@inkeep/agents-api 0.0.0-dev-20260406183632 → 0.0.0-dev-20260406185511

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/dist/.well-known/workflow/v1/manifest.json +70 -70
  2. package/dist/createApp.d.ts +2 -2
  3. package/dist/data/db/manageDbClient.d.ts +2 -2
  4. package/dist/data-reconciliation/handlers/agent.d.ts +2 -2
  5. package/dist/data-reconciliation/handlers/context-configs.d.ts +2 -2
  6. package/dist/data-reconciliation/handlers/sub-agents.d.ts +2 -2
  7. package/dist/data-reconciliation/handlers/tools.d.ts +2 -2
  8. package/dist/domains/evals/routes/index.d.ts +2 -2
  9. package/dist/domains/evals/workflow/routes.d.ts +2 -2
  10. package/dist/domains/manage/routes/authLookup.d.ts +2 -2
  11. package/dist/domains/manage/routes/availableAgents.d.ts +2 -2
  12. package/dist/domains/manage/routes/conversations.d.ts +2 -2
  13. package/dist/domains/manage/routes/feedback.d.ts +2 -2
  14. package/dist/domains/manage/routes/index.d.ts +2 -2
  15. package/dist/domains/manage/routes/invitations.d.ts +2 -2
  16. package/dist/domains/manage/routes/passwordResetLinks.d.ts +2 -2
  17. package/dist/domains/manage/routes/signoz.d.ts +2 -2
  18. package/dist/domains/manage/routes/users.d.ts +2 -2
  19. package/dist/domains/mcp/routes/mcp.d.ts +2 -2
  20. package/dist/domains/run/agents/relationTools.d.ts +2 -2
  21. package/dist/domains/run/routes/auth.d.ts +2 -2
  22. package/dist/domains/run/tools/distill-conversation-history-tool.d.ts +1 -1
  23. package/dist/domains/run/types/chat.d.ts +16 -16
  24. package/dist/domains/run/workflow/steps/scheduledTriggerSteps.d.ts +6 -6
  25. package/dist/factory.d.ts +80 -80
  26. package/dist/index.d.ts +80 -80
  27. package/dist/middleware/evalsAuth.d.ts +2 -2
  28. package/dist/middleware/manageAuth.d.ts +3 -3
  29. package/dist/middleware/requireEntitlement.d.ts +2 -2
  30. package/dist/middleware/requirePermission.d.ts +2 -2
  31. package/dist/middleware/runAuth.d.ts +4 -4
  32. package/dist/middleware/sessionAuth.d.ts +3 -3
  33. package/dist/middleware/tenantAccess.d.ts +2 -2
  34. package/dist/middleware/tracing.d.ts +3 -3
  35. package/package.json +5 -5
package/dist/factory.d.ts CHANGED
@@ -3,43 +3,43 @@ import "./types/index.js";
3
3
  import { createAgentsHono } from "./createApp.js";
4
4
  import { CredentialStore, ServerConfig } from "@inkeep/agents-core";
5
5
  import * as hono0 from "hono";
6
- import * as zod32 from "zod";
6
+ import * as zod0 from "zod";
7
7
  import { EmailServiceConfig, SSOProviderConfig, UserAuthConfig } from "@inkeep/agents-core/auth";
8
- import * as hono_types1 from "hono/types";
9
- import * as better_auth43 from "better-auth";
10
- import * as better_auth_plugins4 from "better-auth/plugins";
8
+ import * as hono_types0 from "hono/types";
9
+ import * as better_auth0 from "better-auth";
10
+ import * as better_auth_plugins0 from "better-auth/plugins";
11
11
 
12
12
  //#region src/factory.d.ts
13
- declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?: EmailServiceConfig): better_auth43.Auth<{
13
+ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?: EmailServiceConfig): better_auth0.Auth<{
14
14
  plugins: [{
15
15
  id: "bearer";
16
16
  hooks: {
17
17
  before: {
18
- matcher(context: better_auth43.HookEndpointContext): boolean;
19
- handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<{
18
+ matcher(context: better_auth0.HookEndpointContext): boolean;
19
+ handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<{
20
20
  context: {
21
21
  headers: Headers;
22
22
  };
23
23
  } | undefined>;
24
24
  }[];
25
25
  after: {
26
- matcher(context: better_auth43.HookEndpointContext): true;
27
- handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
26
