@push.rocks/smartregistry 2.3.0 → 2.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist_ts/00_commitinfo_data.js +1 -1
- package/dist_ts/classes.smartregistry.d.ts +33 -2
- package/dist_ts/classes.smartregistry.js +38 -5
- package/dist_ts/core/classes.authmanager.d.ts +30 -80
- package/dist_ts/core/classes.authmanager.js +63 -337
- package/dist_ts/core/classes.defaultauthprovider.d.ts +78 -0
- package/dist_ts/core/classes.defaultauthprovider.js +311 -0
- package/dist_ts/core/classes.registrystorage.d.ts +70 -4
- package/dist_ts/core/classes.registrystorage.js +165 -5
- package/dist_ts/core/index.d.ts +3 -0
- package/dist_ts/core/index.js +7 -2
- package/dist_ts/core/interfaces.auth.d.ts +83 -0
- package/dist_ts/core/interfaces.auth.js +2 -0
- package/dist_ts/core/interfaces.core.d.ts +35 -0
- package/dist_ts/core/interfaces.storage.d.ts +120 -0
- package/dist_ts/core/interfaces.storage.js +2 -0
- package/dist_ts/upstream/classes.baseupstream.d.ts +2 -2
- package/dist_ts/upstream/classes.baseupstream.js +16 -14
- package/dist_ts/upstream/classes.upstreamcache.d.ts +69 -22
- package/dist_ts/upstream/classes.upstreamcache.js +207 -50
- package/package.json +1 -1
- package/readme.md +225 -1
- package/ts/00_commitinfo_data.ts +1 -1
- package/ts/classes.smartregistry.ts +39 -4
- package/ts/core/classes.authmanager.ts +74 -412
- package/ts/core/classes.defaultauthprovider.ts +393 -0
- package/ts/core/classes.registrystorage.ts +199 -5
- package/ts/core/index.ts +8 -1
- package/ts/core/interfaces.auth.ts +91 -0
- package/ts/core/interfaces.core.ts +39 -0
- package/ts/core/interfaces.storage.ts +130 -0
- package/ts/upstream/classes.baseupstream.ts +20 -15
- package/ts/upstream/classes.upstreamcache.ts +256 -53
|
@@ -0,0 +1,78 @@
|
|
|
1
|
+
import type { IAuthProvider, ITokenOptions } from './interfaces.auth.js';
|
|
2
|
+
import type { IAuthConfig, IAuthToken, ICredentials, TRegistryProtocol } from './interfaces.core.js';
|
|
3
|
+
/**
|
|
4
|
+
* Default in-memory authentication provider.
|
|
5
|
+
* This is the reference implementation that stores tokens in memory.
|
|
6
|
+
* For production use, implement IAuthProvider with Redis, database, or external auth.
|
|
7
|
+
*/
|
|
8
|
+
export declare class DefaultAuthProvider implements IAuthProvider {
|
|
9
|
+
private config;
|
|
10
|
+
private tokenStore;
|
|
11
|
+
private userCredentials;
|
|
12
|
+
constructor(config: IAuthConfig);
|
|
13
|
+
/**
|
|
14
|
+
* Initialize the auth provider
|
|
15
|
+
*/
|
|
16
|
+
init(): Promise<void>;
|
|
17
|
+
/**
|
|
18
|
+
* Authenticate user credentials
|
|
19
|
+
*/
|
|
20
|
+
authenticate(credentials: ICredentials): Promise<string | null>;
|
|
21
|
+
/**
|
|
22
|
+
* Validate any token (NPM, Maven, OCI, PyPI, RubyGems, Composer, Cargo)
|
|
23
|
+
*/
|
|
24
|
+
validateToken(tokenString: string, protocol?: TRegistryProtocol): Promise<IAuthToken | null>;
|
|
25
|
+
/**
|
|
26
|
+
* Create a new token for a user
|
|
27
|
+
*/
|
|
28
|
+
createToken(userId: string, protocol: TRegistryProtocol, options?: ITokenOptions): Promise<string>;
|
|
29
|
+
/**
|
|
30
|
+
* Revoke a token
|
|
31
|
+
*/
|
|
32
|
+
revokeToken(token: string): Promise<void>;
|
|
33
|
+
/**
|
|
34
|
+
* Check if token has permission for an action
|
|
35
|
+
*/
|
|
36
|
+
authorize(token: IAuthToken | null, resource: string, action: string): Promise<boolean>;
|
|
37
|
+
/**
|
|
38
|
+
* List all tokens for a user
|
|
39
|
+
*/
|
|
40
|
+
listUserTokens(userId: string): Promise<Array<{
|
|
41
|
+
key: string;
|
|
42
|
+
readonly: boolean;
|
|
43
|
+
created: string;
|
|
44
|
+
protocol?: TRegistryProtocol;
|
|
45
|
+
}>>;
|
|
46
|
+
/**
