@inkeep/agents-api 0.0.0-dev-20260406183632 → 0.0.0-dev-20260406185511
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/.well-known/workflow/v1/manifest.json +70 -70
- package/dist/createApp.d.ts +2 -2
- package/dist/data/db/manageDbClient.d.ts +2 -2
- package/dist/data-reconciliation/handlers/agent.d.ts +2 -2
- package/dist/data-reconciliation/handlers/context-configs.d.ts +2 -2
- package/dist/data-reconciliation/handlers/sub-agents.d.ts +2 -2
- package/dist/data-reconciliation/handlers/tools.d.ts +2 -2
- package/dist/domains/evals/routes/index.d.ts +2 -2
- package/dist/domains/evals/workflow/routes.d.ts +2 -2
- package/dist/domains/manage/routes/authLookup.d.ts +2 -2
- package/dist/domains/manage/routes/availableAgents.d.ts +2 -2
- package/dist/domains/manage/routes/conversations.d.ts +2 -2
- package/dist/domains/manage/routes/feedback.d.ts +2 -2
- package/dist/domains/manage/routes/index.d.ts +2 -2
- package/dist/domains/manage/routes/invitations.d.ts +2 -2
- package/dist/domains/manage/routes/passwordResetLinks.d.ts +2 -2
- package/dist/domains/manage/routes/signoz.d.ts +2 -2
- package/dist/domains/manage/routes/users.d.ts +2 -2
- package/dist/domains/mcp/routes/mcp.d.ts +2 -2
- package/dist/domains/run/agents/relationTools.d.ts +2 -2
- package/dist/domains/run/routes/auth.d.ts +2 -2
- package/dist/domains/run/tools/distill-conversation-history-tool.d.ts +1 -1
- package/dist/domains/run/types/chat.d.ts +16 -16
- package/dist/domains/run/workflow/steps/scheduledTriggerSteps.d.ts +6 -6
- package/dist/factory.d.ts +80 -80
- package/dist/index.d.ts +80 -80
- package/dist/middleware/evalsAuth.d.ts +2 -2
- package/dist/middleware/manageAuth.d.ts +3 -3
- package/dist/middleware/requireEntitlement.d.ts +2 -2
- package/dist/middleware/requirePermission.d.ts +2 -2
- package/dist/middleware/runAuth.d.ts +4 -4
- package/dist/middleware/sessionAuth.d.ts +3 -3
- package/dist/middleware/tenantAccess.d.ts +2 -2
- package/dist/middleware/tracing.d.ts +3 -3
- package/package.json +5 -5
package/dist/factory.d.ts
CHANGED
|
@@ -3,43 +3,43 @@ import "./types/index.js";
|
|
|
3
3
|
import { createAgentsHono } from "./createApp.js";
|
|
4
4
|
import { CredentialStore, ServerConfig } from "@inkeep/agents-core";
|
|
5
5
|
import * as hono0 from "hono";
|
|
6
|
-
import * as
|
|
6
|
+
import * as zod0 from "zod";
|
|
7
7
|
import { EmailServiceConfig, SSOProviderConfig, UserAuthConfig } from "@inkeep/agents-core/auth";
|
|
8
|
-
import * as
|
|
9
|
-
import * as
|
|
10
|
-
import * as
|
|
8
|
+
import * as hono_types0 from "hono/types";
|
|
9
|
+
import * as better_auth0 from "better-auth";
|
|
10
|
+
import * as better_auth_plugins0 from "better-auth/plugins";
|
|
11
11
|
|
|
12
12
|
//#region src/factory.d.ts
|
|
13
|
-
declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?: EmailServiceConfig):
|
|
13
|
+
declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?: EmailServiceConfig): better_auth0.Auth<{
|
|
14
14
|
plugins: [{
|
|
15
15
|
id: "bearer";
|
|
16
16
|
hooks: {
|
|
17
17
|
before: {
|
|
18
|
-
matcher(context:
|
|
19
|
-
handler: (inputContext:
|
|
18
|
+
matcher(context: better_auth0.HookEndpointContext): boolean;
|
|
19
|
+
handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<{
|
|
20
20
|
context: {
|
|
21
21
|
headers: Headers;
|
|
22
22
|
};
|
|
23
23
|
} | undefined>;
|
|
24
24
|
}[];
|
|
25
25
|
after: {
|
|
26
|
-
matcher(context:
|
|
27
|
-
handler: (inputContext:
|
|
26
|
+
