@smythos/sre 1.5.44 → 1.5.45

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (227) hide show
  1. package/CHANGELOG +90 -90
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/index.js +3 -3
  5. package/dist/index.js.map +1 -1
  6. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +13 -1
  7. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.d.ts +46 -27
  8. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.d.ts +4 -2
  9. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/types.d.ts +0 -4
  10. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +39 -0
  11. package/dist/types/types/LLM.types.d.ts +1 -0
  12. package/package.json +1 -1
  13. package/src/Components/APICall/APICall.class.ts +156 -156
  14. package/src/Components/APICall/AccessTokenManager.ts +130 -130
  15. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  16. package/src/Components/APICall/OAuth.helper.ts +294 -294
  17. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  18. package/src/Components/APICall/parseData.ts +167 -167
  19. package/src/Components/APICall/parseHeaders.ts +41 -41
  20. package/src/Components/APICall/parseProxy.ts +68 -68
  21. package/src/Components/APICall/parseUrl.ts +91 -91
  22. package/src/Components/APIEndpoint.class.ts +234 -234
  23. package/src/Components/APIOutput.class.ts +58 -58
  24. package/src/Components/AgentPlugin.class.ts +102 -102
  25. package/src/Components/Async.class.ts +155 -155
  26. package/src/Components/Await.class.ts +90 -90
  27. package/src/Components/Classifier.class.ts +158 -158
  28. package/src/Components/Component.class.ts +132 -132
  29. package/src/Components/ComponentHost.class.ts +38 -38
  30. package/src/Components/DataSourceCleaner.class.ts +92 -92
  31. package/src/Components/DataSourceIndexer.class.ts +181 -181
  32. package/src/Components/DataSourceLookup.class.ts +161 -161
  33. package/src/Components/ECMASandbox.class.ts +71 -71
  34. package/src/Components/FEncDec.class.ts +29 -29
  35. package/src/Components/FHash.class.ts +33 -33
  36. package/src/Components/FSign.class.ts +80 -80
  37. package/src/Components/FSleep.class.ts +25 -25
  38. package/src/Components/FTimestamp.class.ts +25 -25
  39. package/src/Components/FileStore.class.ts +78 -78
  40. package/src/Components/ForEach.class.ts +97 -97
  41. package/src/Components/GPTPlugin.class.ts +70 -70
  42. package/src/Components/GenAILLM.class.ts +586 -586
  43. package/src/Components/HuggingFace.class.ts +314 -314
  44. package/src/Components/Image/imageSettings.config.ts +70 -70
  45. package/src/Components/ImageGenerator.class.ts +502 -502
  46. package/src/Components/JSONFilter.class.ts +54 -54
  47. package/src/Components/LLMAssistant.class.ts +213 -213
  48. package/src/Components/LogicAND.class.ts +28 -28
  49. package/src/Components/LogicAtLeast.class.ts +85 -85
  50. package/src/Components/LogicAtMost.class.ts +86 -86
  51. package/src/Components/LogicOR.class.ts +29 -29
  52. package/src/Components/LogicXOR.class.ts +34 -34
  53. package/src/Components/MCPClient.class.ts +112 -112
  54. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  55. package/src/Components/MemoryReadKeyVal.class.ts +66 -66
  56. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  57. package/src/Components/MemoryWriteObject.class.ts +97 -97
  58. package/src/Components/MultimodalLLM.class.ts +128 -128
  59. package/src/Components/OpenAPI.class.ts +72 -72
  60. package/src/Components/PromptGenerator.class.ts +122 -122
  61. package/src/Components/ScrapflyWebScrape.class.ts +159 -159
  62. package/src/Components/ServerlessCode.class.ts +123 -123
  63. package/src/Components/TavilyWebSearch.class.ts +98 -98
  64. package/src/Components/VisionLLM.class.ts +104 -104
  65. package/src/Components/ZapierAction.class.ts +127 -127
  66. package/src/Components/index.ts +97 -97
  67. package/src/Core/AgentProcess.helper.ts +240 -240
  68. package/src/Core/Connector.class.ts +123 -123
  69. package/src/Core/ConnectorsService.ts +197 -197
  70. package/src/Core/DummyConnector.ts +49 -49
  71. package/src/Core/HookService.ts +105 -105
  72. package/src/Core/SmythRuntime.class.ts +235 -235
  73. package/src/Core/SystemEvents.ts +16 -16
  74. package/src/Core/boot.ts +56 -56
  75. package/src/config.ts +15 -15
  76. package/src/constants.ts +126 -126
  77. package/src/data/hugging-face.params.json +579 -579
  78. package/src/helpers/AWSLambdaCode.helper.ts +587 -587
  79. package/src/helpers/BinaryInput.helper.ts +331 -331
  80. package/src/helpers/Conversation.helper.ts +1119 -1119
  81. package/src/helpers/ECMASandbox.helper.ts +54 -54
  82. package/src/helpers/JsonContent.helper.ts +97 -97
  83. package/src/helpers/LocalCache.helper.ts +97 -97
  84. package/src/helpers/Log.helper.ts +274 -274
  85. package/src/helpers/OpenApiParser.helper.ts +150 -150
  86. package/src/helpers/S3Cache.helper.ts +147 -147
  87. package/src/helpers/SmythURI.helper.ts +5 -5
  88. package/src/helpers/Sysconfig.helper.ts +77 -77
  89. package/src/helpers/TemplateString.helper.ts +243 -243
  90. package/src/helpers/TypeChecker.helper.ts +329 -329
  91. package/src/index.ts +196 -196
  92. package/src/index.ts.bak +196 -196
  93. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  94. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  95. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  96. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  97. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
  98. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  99. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  100. package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
  101. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  102. package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
