@inkeep/agents-manage-api 0.0.0-dev-20260119163620 → 0.0.0-dev-20260120175022

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
- import * as _inkeep_agents_core1 from "@inkeep/agents-core";
1
+ import * as _inkeep_agents_core0 from "@inkeep/agents-core";
2
2
 
3
3
  //#region src/data/db/dbClient.d.ts
4
- declare const manageDbClient: _inkeep_agents_core1.AgentsManageDatabaseClient;
4
+ declare const manageDbClient: _inkeep_agents_core0.AgentsManageDatabaseClient;
5
5
  //#endregion
6
6
  export { manageDbClient as default };
@@ -1,6 +1,6 @@
1
- import * as _inkeep_agents_core0 from "@inkeep/agents-core";
1
+ import * as _inkeep_agents_core1 from "@inkeep/agents-core";
2
2
 
3
3
  //#region src/data/db/runDbClient.d.ts
4
- declare const runDbClient: _inkeep_agents_core0.AgentsRunDatabaseClient;
4
+ declare const runDbClient: _inkeep_agents_core1.AgentsRunDatabaseClient;
5
5
  //#endregion
6
6
  export { runDbClient as default };
package/dist/factory.d.ts CHANGED
@@ -1,7 +1,7 @@
1
1
  import { createManagementHono } from "./create-app.js";
2
2
  import { initializeDefaultUser } from "./initialization.js";
3
3
  import { createAuth0Provider, createOIDCProvider } from "./sso-helpers.js";
4
- import * as hono2 from "hono";
4
+ import * as hono0 from "hono";
5
5
  import { CredentialStore, ServerConfig } from "@inkeep/agents-core";
6
6
  import { SSOProviderConfig, UserAuthConfig } from "@inkeep/agents-core/auth";
7
7
  import * as hono_types1 from "hono/types";
@@ -12,6 +12,6 @@ declare function createManagementApp(config?: {
12
12
  credentialStores?: CredentialStore[];
13
13
  auth?: UserAuthConfig;
14
14
  skipInitialization?: boolean;
15
- }): hono2.Hono<hono_types1.BlankEnv, hono_types1.BlankSchema, "/">;
15
+ }): hono0.Hono<hono_types1.BlankEnv, hono_types1.BlankSchema, "/">;
16
16
  //#endregion
17
17
  export { type SSOProviderConfig, type UserAuthConfig, createAuth0Provider, createManagementApp, createManagementHono, createOIDCProvider, initializeDefaultUser };
package/dist/index.d.ts CHANGED
@@ -785,25 +785,25 @@ declare const auth: better_auth0.Auth<{
785
785
  ac: better_auth_plugins0.AccessControl;
786
786
  roles: {
787
787
  member: {
788
- authorize<K_1 extends "project" | "organization" | "team" | "member" | "ac" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key] | {
789
- actions: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key];
788
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
789
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
790
790
  connector: "OR" | "AND";
791
791
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
792
- statements: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>;
792
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
793
793
  };
794
794
  admin: {
795
- authorize<K_1 extends "project" | "organization" | "team" | "member" | "ac" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key] | {
796
- actions: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key];
795
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
796
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
797
797
  connector: "OR" | "AND";
798
798
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
799
- statements: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>;
799
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
800
800
  };
801
801
  owner: {
802
- authorize<K_1 extends "project" | "organization" | "team" | "member" | "ac" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key] | {
803
- actions: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key];
802
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
803
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
804
804
  connector: "OR" | "AND";
805
805
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
806
- statements: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>;
806
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
807
807
  };
808
808
  };
809
809
  membershipLimit: number;
@@ -977,7 +977,7 @@ declare const auth: better_auth0.Auth<{
977
977
  id: string;
978
978
  organizationId: string;
979
979
  email: string;
980
- role: "member" | "owner" | "admin";
980
+ role: "member" | "admin" | "owner";
981
981
  status: better_auth_plugins0.InvitationStatus;
982
982
  inviterId: string;
983
983
  expiresAt: Date;
@@ -986,7 +986,7 @@ declare const auth: better_auth0.Auth<{
986
986
  Member: {
987
987
  id: string;
988
988
  organizationId: string;
989
- role: "member" | "owner" | "admin";
989
+ role: "member" | "admin" | "owner";
990
990
  createdAt: Date;
991
991
  userId: string;
992
992
  user: {
@@ -1002,7 +1002,7 @@ declare const auth: better_auth0.Auth<{
1002
1002
  members: {
1003
1003
  id: string;
1004
1004
  organizationId: string;
1005
- role: "member" | "owner" | "admin";
1005
+ role: "member" | "admin" | "owner";
1006
1006
  createdAt: Date;
1007
1007
  userId: string;
1008
1008
  user: {
@@ -1016,7 +1016,7 @@ declare const auth: better_auth0.Auth<{
1016
1016
  id: string;
1017
1017
  organizationId: string;
1018
1018
  email: string;
1019
- role: "member" | "owner" | "admin";
1019
+ role: "member" | "admin" | "owner";
1020
1020
  status: better_auth_plugins0.InvitationStatus;
1021
1021
  inviterId: string;
1022
1022
  expiresAt: Date;
@@ -1094,25 +1094,25 @@ declare const auth: better_auth0.Auth<{
1094
1094
  ac: better_auth_plugins0.AccessControl;
1095
1095
  roles: {
1096
1096
  member: {
1097
- authorize<K_1 extends "project" | "organization" | "team" | "member" | "ac" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key] | {
1098
- actions: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key];
1097
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1098
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1099
1099
  connector: "OR" | "AND";
1100
1100
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1101
- statements: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>;
1101
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1102
1102
  };
1103
1103
  admin: {
1104
- authorize<K_1 extends "project" | "organization" | "team" | "member" | "ac" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key] | {
1105
- actions: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key];
1104
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1105
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1106
1106
  connector: "OR" | "AND";
1107
1107
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1108
- statements: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>;
1108
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1109
1109
  };
1110
1110
  owner: {
1111
- authorize<K_1 extends "project" | "organization" | "team" | "member" | "ac" | "invitation">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key] | {
1112
- actions: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>[key];
1111
+ authorize<K_1 extends "organization" | "member" | "invitation" | "project" | "team" | "ac">(request: K_1 extends infer T extends K ? { [key in T]?: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key] | {
1112
+ actions: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>[key];
1113
1113
  connector: "OR" | "AND";
1114
1114
  } | undefined } : never, connector?: "OR" | "AND"): better_auth_plugins0.AuthorizeResponse;
1115
- statements: better_auth_plugins0.Subset<"project" | "organization" | "team" | "member" | "ac" | "invitation", better_auth_plugins0.Statements>;
1115
+ statements: better_auth_plugins0.Subset<"organization" | "member" | "invitation" | "project" | "team" | "ac", better_auth_plugins0.Statements>;
1116
1116
  };
1117
1117
  };
1118
1118
  membershipLimit: number;
@@ -1,4 +1,4 @@
1
- import * as hono1 from "hono";
1
+ import * as hono0 from "hono";
2
2
  import { BaseExecutionContext } from "@inkeep/agents-core";
3
3
  import { createAuth } from "@inkeep/agents-core/auth";
4
4
 
