@inkeep/agents-api 0.0.0-dev-20260403132729 → 0.0.0-dev-20260403190627

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -12,9 +12,18 @@
12
12
  "stepId": "__builtin_response_text"
13
13
  }
14
14
  },
15
- "node_modules/.pnpm/workflow@4.2.0-beta.67_@nestjs+common@11.1.13_reflect-metadata@0.2.2_rxjs@7.8.2__@nestj_ae349ba339a6edc79d2e07638ba82f4b/node_modules/workflow/dist/stdlib.js": {
16
- "fetch": {
17
- "stepId": "step//workflow@4.2.0-beta.67//fetch"
15
+ "src/domains/evals/workflow/functions/evaluateConversation.ts": {
16
+ "executeEvaluatorStep": {
17
+ "stepId": "step//./src/domains/evals/workflow/functions/evaluateConversation//executeEvaluatorStep"
18
+ },
19
+ "getConversationStep": {
20
+ "stepId": "step//./src/domains/evals/workflow/functions/evaluateConversation//getConversationStep"
21
+ },
22
+ "getEvaluatorsStep": {
23
+ "stepId": "step//./src/domains/evals/workflow/functions/evaluateConversation//getEvaluatorsStep"
24
+ },
25
+ "logStep": {
26
+ "stepId": "step//./src/domains/evals/workflow/functions/evaluateConversation//logStep"
18
27
  }
19
28
  },
20
29
  "src/domains/run/workflow/steps/schedulerSteps.ts": {
@@ -31,18 +40,9 @@
31
40
  "stepId": "step//./src/domains/run/workflow/steps/schedulerSteps//registerSchedulerStep"
32
41
  }
33
42
  },
34
- "src/domains/evals/workflow/functions/evaluateConversation.ts": {
35
- "executeEvaluatorStep": {
36
- "stepId": "step//./src/domains/evals/workflow/functions/evaluateConversation//executeEvaluatorStep"
37
- },
38
- "getConversationStep": {
39
- "stepId": "step//./src/domains/evals/workflow/functions/evaluateConversation//getConversationStep"
40
- },
41
- "getEvaluatorsStep": {
42
- "stepId": "step//./src/domains/evals/workflow/functions/evaluateConversation//getEvaluatorsStep"
43
- },
44
- "logStep": {
45
- "stepId": "step//./src/domains/evals/workflow/functions/evaluateConversation//logStep"
43
+ "node_modules/.pnpm/workflow@4.2.0-beta.67_@nestjs+common@11.1.13_reflect-metadata@0.2.2_rxjs@7.8.2__@nestj_ae349ba339a6edc79d2e07638ba82f4b/node_modules/workflow/dist/stdlib.js": {
44
+ "fetch": {
45
+ "stepId": "step//workflow@4.2.0-beta.67//fetch"
46
46
  }
47
47
  },
48
48
  "src/domains/evals/workflow/functions/runDatasetItem.ts": {
@@ -279,39 +279,6 @@
279
279
  }
280
280
  }
281
281
  },
282
- "src/domains/run/workflow/functions/agentExecution.ts": {
283
- "_agentExecutionWorkflow": {
284
- "workflowId": "workflow//./src/domains/run/workflow/functions/agentExecution//_agentExecutionWorkflow",
285
- "graph": {
286
- "nodes": [
287
- {
288
- "id": "start",
289
- "type": "workflowStart",
290
- "data": {
291
- "label": "Start: _agentExecutionWorkflow",
292
- "nodeKind": "workflow_start"
293
- }
294
- },
295
- {
296
- "id": "end",
297
- "type": "workflowEnd",
298
- "data": {
299
- "label": "Return",
300
- "nodeKind": "workflow_end"
301
- }
302
- }
303
- ],
304
- "edges": [
305
- {
306
- "id": "e_start_end",
307
- "source": "start",
308
- "target": "end",
309
- "type": "default"
310
- }
311
- ]
312
- }
313
- }
314
- },
315
282
  "src/domains/run/workflow/functions/schedulerWorkflow.ts": {
316
283
  "_schedulerWorkflow": {
317
284
  "workflowId": "workflow//./src/domains/run/workflow/functions/schedulerWorkflow//_schedulerWorkflow",
@@ -367,6 +334,39 @@
367
334
  ]
368
335
  }
369
336
  }
337
+ },
338
+ "src/domains/run/workflow/functions/agentExecution.ts": {
339
+ "_agentExecutionWorkflow": {
340
+ "workflowId": "workflow//./src/domains/run/workflow/functions/agentExecution//_agentExecutionWorkflow",
341
+ "graph": {
342
+ "nodes": [
343
+ {
344
+ "id": "start",
345
+ "type": "workflowStart",
346
+ "data": {
347
+ "label": "Start: _agentExecutionWorkflow",
348
+ "nodeKind": "workflow_start"
349
+ }
350
+ },
351
+ {
352
+ "id": "end",
353
+ "type": "workflowEnd",
354
+ "data": {
355
+ "label": "Return",
356
+ "nodeKind": "workflow_end"
357
+ }
358
+ }
359
+ ],
360
+ "edges": [
361
+ {
362
+ "id": "e_start_end",
363
+ "source": "start",
364
+ "target": "end",
365
+ "type": "default"
366
+ }
367
+ ]
368
+ }
369
+ }
370
370
  }
371
371
  },
372
372
  "classes": {}
@@ -1,10 +1,10 @@
1
1
  import { AppConfig } from "./types/app.js";
2
2
  import "./types/index.js";
3
3
  import { Hono } from "hono";
4
- import * as hono_types9 from "hono/types";
4
+ import * as hono_types0 from "hono/types";
5
5
 
6
6
  //#region src/createApp.d.ts
7
7
  declare const isWebhookRoute: (path: string) => boolean;
8
- declare function createAgentsHono(config: AppConfig): Hono<hono_types9.BlankEnv, hono_types9.BlankSchema, "/">;
8
+ declare function createAgentsHono(config: AppConfig): Hono<hono_types0.BlankEnv, hono_types0.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { createAgentsHono, isWebhookRoute };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types0 from "hono/types";
2
+ import * as hono_types3 from "hono/types";
3
3
 
