@smythos/sre 1.5.43 → 1.5.45

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. package/CHANGELOG +90 -90
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/index.js +13 -13
  5. package/dist/index.js.map +1 -1
  6. package/dist/types/Components/GenAILLM.class.d.ts +6 -0
  7. package/dist/types/helpers/AWSLambdaCode.helper.d.ts +8 -5
  8. package/dist/types/index.d.ts +1 -0
  9. package/dist/types/subsystems/LLMManager/LLM.service/connectors/Groq.class.d.ts +5 -0
  10. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +13 -1
  11. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.d.ts +0 -4
  12. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.d.ts +44 -29
  13. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.d.ts +4 -2
  14. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.d.ts +6 -0
  15. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/types.d.ts +0 -4
  16. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +39 -0
  17. package/dist/types/types/LLM.types.d.ts +4 -1
  18. package/package.json +5 -2
  19. package/src/Components/APICall/APICall.class.ts +156 -156
  20. package/src/Components/APICall/AccessTokenManager.ts +130 -130
  21. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  22. package/src/Components/APICall/OAuth.helper.ts +294 -294
  23. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  24. package/src/Components/APICall/parseData.ts +167 -167
  25. package/src/Components/APICall/parseHeaders.ts +41 -41
  26. package/src/Components/APICall/parseProxy.ts +68 -68
  27. package/src/Components/APICall/parseUrl.ts +91 -91
  28. package/src/Components/APIEndpoint.class.ts +234 -234
  29. package/src/Components/APIOutput.class.ts +58 -58
  30. package/src/Components/AgentPlugin.class.ts +102 -102
  31. package/src/Components/Async.class.ts +155 -155
  32. package/src/Components/Await.class.ts +90 -90
  33. package/src/Components/Classifier.class.ts +158 -158
  34. package/src/Components/Component.class.ts +132 -132
  35. package/src/Components/ComponentHost.class.ts +38 -38
  36. package/src/Components/DataSourceCleaner.class.ts +92 -92
  37. package/src/Components/DataSourceIndexer.class.ts +181 -181
  38. package/src/Components/DataSourceLookup.class.ts +161 -161
  39. package/src/Components/ECMASandbox.class.ts +71 -71
  40. package/src/Components/FEncDec.class.ts +29 -29
  41. package/src/Components/FHash.class.ts +33 -33
  42. package/src/Components/FSign.class.ts +80 -80
  43. package/src/Components/FSleep.class.ts +25 -25
  44. package/src/Components/FTimestamp.class.ts +25 -25
  45. package/src/Components/FileStore.class.ts +78 -78
  46. package/src/Components/ForEach.class.ts +97 -97
  47. package/src/Components/GPTPlugin.class.ts +70 -70
  48. package/src/Components/GenAILLM.class.ts +586 -579
  49. package/src/Components/HuggingFace.class.ts +314 -314
  50. package/src/Components/Image/imageSettings.config.ts +70 -70
  51. package/src/Components/ImageGenerator.class.ts +502 -502
  52. package/src/Components/JSONFilter.class.ts +54 -54
  53. package/src/Components/LLMAssistant.class.ts +213 -213
  54. package/src/Components/LogicAND.class.ts +28 -28
  55. package/src/Components/LogicAtLeast.class.ts +85 -85
  56. package/src/Components/LogicAtMost.class.ts +86 -86
  57. package/src/Components/LogicOR.class.ts +29 -29
  58. package/src/Components/LogicXOR.class.ts +34 -34
  59. package/src/Components/MCPClient.class.ts +112 -112
  60. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  61. package/src/Components/MemoryReadKeyVal.class.ts +66 -66
  62. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  63. package/src/Components/MemoryWriteObject.class.ts +97 -97
  64. package/src/Components/MultimodalLLM.class.ts +128 -128
  65. package/src/Components/OpenAPI.class.ts +72 -72
  66. package/src/Components/PromptGenerator.class.ts +122 -122
  67. package/src/Components/ScrapflyWebScrape.class.ts +159 -159
  68. package/src/Components/ServerlessCode.class.ts +123 -123
  69. package/src/Components/TavilyWebSearch.class.ts +98 -98
  70. package/src/Components/VisionLLM.class.ts +104 -104
  71. package/src/Components/ZapierAction.class.ts +127 -127
