@inkeep/agents-api 0.0.0-dev-20260122022039 → 0.0.0-dev-20260122023346
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/.well-known/workflow/v1/flow.cjs +44 -44
- package/dist/.well-known/workflow/v1/flow.cjs.debug.json +2 -2
- package/dist/.well-known/workflow/v1/manifest.debug.json +11 -11
- package/dist/.well-known/workflow/v1/step.cjs +131 -131
- package/dist/.well-known/workflow/v1/step.cjs.debug.json +2 -2
- package/dist/data/db/manageDbClient.d.ts +2 -2
- package/dist/data/db/runDbClient.d.ts +2 -2
- package/dist/domains/evals/routes/datasetTriggers.d.ts +2 -2
- package/dist/domains/evals/routes/index.d.ts +2 -2
- package/dist/domains/evals/workflow/routes.d.ts +2 -2
- package/dist/domains/manage/routes/conversations.d.ts +2 -2
- package/dist/domains/manage/routes/evals/evaluationResults.d.ts +2 -2
- package/dist/domains/manage/routes/index.d.ts +2 -2
- package/dist/domains/manage/routes/mcp.d.ts +2 -2
- package/dist/domains/manage/routes/signoz.d.ts +2 -2
- package/dist/domains/run/agents/relationTools.d.ts +2 -2
- package/dist/domains/run/utils/token-estimator.d.ts +2 -2
- package/dist/factory.d.ts +20 -20
- package/dist/index.d.ts +20 -20
- package/dist/middleware/evalsAuth.d.ts +2 -2
- package/dist/middleware/manageAuth.d.ts +2 -2
- package/dist/middleware/projectAccess.d.ts +2 -2
- package/dist/middleware/projectConfig.d.ts +3 -3
- package/dist/middleware/requirePermission.d.ts +2 -2
- package/dist/middleware/runAuth.d.ts +4 -4
- package/dist/middleware/sessionAuth.d.ts +3 -3
- package/dist/middleware/tenantAccess.d.ts +2 -2
- package/dist/middleware/tracing.d.ts +3 -3
- package/package.json +3 -3
|
@@ -46286,14 +46286,52 @@ var workflowCode = `globalThis.__private_workflows = new Map();
|
|
|
46286
46286
|
var __defProp = Object.defineProperty;
|
|
46287
46287
|
var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
|
|
46288
46288
|
|
|
46289
|
+
// src/domains/evals/workflow/functions/evaluateConversation.ts
|
|
46290
|
+
var getConversationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep");
|
|
46291
|
+
var getEvaluatorsStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep");
|
|
46292
|
+
var executeEvaluatorStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep");
|
|
46293
|
+
var logStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep");
|
|
46294
|
+
async function _evaluateConversationWorkflow(payload) {
|
|
46295
|
+
const { conversationId, evaluatorIds } = payload;
|
|
46296
|
+
await logStep("Starting conversation evaluation", payload);
|
|
46297
|
+
const conversation = await getConversationStep(payload);
|
|
46298
|
+
const evaluators = await getEvaluatorsStep(payload);
|
|
46299
|
+
if (evaluators.length === 0) {
|
|
46300
|
+
await logStep("No valid evaluators found", {
|
|
46301
|
+
conversationId,
|
|
46302
|
+
evaluatorIds
|
|
46303
|
+
});
|
|
46304
|
+
return {
|
|
46305
|
+
success: false,
|
|
46306
|
+
reason: "No valid evaluators"
|
|
46307
|
+
};
|
|
46308
|
+
}
|
|
46309
|
+
const results = [];
|
|
46310
|
+
for (const evaluator of evaluators) {
|
|
46311
|
+
const result = await executeEvaluatorStep(payload, evaluator.id, conversation);
|
|
46312
|
+
results.push(result);
|
|
46313
|
+
}
|
|
46314
|
+
return {
|
|
46315
|
+
success: true,
|
|
46316
|
+
conversationId,
|
|
46317
|
+
resultCount: results.length
|
|
46318
|
+
};
|
|
46319
|
+
}
|
|
46320
|
+
__name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
|
|
46321
|
+
_evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
|
|
46322
|
+
globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow", _evaluateConversationWorkflow);
|
|
46323
|
+
var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
|
|
46324
|
+
workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
|
|
46325
|
+
});
|
|
46326
|
+
|
|
46289
46327
|
// src/domains/evals/workflow/functions/runDatasetItem.ts
|
|
46290
46328
|
var callChatApiStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep");
|
|
46291
46329
|
var createRelationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep");
|
|
46292
|
-
var
|
|
46293
|
-
var
|
|
46330
|
+
var executeEvaluatorStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep");
|
|
46331
|
+
var logStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep");
|
|
46294
46332
|
async function _runDatasetItemWorkflow(payload) {
|
|
46295
46333
|
const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;
|
|
46296
|
-
await
|
|
46334
|
+
await logStep2("Starting dataset item processing", {
|
|
46297
46335
|
datasetItemId,
|
|
46298
46336
|
datasetRunId,
|
|
46299
46337
|
agentId,
|
|
@@ -46304,11 +46342,11 @@ async function _runDatasetItemWorkflow(payload) {
|
|
|
46304
46342
|
await createRelationStep(payload, result.conversationId);
|
|
46305
46343
|
if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {
|
|
46306
46344
|
for (const evaluatorId of evaluatorIds) {
|
|
46307
|
-
await
|
|
46345
|
+
await executeEvaluatorStep2(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);
|
|
46308
46346
|
}
|
|
46309
46347
|
}
|
|
46310
46348
|
} else {
|
|
46311
|
-
await
|
|
46349
|
+
await logStep2("No conversation created", {
|
|
46312
46350
|
datasetItemId,
|
|
46313
46351
|
datasetRunId,
|
|
46314
46352
|
error: result.error
|
|
@@ -46328,45 +46366,7 @@ globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functio
|
|
|
46328
46366
|
var runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {
|
|
46329
46367
|
workflowId: "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
|
|
46330
46368
|
});
|
|
46331
|
-
|
|
46332
|
-
// src/domains/evals/workflow/functions/evaluateConversation.ts
|
|
46333
|
-
var getConversationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep");
|
|
46334
|
-
var getEvaluatorsStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep");
|
|
46335
|
-
var executeEvaluatorStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep");
|
|
46336
|
-
var logStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep");
|
|
46337
|
-
async function _evaluateConversationWorkflow(payload) {
|
|
46338
|
-
const { conversationId, evaluatorIds } = payload;
|
|
46339
|
-
await logStep2("Starting conversation evaluation", payload);
|
|
46340
|
-
const conversation = await getConversationStep(payload);
|
|
46341
|
-
const evaluators = await getEvaluatorsStep(payload);
|
|
46342
|
-
if (evaluators.length === 0) {
|
|
46343
|
-
await logStep2("No valid evaluators found", {
|
|
46344
|
-
conversationId,
|
|
46345
|
-
evaluatorIds
|
|
46346
|
-
});
|
|
46347
|
-
return {
|
|
46348
|
-
success: false,
|
|
46349
|
-
reason: "No valid evaluators"
|
|
46350
|
-
};
|
|
46351
|
-
}
|
|
46352
|
-
const results = [];
|
|
46353
|
-
for (const evaluator of evaluators) {
|
|
46354
|
-
const result = await executeEvaluatorStep2(payload, evaluator.id, conversation);
|
|
46355
|
-
results.push(result);
|
|
46356
|
-
}
|
|
46357
|
-
return {
|
|
46358
|
-
success: true,
|
|
46359
|
-
conversationId,
|
|
46360
|
-
resultCount: results.length
|
|
46361
|
-
};
|
|
46362
|
-
}
|
|
46363
|
-
__name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
|
|
46364
|
-
_evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
|
|
46365
|
-
globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow", _evaluateConversationWorkflow);
|
|
46366
|
-
var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
|
|
46367
|
-
workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
|
|
46368
|
-
});
|
|
46369
|
-
//# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["src/domains/evals/workflow/functions/runDatasetItem.ts", "src/domains/evals/workflow/functions/evaluateConversation.ts"],
