@smythos/sre 1.5.0 → 1.5.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +62 -0
- package/LICENSE +18 -0
- package/package.json +127 -115
- package/src/Components/APICall/APICall.class.ts +155 -0
- package/src/Components/APICall/AccessTokenManager.ts +130 -0
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -0
- package/src/Components/APICall/OAuth.helper.ts +294 -0
- package/src/Components/APICall/mimeTypeCategories.ts +46 -0
- package/src/Components/APICall/parseData.ts +167 -0
- package/src/Components/APICall/parseHeaders.ts +41 -0
- package/src/Components/APICall/parseProxy.ts +68 -0
- package/src/Components/APICall/parseUrl.ts +91 -0
- package/src/Components/APIEndpoint.class.ts +234 -0
- package/src/Components/APIOutput.class.ts +58 -0
- package/src/Components/AgentPlugin.class.ts +102 -0
- package/src/Components/Async.class.ts +155 -0
- package/src/Components/Await.class.ts +90 -0
- package/src/Components/Classifier.class.ts +158 -0
- package/src/Components/Component.class.ts +94 -0
- package/src/Components/ComponentHost.class.ts +38 -0
- package/src/Components/DataSourceCleaner.class.ts +92 -0
- package/src/Components/DataSourceIndexer.class.ts +181 -0
- package/src/Components/DataSourceLookup.class.ts +141 -0
- package/src/Components/FEncDec.class.ts +29 -0
- package/src/Components/FHash.class.ts +33 -0
- package/src/Components/FSign.class.ts +80 -0
- package/src/Components/FSleep.class.ts +25 -0
- package/src/Components/FTimestamp.class.ts +25 -0
- package/src/Components/FileStore.class.ts +75 -0
- package/src/Components/ForEach.class.ts +97 -0
- package/src/Components/GPTPlugin.class.ts +70 -0
- package/src/Components/GenAILLM.class.ts +395 -0
- package/src/Components/HuggingFace.class.ts +314 -0
- package/src/Components/Image/imageSettings.config.ts +70 -0
- package/src/Components/ImageGenerator.class.ts +407 -0
- package/src/Components/JSONFilter.class.ts +54 -0
- package/src/Components/LLMAssistant.class.ts +213 -0
- package/src/Components/LogicAND.class.ts +28 -0
- package/src/Components/LogicAtLeast.class.ts +85 -0
- package/src/Components/LogicAtMost.class.ts +86 -0
- package/src/Components/LogicOR.class.ts +29 -0
- package/src/Components/LogicXOR.class.ts +34 -0
- package/src/Components/MCPClient.class.ts +112 -0
- package/src/Components/PromptGenerator.class.ts +122 -0
- package/src/Components/ScrapflyWebScrape.class.ts +159 -0
- package/src/Components/TavilyWebSearch.class.ts +98 -0
- package/src/Components/index.ts +77 -0
- package/src/Core/AgentProcess.helper.ts +240 -0
- package/src/Core/Connector.class.ts +123 -0
- package/src/Core/ConnectorsService.ts +192 -0
- package/src/Core/DummyConnector.ts +49 -0
- package/src/Core/HookService.ts +105 -0
- package/src/Core/SmythRuntime.class.ts +292 -0
- package/src/Core/SystemEvents.ts +15 -0
- package/src/Core/boot.ts +55 -0
- package/src/config.ts +15 -0
- package/src/constants.ts +125 -0
- package/src/data/hugging-face.params.json +580 -0
- package/src/helpers/BinaryInput.helper.ts +324 -0
- package/src/helpers/Conversation.helper.ts +1094 -0
- package/src/helpers/JsonContent.helper.ts +97 -0
- package/src/helpers/LocalCache.helper.ts +97 -0
- package/src/helpers/Log.helper.ts +234 -0
- package/src/helpers/OpenApiParser.helper.ts +150 -0
- package/src/helpers/S3Cache.helper.ts +129 -0
- package/src/helpers/SmythURI.helper.ts +5 -0
- package/src/helpers/TemplateString.helper.ts +243 -0
- package/src/helpers/TypeChecker.helper.ts +329 -0
- package/src/index.ts +179 -0
- package/src/index.ts.bak +179 -0
- package/src/subsystems/AgentManager/Agent.class.ts +1108 -0
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -0
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -0
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -0
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -0
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -0
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -0
- package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -0
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -0
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -0
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -0
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -0
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -0
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +59 -0
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -0
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -0
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +153 -0
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -0
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +99 -0
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +63 -0
- package/src/subsystems/ComputeManager/Code.service/index.ts +11 -0
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -0