+ matcher(context: better_auth0.HookEndpointContext): true;
27
+ handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
28
28
  }[];
29
29
  };
30
- options: better_auth_plugins4.BearerOptions | undefined;
30
+ options: better_auth_plugins0.BearerOptions | undefined;
31
31
  }, {
32
32
  id: "oauth-proxy";
33
- options: NoInfer<better_auth_plugins4.OAuthProxyOptions>;
33
+ options: NoInfer<better_auth_plugins0.OAuthProxyOptions>;
34
34
  endpoints: {
35
- oAuthProxy: better_auth43.StrictEndpoint<"/oauth-proxy-callback", {
35
+ oAuthProxy: better_auth0.StrictEndpoint<"/oauth-proxy-callback", {
36
36
  method: "GET";
37
37
  operationId: string;
38
- query: zod32.ZodObject<{
39
- callbackURL: zod32.ZodString;
40
- profile: zod32.ZodOptional<zod32.ZodString>;
41
- }, better_auth43.$strip>;
42
- use: ((inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>)[];
38
+ query: zod0.ZodObject<{
39
+ callbackURL: zod0.ZodString;
40
+ profile: zod0.ZodOptional<zod0.ZodString>;
41
+ }, better_auth0.$strip>;
42
+ use: ((inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>)[];
43
43
  metadata: {
44
44
  openapi: {
45
45
  operationId: string;
@@ -74,15 +74,15 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
74
74
  };
75
75
  hooks: {
76
76
  before: {
77
- matcher(context: better_auth43.HookEndpointContext): boolean;
78
- handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
77
+ matcher(context: better_auth0.HookEndpointContext): boolean;
78
+ handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
79
79
  }[];
80
80
  after: {
81
- matcher(context: better_auth43.HookEndpointContext): boolean;
82
- handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
81
+ matcher(context: better_auth0.HookEndpointContext): boolean;
82
+ handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
83
83
  }[];
84
84
  };
85
- }, better_auth_plugins4.DefaultOrganizationPlugin<{
85
+ }, better_auth_plugins0.DefaultOrganizationPlugin<{
86
86
  schema: {
87
87
  invitation: {
88
88
  additionalFields: {
@@ -152,19 +152,19 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
152
152
  };
153
153
  };
154
154
  endpoints: {
155
- deviceCode: better_auth43.StrictEndpoint<"/device/code", {
155
+ deviceCode: better_auth0.StrictEndpoint<"/device/code", {
156
156
  method: "POST";
157
- body: zod32.ZodObject<{
158
- client_id: zod32.ZodString;
159
- scope: zod32.ZodOptional<zod32.ZodString>;
160
- }, better_auth43.$strip>;
161
- error: zod32.ZodObject<{
162
- error: zod32.ZodEnum<{
157
+ body: zod0.ZodObject<{
158
+ client_id: zod0.ZodString;
159
+ scope: zod0.ZodOptional<zod0.ZodString>;
160
+ }, better_auth0.$strip>;
161
+ error: zod0.ZodObject<{
162
+ error: zod0.ZodEnum<{
163
163
  invalid_request: "invalid_request";
164
164
  invalid_client: "invalid_client";
165
165
  }>;
166
- error_description: zod32.ZodString;
167
- }, better_auth43.$strip>;
166
+ error_description: zod0.ZodString;
167
+ }, better_auth0.$strip>;
168
168
  metadata: {
169
169
  openapi: {
170
170
  description: string;
@@ -237,15 +237,15 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
237
237
  expires_in: number;
238
238
  interval: number;
239
239
  }>;
240
- deviceToken: better_auth43.StrictEndpoint<"/device/token", {
240
+ deviceToken: better_auth0.StrictEndpoint<"/device/token", {
241
241
  method: "POST";
242
- body: zod32.ZodObject<{
243
- grant_type: zod32.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
244
- device_code: zod32.ZodString;
245
- client_id: zod32.ZodString;
246
- }, better_auth43.$strip>;
247
- error: zod32.ZodObject<{
248
- error: zod32.ZodEnum<{
242
+ body: zod0.ZodObject<{
243
+ grant_type: zod0.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
244
+ device_code: zod0.ZodString;
