@smythos/sre 1.5.43 → 1.5.45

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. package/CHANGELOG +90 -90
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/index.js +13 -13
  5. package/dist/index.js.map +1 -1
  6. package/dist/types/Components/GenAILLM.class.d.ts +6 -0
  7. package/dist/types/helpers/AWSLambdaCode.helper.d.ts +8 -5
  8. package/dist/types/index.d.ts +1 -0
  9. package/dist/types/subsystems/LLMManager/LLM.service/connectors/Groq.class.d.ts +5 -0
  10. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +13 -1
  11. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.d.ts +0 -4
  12. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.d.ts +44 -29
  13. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.d.ts +4 -2
  14. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.d.ts +6 -0
  15. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/types.d.ts +0 -4
  16. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +39 -0
  17. package/dist/types/types/LLM.types.d.ts +4 -1
  18. package/package.json +5 -2
  19. package/src/Components/APICall/APICall.class.ts +156 -156
  20. package/src/Components/APICall/AccessTokenManager.ts +130 -130
  21. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  22. package/src/Components/APICall/OAuth.helper.ts +294 -294
  23. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  24. package/src/Components/APICall/parseData.ts +167 -167
  25. package/src/Components/APICall/parseHeaders.ts +41 -41
  26. package/src/Components/APICall/parseProxy.ts +68 -68
  27. package/src/Components/APICall/parseUrl.ts +91 -91
  28. package/src/Components/APIEndpoint.class.ts +234 -234
  29. package/src/Components/APIOutput.class.ts +58 -58
  30. package/src/Components/AgentPlugin.class.ts +102 -102
  31. package/src/Components/Async.class.ts +155 -155
  32. package/src/Components/Await.class.ts +90 -90
  33. package/src/Components/Classifier.class.ts +158 -158
  34. package/src/Components/Component.class.ts +132 -132
  35. package/src/Components/ComponentHost.class.ts +38 -38
  36. package/src/Components/DataSourceCleaner.class.ts +92 -92
  37. package/src/Components/DataSourceIndexer.class.ts +181 -181
  38. package/src/Components/DataSourceLookup.class.ts +161 -161
  39. package/src/Components/ECMASandbox.class.ts +71 -71
  40. package/src/Components/FEncDec.class.ts +29 -29
  41. package/src/Components/FHash.class.ts +33 -33
  42. package/src/Components/FSign.class.ts +80 -80
  43. package/src/Components/FSleep.class.ts +25 -25
  44. package/src/Components/FTimestamp.class.ts +25 -25
  45. package/src/Components/FileStore.class.ts +78 -78
  46. package/src/Components/ForEach.class.ts +97 -97
  47. package/src/Components/GPTPlugin.class.ts +70 -70
  48. package/src/Components/GenAILLM.class.ts +586 -579
  49. package/src/Components/HuggingFace.class.ts +314 -314
  50. package/src/Components/Image/imageSettings.config.ts +70 -70
  51. package/src/Components/ImageGenerator.class.ts +502 -502
  52. package/src/Components/JSONFilter.class.ts +54 -54
  53. package/src/Components/LLMAssistant.class.ts +213 -213
  54. package/src/Components/LogicAND.class.ts +28 -28
  55. package/src/Components/LogicAtLeast.class.ts +85 -85
  56. package/src/Components/LogicAtMost.class.ts +86 -86
  57. package/src/Components/LogicOR.class.ts +29 -29
  58. package/src/Components/LogicXOR.class.ts +34 -34
  59. package/src/Components/MCPClient.class.ts +112 -112
  60. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  61. package/src/Components/MemoryReadKeyVal.class.ts +66 -66
  62. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  63. package/src/Components/MemoryWriteObject.class.ts +97 -97
  64. package/src/Components/MultimodalLLM.class.ts +128 -128
  65. package/src/Components/OpenAPI.class.ts +72 -72
  66. package/src/Components/PromptGenerator.class.ts +122 -122
  67. package/src/Components/ScrapflyWebScrape.class.ts +159 -159
  68. package/src/Components/ServerlessCode.class.ts +123 -123
  69. package/src/Components/TavilyWebSearch.class.ts +98 -98
  70. package/src/Components/VisionLLM.class.ts +104 -104
  71. package/src/Components/ZapierAction.class.ts +127 -127
  72. package/src/Components/index.ts +97 -97
  73. package/src/Core/AgentProcess.helper.ts +240 -240
  74. package/src/Core/Connector.class.ts +123 -123
  75. package/src/Core/ConnectorsService.ts +197 -197
  76. package/src/Core/DummyConnector.ts +49 -49
  77. package/src/Core/HookService.ts +105 -105
  78. package/src/Core/SmythRuntime.class.ts +235 -235
  79. package/src/Core/SystemEvents.ts +16 -16
  80. package/src/Core/boot.ts +56 -56
  81. package/src/config.ts +15 -15
  82. package/src/constants.ts +126 -126
  83. package/src/data/hugging-face.params.json +579 -579
  84. package/src/helpers/AWSLambdaCode.helper.ts +588 -528
  85. package/src/helpers/BinaryInput.helper.ts +331 -331
  86. package/src/helpers/Conversation.helper.ts +1119 -1119
  87. package/src/helpers/ECMASandbox.helper.ts +54 -54
  88. package/src/helpers/JsonContent.helper.ts +97 -97
  89. package/src/helpers/LocalCache.helper.ts +97 -97
  90. package/src/helpers/Log.helper.ts +274 -274
  91. package/src/helpers/OpenApiParser.helper.ts +150 -150
  92. package/src/helpers/S3Cache.helper.ts +147 -147
  93. package/src/helpers/SmythURI.helper.ts +5 -5