  72. package/src/Components/index.ts +97 -97
  73. package/src/Core/AgentProcess.helper.ts +240 -240
  74. package/src/Core/Connector.class.ts +123 -123
  75. package/src/Core/ConnectorsService.ts +197 -197
  76. package/src/Core/DummyConnector.ts +49 -49
  77. package/src/Core/HookService.ts +105 -105
  78. package/src/Core/SmythRuntime.class.ts +235 -235
  79. package/src/Core/SystemEvents.ts +16 -16
  80. package/src/Core/boot.ts +56 -56
  81. package/src/config.ts +15 -15
  82. package/src/constants.ts +126 -126
  83. package/src/data/hugging-face.params.json +579 -579
  84. package/src/helpers/AWSLambdaCode.helper.ts +588 -528
  85. package/src/helpers/BinaryInput.helper.ts +331 -331
  86. package/src/helpers/Conversation.helper.ts +1119 -1119
  87. package/src/helpers/ECMASandbox.helper.ts +54 -54
  88. package/src/helpers/JsonContent.helper.ts +97 -97
  89. package/src/helpers/LocalCache.helper.ts +97 -97
  90. package/src/helpers/Log.helper.ts +274 -274
  91. package/src/helpers/OpenApiParser.helper.ts +150 -150
  92. package/src/helpers/S3Cache.helper.ts +147 -147
  93. package/src/helpers/SmythURI.helper.ts +5 -5
  94. package/src/helpers/Sysconfig.helper.ts +77 -77
  95. package/src/helpers/TemplateString.helper.ts +243 -243
  96. package/src/helpers/TypeChecker.helper.ts +329 -329
  97. package/src/index.ts +4 -3
  98. package/src/index.ts.bak +4 -3
  99. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  100. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  101. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  102. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  103. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
  104. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  105. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  106. package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
  107. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  108. package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
  109. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  110. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  111. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  112. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  113. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  114. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  115. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  116. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  117. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  118. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -170
  119. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  120. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  121. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  122. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  123. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  124. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  125. package/src/subsystems/IO/Log.service/index.ts +13 -13
  126. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  127. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  128. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  129. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  130. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  131. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  132. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  133. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  134. package/src/subsystems/IO/Router.service/index.ts +11 -11
  135. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
  136. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  137. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  138. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  139. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  140. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  141. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
  142. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
  143. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
  144. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  145. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  146. package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
