@inkeep/agents-api 0.0.0-dev-20260121221420 → 0.0.0-dev-20260121225854

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -46286,52 +46286,14 @@ var workflowCode = `globalThis.__private_workflows = new Map();
46286
46286
  var __defProp = Object.defineProperty;
46287
46287
  var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
46288
46288
 
46289
- // src/domains/evals/workflow/functions/evaluateConversation.ts
46290
- var getConversationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep");
46291
- var getEvaluatorsStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep");
46292
- var executeEvaluatorStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep");
46293
- var logStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep");
46294
- async function _evaluateConversationWorkflow(payload) {
46295
- const { conversationId, evaluatorIds } = payload;
46296
- await logStep("Starting conversation evaluation", payload);
46297
- const conversation = await getConversationStep(payload);
46298
- const evaluators = await getEvaluatorsStep(payload);
46299
- if (evaluators.length === 0) {
46300
- await logStep("No valid evaluators found", {
46301
- conversationId,
46302
- evaluatorIds
46303
- });
46304
- return {
46305
- success: false,
46306
- reason: "No valid evaluators"
46307
- };
46308
- }
46309
- const results = [];
46310
- for (const evaluator of evaluators) {
46311
- const result = await executeEvaluatorStep(payload, evaluator.id, conversation);
46312
- results.push(result);
46313
- }
46314
- return {
46315
- success: true,
46316
- conversationId,
46317
- resultCount: results.length
46318
- };
46319
- }
46320
- __name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
46321
- _evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
46322
- globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow", _evaluateConversationWorkflow);
46323
- var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
46324
- workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
46325
- });
46326
-
46327
46289
  // src/domains/evals/workflow/functions/runDatasetItem.ts
46328
46290
  var callChatApiStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep");
46329
46291
  var createRelationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep");
46330
- var executeEvaluatorStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep");
46331
- var logStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep");
46292
+ var executeEvaluatorStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep");
46293
+ var logStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep");
46332
46294
  async function _runDatasetItemWorkflow(payload) {
46333
46295
  const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;
46334
- await logStep2("Starting dataset item processing", {
46296
+ await logStep("Starting dataset item processing", {
46335
46297
  datasetItemId,
46336
46298
  datasetRunId,
46337
46299
  agentId,
@@ -46342,11 +46304,11 @@ async function _runDatasetItemWorkflow(payload) {
46342
46304
  await createRelationStep(payload, result.conversationId);
46343
46305
  if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {
46344
46306
  for (const evaluatorId of evaluatorIds) {
46345
- await executeEvaluatorStep2(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);
46307
+ await executeEvaluatorStep(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);
46346
46308
  }
46347
46309
  }
46348
46310
  } else {
46349
- await logStep2("No conversation created", {
46311
+ await logStep("No conversation created", {
46350
46312
  datasetItemId,
46351
46313
  datasetRunId,
46352
46314
  error: result.error
@@ -46366,7 +46328,45 @@ globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functio
46366
46328
  var runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {
46367
46329
  workflowId: "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
46368
46330
  });
46369
- //# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["src/domains/evals/workflow/functions/evaluateConversation.ts", "src/domains/evals/workflow/functions/runDatasetItem.ts"],
  "sourcesContent": ["/**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"_evaluateConversationWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\"},\"getConversationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\"},\"getEvaluatorsStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\"}}}}*/;\nvar getConversationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\");\nvar getEvaluatorsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\");\nvar executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\");\n/**\n * Main workflow function - orchestrates the evaluation steps.\n *\n * IMPORTANT: This runs in a deterministic sandbox.\n * - Do NOT call Node.js APIs directly here (no DB, no fs, etc.)