@inkeep/agents-api 0.0.0-dev-20260122105802 → 0.0.0-dev-20260122110905

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -46286,52 +46286,14 @@ var workflowCode = `globalThis.__private_workflows = new Map();
46286
46286
  var __defProp = Object.defineProperty;
46287
46287
  var __name = (target, value) => __defProp(target, "name", { value, configurable: true });
46288
46288
 
46289
- // src/domains/evals/workflow/functions/evaluateConversation.ts
46290
- var getConversationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep");
46291
- var getEvaluatorsStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep");
46292
- var executeEvaluatorStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep");
46293
- var logStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep");
46294
- async function _evaluateConversationWorkflow(payload) {
46295
- const { conversationId, evaluatorIds } = payload;
46296
- await logStep("Starting conversation evaluation", payload);
46297
- const conversation = await getConversationStep(payload);
46298
- const evaluators = await getEvaluatorsStep(payload);
46299
- if (evaluators.length === 0) {
46300
- await logStep("No valid evaluators found", {
46301
- conversationId,
46302
- evaluatorIds
46303
- });
46304
- return {
46305
- success: false,
46306
- reason: "No valid evaluators"
46307
- };
46308
- }
46309
- const results = [];
46310
- for (const evaluator of evaluators) {
46311
- const result = await executeEvaluatorStep(payload, evaluator.id, conversation);
46312
- results.push(result);
46313
- }
46314
- return {
46315
- success: true,
46316
- conversationId,
46317
- resultCount: results.length
46318
- };
46319
- }
46320
- __name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
46321
- _evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
46322
- globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow", _evaluateConversationWorkflow);
46323
- var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
46324
- workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
46325
- });
46326
-
46327
46289
  // src/domains/evals/workflow/functions/runDatasetItem.ts
46328
46290
  var callChatApiStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep");
46329
46291
  var createRelationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep");
46330
- var executeEvaluatorStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep");
46331
- var logStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep");
46292
+ var executeEvaluatorStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep");
46293
+ var logStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep");
46332
46294
  async function _runDatasetItemWorkflow(payload) {
46333
46295
  const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;
46334
- await logStep2("Starting dataset item processing", {
46296
+ await logStep("Starting dataset item processing", {
46335
46297
  datasetItemId,
46336
46298
  datasetRunId,
46337
46299
  agentId,
@@ -46342,11 +46304,11 @@ async function _runDatasetItemWorkflow(payload) {
46342
46304
  await createRelationStep(payload, result.conversationId);
46343
46305
  if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {
46344
46306
  for (const evaluatorId of evaluatorIds) {
46345
- await executeEvaluatorStep2(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);
46307
+ await executeEvaluatorStep(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);
46346
46308
  }
46347
46309
  }
46348
46310
  } else {
46349
- await logStep2("No conversation created", {
46311
+ await logStep("No conversation created", {
46350
46312
  datasetItemId,
46351
46313
  datasetRunId,
46352
46314
  error: result.error
@@ -46366,7 +46328,45 @@ globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functio
46366
46328
  var runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {
46367
46329
  workflowId: "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
46368
46330
  });
46369
- //# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["src/domains/evals/workflow/functions/evaluateConversation.ts", "src/domains/evals/workflow/functions/runDatasetItem.ts"],
  "sourcesContent": ["/**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"_evaluateConversationWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\"},\"getConversationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\"},\"getEvaluatorsStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\"}}}}*/;\nvar getConversationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\");\nvar getEvaluatorsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\");\nvar executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\");\n/**\n * Main workflow function - orchestrates the evaluation steps.\n *\n * IMPORTANT: This runs in a deterministic sandbox.\n * - Do NOT call Node.js APIs directly here (no DB, no fs, etc.)