@inkeep/agents-core 0.53.3 → 0.53.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/auth/auth-schema.d.ts +107 -107
- package/dist/auth/auth.d.ts +28 -28
- package/dist/auth/permissions.d.ts +13 -13
- package/dist/data-access/manage/skills.d.ts +1 -1
- package/dist/data-access/runtime/apiKeys.d.ts +8 -8
- package/dist/data-access/runtime/messages.d.ts +3 -3
- package/dist/data-access/runtime/tasks.d.ts +3 -3
- package/dist/db/manage/manage-schema.d.ts +445 -445
- package/dist/db/runtime/runtime-schema.d.ts +290 -290
- package/dist/middleware/no-auth.d.ts +2 -2
- package/dist/validation/schemas.d.ts +58 -58
- package/dist/validation/schemas.js +2 -1
- package/package.json +1 -1
package/dist/auth/auth.d.ts
CHANGED
|
@@ -3,7 +3,7 @@ import * as zod0 from "zod";
|
|
|
3
3
|
import * as better_auth0 from "better-auth";
|
|
4
4
|
import { BetterAuthAdvancedOptions } from "better-auth";
|
|
5
5
|
import * as _better_auth_sso0 from "@better-auth/sso";
|
|
6
|
-
import * as
|
|
6
|
+
import * as better_auth_plugins20 from "better-auth/plugins";
|
|
7
7
|
import { GoogleOptions } from "better-auth/social-providers";
|
|
8
8
|
|
|
9
9
|
//#region src/auth/auth.d.ts
|
|
@@ -250,7 +250,7 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
|
|
|
250
250
|
handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
|
|
251
251
|
}[];
|
|
252
252
|
};
|
|
253
|
-
options:
|
|
253
|
+
options: better_auth_plugins20.BearerOptions | undefined;
|
|
254
254
|
}, {
|
|
255
255
|
id: "sso";
|
|
256
256
|
endpoints: {
|
|
@@ -1241,30 +1241,30 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
|
|
|
1241
1241
|
handler: (inputContext: better_auth0.MiddlewareInputContext<better_auth0.MiddlewareOptions>) => Promise<void>;
|
|
1242
1242
|
}[];
|
|
1243
1243
|
};
|
|
1244
|
-
},
|
|
1244
|
+
}, better_auth_plugins20.DefaultOrganizationPlugin<{
|
|
1245
1245
|
allowUserToCreateOrganization: true;
|
|
1246
|
-
ac:
|
|
1246
|
+
ac: better_auth_plugins20.AccessControl;
|
|
1247
1247
|
roles: {
|
|
1248
1248
|
member: {
|
|
1249
|
-
authorize<K_1 extends "
|
|
1250
|
-
actions:
|
|
1249
|
+
authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>[key] | {
|
|
1250
|
+
actions: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>[key];
|
|
1251
1251
|
connector: "OR" | "AND";
|
|
1252
|
-
} | undefined } : never, connector?: "OR" | "AND"):
|
|
1253
|
-
statements:
|
|
1252
|
+
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins20.AuthorizeResponse;
|
|
1253
|
+
statements: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>;
|
|
1254
1254
|
};
|
|
1255
1255
|
admin: {
|
|
1256
|
-
authorize<K_1 extends "
|
|
1257
|
-
actions:
|
|
1256
|
+
authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>[key] | {
|
|
1257
|
+
actions: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>[key];
|
|
1258
1258
|
connector: "OR" | "AND";
|
|
1259
|
-
} | undefined } : never, connector?: "OR" | "AND"):
|
|
1260
|
-
statements:
|
|
1259
|
+
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins20.AuthorizeResponse;
|
|
1260
|
+
statements: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>;
|
|
1261
1261
|
};
|
|
1262
1262
|
owner: {
|
|
1263
|
-
authorize<K_1 extends "
|
|
1264
|
-
actions:
|
|
1263
|
+
authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>[key] | {
|
|
1264
|
+
actions: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>[key];
|
|
1265
1265
|
connector: "OR" | "AND";
|
|
1266
|
-
} | undefined } : never, connector?: "OR" | "AND"):
|
|
1267
|
-
statements:
|
|
1266
|
+
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins20.AuthorizeResponse;
|
|
1267
|
+
statements: better_auth_plugins20.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins20.Statements>;
|
|
1268
1268
|
};
|
|
1269
1269
|
};
|
|
1270
1270
|
creatorRole: "admin";
|
|
@@ -1275,9 +1275,9 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
|
|
|
1275
1275
|
id: string;
|
|
1276
1276
|
role: string;
|
|
1277
1277
|
email: string;
|
|
1278
|
-
organization:
|
|
1279
|
-
invitation:
|
|
1280
|
-
inviter:
|
|
1278
|
+
organization: better_auth_plugins20.Organization;
|
|
1279
|
+
invitation: better_auth_plugins20.Invitation;
|
|
1280
|
+
inviter: better_auth_plugins20.Member & {
|
|
1281
1281
|
user: better_auth0.User;
|
|
1282
1282
|
};
|
|
1283
1283
|
}): Promise<void>;
|
|
@@ -1312,28 +1312,28 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
|
|
|
1312
1312
|
user,
|
|
1313
1313
|
organization: org
|
|
1314
1314
|
}: {
|
|
1315
|
-
invitation:
|
|
1316
|
-
member:
|
|
1315
|
+
invitation: better_auth_plugins20.Invitation & Record<string, any>;
|
|
1316
|
+
member: better_auth_plugins20.Member & Record<string, any>;
|
|
1317
1317
|
user: better_auth0.User & Record<string, any>;
|
|
1318
|
-
organization:
|
|
1318
|
+
organization: better_auth_plugins20.Organization & Record<string, any>;
|
|
1319
1319
|
}) => Promise<void>;
|
|
1320
1320
|
beforeUpdateMemberRole: ({
|
|
1321
1321
|
member,
|
|
1322
1322
|
organization: org,
|
|
1323
1323
|
newRole
|
|
1324
1324
|
}: {
|
|
1325
|
-
member:
|
|
1325
|
+
member: better_auth_plugins20.Member & Record<string, any>;
|
|
1326
1326
|
newRole: string;
|
|
1327
1327
|
user: better_auth0.User & Record<string, any>;
|
|
1328
|
-
organization:
|
|
1328
|
+
organization: better_auth_plugins20.Organization & Record<string, any>;
|
|
1329
1329
|
}) => Promise<void>;
|
|
1330
1330
|
beforeRemoveMember: ({
|
|
1331
1331
|
member,
|
|
1332
1332
|
organization: org
|
|
1333
1333
|
}: {
|
|
1334
|
-
member:
|
|
1334
|
+
member: better_auth_plugins20.Member & Record<string, any>;
|
|
1335
1335
|
user: better_auth0.User & Record<string, any>;
|
|
1336
|
-
organization:
|
|
1336
|
+
organization: better_auth_plugins20.Organization & Record<string, any>;
|
|
1337
1337
|
}) => Promise<void>;
|
|
1338
1338
|
};
|
|
1339
1339
|
}>, {
|
|
@@ -1674,8 +1674,8 @@ declare function createAuth(config: BetterAuthConfig): better_auth0.Auth<{
|
|
|
1674
1674
|
readonly AUTHENTICATION_REQUIRED: "Authentication required";
|
|
1675
1675
|
};
|
|
1676
1676
|
options: Partial<{
|
|
1677
|
-
expiresIn:
|
|
1678
|
-
interval:
|
|
1677
|
+
expiresIn: better_auth_plugins20.TimeString;
|
|
1678
|
+
interval: better_auth_plugins20.TimeString;
|
|
1679
1679
|
deviceCodeLength: number;
|
|
1680
1680
|
userCodeLength: number;
|
|
1681
1681
|
schema: {
|
|
@@ -1,29 +1,29 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as better_auth_plugins0 from "better-auth/plugins";
|
|
2
2
|