matcher(context: better_auth0.HookEndpointContext): true;
|
|
27
|
+
handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
|
|
28
28
|
}[];
|
|
29
29
|
};
|
|
30
|
-
options:
|
|
30
|
+
options: better_auth_plugins0.BearerOptions | undefined;
|
|
31
31
|
}, {
|
|
32
32
|
id: "oauth-proxy";
|
|
33
|
-
options: NoInfer<
|
|
33
|
+
options: NoInfer<better_auth_plugins0.OAuthProxyOptions>;
|
|
34
34
|
endpoints: {
|
|
35
|
-
oAuthProxy:
|
|
35
|
+
oAuthProxy: better_auth0.StrictEndpoint<"/oauth-proxy-callback", {
|
|
36
36
|
method: "GET";
|
|
37
37
|
operationId: string;
|
|
38
|
-
query:
|
|
39
|
-
callbackURL:
|
|
40
|
-
profile:
|
|
41
|
-
},
|
|
42
|
-
use: ((inputContext:
|
|
38
|
+
query: zod0.ZodObject<{
|
|
39
|
+
callbackURL: zod0.ZodString;
|
|
40
|
+
profile: zod0.ZodOptional<zod0.ZodString>;
|
|
41
|
+
}, better_auth0.$strip>;
|
|
42
|
+
use: ((inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>)[];
|
|
43
43
|
metadata: {
|
|
44
44
|
openapi: {
|
|
45
45
|
operationId: string;
|
|
@@ -74,15 +74,15 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
|
|
|
74
74
|
};
|
|
75
75
|
hooks: {
|
|
76
76
|
before: {
|
|
77
|
-
matcher(context:
|
|
78
|
-
handler: (inputContext:
|
|
77
|
+
matcher(context: better_auth0.HookEndpointContext): boolean;
|
|
78
|
+
handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
|
|
79
79
|
}[];
|
|
80
80
|
after: {
|
|
81
|
-
matcher(context:
|
|
82
|
-
handler: (inputContext:
|
|
81
|
+
matcher(context: better_auth0.HookEndpointContext): boolean;
|
|
82
|
+
handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
|
|
83
83
|
}[];
|
|
84
84
|
};
|
|
85
|
-
},
|
|
85
|
+
}, better_auth_plugins0.DefaultOrganizationPlugin<{
|
|
86
86
|
schema: {
|
|
87
87
|
invitation: {
|
|
88
88
|
additionalFields: {
|
|
@@ -152,19 +152,19 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
|
|
|
152
152
|
};
|
|
153
153
|
};
|
|
154
154
|
endpoints: {
|
|
155
|
-
deviceCode:
|
|
155
|
+
deviceCode: better_auth0.StrictEndpoint<"/device/code", {
|
|
156
156
|
method: "POST";
|
|
157
|
-
body:
|
|
158
|
-
client_id:
|
|
159
|
-
scope:
|
|
160
|
-
},
|
|
161
|
-
error:
|
|
162
|
-
error:
|
|
157
|
+
body: zod0.ZodObject<{
|
|
158
|
+
client_id: zod0.ZodString;
|
|
159
|
+
scope: zod0.ZodOptional<zod0.ZodString>;
|
|
160
|
+
}, better_auth0.$strip>;
|
|
161
|
+
error: zod0.ZodObject<{
|
|
162
|
+
error: zod0.ZodEnum<{
|
|
163
163
|
invalid_request: "invalid_request";
|
|
164
164
|
invalid_client: "invalid_client";
|
|
165
165
|
}>;
|
|
166
|
-
error_description:
|
|
167
|
-
},
|
|
166
|
+
error_description: zod0.ZodString;
|
|
167
|
+
}, better_auth0.$strip>;
|
|
168
168
|
metadata: {
|
|
169
169
|
openapi: {
|
|
170
170
|
description: string;
|
|
@@ -237,15 +237,15 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
|
|
|
237
237
|
expires_in: number;
|
|
238
238
|
interval: number;
|
|
239
239
|
}>;
|
|
240
|
-
deviceToken:
|
|
240
|
+
deviceToken: better_auth0.StrictEndpoint<"/device/token", {
|
|
241
241
|
method: "POST";
|
|
242
|
-
body:
|
|
243
|
-
grant_type:
|
|
244
|
-
device_code:
|
|
245
|
-
client_id:
|
|
246
|
-
},
|
|
247
|
-
error:
|
|
248
|
-
error:
|
|
242
|
+
body: zod0.ZodObject<{
|
|
243
|
+
grant_type: zod0.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
|
|
244
|
+
device_code: zod0.ZodString;
|
|
245
|
+
client_id: zod0.ZodString;
|
|
246
|
+
}, better_auth0.$strip>;
|
|
247
|
+
error: zod0.ZodObject<{
|
|
248
|
+
error: zod0.ZodEnum<{
|