245
+ client_id: zod0.ZodString;
246
+ }, better_auth0.$strip>;
247
+ error: zod0.ZodObject<{
248
+ error: zod0.ZodEnum<{
249
249
  invalid_request: "invalid_request";
250
250
  authorization_pending: "authorization_pending";
251
251
  slow_down: "slow_down";
@@ -253,8 +253,8 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
253
253
  access_denied: "access_denied";
254
254
  invalid_grant: "invalid_grant";
255
255
  }>;
256
- error_description: zod32.ZodString;
257
- }, better_auth43.$strip>;
256
+ error_description: zod0.ZodString;
257
+ }, better_auth0.$strip>;
258
258
  metadata: {
259
259
  openapi: {
260
260
  description: string;
@@ -305,17 +305,17 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
305
305
  expires_in: number;
306
306
  scope: string;
307
307
  }>;
308
- deviceVerify: better_auth43.StrictEndpoint<"/device", {
308
+ deviceVerify: better_auth0.StrictEndpoint<"/device", {
309
309
  method: "GET";
310
- query: zod32.ZodObject<{
311
- user_code: zod32.ZodString;
312
- }, better_auth43.$strip>;
313
- error: zod32.ZodObject<{
314
- error: zod32.ZodEnum<{
310
+ query: zod0.ZodObject<{
311
+ user_code: zod0.ZodString;
312
+ }, better_auth0.$strip>;
313
+ error: zod0.ZodObject<{
314
+ error: zod0.ZodEnum<{
315
315
  invalid_request: "invalid_request";
316
316
  }>;
317
- error_description: zod32.ZodString;
318
- }, better_auth43.$strip>;
317
+ error_description: zod0.ZodString;
318
+ }, better_auth0.$strip>;
319
319
  metadata: {
320
320
  openapi: {
321
321
  description: string;
@@ -348,21 +348,21 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
348
348
  user_code: string;
349
349
  status: string;
350
350
  }>;
351
- deviceApprove: better_auth43.StrictEndpoint<"/device/approve", {
351
+ deviceApprove: better_auth0.StrictEndpoint<"/device/approve", {
352
352
  method: "POST";
353
- body: zod32.ZodObject<{
354
- userCode: zod32.ZodString;
355
- }, better_auth43.$strip>;
356
- error: zod32.ZodObject<{
357
- error: zod32.ZodEnum<{
353
+ body: zod0.ZodObject<{
354
+ userCode: zod0.ZodString;
355
+ }, better_auth0.$strip>;
356
+ error: zod0.ZodObject<{
357
+ error: zod0.ZodEnum<{
358
358
  invalid_request: "invalid_request";
359
359
  expired_token: "expired_token";
360
360
  access_denied: "access_denied";
361
361
  device_code_already_processed: "device_code_already_processed";
362
362
  unauthorized: "unauthorized";
363
363
  }>;
364
- error_description: zod32.ZodString;
365
- }, better_auth43.$strip>;
364
+ error_description: zod0.ZodString;
365
+ }, better_auth0.$strip>;
366
366
  requireHeaders: true;
367
367
  metadata: {
368
368
  openapi: {
@@ -389,20 +389,20 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
389
389
  }, {
390
390
  success: boolean;
391
391
  }>;
392
- deviceDeny: better_auth43.StrictEndpoint<"/device/deny", {
392
+ deviceDeny: better_auth0.StrictEndpoint<"/device/deny", {
393
393
  method: "POST";
394
- body: zod32.ZodObject<{
395
- userCode: zod32.ZodString;
396
- }, better_auth43.$strip>;
397
- error: zod32.ZodObject<{
398
- error: zod32.ZodEnum<{
394
+ body: zod0.ZodObject<{
395
+ userCode: zod0.ZodString;
396
+ }, better_auth0.$strip>;
397
+ error: zod0.ZodObject<{
398
+ error: zod0.ZodEnum<{
399
399
  invalid_request: "invalid_request";
400
400
  expired_token: "expired_token";
401
401
  access_denied: "access_denied";
402
402
  unauthorized: "unauthorized";
403
403
  }>;
404
- error_description: zod32.ZodString;
405
- }, better_auth43.$strip>;
404
+ error_description: zod0.ZodString;
405
+ }, better_auth0.$strip>;
406
406
  requireHeaders: true;
407
407
  metadata: {
408
408
  openapi: {
@@ -431,22 +431,22 @@ declare function createAgentsAuth(userAuthConfig?: UserAuthConfig, emailService?