4
4
  //#region src/domains/evals/workflow/routes.d.ts
5
- declare const workflowRoutes: Hono<hono_types0.BlankEnv, hono_types0.BlankSchema, "/">;
5
+ declare const workflowRoutes: Hono<hono_types3.BlankEnv, hono_types3.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { workflowRoutes };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types0 from "hono/types";
3
+ import * as hono_types7 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/authLookup.d.ts
6
6
  declare const authLookupRoutes: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types0.BlankSchema, "/">;
8
+ }, hono_types7.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { authLookupRoutes as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono19 from "hono";
2
+ import * as hono6 from "hono";
3
3
 
4
4
  //#region src/domains/manage/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono19.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono6.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types13 from "hono/types";
3
+ import * as hono_types9 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/invitations.d.ts
6
6
  declare const invitationsRoutes: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types13.BlankSchema, "/">;
8
+ }, hono_types9.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { invitationsRoutes as default };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types11 from "hono/types";
3
+ import * as hono_types10 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/passwordResetLinks.d.ts
6
6
  declare const passwordResetLinksRoutes: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types11.BlankSchema, "/">;
8
+ }, hono_types10.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { passwordResetLinksRoutes as default };
@@ -1,10 +1,10 @@
1
1
  import { ManageAppVariables } from "../../../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types12 from "hono/types";
3
+ import * as hono_types11 from "hono/types";
4
4
 
5
5
  //#region src/domains/manage/routes/signoz.d.ts
6
6
  declare const app: Hono<{
7
7
  Variables: ManageAppVariables;
8
- }, hono_types12.BlankSchema, "/">;
8
+ }, hono_types11.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types2 from "hono/types";
2
+ import * as hono_types5 from "hono/types";
3
3
 
4
4
  //#region src/domains/mcp/routes/mcp.d.ts
5
- declare const app: Hono<hono_types2.BlankEnv, hono_types2.BlankSchema, "/">;
5
+ declare const app: Hono<hono_types5.BlankEnv, hono_types5.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,8 +1,8 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono0 from "hono";
2
+ import * as hono5 from "hono";
3
3
 
4
4
  //#region src/domains/run/routes/auth.d.ts
5
5
  declare function getAnonJwtSecret(): Uint8Array;
6
- declare const app: OpenAPIHono<hono0.Env, {}, "/">;
6
+ declare const app: OpenAPIHono<hono5.Env, {}, "/">;
7
7
  //#endregion
8
8
  export { app as default, getAnonJwtSecret };
@@ -71,7 +71,7 @@ declare function createInvocationIdempotentStep(params: {
71
71
  projectId: string;
72
72
  tenantId: string;
73
73
  id: string;
74
- status: "pending" | "failed" | "running" | "completed" | "cancelled";
74
+ status: "completed" | "pending" | "running" | "failed" | "cancelled";
75
75
  ref?: {
76
76
  type: "commit" | "tag" | "branch";
77
77
  name: string;
@@ -116,7 +116,7 @@ declare function markRunningStep(params: {
116
116
  projectId: string;
117
117
  tenantId: string;
118
118
  id: string;
119
- status: "pending" | "failed" | "running" | "completed" | "cancelled";
119
+ status: "completed" | "pending" | "running" | "failed" | "cancelled";
120
120
  ref?: {
121
121
  type: "commit" | "tag" | "branch";
122
122
  name: string;
@@ -148,7 +148,7 @@ declare function addConversationIdStep(params: {
148
148
  projectId: string;
149
149
  tenantId: string;
150
150
  id: string;
151
- status: "pending" | "failed" | "running" | "completed" | "cancelled";
151
+ status: "completed" | "pending" | "running" | "failed" | "cancelled";
152
152
  ref?: {
153
153
  type: "commit" | "tag" | "branch";
154
154
  name: string;
@@ -178,7 +178,7 @@ declare function markCompletedStep(params: {
178
178
  projectId: string;
179
179
  tenantId: string;
180
180
  id: string;
181
- status: "pending" | "failed" | "running" | "completed" | "cancelled";
181
+ status: "completed" | "pending" | "running" | "failed" | "cancelled";
182
182
  ref?: {
183
183
  type: "commit" | "tag" | "branch";
184
184
  name: string;
@@ -208,7 +208,7 @@ declare function markFailedStep(params: {
208
208
  projectId: string;
209
209
  tenantId: string;
210
210
  id: string;
211
- status: "pending" | "failed" | "running" | "completed" | "cancelled";
211
+ status: "completed" | "pending" | "running" | "failed" | "cancelled";
212
212
  ref?: {
213
213
  type: "commit" | "tag" | "branch";
214
214
  name: string;
@@ -257,7 +257,7 @@ declare function resetInvocationToPendingStep(params: {
257
257
  projectId: string;
258
258
  tenantId: string;
259
259
  id: string;
260
- status: "pending" | "failed" | "running" | "completed" | "cancelled";
260
+ status: "completed" | "pending" | "running" | "failed" | "cancelled";
261
261
  ref?: {
262
262
  type: "commit" | "tag" | "branch";
263
263
  name: string;
package/dist/factory.d.ts CHANGED
@@ -2,44 +2,44 @@ import { SandboxConfig } from "./types/app.js";
2
2
  import "./types/index.js";
3
3
  import { createAgentsHono } from "./createApp.js";
4
4
  import { CredentialStore, ServerConfig } from "@inkeep/agents-core";
5
- import * as hono18 from "hono";
6
- import * as zod32 from "zod";
5
+ import * as hono0 from "hono";
6
+ import * as zod0 from "zod";
7
7
  import { EmailServiceConfig, SSOProviderConfig, UserAuthConfig } from "@inkeep/agents-core/auth";
8
- import * as hono_types6 from "hono/types";
9
- import * as better_auth43 from "better-auth";
10
- import * as better_auth_plugins4 from "better-auth/plugins";
8
+ import * as hono_types1 from "hono/types";
9
+ import * as better_auth0 from "better-auth";
10
+ import * as better_auth_plugins0 from "better-auth/plugins";
11
11
 