  "sourcesContent": ["/**\n * Workflow for running dataset items through the chat API.\n *\n * This makes dataset run processing fire-and-forget - each item is queued\n * independently and processed in parallel by the workflow system.\n */ /**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"_runDatasetItemWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"callChatApiStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\"},\"createRelationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\"},\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\"}}}}*/;\n/**\n * Step: Call the chat API to process the dataset item\n */ var callChatApiStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\");\n/**\n * Step: Create conversation relation in database\n */ var createRelationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\");\n/**\n * Step: Execute a single evaluator on a conversation\n */ var executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\");\n/**\n * Main workflow function - processes a single dataset item through the chat API.\n * Optionally runs evaluators on the resulting conversation.\n */ async function _runDatasetItemWorkflow(payload) {\n    const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;\n    await logStep('Starting dataset item processing', {\n        datasetItemId,\n        datasetRunId,\n        agentId,\n        hasEvaluators: !!(evaluatorIds && evaluatorIds.length > 0)\n    });\n    // Call chat API\n    const result = await callChatApiStep(payload);\n    // Create relation if we got a conversation\n    if (result.conversationId) {\n        await createRelationStep(payload, result.conversationId);\n        // Run evaluations if configured\n        if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {\n            for (const evaluatorId of evaluatorIds){\n                await executeEvaluatorStep(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);\n            }\n        }\n    } else {\n        await logStep('No conversation created', {\n            datasetItemId,\n            datasetRunId,\n            error: result.error\n        });\n    }\n    return {\n        success: !result.error,\n        datasetItemId,\n        datasetRunId,\n        conversationId: result.conversationId || null,\n        error: result.error || null\n    };\n}\n_runDatasetItemWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\", _runDatasetItemWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow'\n});\n", "/**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"_evaluateConversationWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\"},\"getConversationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\"},\"getEvaluatorsStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\"}}}}*/;\nvar getConversationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\");\nvar getEvaluatorsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\");\nvar executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\");\n/**\n * Main workflow function - orchestrates the evaluation steps.\n *\n * IMPORTANT: This runs in a deterministic sandbox.\n * - Do NOT call Node.js APIs directly here (no DB, no fs, etc.)\n * - All side effects must happen in step functions\n */ async function _evaluateConversationWorkflow(payload) {\n    const { conversationId, evaluatorIds } = payload;\n    await logStep('Starting conversation evaluation', payload);\n    const conversation = await getConversationStep(payload);\n    const evaluators = await getEvaluatorsStep(payload);\n    if (evaluators.length === 0) {\n        await logStep('No valid evaluators found', {\n            conversationId,\n            evaluatorIds\n        });\n        return {\n            success: false,\n            reason: 'No valid evaluators'\n        };\n    }\n    const results = [];\n    for (const evaluator of evaluators){\n        const result = await executeEvaluatorStep(payload, evaluator.id, conversation);\n        results.push(result);\n    }\n    return {\n        success: true,\n        conversationId,\n        resultCount: results.length\n    };\n}\n_evaluateConversationWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\", _evaluateConversationWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow'\n});\n"],
  "mappings": ";;;;;AAQI,IAAI,kBAAkB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,+EAA+E;AAGjJ,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,kFAAkF;AAGvJ,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oFAAoF;AAG3J,IAAI,UAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uEAAuE;AAIjI,eAAe,wBAAwB,SAAS;AAChD,QAAM,EAAE,eAAe,cAAc,SAAS,cAAc,gBAAgB,IAAI;AAChF,QAAM,QAAQ,oCAAoC;AAAA,IAC9C;AAAA,IACA;AAAA,IACA;AAAA,IACA,eAAe,CAAC,EAAE,gBAAgB,aAAa,SAAS;AAAA,EAC5D,CAAC;AAED,QAAM,SAAS,MAAM,gBAAgB,OAAO;AAE5C,MAAI,OAAO,gBAAgB;AACvB,UAAM,mBAAmB,SAAS,OAAO,cAAc;AAEvD,QAAI,gBAAgB,aAAa,SAAS,KAAK,iBAAiB;AAC5D,iBAAW,eAAe,cAAa;AACnC,cAAM,qBAAqB,QAAQ,UAAU,QAAQ,WAAW,OAAO,gBAAgB,aAAa,iBAAiB,QAAQ,yBAAyB;AAAA,MAC1J;AAAA,IACJ;AAAA,EACJ,OAAO;AACH,UAAM,QAAQ,2BAA2B;AAAA,MACrC;AAAA,MACA;AAAA,MACA,OAAO,OAAO;AAAA,IAClB,CAAC;AAAA,EACL;AACA,SAAO;AAAA,IACH,SAAS,CAAC,OAAO;AAAA,IACjB;AAAA,IACA;AAAA,IACA,gBAAgB,OAAO,kBAAkB;AAAA,IACzC,OAAO,OAAO,SAAS;AAAA,EAC3B;AACJ;AAjCmB;AAkCnB,wBAAwB,aAAa;AACrC,WAAW,oBAAoB,IAAI,6FAA6F,uBAAuB;AAEhJ,IAAM,yBAAyB,OAAO,OAAO,yBAAyB;AAAA,EACzE,YAAY;AAChB,CAAC;;;AC3DD,IAAI,sBAAsB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,yFAAyF;AAC/J,IAAI,oBAAoB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uFAAuF;AAC3J,IAAIA,wBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,0FAA0F;AAG7J,IAAIC,WAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6EAA6E;AAOvI,eAAe,8BAA8B,SAAS;AACtD,QAAM,EAAE,gBAAgB,aAAa,IAAI;AACzC,QAAMA,SAAQ,oCAAoC,OAAO;AACzD,QAAM,eAAe,MAAM,oBAAoB,OAAO;AACtD,QAAM,aAAa,MAAM,kBAAkB,OAAO;AAClD,MAAI,WAAW,WAAW,GAAG;AACzB,UAAMA,SAAQ,6BAA6B;AAAA,MACvC;AAAA,MACA;AAAA,IACJ,CAAC;AACD,WAAO;AAAA,MACH,SAAS;AAAA,MACT,QAAQ;AAAA,IACZ;AAAA,EACJ;AACA,QAAM,UAAU,CAAC;AACjB,aAAW,aAAa,YAAW;AAC/B,UAAM,SAAS,MAAMD,sBAAqB,SAAS,UAAU,IAAI,YAAY;AAC7E,YAAQ,KAAK,MAAM;AAAA,EACvB;AACA,SAAO;AAAA,IACH,SAAS;AAAA,IACT;AAAA,IACA,aAAa,QAAQ;AAAA,EACzB;AACJ;AAzBmB;AA0BnB,8BAA8B,aAAa;AAC3C,WAAW,oBAAoB,IAAI,yGAAyG,6BAA6B;AAElK,IAAM,+BAA+B,OAAO,OAAO,+BAA+B;AAAA,EACrF,YAAY;AAChB,CAAC;",
  "names": ["executeEvaluatorStep", "logStep"]
}

|
|
46369
|
+
//# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["src/domains/evals/workflow/functions/evaluateConversation.ts", "src/domains/evals/workflow/functions/runDatasetItem.ts"],
