@inkeep/agents-core 0.41.2 → 0.42.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (228) hide show
  1. package/dist/api-client/base-client.d.ts +87 -8
  2. package/dist/api-client/base-client.js +174 -1
  3. package/dist/api-client/eval-api-client.d.ts +47 -0
  4. package/dist/api-client/eval-api-client.js +65 -0
  5. package/dist/api-client/index.d.ts +4 -0
  6. package/dist/api-client/index.js +5 -0
  7. package/dist/api-client/manage-api-client.d.ts +34 -0
  8. package/dist/api-client/manage-api-client.js +104 -0
  9. package/dist/auth/auth.d.ts +86 -20
  10. package/dist/auth/auth.js +55 -1
  11. package/dist/auth/authz/client.d.ts +81 -0
  12. package/dist/auth/authz/client.js +189 -0
  13. package/dist/auth/authz/config.d.ts +76 -0
  14. package/dist/auth/authz/config.js +76 -0
  15. package/dist/auth/authz/index.d.ts +5 -0
  16. package/dist/auth/authz/index.js +6 -0
  17. package/dist/auth/authz/permissions.d.ts +57 -0
  18. package/dist/auth/authz/permissions.js +83 -0
  19. package/dist/auth/authz/sync.d.ts +85 -0
  20. package/dist/auth/authz/sync.js +237 -0
  21. package/dist/auth/permissions.d.ts +13 -13
  22. package/dist/auth/permissions.js +2 -181
  23. package/dist/client-exports.d.ts +8 -3
  24. package/dist/client-exports.js +3 -2
  25. package/dist/constants/context-breakdown.d.ts +61 -0
  26. package/dist/constants/context-breakdown.js +124 -0
  27. package/dist/constants/otel-attributes.d.ts +4 -0
  28. package/dist/constants/otel-attributes.js +4 -0
  29. package/dist/context/ContextConfig.d.ts +2 -2
  30. package/dist/context/ContextConfig.js +3 -3
  31. package/dist/context/TemplateEngine.js +0 -1
  32. package/dist/context/index.d.ts +1 -5
  33. package/dist/context/index.js +1 -5
  34. package/dist/credential-stuffer/CredentialStuffer.d.ts +1 -1
  35. package/dist/data-access/index.d.ts +34 -26
  36. package/dist/data-access/index.js +34 -26
  37. package/dist/data-access/manage/agentFull.d.ts +36 -0
  38. package/dist/data-access/{agentFull.js → manage/agentFull.js} +205 -7
  39. package/dist/data-access/{agents.d.ts → manage/agents.d.ts} +23 -22
  40. package/dist/data-access/{agents.js → manage/agents.js} +52 -7
  41. package/dist/data-access/{artifactComponents.d.ts → manage/artifactComponents.d.ts} +21 -21
  42. package/dist/data-access/{artifactComponents.js → manage/artifactComponents.js} +5 -5
  43. package/dist/data-access/{contextConfigs.d.ts → manage/contextConfigs.d.ts} +14 -14
  44. package/dist/data-access/{contextConfigs.js → manage/contextConfigs.js} +3 -3
  45. package/dist/data-access/{credentialReferences.d.ts → manage/credentialReferences.d.ts} +17 -17
  46. package/dist/data-access/{credentialReferences.js → manage/credentialReferences.js} +2 -2
  47. package/dist/data-access/{dataComponents.d.ts → manage/dataComponents.d.ts} +20 -20
  48. package/dist/data-access/{dataComponents.js → manage/dataComponents.js} +7 -7
  49. package/dist/data-access/manage/evalConfig.d.ts +221 -0
  50. package/dist/data-access/manage/evalConfig.js +275 -0
  51. package/dist/data-access/{externalAgents.d.ts → manage/externalAgents.d.ts} +16 -16
  52. package/dist/data-access/{externalAgents.js → manage/externalAgents.js} +2 -2
  53. package/dist/data-access/{functionTools.d.ts → manage/functionTools.d.ts} +65 -15
  54. package/dist/data-access/{functionTools.js → manage/functionTools.js} +90 -8
  55. package/dist/data-access/{functions.d.ts → manage/functions.d.ts} +9 -9
  56. package/dist/data-access/{functions.js → manage/functions.js} +3 -3
  57. package/dist/data-access/manage/projectFull.d.ts +38 -0
  58. package/dist/data-access/{projectFull.js → manage/projectFull.js} +64 -65
  59. package/dist/data-access/manage/projectLifecycle.d.ts +119 -0
  60. package/dist/data-access/manage/projectLifecycle.js +234 -0
  61. package/dist/data-access/manage/projects.d.ts +75 -0
  62. package/dist/data-access/{projects.js → manage/projects.js} +15 -16
  63. package/dist/data-access/{subAgentExternalAgentRelations.d.ts → manage/subAgentExternalAgentRelations.d.ts} +19 -19
  64. package/dist/data-access/{subAgentExternalAgentRelations.js → manage/subAgentExternalAgentRelations.js} +2 -2
  65. package/dist/data-access/{subAgentRelations.d.ts → manage/subAgentRelations.d.ts} +29 -29
  66. package/dist/data-access/{subAgentRelations.js → manage/subAgentRelations.js} +3 -3
  67. package/dist/data-access/{subAgentTeamAgentRelations.d.ts → manage/subAgentTeamAgentRelations.d.ts} +19 -19
  68. package/dist/data-access/{subAgentTeamAgentRelations.js → manage/subAgentTeamAgentRelations.js} +2 -2
  69. package/dist/data-access/{subAgents.d.ts → manage/subAgents.d.ts} +13 -13
