@inkeep/agents-manage-api 0.0.0-dev-20260105201718 → 0.0.0-dev-20260105203442
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/create-app.d.ts +2 -2
- package/dist/factory.d.ts +2 -2
- package/dist/index.d.ts +18 -18
- package/dist/middleware/auth.d.ts +2 -2
- package/dist/middleware/require-permission.d.ts +2 -2
- package/dist/middleware/session-auth.d.ts +2 -2
- package/dist/middleware/tenant-access.d.ts +2 -2
- package/dist/routes/conversations.d.ts +2 -2
- package/dist/routes/index.d.ts +2 -2
- package/dist/routes/mcp.d.ts +2 -2
- package/dist/routes/signoz.d.ts +2 -2
- package/package.json +3 -3
package/dist/create-app.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { Hono } from "hono";
|
|
2
2
|
import { ServerConfig } from "@inkeep/agents-core";
|
|
3
3
|
import { auth, createAuth } from "@inkeep/agents-core/auth";
|
|
4
|
-
import * as
|
|
4
|
+
import * as hono_types4 from "hono/types";
|
|
5
5
|
import { CredentialStoreRegistry as CredentialStoreRegistry$1 } from "@inkeep/agents-core/credential-stores";
|
|
6
6
|
|
|
7
7
|
//#region src/create-app.d.ts
|
|
@@ -16,6 +16,6 @@ type AppVariables = {
|
|
|
16
16
|
tenantId?: string;
|
|
17
17
|
tenantRole?: string;
|
|
18
18
|
};
|
|
19
|
-
declare function createManagementHono(serverConfig: ServerConfig, credentialStores: CredentialStoreRegistry$1, auth: ReturnType<typeof createAuth> | null): Hono<
|
|
19
|
+
declare function createManagementHono(serverConfig: ServerConfig, credentialStores: CredentialStoreRegistry$1, auth: ReturnType<typeof createAuth> | null): Hono<hono_types4.BlankEnv, hono_types4.BlankSchema, "/">;
|
|
20
20
|
//#endregion
|
|
21
21
|
export { AppVariables, createManagementHono };
|
package/dist/factory.d.ts
CHANGED
|
@@ -4,7 +4,7 @@ import { createAuth0Provider, createOIDCProvider } from "./sso-helpers.js";
|
|
|
4
4
|
import * as hono0 from "hono";
|
|
5
5
|
import { CredentialStore, ServerConfig } from "@inkeep/agents-core";
|
|
6
6
|
import { SSOProviderConfig, UserAuthConfig } from "@inkeep/agents-core/auth";
|
|
7
|
-
import * as
|
|
7
|
+
import * as hono_types0 from "hono/types";
|
|
8
8
|
|
|
9
9
|
//#region src/factory.d.ts
|
|
10
10
|
declare function createManagementApp(config?: {
|
|
@@ -12,6 +12,6 @@ declare function createManagementApp(config?: {
|
|
|
12
12
|
credentialStores?: CredentialStore[];
|
|
13
13
|
auth?: UserAuthConfig;
|
|
14
14
|
skipInitialization?: boolean;
|
|
15
|
-
}): hono0.Hono<
|
|
15
|
+
}): hono0.Hono<hono_types0.BlankEnv, hono_types0.BlankSchema, "/">;
|
|
16
16
|
//#endregion
|
|
17
17
|
export { type SSOProviderConfig, type UserAuthConfig, createAuth0Provider, createManagementApp, createManagementHono, createOIDCProvider, initializeDefaultUser };
|
package/dist/index.d.ts
CHANGED
|
@@ -765,25 +765,25 @@ declare const auth: better_auth0.Auth<{
|
|
|
765
765
|
ac: better_auth_plugins0.AccessControl;
|
|
766
766
|
roles: {
|
|
767
767
|
member: {
|
|
768
|
-
authorize<K_1 extends "function" | "organization" | "
|
|
769
|
-
actions: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
768
|
+
authorize<K_1 extends "function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
|
|
769
|
+
actions: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key];
|
|
770
770
|
connector: "OR" | "AND";
|
|
771
771
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
772
|
-
statements: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
772
|
+
statements: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>;
|
|
773
773
|
};
|
|
774
774
|
admin: {
|
|
775
|
-
authorize<K_1 extends "function" | "organization" | "
|
|
776
|
-
actions: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
775
|
+
authorize<K_1 extends "function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
|
|