\n * - All side effects must happen in step functions\n */ async function _evaluateConversationWorkflow(payload) {\n    const { conversationId, evaluatorIds } = payload;\n    await logStep('Starting conversation evaluation', payload);\n    const conversation = await getConversationStep(payload);\n    const evaluators = await getEvaluatorsStep(payload);\n    if (evaluators.length === 0) {\n        await logStep('No valid evaluators found', {\n            conversationId,\n            evaluatorIds\n        });\n        return {\n            success: false,\n            reason: 'No valid evaluators'\n        };\n    }\n    const results = [];\n    for (const evaluator of evaluators){\n        const result = await executeEvaluatorStep(payload, evaluator.id, conversation);\n        results.push(result);\n    }\n    return {\n        success: true,\n        conversationId,\n        resultCount: results.length\n    };\n}\n_evaluateConversationWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\", _evaluateConversationWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow'\n});\n", "/**\n * Workflow for running dataset items through the chat API.\n *\n * This makes dataset run processing fire-and-forget - each item is queued\n * independently and processed in parallel by the workflow system.\n */ /**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"_runDatasetItemWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"callChatApiStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\"},\"createRelationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\"},\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\"}}}}*/;\n/**\n * Step: Call the chat API to process the dataset item\n */ var callChatApiStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\");\n/**\n * Step: Create conversation relation in database\n */ var createRelationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\");\n/**\n * Step: Execute a single evaluator on a conversation\n */ var executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\");\n/**\n * Main workflow function - processes a single dataset item through the chat API.\n * Optionally runs evaluators on the resulting conversation.\n */ async function _runDatasetItemWorkflow(payload) {\n    const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;\n    await logStep('Starting dataset item processing', {\n        datasetItemId,\n        datasetRunId,\n        agentId,\n        hasEvaluators: !!(evaluatorIds && evaluatorIds.length > 0)\n    });\n    // Call chat API\n    const result = await callChatApiStep(payload);\n    // Create relation if we got a conversation\n    if (result.conversationId) {\n        await createRelationStep(payload, result.conversationId);\n        // Run evaluations if configured\n        if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {\n            for (const evaluatorId of evaluatorIds){\n                await executeEvaluatorStep(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);\n            }\n        }\n    } else {\n        await logStep('No conversation created', {\n            datasetItemId,\n            datasetRunId,\n            error: result.error\n        });\n    }\n    return {\n        success: !result.error,\n        datasetItemId,\n        datasetRunId,\n        conversationId: result.conversationId || null,\n        error: result.error || null\n    };\n}\n_runDatasetItemWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\", _runDatasetItemWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow'\n});\n"],
  "mappings": ";;;;;AACA,IAAI,sBAAsB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,yFAAyF;AAC/J,IAAI,oBAAoB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uFAAuF;AAC3J,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,0FAA0F;AAG7J,IAAI,UAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6EAA6E;AAOvI,eAAe,8BAA8B,SAAS;AACtD,QAAM,EAAE,gBAAgB,aAAa,IAAI;AACzC,QAAM,QAAQ,oCAAoC,OAAO;AACzD,QAAM,eAAe,MAAM,oBAAoB,OAAO;AACtD,QAAM,aAAa,MAAM,kBAAkB,OAAO;AAClD,MAAI,WAAW,WAAW,GAAG;AACzB,UAAM,QAAQ,6BAA6B;AAAA,MACvC;AAAA,MACA;AAAA,IACJ,CAAC;AACD,WAAO;AAAA,MACH,SAAS;AAAA,MACT,QAAQ;AAAA,IACZ;AAAA,EACJ;AACA,QAAM,UAAU,CAAC;AACjB,aAAW,aAAa,YAAW;AAC/B,UAAM,SAAS,MAAM,qBAAqB,SAAS,UAAU,IAAI,YAAY;AAC7E,YAAQ,KAAK,MAAM;AAAA,EACvB;AACA,SAAO;AAAA,IACH,SAAS;AAAA,IACT;AAAA,IACA,aAAa,QAAQ;AAAA,EACzB;AACJ;AAzBmB;AA0BnB,8BAA8B,aAAa;AAC3C,WAAW,oBAAoB,IAAI,yGAAyG,6BAA6B;AAElK,IAAM,+BAA+B,OAAO,OAAO,+BAA+B;AAAA,EACrF,YAAY;AAChB,CAAC;;;ACpCG,IAAI,kBAAkB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,+EAA+E;AAGjJ,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,kFAAkF;AAGvJ,IAAIA,wBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oFAAoF;AAG3J,IAAIC,WAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uEAAuE;AAIjI,eAAe,wBAAwB,SAAS;AAChD,QAAM,EAAE,eAAe,cAAc,SAAS,cAAc,gBAAgB,IAAI;AAChF,QAAMA,SAAQ,oCAAoC;AAAA,IAC9C;AAAA,IACA;AAAA,IACA;AAAA,IACA,eAAe,CAAC,EAAE,gBAAgB,aAAa,SAAS;AAAA,EAC5D,CAAC;AAED,QAAM,SAAS,MAAM,gBAAgB,OAAO;AAE5C,MAAI,OAAO,gBAAgB;AACvB,UAAM,mBAAmB,SAAS,OAAO,cAAc;AAEvD,QAAI,gBAAgB,aAAa,SAAS,KAAK,iBAAiB;AAC5D,iBAAW,eAAe,cAAa;AACnC,cAAMD,sBAAqB,QAAQ,UAAU,QAAQ,WAAW,OAAO,gBAAgB,aAAa,iBAAiB,QAAQ,yBAAyB;AAAA,MAC1J;AAAA,IACJ;AAAA,EACJ,OAAO;AACH,UAAMC,SAAQ,2BAA2B;AAAA,MACrC;AAAA,MACA;AAAA,MACA,OAAO,OAAO;AAAA,IAClB,CAAC;AAAA,EACL;AACA,SAAO;AAAA,IACH,SAAS,CAAC,OAAO;AAAA,IACjB;AAAA,IACA;AAAA,IACA,gBAAgB,OAAO,kBAAkB;AAAA,IACzC,OAAO,OAAO,SAAS;AAAA,EAC3B;AACJ;AAjCmB;AAkCnB,wBAAwB,aAAa;AACrC,WAAW,oBAAoB,IAAI,6FAA6F,uBAAuB;AAEhJ,IAAM,yBAAyB,OAAO,OAAO,yBAAyB;AAAA,EACzE,YAAY;AAChB,CAAC;",
  "names": ["executeEvaluatorStep", "logStep"]
}

