@inkeep/agents-manage-api 0.0.0-dev-20260119163620 → 0.0.0-dev-20260120175022
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/data/db/dbClient.d.ts +2 -2
- package/dist/data/db/runDbClient.d.ts +2 -2
- package/dist/factory.d.ts +2 -2
- package/dist/index.d.ts +22 -22
- package/dist/middleware/auth.d.ts +2 -2
- package/dist/middleware/project-access.d.ts +2 -2
- package/dist/middleware/require-permission.d.ts +2 -2
- package/dist/middleware/session-auth.d.ts +2 -2
- package/dist/middleware/tenant-access.d.ts +2 -2
- package/dist/routes/conversations.d.ts +2 -2
- package/dist/routes/evals/evaluationResults.d.ts +2 -2
- package/dist/routes/index.d.ts +2 -2
- package/dist/routes/mcp.d.ts +2 -2
- package/dist/routes/signoz.d.ts +2 -2
- package/package.json +3 -3
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as _inkeep_agents_core0 from "@inkeep/agents-core";
|
|
2
2
|
|
|
3
3
|
//#region src/data/db/dbClient.d.ts
|
|
4
|
-
declare const manageDbClient:
|
|
4
|
+
declare const manageDbClient: _inkeep_agents_core0.AgentsManageDatabaseClient;
|
|
5
5
|
//#endregion
|
|
6
6
|
export { manageDbClient as default };
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as _inkeep_agents_core1 from "@inkeep/agents-core";
|
|
2
2
|
|
|
3
3
|
//#region src/data/db/runDbClient.d.ts
|
|
4
|
-
declare const runDbClient:
|
|
4
|
+
declare const runDbClient: _inkeep_agents_core1.AgentsRunDatabaseClient;
|
|
5
5
|
//#endregion
|
|
6
6
|
export { runDbClient as default };
|
package/dist/factory.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { createManagementHono } from "./create-app.js";
|
|
2
2
|
import { initializeDefaultUser } from "./initialization.js";
|
|
3
3
|
import { createAuth0Provider, createOIDCProvider } from "./sso-helpers.js";
|
|
4
|
-
import * as
|
|
4
|
+
import * as hono0 from "hono";
|
|
5
5
|
import { CredentialStore, ServerConfig } from "@inkeep/agents-core";
|
|
6
6
|
import { SSOProviderConfig, UserAuthConfig } from "@inkeep/agents-core/auth";
|
|
7
7
|
import * as hono_types1 from "hono/types";
|
|
@@ -12,6 +12,6 @@ declare function createManagementApp(config?: {
|
|
|
12
12
|
credentialStores?: CredentialStore[];
|
|
13
13
|
auth?: UserAuthConfig;
|
|
14
14
|
skipInitialization?: boolean;
|
|
15
|
-
}):
|
|
15
|
+
}): hono0.Hono<hono_types1.BlankEnv, hono_types1.BlankSchema, "/">;
|
|
16
16
|
//#endregion
|
|
17
17
|
export { type SSOProviderConfig, type UserAuthConfig, createAuth0Provider, createManagementApp, createManagementHono, createOIDCProvider, initializeDefaultUser };
|
package/dist/index.d.ts
CHANGED
|
@@ -785,25 +785,25 @@ declare const auth: better_auth0.Auth<{
|
|
|
785
785
|
ac: better_auth_plugins0.AccessControl;
|
|
786
786
|
roles: {
|
|
787
787
|
member: {
|
|
788
|
-
authorize<K_1 extends "
|
|
789
|
-
actions: better_auth_plugins0.Subset<"
|
|
788
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
789
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
790
790
|
connector: "OR" | "AND";
|
|
791
791
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
792
|
-
statements: better_auth_plugins0.Subset<"
|
|
792
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
793
793
|
};
|
|
794
794
|
admin: {
|
|
795
|
-
authorize<K_1 extends "
|
|
796
|
-
actions: better_auth_plugins0.Subset<"
|
|
795
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
796
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
797
797
|
connector: "OR" | "AND";
|
|
798
798
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
799
|
-
statements: better_auth_plugins0.Subset<"
|
|
799
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
800
800
|
};
|
|
801
801
|
owner: {
|
|
802
|
-
authorize<K_1 extends "
|
|
803
|
-
actions: better_auth_plugins0.Subset<"
|
|
802
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
803
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
804
804
|
connector: "OR" | "AND";
|
|
805
805
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
806
|
-
statements: better_auth_plugins0.Subset<"
|
|
806
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
807
807
|
};
|
|
808
808
|
};
|
|
809
809
|