776
|
+
actions: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key];
|
|
777
777
|
connector: "OR" | "AND";
|
|
778
778
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
779
|
-
statements: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
779
|
+
statements: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>;
|
|
780
780
|
};
|
|
781
781
|
owner: {
|
|
782
|
-
authorize<K_1 extends "function" | "organization" | "
|
|
783
|
-
actions: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
782
|
+
authorize<K_1 extends "function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
|
|
783
|
+
actions: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key];
|
|
784
784
|
connector: "OR" | "AND";
|
|
785
785
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
786
|
-
statements: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
786
|
+
statements: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>;
|
|
787
787
|
};
|
|
788
788
|
};
|
|
789
789
|
membershipLimit: number;
|
|
@@ -1044,25 +1044,25 @@ declare const auth: better_auth0.Auth<{
|
|
|
1044
1044
|
ac: better_auth_plugins0.AccessControl;
|
|
1045
1045
|
roles: {
|
|
1046
1046
|
member: {
|
|
1047
|
-
authorize<K_1 extends "function" | "organization" | "
|
|
1048
|
-
actions: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
1047
|
+
authorize<K_1 extends "function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
|
|
1048
|
+
actions: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key];
|
|
1049
1049
|
connector: "OR" | "AND";
|
|
1050
1050
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1051
|
-
statements: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
1051
|
+
statements: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>;
|
|
1052
1052
|
};
|
|
1053
1053
|
admin: {
|
|
1054
|
-
authorize<K_1 extends "function" | "organization" | "
|
|
1055
|
-
actions: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
1054
|
+
authorize<K_1 extends "function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
|
|
1055
|
+
actions: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key];
|
|
1056
1056
|
connector: "OR" | "AND";
|
|
1057
1057
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1058
|
-
statements: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
1058
|
+
statements: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>;
|
|
1059
1059
|
};
|
|
1060
1060
|
owner: {
|
|
1061
|
-
authorize<K_1 extends "function" | "organization" | "
|
|
1062
|
-
actions: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
1061
|
+
authorize<K_1 extends "function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key] | {
|
|
1062
|
+
actions: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>[key];
|
|
1063
1063
|
connector: "OR" | "AND";
|
|
1064
1064
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1065
|
-
statements: better_auth_plugins0.Subset<"function" | "organization" | "
|
|
1065
|
+
statements: better_auth_plugins0.Subset<"function" | "organization" | "member" | "invitation" | "project" | "agent" | "sub_agent" | "tool" | "api_key" | "credential" | "data_component" | "artifact_component" | "external_agent" | "context_config" | "ac" | "team", better_auth_plugins0.Statements>;
|
|
1066
1066
|
};
|
|
1067
1067
|
};
|
|
1068
1068
|
membershipLimit: number;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono2 from "hono";
|
|
2
2
|
import { ExecutionContext } from "@inkeep/agents-core";
|
|
3
3
|
import { createAuth } from "@inkeep/agents-core/auth";
|
|
4
4
|
|
|
@@ -11,7 +11,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
|
|
|
11
11
|
* 2. Better-auth session token (from device authorization flow)
|
|
12
12
|
* 3. Database API key
|
|
13
13
|
*/
|
|
14
|
-
declare const apiKeyAuth: () =>