46331
+
46332
+ // src/domains/evals/workflow/functions/evaluateConversation.ts
46333
+ var getConversationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep");
46334
+ var getEvaluatorsStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep");
46335
+ var executeEvaluatorStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep");
46336
+ var logStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep");
46337
+ async function _evaluateConversationWorkflow(payload) {
46338
+ const { conversationId, evaluatorIds } = payload;
46339
+ await logStep2("Starting conversation evaluation", payload);
46340
+ const conversation = await getConversationStep(payload);
46341
+ const evaluators = await getEvaluatorsStep(payload);
46342
+ if (evaluators.length === 0) {
46343
+ await logStep2("No valid evaluators found", {
46344
+ conversationId,
46345
+ evaluatorIds
46346
+ });
46347
+ return {
46348
+ success: false,
46349
+ reason: "No valid evaluators"
46350
+ };
46351
+ }
46352
+ const results = [];
46353
+ for (const evaluator of evaluators) {
46354
+ const result = await executeEvaluatorStep2(payload, evaluator.id, conversation);
46355
+ results.push(result);
46356
+ }
46357
+ return {
46358
+ success: true,
46359
+ conversationId,
46360
+ resultCount: results.length
46361
+ };
46362
+ }
46363
+ __name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
46364
+ _evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
46365
+ globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow", _evaluateConversationWorkflow);
46366
+ var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
46367
+ workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
46368
+ });
46369
+ //# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["src/domains/evals/workflow/functions/runDatasetItem.ts", "src/domains/evals/workflow/functions/evaluateConversation.ts"],
  "sourcesContent": ["/**\n * Workflow for running dataset items through the chat API.\n *\n * This makes dataset run processing fire-and-forget - each item is queued\n * independently and processed in parallel by the workflow system.\n */ /**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"_runDatasetItemWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"callChatApiStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\"},\"createRelationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\"},\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\"}}}}*/;\n/**\n * Step: Call the chat API to process the dataset item\n */ var callChatApiStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\");\n/**\n * Step: Create conversation relation in database\n */ var createRelationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\");\n/**\n * Step: Execute a single evaluator on a conversation\n */ var executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\");\n/**\n * Main workflow function - processes a single dataset item through the chat API.\n * Optionally runs evaluators on the resulting conversation.\n */ async function _runDatasetItemWorkflow(payload) {\n    const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;\n    await logStep('Starting dataset item processing', {\n        datasetItemId,\n        datasetRunId,\n        agentId,\n        hasEvaluators: !!(evaluatorIds && evaluatorIds.length > 0)\n    });\n    // Call chat API\n    const result = await callChatApiStep(payload);\n    // Create relation if we got a conversation\n    if (result.conversationId) {\n        await createRelationStep(payload, result.conversationId);\n        // Run evaluations if configured\n        if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {\n            for (const evaluatorId of evaluatorIds){\n                await executeEvaluatorStep(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);\n            }\n        }\n    } else {\n        await logStep('No conversation created', {\n            datasetItemId,\n            datasetRunId,\n            error: result.error\n        });\n    }\n    return {\n        success: !result.error,\n        datasetItemId,\n        datasetRunId,\n        conversationId: result.conversationId || null,\n        error: result.error || null\n    };\n}\n_runDatasetItemWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\", _runDatasetItemWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow'\n});\n", "/**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"_evaluateConversationWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\"},\"getConversationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\"},\"getEvaluatorsStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\"}}}}*/;\nvar getConversationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\");\nvar getEvaluatorsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\");\nvar executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\");\n/**\n * Main workflow function - orchestrates the evaluation steps.\n *\n * IMPORTANT: This runs in a deterministic sandbox.\n * - Do NOT call Node.js APIs directly here (no DB, no fs, etc.)\n * - All side effects must happen in step functions\n */ async function _evaluateConversationWorkflow(payload) {\n    const { conversationId, evaluatorIds } = payload;\n    await logStep('Starting conversation evaluation', payload);\n    const conversation = await getConversationStep(payload);\n    const evaluators = await getEvaluatorsStep(payload);\n    if (evaluators.length === 0) {\n        await logStep('No valid evaluators found', {\n            conversationId,\n            evaluatorIds\n        });\n        return {\n            success: false,\n            reason: 'No valid evaluators'\n        };\n    }\n    const results = [];\n    for (const evaluator of evaluators){\n        const result = await executeEvaluatorStep(payload, evaluator.id, conversation);\n        results.push(result);\n    }\n    return {\n        success: true,\n        conversationId,\n        resultCount: results.length\n    };\n}\n_evaluateConversationWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\", _evaluateConversationWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow'\n});\n"],
  "mappings": ";;;;;AAQI,IAAI,kBAAkB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,+EAA+E;AAGjJ,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,kFAAkF;AAGvJ,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oFAAoF;AAG3J,IAAI,UAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uEAAuE;AAIjI,eAAe,wBAAwB,SAAS;AAChD,QAAM,EAAE,eAAe,cAAc,SAAS,cAAc,gBAAgB,IAAI;AAChF,QAAM,QAAQ,oCAAoC;AAAA,IAC9C;AAAA,IACA;AAAA,IACA;AAAA,IACA,eAAe,CAAC,EAAE,gBAAgB,aAAa,SAAS;AAAA,EAC5D,CAAC;AAED,QAAM,SAAS,MAAM,gBAAgB,OAAO;AAE5C,MAAI,OAAO,gBAAgB;AACvB,UAAM,mBAAmB,SAAS,OAAO,cAAc;AAEvD,QAAI,gBAAgB,aAAa,SAAS,KAAK,iBAAiB;AAC5D,iBAAW,eAAe,cAAa;AACnC,cAAM,qBAAqB,QAAQ,UAAU,QAAQ,WAAW,OAAO,gBAAgB,aAAa,iBAAiB,QAAQ,yBAAyB;AAAA,MAC1J;AAAA,IACJ;AAAA,EACJ,OAAO;AACH,UAAM,QAAQ,2BAA2B;AAAA,MACrC;AAAA,MACA;AAAA,MACA,OAAO,OAAO;AAAA,IAClB,CAAC;AAAA,EACL;AACA,SAAO;AAAA,IACH,SAAS,CAAC,OAAO;AAAA,IACjB;AAAA,IACA;AAAA,IACA,gBAAgB,OAAO,kBAAkB;AAAA,IACzC,OAAO,OAAO,SAAS;AAAA,EAC3B;AACJ;AAjCmB;AAkCnB,wBAAwB,aAAa;AACrC,WAAW,oBAAoB,IAAI,6FAA6F,uBAAuB;AAEhJ,IAAM,yBAAyB,OAAO,OAAO,yBAAyB;AAAA,EACzE,YAAY;AAChB,CAAC;;;AC3DD,IAAI,sBAAsB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,yFAAyF;AAC/J,IAAI,oBAAoB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uFAAuF;AAC3J,IAAIA,wBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,0FAA0F;AAG7J,IAAIC,WAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6EAA6E;AAOvI,eAAe,8BAA8B,SAAS;AACtD,QAAM,EAAE,gBAAgB,aAAa,IAAI;AACzC,QAAMA,SAAQ,oCAAoC,OAAO;AACzD,QAAM,eAAe,MAAM,oBAAoB,OAAO;AACtD,QAAM,aAAa,MAAM,kBAAkB,OAAO;AAClD,MAAI,WAAW,WAAW,GAAG;AACzB,UAAMA,SAAQ,6BAA6B;AAAA,MACvC;AAAA,MACA;AAAA,IACJ,CAAC;AACD,WAAO;AAAA,MACH,SAAS;AAAA,MACT,QAAQ;AAAA,IACZ;AAAA,EACJ;AACA,QAAM,UAAU,CAAC;AACjB,aAAW,aAAa,YAAW;AAC/B,UAAM,SAAS,MAAMD,sBAAqB,SAAS,UAAU,IAAI,YAAY;AAC7E,YAAQ,KAAK,MAAM;AAAA,EACvB;AACA,SAAO;AAAA,IACH,SAAS;AAAA,IACT;AAAA,IACA,aAAa,QAAQ;AAAA,EACzB;AACJ;AAzBmB;AA0BnB,8BAA8B,aAAa;AAC3C,WAAW,oBAAoB,IAAI,yGAAyG,6BAA6B;AAElK,IAAM,+BAA+B,OAAO,OAAO,+BAA+B;AAAA,EACrF,YAAY;AAChB,CAAC;",
  "names": ["executeEvaluatorStep", "logStep"]
}

