@inkeep/agents-api 0.0.0-dev-20260129102848 → 0.0.0-dev-20260129163144
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/.well-known/workflow/v1/manifest.debug.json +5 -5
- package/dist/.well-known/workflow/v1/step.cjs +0 -1
- package/dist/createApp.d.ts +2 -2
- package/dist/createApp.js +8 -6
- package/dist/data/db/runDbClient.d.ts +2 -2
- package/dist/domains/evals/routes/datasetTriggers.d.ts +2 -2
- package/dist/domains/evals/routes/index.d.ts +2 -2
- package/dist/domains/evals/workflow/routes.d.ts +2 -2
- package/dist/domains/github/index.d.ts +3 -3
- package/dist/domains/github/routes/tokenExchange.d.ts +2 -2
- package/dist/domains/manage/routes/conversations.d.ts +2 -2
- package/dist/domains/manage/routes/evals/evaluationResults.d.ts +2 -2
- package/dist/domains/manage/routes/index.d.ts +2 -2
- package/dist/domains/manage/routes/mcp.d.ts +2 -2
- package/dist/domains/manage/routes/projectMembers.js +1 -14
- package/dist/domains/manage/routes/projectPermissions.js +2 -9
- package/dist/domains/manage/routes/projects.js +14 -16
- package/dist/domains/manage/routes/signoz.d.ts +2 -2
- package/dist/domains/manage/routes/signoz.js +1 -1
- package/dist/domains/manage/routes/userProjectMemberships.js +1 -2
- package/dist/domains/mcp/routes/mcp.d.ts +2 -2
- package/dist/domains/run/context/validation.d.ts +1 -1
- package/dist/domains/run/services/TriggerService.d.ts +1 -1
- package/dist/domains/run/services/TriggerService.js +15 -13
- package/dist/domains/run/utils/token-estimator.d.ts +2 -2
- package/dist/env.d.ts +0 -2
- package/dist/env.js +0 -1
- package/dist/factory.d.ts +29 -29
- package/dist/factory.js +4 -10
- package/dist/index.d.ts +30 -29
- package/dist/index.js +3 -5
- package/dist/middleware/branchScopedDb.d.ts +1 -1
- package/dist/middleware/evalsAuth.d.ts +2 -2
- package/dist/middleware/manageAuth.d.ts +2 -2
- package/dist/middleware/projectAccess.d.ts +2 -11
- package/dist/middleware/projectAccess.js +7 -33
- package/dist/middleware/projectConfig.d.ts +3 -3
- package/dist/middleware/ref.d.ts +1 -1
- package/dist/middleware/requirePermission.d.ts +2 -2
- package/dist/middleware/requirePermission.js +1 -2
- package/dist/middleware/runAuth.d.ts +4 -4
- package/dist/middleware/sessionAuth.d.ts +3 -3
- package/dist/middleware/sessionAuth.js +1 -2
- package/dist/middleware/tenantAccess.d.ts +2 -2
- package/dist/middleware/tracing.d.ts +3 -3
- package/package.json +4 -4
- package/dist/initialization.d.ts +0 -6
- package/dist/initialization.js +0 -72
|
@@ -1,4 +1,3 @@
|
|
|
1
|
-
import { env } from "../env.js";
|
|
2
1
|
import { createApiError } from "@inkeep/agents-core";
|
|
3
2
|
import { createMiddleware } from "hono/factory";
|
|
4
3
|
import { HTTPException } from "hono/http-exception";
|
|
@@ -33,7 +32,7 @@ const sessionAuth = () => createMiddleware(async (c, next) => {
|
|
|
33
32
|
*/
|
|
34
33
|
