@inkeep/agents-api 0.0.0-dev-20260209221416 → 0.0.0-dev-20260209233018

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. package/dist/.well-known/workflow/v1/manifest.debug.json +5 -5
  2. package/dist/.well-known/workflow/v1/step.cjs +15 -3
  3. package/dist/createApp.d.ts +2 -2
  4. package/dist/data/db/runDbClient.d.ts +2 -2
  5. package/dist/domains/evals/routes/datasetTriggers.d.ts +2 -2
  6. package/dist/domains/evals/routes/index.d.ts +2 -2
  7. package/dist/domains/evals/workflow/routes.d.ts +2 -2
  8. package/dist/domains/manage/routes/availableAgents.d.ts +2 -2
  9. package/dist/domains/manage/routes/conversations.d.ts +2 -2
  10. package/dist/domains/manage/routes/index.d.ts +2 -2
  11. package/dist/domains/manage/routes/mcp.d.ts +2 -2
  12. package/dist/domains/manage/routes/passwordResetLinks.d.ts +2 -2
  13. package/dist/domains/manage/routes/signoz.d.ts +2 -2
  14. package/dist/domains/manage/routes/users.d.ts +2 -2
  15. package/dist/domains/mcp/routes/mcp.d.ts +2 -2
  16. package/dist/domains/run/agents/Agent.js +18 -14
  17. package/dist/domains/run/agents/relationTools.d.ts +2 -2
  18. package/dist/domains/run/services/PendingToolApprovalManager.js +1 -1
  19. package/dist/domains/run/services/ToolApprovalUiBus.d.ts +1 -0
  20. package/dist/domains/run/services/ToolApprovalUiBus.js +2 -1
  21. package/dist/domains/run/utils/tool-result.d.ts +11 -0
  22. package/dist/domains/run/utils/tool-result.js +15 -0
  23. package/dist/env.d.ts +2 -2
  24. package/dist/factory.d.ts +21 -21
  25. package/dist/index.d.ts +18 -18
  26. package/dist/middleware/projectConfig.d.ts +3 -3
  27. package/dist/middleware/requirePermission.d.ts +2 -2
  28. package/dist/middleware/runAuth.d.ts +4 -4
  29. package/dist/middleware/sessionAuth.d.ts +3 -3
  30. package/dist/middleware/tenantAccess.d.ts +2 -2
  31. package/package.json +5 -5
@@ -41,15 +41,15 @@
41
41
  }
42
42
  },
43
43
  "workflows": {
44
- "src/domains/evals/workflow/functions/runDatasetItem.ts": {
45
- "_runDatasetItemWorkflow": {
46
- "workflowId": "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
47
- }
48
- },
49
44
  "src/domains/evals/workflow/functions/evaluateConversation.ts": {
50
45
  "_evaluateConversationWorkflow": {
51
46
  "workflowId": "workflow//src/domains/evals/workflow/functions/evaluateConversation.ts//_evaluateConversationWorkflow"
52
47
  }
48
+ },
49
+ "src/domains/evals/workflow/functions/runDatasetItem.ts": {
50
+ "_runDatasetItemWorkflow": {
51
+ "workflowId": "workflow//src/domains/evals/workflow/functions/runDatasetItem.ts//_runDatasetItemWorkflow"
52
+ }
53
53
  }
54
54
  }
55
55
  }
@@ -180088,7 +180088,11 @@ function createAgentsManageDatabasePool(config4) {
180088
180088
  if (!connectionString) throw new Error("INKEEP_AGENTS_MANAGE_DATABASE_URL environment variable is required. Please set it to your PostgreSQL connection string.");
180089
180089
  const pool2 = new Pool({
180090
180090
  connectionString,
180091
- max: config4.poolSize || Number(env.POSTGRES_POOL_SIZE) || 100
180091
+ max: config4.poolSize || Number(env.POSTGRES_POOL_SIZE) || 100,
180092
+ keepAlive: true,
180093
+ keepAliveInitialDelayMillis: 6e4,
180094
+ connectionTimeoutMillis: 1e4,
180095
+ idleTimeoutMillis: 3e4
180092
180096
  });
180093
180097
  pool2.on("error", (err2) => {
180094
180098
  console.error("Unexpected PostgreSQL pool error:", err2);
@@ -180102,7 +180106,11 @@ function createAgentsManageDatabaseClient(config4) {
180102
180106
  if (!connectionString) throw new Error("INKEEP_AGENTS_MANAGE_DATABASE_URL environment variable is required. Please set it to your PostgreSQL connection string.");
180103
180107
  const pool2 = new Pool({
180104
180108
  connectionString,
180105
- max: config4.poolSize || Number(env.POSTGRES_POOL_SIZE) || 100
180109
+ max: config4.poolSize || Number(env.POSTGRES_POOL_SIZE) || 100,
180110
+ keepAlive: true,
180111
+ keepAliveInitialDelayMillis: 6e4,
180112
+ connectionTimeoutMillis: 1e4,
180113
+ idleTimeoutMillis: 3e4
180106
180114
  });
180107
180115
  pool2.on("error", (err2) => {
180108
180116
  console.error("Unexpected PostgreSQL pool error:", err2);
@@ -180130,7 +180138,11 @@ function createAgentsRunDatabaseClient(config4) {
180130
180138
  if (!connectionString) throw new Error("INKEEP_AGENTS_RUN_DATABASE_URL environment variable is required. Please set it to your PostgreSQL connection string.");
180131
180139
  const pool2 = new Pool({
180132
180140
  connectionString,
180133
- max: config4?.poolSize || Number(env.POSTGRES_POOL_SIZE) || 100
180141
+ max: config4?.poolSize || Number(env.POSTGRES_POOL_SIZE) || 100,
180142
+ keepAlive: true,
180143
+ keepAliveInitialDelayMillis: 6e4,
180144
+ connectionTimeoutMillis: 1e4,
180145
+ idleTimeoutMillis: 3e4
180134
180146
  });
180135
180147
  pool2.on("error", (err2) => {
180136
180148
  console.error("Unexpected PostgreSQL pool error:", err2);
@@ -1,10 +1,10 @@
1
1
  import { AppConfig } from "./types/app.js";
2
2
  import "./types/index.js";
3
3
  import { Hono } from "hono";
4
- import * as hono_types11 from "hono/types";
4
+ import * as hono_types0 from "hono/types";
5
5
 