46370
46370
  `;
46371
46371
  var POST = workflowEntrypoint(workflowCode);
46372
46372
  // Annotate the CommonJS export names for ESM import in node:
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "workflowFiles": [
3
- "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts",
4
- "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts"
3
+ "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts",
4
+ "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts"
5
5
  ]
6
6
  }
@@ -41,15 +41,15 @@
41
41
  }
42
42
  },
43
43
  "workflows": {
44
- "src/domains/evals/workflow/functions/evaluateConversation.ts": {
45
- "_evaluateConversationWorkflow": {
46
- "workflowId": "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
47
- }
48
- },
49
44
  "src/domains/evals/workflow/functions/runDatasetItem.ts": {
50
45
  "_runDatasetItemWorkflow": {
51
46
  "workflowId": "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
52
47
  }
48
+ },
49
+ "src/domains/evals/workflow/functions/evaluateConversation.ts": {
50
+ "_evaluateConversationWorkflow": {
51
+ "workflowId": "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
52
+ }
53
53
  }
54
54
  }
55
55
  }
@@ -212492,124 +212492,8 @@ Return your evaluation as a JSON object matching the schema above.`;
212492
212492
  }
212493
212493
  };
212494
212494
 
212495
- // src/domains/evals/workflow/functions/evaluateConversation.ts
212496
- var logger22 = getLogger("workflow-evaluate-conversation");
212497
- async function getConversationStep(payload) {
212498
- const { tenantId, projectId, conversationId } = payload;
212499
- const conv = await getConversation(runDbClient_default)({
212500
- scopes: {
212501
- tenantId,
212502
- projectId
212503
- },
212504
- conversationId
212505
- });
212506
- if (!conv) {
212507
- throw new Error(`Conversation not found: ${conversationId}`);
212508
- }
212509
- return conv;
212510
- }
212511
- __name(getConversationStep, "getConversationStep");
212512
- async function getEvaluatorsStep(payload) {
212513
- const { tenantId, projectId, evaluatorIds } = payload;
212514
- const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
212515
- const evals = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorsByIds(db)({
212516
- scopes: {
212517
- tenantId,
212518
- projectId
212519
- },
212520
- evaluatorIds
212521
- }));
212522
- return evals;
212523
- }
212524
- __name(getEvaluatorsStep, "getEvaluatorsStep");
212525
- async function executeEvaluatorStep(payload, evaluatorId, conversation) {
212526
- const { tenantId, projectId, conversationId, evaluationRunId } = payload;
212527
- const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
212528
- const evaluator2 = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorById(db)({
212529
- scopes: {
212530
- tenantId,
212531
- projectId,
212532
- evaluatorId
212533
- }
212534
- }));
212535
- if (!evaluator2) {
212536
- throw new Error(`Evaluator not found: ${evaluatorId}`);
212537
- }
212538
- const evalResult = await createEvaluationResult(runDbClient_default)({
212539
- id: generateId(),
212540
- tenantId,
212541
- projectId,
212542
- conversationId,
212543
- evaluatorId: evaluator2.id,
212544
- evaluationRunId
212545
- });
212546
- try {
212547
- const evaluationService = new EvaluationService();
212548
- const output = await evaluationService.executeEvaluation({
212549
- conversation,
212550
- evaluator: evaluator2,
212551
- tenantId,
212552
- projectId
212553
- });
212554
- const updated = await updateEvaluationResult(runDbClient_default)({
212555
- scopes: {
212556
- tenantId,
212557
- projectId,
212558
- evaluationResultId: evalResult.id
212559
- },
212560
- data: {
212561
- output
212562
- }
212563
- });
212564
- logger22.info({
212565
- conversationId,
212566
- evaluatorId: evaluator2.id,
212567
- resultId: evalResult.id
212568
- }, "Evaluation completed successfully");
212569
- return updated;
212570
- } catch (error46) {
212571
- const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
212572
- logger22.error({
212573
- error: error46,
212574
- conversationId,
212575
- evaluatorId: evaluator2.id,
212576
- resultId: evalResult.id
212577
- }, "Evaluation execution failed");
212578
- const failed = await updateEvaluationResult(runDbClient_default)({
212579
- scopes: {
212580
- tenantId,
212581
- projectId,
212582
- evaluationResultId: evalResult.id
212583
- },
212584
- data: {
212585
- output: {
212586
- text: `Evaluation failed: ${errorMessage}`
212587
- }
212588
- }
212589
- });
212590
- return failed;
212591
- }
212592
- }
212593
- __name(executeEvaluatorStep, "executeEvaluatorStep");
212594
- async function logStep(message, data) {
212595
- logger22.info(data, message);
212596
- }
212597
- __name(logStep, "logStep");
212598
- async function _evaluateConversationWorkflow(payload) {
212599
- throw new Error("You attempted to execute workflow _evaluateConversationWorkflow function directly. To start a workflow, use start(_evaluateConversationWorkflow) from workflow/api");
212600
- }
212601
- __name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
212602
- _evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
212603
- var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
212604
- workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
212605
- });
212606
- registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep", getConversationStep);
212607
- registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep", getEvaluatorsStep);
212608
- registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep", executeEvaluatorStep);
212609
- registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep", logStep);
212610
-
212611
212495
  // src/domains/evals/workflow/functions/runDatasetItem.ts
212612
- var logger23 = getLogger("workflow-run-dataset-item");
212496
+ var logger22 = getLogger("workflow-run-dataset-item");
212613
212497
  async function callChatApiStep(payload) {
212614
212498
  const { tenantId, projectId, agentId, datasetItemId, datasetItemInput, datasetItemSimulationAgent, datasetRunId } = payload;
212615
212499
  const evaluationService = new EvaluationService();
@@ -212625,7 +212509,7 @@ async function callChatApiStep(payload) {
212625
212509
  datasetItem: datasetItem2,
212626
212510
  datasetRunId
212627
212511
  });
212628
- logger23.info({
212512
+ logger22.info({
212629
212513
  tenantId,
212630
212514
  projectId,
212631
212515
  datasetItemId,
@@ -212648,7 +212532,7 @@ async function createRelationStep(payload, conversationId) {
212648
212532
  conversationId,
212649
212533
  datasetItemId
212650
212534
  });
212651
- logger23.info({
212535
+ logger22.info({
212652
212536
  tenantId,
212653
212537
  projectId,
212654
212538
  datasetItemId,
@@ -212662,7 +212546,7 @@ async function createRelationStep(payload, conversationId) {
212662
212546
  };
212663
212547
  } catch (error46) {
212664
212548
  if (error46?.cause?.code === "23503" || error46?.code === "23503") {
212665
- logger23.warn({
212549
+ logger22.warn({
212666
212550
  tenantId,
212667
212551
  projectId,
212668
212552
  datasetItemId,
@@ -212679,7 +212563,7 @@ async function createRelationStep(payload, conversationId) {
212679
212563
  }
212680
212564
  }
212681
212565
  __name(createRelationStep, "createRelationStep");
212682
- async function executeEvaluatorStep2(tenantId, projectId, conversationId, evaluatorId, evaluationRunId, expectedOutput) {
