@elliotding/ai-agent-mcp 0.1.25 → 0.1.26
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +4 -1
- package/.prompt-cache/cmd-cmd-client-sdk-ai-hub-generate-testcase.md +0 -101
- package/.prompt-cache/cmd-cmd-client-sdk-ai-hub-submit_zct_job.md +0 -158
- package/.prompt-cache/skill-skill-client-sdk-ai-hub-analyze-conf-status.md +0 -311
- package/.prompt-cache/skill-skill-client-sdk-ai-hub-analyze-sdk-log.md +0 -64
- package/.prompt-cache/skill-skill-client-sdk-ai-hub-analyze-zmb-log-errors.md +0 -84
- package/ai-resource-telemetry.json +0 -40
- package/dist/api/cached-client.d.ts +0 -48
- package/dist/api/cached-client.d.ts.map +0 -1
- package/dist/api/cached-client.js +0 -126
- package/dist/api/cached-client.js.map +0 -1
- package/dist/api/client.d.ts +0 -281
- package/dist/api/client.d.ts.map +0 -1
- package/dist/api/client.js +0 -371
- package/dist/api/client.js.map +0 -1
- package/dist/auth/index.d.ts +0 -8
- package/dist/auth/index.d.ts.map +0 -1
- package/dist/auth/index.js +0 -26
- package/dist/auth/index.js.map +0 -1
- package/dist/auth/middleware.d.ts +0 -36
- package/dist/auth/middleware.d.ts.map +0 -1
- package/dist/auth/middleware.js +0 -194
- package/dist/auth/middleware.js.map +0 -1
- package/dist/auth/permissions.d.ts +0 -60
- package/dist/auth/permissions.d.ts.map +0 -1
- package/dist/auth/permissions.js +0 -262
- package/dist/auth/permissions.js.map +0 -1
- package/dist/auth/token-validator.d.ts +0 -52
- package/dist/auth/token-validator.d.ts.map +0 -1
- package/dist/auth/token-validator.js +0 -215
- package/dist/auth/token-validator.js.map +0 -1
- package/dist/cache/cache-manager.d.ts +0 -49
- package/dist/cache/cache-manager.d.ts.map +0 -1
- package/dist/cache/cache-manager.js +0 -191
- package/dist/cache/cache-manager.js.map +0 -1
- package/dist/cache/index.d.ts +0 -6
- package/dist/cache/index.d.ts.map +0 -1
- package/dist/cache/index.js +0 -12
- package/dist/cache/index.js.map +0 -1
- package/dist/cache/redis-client.d.ts +0 -45
- package/dist/cache/redis-client.d.ts.map +0 -1
- package/dist/cache/redis-client.js +0 -210
- package/dist/cache/redis-client.js.map +0 -1
- package/dist/config/constants.d.ts +0 -28
- package/dist/config/constants.d.ts.map +0 -1
- package/dist/config/constants.js +0 -31
- package/dist/config/constants.js.map +0 -1
- package/dist/config/index.d.ts +0 -71
- package/dist/config/index.d.ts.map +0 -1
- package/dist/config/index.js +0 -190
- package/dist/config/index.js.map +0 -1
- package/dist/filesystem/manager.d.ts +0 -45
- package/dist/filesystem/manager.d.ts.map +0 -1
- package/dist/filesystem/manager.js +0 -246
- package/dist/filesystem/manager.js.map +0 -1
- package/dist/git/multi-source-manager.d.ts +0 -78
- package/dist/git/multi-source-manager.d.ts.map +0 -1
- package/dist/git/multi-source-manager.js +0 -577
- package/dist/git/multi-source-manager.js.map +0 -1
- package/dist/git/operations.d.ts +0 -27
- package/dist/git/operations.d.ts.map +0 -1
- package/dist/git/operations.js +0 -83
- package/dist/git/operations.js.map +0 -1
- package/dist/index.d.ts +0 -6
- package/dist/index.d.ts.map +0 -1
- package/dist/index.js +0 -122
- package/dist/index.js.map +0 -1
- package/dist/monitoring/health.d.ts +0 -35
- package/dist/monitoring/health.d.ts.map +0 -1
- package/dist/monitoring/health.js +0 -105
- package/dist/monitoring/health.js.map +0 -1
- package/dist/prompts/cache.d.ts +0 -69
- package/dist/prompts/cache.d.ts.map +0 -1
- package/dist/prompts/cache.js +0 -163
- package/dist/prompts/cache.js.map +0 -1
- package/dist/prompts/generator.d.ts +0 -49
- package/dist/prompts/generator.d.ts.map +0 -1
- package/dist/prompts/generator.js +0 -160
- package/dist/prompts/generator.js.map +0 -1
- package/dist/prompts/index.d.ts +0 -13
- package/dist/prompts/index.d.ts.map +0 -1
- package/dist/prompts/index.js +0 -24
- package/dist/prompts/index.js.map +0 -1
- package/dist/prompts/manager.d.ts +0 -207
- package/dist/prompts/manager.d.ts.map +0 -1
- package/dist/prompts/manager.js +0 -566
- package/dist/prompts/manager.js.map +0 -1
- package/dist/resources/index.d.ts +0 -6
- package/dist/resources/index.d.ts.map +0 -1
- package/dist/resources/index.js +0 -10
- package/dist/resources/index.js.map +0 -1
- package/dist/resources/loader.d.ts +0 -88
- package/dist/resources/loader.d.ts.map +0 -1
- package/dist/resources/loader.js +0 -492
- package/dist/resources/loader.js.map +0 -1
- package/dist/server/http.d.ts +0 -57
- package/dist/server/http.d.ts.map +0 -1
- package/dist/server/http.js +0 -435
- package/dist/server/http.js.map +0 -1
- package/dist/server.d.ts +0 -13
- package/dist/server.d.ts.map +0 -1
- package/dist/server.js +0 -201
- package/dist/server.js.map +0 -1
- package/dist/session/manager.d.ts +0 -91
- package/dist/session/manager.d.ts.map +0 -1
- package/dist/session/manager.js +0 -251
- package/dist/session/manager.js.map +0 -1
- package/dist/telemetry/index.d.ts +0 -3
- package/dist/telemetry/index.d.ts.map +0 -1
- package/dist/telemetry/index.js +0 -7
- package/dist/telemetry/index.js.map +0 -1
- package/dist/telemetry/manager.d.ts +0 -151
- package/dist/telemetry/manager.d.ts.map +0 -1
- package/dist/telemetry/manager.js +0 -367
- package/dist/telemetry/manager.js.map +0 -1
- package/dist/tools/index.d.ts +0 -13
- package/dist/tools/index.d.ts.map +0 -1
- package/dist/tools/index.js +0 -29
- package/dist/tools/index.js.map +0 -1
- package/dist/tools/manage-subscription.d.ts +0 -47
- package/dist/tools/manage-subscription.d.ts.map +0 -1
- package/dist/tools/manage-subscription.js +0 -317
- package/dist/tools/manage-subscription.js.map +0 -1
- package/dist/tools/registry.d.ts +0 -40
- package/dist/tools/registry.d.ts.map +0 -1
- package/dist/tools/registry.js +0 -85
- package/dist/tools/registry.js.map +0 -1
- package/dist/tools/resolve-prompt-content.d.ts +0 -35
