@smythos/sre 1.5.44 → 1.5.45
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +90 -90
- package/LICENSE +18 -18
- package/README.md +135 -135
- package/dist/index.js +3 -3
- package/dist/index.js.map +1 -1
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +13 -1
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.d.ts +46 -27
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.d.ts +4 -2
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/types.d.ts +0 -4
- package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +39 -0
- package/dist/types/types/LLM.types.d.ts +1 -0
- package/package.json +1 -1
- package/src/Components/APICall/APICall.class.ts +156 -156
- package/src/Components/APICall/AccessTokenManager.ts +130 -130
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
- package/src/Components/APICall/OAuth.helper.ts +294 -294
- package/src/Components/APICall/mimeTypeCategories.ts +46 -46
- package/src/Components/APICall/parseData.ts +167 -167
- package/src/Components/APICall/parseHeaders.ts +41 -41
- package/src/Components/APICall/parseProxy.ts +68 -68
- package/src/Components/APICall/parseUrl.ts +91 -91
- package/src/Components/APIEndpoint.class.ts +234 -234
- package/src/Components/APIOutput.class.ts +58 -58
- package/src/Components/AgentPlugin.class.ts +102 -102
- package/src/Components/Async.class.ts +155 -155
- package/src/Components/Await.class.ts +90 -90
- package/src/Components/Classifier.class.ts +158 -158
- package/src/Components/Component.class.ts +132 -132
- package/src/Components/ComponentHost.class.ts +38 -38
- package/src/Components/DataSourceCleaner.class.ts +92 -92
- package/src/Components/DataSourceIndexer.class.ts +181 -181
- package/src/Components/DataSourceLookup.class.ts +161 -161
- package/src/Components/ECMASandbox.class.ts +71 -71
- package/src/Components/FEncDec.class.ts +29 -29
- package/src/Components/FHash.class.ts +33 -33
- package/src/Components/FSign.class.ts +80 -80
- package/src/Components/FSleep.class.ts +25 -25
- package/src/Components/FTimestamp.class.ts +25 -25
- package/src/Components/FileStore.class.ts +78 -78
- package/src/Components/ForEach.class.ts +97 -97
- package/src/Components/GPTPlugin.class.ts +70 -70
- package/src/Components/GenAILLM.class.ts +586 -586
- package/src/Components/HuggingFace.class.ts +314 -314
- package/src/Components/Image/imageSettings.config.ts +70 -70
- package/src/Components/ImageGenerator.class.ts +502 -502
- package/src/Components/JSONFilter.class.ts +54 -54
- package/src/Components/LLMAssistant.class.ts +213 -213
- package/src/Components/LogicAND.class.ts +28 -28
- package/src/Components/LogicAtLeast.class.ts +85 -85
- package/src/Components/LogicAtMost.class.ts +86 -86
- package/src/Components/LogicOR.class.ts +29 -29
- package/src/Components/LogicXOR.class.ts +34 -34
- package/src/Components/MCPClient.class.ts +112 -112
- package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
- package/src/Components/MemoryReadKeyVal.class.ts +66 -66
- package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
- package/src/Components/MemoryWriteObject.class.ts +97 -97
- package/src/Components/MultimodalLLM.class.ts +128 -128
- package/src/Components/OpenAPI.class.ts +72 -72
- package/src/Components/PromptGenerator.class.ts +122 -122
- package/src/Components/ScrapflyWebScrape.class.ts +159 -159
- package/src/Components/ServerlessCode.class.ts +123 -123
- package/src/Components/TavilyWebSearch.class.ts +98 -98
- package/src/Components/VisionLLM.class.ts +104 -104
- package/src/Components/ZapierAction.class.ts +127 -127
- package/src/Components/index.ts +97 -97