\n * - All side effects must happen in step functions\n */ async function _evaluateConversationWorkflow(payload) {\n    const { conversationId, evaluatorIds } = payload;\n    await logStep('Starting conversation evaluation', payload);\n    const conversation = await getConversationStep(payload);\n    const evaluators = await getEvaluatorsStep(payload);\n    if (evaluators.length === 0) {\n        await logStep('No valid evaluators found', {\n            conversationId,\n            evaluatorIds\n        });\n        return {\n            success: false,\n            reason: 'No valid evaluators'\n        };\n    }\n    const results = [];\n    for (const evaluator of evaluators){\n        const result = await executeEvaluatorStep(payload, evaluator.id, conversation);\n        results.push(result);\n    }\n    return {\n        success: true,\n        conversationId,\n        resultCount: results.length\n    };\n}\n_evaluateConversationWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\", _evaluateConversationWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow'\n});\n", "/**\n * Workflow for running dataset items through the chat API.\n *\n * This makes dataset run processing fire-and-forget - each item is queued\n * independently and processed in parallel by the workflow system.\n */ /**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"_runDatasetItemWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"callChatApiStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\"},\"createRelationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\"},\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\"}}}}*/;\n/**\n * Step: Call the chat API to process the dataset item\n */ var callChatApiStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\");\n/**\n * Step: Create conversation relation in database\n */ var createRelationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\");\n/**\n * Step: Execute a single evaluator on a conversation\n */ var executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\");\n/**\n * Main workflow function - processes a single dataset item through the chat API.\n * Optionally runs evaluators on the resulting conversation.\n */ async function _runDatasetItemWorkflow(payload) {\n    const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;\n    await logStep('Starting dataset item processing', {\n        datasetItemId,\n        datasetRunId,\n        agentId,\n        hasEvaluators: !!(evaluatorIds && evaluatorIds.length > 0)\n    });\n    // Call chat API\n    const result = await callChatApiStep(payload);\n    // Create relation if we got a conversation\n    if (result.conversationId) {\n        await createRelationStep(payload, result.conversationId);\n        // Run evaluations if configured\n        if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {\n            for (const evaluatorId of evaluatorIds){\n                await executeEvaluatorStep(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);\n            }\n        }\n    } else {\n        await logStep('No conversation created', {\n            datasetItemId,\n            datasetRunId,\n            error: result.error\n        });\n    }\n    return {\n        success: !result.error,\n        datasetItemId,\n        datasetRunId,\n        conversationId: result.conversationId || null,\n        error: result.error || null\n    };\n}\n_runDatasetItemWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\", _runDatasetItemWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow'\n});\n"],
  "mappings": ";;;;;AACA,IAAI,sBAAsB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,yFAAyF;AAC/J,IAAI,oBAAoB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uFAAuF;AAC3J,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,0FAA0F;AAG7J,IAAI,UAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6EAA6E;AAOvI,eAAe,8BAA8B,SAAS;AACtD,QAAM,EAAE,gBAAgB,aAAa,IAAI;AACzC,QAAM,QAAQ,oCAAoC,OAAO;AACzD,QAAM,eAAe,MAAM,oBAAoB,OAAO;AACtD,QAAM,aAAa,MAAM,kBAAkB,OAAO;AAClD,MAAI,WAAW,WAAW,GAAG;AACzB,UAAM,QAAQ,6BAA6B;AAAA,MACvC;AAAA,MACA;AAAA,IACJ,CAAC;AACD,WAAO;AAAA,MACH,SAAS;AAAA,MACT,QAAQ;AAAA,IACZ;AAAA,EACJ;AACA,QAAM,UAAU,CAAC;AACjB,aAAW,aAAa,YAAW;AAC/B,UAAM,SAAS,MAAM,qBAAqB,SAAS,UAAU,IAAI,YAAY;AAC7E,YAAQ,KAAK,MAAM;AAAA,EACvB;AACA,SAAO;AAAA,IACH,SAAS;AAAA,IACT;AAAA,IACA,aAAa,QAAQ;AAAA,EACzB;AACJ;AAzBmB;AA0BnB,8BAA8B,aAAa;AAC3C,WAAW,oBAAoB,IAAI,yGAAyG,6BAA6B;AAElK,IAAM,+BAA+B,OAAO,OAAO,+BAA+B;AAAA,EACrF,YAAY;AAChB,CAAC;;;ACpCG,IAAI,kBAAkB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,+EAA+E;AAGjJ,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,kFAAkF;AAGvJ,IAAIA,wBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oFAAoF;AAG3J,IAAIC,WAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uEAAuE;AAIjI,eAAe,wBAAwB,SAAS;AAChD,QAAM,EAAE,eAAe,cAAc,SAAS,cAAc,gBAAgB,IAAI;AAChF,QAAMA,SAAQ,oCAAoC;AAAA,IAC9C;AAAA,IACA;AAAA,IACA;AAAA,IACA,eAAe,CAAC,EAAE,gBAAgB,aAAa,SAAS;AAAA,EAC5D,CAAC;AAED,QAAM,SAAS,MAAM,gBAAgB,OAAO;AAE5C,MAAI,OAAO,gBAAgB;AACvB,UAAM,mBAAmB,SAAS,OAAO,cAAc;AAEvD,QAAI,gBAAgB,aAAa,SAAS,KAAK,iBAAiB;AAC5D,iBAAW,eAAe,cAAa;AACnC,cAAMD,sBAAqB,QAAQ,UAAU,QAAQ,WAAW,OAAO,gBAAgB,aAAa,iBAAiB,QAAQ,yBAAyB;AAAA,MAC1J;AAAA,IACJ;AAAA,EACJ,OAAO;AACH,UAAMC,SAAQ,2BAA2B;AAAA,MACrC;AAAA,MACA;AAAA,MACA,OAAO,OAAO;AAAA,IAClB,CAAC;AAAA,EACL;AACA,SAAO;AAAA,IACH,SAAS,CAAC,OAAO;AAAA,IACjB;AAAA,IACA;AAAA,IACA,gBAAgB,OAAO,kBAAkB;AAAA,IACzC,OAAO,OAAO,SAAS;AAAA,EAC3B;AACJ;AAjCmB;AAkCnB,wBAAwB,aAAa;AACrC,WAAW,oBAAoB,IAAI,6FAA6F,uBAAuB;AAEhJ,IAAM,yBAAyB,OAAO,OAAO,yBAAyB;AAAA,EACzE,YAAY;AAChB,CAAC;",
  "names": ["executeEvaluatorStep", "logStep"]
}