- package/dist/tools/resolve-prompt-content.d.ts.map +0 -1
- package/dist/tools/resolve-prompt-content.js +0 -99
- package/dist/tools/resolve-prompt-content.js.map +0 -1
- package/dist/tools/search-resources.d.ts +0 -35
- package/dist/tools/search-resources.d.ts.map +0 -1
- package/dist/tools/search-resources.js +0 -159
- package/dist/tools/search-resources.js.map +0 -1
- package/dist/tools/sync-resources.d.ts +0 -54
- package/dist/tools/sync-resources.d.ts.map +0 -1
- package/dist/tools/sync-resources.js +0 -735
- package/dist/tools/sync-resources.js.map +0 -1
- package/dist/tools/track-usage.d.ts +0 -63
- package/dist/tools/track-usage.d.ts.map +0 -1
- package/dist/tools/track-usage.js +0 -90
- package/dist/tools/track-usage.js.map +0 -1
- package/dist/tools/uninstall-resource.d.ts +0 -30
- package/dist/tools/uninstall-resource.d.ts.map +0 -1
- package/dist/tools/uninstall-resource.js +0 -174
- package/dist/tools/uninstall-resource.js.map +0 -1
- package/dist/tools/upload-resource.d.ts +0 -81
- package/dist/tools/upload-resource.d.ts.map +0 -1
- package/dist/tools/upload-resource.js +0 -393
- package/dist/tools/upload-resource.js.map +0 -1
- package/dist/transport/sse.d.ts +0 -29
- package/dist/transport/sse.d.ts.map +0 -1
- package/dist/transport/sse.js +0 -271
- package/dist/transport/sse.js.map +0 -1
- package/dist/types/errors.d.ts +0 -60
- package/dist/types/errors.d.ts.map +0 -1
- package/dist/types/errors.js +0 -112
- package/dist/types/errors.js.map +0 -1
- package/dist/types/index.d.ts +0 -7
- package/dist/types/index.d.ts.map +0 -1
- package/dist/types/index.js +0 -23
- package/dist/types/index.js.map +0 -1
- package/dist/types/mcp.d.ts +0 -50
- package/dist/types/mcp.d.ts.map +0 -1
- package/dist/types/mcp.js +0 -6
- package/dist/types/mcp.js.map +0 -1
- package/dist/types/resources.d.ts +0 -109
- package/dist/types/resources.d.ts.map +0 -1
- package/dist/types/resources.js +0 -7
- package/dist/types/resources.js.map +0 -1
- package/dist/types/tools.d.ts +0 -253
- package/dist/types/tools.d.ts.map +0 -1
- package/dist/types/tools.js +0 -6
- package/dist/types/tools.js.map +0 -1
- package/dist/utils/cursor-paths.d.ts +0 -84
- package/dist/utils/cursor-paths.d.ts.map +0 -1
- package/dist/utils/cursor-paths.js +0 -166
- package/dist/utils/cursor-paths.js.map +0 -1
- package/dist/utils/log-cleaner.d.ts +0 -18
- package/dist/utils/log-cleaner.d.ts.map +0 -1
- package/dist/utils/log-cleaner.js +0 -112
- package/dist/utils/log-cleaner.js.map +0 -1
- package/dist/utils/logger.d.ts +0 -59
- package/dist/utils/logger.d.ts.map +0 -1
- package/dist/utils/logger.js +0 -292
- package/dist/utils/logger.js.map +0 -1
- package/dist/utils/validation.d.ts +0 -58
- package/dist/utils/validation.d.ts.map +0 -1
- package/dist/utils/validation.js +0 -214
- package/dist/utils/validation.js.map +0 -1
- package/src/api/cached-client.ts +0 -144
- package/src/api/client.ts +0 -697
- package/src/auth/index.ts +0 -11
- package/src/auth/middleware.ts +0 -244
- package/src/auth/permissions.ts +0 -323
- package/src/auth/token-validator.ts +0 -292
- package/src/cache/cache-manager.ts +0 -243
- package/src/cache/index.ts +0 -6
- package/src/cache/redis-client.ts +0 -249
- package/src/config/constants.ts +0 -33
- package/src/config/index.ts +0 -269
- package/src/filesystem/manager.ts +0 -235
- package/src/git/multi-source-manager.ts +0 -654
- package/src/git/operations.ts +0 -93
- package/src/index.ts +0 -157
- package/src/monitoring/health.ts +0 -132
- package/src/prompts/cache.ts +0 -140
- package/src/prompts/generator.ts +0 -143
- package/src/prompts/index.ts +0 -20
- package/src/prompts/manager.ts +0 -718
- package/src/resources/index.ts +0 -13
- package/src/resources/loader.ts +0 -563
- package/src/server/http.ts +0 -549
- package/src/server.ts +0 -206
- package/src/session/manager.ts +0 -296
- package/src/telemetry/index.ts +0 -10
- package/src/telemetry/manager.ts +0 -419
- package/src/tools/index.ts +0 -13
- package/src/tools/manage-subscription.ts +0 -388
- package/src/tools/registry.ts +0 -97
- package/src/tools/resolve-prompt-content.ts +0 -113
- package/src/tools/search-resources.ts +0 -185
- package/src/tools/sync-resources.ts +0 -829
- package/src/tools/track-usage.ts +0 -113
- package/src/tools/uninstall-resource.ts +0 -199
- package/src/tools/upload-resource.ts +0 -431
- package/src/transport/sse.ts +0 -308
- package/src/types/errors.ts +0 -146
- package/src/types/index.ts +0 -7
- package/src/types/mcp.ts +0 -61
- package/src/types/resources.ts +0 -141
- package/src/types/tools.ts +0 -305
- package/src/utils/cursor-paths.ts +0 -135
- package/src/utils/log-cleaner.ts +0 -92
- package/src/utils/logger.ts +0 -333
- package/src/utils/validation.ts +0 -262
package/dist/auth/middleware.js
DELETED
|
@@ -1,194 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* Authentication and Permission Middlewares
|
|
4
|
-
* Token authentication and permission checking for HTTP endpoints
|
|
5
|
-
*/
|
|
6
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
7
|
-
exports.tokenAuthMiddleware = tokenAuthMiddleware;
|
|
8
|
-
exports.tokenAuthOrLegacyMiddleware = tokenAuthOrLegacyMiddleware;
|
|
9
|
-
exports.requirePermission = requirePermission;
|
|
10
|
-
exports.checkToolCallPermission = checkToolCallPermission;
|
|
11
|
-
const token_validator_1 = require("./token-validator");
|
|
12
|
-
const permissions_1 = require("./permissions");
|
|
13
|
-
const logger_1 = require("../utils/logger");
|
|
14
|
-
/**
|
|
15
|
-
* Token Authentication Middleware
|
|
16
|
-
* Verifies token via external REST API
|
|
17
|
-
*/
|
|
18
|
-
async function tokenAuthMiddleware(request, reply) {
|
|
19
|
-
try {
|
|
20
|
-
// Extract token from Authorization header
|
|
21
|
-
const authHeader = request.headers.authorization;
|
|
22
|