6
6
  //#region src/createApp.d.ts
7
7
  declare const isWebhookRoute: (path: string) => boolean;
8
- declare function createAgentsHono(config: AppConfig): Hono<hono_types11.BlankEnv, hono_types11.BlankSchema, "/">;
8
+ declare function createAgentsHono(config: AppConfig): Hono<hono_types0.BlankEnv, hono_types0.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { createAgentsHono, isWebhookRoute };
@@ -1,6 +1,6 @@
1
- import * as _inkeep_agents_core2 from "@inkeep/agents-core";
1
+ import * as _inkeep_agents_core0 from "@inkeep/agents-core";
2
2
 
3
3
  //#region src/data/db/runDbClient.d.ts
4
- declare const runDbClient: _inkeep_agents_core2.AgentsRunDatabaseClient;
4
+ declare const runDbClient: _inkeep_agents_core0.AgentsRunDatabaseClient;
5
5
  //#endregion
6
6
  export { runDbClient as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono14 from "hono";
2
+ import * as hono15 from "hono";
3
3
 
4
4
  //#region src/domains/evals/routes/datasetTriggers.d.ts
5
- declare const app: OpenAPIHono<hono14.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono15.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono18 from "hono";
2
+ import * as hono16 from "hono";
3
3
 