12
12
  //#region src/factory.d.ts
13
- declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?: EmailServiceConfig): better_auth43.Auth<{
13
+ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?: EmailServiceConfig): better_auth0.Auth<{
14
14
  plugins: [{
15
15
  id: "bearer";
16
16
  hooks: {
17
17
  before: {
18
- matcher(context: better_auth43.HookEndpointContext): boolean;
19
- handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<{
18
+ matcher(context: better_auth0.HookEndpointContext): boolean;
19
+ handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<{
20
20
  context: {
21
21
  headers: Headers;
22
22
  };
23
23
  } | undefined>;
24
24
  }[];
25
25
  after: {
26
- matcher(context: better_auth43.HookEndpointContext): true;
27
- handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
26
+ matcher(context: better_auth0.HookEndpointContext): true;
27
+ handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
28
28
  }[];
29
29
  };
30
- options: better_auth_plugins4.BearerOptions | undefined;
30
+ options: better_auth_plugins0.BearerOptions | undefined;
31
31
  }, {
32
32
  id: "oauth-proxy";
33
- options: NoInfer<better_auth_plugins4.OAuthProxyOptions>;
33
+ options: NoInfer<better_auth_plugins0.OAuthProxyOptions>;
34
34
  endpoints: {
35
- oAuthProxy: better_auth43.StrictEndpoint<"/oauth-proxy-callback", {
35
+ oAuthProxy: better_auth0.StrictEndpoint<"/oauth-proxy-callback", {
36
36
  method: "GET";
37
37
  operationId: string;
38
- query: zod32.ZodObject<{
39
- callbackURL: zod32.ZodString;
40
- profile: zod32.ZodOptional<zod32.ZodString>;
41
- }, better_auth43.$strip>;
42
- use: ((inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>)[];
38
+ query: zod0.ZodObject<{
39
+ callbackURL: zod0.ZodString;
40
+ profile: zod0.ZodOptional<zod0.ZodString>;
41
+ }, better_auth0.$strip>;
42
+ use: ((inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>)[];
43
43
  metadata: {
44
44
  openapi: {
45
45
  operationId: string;
@@ -74,15 +74,15 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
74
74
  };
75
75
  hooks: {
76
76
  before: {
77
- matcher(context: better_auth43.HookEndpointContext): boolean;
78
- handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
77
+ matcher(context: better_auth0.HookEndpointContext): boolean;
78
+ handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
79
79
  }[];
80
80
  after: {
81
- matcher(context: better_auth43.HookEndpointContext): boolean;
82
- handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
81
+ matcher(context: better_auth0.HookEndpointContext): boolean;
82
+ handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
83
83
  }[];
84
84
  };
85
- }, better_auth_plugins4.DefaultOrganizationPlugin<{
85
+ }, better_auth_plugins0.DefaultOrganizationPlugin<{
86
86
  schema: {
87
87
  invitation: {
88
88
  additionalFields: {
@@ -152,19 +152,19 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
152
152
  };
153
153
  };
154
154
  endpoints: {
155
- deviceCode: better_auth43.StrictEndpoint<"/device/code", {
155
+ deviceCode: better_auth0.StrictEndpoint<"/device/code", {
156
156
  method: "POST";
157
- body: zod32.ZodObject<{
158
- client_id: zod32.ZodString;
159
- scope: zod32.ZodOptional<zod32.ZodString>;
160
- }, better_auth43.$strip>;
161
- error: zod32.ZodObject<{
162
- error: zod32.ZodEnum<{
157
+ body: zod0.ZodObject<{
158
+ client_id: zod0.ZodString;
159
+ scope: zod0.ZodOptional<zod0.ZodString>;
160
+ }, better_auth0.$strip>;
161
+ error: zod0.ZodObject<{
162
+ error: zod0.ZodEnum<{
163
163
  invalid_request: "invalid_request";
164
164
  invalid_client: "invalid_client";
165
165
  }>;
166
- error_description: zod32.ZodString;
167
- }, better_auth43.$strip>;
166
+ error_description: zod0.ZodString;
167
+ }, better_auth0.$strip>;
168
168
  metadata: {
169
169
  openapi: {
170
170
  description: string;
@@ -237,15 +237,15 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
237
237
  expires_in: number;
238
238
  interval: number;
239
239
  }>;
240
- deviceToken: better_auth43.StrictEndpoint<"/device/token", {
240
+ deviceToken: better_auth0.StrictEndpoint<"/device/token", {
241
241
  method: "POST";
242
- body: zod32.ZodObject<{
243
- grant_type: zod32.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
244
- device_code: zod32.ZodString;
245
- client_id: zod32.ZodString;
246
- }, better_auth43.$strip>;
247
- error: zod32.ZodObject<{
248
- error: zod32.ZodEnum<{
242
+ body: zod0.ZodObject<{
243
+ grant_type: zod0.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
244
+ device_code: zod0.ZodString;
245
+ client_id: zod0.ZodString;
246
+ }, better_auth0.$strip>;
247
+ error: zod0.ZodObject<{
248
+ error: zod0.ZodEnum<{
249
249
  invalid_request: "invalid_request";
250
250
  authorization_pending: "authorization_pending";
251
251
  slow_down: "slow_down";
@@ -253,8 +253,8 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
253
253
  access_denied: "access_denied";
254
254
  invalid_grant: "invalid_grant";
255
255
  }>;
256
- error_description: zod32.ZodString;
257
- }, better_auth43.$strip>;
256
+ error_description: zod0.ZodString;
257
+ }, better_auth0.$strip>;
258
258
  metadata: {
259
259
  openapi: {
260
260
  description: string;
@@ -305,17 +305,17 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
305
305
  expires_in: number;
306
306
  scope: string;
307
307
  }>;
308
- deviceVerify: better_auth43.StrictEndpoint<"/device", {
308
+ deviceVerify: better_auth0.StrictEndpoint<"/device", {
309
309
  method: "GET";
310
- query: zod32.ZodObject<{
311
- user_code: zod32.ZodString;
312
- }, better_auth43.$strip>;
313
- error: zod32.ZodObject<{
314
- error: zod32.ZodEnum<{
310
+ query: zod0.ZodObject<{
311
+ user_code: zod0.ZodString;
312
+ }, better_auth0.$strip>;
313
+ error: zod0.ZodObject<{
314
+ error: zod0.ZodEnum<{
315
315