-
if (!authHeader || !authHeader.startsWith('Bearer ')) {
|
|
23
|
-
logger_1.logger.warn({
|
|
24
|
-
type: 'auth',
|
|
25
|
-
operation: 'middleware',
|
|
26
|
-
ip: request.ip,
|
|
27
|
-
url: request.url
|
|
28
|
-
}, 'Missing or invalid Authorization header');
|
|
29
|
-
reply.code(401).send({
|
|
30
|
-
error: 'Unauthorized',
|
|
31
|
-
message: 'Missing or invalid Authorization header. Expected: Bearer <token>',
|
|
32
|
-
});
|
|
33
|
-
return;
|
|
34
|
-
}
|
|
35
|
-
const token = authHeader.substring(7); // Remove 'Bearer ' prefix
|
|
36
|
-
// Verify token via external API
|
|
37
|
-
const payload = await (0, token_validator_1.verifyToken)(token);
|
|
38
|
-
if (!payload) {
|
|
39
|
-
logger_1.logger.warn({
|
|
40
|
-
type: 'auth',
|
|
41
|
-
operation: 'middleware',
|
|
42
|
-
ip: request.ip,
|
|
43
|
-
url: request.url
|
|
44
|
-
}, 'Token validation failed');
|
|
45
|
-
reply.code(401).send({
|
|
46
|
-
error: 'Unauthorized',
|
|
47
|
-
message: 'Invalid or expired token',
|
|
48
|
-
});
|
|
49
|
-
return;
|
|
50
|
-
}
|
|
51
|
-
// Attach user info to request
|
|
52
|
-
request.user = payload;
|
|
53
|
-
logger_1.logger.debug({
|
|
54
|
-
type: 'auth',
|
|
55
|
-
operation: 'middleware',
|
|
56
|
-
userId: payload.userId,
|
|
57
|
-
email: payload.email,
|
|
58
|
-
groups: payload.groups
|
|
59
|
-
}, `Token authentication successful for user ${payload.userId}`);
|
|
60
|
-
}
|
|
61
|
-
catch (error) {
|
|
62
|
-
logger_1.logger.error({
|
|
63
|
-
type: 'auth',
|
|
64
|
-
operation: 'middleware',
|
|
65
|
-
error: error instanceof Error ? error.message : 'Unknown error'
|
|
66
|
-
}, 'Token authentication error');
|
|
67
|
-
reply.code(500).send({
|
|
68
|
-
error: 'Internal Server Error',
|
|
69
|
-
message: 'Authentication failed',
|
|
70
|
-
});
|
|
71
|
-
}
|
|
72
|
-
}
|
|
73
|
-
/**
|
|
74
|
-
* Token Authentication Middleware with Legacy Bearer Token Support
|
|
75
|
-
* Supports both token validation via API and legacy bearer tokens
|
|
76
|
-
*/
|
|
77
|
-
async function tokenAuthOrLegacyMiddleware(request, reply) {
|
|
78
|
-
try {
|
|
79
|
-
const authHeader = request.headers.authorization;
|
|
80
|
-
if (!authHeader || !authHeader.startsWith('Bearer ')) {
|
|
81
|
-
logger_1.logger.warn({
|
|
82
|
-
type: 'auth',
|
|
83
|
-
operation: 'middleware_legacy',
|
|
84
|
-
ip: request.ip,
|
|
85
|
-
url: request.url
|
|
86
|
-
}, 'Missing or invalid Authorization header');
|
|
87
|
-
reply.code(401).send({
|
|
88
|
-
error: 'Unauthorized',
|
|
89
|
-
message: 'Missing or invalid Authorization header',
|
|
90
|
-
});
|
|
91
|
-
return;
|
|
92
|
-
}
|
|
93
|
-
const token = authHeader.substring(7);
|
|
94
|
-
// Try to validate via API first
|
|
95
|
-
const payload = await (0, token_validator_1.verifyToken)(token);
|
|
96
|
-
if (payload) {
|
|
97
|
-
// API validation successful
|
|
98
|
-
request.user = payload;
|
|
99
|
-
logger_1.logger.debug({
|
|
100
|
-
type: 'auth',
|
|
101
|
-
operation: 'middleware_legacy',
|
|
102
|
-
userId: payload.userId,
|
|
103
|
-
email: payload.email,
|
|
104
|
-
groups: payload.groups
|
|
105
|
-
}, `Token validated via API for user ${payload.userId}`);
|
|
106
|
-
return;
|
|
107
|
-
}
|
|
108
|
-
// Fallback to legacy bearer token (for backward compatibility)
|
|
109
|
-
logger_1.logger.debug({
|
|
110
|
-
type: 'auth',
|
|
111
|
-
operation: 'middleware_legacy',
|
|
112
|
-
ip: request.ip
|
|
113
|
-
}, 'API validation failed, using legacy bearer token mode');
|
|
114
|
-
// In legacy mode, we don't have user info, so continue without setting request.user
|
|
115
|
-
// The endpoint will handle the legacy token separately
|
|
116
|
-
}
|
|
117
|
-
catch (error) {
|
|
118
|
-
logger_1.logger.error({
|
|
119
|
-
type: 'auth',
|
|
120
|
-
operation: 'middleware_legacy',
|
|
121
|
-
error: error instanceof Error ? error.message : 'Unknown error'
|
|
122
|
-
}, 'Token authentication error');
|
|
123
|
-
reply.code(500).send({
|
|
124
|
-
error: 'Internal Server Error',
|
|
125
|
-
message: 'Authentication failed',
|
|
126
|
-
});
|
|
127
|
-
}
|
|
128
|
-
}
|
|
129
|
-
/**
|
|
130
|
-
* Permission Check Middleware Factory
|
|
131
|
-
* Creates middleware to check permissions for a specific tool
|
|
132
|
-
*/
|
|
133
|
-
function requirePermission(toolName) {
|
|
134
|
-
return async (request, reply) => {
|
|
135
|
-
try {
|
|
136
|
-
if (!request.user) {
|
|
137
|
-
logger_1.logger.error({
|
|
138
|
-
type: 'auth',
|
|
139
|
-
operation: 'permission_check',
|
|
140
|
-
url: request.url
|
|
141
|
-
}, 'Permission check called without authentication');
|
|
142
|
-
reply.code(401).send({
|
|
143
|
-
error: 'Unauthorized',
|
|
144
|
-
message: 'Authentication required',
|
|
145
|
-
});
|
|
146
|
-
return;
|
|
147
|
-
}
|
|
148
|
-
// Check permission
|
|
149
|
-
const permissionCheck = (0, permissions_1.checkPermission)(toolName, request.user.groups);
|
|
150
|
-
if (!permissionCheck.allowed) {
|
|
151
|
-
logger_1.logger.warn({
|
|
152
|
-
type: 'auth',
|
|
153
|
-
operation: 'permission_check',
|
|
154
|
-
userId: request.user.userId,
|
|
155
|
-
email: request.user.email,
|
|
156
|
-
groups: request.user.groups,
|
|
157
|
-
toolName,
|
|
158
|
-
reason: permissionCheck.reason,
|
|
159
|
-
}, `Permission denied for user ${request.user.userId} to access tool ${toolName}`);
|
|
160
|
-
reply.code(403).send({
|
|
161
|
-
error: 'Forbidden',
|
|
162
|
-
message: permissionCheck.reason || 'Insufficient permissions',
|
|
163
|
-
});
|
|
164
|
-
return;
|
|
165
|
-
}
|
|
166
|
-
logger_1.logger.debug({
|
|
167
|
-
type: 'auth',
|
|
168
|
-
operation: 'permission_check',
|
|
169
|
-
userId: request.user.userId,
|
|
170
|
-
toolName
|
|
171
|
-
}, `Permission granted for user ${request.user.userId} to access tool ${toolName}`);
|
|
172
|
-
}
|
|
173
|
-
catch (error) {