  94. package/src/helpers/Sysconfig.helper.ts +77 -77
  95. package/src/helpers/TemplateString.helper.ts +243 -243
  96. package/src/helpers/TypeChecker.helper.ts +329 -329
  97. package/src/index.ts +4 -3
  98. package/src/index.ts.bak +4 -3
  99. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  100. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  101. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  102. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  103. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
  104. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  105. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  106. package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
  107. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  108. package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
  109. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  110. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  111. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  112. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  113. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  114. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  115. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  116. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  117. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  118. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -170
  119. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  120. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  121. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  122. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  123. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  124. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  125. package/src/subsystems/IO/Log.service/index.ts +13 -13
  126. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  127. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  128. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  129. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  130. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  131. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  132. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  133. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  134. package/src/subsystems/IO/Router.service/index.ts +11 -11
  135. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
  136. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  137. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  138. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  139. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  140. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  141. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
  142. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
  143. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
  144. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  145. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  146. package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
  147. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  148. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  149. package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
  150. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
  151. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  152. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
  153. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
  154. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
  155. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
  156. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -291
  157. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
  158. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -455
  160. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +528 -528
  161. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  162. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  163. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1168 -853
  164. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -37
  165. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  166. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -0
  167. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -37
  168. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
  169. package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
  170. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
  171. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
  172. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  173. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  174. package/src/subsystems/LLMManager/models.ts +2540 -2540
  175. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  176. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  177. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  178. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
  179. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  180. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  181. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  182. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  183. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  184. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  185. package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
