcuPfk3URPfDzmZU1LKmuw8kT+0nIHvKrKgFrwifol/doWcdA4ZqsWQ8ENrFKkd67Mfpo/LovbIUsbt3w==
-micromatch@^4.0.0, micromatch@^4.0.4, micromatch@^4.0.8:
+micromatch@^4.0.0, micromatch@^4.0.4:
version "4.0.8"
resolved "https://registry.yarnpkg.com/micromatch/-/micromatch-4.0.8.tgz#d66fa18f3a47076789320b9b1af32bd86d9fa202"
integrity sha512-PXwfBhYu0hBCPw8Dn0E+WDYb7af3dSLVWKi3HGv84IdF4TyFoC0ysxFd0Goxw7nSv4T/PzEJQxsYsEiFCKo2BA==
@@ -3101,12 +3094,12 @@ mimic-function@^5.0.0:
resolved "https://registry.yarnpkg.com/mimic-function/-/mimic-function-5.0.1.tgz#acbe2b3349f99b9deaca7fb70e48b83e94e67076"
integrity sha512-VP79XUPxV2CigYP3jWwAUFSku2aKqBH7uTAapFWCBqutsbmDo96KY5o8uh6U+/YSIn5OxJnXp73beVkpqMIGhA==
-minimatch@^10.2.2:
- version "10.2.4"
- resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-10.2.4.tgz#465b3accbd0218b8281f5301e27cedc697f96fde"
- integrity sha512-oRjTw/97aTBN0RHbYCdtF1MQfvusSIBQM0IZEgzl6426+8jSC0nF1a/GmnVLpfB9yyr6g6FTqWqiZVbxrtaCIg==
+minimatch@^10.2.2, minimatch@^10.2.4:
+ version "10.2.5"
+ resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-10.2.5.tgz#bd48687a0be38ed2961399105600f832095861d1"
+ integrity sha512-MULkVLfKGYDFYejP07QOurDLLQpcjk7Fw+7jXS2R2czRQzR56yHRveU5NDJEOviH+hETZKSkIk5c+T23GjFUMg==
dependencies:
- brace-expansion "^5.0.2"
+ brace-expansion "^5.0.5"
minimatch@^3.0.4, minimatch@^3.1.1, minimatch@^3.1.5:
version "3.1.5"
@@ -3115,13 +3108,6 @@ minimatch@^3.0.4, minimatch@^3.1.1, minimatch@^3.1.5:
dependencies:
brace-expansion "^1.1.7"
-minimatch@^9.0.5:
- version "9.0.9"
- resolved "https://registry.yarnpkg.com/minimatch/-/minimatch-9.0.9.tgz#9b0cb9fcb78087f6fd7eababe2511c4d3d60574e"
- integrity sha512-OBwBN9AL4dqmETlpS2zasx+vTeWclWzkblfZk7KTA5j3jeOONz/tRCnZomUyvNg83wL5Zv9Ss6HMJXAgL8R2Yg==
- dependencies:
- brace-expansion "^2.0.2"
-
minimist@^1.2.5:
version "1.2.8"
resolved "https://registry.yarnpkg.com/minimist/-/minimist-1.2.8.tgz#c1a464e7693302e082a075cee0c057741ac4772c"
@@ -3178,9 +3164,9 @@ neo-async@^2.6.2:
integrity sha512-Yd3UES5mWCSqR+qNT93S3UoYUkqAZ9lLg8a7g9rimsWmYGK8cVToA4/sF3RrshdyV3sAGMXVUmpMYOw+dLpOuw==
nock@^14.0.6:
- version "14.0.11"
- resolved "https://registry.yarnpkg.com/nock/-/nock-14.0.11.tgz#4ed20d50433b0479ddabd9f03c5886054608aeae"
- integrity sha512-u5xUnYE+UOOBA6SpELJheMCtj2Laqx15Vl70QxKo43Wz/6nMHXS7PrEioXLjXAwhmawdEMNImwKCcPhBJWbKVw==