|
249
249
|
invalid_request: "invalid_request";
|
|
250
250
|
authorization_pending: "authorization_pending";
|
|
251
251
|
slow_down: "slow_down";
|
|
@@ -253,8 +253,8 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
|
|
|
253
253
|
access_denied: "access_denied";
|
|
254
254
|
invalid_grant: "invalid_grant";
|
|
255
255
|
}>;
|
|
256
|
-
error_description:
|
|
257
|
-
},
|
|
256
|
+
error_description: zod0.ZodString;
|
|
257
|
+
}, better_auth0.$strip>;
|
|
258
258
|
metadata: {
|
|
259
259
|
openapi: {
|
|
260
260
|
description: string;
|
|
@@ -305,17 +305,17 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
|
|
|
305
305
|
expires_in: number;
|
|
306
306
|
scope: string;
|
|
307
307
|
}>;
|
|
308
|
-
deviceVerify:
|
|
308
|
+
deviceVerify: better_auth0.StrictEndpoint<"/device", {
|
|
309
309
|
method: "GET";
|
|
310
|
-
query:
|
|
311
|
-
user_code:
|
|
312
|
-
},
|
|
313
|
-
error:
|
|
314
|
-
error:
|
|
310
|
+
query: zod0.ZodObject<{
|
|
311
|
+
user_code: zod0.ZodString;
|
|
312
|
+
}, better_auth0.$strip>;
|
|
313
|
+
error: zod0.ZodObject<{
|
|
314
|
+
error: zod0.ZodEnum<{
|
|
315
315
|
invalid_request: "invalid_request";
|
|
316
316
|
}>;
|
|
317
|
-
error_description:
|
|
318
|
-
},
|
|
317
|
+
error_description: zod0.ZodString;
|
|
318
|
+
}, better_auth0.$strip>;
|
|
319
319
|
metadata: {
|
|
320
320
|
openapi: {
|
|
321
321
|
description: string;
|
|
@@ -348,21 +348,21 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
|
|
|
348
348
|
user_code: string;
|
|
349
349
|
status: string;
|
|
350
350
|
}>;
|
|
351
|
-
deviceApprove:
|
|
351
|
+
deviceApprove: better_auth0.StrictEndpoint<"/device/approve", {
|
|
352
352
|
method: "POST";
|
|
353
|
-
body:
|
|
354
|
-
userCode:
|
|
355
|
-
},
|
|
356
|
-
error:
|
|
357
|
-
error:
|
|
353
|
+
body: zod0.ZodObject<{
|
|
354
|
+
userCode: zod0.ZodString;
|
|
355
|
+
}, better_auth0.$strip>;
|
|
356
|
+
error: zod0.ZodObject<{
|
|
357
|
+
error: zod0.ZodEnum<{
|
|
358
358
|
invalid_request: "invalid_request";
|
|
359
359
|
expired_token: "expired_token";
|
|
360
360
|
access_denied: "access_denied";
|
|
361
361
|
device_code_already_processed: "device_code_already_processed";
|
|
362
362
|
unauthorized: "unauthorized";
|
|
363
363
|
}>;
|
|
364
|
-
error_description:
|
|
365
|
-
},
|
|
364
|
+
error_description: zod0.ZodString;
|
|
365
|
+
}, better_auth0.$strip>;
|
|
366
366
|
requireHeaders: true;
|
|
367
367
|
metadata: {
|
|
368
368
|
openapi: {
|
|
@@ -389,20 +389,20 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
|
|
|
389
389
|
}, {
|
|
390
390
|
success: boolean;
|
|
391
391
|
}>;
|
|
392
|
-
deviceDeny:
|
|
392
|
+
deviceDeny: better_auth0.StrictEndpoint<"/device/deny", {
|
|
393
393
|
method: "POST";
|
|
394
|
-
body:
|
|
395
|
-
userCode:
|
|
396
|
-
},
|
|
397
|
-
error:
|
|
398
|
-
error:
|
|
394
|
+
body: zod0.ZodObject<{
|
|
395
|
+
userCode: zod0.ZodString;
|
|
396
|
+
}, better_auth0.$strip>;
|
|
397
|
+
error: zod0.ZodObject<{
|
|
398
|
+
error: zod0.ZodEnum<{
|
|
399
399
|
invalid_request: "invalid_request";
|
|
400
400
|
expired_token: "expired_token";
|
|
401
401
|
access_denied: "access_denied";
|
|
402
402
|
unauthorized: "unauthorized";
|
|
403
403
|
}>;
|
|
404
|
-
error_description:
|
|
405
|
-
},
|
|
404
|
+
error_description: zod0.ZodString;
|
|
405
|
+
}, better_auth0.$strip>;
|
|
406
406
|
requireHeaders: true;
|
|
407
407
|
metadata: {
|
|
408
408
|
openapi: {
|
|