  186. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  187. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  188. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  189. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  190. package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
  191. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  192. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
  193. package/src/subsystems/Security/Account.service/index.ts +14 -14
  194. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  195. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  196. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  197. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  198. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  199. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  200. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  201. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  202. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  203. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  204. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  205. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  206. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  207. package/src/types/ACL.types.ts +104 -104
  208. package/src/types/AWS.types.ts +10 -10
  209. package/src/types/Agent.types.ts +61 -61
  210. package/src/types/AgentLogger.types.ts +17 -17
  211. package/src/types/Cache.types.ts +1 -1
  212. package/src/types/Common.types.ts +2 -2
  213. package/src/types/LLM.types.ts +496 -491
  214. package/src/types/Redis.types.ts +8 -8
  215. package/src/types/SRE.types.ts +64 -64
  216. package/src/types/Security.types.ts +14 -14
  217. package/src/types/Storage.types.ts +5 -5
  218. package/src/types/VectorDB.types.ts +86 -86
  219. package/src/utils/base64.utils.ts +275 -275
  220. package/src/utils/cli.utils.ts +68 -68
  221. package/src/utils/data.utils.ts +322 -322
  222. package/src/utils/date-time.utils.ts +22 -22
  223. package/src/utils/general.utils.ts +238 -238
  224. package/src/utils/index.ts +12 -12
  225. package/src/utils/lazy-client.ts +261 -261
  226. package/src/utils/numbers.utils.ts +13 -13
  227. package/src/utils/oauth.utils.ts +35 -35
  228. package/src/utils/string.utils.ts +414 -414
  229. package/src/utils/url.utils.ts +19 -19
  230. package/src/utils/validation.utils.ts +74 -74
  231. package/dist/bundle-analysis-lazy.html +0 -4949
  232. package/dist/bundle-analysis.html +0 -4949
  233. package/dist/types/utils/package-manager.utils.d.ts +0 -26
@@ -1,327 +1,327 @@
1
- //==[ SRE: LocalStorage ]======================
2
-
3
- import { Logger } from '@sre/helpers/Log.helper';
4
- import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
5
- import { ACL } from '@sre/Security/AccessControl/ACL.class';
6
- import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
7
- import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
8
- //import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
9
- import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
10
- import { SecureConnector } from '@sre/Security/SecureConnector.class';
11
- import fs, { existsSync } from 'fs';
12
- import os from 'os';
13
- import path from 'path';
14
- import { findSmythPath } from '../../../..';
15
-
16
- const console = Logger('LocalStorage');
17
-
18
- export type LocalStorageConfig = {
19
- /**
20
- * The folder to use for the local storage.
21
- *
22
- * If not provided, the default folder will be used.
23
- * The default folder is ~/.smyth/storage
24
- */
25
- folder?: string;
26
- };
27
-
28
- //TODO : detect and store ContentType metadata when saving
29
-
30
- export class LocalStorage extends StorageConnector {
31
- public name = 'LocalStorage';
32
- private folder: string;
33
- private storagePrefix = 'local';
34
- private metadataPrefix = '.local.metadata';
35
- private isInitialized = false;
36
-
37
- constructor(protected _settings?: LocalStorageConfig) {
38
- super(_settings);
39
- //if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
40
-
41
- this.folder = this.findStorageFolder(_settings?.folder);
42
- this.initialize();
43
- if (!fs.existsSync(this.folder)) {
44
- //throw new Error('Invalid folder provided');
45
- console.error(`Invalid folder provided: ${this.folder}`);
46
- }
47
- }
48
-
49
- private findStorageFolder(folder) {
50
- let _storageFolder = folder;
51
-
52
- if (fs.existsSync(_storageFolder)) {
53
- return _storageFolder;
54
- }
55
-
56
- _storageFolder = findSmythPath('storage');
57
-
58
- if (fs.existsSync(_storageFolder)) {
59
- console.warn('Using alternative storage folder found in : ', _storageFolder);
60
- return _storageFolder;
61
- }
62
-
63
- console.warn('!!! All attempts to find an existing storage folder failed !!!');
64
- console.warn('!!! I will use this folder: ', _storageFolder);
65
- return _storageFolder;
66
- }
67
-
68
- /**
69
- * Reads an object from the local storage.
70
- *
71
- * @param {string} resourceId - The key of the object to be read.
72
- * @returns {Promise<any>} - A promise that resolves with the object data.
