@inkeep/agents-api 0.0.0-dev-20260121145510 → 0.0.0-dev-20260121155340
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/.well-known/workflow/v1/manifest.debug.json +19 -19
- package/dist/domains/evals/routes/datasetTriggers.d.ts +2 -2
- package/dist/domains/evals/routes/index.d.ts +2 -2
- package/dist/domains/evals/workflow/routes.d.ts +2 -2
- package/dist/domains/manage/routes/conversations.d.ts +2 -2
- package/dist/domains/manage/routes/evals/evaluationResults.d.ts +2 -2
- package/dist/domains/manage/routes/index.d.ts +2 -2
- package/dist/domains/manage/routes/mcp.d.ts +2 -2
- package/dist/domains/manage/routes/signoz.d.ts +2 -2
- package/dist/factory.d.ts +24 -18
- package/dist/index.d.ts +24 -18
- package/dist/middleware/evalsAuth.d.ts +2 -2
- package/dist/middleware/manageAuth.d.ts +2 -2
- package/dist/middleware/projectAccess.d.ts +2 -2
- package/package.json +3 -3
|
@@ -11,20 +11,6 @@
|
|
|
11
11
|
"stepId": "__builtin_response_text"
|
|
12
12
|
}
|
|
13
13
|
},
|
|
14
|
-
"src/domains/evals/workflow/functions/evaluateConversation.ts": {
|
|
15
|
-
"executeEvaluatorStep": {
|
|
16
|
-
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep"
|
|
17
|
-
},
|
|
18
|
-
"getConversationStep": {
|
|
19
|
-
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep"
|
|
20
|
-
},
|
|
21
|
-
"getEvaluatorsStep": {
|
|
22
|
-
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep"
|
|
23
|
-
},
|
|
24
|
-
"logStep": {
|
|
25
|
-
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep"
|
|
26
|
-
}
|
|
27
|
-
},
|
|
28
14
|
"src/domains/evals/workflow/functions/runDatasetItem.ts": {
|
|
29
15
|
"callChatApiStep": {
|
|
30
16
|
"stepId": "step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep"
|
|
@@ -38,18 +24,32 @@
|
|
|
38
24
|
"logStep": {
|
|
39
25
|
"stepId": "step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep"
|
|
40
26
|
}
|
|
27
|
+
},
|
|
28
|
+
"src/domains/evals/workflow/functions/evaluateConversation.ts": {
|
|
29
|
+
"executeEvaluatorStep": {
|
|
30
|
+
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep"
|
|
31
|
+
},
|
|
32
|
+
"getConversationStep": {
|
|
33
|
+
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep"
|
|
34
|
+
},
|
|
35
|
+
"getEvaluatorsStep": {
|
|
36
|
+
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep"
|
|
37
|
+
},
|
|
38
|
+
"logStep": {
|
|
39
|
+
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep"
|
|
40
|
+
}
|
|
41
41
|
}
|
|
42
42
|
},
|
|
43
43
|
"workflows": {
|
|
44
|
-
"src/domains/evals/workflow/functions/evaluateConversation.ts": {
|
|
45
|
-
"_evaluateConversationWorkflow": {
|
|
46
|
-
"workflowId": "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
|
|
47
|
-
}
|
|
48
|
-
},
|
|
49
44
|
"src/domains/evals/workflow/functions/runDatasetItem.ts": {
|
|
50
45
|
"_runDatasetItemWorkflow": {
|
|
51
46
|
"workflowId": "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
|
|
52
47
|
}
|
|
48
|
+
},
|
|
49
|
+
"src/domains/evals/workflow/functions/evaluateConversation.ts": {
|
|
50
|
+
"_evaluateConversationWorkflow": {
|
|
51
|
+
"workflowId": "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
|
|
52
|
+
}
|
|
53
53
|
}
|
|
54
54
|
}
|
|
55
55
|
}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono17 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/evals/routes/datasetTriggers.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono17.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono18 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/evals/routes/index.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono18.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { Hono } from "hono";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono_types5 from "hono/types";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/evals/workflow/routes.d.ts
|
|
5
|
-
declare const workflowRoutes: Hono<
|
|
5
|
+