431
431
  }>;
432
432
  };
433
433
  $ERROR_CODES: {
434
- USER_NOT_FOUND: better_auth43.RawError<"USER_NOT_FOUND">;
435
- FAILED_TO_CREATE_SESSION: better_auth43.RawError<"FAILED_TO_CREATE_SESSION">;
436
- INVALID_DEVICE_CODE: better_auth43.RawError<"INVALID_DEVICE_CODE">;
437
- EXPIRED_DEVICE_CODE: better_auth43.RawError<"EXPIRED_DEVICE_CODE">;
438
- EXPIRED_USER_CODE: better_auth43.RawError<"EXPIRED_USER_CODE">;
439
- AUTHORIZATION_PENDING: better_auth43.RawError<"AUTHORIZATION_PENDING">;
440
- ACCESS_DENIED: better_auth43.RawError<"ACCESS_DENIED">;
441
- INVALID_USER_CODE: better_auth43.RawError<"INVALID_USER_CODE">;
442
- DEVICE_CODE_ALREADY_PROCESSED: better_auth43.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
443
- POLLING_TOO_FREQUENTLY: better_auth43.RawError<"POLLING_TOO_FREQUENTLY">;
444
- INVALID_DEVICE_CODE_STATUS: better_auth43.RawError<"INVALID_DEVICE_CODE_STATUS">;
445
- AUTHENTICATION_REQUIRED: better_auth43.RawError<"AUTHENTICATION_REQUIRED">;
434
+ USER_NOT_FOUND: better_auth0.RawError<"USER_NOT_FOUND">;
435
+ FAILED_TO_CREATE_SESSION: better_auth0.RawError<"FAILED_TO_CREATE_SESSION">;
436
+ INVALID_DEVICE_CODE: better_auth0.RawError<"INVALID_DEVICE_CODE">;
437
+ EXPIRED_DEVICE_CODE: better_auth0.RawError<"EXPIRED_DEVICE_CODE">;
438
+ EXPIRED_USER_CODE: better_auth0.RawError<"EXPIRED_USER_CODE">;
439
+ AUTHORIZATION_PENDING: better_auth0.RawError<"AUTHORIZATION_PENDING">;
440
+ ACCESS_DENIED: better_auth0.RawError<"ACCESS_DENIED">;
441
+ INVALID_USER_CODE: better_auth0.RawError<"INVALID_USER_CODE">;
442
+ DEVICE_CODE_ALREADY_PROCESSED: better_auth0.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
443
+ POLLING_TOO_FREQUENTLY: better_auth0.RawError<"POLLING_TOO_FREQUENTLY">;
444
+ INVALID_DEVICE_CODE_STATUS: better_auth0.RawError<"INVALID_DEVICE_CODE_STATUS">;
445
+ AUTHENTICATION_REQUIRED: better_auth0.RawError<"AUTHENTICATION_REQUIRED">;
446
446
  };
447
447
  options: Partial<{
448
- expiresIn: better_auth_plugins4.TimeString;
449
- interval: better_auth_plugins4.TimeString;
448
+ expiresIn: better_auth_plugins0.TimeString;
449
+ interval: better_auth_plugins0.TimeString;
450
450
  deviceCodeLength: number;
451
451
  userCodeLength: number;
452
452
  schema: {
@@ -479,6 +479,6 @@ declare function createAgentsApp(config?: {
479
479
  auth?: UserAuthConfig;
480
480
  sandboxConfig?: SandboxConfig;
481
481
  emailService?: EmailServiceConfig;
482
- }): hono0.Hono<hono_types1.BlankEnv, hono_types1.BlankSchema, "/">;
482
+ }): hono0.Hono<hono_types0.BlankEnv, hono_types0.BlankSchema, "/">;
483
483
  //#endregion
484
484
  export { type SSOProviderConfig, type UserAuthConfig, createAgentsApp, createAgentsAuth, createAgentsHono };
package/dist/index.d.ts CHANGED
@@ -5,42 +5,42 @@ import { NativeSandboxConfig, SandboxConfig, VercelSandboxConfig } from "./domai
5
5
  import { SSOProviderConfig, UserAuthConfig, createAgentsApp } from "./factory.js";
6
6
  import "./sentry.js";
7
7
  import { Hono } from "hono";
8
- import * as zod0 from "zod";
9
- import * as hono_types0 from "hono/types";
10
- import * as better_auth0 from "better-auth";
11
- import * as better_auth_plugins0 from "better-auth/plugins";
8
+ import * as zod32 from "zod";
9
+ import * as hono_types12 from "hono/types";
10
+ import * as better_auth43 from "better-auth";
11
+ import * as better_auth_plugins4 from "better-auth/plugins";
12
12
 
13
13
  //#region src/index.d.ts
14
- declare const auth: better_auth0.Auth<{
14
+ declare const auth: better_auth43.Auth<{
15
15
  plugins: [{
16
16
  id: "bearer";
17
17
  hooks: {
18
18
  before: {
19
- matcher(context: better_auth0.HookEndpointContext): boolean;
20
- handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<{
19
+ matcher(context: better_auth43.HookEndpointContext): boolean;
20
+ handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<{
21
