@push.rocks/smartregistry 2.3.0 → 2.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/dist_ts/00_commitinfo_data.js +1 -1
  2. package/dist_ts/classes.smartregistry.d.ts +33 -2
  3. package/dist_ts/classes.smartregistry.js +38 -5
  4. package/dist_ts/core/classes.authmanager.d.ts +30 -80
  5. package/dist_ts/core/classes.authmanager.js +63 -337
  6. package/dist_ts/core/classes.defaultauthprovider.d.ts +78 -0
  7. package/dist_ts/core/classes.defaultauthprovider.js +311 -0
  8. package/dist_ts/core/classes.registrystorage.d.ts +70 -4
  9. package/dist_ts/core/classes.registrystorage.js +165 -5
  10. package/dist_ts/core/index.d.ts +3 -0
  11. package/dist_ts/core/index.js +7 -2
  12. package/dist_ts/core/interfaces.auth.d.ts +83 -0
  13. package/dist_ts/core/interfaces.auth.js +2 -0
  14. package/dist_ts/core/interfaces.core.d.ts +35 -0
  15. package/dist_ts/core/interfaces.storage.d.ts +120 -0
  16. package/dist_ts/core/interfaces.storage.js +2 -0
  17. package/dist_ts/upstream/classes.baseupstream.d.ts +2 -2
  18. package/dist_ts/upstream/classes.baseupstream.js +16 -14
  19. package/dist_ts/upstream/classes.upstreamcache.d.ts +69 -22
  20. package/dist_ts/upstream/classes.upstreamcache.js +207 -50
  21. package/package.json +1 -1
  22. package/readme.md +225 -1
  23. package/ts/00_commitinfo_data.ts +1 -1
  24. package/ts/classes.smartregistry.ts +39 -4
  25. package/ts/core/classes.authmanager.ts +74 -412
  26. package/ts/core/classes.defaultauthprovider.ts +393 -0
  27. package/ts/core/classes.registrystorage.ts +199 -5
  28. package/ts/core/index.ts +8 -1
  29. package/ts/core/interfaces.auth.ts +91 -0
  30. package/ts/core/interfaces.core.ts +39 -0
  31. package/ts/core/interfaces.storage.ts +130 -0
  32. package/ts/upstream/classes.baseupstream.ts +20 -15
  33. package/ts/upstream/classes.upstreamcache.ts +256 -53
@@ -0,0 +1,78 @@
1
+ import type { IAuthProvider, ITokenOptions } from './interfaces.auth.js';
2
+ import type { IAuthConfig, IAuthToken, ICredentials, TRegistryProtocol } from './interfaces.core.js';
3
+ /**
4
+ * Default in-memory authentication provider.
5
+ * This is the reference implementation that stores tokens in memory.
6
+ * For production use, implement IAuthProvider with Redis, database, or external auth.
7
+ */
8
+ export declare class DefaultAuthProvider implements IAuthProvider {
9
+ private config;
10
+ private tokenStore;
11
+ private userCredentials;
12
+ constructor(config: IAuthConfig);
13
+ /**
14
+ * Initialize the auth provider
15
+ */
16
+ init(): Promise<void>;
17
+ /**
18
+ * Authenticate user credentials
19
+ */
20
+ authenticate(credentials: ICredentials): Promise<string | null>;
21
+ /**
22
+ * Validate any token (NPM, Maven, OCI, PyPI, RubyGems, Composer, Cargo)
23
+ */
24
+ validateToken(tokenString: string, protocol?: TRegistryProtocol): Promise<IAuthToken | null>;
25
+ /**
26
+ * Create a new token for a user
27
+ */
28
+ createToken(userId: string, protocol: TRegistryProtocol, options?: ITokenOptions): Promise<string>;
29
+ /**
30
+ * Revoke a token
31
+ */
32
+ revokeToken(token: string): Promise<void>;
33
+ /**
34
+ * Check if token has permission for an action
35
+ */
36
+ authorize(token: IAuthToken | null, resource: string, action: string): Promise<boolean>;
37
+ /**
38
+ * List all tokens for a user
39
+ */
40
+ listUserTokens(userId: string): Promise<Array<{
41
+ key: string;
42
+ readonly: boolean;
43
+ created: string;
44
+ protocol?: TRegistryProtocol;
45
+ }>>;
46
+ /**
47
+ * Create an OCI JWT token
48
+ */
49
+ private createOciToken;
50
+ /**
51
+ * Validate an OCI JWT token
52
+ */
53
+ private validateOciToken;
54
+ /**
55
+ * Check if a scope matches a resource and action
56
+ */
57
+ private matchesScope;
58
+ /**
59
+ * Convert unified scopes to OCI access array
60
+ */
61
+ private scopesToOciAccess;
62
+ /**
63
+ * Convert OCI access array to unified scopes
64
+ */
65
+ private ociAccessToScopes;
66
+ /**
67
+ * Generate UUID for tokens
68
+ */
69
+ private generateUuid;
70
+ /**
71
+ * Check if string is a valid UUID
72
+ */
73
+ private isValidUuid;
74
+ /**
75
+ * Hash a token for identification
76
+ */
77
+ private hashToken;
78
+ }
@@ -0,0 +1,311 @@
1
+ import * as crypto from 'crypto';
2
+ /**
3
+ * Default in-memory authentication provider.