  70. package/dist/data-access/{subAgents.js → manage/subAgents.js} +4 -4
  71. package/dist/data-access/{tools.d.ts → manage/tools.d.ts} +26 -19
  72. package/dist/data-access/{tools.js → manage/tools.js} +57 -35
  73. package/dist/data-access/manage/triggers.d.ts +80 -0
  74. package/dist/data-access/manage/triggers.js +81 -0
  75. package/dist/data-access/{apiKeys.d.ts → runtime/apiKeys.d.ts} +17 -17
  76. package/dist/data-access/{apiKeys.js → runtime/apiKeys.js} +3 -3
  77. package/dist/data-access/runtime/cascade-delete.d.ts +77 -0
  78. package/dist/data-access/runtime/cascade-delete.js +111 -0
  79. package/dist/data-access/{contextCache.d.ts → runtime/contextCache.d.ts} +13 -13
  80. package/dist/data-access/{contextCache.js → runtime/contextCache.js} +5 -5
  81. package/dist/data-access/{conversations.d.ts → runtime/conversations.d.ts} +68 -19
  82. package/dist/data-access/{conversations.js → runtime/conversations.js} +13 -7
  83. package/dist/data-access/runtime/evalRuns.d.ts +120 -0
  84. package/dist/data-access/runtime/evalRuns.js +168 -0
  85. package/dist/data-access/{ledgerArtifacts.d.ts → runtime/ledgerArtifacts.d.ts} +13 -13
  86. package/dist/data-access/{ledgerArtifacts.js → runtime/ledgerArtifacts.js} +3 -3
  87. package/dist/data-access/{messages.d.ts → runtime/messages.d.ts} +15 -15
  88. package/dist/data-access/{messages.js → runtime/messages.js} +2 -2
  89. package/dist/data-access/{organizations.d.ts → runtime/organizations.d.ts} +16 -7
  90. package/dist/data-access/{organizations.js → runtime/organizations.js} +15 -3
  91. package/dist/data-access/runtime/projects.d.ts +62 -0
  92. package/dist/data-access/runtime/projects.js +90 -0
  93. package/dist/data-access/runtime/tasks.d.ts +55 -0
  94. package/dist/data-access/{tasks.js → runtime/tasks.js} +2 -2
  95. package/dist/data-access/runtime/triggerInvocations.d.ts +62 -0
  96. package/dist/data-access/runtime/triggerInvocations.js +54 -0
  97. package/dist/data-access/runtime/users.d.ts +19 -0
  98. package/dist/data-access/{users.js → runtime/users.js} +2 -2
  99. package/dist/data-access/validation.d.ts +4 -4
  100. package/dist/data-access/validation.js +1 -1
  101. package/dist/db/clean.d.ts +8 -4
  102. package/dist/db/clean.js +14 -105
  103. package/dist/db/delete.d.ts +1 -1
  104. package/dist/db/delete.js +7 -10
  105. package/dist/db/manage/dolt-cleanup.d.ts +51 -0
  106. package/dist/db/manage/dolt-cleanup.js +132 -0
  107. package/dist/db/manage/manage-client.d.ts +26 -0
  108. package/dist/db/manage/manage-client.js +68 -0
  109. package/dist/db/{schema.d.ts → manage/manage-schema.d.ts} +1459 -1285
  110. package/dist/db/{schema.js → manage/manage-schema.js} +433 -341
  111. package/dist/db/manage/test-manage-client.d.ts +27 -0
  112. package/dist/db/manage/test-manage-client.js +68 -0
  113. package/dist/db/runtime/runtime-client.d.ts +20 -0
  114. package/dist/db/runtime/runtime-client.js +30 -0
  115. package/dist/db/runtime/runtime-schema.d.ts +2834 -0
  116. package/dist/db/runtime/runtime-schema.js +483 -0
  117. package/dist/db/runtime/test-runtime-client.d.ts +27 -0
  118. package/dist/db/{test-client.js → runtime/test-runtime-client.js} +11 -25
  119. package/dist/dolt/branch.d.ts +62 -0
  120. package/dist/dolt/branch.js +82 -0
  121. package/dist/dolt/branches-api.d.ts +108 -0
  122. package/dist/dolt/branches-api.js +162 -0
  123. package/dist/dolt/commit.d.ts +94 -0
  124. package/dist/dolt/commit.js +103 -0
  125. package/dist/dolt/diff.d.ts +27 -0
  126. package/dist/dolt/diff.js +21 -0
  127. package/dist/dolt/index.d.ts +10 -0
  128. package/dist/dolt/index.js +11 -0
  129. package/dist/dolt/merge.d.ts +63 -0
  130. package/dist/dolt/merge.js +81 -0
  131. package/dist/dolt/migrate-all-branches.d.ts +4 -0
  132. package/dist/dolt/migrate-all-branches.js +78 -0
  133. package/dist/dolt/migrate-dolt.d.ts +1 -0
  134. package/dist/dolt/migrate-dolt.js +22 -0
  135. package/dist/dolt/ref-helpers.d.ts +19 -0
  136. package/dist/dolt/ref-helpers.js +65 -0
  137. package/dist/dolt/ref-middleware.d.ts +82 -0
  138. package/dist/dolt/ref-middleware.js +217 -0
  139. package/dist/dolt/ref-scope.d.ts +101 -0
  140. package/dist/dolt/ref-scope.js +231 -0
  141. package/dist/dolt/schema-sync.d.ts +134 -0
  142. package/dist/dolt/schema-sync.js +246 -0
  143. package/dist/env.d.ts +6 -4
  144. package/dist/env.js +3 -2
  145. package/dist/index.d.ts +71 -44
  146. package/dist/index.js +74 -47
  147. package/dist/types/entities.d.ts +81 -2
  148. package/dist/types/index.d.ts +3 -3
  149. package/dist/types/utility.d.ts +45 -4