|
|
174
|
-
logger_1.logger.error({
|
|
175
|
-
type: 'auth',
|
|
176
|
-
operation: 'permission_check',
|
|
177
|
-
toolName,
|
|
178
|
-
error: error instanceof Error ? error.message : 'Unknown error'
|
|
179
|
-
}, 'Permission check error');
|
|
180
|
-
reply.code(500).send({
|
|
181
|
-
error: 'Internal Server Error',
|
|
182
|
-
message: 'Permission check failed',
|
|
183
|
-
});
|
|
184
|
-
}
|
|
185
|
-
};
|
|
186
|
-
}
|
|
187
|
-
/**
|
|
188
|
-
* Permission Check for Tool Call
|
|
189
|
-
* Checks permission when tools/call is invoked
|
|
190
|
-
*/
|
|
191
|
-
function checkToolCallPermission(toolName, user) {
|
|
192
|
-
return (0, permissions_1.checkPermission)(toolName, user.groups);
|
|
193
|
-
}
|
|
194
|
-
//# sourceMappingURL=middleware.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"middleware.js","sourceRoot":"","sources":["../../src/auth/middleware.ts"],"names":[],"mappings":";AAAA;;;GAGG;;AAkBH,kDAqEC;AAMD,kEAkEC;AAMD,8CAgEC;AAMD,0DAKC;AA7OD,uDAA8D;AAC9D,+CAAgD;AAChD,4CAAyC;AASzC;;;GAGG;AACI,KAAK,UAAU,mBAAmB,CACvC,OAA6B,EAC7B,KAAmB;IAEnB,IAAI,CAAC;QACH,0CAA0C;QAC1C,MAAM,UAAU,GAAG,OAAO,CAAC,OAAO,CAAC,aAAa,CAAC;QACjD,IAAI,CAAC,UAAU,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;YACrD,eAAM,CAAC,IAAI,CACT;gBACE,IAAI,EAAE,MAAM;gBACZ,SAAS,EAAE,YAAY;gBACvB,EAAE,EAAE,OAAO,CAAC,EAAE;gBACd,GAAG,EAAE,OAAO,CAAC,GAAG;aACjB,EACD,yCAAyC,CAC1C,CAAC;YACF,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;gBACnB,KAAK,EAAE,cAAc;gBACrB,OAAO,EAAE,mEAAmE;aAC7E,CAAC,CAAC;YACH,OAAO;QACT,CAAC;QAED,MAAM,KAAK,GAAG,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,CAAC,0BAA0B;QAEjE,gCAAgC;QAChC,MAAM,OAAO,GAAG,MAAM,IAAA,6BAAW,EAAC,KAAK,CAAC,CAAC;QACzC,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,eAAM,CAAC,IAAI,CACT;gBACE,IAAI,EAAE,MAAM;gBACZ,SAAS,EAAE,YAAY;gBACvB,EAAE,EAAE,OAAO,CAAC,EAAE;gBACd,GAAG,EAAE,OAAO,CAAC,GAAG;aACjB,EACD,yBAAyB,CAC1B,CAAC;YACF,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;gBACnB,KAAK,EAAE,cAAc;gBACrB,OAAO,EAAE,0BAA0B;aACpC,CAAC,CAAC;YACH,OAAO;QACT,CAAC;QAED,8BAA8B;QAC9B,OAAO,CAAC,IAAI,GAAG,OAAO,CAAC;QAEvB,eAAM,CAAC,KAAK,CACV;YACE,IAAI,EAAE,MAAM;YACZ,SAAS,EAAE,YAAY;YACvB,MAAM,EAAE,OAAO,CAAC,MAAM;YACtB,KAAK,EAAE,OAAO,CAAC,KAAK;YACpB,MAAM,EAAE,OAAO,CAAC,MAAM;SACvB,EACD,4CAA4C,OAAO,CAAC,MAAM,EAAE,CAC7D,CAAC;IACJ,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,eAAM,CAAC,KAAK,CAAC;YACX,IAAI,EAAE,MAAM;YACZ,SAAS,EAAE,YAAY;YACvB,KAAK,EAAE,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,eAAe;SAChE,EAAE,4BAA4B,CAAC,CAAC;QACjC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;YACnB,KAAK,EAAE,uBAAuB;YAC9B,OAAO,EAAE,uBAAuB;SACjC,CAAC,CAAC;IACL,CAAC;AACH,CAAC;AAED;;;GAGG;AACI,KAAK,UAAU,2BAA2B,CAC/C,OAA6B,EAC7B,KAAmB;IAEnB,IAAI,CAAC;QACH,MAAM,UAAU,GAAG,OAAO,CAAC,OAAO,CAAC,aAAa,CAAC;QACjD,IAAI,CAAC,UAAU,IAAI,CAAC,UAAU,CAAC,UAAU,CAAC,SAAS,CAAC,EAAE,CAAC;YACrD,eAAM,CAAC,IAAI,CACT;gBACE,IAAI,EAAE,MAAM;gBACZ,SAAS,EAAE,mBAAmB;gBAC9B,EAAE,EAAE,OAAO,CAAC,EAAE;gBACd,GAAG,EAAE,OAAO,CAAC,GAAG;aACjB,EACD,yCAAyC,CAC1C,CAAC;YACF,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;gBACnB,KAAK,EAAE,cAAc;gBACrB,OAAO,EAAE,yCAAyC;aACnD,CAAC,CAAC;YACH,OAAO;QACT,CAAC;QAED,MAAM,KAAK,GAAG,UAAU,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC;QAEtC,gCAAgC;QAChC,MAAM,OAAO,GAAG,MAAM,IAAA,6BAAW,EAAC,KAAK,CAAC,CAAC;QACzC,IAAI,OAAO,EAAE,CAAC;YACZ,4BAA4B;YAC5B,OAAO,CAAC,IAAI,GAAG,OAAO,CAAC;YACvB,eAAM,CAAC,KAAK,CACV;gBACE,IAAI,EAAE,MAAM;gBACZ,SAAS,EAAE,mBAAmB;gBAC9B,MAAM,EAAE,OAAO,CAAC,MAAM;gBACtB,KAAK,EAAE,OAAO,CAAC,KAAK;gBACpB,MAAM,EAAE,OAAO,CAAC,MAAM;aACvB,EACD,oCAAoC,OAAO,CAAC,MAAM,EAAE,CACrD,CAAC;YACF,OAAO;QACT,CAAC;QAED,+DAA+D;QAC/D,eAAM,CAAC,KAAK,CACV;YACE,IAAI,EAAE,MAAM;YACZ,SAAS,EAAE,mBAAmB;YAC9B,EAAE,EAAE,OAAO,CAAC,EAAE;SACf,EACD,uDAAuD,CACxD,CAAC;QAEF,oFAAoF;QACpF,uDAAuD;IACzD,CAAC;IAAC,OAAO,KAAK,EAAE,CAAC;QACf,eAAM,CAAC,KAAK,CAAC;YACX,IAAI,EAAE,MAAM;YACZ,SAAS,EAAE,mBAAmB;YAC9B,KAAK,EAAE,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,eAAe;SAChE,EAAE,4BAA4B,CAAC,CAAC;QACjC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;YACnB,KAAK,EAAE,uBAAuB;YAC9B,OAAO,EAAE,uBAAuB;SACjC,CAAC,CAAC;IACL,CAAC;AACH,CAAC;AAED;;;GAGG;AACH,SAAgB,iBAAiB,CAAC,QAAgB;IAChD,OAAO,KAAK,EAAE,OAA6B,EAAE,KAAmB,EAAiB,EAAE;QACjF,IAAI,CAAC;YACH,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;gBAClB,eAAM,CAAC,KAAK,CACV;oBACE,IAAI,EAAE,MAAM;oBACZ,SAAS,EAAE,kBAAkB;oBAC7B,GAAG,EAAE,OAAO,CAAC,GAAG;iBACjB,EACD,gDAAgD,CACjD,CAAC;gBACF,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;oBACnB,KAAK,EAAE,cAAc;oBACrB,OAAO,EAAE,yBAAyB;iBACnC,CAAC,CAAC;gBACH,OAAO;YACT,CAAC;YAED,mBAAmB;YACnB,MAAM,eAAe,GAAG,IAAA,6BAAe,EAAC,QAAQ,EAAE,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;YAEvE,IAAI,CAAC,eAAe,CAAC,OAAO,EAAE,CAAC;gBAC7B,eAAM,CAAC,IAAI,CACT;oBACE,IAAI,EAAE,MAAM;oBACZ,SAAS,EAAE,kBAAkB;oBAC7B,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,MAAM;oBAC3B,KAAK,EAAE,OAAO,CAAC,IAAI,CAAC,KAAK;oBACzB,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,MAAM;oBAC3B,QAAQ;oBACR,MAAM,EAAE,eAAe,CAAC,MAAM;iBAC/B,EACD,8BAA8B,OAAO,CAAC,IAAI,CAAC,MAAM,mBAAmB,QAAQ,EAAE,CAC/E,CAAC;gBACF,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;oBACnB,KAAK,EAAE,WAAW;oBAClB,OAAO,EAAE,eAAe,CAAC,MAAM,IAAI,0BAA0B;iBAC9D,CAAC,CAAC;gBACH,OAAO;YACT,CAAC;YAED,eAAM,CAAC,KAAK,CACV;gBACE,IAAI,EAAE,MAAM;gBACZ,SAAS,EAAE,kBAAkB;gBAC7B,MAAM,EAAE,OAAO,CAAC,IAAI,CAAC,MAAM;gBAC3B,QAAQ;aACT,EACD,+BAA+B,OAAO,CAAC,IAAI,CAAC,MAAM,mBAAmB,QAAQ,EAAE,CAChF,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,eAAM,CAAC,KAAK,CAAC;gBACX,IAAI,EAAE,MAAM;gBACZ,SAAS,EAAE,kBAAkB;gBAC7B,QAAQ;gBACR,KAAK,EAAE,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,eAAe;aAChE,EAAE,wBAAwB,CAAC,CAAC;YAC7B,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,IAAI,CAAC;gBACnB,KAAK,EAAE,uBAAuB;gBAC9B,OAAO,EAAE,yBAAyB;aACnC,CAAC,CAAC;QACL,CAAC;IACH,CAAC,CAAC;AACJ,CAAC;AAED;;;GAGG;AACH,SAAgB,uBAAuB,CACrC,QAAgB,EAChB,IAAkB;IAElB,OAAO,IAAA,6BAAe,EAAC,QAAQ,EAAE,IAAI,CAAC,MAAM,CAAC,CAAC;AAChD,CAAC"}
