@smythos/sre 1.5.43 → 1.5.45

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. package/CHANGELOG +90 -90
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/index.js +13 -13
  5. package/dist/index.js.map +1 -1
  6. package/dist/types/Components/GenAILLM.class.d.ts +6 -0
  7. package/dist/types/helpers/AWSLambdaCode.helper.d.ts +8 -5
  8. package/dist/types/index.d.ts +1 -0
  9. package/dist/types/subsystems/LLMManager/LLM.service/connectors/Groq.class.d.ts +5 -0
  10. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +13 -1
  11. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.d.ts +0 -4
  12. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.d.ts +44 -29
  13. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.d.ts +4 -2
  14. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.d.ts +6 -0
  15. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/types.d.ts +0 -4
  16. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +39 -0
  17. package/dist/types/types/LLM.types.d.ts +4 -1
  18. package/package.json +5 -2
  19. package/src/Components/APICall/APICall.class.ts +156 -156
  20. package/src/Components/APICall/AccessTokenManager.ts +130 -130
  21. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  22. package/src/Components/APICall/OAuth.helper.ts +294 -294
  23. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  24. package/src/Components/APICall/parseData.ts +167 -167
  25. package/src/Components/APICall/parseHeaders.ts +41 -41
  26. package/src/Components/APICall/parseProxy.ts +68 -68
  27. package/src/Components/APICall/parseUrl.ts +91 -91
  28. package/src/Components/APIEndpoint.class.ts +234 -234
  29. package/src/Components/APIOutput.class.ts +58 -58
  30. package/src/Components/AgentPlugin.class.ts +102 -102
  31. package/src/Components/Async.class.ts +155 -155
  32. package/src/Components/Await.class.ts +90 -90
  33. package/src/Components/Classifier.class.ts +158 -158
  34. package/src/Components/Component.class.ts +132 -132
  35. package/src/Components/ComponentHost.class.ts +38 -38
  36. package/src/Components/DataSourceCleaner.class.ts +92 -92
  37. package/src/Components/DataSourceIndexer.class.ts +181 -181
  38. package/src/Components/DataSourceLookup.class.ts +161 -161
  39. package/src/Components/ECMASandbox.class.ts +71 -71
  40. package/src/Components/FEncDec.class.ts +29 -29
  41. package/src/Components/FHash.class.ts +33 -33
  42. package/src/Components/FSign.class.ts +80 -80
  43. package/src/Components/FSleep.class.ts +25 -25
  44. package/src/Components/FTimestamp.class.ts +25 -25
  45. package/src/Components/FileStore.class.ts +78 -78
  46. package/src/Components/ForEach.class.ts +97 -97
  47. package/src/Components/GPTPlugin.class.ts +70 -70
  48. package/src/Components/GenAILLM.class.ts +586 -579
  49. package/src/Components/HuggingFace.class.ts +314 -314
  50. package/src/Components/Image/imageSettings.config.ts +70 -70
  51. package/src/Components/ImageGenerator.class.ts +502 -502
  52. package/src/Components/JSONFilter.class.ts +54 -54
  53. package/src/Components/LLMAssistant.class.ts +213 -213
  54. package/src/Components/LogicAND.class.ts +28 -28
  55. package/src/Components/LogicAtLeast.class.ts +85 -85
  56. package/src/Components/LogicAtMost.class.ts +86 -86
  57. package/src/Components/LogicOR.class.ts +29 -29
  58. package/src/Components/LogicXOR.class.ts +34 -34
  59. package/src/Components/MCPClient.class.ts +112 -112
  60. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  61. package/src/Components/MemoryReadKeyVal.class.ts +66 -66
  62. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  63. package/src/Components/MemoryWriteObject.class.ts +97 -97
  64. package/src/Components/MultimodalLLM.class.ts +128 -128
  65. package/src/Components/OpenAPI.class.ts +72 -72
  66. package/src/Components/PromptGenerator.class.ts +122 -122
  67. package/src/Components/ScrapflyWebScrape.class.ts +159 -159
  68. package/src/Components/ServerlessCode.class.ts +123 -123
  69. package/src/Components/TavilyWebSearch.class.ts +98 -98
  70. package/src/Components/VisionLLM.class.ts +104 -104
  71. package/src/Components/ZapierAction.class.ts +127 -127
  72. package/src/Components/index.ts +97 -97
  73. package/src/Core/AgentProcess.helper.ts +240 -240
  74. package/src/Core/Connector.class.ts +123 -123
  75. package/src/Core/ConnectorsService.ts +197 -197
  76. package/src/Core/DummyConnector.ts +49 -49
  77. package/src/Core/HookService.ts +105 -105