  invalid_request: "invalid_request";
316
316
  }>;
317
- error_description: zod32.ZodString;
318
- }, better_auth43.$strip>;
317
+ error_description: zod0.ZodString;
318
+ }, better_auth0.$strip>;
319
319
  metadata: {
320
320
  openapi: {
321
321
  description: string;
@@ -348,21 +348,21 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
348
348
  user_code: string;
349
349
  status: string;
350
350
  }>;
351
- deviceApprove: better_auth43.StrictEndpoint<"/device/approve", {
351
+ deviceApprove: better_auth0.StrictEndpoint<"/device/approve", {
352
352
  method: "POST";
353
- body: zod32.ZodObject<{
354
- userCode: zod32.ZodString;
355
- }, better_auth43.$strip>;
356
- error: zod32.ZodObject<{
357
- error: zod32.ZodEnum<{
353
+ body: zod0.ZodObject<{
354
+ userCode: zod0.ZodString;
355
+ }, better_auth0.$strip>;
356
+ error: zod0.ZodObject<{
357
+ error: zod0.ZodEnum<{
358
358
  invalid_request: "invalid_request";
359
359
  expired_token: "expired_token";
360
360
  access_denied: "access_denied";
361
361
  device_code_already_processed: "device_code_already_processed";
362
362
  unauthorized: "unauthorized";
363
363
  }>;
364
- error_description: zod32.ZodString;
365
- }, better_auth43.$strip>;
364
+ error_description: zod0.ZodString;
365
+ }, better_auth0.$strip>;
366
366
  requireHeaders: true;
367
367
  metadata: {
368
368
  openapi: {
@@ -389,20 +389,20 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
389
389
  }, {
390
390
  success: boolean;
391
391
  }>;
392
- deviceDeny: better_auth43.StrictEndpoint<"/device/deny", {
392
+ deviceDeny: better_auth0.StrictEndpoint<"/device/deny", {
393
393
  method: "POST";
394
- body: zod32.ZodObject<{
395
- userCode: zod32.ZodString;
396
- }, better_auth43.$strip>;
397
- error: zod32.ZodObject<{
398
- error: zod32.ZodEnum<{
394
+ body: zod0.ZodObject<{
395
+ userCode: zod0.ZodString;
396
+ }, better_auth0.$strip>;
397
+ error: zod0.ZodObject<{
398
+ error: zod0.ZodEnum<{
399
399
  invalid_request: "invalid_request";
400
400
  expired_token: "expired_token";
401
401
  access_denied: "access_denied";
402
402
  unauthorized: "unauthorized";
403
403
  }>;
404
- error_description: zod32.ZodString;
405
- }, better_auth43.$strip>;
404
+ error_description: zod0.ZodString;
405
+ }, better_auth0.$strip>;
406
406
  requireHeaders: true;
407
407
  metadata: {
408
408
  openapi: {
@@ -431,22 +431,22 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
431
431
  }>;
432
432
  };
433
433
  $ERROR_CODES: {
434
- USER_NOT_FOUND: better_auth43.RawError<"USER_NOT_FOUND">;
435
- FAILED_TO_CREATE_SESSION: better_auth43.RawError<"FAILED_TO_CREATE_SESSION">;
436
- INVALID_DEVICE_CODE: better_auth43.RawError<"INVALID_DEVICE_CODE">;
437
- EXPIRED_DEVICE_CODE: better_auth43.RawError<"EXPIRED_DEVICE_CODE">;
438
- EXPIRED_USER_CODE: better_auth43.RawError<"EXPIRED_USER_CODE">;
439
- AUTHORIZATION_PENDING: better_auth43.RawError<"AUTHORIZATION_PENDING">;
440
- ACCESS_DENIED: better_auth43.RawError<"ACCESS_DENIED">;
441
- INVALID_USER_CODE: better_auth43.RawError<"INVALID_USER_CODE">;
442
- DEVICE_CODE_ALREADY_PROCESSED: better_auth43.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
443
- POLLING_TOO_FREQUENTLY: better_auth43.RawError<"POLLING_TOO_FREQUENTLY">;
444
- INVALID_DEVICE_CODE_STATUS: better_auth43.RawError<"INVALID_DEVICE_CODE_STATUS">;
445
- AUTHENTICATION_REQUIRED: better_auth43.RawError<"AUTHENTICATION_REQUIRED">;
434
+ USER_NOT_FOUND: better_auth0.RawError<"USER_NOT_FOUND">;
435
+ FAILED_TO_CREATE_SESSION: better_auth0.RawError<"FAILED_TO_CREATE_SESSION">;
436
+ INVALID_DEVICE_CODE: better_auth0.RawError<"INVALID_DEVICE_CODE">;
437
+ EXPIRED_DEVICE_CODE: better_auth0.RawError<"EXPIRED_DEVICE_CODE">;
438
+ EXPIRED_USER_CODE: better_auth0.RawError<"EXPIRED_USER_CODE">;
439
+ AUTHORIZATION_PENDING: better_auth0.RawError<"AUTHORIZATION_PENDING">;
440
+ ACCESS_DENIED: better_auth0.RawError<"ACCESS_DENIED">;
441
+ INVALID_USER_CODE: better_auth0.RawError<"INVALID_USER_CODE">;
442
+ DEVICE_CODE_ALREADY_PROCESSED: better_auth0.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
443
+ POLLING_TOO_FREQUENTLY: better_auth0.RawError<"POLLING_TOO_FREQUENTLY">;
444
+ INVALID_DEVICE_CODE_STATUS: better_auth0.RawError<"INVALID_DEVICE_CODE_STATUS">;
445
+ AUTHENTICATION_REQUIRED: better_auth0.RawError<"AUTHENTICATION_REQUIRED">;
446
446
  };
447
447
  options: Partial<{
448
- expiresIn: better_auth_plugins4.TimeString;
449
- interval: better_auth_plugins4.TimeString;
448
+ expiresIn: better_auth_plugins0.TimeString;
449
+ interval: better_auth_plugins0.TimeString;
450
450
  deviceCodeLength: number;
451
451
  userCodeLength: number;
452
452
  schema: {
@@ -479,6 +479,6 @@ declare function createAgentsApp(config?: {
479
479
  auth?: UserAuthConfig;
480
480
  sandboxConfig?: SandboxConfig;
481
481
  emailService?: EmailServiceConfig;
482
- }): hono18.Hono<hono_types6.BlankEnv, hono_types6.BlankSchema, "/">;
482
+ }): hono0.Hono<hono_types1.BlankEnv, hono_types1.BlankSchema, "/">;
483
483
  //#endregion
484
484
  export { type SSOProviderConfig, type UserAuthConfig, createAgentsApp, createAgentsAuth, createAgentsHono };
package/dist/index.d.ts CHANGED
@@ -5,42 +5,42 @@ import { NativeSandboxConfig, SandboxConfig, VercelSandboxConfig } from "./domai
5
5
  import { SSOProviderConfig, UserAuthConfig, createAgentsApp } from "./factory.js";
6
6
  import "./sentry.js";
7
7
  import { Hono } from "hono";
8
- import * as zod0 from "zod";
9
- import * as hono_types4 from "hono/types";
10
- import * as better_auth0 from "better-auth";
11
- import * as better_auth_plugins0 from "better-auth/plugins";
8
+ import * as zod32 from "zod";
9
+ import * as hono_types12 from "hono/types";
10
+ import * as better_auth43 from "better-auth";
11
+ import * as better_auth_plugins4 from "better-auth/plugins";
12
12
 