21
  context: {
22
22
  headers: Headers;
23
23
  };
24
24
  } | undefined>;
25
25
  }[];
26
26
  after: {
27
- matcher(context: better_auth0.HookEndpointContext): true;
28
- handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
27
+ matcher(context: better_auth43.HookEndpointContext): true;
28
+ handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
29
29
  }[];
30
30
  };
31
- options: better_auth_plugins0.BearerOptions | undefined;
31
+ options: better_auth_plugins4.BearerOptions | undefined;
32
32
  }, {
33
33
  id: "oauth-proxy";
34
- options: NoInfer<better_auth_plugins0.OAuthProxyOptions>;
34
+ options: NoInfer<better_auth_plugins4.OAuthProxyOptions>;
35
35
  endpoints: {
36
- oAuthProxy: better_auth0.StrictEndpoint<"/oauth-proxy-callback", {
36
+ oAuthProxy: better_auth43.StrictEndpoint<"/oauth-proxy-callback", {
37
37
  method: "GET";
38
38
  operationId: string;
39
- query: zod0.ZodObject<{
40
- callbackURL: zod0.ZodString;
41
- profile: zod0.ZodOptional<zod0.ZodString>;
42
- }, better_auth0.$strip>;
43
- use: ((inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>)[];
39
+ query: zod32.ZodObject<{
40
+ callbackURL: zod32.ZodString;
41
+ profile: zod32.ZodOptional<zod32.ZodString>;
42
+ }, better_auth43.$strip>;
43
+ use: ((inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>)[];
44
44
  metadata: {
45
45
  openapi: {
46
46
  operationId: string;
@@ -75,15 +75,15 @@ declare const auth: better_auth0.Auth<{
75
75
  };
76
76
  hooks: {
77
77
  before: {
78
- matcher(context: better_auth0.HookEndpointContext): boolean;
79
- handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
78
+ matcher(context: better_auth43.HookEndpointContext): boolean;
79
+ handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
80
80
  }[];
81
81
  after: {
82
- matcher(context: better_auth0.HookEndpointContext): boolean;
83
- handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
82
+ matcher(context: better_auth43.HookEndpointContext): boolean;
83
+ handler: (inputContext: better_auth43.MiddlewareInputContext<better_auth43.MiddlewareOptions>) => Promise<void>;
84
84
  }[];
85
85
  };
86
- }, better_auth_plugins0.DefaultOrganizationPlugin<{
86
+ }, better_auth_plugins4.DefaultOrganizationPlugin<{
87
87
  schema: {
88
88
  invitation: {
89
89
  additionalFields: {
@@ -153,19 +153,19 @@ declare const auth: better_auth0.Auth<{
153
153
  };
154
154
  };
155
155
  endpoints: {
156
- deviceCode: better_auth0.StrictEndpoint<"/device/code", {
156
+ deviceCode: better_auth43.StrictEndpoint<"/device/code", {
157
157
  method: "POST";
158
- body: zod0.ZodObject<{
159
- client_id: zod0.ZodString;
160
- scope: zod0.ZodOptional<zod0.ZodString>;
161
- }, better_auth0.$strip>;
162
- error: zod0.ZodObject<{
163
- error: zod0.ZodEnum<{
158
+ body: zod32.ZodObject<{
159
+ client_id: zod32.ZodString;
160
+ scope: zod32.ZodOptional<zod32.ZodString>;
161
+ }, better_auth43.$strip>;
162
+ error: zod32.ZodObject<{
163
+ error: zod32.ZodEnum<{
164
164
  invalid_request: "invalid_request";
165
165
  invalid_client: "invalid_client";
166
166
  }>;
167
- error_description: zod0.ZodString;
168
- }, better_auth0.$strip>;
167
+ error_description: zod32.ZodString;
168
+ }, better_auth43.$strip>;
169
169
  metadata: {
170
170
  openapi: {
171
171
  description: string;
@@ -238,15 +238,15 @@ declare const auth: better_auth0.Auth<{
238
238
  expires_in: number;
239
239
  interval: number;
240
240
  }>;
241
- deviceToken: better_auth0.StrictEndpoint<"/device/token", {
241
+ deviceToken: better_auth43.StrictEndpoint<"/device/token", {
242
242
  method: "POST";
243
- body: zod0.ZodObject<{
244
- grant_type: zod0.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
245
- device_code: zod0.ZodString;
246
- client_id: zod0.ZodString;
247
- }, better_auth0.$strip>;
248
- error: zod0.ZodObject<{
249
- error: zod0.ZodEnum<{