  78. package/src/Core/SmythRuntime.class.ts +235 -235
  79. package/src/Core/SystemEvents.ts +16 -16
  80. package/src/Core/boot.ts +56 -56
  81. package/src/config.ts +15 -15
  82. package/src/constants.ts +126 -126
  83. package/src/data/hugging-face.params.json +579 -579
  84. package/src/helpers/AWSLambdaCode.helper.ts +588 -528
  85. package/src/helpers/BinaryInput.helper.ts +331 -331
  86. package/src/helpers/Conversation.helper.ts +1119 -1119
  87. package/src/helpers/ECMASandbox.helper.ts +54 -54
  88. package/src/helpers/JsonContent.helper.ts +97 -97
  89. package/src/helpers/LocalCache.helper.ts +97 -97
  90. package/src/helpers/Log.helper.ts +274 -274
  91. package/src/helpers/OpenApiParser.helper.ts +150 -150
  92. package/src/helpers/S3Cache.helper.ts +147 -147
  93. package/src/helpers/SmythURI.helper.ts +5 -5
  94. package/src/helpers/Sysconfig.helper.ts +77 -77
  95. package/src/helpers/TemplateString.helper.ts +243 -243
  96. package/src/helpers/TypeChecker.helper.ts +329 -329
  97. package/src/index.ts +4 -3
  98. package/src/index.ts.bak +4 -3
  99. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  100. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  101. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  102. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  103. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
  104. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  105. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  106. package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
  107. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  108. package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
  109. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  110. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  111. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  112. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  113. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  114. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  115. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  116. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  117. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  118. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -170
  119. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  120. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  121. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  122. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  123. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  124. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  125. package/src/subsystems/IO/Log.service/index.ts +13 -13
  126. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  127. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  128. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  129. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  130. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  131. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  132. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  133. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  134. package/src/subsystems/IO/Router.service/index.ts +11 -11
  135. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
  136. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  137. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  138. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  139. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  140. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  141. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
  142. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
  143. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
  144. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  145. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  146. package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
  147. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  148. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  149. package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
  150. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
  151. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  152. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
  153. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
  154. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