13
13
  //#region src/index.d.ts
14
- declare const auth: better_auth0.Auth<{
14
+ declare const auth: better_auth43.Auth<{
15
15
  plugins: [{
16
16
  id: "bearer";
17
17
  hooks: {
18
18
  before: {
19
- matcher(context: better_auth0.HookEndpointContext): boolean;
20
- handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<{
19
+ matcher(context: better_auth43.HookEndpointContext): boolean;
20
+ handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<{
21
21
  context: {
22
22
  headers: Headers;
23
23
  };
24
24
  } | undefined>;
25
25
  }[];
26
26
  after: {
27
- matcher(context: better_auth0.HookEndpointContext): true;
28
- handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
27
+ matcher(context: better_auth43.HookEndpointContext): true;
28
+ handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
29
29
  }[];
30
30
  };
31
- options: better_auth_plugins0.BearerOptions | undefined;
31
+ options: better_auth_plugins4.BearerOptions | undefined;
32
32
  }, {
33
33
  id: "oauth-proxy";
34
- options: NoInfer<better_auth_plugins0.OAuthProxyOptions>;
34
+ options: NoInfer<better_auth_plugins4.OAuthProxyOptions>;
35
35
  endpoints: {
36
- oAuthProxy: better_auth0.StrictEndpoint<"/oauth-proxy-callback", {
36
+ oAuthProxy: better_auth43.StrictEndpoint<"/oauth-proxy-callback", {
37
37
  method: "GET";
38
38
  operationId: string;
39
- query: zod0.ZodObject<{
40
- callbackURL: zod0.ZodString;
41
- profile: zod0.ZodOptional<zod0.ZodString>;
42
- }, better_auth0.$strip>;
43
- use: ((inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>)[];
39
+ query: zod32.ZodObject<{
40
+ callbackURL: zod32.ZodString;
41
+ profile: zod32.ZodOptional<zod32.ZodString>;
42
+ }, better_auth43.$strip>;
43
+ use: ((inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>)[];
44
44
  metadata: {
45
45
  openapi: {
46
46
  operationId: string;
@@ -75,15 +75,15 @@ declare const auth: better_auth0.Auth<{
75
75
  };
76
76
  hooks: {
77
77
  before: {
78
- matcher(context: better_auth0.HookEndpointContext): boolean;
79
- handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
78
+ matcher(context: better_auth43.HookEndpointContext): boolean;
79
+ handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
80
80
  }[];
81
81
  after: {
82
- matcher(context: better_auth0.HookEndpointContext): boolean;
83
- handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
82
+ matcher(context: better_auth43.HookEndpointContext): boolean;
83
+ handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
84
84
  }[];
85
85
  };
86
- }, better_auth_plugins0.DefaultOrganizationPlugin<{
86
+ }, better_auth_plugins4.DefaultOrganizationPlugin<{
87
87
  schema: {
88
88
  invitation: {
89
89
  additionalFields: {
@@ -153,19 +153,19 @@ declare const auth: better_auth0.Auth<{
153
153
  };
154
154
  };
155
155
  endpoints: {
156
- deviceCode: better_auth0.StrictEndpoint<"/device/code", {
156
+ deviceCode: better_auth43.StrictEndpoint<"/device/code", {
157
157
  method: "POST";
158
- body: zod0.ZodObject<{
159
- client_id: zod0.ZodString;
160
- scope: zod0.ZodOptional<zod0.ZodString>;
161
- }, better_auth0.$strip>;
162
- error: zod0.ZodObject<{
163
- error: zod0.ZodEnum<{
158
+ body: zod32.ZodObject<{
159
+ client_id: zod32.ZodString;
160
+ scope: zod32.ZodOptional<zod32.ZodString>;
161
+ }, better_auth43.$strip>;
162
+ error: zod32.ZodObject<{
163
+ error: zod32.ZodEnum<{
164
164
  invalid_request: "invalid_request";
165
165
  invalid_client: "invalid_client";
166
166
  }>;
167
- error_description: zod0.ZodString;
168
- }, better_auth0.$strip>;
167
+ error_description: zod32.ZodString;
168
+ }, better_auth43.$strip>;
169
169
  metadata: {
170
170
  openapi: {
171
171
  description: string;
@@ -238,15 +238,15 @@ declare const auth: better_auth0.Auth<{
238
238
  expires_in: number;
239
239
  interval: number;
240
240
  }>;
241
- deviceToken: better_auth0.StrictEndpoint<"/device/token", {
241
+ deviceToken: better_auth43.StrictEndpoint<"/device/token", {
242
242
  method: "POST";
243
- body: zod0.ZodObject<{
244
- grant_type: zod0.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
245
- device_code: zod0.ZodString;
246
- client_id: zod0.ZodString;
247
- }, better_auth0.$strip>;
248
- error: zod0.ZodObject<{
249
- error: zod0.ZodEnum<{
243
+ body: zod32.ZodObject<{
244
+ grant_type: zod32.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
245
+ device_code: zod32.ZodString;
246
+ client_id: zod32.ZodString;
247
+ }, better_auth43.$strip>;
248
+ error: zod32.ZodObject<{
249
+ error: zod32.ZodEnum<{
250
250
  invalid_request: "invalid_request";
251
251
  authorization_pending: "authorization_pending";
252
252
  slow_down: "slow_down";
@@ -254,8 +254,8 @@ declare const auth: better_auth0.Auth<{
254
254
  access_denied: "access_denied";
255
255
  invalid_grant: "invalid_grant";
256
256
  }>;
257
- error_description: zod0.ZodString;
258
- }, better_auth0.$strip>;
257
+ error_description: zod32.ZodString;
258
+ }, better_auth43.$strip>;
259
259
  metadata: {
260
260
  openapi: {
261
261
  description: string;
@@ -306,17 +306,17 @@ declare const auth: better_auth0.Auth<{
306
306
  expires_in: number;
307
307
  scope: string;
308
308
  }>;
309
- deviceVerify: better_auth0.StrictEndpoint<"/device", {
309
+ deviceVerify: better_auth43.StrictEndpoint<"/device", {
310
310
  method: "GET";
311
- query: zod0.ZodObject<{
312
- user_code: zod0.ZodString;
313
- }, better_auth0.$strip>;
314
- error: zod0.ZodObject<{
315
- error: zod0.ZodEnum<{