243
+ body: zod32.ZodObject<{
244
+ grant_type: zod32.ZodLiteral<"urn:ietf:params:oauth:grant-type:device_code">;
245
+ device_code: zod32.ZodString;
246
+ client_id: zod32.ZodString;
247
+ }, better_auth43.$strip>;
248
+ error: zod32.ZodObject<{
249
+ error: zod32.ZodEnum<{
250
250
  invalid_request: "invalid_request";
251
251
  authorization_pending: "authorization_pending";
252
252
  slow_down: "slow_down";
@@ -254,8 +254,8 @@ declare const auth: better_auth0.Auth<{
254
254
  access_denied: "access_denied";
255
255
  invalid_grant: "invalid_grant";
256
256
  }>;
257
- error_description: zod0.ZodString;
258
- }, better_auth0.$strip>;
257
+ error_description: zod32.ZodString;
258
+ }, better_auth43.$strip>;
259
259
  metadata: {
260
260
  openapi: {
261
261
  description: string;
@@ -306,17 +306,17 @@ declare const auth: better_auth0.Auth<{
306
306
  expires_in: number;
307
307
  scope: string;
308
308
  }>;
309
- deviceVerify: better_auth0.StrictEndpoint<"/device", {
309
+ deviceVerify: better_auth43.StrictEndpoint<"/device", {
310
310
  method: "GET";
311
- query: zod0.ZodObject<{
312
- user_code: zod0.ZodString;
313
- }, better_auth0.$strip>;
314
- error: zod0.ZodObject<{
315
- error: zod0.ZodEnum<{
311
+ query: zod32.ZodObject<{
312
+ user_code: zod32.ZodString;
313
+ }, better_auth43.$strip>;
314
+ error: zod32.ZodObject<{
315
+ error: zod32.ZodEnum<{
316
316
  invalid_request: "invalid_request";
317
317
  }>;
318
- error_description: zod0.ZodString;
319
- }, better_auth0.$strip>;
318
+ error_description: zod32.ZodString;
319
+ }, better_auth43.$strip>;
320
320
  metadata: {
321
321
  openapi: {
322
322
  description: string;
@@ -349,21 +349,21 @@ declare const auth: better_auth0.Auth<{
349
349
  user_code: string;
350
350
  status: string;
351
351
  }>;
352
- deviceApprove: better_auth0.StrictEndpoint<"/device/approve", {
352
+ deviceApprove: better_auth43.StrictEndpoint<"/device/approve", {
353
353
  method: "POST";
354
- body: zod0.ZodObject<{
355
- userCode: zod0.ZodString;
356
- }, better_auth0.$strip>;
357
- error: zod0.ZodObject<{
358
- error: zod0.ZodEnum<{
354
+ body: zod32.ZodObject<{
355
+ userCode: zod32.ZodString;
356
+ }, better_auth43.$strip>;
357
+ error: zod32.ZodObject<{
358
+ error: zod32.ZodEnum<{
359
359
  invalid_request: "invalid_request";
360
360
  expired_token: "expired_token";
361
361
  access_denied: "access_denied";
362
362
  device_code_already_processed: "device_code_already_processed";
363
363
  unauthorized: "unauthorized";
364
364
  }>;
365
- error_description: zod0.ZodString;
366
- }, better_auth0.$strip>;
365
+ error_description: zod32.ZodString;
366
+ }, better_auth43.$strip>;
367
367
  requireHeaders: true;
368
368
  metadata: {
369
369
  openapi: {
@@ -390,20 +390,20 @@ declare const auth: better_auth0.Auth<{
390
390
  }, {
391
391
  success: boolean;
392
392
  }>;
393
- deviceDeny: better_auth0.StrictEndpoint<"/device/deny", {
393
+ deviceDeny: better_auth43.StrictEndpoint<"/device/deny", {
394
394
  method: "POST";
395
- body: zod0.ZodObject<{
396
- userCode: zod0.ZodString;
397
- }, better_auth0.$strip>;
398
- error: zod0.ZodObject<{
399
- error: zod0.ZodEnum<{
395
+ body: zod32.ZodObject<{
396
+ userCode: zod32.ZodString;
397
+ }, better_auth43.$strip>;
398
+ error: zod32.ZodObject<{
399
+ error: zod32.ZodEnum<{
400
400
  invalid_request: "invalid_request";
401
401
  expired_token: "expired_token";
402
402
  access_denied: "access_denied";
403
403
  unauthorized: "unauthorized";
404
404
  }>;
405
- error_description: zod0.ZodString;
406
- }, better_auth0.$strip>;
405
+ error_description: zod32.ZodString;
406
+ }, better_auth43.$strip>;
407
407
  requireHeaders: true;
408
408
  metadata: {
409
409
  openapi: {
@@ -432,22 +432,22 @@ declare const auth: better_auth0.Auth<{
432
432
  }>;
433
433
  };
434
434
  $ERROR_CODES: {
435