declare const workflowRoutes: Hono<hono_types5.BlankEnv, hono_types5.BlankSchema, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { workflowRoutes };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono14 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/manage/routes/conversations.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono14.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono16 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/manage/routes/evals/evaluationResults.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono16.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono15 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/manage/routes/index.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono15.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { Hono } from "hono";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono_types7 from "hono/types";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/manage/routes/mcp.d.ts
|
|
5
|
-
declare const app: Hono<
|
|
5
|
+
declare const app: Hono<hono_types7.BlankEnv, hono_types7.BlankSchema, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
import { ManageAppVariables } from "../../../types/app.js";
|
|
2
2
|
import { Hono } from "hono";
|
|
3
|
-
import * as
|
|
3
|
+
import * as hono_types9 from "hono/types";
|
|
4
4
|
|
|
5
5
|
//#region src/domains/manage/routes/signoz.d.ts
|
|
6
6
|
declare const app: Hono<{
|
|
7
7
|
Variables: ManageAppVariables;
|
|
8
|
-
},
|
|
8
|
+
}, hono_types9.BlankSchema, "/">;
|
|
9
9
|
//#endregion
|
|
10
10
|
export { app as default };
|
package/dist/factory.d.ts
CHANGED
|
@@ -24,6 +24,12 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
|
|
|
24
24
|
requireEmailVerification: false;
|
|
25
25
|
autoSignIn: true;
|
|
26
26
|
};
|
|
27
|
+
account: {
|
|
28
|
+
accountLinking: {
|
|
29
|
+
enabled: true;
|
|
30
|
+
trustedProviders: ("google" | "email-password" | "auth0")[];
|
|
31
|
+
};
|
|
32
|
+
};
|
|
27
33
|
databaseHooks: {
|
|
28
34
|
session: {
|
|
29
35
|
create: {
|
|
@@ -789,25 +795,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
|
|
|
789
795
|
ac: better_auth_plugins0.AccessControl;
|
|
790
796
|
roles: {
|
|
791
797
|
member: {
|
|
792
|
-
authorize<K_1 extends "
|
|
793
|
-
actions: better_auth_plugins0.Subset<"
|
|
798
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
799
|
+
actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
794
800
|
connector: "OR" | "AND";
|
|
795
801
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
796
|
-
statements: better_auth_plugins0.Subset<"
|
|
802
|
+
statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
797
803
|
};
|
|
798
804
|
admin: {
|
|
799
|
-
authorize<K_1 extends "
|
|
800
|
-
actions: better_auth_plugins0.Subset<"
|
|
805
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
806
|
+
actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
801
807
|
connector: "OR" | "AND";
|
|
802
808
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
803
|
-
statements: better_auth_plugins0.Subset<"
|
|
809
|
+
statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
804
810
|
};
|
|
805
811
|
owner: {
|
|
806
|
-
authorize<K_1 extends "
|
|
807
|
-
actions: better_auth_plugins0.Subset<"
|
|
812
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
813
|
+
actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
808
814
|
connector: "OR" | "AND";
|
|
809
815
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
810
|
-
statements: better_auth_plugins0.Subset<"
|
|
816
|
+
statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
811
817
|
};
|
|
812
818
|
};
|
|
813
819
|
membershipLimit: number;
|
|
@@ -1098,25 +1104,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
|
|
|
1098
1104
|
ac: better_auth_plugins0.AccessControl;
|
|
1099
1105
|
roles: {
|
|
1100
1106
|
member: {
|
|
1101
|
-
authorize<K_1 extends "
|
|
1102
|
-
actions: better_auth_plugins0.Subset<"
|
|
1107