+ version "14.0.12"
+ resolved "https://registry.yarnpkg.com/nock/-/nock-14.0.12.tgz#7e24fecf0c2177633851ef7c5dc1dc66d90b4261"
+ integrity sha512-kZM3bHV0KzhHH6E2eRszHyML/w87AUzLBwupNTHohtYWP9fZYgUPmCbSKq6ITfEEmHqN4/p0MscvUipT4P5Qsg==
dependencies:
"@mswjs/interceptors" "^0.41.0"
json-stringify-safe "^5.0.1"
@@ -3191,10 +3177,10 @@ node-int64@^0.4.0:
resolved "https://registry.yarnpkg.com/node-int64/-/node-int64-0.4.0.tgz#87a9065cdb355d3182d8f94ce11188b825c68a3b"
integrity sha512-O5lz91xSOeoXP6DulyHfllpq+Eg00MWitZIbtPfoSEvqIHdl5gfcY6hYzDWnj0qD5tz52PI08u9qUvSVeUBeHw==
-node-releases@^2.0.27:
- version "2.0.36"
- resolved "https://registry.yarnpkg.com/node-releases/-/node-releases-2.0.36.tgz#99fd6552aaeda9e17c4713b57a63964a2e325e9d"
- integrity sha512-TdC8FSgHz8Mwtw9g5L4gR/Sh9XhSP/0DEkQxfEFXOpiul5IiHgHan2VhYYb6agDSfp4KuvltmGApc8HMgUrIkA==
+node-releases@^2.0.36:
+ version "2.0.37"
+ resolved "https://registry.yarnpkg.com/node-releases/-/node-releases-2.0.37.tgz#9bd4f10b77ba39c2b9402d4e8399c482a797f671"
+ integrity sha512-1h5gKZCF+pO/o3Iqt5Jp7wc9rH3eJJ0+nh/CIoiRwjRxde/hAHyLPXYN4V3CqKAbiZPSeJFSWHmJsbkicta0Eg==
normalize-path@^3.0.0:
version "3.0.0"
@@ -3344,14 +3330,14 @@ picocolors@^1.1.1:
integrity sha512-xceH2snhtb5M9liqDsmEw56le376mTZkEX/jEb/RxNFyegNul7eNslCXP9FDj/Lcu0X8KEyMceP2ntpaHrDEVA==
picomatch@^2.0.4, picomatch@^2.2.3, picomatch@^2.3.1:
- version "2.3.1"
- resolved "https://registry.yarnpkg.com/picomatch/-/picomatch-2.3.1.tgz#3ba3833733646d9d3e4995946c1365a67fb07a42"
- integrity sha512-JU3teHTNjmE2VCGFzuY8EXzCDVwEqB2a8fsIvwaStHhAWJEeVd1o1QD80CU6+ZdEXXSLbSsuLwJjkCBWqRQUVA==
+ version "2.3.2"
+ resolved "https://registry.yarnpkg.com/picomatch/-/picomatch-2.3.2.tgz#5a942915e26b372dc0f0e6753149a16e6b1c5601"
+ integrity sha512-V7+vQEJ06Z+c5tSye8S+nHUfI51xoXIXjHQ99cQtKUkQqqO1kO/KCJUfZXuB47h/YBlDhah2H3hdUGXn8ie0oA==
-picomatch@^4.0.3:
- version "4.0.3"
- resolved "https://registry.yarnpkg.com/picomatch/-/picomatch-4.0.3.tgz#796c76136d1eead715db1e7bad785dedd695a042"
- integrity sha512-5gTmgEY/sqK6gFXLIsQNH19lWb4ebPDLA4SdLP7dsWkIXHWlG66oPuVvXSGFPppYZz8ZDZq0dYYrbHfBCVUb1Q==
+picomatch@^4.0.3, picomatch@^4.0.4:
+ version "4.0.4"
+ resolved "https://registry.yarnpkg.com/picomatch/-/picomatch-4.0.4.tgz#fd6f5e00a143086e074dffe4c924b8fb293b0589"