|
|
14
|
+
declare const apiKeyAuth: () => hono2.MiddlewareHandler<{
|
|
15
15
|
Variables: {
|
|
16
16
|
executionContext: ExecutionContext;
|
|
17
17
|
userId?: string;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono4 from "hono";
|
|
2
2
|
import { createAuth } from "@inkeep/agents-core/auth";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/require-permission.d.ts
|
|
@@ -14,6 +14,6 @@ type MinimalAuthVariables = {
|
|
|
14
14
|
tenantRole: string;
|
|
15
15
|
};
|
|
16
16
|
};
|
|
17
|
-
declare const requirePermission: <Env$1 extends MinimalAuthVariables = MinimalAuthVariables>(permissions: Permission) =>
|
|
17
|
+
declare const requirePermission: <Env$1 extends MinimalAuthVariables = MinimalAuthVariables>(permissions: Permission) => hono4.MiddlewareHandler<Env$1, string, {}, Response>;
|
|
18
18
|
//#endregion
|
|
19
19
|
export { requirePermission };
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono3 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/session-auth.d.ts
|
|
4
|
-
declare const sessionAuth: () =>
|
|
4
|
+
declare const sessionAuth: () => hono3.MiddlewareHandler<any, string, {}, Response>;
|
|
5
5
|
//#endregion
|
|
6
6
|
export { sessionAuth };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono5 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/tenant-access.d.ts
|
|
4
|
-
declare const requireTenantAccess: () =>
|
|
4
|
+
declare const requireTenantAccess: () => hono5.MiddlewareHandler<{
|
|
5
5
|
Variables: {
|
|
6
6
|
userId: string;
|
|
7
7
|
tenantId: string;
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono1 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/routes/conversations.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono1.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
package/dist/routes/index.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono0 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/routes/index.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono0.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
package/dist/routes/mcp.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { Hono } from "hono";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono_types1 from "hono/types";
|
|
3
3
|
|
|
4
4
|
//#region src/routes/mcp.d.ts
|
|
5
|
-
declare const app: Hono<
|
|
5
|
+
declare const app: Hono<hono_types1.BlankEnv, hono_types1.BlankSchema, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
package/dist/routes/signoz.d.ts
CHANGED
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
import { BaseAppVariables } from "../types/app.js";
|
|
2
2
|
import { Hono } from "hono";
|
|
3
|
-
import * as
|
|
3
|
+
import * as hono_types3 from "hono/types";
|
|
4
4
|
|
|
5
5
|
//#region src/routes/signoz.d.ts
|
|
6
6
|
declare const app: Hono<{
|
|
7
7
|
Variables: BaseAppVariables;
|
|
8
|
-
},
|
|
8
|
+
}, hono_types3.BlankSchema, "/">;
|
|
9
9
|
//#endregion
|
|
10
10
|
export { app as default };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@inkeep/agents-manage-api",
|
|
3
|
-
"version": "0.0.0-dev-
|
|
3
|
+
"version": "0.0.0-dev-20260105203442",
|
|
4
4
|
"description": "Agents Manage API for Inkeep Agent Framework - handles CRUD operations and OAuth",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
6
|
"types": "dist/index.d.ts",
|
|
@@ -28,8 +28,8 @@
|
|
|
28
28
|
"nanoid": "^5.1.5",
|
|
29
29
|
"openid-client": "^6.6.4",
|
|
30
30
|
"pino": "^9.7.0",
|
|
31
|
-
"@inkeep/agents-core": "^0.0.0-dev-
|
|
32
|
-
"@inkeep/agents-manage-mcp": "^0.0.0-dev-
|
|
31
|
+
"@inkeep/agents-core": "^0.0.0-dev-20260105203442",
|
|
32
|
+
"@inkeep/agents-manage-mcp": "^0.0.0-dev-20260105203442"
|
|
33
33
|
},
|
|
34
34
|
"peerDependencies": {
|
|
35
35
|
"@hono/zod-openapi": "^1.1.5",
|