212566
+ async function executeEvaluatorStep(tenantId, projectId, conversationId, evaluatorId, evaluationRunId, expectedOutput) {
212683
212567
  const ref = getProjectScopedRef(tenantId, projectId, "main");
212684
212568
  const resolvedRef = await resolveRef2(manageDbClient_default)(ref);
212685
212569
  if (!resolvedRef) {
@@ -212693,7 +212577,7 @@ async function executeEvaluatorStep2(tenantId, projectId, conversationId, evalua
212693
212577
  }
212694
212578
  }));
212695
212579
  if (!evaluator2) {
212696
- logger23.warn({
212580
+ logger22.warn({
212697
212581
  evaluatorId
212698
212582
  }, "Evaluator not found");
212699
212583
  return null;
@@ -212735,7 +212619,7 @@ async function executeEvaluatorStep2(tenantId, projectId, conversationId, evalua
212735
212619
  output
212736
212620
  }
212737
212621
  });
212738
- logger23.info({
212622
+ logger22.info({
212739
212623
  conversationId,
212740
212624
  evaluatorId: evaluator2.id,
212741
212625
  resultId: evalResult.id
@@ -212743,7 +212627,7 @@ async function executeEvaluatorStep2(tenantId, projectId, conversationId, evalua
212743
212627
  return evalResult.id;
212744
212628
  } catch (error46) {
212745
212629
  const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
212746
- logger23.error({
212630
+ logger22.error({
212747
212631
  error: error46,
212748
212632
  conversationId,
212749
212633
  evaluatorId: evaluator2.id
@@ -212763,11 +212647,11 @@ async function executeEvaluatorStep2(tenantId, projectId, conversationId, evalua
212763
212647
  return evalResult.id;
212764
212648
  }
212765
212649
  }
212766
- __name(executeEvaluatorStep2, "executeEvaluatorStep");
212767
- async function logStep2(message, data) {
212768
- logger23.info(data, message);
212650
+ __name(executeEvaluatorStep, "executeEvaluatorStep");
212651
+ async function logStep(message, data) {
212652
+ logger22.info(data, message);
212769
212653
  }
212770
- __name(logStep2, "logStep");
212654
+ __name(logStep, "logStep");
212771
212655
  async function _runDatasetItemWorkflow(payload) {
212772
212656
  throw new Error("You attempted to execute workflow _runDatasetItemWorkflow function directly. To start a workflow, use start(_runDatasetItemWorkflow) from workflow/api");
212773
212657
  }
@@ -212778,8 +212662,124 @@ var runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {
212778
212662
  });
212779
212663
  registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep", callChatApiStep);
212780
212664
  registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep", createRelationStep);
212781
- registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep", executeEvaluatorStep2);
212782
- registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep", logStep2);
212665
+ registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep", executeEvaluatorStep);
212666
+ registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep", logStep);
212667
+
212668
+ // src/domains/evals/workflow/functions/evaluateConversation.ts
212669
+ var logger23 = getLogger("workflow-evaluate-conversation");
212670
+ async function getConversationStep(payload) {
212671
+ const { tenantId, projectId, conversationId } = payload;
212672
+ const conv = await getConversation(runDbClient_default)({
212673
+ scopes: {
212674
+ tenantId,
212675
+ projectId
212676
+ },
212677
+ conversationId
212678
+ });
212679
+ if (!conv) {
212680
+ throw new Error(`Conversation not found: ${conversationId}`);
212681
+ }
212682
+ return conv;
212683
+ }
212684
+ __name(getConversationStep, "getConversationStep");
212685
+ async function getEvaluatorsStep(payload) {
212686
+ const { tenantId, projectId, evaluatorIds } = payload;
212687
+ const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
212688
+ const evals = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorsByIds(db)({
212689
+ scopes: {
212690
+ tenantId,
212691
+ projectId
212692
+ },
212693
+ evaluatorIds
212694
+ }));
212695
+ return evals;
212696
+ }
212697
+ __name(getEvaluatorsStep, "getEvaluatorsStep");
212698
+ async function executeEvaluatorStep2(payload, evaluatorId, conversation) {
212699
+ const { tenantId, projectId, conversationId, evaluationRunId } = payload;
212700
+ const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
212701
+ const evaluator2 = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorById(db)({
212702
+ scopes: {
212703
+ tenantId,
212704
+ projectId,
212705
+ evaluatorId
212706
+ }
212707
+ }));
212708
+ if (!evaluator2) {
212709
+ throw new Error(`Evaluator not found: ${evaluatorId}`);
212710
+ }
212711
+ const evalResult = await createEvaluationResult(runDbClient_default)({
212712
+ id: generateId(),
212713
+ tenantId,
212714
+ projectId,
212715
+ conversationId,
212716
+ evaluatorId: evaluator2.id,
212717
+ evaluationRunId
212718
+ });
212719
+ try {
212720
+ const evaluationService = new EvaluationService();
212721
+ const output = await evaluationService.executeEvaluation({
212722
+ conversation,
212723
+ evaluator: evaluator2,
212724
+ tenantId,
212725
+ projectId
212726
+ });
212727
+ const updated = await updateEvaluationResult(runDbClient_default)({
212728
+ scopes: {
212729
+ tenantId,
212730
+ projectId,
212731
+ evaluationResultId: evalResult.id
212732
+ },
212733
+ data: {
212734
+ output
212735
+ }
212736
+ });
212737
+ logger23.info({
212738
+ conversationId,
212739
+ evaluatorId: evaluator2.id,
212740
+ resultId: evalResult.id
212741
+ }, "Evaluation completed successfully");
212742
+ return updated;
212743
+ } catch (error46) {
212744
+ const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
212745
+ logger23.error({
212746
+ error: error46,
212747
+ conversationId,
212748
+ evaluatorId: evaluator2.id,
212749
+ resultId: evalResult.id
212750
+ }, "Evaluation execution failed");
212751
+ const failed = await updateEvaluationResult(runDbClient_default)({
212752
+ scopes: {
212753
+ tenantId,
212754
+ projectId,
212755
+ evaluationResultId: evalResult.id
212756
+ },
212757
+ data: {
212758
+ output: {
212759
+ text: `Evaluation failed: ${errorMessage}`
212760
+ }
212761
+ }
212762
+ });
212763
+ return failed;
212764
+ }
212765
+ }
212766
+ __name(executeEvaluatorStep2, "executeEvaluatorStep");
212767
+ async function logStep2(message, data) {
212768
+ logger23.info(data, message);
212769
+ }
212770
+ __name(logStep2, "logStep");
212771
+ async function _evaluateConversationWorkflow(payload) {
212772
+ throw new Error("You attempted to execute workflow _evaluateConversationWorkflow function directly. To start a workflow, use start(_evaluateConversationWorkflow) from workflow/api");
212773
+ }
212774
+ __name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
212775
+ _evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
212776
+ var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
212777
+ workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
212778
+ });
212779
+ registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep", getConversationStep);
212780
+ registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep", getEvaluatorsStep);
212781
+ registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep", executeEvaluatorStep2);
212782
+ registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep", logStep2);
212783
212783
 