  "sourcesContent": ["/**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"_evaluateConversationWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\"},\"getConversationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\"},\"getEvaluatorsStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\"}}}}*/;\nvar getConversationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\");\nvar getEvaluatorsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\");\nvar executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\");\n/**\n * Main workflow function - orchestrates the evaluation steps.\n *\n * IMPORTANT: This runs in a deterministic sandbox.\n * - Do NOT call Node.js APIs directly here (no DB, no fs, etc.)\n * - All side effects must happen in step functions\n */ async function _evaluateConversationWorkflow(payload) {\n    const { conversationId, evaluatorIds } = payload;\n    await logStep('Starting conversation evaluation', payload);\n    const conversation = await getConversationStep(payload);\n    const evaluators = await getEvaluatorsStep(payload);\n    if (evaluators.length === 0) {\n        await logStep('No valid evaluators found', {\n            conversationId,\n            evaluatorIds\n        });\n        return {\n            success: false,\n            reason: 'No valid evaluators'\n        };\n    }\n    const results = [];\n    for (const evaluator of evaluators){\n        const result = await executeEvaluatorStep(payload, evaluator.id, conversation);\n        results.push(result);\n    }\n    return {\n        success: true,\n        conversationId,\n        resultCount: results.length\n    };\n}\n_evaluateConversationWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\", _evaluateConversationWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow'\n});\n", "/**\n * Workflow for running dataset items through the chat API.\n *\n * This makes dataset run processing fire-and-forget - each item is queued\n * independently and processed in parallel by the workflow system.\n */ /**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"_runDatasetItemWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"callChatApiStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\"},\"createRelationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\"},\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\"}}}}*/;\n/**\n * Step: Call the chat API to process the dataset item\n */ var callChatApiStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\");\n/**\n * Step: Create conversation relation in database\n */ var createRelationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\");\n/**\n * Step: Execute a single evaluator on a conversation\n */ var executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\");\n/**\n * Main workflow function - processes a single dataset item through the chat API.\n * Optionally runs evaluators on the resulting conversation.\n */ async function _runDatasetItemWorkflow(payload) {\n    const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;\n    await logStep('Starting dataset item processing', {\n        datasetItemId,\n        datasetRunId,\n        agentId,\n        hasEvaluators: !!(evaluatorIds && evaluatorIds.length > 0)\n    });\n    // Call chat API\n    const result = await callChatApiStep(payload);\n    // Create relation if we got a conversation\n    if (result.conversationId) {\n        await createRelationStep(payload, result.conversationId);\n        // Run evaluations if configured\n        if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {\n            for (const evaluatorId of evaluatorIds){\n                await executeEvaluatorStep(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);\n            }\n        }\n    } else {\n        await logStep('No conversation created', {\n            datasetItemId,\n            datasetRunId,\n            error: result.error\n        });\n    }\n    return {\n        success: !result.error,\n        datasetItemId,\n        datasetRunId,\n        conversationId: result.conversationId || null,\n        error: result.error || null\n    };\n}\n_runDatasetItemWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\", _runDatasetItemWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow'\n});\n"],
  "mappings": ";;;;;AACA,IAAI,sBAAsB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,yFAAyF;AAC/J,IAAI,oBAAoB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uFAAuF;AAC3J,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,0FAA0F;AAG7J,IAAI,UAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6EAA6E;AAOvI,eAAe,8BAA8B,SAAS;AACtD,QAAM,EAAE,gBAAgB,aAAa,IAAI;AACzC,QAAM,QAAQ,oCAAoC,OAAO;AACzD,QAAM,eAAe,MAAM,oBAAoB,OAAO;AACtD,QAAM,aAAa,MAAM,kBAAkB,OAAO;AAClD,MAAI,WAAW,WAAW,GAAG;AACzB,UAAM,QAAQ,6BAA6B;AAAA,MACvC;AAAA,MACA;AAAA,IACJ,CAAC;AACD,WAAO;AAAA,MACH,SAAS;AAAA,MACT,QAAQ;AAAA,IACZ;AAAA,EACJ;AACA,QAAM,UAAU,CAAC;AACjB,aAAW,aAAa,YAAW;AAC/B,UAAM,SAAS,MAAM,qBAAqB,SAAS,UAAU,IAAI,YAAY;AAC7E,YAAQ,KAAK,MAAM;AAAA,EACvB;AACA,SAAO;AAAA,IACH,SAAS;AAAA,IACT;AAAA,IACA,aAAa,QAAQ;AAAA,EACzB;AACJ;AAzBmB;AA0BnB,8BAA8B,aAAa;AAC3C,WAAW,oBAAoB,IAAI,yGAAyG,6BAA6B;AAElK,IAAM,+BAA+B,OAAO,OAAO,+BAA+B;AAAA,EACrF,YAAY;AAChB,CAAC;;;ACpCG,IAAI,kBAAkB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,+EAA+E;AAGjJ,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,kFAAkF;AAGvJ,IAAIA,wBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oFAAoF;AAG3J,IAAIC,WAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uEAAuE;AAIjI,eAAe,wBAAwB,SAAS;AAChD,QAAM,EAAE,eAAe,cAAc,SAAS,cAAc,gBAAgB,IAAI;AAChF,QAAMA,SAAQ,oCAAoC;AAAA,IAC9C;AAAA,IACA;AAAA,IACA;AAAA,IACA,eAAe,CAAC,EAAE,gBAAgB,aAAa,SAAS;AAAA,EAC5D,CAAC;AAED,QAAM,SAAS,MAAM,gBAAgB,OAAO;AAE5C,MAAI,OAAO,gBAAgB;AACvB,UAAM,mBAAmB,SAAS,OAAO,cAAc;AAEvD,QAAI,gBAAgB,aAAa,SAAS,KAAK,iBAAiB;AAC5D,iBAAW,eAAe,cAAa;AACnC,cAAMD,sBAAqB,QAAQ,UAAU,QAAQ,WAAW,OAAO,gBAAgB,aAAa,iBAAiB,QAAQ,yBAAyB;AAAA,MAC1J;AAAA,IACJ;AAAA,EACJ,OAAO;AACH,UAAMC,SAAQ,2BAA2B;AAAA,MACrC;AAAA,MACA;AAAA,MACA,OAAO,OAAO;AAAA,IAClB,CAAC;AAAA,EACL;AACA,SAAO;AAAA,IACH,SAAS,CAAC,OAAO;AAAA,IACjB;AAAA,IACA;AAAA,IACA,gBAAgB,OAAO,kBAAkB;AAAA,IACzC,OAAO,OAAO,SAAS;AAAA,EAC3B;AACJ;AAjCmB;AAkCnB,wBAAwB,aAAa;AACrC,WAAW,oBAAoB,IAAI,6FAA6F,uBAAuB;AAEhJ,IAAM,yBAAyB,OAAO,OAAO,yBAAyB;AAAA,EACzE,YAAY;AAChB,CAAC;",
  "names": ["executeEvaluatorStep", "logStep"]
}

|
|
46370
46370
|
`;
|
|
46371
46371
|
var POST = workflowEntrypoint(workflowCode);
|
|
46372
46372
|
// Annotate the CommonJS export names for ESM import in node:
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"workflowFiles": [
|
|
3
|
-
"/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/
|
|
4
|
-
"/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/
|
|
3
|
+
"/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts",
|
|
4
|
+
"/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts"
|
|
5
5
|
]
|
|
6
6
|
}
|
|
@@ -1,16 +1,5 @@
|
|
|
1
1
|
{
|
|
2
2
|
"steps": {
|
|
3
|
-
"node_modules/.pnpm/workflow@4.0.1-beta.33_@aws-sdk+client-sts@3.970.0_@opentelemetry+api@1.9.0_@types+reac_5c488396978166b4f12e99cb3aa4a769/node_modules/workflow/dist/internal/builtins.js": {
|
|
4
|
-
"__builtin_response_array_buffer": {
|
|
5
|
-
"stepId": "__builtin_response_array_buffer"
|
|
6
|
-
},
|
|
7
|
-
"__builtin_response_json": {
|
|
8
|
-
"stepId": "__builtin_response_json"
|
|
9
|
-
},
|
|
10
|
-
"__builtin_response_text": {
|
|
11
|
-
"stepId": "__builtin_response_text"
|
|
12
|
-
}
|
|
13
|
-
},
|
|
14
3
|
"src/domains/evals/workflow/functions/runDatasetItem.ts": {
|
|
15
4
|
"callChatApiStep": {
|
|
16
5
|
"stepId": "step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep"
|
|
@@ -38,6 +27,17 @@
|
|
|
38
27
|
"logStep": {
|
|
39
28
|
"stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep"
|
|
40
29
|
}
|
|
30
|
+
},
|
|
31
|
+
"node_modules/.pnpm/workflow@4.0.1-beta.33_@aws-sdk+client-sts@3.970.0_@opentelemetry+api@1.9.0_@types+reac_5c488396978166b4f12e99cb3aa4a769/node_modules/workflow/dist/internal/builtins.js": {
|
|
32
|
+
"__builtin_response_array_buffer": {
|
|
33
|
+
"stepId": "__builtin_response_array_buffer"
|
|
34
|
+
},
|
|
35
|
+
"__builtin_response_json": {
|
|
36
|
+
"stepId": "__builtin_response_json"
|
|
37
|
+
},
|
|
38
|
+
"__builtin_response_text": {
|
|
39
|
+
"stepId": "__builtin_response_text"
|
|
40
|
+
}
|
|
41
41
|
}
|
|
42
42
|
},
|
|
43
43
|
"workflows": {
|
|
@@ -127246,7 +127246,7 @@ var TriggerUpdateSchema = external_exports.object({
|
|
|
127246
127246
|