  155. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
  156. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -291
  157. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
  158. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -455
  160. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +528 -528
  161. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  162. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  163. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1168 -853
  164. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -37
  165. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  166. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -0
  167. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -37
  168. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
  169. package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
  170. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
  171. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
  172. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  173. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  174. package/src/subsystems/LLMManager/models.ts +2540 -2540
  175. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  176. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  177. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  178. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
  179. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  180. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  181. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  182. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  183. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  184. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  185. package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
  186. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  187. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  188. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  189. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  190. package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
  191. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  192. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
  193. package/src/subsystems/Security/Account.service/index.ts +14 -14
  194. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  195. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  196. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  197. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  198. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  199. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  200. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  201. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  202. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  203. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  204. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  205. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  206. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  207. package/src/types/ACL.types.ts +104 -104
  208. package/src/types/AWS.types.ts +10 -10
  209. package/src/types/Agent.types.ts +61 -61
  210. package/src/types/AgentLogger.types.ts +17 -17
  211. package/src/types/Cache.types.ts +1 -1
  212. package/src/types/Common.types.ts +2 -2
  213. package/src/types/LLM.types.ts +496 -491
  214. package/src/types/Redis.types.ts +8 -8
  215. package/src/types/SRE.types.ts +64 -64
  216. package/src/types/Security.types.ts +14 -14
  217. package/src/types/Storage.types.ts +5 -5
  218. package/src/types/VectorDB.types.ts +86 -86
  219. package/src/utils/base64.utils.ts +275 -275
  220. package/src/utils/cli.utils.ts +68 -68
  221. package/src/utils/data.utils.ts +322 -322
  222. package/src/utils/date-time.utils.ts +22 -22
  223. package/src/utils/general.utils.ts +238 -238
  224. package/src/utils/index.ts +12 -12
  225. package/src/utils/lazy-client.ts +261 -261
  226. package/src/utils/numbers.utils.ts +13 -13
  227. package/src/utils/oauth.utils.ts +35 -35
  228. package/src/utils/string.utils.ts +414 -414
  229. package/src/utils/url.utils.ts +19 -19
  230. package/src/utils/validation.utils.ts +74 -74
  231. package/dist/bundle-analysis-lazy.html +0 -4949
  232. package/dist/bundle-analysis.html +0 -4949
  233. package/dist/types/utils/package-manager.utils.d.ts +0 -26
@@ -1,294 +1,294 @@
1
- // helper.ts
2