311
+ query: zod32.ZodObject<{
312
+ user_code: zod32.ZodString;
313
+ }, better_auth43.$strip>;
314
+ error: zod32.ZodObject<{
315
+ error: zod32.ZodEnum<{
316
316
  invalid_request: "invalid_request";
317
317
  }>;
318
- error_description: zod0.ZodString;
319
- }, better_auth0.$strip>;
318
+ error_description: zod32.ZodString;
319
+ }, better_auth43.$strip>;
320
320
  metadata: {
321
321
  openapi: {
322
322
  description: string;
@@ -349,21 +349,21 @@ declare const auth: better_auth0.Auth<{
349
349
  user_code: string;
350
350
  status: string;
351
351
  }>;
352
- deviceApprove: better_auth0.StrictEndpoint<"/device/approve", {
352
+ deviceApprove: better_auth43.StrictEndpoint<"/device/approve", {
353
353
  method: "POST";
354
- body: zod0.ZodObject<{
355
- userCode: zod0.ZodString;
356
- }, better_auth0.$strip>;
357
- error: zod0.ZodObject<{
358
- error: zod0.ZodEnum<{
354
+ body: zod32.ZodObject<{
355
+ userCode: zod32.ZodString;
356
+ }, better_auth43.$strip>;
357
+ error: zod32.ZodObject<{
358
+ error: zod32.ZodEnum<{
359
359
  invalid_request: "invalid_request";
360
360
  expired_token: "expired_token";
361
361
  access_denied: "access_denied";
362
362
  device_code_already_processed: "device_code_already_processed";
363
363
  unauthorized: "unauthorized";
364
364
  }>;
365
- error_description: zod0.ZodString;
366
- }, better_auth0.$strip>;
365
+ error_description: zod32.ZodString;
366
+ }, better_auth43.$strip>;
367
367
  requireHeaders: true;
368
368
  metadata: {
369
369
  openapi: {
@@ -390,20 +390,20 @@ declare const auth: better_auth0.Auth<{
390
390
  }, {
391
391
  success: boolean;
392
392
  }>;
393
- deviceDeny: better_auth0.StrictEndpoint<"/device/deny", {
393
+ deviceDeny: better_auth43.StrictEndpoint<"/device/deny", {
394
394
  method: "POST";
395
- body: zod0.ZodObject<{
396
- userCode: zod0.ZodString;
397
- }, better_auth0.$strip>;
398
- error: zod0.ZodObject<{
399
- error: zod0.ZodEnum<{
395
+ body: zod32.ZodObject<{
396
+ userCode: zod32.ZodString;
397
+ }, better_auth43.$strip>;
398
+ error: zod32.ZodObject<{
399
+ error: zod32.ZodEnum<{
400
400
  invalid_request: "invalid_request";
401
401
  expired_token: "expired_token";
402
402
  access_denied: "access_denied";
403
403
  unauthorized: "unauthorized";
404
404
  }>;
405
- error_description: zod0.ZodString;
406
- }, better_auth0.$strip>;
405
+ error_description: zod32.ZodString;
406
+ }, better_auth43.$strip>;
407
407
  requireHeaders: true;
408
408
  metadata: {
409
409
  openapi: {
@@ -432,22 +432,22 @@ declare const auth: better_auth0.Auth<{
432
432
  }>;
433
433
  };
434
434
  $ERROR_CODES: {
435
- USER_NOT_FOUND: better_auth0.RawError<"USER_NOT_FOUND">;
436
- FAILED_TO_CREATE_SESSION: better_auth0.RawError<"FAILED_TO_CREATE_SESSION">;
437
- INVALID_DEVICE_CODE: better_auth0.RawError<"INVALID_DEVICE_CODE">;
438
- EXPIRED_DEVICE_CODE: better_auth0.RawError<"EXPIRED_DEVICE_CODE">;
439
- EXPIRED_USER_CODE: better_auth0.RawError<"EXPIRED_USER_CODE">;
440
- AUTHORIZATION_PENDING: better_auth0.RawError<"AUTHORIZATION_PENDING">;
441
- ACCESS_DENIED: better_auth0.RawError<"ACCESS_DENIED">;
442
- INVALID_USER_CODE: better_auth0.RawError<"INVALID_USER_CODE">;
443
- DEVICE_CODE_ALREADY_PROCESSED: better_auth0.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
444
- POLLING_TOO_FREQUENTLY: better_auth0.RawError<"POLLING_TOO_FREQUENTLY">;
445
- INVALID_DEVICE_CODE_STATUS: better_auth0.RawError<"INVALID_DEVICE_CODE_STATUS">;
446
- AUTHENTICATION_REQUIRED: better_auth0.RawError<"AUTHENTICATION_REQUIRED">;
435
+ USER_NOT_FOUND: better_auth43.RawError<"USER_NOT_FOUND">;
436
+ FAILED_TO_CREATE_SESSION: better_auth43.RawError<"FAILED_TO_CREATE_SESSION">;
437
+ INVALID_DEVICE_CODE: better_auth43.RawError<"INVALID_DEVICE_CODE">;
438
+ EXPIRED_DEVICE_CODE: better_auth43.RawError<"EXPIRED_DEVICE_CODE">;
439
+ EXPIRED_USER_CODE: better_auth43.RawError<"EXPIRED_USER_CODE">;
440
+ AUTHORIZATION_PENDING: better_auth43.RawError<"AUTHORIZATION_PENDING">;
441
+ ACCESS_DENIED: better_auth43.RawError<"ACCESS_DENIED">;
442
+ INVALID_USER_CODE: better_auth43.RawError<"INVALID_USER_CODE">;
443
+ DEVICE_CODE_ALREADY_PROCESSED: better_auth43.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
444
+ POLLING_TOO_FREQUENTLY: better_auth43.RawError<"POLLING_TOO_FREQUENTLY">;
445
+ INVALID_DEVICE_CODE_STATUS: better_auth43.RawError<"INVALID_DEVICE_CODE_STATUS">;
446
+ AUTHENTICATION_REQUIRED: better_auth43.RawError<"AUTHENTICATION_REQUIRED">;
447
447
  };
448
448
  options: Partial<{
449
- expiresIn: better_auth_plugins0.TimeString;
450
- interval: better_auth_plugins0.TimeString;
449
+ expiresIn: better_auth_plugins4.TimeString;
450
+ interval: better_auth_plugins4.TimeString;
451
451
  deviceCodeLength: number;
452
452
  userCodeLength: number;
453
453
  schema: {
@@ -474,6 +474,6 @@ declare const auth: better_auth0.Auth<{
474
474
  }>;
475
475
  }];
476
476
  }>;
477
- declare const app: Hono<hono_types4.BlankEnv, hono_types4.BlankSchema, "/">;
477
+ declare const app: Hono<hono_types12.BlankEnv, hono_types12.BlankSchema, "/">;
478
478
  //#endregion
479
479
  export { type AppConfig, type AppVariables, Hono, type NativeSandboxConfig, type SSOProviderConfig, type SandboxConfig, type UserAuthConfig, type VercelSandboxConfig, auth, createAgentsApp, createAgentsHono, app as default };
@@ -1,5 +1,5 @@
1
1
  import { BaseExecutionContext } from "@inkeep/agents-core";
2
- import * as hono11 from "hono";
2
+ import * as hono19 from "hono";
3
3
 