- package/src/subsystems/IO/CLI.service/index.ts +9 -0
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -0
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -0
- package/src/subsystems/IO/Log.service/index.ts +13 -0
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +41 -0
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -0
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -0
- package/src/subsystems/IO/NKV.service/index.ts +12 -0
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -0
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -0
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -0
- package/src/subsystems/IO/Router.service/index.ts +11 -0
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +472 -0
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -0
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +305 -0
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +418 -0
- package/src/subsystems/IO/Storage.service/index.ts +13 -0
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -0
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +450 -0
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +373 -0
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +420 -0
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +106 -0
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -0
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -0
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -0
- package/src/subsystems/LLMManager/LLM.helper.ts +221 -0
- package/src/subsystems/LLMManager/LLM.inference.ts +335 -0
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +374 -0
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +145 -0
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +632 -0
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +405 -0
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +81 -0
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +689 -0
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +257 -0
- package/src/subsystems/LLMManager/LLM.service/connectors/OpenAI.class.ts +848 -0
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +255 -0
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +193 -0
- package/src/subsystems/LLMManager/LLM.service/index.ts +43 -0
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +281 -0
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.ts +229 -0
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -0
- package/src/subsystems/LLMManager/custom-models.ts +854 -0
- package/src/subsystems/LLMManager/models.ts +2539 -0
- package/src/subsystems/LLMManager/paramMappings.ts +69 -0
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -0
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -0
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -0
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -0
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -0
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -0
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -0
- package/src/subsystems/MemoryManager/LLMContext.ts +125 -0
- package/src/subsystems/MemoryManager/RuntimeContext.ts +249 -0
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -0
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +76 -0
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -0
- package/src/subsystems/Security/Account.service/AccountConnector.ts +41 -0
- package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -0
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -0
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -0
- package/src/subsystems/Security/Account.service/index.ts +14 -0
- package/src/subsystems/Security/Credentials.helper.ts +62 -0
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +34 -0
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +57 -0
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -0
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -0
- package/src/subsystems/Security/SecureConnector.class.ts +110 -0
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -0
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +26 -0
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -0
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +166 -0
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -0
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -0
- package/src/subsystems/Security/Vault.service/index.ts +12 -0
- package/src/types/ACL.types.ts +104 -0
- package/src/types/AWS.types.ts +9 -0
- package/src/types/Agent.types.ts +61 -0
- package/src/types/AgentLogger.types.ts +17 -0
- package/src/types/Cache.types.ts +1 -0
- package/src/types/Common.types.ts +3 -0
- package/src/types/LLM.types.ts +419 -0
- package/src/types/Redis.types.ts +8 -0
- package/src/types/SRE.types.ts +64 -0