  147. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  148. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  149. package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
  150. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
  151. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  152. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
  153. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
  154. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
  155. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
  156. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -291
  157. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
  158. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -455
  160. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +528 -528
  161. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  162. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  163. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1168 -853
  164. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -37
  165. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  166. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -0
  167. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -37
  168. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
  169. package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
  170. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
  171. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
  172. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  173. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  174. package/src/subsystems/LLMManager/models.ts +2540 -2540
  175. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  176. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  177. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  178. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
  179. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  180. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  181. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  182. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  183. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  184. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  185. package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
  186. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  187. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  188. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  189. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  190. package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
  191. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  192. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
  193. package/src/subsystems/Security/Account.service/index.ts +14 -14
  194. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  195. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  196. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  197. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  198. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  199. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  200. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  201. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  202. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  203. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  204. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  205. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  206. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  207. package/src/types/ACL.types.ts +104 -104
  208. package/src/types/AWS.types.ts +10 -10
  209. package/src/types/Agent.types.ts +61 -61
  210. package/src/types/AgentLogger.types.ts +17 -17
  211. package/src/types/Cache.types.ts +1 -1
  212. package/src/types/Common.types.ts +2 -2
  213. package/src/types/LLM.types.ts +496 -491
  214. package/src/types/Redis.types.ts +8 -8
  215. package/src/types/SRE.types.ts +64 -64
  216. package/src/types/Security.types.ts +14 -14
  217. package/src/types/Storage.types.ts +5 -5