|
|
@@ -1,60 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Permission Control System
|
|
3
|
-
* Group-based access control for MCP tools
|
|
4
|
-
* Groups are obtained from CSP API /user/permissions (e.g., "zNet", "Client-Public")
|
|
5
|
-
*/
|
|
6
|
-
/**
|
|
7
|
-
* Known groups from CSP
|
|
8
|
-
* Users may belong to one or more groups
|
|
9
|
-
*/
|
|
10
|
-
export declare const KnownGroups: {
|
|
11
|
-
readonly ZNET: "zNet";
|
|
12
|
-
readonly CLIENT_PUBLIC: "Client-Public";
|
|
13
|
-
readonly ADMIN: "admin";
|
|
14
|
-
};
|
|
15
|
-
/**
|
|
16
|
-
* Permission level for operations
|
|
17
|
-
*/
|
|
18
|
-
export declare enum PermissionLevel {
|
|
19
|
-
READ = "read",
|
|
20
|
-
WRITE = "write",
|
|
21
|
-
ADMIN = "admin"
|
|
22
|
-
}
|
|
23
|
-
/**
|
|
24
|
-
* Tool permission configuration
|
|
25
|
-
*/
|
|
26
|
-
export interface ToolPermission {
|
|
27
|
-
tool: string;
|
|
28
|
-
allowedGroups: string[];
|
|
29
|
-
requiredPermission: PermissionLevel;
|
|
30
|
-
}
|
|
31
|
-
/**
|
|
32
|
-
* Initialize permission system
|
|
33
|
-
*/
|
|
34
|
-
export declare function initializePermissions(customRules?: ToolPermission[]): void;
|
|
35
|
-
/**
|
|
36
|
-
* Check if a user has permission to access a tool
|
|
37
|
-
* @param toolName - The name of the tool to check
|
|
38
|
-
* @param userGroups - The groups the user belongs to (from CSP API)
|
|
39
|
-
*/
|
|
40
|
-
export declare function checkPermission(toolName: string, userGroups: string[]): {
|
|
41
|
-
allowed: boolean;
|
|
42
|
-
reason?: string;
|
|
43
|
-
};
|
|
44
|
-
/**
|
|
45
|
-
* Get permission info for a tool
|
|
46
|
-
*/
|
|
47
|
-
export declare function getToolPermission(toolName: string): ToolPermission | undefined;
|
|
48
|
-
/**
|
|
49
|
-
* Get all permission rules
|
|
50
|
-
*/
|
|
51
|
-
export declare function getAllPermissions(): ToolPermission[];
|
|
52
|
-
/**
|
|
53
|
-
* Update permission rule for a tool
|
|
54
|
-
*/
|
|
55
|
-
export declare function updatePermission(permission: ToolPermission): void;
|
|
56
|
-
/**
|
|
57
|
-
* Remove permission rule for a tool
|
|
58
|
-
*/
|
|
59
|
-
export declare function removePermission(toolName: string): void;
|
|
60
|
-
//# sourceMappingURL=permissions.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"permissions.d.ts","sourceRoot":"","sources":["../../src/auth/permissions.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAIH;;;GAGG;AACH,eAAO,MAAM,WAAW;;;;CAId,CAAC;AAEX;;GAEG;AACH,oBAAY,eAAe;IACzB,IAAI,SAAS;IACb,KAAK,UAAU;IACf,KAAK,UAAU;CAChB;AAED;;GAEG;AACH,MAAM,WAAW,cAAc;IAC7B,IAAI,EAAE,MAAM,CAAC;IACb,aAAa,EAAE,MAAM,EAAE,CAAC;IACxB,kBAAkB,EAAE,eAAe,CAAC;CACrC;AAkDD;;GAEG;AACH,wBAAgB,qBAAqB,CAAC,WAAW,CAAC,EAAE,cAAc,EAAE,GAAG,IAAI,CAqB1E;AAED;;;;GAIG;AACH,wBAAgB,eAAe,CAC7B,QAAQ,EAAE,MAAM,EAChB,UAAU,EAAE,MAAM,EAAE,GACnB;IAAE,OAAO,EAAE,OAAO,CAAC;IAAC,MAAM,CAAC,EAAE,MAAM,CAAA;CAAE,CAwKvC;AAED;;GAEG;AACH,wBAAgB,iBAAiB,CAAC,QAAQ,EAAE,MAAM,GAAG,cAAc,GAAG,SAAS,CAE9E;AAED;;GAEG;AACH,wBAAgB,iBAAiB,IAAI,cAAc,EAAE,CAEpD;AAED;;GAEG;AACH,wBAAgB,gBAAgB,CAAC,UAAU,EAAE,cAAc,GAAG,IAAI,CAMjE;AAED;;GAEG;AACH,wBAAgB,gBAAgB,CAAC,QAAQ,EAAE,MAAM,GAAG,IAAI,CAGvD"}
|
package/dist/auth/permissions.js
DELETED
|
@@ -1,262 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* Permission Control System
|
|
4
|
-
* Group-based access control for MCP tools
|
|
5
|
-
* Groups are obtained from CSP API /user/permissions (e.g., "zNet", "Client-Public")
|
|
6
|
-
*/
|
|
7
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
-
exports.PermissionLevel = exports.KnownGroups = void 0;
|
|
9
|
-
exports.initializePermissions = initializePermissions;
|
|
10
|
-
exports.checkPermission = checkPermission;
|
|
11
|
-
exports.getToolPermission = getToolPermission;
|
|
12
|
-
exports.getAllPermissions = getAllPermissions;
|
|
13
|
-
exports.updatePermission = updatePermission;
|
|
14
|
-
exports.removePermission = removePermission;
|
|
15
|
-
const logger_1 = require("../utils/logger");
|
|
16
|
-
/**
|
|
17
|
-
* Known groups from CSP
|
|
18
|
-
* Users may belong to one or more groups
|
|
19
|
-
*/
|
|
20
|
-
exports.KnownGroups = {
|
|
21
|
-
ZNET: 'zNet', // zNet team - full access
|
|
22
|
-
CLIENT_PUBLIC: 'Client-Public', // Client-Public team - standard access
|
|
23
|
-
ADMIN: 'admin', // Admin group - full access (if exists)
|
|
24
|
-
};
|
|
25
|
-
/**
|
|
26
|
-
* Permission level for operations
|
|
27
|
-
*/
|
|
28
|
-
var PermissionLevel;
|
|
29
|
-
(function (PermissionLevel) {
|
|
30
|
-
PermissionLevel["READ"] = "read";
|
|
31
|
-
PermissionLevel["WRITE"] = "write";
|
|
32
|
-
PermissionLevel["ADMIN"] = "admin";
|
|
33
|
-
})(PermissionLevel || (exports.PermissionLevel = PermissionLevel = {}));
|
|
34
|
-
/**
|
|
35
|
-
* Default permission rules for each tool
|
|
36
|
-
* All authenticated users (with valid groups) can use these tools
|
|
37
|
-
*/
|
|
38
|
-
const defaultPermissions = [
|
|
39
|
-
// sync_resources - available to all authenticated users
|
|
40
|
-
{
|
|
41
|
-
tool: 'sync_resources',
|
|
42
|
-
allowedGroups: ['*'], // * means all authenticated users
|
|
43
|
-
requiredPermission: PermissionLevel.WRITE,
|
|
44
|
-
},
|
|
45
|
-
// manage_subscription - available to all authenticated users
|
|
46
|
-
{
|
|
47
|
-
tool: 'manage_subscription',
|
|
48
|
-
allowedGroups: ['*'],
|
|
49
|
-
requiredPermission: PermissionLevel.WRITE,
|
|
50
|
-
},
|
|
51
|
-
// search_resources - read-only, all authenticated users
|
|
52
|
-
{
|
|
53
|
-
tool: 'search_resources',
|
|
54
|
-
allowedGroups: ['*'],
|
|
55
|
-
requiredPermission: PermissionLevel.READ,
|
|
56
|
-
},
|
|
57
|
-
// upload_resource - requires write permission