- USER_NOT_FOUND: better_auth0.RawError<"USER_NOT_FOUND">;
436
- FAILED_TO_CREATE_SESSION: better_auth0.RawError<"FAILED_TO_CREATE_SESSION">;
437
- INVALID_DEVICE_CODE: better_auth0.RawError<"INVALID_DEVICE_CODE">;
438
- EXPIRED_DEVICE_CODE: better_auth0.RawError<"EXPIRED_DEVICE_CODE">;
439
- EXPIRED_USER_CODE: better_auth0.RawError<"EXPIRED_USER_CODE">;
440
- AUTHORIZATION_PENDING: better_auth0.RawError<"AUTHORIZATION_PENDING">;
441
- ACCESS_DENIED: better_auth0.RawError<"ACCESS_DENIED">;
442
- INVALID_USER_CODE: better_auth0.RawError<"INVALID_USER_CODE">;
443
- DEVICE_CODE_ALREADY_PROCESSED: better_auth0.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
444
- POLLING_TOO_FREQUENTLY: better_auth0.RawError<"POLLING_TOO_FREQUENTLY">;
445
- INVALID_DEVICE_CODE_STATUS: better_auth0.RawError<"INVALID_DEVICE_CODE_STATUS">;
446
- AUTHENTICATION_REQUIRED: better_auth0.RawError<"AUTHENTICATION_REQUIRED">;
435
+ USER_NOT_FOUND: better_auth43.RawError<"USER_NOT_FOUND">;
436
+ FAILED_TO_CREATE_SESSION: better_auth43.RawError<"FAILED_TO_CREATE_SESSION">;
437
+ INVALID_DEVICE_CODE: better_auth43.RawError<"INVALID_DEVICE_CODE">;
438
+ EXPIRED_DEVICE_CODE: better_auth43.RawError<"EXPIRED_DEVICE_CODE">;
439
+ EXPIRED_USER_CODE: better_auth43.RawError<"EXPIRED_USER_CODE">;
440
+ AUTHORIZATION_PENDING: better_auth43.RawError<"AUTHORIZATION_PENDING">;
441
+ ACCESS_DENIED: better_auth43.RawError<"ACCESS_DENIED">;
442
+ INVALID_USER_CODE: better_auth43.RawError<"INVALID_USER_CODE">;
443
+ DEVICE_CODE_ALREADY_PROCESSED: better_auth43.RawError<"DEVICE_CODE_ALREADY_PROCESSED">;
444
+ POLLING_TOO_FREQUENTLY: better_auth43.RawError<"POLLING_TOO_FREQUENTLY">;
445
+ INVALID_DEVICE_CODE_STATUS: better_auth43.RawError<"INVALID_DEVICE_CODE_STATUS">;
446
+ AUTHENTICATION_REQUIRED: better_auth43.RawError<"AUTHENTICATION_REQUIRED">;
447
447
  };
448
448
  options: Partial<{
449
- expiresIn: better_auth_plugins0.TimeString;
450
- interval: better_auth_plugins0.TimeString;
449
+ expiresIn: better_auth_plugins4.TimeString;
450
+ interval: better_auth_plugins4.TimeString;
451
451
  deviceCodeLength: number;
452
452
  userCodeLength: number;
453
453
  schema: {
@@ -474,6 +474,6 @@ declare const auth: better_auth0.Auth<{
474
474
  }>;
475
475
  }];
476
476
  }>;
477
- declare const app: Hono<hono_types0.BlankEnv, hono_types0.BlankSchema, "/">;
477
+ declare const app: Hono<hono_types12.BlankEnv, hono_types12.BlankSchema, "/">;
478
478
  //#endregion
479
479
  export { type AppConfig, type AppVariables, Hono, type NativeSandboxConfig, type SSOProviderConfig, type SandboxConfig, type UserAuthConfig, type VercelSandboxConfig, auth, createAgentsApp, createAgentsHono, app as default };
@@ -1,5 +1,5 @@
1
1
  import { BaseExecutionContext } from "@inkeep/agents-core";
2
- import * as hono18 from "hono";
2
+ import * as hono20 from "hono";
3
3
 
4
4
  //#region src/middleware/evalsAuth.d.ts
5
5
 
@@ -7,7 +7,7 @@ import * as hono18 from "hono";
7
7
  * Middleware to authenticate API requests using Bearer token authentication
8
8
  * First checks if token matches INKEEP_AGENTS_EVAL_API_BYPASS_SECRET,
9
9
  */
10
- declare const evalApiKeyAuth: () => hono18.MiddlewareHandler<{
10
+ declare const evalApiKeyAuth: () => hono20.MiddlewareHandler<{
11
11
  Variables: {
12
12
  executionContext: BaseExecutionContext;
13
13
  };
@@ -1,5 +1,5 @@
1
1
  import { BaseExecutionContext } from "@inkeep/agents-core";
2
- import * as hono11 from "hono";
2
+ import * as hono18 from "hono";
3
3
  import { createAuth } from "@inkeep/agents-core/auth";
4
4
 
5
5
  //#region src/middleware/manageAuth.d.ts
@@ -16,7 +16,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
16
16
  * EXCEPT for the legacy exception on GET /manage/tenants/:t/projects/:p/conversations/:id
17
17
  * (see isLegacyApiKeyAllowedRoute). API keys are otherwise restricted to the run domain only.