  218. package/src/types/VectorDB.types.ts +86 -86
  219. package/src/utils/base64.utils.ts +275 -275
  220. package/src/utils/cli.utils.ts +68 -68
  221. package/src/utils/data.utils.ts +322 -322
  222. package/src/utils/date-time.utils.ts +22 -22
  223. package/src/utils/general.utils.ts +238 -238
  224. package/src/utils/index.ts +12 -12
  225. package/src/utils/lazy-client.ts +261 -261
  226. package/src/utils/numbers.utils.ts +13 -13
  227. package/src/utils/oauth.utils.ts +35 -35
  228. package/src/utils/string.utils.ts +414 -414
  229. package/src/utils/url.utils.ts +19 -19
  230. package/src/utils/validation.utils.ts +74 -74
  231. package/dist/bundle-analysis-lazy.html +0 -4949
  232. package/dist/bundle-analysis.html +0 -4949
  233. package/dist/types/utils/package-manager.utils.d.ts +0 -26
@@ -1,208 +1,208 @@
1
- //import { xxh3 } from '@node-rs/xxhash';
2
- import xxhash from 'xxhashjs';
3
- import { IACL, IAccessRequest, LevelMap, ReverseLevelMap, ReverseRoleMap, RoleMap, TACLEntry, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
4
-
5
- const ACLHashAlgo = {
6
- none: (source) => source,
7
- //xxh3: (source) => xxh3.xxh64(source.toString()).toString(16),
8
- xxh3: (source) => {
9
- const h64 = xxhash.h64(); // Use xxhashjs's h64 function
10
- return source ? h64.update(source.toString()).digest().toString(16) : null;
11
- },
12
- };
13
-
14
- export class ACL implements IACL {
15
- public hashAlgorithm?: string | undefined;
16
- public entries?: {
17
- [key in TAccessRole]?: TACLEntry | undefined;
18
- };
19
- public migrated?: boolean | undefined;
20
- //private acl: TACL;
21
- public get ACL(): IACL {
22
- return {
23
- hashAlgorithm: this.hashAlgorithm,
24
- entries: JSON.parse(JSON.stringify(this.entries)),
25
- migrated: this.migrated,
26
- };
27
- }
28
- public get serializedACL(): string {
29
- return this.serializeACL(this);
30
- }
31
-
32
- constructor(acl?: IACL | string) {
33
- if (typeof acl === 'string') {
34
- this.deserializeACL(acl);
35
- } else {
36
- this.hashAlgorithm = acl?.hashAlgorithm;
37
- this.entries = acl?.entries ? JSON.parse(JSON.stringify(acl?.entries)) : {};
38
- this.migrated = acl?.migrated;
39
- }
40
- if (!this.hashAlgorithm) this.hashAlgorithm = 'xxh3';
41
- if (!this.entries) this.entries = {};
42
- }
43
-
44
- static from(acl?: IACL | string): ACL {
45
- return new ACL(acl);
46
- }
47
-
48
- /**
49
- * This function checks if the candidate has access to the requested level
50
- * it only checks the exact access level, not the higher levels
51
- * Examples :
52
- * - if the candidate has read access, it will return true only if the requested level is read
53
- * - if the current ACL has team access but the candidate is an agent, it will not match the team access
54
- * @param acRequest
55
- * @returns
56
- */
57
- public checkExactAccess(acRequest: IAccessRequest): boolean {
58
- if (!this?.entries) return false; // cannot determine the access rights, prefer to deny access
59
-
60
- const role = this?.entries[acRequest.candidate.role];
61
- if (!role) return false;
62
- let entryId = acRequest.candidate.id;
63
-
64
- if (!ACLHashAlgo[this.hashAlgorithm]) {
65
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
66
- }
67
-
68
- entryId = ACLHashAlgo[this.hashAlgorithm](entryId);
69
-
70
- const access = role[entryId];
71
- if (!access) return false;
72
-
73
- const levels = Array.isArray(acRequest.level) ? acRequest.level : [acRequest.level];
74
-
75
- return levels.every((level) => access.includes(level));
76
- //return access.includes(req.level);
77
- }
78
-
79
- public addPublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
80
- if (!this?.entries[TAccessRole.Public]) this.entries[TAccessRole.Public] = {};
81
- if (!ACLHashAlgo[this.hashAlgorithm]) {
82
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
83
- }
84
- const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
85
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
86
-
87
- if (!this?.entries[TAccessRole.Public]![hashedOwner]) this.entries[TAccessRole.Public]![hashedOwner] = [];
88
- //acl[TAccessRole.Public]![hashedOwner]!.push(level);
89
- //concatenate the levels
90
- const curLevel: any = this.entries[TAccessRole.Public]![hashedOwner]!;