|
|
58
|
-
{
|
|
59
|
-
tool: 'upload_resource',
|
|
60
|
-
allowedGroups: ['*'],
|
|
61
|
-
requiredPermission: PermissionLevel.WRITE,
|
|
62
|
-
},
|
|
63
|
-
// uninstall_resource - requires write permission
|
|
64
|
-
{
|
|
65
|
-
tool: 'uninstall_resource',
|
|
66
|
-
allowedGroups: ['*'],
|
|
67
|
-
requiredPermission: PermissionLevel.WRITE,
|
|
68
|
-
},
|
|
69
|
-
// track_usage - internal telemetry tool, always allowed for all authenticated users
|
|
70
|
-
{
|
|
71
|
-
tool: 'track_usage',
|
|
72
|
-
allowedGroups: ['*'],
|
|
73
|
-
requiredPermission: PermissionLevel.WRITE,
|
|
74
|
-
},
|
|
75
|
-
];
|
|
76
|
-
/**
|
|
77
|
-
* Custom permission rules (can be overridden via config)
|
|
78
|
-
*/
|
|
79
|
-
let permissionRules = new Map();
|
|
80
|
-
/**
|
|
81
|
-
* Initialize permission system
|
|
82
|
-
*/
|
|
83
|
-
function initializePermissions(customRules) {
|
|
84
|
-
// Load default permissions
|
|
85
|
-
for (const perm of defaultPermissions) {
|
|
86
|
-
permissionRules.set(perm.tool, perm);
|
|
87
|
-
}
|
|
88
|
-
// Override with custom rules if provided
|
|
89
|
-
if (customRules && customRules.length > 0) {
|
|
90
|
-
logger_1.logger.info({ count: customRules.length }, 'Loading custom permission rules');
|
|
91
|
-
for (const perm of customRules) {
|
|
92
|
-
permissionRules.set(perm.tool, perm);
|
|
93
|
-
}
|
|
94
|
-
}
|
|
95
|
-
logger_1.logger.info({ toolCount: permissionRules.size }, 'Permission system initialized');
|
|
96
|
-
}
|
|
97
|
-
/**
|
|
98
|
-
* Check if a user has permission to access a tool
|
|
99
|
-
* @param toolName - The name of the tool to check
|
|
100
|
-
* @param userGroups - The groups the user belongs to (from CSP API)
|
|
101
|
-
*/
|
|
102
|
-
function checkPermission(toolName, userGroups) {
|
|
103
|
-
const checkStartTime = Date.now();
|
|
104
|
-
logger_1.logger.debug({
|
|
105
|
-
type: 'permission_check',
|
|
106
|
-
toolName,
|
|
107
|
-
userGroups,
|
|
108
|
-
timestamp: new Date().toISOString()
|
|
109
|
-
}, `Checking permission for tool: ${toolName}`);
|
|
110
|
-
// Check if tool has permission rules
|
|
111
|
-
const permission = permissionRules.get(toolName);
|
|
112
|
-
if (!permission) {
|
|
113
|
-
// If no permission rule defined, deny by default
|
|
114
|
-
logger_1.logger.warn({
|
|
115
|
-
type: 'permission_check',
|
|
116
|
-
toolName,
|
|
117
|
-
userGroups,
|
|
118
|
-
result: 'denied',
|
|
119
|
-
reason: 'no_rule',
|
|
120
|
-
timestamp: new Date().toISOString()
|
|
121
|
-
}, 'No permission rule found for tool, denying access');
|
|
122
|
-
(0, logger_1.logAuthAttempt)('permission_check', false, {
|
|
123
|
-
toolName,
|
|
124
|
-
userGroups,
|
|
125
|
-
reason: 'no_rule',
|
|
126
|
-
duration: Date.now() - checkStartTime
|
|
127
|
-
});
|
|
128
|
-
return {
|
|
129
|
-
allowed: false,
|
|
130
|
-
reason: `Tool '${toolName}' has no permission rule defined`,
|
|
131
|
-
};
|
|
132
|
-
}
|
|
133
|
-
// If no groups provided, deny access
|
|
134
|
-
if (!userGroups || userGroups.length === 0) {
|
|
135
|
-
logger_1.logger.warn({
|
|
136
|
-
type: 'permission_check',
|
|
137
|
-
toolName,
|
|
138
|
-
result: 'denied',
|
|
139
|
-
reason: 'no_groups',
|
|
140
|
-
timestamp: new Date().toISOString()
|
|
141
|
-
}, 'Permission denied: user has no groups');
|
|
142
|
-
(0, logger_1.logAuthAttempt)('permission_check', false, {
|
|
143
|
-
toolName,
|
|
144
|
-
reason: 'no_groups',
|
|
145
|
-
duration: Date.now() - checkStartTime
|
|
146
|
-
});
|
|
147
|
-
return {
|
|
148
|
-
allowed: false,
|
|
149
|
-
reason: `User must belong to at least one group to access tools`,
|
|
150
|
-
};
|
|
151
|
-
}
|
|
152
|
-
// Admin group bypasses all checks
|
|
153
|
-
if (userGroups.includes(exports.KnownGroups.ADMIN) || userGroups.includes('admin')) {
|
|
154
|
-
logger_1.logger.info({
|
|
155
|
-
type: 'permission_check',
|
|
156
|
-
toolName,
|
|
157
|
-
userGroups,
|
|
158
|
-
result: 'granted',
|
|
159
|
-
reason: 'admin_bypass',
|
|
160
|
-
duration: Date.now() - checkStartTime,
|
|
161
|
-
timestamp: new Date().toISOString()
|
|
162
|
-
}, 'Admin group access granted');
|
|
163
|
-
(0, logger_1.logAuthAttempt)('permission_check', true, {
|
|
164
|
-
toolName,
|
|
165
|
-
userGroups,
|
|
166
|
-
reason: 'admin',
|
|
167
|
-
duration: Date.now() - checkStartTime
|
|
168
|
-
});
|
|
169
|
-
return { allowed: true };
|
|
170
|
-
}
|
|
171
|
-
// Check if tool allows all authenticated users
|
|
172
|
-
if (permission.allowedGroups.includes('*')) {
|
|
173
|
-
logger_1.logger.info({
|
|
174
|
-
type: 'permission_check',
|
|
175
|
-
toolName,
|
|
176
|
-
userGroups,
|
|
177
|
-
allowedGroups: permission.allowedGroups,
|
|
178
|
-
result: 'granted',
|
|
179
|
-
reason: 'wildcard',
|
|
180
|
-
duration: Date.now() - checkStartTime,
|
|
181
|
-
timestamp: new Date().toISOString()
|
|
182
|
-
}, 'Permission granted (tool allows all authenticated users)');
|
|
183
|
-
(0, logger_1.logAuthAttempt)('permission_check', true, {
|
|
184
|
-
toolName,
|
|
185
|
-
userGroups,
|
|
186
|
-
reason: 'wildcard',
|
|
187
|
-
duration: Date.now() - checkStartTime
|
|
188
|
-
});
|
|
189
|
-
return { allowed: true };
|
|
190
|
-
}
|
|
191
|
-
// Check if user belongs to any of the allowed groups
|
|
192
|
-
const hasAllowedGroup = userGroups.some((group) => permission.allowedGroups.includes(group));
|
|
193
|
-
if (!hasAllowedGroup) {
|
|
194
|
-
logger_1.logger.warn({
|
|
195
|
-
type: 'permission_check',
|
|
196
|
-
toolName,
|
|
197
|
-
userGroups,
|
|
198
|
-
allowedGroups: permission.allowedGroups,
|
|
199
|
-
result: 'denied',
|
|
200
|
-
reason: 'group_mismatch',
|
|
201
|
-
duration: Date.now() - checkStartTime,
|
|
202
|
-
timestamp: new Date().toISOString()
|
|
203
|
-
}, 'Permission denied: user not in allowed groups');
|
|
204
|
-