membershipLimit: number;
|
|
@@ -977,7 +977,7 @@ declare const auth: better_auth0.Auth<{
|
|
|
977
977
|
id: string;
|
|
978
978
|
organizationId: string;
|
|
979
979
|
email: string;
|
|
980
|
-
role: "member" | "
|
|
980
|
+
role: "member" | "admin" | "owner";
|
|
981
981
|
status: better_auth_plugins0.InvitationStatus;
|
|
982
982
|
inviterId: string;
|
|
983
983
|
expiresAt: Date;
|
|
@@ -986,7 +986,7 @@ declare const auth: better_auth0.Auth<{
|
|
|
986
986
|
Member: {
|
|
987
987
|
id: string;
|
|
988
988
|
organizationId: string;
|
|
989
|
-
role: "member" | "
|
|
989
|
+
role: "member" | "admin" | "owner";
|
|
990
990
|
createdAt: Date;
|
|
991
991
|
userId: string;
|
|
992
992
|
user: {
|
|
@@ -1002,7 +1002,7 @@ declare const auth: better_auth0.Auth<{
|
|
|
1002
1002
|
members: {
|
|
1003
1003
|
id: string;
|
|
1004
1004
|
organizationId: string;
|
|
1005
|
-
role: "member" | "
|
|
1005
|
+
role: "member" | "admin" | "owner";
|
|
1006
1006
|
createdAt: Date;
|
|
1007
1007
|
userId: string;
|
|
1008
1008
|
user: {
|
|
@@ -1016,7 +1016,7 @@ declare const auth: better_auth0.Auth<{
|
|
|
1016
1016
|
id: string;
|
|
1017
1017
|
organizationId: string;
|
|
1018
1018
|
email: string;
|
|
1019
|
-
role: "member" | "
|
|
1019
|
+
role: "member" | "admin" | "owner";
|
|
1020
1020
|
status: better_auth_plugins0.InvitationStatus;
|
|
1021
1021
|
inviterId: string;
|
|
1022
1022
|
expiresAt: Date;
|
|
@@ -1094,25 +1094,25 @@ declare const auth: better_auth0.Auth<{
|
|
|
1094
1094
|
ac: better_auth_plugins0.AccessControl;
|
|
1095
1095
|
roles: {
|
|
1096
1096
|
member: {
|
|
1097
|
-
authorize<K_1 extends "
|
|
1098
|
-
actions: better_auth_plugins0.Subset<"
|
|
1097
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
1098
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
1099
1099
|
connector: "OR" | "AND";
|
|
1100
1100
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1101
|
-
statements: better_auth_plugins0.Subset<"
|
|
1101
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
1102
1102
|
};
|
|
1103
1103
|
admin: {
|
|
1104
|
-
authorize<K_1 extends "
|
|
1105
|
-
actions: better_auth_plugins0.Subset<"
|
|
1104
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
1105
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
1106
1106
|
connector: "OR" | "AND";
|
|
1107
1107
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1108
|
-
statements: better_auth_plugins0.Subset<"
|
|
1108
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
1109
1109
|
};
|
|
1110
1110
|
owner: {
|
|
1111
|
-
authorize<K_1 extends "
|
|
1112
|
-
actions: better_auth_plugins0.Subset<"
|
|
1111
|
+
authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
|
|
1112
|
+
actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
|
|
1113
1113
|
connector: "OR" | "AND";
|
|
1114
1114
|
} | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
|
|
1115
|
-
statements: better_auth_plugins0.Subset<"
|
|
1115
|
+
statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
|
|
1116
1116
|
};
|
|
1117
1117
|
};
|
|
1118
1118
|
membershipLimit: number;
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono0 from "hono";
|
|
2
2
|
import { BaseExecutionContext } from "@inkeep/agents-core";
|
|
3
3
|
import { createAuth } from "@inkeep/agents-core/auth";
|
|
4
4
|
|
|
@@ -12,7 +12,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
|
|
|
12
12
|
* 3. Database API key
|
|
13
13
|
* 4. Internal service token
|
|
14
14
|
*/
|
|
15
|
-
declare const apiKeyAuth: () =>
|
|
15
|
+
declare const apiKeyAuth: () => hono0.MiddlewareHandler<{
|
|
16
16
|
Variables: {
|
|
17
17
|
executionContext: BaseExecutionContext;
|
|
18
18
|
userId?: string;
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { BaseAppVariables } from "../types/app.js";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono1 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/project-access.d.ts
|
|
5
5
|
|
|
@@ -26,6 +26,6 @@ declare const requireProjectPermission: <Env$1 extends {
|
|
|
26
26
|
Variables: BaseAppVariables;
|
|
27
27
|
} = {
|
|
28
28
|
Variables: BaseAppVariables;
|
|
29
|
-