enabled: external_exports.boolean().describe("Whether the trigger is enabled").optional(),
|
|
127247
127247
|
inputSchema: external_exports.record(external_exports.string(), external_exports.unknown()).optional().describe("JSON Schema for input validation"),
|
|
127248
127248
|
outputTransform: TriggerOutputTransformSchema.optional(),
|
|
127249
|
-
messageTemplate: external_exports.string().trim().nonempty().describe("Message template with {{placeholder}} syntax").optional(),
|
|
127249
|
+
messageTemplate: external_exports.string().trim().nonempty().describe("Message template with {{placeholder}} syntax").optional().nullable(),
|
|
127250
127250
|
authentication: TriggerAuthenticationUpdateSchema.optional(),
|
|
127251
127251
|
signingSecret: external_exports.string().optional().describe("New HMAC-SHA256 signing secret"),
|
|
127252
127252
|
keepExistingSigningSecret: external_exports.boolean().optional().describe("If true, keep existing signing secret")
|
|
@@ -212494,8 +212494,124 @@ Return your evaluation as a JSON object matching the schema above.`;
|
|
|
212494
212494
|
}
|
|
212495
212495
|
};
|
|
212496
212496
|
|
|
212497
|
+
// src/domains/evals/workflow/functions/evaluateConversation.ts
|
|
212498
|
+
var logger22 = getLogger("workflow-evaluate-conversation");
|
|
212499
|
+
async function getConversationStep(payload) {
|
|
212500
|
+
const { tenantId, projectId, conversationId } = payload;
|
|
212501
|
+
const conv = await getConversation(runDbClient_default)({
|
|
212502
|
+
scopes: {
|
|
212503
|
+
tenantId,
|
|
212504
|
+
projectId
|
|
212505
|
+
},
|
|
212506
|
+
conversationId
|
|
212507
|
+
});
|
|
212508
|
+
if (!conv) {
|
|
212509
|
+
throw new Error(`Conversation not found: ${conversationId}`);
|
|
212510
|
+
}
|
|
212511
|
+
return conv;
|
|
212512
|
+
}
|
|
212513
|
+
__name(getConversationStep, "getConversationStep");
|
|
212514
|
+
async function getEvaluatorsStep(payload) {
|
|
212515
|
+
const { tenantId, projectId, evaluatorIds } = payload;
|
|
212516
|
+
const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
|
|
212517
|
+
const evals = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorsByIds(db)({
|
|
212518
|
+
scopes: {
|
|
212519
|
+
tenantId,
|
|
212520
|
+
projectId
|
|
212521
|
+
},
|
|
212522
|
+
evaluatorIds
|
|
212523
|
+
}));
|
|
212524
|
+
return evals;
|
|
212525
|
+
}
|
|
212526
|
+
__name(getEvaluatorsStep, "getEvaluatorsStep");
|
|
212527
|
+
async function executeEvaluatorStep(payload, evaluatorId, conversation) {
|
|
212528
|
+
const { tenantId, projectId, conversationId, evaluationRunId } = payload;
|
|
212529
|
+
const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
|
|
212530
|
+
const evaluator2 = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorById(db)({
|
|
212531
|
+
scopes: {
|
|
212532
|
+
tenantId,
|
|
212533
|
+
projectId,
|
|
212534
|
+
evaluatorId
|
|
212535
|
+
}
|
|
212536
|
+
}));
|
|
212537
|
+
if (!evaluator2) {
|
|
212538
|
+
throw new Error(`Evaluator not found: ${evaluatorId}`);
|
|
212539
|
+
}
|
|
212540
|
+
const evalResult = await createEvaluationResult(runDbClient_default)({
|
|
212541
|
+
id: generateId(),
|
|
212542
|
+
tenantId,
|
|
212543
|
+
projectId,
|
|
212544
|
+
conversationId,
|
|
212545
|
+
evaluatorId: evaluator2.id,
|
|
212546
|
+
evaluationRunId
|
|
212547
|
+
});
|
|
212548
|
+
try {
|
|
212549
|
+
const evaluationService = new EvaluationService();
|
|
212550
|
+
const output = await evaluationService.executeEvaluation({
|
|
212551
|
+
conversation,
|
|
212552
|
+
evaluator: evaluator2,
|
|
212553
|
+
tenantId,
|
|
212554
|
+
projectId
|
|
212555
|
+
});
|
|
212556
|
+
const updated = await updateEvaluationResult(runDbClient_default)({
|
|
212557
|
+
scopes: {
|
|
212558
|
+
tenantId,
|
|
212559
|
+
projectId,
|
|
212560
|
+
evaluationResultId: evalResult.id
|
|
212561
|
+
},
|
|
212562
|
+
data: {
|
|
212563
|
+
output
|
|
212564
|
+
}
|
|
212565
|
+
});
|
|
212566
|
+
logger22.info({
|
|
212567
|
+
conversationId,
|
|
212568
|
+
evaluatorId: evaluator2.id,
|
|
212569
|
+
resultId: evalResult.id
|
|
212570
|
+
}, "Evaluation completed successfully");
|
|
212571
|
+
return updated;
|
|
212572
|
+
} catch (error46) {
|
|
212573
|
+
const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
|
|
212574
|
+
logger22.error({
|
|
212575
|
+
error: error46,
|
|
212576
|
+
conversationId,
|
|
212577
|
+
evaluatorId: evaluator2.id,
|
|
212578
|
+
resultId: evalResult.id
|
|
212579
|
+
}, "Evaluation execution failed");
|
|
212580
|
+
const failed = await updateEvaluationResult(runDbClient_default)({
|
|
212581
|
+
scopes: {
|
|
212582
|
+
tenantId,
|
|
212583
|
+
projectId,
|
|
212584
|
+
evaluationResultId: evalResult.id
|
|
212585
|
+
},
|
|
212586
|
+
data: {
|
|
212587
|
+
output: {
|
|
212588
|
+
text: `Evaluation failed: ${errorMessage}`
|
|
212589
|
+
}
|
|
212590
|
+
}
|
|
212591
|
+
});
|
|
212592
|
+
return failed;
|
|
212593
|
+
}
|
|
212594
|
+
}
|
|
212595
|
+
__name(executeEvaluatorStep, "executeEvaluatorStep");
|
|
212596
|
+
async function logStep(message, data) {
|
|
212597
|
+
logger22.info(data, message);
|
|
212598
|
+
}
|
|
212599
|
+
__name(logStep, "logStep");
|
|
212600
|
+
async function _evaluateConversationWorkflow(payload) {
|
|
212601
|
+
throw new Error("You attempted to execute workflow _evaluateConversationWorkflow function directly. To start a workflow, use start(_evaluateConversationWorkflow) from workflow/api");
|
|
212602
|
+
}
|
|
212603
|
+
__name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
|
|
212604
|
+
_evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
|
|
212605
|
+
var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
|
|
212606
|
+
workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
|
|
212607
|
+
});
|
|
212608
|
+
registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep", getConversationStep);
|
|
212609
|
+
registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep", getEvaluatorsStep);
|
|
212610
|
+
registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep", executeEvaluatorStep);
|
|
212611
|
+
registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep", logStep);
|
|
212612
|
+
|
|
212497
212613
|
// src/domains/evals/workflow/functions/runDatasetItem.ts
|
|
212498
|
-
var
|
|
212614
|
+
var logger23 = getLogger("workflow-run-dataset-item");
|
|
212499
212615
|
async function callChatApiStep(payload) {
|
|
212500
212616
|
const { tenantId, projectId, agentId, datasetItemId, datasetItemInput, datasetItemSimulationAgent, datasetRunId } = payload;
|
|
212501
212617
|
const evaluationService = new EvaluationService();
|
|
@@ -212511,7 +212627,7 @@ async function callChatApiStep(payload) {
|
|
|
212511
212627
|
datasetItem: datasetItem2,
|
|
212512
212628
|
datasetRunId
|
|
212513
212629
|
});
|
|
212514
|
-
|
|
212630
|
+
logger23.info({
|
|
212515
212631
|
tenantId,
|
|
212516
212632
|
projectId,
|
|
212517
212633
|
datasetItemId,
|
|
@@ -212534,7 +212650,7 @@ async function createRelationStep(payload, conversationId) {
|
|
|
212534
212650
|
conversationId,
|
|
212535
212651
|
datasetItemId
|
|
212536
212652
|
});
|
|
212537
|
-
|
|
212653
|
+
logger23.info({
|
|
212538
212654
|
tenantId,
|
|
212539
212655
|
projectId,
|
|
212540
212656
|
datasetItemId,
|
|
@@ -212548,7 +212664,7 @@ async function createRelationStep(payload, conversationId) {
|
|
|
212548
212664
|
};
|
|
212549
212665
|
} catch (error46) {
|
|
212550
212666
|
if (error46?.cause?.code === "23503" || error46?.code === "23503") {
|
|
212551
|
-
|
|
212667
|
+
logger23.warn({
|
|
212552
212668
|
tenantId,
|
|
212553
212669
|