212784
212784
  // ../node_modules/.pnpm/@workflow+utils@4.0.1-beta.7/node_modules/@workflow/utils/dist/index.js
212785
212785
  var import_ms2 = __toESM(require_ms(), 1);
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "stepFiles": [
3
- "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts",
4
- "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts"
3
+ "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts",
4
+ "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts"
5
5
  ]
6
6
  }
@@ -1,6 +1,6 @@
1
- import * as _inkeep_agents_core0 from "@inkeep/agents-core";
1
+ import * as _inkeep_agents_core1 from "@inkeep/agents-core";
2
2
 
3
3
  //#region src/data/db/manageDbClient.d.ts
4
- declare const manageDbClient: _inkeep_agents_core0.AgentsManageDatabaseClient;
4
+ declare const manageDbClient: _inkeep_agents_core1.AgentsManageDatabaseClient;
5
5
  //#endregion
6
6
  export { manageDbClient as default };
@@ -1,6 +1,6 @@
1
- import * as _inkeep_agents_core0 from "@inkeep/agents-core";
1
+ import * as _inkeep_agents_core2 from "@inkeep/agents-core";
2
2
 
3
3
  //#region src/data/db/runDbClient.d.ts
4
- declare const runDbClient: _inkeep_agents_core0.AgentsRunDatabaseClient;
4
+ declare const runDbClient: _inkeep_agents_core2.AgentsRunDatabaseClient;
5
5
  //#endregion
6
6
  export { runDbClient as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono14 from "hono";
2
+ import * as hono4 from "hono";
3
3
 
4
4
  //#region src/domains/evals/routes/datasetTriggers.d.ts
5
- declare const app: OpenAPIHono<hono14.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono4.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono15 from "hono";
2
+ import * as hono5 from "hono";
3
3
 
4
4
  //#region src/domains/evals/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono15.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono5.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types5 from "hono/types";
2
+ import * as hono_types6 from "hono/types";
3
3
 
4
4
  //#region src/domains/evals/workflow/routes.d.ts
5
- declare const workflowRoutes: Hono<hono_types5.BlankEnv, hono_types5.BlankSchema, "/">;
5
+ declare const workflowRoutes: Hono<hono_types6.BlankEnv, hono_types6.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { workflowRoutes };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono18 from "hono";
2
+ import * as hono17 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/evals/evaluationResults.d.ts
5
- declare const app: OpenAPIHono<hono18.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono17.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono17 from "hono";
2
+ import * as hono18 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono17.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono18.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types7 from "hono/types";
2
+ import * as hono_types8 from "hono/types";
3
3
 
4
4
  //#region src/domains/manage/routes/mcp.d.ts
5
- declare const app: Hono<hono_types7.BlankEnv, hono_types7.BlankSchema, "/">;
5
+ declare const app: Hono<hono_types8.BlankEnv, hono_types8.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types9 from "hono/types";
3
+ import * as hono_types5 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/signoz.d.ts
6
6
  declare const app: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types9.BlankSchema, "/">;
8
+ }, hono_types5.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { app as default };
@@ -1,6 +1,6 @@
1
1
  import { AgentConfig, DelegateRelation } from "./Agent.js";
2
2
  import { InternalRelation } from "../utils/project.js";
3
- import * as _inkeep_agents_core1 from "@inkeep/agents-core";
3
+ import * as _inkeep_agents_core0 from "@inkeep/agents-core";
4
4
  import { CredentialStoreRegistry, FullExecutionContext } from "@inkeep/agents-core";
5
5
  import * as ai0 from "ai";
6
6
 