91
- this.entries[TAccessRole.Public]![hashedOwner] = [...curLevel, ...level];
92
-
93
- return this;
94
- }
95
- public removePublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
96
- if (!this?.entries[TAccessRole.Public]) return this;
97
- const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
98
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
99
-
100
- //remove the levels
101
- const curLevel = this[TAccessRole.Public]![hashedOwner]!;
102
- this[TAccessRole.Public]![hashedOwner] = curLevel.filter((l) => !level.includes(l));
103
-
104
- return this;
105
- }
106
- public addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
107
- if (role === TAccessRole.Public) {
108
- throw new Error('Adding public access using addAccess method is not allowed. Use addPublicAccess method instead.');
109
- }
110
- const _level = Array.isArray(level) ? level : [level];
111
- if (!this?.entries[role]) this.entries[role] = {};
112
- if (!ACLHashAlgo[this.hashAlgorithm]) {
113
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
114
- }
115
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
116
-
117
- if (!hashedOwner) {
118
- throw new Error(`Invalid ownerId: ${role}:${ownerId}`);
119
- }
120
-
121
- if (!this?.entries[role]![hashedOwner]) this.entries[role]![hashedOwner] = [];
122
- //acl[role]![ownerId]!.push(level);
123
- //concatenate the levels
124
- const curLevel = this.entries[role]![hashedOwner]!;
125
- this.entries[role]![hashedOwner] = [...curLevel, ..._level];
126
-
127
- return this;
128
- }
129
- public static addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
130
- return ACL.from().addAccess(role, ownerId, level);
131
- }
132
-
133
- public removeAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
134
- const _level = Array.isArray(level) ? level : [level];
135
- if (!this[role]) return this;
136
- if (!this[role]![ownerId]) return this;
137
- //acl[role]![ownerId] = acl[role]![ownerId]!.filter((l) => l !== level);
138
- //remove the levels
139
- const curLevel = this[role]![ownerId]!;
140
- this[role]![ownerId] = curLevel.filter((l) => !_level.includes(l));
141
-
142
- return this;
143
- }
144
-
145
- private serializeACL(tacl: IACL): string {
146
- let compressed = '';
147
-
148
- if (tacl.hashAlgorithm) {
149
- compressed += `h:${tacl.hashAlgorithm}|`;
150
- }
151
-
152
- if (tacl.entries) {
153
- for (const [role, entries] of Object.entries(tacl.entries)) {
154
- const roleShort = RoleMap[role]; // Use the mapping for role
155
- const entriesArray: any[] = [];
156
-
157
- for (const [hashedOwnerKey, accessLevels] of Object.entries(entries || {})) {
158
- if (accessLevels) {
159
- const accessLevelsShort = accessLevels.map((level) => LevelMap[level]).join('');
160
- entriesArray.push(`${hashedOwnerKey}/${accessLevelsShort}`);
161
- }
162
- }
163
-
164
- if (entriesArray.length > 0) {
165
- compressed += `${roleShort}:${entriesArray.join(',')}|`;
166
- }
167
- }
168
- }
169
-
170
- // Remove the trailing '|'
171
- if (compressed.endsWith('|')) {
172
- compressed = compressed.slice(0, -1);
173
- }
174
-
175
- return compressed;
176
- }
177
-
178
- private deserializeACL(compressed: string) {
179
- const parts = compressed.split('|');
180
- this.hashAlgorithm = '';
181
- this.entries = {};
182
-
183
- for (const part of parts) {
184
- if (part.startsWith('h:')) {
185
- this.hashAlgorithm = part.substring(2);
186
- } else {
187
- const [roleShort, entries] = part.split(':');
188
- const role = ReverseRoleMap[roleShort]; // Use the reverse mapping for role
189
-
190
- if (role) {
191
- const entriesObj = {};
192
- const entriesArray = entries.split(',');
193
-
194
- for (const entry of entriesArray) {
195
- const [hashedOwnerKey, accessLevelsShort] = entry.split('/');
196
- const accessLevels = accessLevelsShort.split('').map((short) => ReverseLevelMap[short]);
197
-
198
- entriesObj[hashedOwnerKey] = accessLevels;
199
- }
200
-
201
- this.entries[role] = entriesObj;
202
- }
203
- }
204
- }
205
-
206
- //return tacl;
207
- }
208
- }
1
+ //import { xxh3 } from '@node-rs/xxhash';
2
+ import xxhash from 'xxhashjs';
3