  150. package/dist/utils/JsonTransformer.d.ts +44 -0
  151. package/dist/utils/JsonTransformer.js +112 -0
  152. package/dist/utils/apiKeys.d.ts +5 -1
  153. package/dist/utils/apiKeys.js +11 -1
  154. package/dist/utils/colors.d.ts +34 -0
  155. package/dist/utils/colors.js +49 -0
  156. package/dist/utils/credential-store-utils.d.ts +1 -1
  157. package/dist/utils/format-messages.d.ts +1 -1
  158. package/dist/utils/index.d.ts +7 -3
  159. package/dist/utils/index.js +7 -3
  160. package/dist/utils/internal-service-auth.d.ts +79 -0
  161. package/dist/utils/internal-service-auth.js +140 -0
  162. package/dist/utils/jwt-helpers.d.ts +56 -0
  163. package/dist/utils/jwt-helpers.js +90 -0
  164. package/dist/utils/service-token-auth.d.ts +9 -27
  165. package/dist/utils/service-token-auth.js +48 -96
  166. package/dist/utils/template-interpolation.d.ts +22 -0
  167. package/dist/utils/template-interpolation.js +62 -0
  168. package/dist/utils/third-party-mcp-servers/composio-client.js +23 -23
  169. package/dist/utils/trigger-auth.d.ts +62 -0
  170. package/dist/utils/trigger-auth.js +125 -0
  171. package/dist/validation/agentFull.js +2 -4
  172. package/dist/validation/dolt-schemas.d.ts +49 -0
  173. package/dist/validation/dolt-schemas.js +44 -0
  174. package/dist/validation/drizzle-schema-helpers.d.ts +4 -26
  175. package/dist/validation/drizzle-schema-helpers.js +5 -151
  176. package/dist/validation/index.d.ts +4 -3
  177. package/dist/validation/index.js +3 -2
  178. package/dist/validation/schemas.d.ts +17647 -4789
  179. package/dist/validation/schemas.js +328 -11
  180. package/drizzle/manage/0000_tearful_rhodey.sql +414 -0
  181. package/drizzle/manage/0001_broken_wendell_vaughn.sql +19 -0
  182. package/drizzle/manage/0002_bent_sunfire.sql +1 -0
  183. package/drizzle/manage/meta/0000_snapshot.json +2987 -0
  184. package/drizzle/manage/meta/0001_snapshot.json +3115 -0
  185. package/drizzle/manage/meta/0002_snapshot.json +3115 -0
  186. package/drizzle/manage/meta/_journal.json +27 -0
  187. package/drizzle/runtime/0008_silly_preak.sql +127 -0
  188. package/drizzle/runtime/0009_freezing_leo.sql +17 -0
  189. package/drizzle/runtime/meta/0008_snapshot.json +2263 -0
  190. package/drizzle/runtime/meta/0009_snapshot.json +2397 -0
  191. package/drizzle/{meta → runtime/meta}/_journal.json +14 -0
  192. package/package.json +48 -15
  193. package/dist/context/ContextFetcher.d.ts +0 -73
  194. package/dist/context/ContextFetcher.js +0 -291
  195. package/dist/context/ContextResolver.d.ts +0 -60
  196. package/dist/context/ContextResolver.js +0 -278
  197. package/dist/context/context.d.ts +0 -27
  198. package/dist/context/context.js +0 -128
  199. package/dist/context/contextCache.d.ts +0 -58
  200. package/dist/context/contextCache.js +0 -177
  201. package/dist/data-access/agentFull.d.ts +0 -33
  202. package/dist/data-access/projectFull.d.ts +0 -32
  203. package/dist/data-access/projects.d.ts +0 -71
  204. package/dist/data-access/tasks.d.ts +0 -45
  205. package/dist/data-access/users.d.ts +0 -19
  206. package/dist/db/client.d.ts +0 -20
  207. package/dist/db/client.js +0 -28
  208. package/dist/db/test-client.d.ts +0 -31
  209. package/dist/middleware/contextValidation.d.ts +0 -46
  210. package/dist/middleware/contextValidation.js +0 -280
  211. package/dist/middleware/index.d.ts +0 -2
  212. package/dist/middleware/index.js +0 -3
  213. package/dist/utils/execution.d.ts +0 -22
  214. package/dist/utils/execution.js +0 -25
  215. /package/drizzle/{0000_exotic_mysterio.sql → runtime/0000_exotic_mysterio.sql} +0 -0
  216. /package/drizzle/{0001_calm_sheva_callister.sql → runtime/0001_calm_sheva_callister.sql} +0 -0
  217. /package/drizzle/{0002_puzzling_goblin_queen.sql → runtime/0002_puzzling_goblin_queen.sql} +0 -0
  218. /package/drizzle/{0003_sweet_human_robot.sql → runtime/0003_sweet_human_robot.sql} +0 -0
  219. /package/drizzle/{0004_cuddly_shooting_star.sql → runtime/0004_cuddly_shooting_star.sql} +0 -0
  220. /package/drizzle/{0005_reflective_starfox.sql → runtime/0005_reflective_starfox.sql} +0 -0
  221. /package/drizzle/{0006_stale_thaddeus_ross.sql → runtime/0006_stale_thaddeus_ross.sql} +0 -0
  222. /package/drizzle/{0007_slim_karma.sql → runtime/0007_slim_karma.sql} +0 -0
  223. /package/drizzle/{meta → runtime/meta}/0000_snapshot.json +0 -0
  224. /package/drizzle/{meta → runtime/meta}/0001_snapshot.json +0 -0
  225. /package/drizzle/{meta → runtime/meta}/0003_snapshot.json +0 -0
  226. /package/drizzle/{meta → runtime/meta}/0005_snapshot.json +0 -0
  227. /package/drizzle/{meta → runtime/meta}/0006_snapshot.json +0 -0