  103. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  104. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  105. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  106. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  107. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  108. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  109. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  110. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  111. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  112. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
  113. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  114. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  115. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  116. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  117. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  118. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  119. package/src/subsystems/IO/Log.service/index.ts +13 -13
  120. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  121. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  122. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  123. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  124. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  125. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  126. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  127. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  128. package/src/subsystems/IO/Router.service/index.ts +11 -11
  129. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
  130. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  131. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  132. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  133. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  134. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  135. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
  136. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
  137. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
  138. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  139. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  140. package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
  141. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  142. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  143. package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
  144. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
  145. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  146. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
  147. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
  148. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
  149. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
  150. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
  151. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
  152. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
  153. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -455
  154. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +528 -528
  155. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  156. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  157. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1168 -862
  158. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -37
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  160. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
  161. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -37
  162. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
  163. package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
  164. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
  165. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
  166. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  167. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  168. package/src/subsystems/LLMManager/models.ts +2540 -2540
  169. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  170. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  171. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  172. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
  173. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  174. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  175. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  176. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  177. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  178. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  179. package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
  180. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  181. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  182. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  183. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  184. package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
  185. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  186. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
  187. package/src/subsystems/Security/Account.service/index.ts +14 -14
  188. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  189. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  190. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  191. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  192. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  193. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  194. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  195. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  196. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  197. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  198. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  199. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  200. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  201. package/src/types/ACL.types.ts +104 -104
  202. package/src/types/AWS.types.ts +10 -10