+ integrity sha512-QP88BAKvMam/3NxH6vj2o21R6MjxZUAd6nlwAS/pnGvN9IVLocLHxGYIzFhg6fUQ+5th6P4dv4eW9jX3DSIj7A==
pirates@^4.0.4:
version "4.0.7"
@@ -3544,7 +3530,7 @@ semver@^6.3.0, semver@^6.3.1:
resolved "https://registry.yarnpkg.com/semver/-/semver-6.3.1.tgz#556d2ef8689146e46dcea4bfdd095f3434dffcb4"
integrity sha512-BR7VvDCVHO+q2xBEWskxS6DJE1qRnb7DxzUrogb71CWoSficBxYsiAGd+Kl0mmq/MprG9yArRkyrQxTO6XjMzA==
-semver@^7.3.4, semver@^7.5.3, semver@^7.5.4, semver@^7.7.3:
+semver@^7.3.4, semver@^7.5.3, semver@^7.5.4, semver@^7.7.3, semver@^7.7.4:
version "7.7.4"
resolved "https://registry.yarnpkg.com/semver/-/semver-7.7.4.tgz#28464e36060e991fa7a11d0279d2d3f3b57a7e8a"
integrity sha512-vFKC2IEtQnVhpT78h1Yp8wzwrf8CM+MzKMHGJZfBtzhZNycRFnXsHk6E5TxIkkMsgNS7mdX3AGB7x2QM2di4lA==
@@ -3745,9 +3731,9 @@ synckit@^0.11.12:
"@pkgr/core" "^0.2.9"
tapable@^2.3.0:
- version "2.3.0"
- resolved "https://registry.yarnpkg.com/tapable/-/tapable-2.3.0.tgz#7e3ea6d5ca31ba8e078b560f0d83ce9a14aa8be6"
- integrity sha512-g9ljZiwki/LfxmQADO3dEY1CbpmXT5Hm2fJ+QaGKwSXUylMybePR7/67YW7jOrrvjEgL1Fmz5kzyAjWVWLlucg==
+ version "2.3.2"
+ resolved "https://registry.yarnpkg.com/tapable/-/tapable-2.3.2.tgz#86755feabad08d82a26b891db044808c6ad00f15"
+ integrity sha512-1MOpMXuhGzGL5TTCZFItxCc0AARf1EZFQkGqMm7ERKj8+Hgr5oLvJOVFcC+lRmR8hCe2S3jC4T5D7Vg/d7/fhA==
terser-webpack-plugin@^5.3.17:
version "5.4.0"
@@ -3760,9 +3746,9 @@ terser-webpack-plugin@^5.3.17:
terser "^5.31.1"
terser@^5.31.1:
- version "5.46.0"
- resolved "https://registry.yarnpkg.com/terser/-/terser-5.46.0.tgz#1b81e560d584bbdd74a8ede87b4d9477b0ff9695"
- integrity sha512-jTwoImyr/QbOWFFso3YoU3ik0jBBDJ6JTOQiy/J2YxVJdZCc+5u7skhNwiOR3FQIygFqVUPHl7qbbxtjW2K3Qg==
+ version "5.46.1"
+ resolved "https://registry.yarnpkg.com/terser/-/terser-5.46.1.tgz#40e4b1e35d5f13130f82793a8b3eeb7ec3a92eee"
+ integrity sha512-vzCjQO/rgUuK9sf8VJZvjqiqiHFaZLnOiimmUuOKODxWL8mm/xua7viT7aqX7dgPY60otQjUotzFMmCB4VdmqQ==
dependencies:
"@jridgewell/source-map" "^0.3.3"
acorn "^8.15.0"
@@ -3778,30 +3764,30 @@ test-exclude@^6.0.0:
glob "^7.1.4"
minimatch "^3.0.4"
-tinyexec@^1.0.2:
- version "1.0.2"
- resolved "https://registry.yarnpkg.com/tinyexec/-/tinyexec-1.0.2.tgz#bdd2737fe2ba40bd6f918ae26642f264b99ca251"
- integrity sha512-W/KYk+NFhkmsYpuHq5JykngiOCnxeVL8v8dFnqxSD8qEEdRfXk1SDM6JzNqcERbcGYj9tMrDQBYV9cjgnunFIg==
+tinyexec@^1.0.4:
+ version "1.1.1"
+ resolved "https://registry.yarnpkg.com/tinyexec/-/tinyexec-1.1.1.tgz#e1ff45dfa60d1dedb91b734956b78f6c2a3e821b"
+ integrity sha512-VKS/ZaQhhkKFMANmAOhhXVoIfBXblQxGX1myCQ2faQrfmobMftXeJPcZGp0gS07ocvGJWDLZGyOZDadDBqYIJg==
tinyglobby@^0.2.15:
- version "0.2.15"
- resolved "https://registry.yarnpkg.com/tinyglobby/-/tinyglobby-0.2.15.tgz#e228dd1e638cea993d2fdb4fcd2d4602a79951c2"
- integrity sha512-j2Zq4NyQYG5XMST4cbs02Ak8iJUdxRM0XI5QyxXuZOzKOINmWurp3smXu3y5wDcJrptwpSjgXHzIQxR0omXljQ==
+ version "0.2.16"
+ resolved "https://registry.yarnpkg.com/tinyglobby/-/tinyglobby-0.2.16.tgz#1c3b7eb953fce42b226bc5a1ee06428281aff3d6"
+ integrity sha512-pn99VhoACYR8nFHhxqix+uvsbXineAasWm5ojXoN8xEwK5Kd3/TrhNn1wByuD52UxWRLy8pu+kRMniEi6Eq9Zg==
dependencies:
fdir "^6.5.0"
- picomatch "^4.0.3"
+ picomatch "^4.0.4"
-tldts-core@^7.0.25:
- version "7.0.25"
- resolved "https://registry.yarnpkg.com/tldts-core/-/tldts-core-7.0.25.tgz#eaee57facdfb5528383d961f5586d49784519de5"
- integrity sha512-ZjCZK0rppSBu7rjHYDYsEaMOIbbT+nWF57hKkv4IUmZWBNrBWBOjIElc0mKRgLM8bm7x/BBlof6t2gi/Oq/Asw==
+tldts-core@^7.0.28:
+ version "7.0.28"
+ resolved "https://registry.yarnpkg.com/tldts-core/-/tldts-core-7.0.28.tgz#28c256edae2ed177b2a8338a51caf81d41580ecf"
+ integrity sha512-7W5Efjhsc3chVdFhqtaU0KtK32J37Zcr9RKtID54nG+tIpcY79CQK/veYPODxtD/LJ4Lue66jvrQzIX2Z2/pUQ==
tldts@^7.0.5:
- version "7.0.25"
- resolved "https://registry.yarnpkg.com/tldts/-/tldts-7.0.25.tgz#e9034876e09b2ad92db547a9307ae6fa65400f8d"
- integrity sha512-keinCnPbwXEUG3ilrWQZU+CqcTTzHq9m2HhoUP2l7Xmi8l1LuijAXLpAJ5zRW+ifKTNscs4NdCkfkDCBYm352w==
+ version "7.0.28"
+ resolved "https://registry.yarnpkg.com/tldts/-/tldts-7.0.28.tgz#5a5bb26ef3f70008d88c6e53ff58cd59ed8d4c68"
+ integrity sha512-+Zg3vWhRUv8B1maGSTFdev9mjoo8Etn2Ayfs4cnjlD3CsGkxXX4QyW3j2WJ0wdjYcYmy7Lx2RDsZMhgCWafKIw==
dependencies:
- tldts-core "^7.0.25"
+ tldts-core "^7.0.28"
tmpl@1.0.5:
version "1.0.5"
@@ -3826,9 +3812,9 @@ tough-cookie@^4.1.2:
url-parse "^1.5.3"
tough-cookie@^6.0.0:
- version "6.0.0"
- resolved "https://registry.yarnpkg.com/tough-cookie/-/tough-cookie-6.0.0.tgz#11e418b7864a2c0d874702bc8ce0f011261940e5"
- integrity sha512-kXuRi1mtaKMrsLUxz3sQYvVl37B0Ns6MzfrtV5DvJceE9bPyspOqk9xxv7XbZWcfLWbFmm997vl83qUWVJA64w==
+ version "6.0.1"