(0, logger_1.logAuthAttempt)('permission_check', false, {
|
|
205
|
-
toolName,
|
|
206
|
-
userGroups,
|
|
207
|
-
allowedGroups: permission.allowedGroups,
|
|
208
|
-
reason: 'group_mismatch',
|
|
209
|
-
duration: Date.now() - checkStartTime
|
|
210
|
-
});
|
|
211
|
-
return {
|
|
212
|
-
allowed: false,
|
|
213
|
-
reason: `Tool '${toolName}' requires membership in one of: ${permission.allowedGroups.join(', ')}`,
|
|
214
|
-
};
|
|
215
|
-
}
|
|
216
|
-
logger_1.logger.info({
|
|
217
|
-
type: 'permission_check',
|
|
218
|
-
toolName,
|
|
219
|
-
userGroups,
|
|
220
|
-
allowedGroups: permission.allowedGroups,
|
|
221
|
-
result: 'granted',
|
|
222
|
-
reason: 'group_match',
|
|
223
|
-
duration: Date.now() - checkStartTime,
|
|
224
|
-
timestamp: new Date().toISOString()
|
|
225
|
-
}, 'Permission granted (user in allowed groups)');
|
|
226
|
-
(0, logger_1.logAuthAttempt)('permission_check', true, {
|
|
227
|
-
toolName,
|
|
228
|
-
userGroups,
|
|
229
|
-
matchedGroups: userGroups.filter(g => permission.allowedGroups.includes(g)),
|
|
230
|
-
duration: Date.now() - checkStartTime
|
|
231
|
-
});
|
|
232
|
-
return { allowed: true };
|
|
233
|
-
}
|
|
234
|
-
/**
|
|
235
|
-
* Get permission info for a tool
|
|
236
|
-
*/
|
|
237
|
-
function getToolPermission(toolName) {
|
|
238
|
-
return permissionRules.get(toolName);
|
|
239
|
-
}
|
|
240
|
-
/**
|
|
241
|
-
* Get all permission rules
|
|
242
|
-
*/
|
|
243
|
-
function getAllPermissions() {
|
|
244
|
-
return Array.from(permissionRules.values());
|
|
245
|
-
}
|
|
246
|
-
/**
|
|
247
|
-
* Update permission rule for a tool
|
|
248
|
-
*/
|
|
249
|
-
function updatePermission(permission) {
|
|
250
|
-
permissionRules.set(permission.tool, permission);
|
|
251
|
-
logger_1.logger.info({ tool: permission.tool, permission }, 'Permission rule updated');
|
|
252
|
-
}
|
|
253
|
-
/**
|
|
254
|
-
* Remove permission rule for a tool
|
|
255
|
-
*/
|
|
256
|
-
function removePermission(toolName) {
|
|
257
|
-
permissionRules.delete(toolName);
|
|
258
|
-
logger_1.logger.info({ toolName }, 'Permission rule removed');
|
|
259
|
-
}
|
|
260
|
-
// Initialize with default permissions
|
|
261
|
-
initializePermissions();
|
|
262
|
-
//# sourceMappingURL=permissions.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"permissions.js","sourceRoot":"","sources":["../../src/auth/permissions.ts"],"names":[],"mappings":";AAAA;;;;GAIG;;;AAmFH,sDAqBC;AAOD,0CA2KC;AAKD,8CAEC;AAKD,8CAEC;AAKD,4CAMC;AAKD,4CAGC;AAzTD,4CAAyD;AAEzD;;;GAGG;AACU,QAAA,WAAW,GAAG;IACzB,IAAI,EAAE,MAAM,EAAuB,0BAA0B;IAC7D,aAAa,EAAE,eAAe,EAAK,uCAAuC;IAC1E,KAAK,EAAE,OAAO,EAAqB,wCAAwC;CACnE,CAAC;AAEX;;GAEG;AACH,IAAY,eAIX;AAJD,WAAY,eAAe;IACzB,gCAAa,CAAA;IACb,kCAAe,CAAA;IACf,kCAAe,CAAA;AACjB,CAAC,EAJW,eAAe,+BAAf,eAAe,QAI1B;AAWD;;;GAGG;AACH,MAAM,kBAAkB,GAAqB;IAC3C,wDAAwD;IACxD;QACE,IAAI,EAAE,gBAAgB;QACtB,aAAa,EAAE,CAAC,GAAG,CAAC,EAAG,kCAAkC;QACzD,kBAAkB,EAAE,eAAe,CAAC,KAAK;KAC1C;IACD,6DAA6D;IAC7D;QACE,IAAI,EAAE,qBAAqB;QAC3B,aAAa,EAAE,CAAC,GAAG,CAAC;QACpB,kBAAkB,EAAE,eAAe,CAAC,KAAK;KAC1C;IACD,wDAAwD;IACxD;QACE,IAAI,EAAE,kBAAkB;QACxB,aAAa,EAAE,CAAC,GAAG,CAAC;QACpB,kBAAkB,EAAE,eAAe,CAAC,IAAI;KACzC;IACD,8CAA8C;IAC9C;QACE,IAAI,EAAE,iBAAiB;QACvB,aAAa,EAAE,CAAC,GAAG,CAAC;QACpB,kBAAkB,EAAE,eAAe,CAAC,KAAK;KAC1C;IACD,iDAAiD;IACjD;QACE,IAAI,EAAE,oBAAoB;QAC1B,aAAa,EAAE,CAAC,GAAG,CAAC;QACpB,kBAAkB,EAAE,eAAe,CAAC,KAAK;KAC1C;IACD,oFAAoF;IACpF;QACE,IAAI,EAAE,aAAa;QACnB,aAAa,EAAE,CAAC,GAAG,CAAC;QACpB,kBAAkB,EAAE,eAAe,CAAC,KAAK;KAC1C;CACF,CAAC;AAEF;;GAEG;AACH,IAAI,eAAe,GAAgC,IAAI,GAAG,EAAE,CAAC;AAE7D;;GAEG;AACH,SAAgB,qBAAqB,CAAC,WAA8B;IAClE,2BAA2B;IAC3B,KAAK,MAAM,IAAI,IAAI,kBAAkB,EAAE,CAAC;QACtC,eAAe,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;IACvC,CAAC;IAED,yCAAyC;IACzC,IAAI,WAAW,IAAI,WAAW,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC1C,eAAM,CAAC,IAAI,CACT,EAAE,KAAK,EAAE,WAAW,CAAC,MAAM,EAAE,EAC7B,iCAAiC,CAClC,CAAC;QACF,KAAK,MAAM,IAAI,IAAI,WAAW,EAAE,CAAC;YAC/B,eAAe,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,EAAE,IAAI,CAAC,CAAC;QACvC,CAAC;IACH,CAAC;IAED,eAAM,CAAC,IAAI,CACT,EAAE,SAAS,EAAE,eAAe,CAAC,IAAI,EAAE,EACnC,+BAA+B,CAChC,CAAC;AACJ,CAAC;AAED;;;;GAIG;AACH,SAAgB,eAAe,CAC7B,QAAgB,EAChB,UAAoB;IAEpB,MAAM,cAAc,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;IAElC,eAAM,CAAC,KAAK,CAAC;QACX,IAAI,EAAE,kBAAkB;QACxB,QAAQ;QACR,UAAU;QACV,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;KACpC,EAAE,iCAAiC,QAAQ,EAAE,CAAC,CAAC;IAEhD,qCAAqC;IACrC,MAAM,UAAU,GAAG,eAAe,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;IACjD,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,iDAAiD;QACjD,eAAM,CAAC,IAAI,CAAC;YACV,IAAI,EAAE,kBAAkB;YACxB,QAAQ;YACR,UAAU;YACV,MAAM,EAAE,QAAQ;YAChB,MAAM,EAAE,SAAS;YACjB,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,EAAE,mDAAmD,CAAC,CAAC;QAExD,IAAA,uBAAc,EAAC,kBAAkB,EAAE,KAAK,EAAE;YACxC,QAAQ;YACR,UAAU;YACV,MAAM,EAAE,SAAS;YACjB,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;SACtC,CAAC,CAAC;QAEH,OAAO;YACL,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,SAAS,QAAQ,kCAAkC;SAC5D,CAAC;IACJ,CAAC;IAED,qCAAqC;IACrC,IAAI,CAAC,UAAU,IAAI,UAAU,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QAC3C,eAAM,CAAC,IAAI,CACT;YACE,IAAI,EAAE,kBAAkB;YACxB,QAAQ;YACR,MAAM,EAAE,QAAQ;YAChB,MAAM,EAAE,WAAW;YACnB,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,EACD,uCAAuC,CACxC,CAAC;QAEF,IAAA,uBAAc,EAAC,kBAAkB,EAAE,KAAK,EAAE;YACxC,QAAQ;YACR,MAAM,EAAE,WAAW;YACnB,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;SACtC,CAAC,CAAC;QAEH,OAAO;YACL,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,wDAAwD;SACjE,CAAC;IACJ,CAAC;IAED,kCAAkC;IAClC,IAAI,UAAU,CAAC,QAAQ,CAAC,mBAAW,CAAC,KAAK,CAAC,IAAI,UAAU,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;QAC3E,eAAM,CAAC,IAAI,CACT;YACE,IAAI,EAAE,kBAAkB;YACxB,QAAQ;YACR,UAAU;YACV,MAAM,EAAE,SAAS;YACjB,MAAM,EAAE,cAAc;YACtB,