  203. package/src/types/Agent.types.ts +61 -61
  204. package/src/types/AgentLogger.types.ts +17 -17
  205. package/src/types/Cache.types.ts +1 -1
  206. package/src/types/Common.types.ts +2 -2
  207. package/src/types/LLM.types.ts +496 -495
  208. package/src/types/Redis.types.ts +8 -8
  209. package/src/types/SRE.types.ts +64 -64
  210. package/src/types/Security.types.ts +14 -14
  211. package/src/types/Storage.types.ts +5 -5
  212. package/src/types/VectorDB.types.ts +86 -86
  213. package/src/utils/base64.utils.ts +275 -275
  214. package/src/utils/cli.utils.ts +68 -68
  215. package/src/utils/data.utils.ts +322 -322
  216. package/src/utils/date-time.utils.ts +22 -22
  217. package/src/utils/general.utils.ts +238 -238
  218. package/src/utils/index.ts +12 -12
  219. package/src/utils/lazy-client.ts +261 -261
  220. package/src/utils/numbers.utils.ts +13 -13
  221. package/src/utils/oauth.utils.ts +35 -35
  222. package/src/utils/string.utils.ts +414 -414
  223. package/src/utils/url.utils.ts +19 -19
  224. package/src/utils/validation.utils.ts +74 -74
  225. package/dist/bundle-analysis-lazy.html +0 -4949
  226. package/dist/bundle-analysis.html +0 -4949
  227. package/dist/types/utils/package-manager.utils.d.ts +0 -26
@@ -1,327 +1,327 @@
1
- //==[ SRE: LocalStorage ]======================
2
-
3
- import { Logger } from '@sre/helpers/Log.helper';
4
- import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
5
- import { ACL } from '@sre/Security/AccessControl/ACL.class';
6
- import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
7
- import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
8
- //import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
9
- import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
10
- import { SecureConnector } from '@sre/Security/SecureConnector.class';
11
- import fs, { existsSync } from 'fs';
12
- import os from 'os';
13
- import path from 'path';
14
- import { findSmythPath } from '../../../..';
15
-
16
- const console = Logger('LocalStorage');
17
-
18
- export type LocalStorageConfig = {
19
- /**
20
- * The folder to use for the local storage.
21
- *
22
- * If not provided, the default folder will be used.
23
- * The default folder is ~/.smyth/storage
24
- */
25
- folder?: string;
26
- };
27
-
28
- //TODO : detect and store ContentType metadata when saving
29
-
30
- export class LocalStorage extends StorageConnector {
31
- public name = 'LocalStorage';
32
- private folder: string;
33
- private storagePrefix = 'local';
34
- private metadataPrefix = '.local.metadata';
35
- private isInitialized = false;
36
-
37
- constructor(protected _settings?: LocalStorageConfig) {
38
- super(_settings);
39
- //if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
40
-
41
- this.folder = this.findStorageFolder(_settings?.folder);
42
- this.initialize();
43
- if (!fs.existsSync(this.folder)) {
44
- //throw new Error('Invalid folder provided');
45
- console.error(`Invalid folder provided: ${this.folder}`);
46
- }
47
- }
48
-
49
- private findStorageFolder(folder) {
50
- let _storageFolder = folder;
51
-
52
- if (fs.existsSync(_storageFolder)) {
53
- return _storageFolder;
54
- }
55
-
56
- _storageFolder = findSmythPath('storage');
57
-
58
- if (fs.existsSync(_storageFolder)) {
59
- console.warn('Using alternative storage folder found in : ', _storageFolder);
60
- return _storageFolder;
61
- }
62
-
63
- console.warn('!!! All attempts to find an existing storage folder failed !!!');
64
- console.warn('!!! I will use this folder: ', _storageFolder);
65
- return _storageFolder;
66
- }
67
-
68
- /**
69
- * Reads an object from the local storage.
70
- *
71
- * @param {string} resourceId - The key of the object to be read.
72
- * @returns {Promise<any>} - A promise that resolves with the object data.
73
- */
74
-
75
- @SecureConnector.AccessControl
76
- public async read(acRequest: AccessRequest, resourceId: string) {
77
- if (!this.isInitialized) {
78
- await this.initialize();
79
- }
80
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
81
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
82
- try {
83
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
84
- if (!fs.existsSync(filePath)) return undefined;
85
- const data = fs.readFileSync(filePath, null);
86
- return data;
87
- } catch (error) {
88
- console.error(`Error reading object from local storage`, error.name, error.message);
89
- throw error;
90
- }
91
- }
92
-
93
- @SecureConnector.AccessControl
94
- async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
95
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
96
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
97
-
98
- try {
99
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
100
- if (!fs.existsSync(metadataFilePath)) return undefined;
101
- const data = fs.readFileSync(metadataFilePath, 'utf-8');
102
- return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
103
- } catch (error) {
104
- console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
105
- throw error;
106
- }
107
- }
108
-
109
- @SecureConnector.AccessControl
110
- async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
111
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
112
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
113
-
114
- try {
115
- let fileMetadata = await this.getMetadata(acRequest, resourceId);
116
- if (!fileMetadata) fileMetadata = {};
117
-
118
- fileMetadata = { ...fileMetadata, ...metadata };
119
-
120
- //now we can write the metadata
121
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
122
- const serializedMetadata = this.serializeMetadata(fileMetadata);
123
- fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
124
- } catch (error) {
125
- console.error(`Error setting metadata in local storage`, error.name, error.message);
126
- throw error;
127
- }
128
- }
129
- /**
130
- * Writes an object to the local storage.