@@ -431,22 +431,22 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
|
|
|
431
431
|
}>;
|
|
432
432
|
};
|
|
433
433
|
$ERROR_CODES: {
|
|
434
|
-
USER_NOT_FOUND:
|
|
435
|
-
FAILED_TO_CREATE_SESSION:
|
|
436
|
-
INVALID_DEVICE_CODE:
|
|
437
|
-
EXPIRED_DEVICE_CODE:
|
|
438
|
-
EXPIRED_USER_CODE:
|
|
439
|
-
AUTHORIZATION_PENDING:
|
|
440
|
-
ACCESS_DENIED:
|
|
441
|
-
INVALID_USER_CODE:
|
|
442
|
-
DEVICE_CODE_ALREADY_PROCESSED:
|
|
443
|
-
POLLING_TOO_FREQUENTLY:
|
|
444
|
-
INVALID_DEVICE_CODE_STATUS:
|
|
445
|
-
AUTHENTICATION_REQUIRED:
|
|
434
|
+
USER_NOT_FOUND: better_auth0.RawError<"USER_NOT_FOUND">;
|
|
435
|
+
FAILED_TO_CREATE_SESSION: better_auth0.RawError<"FAILED_TO_CREATE_SESSION">;
|
|
436
|
+
INVALID_DEVICE_CODE: better_auth0.RawError<"INVALID_DEVICE_CODE">;
|
|
437
|
+
EXPIRED_DEVICE_CODE: better_auth0.RawError<"EXPIRED_DEVICE_CODE">;
|
|
438
|
+
EXPIRED_USER_CODE: better_auth0.RawError<"EXPIRED_USER_CODE">;
|
|
439
|
+
AUTHORIZATION_PENDING: better_auth0.RawError<"AUTHORIZATION_PENDING">;
|
|
440
|
+
ACCESS_DENIED: better_auth0.RawError<"ACCESS_DENIED">;
|
|
441
|
+
INVALID_USER_CODE: better_auth0.RawError<"INVALID_USER_CODE">;
|
|
442
|
+
DEVICE_CODE_ALREADY_PROCESSED: better_auth0.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
|
|
443
|
+
POLLING_TOO_FREQUENTLY: better_auth0.RawError<"POLLING_TOO_FREQUENTLY">;
|
|
444
|
+
INVALID_DEVICE_CODE_STATUS: better_auth0.RawError<"INVALID_DEVICE_CODE_STATUS">;
|
|
445
|
+
AUTHENTICATION_REQUIRED: better_auth0.RawError<"AUTHENTICATION_REQUIRED">;
|
|
446
446
|
};
|
|
447
447
|
options: Partial<{
|
|
448
|
-
expiresIn:
|
|
449
|
-
interval:
|
|
448
|
+
expiresIn: better_auth_plugins0.TimeString;
|
|
449
|
+
interval: better_auth_plugins0.TimeString;
|
|
450
450
|
deviceCodeLength: number;
|
|
451
451
|
userCodeLength: number;
|
|
452
452
|
schema: {
|
|
@@ -479,6 +479,6 @@ declare function createAgentsApp(config?: {
|
|
|
479
479
|
auth?: UserAuthConfig;
|
|
480
480
|
sandboxConfig?: SandboxConfig;
|
|
481
481
|
emailService?: EmailServiceConfig;
|
|
482
|
-
}): hono0.Hono<
|
|
482
|
+
}): hono0.Hono<hono_types0.BlankEnv, hono_types0.BlankSchema, "/">;
|
|
483
483
|
//#endregion
|
|
484
484
|
export { type SSOProviderConfig, type UserAuthConfig, createAgentsApp, createAgentsAuth, createAgentsHono };
|
package/dist/index.d.ts
CHANGED
|
@@ -5,42 +5,42 @@ import { NativeSandboxConfig, SandboxConfig, VercelSandboxConfig } from "./domai
|
|
|
5
5
|
import { SSOProviderConfig, UserAuthConfig, createAgentsApp } from "./factory.js";
|
|
6
6
|
import "./sentry.js";
|
|
7
7
|
import { Hono } from "hono";
|
|
8
|
-
import * as
|
|
9
|
-
import * as
|
|
10
|
-
import * as
|
|
11
|
-
import * as
|
|
8
|
+
import * as zod32 from "zod";
|
|
9
|
+
import * as hono_types12 from "hono/types";
|
|
10
|
+
import * as better_auth43 from "better-auth";
|
|
11
|
+
import * as better_auth_plugins4 from "better-auth/plugins";
|
|
12
12
|
|
|
13
13
|
//#region src/index.d.ts
|
|
14
|
-
declare const auth:
|
|
14
|
+
declare const auth: better_auth43.Auth<{
|
|
15
15
|
plugins: [{
|
|
16
16
|
id: "bearer";
|
|
17
17
|
hooks: {
|
|
18
18
|
before: {
|
|
19
|
-
matcher(context:
|
|
20
|
-
handler: (inputContext:
|
|
19
|
+
matcher(context: better_auth43.HookEndpointContext): boolean;
|
|
20
|
+
handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<{
|
|
21
21
|
context: {
|
|
22
22
|
headers: Headers;
|
|
23
23
|
};
|
|
24
24
|
} | undefined>;
|
|
25
25
|
}[];
|
|
26
26
|
after: {