|
|
47
|
+
* Create an OCI JWT token
|
|
48
|
+
*/
|
|
49
|
+
private createOciToken;
|
|
50
|
+
/**
|
|
51
|
+
* Validate an OCI JWT token
|
|
52
|
+
*/
|
|
53
|
+
private validateOciToken;
|
|
54
|
+
/**
|
|
55
|
+
* Check if a scope matches a resource and action
|
|
56
|
+
*/
|
|
57
|
+
private matchesScope;
|
|
58
|
+
/**
|
|
59
|
+
* Convert unified scopes to OCI access array
|
|
60
|
+
*/
|
|
61
|
+
private scopesToOciAccess;
|
|
62
|
+
/**
|
|
63
|
+
* Convert OCI access array to unified scopes
|
|
64
|
+
*/
|
|
65
|
+
private ociAccessToScopes;
|
|
66
|
+
/**
|
|
67
|
+
* Generate UUID for tokens
|
|
68
|
+
*/
|
|
69
|
+
private generateUuid;
|
|
70
|
+
/**
|
|
71
|
+
* Check if string is a valid UUID
|
|
72
|
+
*/
|
|
73
|
+
private isValidUuid;
|
|
74
|
+
/**
|
|
75
|
+
* Hash a token for identification
|
|
76
|
+
*/
|
|
77
|
+
private hashToken;
|
|
78
|
+
}
|
|
@@ -0,0 +1,311 @@
|
|
|
1
|
+
import * as crypto from 'crypto';
|
|
2
|
+
/**
|
|
3
|
+
* Default in-memory authentication provider.
|
|
4
|
+
* This is the reference implementation that stores tokens in memory.
|
|
5
|
+
* For production use, implement IAuthProvider with Redis, database, or external auth.
|
|
6
|
+
*/
|
|
7
|
+
export class DefaultAuthProvider {
|
|
8
|
+
config;
|
|
9
|
+
tokenStore = new Map();
|
|
10
|
+
userCredentials = new Map(); // username -> password hash (mock)
|
|
11
|
+
constructor(config) {
|
|
12
|
+
this.config = config;
|
|
13
|
+
}
|
|
14
|
+
/**
|
|
15
|
+
* Initialize the auth provider
|
|
16
|
+
*/
|
|
17
|
+
async init() {
|
|
18
|
+
// Initialize token store (in-memory for now)
|
|
19
|
+
// In production, this could be Redis or a database
|
|
20
|
+
}
|
|
21
|
+
// ========================================================================
|
|
22
|
+
// IAuthProvider Implementation
|
|
23
|
+
// ========================================================================
|
|
24
|
+
/**
|
|
25
|
+
* Authenticate user credentials
|
|
26
|
+
*/
|
|
27
|
+
async authenticate(credentials) {
|
|
28
|
+
// Mock authentication - in production, verify against database/LDAP
|
|
29
|
+
const storedPassword = this.userCredentials.get(credentials.username);
|
|
30
|
+
if (!storedPassword) {
|
|
31
|
+
// Auto-register for testing (remove in production)
|
|
32
|
+
this.userCredentials.set(credentials.username, credentials.password);
|
|
33
|
+
return credentials.username;
|
|
34
|
+
}
|
|
35
|
+
if (storedPassword === credentials.password) {
|
|
36
|
+
return credentials.username;
|
|
37
|
+
}
|
|
38
|
+
return null;
|
|
39
|
+
}
|
|
40
|
+
/**
|
|
41
|
+
* Validate any token (NPM, Maven, OCI, PyPI, RubyGems, Composer, Cargo)
|
|
42
|
+
*/
|
|
43
|
+
async validateToken(tokenString, protocol) {
|
|
44
|
+
// OCI uses JWT (contains dots), not UUID - check first if OCI is expected
|
|
45
|
+
if (protocol === 'oci' || tokenString.includes('.')) {
|
|
46
|
+
const ociToken = await this.validateOciToken(tokenString);
|
|
47
|
+
if (ociToken && (!protocol || protocol === 'oci')) {
|
|
48
|
+
return ociToken;
|
|
49
|
+
}
|
|
50
|
+
// If protocol was explicitly OCI but validation failed, return null
|
|
51
|
+
if (protocol === 'oci') {
|
|
52
|
+
return null;
|
|
53
|
+
}
|
|
54
|
+
}
|
|
55
|
+
// UUID-based tokens: single O(1) Map lookup
|
|
56
|
+
if (this.isValidUuid(tokenString)) {
|
|
57
|
+
const authToken = this.tokenStore.get(tokenString);
|
|
58
|
+
if (authToken) {
|
|
59
|
+
// If protocol specified, verify it matches
|
|
60
|
+
if (protocol && authToken.type !== protocol) {
|
|
61
|
+
return null;
|
|
62
|
+
}
|
|
63
|
+
// Check expiration
|
|
64
|
+
if (authToken.expiresAt && authToken.expiresAt < new Date()) {