131
- *
132
- * @param {string} resourceId - The key of the object to be written.
133
- * @param {any} value - The value of the object to be written.
134
- * @param {Metadata} metadata - Optional metadata to be associated with the object.
135
- * @returns {Promise<void>} - A promise that resolves when the object has been written.
136
- */
137
- @SecureConnector.AccessControl
138
- async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
139
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
140
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
141
- if (!this.isInitialized) {
142
- await this.initialize();
143
- }
144
- const accessCandidate = acRequest.candidate;
145
-
146
- let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
147
- let fileMetadata = {
148
- ...metadata,
149
- acl: localACL,
150
- };
151
-
152
- //now we can write the file
153
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
154
- fs.writeFileSync(filePath, value as Buffer);
155
- //now we can write the metadata
156
- await this.setMetadata(acRequest, resourceId, fileMetadata);
157
- }
158
-
159
- /**
160
- * Deletes an object from the local storage.
161
- *
162
- * @param {string} resourceId - The key of the object to be deleted.
163
- * @returns {Promise<void>} - A promise that resolves when the object has been deleted.
164
- */
165
- @SecureConnector.AccessControl
166
- async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
167
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
168
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
169
-
170
- try {
171
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
172
- if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
173
-
174
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
175
- if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
176
- } catch (error) {
177
- console.error(`Error deleting object from local storage`, error.name, error.message);
178
- throw error;
179
- }
180
- }
181
-
182
- @SecureConnector.AccessControl
183
- async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
184
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
185
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
186
- if (!this.isInitialized) {
187
- await this.initialize();
188
- }
189
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
190
- return !!fs.existsSync(filePath);
191
- }
192
-
193
- //this determines the access rights for the requested resource
194
- //the connector should check if the resource exists or not
195
- //if the resource exists we read it's ACL and return it
196
- //if the resource does not exist we return an write access ACL for the candidate
197
- public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
198
- if (!this.isInitialized) {
199
- await this.initialize();
200
- }
201
- const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
202
-
203
- if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
204
-
205
- const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
206
- const exists = metadata !== undefined; //undefined metadata means the resource does not exist
207
-
208
- if (!exists) {
209
- //the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
210
- return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
211
- }
212
- try {
213
- let metadataObject = JSON.parse(metadata);
214
- return ACL.from(metadataObject?.['acl'] as IACL);
215
- } catch (error) {
216
- console.error(`Error parsing metadata in local storage`, error.name, error.message);
217
- throw error;
218
- }
219
- }
220
-
221
- @SecureConnector.AccessControl
222
- async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
223
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
224
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
225
-
226
- try {
227
- const fileMetadata = await this.getMetadata(acRequest, resourceId);
228
- return ACL.from(fileMetadata?.['acl'] as IACL);
229
- } catch (error) {
230
- console.error(`Error getting access rights in local storage`, error.name, error.message);
231
- throw error;
232
- }
233
- }
234
-
235
- @SecureConnector.AccessControl
236
- async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
237
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
238
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
239
-
240
- try {
241
- let fileMetadata = await this.getMetadata(acRequest, resourceId);
242
- if (!fileMetadata) fileMetadata = {};
243
- //when setting ACL make sure to not lose ownership
244
- fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
245
- await this.setMetadata(acRequest, resourceId, fileMetadata);
246
- } catch (error) {
247
- console.error(`Error setting access rights in local storage`, error);
248
- throw error;
249
- }
250
- }
251
-
252