4
+ * This is the reference implementation that stores tokens in memory.
5
+ * For production use, implement IAuthProvider with Redis, database, or external auth.
6
+ */
7
+ export class DefaultAuthProvider {
8
+ config;
9
+ tokenStore = new Map();
10
+ userCredentials = new Map(); // username -> password hash (mock)
11
+ constructor(config) {
12
+ this.config = config;
13
+ }
14
+ /**
15
+ * Initialize the auth provider
16
+ */
17
+ async init() {
18
+ // Initialize token store (in-memory for now)
19
+ // In production, this could be Redis or a database
20
+ }
21
+ // ========================================================================
22
+ // IAuthProvider Implementation
23
+ // ========================================================================
24
+ /**
25
+ * Authenticate user credentials
26
+ */
27
+ async authenticate(credentials) {
28
+ // Mock authentication - in production, verify against database/LDAP
29
+ const storedPassword = this.userCredentials.get(credentials.username);
30
+ if (!storedPassword) {
31
+ // Auto-register for testing (remove in production)
32
+ this.userCredentials.set(credentials.username, credentials.password);
33
+ return credentials.username;
34
+ }
35
+ if (storedPassword === credentials.password) {
36
+ return credentials.username;
37
+ }
38
+ return null;
39
+ }
40
+ /**
41
+ * Validate any token (NPM, Maven, OCI, PyPI, RubyGems, Composer, Cargo)
42
+ */
43
+ async validateToken(tokenString, protocol) {
44
+ // OCI uses JWT (contains dots), not UUID - check first if OCI is expected
45
+ if (protocol === 'oci' || tokenString.includes('.')) {
46
+ const ociToken = await this.validateOciToken(tokenString);
47
+ if (ociToken && (!protocol || protocol === 'oci')) {
48
+ return ociToken;
49
+ }
50
+ // If protocol was explicitly OCI but validation failed, return null
51
+ if (protocol === 'oci') {
52
+ return null;
53
+ }
54
+ }
55
+ // UUID-based tokens: single O(1) Map lookup
56
+ if (this.isValidUuid(tokenString)) {
57
+ const authToken = this.tokenStore.get(tokenString);
58
+ if (authToken) {
59
+ // If protocol specified, verify it matches
60
+ if (protocol && authToken.type !== protocol) {
61
+ return null;
62
+ }
63
+ // Check expiration
64
+ if (authToken.expiresAt && authToken.expiresAt < new Date()) {
65
+ this.tokenStore.delete(tokenString);
66
+ return null;
67
+ }
68
+ return authToken;
69
+ }
70
+ }
71
+ return null;
72
+ }
73
+ /**
74
+ * Create a new token for a user
75
+ */
76
+ async createToken(userId, protocol, options) {
77
+ // OCI tokens use JWT
78
+ if (protocol === 'oci') {
79
+ return this.createOciToken(userId, options?.scopes || ['oci:*:*:*'], options?.expiresIn || 3600);
80
+ }
81
+ // All other protocols use UUID tokens
82
+ const token = this.generateUuid();
83
+ const scopes = options?.scopes || (options?.readonly
84
+ ? [`${protocol}:*:*:read`]
85
+ : [`${protocol}:*:*:*`]);
86
+ const authToken = {
87
+ type: protocol,
88
+ userId,
89
+ scopes,
90
+ readonly: options?.readonly,
91
+ expiresAt: options?.expiresIn ? new Date(Date.now() + options.expiresIn * 1000) : undefined,
92
+ metadata: {
93
+ created: new Date().toISOString(),
94
+ },
95
+ };
96
+ this.tokenStore.set(token, authToken);
97