  228. /package/drizzle/{meta → runtime/meta}/0007_snapshot.json +0 -0
@@ -1,4 +1,4 @@
1
- import { DatabaseClient } from "../db/client.js";
1
+ import { AgentsRunDatabaseClient } from "../db/runtime/runtime-client.js";
2
2
  import * as _better_auth_sso0 from "@better-auth/sso";
3
3
  import * as better_auth0 from "better-auth";
4
4
  import { BetterAuthAdvancedOptions } from "better-auth";
@@ -56,7 +56,7 @@ interface SSOProviderConfig {
56
56
  interface BetterAuthConfig {
57
57
  baseURL: string;
58
58
  secret: string;
59
- dbClient: DatabaseClient;
59
+ dbClient: AgentsRunDatabaseClient;
60
60
  ssoProviders?: SSOProviderConfig[];
61
61
  socialProviders?: {
62
62
  google?: GoogleOptions;
@@ -81,6 +81,12 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
81
81
  requireEmailVerification: false;
82
82
  autoSignIn: true;
83
83
  };
84
+ account: {
85
+ accountLinking: {
86
+ enabled: true;
87
+ trustedProviders: ("google" | "email-password" | "auth0")[];
88
+ };
89
+ };
84
90
  databaseHooks: {
85
91
  session: {
86
92
  create: {
@@ -846,25 +852,25 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
846
852
  ac: better_auth_plugins0.AccessControl;
847
853
  roles: {
848
854
  member: {
849
- authorize<K_1 extends "function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key] | {
850
- actions: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key];
855
+ authorize<K_1 extends "organization" | "ac" | "member" | "project" | "team" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key] | {
856
+ actions: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key];
851
857
  connector: "OR" | "AND";
852
858
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
853
- statements: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>;
859
+ statements: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>;
854
860
  };
855
861
  admin: {
856
- authorize<K_1 extends "function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key] | {
857
- actions: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key];
862
+ authorize<K_1 extends "organization" | "ac" | "member" | "project" | "team" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key] | {
863
+ actions: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key];
858
864
  connector: "OR" | "AND";
859
865
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
860
- statements: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>;
866
+ statements: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>;
861
867
  };
862
868
  owner: {
863
- authorize<K_1 extends "function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key] | {
864
- actions: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key];
869
+ authorize<K_1 extends "organization" | "ac" | "member" | "project" | "team" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key] | {
870
+ actions: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key];
865
871
  connector: "OR" | "AND";
866
872
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
867
- statements: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>;
873
+ statements: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>;
868
874
  };
869
875
  };
870
876
  membershipLimit: number;
@@ -880,6 +886,36 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
880
886
  user: better_auth0.User;
881
887
  };
882
888
  }): Promise<void>;
889
+ organizationHooks: {
890
+ afterAcceptInvitation: ({
891
+ member,
892
+ user,
893
+ organization: org
894
+ }: {
895
+ invitation: better_auth_plugins0.Invitation & Record<string, any>;
896
+ member: better_auth_plugins0.Member & Record<string, any>;
897
+ user: better_auth0.User & Record<string, any>;
898
+ organization: better_auth_plugins0.Organization & Record<string, any>;
899
+ }) => Promise<void>;
900
+ afterUpdateMemberRole: ({
901
+ member,
902
+ organization: org,
903
+ previousRole
904
+ }: {
905
+ member: better_auth_plugins0.Member & Record<string, any>;
906
+ previousRole: string;
907
+ user: better_auth0.User & Record<string, any>;
908
+ organization: better_auth_plugins0.Organization & Record<string, any>;
909
+ }) => Promise<void>;
910
+ afterRemoveMember: ({
911
+ member,
912
+ organization: org
913
+ }: {
914
+ member: better_auth_plugins0.Member & Record<string, any>;
915
+ user: better_auth0.User & Record<string, any>;
916
+ organization: better_auth_plugins0.Organization & Record<string, any>;
917
+ }) => Promise<void>;
918
+ };
883
919
  }>;
884
920
  schema: {
885
921
  organization: {
@@ -1125,25 +1161,25 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
1125
1161
  ac: better_auth_plugins0.AccessControl;