|
|
27
|
-
matcher(context:
|
|
28
|
-
handler: (inputContext:
|
|
27
|
+
matcher(context: better_auth43.HookEndpointContext): true;
|
|
28
|
+
handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
|
|
29
29
|
}[];
|
|
30
30
|
};
|
|
31
|
-
options:
|
|
31
|
+
options: better_auth_plugins4.BearerOptions | undefined;
|
|
32
32
|
}, {
|
|
33
33
|
id: "oauth-proxy";
|
|
34
|
-
options: NoInfer<
|
|
34
|
+
options: NoInfer<better_auth_plugins4.OAuthProxyOptions>;
|
|
35
35
|
endpoints: {
|
|
36
|
-
oAuthProxy:
|
|
36
|
+
oAuthProxy: better_auth43.StrictEndpoint<"/oauth-proxy-callback", {
|
|
37
37
|
method: "GET";
|
|
38
38
|
operationId: string;
|
|
39
|
-
query:
|
|
40
|
-
callbackURL:
|
|
41
|
-
profile:
|
|
42
|
-
},
|
|
43
|
-
use: ((inputContext:
|
|
39
|
+
query: zod32.ZodObject<{
|
|
40
|
+
callbackURL: zod32.ZodString;
|
|
41
|
+
profile: zod32.ZodOptional<zod32.ZodString>;
|
|
42
|
+
}, better_auth43.$strip>;
|
|
43
|
+
use: ((inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>)[];
|
|
44
44
|
metadata: {
|
|
45
45
|
openapi: {
|
|
46
46
|
operationId: string;
|
|
@@ -75,15 +75,15 @@ declare const auth: better_auth0.Auth<{
|
|
|
75
75
|
};
|
|
76
76
|
hooks: {
|
|
77
77
|
before: {
|
|
78
|
-
matcher(context:
|
|
79
|
-
handler: (inputContext:
|
|
78
|
+
matcher(context: better_auth43.HookEndpointContext): boolean;
|
|
79
|
+
handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
|
|
80
80
|
}[];
|
|
81
81
|
after: {
|
|
82
|
-
matcher(context:
|
|
83
|
-
handler: (inputContext:
|
|
82
|
+
matcher(context: better_auth43.HookEndpointContext): boolean;
|
|
83
|
+
handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
|
|
84
84
|
}[];
|
|
85
85
|
};
|
|
86
|
-
},
|
|
86
|
+
}, better_auth_plugins4.DefaultOrganizationPlugin<{
|
|
87
87
|
schema: {
|
|
88
88
|
invitation: {
|
|
89
89
|
additionalFields: {
|
|
@@ -153,19 +153,19 @@ declare const auth: better_auth0.Auth<{
|
|
|
153
153
|
};
|
|
154
154
|
};
|
|
155
155
|
endpoints: {
|
|
156
|
-
deviceCode:
|
|
156
|
+
deviceCode: better_auth43.StrictEndpoint<"/device/code", {
|
|
157
157
|
method: "POST";
|
|
158
|
-
body:
|
|
159
|
-
client_id:
|
|
160
|
-
scope:
|
|
161
|
-
},
|
|
162
|
-
error:
|
|
163
|
-
error:
|
|
158
|
+
body: zod32.ZodObject<{
|
|
159
|
+
client_id: zod32.ZodString;
|
|
160
|
+
scope: zod32.ZodOptional<zod32.ZodString>;
|
|
161
|
+
}, better_auth43.$strip>;
|
|
162
|
+
error: zod32.ZodObject<{
|
|
163
|
+
error: zod32.ZodEnum<{
|
|
164
164
|
invalid_request: "invalid_request";
|
|
165
165
|
invalid_client: "invalid_client";
|
|
166
166
|
}>;
|
|
167
|
-
error_description:
|
|
168
|
-
},
|
|
167
|
+
error_description: zod32.ZodString;
|
|
168
|
+
}, better_auth43.$strip>;
|
|
169
169
|
metadata: {
|
|
170
170
|
openapi: {
|
|
171
171
|
description: string;
|
|
@@ -238,15 +238,15 @@ declare const auth: better_auth0.Auth<{
|
|
|
238
238
|
expires_in: number;
|
|
239
239
|
interval: number;
|
|
240
240
|
}>;
|
|
241
|
-
deviceToken:
|
|
241
|
+
deviceToken: better_auth43.StrictEndpoint<"/device/token", {
|
|
242
242
|
method: "POST";
|
|
243
|
-
body:
|
|
244
|
-
grant_type:
|
|
245
|
-
device_code:
|
|
246
|
-
client_id:
|
|
247
|
-
},
|
|
248
|
-
error:
|
|
249
|
-
error:
|
|
243
|
+
body: zod32.ZodObject<{
|
|
244
|
+
grant_type: zod32.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
|
|
245
|
+
device_code: zod32.ZodString;
|
|
246
|
+
client_id: zod32.ZodString;
|
|
247
|
+
}, better_auth43.$strip>;