@@ -12,7 +12,7 @@ import { createAuth } from "@inkeep/agents-core/auth";
12
12
  * 3. Database API key
13
13
  * 4. Internal service token
14
14
  */
15
- declare const apiKeyAuth: () => hono1.MiddlewareHandler<{
15
+ declare const apiKeyAuth: () => hono0.MiddlewareHandler<{
16
16
  Variables: {
17
17
  executionContext: BaseExecutionContext;
18
18
  userId?: string;
@@ -1,5 +1,5 @@
1
1
  import { BaseAppVariables } from "../types/app.js";
2
- import * as hono0 from "hono";
2
+ import * as hono1 from "hono";
3
3
 
4
4
  //#region src/middleware/project-access.d.ts
5
5
 
@@ -26,6 +26,6 @@ declare const requireProjectPermission: <Env$1 extends {
26
26
  Variables: BaseAppVariables;
27
27
  } = {
28
28
  Variables: BaseAppVariables;
29
- }>(permission?: ProjectPermission) => hono0.MiddlewareHandler<Env$1, string, {}, Response>;
29
+ }>(permission?: ProjectPermission) => hono1.MiddlewareHandler<Env$1, string, {}, Response>;
30
30
  //#endregion
31
31
  export { ProjectPermission, requireProjectPermission };
@@ -1,5 +1,5 @@
1
1
  import { BaseAppVariables } from "../types/app.js";
2
- import * as hono4 from "hono";
2
+ import * as hono3 from "hono";
3
3
 