}>(permission?: ProjectPermission) =>
|
|
29
|
+
}>(permission?: ProjectPermission) => hono1.MiddlewareHandler<Env$1, string, {}, Response>;
|
|
30
30
|
//#endregion
|
|
31
31
|
export { ProjectPermission, requireProjectPermission };
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import { BaseAppVariables } from "../types/app.js";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono3 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/middleware/require-permission.d.ts
|
|
5
5
|
type Permission = {
|
|
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
|
|
|
9
9
|
Variables: BaseAppVariables;
|
|
10
10
|
} = {
|
|
11
11
|
Variables: BaseAppVariables;
|
|
12
|
-
}>(permissions: Permission) =>
|
|
12
|
+
}>(permissions: Permission) => hono3.MiddlewareHandler<Env$1, string, {}, Response>;
|
|
13
13
|
//#endregion
|
|
14
14
|
export { requirePermission };
|
|
@@ -1,6 +1,6 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono4 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/session-auth.d.ts
|
|
4
|
-
declare const sessionAuth: () =>
|
|
4
|
+
declare const sessionAuth: () => hono4.MiddlewareHandler<any, string, {}, Response>;
|
|
5
5
|
//#endregion
|
|
6
6
|
export { sessionAuth };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
import * as
|
|
1
|
+
import * as hono7 from "hono";
|
|
2
2
|
|
|
3
3
|
//#region src/middleware/tenant-access.d.ts
|
|
4
|
-
declare const requireTenantAccess: () =>
|
|
4
|
+
declare const requireTenantAccess: () => hono7.MiddlewareHandler<{
|
|
5
5
|
Variables: {
|
|
6
6
|
userId: string;
|
|
7
7
|
tenantId: string;
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono5 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/routes/conversations.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono5.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono2 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/routes/evals/evaluationResults.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono2.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
package/dist/routes/index.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { OpenAPIHono } from "@hono/zod-openapi";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono6 from "hono";
|
|
3
3
|
|
|
4
4
|
//#region src/routes/index.d.ts
|
|
5
|
-
declare const app: OpenAPIHono<
|
|
5
|
+
declare const app: OpenAPIHono<hono6.Env, {}, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
package/dist/routes/mcp.d.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { Hono } from "hono";
|
|
2
|
-
import * as
|
|
2
|
+
import * as hono_types4 from "hono/types";
|
|
3
3
|
|
|
4
4
|
//#region src/routes/mcp.d.ts
|
|
5
|
-
declare const app: Hono<
|
|
5
|
+
declare const app: Hono<hono_types4.BlankEnv, hono_types4.BlankSchema, "/">;
|
|
6
6
|
//#endregion
|
|
7
7
|
export { app as default };
|
package/dist/routes/signoz.d.ts
CHANGED
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
import { BaseAppVariables } from "../types/app.js";
|
|
2
2
|
import { Hono } from "hono";
|
|
3
|
-
import * as
|
|
3
|
+
import * as hono_types3 from "hono/types";
|
|
4
4
|
|
|
5
5
|
//#region src/routes/signoz.d.ts
|
|
6
6
|
declare const app: Hono<{
|
|
7
7
|
Variables: BaseAppVariables;
|
|
8
|
-
},
|
|
8
|
+
}, hono_types3.BlankSchema, "/">;
|
|
9
9
|
//#endregion
|
|
10
10
|
export { app as default };
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@inkeep/agents-manage-api",
|
|
3
|
-
"version": "0.0.0-dev-
|
|
3
|
+
"version": "0.0.0-dev-20260120175022",
|
|
4
4
|
"description": "Agents Manage API for Inkeep Agent Framework - handles CRUD operations and OAuth",
|
|
5
5
|
"main": "dist/index.js",
|
|
6
6
|
"types": "dist/index.d.ts",
|
|
@@ -29,8 +29,8 @@
|
|
|
29
29
|
"openid-client": "^6.6.4",
|
|
30
30
|
"pg": "^8.16.3",
|
|
31
31
|
"pino": "^9.7.0",
|
|
32
|
-
"@inkeep/agents-core": "^0.0.0-dev-
|
|
33
|
-
"@inkeep/agents-manage-mcp": "^0.0.0-dev-
|
|
32
|
+
"@inkeep/agents-core": "^0.0.0-dev-20260120175022",
|
|
33
|
+
"@inkeep/agents-manage-mcp": "^0.0.0-dev-20260120175022"
|
|
34
34
|
},
|
|
35
35
|
"peerDependencies": {
|
|
36
36
|
"@hono/zod-openapi": "^1.1.5",
|