- package/src/Core/AgentProcess.helper.ts +240 -240
- package/src/Core/Connector.class.ts +123 -123
- package/src/Core/ConnectorsService.ts +197 -197
- package/src/Core/DummyConnector.ts +49 -49
- package/src/Core/HookService.ts +105 -105
- package/src/Core/SmythRuntime.class.ts +235 -235
- package/src/Core/SystemEvents.ts +16 -16
- package/src/Core/boot.ts +56 -56
- package/src/config.ts +15 -15
- package/src/constants.ts +126 -126
- package/src/data/hugging-face.params.json +579 -579
- package/src/helpers/AWSLambdaCode.helper.ts +587 -587
- package/src/helpers/BinaryInput.helper.ts +331 -331
- package/src/helpers/Conversation.helper.ts +1119 -1119
- package/src/helpers/ECMASandbox.helper.ts +54 -54
- package/src/helpers/JsonContent.helper.ts +97 -97
- package/src/helpers/LocalCache.helper.ts +97 -97
- package/src/helpers/Log.helper.ts +274 -274
- package/src/helpers/OpenApiParser.helper.ts +150 -150
- package/src/helpers/S3Cache.helper.ts +147 -147
- package/src/helpers/SmythURI.helper.ts +5 -5
- package/src/helpers/Sysconfig.helper.ts +77 -77
- package/src/helpers/TemplateString.helper.ts +243 -243
- package/src/helpers/TypeChecker.helper.ts +329 -329
- package/src/index.ts +196 -196
- package/src/index.ts.bak +196 -196
- package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
- package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
- package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
- package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
- package/src/subsystems/IO/CLI.service/index.ts +9 -9
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
- package/src/subsystems/IO/Log.service/index.ts +13 -13
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
- package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
- package/src/subsystems/IO/NKV.service/index.ts +14 -14
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
- package/src/subsystems/IO/Router.service/index.ts +11 -11
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
- package/src/subsystems/IO/Storage.service/index.ts +13 -13
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
- package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
- package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -455
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +528 -528
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1168 -862
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -37
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -37
- package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
- package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
- package/src/subsystems/LLMManager/custom-models.ts +854 -854
- package/src/subsystems/LLMManager/models.ts +2540 -2540
- package/src/subsystems/LLMManager/paramMappings.ts +69 -69
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
- package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
- package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
- package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
- package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
- package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
- package/src/subsystems/Security/Account.service/index.ts +14 -14
- package/src/subsystems/Security/Credentials.helper.ts +62 -62
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
- package/src/subsystems/Security/SecureConnector.class.ts +110 -110
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
- package/src/subsystems/Security/Vault.service/index.ts +12 -12
- package/src/types/ACL.types.ts +104 -104
- package/src/types/AWS.types.ts +10 -10