4
4
  //#region src/domains/evals/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono18.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono16.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types5 from "hono/types";
2
+ import * as hono_types6 from "hono/types";
3
3
 
4
4
  //#region src/domains/evals/workflow/routes.d.ts
5
- declare const workflowRoutes: Hono<hono_types5.BlankEnv, hono_types5.BlankSchema, "/">;
5
+ declare const workflowRoutes: Hono<hono_types6.BlankEnv, hono_types6.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { workflowRoutes };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono15 from "hono";
2
+ import * as hono14 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/availableAgents.d.ts
5
- declare const app: OpenAPIHono<hono15.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono14.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono16 from "hono";
2
+ import * as hono17 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/conversations.d.ts
5
- declare const app: OpenAPIHono<hono16.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono17.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono17 from "hono";
2
+ import * as hono9 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono17.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono9.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types9 from "hono/types";
2
+ import * as hono_types4 from "hono/types";
3
3
 
4
4
  //#region src/domains/manage/routes/mcp.d.ts
5
- declare const app: Hono<hono_types9.BlankEnv, hono_types9.BlankSchema, "/">;
5
+ declare const app: Hono<hono_types4.BlankEnv, hono_types4.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types4 from "hono/types";
3
+ import * as hono_types8 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/passwordResetLinks.d.ts
6
6
  declare const passwordResetLinksRoutes: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types4.BlankSchema, "/">;
8
+ }, hono_types8.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { passwordResetLinksRoutes as default };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types2 from "hono/types";
3
+ import * as hono_types10 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/signoz.d.ts
6
6
  declare const app: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types2.BlankSchema, "/">;
8
+ }, hono_types10.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { app as default };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types1 from "hono/types";
3
+ import * as hono_types9 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/users.d.ts
6
6
  declare const usersRoutes: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types1.BlankSchema, "/">;
8
+ }, hono_types9.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { usersRoutes as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types7 from "hono/types";
2
+ import * as hono_types1 from "hono/types";
3
3
 