projectId,
|
|
212554
212670
|
datasetItemId,
|
|
@@ -212565,7 +212681,7 @@ async function createRelationStep(payload, conversationId) {
|
|
|
212565
212681
|
}
|
|
212566
212682
|
}
|
|
212567
212683
|
__name(createRelationStep, "createRelationStep");
|
|
212568
|
-
async function
|
|
212684
|
+
async function executeEvaluatorStep2(tenantId, projectId, conversationId, evaluatorId, evaluationRunId, expectedOutput) {
|
|
212569
212685
|
const ref = getProjectScopedRef(tenantId, projectId, "main");
|
|
212570
212686
|
const resolvedRef = await resolveRef2(manageDbClient_default)(ref);
|
|
212571
212687
|
if (!resolvedRef) {
|
|
@@ -212579,7 +212695,7 @@ async function executeEvaluatorStep(tenantId, projectId, conversationId, evaluat
|
|
|
212579
212695
|
}
|
|
212580
212696
|
}));
|
|
212581
212697
|
if (!evaluator2) {
|
|
212582
|
-
|
|
212698
|
+
logger23.warn({
|
|
212583
212699
|
evaluatorId
|
|
212584
212700
|
}, "Evaluator not found");
|
|
212585
212701
|
return null;
|
|
@@ -212621,7 +212737,7 @@ async function executeEvaluatorStep(tenantId, projectId, conversationId, evaluat
|
|
|
212621
212737
|
output
|
|
212622
212738
|
}
|
|
212623
212739
|
});
|
|
212624
|
-
|
|
212740
|
+
logger23.info({
|
|
212625
212741
|
conversationId,
|
|
212626
212742
|
evaluatorId: evaluator2.id,
|
|
212627
212743
|
resultId: evalResult.id
|
|
@@ -212629,7 +212745,7 @@ async function executeEvaluatorStep(tenantId, projectId, conversationId, evaluat
|
|
|
212629
212745
|
return evalResult.id;
|
|
212630
212746
|
} catch (error46) {
|
|
212631
212747
|
const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
|
|
212632
|
-
|
|
212748
|
+
logger23.error({
|
|
212633
212749
|
error: error46,
|
|
212634
212750
|
conversationId,
|
|
212635
212751
|
evaluatorId: evaluator2.id
|
|
@@ -212649,11 +212765,11 @@ async function executeEvaluatorStep(tenantId, projectId, conversationId, evaluat
|
|
|
212649
212765
|
return evalResult.id;
|
|
212650
212766
|
}
|
|
212651
212767
|
}
|
|
212652
|
-
__name(
|
|
212653
|
-
async function
|
|
212654
|
-
|
|
212768
|
+
__name(executeEvaluatorStep2, "executeEvaluatorStep");
|
|
212769
|
+
async function logStep2(message, data) {
|
|
212770
|
+
logger23.info(data, message);
|
|
212655
212771
|
}
|
|
212656
|
-
__name(
|
|
212772
|
+
__name(logStep2, "logStep");
|
|
212657
212773
|
async function _runDatasetItemWorkflow(payload) {
|
|
212658
212774
|
throw new Error("You attempted to execute workflow _runDatasetItemWorkflow function directly. To start a workflow, use start(_runDatasetItemWorkflow) from workflow/api");
|
|
212659
212775
|
}
|
|
@@ -212664,124 +212780,8 @@ var runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {
|
|
|
212664
212780
|
});
|
|
212665
212781
|
registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep", callChatApiStep);
|
|
212666
212782
|
registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep", createRelationStep);
|
|
212667
|
-
registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep",
|
|
212668
|
-
registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep",
|
|
212669
|
-
|
|
212670
|
-
// src/domains/evals/workflow/functions/evaluateConversation.ts
|
|
212671
|
-
var logger23 = getLogger("workflow-evaluate-conversation");
|
|
212672
|
-
async function getConversationStep(payload) {
|
|
212673
|
-
const { tenantId, projectId, conversationId } = payload;
|
|
212674
|
-
const conv = await getConversation(runDbClient_default)({
|
|
212675
|
-
scopes: {
|
|
212676
|
-
tenantId,
|
|
212677
|
-
projectId
|
|
212678
|
-
},
|
|
212679
|
-
conversationId
|
|
212680
|
-
});
|
|
212681
|
-
if (!conv) {
|
|
212682
|
-
throw new Error(`Conversation not found: ${conversationId}`);
|
|
212683
|
-
}
|
|
212684
|
-
return conv;
|
|
212685
|
-
}
|
|
212686
|
-
__name(getConversationStep, "getConversationStep");
|
|
212687
|
-
async function getEvaluatorsStep(payload) {
|
|
212688
|
-
const { tenantId, projectId, evaluatorIds } = payload;
|
|
212689
|
-
const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
|
|
212690
|
-
const evals = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorsByIds(db)({
|
|
212691
|
-
scopes: {
|
|
212692
|
-
tenantId,
|
|
212693
|
-
projectId
|
|
212694
|
-
},
|
|
212695
|
-
evaluatorIds
|
|
212696
|
-
}));
|
|
212697
|
-
return evals;
|
|
212698
|
-
}
|
|
212699
|
-
__name(getEvaluatorsStep, "getEvaluatorsStep");
|
|
212700
|
-
async function executeEvaluatorStep2(payload, evaluatorId, conversation) {
|
|
212701
|
-
const { tenantId, projectId, conversationId, evaluationRunId } = payload;
|
|
212702
|
-
const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
|
|
212703
|
-
const evaluator2 = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorById(db)({
|
|
212704
|
-
scopes: {
|
|
212705
|
-
tenantId,
|
|
212706
|
-
projectId,
|
|
212707
|
-
evaluatorId
|
|
212708
|
-
}
|
|
212709
|
-
}));
|
|
212710
|
-
if (!evaluator2) {
|
|
212711
|
-
throw new Error(`Evaluator not found: ${evaluatorId}`);
|
|
212712
|
-
}
|
|
212713
|
-
const evalResult = await createEvaluationResult(runDbClient_default)({
|
|
212714
|
-
id: generateId(),
|
|
212715
|
-
tenantId,
|
|
212716
|
-
projectId,
|
|
212717
|
-
conversationId,
|
|
212718
|
-
evaluatorId: evaluator2.id,
|
|
212719
|
-
evaluationRunId
|
|
212720
|
-
});
|
|
212721
|
-
try {
|
|
212722
|
-
const evaluationService = new EvaluationService();
|
|
212723
|
-
const output = await evaluationService.executeEvaluation({
|
|
212724
|
-
conversation,
|
|
212725
|
-
evaluator: evaluator2,
|
|
212726
|
-
tenantId,
|
|
212727
|
-
projectId
|
|
212728
|
-
});
|
|
212729
|
-
const updated = await updateEvaluationResult(runDbClient_default)({
|
|
212730
|
-
scopes: {
|
|
212731
|
-
tenantId,
|
|
212732
|
-
projectId,
|
|
212733
|
-
evaluationResultId: evalResult.id
|
|
212734
|
-
},
|
|
212735
|
-
data: {
|
|
212736
|
-
output
|
|
212737
|
-
}
|
|
212738
|
-
});
|
|
212739
|
-
logger23.info({
|
|
212740
|
-
conversationId,
|
|
212741
|
-
evaluatorId: evaluator2.id,
|
|
212742
|
-
resultId: evalResult.id
|
|
212743
|
-
}, "Evaluation completed successfully");
|
|
212744
|
-
return updated;
|
|
212745
|
-
} catch (error46) {
|
|
212746
|
-
const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
|
|
212747
|
-
logger23.error({
|
|
212748
|
-
error: error46,
|
|
212749
|
-
conversationId,
|
|
212750
|
-
evaluatorId: evaluator2.id,
|
|
212751
|
-
resultId: evalResult.id
|
|
212752
|
-
}, "Evaluation execution failed");
|
|
212753
|
-
const failed = await updateEvaluationResult(runDbClient_default)({
|
|
212754
|
-
scopes: {
|
|
212755
|
-
tenantId,
|
|
212756
|
-
projectId,
|
|
212757
|
-
evaluationResultId: evalResult.id
|
|
212758
|
-
},
|
|
212759
|
-
data: {
|
|
212760
|
-
output: {
|
|
212761
|
-
text: `Evaluation failed: ${errorMessage}`
|
|
212762
|
-
}
|
|
212763
|
-
}
|
|
212764
|
-
});
|
|
212765
|
-
return failed;
|
|
212766
|
-
}
|
|
212767
|
-
}
|
|
212768
|
-
__name(executeEvaluatorStep2, "executeEvaluatorStep");
|
|
212769
|
-
async function logStep2(message, data) {
|
|
212770
|
-
logger23.info(data, message);
|
|
212771
|
-
}
|
|
212772
|
-
__name(logStep2, "logStep");
|
|
212773
|
-
async function _evaluateConversationWorkflow(payload) {
|
|
212774
|
-
throw new Error("You attempted to execute workflow _evaluateConversationWorkflow function directly. To start a workflow, use start(_evaluateConversationWorkflow) from workflow/api");
|
|
212775
|
-
}
|
|
212776
|
-
__name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
|
|
212777
|
-
_evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
|
|