- package/src/types/Agent.types.ts +61 -61
- package/src/types/AgentLogger.types.ts +17 -17
- package/src/types/Cache.types.ts +1 -1
- package/src/types/Common.types.ts +2 -2
- package/src/types/LLM.types.ts +496 -495
- package/src/types/Redis.types.ts +8 -8
- package/src/types/SRE.types.ts +64 -64
- package/src/types/Security.types.ts +14 -14
- package/src/types/Storage.types.ts +5 -5
- package/src/types/VectorDB.types.ts +86 -86
- package/src/utils/base64.utils.ts +275 -275
- package/src/utils/cli.utils.ts +68 -68
- package/src/utils/data.utils.ts +322 -322
- package/src/utils/date-time.utils.ts +22 -22
- package/src/utils/general.utils.ts +238 -238
- package/src/utils/index.ts +12 -12
- package/src/utils/lazy-client.ts +261 -261
- package/src/utils/numbers.utils.ts +13 -13
- package/src/utils/oauth.utils.ts +35 -35
- package/src/utils/string.utils.ts +414 -414
- package/src/utils/url.utils.ts +19 -19
- package/src/utils/validation.utils.ts +74 -74
- package/dist/bundle-analysis-lazy.html +0 -4949
- package/dist/bundle-analysis.html +0 -4949
- package/dist/types/utils/package-manager.utils.d.ts +0 -26
package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts
CHANGED
|
@@ -1,154 +1,154 @@
|
|
|
1
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
-
//import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
6
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
7
|
-
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
8
|
-
|
|
9
|
-
import {
|
|
10
|
-
CreateSecretCommand,
|
|
11
|
-
DeleteSecretCommand,
|
|
12
|
-
GetSecretValueCommand,
|
|
13
|
-
GetSecretValueCommandOutput,
|
|
14
|
-
ListSecretsCommand,
|
|
15
|
-
ListSecretsCommandOutput,
|
|
16
|
-
PutSecretValueCommand,
|
|
17
|
-
SecretsManagerClient,
|
|
18
|
-
} from '@aws-sdk/client-secrets-manager';
|
|
19
|
-
import { randomUUID } from 'crypto';
|
|
20
|
-
import { ManagedVaultConnector } from '../ManagedVaultConnector';
|
|
21
|
-
import { SecretsManagerConfig } from '../../Vault.service/connectors/SecretsManager.class';
|
|
22
|
-
|
|
23
|
-
const console = Logger('SecretManagerManagedVault');
|
|
24
|
-
|
|
25
|
-
export class SecretManagerManagedVault extends ManagedVaultConnector {
|
|
26
|
-
public name: string = 'SecretManagerManagedVault';
|
|
27
|
-
public scope: string = 'smyth-managed-vault';
|
|
28
|
-
private secretsManager: SecretsManagerClient;
|
|
29
|
-
|
|
30
|
-
constructor(protected _settings: SecretsManagerConfig & { vaultName: string }) {
|
|
31
|
-
super(_settings);
|
|
32
|
-
//if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
|
|
33
|
-
|
|
34
|
-
this.secretsManager = new SecretsManagerClient({
|
|
35
|
-
region: _settings.region,
|
|
36
|
-
...(_settings.awsAccessKeyId && _settings.awsSecretAccessKey
|
|
37
|
-
? {
|
|
38
|
-
accessKeyId: _settings.awsAccessKeyId,
|
|
39
|
-
secretAccessKey: _settings.awsSecretAccessKey,
|
|
40
|
-
}
|
|
41
|
-
: {}),
|
|
42
|
-
});
|
|
43
|
-
}
|
|
44
|
-
|
|
45
|
-
@SecureConnector.AccessControl
|
|
46
|
-
protected async get(acRequest: AccessRequest, secretName: string) {
|
|
47
|
-
const secret = await this.getSecretByName(secretName);
|
|
48
|
-
return secret?.SecretString;
|
|
49
|
-
}
|
|
50
|
-
|
|
51
|
-
@SecureConnector.AccessControl
|
|
52
|
-
protected async set(acRequest: AccessRequest, secretName: string, value: string) {
|
|
53
|
-
const secret = await this.getSecretByName(secretName);
|
|
54
|
-
if (secret) {
|
|
55
|
-
await this.secretsManager.send(new PutSecretValueCommand({ SecretId: secret.ARN, SecretString: value }));
|
|
56
|
-
} else {
|
|
57
|
-