4
4
  //#region src/domains/mcp/routes/mcp.d.ts
5
- declare const app: Hono<hono_types7.BlankEnv, hono_types7.BlankSchema, "/">;
5
+ declare const app: Hono<hono_types1.BlankEnv, hono_types1.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -21,6 +21,7 @@ import { generateToolId } from "../utils/agent-operations.js";
21
21
  import { ArtifactCreateSchema, ArtifactReferenceSchema } from "../utils/artifact-component-schema.js";
22
22
  import { withJsonPostProcessing } from "../utils/json-postprocessor.js";
23
23
  import { calculateBreakdownTotal, estimateTokens } from "../utils/token-estimator.js";
24
+ import { createDeniedToolResult, isToolResultDenied } from "../utils/tool-result.js";
24
25
  import { createDelegateToAgentTool, createTransferToAgentTool } from "./relationTools.js";
25
26
  import { SystemPromptBuilder } from "./SystemPromptBuilder.js";
26
27
  import { PromptConfig, V1_BREAKDOWN_SCHEMA } from "./versions/v1/PromptConfig.js";
@@ -354,7 +355,7 @@ var Agent = class {
354
355
  needsApproval,
355
356
  inDelegatedAgent: this.isDelegatedAgent
356
357
  });
357
- const isDeniedResult = !!result && typeof result === "object" && "__inkeepToolDenied" in result && result.__inkeepToolDenied === true;
358
+ const isDeniedResult = isToolResultDenied(result);
358
359
  if (streamRequestId && streamHelper && !isInternalToolForUi) if (isDeniedResult) await streamHelper.writeToolOutputDenied({ toolCallId });
359
360
  else await streamHelper.writeToolOutputAvailable({
360
361
  toolCallId,
@@ -508,14 +509,16 @@ var Agent = class {
508
509
  if (streamRequestId$1) await toolApprovalUiBus.publish(streamRequestId$1, {
509
510
  type: "approval-resolved",
510
511
  toolCallId,
511
- approved: false
512
+ approved: false,
513
+ reason: approvalResult.reason
512
514
  });
513
515
  }
514
516
  return tracer.startActiveSpan("tool.approval_denied", { attributes: {
515
517
  "tool.name": toolName,
516
518
  "tool.callId": toolCallId,
517
519
  "subAgent.id": this.config.id,
518
- "subAgent.name": this.config.name
520
+ "subAgent.name": this.config.name,
521
+ "tool.approval.reason": approvalResult.reason
519
522
  } }, (denialSpan) => {
520
523
  logger.info({
521
524
  toolName,
@@ -524,11 +527,7 @@ var Agent = class {
524
527
  }, "Tool execution denied by user");
525
528
  denialSpan.setStatus({ code: SpanStatusCode.OK });
526
529
  denialSpan.end();
527
- return {
528
- __inkeepToolDenied: true,
529
- toolCallId,
530
- reason: approvalResult.reason
531
- };
530
+ return createDeniedToolResult(toolCallId, approvalResult.reason);
532
531
  });
533
532
  }
534
533
  tracer.startActiveSpan("tool.approval_approved", { attributes: {
@@ -926,7 +925,8 @@ var Agent = class {
926
925
  if (streamRequestId$1) await toolApprovalUiBus.publish(streamRequestId$1, {
927
926
  type: "approval-resolved",
928
927
  toolCallId,
929
- approved: false
928
+ approved: false,
929
+ reason: approvalResult.reason
930
930
  });
931
931
  }
932
932
  return tracer.startActiveSpan("tool.approval_denied", { attributes: {
@@ -942,11 +942,7 @@ var Agent = class {
942
942
  }, "Function tool execution denied by user");
943
943
  denialSpan.setStatus({ code: SpanStatusCode.OK });
944
944
  denialSpan.end();
945
- return {
946
- __inkeepToolDenied: true,
947
- toolCallId,
948
- reason: approvalResult.reason
949
- };
945
+ return createDeniedToolResult(toolCallId, approvalResult.reason);
950
946
  });
951
947
  }
952
948
  tracer.startActiveSpan("tool.approval_approved", { attributes: {
@@ -1445,6 +1441,14 @@ var Agent = class {
1445
1441
  */
1446
1442
  formatToolResult(toolName, args, result, toolCallId) {
1447
1443
  const input = args ? JSON.stringify(args, null, 2) : "No input";
1444
+ if (isToolResultDenied(result)) return [
1445
+ `## Tool: ${toolName}`,
1446
+ "",
1447
+ `### 🔧 TOOL_CALL_ID: ${toolCallId}`,
1448
+ "",
1449
+ `### Output`,
1450
+ result.reason
1451
+ ].join("\n");
1448
1452
  let parsedResult = result;
1449
1453
  if (typeof result === "string") try {
1450
1454
  parsedResult = JSON.parse(result);
@@ -1,6 +1,6 @@
1
1
  import { AgentConfig, DelegateRelation } from "./Agent.js";
2
2
  import { InternalRelation } from "../utils/project.js";
3
- import * as _inkeep_agents_core0 from "@inkeep/agents-core";
3
+ import * as _inkeep_agents_core1 from "@inkeep/agents-core";
4
4
  import { CredentialStoreRegistry, FullExecutionContext } from "@inkeep/agents-core";
5
5
  import * as ai0 from "ai";
6
6
 