|
|
248
|
+
error: zod32.ZodObject<{
|
|
249
|
+
error: zod32.ZodEnum<{
|
|
250
250
|
invalid_request: "invalid_request";
|
|
251
251
|
authorization_pending: "authorization_pending";
|
|
252
252
|
slow_down: "slow_down";
|
|
@@ -254,8 +254,8 @@ declare const auth: better_auth0.Auth<{
|
|
|
254
254
|
access_denied: "access_denied";
|
|
255
255
|
invalid_grant: "invalid_grant";
|
|
256
256
|
}>;
|
|
257
|
-
error_description:
|
|
258
|
-
},
|
|
257
|
+
error_description: zod32.ZodString;
|
|
258
|
+
}, better_auth43.$strip>;
|
|
259
259
|
metadata: {
|
|
260
260
|
openapi: {
|
|
261
261
|
description: string;
|
|
@@ -306,17 +306,17 @@ declare const auth: better_auth0.Auth<{
|
|
|
306
306
|
expires_in: number;
|
|
307
307
|
scope: string;
|
|
308
308
|
}>;
|
|
309
|
-
deviceVerify:
|
|
309
|
+
deviceVerify: better_auth43.StrictEndpoint<"/device", {
|
|
310
310
|
method: "GET";
|
|
311
|
-
query:
|
|
312
|
-
user_code:
|
|
313
|
-
},
|
|
314
|
-
error:
|
|
315
|
-
error:
|
|
311
|
+
query: zod32.ZodObject<{
|
|
312
|
+
user_code: zod32.ZodString;
|
|
313
|
+
}, better_auth43.$strip>;
|
|
314
|
+
error: zod32.ZodObject<{
|
|
315
|
+
error: zod32.ZodEnum<{
|
|
316
316
|
invalid_request: "invalid_request";
|
|
317
317
|
}>;
|
|
318
|
-
error_description:
|
|
319
|
-
},
|
|
318
|
+
error_description: zod32.ZodString;
|
|
319
|
+
}, better_auth43.$strip>;
|
|
320
320
|
metadata: {
|
|
321
321
|
openapi: {
|
|
322
322
|
description: string;
|
|
@@ -349,21 +349,21 @@ declare const auth: better_auth0.Auth<{
|
|
|
349
349
|
user_code: string;
|
|
350
350
|
status: string;
|
|
351
351
|
}>;
|
|
352
|
-
deviceApprove:
|
|
352
|
+
deviceApprove: better_auth43.StrictEndpoint<"/device/approve", {
|
|
353
353
|
method: "POST";
|
|
354
|
-
body:
|
|
355
|
-
userCode:
|
|
356
|
-
},
|
|
357
|
-
error:
|
|
358
|
-
error:
|
|
354
|
+
body: zod32.ZodObject<{
|
|
355
|
+
userCode: zod32.ZodString;
|
|
356
|
+
}, better_auth43.$strip>;
|
|
357
|
+
error: zod32.ZodObject<{
|
|
358
|
+
error: zod32.ZodEnum<{
|
|
359
359
|
invalid_request: "invalid_request";
|
|
360
360
|
expired_token: "expired_token";
|
|
361
361
|
access_denied: "access_denied";
|
|
362
362
|
device_code_already_processed: "device_code_already_processed";
|
|
363
363
|
unauthorized: "unauthorized";
|
|
364
364
|
}>;
|
|
365
|
-
error_description:
|
|
366
|
-
},
|
|
365
|
+
error_description: zod32.ZodString;
|
|
366
|
+
}, better_auth43.$strip>;
|
|
367
367
|
requireHeaders: true;
|
|
368
368
|
metadata: {
|
|
369
369
|
openapi: {
|
|
@@ -390,20 +390,20 @@ declare const auth: better_auth0.Auth<{
|
|
|
390
390
|
}, {
|
|
391
391
|
success: boolean;
|
|
392
392
|
}>;
|
|
393
|
-
deviceDeny:
|
|
393
|
+
deviceDeny: better_auth43.StrictEndpoint<"/device/deny", {
|
|
394
394
|
method: "POST";
|
|
395
|
-
body:
|
|
396
|
-
userCode:
|
|
397
|
-
},
|
|
398
|
-
error:
|
|
399
|
-
error:
|
|
395
|
+
body: zod32.ZodObject<{
|
|
396
|
+
userCode: zod32.ZodString;
|
|
397
|
+
}, better_auth43.$strip>;
|
|
398
|
+
error: zod32.ZodObject<{
|
|
399
|
+
error: zod32.ZodEnum<{
|
|
400
400
|
invalid_request: "invalid_request";
|
|
401
401
|
expired_token: "expired_token";
|
|
402
402
|
access_denied: "access_denied";
|
|
403
403
|
unauthorized: "unauthorized";
|
|
404
404
|
}>;
|
|
405
|
-
error_description:
|
|
406
|
-
},
|
|
405
|
+
error_description: zod32.ZodString;
|
|
406
|
+
}, better_auth43.$strip>;
|
|
407
407
|
requireHeaders: true;
|
|
408
408
|
metadata: {