- import crypto from 'crypto';
3
- import OAuth from 'oauth-1.0a';
4
- import AccessTokenManager from './AccessTokenManager';
5
- import { REQUEST_CONTENT_TYPES } from '@sre/constants';
6
- import axios, { AxiosRequestConfig } from 'axios';
7
- import { Logger } from '@sre/helpers/Log.helper';
8
- import { ConnectorService } from '@sre/Core/ConnectorsService';
9
- import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
10
- import { TemplateString } from '@sre/helpers/TemplateString.helper';
11
- import { SystemEvents } from '@sre/Core/SystemEvents';
12
-
13
- const console = Logger('OAuth.helper');
14
- let managedVault: any;
15
-
16
- SystemEvents.on('SRE:Booted', () => {
17
- try {
18
- managedVault = ConnectorService.getManagedVaultConnector();
19
- } catch (error) {
20
- console.warn('Could not find a compatible ManagedVault connector, OAuth APICalls will not work');
21
- }
22
- });
23
-
24
- export function extractAdditionalParamsForOAuth1(reqConfig: AxiosRequestConfig = {}) {
25
- let additionalParams = {};
26
- // Parse URL parameters using URL and URLSearchParams
27
- const url = new URL(reqConfig.url);
28
- const searchParams = url.searchParams;
29
- additionalParams = Object.fromEntries(searchParams.entries());
30
-
31
- // Check content type and add required parameters for OAuth 1 signature
32
- const contentType = reqConfig.headers?.['Content-Type'] || '';
33
- if (contentType === REQUEST_CONTENT_TYPES.urlEncodedFormData) {
34
- // For form data, include the form parameters in the signature
35
- if (typeof reqConfig.data === 'string') {
36
- const formData = new URLSearchParams(reqConfig.data);
37
- additionalParams = { ...additionalParams, ...Object.fromEntries(formData) };
38
- }
39
- } else if (contentType === REQUEST_CONTENT_TYPES.json) {
40
- // For JSON data, include a hash of the request body
41
- if (reqConfig.data) {
42
- const hash = crypto.createHash('sha1').update(JSON.stringify(reqConfig.data)).digest('base64');
43
- additionalParams['oauth_body_hash'] = hash;
44
- }
45
- } else if (contentType === REQUEST_CONTENT_TYPES.multipartFormData) {
46
- const formData = reqConfig.data as FormData;
47
- for (const [key, value] of formData.entries()) {
48
- // Exclude binary form data (File, Blob, etc.)
49
- if (typeof value === 'object' && value !== null && 'size' in value && 'type' in value) {
50
- continue;
51
- }
52
-
53
- additionalParams[key] = value;
54
- }
55
- }
56
-
57
- return additionalParams;
58
- }
59
-
60
- export const buildOAuth1Header = (url, method, oauth1Credentials, additionalParams = {}) => {
61
- const oauth = new OAuth({
62
- consumer: {
63
- key: oauth1Credentials.consumerKey,
64
- secret: oauth1Credentials.consumerSecret,
65
- },
66
- signature_method: 'HMAC-SHA1',
67
- hash_function(base_string, key) {
68
- return crypto.createHmac('sha1', key).update(base_string).digest('base64');
69
- },
70
- });
71
-
72
- // Include additional parameters if necessary (e.g., for non-standard providers)
73
- const requestData = {
74
- url,
75
- method,
76
- ...additionalParams,
77
- };
78
- const signedRequest = oauth.authorize(requestData, { key: oauth1Credentials.token, secret: oauth1Credentials.tokenSecret });
79
- return oauth.toHeader(signedRequest);
80
- };
81
-
82
- export const retrieveOAuthTokens = async (agent, config) => {
83
- let tokenKey: any = null;
84
- try {
85
- tokenKey = `OAUTH_${config.componentId ?? config.id}_TOKENS`;
86
-
87
- try {
88
- const result: any = await managedVault.user(AccessCandidate.agent(agent.id)).get(tokenKey);
89
- const tokensData = typeof result === 'object' ? result : JSON.parse(result || '{}');
90
-
91
- if (!tokensData) {
92
- throw new Error('Failed to retrieve OAuth tokens from vault. Please authenticate ...');
93
- }
94
-
95
- const primaryToken = tokensData.primary; // accessToken or token
96
- const secondaryToken = tokensData.secondary; // refreshToken or tokenSecret
97
- const type = tokensData.type; // oauth || oauth2
98
-
99
- // Add warning logs for OAuth2
100
- if (type === 'oauth2' && config.data.oauthService !== 'OAuth2 Client Credentials') {
101
- if (!secondaryToken) {
102
- console.warn('Warning: refresh_token is missing for OAuth2');
103
- }
104
- if (!tokensData.expires_in) {
105
- console.warn('Warning: expires_in is missing for OAuth2.');
106
- }
107
- }
108
-
109
- // sometimes refreshToken is not available . e.g in case of linkedIn. so only add check for primary token
110