const sessionContext = () => createMiddleware(async (c, next) => {
|
|
35
34
|
const auth = c.get("auth");
|
|
36
|
-
if (
|
|
35
|
+
if (!auth) {
|
|
37
36
|
c.set("user", null);
|
|
38
37
|
c.set("session", null);
|
|
39
38
|
await next();
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono6 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/tenantAccess.d.ts
|
|
4
4
|
|
|
@@ -11,7 +11,7 @@ import * as hono15 from "hono";
|
|
|
11
11
|
* - API key user: Access only to the tenant associated with the API key
|
|
12
12
|
* - Session user: Access based on organization membership
|
|
13
13
|
*/
|
|
14
|
-
declare const requireTenantAccess: () =>
|
|
14
|
+
declare const requireTenantAccess: () => hono6.MiddlewareHandler<{
|
|
15
15
|
Variables: {
|
|
16
16
|
userId: string;
|
|
17
17
|
tenantId: string;
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono7 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/tracing.d.ts
|
|
4
|
-
declare const otelBaggageMiddleware: () =>
|
|
5
|
-
declare const executionBaggageMiddleware: () =>
|
|
4
|
+
declare const otelBaggageMiddleware: () => hono7.MiddlewareHandler<any, string, {}, Response>;
|
|
5
|
+
declare const executionBaggageMiddleware: () => hono7.MiddlewareHandler<any, string, {}, Response>;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { executionBaggageMiddleware, otelBaggageMiddleware };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@inkeep/agents-api",
|
|
3
|
-
"version": "0.0.0-dev-
|
|
3
|
+
"version": "0.0.0-dev-20260129163144",
|
|
4
4
|
"description": "Unified Inkeep Agents API - combines management, runtime, and evaluation capabilities",
|
|
5
5
|
"types": "dist/index.d.ts",
|
|
6
6
|
"exports": {
|
|
@@ -66,9 +66,9 @@
|
|
|
66
66
|
"openid-client": "^6.8.1",
|
|
67
67
|
"pg": "^8.16.3",
|
|
68
68
|
"workflow": "4.0.1-beta.33",
|
|
69
|
-
"@inkeep/agents-core": "^0.0.0-dev-
|
|
70
|
-
"@inkeep/agents-manage-mcp": "^0.0.0-dev-
|
|
71
|
-
"@inkeep/agents-mcp": "^0.0.0-dev-
|
|
69
|
+
"@inkeep/agents-core": "^0.0.0-dev-20260129163144",
|
|
70
|
+
"@inkeep/agents-manage-mcp": "^0.0.0-dev-20260129163144",
|
|
71
|
+
"@inkeep/agents-mcp": "^0.0.0-dev-20260129163144"
|
|
72
72
|
},
|
|
73
73
|
"peerDependencies": {
|
|
74
74
|
"@hono/zod-openapi": "^1.1.5",
|
package/dist/initialization.d.ts
DELETED
package/dist/initialization.js
DELETED
|
@@ -1,72 +0,0 @@
|
|
|
1
|
-
import { getLogger as getLogger$1 } from "./logger.js";
|
|
2
|
-
import { env } from "./env.js";
|
|
3
|
-
import runDbClient_default from "./data/db/runDbClient.js";
|
|
4
|
-
import { OrgRoles, addUserToOrganization, getUserByEmail, syncOrgMemberToSpiceDb, upsertOrganization } from "@inkeep/agents-core";
|
|
5
|
-
|
|
6
|
-
//#region src/initialization.ts
|
|
7
|
-
const logger = getLogger$1("initialization");
|
|
8
|
-
async function initializeDefaultUser(authInstance) {
|
|
9
|
-