|
|
65
|
+
this.tokenStore.delete(tokenString);
|
|
66
|
+
return null;
|
|
67
|
+
}
|
|
68
|
+
return authToken;
|
|
69
|
+
}
|
|
70
|
+
}
|
|
71
|
+
return null;
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* Create a new token for a user
|
|
75
|
+
*/
|
|
76
|
+
async createToken(userId, protocol, options) {
|
|
77
|
+
// OCI tokens use JWT
|
|
78
|
+
if (protocol === 'oci') {
|
|
79
|
+
return this.createOciToken(userId, options?.scopes || ['oci:*:*:*'], options?.expiresIn || 3600);
|
|
80
|
+
}
|
|
81
|
+
// All other protocols use UUID tokens
|
|
82
|
+
const token = this.generateUuid();
|
|
83
|
+
const scopes = options?.scopes || (options?.readonly
|
|
84
|
+
? [`${protocol}:*:*:read`]
|
|
85
|
+
: [`${protocol}:*:*:*`]);
|
|
86
|
+
const authToken = {
|
|
87
|
+
type: protocol,
|
|
88
|
+
userId,
|
|
89
|
+
scopes,
|
|
90
|
+
readonly: options?.readonly,
|
|
91
|
+
expiresAt: options?.expiresIn ? new Date(Date.now() + options.expiresIn * 1000) : undefined,
|
|
92
|
+
metadata: {
|
|
93
|
+
created: new Date().toISOString(),
|
|
94
|
+
},
|
|
95
|
+
};
|
|
96
|
+
this.tokenStore.set(token, authToken);
|
|
97
|
+
return token;
|
|
98
|
+
}
|
|
99
|
+
/**
|
|
100
|
+
* Revoke a token
|
|
101
|
+
*/
|
|
102
|
+
async revokeToken(token) {
|
|
103
|
+
this.tokenStore.delete(token);
|
|
104
|
+
}
|
|
105
|
+
/**
|
|
106
|
+
* Check if token has permission for an action
|
|
107
|
+
*/
|
|
108
|
+
async authorize(token, resource, action) {
|
|
109
|
+
if (!token) {
|
|
110
|
+
return false;
|
|
111
|
+
}
|
|
112
|
+
// Check readonly flag
|
|
113
|
+
if (token.readonly && ['write', 'push', 'delete'].includes(action)) {
|
|
114
|
+
return false;
|
|
115
|
+
}
|
|
116
|
+
// Check scopes
|
|
117
|
+
for (const scope of token.scopes) {
|
|
118
|
+
if (this.matchesScope(scope, resource, action)) {
|
|
119
|
+
return true;
|
|
120
|
+
}
|
|
121
|
+
}
|
|
122
|
+
return false;
|
|
123
|
+
}
|
|
124
|
+
/**
|
|
125
|
+
* List all tokens for a user
|
|
126
|
+
*/
|
|
127
|
+
async listUserTokens(userId) {
|
|
128
|
+
const tokens = [];
|
|
129
|
+
for (const [token, authToken] of this.tokenStore.entries()) {
|
|
130
|
+
if (authToken.userId === userId) {
|
|
131
|
+
tokens.push({
|
|
132
|
+
key: this.hashToken(token),
|
|
133
|
+
readonly: authToken.readonly || false,
|
|
134
|
+
created: authToken.metadata?.created || 'unknown',
|
|
135
|
+
protocol: authToken.type,
|
|
136
|
+
});
|
|
137
|
+
}
|
|
138
|
+
}
|
|
139
|
+
return tokens;
|
|
140
|
+
}
|
|
141
|
+
// ========================================================================
|
|
142
|
+
// OCI JWT Token Methods
|
|
143
|
+
// ========================================================================
|
|
144
|
+
/**
|
|
145
|
+
* Create an OCI JWT token
|
|
146
|
+
*/
|
|
147
|
+
async createOciToken(userId, scopes, expiresIn = 3600) {
|
|
148
|
+
if (!this.config.ociTokens?.enabled) {
|
|
149
|
+
throw new Error('OCI tokens are not enabled');
|
|
150
|
+
}
|
|
151
|
+
const now = Math.floor(Date.now() / 1000);
|
|
152
|
+
const payload = {
|
|
153
|
+
iss: this.config.ociTokens.realm,
|
|
154
|
+
sub: userId,
|
|
155
|
+
aud: this.config.ociTokens.service,
|
|
156
|
+
exp: now + expiresIn,
|
|
157
|
+
nbf: now,
|
|
158
|
+
iat: now,
|
|
159
|
+
access: this.scopesToOciAccess(scopes),
|
|
160
|
+
};
|
|
161
|
+
// Create JWT with HMAC-SHA256 signature
|
|
162
|
+
const header = { alg: 'HS256', typ: 'JWT' };
|
|
163
|
+
const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64url');
|
|
164
|
+
const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64url');
|
|
165
|
+
const signature = crypto
|
|
166
|
+