- package/src/types/Security.types.ts +18 -0
- package/src/types/Storage.types.ts +5 -0
- package/src/types/VectorDB.types.ts +78 -0
- package/src/utils/base64.utils.ts +275 -0
- package/src/utils/cli.utils.ts +68 -0
- package/src/utils/data.utils.ts +263 -0
- package/src/utils/date-time.utils.ts +22 -0
- package/src/utils/general.utils.ts +238 -0
- package/src/utils/index.ts +12 -0
- package/src/utils/numbers.utils.ts +13 -0
- package/src/utils/oauth.utils.ts +35 -0
- package/src/utils/string.utils.ts +414 -0
- package/src/utils/url.utils.ts +19 -0
- package/src/utils/validation.utils.ts +74 -0
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
2
|
+
import { AccessRequest } from './AccessRequest.class';
|
|
3
|
+
|
|
4
|
+
export class AccessCandidate implements IAccessCandidate {
|
|
5
|
+
public role: TAccessRole;
|
|
6
|
+
public id: string;
|
|
7
|
+
//public _candidate: TAccessCandidate;
|
|
8
|
+
constructor(candidate?: IAccessCandidate) {
|
|
9
|
+
//this._candidate = candidate || { role: TAccessRole.Public, id: '' };
|
|
10
|
+
|
|
11
|
+
this.role = candidate ? candidate.role : TAccessRole.Public;
|
|
12
|
+
this.id = candidate ? candidate.id : '';
|
|
13
|
+
}
|
|
14
|
+
|
|
15
|
+
public toString(): string {
|
|
16
|
+
return `AC:R[${this.role}]:ID[${this.id}]`;
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
public get request(): AccessRequest {
|
|
20
|
+
return new AccessRequest(this);
|
|
21
|
+
}
|
|
22
|
+
|
|
23
|
+
public get readRequest(): AccessRequest {
|
|
24
|
+
return new AccessRequest(this).setLevel(TAccessLevel.Read);
|
|
25
|
+
}
|
|
26
|
+
public get writeRequest(): AccessRequest {
|
|
27
|
+
return new AccessRequest(this).setLevel(TAccessLevel.Write);
|
|
28
|
+
}
|
|
29
|
+
public get ownerRequest(): AccessRequest {
|
|
30
|
+
return new AccessRequest(this).setLevel(TAccessLevel.Owner);
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
public static clone(candidate: IAccessCandidate): AccessCandidate {
|
|
34
|
+
return new AccessCandidate(candidate);
|
|
35
|
+
}
|
|
36
|
+
|
|
37
|
+
public team(teamId: string): AccessCandidate {
|
|
38
|
+
this.role = TAccessRole.Team;
|
|
39
|
+
this.id = teamId;
|
|
40
|
+
|
|
41
|
+
return this;
|
|
42
|
+
}
|
|
43
|
+
static team(teamId: string): AccessCandidate {
|
|
44
|
+
return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
|
|
45
|
+
}
|
|
46
|
+
|
|
47
|
+
public agent(agentId: string): AccessCandidate {
|
|
48
|
+
this.role = TAccessRole.Agent;
|
|
49
|
+
this.id = agentId;
|
|
50
|
+
return this;
|
|
51
|
+
}
|
|
52
|
+
static agent(agentId: string): AccessCandidate {
|
|
53
|
+
return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
|
|
54
|
+
}
|
|
55
|
+
|
|
56
|
+
public user(userId: string): AccessCandidate {
|
|
57
|
+
this.role = TAccessRole.User;
|
|
58
|
+
this.id = userId;
|
|
59
|
+
return this;
|
|
60
|
+
}
|
|
61
|
+
static user(userId: string): AccessCandidate {
|
|
62
|
+
return new AccessCandidate({ role: TAccessRole.User, id: userId });
|
|
63
|
+
}
|
|
64
|
+
|
|
65
|
+
public public(): AccessCandidate {
|
|
66
|
+
this.role = TAccessRole.Public;
|
|
67
|
+
|
|
68
|
+
//public is a special case we use the role as the owner id because public access does not have specific candidate IDs
|
|
69
|
+
this.id = TAccessRole.Public;
|
|
70
|
+
|
|
71
|
+
return this;
|
|
72
|
+
}
|
|
73
|
+
static public(): AccessCandidate {
|
|
74
|
+
return new AccessCandidate({ role: TAccessRole.Public, id: '' });
|
|
75
|
+
}
|
|
76
|
+
}
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
import { IAccessCandidate, IAccessRequest, TAccessLevel } from '@sre/types/ACL.types';
|
|
2
|
+
import { uid } from '@sre/utils/index';
|
|
3
|
+
|
|
4
|
+
export class AccessRequest implements IAccessRequest {
|
|
5
|
+
public id: string;
|
|
6
|
+
public resourceId: string;
|
|
7
|
+
|
|
8
|
+
public level: TAccessLevel[] = [];
|
|
9
|
+
public candidate: IAccessCandidate;
|
|
10
|
+
|
|
11
|
+
constructor(object?: IAccessRequest | IAccessCandidate) {
|
|
12
|
+
if (!object) {
|
|
13
|
+
this.id = 'aclR:' + uid();
|
|
14
|
+
}
|
|
15
|
+
if (['role', 'id'].every((k) => k in object)) {
|
|
16
|
+
//this is a candidate
|
|
17
|
+
this.id = 'aclR:' + uid();
|
|
18
|
+
this.candidate = object as IAccessCandidate;
|
|
19
|
+
} else {
|
|
20
|
+
const acReq: AccessRequest = object as AccessRequest;
|
|
21
|
+
this.id = acReq.id;
|
|
22
|
+
//this.resourceId = acReq.resourceId;
|
|
23
|
+
this.level = acReq.level;
|
|
24
|
+
this.candidate = acReq.candidate;
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
this.resourceId = undefined;
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
public static clone(request: IAccessRequest): AccessRequest {
|
|
31
|
+
return new AccessRequest(request);
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