+ import { IACL, IAccessRequest, LevelMap, ReverseLevelMap, ReverseRoleMap, RoleMap, TACLEntry, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
4
+
5
+ const ACLHashAlgo = {
6
+ none: (source) => source,
7
+ //xxh3: (source) => xxh3.xxh64(source.toString()).toString(16),
8
+ xxh3: (source) => {
9
+ const h64 = xxhash.h64(); // Use xxhashjs's h64 function
10
+ return source ? h64.update(source.toString()).digest().toString(16) : null;
11
+ },
12
+ };
13
+
14
+ export class ACL implements IACL {
15
+ public hashAlgorithm?: string | undefined;
16
+ public entries?: {
17
+ [key in TAccessRole]?: TACLEntry | undefined;
18
+ };
19
+ public migrated?: boolean | undefined;
20
+ //private acl: TACL;
21
+ public get ACL(): IACL {
22
+ return {
23
+ hashAlgorithm: this.hashAlgorithm,
24
+ entries: JSON.parse(JSON.stringify(this.entries)),
25
+ migrated: this.migrated,
26
+ };
27
+ }
28
+ public get serializedACL(): string {
29
+ return this.serializeACL(this);
30
+ }
31
+
32
+ constructor(acl?: IACL | string) {
33
+ if (typeof acl === 'string') {
34
+ this.deserializeACL(acl);
35
+ } else {
36
+ this.hashAlgorithm = acl?.hashAlgorithm;
37
+ this.entries = acl?.entries ? JSON.parse(JSON.stringify(acl?.entries)) : {};
38
+ this.migrated = acl?.migrated;
39
+ }
40
+ if (!this.hashAlgorithm) this.hashAlgorithm = 'xxh3';
41
+ if (!this.entries) this.entries = {};
42
+ }
43
+
44
+ static from(acl?: IACL | string): ACL {
45
+ return new ACL(acl);
46
+ }
47
+
48
+ /**
49
+ * This function checks if the candidate has access to the requested level
50
+ * it only checks the exact access level, not the higher levels
51
+ * Examples :
52
+ * - if the candidate has read access, it will return true only if the requested level is read
53
+ * - if the current ACL has team access but the candidate is an agent, it will not match the team access
54
+ * @param acRequest
55
+ * @returns
56
+ */
57
+ public checkExactAccess(acRequest: IAccessRequest): boolean {
58
+ if (!this?.entries) return false; // cannot determine the access rights, prefer to deny access
59
+
60
+ const role = this?.entries[acRequest.candidate.role];
61
+ if (!role) return false;
62
+ let entryId = acRequest.candidate.id;
63
+
64
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
65
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
66
+ }
67
+
68
+ entryId = ACLHashAlgo[this.hashAlgorithm](entryId);
69
+
70
+ const access = role[entryId];
71
+ if (!access) return false;
72
+
73
+ const levels = Array.isArray(acRequest.level) ? acRequest.level : [acRequest.level];
74
+
75
+ return levels.every((level) => access.includes(level));
76
+ //return access.includes(req.level);
77
+ }
78
+
79
+ public addPublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
80
+ if (!this?.entries[TAccessRole.Public]) this.entries[TAccessRole.Public] = {};
81
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
82
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
83
+ }
84
+ const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
85
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
86
+
87
+ if (!this?.entries[TAccessRole.Public]![hashedOwner]) this.entries[TAccessRole.Public]![hashedOwner] = [];
88
+ //acl[TAccessRole.Public]![hashedOwner]!.push(level);
89
+ //concatenate the levels
90
+ const curLevel: any = this.entries[TAccessRole.Public]![hashedOwner]!;
91
+ this.entries[TAccessRole.Public]![hashedOwner] = [...curLevel, ...level];
92
+
93
+ return this;
94
+ }
95
+ public removePublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
96
+ if (!this?.entries[TAccessRole.Public]) return this;
97
+ const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
98
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
99
+
100
+ //remove the levels
101
+ const curLevel = this[TAccessRole.Public]![hashedOwner]!;
102
+ this[TAccessRole.Public]![hashedOwner] = curLevel.filter((l) => !level.includes(l));
103
+
104
+ return this;
105
+ }
106
+ public addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
107
+ if (role === TAccessRole.Public) {
108
+ throw new Error('Adding public access using addAccess method is not allowed. Use addPublicAccess method instead.');
109
+ }
110
+ const _level = Array.isArray(level) ? level : [level];