.createHmac('sha256', this.config.jwtSecret)
|
|
167
|
+
.update(`${headerB64}.${payloadB64}`)
|
|
168
|
+
.digest('base64url');
|
|
169
|
+
return `${headerB64}.${payloadB64}.${signature}`;
|
|
170
|
+
}
|
|
171
|
+
/**
|
|
172
|
+
* Validate an OCI JWT token
|
|
173
|
+
*/
|
|
174
|
+
async validateOciToken(jwt) {
|
|
175
|
+
try {
|
|
176
|
+
const parts = jwt.split('.');
|
|
177
|
+
if (parts.length !== 3) {
|
|
178
|
+
return null;
|
|
179
|
+
}
|
|
180
|
+
const [headerB64, payloadB64, signatureB64] = parts;
|
|
181
|
+
// Verify signature
|
|
182
|
+
const expectedSignature = crypto
|
|
183
|
+
.createHmac('sha256', this.config.jwtSecret)
|
|
184
|
+
.update(`${headerB64}.${payloadB64}`)
|
|
185
|
+
.digest('base64url');
|
|
186
|
+
if (signatureB64 !== expectedSignature) {
|
|
187
|
+
return null;
|
|
188
|
+
}
|
|
189
|
+
// Decode and parse payload
|
|
190
|
+
const payload = JSON.parse(Buffer.from(payloadB64, 'base64url').toString('utf-8'));
|
|
191
|
+
// Check expiration
|
|
192
|
+
const now = Math.floor(Date.now() / 1000);
|
|
193
|
+
if (payload.exp && payload.exp < now) {
|
|
194
|
+
return null;
|
|
195
|
+
}
|
|
196
|
+
// Check not-before time
|
|
197
|
+
if (payload.nbf && payload.nbf > now) {
|
|
198
|
+
return null;
|
|
199
|
+
}
|
|
200
|
+
// Convert to unified token format
|
|
201
|
+
const scopes = this.ociAccessToScopes(payload.access || []);
|
|
202
|
+
return {
|
|
203
|
+
type: 'oci',
|
|
204
|
+
userId: payload.sub,
|
|
205
|
+
scopes,
|
|
206
|
+
expiresAt: payload.exp ? new Date(payload.exp * 1000) : undefined,
|
|
207
|
+
metadata: {
|
|
208
|
+
iss: payload.iss,
|
|
209
|
+
aud: payload.aud,
|
|
210
|
+
},
|
|
211
|
+
};
|
|
212
|
+
}
|
|
213
|
+
catch (error) {
|
|
214
|
+
return null;
|
|
215
|
+
}
|
|
216
|
+
}
|
|
217
|
+
// ========================================================================
|
|
218
|
+
// Helper Methods
|
|
219
|
+
// ========================================================================
|
|
220
|
+
/**
|
|
221
|
+
* Check if a scope matches a resource and action
|
|
222
|
+
*/
|
|
223
|
+
matchesScope(scope, resource, action) {
|
|
224
|
+
const scopeParts = scope.split(':');
|
|
225
|
+
const resourceParts = resource.split(':');
|
|
226
|
+
// Scope must have at least protocol:type:name:action
|
|
227
|
+
if (scopeParts.length < 4) {
|
|
228
|
+
return false;
|
|
229
|
+
}
|
|
230
|
+
const [scopeProtocol, scopeType, scopeName, scopeAction] = scopeParts;
|
|
231
|
+
const [resourceProtocol, resourceType, resourceName] = resourceParts;
|
|
232
|
+
// Check protocol
|
|
233
|
+
if (scopeProtocol !== '*' && scopeProtocol !== resourceProtocol) {
|
|
234
|
+
return false;
|
|
235
|
+
}
|
|
236
|
+
// Check type
|
|
237
|
+
if (scopeType !== '*' && scopeType !== resourceType) {
|
|
238
|
+
return false;
|
|
239
|
+
}
|
|
240
|
+
// Check name
|
|
241
|
+
if (scopeName !== '*' && scopeName !== resourceName) {
|
|
242
|
+
return false;
|
|
243
|
+
}
|
|
244
|
+
// Check action
|
|
245
|
+
if (scopeAction !== '*' && scopeAction !== action) {
|
|
246
|
+
// Map action aliases
|
|
247
|
+
const actionAliases = {
|
|
248
|
+
read: ['pull', 'get'],
|
|
249
|
+
write: ['push', 'put', 'post'],
|
|
250
|
+
};
|
|
251
|
+
const aliases = actionAliases[scopeAction] || [];
|
|
252
|
+
if (!aliases.includes(action)) {
|
|
253
|
+
return false;
|
|
254
|
+
}
|
|
255
|
+
}
|
|
256
|
+
return true;
|
|
257
|
+
}
|
|
258
|
+
/**
|
|
259
|
+
* Convert unified scopes to OCI access array
|
|
260
|
+
*/
|
|
261
|
+
scopesToOciAccess(scopes) {
|
|
262
|
+
const access = [];
|
|
263
|
+
for (const scope of scopes) {
|
|
264
|
+
const parts = scope.split(':');