+ resolved "https://registry.yarnpkg.com/tough-cookie/-/tough-cookie-6.0.1.tgz#a495f833836609ed983c19bc65639cfbceb54c76"
+ integrity sha512-LktZQb3IeoUWB9lqR5EWTHgW/VTITCXg4D21M+lvybRVdylLrRMnqaIONLVb5mav8vM19m44HIcGq4qASeu2Qw==
dependencies:
tldts "^7.0.5"
@@ -3839,30 +3825,30 @@ tr46@^3.0.0:
dependencies:
punycode "^2.1.1"
-ts-api-utils@^2.4.0:
- version "2.4.0"
- resolved "https://registry.yarnpkg.com/ts-api-utils/-/ts-api-utils-2.4.0.tgz#2690579f96d2790253bdcf1ca35d569ad78f9ad8"
- integrity sha512-3TaVTaAv2gTiMB35i3FiGJaRfwb3Pyn/j3m/bfAvGe8FB7CF6u+LMYqYlDh7reQf7UNvoTvdfAqHGmPGOSsPmA==
+ts-api-utils@^2.5.0:
+ version "2.5.0"
+ resolved "https://registry.yarnpkg.com/ts-api-utils/-/ts-api-utils-2.5.0.tgz#4acd4a155e22734990a5ed1fe9e97f113bcb37c1"
+ integrity sha512-OJ/ibxhPlqrMM0UiNHJ/0CKQkoKF243/AEmplt3qpRgkW8VG7IfOS41h7V8TjITqdByHzrjcS/2si+y4lIh8NA==
ts-jest@^29.3.4:
- version "29.4.6"
- resolved "https://registry.yarnpkg.com/ts-jest/-/ts-jest-29.4.6.tgz#51cb7c133f227396818b71297ad7409bb77106e9"
- integrity sha512-fSpWtOO/1AjSNQguk43hb/JCo16oJDnMJf3CdEGNkqsEX3t0KX96xvyX1D7PfLCpVoKu4MfVrqUkFyblYoY4lA==
+ version "29.4.9"
+ resolved "https://registry.yarnpkg.com/ts-jest/-/ts-jest-29.4.9.tgz#47dc33d0f5c36bddcedd16afefae285e0b049d2d"
+ integrity sha512-LTb9496gYPMCqjeDLdPrKuXtncudeV1yRZnF4Wo5l3SFi0RYEnYRNgMrFIdg+FHvfzjCyQk1cLncWVqiSX+EvQ==
dependencies:
bs-logger "^0.2.6"
fast-json-stable-stringify "^2.1.0"
- handlebars "^4.7.8"
+ handlebars "^4.7.9"
json5 "^2.2.3"
lodash.memoize "^4.1.2"
make-error "^1.3.6"
- semver "^7.7.3"
+ semver "^7.7.4"
type-fest "^4.41.0"
yargs-parser "^21.1.1"
ts-loader@^9.5.1:
- version "9.5.4"
- resolved "https://registry.yarnpkg.com/ts-loader/-/ts-loader-9.5.4.tgz#44b571165c10fb5a90744aa5b7e119233c4f4585"
- integrity sha512-nCz0rEwunlTZiy6rXFByQU1kVVpCIgUpc/psFiKVrUwrizdnIbRFu8w7bxhUF0X613DYwT4XzrZHpVyMe758hQ==
+ version "9.5.7"
+ resolved "https://registry.yarnpkg.com/ts-loader/-/ts-loader-9.5.7.tgz#582663e853646e18506cd5cc79feb354952731c0"
+ integrity sha512-/ZNrKgA3K3PtpMYOC71EeMWIloGw3IYEa5/t1cyz2r5/PyUwTXGzYJvcD3kfUvmhlfpz1rhV8B2O6IVTQ0avsg==
dependencies:
chalk "^4.1.0"
enhanced-resolve "^5.0.0"
@@ -3893,20 +3879,20 @@ type-fest@^4.26.1, type-fest@^4.41.0:
integrity sha512-TeTSQ6H5YHvpqVwBRcnLDCBnDOHWYu7IvGbHT6N8AOymcr9PJGjc1GTtiWZTYg0NCgYwvnYWEkVChQAr9bjfwA==
typedoc-plugin-missing-exports@^4.0.0:
- version "4.1.2"
- resolved "https://registry.yarnpkg.com/typedoc-plugin-missing-exports/-/typedoc-plugin-missing-exports-4.1.2.tgz#a125a679782082caad123e8b086b4ac9b28d08da"
- integrity sha512-WNoeWX9+8X3E3riuYPduilUTFefl1K+Z+5bmYqNeH5qcWjtnTRMbRzGdEQ4XXn1WEO4WCIlU0vf46Ca2y/mspg==
+ version "4.1.3"
+ resolved "https://registry.yarnpkg.com/typedoc-plugin-missing-exports/-/typedoc-plugin-missing-exports-4.1.3.tgz#36573af8021df7c82cd54edd42081c66a04be54f"
+ integrity sha512-tgrlnwzXbqMP2/3BaZk0atddPsD7UnpCoeQ0cUCtk624gODT1bLYOLBEJLXQyVmbnP8HZCMhHpRiR+rxSdZqhg==
typedoc@^0.28.7:
- version "0.28.17"
- resolved "https://registry.yarnpkg.com/typedoc/-/typedoc-0.28.17.tgz#eab7c6649494d0a796e0b2fd2c9a5aea41b0a781"
- integrity sha512-ZkJ2G7mZrbxrKxinTQMjFqsCoYY6a5Luwv2GKbTnBCEgV2ihYm5CflA9JnJAwH0pZWavqfYxmDkFHPt4yx2oDQ==
+ version "0.28.18"
+ resolved "https://registry.yarnpkg.com/typedoc/-/typedoc-0.28.18.tgz#f7578fd9aa3ace83db8cce9bf1e8d41b88ec0b94"
+ integrity sha512-NTWTUOFRQ9+SGKKTuWKUioUkjxNwtS3JDRPVKZAXGHZy2wCA8bdv2iJiyeePn0xkmK+TCCqZFT0X7+2+FLjngA==
dependencies:
- "@gerrit0/mini-shiki" "^3.17.0"
+ "@gerrit0/mini-shiki" "^3.23.0"
lunr "^2.3.9"
- markdown-it "^14.1.0"
- minimatch "^9.0.5"
- yaml "^2.8.1"
+ markdown-it "^14.1.1"
+ minimatch "^10.2.4"
+ yaml "^2.8.2"
typescript@~5.7.2:
version "5.7.3"
@@ -3924,9 +3910,9 @@ uglify-js@^3.1.4:
integrity sha512-v3Xu+yuwBXisp6QYTcH4UbH+xYJXqnq2m/LtQVWKWzYc1iehYnLixoQDN9FH6/j9/oybfd6W9Ghwkl8+UMKTKQ==
undici-types@^6.15.0:
- version "6.23.0"
- resolved "https://registry.yarnpkg.com/undici-types/-/undici-types-6.23.0.tgz#5291144c899c9c868968fba80fddd9c48def75f9"
- integrity sha512-HN7GeXgBUs1StmY/vf9hIH11LrNI5SfqmFVtxKyp9Dhuf1P1cDSRlS+H1NJDaGOWzlI08q+NmiHgu11Vx6QnhA==
+ version "6.24.1"
+ resolved "https://registry.yarnpkg.com/undici-types/-/undici-types-6.24.1.tgz#dd6f30c5ec79f810dcb8d9731ada045afe4b9a6f"
+ integrity sha512-JT8B3M7LYQCRZVfB1OZZIqzi1OMeDHcTpRJpHPNvHFmye4wT03uBM8vw73NqXKfihrpGzSsWlBfUcOglX3oBeA==
undici-types@~5.26.4:
version "5.26.5"
@@ -3939,16 +3925,16 @@ undici-types@~7.18.0:
integrity sha512-AsuCzffGHJybSaRrmr5eHr81mwJU3kjw6M+uprWvCXiNeN9SOGwQ3Jn8jb8m3Z6izVgknn1R0FTCEAP2QrLY/w==
undici@^7.12.0:
- version "7.24.0"
- resolved "https://registry.yarnpkg.com/undici/-/undici-7.24.0.tgz#c7349cdede0db44226b5930783b11207831a5eaf"