- if (config.data.oauthService !== 'OAuth2 Client Credentials') {
111
- if (!primaryToken) {
112
- throw new Error('Retrieved OAuth tokens do not exist, invalid OR incomplete. Please authenticate ...');
113
- }
114
- }
115
-
116
- const responseData: any = {
117
- primaryToken,
118
- secondaryToken,
119
- type,
120
- };
121
-
122
- if (type === 'oauth') {
123
- // Check and assign if present
124
- if ('consumerKey' in tokensData) responseData.consumerKey = tokensData.consumerKey;
125
- if ('consumerSecret' in tokensData) responseData.consumerSecret = tokensData.consumerSecret;
126
- responseData.team = tokensData.team;
127
- } else if (type === 'oauth2') {
128
- // Check and assign if present
129
- responseData.tokenURL = tokensData.tokenURL;
130
- if ('clientID' in tokensData) responseData.clientID = tokensData.clientID;
131
- if ('clientSecret' in tokensData) responseData.clientSecret = tokensData.clientSecret;
132
- responseData.expiresIn = tokensData.expires_in ?? 0; // Optional property, default to 0 if not present. time to expire access token
133
- responseData.team = tokensData.team;
134
- }
135
-
136
- return { responseData, data: tokensData, keyId: tokenKey };
137
- } catch (error) {
138
- throw new Error(`Failed to parse retrieved tokens: ${error}`);
139
- }
140
- } catch (error) {
141
- console.error('Error retrieving OAuth tokens:', error);
142
- throw error; // rethrow for potential handling by the calling code
143
- }
144
- };
145
-
146
- export const handleOAuthHeaders = async (agent, config, reqConfig, logger, additionalParams = {}, rootUrl) => {
147
- let headers = {}; // Initialize headers as an empty object
148
- const { responseData: oauthTokens, data, keyId } = await retrieveOAuthTokens(agent, config);
149
-
150
- try {
151
- // Extract template variable key IDs for consumerKey, consumerSecret, clientID, and clientSecret
152
- const keys = ['consumerKey', 'consumerSecret', 'clientID', 'clientSecret'];
153
- let oAuthConfigString = JSON.stringify({
154
- consumerKey: config.data.consumerKey,
155
- consumerSecret: config.data.consumerSecret,
156
- clientID: config.data.clientID,
157
- clientSecret: config.data.clientSecret,
158
- tokenURL: config.data.tokenURL,
159
- });
160
-
161
- oAuthConfigString = await TemplateString(oAuthConfigString).parseTeamKeysAsync(oauthTokens.team || agent.teamId).asyncResult;
162
-
163
- const oAuthConfig = JSON.parse(oAuthConfigString);
164
-
165
- if (oAuthConfig.oauthService === 'OAuth2 Client Credentials') {
166
- const accessToken = await getClientCredentialToken(data, logger, keyId, oauthTokens, config, agent);
167
- headers['Authorization'] = `Bearer ${accessToken}`;
168
- } else {
169
- if (oauthTokens.type === 'oauth') {
170
- // For OAuth1, generate and replace the signature in headers
171
- const oauthHeader = buildOAuth1Header(
172
- rootUrl,
173
- reqConfig.method,
174
- {
175
- consumerKey: oAuthConfig.consumerKey,
176
- consumerSecret: oAuthConfig.consumerSecret,
177
- token: oauthTokens.primaryToken,
178
- tokenSecret: oauthTokens.secondaryToken,
179
- },
180
- additionalParams,
181
- );
182
-
183
- headers = { ...reqConfig.headers, ...oauthHeader };
184
- logger.debug('OAuth1 access token check success.');
185
- } else if (oauthTokens.type === 'oauth2') {
186
- // For OAuth2, add the 'Authorization' header with the bearer token
187
- const accessTokenManager = new AccessTokenManager(
188
- oAuthConfig.clientID,
189
- oAuthConfig.clientSecret,
190
- oauthTokens.secondaryToken,
191
- oAuthConfig.tokenURL,
192
- oauthTokens.expiresIn,
193
- oauthTokens.primaryToken,
194
- data,
195
- keyId,
196
- logger,
197
- agent,
198
- );
199
-
200
- const accessToken = await accessTokenManager.getAccessToken();
201
- headers['Authorization'] = `Bearer ${accessToken}`;
202
- }
203
- }
204
- return headers;
205
- } catch (error) {
206
- logger.error(`Access token check failed: ${error}`);
207
- throw error;
208
- }
209
- };
210
-
211
- const getKeyIdsFromTemplateVars = (str: string): string[] => {
212
- if (!str) return [];
213
-
214
- const pattern = /{{KEY\((.*?)\)}}/g;
215
- const keyIds: any = [];
216
- let match: any = [];
217
-
218
- while ((match = pattern.exec(str)) !== null) {
219
- if (match?.length < 2) continue;
220
- keyIds.push(match[1]);
221
- }
222
-
223
- return keyIds;
224
- };
225
-
226
- async function getClientCredentialToken(data, logger, keyId, oauthTokens, config, agent) {
227
- const logAndThrowError = (message) => {
228
- logger.debug(message);