public setLevel(level: TAccessLevel | TAccessLevel[]): AccessRequest {
|
|
35
|
+
this.level = Array.isArray(level) ? level : [level];
|
|
36
|
+
return this;
|
|
37
|
+
}
|
|
38
|
+
public addLevel(level: TAccessLevel | TAccessLevel[]): AccessRequest {
|
|
39
|
+
this.level = [...this.level, ...(Array.isArray(level) ? level : [level])];
|
|
40
|
+
return this;
|
|
41
|
+
}
|
|
42
|
+
public resource(resourceId: string): AccessRequest {
|
|
43
|
+
this.resourceId = resourceId;
|
|
44
|
+
|
|
45
|
+
return this;
|
|
46
|
+
}
|
|
47
|
+
public setCandidate(candidate: IAccessCandidate): AccessRequest {
|
|
48
|
+
this.candidate = candidate;
|
|
49
|
+
|
|
50
|
+
return this;
|
|
51
|
+
}
|
|
52
|
+
}
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
import { Connector } from '@sre/Core/Connector.class';
|
|
2
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
3
|
+
import { IAccessCandidate, TAccessRole } from '@sre/types/ACL.types';
|
|
4
|
+
import { AccessCandidate } from '../AccessControl/AccessCandidate.class';
|
|
5
|
+
import { KeyValueObject } from '@sre/types/Common.types';
|
|
6
|
+
import { ACL } from '../AccessControl/ACL.class';
|
|
7
|
+
|
|
8
|
+
export interface ISmythAccountRequest {
|
|
9
|
+
isTeamMember(teamId: string): Promise<boolean>;
|
|
10
|
+
getCandidateTeam(): Promise<string | undefined>;
|
|
11
|
+
getAllTeamSettings(): Promise<KeyValueObject>;
|
|
12
|
+
getAllUserSettings(): Promise<KeyValueObject>;
|
|
13
|
+
getTeamSetting(settingKey: string): Promise<string>;
|
|
14
|
+
getUserSetting(settingKey: string): Promise<string>;
|
|
15
|
+
getAgentSetting(settingKey: string): Promise<string>;
|
|
16
|
+
getTeam(): Promise<string>;
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
export abstract class AccountConnector extends Connector {
|
|
20
|
+
public requester(candidate: AccessCandidate): ISmythAccountRequest {
|
|
21
|
+
return {
|
|
22
|
+
getAllUserSettings: async () => this.getAllUserSettings(candidate.readRequest, candidate.id),
|
|
23
|
+
getUserSetting: async (settingKey: string) => this.getUserSetting(candidate.readRequest, candidate.id, settingKey),
|
|
24
|
+
getAllTeamSettings: async () => this.getAllTeamSettings(candidate.readRequest, candidate.id),
|
|
25
|
+
getTeamSetting: async (settingKey: string) => this.getTeamSetting(candidate.readRequest, candidate.id, settingKey),
|
|
26
|
+
isTeamMember: async (teamId: string) => this.isTeamMember(teamId, candidate),
|
|
27
|
+
getCandidateTeam: async () => this.getCandidateTeam(candidate),
|
|
28
|
+
getTeam: async () => this.getCandidateTeam(candidate),
|
|
29
|
+
getAgentSetting: async (settingKey: string) => this.getAgentSetting(candidate.readRequest, candidate.id, settingKey),
|
|
30
|
+
};
|
|
31
|
+
}
|
|
32
|
+
public abstract getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL>;
|
|
33
|
+
|
|
34
|
+
public abstract isTeamMember(teamId: string, candidate: IAccessCandidate): Promise<boolean>;
|
|
35
|
+
public abstract getCandidateTeam(candidate: IAccessCandidate): Promise<string | undefined>;
|
|
36
|
+
public abstract getAllTeamSettings(acRequest: AccessRequest, teamId: string): Promise<KeyValueObject>;
|
|
37
|
+
public abstract getAllUserSettings(acRequest: AccessRequest, accountId: string): Promise<KeyValueObject>;
|
|
38
|
+
public abstract getTeamSetting(acRequest: AccessRequest, teamId: string, settingKey: string): Promise<string>;
|
|
39
|
+
public abstract getUserSetting(acRequest: AccessRequest, accountId: string, settingKey: string): Promise<string>;
|
|
40
|
+
public abstract getAgentSetting(acRequest: AccessRequest, agentId: string, settingKey: string): Promise<string>;
|
|
41
|
+
}
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
import mysql from 'mysql2/promise';
|
|
2
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
3
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
4
|
+
import { DEFAULT_TEAM_ID, IAccessCandidate, IACL, TAccessRole } from '@sre/types/ACL.types';
|
|
5
|
+
import { AccountConnector } from '../AccountConnector';
|
|
6
|
+
import { KeyValueObject } from '@sre/types/Common.types';
|
|
7
|
+
|
|
8
|
+
export class AWSAccount extends AccountConnector {
|
|
9
|
+
public name = 'AWSAccount';
|
|
10
|
+
|
|
11
|
+
private pool: mysql.Pool;
|
|
12
|
+
|
|
13
|
+
constructor(protected _settings: any) {
|
|
14
|
+
super(_settings);
|
|
15
|
+
|
|
16
|
+
this.pool = mysql.createPool({
|
|
17
|
+
host: _settings.host,
|
|
18
|
+
database: _settings.database || 'app',
|
|
19
|
+
user: _settings.user || 'app',
|
|
20
|
+
password: _settings.password,
|
|
21
|
+
connectionLimit: 10,
|
|
22
|
+
});
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
public isTeamMember(team: string, candidate: IAccessCandidate): Promise<boolean> {
|
|
26
|
+
return Promise.resolve(true);
