@inkeep/agents-api 0.0.0-dev-20260121145510 → 0.0.0-dev-20260121155340

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -11,20 +11,6 @@
11
11
  "stepId": "__builtin_response_text"
12
12
  }
13
13
  },
14
- "src/domains/evals/workflow/functions/evaluateConversation.ts": {
15
- "executeEvaluatorStep": {
16
- "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep"
17
- },
18
- "getConversationStep": {
19
- "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep"
20
- },
21
- "getEvaluatorsStep": {
22
- "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep"
23
- },
24
- "logStep": {
25
- "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep"
26
- }
27
- },
28
14
  "src/domains/evals/workflow/functions/runDatasetItem.ts": {
29
15
  "callChatApiStep": {
30
16
  "stepId": "step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep"
@@ -38,18 +24,32 @@
38
24
  "logStep": {
39
25
  "stepId": "step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep"
40
26
  }
27
+ },
28
+ "src/domains/evals/workflow/functions/evaluateConversation.ts": {
29
+ "executeEvaluatorStep": {
30
+ "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep"
31
+ },
32
+ "getConversationStep": {
33
+ "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep"
34
+ },
35
+ "getEvaluatorsStep": {
36
+ "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep"
37
+ },
38
+ "logStep": {
39
+ "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep"
40
+ }
41
41
  }
42
42
  },
43
43
  "workflows": {
44
- "src/domains/evals/workflow/functions/evaluateConversation.ts": {
45
- "_evaluateConversationWorkflow": {
46
- "workflowId": "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
47
- }
48
- },
49
44
  "src/domains/evals/workflow/functions/runDatasetItem.ts": {
50
45
  "_runDatasetItemWorkflow": {
51
46
  "workflowId": "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
52
47
  }
48
+ },
49
+ "src/domains/evals/workflow/functions/evaluateConversation.ts": {
50
+ "_evaluateConversationWorkflow": {
51
+ "workflowId": "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
52
+ }
53
53
  }
54
54
  }
55
55
  }
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono16 from "hono";
2
+ import * as hono17 from "hono";
3
3
 
4
4
  //#region src/domains/evals/routes/datasetTriggers.d.ts
5
- declare const app: OpenAPIHono<hono16.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono17.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono17 from "hono";
2
+ import * as hono18 from "hono";
3
3
 
4
4
  //#region src/domains/evals/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono17.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono18.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types6 from "hono/types";
2
+ import * as hono_types5 from "hono/types";
3
3
 
4
4
  //#region src/domains/evals/workflow/routes.d.ts
5
- declare const workflowRoutes: Hono<hono_types6.BlankEnv, hono_types6.BlankSchema, "/">;
5
+ declare const workflowRoutes: Hono<hono_types5.BlankEnv, hono_types5.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { workflowRoutes };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono15 from "hono";
2
+ import * as hono14 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/conversations.d.ts
5
- declare const app: OpenAPIHono<hono15.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono14.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono14 from "hono";
2
+ import * as hono16 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/evals/evaluationResults.d.ts
5
- declare const app: OpenAPIHono<hono14.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono16.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono18 from "hono";
2
+ import * as hono15 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono18.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono15.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types8 from "hono/types";
2
+ import * as hono_types7 from "hono/types";
3
3
 