111
+ if (!this?.entries[role]) this.entries[role] = {};
112
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
113
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
114
+ }
115
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
116
+
117
+ if (!hashedOwner) {
118
+ throw new Error(`Invalid ownerId: ${role}:${ownerId}`);
119
+ }
120
+
121
+ if (!this?.entries[role]![hashedOwner]) this.entries[role]![hashedOwner] = [];
122
+ //acl[role]![ownerId]!.push(level);
123
+ //concatenate the levels
124
+ const curLevel = this.entries[role]![hashedOwner]!;
125
+ this.entries[role]![hashedOwner] = [...curLevel, ..._level];
126
+
127
+ return this;
128
+ }
129
+ public static addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
130
+ return ACL.from().addAccess(role, ownerId, level);
131
+ }
132
+
133
+ public removeAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
134
+ const _level = Array.isArray(level) ? level : [level];
135
+ if (!this[role]) return this;
136
+ if (!this[role]![ownerId]) return this;
137
+ //acl[role]![ownerId] = acl[role]![ownerId]!.filter((l) => l !== level);
138
+ //remove the levels
139
+ const curLevel = this[role]![ownerId]!;
140
+ this[role]![ownerId] = curLevel.filter((l) => !_level.includes(l));
141
+
142
+ return this;
143
+ }
144
+
145
+ private serializeACL(tacl: IACL): string {
146
+ let compressed = '';
147
+
148
+ if (tacl.hashAlgorithm) {
149
+ compressed += `h:${tacl.hashAlgorithm}|`;
150
+ }
151
+
152
+ if (tacl.entries) {
153
+ for (const [role, entries] of Object.entries(tacl.entries)) {
154
+ const roleShort = RoleMap[role]; // Use the mapping for role
155
+ const entriesArray: any[] = [];
156
+
157
+ for (const [hashedOwnerKey, accessLevels] of Object.entries(entries || {})) {
158
+ if (accessLevels) {
159
+ const accessLevelsShort = accessLevels.map((level) => LevelMap[level]).join('');
160
+ entriesArray.push(`${hashedOwnerKey}/${accessLevelsShort}`);
161
+ }
162
+ }
163
+
164
+ if (entriesArray.length > 0) {
165
+ compressed += `${roleShort}:${entriesArray.join(',')}|`;
166
+ }
167
+ }
168
+ }
169
+
170
+ // Remove the trailing '|'
171
+ if (compressed.endsWith('|')) {
172
+ compressed = compressed.slice(0, -1);
173
+ }
174
+
175
+ return compressed;
176
+ }
177
+
178
+ private deserializeACL(compressed: string) {
179
+ const parts = compressed.split('|');
180
+ this.hashAlgorithm = '';
181
+ this.entries = {};
182
+
183
+ for (const part of parts) {
184
+ if (part.startsWith('h:')) {
185
+ this.hashAlgorithm = part.substring(2);
186
+ } else {
187
+ const [roleShort, entries] = part.split(':');
188
+ const role = ReverseRoleMap[roleShort]; // Use the reverse mapping for role
189
+
190
+ if (role) {
191
+ const entriesObj = {};
192
+ const entriesArray = entries.split(',');
193
+
194
+ for (const entry of entriesArray) {
195
+ const [hashedOwnerKey, accessLevelsShort] = entry.split('/');
196
+ const accessLevels = accessLevelsShort.split('').map((short) => ReverseLevelMap[short]);
197
+
198
+ entriesObj[hashedOwnerKey] = accessLevels;
199
+ }
200
+
201
+ this.entries[role] = entriesObj;
202
+ }
203
+ }
204
+ }
205
+
206
+ //return tacl;
207
+ }
208
+ }
@@ -1,82 +1,82 @@
1
- import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
2
- import { AccessRequest } from './AccessRequest.class';
3
-
4
- export class AccessCandidate implements IAccessCandidate {
5
- public role: TAccessRole;
6
- public id: string;
7
- //public _candidate: TAccessCandidate;
8
- constructor(candidate?: IAccessCandidate) {
9
- //this._candidate = candidate || { role: TAccessRole.Public, id: '' };
10
-
11
- this.role = candidate ? candidate.role : TAccessRole.Public;
12
- this.id = candidate ? this._validateId(candidate.id) : '';
13
- }
14
-
15
- private _validateId(id: string) {
16
- if (/[^a-zA-Z0-9-]/.test(id))
17
- throw new Error(`Access Candidate ID can only contain alphanumeric characters and hyphens, invalid id: ${id}`);
18
- return id;
19
- }
20
-
21
- public toString(): string {
22
- return `AC:R[${this.role}]:ID[${this.id}]`;
23
- }
24
-
25
- public get request(): AccessRequest {
26
- return new AccessRequest(this);
27
- }
28
-
29
- public get readRequest(): AccessRequest {