|
|
409
409
|
openapi: {
|
|
@@ -432,22 +432,22 @@ declare const auth: better_auth0.Auth<{
|
|
|
432
432
|
}>;
|
|
433
433
|
};
|
|
434
434
|
$ERROR_CODES: {
|
|
435
|
-
USER_NOT_FOUND:
|
|
436
|
-
FAILED_TO_CREATE_SESSION:
|
|
437
|
-
INVALID_DEVICE_CODE:
|
|
438
|
-
EXPIRED_DEVICE_CODE:
|
|
439
|
-
EXPIRED_USER_CODE:
|
|
440
|
-
AUTHORIZATION_PENDING:
|
|
441
|
-
ACCESS_DENIED:
|
|
442
|
-
INVALID_USER_CODE:
|
|
443
|
-
DEVICE_CODE_ALREADY_PROCESSED:
|
|
444
|
-
POLLING_TOO_FREQUENTLY:
|
|
445
|
-
INVALID_DEVICE_CODE_STATUS:
|
|
446
|
-
AUTHENTICATION_REQUIRED:
|
|
435
|
+
USER_NOT_FOUND: better_auth43.RawError<"USER_NOT_FOUND">;
|
|
436
|
+
FAILED_TO_CREATE_SESSION: better_auth43.RawError<"FAILED_TO_CREATE_SESSION">;
|
|
437
|
+
INVALID_DEVICE_CODE: better_auth43.RawError<"INVALID_DEVICE_CODE">;
|
|
438
|
+
EXPIRED_DEVICE_CODE: better_auth43.RawError<"EXPIRED_DEVICE_CODE">;
|
|
439
|
+
EXPIRED_USER_CODE: better_auth43.RawError<"EXPIRED_USER_CODE">;
|
|
440
|
+
AUTHORIZATION_PENDING: better_auth43.RawError<"AUTHORIZATION_PENDING">;
|
|
441
|
+
ACCESS_DENIED: better_auth43.RawError<"ACCESS_DENIED">;
|
|
442
|
+
INVALID_USER_CODE: better_auth43.RawError<"INVALID_USER_CODE">;
|
|
443
|
+
DEVICE_CODE_ALREADY_PROCESSED: better_auth43.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
|
|
444
|
+
POLLING_TOO_FREQUENTLY: better_auth43.RawError<"POLLING_TOO_FREQUENTLY">;
|
|
445
|
+
INVALID_DEVICE_CODE_STATUS: better_auth43.RawError<"INVALID_DEVICE_CODE_STATUS">;
|
|
446
|
+
AUTHENTICATION_REQUIRED: better_auth43.RawError<"AUTHENTICATION_REQUIRED">;
|
|
447
447
|
};
|
|
448
448
|
options: Partial<{
|
|
449
|
-
expiresIn:
|
|
450
|
-
interval:
|
|
449
|
+
expiresIn: better_auth_plugins4.TimeString;
|
|
450
|
+
interval: better_auth_plugins4.TimeString;
|
|
451
451
|
deviceCodeLength: number;
|
|
452
452
|
userCodeLength: number;
|
|
453
453
|
schema: {
|
|
@@ -474,6 +474,6 @@ declare const auth: better_auth0.Auth<{
|
|
|
474
474
|
}>;
|
|
475
475
|
}];
|
|
476
476
|
}>;
|
|
477
|
-
declare const app: Hono<
|
|
477
|
+
declare const app: Hono<hono_types12.BlankEnv, hono_types12.BlankSchema, "/">;
|
|
478
478
|
//#endregion
|
|
479
479
|
export { type AppConfig, type AppVariables, Hono, type NativeSandboxConfig, type SSOProviderConfig, type SandboxConfig, type UserAuthConfig, type VercelSandboxConfig, auth, createAgentsApp, createAgentsHono, app as default };
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono20 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/evalsAuth.d.ts
|
|
5
5
|
|
|
@@ -7,7 +7,7 @@ import * as hono18 from "hono";
|
|
|
7
7
|
* Middleware to authenticate API requests using Bearer token authentication
|
|
8
8
|
* First checks if token matches INKEEP_AGENTS_EVAL_API_BYPASS_SECRET,
|
|
9
9
|
*/
|
|
10
|
-
declare const evalApiKeyAuth: () =>
|
|
10
|
+
declare const evalApiKeyAuth: () => hono20.MiddlewareHandler<{
|
|
11
11
|
Variables: {
|
|
12
12
|
executionContext: BaseExecutionContext;
|
|
13
13
|
};
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono18 from "hono";
|
|
3
3
|
import { createAuth } from "@inkeep/agents-core/auth";
|
|
4
4
|
|
|
5
5
|
//#region src/middleware/manageAuth.d.ts
|
|
@@ -16,7 +16,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
|
|
|
16
16
|
* EXCEPT for the legacy exception on GET /manage/tenants/:t/projects/:p/conversations/:id
|
|
17
17
|
* (see isLegacyApiKeyAllowedRoute). API keys are otherwise restricted to the run domain only.