import { AccessControl } from "better-auth/plugins/access";
|
|
3
3
|
import { organizationClient } from "better-auth/client/plugins";
|
|
4
4
|
|
|
5
5
|
//#region src/auth/permissions.d.ts
|
|
6
6
|
declare const ac: AccessControl;
|
|
7
7
|
declare const memberRole: {
|
|
8
|
-
authorize<K_1 extends "
|
|
9
|
-
actions:
|
|
8
|
+
authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
9
|
+
actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
10
10
|
connector: "OR" | "AND";
|
|
11
|
-
} | undefined } : never, connector?: "OR" | "AND"):
|
|
12
|
-
statements:
|
|
11
|
+
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
12
|
+
statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
13
13
|
};
|
|
14
14
|
declare const adminRole: {
|
|
15
|
-
authorize<K_1 extends "
|
|
16
|
-
actions:
|
|
15
|
+
authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
16
|
+
actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
17
17
|
connector: "OR" | "AND";
|
|
18
|
-
} | undefined } : never, connector?: "OR" | "AND"):
|
|
19
|
-
statements:
|
|
18
|
+
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
19
|
+
statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
20
20
|
};
|
|
21
21
|
declare const ownerRole: {
|
|
22
|
-
authorize<K_1 extends "
|
|
23
|
-
actions:
|
|
22
|
+
authorize<K_1 extends "project" | "organization" | "member" | "invitation" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
23
|
+
actions: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
24
24
|
connector: "OR" | "AND";
|
|
25
|
-
} | undefined } : never, connector?: "OR" | "AND"):
|
|
26
|
-
statements:
|
|
25
|
+
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
26
|
+
statements: better_auth_plugins0.Subset<"project" | "organization" | "member" | "invitation" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
27
27
|
};
|
|
28
28
|
//#endregion
|
|
29
29
|
export { ac, adminRole, memberRole, organizationClient, ownerRole };
|
|
@@ -99,8 +99,8 @@ declare const upsertSubAgentSkill: (db: AgentsManageDatabaseClient) => (params:
|
|
|
99
99
|
updatedAt: string;
|
|
100
100
|
index: number;
|
|
101
101
|
alwaysLoaded: boolean;
|
|
102
|
-
subAgentId: string;
|
|
103
102
|
skillId: string;
|
|
103
|
+
subAgentId: string;
|
|
104
104
|
}>;
|
|
105
105
|
declare const deleteSubAgentSkill: (db: AgentsManageDatabaseClient) => (params: {
|
|
106
106
|
scopes: AgentScopeConfig;
|
|
@@ -15,11 +15,11 @@ declare const getApiKeyById: (db: AgentsRunDatabaseClient) => (params: {
|
|
|
15
15
|
agentId: string;
|
|
16
16
|
createdAt: string;
|
|
17
17
|
updatedAt: string;
|
|
18
|
-
|
|
18
|
+
expiresAt: string | null;
|
|
19
19
|
publicId: string;
|
|
20
20
|
keyHash: string;
|
|
21
21
|
keyPrefix: string;
|
|
22
|
-
|
|
22
|
+
lastUsedAt: string | null;
|
|
23
23
|
} | undefined>;
|
|
24
24
|
declare const getApiKeyByPublicId: (db: AgentsRunDatabaseClient) => (publicId: string) => Promise<{
|
|
25
25
|
id: string;
|
|
@@ -29,11 +29,11 @@ declare const getApiKeyByPublicId: (db: AgentsRunDatabaseClient) => (publicId: s
|
|
|
29
29
|
agentId: string;
|
|
30
30
|
createdAt: string;
|
|
31
31
|
updatedAt: string;
|
|
32
|
-
|
|
32
|
+
expiresAt: string | null;
|
|
33
33
|
publicId: string;
|
|
34
34
|
keyHash: string;
|
|
35
35
|