30
- return new AccessRequest(this).setLevel(TAccessLevel.Read);
31
- }
32
- public get writeRequest(): AccessRequest {
33
- return new AccessRequest(this).setLevel(TAccessLevel.Write);
34
- }
35
- public get ownerRequest(): AccessRequest {
36
- return new AccessRequest(this).setLevel(TAccessLevel.Owner);
37
- }
38
-
39
- public static clone(candidate: IAccessCandidate): AccessCandidate {
40
- return new AccessCandidate(candidate);
41
- }
42
-
43
- public team(teamId: string): AccessCandidate {
44
- this.role = TAccessRole.Team;
45
- this.id = teamId;
46
-
47
- return this;
48
- }
49
- static team(teamId: string): AccessCandidate {
50
- return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
51
- }
52
-
53
- public agent(agentId: string): AccessCandidate {
54
- this.role = TAccessRole.Agent;
55
- this.id = agentId;
56
- return this;
57
- }
58
- static agent(agentId: string): AccessCandidate {
59
- return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
60
- }
61
-
62
- public user(userId: string): AccessCandidate {
63
- this.role = TAccessRole.User;
64
- this.id = userId;
65
- return this;
66
- }
67
- static user(userId: string): AccessCandidate {
68
- return new AccessCandidate({ role: TAccessRole.User, id: userId });
69
- }
70
-
71
- public public(): AccessCandidate {
72
- this.role = TAccessRole.Public;
73
-
74
- //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
75
- this.id = TAccessRole.Public;
76
-
77
- return this;
78
- }
79
- static public(): AccessCandidate {
80
- return new AccessCandidate({ role: TAccessRole.Public, id: '' });
81
- }
82
- }
1
+ import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
2
+ import { AccessRequest } from './AccessRequest.class';
3
+
4
+ export class AccessCandidate implements IAccessCandidate {
5
+ public role: TAccessRole;
6
+ public id: string;
7
+ //public _candidate: TAccessCandidate;
8
+ constructor(candidate?: IAccessCandidate) {
9
+ //this._candidate = candidate || { role: TAccessRole.Public, id: '' };
10
+
11
+ this.role = candidate ? candidate.role : TAccessRole.Public;
12
+ this.id = candidate ? this._validateId(candidate.id) : '';
13
+ }
14
+
15
+ private _validateId(id: string) {
16
+ if (/[^a-zA-Z0-9-]/.test(id))
17
+ throw new Error(`Access Candidate ID can only contain alphanumeric characters and hyphens, invalid id: ${id}`);
18
+ return id;
19
+ }
20
+
21
+ public toString(): string {
22
+ return `AC:R[${this.role}]:ID[${this.id}]`;
23
+ }
24
+
25
+ public get request(): AccessRequest {
26
+ return new AccessRequest(this);
27
+ }
28
+
29
+ public get readRequest(): AccessRequest {
30
+ return new AccessRequest(this).setLevel(TAccessLevel.Read);
31
+ }
32
+ public get writeRequest(): AccessRequest {
33
+ return new AccessRequest(this).setLevel(TAccessLevel.Write);
34
+ }
35
+ public get ownerRequest(): AccessRequest {
36
+ return new AccessRequest(this).setLevel(TAccessLevel.Owner);
37
+ }
38
+
39
+ public static clone(candidate: IAccessCandidate): AccessCandidate {
40
+ return new AccessCandidate(candidate);
41
+ }
42
+
43
+ public team(teamId: string): AccessCandidate {
44
+ this.role = TAccessRole.Team;
45
+ this.id = teamId;
46
+
47
+ return this;
48
+ }
49
+ static team(teamId: string): AccessCandidate {
50
+ return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
51
+ }
52
+
53
+ public agent(agentId: string): AccessCandidate {
54
+ this.role = TAccessRole.Agent;
55
+ this.id = agentId;
56
+ return this;
57
+ }
58
+ static agent(agentId: string): AccessCandidate {
59
+ return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
60
+ }
61
+
62
+ public user(userId: string): AccessCandidate {
63
+ this.role = TAccessRole.User;
64
+ this.id = userId;
65
+ return this;
66
+ }
67
+ static user(userId: string): AccessCandidate {
68
+ return new AccessCandidate({ role: TAccessRole.User, id: userId });
69
+ }
70
+
71
+ public public(): AccessCandidate {
72
+ this.role = TAccessRole.Public;
73
+
74
+ //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
75
+ this.id = TAccessRole.Public;
76
+
77
+ return this;
78
+ }
79
+ static public(): AccessCandidate {
80
+ return new AccessCandidate({ role: TAccessRole.Public, id: '' });
81
+ }
82
+ }