73
- */
74
-
75
- @SecureConnector.AccessControl
76
- public async read(acRequest: AccessRequest, resourceId: string) {
77
- if (!this.isInitialized) {
78
- await this.initialize();
79
- }
80
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
81
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
82
- try {
83
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
84
- if (!fs.existsSync(filePath)) return undefined;
85
- const data = fs.readFileSync(filePath, null);
86
- return data;
87
- } catch (error) {
88
- console.error(`Error reading object from local storage`, error.name, error.message);
89
- throw error;
90
- }
91
- }
92
-
93
- @SecureConnector.AccessControl
94
- async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
95
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
96
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
97
-
98
- try {
99
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
100
- if (!fs.existsSync(metadataFilePath)) return undefined;
101
- const data = fs.readFileSync(metadataFilePath, 'utf-8');
102
- return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
103
- } catch (error) {
104
- console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
105
- throw error;
106
- }
107
- }
108
-
109
- @SecureConnector.AccessControl
110
- async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
111
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
112
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
113
-
114
- try {
115
- let fileMetadata = await this.getMetadata(acRequest, resourceId);
116
- if (!fileMetadata) fileMetadata = {};
117
-
118
- fileMetadata = { ...fileMetadata, ...metadata };
119
-
120
- //now we can write the metadata
121
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
122
- const serializedMetadata = this.serializeMetadata(fileMetadata);
123
- fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
124
- } catch (error) {
125
- console.error(`Error setting metadata in local storage`, error.name, error.message);
126
- throw error;
127
- }
128
- }
129
- /**
130
- * Writes an object to the local storage.
131
- *
132
- * @param {string} resourceId - The key of the object to be written.
133
- * @param {any} value - The value of the object to be written.
134
- * @param {Metadata} metadata - Optional metadata to be associated with the object.
135
- * @returns {Promise<void>} - A promise that resolves when the object has been written.
136
- */
137
- @SecureConnector.AccessControl
138
- async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
139
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
140
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
141
- if (!this.isInitialized) {
142
- await this.initialize();
143
- }
144
- const accessCandidate = acRequest.candidate;
145
-
146
- let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
147
- let fileMetadata = {
148
- ...metadata,
149
- acl: localACL,
150
- };
151
-
152
- //now we can write the file
153
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
154
- fs.writeFileSync(filePath, value as Buffer);
155
- //now we can write the metadata
156
- await this.setMetadata(acRequest, resourceId, fileMetadata);
157
- }
158
-
159
- /**
160
- * Deletes an object from the local storage.
161
- *
162
- * @param {string} resourceId - The key of the object to be deleted.
163
- * @returns {Promise<void>} - A promise that resolves when the object has been deleted.
164
- */
165
- @SecureConnector.AccessControl
166
- async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
167
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
168
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
169
-
170
- try {
171
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
172
- if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
173
-
174
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
175
- if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
176
- } catch (error) {
177
- console.error(`Error deleting object from local storage`, error.name, error.message);
178
- throw error;
179
- }
180
- }
181
-
182
- @SecureConnector.AccessControl
183
- async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
184
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
185
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
186
- if (!this.isInitialized) {
187
- await this.initialize();
188
- }
189
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
190
- return !!fs.existsSync(filePath);
191
- }
192
-
193
- //this determines the access rights for the requested resource
194
- //the connector should check if the resource exists or not
195
- //if the resource exists we read it's ACL and return it
196
- //if the resource does not exist we return an write access ACL for the candidate
197
- public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
198
- if (!this.isInitialized) {
199
- await this.initialize();
200
- }
201
- const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
202
-
203
- if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
204
-
205
- const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
206
- const exists = metadata !== undefined; //undefined metadata means the resource does not exist
207
-
208
- if (!exists) {
209
- //the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
210
- return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
211
- }
212
- try {
213
- let metadataObject = JSON.parse(metadata);
214
- return ACL.from(metadataObject?.['acl'] as IACL);
215
- } catch (error) {
216
- console.error(`Error parsing metadata in local storage`, error.name, error.message);
217
- throw error;
218
- }
219
- }
220
-
221
- @SecureConnector.AccessControl
222
- async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
223
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
224