229
- throw new Error(message);
230
- };
231
-
232
- try {
233
- data = data[keyId] || {};
234
- const { clientID, clientSecret, tokenURL } = config.data;
235
- const currentTime = new Date().getTime();
236
- // Check for token expiration
237
- if (!oauthTokens.expiresIn || currentTime >= Number(oauthTokens.expiresIn)) {
238
- // Verify required parameters
239
- if (!clientID || !clientSecret || !tokenURL) {
240
- logAndThrowError('Missing client_id, client_secret OR token_url');
241
- }
242
-
243
- const params = new URLSearchParams({
244
- grant_type: 'client_credentials',
245
- client_id: clientID,
246
- client_secret: clientSecret,
247
- });
248
-
249
- const response = await axios.post(tokenURL, params.toString(), {
250
- headers: { 'Content-Type': 'application/x-www-form-urlencoded' },
251
- });
252
-
253
- console.log('Access token refreshed successfully.');
254
- logger.debug('Access token refreshed successfully.');
255
-
256
- const newAccessToken = response.data.access_token;
257
- const expiresInMilliseconds = response.data.expires_in * 1000;
258
- const expirationTimestamp = currentTime + expiresInMilliseconds;
259
-
260
- // Set data if it's empty
261
- if (Object.keys(data).length === 0) {
262
- data = {
263
- primary: '',
264
- secondary: '',
265
- type: 'oauth2',
266
- tokenURL,
267
- expires_in: '',
268
- team: agent.teamId,
269
- oauth_info: {
270
- oauth_keys_prefix: `OAUTH_${config.componentId ?? config.id}`,
271
- service: 'oauth2_client_credentials',
272
- tokenURL,
273
- clientID,
274
- clientSecret,
275
- },
276
- };
277
- }
278
-
279
- data.primary = newAccessToken;
280
- data.expires_in = expirationTimestamp.toString();
281
- //const oauthTeamSettings = new OauthTeamSettings();
282
- //const save = await oauthTeamSettings.update({ keyId: keyId, data: data });
283
- await managedVault.user(AccessCandidate.agent(agent.id)).set(keyId, data);
284
-
285
- return newAccessToken;
286
- } else {
287
- console.log('Access token value is still valid.');
288
- logger.debug('Access token value is still valid.');
289
- return oauthTokens.primaryToken;
290
- }
291
- } catch (error) {
292
- logAndThrowError(`Failed to refresh access token: ${error}`);
293
- }
294
- }
1
+ // helper.ts
2
+ import crypto from 'crypto';
3
+ import OAuth from 'oauth-1.0a';
4
+ import AccessTokenManager from './AccessTokenManager';
5
+ import { REQUEST_CONTENT_TYPES } from '@sre/constants';
6
+ import axios, { AxiosRequestConfig } from 'axios';
7
+ import { Logger } from '@sre/helpers/Log.helper';
8
+ import { ConnectorService } from '@sre/Core/ConnectorsService';
9
+ import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
10
+ import { TemplateString } from '@sre/helpers/TemplateString.helper';
11
+ import { SystemEvents } from '@sre/Core/SystemEvents';
12
+
13
+ const console = Logger('OAuth.helper');
14
+ let managedVault: any;
15
+
16
+ SystemEvents.on('SRE:Booted', () => {
17
+ try {
18
+ managedVault = ConnectorService.getManagedVaultConnector();
19
+ } catch (error) {
20
+ console.warn('Could not find a compatible ManagedVault connector, OAuth APICalls will not work');
21
+ }
22
+ });
23
+
24
+ export function extractAdditionalParamsForOAuth1(reqConfig: AxiosRequestConfig = {}) {
25
+ let additionalParams = {};
26
+ // Parse URL parameters using URL and URLSearchParams
27
+ const url = new URL(reqConfig.url);
28
+ const searchParams = url.searchParams;
29
+ additionalParams = Object.fromEntries(searchParams.entries());
30
+
31
+ // Check content type and add required parameters for OAuth 1 signature
32
+ const contentType = reqConfig.headers?.['Content-Type'] || '';
33
+ if (contentType === REQUEST_CONTENT_TYPES.urlEncodedFormData) {
34
+ // For form data, include the form parameters in the signature
35
+ if (typeof reqConfig.data === 'string') {
36
+ const formData = new URLSearchParams(reqConfig.data);
37
+ additionalParams = { ...additionalParams, ...Object.fromEntries(formData) };
38
+ }
39
+ } else if (contentType === REQUEST_CONTENT_TYPES.json) {
40
+ // For JSON data, include a hash of the request body
41
+ if (reqConfig.data) {
42
+ const hash = crypto.createHash('sha1').update(JSON.stringify(reqConfig.data)).digest('base64');
43
+ additionalParams['oauth_body_hash'] = hash;
44
+ }
45
+ } else if (contentType === REQUEST_CONTENT_TYPES.multipartFormData) {
46
+ const formData = reqConfig.data as FormData;
47
+ for (const [key, value] of formData.entries()) {
48