@@ -44,7 +44,7 @@ declare function createDelegateToAgentTool({
44
44
  message: string;
45
45
  }, {
46
46
  toolCallId: any;
47
- result: _inkeep_agents_core1.Message | _inkeep_agents_core1.Task;
47
+ result: _inkeep_agents_core0.Message | _inkeep_agents_core0.Task;
48
48
  }>;
49
49
  /**
50
50
  * Parameters for building a transfer relation config
@@ -289,7 +289,7 @@ async function invokeAgentAsync(params) {
289
289
  projectId,
290
290
  agentId,
291
291
  baseUrl: env.INKEEP_AGENTS_API_URL || "http://localhost:3002",
292
- apiKey: "",
292
+ apiKey: env.INKEEP_AGENTS_RUN_API_BYPASS_SECRET || "",
293
293
  apiKeyId: "trigger-invocation",
294
294
  resolvedRef,
295
295
  project,
package/dist/factory.d.ts CHANGED
@@ -795,25 +795,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
795
795
  ac: better_auth_plugins0.AccessControl;
796
796
  roles: {
797
797
  member: {
798
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
799
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
798
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
799
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
800
800
  connector: "OR" | "AND";
801
801
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
802
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
802
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
803
803
  };
804
804
  admin: {
805
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
806
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
805
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
806
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
807
807
  connector: "OR" | "AND";
808
808
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
809
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
809
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
810
810
  };
811
811
  owner: {
812
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
813
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
812
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
813
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
814
814
  connector: "OR" | "AND";
815
815
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
816
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
816
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
817
817
  };
818
818
  };
819
819
  membershipLimit: number;
@@ -987,7 +987,7 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
987
987
  id: string;
988
988
  organizationId: string;
989
989
  email: string;
990
- role: "member" | "owner" | "admin";
990
+ role: "member" | "admin" | "owner";
991
991
  status: better_auth_plugins0.InvitationStatus;
992
992
  inviterId: string;
993
993
  expiresAt: Date;
@@ -996,7 +996,7 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
996
996
  Member: {
997
997
  id: string;
998
998
  organizationId: string;
999
- role: "member" | "owner" | "admin";
999
+ role: "member" | "admin" | "owner";
1000
1000
  createdAt: Date;
1001
1001
  userId: string;
1002
1002
  user: {
@@ -1012,7 +1012,7 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
1012
1012
  members: {
1013
1013
  id: string;
1014
1014
  organizationId: string;
1015
- role: "member" | "owner" | "admin";
1015
+ role: "member" | "admin" | "owner";
1016
1016
  createdAt: Date;
1017
1017
  userId: string;
1018
1018
  user: {
@@ -1026,7 +1026,7 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
1026
1026
  id: string;
1027
1027
  organizationId: string;
1028
1028
  email: string;
1029
- role: "member" | "owner" | "admin";
1029
+ role: "member" | "admin" | "owner";
1030
1030
  status: better_auth_plugins0.InvitationStatus;
1031
1031
  inviterId: string;
1032
1032
  expiresAt: Date;
@@ -1104,25 +1104,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
1104
1104
  ac: better_auth_plugins0.AccessControl;
1105
1105
  roles: {
1106
1106
  member: {
1107
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1108
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1107
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
1108
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
1109
1109
  connector: "OR" | "AND";
1110
1110
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1111
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1111
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
1112
1112
  };
1113
1113
  admin: {
1114
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1115
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1114
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
1115
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
1116
1116
  connector: "OR" | "AND";
1117
1117
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1118
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1118
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
1119
1119
  };
1120
1120
  owner: {
1121
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1122
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1121
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
1122
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
1123
1123
  connector: "OR" | "AND";
1124
1124
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1125
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1125
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
1126
1126
  };
1127
1127
  };
1128
1128
  membershipLimit: number;
package/dist/index.d.ts CHANGED
@@ -796,25 +796,25 @@ declare const auth: better_auth78.Auth<{
796
796
  ac: better_auth_plugins69.AccessControl;
797
797
  roles: {
798
798
  member: {
799
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
800
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
799
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
800
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
801
801
  connector: "OR" | "AND";
802
802
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
803
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
803
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
804
804
  };
805
805
  admin: {
806
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
807
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
806
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
807
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
808
808
  connector: "OR" | "AND";
809
809
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
810
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
810
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
811
811
  };
812
812
  owner: {
813
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
814
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
813
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
814
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
815
815
  connector: "OR" | "AND";
816
816
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
817
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
817
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
818
818
  };
819
819
  };
820
820
  membershipLimit: number;
@@ -988,7 +988,7 @@ declare const auth: better_auth78.Auth<{
988
988
  id: string;
989
989
  organizationId: string;
990
990
  email: string;
991
- role: "member" | "owner" | "admin";
991
+ role: "member" | "admin" | "owner";
992
992
  status: better_auth_plugins69.InvitationStatus;
993
993
  inviterId: string;
994
994
  expiresAt: Date;
@@ -997,7 +997,7 @@ declare const auth: better_auth78.Auth<{
997
997
  Member: {
998
998
  id: string;
999
999
  organizationId: string;
1000
- role: "member" | "owner" | "admin";
1000
+ role: "member" | "admin" | "owner";
1001
1001
  createdAt: Date;
1002
1002
  userId: string;
1003
1003
  user: {
@@ -1013,7 +1013,7 @@ declare const auth: better_auth78.Auth<{
1013
1013
  members: {
1014
1014
  id: string;
1015
1015
  organizationId: string;
1016
- role: "member" | "owner" | "admin";
1016
+ role: "member" | "admin" | "owner";
1017
1017
  createdAt: Date;
1018
1018
  userId: string;
1019
1019
  user: {
@@ -1027,7 +1027,7 @@ declare const auth: better_auth78.Auth<{
1027
1027
  id: string;
1028
1028
  organizationId: string;
1029
1029
  email: string;
1030
- role: "member" | "owner" | "admin";
1030
+ role: "member" | "admin" | "owner";
1031
1031
  status: better_auth_plugins69.InvitationStatus;
1032
1032
  inviterId: string;
1033
1033
  expiresAt: Date;
@@ -1105,25 +1105,25 @@ declare const auth: better_auth78.Auth<{
1105
1105
  ac: better_auth_plugins69.AccessControl;
1106
1106
  roles: {
1107
1107
  member: {
1108
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1109
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
1108
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
1109
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
1110
1110
  connector: "OR" | "AND";
1111
1111
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1112
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
1112
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
1113
1113
  };
1114
1114
  admin: {
1115
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1116
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
1115
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
1116
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
1117
1117
  connector: "OR" | "AND";
1118
1118
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1119
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
1119
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
1120
1120
  };
1121
1121
  owner: {
1122
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1123
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
1122
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
1123
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
1124
1124
  connector: "OR" | "AND";
1125
1125
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1126
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
1126
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
1127
1127
  };
1128
1128
  };
1129
1129
  membershipLimit: number;
@@ -1,4 +1,4 @@
1
- import * as hono0 from "hono";
1
+ import * as hono6 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
 
4
4
  //#region src/middleware/evalsAuth.d.ts
@@ -7,7 +7,7 @@ import { BaseExecutionContext } from "@inkeep/agents-core";
7
7
  * Middleware to authenticate API requests using Bearer token authentication
8
8
  * First checks if token matches INKEEP_AGENTS_EVAL_API_BYPASS_SECRET,
9
9
  */
10
- declare const evalApiKeyAuth: () => hono0.MiddlewareHandler<{
10
+ declare const evalApiKeyAuth: () => hono6.MiddlewareHandler<{
11
11
  Variables: {
12
12
  executionContext: BaseExecutionContext;
13
13
  };
@@ -1,4 +1,4 @@
1
- import * as hono2 from "hono";
1
+ import * as hono0 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
  import { createAuth } from "@inkeep/agents-core/auth";
4
4
 
@@ -12,7 +12,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
12
12
  * 3. Database API key
13
13
  * 4. Internal service token
14
14
  */
15
- declare const manageApiKeyAuth: () => hono2.MiddlewareHandler<{
15
+ declare const manageApiKeyAuth: () => hono0.MiddlewareHandler<{
16
16
  Variables: {
17
17
  executionContext: BaseExecutionContext;
18
18
  userId?: string;
@@ -1,11 +1,11 @@
1
- import * as hono3 from "hono";
1
+ import * as hono2 from "hono";
2
2
  import { BaseExecutionContext, ResolvedRef } from "@inkeep/agents-core";
3
3
 