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
225
-
226
- try {
227
- const fileMetadata = await this.getMetadata(acRequest, resourceId);
228
- return ACL.from(fileMetadata?.['acl'] as IACL);
229
- } catch (error) {
230
- console.error(`Error getting access rights in local storage`, error.name, error.message);
231
- throw error;
232
- }
233
- }
234
-
235
- @SecureConnector.AccessControl
236
- async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
237
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
238
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
239
-
240
- try {
241
- let fileMetadata = await this.getMetadata(acRequest, resourceId);
242
- if (!fileMetadata) fileMetadata = {};
243
- //when setting ACL make sure to not lose ownership
244
- fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
245
- await this.setMetadata(acRequest, resourceId, fileMetadata);
246
- } catch (error) {
247
- console.error(`Error setting access rights in local storage`, error);
248
- throw error;
249
- }
250
- }
251
-
252
- @SecureConnector.AccessControl
253
- async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
254
- console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
255
- }
256
-
257
- private async initialize() {
258
- const storageFolderPath = path.join(this.folder, this.storagePrefix);
259
- if (!existsSync(storageFolderPath)) {
260
- fs.mkdirSync(storageFolderPath, { recursive: true });
261
- }
262
- const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
263
- if (!existsSync(metadataFolderPath)) {
264
- fs.mkdirSync(metadataFolderPath, { recursive: true });
265
- fs.writeFileSync(
266
- path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
267
- 'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
268
- );
269
- }
270
- this.isInitialized = true;
271
- }
272
-
273
- private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
274
- const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
275
- const folder = path.dirname(fullPath);
276
- if (createFoldersIfNotExists && !fs.existsSync(folder)) {
277
- fs.mkdirSync(folder, { recursive: true });
278
- }
279
-
280
- return fullPath;
281
- }
282
-
283
- private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
284
- const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
285
- const folder = path.dirname(fullPath);
286
- if (createFoldersIfNotExists && !fs.existsSync(folder)) {
287
- fs.mkdirSync(folder, { recursive: true });
288
- }
289
-
290
- return fullPath;
291
- }
292
-
293
- private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
294
- let updatedMetadata = {};
295
- if (metadata['acl']) {
296
- if (metadata['acl']) {
297
- updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
298
- }
299
-
300
- delete metadata['acl'];
301
- }
302
-
303
- for (let key in metadata) {
304
- updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
305
- }
306
-
307
- return updatedMetadata;
308
- }
309
-
310
- private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
311
- let deserializedMetadata: Record<string, any> = {};
312
-
313
- for (let key in metadata) {
314
- if (key === 'acl') {
315
- deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
316
- continue;
317
- }
318
-
319
- try {
320
- deserializedMetadata[key] = JSON.parse(metadata[key]);
321
- } catch (error) {
322
- deserializedMetadata[key] = metadata[key];
323
- }
324
- }
325
- return deserializedMetadata;
326
- }
327
- }
1
+ //==[ SRE: LocalStorage ]======================
2
+
3
+ import { Logger } from '@sre/helpers/Log.helper';
4
+ import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
5
+ import { ACL } from '@sre/Security/AccessControl/ACL.class';
6
+ import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
7
+ import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
8
+ //import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
9
+ import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
10
+ import { SecureConnector } from '@sre/Security/SecureConnector.class';
11
+ import fs, { existsSync } from 'fs';
12
+ import os from 'os';
13
+ import path from 'path';
14
+ import { findSmythPath } from '../../../..';
15
+
16
+ const console = Logger('LocalStorage');
17
+
18
+ export type LocalStorageConfig = {
19
+ /**
20
+ * The folder to use for the local storage.
21
+ *
22
+ * If not provided, the default folder will be used.
23
+ * The default folder is ~/.smyth/storage
24
+ */
25
+ folder?: string;
26
+ };
27
+
28
+ //TODO : detect and store ContentType metadata when saving
29
+
30
+ export class LocalStorage extends StorageConnector {
31
+ public name = 'LocalStorage';
32
+ private folder: string;
33
+ private storagePrefix = 'local';
34
+ private metadataPrefix = '.local.metadata';
35
+ private isInitialized = false;
36
+
37
+ constructor(protected _settings?: LocalStorageConfig) {
38
+ super(_settings);
39
+ //if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
40
+
41
+ this.folder = this.findStorageFolder(_settings?.folder);
42
+ this.initialize();
43
+ if (!fs.existsSync(this.folder)) {
44
+ //throw new Error('Invalid folder provided');
45
+ console.error(`Invalid folder provided: ${this.folder}`);
46
+ }
47
+ }
48
+
49
+ private findStorageFolder(folder) {
50
+ let _storageFolder = folder;
51
+
52
+ if (fs.existsSync(_storageFolder)) {
53
+ return _storageFolder;
54
+ }
55
+
56
+ _storageFolder = findSmythPath('storage');
57
+
58
+ if (fs.existsSync(_storageFolder)) {
59
+ console.warn('Using alternative storage folder found in : ', _storageFolder);
60
+ return _storageFolder;
61
+ }
62
+
63
+ console.warn('!!! All attempts to find an existing storage folder failed !!!');
64
+ console.warn('!!! I will use this folder: ', _storageFolder);
65
+ return _storageFolder;
66
+ }
67
+
68
+ /**
69
+ * Reads an object from the local storage.