await this.secretsManager.send(
|
|
58
|
-
new CreateSecretCommand({
|
|
59
|
-
Name: `smyth/${randomUUID()}`,
|
|
60
|
-
SecretString: JSON.stringify({ [secretName]: value }),
|
|
61
|
-
Tags: [{ Key: this.scope, Value: 'true' }],
|
|
62
|
-
})
|
|
63
|
-
);
|
|
64
|
-
}
|
|
65
|
-
}
|
|
66
|
-
|
|
67
|
-
@SecureConnector.AccessControl
|
|
68
|
-
protected async delete(acRequest: AccessRequest, secretName: string) {
|
|
69
|
-
const secret = await this.getSecretByName(secretName);
|
|
70
|
-
if (secret) {
|
|
71
|
-
await this.secretsManager.send(new DeleteSecretCommand({ SecretId: secret.ARN }));
|
|
72
|
-
}
|
|
73
|
-
}
|
|
74
|
-
|
|
75
|
-
@SecureConnector.AccessControl
|
|
76
|
-
protected async exists(acRequest: AccessRequest, secretName: string) {
|
|
77
|
-
const secret = await this.get(acRequest, secretName);
|
|
78
|
-
return !!secret;
|
|
79
|
-
}
|
|
80
|
-
|
|
81
|
-
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
82
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
83
|
-
const teamId = await accountConnector.getCandidateTeam(candidate);
|
|
84
|
-
|
|
85
|
-
const acl = new ACL();
|
|
86
|
-
|
|
87
|
-
acl.addAccess(TAccessRole.Team, teamId, TAccessLevel.Owner)
|
|
88
|
-
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Read)
|
|
89
|
-
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Write);
|
|
90
|
-
|
|
91
|
-
return acl;
|
|
92
|
-
}
|
|
93
|
-
|
|
94
|
-
private async getSecretByName(secretName: string) {
|
|
95
|
-
try {
|
|
96
|
-
const secrets = [];
|
|
97
|
-
let nextToken: string | undefined;
|
|
98
|
-
do {
|
|
99
|
-
const listResponse: ListSecretsCommandOutput = await this.secretsManager.send(
|
|
100
|
-
new ListSecretsCommand({ NextToken: nextToken, Filters: [{ Key: 'tag-key', Values: [this.scope] }] })
|
|
101
|
-
);
|
|
102
|
-
if (listResponse.SecretList) {
|
|
103
|
-
for (const secret of listResponse.SecretList) {
|
|
104
|
-
if (secret.Name) {
|
|
105
|
-
secrets.push({
|
|
106
|
-
ARN: secret.ARN,
|
|
107
|
-
Name: secret.Name,
|
|
108
|
-
CreatedDate: secret.CreatedDate,
|
|
109
|
-
});
|
|
110
|
-
}
|
|
111
|
-
}
|
|
112
|
-
}
|
|
113
|
-
nextToken = listResponse.NextToken;
|
|
114
|
-
} while (nextToken);
|
|
115
|
-
|
|
116
|
-
const formattedSecrets = [];
|
|
117
|
-
const $promises = [];
|
|
118
|
-
for (const secret of secrets) {
|
|
119
|
-
$promises.push(getSpecificSecret(secret, this.secretsManager));
|
|
120
|
-
}
|
|
121
|
-
const results = await Promise.all($promises);
|
|
122
|
-
for (const result of results) {
|
|
123
|
-
formattedSecrets.push(result);
|
|
124
|
-
}
|
|
125
|
-
const secret = formattedSecrets.find((s) => s.Name === secretName);
|
|
126
|
-
return secret;
|
|
127
|
-
} catch (error) {
|
|
128
|
-
console.error(error);
|
|
129
|
-
}
|
|
130
|
-
|
|
131
|
-
async function getSpecificSecret(secret, secretsManager: SecretsManagerClient) {
|
|
132
|
-
const data: GetSecretValueCommandOutput = await secretsManager.send(new GetSecretValueCommand({ SecretId: secret.ARN }));
|
|
133
|
-
let secretString = data.SecretString;
|
|
134
|
-
let secretName = secret.Name;
|
|
135
|
-
|
|
136
|
-
if (secretString) {
|
|
137
|
-
try {
|
|
138
|
-
let parsedSecret = JSON.parse(secretString);
|
|
139
|
-
if (Object.keys(parsedSecret).length === 1) {
|
|
140
|
-
secretName = Object.keys(parsedSecret)[0];
|
|
141
|
-
secretString = parsedSecret[secretName];
|
|
142
|
-
}
|
|
143
|
-
} catch (error) {}
|
|
144
|
-
}
|
|
145
|
-
return {
|
|
146
|
-
Name: secretName,
|
|
147
|
-
ARN: secret.ARN,
|
|
148
|
-
CreatedDate: secret.CreatedDate,
|
|
149
|
-
SecretId: secret.Name,
|
|
150
|
-