|
|
265
|
+
if (parts.length >= 4 && parts[0] === 'oci') {
|
|
266
|
+
access.push({
|
|
267
|
+
type: parts[1],
|
|
268
|
+
name: parts[2],
|
|
269
|
+
actions: [parts[3]],
|
|
270
|
+
});
|
|
271
|
+
}
|
|
272
|
+
}
|
|
273
|
+
return access;
|
|
274
|
+
}
|
|
275
|
+
/**
|
|
276
|
+
* Convert OCI access array to unified scopes
|
|
277
|
+
*/
|
|
278
|
+
ociAccessToScopes(access) {
|
|
279
|
+
const scopes = [];
|
|
280
|
+
for (const item of access) {
|
|
281
|
+
for (const action of item.actions) {
|
|
282
|
+
scopes.push(`oci:${item.type}:${item.name}:${action}`);
|
|
283
|
+
}
|
|
284
|
+
}
|
|
285
|
+
return scopes;
|
|
286
|
+
}
|
|
287
|
+
/**
|
|
288
|
+
* Generate UUID for tokens
|
|
289
|
+
*/
|
|
290
|
+
generateUuid() {
|
|
291
|
+
return 'xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx'.replace(/[xy]/g, (c) => {
|
|
292
|
+
const r = (Math.random() * 16) | 0;
|
|
293
|
+
const v = c === 'x' ? r : (r & 0x3) | 0x8;
|
|
294
|
+
return v.toString(16);
|
|
295
|
+
});
|
|
296
|
+
}
|
|
297
|
+
/**
|
|
298
|
+
* Check if string is a valid UUID
|
|
299
|
+
*/
|
|
300
|
+
isValidUuid(str) {
|
|
301
|
+
const uuidRegex = /^[0-9a-f]{8}-[0-9a-f]{4}-4[0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$/i;
|
|
302
|
+
return uuidRegex.test(str);
|
|
303
|
+
}
|
|
304
|
+
/**
|
|
305
|
+
* Hash a token for identification
|
|
306
|
+
*/
|
|
307
|
+
hashToken(token) {
|
|
308
|
+
return `sha512-${token.substring(0, 16)}...`;
|
|
309
|
+
}
|
|
310
|
+
}
|
|
311
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.defaultauthprovider.js","sourceRoot":"","sources":["../../ts/core/classes.defaultauthprovider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAIjC;;;;GAIG;AACH,MAAM,OAAO,mBAAmB;IAIV;IAHZ,UAAU,GAA4B,IAAI,GAAG,EAAE,CAAC;IAChD,eAAe,GAAwB,IAAI,GAAG,EAAE,CAAC,CAAC,mCAAmC;IAE7F,YAAoB,MAAmB;QAAnB,WAAM,GAAN,MAAM,CAAa;IAAG,CAAC;IAE3C;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,6CAA6C;QAC7C,mDAAmD;IACrD,CAAC;IAED,2EAA2E;IAC3E,+BAA+B;IAC/B,2EAA2E;IAE3E;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,WAAyB;QACjD,oEAAoE;QACpE,MAAM,cAAc,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;QAEtE,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,mDAAmD;YACnD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,WAAW,CAAC,QAAQ,EAAE,WAAW,CAAC,QAAQ,CAAC,CAAC;YACrE,OAAO,WAAW,CAAC,QAAQ,CAAC;QAC9B,CAAC;QAED,IAAI,cAAc,KAAK,WAAW,CAAC,QAAQ,EAAE,CAAC;YAC5C,OAAO,WAAW,CAAC,QAAQ,CAAC;QAC9B,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,aAAa,CACxB,WAAmB,EACnB,QAA4B;QAE5B,0EAA0E;QAC1E,IAAI,QAAQ,KAAK,KAAK,IAAI,WAAW,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACpD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;YAC1D,IAAI,QAAQ,IAAI,CAAC,CAAC,QAAQ,IAAI,QAAQ,KAAK,KAAK,CAAC,EAAE,CAAC;gBAClD,OAAO,QAAQ,CAAC;YAClB,CAAC;YACD,oEAAoE;YACpE,IAAI,QAAQ,KAAK,KAAK,EAAE,CAAC;gBACvB,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,4CAA4C;QAC5C,IAAI,IAAI,CAAC,WAAW,CAAC,WAAW,CAAC,EAAE,CAAC;YAClC,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;YACnD,IAAI,SAAS,EAAE,CAAC;gBACd,2CAA2C;gBAC3C,IAAI,QAAQ,IAAI,SAAS,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;oBAC5C,OAAO,IAAI,CAAC;gBACd,CAAC;gBACD,mBAAmB;gBACnB,IAAI,SAAS,CAAC,SAAS,IAAI,SAAS,CAAC,SAAS,GAAG,IAAI,IAAI,EAAE,EAAE,CAAC;oBAC5D,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;oBACpC,OAAO,IAAI,CAAC;gBACd,CAAC;gBACD,OAAO,SAAS,CAAC;YACnB,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,WAAW,CACtB,MAAc,EACd,QAA2B,EAC3B,OAAuB;QAEvB,qBAAqB;QACrB,IAAI,QAAQ,KAAK,KAAK,EAAE,CAAC;YACvB,OAAO,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,OAAO,EAAE,MAAM,IAAI,CAAC,WAAW,CAAC,EAAE,OAAO,EAAE,SAAS,IAAI,IAAI,CAAC,CAAC;QACnG,CAAC;QAED,sCAAsC;QACtC,MAAM,KAAK,GAAG,IAAI,CAAC,YAAY,EAAE,CAAC;QAClC,MAAM,MAAM,GAAG,OAAO,EAAE,MAAM,IAAI,CAAC,OAAO,EAAE,QAAQ;YAClD,CAAC,CAAC,CAAC,GAAG,QAAQ,WAAW,CAAC;YAC1B,CAAC,CAAC,CAAC,GAAG,QAAQ,QAAQ,CAAC,CAAC,CAAC;QAE3B,MAAM,SAAS,GAAe;YAC5B,IAAI,EAAE,QAAQ;YACd,MAAM;YACN,MAAM;YACN,QAAQ,EAAE,OAAO,EAAE,QAAQ;YAC3B,SAAS,EAAE,OAAO,EAAE,SAAS,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,OAAO,CAAC,SAAS,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC,SAAS;YAC3F,QAAQ,EAAE;gBACR,OAAO,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;aAClC;SACF,CAAC;QAEF,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;QACtC,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,WAAW,CAAC,KAAa;QACpC,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IAChC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,SAAS,CACpB,KAAwB,EACxB,QAAgB,EAChB,MAAc;QAEd,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,KAAK,CAAC;QACf,CAAC;QAED,sBAAsB;QACtB,IAAI,KAAK,CAAC,QAAQ,IAAI,CAAC,OAAO,EAAE,MAAM,EAAE,QAAQ,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;YACnE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,eAAe;QACf,KAAK,MAAM,KAAK,IAAI,KAAK,CAAC,MAAM,EAAE,CAAC;YACjC,IAAI,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC,EAAE,CAAC;gBAC/C,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,cAAc,CAAC,MAAc;QAMxC,MAAM,MAAM,GAA2F,EAAE,CAAC;QAE1G,KAAK,MAAM,CAAC,KAAK,EAAE,SAAS,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC;YAC3D,IAAI,SAAS,CAAC,MAAM,KAAK,MAAM,EAAE,CAAC;gBAChC,MAAM,CAAC,IAAI,CAAC;oBACV,GAAG,EAAE,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC;oBAC1B,QAAQ,EAAE,SAAS,CAAC,QAAQ,IAAI,KAAK;oBACrC,OAAO,EAAE,SAAS,CAAC,QAAQ,EAAE,OAAO,IAAI,SAAS;oBACjD,QAAQ,EAAE,SAAS,CAAC,IAAI;iBACzB,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,2EAA2E;IAC3E,wBAAwB;IACxB,2EAA2E;IAE3E;;OAEG;IACK,KAAK,CAAC,cAAc,CAC1B,MAAc,EACd,MAAgB,EAChB,YAAoB,IAAI;QAExB,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,OAAO,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAC;QAChD,CAAC;QAED,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAC1C,MAAM,OAAO,GAAG;YACd,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK;YAChC,GAAG,EAAE,MAAM;YACX,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO;YAClC,GAAG,EAAE,GAAG,GAAG,SAAS;YACpB,GAAG,EAAE,GAAG;YACR,GAAG,EAAE,GAAG;YACR,MAAM,EAAE,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC;SACvC,CAAC;QAEF,wCAAwC;QACxC,MAAM,MAAM,GAAG,EAAE,GAAG,EAAE,OAAO,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QAC5E,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QAE9E,MAAM,SAAS,GAAG,MAAM;aACrB,UAAU,CAAC,QAAQ,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC;aAC3C,MAAM,CAAC,GAAG,SAAS,IAAI,UAAU,EAAE,CAAC;aACpC,MAAM,CAAC,WAAW,CAAC,CAAC;QAEvB,OAAO,GAAG,SAAS,IAAI,UAAU,IAAI,SAAS,EAAE,CAAC;IACnD,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,GAAW;QACxC,IAAI,CAAC;YACH,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC7B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACvB,OAAO,IAAI,CAAC;YACd,CAAC;YAED,MAAM,CAAC,SAAS,EAAE,UAAU,EAAE,YAAY,CAAC,GAAG,KAAK,CAAC;YAEpD,mBAAmB;YACnB,MAAM,iBAAiB,GAAG,MAAM;iBAC7B,UAAU,CAAC,QAAQ,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC;iBAC3C,MAAM,CAAC,GAAG,SAAS,IAAI,UAAU,EAAE,CAAC;iBACpC,MAAM,CAAC,WAAW,CAAC,CAAC;YAEvB,IAAI,YAAY,KAAK,iBAAiB,EAAE,CAAC;gBACvC,OAAO,IAAI,CAAC;YACd,CAAC;YAED,2BAA2B;YAC3B,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,WAAW,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAEnF,mBAAmB;YACnB,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;YAC1C,IAAI,OAAO,CAAC,GAAG,IAAI,OAAO,CAAC,GAAG,GAAG,GAAG,EAAE,CAAC;gBACrC,OAAO,IAAI,CAAC;YACd,CAAC;YAED,wBAAwB;YACxB,IAAI,OAAO,CAAC,GAAG,IAAI,OAAO,CAAC,GAAG,GAAG,GAAG,EAAE,CAAC;gBACrC,OAAO,IAAI,CAAC;YACd,CAAC;YAED,kCAAkC;YAClC,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;YAE5D,OAAO;gBACL,IAAI,EAAE,KAAK;gBACX,MAAM,EAAE,OAAO,CAAC,GAAG;gBACnB,MAAM;gBACN,SAAS,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC,SAAS;gBACjE,QAAQ,EAAE;oBACR,GAAG,EAAE,OAAO,CAAC,GAAG;oBAChB,GAAG,EAAE,OAAO,CAAC,GAAG;iBACjB;aACF,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAED,2EAA2E;IAC3E,iBAAiB;IACjB,2EAA2E;IAE3E;;OAEG;IACK,YAAY,CAAC,KAAa,EAAE,QAAgB,EAAE,MAAc;QAClE,MAAM,UAAU,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACpC,MAAM,aAAa,GAAG,QAAQ,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAE1C,qDAAqD;QACrD,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1B,OAAO,KAAK,CAAC;QACf,CAAC;QAED,MAAM,CAAC,aAAa,EAAE,SAAS,EAAE,SAAS,EAAE,WAAW,CAAC,GAAG,UAAU,CAAC;QACtE,MAAM,CAAC,gBAAgB,EAAE,YAAY,EAAE,YAAY,CAAC,GAAG,aAAa,CAAC;QAErE,iBAAiB;QACjB,IAAI,aAAa,KAAK,GAAG,IAAI,aAAa,KAAK,gBAAgB,EAAE,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,aAAa;QACb,IAAI,SAAS,KAAK,GAAG,IAAI,SAAS,KAAK,YAAY,EAAE,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,aAAa;QACb,IAAI,SAAS,KAAK,GAAG,IAAI,SAAS,KAAK,YAAY,EAAE,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,eAAe;QACf,IAAI,WAAW,KAAK,GAAG,IAAI,WAAW,KAAK,MAAM,EAAE,CAAC;YAClD,qBAAqB;YACrB,MAAM,aAAa,GAA6B;gBAC9C,IAAI,EAAE,CAAC,MAAM,EAAE,KAAK,CAAC;gBACrB,KAAK,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,MAAM,CAAC;aAC/B,CAAC;YAEF,MAAM,OAAO,GAAG,aAAa,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;YACjD,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC9B,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,MAAgB;QAKxC,MAAM,MAAM,GAA2D,EAAE,CAAC;QAE1E,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC/B,IAAI,KAAK,CAAC,MAAM,IAAI,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,KAAK,EAAE,CAAC;gBAC5C,MAAM,CAAC,IAAI,CAAC;oBACV,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC;oBACd,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC;oBACd,OAAO,EAAE,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;iBACpB,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,MAIxB;QACA,MAAM,MAAM,GAAa,EAAE,CAAC;QAE5B,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;YAC1B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,OAAO,EAAE,CAAC;gBAClC,MAAM,CAAC,IAAI,CAAC,OAAO,IAAI,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,IAAI,MAAM,EAAE,CAAC,CAAC;YACzD,CAAC;QACH,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,YAAY;QAClB,OAAO,sCAAsC,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC,EAAE,EAAE;YACnE,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC,GAAG,CAAC,CAAC;YACnC,MAAM,CAAC,GAAG,CAAC,KAAK,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,GAAG,CAAC,GAAG,GAAG,CAAC;YAC1C,OAAO,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;QACxB,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,GAAW;QAC7B,MAAM,SAAS,GAAG,wEAAwE,CAAC;QAC3F,OAAO,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IAC7B,CAAC;IAED;;OAEG;IACK,SAAS,CAAC,KAAa;QAC7B,OAAO,UAAU,KAAK,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC;IAC/C,CAAC;CACF"}
|
|
@@ -1,14 +1,42 @@
|
|
|
1
|
-
import type { IStorageConfig, IStorageBackend } from './interfaces.core.js';
|
|
1
|
+
import type { IStorageConfig, IStorageBackend, TRegistryProtocol } from './interfaces.core.js';
|
|
2
|
+
import type { IStorageHooks, IStorageActor, IStorageMetadata } from './interfaces.storage.js';
|
|
2
3
|
/**
|
|
3
|
-
* Storage abstraction layer for registry
|
|
4
|
-
* Provides a unified interface over SmartBucket
|
|
4
|
+
* Storage abstraction layer for registry.