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
public getCandidateTeam(candidate: IAccessCandidate): Promise<string | undefined> {
|
|
30
|
+
if (candidate.role === TAccessRole.Team) {
|
|
31
|
+
return Promise.resolve(candidate.id);
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
return Promise.resolve(DEFAULT_TEAM_ID);
|
|
35
|
+
}
|
|
36
|
+
|
|
37
|
+
public async getAllTeamSettings(acRequest: AccessRequest, teamId: string): Promise<KeyValueObject[]> {
|
|
38
|
+
try {
|
|
39
|
+
const [rows] = await this.pool.execute('SELECT `key`, `value` FROM TeamSettings');
|
|
40
|
+
const settings: KeyValueObject[] = [];
|
|
41
|
+
if (Array.isArray(rows) && rows.length > 0) {
|
|
42
|
+
settings.push(...rows.map((row) => ({ key: row.key, value: row.value })));
|
|
43
|
+
}
|
|
44
|
+
return settings;
|
|
45
|
+
} catch (error) {
|
|
46
|
+
console.error('Error in getTeamSetting:', error);
|
|
47
|
+
return [] as KeyValueObject[];
|
|
48
|
+
}
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
public async getTeamSetting(acRequest: AccessRequest, teamId: string, settingKey: string): Promise<string> {
|
|
52
|
+
try {
|
|
53
|
+
const [rows] = await this.pool.execute('SELECT `value` FROM TeamSettings WHERE `key` = ? LIMIT 1', [settingKey]);
|
|
54
|
+
if (Array.isArray(rows) && rows.length > 0 && 'value' in rows[0]) return rows[0].value;
|
|
55
|
+
return '';
|
|
56
|
+
} catch (error) {
|
|
57
|
+
console.error('Error in getTeamSetting:', error);
|
|
58
|
+
return '';
|
|
59
|
+
}
|
|
60
|
+
}
|
|
61
|
+
|
|
62
|
+
// TODO: Implement this
|
|
63
|
+
public getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL> {
|
|
64
|
+
throw new Error('getResourceACL Method not implemented.');
|
|
65
|
+
}
|
|
66
|
+
public getAllUserSettings(acRequest: AccessRequest, accountId: string): Promise<KeyValueObject[]> {
|
|
67
|
+
throw new Error('getAllUserSettings Method not implemented.');
|
|
68
|
+
}
|
|
69
|
+
public getUserSetting(acRequest: AccessRequest, accountId: string, settingKey: string): Promise<string> {
|
|
70
|
+
throw new Error('getUserSetting Method not implemented.');
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
public getAgentSetting(acRequest: AccessRequest, agentId: string, settingKey: string): Promise<string> {
|
|
74
|
+
throw new Error('getAgentSetting Method not implemented.');
|
|
75
|
+
}
|
|
76
|
+
}
|
|
@@ -0,0 +1,130 @@
|
|
|
1
|
+
import { Connector } from '@sre/Core/Connector.class';
|
|
2
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
3
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
4
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
6
|
+
import { DEFAULT_TEAM_ID, IAccessCandidate, IACL, TAccessRole } from '@sre/types/ACL.types';
|
|
7
|
+
import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
|
|
8
|
+
import { AccountConnector } from '../AccountConnector';
|
|
9
|
+
import { KeyValueObject } from '@sre/types/Common.types';
|
|
10
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
11
|
+
|
|
12
|
+
const console = Logger('DummyAccount');
|
|
13
|
+
|
|
14
|
+
/*
|
|
15
|
+
data format
|
|
16
|
+
|
|
17
|
+
{
|
|
18
|
+
"team1": {
|
|
19
|
+
users: {
|
|
20
|
+
"user1": {
|
|
21
|
+
"settings": {
|
|
22
|
+
"setting1": "value1",
|
|
23
|
+
"setting2": "value2"
|
|
24
|
+
}
|
|
25
|
+
}
|
|
26
|
+
},
|
|
27
|
+
"agents": {
|
|
28
|
+
"agent1": {
|
|
29
|
+
"settings": {
|
|
30
|
+
"setting1": "value1",
|
|
31
|
+
"setting2": "value2"
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
},
|
|
35
|
+
"settings": {
|
|
36
|
+
"setting1": "value1",
|
|
37
|
+
"setting2": "value2"
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
}
|
|
41
|
+
|
|
42
|
+
*/
|
|
43
|
+
|
|
44
|
+
export class DummyAccount extends AccountConnector {
|
|
45
|
+
public name = 'DummyAccount';
|
|
46
|
+
public data: any = {};
|
|
47
|
+
|
|
48
|
+
constructor(protected _settings?: any) {
|
|
49
|
+
super(_settings);
|
|
50
|
+
this.data = _settings?.data || {};
|
|
51
|
+
if (!this.data[DEFAULT_TEAM_ID]) {
|
|
52
|
+
this.data[DEFAULT_TEAM_ID] = {
|
|
53
|
+
users: {},
|
|
54
|
+
agents: { FAKE_AGENT_ID: {} },
|
|
55
|
+
settings: {},
|
|
56
|
+
};
|
|
57
|
+
}
|
|
58
|
+
if (!this.data[DEFAULT_TEAM_ID])
|
|
59
|
+
console.warn(
|
|
60
|
+
'You are using the DummyAccount connector. This is a development tool and should not be used in production if you have security concerns.'
|
|
61
|
+
);
|
|
62
|
+
}
|
|
63
|
+
|
|
64
|
+
public isTeamMember(team: string, candidate: IAccessCandidate): Promise<boolean> {
|
|
65
|
+
if (team === DEFAULT_TEAM_ID) {
|
|
66
|
+
return Promise.resolve(true);
|
|
67
|
+
}
|
|
68
|
+
|
|
69
|
+
switch (candidate.role) {
|
|
70
|
+
case TAccessRole.Team:
|
|
71
|
+
return Promise.resolve(team === candidate.id);
|
|
72
|
+
case TAccessRole.User:
|
|