46331
+
46332
+ // src/domains/evals/workflow/functions/evaluateConversation.ts
46333
+ var getConversationStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep");
46334
+ var getEvaluatorsStep = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep");
46335
+ var executeEvaluatorStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep");
46336
+ var logStep2 = globalThis[Symbol.for("WORKFLOW_USE_STEP")]("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep");
46337
+ async function _evaluateConversationWorkflow(payload) {
46338
+ const { conversationId, evaluatorIds } = payload;
46339
+ await logStep2("Starting conversation evaluation", payload);
46340
+ const conversation = await getConversationStep(payload);
46341
+ const evaluators = await getEvaluatorsStep(payload);
46342
+ if (evaluators.length === 0) {
46343
+ await logStep2("No valid evaluators found", {
46344
+ conversationId,
46345
+ evaluatorIds
46346
+ });
46347
+ return {
46348
+ success: false,
46349
+ reason: "No valid evaluators"
46350
+ };
46351
+ }
46352
+ const results = [];
46353
+ for (const evaluator of evaluators) {
46354
+ const result = await executeEvaluatorStep2(payload, evaluator.id, conversation);
46355
+ results.push(result);
46356
+ }
46357
+ return {
46358
+ success: true,
46359
+ conversationId,
46360
+ resultCount: results.length
46361
+ };
46362
+ }
46363
+ __name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
46364
+ _evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
46365
+ globalThis.__private_workflows.set("workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow", _evaluateConversationWorkflow);
46366
+ var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
46367
+ workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
46368
+ });
46369
+ //# sourceMappingURL=data:application/json;base64,{
  "version": 3,
  "sources": ["src/domains/evals/workflow/functions/runDatasetItem.ts", "src/domains/evals/workflow/functions/evaluateConversation.ts"],
  "sourcesContent": ["/**\n * Workflow for running dataset items through the chat API.\n *\n * This makes dataset run processing fire-and-forget - each item is queued\n * independently and processed in parallel by the workflow system.\n */ /**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"_runDatasetItemWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/runDatasetItem.ts\":{\"callChatApiStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\"},\"createRelationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\"},\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\"}}}}*/;\n/**\n * Step: Call the chat API to process the dataset item\n */ var callChatApiStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep\");\n/**\n * Step: Create conversation relation in database\n */ var createRelationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep\");\n/**\n * Step: Execute a single evaluator on a conversation\n */ var executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep\");\n/**\n * Main workflow function - processes a single dataset item through the chat API.\n * Optionally runs evaluators on the resulting conversation.\n */ async function _runDatasetItemWorkflow(payload) {\n    const { datasetItemId, datasetRunId, agentId, evaluatorIds, evaluationRunId } = payload;\n    await logStep('Starting dataset item processing', {\n        datasetItemId,\n        datasetRunId,\n        agentId,\n        hasEvaluators: !!(evaluatorIds && evaluatorIds.length > 0)\n    });\n    // Call chat API\n    const result = await callChatApiStep(payload);\n    // Create relation if we got a conversation\n    if (result.conversationId) {\n        await createRelationStep(payload, result.conversationId);\n        // Run evaluations if configured\n        if (evaluatorIds && evaluatorIds.length > 0 && evaluationRunId) {\n            for (const evaluatorId of evaluatorIds){\n                await executeEvaluatorStep(payload.tenantId, payload.projectId, result.conversationId, evaluatorId, evaluationRunId, payload.datasetItemExpectedOutput);\n            }\n        }\n    } else {\n        await logStep('No conversation created', {\n            datasetItemId,\n            datasetRunId,\n            error: result.error\n        });\n    }\n    return {\n        success: !result.error,\n        datasetItemId,\n        datasetRunId,\n        conversationId: result.conversationId || null,\n        error: result.error || null\n    };\n}\n_runDatasetItemWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow\", _runDatasetItemWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow'\n});\n", "/**__internal_workflows{\"workflows\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"_evaluateConversationWorkflow\":{\"workflowId\":\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\"}}},\"steps\":{\"src/domains/evals/workflow/functions/evaluateConversation.ts\":{\"executeEvaluatorStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\"},\"getConversationStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\"},\"getEvaluatorsStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\"},\"logStep\":{\"stepId\":\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\"}}}}*/;\nvar getConversationStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep\");\nvar getEvaluatorsStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep\");\nvar executeEvaluatorStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep\");\n/**\n * Step: Log workflow progress\n */ var logStep = globalThis[Symbol.for(\"WORKFLOW_USE_STEP\")](\"step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep\");\n/**\n * Main workflow function - orchestrates the evaluation steps.\n *\n * IMPORTANT: This runs in a deterministic sandbox.\n * - Do NOT call Node.js APIs directly here (no DB, no fs, etc.)\n * - All side effects must happen in step functions\n */ async function _evaluateConversationWorkflow(payload) {\n    const { conversationId, evaluatorIds } = payload;\n    await logStep('Starting conversation evaluation', payload);\n    const conversation = await getConversationStep(payload);\n    const evaluators = await getEvaluatorsStep(payload);\n    if (evaluators.length === 0) {\n        await logStep('No valid evaluators found', {\n            conversationId,\n            evaluatorIds\n        });\n        return {\n            success: false,\n            reason: 'No valid evaluators'\n        };\n    }\n    const results = [];\n    for (const evaluator of evaluators){\n        const result = await executeEvaluatorStep(payload, evaluator.id, conversation);\n        results.push(result);\n    }\n    return {\n        success: true,\n        conversationId,\n        resultCount: results.length\n    };\n}\n_evaluateConversationWorkflow.workflowId = \"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\";\nglobalThis.__private_workflows.set(\"workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow\", _evaluateConversationWorkflow);\n// This ID must match what workflow:build generates in .well-known/workflow/v1/flow.cjs\nexport const evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {\n    workflowId: 'workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow'\n});\n"],
  "mappings": ";;;;;AAQI,IAAI,kBAAkB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,+EAA+E;AAGjJ,IAAI,qBAAqB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,kFAAkF;AAGvJ,IAAI,uBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,oFAAoF;AAG3J,IAAI,UAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uEAAuE;AAIjI,eAAe,wBAAwB,SAAS;AAChD,QAAM,EAAE,eAAe,cAAc,SAAS,cAAc,gBAAgB,IAAI;AAChF,QAAM,QAAQ,oCAAoC;AAAA,IAC9C;AAAA,IACA;AAAA,IACA;AAAA,IACA,eAAe,CAAC,EAAE,gBAAgB,aAAa,SAAS;AAAA,EAC5D,CAAC;AAED,QAAM,SAAS,MAAM,gBAAgB,OAAO;AAE5C,MAAI,OAAO,gBAAgB;AACvB,UAAM,mBAAmB,SAAS,OAAO,cAAc;AAEvD,QAAI,gBAAgB,aAAa,SAAS,KAAK,iBAAiB;AAC5D,iBAAW,eAAe,cAAa;AACnC,cAAM,qBAAqB,QAAQ,UAAU,QAAQ,WAAW,OAAO,gBAAgB,aAAa,iBAAiB,QAAQ,yBAAyB;AAAA,MAC1J;AAAA,IACJ;AAAA,EACJ,OAAO;AACH,UAAM,QAAQ,2BAA2B;AAAA,MACrC;AAAA,MACA;AAAA,MACA,OAAO,OAAO;AAAA,IAClB,CAAC;AAAA,EACL;AACA,SAAO;AAAA,IACH,SAAS,CAAC,OAAO;AAAA,IACjB;AAAA,IACA;AAAA,IACA,gBAAgB,OAAO,kBAAkB;AAAA,IACzC,OAAO,OAAO,SAAS;AAAA,EAC3B;AACJ;AAjCmB;AAkCnB,wBAAwB,aAAa;AACrC,WAAW,oBAAoB,IAAI,6FAA6F,uBAAuB;AAEhJ,IAAM,yBAAyB,OAAO,OAAO,yBAAyB;AAAA,EACzE,YAAY;AAChB,CAAC;;;AC3DD,IAAI,sBAAsB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,yFAAyF;AAC/J,IAAI,oBAAoB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,uFAAuF;AAC3J,IAAIA,wBAAuB,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,0FAA0F;AAG7J,IAAIC,WAAU,WAAW,OAAO,IAAI,mBAAmB,CAAC,EAAE,6EAA6E;AAOvI,eAAe,8BAA8B,SAAS;AACtD,QAAM,EAAE,gBAAgB,aAAa,IAAI;AACzC,QAAMA,SAAQ,oCAAoC,OAAO;AACzD,QAAM,eAAe,MAAM,oBAAoB,OAAO;AACtD,QAAM,aAAa,MAAM,kBAAkB,OAAO;AAClD,MAAI,WAAW,WAAW,GAAG;AACzB,UAAMA,SAAQ,6BAA6B;AAAA,MACvC;AAAA,MACA;AAAA,IACJ,CAAC;AACD,WAAO;AAAA,MACH,SAAS;AAAA,MACT,QAAQ;AAAA,IACZ;AAAA,EACJ;AACA,QAAM,UAAU,CAAC;AACjB,aAAW,aAAa,YAAW;AAC/B,UAAM,SAAS,MAAMD,sBAAqB,SAAS,UAAU,IAAI,YAAY;AAC7E,YAAQ,KAAK,MAAM;AAAA,EACvB;AACA,SAAO;AAAA,IACH,SAAS;AAAA,IACT;AAAA,IACA,aAAa,QAAQ;AAAA,EACzB;AACJ;AAzBmB;AA0BnB,8BAA8B,aAAa;AAC3C,WAAW,oBAAoB,IAAI,yGAAyG,6BAA6B;AAElK,IAAM,+BAA+B,OAAO,OAAO,+BAA+B;AAAA,EACrF,YAAY;AAChB,CAAC;",
  "names": ["executeEvaluatorStep", "logStep"]
}