4
4
  //#region src/domains/manage/routes/mcp.d.ts
5
- declare const app: Hono<hono_types8.BlankEnv, hono_types8.BlankSchema, "/">;
5
+ declare const app: Hono<hono_types7.BlankEnv, hono_types7.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types5 from "hono/types";
3
+ import * as hono_types9 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/signoz.d.ts
6
6
  declare const app: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types5.BlankSchema, "/">;
8
+ }, hono_types9.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { app as default };
package/dist/factory.d.ts CHANGED
@@ -24,6 +24,12 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
24
24
  requireEmailVerification: false;
25
25
  autoSignIn: true;
26
26
  };
27
+ account: {
28
+ accountLinking: {
29
+ enabled: true;
30
+ trustedProviders: ("google" | "email-password" | "auth0")[];
31
+ };
32
+ };
27
33
  databaseHooks: {
28
34
  session: {
29
35
  create: {
@@ -789,25 +795,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
789
795
  ac: better_auth_plugins0.AccessControl;
790
796
  roles: {
791
797
  member: {
792
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
793
- actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
798
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
799
+ actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
794
800
  connector: "OR" | "AND";
795
801
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
796
- statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
802
+ statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
797
803
  };
798
804
  admin: {
799
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
800
- actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
805
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
806
+ actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
801
807
  connector: "OR" | "AND";
802
808
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
803
- statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
809
+ statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
804
810
  };
805
811
  owner: {
806
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
807
- actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
812
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
813
+ actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
808
814
  connector: "OR" | "AND";
809
815
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
810
- statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
816
+ statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
811
817
  };
812
818
  };
813
819
  membershipLimit: number;
@@ -1098,25 +1104,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
1098
1104
  ac: better_auth_plugins0.AccessControl;
1099
1105
  roles: {
1100
1106
  member: {
1101
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1102
- actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1107
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1108
+ actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1103
1109
  connector: "OR" | "AND";
1104
1110
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1105
- statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1111
+ statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1106
1112
  };
1107
1113
  admin: {
1108
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1109
- actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1114
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1115
+ actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1110
1116
  connector: "OR" | "AND";
1111
1117
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1112
- statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1118
+ statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1113
1119
  };
1114
1120
  owner: {
1115
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1116
- actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1121
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1122
+ actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1117
1123
  connector: "OR" | "AND";
1118
1124
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1119
- statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1125
+ statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1120
1126
  };
1121
1127
  };
1122
1128
  membershipLimit: number;
package/dist/index.d.ts CHANGED
@@ -25,6 +25,12 @@ declare const auth: better_auth78.Auth<{
25
25
  requireEmailVerification: false;
26
26
  autoSignIn: true;
27
27
  };
28
+ account: {
29
+ accountLinking: {
30
+ enabled: true;
31
+ trustedProviders: ("google" | "email-password" | "auth0")[];
32
+ };
33
+ };
28
34
  databaseHooks: {
29
35
  session: {
30
36
  create: {
@@ -790,25 +796,25 @@ declare const auth: better_auth78.Auth<{
790
796
  ac: better_auth_plugins69.AccessControl;
791
797
  roles: {
792
798
  member: {
793
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
794
- actions: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
799
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
800
+ actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
795
801
  connector: "OR" | "AND";
796
802
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
797
- statements: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
803
+ statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
798
804
  };
799
805
  admin: {
800
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
801
- actions: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
806
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
807
+ actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
802
808
  connector: "OR" | "AND";
803
809
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
804
- statements: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
810
+ statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
805
811
  };
806
812
  owner: {
807
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
808
- actions: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
813
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
814
+ actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
809
815
  connector: "OR" | "AND";
810
816
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
811
- statements: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
817
+ statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
812
818
  };
813
819
  };
814
820
  membershipLimit: number;
@@ -1099,25 +1105,25 @@ declare const auth: better_auth78.Auth<{
1099
1105
  ac: better_auth_plugins69.AccessControl;
1100
1106
  roles: {
1101
1107
  member: {
1102
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1103
- actions: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1108
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1109
+ actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1104
1110
  connector: "OR" | "AND";
1105
1111
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1106
- statements: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1112
+ statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1107
1113
  };
1108
1114
  admin: {
1109
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1110
- actions: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1115
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1116
+ actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1111
1117
  connector: "OR" | "AND";
1112
1118
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1113
- statements: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1119
+ statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1114
1120
  };
1115
1121
  owner: {
1116
- authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1117
- actions: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1122
+ authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1123
+ actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1118
1124
  connector: "OR" | "AND";
1119
1125
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1120
- statements: better_auth_plugins69.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1126
+ statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1121
1127
  };
1122
1128
  };
1123
1129
  membershipLimit: number;
@@ -1,4 +1,4 @@
1
- import * as hono0 from "hono";
1
+ import * as hono1 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
 
4
4
  //#region src/middleware/evalsAuth.d.ts
@@ -7,7 +7,7 @@ import { BaseExecutionContext } from "@inkeep/agents-core";
7
7
  * Middleware to authenticate API requests using Bearer token authentication
8
8
  * First checks if token matches INKEEP_AGENTS_EVAL_API_BYPASS_SECRET,
9
9
  */
10
- declare const evalApiKeyAuth: () => hono0.MiddlewareHandler<{
10
+ declare const evalApiKeyAuth: () => hono1.MiddlewareHandler<{
11
11
  Variables: {
12
12
  executionContext: BaseExecutionContext;
13
13
  };
@@ -1,4 +1,4 @@
1
- import * as hono1 from "hono";
1
+ import * as hono2 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
  import { createAuth } from "@inkeep/agents-core/auth";
4
4
 
@@ -12,7 +12,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
12
12
  * 3. Database API key
13
13
  * 4. Internal service token
14
14
  */
15
- declare const manageApiKeyAuth: () => hono1.MiddlewareHandler<{
15
+ declare const manageApiKeyAuth: () => hono2.MiddlewareHandler<{
16
16
  Variables: {
17
17
  executionContext: BaseExecutionContext;
18
18
  userId?: string;
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono2 from "hono";
2
+ import * as hono0 from "hono";
3
3
 
4
4
  //#region src/middleware/projectAccess.d.ts
5
5
 
@@ -26,6 +26,6 @@ declare const requireProjectPermission: <Env$1 extends {
26
26
  Variables: ManageAppVariables;
27
27
  } = {
28
28
  Variables: ManageAppVariables;
29
- }>(permission?: ProjectPermission) => hono2.MiddlewareHandler<Env$1, string, {}, Response>;
29
+ }>(permission?: ProjectPermission) => hono0.MiddlewareHandler<Env$1, string, {}, Response>;
30
30
  //#endregion
31
31
  export { ProjectPermission, requireProjectPermission };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@inkeep/agents-api",
3
- "version": "0.0.0-dev-20260121145510",
3
+ "version": "0.0.0-dev-20260121155340",
4
4
  "description": "Unified Inkeep Agents API - combines management, runtime, and evaluation capabilities",
5
5
  "types": "dist/index.d.ts",
6
6
  "exports": {
@@ -70,8 +70,8 @@
70
70
  "openid-client": "^6.8.1",
71
71
  "pg": "^8.16.3",
72
72
  "workflow": "4.0.1-beta.33",
73
- "@inkeep/agents-core": "^0.0.0-dev-20260121145510",
74
- "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260121145510"
73
+ "@inkeep/agents-core": "^0.0.0-dev-20260121155340",
74
+ "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260121155340"
75
75
  },
76
76
  "peerDependencies": {
77
77
  "@hono/zod-openapi": "^1.1.5",