- @SecureConnector.AccessControl
253
- async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
254
- console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
255
- }
256
-
257
- private async initialize() {
258
- const storageFolderPath = path.join(this.folder, this.storagePrefix);
259
- if (!existsSync(storageFolderPath)) {
260
- fs.mkdirSync(storageFolderPath, { recursive: true });
261
- }
262
- const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
263
- if (!existsSync(metadataFolderPath)) {
264
- fs.mkdirSync(metadataFolderPath, { recursive: true });
265
- fs.writeFileSync(
266
- path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
267
- 'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
268
- );
269
- }
270
- this.isInitialized = true;
271
- }
272
-
273
- private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
274
- const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
275
- const folder = path.dirname(fullPath);
276
- if (createFoldersIfNotExists && !fs.existsSync(folder)) {
277
- fs.mkdirSync(folder, { recursive: true });
278
- }
279
-
280
- return fullPath;
281
- }
282
-
283
- private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
284
- const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
285
- const folder = path.dirname(fullPath);
286
- if (createFoldersIfNotExists && !fs.existsSync(folder)) {
287
- fs.mkdirSync(folder, { recursive: true });
288
- }
289
-
290
- return fullPath;
291
- }
292
-
293
- private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
294
- let updatedMetadata = {};
295
- if (metadata['acl']) {
296
- if (metadata['acl']) {
297
- updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
298
- }
299
-
300
- delete metadata['acl'];
301
- }
302
-
303
- for (let key in metadata) {
304
- updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
305
- }
306
-
307
- return updatedMetadata;
308
- }
309
-
310
- private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
311
- let deserializedMetadata: Record<string, any> = {};
312
-
313
- for (let key in metadata) {
314
- if (key === 'acl') {
315
- deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
316
- continue;
317
- }
318
-
319
- try {
320
- deserializedMetadata[key] = JSON.parse(metadata[key]);
321
- } catch (error) {
322
- deserializedMetadata[key] = metadata[key];
323
- }
324
- }
325
- return deserializedMetadata;
326
- }
327
- }
1
+ //==[ SRE: LocalStorage ]======================
2
+
3
+ import { Logger } from '@sre/helpers/Log.helper';
4
+ import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
5
+ import { ACL } from '@sre/Security/AccessControl/ACL.class';
6
+ import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
7
+ import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
8
+ //import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
9
+ import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
10
+ import { SecureConnector } from '@sre/Security/SecureConnector.class';
11
+ import fs, { existsSync } from 'fs';
12
+ import os from 'os';
13
+ import path from 'path';
14
+ import { findSmythPath } from '../../../..';
15
+
16
+ const console = Logger('LocalStorage');
17
+
18
+ export type LocalStorageConfig = {
19
+ /**
20
+ * The folder to use for the local storage.
21
+ *
22
+ * If not provided, the default folder will be used.
23
+ * The default folder is ~/.smyth/storage
24
+ */
25
+ folder?: string;
26
+ };
27
+
28
+ //TODO : detect and store ContentType metadata when saving
29
+
30
+ export class LocalStorage extends StorageConnector {
31
+ public name = 'LocalStorage';
32
+ private folder: string;
33
+ private storagePrefix = 'local';
34
+ private metadataPrefix = '.local.metadata';
35
+ private isInitialized = false;
36
+
37
+ constructor(protected _settings?: LocalStorageConfig) {
38
+ super(_settings);
39
+ //if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
40
+
41
+ this.folder = this.findStorageFolder(_settings?.folder);
42
+ this.initialize();
43
+ if (!fs.existsSync(this.folder)) {
44
+ //throw new Error('Invalid folder provided');
45
+ console.error(`Invalid folder provided: ${this.folder}`);
46
+ }
47
+ }
48
+
49
+ private findStorageFolder(folder) {
50
+ let _storageFolder = folder;
51
+
52
+ if (fs.existsSync(_storageFolder)) {
53
+ return _storageFolder;
54
+ }
55
+
56
+ _storageFolder = findSmythPath('storage');
57
+
58
+ if (fs.existsSync(_storageFolder)) {
59
+ console.warn('Using alternative storage folder found in : ', _storageFolder);
60
+ return _storageFolder;
61
+ }
62
+
63
+ console.warn('!!! All attempts to find an existing storage folder failed !!!');
64
+ console.warn('!!! I will use this folder: ', _storageFolder);
65
+ return _storageFolder;
66
+ }
67
+
68
+ /**
69
+ * Reads an object from the local storage.