4
4
  //#region src/middleware/require-permission.d.ts
5
5
  type Permission = {
@@ -9,6 +9,6 @@ declare const requirePermission: <Env$1 extends {
9
9
  Variables: BaseAppVariables;
10
10
  } = {
11
11
  Variables: BaseAppVariables;
12
- }>(permissions: Permission) => hono4.MiddlewareHandler<Env$1, string, {}, Response>;
12
+ }>(permissions: Permission) => hono3.MiddlewareHandler<Env$1, string, {}, Response>;
13
13
  //#endregion
14
14
  export { requirePermission };
@@ -1,6 +1,6 @@
1
- import * as hono3 from "hono";
1
+ import * as hono4 from "hono";
2
2
 
3
3
  //#region src/middleware/session-auth.d.ts
4
- declare const sessionAuth: () => hono3.MiddlewareHandler<any, string, {}, Response>;
4
+ declare const sessionAuth: () => hono4.MiddlewareHandler<any, string, {}, Response>;
5
5
  //#endregion
6
6
  export { sessionAuth };
@@ -1,7 +1,7 @@
1
- import * as hono6 from "hono";
1
+ import * as hono7 from "hono";
2
2
 
3
3
  //#region src/middleware/tenant-access.d.ts
4
- declare const requireTenantAccess: () => hono6.MiddlewareHandler<{
4
+ declare const requireTenantAccess: () => hono7.MiddlewareHandler<{
5
5
  Variables: {
6
6
  userId: string;
7
7
  tenantId: string;
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono0 from "hono";
2
+ import * as hono5 from "hono";
3
3
 
4
4
  //#region src/routes/conversations.d.ts
5
- declare const app: OpenAPIHono<hono0.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono5.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono7 from "hono";
2
+ import * as hono2 from "hono";
3
3
 
4
4
  //#region src/routes/evals/evaluationResults.d.ts
5
- declare const app: OpenAPIHono<hono7.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono2.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { OpenAPIHono } from "@hono/zod-openapi";
2
- import * as hono5 from "hono";
2
+ import * as hono6 from "hono";
3
3
 
4
4
  //#region src/routes/index.d.ts
5
- declare const app: OpenAPIHono<hono5.Env, {}, "/">;
5
+ declare const app: OpenAPIHono<hono6.Env, {}, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,7 +1,7 @@
1
1
  import { Hono } from "hono";
2
- import * as hono_types3 from "hono/types";
2
+ import * as hono_types4 from "hono/types";
3
3
 
4
4
  //#region src/routes/mcp.d.ts
5
- declare const app: Hono<hono_types3.BlankEnv, hono_types3.BlankSchema, "/">;
5
+ declare const app: Hono<hono_types4.BlankEnv, hono_types4.BlankSchema, "/">;
6
6
  //#endregion
7
7
  export { app as default };
@@ -1,10 +1,10 @@
1
1
  import { BaseAppVariables } from "../types/app.js";
2
2
  import { Hono } from "hono";
3
- import * as hono_types5 from "hono/types";
3
+ import * as hono_types3 from "hono/types";
4
4
 
5
5
  //#region src/routes/signoz.d.ts
6
6
  declare const app: Hono<{
7
7
  Variables: BaseAppVariables;
8
- }, hono_types5.BlankSchema, "/">;
8
+ }, hono_types3.BlankSchema, "/">;
9
9
  //#endregion
10
10
  export { app as default };
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@inkeep/agents-manage-api",
3
- "version": "0.0.0-dev-20260119163620",
3
+ "version": "0.0.0-dev-20260120175022",
4
4
  "description": "Agents Manage API for Inkeep Agent Framework - handles CRUD operations and OAuth",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",
@@ -29,8 +29,8 @@
29
29
  "openid-client": "^6.6.4",
30
30
  "pg": "^8.16.3",
31
31
  "pino": "^9.7.0",
32
- "@inkeep/agents-core": "^0.0.0-dev-20260119163620",
33
- "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260119163620"
32
+ "@inkeep/agents-core": "^0.0.0-dev-20260120175022",
33
+ "@inkeep/agents-manage-mcp": "^0.0.0-dev-20260120175022"
34
34
  },
35
35
  "peerDependencies": {
36
36
  "@hono/zod-openapi": "^1.1.5",