- integrity sha512-jxytwMHhsbdpBXxLAcuu0fzlQeXCNnWdDyRHpvWsUl8vd98UwYdl9YTyn8/HcpcJPC3pwUveefsa3zTxyD/ERg==
+ version "7.24.7"
+ resolved "https://registry.yarnpkg.com/undici/-/undici-7.24.7.tgz#af9535341bbe80625ca403a02418477a5c6a8760"
+ integrity sha512-H/nlJ/h0ggGC+uRL3ovD+G0i4bqhvsDOpbDv7At5eFLlj2b41L8QliGbnl2H7SnDiYhENphh1tQFJZf+MyfLsQ==
universalify@^0.2.0:
version "0.2.0"
resolved "https://registry.yarnpkg.com/universalify/-/universalify-0.2.0.tgz#6451760566fa857534745ab1dde952d1b1761be0"
integrity sha512-CJ1QgKmNg3CwvAv/kOFmtnEN05f0D/cn9QntgNOQlQF9dgvVTHj3t+8JPdjqawCHk7V/KA+fbUqzZ9XWhcqPUg==
-update-browserslist-db@^1.2.0:
+update-browserslist-db@^1.2.3:
version "1.2.3"
resolved "https://registry.yarnpkg.com/update-browserslist-db/-/update-browserslist-db-1.2.3.tgz#64d76db58713136acbeb4c49114366cc6cc2e80d"
integrity sha512-Js0m9cx+qOgDxo0eMiFGEueWztz+d4+M3rGlmKPT+T4IS/jP4ylw3Nwpu6cpTTP8R1MAC1kF4VbdLt3ARf209w==
@@ -4131,9 +4117,9 @@ write-file-atomic@^4.0.2:
signal-exit "^3.0.7"
ws@^8.11.0:
- version "8.19.0"
- resolved "https://registry.yarnpkg.com/ws/-/ws-8.19.0.tgz#ddc2bdfa5b9ad860204f5a72a4863a8895fd8c8b"
- integrity sha512-blAT2mjOEIi0ZzruJfIhb3nps74PRWTCz1IjglWEEpQl5XS/UNama6u2/rjFkDDouqr4L67ry+1aGIALViWjDg==
+ version "8.20.0"
+ resolved "https://registry.yarnpkg.com/ws/-/ws-8.20.0.tgz#4cd9532358eba60bc863aad1623dfb045a4d4af8"
+ integrity sha512-sAt8BhgNbzCtgGbt2OxmpuryO63ZoDk/sqaB/znQm94T4fCEsy/yV+7CdC1kJhOU9lboAEU7R3kquuycDoibVA==
xml-name-validator@^4.0.0:
version "4.0.0"
@@ -4155,10 +4141,10 @@ yallist@^3.0.2:
resolved "https://registry.yarnpkg.com/yallist/-/yallist-3.1.1.tgz#dbb7daf9bfd8bac9ab45ebf602b8cbad0d5d08fd"
integrity sha512-a4UGQaWPH59mOXUYnAG2ewncQS4i4F43Tv3JoAM+s2VDAmS9NsK8GpDMLrCHPksFT7h3K6TOoUNn2pb7RoXx4g==
-yaml@^2.8.1, yaml@^2.8.2:
- version "2.8.2"
- resolved "https://registry.yarnpkg.com/yaml/-/yaml-2.8.2.tgz#5694f25eca0ce9c3e7a9d9e00ce0ddabbd9e35c5"
- integrity sha512-mplynKqc1C2hTVYxd0PU2xQAc22TI1vShAYGksCCfxbn/dFwnHTNi1bvYsBTkhdUNtGIf5xNOg938rrSSYvS9A==
+yaml@^2.8.2:
+ version "2.8.3"
+ resolved "https://registry.yarnpkg.com/yaml/-/yaml-2.8.3.tgz#a0d6bd2efb3dd03c59370223701834e60409bd7d"
+ integrity sha512-AvbaCLOO2Otw/lW5bmh9d/WEdcDFdQp2Z2ZUH3pX9U2ihyUY0nvLv7J6TrWowklRGPYbB/IuIMfYgxaCPg5Bpg==
yargs-parser@^21.1.1:
version "21.1.1"