@@ -44,7 +44,7 @@ declare function createDelegateToAgentTool({
44
44
  message: string;
45
45
  }, {
46
46
  toolCallId: any;
47
- result: _inkeep_agents_core0.Message | _inkeep_agents_core0.Task;
47
+ result: _inkeep_agents_core1.Message | _inkeep_agents_core1.Task;
48
48
  }>;
49
49
  /**
50
50
  * Parameters for building a transfer relation config
@@ -89,7 +89,7 @@ var PendingToolApprovalManager = class PendingToolApprovalManager {
89
89
  this.pendingApprovals.delete(toolCallId);
90
90
  approval.resolve({
91
91
  approved: false,
92
- reason: reason || "User denied approval"
92
+ reason: `The user declined to run this tool. ${reason ? `Reason: ${reason}` : ""}`
93
93
  });
94
94
  return true;
95
95
  }
@@ -10,6 +10,7 @@ type ToolApprovalUiEvent = {
10
10
  type: 'approval-resolved';
11
11
  toolCallId: string;
12
12
  approved: boolean;
13
+ reason?: string;
13
14
  };
14
15
  type Listener = (event: ToolApprovalUiEvent) => void | Promise<void>;
15
16
  /**
@@ -33,7 +33,8 @@ var ToolApprovalUiBus = class {
33
33
  streamRequestId,
34
34
  eventType: event.type,
35
35
  toolCallId: event.toolCallId,
36
- error: error instanceof Error ? error.message : String(error)
36
+ error: error instanceof Error ? error.message : String(error),
37
+ reason: event.reason
37
38
  }, "ToolApprovalUiBus listener failed");
38
39
  }
39
40
  }
@@ -0,0 +1,11 @@
1
+ //#region src/domains/run/utils/tool-result.d.ts
2
+ declare const INKEEP_TOOL_DENIED_KEY = "__inkeepToolDenied";
3
+ interface DeniedToolResult {
4
+ [INKEEP_TOOL_DENIED_KEY]: true;
5
+ toolCallId: string;
6
+ reason?: string;
7
+ }
8
+ declare function isToolResultDenied(result: unknown): result is DeniedToolResult;
9
+ declare function createDeniedToolResult(toolCallId: string, reason?: string): DeniedToolResult;
10
+ //#endregion
11
+ export { DeniedToolResult, INKEEP_TOOL_DENIED_KEY, createDeniedToolResult, isToolResultDenied };
@@ -0,0 +1,15 @@
1
+ //#region src/domains/run/utils/tool-result.ts
2
+ const INKEEP_TOOL_DENIED_KEY = "__inkeepToolDenied";
3
+ function isToolResultDenied(result) {
4
+ return !!result && typeof result === "object" && INKEEP_TOOL_DENIED_KEY in result && result[INKEEP_TOOL_DENIED_KEY] === true;
5
+ }
6
+ function createDeniedToolResult(toolCallId, reason) {
7
+ return {
8
+ [INKEEP_TOOL_DENIED_KEY]: true,
9
+ toolCallId,
10
+ reason
11
+ };
12
+ }
13
+
14
+ //#endregion
15
+ export { INKEEP_TOOL_DENIED_KEY, createDeniedToolResult, isToolResultDenied };
package/dist/env.d.ts CHANGED
@@ -14,11 +14,11 @@ declare const envSchema: z.ZodObject<{
14
14
  pentest: "pentest";
15
15
  }>>;
16
16
  LOG_LEVEL: z.ZodDefault<z.ZodEnum<{
17
+ error: "error";
17
18
  trace: "trace";
18
19
  debug: "debug";
19
20
  info: "info";
20
21
  warn: "warn";
21
- error: "error";
22
22
  }>>;
23
23
  INKEEP_AGENTS_MANAGE_DATABASE_URL: z.ZodString;
24
24
  INKEEP_AGENTS_RUN_DATABASE_URL: z.ZodString;
@@ -59,7 +59,7 @@ declare const envSchema: z.ZodObject<{
59
59
  declare const env: {
60
60
  NODE_ENV: "development" | "production" | "test";
61
61
  ENVIRONMENT: "development" | "production" | "test" | "pentest";
62
- LOG_LEVEL: "trace" | "debug" | "info" | "warn" | "error";
62
+ LOG_LEVEL: "error" | "trace" | "debug" | "info" | "warn";
63
63
  INKEEP_AGENTS_MANAGE_DATABASE_URL: string;
64
64
  INKEEP_AGENTS_RUN_DATABASE_URL: string;
65
65
  INKEEP_AGENTS_API_URL: string;
package/dist/factory.d.ts CHANGED
@@ -3,10 +3,10 @@ import "./types/index.js";
3
3
  import { createAgentsHono } from "./createApp.js";
4
4
  import { createAuth0Provider, createOIDCProvider } from "./ssoHelpers.js";
5
5
  import { CredentialStore, ServerConfig } from "@inkeep/agents-core";
6
- import * as hono0 from "hono";
6
+ import * as hono18 from "hono";
7
7
  import * as zod0 from "zod";
8
8
  import { SSOProviderConfig, UserAuthConfig } from "@inkeep/agents-core/auth";
9
- import * as hono_types0 from "hono/types";
9
+ import * as hono_types11 from "hono/types";
10
10
  import * as better_auth0 from "better-auth";
11
11
  import * as better_auth_plugins0 from "better-auth/plugins";
12
12
  import * as _better_auth_sso0 from "@better-auth/sso";
@@ -804,25 +804,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
804
804
  ac: better_auth_plugins0.AccessControl;
805
805
  roles: {
806
806
  member: {
807
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
808
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
807
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
808
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key];
809
809
  connector: "OR" | "AND";
810
810
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
811
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
811
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>;
812
812
  };
813
813
  admin: {
814
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
815
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
814
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
815
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key];
816
816
  connector: "OR" | "AND";
817
817
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
818
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
818
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>;
819
819
  };
820
820
  owner: {
821
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
822
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
821
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
822
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key];
823
823
  connector: "OR" | "AND";
824
824
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
825
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
825
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>;
826
826
  };
827
827
  };
828
828
  creatorRole: "admin";
@@ -1127,25 +1127,25 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig): better_auth0
1127
1127