73
|
+
return Promise.resolve(this.data[team]?.users?.[candidate.id]);
|
|
74
|
+
case TAccessRole.Agent:
|
|
75
|
+
return Promise.resolve(this.data[team]?.agents?.[candidate.id]);
|
|
76
|
+
default:
|
|
77
|
+
return Promise.resolve(false);
|
|
78
|
+
}
|
|
79
|
+
}
|
|
80
|
+
public getCandidateTeam(candidate: IAccessCandidate): Promise<string | undefined> {
|
|
81
|
+
if (candidate.role === TAccessRole.Team) {
|
|
82
|
+
return Promise.resolve(candidate.id);
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
//lookup the team id for the user or agent
|
|
86
|
+
for (const team in this.data) {
|
|
87
|
+
if (candidate.role === TAccessRole.User && this.data[team]?.users?.[candidate.id]) {
|
|
88
|
+
return Promise.resolve(team);
|
|
89
|
+
}
|
|
90
|
+
if (candidate.role === TAccessRole.Agent && this.data[team]?.agents?.[candidate.id]) {
|
|
91
|
+
return Promise.resolve(team);
|
|
92
|
+
}
|
|
93
|
+
}
|
|
94
|
+
return Promise.resolve(DEFAULT_TEAM_ID);
|
|
95
|
+
}
|
|
96
|
+
|
|
97
|
+
public getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL> {
|
|
98
|
+
throw new Error('getResourceACL Method not implemented.');
|
|
99
|
+
}
|
|
100
|
+
public getAllTeamSettings(acRequest: AccessRequest, teamId: string): Promise<KeyValueObject[]> {
|
|
101
|
+
return Promise.resolve(this.data[teamId]?.settings);
|
|
102
|
+
}
|
|
103
|
+
public getAllUserSettings(acRequest: AccessRequest, accountId: string): Promise<KeyValueObject[]> {
|
|
104
|
+
for (const team in this.data) {
|
|
105
|
+
if (this.data[team]?.users?.[accountId]) {
|
|
106
|
+
return Promise.resolve(this.data[team]?.users?.[accountId]?.settings);
|
|
107
|
+
}
|
|
108
|
+
}
|
|
109
|
+
return Promise.resolve([]);
|
|
110
|
+
}
|
|
111
|
+
public getTeamSetting(acRequest: AccessRequest, teamId: string, settingKey: string): Promise<string> {
|
|
112
|
+
return Promise.resolve(this.data[teamId]?.settings?.[settingKey]);
|
|
113
|
+
}
|
|
114
|
+
public getUserSetting(acRequest: AccessRequest, accountId: string, settingKey: string): Promise<string> {
|
|
115
|
+
for (const team in this.data) {
|
|
116
|
+
if (this.data[team]?.users?.[accountId]) {
|
|
117
|
+
return Promise.resolve(this.data[team]?.users?.[accountId]?.settings?.[settingKey]);
|
|
118
|
+
}
|
|
119
|
+
}
|
|
120
|
+
return Promise.resolve(undefined);
|
|
121
|
+
}
|
|
122
|
+
public getAgentSetting(acRequest: AccessRequest, agentId: string, settingKey: string): Promise<string> {
|
|
123
|
+
for (const team in this.data) {
|
|
124
|
+
if (this.data[team]?.agents?.[agentId]) {
|
|
125
|
+
return Promise.resolve(this.data[team]?.agents?.[agentId]?.settings?.[settingKey]);
|
|
126
|
+
}
|
|
127
|
+
}
|
|
128
|
+
return Promise.resolve(undefined);
|
|
129
|
+
}
|
|
130
|
+
}
|
|
@@ -0,0 +1,159 @@
|
|
|
1
|
+
import { Connector } from '@sre/Core/Connector.class';
|
|
2
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
3
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
4
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
6
|
+
import { DEFAULT_TEAM_ID, IAccessCandidate, IACL, TAccessRole } from '@sre/types/ACL.types';
|
|
7
|
+
import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
|
|
8
|
+
import { AccountConnector } from '../AccountConnector';
|
|
9
|
+
import { KeyValueObject } from '@sre/types/Common.types';
|
|
10
|
+
import * as fs from 'fs';
|
|
11
|
+
import * as path from 'path';
|
|
12
|
+
|
|
13
|
+
/*
|
|
14
|
+
JSONAccount format
|
|
15
|
+
|
|
16
|
+
{
|
|
17
|
+
"team1": {
|
|
18
|
+
users: {
|
|
19
|
+
"user1": {
|
|
20
|
+
"settings": {
|
|
21
|
+
"setting1": "value1",
|
|
22
|
+
"setting2": "value2"
|
|
23
|
+
}
|
|
24
|
+
}
|
|
25
|
+
},
|
|
26
|
+
"agents": {
|
|
27
|
+
"agent1": {
|
|
28
|
+
"settings": {
|
|
29
|
+
"setting1": "value1",
|
|
30
|
+
"setting2": "value2"
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
},
|
|
34
|
+
"settings": {
|
|
35
|
+
"setting1": "value1",
|
|
36
|
+
"setting2": "value2"
|
|
37
|
+
}
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
*/
|
|
42
|
+
|
|
43
|
+
export type TJSONFileAccountSettings = {
|
|
44
|
+
file: string;
|
|
45
|
+
};
|
|
46
|
+
|
|
47
|
+
export class JSONFileAccount extends AccountConnector {
|
|
48
|
+
public name = 'JSONFileAccount';
|
|
49
|
+
private data: any = {};
|
|
50
|
+
private file: string;
|
|
51
|
+
|
|
52
|
+
constructor(protected _settings: TJSONFileAccountSettings) {
|
|
53
|
+
super(_settings);
|
|
54
|
+
this.file = _settings.file;
|
|
55
|
+
this.loadData();
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
private loadData() {
|
|
59
|
+
try {
|
|
60
|
+
const fileContent = fs.readFileSync(this.file, 'utf-8');
|
|
61
|
+
this.data = JSON.parse(fileContent);
|
|
62
|
+
} catch (error) {
|
|
63
|
+
console.error('Error loading JSON account data:', error);
|
|
64
|
+