1126
1162
  roles: {
1127
1163
  member: {
1128
- authorize<K_1 extends "function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key] | {
1129
- actions: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key];
1164
+ authorize<K_1 extends "organization" | "ac" | "member" | "project" | "team" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key] | {
1165
+ actions: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key];
1130
1166
  connector: "OR" | "AND";
1131
1167
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1132
- statements: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>;
1168
+ statements: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>;
1133
1169
  };
1134
1170
  admin: {
1135
- authorize<K_1 extends "function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key] | {
1136
- actions: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key];
1171
+ authorize<K_1 extends "organization" | "ac" | "member" | "project" | "team" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key] | {
1172
+ actions: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key];
1137
1173
  connector: "OR" | "AND";
1138
1174
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1139
- statements: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>;
1175
+ statements: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>;
1140
1176
  };
1141
1177
  owner: {
1142
- authorize<K_1 extends "function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key] | {
1143
- actions: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>[key];
1178
+ authorize<K_1 extends "organization" | "ac" | "member" | "project" | "team" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key] | {
1179
+ actions: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>[key];
1144
1180
  connector: "OR" | "AND";
1145
1181
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1146
- statements: better_auth_plugins0.Subset<"function" | "organization" | "agent" | "member" | "invitation" | "project" | "tool" | "ac" | "sub_agent" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "team", better_auth_plugins0.Statements>;
1182
+ statements: better_auth_plugins0.Subset<"organization" | "ac" | "member" | "project" | "team" | "invitation", better_auth_plugins0.Statements>;
1147
1183
  };
1148
1184
  };
1149
1185
  membershipLimit: number;
@@ -1159,6 +1195,36 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
1159
1195
  user: better_auth0.User;
1160
1196
  };
1161
1197
  }): Promise<void>;
1198
+ organizationHooks: {
1199
+ afterAcceptInvitation: ({
1200
+ member,
1201
+ user,
1202
+ organization: org
1203
+ }: {
1204
+ invitation: better_auth_plugins0.Invitation & Record<string, any>;
1205
+ member: better_auth_plugins0.Member & Record<string, any>;
1206
+ user: better_auth0.User & Record<string, any>;
1207
+ organization: better_auth_plugins0.Organization & Record<string, any>;
1208
+ }) => Promise<void>;
1209
+ afterUpdateMemberRole: ({
1210
+ member,
1211
+ organization: org,
1212
+ previousRole
1213
+ }: {
1214
+ member: better_auth_plugins0.Member & Record<string, any>;
1215
+ previousRole: string;
1216
+ user: better_auth0.User & Record<string, any>;
1217
+ organization: better_auth_plugins0.Organization & Record<string, any>;
1218
+ }) => Promise<void>;
1219
+ afterRemoveMember: ({
1220
+ member,
1221
+ organization: org
1222
+ }: {
1223
+ member: better_auth_plugins0.Member & Record<string, any>;
1224
+ user: better_auth0.User & Record<string, any>;
1225
+ organization: better_auth_plugins0.Organization & Record<string, any>;
1226
+ }) => Promise<void>;
1227
+ };
1162
1228
  }>;
1163
1229
  }, {
1164
1230
  id: "device-authorization";
package/dist/auth/auth.js CHANGED
@@ -76,6 +76,14 @@ function createAuth(config) {
76
76
  requireEmailVerification: false,
77
77
  autoSignIn: true
78
78
  },
79
+ account: { accountLinking: {
80
+ enabled: true,
81
+ trustedProviders: [
82
+ "auth0",
83
+ "google",
84
+ "email-password"
85
+ ]
86
+ } },
79
87
  databaseHooks: { session: { create: { before: async (session) => {
80
88
  const organization$1 = await getInitialOrganization(config.dbClient, session.userId);
81
89
  return { data: {
@@ -114,7 +122,7 @@ function createAuth(config) {
114
122
  "http://localhost:3000",
115
123
  "http://localhost:3002",
116
124
  env.INKEEP_AGENTS_MANAGE_UI_URL,
117
- env.INKEEP_AGENTS_MANAGE_API_URL,
125
+ env.INKEEP_AGENTS_API_URL,
118
126
  env.TRUSTED_ORIGIN
119
127
  ].filter((origin) => typeof origin === "string" && origin.length > 0),
120
128
  plugins: [
@@ -139,6 +147,52 @@ function createAuth(config) {
139
147