  ac: better_auth_plugins0.AccessControl;
1128
1128
  roles: {
1129
1129
  member: {
1130
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1131
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1130
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
1131
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key];
1132
1132
  connector: "OR" | "AND";
1133
1133
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1134
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1134
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>;
1135
1135
  };
1136
1136
  admin: {
1137
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1138
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1137
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
1138
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key];
1139
1139
  connector: "OR" | "AND";
1140
1140
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1141
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1141
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>;
1142
1142
  };
1143
1143
  owner: {
1144
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1145
- actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1144
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
1145
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>[key];
1146
1146
  connector: "OR" | "AND";
1147
1147
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1148
- statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1148
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins0.Statements>;
1149
1149
  };
1150
1150
  };
1151
1151
  creatorRole: "admin";
@@ -1570,6 +1570,6 @@ declare function createAgentsApp(config?: {
1570
1570
  credentialStores?: CredentialStore[];
1571
1571
  auth?: UserAuthConfig;
1572
1572
  sandboxConfig?: SandboxConfig;
1573
- }): hono0.Hono<hono_types0.BlankEnv, hono_types0.BlankSchema, "/">;
1573
+ }): hono18.Hono<hono_types11.BlankEnv, hono_types11.BlankSchema, "/">;
1574
1574
  //#endregion
1575
1575
  export { type SSOProviderConfig, type UserAuthConfig, createAgentsApp, createAgentsAuth, createAgentsHono, createAuth0Provider, createOIDCProvider };
package/dist/index.d.ts CHANGED
@@ -805,25 +805,25 @@ declare const auth: better_auth79.Auth<{
805
805
  ac: better_auth_plugins69.AccessControl;
806
806
  roles: {
807
807
  member: {
808
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
809
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
808
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key] | {
809
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key];
810
810
  connector: "OR" | "AND";
811
811
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
812
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
812
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>;
813
813
  };
814
814
  admin: {
815
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
816
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
815
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key] | {
816
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key];
817
817
  connector: "OR" | "AND";
818
818
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
819
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
819
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>;
820
820
  };
821
821
  owner: {
822
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
823
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
822
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key] | {
823
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key];
824
824
  connector: "OR" | "AND";
825
825
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
826
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
826
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>;
827
827
  };
828
828
  };
829
829
  creatorRole: "admin";
@@ -1128,25 +1128,25 @@ declare const auth: better_auth79.Auth<{
1128
1128
  ac: better_auth_plugins69.AccessControl;
1129
1129
  roles: {
1130
1130
  member: {
1131
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1132
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
1131
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key] | {
1132
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key];
1133
1133
  connector: "OR" | "AND";
1134
1134
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1135
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
1135
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>;
1136
1136
  };
1137
1137
  admin: {
1138
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1139
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
1138
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key] | {
1139
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key];
1140
1140
  connector: "OR" | "AND";
1141
1141
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1142
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
1142
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>;
1143
1143
  };
1144
1144
  owner: {
1145
- authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key] | {
1146
- actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>[key];
1145
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key] | {
1146
+ actions: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>[key];
1147
1147
  connector: "OR" | "AND";
1148
1148
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins69.AuthorizeResponse;
1149
- statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins69.Statements>;
1149
+ statements: better_auth_plugins69.Subset<"organization" | "member" | "invitation" | "project" | "ac" | "team", better_auth_plugins69.Statements>;
1150
1150
  };
1151
1151
  };
1152
1152
  creatorRole: "admin";
@@ -1,11 +1,11 @@
1
1
  import { BaseExecutionContext, ResolvedRef } from "@inkeep/agents-core";
2
- import * as hono10 from "hono";
2
+ import * as hono0 from "hono";
3
3
 