|
|
5
|
+
* Provides a unified interface over SmartBucket with optional hooks
|
|
6
|
+
* for quota tracking, audit logging, cache invalidation, etc.
|
|
7
|
+
*
|
|
8
|
+
* @example
|
|
9
|
+
* ```typescript
|
|
10
|
+
* // Basic usage
|
|
11
|
+
* const storage = new RegistryStorage(config);
|
|
12
|
+
*
|
|
13
|
+
* // With hooks for quota tracking
|
|
14
|
+
* const storage = new RegistryStorage(config, {
|
|
15
|
+
* beforePut: async (ctx) => {
|
|
16
|
+
* const quota = await getQuota(ctx.actor?.orgId);
|
|
17
|
+
* const usage = await getUsage(ctx.actor?.orgId);
|
|
18
|
+
* if (usage + (ctx.metadata?.size || 0) > quota) {
|
|
19
|
+
* return { allowed: false, reason: 'Quota exceeded' };
|
|
20
|
+
* }
|
|
21
|
+
* return { allowed: true };
|
|
22
|
+
* },
|
|
23
|
+
* afterPut: async (ctx) => {
|
|
24
|
+
* await updateUsage(ctx.actor?.orgId, ctx.metadata?.size || 0);
|
|
25
|
+
* }
|
|
26
|
+
* });
|
|
27
|
+
* ```
|
|
5
28
|
*/
|
|
6
29
|
export declare class RegistryStorage implements IStorageBackend {
|
|
7
30
|
private config;
|
|
8
31
|
private smartBucket;
|
|
9
32
|
private bucket;
|
|
10
33
|
private bucketName;
|
|
11
|
-
|
|
34
|
+
private hooks?;
|
|
35
|
+
constructor(config: IStorageConfig, hooks?: IStorageHooks);
|
|
36
|
+
/**
|
|
37
|
+
* Set storage hooks (can be called after construction)
|
|
38
|
+
*/
|
|
39
|
+
setHooks(hooks: IStorageHooks): void;
|
|
12
40
|
/**
|
|
13
41
|
* Initialize the storage backend
|
|
14
42
|
*/
|
|
@@ -25,6 +53,44 @@ export declare class RegistryStorage implements IStorageBackend {
|
|
|
25
53
|
* Delete an object
|
|
26
54
|
*/
|
|
27
55
|
deleteObject(key: string): Promise<void>;
|
|
56
|
+
/**
|
|
57
|
+
* Current operation context for hooks.
|
|
58
|
+
* Set this before performing storage operations to enable hooks.
|
|
59
|
+
*/
|
|
60
|
+
private currentContext?;
|
|
61
|
+
/**
|
|
62
|
+
* Set the current operation context for hooks.
|
|
63
|
+
* Call this before performing storage operations.
|
|
64
|
+
*
|
|
65
|
+
* @example
|
|
66
|
+
* ```typescript
|
|
67
|
+
* storage.setContext({
|
|
68
|
+
* protocol: 'npm',
|
|
69
|
+
* actor: { userId: 'user123', ip: '192.168.1.1' },
|
|
70
|
+
* metadata: { packageName: 'lodash', version: '4.17.21' }
|
|
71
|
+
* });
|
|
72
|
+
* await storage.putNpmTarball('lodash', '4.17.21', tarball);
|
|
73
|
+
* storage.clearContext();
|
|
74
|
+
* ```
|
|
75
|
+
*/
|
|
76
|
+
setContext(context: {
|
|
77
|
+
protocol: TRegistryProtocol;
|
|
78
|
+
actor?: IStorageActor;
|
|
79
|
+
metadata?: IStorageMetadata;
|
|
80
|
+
}): void;
|
|
81
|
+
/**
|
|
82
|
+
* Clear the current operation context.
|
|
83
|
+
*/
|
|
84
|
+
clearContext(): void;
|
|
85
|
+
/**
|
|
86
|
+
* Execute a function with a temporary context.
|
|
87
|
+
* Context is automatically cleared after execution.
|
|
88
|
+
*/
|
|
89
|
+
withContext<T>(context: {
|
|
90
|
+
protocol: TRegistryProtocol;
|
|
91
|
+
actor?: IStorageActor;
|
|
92
|
+
metadata?: IStorageMetadata;
|
|
93
|
+
}, fn: () => Promise<T>): Promise<T>;
|
|
28
94
|
/**
|
|
29
95
|
* List objects with a prefix (recursively)
|
|
30
96
|
*/
|