46370
46370
  `;
46371
46371
  var POST = workflowEntrypoint(workflowCode);
46372
46372
  // Annotate the CommonJS export names for ESM import in node:
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "workflowFiles": [
3
- "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts",
4
- "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts"
3
+ "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts",
4
+ "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts"
5
5
  ]
6
6
  }
@@ -1,17 +1,14 @@
1
1
  {
2
2
  "steps": {
3
- "src/domains/evals/workflow/functions/evaluateConversation.ts": {
4
- "executeEvaluatorStep": {
5
- "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep"
6
- },
7
- "getConversationStep": {
8
- "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep"
3
+ "node_modules/.pnpm/workflow@4.0.1-beta.33_@aws-sdk+client-sts@3.970.0_@opentelemetry+api@1.9.0_@types+reac_5c488396978166b4f12e99cb3aa4a769/node_modules/workflow/dist/internal/builtins.js": {
4
+ "__builtin_response_array_buffer": {
5
+ "stepId": "__builtin_response_array_buffer"
9
6
  },
10
- "getEvaluatorsStep": {
11
- "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep"
7
+ "__builtin_response_json": {
8
+ "stepId": "__builtin_response_json"
12
9
  },
13
- "logStep": {
14
- "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep"
10
+ "__builtin_response_text": {
11
+ "stepId": "__builtin_response_text"
15
12
  }
16
13
  },
17
14
  "src/domains/evals/workflow/functions/runDatasetItem.ts": {
@@ -28,28 +25,31 @@
28
25
  "stepId": "step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep"
29
26
  }
30
27
  },
31
- "node_modules/.pnpm/workflow@4.0.1-beta.33_@aws-sdk+client-sts@3.970.0_@opentelemetry+api@1.9.0_@types+reac_5c488396978166b4f12e99cb3aa4a769/node_modules/workflow/dist/internal/builtins.js": {
32
- "__builtin_response_array_buffer": {
33
- "stepId": "__builtin_response_array_buffer"
28
+ "src/domains/evals/workflow/functions/evaluateConversation.ts": {
29
+ "executeEvaluatorStep": {
30
+ "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep"
34
31
  },
35
- "__builtin_response_json": {
36
- "stepId": "__builtin_response_json"
32
+ "getConversationStep": {
33
+ "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep"
37
34
  },
38
- "__builtin_response_text": {
39
- "stepId": "__builtin_response_text"
35
+ "getEvaluatorsStep": {
36
+ "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep"
37
+ },
38
+ "logStep": {
39
+ "stepId": "step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep"
40
40
  }
41
41
  }
42
42
  },
43
43
  "workflows": {
44
- "src/domains/evals/workflow/functions/runDatasetItem.ts": {
45
- "_runDatasetItemWorkflow": {
46
- "workflowId": "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
47
- }
48
- },
49
44
  "src/domains/evals/workflow/functions/evaluateConversation.ts": {
50
45
  "_evaluateConversationWorkflow": {
51
46
  "workflowId": "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
52
47
  }
48
+ },
49
+ "src/domains/evals/workflow/functions/runDatasetItem.ts": {
50
+ "_runDatasetItemWorkflow": {
51
+ "workflowId": "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
52
+ }
53
53
  }
54
54
  }
55
55
  }
@@ -212494,124 +212494,8 @@ Return your evaluation as a JSON object matching the schema above.`;
212494
212494
  }
212495
212495
  };
212496
212496
 