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
1108
|
+
actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
1103
1109
|
connector: "OR" | "AND";
|
|
1104
1110
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1105
|
-
statements: better_auth_plugins0.Subset<"
|
|
1111
|
+
statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
1106
1112
|
};
|
|
1107
1113
|
admin: {
|
|
1108
|
-
authorize<K_1 extends "
|
|
1109
|
-
actions: better_auth_plugins0.Subset<"
|
|
1114
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
1115
|
+
actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
1110
1116
|
connector: "OR" | "AND";
|
|
1111
1117
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1112
|
-
statements: better_auth_plugins0.Subset<"
|
|
1118
|
+
statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
1113
1119
|
};
|
|
1114
1120
|
owner: {
|
|
1115
|
-
authorize<K_1 extends "
|
|
1116
|
-
actions: better_auth_plugins0.Subset<"
|
|
1121
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
1122
|
+
actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
1117
1123
|
connector: "OR" | "AND";
|
|
1118
1124
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1119
|
-
statements: better_auth_plugins0.Subset<"
|
|
1125
|
+
statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
1120
1126
|
};
|
|
1121
1127
|
};
|
|
1122
1128
|
membershipLimit: number;
|
package/dist/index.d.ts
CHANGED
|
@@ -25,6 +25,12 @@ declare const auth: better_auth78.Auth<{
|
|
|
25
25
|
requireEmailVerification: false;
|
|
26
26
|
autoSignIn: true;
|
|
27
27
|
};
|
|
28
|
+
account: {
|
|
29
|
+
accountLinking: {
|
|
30
|
+
enabled: true;
|
|
31
|
+
trustedProviders: ("google" | "email-password" | "auth0")[];
|
|
32
|
+
};
|
|
33
|
+
};
|
|
28
34
|
databaseHooks: {
|
|
29
35
|
session: {
|
|
30
36
|
create: {
|
|
@@ -790,25 +796,25 @@ declare const auth: better_auth78.Auth<{
|
|
|
790
796
|
ac: better_auth_plugins69.AccessControl;
|
|
791
797
|
roles: {
|
|
792
798
|
member: {
|
|
793
|
-
authorize<K_1 extends "
|
|
794
|
-
actions: better_auth_plugins69.Subset<"
|
|
799
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
|
|
800
|
+
actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
|
|
795
801
|
connector: "OR" | "AND";
|
|
796
802
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
797
|
-
statements: better_auth_plugins69.Subset<"
|
|
803
|
+
statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
|
|
798
804
|
};
|
|
799
805
|
admin: {
|
|
800
|
-
authorize<K_1 extends "
|
|
801
|
-
actions: better_auth_plugins69.Subset<"
|
|
806
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
|
|
807
|
+
actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
|
|
802
808
|
connector: "OR" | "AND";
|
|
803
809
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
804
|
-
statements: better_auth_plugins69.Subset<"
|
|
810
|
+
statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
|
|
805
811
|
};
|
|
806
812
|
owner: {
|
|
807
|
-
authorize<K_1 extends "
|
|
808
|
-
actions: better_auth_plugins69.Subset<"
|
|
813
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
|
|
814
|
+
actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
|
|
809
815
|
connector: "OR" | "AND";
|
|
810
816
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
811
|
-
statements: better_auth_plugins69.Subset<"
|
|
817
|
+
statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
|
|
812
818
|
};
|
|
813
819
|
};
|
|
814
820
|
membershipLimit: number;
|
|
@@ -1099,25 +1105,25 @@ declare const auth: better_auth78.Auth<{
|
|
|
1099
1105
|
ac: better_auth_plugins69.AccessControl;
|
|
1100
1106
|
roles: {
|
|
1101
1107
|
member: {
|
|
1102
|
-
authorize<K_1 extends "
|
|
1103
|
-
actions: better_auth_plugins69.Subset<"
|
|
1108
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
|
|
1109
|
+
actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
|
|
1104
1110
|
connector: "OR" | "AND";
|
|
1105
1111