  organization: data.organization.name,
140
148
  invitationId: data.id
141
149
  });
150
+ },
151
+ organizationHooks: {
152
+ afterAcceptInvitation: async ({ member: member$1, user, organization: org }) => {
153
+ try {
154
+ const { syncOrgMemberToSpiceDb } = await import("./authz/sync.js");
155
+ await syncOrgMemberToSpiceDb({
156
+ tenantId: org.id,
157
+ userId: user.id,
158
+ role: member$1.role,
159
+ action: "add"
160
+ });
161
+ console.log(`🔐 SpiceDB: Synced member ${user.email} as ${member$1.role} to org ${org.name}`);
162
+ } catch (error) {
163
+ console.error("❌ SpiceDB sync failed for new member:", error);
164
+ }
165
+ },
166
+ afterUpdateMemberRole: async ({ member: member$1, organization: org, previousRole }) => {
167
+ try {
168
+ const { changeOrgRole } = await import("./authz/sync.js");
169
+ const oldRole = previousRole;
170
+ const newRole = member$1.role;
171
+ await changeOrgRole({
172
+ tenantId: org.id,
173
+ userId: member$1.userId,
174
+ oldRole,
175
+ newRole
176
+ });
177
+ console.log(`🔐 SpiceDB: Updated member ${member$1.userId} role from ${oldRole} to ${newRole} in org ${org.name}`);
178
+ } catch (error) {
179
+ console.error("❌ SpiceDB sync failed for role update:", error);
180
+ }
181
+ },
182
+ afterRemoveMember: async ({ member: member$1, organization: org }) => {
183
+ try {
184
+ const { syncOrgMemberToSpiceDb } = await import("./authz/sync.js");
185
+ await syncOrgMemberToSpiceDb({
186
+ tenantId: org.id,
187
+ userId: member$1.userId,
188
+ role: member$1.role,
189
+ action: "remove"
190
+ });
191
+ console.log(`🔐 SpiceDB: Removed member ${member$1.userId} from org ${org.name}`);
192
+ } catch (error) {
193
+ console.error("❌ SpiceDB sync failed for member removal:", error);
194
+ }
195
+ }
142
196
  }
143
197
  }),
144
198
  deviceAuthorization({
@@ -0,0 +1,81 @@
1
+ import { v1 } from "@authzed/authzed-node";
2
+
3
+ //#region src/auth/authz/client.d.ts
4
+
5
+ type ZedClientInterface = ReturnType<typeof v1.NewClient>;
6
+ /**
7
+ * Get the SpiceDB client singleton.
8
+ * Creates a new client on first call.
9
+ */
10
+ declare function getSpiceClient(): ZedClientInterface;
11
+ /**
12
+ * Reset the client (useful for testing)
13
+ */
14
+ declare function resetSpiceClient(): void;
15
+ /**
16
+ * Check if a subject has a permission on a resource.
17
+ * Note: Caller must verify isAuthzEnabled(tenantId) before calling.
18
+ */
19
+ declare function checkPermission(params: {
20
+ resourceType: string;
21
+ resourceId: string;
22
+ permission: string;
23
+ subjectType: string;
24
+ subjectId: string;
25
+ }): Promise<boolean>;
26
+ /**
27
+ * Check multiple permissions on a resource in a single request.
28
+ * More efficient than multiple checkPermission calls.
29
+ *
30
+ * @returns Record mapping permission names to boolean results
31
+ */
32
+ declare function checkBulkPermissions(params: {
33
+ resourceType: string;
34
+ resourceId: string;
35
+ permissions: string[];
36
+ subjectType: string;
37
+ subjectId: string;
38
+ }): Promise<Record<string, boolean>>;
39
+ /**
40
+ * Find all resources of a type that a subject has a permission on.
41
+ */
42
+ declare function lookupResources(params: {
43
+ resourceType: string;
44
+ permission: string;
45
+ subjectType: string;
46
+ subjectId: string;
47
+ }): Promise<string[]>;
48
+ /**
49
+ * Write a relationship to SpiceDB.
50
+ */
51
+ declare function writeRelationship(params: {
52
+ resourceType: string;
53
+ resourceId: string;
54
+ relation: string;
55
+ subjectType: string;
56
+ subjectId: string;
57
+ }): Promise<void>;
58
+ /**
59
+ * Delete a relationship from SpiceDB.
60
+ */
61
+ declare function deleteRelationship(params: {
62
+ resourceType: string;
63
+ resourceId: string;
64
+ relation: string;
65
+ subjectType: string;
66
+ subjectId: string;
67
+ }): Promise<void>;
68
+ /**
69
+ * Read relationships for a resource to list subjects with access.
70
+ */
71
+ declare function readRelationships(params: {
72
+ resourceType: string;
73
+ resourceId: string;
74
+ relation?: string;
75
+ }): Promise<Array<{
76
+ subjectType: string;
77
+ subjectId: string;
78
+ relation: string;
79
+ }>>;
80
+ //#endregion
81
+ export { checkBulkPermissions, checkPermission, deleteRelationship, getSpiceClient, lookupResources, readRelationships, resetSpiceClient, v1, writeRelationship };
@@ -0,0 +1,189 @@
1
+ import { getSpiceDbConfig } from "./config.js";
2
+ import { v1 } from "@authzed/authzed-node";
3
+
4
+ //#region src/auth/authz/client.ts
5
+ /**
6
+ * SpiceDB Client Wrapper
7
+ *
8
+ * Provides a singleton SpiceDB client and helper functions for common operations.