this.data = {};
|
|
65
|
+
}
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
private saveData() {
|
|
69
|
+
try {
|
|
70
|
+
fs.writeFileSync(this.file, JSON.stringify(this.data, null, 2));
|
|
71
|
+
} catch (error) {
|
|
72
|
+
console.error('Error saving JSON account data:', error);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
public async isTeamMember(team: string, candidate: IAccessCandidate): Promise<boolean> {
|
|
77
|
+
if (!this.data[team]) return false;
|
|
78
|
+
|
|
79
|
+
if (candidate.role === TAccessRole.User) {
|
|
80
|
+
return !!this.data[team].users?.[candidate.id];
|
|
81
|
+
} else if (candidate.role === TAccessRole.Agent) {
|
|
82
|
+
return !!this.data[team].agents?.[candidate.id];
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
return false;
|
|
86
|
+
}
|
|
87
|
+
|
|
88
|
+
public async getCandidateTeam(candidate: IAccessCandidate): Promise<string | undefined> {
|
|
89
|
+
if (candidate.role === TAccessRole.Team) {
|
|
90
|
+
return candidate.id;
|
|
91
|
+
}
|
|
92
|
+
|
|
93
|
+
// Search through all teams to find where the candidate belongs
|
|
94
|
+
for (const [teamId, teamData] of Object.entries(this.data)) {
|
|
95
|
+
const typedTeamData = teamData as { users?: Record<string, any>; agents?: Record<string, any> };
|
|
96
|
+
if (candidate.role === TAccessRole.User && typedTeamData.users?.[candidate.id]) {
|
|
97
|
+
return teamId;
|
|
98
|
+
}
|
|
99
|
+
if (candidate.role === TAccessRole.Agent && typedTeamData.agents?.[candidate.id]) {
|
|
100
|
+
return teamId;
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
return DEFAULT_TEAM_ID;
|
|
105
|
+
}
|
|
106
|
+
|
|
107
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL> {
|
|
108
|
+
throw new Error('getResourceACL Method not implemented.');
|
|
109
|
+
}
|
|
110
|
+
|
|
111
|
+
public async getAllTeamSettings(acRequest: AccessRequest, teamId: string): Promise<KeyValueObject[]> {
|
|
112
|
+
if (!this.data[teamId]?.settings) return [];
|
|
113
|
+
|
|
114
|
+
return Object.entries(this.data[teamId].settings).map(([key, value]) => ({
|
|
115
|
+
key,
|
|
116
|
+
value: value as string,
|
|
117
|
+
}));
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
public async getAllUserSettings(acRequest: AccessRequest, accountId: string): Promise<KeyValueObject[]> {
|
|
121
|
+
// Search through all teams to find user settings
|
|
122
|
+
for (const teamData of Object.values(this.data)) {
|
|
123
|
+
const typedTeamData = teamData as { users?: Record<string, { settings?: Record<string, any> }> };
|
|
124
|
+
if (typedTeamData.users?.[accountId]?.settings) {
|
|
125
|
+
return Object.entries(typedTeamData.users[accountId].settings).map(([key, value]) => ({
|
|
126
|
+
key,
|
|
127
|
+
value: value as string,
|
|
128
|
+
}));
|
|
129
|
+
}
|
|
130
|
+
}
|
|
131
|
+
return [];
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
public async getTeamSetting(acRequest: AccessRequest, teamId: string, settingKey: string): Promise<string> {
|
|
135
|
+
return this.data[teamId]?.settings?.[settingKey] || '';
|
|
136
|
+
}
|
|
137
|
+
|
|
138
|
+
public async getUserSetting(acRequest: AccessRequest, accountId: string, settingKey: string): Promise<string> {
|
|
139
|
+
// Search through all teams to find user setting
|
|
140
|
+
for (const teamData of Object.values(this.data)) {
|
|
141
|
+
const typedTeamData = teamData as { users?: Record<string, { settings?: Record<string, any> }> };
|
|
142
|
+
if (typedTeamData.users?.[accountId]?.settings?.[settingKey]) {
|
|
143
|
+
return typedTeamData.users[accountId].settings[settingKey];
|
|
144
|
+
}
|
|
145
|
+
}
|
|
146
|
+
return '';
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
public async getAgentSetting(acRequest: AccessRequest, agentId: string, settingKey: string): Promise<string> {
|
|
150
|
+
// Search through all teams to find agent setting
|
|
151
|
+
for (const teamData of Object.values(this.data)) {
|
|
152
|
+
const typedTeamData = teamData as { agents?: Record<string, { settings?: Record<string, any> }> };
|
|
153
|
+
if (typedTeamData.agents?.[agentId]?.settings?.[settingKey]) {
|
|
154
|
+
return typedTeamData.agents[agentId].settings[settingKey];
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
return '';
|
|
158
|
+
}
|
|
159
|
+
}
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
//==[ SRE: LLM ]======================
|
|
2
|
+
|
|
3
|
+
import { ConnectorService, ConnectorServiceProvider } from '@sre/Core/ConnectorsService';
|
|
4
|
+
import { TConnectorService } from '@sre/types/SRE.types';
|
|
5
|
+
import { DummyAccount } from './connectors/DummyAccount.class';
|
|
6
|
+
import { AWSAccount } from './connectors/AWSAccount.class';
|
|
7
|
+
import { JSONFileAccount } from './connectors/JSONFileAccount.class';
|
|
8
|
+