70
+ *
71
+ * @param {string} resourceId - The key of the object to be read.
72
+ * @returns {Promise<any>} - A promise that resolves with the object data.
73
+ */
74
+
75
+ @SecureConnector.AccessControl
76
+ public async read(acRequest: AccessRequest, resourceId: string) {
77
+ if (!this.isInitialized) {
78
+ await this.initialize();
79
+ }
80
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
81
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
82
+ try {
83
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
84
+ if (!fs.existsSync(filePath)) return undefined;
85
+ const data = fs.readFileSync(filePath, null);
86
+ return data;
87
+ } catch (error) {
88
+ console.error(`Error reading object from local storage`, error.name, error.message);
89
+ throw error;
90
+ }
91
+ }
92
+
93
+ @SecureConnector.AccessControl
94
+ async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
95
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
96
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
97
+
98
+ try {
99
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
100
+ if (!fs.existsSync(metadataFilePath)) return undefined;
101
+ const data = fs.readFileSync(metadataFilePath, 'utf-8');
102
+ return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
103
+ } catch (error) {
104
+ console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
105
+ throw error;
106
+ }
107
+ }
108
+
109
+ @SecureConnector.AccessControl
110
+ async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
111
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
112
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
113
+
114
+ try {
115
+ let fileMetadata = await this.getMetadata(acRequest, resourceId);
116
+ if (!fileMetadata) fileMetadata = {};
117
+
118
+ fileMetadata = { ...fileMetadata, ...metadata };
119
+
120
+ //now we can write the metadata
121
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
122
+ const serializedMetadata = this.serializeMetadata(fileMetadata);
123
+ fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
124
+ } catch (error) {
125
+ console.error(`Error setting metadata in local storage`, error.name, error.message);
126
+ throw error;
127
+ }
128
+ }
129
+ /**
130
+ * Writes an object to the local storage.
131
+ *
132
+ * @param {string} resourceId - The key of the object to be written.
133
+ * @param {any} value - The value of the object to be written.
134
+ * @param {Metadata} metadata - Optional metadata to be associated with the object.
135
+ * @returns {Promise<void>} - A promise that resolves when the object has been written.
136
+ */
137
+ @SecureConnector.AccessControl
138
+ async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
139
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
140
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
141
+ if (!this.isInitialized) {
142
+ await this.initialize();
143
+ }
144
+ const accessCandidate = acRequest.candidate;
145
+
146
+ let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
147
+ let fileMetadata = {
148
+ ...metadata,
149
+ acl: localACL,
150
+ };
151
+
152
+ //now we can write the file
153
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
154
+ fs.writeFileSync(filePath, value as Buffer);
155
+ //now we can write the metadata
156
+ await this.setMetadata(acRequest, resourceId, fileMetadata);
157
+ }
158
+
159
+ /**
160
+ * Deletes an object from the local storage.
161
+ *
162
+ * @param {string} resourceId - The key of the object to be deleted.
163
+ * @returns {Promise<void>} - A promise that resolves when the object has been deleted.