18
18
  */
19
- declare const manageBearerAuth: () => hono11.MiddlewareHandler<{
19
+ declare const manageBearerAuth: () => hono18.MiddlewareHandler<{
20
20
  Variables: {
21
21
  executionContext: BaseExecutionContext;
22
22
  userId?: string;
@@ -30,6 +30,6 @@ declare const manageBearerAuth: () => hono11.MiddlewareHandler<{
30
30
  * Uses Bearer token → manage bearer auth (bypass secret, session, Slack JWT, internal service),
31
31
  * otherwise falls back to session auth.
32
32
  */
33
- declare const manageBearerOrSessionAuth: () => hono11.MiddlewareHandler<any, string, {}, Response>;
33
+ declare const manageBearerOrSessionAuth: () => hono18.MiddlewareHandler<any, string, {}, Response>;
34
34
  //#endregion
35
35
  export { manageBearerAuth, manageBearerOrSessionAuth };
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono13 from "hono";
2
+ import * as hono2 from "hono";
3
3
 
4
4
  //#region src/middleware/requireEntitlement.d.ts
5
5
  type EntitlementConfig = {
@@ -11,6 +11,6 @@ declare const requireEntitlement: <Env$1 extends {
11
11
  Variables: ManageAppVariables;
12
12
  } = {
13
13
  Variables: ManageAppVariables;
14
- }>(config: EntitlementConfig) => hono13.MiddlewareHandler<Env$1, string, {}, Response>;
14
+ }>(config: EntitlementConfig) => hono2.MiddlewareHandler<Env$1, string, {}, Response>;
15
15
  //#endregion
16
16
  export { requireEntitlement };
@@ -1,5 +1,5 @@
1
1
  import { ManageAppVariables } from "../types/app.js";
2
- import * as hono2 from "hono";
2
+ import * as hono3 from "hono";
3
3
 
4
4
  //#region src/middleware/requirePermission.d.ts
5
5
  type Permission = {
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
9
9
  Variables: ManageAppVariables;
10
10
  } = {
11
11
  Variables: ManageAppVariables;
12
- }>(permissions: Permission) => hono2.MiddlewareHandler<Env$1, string, {}, Response>;
12
+ }>(permissions: Permission) => hono3.MiddlewareHandler<Env$1, string, {}, Response>;
13
13
  //#endregion
14
14
  export { requirePermission };
@@ -1,8 +1,8 @@
1
1
  import { BaseExecutionContext } from "@inkeep/agents-core";
2
- import * as hono3 from "hono";
2
+ import * as hono4 from "hono";
3
3
 
4
4
  //#region src/middleware/runAuth.d.ts
5
- declare const runApiKeyAuth: () => hono3.MiddlewareHandler<{
5
+ declare const runApiKeyAuth: () => hono4.MiddlewareHandler<{
6
6
  Variables: {
7
7
  executionContext: BaseExecutionContext;
8
8
  };
@@ -11,7 +11,7 @@ declare const runApiKeyAuth: () => hono3.MiddlewareHandler<{
11
11
  * Creates a middleware that applies API key authentication except for specified route patterns
12
12
  * @param skipRouteCheck - Function that returns true if the route should skip authentication
13
13
  */
14
- declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono3.MiddlewareHandler<{
14
+ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) => hono4.MiddlewareHandler<{
15
15
  Variables: {
16
16
  executionContext: BaseExecutionContext;
17
17
  };
@@ -20,7 +20,7 @@ declare const runApiKeyAuthExcept: (skipRouteCheck: (path: string) => boolean) =
20
20
  * Helper middleware for endpoints that optionally support API key authentication
21
21
  * If no auth header is present, it continues without setting the executionContext
22
22
  */
23
- declare const runOptionalAuth: () => hono3.MiddlewareHandler<{
23
+ declare const runOptionalAuth: () => hono4.MiddlewareHandler<{
24
24
  Variables: {
25
25
  executionContext?: BaseExecutionContext;
26
26
  };