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
1106
|
-
statements: better_auth_plugins69.Subset<"
|
|
1112
|
+
statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
|
|
1107
1113
|
};
|
|
1108
1114
|
admin: {
|
|
1109
|
-
authorize<K_1 extends "
|
|
1110
|
-
actions: better_auth_plugins69.Subset<"
|
|
1115
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
|
|
1116
|
+
actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
|
|
1111
1117
|
connector: "OR" | "AND";
|
|
1112
1118
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
1113
|
-
statements: better_auth_plugins69.Subset<"
|
|
1119
|
+
statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
|
|
1114
1120
|
};
|
|
1115
1121
|
owner: {
|
|
1116
|
-
authorize<K_1 extends "
|
|
1117
|
-
actions: better_auth_plugins69.Subset<"
|
|
1122
|
+
authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
|
|
1123
|
+
actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
|
|
1118
1124
|
connector: "OR" | "AND";
|
|
1119
1125
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
1120
|
-
statements: better_auth_plugins69.Subset<"
|
|
1126
|
+
statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
|
|
1121
1127
|
};
|
|
1122
1128
|
};
|
|
1123
1129
|
membershipLimit: number;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono1 from "hono";
|
|
2
2
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/evalsAuth.d.ts
|
|
@@ -7,7 +7,7 @@ import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
|
7
7
|
* Middleware to authenticate API requests using Bearer token authentication
|
|
8
8
|
* First checks if token matches INKEEP_AGENTS_EVAL_API_BYPASS_SECRET,
|
|
9
9
|
*/
|
|
10
|
-
declare const evalApiKeyAuth: () =>
|
|
10
|
+
declare const evalApiKeyAuth: () => hono1.MiddlewareHandler<{
|
|
11
11
|
Variables: {
|
|
12
12
|
executionContext: BaseExecutionContext;
|
|
13
13
|
};
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono2 from "hono";
|
|
2
2
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
3
3
|
import { createAuth } from "@inkeep/agents-core/auth";
|
|
4
4
|
|
|
@@ -12,7 +12,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
|
|
|
12
12
|
* 3. Database API key
|
|
13
13
|
* 4. Internal service token
|
|
14
14
|
*/
|
|
15
|
-
declare const manageApiKeyAuth: () =>
|
|
15
|
+
declare const manageApiKeyAuth: () => hono2.MiddlewareHandler<{
|
|
16
16
|
Variables: {
|
|
17
17
|
executionContext: BaseExecutionContext;
|
|
18
18
|
userId?: string;
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { ManageAppVariables } from "../types/app.js";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono0 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/projectAccess.d.ts
|
|
5
5
|
|
|
@@ -26,6 +26,6 @@ declare const requireProjectPermission: <Env$1 extends {
|
|
|
26
26
|
Variables: ManageAppVariables;
|
|
27
27
|
} = {
|
|
28
28
|
Variables: ManageAppVariables;
|
|
29
|
-
}>(permission?: ProjectPermission) =>
|
|
29
|
+
}>(permission?: ProjectPermission) => hono0.MiddlewareHandler<Env$1, string, {}, Response>;
|
|
30
30
|
//#endregion
|
|
31
31
|
export { ProjectPermission, requireProjectPermission };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@inkeep/agents-api",
|
|
3
|
-
"version": "0.0.0-dev-
|
|
3
|
+
"version": "0.0.0-dev-20260121155340",
|
|
4
4
|
"description": "Unified Inkeep Agents API - combines management, runtime, and evaluation capabilities",
|
|
5
5
|
"types": "dist/index.d.ts",
|
|
6
6
|
"exports": {
|
|
@@ -70,8 +70,8 @@
|
|
|
70
70
|
"openid-client": "^6.8.1",
|
|
71
71
|
"pg": "^8.16.3",
|
|
72
72
|
"workflow": "4.0.1-beta.33",
|
|
73
|
-
"@inkeep/agents-core": "^0.0.0-dev-
|
|
74
|
-
"@inkeep/agents-manage-mcp": "^0.0.0-dev-
|
|
73
|
+
"@inkeep/agents-core": "^0.0.0-dev-20260121155340",
|
|
74
|
+
"@inkeep/agents-manage-mcp": "^0.0.0-dev-20260121155340"
|
|
75
75
|
},
|
|
76
76
|
"peerDependencies": {
|
|
77
77
|
"@hono/zod-openapi": "^1.1.5",
|