+ // Exclude binary form data (File, Blob, etc.)
49
+ if (typeof value === 'object' && value !== null && 'size' in value && 'type' in value) {
50
+ continue;
51
+ }
52
+
53
+ additionalParams[key] = value;
54
+ }
55
+ }
56
+
57
+ return additionalParams;
58
+ }
59
+
60
+ export const buildOAuth1Header = (url, method, oauth1Credentials, additionalParams = {}) => {
61
+ const oauth = new OAuth({
62
+ consumer: {
63
+ key: oauth1Credentials.consumerKey,
64
+ secret: oauth1Credentials.consumerSecret,
65
+ },
66
+ signature_method: 'HMAC-SHA1',
67
+ hash_function(base_string, key) {
68
+ return crypto.createHmac('sha1', key).update(base_string).digest('base64');
69
+ },
70
+ });
71
+
72
+ // Include additional parameters if necessary (e.g., for non-standard providers)
73
+ const requestData = {
74
+ url,
75
+ method,
76
+ ...additionalParams,
77
+ };
78
+ const signedRequest = oauth.authorize(requestData, { key: oauth1Credentials.token, secret: oauth1Credentials.tokenSecret });
79
+ return oauth.toHeader(signedRequest);
80
+ };
81
+
82
+ export const retrieveOAuthTokens = async (agent, config) => {
83
+ let tokenKey: any = null;
84
+ try {
85
+ tokenKey = `OAUTH_${config.componentId ?? config.id}_TOKENS`;
86
+
87
+ try {
88
+ const result: any = await managedVault.user(AccessCandidate.agent(agent.id)).get(tokenKey);
89
+ const tokensData = typeof result === 'object' ? result : JSON.parse(result || '{}');
90
+
91
+ if (!tokensData) {
92
+ throw new Error('Failed to retrieve OAuth tokens from vault. Please authenticate ...');
93
+ }
94
+
95
+ const primaryToken = tokensData.primary; // accessToken or token
96
+ const secondaryToken = tokensData.secondary; // refreshToken or tokenSecret
97
+ const type = tokensData.type; // oauth || oauth2
98
+
99
+ // Add warning logs for OAuth2
100
+ if (type === 'oauth2' && config.data.oauthService !== 'OAuth2 Client Credentials') {
101
+ if (!secondaryToken) {
102
+ console.warn('Warning: refresh_token is missing for OAuth2');
103
+ }
104
+ if (!tokensData.expires_in) {
105
+ console.warn('Warning: expires_in is missing for OAuth2.');
106
+ }
107
+ }
108
+
109
+ // sometimes refreshToken is not available . e.g in case of linkedIn. so only add check for primary token
110
+ if (config.data.oauthService !== 'OAuth2 Client Credentials') {
111
+ if (!primaryToken) {
112
+ throw new Error('Retrieved OAuth tokens do not exist, invalid OR incomplete. Please authenticate ...');
113
+ }
114
+ }
115
+
116
+ const responseData: any = {
117
+ primaryToken,
118
+ secondaryToken,
119
+ type,
120
+ };
121
+
122
+ if (type === 'oauth') {
123
+ // Check and assign if present
124
+ if ('consumerKey' in tokensData) responseData.consumerKey = tokensData.consumerKey;
125
+ if ('consumerSecret' in tokensData) responseData.consumerSecret = tokensData.consumerSecret;
126
+ responseData.team = tokensData.team;
127
+ } else if (type === 'oauth2') {
128
+ // Check and assign if present
129
+ responseData.tokenURL = tokensData.tokenURL;
130
+ if ('clientID' in tokensData) responseData.clientID = tokensData.clientID;
131
+ if ('clientSecret' in tokensData) responseData.clientSecret = tokensData.clientSecret;
132
+ responseData.expiresIn = tokensData.expires_in ?? 0; // Optional property, default to 0 if not present. time to expire access token
133
+ responseData.team = tokensData.team;
134
+ }
135
+
136
+ return { responseData, data: tokensData, keyId: tokenKey };
137
+ } catch (error) {
138
+ throw new Error(`Failed to parse retrieved tokens: ${error}`);
139
+ }
140
+ } catch (error) {
141
+ console.error('Error retrieving OAuth tokens:', error);
142
+ throw error; // rethrow for potential handling by the calling code
143
+ }
144
+ };
145
+
146
+ export const handleOAuthHeaders = async (agent, config, reqConfig, logger, additionalParams = {}, rootUrl) => {
147
+ let headers = {}; // Initialize headers as an empty object
148
+ const { responseData: oauthTokens, data, keyId } = await retrieveOAuthTokens(agent, config);
149
+
150
+ try {
151
+ // Extract template variable key IDs for consumerKey, consumerSecret, clientID, and clientSecret
152
+ const keys = ['consumerKey', 'consumerSecret', 'clientID', 'clientSecret'];
153
+ let oAuthConfigString = JSON.stringify({
154
+ consumerKey: config.data.consumerKey,
155
+ consumerSecret: config.data.consumerSecret,
156
+ clientID: config.data.clientID,
157
+ clientSecret: config.data.clientSecret,
158
+ tokenURL: config.data.tokenURL,
159
+ });
160
+
161