70
+ *
71
+ * @param {string} resourceId - The key of the object to be read.
72
+ * @returns {Promise<any>} - A promise that resolves with the object data.
73
+ */
74
+
75
+ @SecureConnector.AccessControl
76
+ public async read(acRequest: AccessRequest, resourceId: string) {
77
+ if (!this.isInitialized) {
78
+ await this.initialize();
79
+ }
80
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
81
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
82
+ try {
83
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
84
+ if (!fs.existsSync(filePath)) return undefined;
85
+ const data = fs.readFileSync(filePath, null);
86
+ return data;
87
+ } catch (error) {
88
+ console.error(`Error reading object from local storage`, error.name, error.message);
89
+ throw error;
90
+ }
91
+ }
92
+
93
+ @SecureConnector.AccessControl
94
+ async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
95
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
96
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
97
+
98
+ try {
99
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
100
+ if (!fs.existsSync(metadataFilePath)) return undefined;
101
+ const data = fs.readFileSync(metadataFilePath, 'utf-8');
102
+ return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
103
+ } catch (error) {
104
+ console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
105
+ throw error;
106
+ }
107
+ }
108
+
109
+ @SecureConnector.AccessControl
110
+ async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
111
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
112
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
113
+
114
+ try {
115
+ let fileMetadata = await this.getMetadata(acRequest, resourceId);
116
+ if (!fileMetadata) fileMetadata = {};
117
+
118
+ fileMetadata = { ...fileMetadata, ...metadata };
119
+
120
+ //now we can write the metadata
121
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
122
+ const serializedMetadata = this.serializeMetadata(fileMetadata);
123
+ fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
124
+ } catch (error) {
125
+ console.error(`Error setting metadata in local storage`, error.name, error.message);
126
+ throw error;
127
+ }
128
+ }
129
+ /**
130
+ * Writes an object to the local storage.
131
+ *
132
+ * @param {string} resourceId - The key of the object to be written.
133
+ * @param {any} value - The value of the object to be written.
134
+ * @param {Metadata} metadata - Optional metadata to be associated with the object.
135
+ * @returns {Promise<void>} - A promise that resolves when the object has been written.
136
+ */
137
+ @SecureConnector.AccessControl
138
+ async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
139
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
140
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
141
+ if (!this.isInitialized) {
142
+ await this.initialize();
143
+ }
144
+ const accessCandidate = acRequest.candidate;
145
+
146
+ let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
147
+ let fileMetadata = {
148
+ ...metadata,
149
+ acl: localACL,
150
+ };
151
+
152
+ //now we can write the file
153
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
154
+ fs.writeFileSync(filePath, value as Buffer);
155
+ //now we can write the metadata
156
+ await this.setMetadata(acRequest, resourceId, fileMetadata);
157
+ }
158
+
159
+ /**
160
+ * Deletes an object from the local storage.
161
+ *
162
+ * @param {string} resourceId - The key of the object to be deleted.
163
+ * @returns {Promise<void>} - A promise that resolves when the object has been deleted.