4
4
  //#region src/middleware/projectConfig.d.ts
5
5
  /**
6
6
  * Middleware that fetches the full project definition from the Management API
7
7
  */
8
- declare const projectConfigMiddleware: hono10.MiddlewareHandler<{
8
+ declare const projectConfigMiddleware: hono0.MiddlewareHandler<{
9
9
  Variables: {
10
10
  executionContext: BaseExecutionContext;
11
11
  resolvedRef: ResolvedRef;
@@ -15,7 +15,7 @@ declare const projectConfigMiddleware: hono10.MiddlewareHandler<{
15
15
  * Creates a middleware that applies project config fetching except for specified route patterns
16
16
  * @param skipRouteCheck - Function that returns true if the route should skip the middleware
17
17
  */
18
- declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono10.MiddlewareHandler<{
18
+ declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono0.MiddlewareHandler<{
19
19
  Variables: {
20
20
  executionContext: BaseExecutionContext;
21
21
  resolvedRef: ResolvedRef;
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono4 from "hono";
2
+ import * as hono11 from "hono";
3
3
 
4
4
  //#region src/middleware/requirePermission.d.ts
5
5
  type Permission = {
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
9
9
  Variables: ManageAppVariables;
10
10
  } = {
11
11
  Variables: ManageAppVariables;
12
- }>(permissions: Permission) => hono4.MiddlewareHandler<Env$1, string, {}, Response>;
12
+ }>(permissions: Permission) => hono11.MiddlewareHandler<Env$1, string, {}, Response>;
13
13
  //#endregion
14
14
  export { requirePermission };
@@ -1,8 +1,8 @@
1
1
  import { BaseExecutionContext } from "@inkeep/agents-core";
2
- import * as hono5 from "hono";
2
+ import * as hono4 from "hono";
3
3
 