212497
- // src/domains/evals/workflow/functions/evaluateConversation.ts
212498
- var logger22 = getLogger("workflow-evaluate-conversation");
212499
- async function getConversationStep(payload) {
212500
- const { tenantId, projectId, conversationId } = payload;
212501
- const conv = await getConversation(runDbClient_default)({
212502
- scopes: {
212503
- tenantId,
212504
- projectId
212505
- },
212506
- conversationId
212507
- });
212508
- if (!conv) {
212509
- throw new Error(`Conversation not found: ${conversationId}`);
212510
- }
212511
- return conv;
212512
- }
212513
- __name(getConversationStep, "getConversationStep");
212514
- async function getEvaluatorsStep(payload) {
212515
- const { tenantId, projectId, evaluatorIds } = payload;
212516
- const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
212517
- const evals = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorsByIds(db)({
212518
- scopes: {
212519
- tenantId,
212520
- projectId
212521
- },
212522
- evaluatorIds
212523
- }));
212524
- return evals;
212525
- }
212526
- __name(getEvaluatorsStep, "getEvaluatorsStep");
212527
- async function executeEvaluatorStep(payload, evaluatorId, conversation) {
212528
- const { tenantId, projectId, conversationId, evaluationRunId } = payload;
212529
- const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
212530
- const evaluator2 = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorById(db)({
212531
- scopes: {
212532
- tenantId,
212533
- projectId,
212534
- evaluatorId
212535
- }
212536
- }));
212537
- if (!evaluator2) {
212538
- throw new Error(`Evaluator not found: ${evaluatorId}`);
212539
- }
212540
- const evalResult = await createEvaluationResult(runDbClient_default)({
212541
- id: generateId(),
212542
- tenantId,
212543
- projectId,
212544
- conversationId,
212545
- evaluatorId: evaluator2.id,
212546
- evaluationRunId
212547
- });
212548
- try {
212549
- const evaluationService = new EvaluationService();
212550
- const output = await evaluationService.executeEvaluation({
212551
- conversation,
212552
- evaluator: evaluator2,
212553
- tenantId,
212554
- projectId
212555
- });
212556
- const updated = await updateEvaluationResult(runDbClient_default)({
212557
- scopes: {
212558
- tenantId,
212559
- projectId,
212560
- evaluationResultId: evalResult.id
212561
- },
212562
- data: {
212563
- output
212564
- }
212565
- });
212566
- logger22.info({
212567
- conversationId,
212568
- evaluatorId: evaluator2.id,
212569
- resultId: evalResult.id
212570
- }, "Evaluation completed successfully");
212571
- return updated;
212572
- } catch (error46) {
212573
- const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
212574
- logger22.error({
212575
- error: error46,
212576
- conversationId,
212577
- evaluatorId: evaluator2.id,
212578
- resultId: evalResult.id
212579
- }, "Evaluation execution failed");
212580
- const failed = await updateEvaluationResult(runDbClient_default)({
212581
- scopes: {
212582
- tenantId,
212583
- projectId,
212584
- evaluationResultId: evalResult.id
212585
- },
212586
- data: {
212587
- output: {
212588
- text: `Evaluation failed: ${errorMessage}`
212589
- }
212590
- }
212591
- });
212592
- return failed;
212593
- }
212594
- }
212595
- __name(executeEvaluatorStep, "executeEvaluatorStep");
212596
- async function logStep(message, data) {
212597
- logger22.info(data, message);
212598
- }
212599
- __name(logStep, "logStep");
212600
- async function _evaluateConversationWorkflow(payload) {
212601
- throw new Error("You attempted to execute workflow _evaluateConversationWorkflow function directly. To start a workflow, use start(_evaluateConversationWorkflow) from workflow/api");
212602
- }
212603
- __name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
212604
- _evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
212605
- var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
212606
- workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
212607
- });
212608
- registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep", getConversationStep);
212609
- registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep", getEvaluatorsStep);
212610
- registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep", executeEvaluatorStep);
212611
- registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep", logStep);
212612
-
212613
212497
  // src/domains/evals/workflow/functions/runDatasetItem.ts
212614
- var logger23 = getLogger("workflow-run-dataset-item");
212498
+ var logger22 = getLogger("workflow-run-dataset-item");
212615
212499
  async function callChatApiStep(payload) {
212616
212500
  const { tenantId, projectId, agentId, datasetItemId, datasetItemInput, datasetItemSimulationAgent, datasetRunId } = payload;
212617
212501
  const evaluationService = new EvaluationService();
@@ -212627,7 +212511,7 @@ async function callChatApiStep(payload) {
212627
212511
  datasetItem: datasetItem2,
212628
212512
  datasetRunId
212629
212513
  });
212630
- logger23.info({
212514
+ logger22.info({
212631
212515
  tenantId,
212632
212516
  projectId,
212633
212517
  datasetItemId,
@@ -212650,7 +212534,7 @@ async function createRelationStep(payload, conversationId) {
212650
212534
  conversationId,
212651
212535
  datasetItemId
212652
212536
  });
212653
- logger23.info({
212537
+ logger22.info({
212654
212538
  tenantId,
212655
212539
  projectId,
212656
212540
  datasetItemId,
@@ -212664,7 +212548,7 @@ async function createRelationStep(payload, conversationId) {
212664
212548
  };
212665
212549
  } catch (error46) {
212666
212550
  if (error46?.cause?.code === "23503" || error46?.code === "23503") {
212667
- logger23.warn({
212551
+ logger22.warn({
212668
212552
  tenantId,
212669
212553
  projectId,
212670
212554
  datasetItemId,
@@ -212681,7 +212565,7 @@ async function createRelationStep(payload, conversationId) {
212681
212565
  }
212682
212566
  }
212683
212567
  __name(createRelationStep, "createRelationStep");
212684
- async function executeEvaluatorStep2(tenantId, projectId, conversationId, evaluatorId, evaluationRunId, expectedOutput) {
212568
+ async function executeEvaluatorStep(tenantId, projectId, conversationId, evaluatorId, evaluationRunId, expectedOutput) {
212685
212569
  const ref = getProjectScopedRef(tenantId, projectId, "main");
212686
212570
  const resolvedRef = await resolveRef2(manageDbClient_default)(ref);
212687
212571
  if (!resolvedRef) {
@@ -212695,7 +212579,7 @@ async function executeEvaluatorStep2(tenantId, projectId, conversationId, evalua
212695
212579
  }
212696
212580
  }));
212697
212581
  if (!evaluator2) {
212698
- logger23.warn({
212582
+ logger22.warn({
212699
212583
  evaluatorId
212700
212584
  }, "Evaluator not found");
212701
212585
  return null;
@@ -212737,7 +212621,7 @@ async function executeEvaluatorStep2(tenantId, projectId, conversationId, evalua
212737
212621