+ return token;
98
+ }
99
+ /**
100
+ * Revoke a token
101
+ */
102
+ async revokeToken(token) {
103
+ this.tokenStore.delete(token);
104
+ }
105
+ /**
106
+ * Check if token has permission for an action
107
+ */
108
+ async authorize(token, resource, action) {
109
+ if (!token) {
110
+ return false;
111
+ }
112
+ // Check readonly flag
113
+ if (token.readonly && ['write', 'push', 'delete'].includes(action)) {
114
+ return false;
115
+ }
116
+ // Check scopes
117
+ for (const scope of token.scopes) {
118
+ if (this.matchesScope(scope, resource, action)) {
119
+ return true;
120
+ }
121
+ }
122
+ return false;
123
+ }
124
+ /**
125
+ * List all tokens for a user
126
+ */
127
+ async listUserTokens(userId) {
128
+ const tokens = [];
129
+ for (const [token, authToken] of this.tokenStore.entries()) {
130
+ if (authToken.userId === userId) {
131
+ tokens.push({
132
+ key: this.hashToken(token),
133
+ readonly: authToken.readonly || false,
134
+ created: authToken.metadata?.created || 'unknown',
135
+ protocol: authToken.type,
136
+ });
137
+ }
138
+ }
139
+ return tokens;
140
+ }
141
+ // ========================================================================
142
+ // OCI JWT Token Methods
143
+ // ========================================================================
144
+ /**
145
+ * Create an OCI JWT token
146
+ */
147
+ async createOciToken(userId, scopes, expiresIn = 3600) {
148
+ if (!this.config.ociTokens?.enabled) {
149
+ throw new Error('OCI tokens are not enabled');
150
+ }
151
+ const now = Math.floor(Date.now() / 1000);
152
+ const payload = {
153
+ iss: this.config.ociTokens.realm,
154
+ sub: userId,
155
+ aud: this.config.ociTokens.service,
156
+ exp: now + expiresIn,
157
+ nbf: now,
158
+ iat: now,
159
+ access: this.scopesToOciAccess(scopes),
160
+ };
161
+ // Create JWT with HMAC-SHA256 signature
162
+ const header = { alg: 'HS256', typ: 'JWT' };
163
+ const headerB64 = Buffer.from(JSON.stringify(header)).toString('base64url');
164
+ const payloadB64 = Buffer.from(JSON.stringify(payload)).toString('base64url');
165
+ const signature = crypto
166
+ .createHmac('sha256', this.config.jwtSecret)
167
+ .update(`${headerB64}.${payloadB64}`)
168
+ .digest('base64url');
169
+ return `${headerB64}.${payloadB64}.${signature}`;
170
+ }
171
+ /**
172
+ * Validate an OCI JWT token
173
+ */
174
+ async validateOciToken(jwt) {
175
+ try {
176
+ const parts = jwt.split('.');
177
+ if (parts.length !== 3) {
178
+ return null;
179
+ }
180
+ const [headerB64, payloadB64, signatureB64] = parts;
181
+ // Verify signature
182
+ const expectedSignature = crypto
183
+ .createHmac('sha256', this.config.jwtSecret)
184
+ .update(`${headerB64}.${payloadB64}`)
185
+ .digest('base64url');
186
+ if (signatureB64 !== expectedSignature) {
187
+ return null;
188
+ }
189
+ // Decode and parse payload
190
+ const payload = JSON.parse(Buffer.from(payloadB64, 'base64url').toString('utf-8'));
191
+ // Check expiration
192
+ const now = Math.floor(Date.now() / 1000);
193
+ if (payload.exp && payload.exp < now) {
194
+ return null;
195
+ }
196
+ // Check not-before time
197
+ if (payload.nbf && payload.nbf > now) {
198
+ return null;
199
+ }
200
+ // Convert to unified token format
201