9
+ */
10
+ let client = null;
11
+ /**
12
+ * Get the SpiceDB client singleton.
13
+ * Creates a new client on first call.
14
+ */
15
+ function getSpiceClient() {
16
+ if (!client) {
17
+ const config = getSpiceDbConfig();
18
+ client = v1.NewClient(config.token, config.endpoint, config.tlsEnabled ? v1.ClientSecurity.SECURE : v1.ClientSecurity.INSECURE_LOCALHOST_ALLOWED);
19
+ }
20
+ return client;
21
+ }
22
+ /**
23
+ * Reset the client (useful for testing)
24
+ */
25
+ function resetSpiceClient() {
26
+ client = null;
27
+ }
28
+ const PERMISSIONSHIP_HAS_PERMISSION = 2;
29
+ const RELATIONSHIP_OPERATION_CREATE = 1;
30
+ /**
31
+ * Check if a subject has a permission on a resource.
32
+ * Note: Caller must verify isAuthzEnabled(tenantId) before calling.
33
+ */
34
+ async function checkPermission(params) {
35
+ return (await getSpiceClient().promises.checkPermission({
36
+ resource: {
37
+ objectType: params.resourceType,
38
+ objectId: params.resourceId
39
+ },
40
+ permission: params.permission,
41
+ subject: {
42
+ object: {
43
+ objectType: params.subjectType,
44
+ objectId: params.subjectId
45
+ },
46
+ optionalRelation: ""
47
+ },
48
+ consistency: { requirement: {
49
+ oneofKind: "minimizeLatency",
50
+ minimizeLatency: true
51
+ } },
52
+ context: void 0,
53
+ withTracing: false
54
+ })).permissionship === PERMISSIONSHIP_HAS_PERMISSION;
55
+ }
56
+ /**
57
+ * Check multiple permissions on a resource in a single request.
58
+ * More efficient than multiple checkPermission calls.
59
+ *
60
+ * @returns Record mapping permission names to boolean results
61
+ */
62
+ async function checkBulkPermissions(params) {
63
+ const spice = getSpiceClient();
64
+ const items = params.permissions.map((permission) => v1.CheckBulkPermissionsRequestItem.create({
65
+ resource: v1.ObjectReference.create({
66
+ objectType: params.resourceType,
67
+ objectId: params.resourceId
68
+ }),
69
+ permission,
70
+ subject: v1.SubjectReference.create({ object: v1.ObjectReference.create({
71
+ objectType: params.subjectType,
72
+ objectId: params.subjectId
73
+ }) })
74
+ }));
75
+ const response = await spice.promises.checkBulkPermissions(v1.CheckBulkPermissionsRequest.create({
76
+ items,
77
+ consistency: { requirement: {
78
+ oneofKind: "minimizeLatency",
79
+ minimizeLatency: true
80
+ } }
81
+ }));
82
+ const result = {};
83
+ for (let i = 0; i < params.permissions.length; i++) {
84
+ const permission = params.permissions[i];
85
+ const pair = response.pairs[i];
86
+ if (pair.response.oneofKind === "item") result[permission] = pair.response.item.permissionship === PERMISSIONSHIP_HAS_PERMISSION;
87
+ else result[permission] = false;
88
+ }
89
+ return result;
90
+ }
91
+ /**
92
+ * Find all resources of a type that a subject has a permission on.
93
+ */
94
+ async function lookupResources(params) {
95
+ return (await getSpiceClient().promises.lookupResources({
96
+ resourceObjectType: params.resourceType,
97
+ permission: params.permission,
98
+ subject: {
99
+ object: {
100
+ objectType: params.subjectType,
101
+ objectId: params.subjectId
102
+ },
103
+ optionalRelation: ""
104
+ },
105
+ consistency: { requirement: {
106
+ oneofKind: "minimizeLatency",
107
+ minimizeLatency: true
108
+ } },
109
+ context: void 0,
110
+ optionalLimit: 0,
111
+ optionalCursor: void 0
112
+ })).map((item) => item.resourceObjectId);
113
+ }
114
+ /**
115
+ * Write a relationship to SpiceDB.
116
+ */
117
+ async function writeRelationship(params) {
118
+ await getSpiceClient().promises.writeRelationships({
119
+ updates: [{
120
+ operation: RELATIONSHIP_OPERATION_CREATE,
121
+ relationship: {
122
+ resource: {
123
+ objectType: params.resourceType,
124
+ objectId: params.resourceId
125
+ },
126
+ relation: params.relation,
127
+ subject: {
128
+ object: {
129
+ objectType: params.subjectType,
130
+ objectId: params.subjectId
131
+ },
132
+ optionalRelation: ""
133
+ },
134
+ optionalCaveat: void 0
135
+ }
136
+ }],
137
+ optionalPreconditions: [],
138
+ optionalTransactionMetadata: void 0
139
+ });
140
+ }
141
+ /**
142
+ * Delete a relationship from SpiceDB.