164
+ */
165
+ @SecureConnector.AccessControl
166
+ async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
167
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
168
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
169
+
170
+ try {
171
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
172
+ if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
173
+
174
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
175
+ if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
176
+ } catch (error) {
177
+ console.error(`Error deleting object from local storage`, error.name, error.message);
178
+ throw error;
179
+ }
180
+ }
181
+
182
+ @SecureConnector.AccessControl
183
+ async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
184
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
185
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
186
+ if (!this.isInitialized) {
187
+ await this.initialize();
188
+ }
189
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
190
+ return !!fs.existsSync(filePath);
191
+ }
192
+
193
+ //this determines the access rights for the requested resource
194
+ //the connector should check if the resource exists or not
195
+ //if the resource exists we read it's ACL and return it
196
+ //if the resource does not exist we return an write access ACL for the candidate
197
+ public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
198
+ if (!this.isInitialized) {
199
+ await this.initialize();
200
+ }
201
+ const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
202
+
203
+ if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
204
+
205
+ const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
206
+ const exists = metadata !== undefined; //undefined metadata means the resource does not exist
207
+
208
+ if (!exists) {
209
+ //the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
210
+ return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
211
+ }
212
+ try {
213
+ let metadataObject = JSON.parse(metadata);
214
+ return ACL.from(metadataObject?.['acl'] as IACL);
215
+ } catch (error) {
216
+ console.error(`Error parsing metadata in local storage`, error.name, error.message);
217
+ throw error;
218
+ }
219
+ }
220
+
221
+ @SecureConnector.AccessControl
222
+ async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
223
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
224
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
225
+
226
+ try {
227
+ const fileMetadata = await this.getMetadata(acRequest, resourceId);
228
+ return ACL.from(fileMetadata?.['acl'] as IACL);
229
+ } catch (error) {
230
+ console.error(`Error getting access rights in local storage`, error.name, error.message);
231
+ throw error;
232
+ }
233
+ }
234
+
235
+ @SecureConnector.AccessControl
236
+ async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
237
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
238
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
239
+
240
+ try {
241
+ let fileMetadata = await this.getMetadata(acRequest, resourceId);
242
+ if (!fileMetadata) fileMetadata = {};
243
+ //when setting ACL make sure to not lose ownership
244
+ fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
245
+ await this.setMetadata(acRequest, resourceId, fileMetadata);
246
+ } catch (error) {
247
+ console.error(`Error setting access rights in local storage`, error);
248
+ throw error;
249
+ }
250
+ }
251
+
252
+ @SecureConnector.AccessControl
253
+ async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
254
+ console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
255
+ }
256
+
257
+ private async initialize() {
258
+ const storageFolderPath = path.join(this.folder, this.storagePrefix);
259
+ if (!existsSync(storageFolderPath)) {
260
+ fs.mkdirSync(storageFolderPath, { recursive: true });
261
+ }
262
+ const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
263
+ if (!existsSync(metadataFolderPath)) {
264
+ fs.mkdirSync(metadataFolderPath, { recursive: true });
265
+ fs.writeFileSync(
266
+ path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
267
+ 'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
268
+ );
269
+ }
270
+ this.isInitialized = true;
271
+ }
272
+
273
+ private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
274
+ const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
275
+ const folder = path.dirname(fullPath);
276
+ if (createFoldersIfNotExists && !fs.existsSync(folder)) {
277
+ fs.mkdirSync(folder, { recursive: true });
278
+ }
279
+
280
+ return fullPath;
281
+ }
282
+
283
+ private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
284
+ const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
285
+ const folder = path.dirname(fullPath);
286
+ if (createFoldersIfNotExists && !fs.existsSync(folder)) {
287
+ fs.mkdirSync(folder, { recursive: true });
288
+ }
289
+
290
+ return fullPath;
291
+ }
292
+
293
+ private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
294
+ let updatedMetadata = {};
295
+ if (metadata['acl']) {
296
+ if (metadata['acl']) {
297
+ updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
298
+ }
299
+
300
+ delete metadata['acl'];
301
+ }
302
+
303
+ for (let key in metadata) {
304
+ updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
305
+ }
306
+
307
+ return updatedMetadata;
308
+ }
309
+
310
+ private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
311
+ let deserializedMetadata: Record<string, any> = {};
312
+
313
+ for (let key in metadata) {
314
+ if (key === 'acl') {
315
+ deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
316
+ continue;
317
+ }
318
+
319
+ try {
320
+ deserializedMetadata[key] = JSON.parse(metadata[key]);
321
+ } catch (error) {
322
+ deserializedMetadata[key] = metadata[key];
323
+ }
324
+ }
325
+ return deserializedMetadata;
326
+ }
327
+ }