|
|
18
18
|
*/
|
|
19
|
-
declare const manageBearerAuth: () =>
|
|
19
|
+
declare const manageBearerAuth: () => hono18.MiddlewareHandler<{
|
|
20
20
|
Variables: {
|
|
21
21
|
executionContext: BaseExecutionContext;
|
|
22
22
|
userId?: string;
|
|
@@ -30,6 +30,6 @@ declare const manageBearerAuth: () => hono11.MiddlewareHandler<{
|
|
|
30
30
|
* Uses Bearer token → manage bearer auth (bypass secret, session, Slack JWT, internal service),
|
|
31
31
|
* otherwise falls back to session auth.
|
|
32
32
|
*/
|
|
33
|
-
declare const manageBearerOrSessionAuth: () =>
|
|
33
|
+
declare const manageBearerOrSessionAuth: () => hono18.MiddlewareHandler<any, string, {}, Response>;
|
|
34
34
|
//#endregion
|
|
35
35
|
export { manageBearerAuth, manageBearerOrSessionAuth };
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { ManageAppVariables } from "../types/app.js";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono2 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/requireEntitlement.d.ts
|
|
5
5
|
type EntitlementConfig = {
|
|
@@ -11,6 +11,6 @@ declare const requireEntitlement: <Env$1 extends {
|
|
|
11
11
|
Variables: ManageAppVariables;
|
|
12
12
|
} = {
|
|
13
13
|
Variables: ManageAppVariables;
|
|
14
|
-
}>(config: EntitlementConfig) =>
|
|
14
|
+
}>(config: EntitlementConfig) => hono2.MiddlewareHandler<Env$1, string, {}, Response>;
|
|
15
15
|
//#endregion
|
|
16
16
|
export { requireEntitlement };
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { ManageAppVariables } from "../types/app.js";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono3 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/requirePermission.d.ts
|
|
5
5
|
type Permission = {
|
|
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
|
|
|
9
9
|
Variables: ManageAppVariables;
|
|
10
10
|
} = {
|
|
11
11
|
Variables: ManageAppVariables;
|
|
12
|
-
}>(permissions: Permission) =>
|
|
12
|
+
}>(permissions: Permission) => hono3.MiddlewareHandler<Env$1, string, {}, Response>;
|
|
13
13
|
//#endregion
|
|
14
14
|
export { requirePermission };
|
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono4 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/runAuth.d.ts
|
|
5
|
-
declare const runApiKeyAuth: () =>
|
|
5
|
+
declare const runApiKeyAuth: () => hono4.MiddlewareHandler<{
|
|
6
6
|
Variables: {
|
|
7
7
|
executionContext: BaseExecutionContext;
|
|
8
8
|
};
|
|
@@ -11,7 +11,7 @@ declare const runApiKeyAuth: () => hono3.MiddlewareHandler<{
|
|
|
11
11
|
* Creates a middleware that applies API key authentication except for specified route patterns
|
|
12
12
|
* @param skipRouteCheck - Function that returns true if the route should skip authentication
|
|
13
13
|
*/
|
|
14
|
-
declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =>
|
|
14
|
+
declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono4.MiddlewareHandler<{
|
|
15
15
|
Variables: {
|
|
16
16
|
executionContext: BaseExecutionContext;
|
|
17
17
|
};
|
|
@@ -20,7 +20,7 @@ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =
|
|
|
20
20
|
* Helper middleware for endpoints that optionally support API key authentication
|
|
21
21
|
* If no auth header is present, it continues without setting the executionContext
|
|
22
22
|
*/
|
|
23
|
-
declare const runOptionalAuth: () =>
|
|
23
|
+
declare const runOptionalAuth: () => hono4.MiddlewareHandler<{
|
|
24
24
|
Variables: {
|
|
25
25
|
executionContext?: BaseExecutionContext;
|
|
26
26
|
};
|