  output
212738
212622
  }
212739
212623
  });
212740
- logger23.info({
212624
+ logger22.info({
212741
212625
  conversationId,
212742
212626
  evaluatorId: evaluator2.id,
212743
212627
  resultId: evalResult.id
@@ -212745,7 +212629,7 @@ async function executeEvaluatorStep2(tenantId, projectId, conversationId, evalua
212745
212629
  return evalResult.id;
212746
212630
  } catch (error46) {
212747
212631
  const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
212748
- logger23.error({
212632
+ logger22.error({
212749
212633
  error: error46,
212750
212634
  conversationId,
212751
212635
  evaluatorId: evaluator2.id
@@ -212765,11 +212649,11 @@ async function executeEvaluatorStep2(tenantId, projectId, conversationId, evalua
212765
212649
  return evalResult.id;
212766
212650
  }
212767
212651
  }
212768
- __name(executeEvaluatorStep2, "executeEvaluatorStep");
212769
- async function logStep2(message, data) {
212770
- logger23.info(data, message);
212652
+ __name(executeEvaluatorStep, "executeEvaluatorStep");
212653
+ async function logStep(message, data) {
212654
+ logger22.info(data, message);
212771
212655
  }
212772
- __name(logStep2, "logStep");
212656
+ __name(logStep, "logStep");
212773
212657
  async function _runDatasetItemWorkflow(payload) {
212774
212658
  throw new Error("You attempted to execute workflow _runDatasetItemWorkflow function directly. To start a workflow, use start(_runDatasetItemWorkflow) from workflow/api");
212775
212659
  }
@@ -212780,8 +212664,124 @@ var runDatasetItemWorkflow = Object.assign(_runDatasetItemWorkflow, {
212780
212664
  });
212781
212665
  registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//callChatApiStep", callChatApiStep);
212782
212666
  registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//createRelationStep", createRelationStep);
212783
- registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep", executeEvaluatorStep2);
212784
- registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep", logStep2);
212667
+ registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//executeEvaluatorStep", executeEvaluatorStep);
212668
+ registerStepFunction("step//src/domains/evals/workflow/functions/runDatasetItem.ts//logStep", logStep);
212669
+
212670
+ // src/domains/evals/workflow/functions/evaluateConversation.ts
212671
+ var logger23 = getLogger("workflow-evaluate-conversation");
212672
+ async function getConversationStep(payload) {
212673
+ const { tenantId, projectId, conversationId } = payload;
212674
+ const conv = await getConversation(runDbClient_default)({
212675
+ scopes: {
212676
+ tenantId,
212677
+ projectId
212678
+ },
212679
+ conversationId
212680
+ });
212681
+ if (!conv) {
212682
+ throw new Error(`Conversation not found: ${conversationId}`);
212683
+ }
212684
+ return conv;
212685
+ }
212686
+ __name(getConversationStep, "getConversationStep");
212687
+ async function getEvaluatorsStep(payload) {
212688
+ const { tenantId, projectId, evaluatorIds } = payload;
212689
+ const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
212690
+ const evals = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorsByIds(db)({
212691
+ scopes: {
212692
+ tenantId,
212693
+ projectId
212694
+ },
212695
+ evaluatorIds
212696
+ }));
212697
+ return evals;
212698
+ }
212699
+ __name(getEvaluatorsStep, "getEvaluatorsStep");
212700
+ async function executeEvaluatorStep2(payload, evaluatorId, conversation) {
212701
+ const { tenantId, projectId, conversationId, evaluationRunId } = payload;
212702
+ const projectMain = await getProjectMainResolvedRef(manageDbClient_default)(tenantId, projectId);
212703
+ const evaluator2 = await withRef(manageDbPool_default, projectMain, (db) => getEvaluatorById(db)({
212704
+ scopes: {
212705
+ tenantId,
212706
+ projectId,
212707
+ evaluatorId
212708
+ }
212709
+ }));
212710
+ if (!evaluator2) {
212711
+ throw new Error(`Evaluator not found: ${evaluatorId}`);
212712
+ }
212713
+ const evalResult = await createEvaluationResult(runDbClient_default)({
212714
+ id: generateId(),
212715
+ tenantId,
212716
+ projectId,
212717
+ conversationId,
212718
+ evaluatorId: evaluator2.id,
212719
+ evaluationRunId
212720
+ });
212721
+ try {
212722
+ const evaluationService = new EvaluationService();
212723
+ const output = await evaluationService.executeEvaluation({
212724
+ conversation,
212725
+ evaluator: evaluator2,
212726
+ tenantId,
212727
+ projectId
212728
+ });
212729
+ const updated = await updateEvaluationResult(runDbClient_default)({
212730
+ scopes: {
212731
+ tenantId,
212732
+ projectId,
212733
+ evaluationResultId: evalResult.id
212734
+ },
212735
+ data: {
212736
+ output
212737
+ }
212738
+ });
212739
+ logger23.info({
212740
+ conversationId,
212741
+ evaluatorId: evaluator2.id,
212742
+ resultId: evalResult.id
212743
+ }, "Evaluation completed successfully");
212744
+ return updated;
212745
+ } catch (error46) {
212746
+ const errorMessage = error46 instanceof Error ? error46.message : "Unknown error";
212747
+ logger23.error({
212748
+ error: error46,
212749
+ conversationId,
212750
+ evaluatorId: evaluator2.id,
212751
+ resultId: evalResult.id
212752
+ }, "Evaluation execution failed");
212753
+ const failed = await updateEvaluationResult(runDbClient_default)({
212754
+ scopes: {
212755
+ tenantId,
212756
+ projectId,
212757
+ evaluationResultId: evalResult.id
212758
+ },
212759
+ data: {
212760
+ output: {
212761
+ text: `Evaluation failed: ${errorMessage}`
212762
+ }
212763
+ }
212764
+ });
212765
+ return failed;
212766
+ }
212767
+ }
212768
+ __name(executeEvaluatorStep2, "executeEvaluatorStep");
212769
+ async function logStep2(message, data) {
212770
+ logger23.info(data, message);
212771
+ }
212772
+ __name(logStep2, "logStep");
212773
+ async function _evaluateConversationWorkflow(payload) {
212774
+ throw new Error("You attempted to execute workflow _evaluateConversationWorkflow function directly. To start a workflow, use start(_evaluateConversationWorkflow) from workflow/api");
212775
+ }
212776
+ __name(_evaluateConversationWorkflow, "_evaluateConversationWorkflow");
212777
+ _evaluateConversationWorkflow.workflowId = "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow";
212778
+ var evaluateConversationWorkflow = Object.assign(_evaluateConversationWorkflow, {
212779
+ workflowId: "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
212780
+ });
212781
+ registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getConversationStep", getConversationStep);
212782
+ registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//getEvaluatorsStep", getEvaluatorsStep);
212783
+ registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//executeEvaluatorStep", executeEvaluatorStep2);
212784
+ registerStepFunction("step//src/domains/evals/workflow/functions/evaluateConversation.ts//logStep", logStep2);
212785
212785
 