export class AccountService extends ConnectorServiceProvider {
|
|
9
|
+
public register() {
|
|
10
|
+
ConnectorService.register(TConnectorService.Account, 'AWSAccount', AWSAccount);
|
|
11
|
+
ConnectorService.register(TConnectorService.Account, 'DummyAccount', DummyAccount);
|
|
12
|
+
ConnectorService.register(TConnectorService.Account, 'JSONFileAccount', JSONFileAccount);
|
|
13
|
+
}
|
|
14
|
+
}
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
import { AccessCandidate } from '../..';
|
|
2
|
+
import { ConnectorService } from '../../Core/ConnectorsService';
|
|
3
|
+
|
|
4
|
+
export type TCredentialsRequest = {
|
|
5
|
+
vaultProvider?: string;
|
|
6
|
+
keyName: string;
|
|
7
|
+
mapping?: {
|
|
8
|
+
[key: string]: string;
|
|
9
|
+
};
|
|
10
|
+
};
|
|
11
|
+
|
|
12
|
+
/**
|
|
13
|
+
* Get credentials from a vault
|
|
14
|
+
*
|
|
15
|
+
* @param candidate - The candidate requesting the credentials
|
|
16
|
+
* @param credentialsRequest - The credentials request
|
|
17
|
+
* @returns The credentials
|
|
18
|
+
*/
|
|
19
|
+
export async function getCredentials(
|
|
20
|
+
candidate: AccessCandidate,
|
|
21
|
+
credentialsRequest: TCredentialsRequest | string
|
|
22
|
+
): Promise<string | Record<string, any>> {
|
|
23
|
+
if (typeof credentialsRequest === 'string') {
|
|
24
|
+
credentialsRequest = {
|
|
25
|
+
vaultProvider: '', //default vault provider
|
|
26
|
+
keyName: credentialsRequest, //default key name
|
|
27
|
+
};
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
const vaultConnector = ConnectorService.getVaultConnector(credentialsRequest.vaultProvider || '');
|
|
31
|
+
const vaultRequester = vaultConnector.requester(candidate);
|
|
32
|
+
const credentials = await vaultRequester.get(credentialsRequest.keyName);
|
|
33
|
+
|
|
34
|
+
if (!credentialsRequest.mapping) return credentials;
|
|
35
|
+
|
|
36
|
+
const mappedCredentials = {};
|
|
37
|
+
for (const [key, value] of Object.entries(credentialsRequest.mapping)) {
|
|
38
|
+
mappedCredentials[key] = JSONExpression(credentials, value);
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
return mappedCredentials;
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
/**
|
|
45
|
+
* @param obj - The object to extract the property from
|
|
46
|
+
* @param propertyString - The property to extract from the object
|
|
47
|
+
* @returns The property value
|
|
48
|
+
*/
|
|
49
|
+
function JSONExpression(obj, propertyString) {
|
|
50
|
+
const properties = propertyString.split(/\.|\[|\]\.|\]\[|\]/).filter(Boolean);
|
|
51
|
+
let currentProperty = obj;
|
|
52
|
+
|
|
53
|
+
for (let property of properties) {
|
|
54
|
+
if (currentProperty === undefined || currentProperty === null) {
|
|
55
|
+
return undefined;
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
currentProperty = currentProperty[property];
|
|
59
|
+
}
|
|
60
|
+
|
|
61
|
+
return currentProperty;
|
|
62
|
+
}
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
2
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
3
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
4
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
5
|
+
import { IAccessCandidate, IACL } from '@sre/types/ACL.types';
|
|
6
|
+
|
|
7
|
+
/**
|
|
8
|
+
* The managed vault is a vault that is managed by the SRE, its keys are not visible to the user.
|
|
9
|
+
* it's used to store generated tokens at runtime, like OAuth tokens
|
|
10
|
+
*/
|
|
11
|
+
|
|
12
|
+
export interface IManagedVaultRequest {
|
|
13
|
+
get(keyId: string): Promise<string>;
|
|
14
|
+
set(keyId: string, value: string): Promise<void>;
|
|
15
|
+
delete(keyId: string): Promise<void>;
|
|
16
|
+
exists(keyId: string): Promise<boolean>;
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
export abstract class ManagedVaultConnector extends SecureConnector {
|
|
20
|
+
requester(candidate: AccessCandidate): IManagedVaultRequest {
|
|
21
|
+
return {
|
|
22
|
+
get: async (keyId: string) => this.get(candidate.readRequest, keyId),
|
|
23
|
+
set: async (keyId: string, value: string) => this.set(candidate.writeRequest, keyId, value),
|
|
24
|
+
delete: async (keyId: string) => this.delete(candidate.writeRequest, keyId),
|
|
25
|
+
exists: async (keyId: string) => this.exists(candidate.readRequest, keyId),
|
|
26
|
+
};
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
public abstract getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL>;
|
|
30
|
+
protected abstract get(acRequest: AccessRequest, keyId: string): Promise<string>;
|
|
31
|
+
protected abstract set(acRequest: AccessRequest, keyId: string, value: string): Promise<void>;
|
|
32
|
+
protected abstract delete(acRequest: AccessRequest, keyId: string): Promise<void>;
|
|
33
|
+
protected abstract exists(acRequest: AccessRequest, keyId: string): Promise<boolean>;
|
|
34
|
+
}
|