212778
|
-
var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
|
|
212779
|
-
workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
|
|
212780
|
-
});
|
|
212781
|
-
registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep", getConversationStep);
|
|
212782
|
-
registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep", getEvaluatorsStep);
|
|
212783
|
-
registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep", executeEvaluatorStep2);
|
|
212784
|
-
registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep", logStep2);
|
|
212783
|
+
registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep", executeEvaluatorStep2);
|
|
212784
|
+
registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep", logStep2);
|
|
212785
212785
|
|
|
212786
212786
|
// ../node_modules/.pnpm/@workflow+utils@4.0.1-beta.7/node_modules/@workflow/utils/dist/index.js
|
|
212787
212787
|
var import_ms2 = __toESM(require_ms(), 1);
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"stepFiles": [
|
|
3
|
-
"/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/
|
|
4
|
-
"/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/
|
|
3
|
+
"/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts",
|
|
4
|
+
"/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts"
|
|
5
5
|
]
|
|
6
6
|
}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as _inkeep_agents_core2 from "@inkeep/agents-core";
|
|
2
2
|
|
|
3
3
|
//#region src/data/db/manageDbClient.d.ts
|
|
4
|
-
declare const manageDbClient:
|
|
4
|
+
declare const manageDbClient: _inkeep_agents_core2.AgentsManageDatabaseClient;
|
|
5
5
|
//#endregion
|
|
6
6
|
export { manageDbClient as default };
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as _inkeep_agents_core3 from "@inkeep/agents-core";
|
|
2
2
|
|
|
3
3
|
//#region src/data/db/runDbClient.d.ts
|
|
4
|
-
declare const runDbClient:
|
|
4
|
+
declare const runDbClient: _inkeep_agents_core3.AgentsRunDatabaseClient;
|
|
5
5
|
//#endregion
|
|
6
6
|
export { runDbClient as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono1 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/evals/routes/datasetTriggers.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono1.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono6 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/evals/routes/index.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono6.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { Hono } from "hono";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono_types8 from "hono/types";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/evals/workflow/routes.d.ts
|
|
5
|
-
declare const workflowRoutes: Hono<
|
|
5
|
+
declare const workflowRoutes: Hono<hono_types8.BlankEnv, hono_types8.BlankSchema, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { workflowRoutes };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono18 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/manage/routes/conversations.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono18.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono16 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/manage/routes/evals/evaluationResults.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono16.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono17 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/manage/routes/index.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono17.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { Hono } from "hono";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono_types5 from "hono/types";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/manage/routes/mcp.d.ts
|
|
5
|
-
declare const app: Hono<
|
|
5
|
+
declare const app: Hono<hono_types5.BlankEnv, hono_types5.BlankSchema, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
import { ManageAppVariables } from "../../../types/app.js";
|
|
2
2
|
import { Hono } from "hono";
|
|
3
|
-
import * as
|
|
3
|
+
import * as hono_types7 from "hono/types";
|
|
4
4
|
|
|
5
5
|
//#region src/domains/manage/routes/signoz.d.ts
|
|
6
6
|
declare const app: Hono<{
|
|
7
7
|
Variables: ManageAppVariables;
|
|
8
|
-
},
|
|
8
|
+
}, hono_types7.BlankSchema, "/">;
|
|
9
9
|
//#endregion
|
|
10
10
|
export { app as default };
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import { AgentConfig, DelegateRelation } from "./Agent.js";
|
|
2
2
|
import { InternalRelation } from "../utils/project.js";
|
|
3
|
-
import * as
|
|
3
|
+
import * as _inkeep_agents_core0 from "@inkeep/agents-core";
|
|
4
4
|
import { CredentialStoreRegistry, FullExecutionContext } from "@inkeep/agents-core";
|
|
5
5
|
import * as ai0 from "ai";
|
|
6
6
|
|
|
@@ -44,7 +44,7 @@ declare function createDelegateToAgentTool({
|
|
|
44
44
|
message: string;
|
|
45
45
|
}, {
|
|
46
46
|
toolCallId: any;
|
|
47
|
-
result:
|
|
47
|
+
result: _inkeep_agents_core0.Message | _inkeep_agents_core0.Task;
|
|
48
48
|
}>;
|
|
49
49
|
/**
|
|
50
50
|
* Parameters for building a transfer relation config
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as _inkeep_agents_core1 from "@inkeep/agents-core";
|
|
2
2
|
import { BreakdownComponentDef, ContextBreakdown, calculateBreakdownTotal, createEmptyBreakdown } from "@inkeep/agents-core";
|
|
3
3
|
|
|
4
4
|
//#region src/domains/run/utils/token-estimator.d.ts
|
|
@@ -17,7 +17,7 @@ interface AssembleResult {
|
|
|
17
17
|
/** The assembled prompt string */
|
|
18
18
|
prompt: string;
|
|
19
19
|
/** Token breakdown for each component */
|
|
20
|
-
breakdown:
|
|
20
|
+
breakdown: _inkeep_agents_core1.ContextBreakdown;
|
|
21
21
|
}
|
|
22
22
|
//#endregion
|
|
23
23
|
export { AssembleResult, type BreakdownComponentDef, type ContextBreakdown, calculateBreakdownTotal, createEmptyBreakdown, estimateTokens };
|
package/dist/factory.d.ts
CHANGED
|
@@ -3,7 +3,7 @@ import "./types/index.js";
|
|
|
3
3
|
import { createAgentsHono } from "./createApp.js";
|
|
4
4
|
import { initializeDefaultUser } from "./initialization.js";
|
|
5
5
|
import { createAuth0Provider, createOIDCProvider } from "./ssoHelpers.js";
|
|
6
|
-
import * as
|
|
6
|
+
import * as hono0 from "hono";
|
|
7
7
|
import { CredentialStore, ServerConfig } from "@inkeep/agents-core";
|
|
8
8
|
import * as zod0 from "zod";
|
|
9
9
|
import { SSOProviderConfig, UserAuthConfig } from "@inkeep/agents-core/auth";
|
|
@@ -795,25 +795,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
|
|
|
795
795
|
ac: better_auth_plugins0.AccessControl;
|
|
796
796
|
roles: {
|
|
797
797
|
member: {
|
|
798
|
-
authorize<K_1 extends "
|
|
799
|
-
actions: better_auth_plugins0.Subset<"
|
|
798
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
|
|
799
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
|
|
800
800
|
connector: "OR" | "AND";
|
|
801
801
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
802
|
-
statements: better_auth_plugins0.Subset<"
|
|
802
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
|
|
803
803
|
};
|
|
804
804
|
admin: {
|
|
805
|
-
authorize<K_1 extends "
|
|
806
|
-
actions: better_auth_plugins0.Subset<"
|
|
805
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
|
|
806
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
|
|
807
807
|
connector: "OR" | "AND";
|
|
808
808
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
809
|
-
statements: better_auth_plugins0.Subset<"
|
|
809
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
|
|
810
810
|
};
|
|
811
811
|
owner: {
|
|
812
|
-
authorize<K_1 extends "
|
|
813
|
-
actions: better_auth_plugins0.Subset<"