+ const scopes = this.ociAccessToScopes(payload.access || []);
202
+ return {
203
+ type: 'oci',
204
+ userId: payload.sub,
205
+ scopes,
206
+ expiresAt: payload.exp ? new Date(payload.exp * 1000) : undefined,
207
+ metadata: {
208
+ iss: payload.iss,
209
+ aud: payload.aud,
210
+ },
211
+ };
212
+ }
213
+ catch (error) {
214
+ return null;
215
+ }
216
+ }
217
+ // ========================================================================
218
+ // Helper Methods
219
+ // ========================================================================
220
+ /**
221
+ * Check if a scope matches a resource and action
222
+ */
223
+ matchesScope(scope, resource, action) {
224
+ const scopeParts = scope.split(':');
225
+ const resourceParts = resource.split(':');
226
+ // Scope must have at least protocol:type:name:action
227
+ if (scopeParts.length < 4) {
228
+ return false;
229
+ }
230
+ const [scopeProtocol, scopeType, scopeName, scopeAction] = scopeParts;
231
+ const [resourceProtocol, resourceType, resourceName] = resourceParts;
232
+ // Check protocol
233
+ if (scopeProtocol !== '*' && scopeProtocol !== resourceProtocol) {
234
+ return false;
235
+ }
236
+ // Check type
237
+ if (scopeType !== '*' && scopeType !== resourceType) {
238
+ return false;
239
+ }
240
+ // Check name
241
+ if (scopeName !== '*' && scopeName !== resourceName) {
242
+ return false;
243
+ }
244
+ // Check action
245
+ if (scopeAction !== '*' && scopeAction !== action) {
246
+ // Map action aliases
247
+ const actionAliases = {
248
+ read: ['pull', 'get'],
249
+ write: ['push', 'put', 'post'],
250
+ };
251
+ const aliases = actionAliases[scopeAction] || [];
252
+ if (!aliases.includes(action)) {
253
+ return false;
254
+ }
255
+ }
256
+ return true;
257
+ }
258
+ /**
259
+ * Convert unified scopes to OCI access array
260
+ */
261
+ scopesToOciAccess(scopes) {
262
+ const access = [];
263
+ for (const scope of scopes) {
264
+ const parts = scope.split(':');
265
+ if (parts.length >= 4 && parts[0] === 'oci') {
266
+ access.push({
267
+ type: parts[1],
268
+ name: parts[2],
269
+ actions: [parts[3]],
270
+ });
271
+ }
272
+ }
273
+ return access;
274
+ }
275
+ /**
276
+ * Convert OCI access array to unified scopes
277
+ */
278
+ ociAccessToScopes(access) {
279
+ const scopes = [];
280
+ for (const item of access) {
281
+ for (const action of item.actions) {
282
+ scopes.push(`oci:${item.type}:${item.name}:${action}`);
283
+ }
284
+ }
285
+ return scopes;
286
+ }
287
+ /**
288
+ * Generate UUID for tokens
289
+ */
290
+ generateUuid() {
291
+ return 'xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx'.replace(/[xy]/g, (c) => {
292
+ const r = (Math.random() * 16) | 0;
293
+ const v = c === 'x' ? r : (r & 0x3) | 0x8;
294
+ return v.toString(16);
295
+ });
296
+ }
297
+ /**
298
+ * Check if string is a valid UUID
299
+ */
300
+ isValidUuid(str) {
301
+ const uuidRegex = /^[0-9a-f]{8}-[0-9a-f]{4}-4[0-9a-f]{3}-[89ab][0-9a-f]{3}-[0-9a-f]{12}$/i;
302
+ return uuidRegex.test(str);
303
+ }
304
+ /**
305
+ * Hash a token for identification
306
+ */
307
+ hashToken(token) {
308
+ return `sha512-${token.substring(0, 16)}...`;
309
+ }
310
+ }
311