4
4
  //#region src/middleware/projectConfig.d.ts
5
5
  /**
6
6
  * Middleware that fetches the full project definition from the Management API
7
7
  */
8
- declare const projectConfigMiddleware: hono3.MiddlewareHandler<{
8
+ declare const projectConfigMiddleware: hono2.MiddlewareHandler<{
9
9
  Variables: {
10
10
  executionContext: BaseExecutionContext;
11
11
  resolvedRef: ResolvedRef;
@@ -15,7 +15,7 @@ declare const projectConfigMiddleware: hono3.MiddlewareHandler<{
15
15
  * Creates a middleware that applies project config fetching except for specified route patterns
16
16
  * @param skipRouteCheck - Function that returns true if the route should skip the middleware
17
17
  */
18
- declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono3.MiddlewareHandler<{
18
+ declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono2.MiddlewareHandler<{
19
19
  Variables: {
20
20
  executionContext: BaseExecutionContext;
21
21
  resolvedRef: ResolvedRef;
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono5 from "hono";
2
+ import * as hono7 from "hono";
3
3
 
4
4
  //#region src/middleware/requirePermission.d.ts
5
5
  type Permission = {
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
9
9
  Variables: ManageAppVariables;
10
10
  } = {
11
11
  Variables: ManageAppVariables;
12
- }>(permissions: Permission) => hono5.MiddlewareHandler<Env$1, string, {}, Response>;
12
+ }>(permissions: Permission) => hono7.MiddlewareHandler<Env$1, string, {}, Response>;
13
13
  //#endregion
14
14
  export { requirePermission };
@@ -1,8 +1,8 @@
1
- import * as hono6 from "hono";
1
+ import * as hono13 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
 
4
4
  //#region src/middleware/runAuth.d.ts
5
- declare const runApiKeyAuth: () => hono6.MiddlewareHandler<{
5
+ declare const runApiKeyAuth: () => hono13.MiddlewareHandler<{
6
6
  Variables: {
7
7
  executionContext: BaseExecutionContext;
8
8
  };
@@ -11,7 +11,7 @@ declare const runApiKeyAuth: () => hono6.MiddlewareHandler<{
11
11
  * Creates a middleware that applies API key authentication except for specified route patterns
12
12
  * @param skipRouteCheck - Function that returns true if the route should skip authentication
13
13
  */
14
- declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono6.MiddlewareHandler<{
14
+ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono13.MiddlewareHandler<{
15
15
  Variables: {
16
16
  executionContext: BaseExecutionContext;
17
17
  };
@@ -20,7 +20,7 @@ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =
20
20
  * Helper middleware for endpoints that optionally support API key authentication
21
21
  * If no auth header is present, it continues without setting the executionContext
22
22
  */
23
- declare const runOptionalAuth: () => hono6.MiddlewareHandler<{
23
+ declare const runOptionalAuth: () => hono13.MiddlewareHandler<{
24
24
  Variables: {
25
25
  executionContext?: BaseExecutionContext;
26
26
  };
@@ -1,4 +1,4 @@
1
- import * as hono10 from "hono";
1
+ import * as hono8 from "hono";
2
2
 
3
3
  //#region src/middleware/sessionAuth.d.ts
4
4
 
@@ -7,11 +7,11 @@ import * as hono10 from "hono";
7
7
  * Requires that a user has already been authenticated via Better Auth session.
8
8
  * Used primarily for manage routes that require an active user session.
9
9
  */
10
- declare const sessionAuth: () => hono10.MiddlewareHandler<any, string, {}, Response>;
10
+ declare const sessionAuth: () => hono8.MiddlewareHandler<any, string, {}, Response>;
11
11
  /**
12
12
  * Global session middleware - sets user and session in context for all routes
13
13
  * Used for all routes that require an active user session.
14
14
  */
15
- declare const sessionContext: () => hono10.MiddlewareHandler<any, string, {}, Response>;
15
+ declare const sessionContext: () => hono8.MiddlewareHandler<any, string, {}, Response>;
16
16
  //#endregion
17
17
  export { sessionAuth, sessionContext };
@@ -1,4 +1,4 @@
1
- import * as hono9 from "hono";
1
+ import * as hono10 from "hono";
2
2
 
3
3
  //#region src/middleware/tenantAccess.d.ts
4
4
 
@@ -11,7 +11,7 @@ import * as hono9 from "hono";
11
11
  * - API key user: Access only to the tenant associated with the API key
12
12
  * - Session user: Access based on organization membership
13
13
  */
14
- declare const requireTenantAccess: () => hono9.MiddlewareHandler<{
14
+ declare const requireTenantAccess: () => hono10.MiddlewareHandler<{
15
15
  Variables: {
16
16
  userId: string;
17
17
  tenantId: string;
@@ -1,7 +1,7 @@
1
- import * as hono12 from "hono";
1
+ import * as hono11 from "hono";
2
2
 
3
3
  //#region src/middleware/tracing.d.ts
4
- declare const otelBaggageMiddleware: () => hono12.MiddlewareHandler<any, string, {}, Response>;
5
- declare const executionBaggageMiddleware: () => hono12.MiddlewareHandler<any, string, {}, Response>;
4
+ declare const otelBaggageMiddleware: () => hono11.MiddlewareHandler<any, string, {}, Response>;
5
+ declare const executionBaggageMiddleware: () => hono11.MiddlewareHandler<any, string, {}, Response>;
6
6
  //#endregion
7
7
  export { executionBaggageMiddleware, otelBaggageMiddleware };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@inkeep/agents-api",
3
- "version": "0.0.0-dev-20260121221420",
3
+ "version": "0.0.0-dev-20260121225854",
4
4
  "description": "Unified Inkeep Agents API - combines management, runtime, and evaluation capabilities",
5
5
  "types": "dist/index.d.ts",
6
6
  "exports": {
@@ -70,8 +70,8 @@
70
70
  "openid-client": "^6.8.1",
71
71
  "pg": "^8.16.3",
72
72
  "workflow": "4.0.1-beta.33",
73
- "@inkeep/agents-core": "^0.0.0-dev-20260121221420",
74
- "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260121221420"
73
+ "@inkeep/agents-core": "^0.0.0-dev-20260121225854",
74
+ "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260121225854"
75
75
  },
76
76
  "peerDependencies": {
77
77
  "@hono/zod-openapi": "^1.1.5",