+ oAuthConfigString = await TemplateString(oAuthConfigString).parseTeamKeysAsync(oauthTokens.team || agent.teamId).asyncResult;
162
+
163
+ const oAuthConfig = JSON.parse(oAuthConfigString);
164
+
165
+ if (oAuthConfig.oauthService === 'OAuth2 Client Credentials') {
166
+ const accessToken = await getClientCredentialToken(data, logger, keyId, oauthTokens, config, agent);
167
+ headers['Authorization'] = `Bearer ${accessToken}`;
168
+ } else {
169
+ if (oauthTokens.type === 'oauth') {
170
+ // For OAuth1, generate and replace the signature in headers
171
+ const oauthHeader = buildOAuth1Header(
172
+ rootUrl,
173
+ reqConfig.method,
174
+ {
175
+ consumerKey: oAuthConfig.consumerKey,
176
+ consumerSecret: oAuthConfig.consumerSecret,
177
+ token: oauthTokens.primaryToken,
178
+ tokenSecret: oauthTokens.secondaryToken,
179
+ },
180
+ additionalParams,
181
+ );
182
+
183
+ headers = { ...reqConfig.headers, ...oauthHeader };
184
+ logger.debug('OAuth1 access token check success.');
185
+ } else if (oauthTokens.type === 'oauth2') {
186
+ // For OAuth2, add the 'Authorization' header with the bearer token
187
+ const accessTokenManager = new AccessTokenManager(
188
+ oAuthConfig.clientID,
189
+ oAuthConfig.clientSecret,
190
+ oauthTokens.secondaryToken,
191
+ oAuthConfig.tokenURL,
192
+ oauthTokens.expiresIn,
193
+ oauthTokens.primaryToken,
194
+ data,
195
+ keyId,
196
+ logger,
197
+ agent,
198
+ );
199
+
200
+ const accessToken = await accessTokenManager.getAccessToken();
201
+ headers['Authorization'] = `Bearer ${accessToken}`;
202
+ }
203
+ }
204
+ return headers;
205
+ } catch (error) {
206
+ logger.error(`Access token check failed: ${error}`);
207
+ throw error;
208
+ }
209
+ };
210
+
211
+ const getKeyIdsFromTemplateVars = (str: string): string[] => {
212
+ if (!str) return [];
213
+
214
+ const pattern = /{{KEY\((.*?)\)}}/g;
215
+ const keyIds: any = [];
216
+ let match: any = [];
217
+
218
+ while ((match = pattern.exec(str)) !== null) {
219
+ if (match?.length < 2) continue;
220
+ keyIds.push(match[1]);
221
+ }
222
+
223
+ return keyIds;
224
+ };
225
+
226
+ async function getClientCredentialToken(data, logger, keyId, oauthTokens, config, agent) {
227
+ const logAndThrowError = (message) => {
228
+ logger.debug(message);
229
+ throw new Error(message);
230
+ };
231
+
232
+ try {
233
+ data = data[keyId] || {};
234
+ const { clientID, clientSecret, tokenURL } = config.data;
235
+ const currentTime = new Date().getTime();
236
+ // Check for token expiration
237
+ if (!oauthTokens.expiresIn || currentTime >= Number(oauthTokens.expiresIn)) {
238
+ // Verify required parameters
239
+ if (!clientID || !clientSecret || !tokenURL) {
240
+ logAndThrowError('Missing client_id, client_secret OR token_url');
241
+ }
242
+
243
+ const params = new URLSearchParams({
244
+ grant_type: 'client_credentials',
245
+ client_id: clientID,
246
+ client_secret: clientSecret,
247
+ });
248
+
249
+ const response = await axios.post(tokenURL, params.toString(), {
250
+ headers: { 'Content-Type': 'application/x-www-form-urlencoded' },
251
+ });
252
+
253
+ console.log('Access token refreshed successfully.');
254
+ logger.debug('Access token refreshed successfully.');
255
+
256
+ const newAccessToken = response.data.access_token;
257
+ const expiresInMilliseconds = response.data.expires_in * 1000;
258
+ const expirationTimestamp = currentTime + expiresInMilliseconds;
259
+
260
+ // Set data if it's empty
261
+ if (Object.keys(data).length === 0) {
262
+ data = {
263
+ primary: '',
264
+ secondary: '',
265
+ type: 'oauth2',
266
+ tokenURL,
267
+ expires_in: '',
268
+ team: agent.teamId,
269
+ oauth_info: {
270
+ oauth_keys_prefix: `OAUTH_${config.componentId ?? config.id}`,
271
+ service: 'oauth2_client_credentials',
272
+ tokenURL,
273
+ clientID,
274
+ clientSecret,
275
+ },
276
+ };
277
+ }
278
+
279
+ data.primary = newAccessToken;
280
+ data.expires_in = expirationTimestamp.toString();
281
+ //const oauthTeamSettings = new OauthTeamSettings();
282
+ //const save = await oauthTeamSettings.update({ keyId: keyId, data: data });
283
+ await managedVault.user(AccessCandidate.agent(agent.id)).set(keyId, data);
284
+
285
+ return newAccessToken;
286
+ } else {
287
+ console.log('Access token value is still valid.');
288
+ logger.debug('Access token value is still valid.');
289
+ return oauthTokens.primaryToken;
290
+ }
291
+ } catch (error) {
292
+ logAndThrowError(`Failed to refresh access token: ${error}`);
293
+ }
294
+ }