keyPrefix: string;
|
|
36
|
-
|
|
36
|
+
lastUsedAt: string | null;
|
|
37
37
|
} | undefined>;
|
|
38
38
|
declare const listApiKeys: (db: AgentsRunDatabaseClient) => (params: {
|
|
39
39
|
scopes: ProjectScopeConfig;
|
|
@@ -46,11 +46,11 @@ declare const listApiKeys: (db: AgentsRunDatabaseClient) => (params: {
|
|
|
46
46
|
agentId: string;
|
|
47
47
|
createdAt: string;
|
|
48
48
|
updatedAt: string;
|
|
49
|
-
|
|
49
|
+
expiresAt: string | null;
|
|
50
50
|
publicId: string;
|
|
51
51
|
keyHash: string;
|
|
52
52
|
keyPrefix: string;
|
|
53
|
-
|
|
53
|
+
lastUsedAt: string | null;
|
|
54
54
|
}[]>;
|
|
55
55
|
declare const listApiKeysPaginated: (db: AgentsRunDatabaseClient) => (params: {
|
|
56
56
|
scopes: ProjectScopeConfig;
|
|
@@ -73,11 +73,11 @@ declare const createApiKey: (db: AgentsRunDatabaseClient) => (params: ApiKeyInse
|
|
|
73
73
|
agentId: string;
|
|
74
74
|
createdAt: string;
|
|
75
75
|
updatedAt: string;
|
|
76
|
-
|
|
76
|
+
expiresAt: string | null;
|
|
77
77
|
publicId: string;
|
|
78
78
|
keyHash: string;
|
|
79
79
|
keyPrefix: string;
|
|
80
|
-
|
|
80
|
+
lastUsedAt: string | null;
|
|
81
81
|
}>;
|
|
82
82
|
declare const updateApiKey: (db: AgentsRunDatabaseClient) => (params: {
|
|
83
83
|
scopes: ProjectScopeConfig;
|
|
@@ -17,8 +17,8 @@ declare const getMessageById: (db: AgentsRunDatabaseClient) => (params: {
|
|
|
17
17
|
updatedAt: string;
|
|
18
18
|
metadata: MessageMetadata | null;
|
|
19
19
|
content: MessageContent;
|
|
20
|
-
conversationId: string;
|
|
21
20
|
role: string;
|
|
21
|
+
conversationId: string;
|
|
22
22
|
fromSubAgentId: string | null;
|
|
23
23
|
toSubAgentId: string | null;
|
|
24
24
|
fromExternalAgentId: string | null;
|
|
@@ -148,8 +148,8 @@ declare const createMessage: (db: AgentsRunDatabaseClient) => (params: MessageIn
|
|
|
148
148
|
updatedAt: string;
|
|
149
149
|
metadata: MessageMetadata | null;
|
|
150
150
|
content: MessageContent;
|
|
151
|
-
conversationId: string;
|
|
152
151
|
role: string;
|
|
152
|
+
conversationId: string;
|
|
153
153
|
fromSubAgentId: string | null;
|
|
154
154
|
toSubAgentId: string | null;
|
|
155
155
|
fromExternalAgentId: string | null;
|
|
@@ -201,8 +201,8 @@ declare const deleteMessage: (db: AgentsRunDatabaseClient) => (params: {
|
|
|
201
201
|
updatedAt: string;
|
|
202
202
|
metadata: MessageMetadata | null;
|
|
203
203
|
content: MessageContent;
|
|
204
|
-
conversationId: string;
|
|
205
204
|
role: string;
|
|
205
|
+
conversationId: string;
|
|
206
206
|
fromSubAgentId: string | null;
|
|
207
207
|
toSubAgentId: string | null;
|
|
208
208
|
fromExternalAgentId: string | null;
|
|
@@ -13,14 +13,14 @@ declare const createTask: (db: AgentsRunDatabaseClient) => (params: TaskInsert)
|
|
|
13
13
|
createdAt: string;
|
|
14
14
|
updatedAt: string;
|
|
15
15
|
metadata: TaskMetadataConfig | null;
|
|
16
|
-
|
|
16
|
+
status: string;
|
|
17
|
+
subAgentId: string;
|
|
17
18
|
ref: {
|
|
18
19
|
type: "commit" | "tag" | "branch";
|
|
19
20
|
name: string;
|
|
20
21
|
hash: string;
|
|
21
22
|
} | null;
|
|
22
|
-
|
|
23
|
-
subAgentId: string;
|
|
23
|
+
contextId: string;
|
|
24
24
|
}>;
|
|
25
25
|
declare const getTask: (db: AgentsRunDatabaseClient) => (params: {
|
|
26
26
|
id: string;
|