4
4
  //#region src/middleware/evalsAuth.d.ts
5
5
 
@@ -7,7 +7,7 @@ import * as hono11 from "hono";
7
7
  * Middleware to authenticate API requests using Bearer token authentication
8
8
  * First checks if token matches INKEEP_AGENTS_EVAL_API_BYPASS_SECRET,
9
9
  */
10
- declare const evalApiKeyAuth: () => hono11.MiddlewareHandler<{
10
+ declare const evalApiKeyAuth: () => hono19.MiddlewareHandler<{
11
11
  Variables: {
12
12
  executionContext: BaseExecutionContext;
13
13
  };
@@ -1,5 +1,5 @@
1
1
  import { BaseExecutionContext } from "@inkeep/agents-core";
2
- import * as hono5 from "hono";
2
+ import * as hono0 from "hono";
3
3
  import { createAuth } from "@inkeep/agents-core/auth";
4
4
 
5
5
  //#region src/middleware/manageAuth.d.ts
@@ -16,7 +16,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
16
16
  * EXCEPT for the legacy exception on GET /manage/tenants/:t/projects/:p/conversations/:id
17
17
  * (see isLegacyApiKeyAllowedRoute). API keys are otherwise restricted to the run domain only.
18
18
  */
19
- declare const manageBearerAuth: () => hono5.MiddlewareHandler<{
19
+ declare const manageBearerAuth: () => hono0.MiddlewareHandler<{
20
20
  Variables: {
21
21
  executionContext: BaseExecutionContext;
22
22
  userId?: string;
@@ -30,6 +30,6 @@ declare const manageBearerAuth: () => hono5.MiddlewareHandler<{
30
30
  * Uses Bearer token → manage bearer auth (bypass secret, session, Slack JWT, internal service),
31
31
  * otherwise falls back to session auth.
32
32
  */
33
- declare const manageBearerOrSessionAuth: () => hono5.MiddlewareHandler<any, string, {}, Response>;
33
+ declare const manageBearerOrSessionAuth: () => hono0.MiddlewareHandler<any, string, {}, Response>;
34
34
  //#endregion
35
35
  export { manageBearerAuth, manageBearerOrSessionAuth };
@@ -1,11 +1,11 @@
1
1
  import { BaseExecutionContext, ResolvedRef } from "@inkeep/agents-core";
2
- import * as hono16 from "hono";
2
+ import * as hono7 from "hono";
3
3
 
4
4
  //#region src/middleware/projectConfig.d.ts
5
5
  /**
6
6
  * Middleware that fetches the full project definition from the Management API
7
7
  */
8
- declare const projectConfigMiddleware: hono16.MiddlewareHandler<{
8
+ declare const projectConfigMiddleware: hono7.MiddlewareHandler<{
9
9
  Variables: {
10
10
  executionContext: BaseExecutionContext;
11
11
  resolvedRef: ResolvedRef;
@@ -15,7 +15,7 @@ declare const projectConfigMiddleware: hono16.MiddlewareHandler<{
15
15
  * Creates a middleware that applies project config fetching except for specified route patterns
16
16
  * @param skipRouteCheck - Function that returns true if the route should skip the middleware
17
17
  */
18
- declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono16.MiddlewareHandler<{
18
+ declare const projectConfigMiddlewareExcept: (skipRouteCheck: (path: string) => boolean) => hono7.MiddlewareHandler<{
19
19
  Variables: {
20
20
  executionContext: BaseExecutionContext;
21
21
  resolvedRef: ResolvedRef;
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono0 from "hono";
2
+ import * as hono9 from "hono";
3
3
 