212786
212786
  // ../node_modules/.pnpm/@workflow+utils@4.0.1-beta.7/node_modules/@workflow/utils/dist/index.js
212787
212787
  var import_ms2 = __toESM(require_ms(), 1);
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "stepFiles": [
3
- "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts",
4
- "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts"
3
+ "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/runDatasetItem.ts",
4
+ "/home/runner/work/agents/agents/agents-api/src/domains/evals/workflow/functions/evaluateConversation.ts"
5
5
  ]
6
6
  }
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono17 from "hono";
2
+ import * as hono0 from "hono";
3
3
 
4
4
  //#region src/domains/evals/routes/datasetTriggers.d.ts
5
- declare const app: OpenAPIHono<hono17.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono0.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono14 from "hono";
2
+ import * as hono1 from "hono";
3
3
 
4
4
  //#region src/domains/evals/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono14.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono1.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono16 from "hono";
2
+ import * as hono2 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/conversations.d.ts
5
- declare const app: OpenAPIHono<hono16.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono2.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono18 from "hono";
2
+ import * as hono4 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/evals/evaluationResults.d.ts
5
- declare const app: OpenAPIHono<hono18.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono4.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono15 from "hono";
2
+ import * as hono3 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono15.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono3.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
package/dist/factory.d.ts CHANGED
@@ -795,25 +795,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
795
795
  ac: better_auth_plugins0.AccessControl;
796
796
  roles: {
797
797
  member: {
798
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
799
- actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
798
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
799
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
800
800
  connector: "OR" | "AND";
801
801
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
802
- statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
802
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
803
803
  };
804
804
  admin: {
805
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
806
- actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
805
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
806
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
807
807
  connector: "OR" | "AND";
808
808
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
809
- statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
809
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
810
810
  };
811
811
  owner: {
812
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
813
- actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
812
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
813
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
814
814
  connector: "OR" | "AND";
815
815
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
816
- statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
816
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
817
817
  };
818
818
  };
819
819
  membershipLimit: number;
@@ -987,7 +987,7 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
987
987
  id: string;
988
988
  organizationId: string;
989
989
  email: string;
990
- role: "owner" | "admin" | "member";
990
+ role: "member" | "admin" | "owner";
991
991
  status: better_auth_plugins0.InvitationStatus;
992
992
  inviterId: string;
993
993
  expiresAt: Date;
@@ -996,7 +996,7 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
996
996
  Member: {
997
997
  id: string;
998
998
  organizationId: string;
999
- role: "owner" | "admin" | "member";
999
+ role: "member" | "admin" | "owner";
1000
1000
  createdAt: Date;
1001
1001
  userId: string;
1002
1002
  user: {
@@ -1012,7 +1012,7 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
1012
1012
  members: {
1013
1013
  id: string;
1014
1014
  organizationId: string;
1015
- role: "owner" | "admin" | "member";
1015
+ role: "member" | "admin" | "owner";
1016
1016
  createdAt: Date;
1017
1017
  userId: string;
1018
1018
  user: {
@@ -1026,7 +1026,7 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
1026
1026
  id: string;
1027
1027
  organizationId: string;
1028
1028
  email: string;
1029
- role: "owner" | "admin" | "member";
1029
+ role: "member" | "admin" | "owner";
1030
1030
  status: better_auth_plugins0.InvitationStatus;
1031
1031
  inviterId: string;
1032
1032
  expiresAt: Date;
@@ -1104,25 +1104,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
1104
1104
  ac: better_auth_plugins0.AccessControl;
1105
1105
  roles: {
1106
1106
  member: {
1107
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1108
- actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1107
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
1108
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
1109
1109
  connector: "OR" | "AND";
1110
1110
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1111
- statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1111
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
1112
1112
  };
1113
1113
  admin: {
1114
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1115
- actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1114
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
1115
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
1116
1116
  connector: "OR" | "AND";
1117
1117
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1118
- statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1118
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
1119
1119
  };
1120
1120
  owner: {
1121
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1122
- actions: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
1121
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key] | {
1122
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>[key];
1123
1123
  connector: "OR" | "AND";
1124
1124
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1125
- statements: better_auth_plugins0.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
1125
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins0.Statements>;
1126
1126
  };
1127
1127
  };
1128
1128
  membershipLimit: number;
package/dist/index.d.ts CHANGED
@@ -796,25 +796,25 @@ declare const auth: better_auth78.Auth<{
796
796
  ac: better_auth_plugins69.AccessControl;
797
797
  roles: {
798
798
  member: {
799
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
800
- actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
799
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
800
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
801
801
  connector: "OR" | "AND";
802
802
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
803
- statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
803
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
804
804
  };
805
805
  admin: {
806
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
807
- actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
806
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
807
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
808
808
  connector: "OR" | "AND";
809
809
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
810
- statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
810
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
811
811
  };
812
812
  owner: {
813
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
814
- actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
813
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
814
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
815
815
  connector: "OR" | "AND";
816
816
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
817
- statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
817
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
818
818
  };
819
819
  };
820
820
  membershipLimit: number;
@@ -988,7 +988,7 @@ declare const auth: better_auth78.Auth<{
988
988
  id: string;
989
989
  organizationId: string;
990
990
  email: string;
991
- role: "owner" | "admin" | "member";
991
+ role: "member" | "admin" | "owner";
992
992
  status: better_auth_plugins69.InvitationStatus;
993
993
  inviterId: string;
994
994
  expiresAt: Date;
@@ -997,7 +997,7 @@ declare const auth: better_auth78.Auth<{
997
997
  Member: {
998
998
  id: string;
999
999
  organizationId: string;
1000
- role: "owner" | "admin" | "member";
1000
+ role: "member" | "admin" | "owner";
1001
1001
  createdAt: Date;
1002
1002
  userId: string;
1003
1003
  user: {
@@ -1013,7 +1013,7 @@ declare const auth: better_auth78.Auth<{
1013
1013
  members: {
1014
1014
  id: string;
1015
1015
  organizationId: string;
1016
- role: "owner" | "admin" | "member";
1016
+ role: "member" | "admin" | "owner";
1017
1017
  createdAt: Date;
1018
1018
  userId: string;
1019
1019
  user: {
@@ -1027,7 +1027,7 @@ declare const auth: better_auth78.Auth<{
1027
1027
  id: string;
1028
1028
  organizationId: string;
1029
1029
  email: string;
1030
- role: "owner" | "admin" | "member";
1030
+ role: "member" | "admin" | "owner";
1031
1031
  status: better_auth_plugins69.InvitationStatus;
1032
1032
  inviterId: string;
1033
1033
  expiresAt: Date;
@@ -1105,25 +1105,25 @@ declare const auth: better_auth78.Auth<{
1105
1105
  ac: better_auth_plugins69.AccessControl;
1106
1106
  roles: {
1107
1107
  member: {
1108
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1109
- actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1108
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
1109
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
1110
1110
  connector: "OR" | "AND";
1111
1111
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1112
- statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1112
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
1113
1113
  };
1114
1114
  admin: {
1115
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1116
- actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1115
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
1116
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
1117
1117
  connector: "OR" | "AND";
1118
1118
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1119
- statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1119
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
1120
1120
  };
1121
1121
  owner: {
1122
- authorize<K_1 extends "organization" | "project" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1123
- actions: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>[key];
1122
+ authorize<K_1 extends "organization" | "member" | "invitation" | "ac" | "project" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key] | {
1123
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>[key];
1124
1124
  connector: "OR" | "AND";
1125
1125
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1126
- statements: better_auth_plugins69.Subset<"organization" | "project" | "member" | "invitation" | "team" | "ac", better_auth_plugins69.Statements>;
1126
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "ac" | "project" | "team", better_auth_plugins69.Statements>;
1127
1127
  };
1128
1128
  };
1129
1129
  membershipLimit: number;
@@ -1,4 +1,4 @@
1
- import * as hono0 from "hono";
1
+ import * as hono5 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
 
4
4
  //#region src/middleware/evalsAuth.d.ts
@@ -7,7 +7,7 @@ import { BaseExecutionContext } from "@inkeep/agents-core";
7
7
  * Middleware to authenticate API requests using Bearer token authentication
8
8
  * First checks if token matches INKEEP_AGENTS_EVAL_API_BYPASS_SECRET,
9
9
  */
10
- declare const evalApiKeyAuth: () => hono0.MiddlewareHandler<{
10
+ declare const evalApiKeyAuth: () => hono5.MiddlewareHandler<{
11
11
  Variables: {
12
12
  executionContext: BaseExecutionContext;
13
13
  };
@@ -1,4 +1,4 @@
1
- import * as hono1 from "hono";
1
+ import * as hono6 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
  import { createAuth } from "@inkeep/agents-core/auth";
4
4
 
@@ -12,7 +12,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
12
12
  * 3. Database API key
13
13
  * 4. Internal service token
14
14
  */
15
- declare const manageApiKeyAuth: () => hono1.MiddlewareHandler<{
15
+ declare const manageApiKeyAuth: () => hono6.MiddlewareHandler<{
16
16
  Variables: {
17
17
  executionContext: BaseExecutionContext;
18
18
  userId?: string;
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono2 from "hono";
2
+ import * as hono7 from "hono";
3
3
 
4
4
  //#region src/middleware/projectAccess.d.ts
5
5
 
@@ -26,6 +26,6 @@ declare const requireProjectPermission: <Env$1 extends {
26
26
  Variables: ManageAppVariables;
27
27
  } = {
28
28
  Variables: ManageAppVariables;
29
- }>(permission?: ProjectPermission) => hono2.MiddlewareHandler<Env$1, string, {}, Response>;
29
+ }>(permission?: ProjectPermission) => hono7.MiddlewareHandler<Env$1, string, {}, Response>;
30
30
  //#endregion
31
31
  export { ProjectPermission, requireProjectPermission };
@@ -1,11 +1,11 @@
1
- import * as hono3 from "hono";
1
+ import * as hono8 from "hono";
2
2
  import { BaseExecutionContext, ResolvedRef } from "@inkeep/agents-core";
3
3
 