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.defaultauthprovider.js","sourceRoot":"","sources":["../../ts/core/classes.defaultauthprovider.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,MAAM,MAAM,QAAQ,CAAC;AAIjC;;;;GAIG;AACH,MAAM,OAAO,mBAAmB;IAIV;IAHZ,UAAU,GAA4B,IAAI,GAAG,EAAE,CAAC;IAChD,eAAe,GAAwB,IAAI,GAAG,EAAE,CAAC,CAAC,mCAAmC;IAE7F,YAAoB,MAAmB;QAAnB,WAAM,GAAN,MAAM,CAAa;IAAG,CAAC;IAE3C;;OAEG;IACI,KAAK,CAAC,IAAI;QACf,6CAA6C;QAC7C,mDAAmD;IACrD,CAAC;IAED,2EAA2E;IAC3E,+BAA+B;IAC/B,2EAA2E;IAE3E;;OAEG;IACI,KAAK,CAAC,YAAY,CAAC,WAAyB;QACjD,oEAAoE;QACpE,MAAM,cAAc,GAAG,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,WAAW,CAAC,QAAQ,CAAC,CAAC;QAEtE,IAAI,CAAC,cAAc,EAAE,CAAC;YACpB,mDAAmD;YACnD,IAAI,CAAC,eAAe,CAAC,GAAG,CAAC,WAAW,CAAC,QAAQ,EAAE,WAAW,CAAC,QAAQ,CAAC,CAAC;YACrE,OAAO,WAAW,CAAC,QAAQ,CAAC;QAC9B,CAAC;QAED,IAAI,cAAc,KAAK,WAAW,CAAC,QAAQ,EAAE,CAAC;YAC5C,OAAO,WAAW,CAAC,QAAQ,CAAC;QAC9B,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,aAAa,CACxB,WAAmB,EACnB,QAA4B;QAE5B,0EAA0E;QAC1E,IAAI,QAAQ,KAAK,KAAK,IAAI,WAAW,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;YACpD,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,WAAW,CAAC,CAAC;YAC1D,IAAI,QAAQ,IAAI,CAAC,CAAC,QAAQ,IAAI,QAAQ,KAAK,KAAK,CAAC,EAAE,CAAC;gBAClD,OAAO,QAAQ,CAAC;YAClB,CAAC;YACD,oEAAoE;YACpE,IAAI,QAAQ,KAAK,KAAK,EAAE,CAAC;gBACvB,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,4CAA4C;QAC5C,IAAI,IAAI,CAAC,WAAW,CAAC,WAAW,CAAC,EAAE,CAAC;YAClC,MAAM,SAAS,GAAG,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;YACnD,IAAI,SAAS,EAAE,CAAC;gBACd,2CAA2C;gBAC3C,IAAI,QAAQ,IAAI,SAAS,CAAC,IAAI,KAAK,QAAQ,EAAE,CAAC;oBAC5C,OAAO,IAAI,CAAC;gBACd,CAAC;gBACD,mBAAmB;gBACnB,IAAI,SAAS,CAAC,SAAS,IAAI,SAAS,CAAC,SAAS,GAAG,IAAI,IAAI,EAAE,EAAE,CAAC;oBAC5D,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC;oBACpC,OAAO,IAAI,CAAC;gBACd,CAAC;gBACD,OAAO,SAAS,CAAC;YACnB,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,WAAW,CACtB,MAAc,EACd,QAA2B,EAC3B,OAAuB;QAEvB,qBAAqB;QACrB,IAAI,QAAQ,KAAK,KAAK,EAAE,CAAC;YACvB,OAAO,IAAI,CAAC,cAAc,CAAC,MAAM,EAAE,OAAO,EAAE,MAAM,IAAI,CAAC,WAAW,CAAC,EAAE,OAAO,EAAE,SAAS,IAAI,IAAI,CAAC,CAAC;QACnG,CAAC;QAED,sCAAsC;QACtC,MAAM,KAAK,GAAG,IAAI,CAAC,YAAY,EAAE,CAAC;QAClC,MAAM,MAAM,GAAG,OAAO,EAAE,MAAM,IAAI,CAAC,OAAO,EAAE,QAAQ;YAClD,CAAC,CAAC,CAAC,GAAG,QAAQ,WAAW,CAAC;YAC1B,CAAC,CAAC,CAAC,GAAG,QAAQ,QAAQ,CAAC,CAAC,CAAC;QAE3B,MAAM,SAAS,GAAe;YAC5B,IAAI,EAAE,QAAQ;YACd,MAAM;YACN,MAAM;YACN,QAAQ,EAAE,OAAO,EAAE,QAAQ;YAC3B,SAAS,EAAE,OAAO,EAAE,SAAS,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,OAAO,CAAC,SAAS,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC,SAAS;YAC3F,QAAQ,EAAE;gBACR,OAAO,EAAE,IAAI,IAAI,EAAE,CAAC,WAAW,EAAE;aAClC;SACF,CAAC;QAEF,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;QACtC,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,WAAW,CAAC,KAAa;QACpC,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC,KAAK,CAAC,CAAC;IAChC,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,SAAS,CACpB,KAAwB,EACxB,QAAgB,EAChB,MAAc;QAEd,IAAI,CAAC,KAAK,EAAE,CAAC;YACX,OAAO,KAAK,CAAC;QACf,CAAC;QAED,sBAAsB;QACtB,IAAI,KAAK,CAAC,QAAQ,IAAI,CAAC,OAAO,EAAE,MAAM,EAAE,QAAQ,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;YACnE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,eAAe;QACf,KAAK,MAAM,KAAK,IAAI,KAAK,CAAC,MAAM,EAAE,CAAC;YACjC,IAAI,IAAI,CAAC,YAAY,CAAC,KAAK,EAAE,QAAQ,EAAE,MAAM,CAAC,EAAE,CAAC;gBAC/C,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;OAEG;IACI,KAAK,CAAC,cAAc,CAAC,MAAc;QAMxC,MAAM,MAAM,GAA2F,EAAE,CAAC;QAE1G,KAAK,MAAM,CAAC,KAAK,EAAE,SAAS,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,OAAO,EAAE,EAAE,CAAC;YAC3D,IAAI,SAAS,CAAC,MAAM,KAAK,MAAM,EAAE,CAAC;gBAChC,MAAM,CAAC,IAAI,CAAC;oBACV,GAAG,EAAE,IAAI,CAAC,SAAS,CAAC,KAAK,CAAC;oBAC1B,QAAQ,EAAE,SAAS,CAAC,QAAQ,IAAI,KAAK;oBACrC,OAAO,EAAE,SAAS,CAAC,QAAQ,EAAE,OAAO,IAAI,SAAS;oBACjD,QAAQ,EAAE,SAAS,CAAC,IAAI;iBACzB,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED,2EAA2E;IAC3E,wBAAwB;IACxB,2EAA2E;IAE3E;;OAEG;IACK,KAAK,CAAC,cAAc,CAC1B,MAAc,EACd,MAAgB,EAChB,YAAoB,IAAI;QAExB,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,EAAE,OAAO,EAAE,CAAC;YACpC,MAAM,IAAI,KAAK,CAAC,4BAA4B,CAAC,CAAC;QAChD,CAAC;QAED,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;QAC1C,MAAM,OAAO,GAAG;YACd,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK;YAChC,GAAG,EAAE,MAAM;YACX,GAAG,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,OAAO;YAClC,GAAG,EAAE,GAAG,GAAG,SAAS;YACpB,GAAG,EAAE,GAAG;YACR,GAAG,EAAE,GAAG;YACR,MAAM,EAAE,IAAI,CAAC,iBAAiB,CAAC,MAAM,CAAC;SACvC,CAAC;QAEF,wCAAwC;QACxC,MAAM,MAAM,GAAG,EAAE,GAAG,EAAE,OAAO,EAAE,GAAG,EAAE,KAAK,EAAE,CAAC;QAC5C,MAAM,SAAS,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QAC5E,MAAM,UAAU,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;QAE9E,MAAM,SAAS,GAAG,MAAM;aACrB,UAAU,CAAC,QAAQ,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC;aAC3C,MAAM,CAAC,GAAG,SAAS,IAAI,UAAU,EAAE,CAAC;aACpC,MAAM,CAAC,WAAW,CAAC,CAAC;QAEvB,OAAO,GAAG,SAAS,IAAI,UAAU,IAAI,SAAS,EAAE,CAAC;IACnD,CAAC;IAED;;OAEG;IACK,KAAK,CAAC,gBAAgB,CAAC,GAAW;QACxC,IAAI,CAAC;YACH,MAAM,KAAK,GAAG,GAAG,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC7B,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACvB,OAAO,IAAI,CAAC;YACd,CAAC;YAED,MAAM,CAAC,SAAS,EAAE,UAAU,EAAE,YAAY,CAAC,GAAG,KAAK,CAAC;YAEpD,mBAAmB;YACnB,MAAM,iBAAiB,GAAG,MAAM;iBAC7B,UAAU,CAAC,QAAQ,EAAE,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC;iBAC3C,MAAM,CAAC,GAAG,SAAS,IAAI,UAAU,EAAE,CAAC;iBACpC,MAAM,CAAC,WAAW,CAAC,CAAC;YAEvB,IAAI,YAAY,KAAK,iBAAiB,EAAE,CAAC;gBACvC,OAAO,IAAI,CAAC;YACd,CAAC;YAED,2BAA2B;YAC3B,MAAM,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,EAAE,WAAW,CAAC,CAAC,QAAQ,CAAC,OAAO,CAAC,CAAC,CAAC;YAEnF,mBAAmB;YACnB,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,EAAE,GAAG,IAAI,CAAC,CAAC;YAC1C,IAAI,OAAO,CAAC,GAAG,IAAI,OAAO,CAAC,GAAG,GAAG,GAAG,EAAE,CAAC;gBACrC,OAAO,IAAI,CAAC;YACd,CAAC;YAED,wBAAwB;YACxB,IAAI,OAAO,CAAC,GAAG,IAAI,OAAO,CAAC,GAAG,GAAG,GAAG,EAAE,CAAC;gBACrC,OAAO,IAAI,CAAC;YACd,CAAC;YAED,kCAAkC;YAClC,MAAM,MAAM,GAAG,IAAI,CAAC,iBAAiB,CAAC,OAAO,CAAC,MAAM,IAAI,EAAE,CAAC,CAAC;YAE5D,OAAO;gBACL,IAAI,EAAE,KAAK;gBACX,MAAM,EAAE,OAAO,CAAC,GAAG;gBACnB,MAAM;gBACN,SAAS,EAAE,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,IAAI,IAAI,CAAC,OAAO,CAAC,GAAG,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC,SAAS;gBACjE,QAAQ,EAAE;oBACR,GAAG,EAAE,OAAO,CAAC,GAAG;oBAChB,GAAG,EAAE,OAAO,CAAC,GAAG;iBACjB;aACF,CAAC;QACJ,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,OAAO,IAAI,CAAC;QACd,CAAC;IACH,CAAC;IAED,2EAA2E;IAC3E,iBAAiB;IACjB,2EAA2E;IAE3E;;OAEG;IACK,YAAY,CAAC,KAAa,EAAE,QAAgB,EAAE,MAAc;QAClE,MAAM,UAAU,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QACpC,MAAM,aAAa,GAAG,QAAQ,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;QAE1C,qDAAqD;QACrD,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1B,OAAO,KAAK,CAAC;QACf,CAAC;QAED,MAAM,CAAC,aAAa,EAAE,SAAS,EAAE,SAAS,EAAE,WAAW,CAAC,GAAG,UAAU,CAAC;QACtE,MAAM,CAAC,gBAAgB,EAAE,YAAY,EAAE,YAAY,CAAC,GAAG,aAAa,CAAC;QAErE,iBAAiB;QACjB,IAAI,aAAa,KAAK,GAAG,IAAI,aAAa,KAAK,gBAAgB,EAAE,CAAC;YAChE,OAAO,KAAK,CAAC;QACf,CAAC;QAED,aAAa;QACb,IAAI,SAAS,KAAK,GAAG,IAAI,SAAS,KAAK,YAAY,EAAE,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,aAAa;QACb,IAAI,SAAS,KAAK,GAAG,IAAI,SAAS,KAAK,YAAY,EAAE,CAAC;YACpD,OAAO,KAAK,CAAC;QACf,CAAC;QAED,eAAe;QACf,IAAI,WAAW,KAAK,GAAG,IAAI,WAAW,KAAK,MAAM,EAAE,CAAC;YAClD,qBAAqB;YACrB,MAAM,aAAa,GAA6B;gBAC9C,IAAI,EAAE,CAAC,MAAM,EAAE,KAAK,CAAC;gBACrB,KAAK,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,MAAM,CAAC;aAC/B,CAAC;YAEF,MAAM,OAAO,GAAG,aAAa,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;YACjD,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,MAAM,CAAC,EAAE,CAAC;gBAC9B,OAAO,KAAK,CAAC;YACf,CAAC;QACH,CAAC;QAED,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,MAAgB;QAKxC,MAAM,MAAM,GAA2D,EAAE,CAAC;QAE1E,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;YAC3B,MAAM,KAAK,GAAG,KAAK,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;YAC/B,IAAI,KAAK,CAAC,MAAM,IAAI,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,KAAK,EAAE,CAAC;gBAC5C,MAAM,CAAC,IAAI,CAAC;oBACV,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC;oBACd,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC;oBACd,OAAO,EAAE,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;iBACpB,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,iBAAiB,CAAC,MAIxB;QACA,MAAM,MAAM,GAAa,EAAE,CAAC;QAE5B,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;YAC1B,KAAK,MAAM,MAAM,IAAI,IAAI,CAAC,OAAO,EAAE,CAAC;gBAClC,MAAM,CAAC,IAAI,CAAC,OAAO,IAAI,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,IAAI,MAAM,EAAE,CAAC,CAAC;YACzD,CAAC;QACH,CAAC;QAED,OAAO,MAAM,CAAC;IAChB,CAAC;IAED;;OAEG;IACK,YAAY;QAClB,OAAO,sCAAsC,CAAC,OAAO,CAAC,OAAO,EAAE,CAAC,CAAC,EAAE,EAAE;YACnE,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,MAAM,EAAE,GAAG,EAAE,CAAC,GAAG,CAAC,CAAC;YACnC,MAAM,CAAC,GAAG,CAAC,KAAK,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,GAAG,CAAC,GAAG,GAAG,CAAC;YAC1C,OAAO,CAAC,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC;QACxB,CAAC,CAAC,CAAC;IACL,CAAC;IAED;;OAEG;IACK,WAAW,CAAC,GAAW;QAC7B,MAAM,SAAS,GAAG,wEAAwE,CAAC;QAC3F,OAAO,SAAS,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;IAC7B,CAAC;IAED;;OAEG;IACK,SAAS,CAAC,KAAa;QAC7B,OAAO,UAAU,KAAK,CAAC,SAAS,CAAC,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC;IAC/C,CAAC;CACF"}
@@ -1,14 +1,42 @@
1
- import type { IStorageConfig, IStorageBackend } from './interfaces.core.js';
1
+ import type { IStorageConfig, IStorageBackend, TRegistryProtocol } from './interfaces.core.js';
2
+ import type { IStorageHooks, IStorageActor, IStorageMetadata } from './interfaces.storage.js';
2
3
  /**
3
- * Storage abstraction layer for registry
4
- * Provides a unified interface over SmartBucket
4
+ * Storage abstraction layer for registry.