4
4
  //#region src/middleware/requireEntitlement.d.ts
5
5
  type EntitlementConfig = {
@@ -11,6 +11,6 @@ declare const requireEntitlement: <Env$1 extends {
11
11
  Variables: ManageAppVariables;
12
12
  } = {
13
13
  Variables: ManageAppVariables;
14
- }>(config: EntitlementConfig) => hono0.MiddlewareHandler<Env$1, string, {}, Response>;
14
+ }>(config: EntitlementConfig) => hono9.MiddlewareHandler<Env$1, string, {}, Response>;
15
15
  //#endregion
16
16
  export { requireEntitlement };
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono7 from "hono";
2
+ import * as hono10 from "hono";
3
3
 
4
4
  //#region src/middleware/requirePermission.d.ts
5
5
  type Permission = {
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
9
9
  Variables: ManageAppVariables;
10
10
  } = {
11
11
  Variables: ManageAppVariables;
12
- }>(permissions: Permission) => hono7.MiddlewareHandler<Env$1, string, {}, Response>;
12
+ }>(permissions: Permission) => hono10.MiddlewareHandler<Env$1, string, {}, Response>;
13
13
  //#endregion
14
14
  export { requirePermission };
@@ -1,8 +1,8 @@
1
1
  import { BaseExecutionContext } from "@inkeep/agents-core";
2
- import * as hono8 from "hono";
2
+ import * as hono11 from "hono";
3
3
 
4
4
  //#region src/middleware/runAuth.d.ts
5
- declare const runApiKeyAuth: () => hono8.MiddlewareHandler<{
5
+ declare const runApiKeyAuth: () => hono11.MiddlewareHandler<{
6
6
  Variables: {
7
7
  executionContext: BaseExecutionContext;
8
8
  };
@@ -11,7 +11,7 @@ declare const runApiKeyAuth: () => hono8.MiddlewareHandler<{
11
11
  * Creates a middleware that applies API key authentication except for specified route patterns
12
12
  * @param skipRouteCheck - Function that returns true if the route should skip authentication
13
13
  */
14
- declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono8.MiddlewareHandler<{
14
+ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono11.MiddlewareHandler<{
15
15
  Variables: {
16
16
  executionContext: BaseExecutionContext;
17
17
  };
@@ -20,7 +20,7 @@ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =
20
20
  * Helper middleware for endpoints that optionally support API key authentication
21
21
  * If no auth header is present, it continues without setting the executionContext
22
22
  */
23
- declare const runOptionalAuth: () => hono8.MiddlewareHandler<{
23
+ declare const runOptionalAuth: () => hono11.MiddlewareHandler<{
24
24
  Variables: {
25
25
  executionContext?: BaseExecutionContext;
26
26
  };
@@ -1,5 +1,5 @@
1
1
  import { AppVariables } from "../types/app.js";
2
- import * as hono12 from "hono";
2
+ import * as hono14 from "hono";
3
3
 
4
4
  //#region src/middleware/sessionAuth.d.ts
5
5
 
@@ -8,12 +8,12 @@ import * as hono12 from "hono";
8
8
  * Requires that a user has already been authenticated via Better Auth session.
9
9
  * Used primarily for manage routes that require an active user session.
10
10
  */
11
- declare const sessionAuth: () => hono12.MiddlewareHandler<any, string, {}, Response>;
11
+ declare const sessionAuth: () => hono14.MiddlewareHandler<any, string, {}, Response>;
12
12
  /**
13
13
  * Global session middleware - sets user and session in context for all routes
14
14
  * Used for all routes that require an active user session.
15
15
  */
16
- declare const sessionContext: () => hono12.MiddlewareHandler<{
16
+ declare const sessionContext: () => hono14.MiddlewareHandler<{
17
17
  Variables: AppVariables;
18
18
  }, string, {}, Response>;
19
19
  //#endregion
@@ -1,4 +1,4 @@
1
- import * as hono1 from "hono";
1
+ import * as hono16 from "hono";
2
2
 
3
3
  //#region src/middleware/tenantAccess.d.ts
4
4
 
@@ -12,7 +12,7 @@ import * as hono1 from "hono";
12
12
  * - API key user: Access only to the tenant associated with the API key
13
13
  * - Session user: Access based on organization membership
14
14
  */
15
- declare const requireTenantAccess: () => hono1.MiddlewareHandler<{
15
+ declare const requireTenantAccess: () => hono16.MiddlewareHandler<{
16
16
  Variables: {
17
17
  userId: string;
18
18
  tenantId: string;
@@ -1,7 +1,7 @@
1
- import * as hono14 from "hono";
1
+ import * as hono17 from "hono";
2
2
 
3
3
  //#region src/middleware/tracing.d.ts
4
- declare const otelBaggageMiddleware: () => hono14.MiddlewareHandler<any, string, {}, Response>;
5
- declare const executionBaggageMiddleware: () => hono14.MiddlewareHandler<any, string, {}, Response>;
4
+ declare const otelBaggageMiddleware: () => hono17.MiddlewareHandler<any, string, {}, Response>;
5
+ declare const executionBaggageMiddleware: () => hono17.MiddlewareHandler<any, string, {}, Response>;
6
6
  //#endregion
7
7
  export { executionBaggageMiddleware, otelBaggageMiddleware };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@inkeep/agents-api",
3
- "version": "0.0.0-dev-20260403132729",
3
+ "version": "0.0.0-dev-20260403190627",
4
4
  "description": "Unified Inkeep Agents API - combines management, runtime, and evaluation capabilities",
5
5
  "types": "dist/index.d.ts",
6
6
  "exports": {
@@ -73,10 +73,10 @@
73
73
  "pg": "^8.16.3",
74
74
  "undici": "^7.22.0",
75
75
  "workflow": "4.2.0-beta.67",
76
- "@inkeep/agents-core": "^0.0.0-dev-20260403132729",
77
- "@inkeep/agents-email": "^0.0.0-dev-20260403132729",
78
- "@inkeep/agents-mcp": "^0.0.0-dev-20260403132729",
79
- "@inkeep/agents-work-apps": "^0.0.0-dev-20260403132729"
76
+ "@inkeep/agents-core": "^0.0.0-dev-20260403190627",
77
+ "@inkeep/agents-email": "^0.0.0-dev-20260403190627",
78
+ "@inkeep/agents-mcp": "^0.0.0-dev-20260403190627",
79
+ "@inkeep/agents-work-apps": "^0.0.0-dev-20260403190627"
80
80
  },
81
81
  "peerDependencies": {
82
82
  "@hono/zod-openapi": "^1.1.5",