4
4
  //#region src/middleware/projectConfig.d.ts
5
5
  /**
6
6
  * Middleware that fetches the full project definition from the Management API
7
7
  */
8
- declare const projectConfigMiddleware: hono3.MiddlewareHandler<{
8
+ declare const projectConfigMiddleware: hono8.MiddlewareHandler<{
9
9
  Variables: {
10
10
  executionContext: BaseExecutionContext;
11
11
  resolvedRef: ResolvedRef;
@@ -15,7 +15,7 @@ declare const projectConfigMiddleware: hono3.MiddlewareHandler<{
15
15
  * Creates a middleware that applies project config fetching except for specified route patterns
16
16
  * @param skipRouteCheck - Function that returns true if the route should skip the middleware
17
17
  */
18
- declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono3.MiddlewareHandler<{
18
+ declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono8.MiddlewareHandler<{
19
19
  Variables: {
20
20
  executionContext: BaseExecutionContext;
21
21
  resolvedRef: ResolvedRef;
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono5 from "hono";
2
+ import * as hono10 from "hono";
3
3
 
4
4
  //#region src/middleware/requirePermission.d.ts
5
5
  type Permission = {
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
9
9
  Variables: ManageAppVariables;
10
10
  } = {
11
11
  Variables: ManageAppVariables;
12
- }>(permissions: Permission) => hono5.MiddlewareHandler<Env$1, string, {}, Response>;
12
+ }>(permissions: Permission) => hono10.MiddlewareHandler<Env$1, string, {}, Response>;
13
13
  //#endregion
14
14
  export { requirePermission };
@@ -1,8 +1,8 @@
1
- import * as hono6 from "hono";
1
+ import * as hono11 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
 
4
4
  //#region src/middleware/runAuth.d.ts
5
- declare const runApiKeyAuth: () => hono6.MiddlewareHandler<{
5
+ declare const runApiKeyAuth: () => hono11.MiddlewareHandler<{
6
6
  Variables: {
7
7
  executionContext: BaseExecutionContext;
8
8
  };
@@ -11,7 +11,7 @@ declare const runApiKeyAuth: () => hono6.MiddlewareHandler<{
11
11
  * Creates a middleware that applies API key authentication except for specified route patterns
12
12
  * @param skipRouteCheck - Function that returns true if the route should skip authentication
13
13
  */
14
- declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono6.MiddlewareHandler<{
14
+ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono11.MiddlewareHandler<{
15
15
  Variables: {
16
16
  executionContext: BaseExecutionContext;
17
17
  };
@@ -20,7 +20,7 @@ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =
20
20
  * Helper middleware for endpoints that optionally support API key authentication
21
21
  * If no auth header is present, it continues without setting the executionContext
22
22
  */
23
- declare const runOptionalAuth: () => hono6.MiddlewareHandler<{
23
+ declare const runOptionalAuth: () => hono11.MiddlewareHandler<{
24
24
  Variables: {
25
25
  executionContext?: BaseExecutionContext;
26
26
  };
@@ -1,4 +1,4 @@
1
- import * as hono9 from "hono";
1
+ import * as hono14 from "hono";
2
2
 
3
3
  //#region src/middleware/sessionAuth.d.ts
4
4
 
@@ -7,11 +7,11 @@ import * as hono9 from "hono";
7
7
  * Requires that a user has already been authenticated via Better Auth session.
8
8
  * Used primarily for manage routes that require an active user session.
9
9
  */
10
- declare const sessionAuth: () => hono9.MiddlewareHandler<any, string, {}, Response>;
10
+ declare const sessionAuth: () => hono14.MiddlewareHandler<any, string, {}, Response>;
11
11
  /**
12
12
  * Global session middleware - sets user and session in context for all routes
13
13
  * Used for all routes that require an active user session.
14
14
  */
15
- declare const sessionContext: () => hono9.MiddlewareHandler<any, string, {}, Response>;
15
+ declare const sessionContext: () => hono14.MiddlewareHandler<any, string, {}, Response>;
16
16
  //#endregion
17
17
  export { sessionAuth, sessionContext };
@@ -1,4 +1,4 @@
1
- import * as hono11 from "hono";
1
+ import * as hono16 from "hono";
2
2
 
3
3
  //#region src/middleware/tenantAccess.d.ts
4
4
 
@@ -11,7 +11,7 @@ import * as hono11 from "hono";
11
11
  * - API key user: Access only to the tenant associated with the API key
12
12
  * - Session user: Access based on organization membership
13
13
  */
14
- declare const requireTenantAccess: () => hono11.MiddlewareHandler<{
14
+ declare const requireTenantAccess: () => hono16.MiddlewareHandler<{
15
15
  Variables: {
16
16
  userId: string;
17
17
  tenantId: string;
@@ -1,7 +1,7 @@
1
- import * as hono12 from "hono";
1
+ import * as hono17 from "hono";
2
2
 
3
3
  //#region src/middleware/tracing.d.ts
4
- declare const otelBaggageMiddleware: () => hono12.MiddlewareHandler<any, string, {}, Response>;
5
- declare const executionBaggageMiddleware: () => hono12.MiddlewareHandler<any, string, {}, Response>;
4
+ declare const otelBaggageMiddleware: () => hono17.MiddlewareHandler<any, string, {}, Response>;
5
+ declare const executionBaggageMiddleware: () => hono17.MiddlewareHandler<any, string, {}, Response>;
6
6
  //#endregion
7
7
  export { executionBaggageMiddleware, otelBaggageMiddleware };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@inkeep/agents-api",
3
- "version": "0.0.0-dev-20260122105802",
3
+ "version": "0.0.0-dev-20260122110905",
4
4
  "description": "Unified Inkeep Agents API - combines management, runtime, and evaluation capabilities",
5
5
  "types": "dist/index.d.ts",
6
6
  "exports": {
@@ -71,8 +71,8 @@
71
71
  "openid-client": "^6.8.1",
72
72
  "pg": "^8.16.3",
73
73
  "workflow": "4.0.1-beta.33",
74
- "@inkeep/agents-core": "^0.0.0-dev-20260122105802",
75
- "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260122105802"
74
+ "@inkeep/agents-core": "^0.0.0-dev-20260122110905",
75
+ "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260122110905"
76
76
  },
77
77
  "peerDependencies": {
78
78
  "@hono/zod-openapi": "^1.1.5",