5
+ * Provides a unified interface over SmartBucket with optional hooks
6
+ * for quota tracking, audit logging, cache invalidation, etc.
7
+ *
8
+ * @example
9
+ * ```typescript
10
+ * // Basic usage
11
+ * const storage = new RegistryStorage(config);
12
+ *
13
+ * // With hooks for quota tracking
14
+ * const storage = new RegistryStorage(config, {
15
+ * beforePut: async (ctx) => {
16
+ * const quota = await getQuota(ctx.actor?.orgId);
17
+ * const usage = await getUsage(ctx.actor?.orgId);
18
+ * if (usage + (ctx.metadata?.size || 0) > quota) {
19
+ * return { allowed: false, reason: 'Quota exceeded' };
20
+ * }
21
+ * return { allowed: true };
22
+ * },
23
+ * afterPut: async (ctx) => {
24
+ * await updateUsage(ctx.actor?.orgId, ctx.metadata?.size || 0);
25
+ * }
26
+ * });
27
+ * ```
5
28
  */
6
29
  export declare class RegistryStorage implements IStorageBackend {
7
30
  private config;
8
31
  private smartBucket;
9
32
  private bucket;
10
33
  private bucketName;
11
- constructor(config: IStorageConfig);
34
+ private hooks?;
35
+ constructor(config: IStorageConfig, hooks?: IStorageHooks);
36
+ /**
37
+ * Set storage hooks (can be called after construction)
38
+ */
39
+ setHooks(hooks: IStorageHooks): void;
12
40
  /**
13
41
  * Initialize the storage backend
14
42
  */
@@ -25,6 +53,44 @@ export declare class RegistryStorage implements IStorageBackend {
25
53
  * Delete an object
26
54
  */
27
55
  deleteObject(key: string): Promise<void>;
56
+ /**
57
+ * Current operation context for hooks.
58
+ * Set this before performing storage operations to enable hooks.
59
+ */
60
+ private currentContext?;
61
+ /**
62
+ * Set the current operation context for hooks.
63
+ * Call this before performing storage operations.
64
+ *
65
+ * @example
66
+ * ```typescript
67
+ * storage.setContext({
68
+ * protocol: 'npm',
69
+ * actor: { userId: 'user123', ip: '192.168.1.1' },
70
+ * metadata: { packageName: 'lodash', version: '4.17.21' }
71
+ * });
72
+ * await storage.putNpmTarball('lodash', '4.17.21', tarball);
73
+ * storage.clearContext();
74
+ * ```
75
+ */
76
+ setContext(context: {
77
+ protocol: TRegistryProtocol;
78
+ actor?: IStorageActor;
79
+ metadata?: IStorageMetadata;
80
+ }): void;
81
+ /**
82
+ * Clear the current operation context.
83
+ */
84
+ clearContext(): void;
85
+ /**
86
+ * Execute a function with a temporary context.
87
+ * Context is automatically cleared after execution.
88
+ */
89
+ withContext<T>(context: {
90
+ protocol: TRegistryProtocol;
91
+ actor?: IStorageActor;
92
+ metadata?: IStorageMetadata;
93
+ }, fn: () => Promise<T>): Promise<T>;
28
94
  /**
29
95
  * List objects with a prefix (recursively)
30
96
  */