4
4
  //#region src/middleware/runAuth.d.ts
5
- declare const runApiKeyAuth: () => hono5.MiddlewareHandler<{
5
+ declare const runApiKeyAuth: () => hono4.MiddlewareHandler<{
6
6
  Variables: {
7
7
  executionContext: BaseExecutionContext;
8
8
  };
@@ -11,7 +11,7 @@ declare const runApiKeyAuth: () => hono5.MiddlewareHandler<{
11
11
  * Creates a middleware that applies API key authentication except for specified route patterns
12
12
  * @param skipRouteCheck - Function that returns true if the route should skip authentication
13
13
  */
14
- declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono5.MiddlewareHandler<{
14
+ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono4.MiddlewareHandler<{
15
15
  Variables: {
16
16
  executionContext: BaseExecutionContext;
17
17
  };
@@ -20,7 +20,7 @@ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =
20
20
  * Helper middleware for endpoints that optionally support API key authentication
21
21
  * If no auth header is present, it continues without setting the executionContext
22
22
  */
23
- declare const runOptionalAuth: () => hono5.MiddlewareHandler<{
23
+ declare const runOptionalAuth: () => hono4.MiddlewareHandler<{
24
24
  Variables: {
25
25
  executionContext?: BaseExecutionContext;
26
26
  };
@@ -1,4 +1,4 @@
1
- import * as hono8 from "hono";
1
+ import * as hono7 from "hono";
2
2
 
3
3
  //#region src/middleware/sessionAuth.d.ts
4
4
 
@@ -7,11 +7,11 @@ import * as hono8 from "hono";
7
7
  * Requires that a user has already been authenticated via Better Auth session.
8
8
  * Used primarily for manage routes that require an active user session.
9
9
  */
10
- declare const sessionAuth: () => hono8.MiddlewareHandler<any, string, {}, Response>;
10
+ declare const sessionAuth: () => hono7.MiddlewareHandler<any, string, {}, Response>;
11
11
  /**
12
12
  * Global session middleware - sets user and session in context for all routes
13
13
  * Used for all routes that require an active user session.
14
14
  */
15
- declare const sessionContext: () => hono8.MiddlewareHandler<any, string, {}, Response>;
15
+ declare const sessionContext: () => hono7.MiddlewareHandler<any, string, {}, Response>;
16
16
  //#endregion
17
17
  export { sessionAuth, sessionContext };
@@ -1,4 +1,4 @@
1
- import * as hono0 from "hono";
1
+ import * as hono10 from "hono";
2
2
 
3
3
  //#region src/middleware/tenantAccess.d.ts
4
4
 
@@ -11,7 +11,7 @@ import * as hono0 from "hono";
11
11
  * - API key user: Access only to the tenant associated with the API key
12
12
  * - Session user: Access based on organization membership
13
13
  */
14
- declare const requireTenantAccess: () => hono0.MiddlewareHandler<{
14
+ declare const requireTenantAccess: () => hono10.MiddlewareHandler<{
15
15
  Variables: {
16
16
  userId: string;
17
17
  tenantId: string;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@inkeep/agents-api",
3
- "version": "0.0.0-dev-20260209221416",
3
+ "version": "0.0.0-dev-20260209233018",
4
4
  "description": "Unified Inkeep Agents API - combines management, runtime, and evaluation capabilities",
5
5
  "types": "dist/index.d.ts",
6
6
  "exports": {
@@ -66,10 +66,10 @@
66
66
  "openid-client": "^6.8.1",
67
67
  "pg": "^8.16.3",
68
68
  "workflow": "4.0.1-beta.33",
69
- "@inkeep/agents-core": "^0.0.0-dev-20260209221416",
70
- "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260209221416",
71
- "@inkeep/agents-mcp": "^0.0.0-dev-20260209221416",
72
- "@inkeep/agents-work-apps": "^0.0.0-dev-20260209221416"
69
+ "@inkeep/agents-core": "^0.0.0-dev-20260209233018",
70
+ "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260209233018",
71
+ "@inkeep/agents-mcp": "^0.0.0-dev-20260209233018",
72
+ "@inkeep/agents-work-apps": "^0.0.0-dev-20260209233018"
73
73
  },
74
74
  "peerDependencies": {
75
75
  "@hono/zod-openapi": "^1.1.5",