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;YACrC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,EACD,4BAA4B,CAC7B,CAAC;QAEF,IAAA,uBAAc,EAAC,kBAAkB,EAAE,IAAI,EAAE;YACvC,QAAQ;YACR,UAAU;YACV,MAAM,EAAE,OAAO;YACf,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;SACtC,CAAC,CAAC;QAEH,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED,+CAA+C;IAC/C,IAAI,UAAU,CAAC,aAAa,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;QAC3C,eAAM,CAAC,IAAI,CACT;YACE,IAAI,EAAE,kBAAkB;YACxB,QAAQ;YACR,UAAU;YACV,aAAa,EAAE,UAAU,CAAC,aAAa;YACvC,MAAM,EAAE,SAAS;YACjB,MAAM,EAAE,UAAU;YAClB,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;YACrC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,EACD,0DAA0D,CAC3D,CAAC;QAEF,IAAA,uBAAc,EAAC,kBAAkB,EAAE,IAAI,EAAE;YACvC,QAAQ;YACR,UAAU;YACV,MAAM,EAAE,UAAU;YAClB,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;SACtC,CAAC,CAAC;QAEH,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;IAC3B,CAAC;IAED,qDAAqD;IACrD,MAAM,eAAe,GAAG,UAAU,CAAC,IAAI,CAAC,CAAC,KAAK,EAAE,EAAE,CAChD,UAAU,CAAC,aAAa,CAAC,QAAQ,CAAC,KAAK,CAAC,CACzC,CAAC;IAEF,IAAI,CAAC,eAAe,EAAE,CAAC;QACrB,eAAM,CAAC,IAAI,CACT;YACE,IAAI,EAAE,kBAAkB;YACxB,QAAQ;YACR,UAAU;YACV,aAAa,EAAE,UAAU,CAAC,aAAa;YACvC,MAAM,EAAE,QAAQ;YAChB,MAAM,EAAE,gBAAgB;YACxB,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;YACrC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;SACpC,EACD,+CAA+C,CAChD,CAAC;QAEF,IAAA,uBAAc,EAAC,kBAAkB,EAAE,KAAK,EAAE;YACxC,QAAQ;YACR,UAAU;YACV,aAAa,EAAE,UAAU,CAAC,aAAa;YACvC,MAAM,EAAE,gBAAgB;YACxB,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;SACtC,CAAC,CAAC;QAEH,OAAO;YACL,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,SAAS,QAAQ,oCAAoC,UAAU,CAAC,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;SACnG,CAAC;IACJ,CAAC;IAED,eAAM,CAAC,IAAI,CACT;QACE,IAAI,EAAE,kBAAkB;QACxB,QAAQ;QACR,UAAU;QACV,aAAa,EAAE,UAAU,CAAC,aAAa;QACvC,MAAM,EAAE,SAAS;QACjB,MAAM,EAAE,aAAa;QACrB,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;QACrC,SAAS,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;KACpC,EACD,6CAA6C,CAC9C,CAAC;IAEF,IAAA,uBAAc,EAAC,kBAAkB,EAAE,IAAI,EAAE;QACvC,QAAQ;QACR,UAAU;QACV,aAAa,EAAE,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,UAAU,CAAC,aAAa,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC;QAC3E,QAAQ,EAAE,IAAI,CAAC,GAAG,EAAE,GAAG,cAAc;KACtC,CAAC,CAAC;IAEH,OAAO,EAAE,OAAO,EAAE,IAAI,EAAE,CAAC;AAC3B,CAAC;AAED;;GAEG;AACH,SAAgB,iBAAiB,CAAC,QAAgB;IAChD,OAAO,eAAe,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;AACvC,CAAC;AAED;;GAEG;AACH,SAAgB,iBAAiB;IAC/B,OAAO,KAAK,CAAC,IAAI,CAAC,eAAe,CAAC,MAAM,EAAE,CAAC,CAAC;AAC9C,CAAC;AAED;;GAEG;AACH,SAAgB,gBAAgB,CAAC,UAA0B;IACzD,eAAe,CAAC,GAAG,CAAC,UAAU,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;IACjD,eAAM,CAAC,IAAI,CACT,EAAE,IAAI,EAAE,UAAU,CAAC,IAAI,EAAE,UAAU,EAAE,EACrC,yBAAyB,CAC1B,CAAC;AACJ,CAAC;AAED;;GAEG;AACH,SAAgB,gBAAgB,CAAC,QAAgB;IAC/C,eAAe,CAAC,MAAM,CAAC,QAAQ,CAAC,CAAC;IACjC,eAAM,CAAC,IAAI,CAAC,EAAE,QAAQ,EAAE,EAAE,yBAAyB,CAAC,CAAC;AACvD,CAAC;AAED,sCAAsC;AACtC,qBAAqB,EAAE,CAAC"}
|
|
@@ -1,52 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* Token Validation via CSP API
|
|
3
|
-
* Validates tokens by calling CSP /user/permissions endpoint
|
|
4
|
-
*/
|
|
5
|
-
/**
|
|
6
|
-
* Token validation payload structure
|
|
7
|
-
*/
|
|
8
|
-
export interface TokenPayload {
|
|
9
|
-
userId: string;
|
|
10
|
-
email: string;
|
|
11
|
-
groups: string[];
|
|
12
|
-
roles?: string[];
|
|
13
|
-
[key: string]: unknown;
|
|
14
|
-
}
|
|
15
|
-
/**
|
|
16
|
-
* Start cache cleanup interval
|
|
17
|
-
*/
|
|
18
|
-
export declare function startCacheCleanup(): void;
|
|
19
|
-
/**
|
|
20
|
-
* Stop cache cleanup interval
|
|
21
|
-
*/
|
|
22
|
-
export declare function stopCacheCleanup(): void;
|
|
23
|
-
/**
|
|
24
|
-
* Verify token by calling CSP API /user/permissions
|
|
25
|
-
* @param token - The JWT token to verify
|
|
26
|
-
* @returns Token payload if valid, null otherwise
|
|
27
|
-
*/
|
|
28
|
-
export declare function verifyTokenViaAPI(token: string): Promise<TokenPayload | null>;
|
|
29
|
-
/**
|
|
30
|
-
* Verify token with caching
|
|
31
|
-
* Uses cached result if available to reduce API calls
|
|
32
|
-
* @param token - The token to verify
|
|
33
|
-
* @returns Token payload if valid, null otherwise
|
|
34
|
-
*/
|
|
35
|
-
export declare function verifyToken(token: string): Promise<TokenPayload | null>;
|
|
36
|
-
/**
|
|
37
|
-
* Clear token from cache (e.g., after logout)
|
|
38
|
-
* @param token - The token to invalidate
|
|
39
|
-
*/
|
|
40
|
-
export declare function invalidateToken(token: string): void;
|
|
41
|
-
/**
|
|
42
|
-
* Clear all cached tokens
|
|
43
|
-
*/
|
|
44
|
-
export declare function clearTokenCache(): void;
|
|
45
|
-
/**
|
|
46
|
-
* Get cache statistics
|
|
47
|
-
*/
|
|
48
|
-
export declare function getTokenCacheStats(): {
|
|
49
|
-
size: number;
|
|
50
|
-
tokens: string[];
|
|
51
|
-
};
|
|
52
|
-
//# sourceMappingURL=token-validator.d.ts.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"token-validator.d.ts","sourceRoot":"","sources":["../../src/auth/token-validator.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAKH;;GAEG;AACH,MAAM,WAAW,YAAY;IAC3B,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,EAAE,MAAM,CAAC;IACd,MAAM,EAAE,MAAM,EAAE,CAAC;IAEjB,KAAK,CAAC,EAAE,MAAM,EAAE,CAAC;IACjB,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC;CACxB;AA+CD;;GAEG;AACH,wBAAgB,iBAAiB,IAAI,IAAI,CASxC;AAED;;GAEG;AACH,wBAAgB,gBAAgB,IAAI,IAAI,CAMvC;AAKD;;;;GAIG;AACH,wBAAsB,iBAAiB,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,GAAG,IAAI,CAAC,CAkGnF;AAED;;;;;GAKG;AACH,wBAAsB,WAAW,CAAC,KAAK,EAAE,MAAM,GAAG,OAAO,CAAC,YAAY,GAAG,IAAI,CAAC,CAqD7E;AAED;;;GAGG;AACH,wBAAgB,eAAe,CAAC,KAAK,EAAE,MAAM,GAAG,IAAI,CAMnD;AAED;;GAEG;AACH,wBAAgB,eAAe,IAAI,IAAI,CAMtC;AAED;;GAEG;AACH,wBAAgB,kBAAkB;;;EAMjC"}
|