const { INKEEP_AGENTS_MANAGE_UI_USERNAME, INKEEP_AGENTS_MANAGE_UI_PASSWORD, DISABLE_AUTH } = env;
|
|
10
|
-
const hasCredentials = INKEEP_AGENTS_MANAGE_UI_USERNAME && INKEEP_AGENTS_MANAGE_UI_PASSWORD;
|
|
11
|
-
const orgId = env.TENANT_ID;
|
|
12
|
-
const { created } = await upsertOrganization(runDbClient_default)({
|
|
13
|
-
organizationId: orgId,
|
|
14
|
-
name: env.TENANT_ID,
|
|
15
|
-
slug: env.TENANT_ID,
|
|
16
|
-
logo: null,
|
|
17
|
-
metadata: null
|
|
18
|
-
});
|
|
19
|
-
if (created) logger.info({ organizationId: orgId }, "Created default organization");
|
|
20
|
-
else logger.info({ organizationId: orgId }, "Organization already exists");
|
|
21
|
-
if (!hasCredentials || DISABLE_AUTH || !authInstance) {
|
|
22
|
-
logger.info({ hasCredentials: false }, "Skipping default user creation");
|
|
23
|
-
return;
|
|
24
|
-
}
|
|
25
|
-
try {
|
|
26
|
-
let user = await getUserByEmail(runDbClient_default)(INKEEP_AGENTS_MANAGE_UI_USERNAME);
|
|
27
|
-
if (user) logger.info({
|
|
28
|
-
email: INKEEP_AGENTS_MANAGE_UI_USERNAME,
|
|
29
|
-
userId: user.id
|
|
30
|
-
}, "Default user already exists");
|
|
31
|
-
else {
|
|
32
|
-
logger.info({ email: INKEEP_AGENTS_MANAGE_UI_USERNAME }, "Creating default user with Better Auth...");
|
|
33
|
-
if (!(await authInstance.api.signUpEmail({ body: {
|
|
34
|
-
email: INKEEP_AGENTS_MANAGE_UI_USERNAME,
|
|
35
|
-
password: INKEEP_AGENTS_MANAGE_UI_PASSWORD,
|
|
36
|
-
name: INKEEP_AGENTS_MANAGE_UI_USERNAME.split("@")[0]
|
|
37
|
-
} })).user) throw new Error("signUpEmail returned no user");
|
|
38
|
-
user = await getUserByEmail(runDbClient_default)(INKEEP_AGENTS_MANAGE_UI_USERNAME);
|
|
39
|
-
if (!user) throw new Error("User was created but could not be retrieved from database");
|
|
40
|
-
logger.info({
|
|
41
|
-
email: user.email,
|
|
42
|
-
id: user.id
|
|
43
|
-
}, "Default user created from INKEEP_AGENTS_MANAGE_UI_USERNAME/INKEEP_AGENTS_MANAGE_UI_PASSWORD");
|
|
44
|
-
}
|
|
45
|
-
await addUserToOrganization(runDbClient_default)({
|
|
46
|
-
userId: user.id,
|
|
47
|
-
organizationId: orgId,
|
|
48
|
-
role: OrgRoles.ADMIN
|
|
49
|
-
});
|
|
50
|
-
await syncOrgMemberToSpiceDb({
|
|
51
|
-
tenantId: orgId,
|
|
52
|
-
userId: user.id,
|
|
53
|
-
role: OrgRoles.ADMIN,
|
|
54
|
-
action: "add"
|
|
55
|
-
});
|
|
56
|
-
console.log(`🔐 SpiceDB: Synced member ${user.email} as ${OrgRoles.ADMIN} to org ${orgId}`);
|
|
57
|
-
logger.info({
|
|
58
|
-
organizationId: orgId,
|
|
59
|
-
organizationSlug: env.TENANT_ID,
|
|
60
|
-
userId: user.id,
|
|
61
|
-
email: INKEEP_AGENTS_MANAGE_UI_USERNAME
|
|
62
|
-
}, "Initialization complete - login with these credentials");
|
|
63
|
-
} catch (error) {
|
|
64
|
-
logger.error({
|
|
65
|
-
error,
|
|
66
|
-
email: INKEEP_AGENTS_MANAGE_UI_USERNAME
|
|
67
|
-
}, "Failed to create default user");
|
|
68
|
-
}
|
|
69
|
-
}
|
|
70
|
-
|
|
71
|
-
//#endregion
|
|
72
|
-
export { initializeDefaultUser };
|