|
|
812
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
|
|
813
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
|
|
814
814
|
connector: "OR" | "AND";
|
|
815
815
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
816
|
-
statements: better_auth_plugins0.Subset<"
|
|
816
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
|
|
817
817
|
};
|
|
818
818
|
};
|
|
819
819
|
membershipLimit: number;
|
|
@@ -1104,25 +1104,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
|
|
|
1104
1104
|
ac: better_auth_plugins0.AccessControl;
|
|
1105
1105
|
roles: {
|
|
1106
1106
|
member: {
|
|
1107
|
-
authorize<K_1 extends "
|
|
1108
|
-
actions: better_auth_plugins0.Subset<"
|
|
1107
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
|
|
1108
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
|
|
1109
1109
|
connector: "OR" | "AND";
|
|
1110
1110
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1111
|
-
statements: better_auth_plugins0.Subset<"
|
|
1111
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
|
|
1112
1112
|
};
|
|
1113
1113
|
admin: {
|
|
1114
|
-
authorize<K_1 extends "
|
|
1115
|
-
actions: better_auth_plugins0.Subset<"
|
|
1114
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
|
|
1115
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
|
|
1116
1116
|
connector: "OR" | "AND";
|
|
1117
1117
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1118
|
-
statements: better_auth_plugins0.Subset<"
|
|
1118
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
|
|
1119
1119
|
};
|
|
1120
1120
|
owner: {
|
|
1121
|
-
authorize<K_1 extends "
|
|
1122
|
-
actions: better_auth_plugins0.Subset<"
|
|
1121
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
|
|
1122
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
|
|
1123
1123
|
connector: "OR" | "AND";
|
|
1124
1124
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1125
|
-
statements: better_auth_plugins0.Subset<"
|
|
1125
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
|
|
1126
1126
|
};
|
|
1127
1127
|
};
|
|
1128
1128
|
membershipLimit: number;
|
|
@@ -1536,6 +1536,6 @@ declare function createAgentsApp(config?: {
|
|
|
1536
1536
|
auth?: UserAuthConfig;
|
|
1537
1537
|
sandboxConfig?: SandboxConfig;
|
|
1538
1538
|
skipInitialization?: boolean;
|
|
1539
|
-
}):
|
|
1539
|
+
}): hono0.Hono<hono_types1.BlankEnv, hono_types1.BlankSchema, "/">;
|
|
1540
1540
|
//#endregion
|
|
1541
1541
|
export { type SSOProviderConfig, type UserAuthConfig, createAgentsApp, createAgentsAuth, createAgentsHono, createAuth0Provider, createOIDCProvider, initializeDefaultUser };
|
package/dist/index.d.ts
CHANGED
|
@@ -8,7 +8,7 @@ import { createAuth0Provider, createOIDCProvider } from "./ssoHelpers.js";
|
|
|
8
8
|
import { SSOProviderConfig, UserAuthConfig, createAgentsApp } from "./factory.js";
|
|
9
9
|
import { Hono } from "hono";
|
|
10
10
|
import * as zod205 from "zod";
|
|
11
|
-
import * as
|
|
11
|
+
import * as hono_types3 from "hono/types";
|
|
12
12
|
import * as better_auth78 from "better-auth";
|
|
13
13
|
import * as better_auth_plugins69 from "better-auth/plugins";
|
|
14
14
|
import * as _better_auth_sso10 from "@better-auth/sso";
|
|
@@ -796,25 +796,25 @@ declare const auth: better_auth78.Auth<{
|
|
|
796
796
|
ac: better_auth_plugins69.AccessControl;
|
|
797
797
|
roles: {
|
|
798
798
|
member: {
|
|
799
|
-
authorize<K_1 extends "
|
|
800
|
-
actions: better_auth_plugins69.Subset<"
|
|
799
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
|
|
800
|
+
actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
|
|
801
801
|
connector: "OR" | "AND";
|
|
802
802
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
803
|
-
statements: better_auth_plugins69.Subset<"
|
|
803
|
+
statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
|
|
804
804
|
};
|
|
805
805
|
admin: {
|
|
806
|
-
authorize<K_1 extends "
|
|
807
|
-
actions: better_auth_plugins69.Subset<"
|
|
806
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
|
|
807
|
+
actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
|
|
808
808
|
connector: "OR" | "AND";
|
|
809
809
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
810
|
-
statements: better_auth_plugins69.Subset<"
|
|
810
|
+
statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
|
|
811
811
|
};
|
|
812
812
|
owner: {
|
|
813
|
-
authorize<K_1 extends "
|
|
814
|
-
actions: better_auth_plugins69.Subset<"
|
|
813
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
|
|
814
|
+
actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
|
|
815
815
|
connector: "OR" | "AND";
|
|
816
816
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
817
|
-
statements: better_auth_plugins69.Subset<"
|
|
817
|
+
statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
|
|
818
818
|
};
|
|
819
819
|
};
|
|
820
820
|
membershipLimit: number;
|
|
@@ -1105,25 +1105,25 @@ declare const auth: better_auth78.Auth<{
|
|
|
1105
1105
|
ac: better_auth_plugins69.AccessControl;
|
|
1106
1106
|
roles: {
|
|
1107
1107
|
member: {
|
|
1108
|
-
authorize<K_1 extends "
|
|
1109
|
-
actions: better_auth_plugins69.Subset<"
|
|
1108
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
|
|
1109
|
+
actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
|
|
1110
1110
|
connector: "OR" | "AND";
|
|
1111
1111
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
1112
|
-
statements: better_auth_plugins69.Subset<"
|
|
1112
|
+
statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
|
|
1113
1113
|
};
|
|
1114
1114
|
admin: {
|
|
1115
|
-
authorize<K_1 extends "
|
|
1116
|
-
actions: better_auth_plugins69.Subset<"
|
|
1115
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
|
|
1116
|
+
actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
|
|
1117
1117
|
connector: "OR" | "AND";
|
|
1118
1118
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
1119
|
-
statements: better_auth_plugins69.Subset<"
|
|
1119
|
+
statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
|
|
1120
1120
|
};
|
|
1121
1121
|
owner: {
|
|
1122
|
-
authorize<K_1 extends "
|
|
1123
|
-
actions: better_auth_plugins69.Subset<"
|
|
1122
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
|
|
1123
|
+
actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
|
|
1124
1124
|
connector: "OR" | "AND";
|
|
1125
1125
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
|
|
1126
|
-
statements: better_auth_plugins69.Subset<"
|
|
1126
|
+
statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
|
|
1127
1127
|
};
|
|
1128
1128
|
};
|
|
1129
1129
|
membershipLimit: number;
|
|
@@ -1531,6 +1531,6 @@ declare const auth: better_auth78.Auth<{
|
|
|
1531
1531
|
}>;
|
|
1532
1532
|
}];
|
|
1533
1533
|
}> | null;
|
|
1534
|
-
declare const app: Hono<
|
|
1534
|
+
declare const app: Hono<hono_types3.BlankEnv, hono_types3.BlankSchema, "/">;
|
|
1535
1535
|
//#endregion
|
|
1536
1536
|
export { type AppConfig, type AppVariables, Hono, type NativeSandboxConfig, type SSOProviderConfig, type SandboxConfig, type UserAuthConfig, type VercelSandboxConfig, auth, createAgentsApp, createAgentsHono, createAuth0Provider, createOIDCProvider, app as default, initializeDefaultUser };
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono0 from "hono";
|
|
2
2
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/evalsAuth.d.ts
|
|
@@ -7,7 +7,7 @@ import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
|
7
7
|
* Middleware to authenticate API requests using Bearer token authentication
|
|
8
8
|
* First checks if token matches INKEEP_AGENTS_EVAL_API_BYPASS_SECRET,
|
|
9
9
|
*/
|
|
10
|
-