143
+ */
144
+ async function deleteRelationship(params) {
145
+ await getSpiceClient().promises.deleteRelationships({
146
+ relationshipFilter: {
147
+ resourceType: params.resourceType,
148
+ optionalResourceId: params.resourceId,
149
+ optionalResourceIdPrefix: "",
150
+ optionalRelation: params.relation,
151
+ optionalSubjectFilter: {
152
+ subjectType: params.subjectType,
153
+ optionalSubjectId: params.subjectId,
154
+ optionalRelation: void 0
155
+ }
156
+ },
157
+ optionalPreconditions: [],
158
+ optionalLimit: 0,
159
+ optionalAllowPartialDeletions: false,
160
+ optionalTransactionMetadata: void 0
161
+ });
162
+ }
163
+ /**
164
+ * Read relationships for a resource to list subjects with access.
165
+ */
166
+ async function readRelationships(params) {
167
+ return (await getSpiceClient().promises.readRelationships({
168
+ relationshipFilter: {
169
+ resourceType: params.resourceType,
170
+ optionalResourceId: params.resourceId,
171
+ optionalResourceIdPrefix: "",
172
+ optionalRelation: params.relation || "",
173
+ optionalSubjectFilter: void 0
174
+ },
175
+ consistency: { requirement: {
176
+ oneofKind: "minimizeLatency",
177
+ minimizeLatency: true
178
+ } },
179
+ optionalLimit: 0,
180
+ optionalCursor: void 0
181
+ })).map((item) => ({
182
+ subjectType: item.relationship?.subject?.object?.objectType || "",
183
+ subjectId: item.relationship?.subject?.object?.objectId || "",
184
+ relation: item.relationship?.relation || ""
185
+ }));
186
+ }
187
+
188
+ //#endregion
189
+ export { checkBulkPermissions, checkPermission, deleteRelationship, getSpiceClient, lookupResources, readRelationships, resetSpiceClient, v1, writeRelationship };
@@ -0,0 +1,76 @@
1
+ //#region src/auth/authz/config.d.ts
2
+ /**
3
+ * SpiceDB Authorization Configuration
4
+ *
5
+ * Feature flag and configuration for the SpiceDB authorization system.
6
+ */
7
+ /**
8
+ * Check if authorization is enabled.
9
+ *
10
+ * When called without tenantId:
11
+ * - Returns true if ENABLE_AUTHZ=true
12
+ *
13
+ * When called with tenantId:
14
+ * - If ENABLE_AUTHZ=false → returns false
15
+ * - If ENABLE_AUTHZ=true and TENANT_ID is not set → returns true (all tenants)
16
+ * - If ENABLE_AUTHZ=true and TENANT_ID is set → returns true only if tenantId matches
17
+ */
18
+ declare function isAuthzEnabled(tenantId: string): boolean;
19
+ /**
20
+ * Get SpiceDB connection configuration from environment variables.
21
+ */
22
+ declare function getSpiceDbConfig(): {
23
+ endpoint: string;
24
+ token: string;
25
+ tlsEnabled: boolean;
26
+ };
27
+ /**
28
+ * SpiceDB resource types used in the schema
29
+ */
30
+ declare const SpiceDbResourceTypes: {
31
+ readonly USER: "user";
32
+ readonly ORGANIZATION: "organization";
33
+ readonly PROJECT: "project";
34
+ };
35
+ /**
36
+ * SpiceDB relations used in the schema
37
+ *
38
+ * Relations are named as nouns (roles) per SpiceDB best practices.
39
+ * Project roles are prefixed for clarity when debugging/grepping.
40
+ */
41
+ declare const SpiceDbRelations: {
42
+ readonly OWNER: "owner";
43
+ readonly ADMIN: "admin";
44
+ readonly MEMBER: "member";
45
+ readonly ORGANIZATION: "organization";
46
+ readonly PROJECT_ADMIN: "project_admin";
47
+ readonly PROJECT_MEMBER: "project_member";
48
+ readonly PROJECT_VIEWER: "project_viewer";
49
+ };
50
+ /**
51
+ * SpiceDB permissions used in the schema
52
+ *
53
+ * Permissions are named as verbs (actions) per SpiceDB best practices.
54
+ */
55
+ /**
56
+ * SpiceDB permissions used in permission checks.
57
+ *
58
+ * Note: Organization-level permissions (manage) are handled via
59
+ * orgRole bypass in permission functions, not direct SpiceDB checks.
60
+ */
61
+ declare const SpiceDbPermissions: {
62
+ readonly VIEW: "view";
63
+ readonly USE: "use";
64
+ readonly EDIT: "edit";
65
+ readonly DELETE: "delete";
66
+ };
67
+ type OrgRole = 'owner' | 'admin' | 'member';
68
+ /**
69
+ * Project roles hierarchy:
70
+ * - project_admin: Full access (view + use + edit + manage members + delete)
71
+ * - project_member: Operator access (view + use: invoke agents, create API keys)
72
+ * - project_viewer: Read-only access (view only)
73
+ */
74
+ type ProjectRole = 'project_admin' | 'project_member' | 'project_viewer';
75
+ //#endregion
76
+ export { OrgRole, ProjectRole, SpiceDbPermissions, SpiceDbRelations, SpiceDbResourceTypes, getSpiceDbConfig, isAuthzEnabled };