164
+ */
165
+ @SecureConnector.AccessControl
166
+ async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
167
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
168
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
169
+
170
+ try {
171
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
172
+ if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
173
+
174
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
175
+ if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
176
+ } catch (error) {
177
+ console.error(`Error deleting object from local storage`, error.name, error.message);
178
+ throw error;
179
+ }
180
+ }
181
+
182
+ @SecureConnector.AccessControl
183
+ async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
184
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
185
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
186
+ if (!this.isInitialized) {
187
+ await this.initialize();
188
+ }
189
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
190
+ return !!fs.existsSync(filePath);
191
+ }
192
+
193
+ //this determines the access rights for the requested resource
194
+ //the connector should check if the resource exists or not
195
+ //if the resource exists we read it's ACL and return it
196
+ //if the resource does not exist we return an write access ACL for the candidate
197
+ public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
198
+ if (!this.isInitialized) {
199
+ await this.initialize();
200
+ }
201
+ const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
202
+
203
+ if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
204
+
205
+ const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
206
+ const exists = metadata !== undefined; //undefined metadata means the resource does not exist
207
+
208
+ if (!exists) {
209
+ //the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
210
+ return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
211
+ }
212
+ try {
213
+ let metadataObject = JSON.parse(metadata);
214
+ return ACL.from(metadataObject?.['acl'] as IACL);
215
+ } catch (error) {
216
+ console.error(`Error parsing metadata in local storage`, error.name, error.message);
217
+ throw error;
218
+ }
219
+ }
220
+
221
+ @SecureConnector.AccessControl
222
+ async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
223
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
224
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
225
+
226
+ try {
227
+ const fileMetadata = await this.getMetadata(acRequest, resourceId);
228
+ return ACL.from(fileMetadata?.['acl'] as IACL);
229
+ } catch (error) {
230
+ console.error(`Error getting access rights in local storage`, error.name, error.message);
231
+ throw error;
232
+ }
233
+ }
234
+
235
+ @SecureConnector.AccessControl
236
+ async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
237
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
238
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
239
+
240
+ try {
241
+ let fileMetadata = await this.getMetadata(acRequest, resourceId);
242
+ if (!fileMetadata) fileMetadata = {};
243
+ //when setting ACL make sure to not lose ownership
244
+ fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
245
+ await this.setMetadata(acRequest, resourceId, fileMetadata);
246
+ } catch (error) {
247
+ console.error(`Error setting access rights in local storage`, error);
248
+ throw error;
249
+ }
250
+ }
251
+
252
+ @SecureConnector.AccessControl
253
+ async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
254
+ console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
255
+ }
256
+
257
+ private async initialize() {
258
+ const storageFolderPath = path.join(this.folder, this.storagePrefix);
259
+ if (!existsSync(storageFolderPath)) {
260
+ fs.mkdirSync(storageFolderPath, { recursive: true });
261
+ }
262
+ const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
263
+ if (!existsSync(metadataFolderPath)) {
264
+ fs.mkdirSync(metadataFolderPath, { recursive: true });
265
+ fs.writeFileSync(
266
+ path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
267
+ 'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
268
+ );
269
+ }
270
+ this.isInitialized = true;
271
+ }
272
+
273
+ private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
274
+ const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
275
+ const folder = path.dirname(fullPath);
276
+ if (createFoldersIfNotExists && !fs.existsSync(folder)) {
277
+ fs.mkdirSync(folder, { recursive: true });
278
+ }
279
+
280
+ return fullPath;
281
+ }
282
+
283
+ private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
284
+ const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
285
+ const folder = path.dirname(fullPath);
286
+ if (createFoldersIfNotExists && !fs.existsSync(folder)) {
287
+ fs.mkdirSync(folder, { recursive: true });
288
+ }
289
+
290
+ return fullPath;
291
+ }
292
+
293
+ private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
294
+ let updatedMetadata = {};
295
+ if (metadata['acl']) {
296
+ if (metadata['acl']) {
297
+ updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
298
+ }
299
+
300
+ delete metadata['acl'];
301
+ }
302
+
303
+ for (let key in metadata) {
304
+ updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
305
+ }
306
+
307
+ return updatedMetadata;
308
+ }
309
+
310
+ private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
311
+ let deserializedMetadata: Record<string, any> = {};
312
+
313
+ for (let key in metadata) {
314
+ if (key === 'acl') {
315
+ deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
316
+ continue;
317
+ }
318
+
319
+ try {
320
+ deserializedMetadata[key] = JSON.parse(metadata[key]);
321
+ } catch (error) {
322
+ deserializedMetadata[key] = metadata[key];
323
+ }
324
+ }
325
+ return deserializedMetadata;
326
+ }
327
+ }