declare const evalApiKeyAuth: () =>
|
|
10
|
+
declare const evalApiKeyAuth: () => hono0.MiddlewareHandler<{
|
|
11
11
|
Variables: {
|
|
12
12
|
executionContext: BaseExecutionContext;
|
|
13
13
|
};
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono2 from "hono";
|
|
2
2
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
3
3
|
import { createAuth } from "@inkeep/agents-core/auth";
|
|
4
4
|
|
|
@@ -12,7 +12,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
|
|
|
12
12
|
* 3. Database API key
|
|
13
13
|
* 4. Internal service token
|
|
14
14
|
*/
|
|
15
|
-
declare const manageApiKeyAuth: () =>
|
|
15
|
+
declare const manageApiKeyAuth: () => hono2.MiddlewareHandler<{
|
|
16
16
|
Variables: {
|
|
17
17
|
executionContext: BaseExecutionContext;
|
|
18
18
|
userId?: string;
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { ManageAppVariables } from "../types/app.js";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono15 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/projectAccess.d.ts
|
|
5
5
|
|
|
@@ -26,6 +26,6 @@ declare const requireProjectPermission: <Env$1 extends {
|
|
|
26
26
|
Variables: ManageAppVariables;
|
|
27
27
|
} = {
|
|
28
28
|
Variables: ManageAppVariables;
|
|
29
|
-
}>(permission?: ProjectPermission) =>
|
|
29
|
+
}>(permission?: ProjectPermission) => hono15.MiddlewareHandler<Env$1, string, {}, Response>;
|
|
30
30
|
//#endregion
|
|
31
31
|
export { ProjectPermission, requireProjectPermission };
|
|
@@ -1,11 +1,11 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono3 from "hono";
|
|
2
2
|
import { BaseExecutionContext, ResolvedRef } from "@inkeep/agents-core";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/projectConfig.d.ts
|
|
5
5
|
/**
|
|
6
6
|
* Middleware that fetches the full project definition from the Management API
|
|
7
7
|
*/
|
|
8
|
-
declare const projectConfigMiddleware:
|
|
8
|
+
declare const projectConfigMiddleware: hono3.MiddlewareHandler<{
|
|
9
9
|
Variables: {
|
|
10
10
|
executionContext: BaseExecutionContext;
|
|
11
11
|
resolvedRef: ResolvedRef;
|
|
@@ -15,7 +15,7 @@ declare const projectConfigMiddleware: hono15.MiddlewareHandler<{
|
|
|
15
15
|
* Creates a middleware that applies project config fetching except for specified route patterns
|
|
16
16
|
* @param skipRouteCheck - Function that returns true if the route should skip the middleware
|
|
17
17
|
*/
|
|
18
|
-
declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) =>
|
|
18
|
+
declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono3.MiddlewareHandler<{
|
|
19
19
|
Variables: {
|
|
20
20
|
executionContext: BaseExecutionContext;
|
|
21
21
|
resolvedRef: ResolvedRef;
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { ManageAppVariables } from "../types/app.js";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono5 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/requirePermission.d.ts
|
|
5
5
|
type Permission = {
|
|
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
|
|
|
9
9
|
Variables: ManageAppVariables;
|
|
10
10
|
} = {
|
|
11
11
|
Variables: ManageAppVariables;
|
|
12
|
-
}>(permissions: Permission) =>
|
|
12
|
+
}>(permissions: Permission) => hono5.MiddlewareHandler<Env$1, string, {}, Response>;
|
|
13
13
|
//#endregion
|
|
14
14
|
export { requirePermission };
|
|
@@ -1,8 +1,8 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono11 from "hono";
|
|
2
2
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/runAuth.d.ts
|
|
5
|
-
declare const runApiKeyAuth: () =>
|
|
5
|
+
declare const runApiKeyAuth: () => hono11.MiddlewareHandler<{
|
|
6
6
|
Variables: {
|
|
7
7
|
executionContext: BaseExecutionContext;
|
|
8
8
|
};
|
|
@@ -11,7 +11,7 @@ declare const runApiKeyAuth: () => hono0.MiddlewareHandler<{
|
|
|
11
11
|
* Creates a middleware that applies API key authentication except for specified route patterns
|
|
12
12
|
* @param skipRouteCheck - Function that returns true if the route should skip authentication
|
|
13
13
|
*/
|
|
14
|
-
declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =>
|
|
14
|
+
declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono11.MiddlewareHandler<{
|
|
15
15
|
Variables: {
|
|
16
16
|
executionContext: BaseExecutionContext;
|
|
17
17
|
};
|
|
@@ -20,7 +20,7 @@ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =
|
|
|
20
20
|
* Helper middleware for endpoints that optionally support API key authentication
|
|
21
21
|
* If no auth header is present, it continues without setting the executionContext
|
|
22
22
|
*/
|
|
23
|
-
declare const runOptionalAuth: () =>
|
|
23
|
+
declare const runOptionalAuth: () => hono11.MiddlewareHandler<{
|
|
24
24
|
Variables: {
|
|
25
25
|
executionContext?: BaseExecutionContext;
|
|
26
26
|
};
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono7 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/sessionAuth.d.ts
|
|
4
4
|
|
|
@@ -7,11 +7,11 @@ import * as hono2 from "hono";
|
|
|
7
7
|
* Requires that a user has already been authenticated via Better Auth session.
|
|
8
8
|
* Used primarily for manage routes that require an active user session.
|
|
9
9
|
*/
|
|
10
|
-
declare const sessionAuth: () =>
|
|
10
|
+
declare const sessionAuth: () => hono7.MiddlewareHandler<any, string, {}, Response>;
|
|
11
11
|
/**
|
|
12
12
|
* Global session middleware - sets user and session in context for all routes
|
|
13
13
|
* Used for all routes that require an active user session.
|
|
14
14
|
*/
|
|
15
|
-
declare const sessionContext: () =>
|
|
15
|
+
declare const sessionContext: () => hono7.MiddlewareHandler<any, string, {}, Response>;
|
|
16
16
|
//#endregion
|
|
17
17
|
export { sessionAuth, sessionContext };
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono14 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/tenantAccess.d.ts
|
|
4
4
|
|
|
@@ -11,7 +11,7 @@ import * as hono5 from "hono";
|
|
|
11
11
|
* - API key user: Access only to the tenant associated with the API key
|
|
12
12
|
* - Session user: Access based on organization membership
|
|
13
13
|
*/
|
|
14
|
-
declare const requireTenantAccess: () =>
|
|
14
|
+
declare const requireTenantAccess: () => hono14.MiddlewareHandler<{
|
|
15
15
|
Variables: {
|
|
16
16
|
userId: string;
|
|
17
17
|
tenantId: string;
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono9 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/tracing.d.ts
|
|
4
|
-
declare const otelBaggageMiddleware: () =>
|
|
5
|
-
declare const executionBaggageMiddleware: () =>
|
|
4
|
+
declare const otelBaggageMiddleware: () => hono9.MiddlewareHandler<any, string, {}, Response>;
|
|
5
|
+
declare const executionBaggageMiddleware: () => hono9.MiddlewareHandler<any, string, {}, Response>;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { executionBaggageMiddleware, otelBaggageMiddleware };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@inkeep/agents-api",
|
|
3
|
-
"version": "0.0.0-dev-
|
|
3
|
+
"version": "0.0.0-dev-20260122023346",
|
|
4
4
|
"description": "Unified Inkeep Agents API - combines management, runtime, and evaluation capabilities",
|
|
5
5
|
"types": "dist/index.d.ts",
|
|
6
6
|
"exports": {
|
|
@@ -70,8 +70,8 @@
|
|
|
70
70
|
"openid-client": "^6.8.1",
|
|
71
71
|
"pg": "^8.16.3",
|
|
72
72
|
"workflow": "4.0.1-beta.33",
|
|
73
|
-
"@inkeep/agents-core": "^0.0.0-dev-
|
|
74
|
-
"@inkeep/agents-manage-mcp": "^0.0.0-dev-
|
|
73
|
+
"@inkeep/agents-core": "^0.0.0-dev-20260122023346",
|
|
74
|
+
"@inkeep/agents-manage-mcp": "^0.0.0-dev-20260122023346"
|
|
75
75
|
},
|
|
76
76
|
"peerDependencies": {
|
|
77
77
|
"@hono/zod-openapi": "^1.1.5",
|