SecretString: secretString,
|
|
151
|
-
};
|
|
152
|
-
}
|
|
153
|
-
}
|
|
154
|
-
}
|
|
1
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
+
//import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
6
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
7
|
+
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
8
|
+
|
|
9
|
+
import {
|
|
10
|
+
CreateSecretCommand,
|
|
11
|
+
DeleteSecretCommand,
|
|
12
|
+
GetSecretValueCommand,
|
|
13
|
+
GetSecretValueCommandOutput,
|
|
14
|
+
ListSecretsCommand,
|
|
15
|
+
ListSecretsCommandOutput,
|
|
16
|
+
PutSecretValueCommand,
|
|
17
|
+
SecretsManagerClient,
|
|
18
|
+
} from '@aws-sdk/client-secrets-manager';
|
|
19
|
+
import { randomUUID } from 'crypto';
|
|
20
|
+
import { ManagedVaultConnector } from '../ManagedVaultConnector';
|
|
21
|
+
import { SecretsManagerConfig } from '../../Vault.service/connectors/SecretsManager.class';
|
|
22
|
+
|
|
23
|
+
const console = Logger('SecretManagerManagedVault');
|
|
24
|
+
|
|
25
|
+
export class SecretManagerManagedVault extends ManagedVaultConnector {
|
|
26
|
+
public name: string = 'SecretManagerManagedVault';
|
|
27
|
+
public scope: string = 'smyth-managed-vault';
|
|
28
|
+
private secretsManager: SecretsManagerClient;
|
|
29
|
+
|
|
30
|
+
constructor(protected _settings: SecretsManagerConfig & { vaultName: string }) {
|
|
31
|
+
super(_settings);
|
|
32
|
+
//if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
|
|
33
|
+
|
|
34
|
+
this.secretsManager = new SecretsManagerClient({
|
|
35
|
+
region: _settings.region,
|
|
36
|
+
...(_settings.awsAccessKeyId && _settings.awsSecretAccessKey
|
|
37
|
+
? {
|
|
38
|
+
accessKeyId: _settings.awsAccessKeyId,
|
|
39
|
+
secretAccessKey: _settings.awsSecretAccessKey,
|
|
40
|
+
}
|
|
41
|
+
: {}),
|
|
42
|
+
});
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
@SecureConnector.AccessControl
|
|
46
|
+
protected async get(acRequest: AccessRequest, secretName: string) {
|
|
47
|
+
const secret = await this.getSecretByName(secretName);
|
|
48
|
+
return secret?.SecretString;
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
@SecureConnector.AccessControl
|
|
52
|
+
protected async set(acRequest: AccessRequest, secretName: string, value: string) {
|
|
53
|
+
const secret = await this.getSecretByName(secretName);
|
|
54
|
+
if (secret) {
|
|
55
|
+
await this.secretsManager.send(new PutSecretValueCommand({ SecretId: secret.ARN, SecretString: value }));
|
|
56
|
+
} else {
|
|
57
|
+
await this.secretsManager.send(
|
|
58
|
+
new CreateSecretCommand({
|
|
59
|
+
Name: `smyth/${randomUUID()}`,
|
|
60
|
+
SecretString: JSON.stringify({ [secretName]: value }),
|
|
61
|
+
Tags: [{ Key: this.scope, Value: 'true' }],
|
|
62
|
+
})
|
|
63
|
+
);
|
|
64
|
+
}
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
@SecureConnector.AccessControl
|
|
68
|
+
protected async delete(acRequest: AccessRequest, secretName: string) {
|
|
69
|
+
const secret = await this.getSecretByName(secretName);
|
|
70
|
+
if (secret) {
|
|
71
|
+
await this.secretsManager.send(new DeleteSecretCommand({ SecretId: secret.ARN }));
|
|
72
|
+
}
|
|
73
|
+
}
|
|
74
|
+
|
|
75
|
+
@SecureConnector.AccessControl
|
|
76
|
+
protected async exists(acRequest: AccessRequest, secretName: string) {
|
|
77
|
+
const secret = await this.get(acRequest, secretName);
|
|
78
|
+
return !!secret;
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
82
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
83
|
+
const teamId = await accountConnector.getCandidateTeam(candidate);
|
|
84
|
+
|
|
85
|
+
const acl = new ACL();
|
|
86
|
+
|
|
87
|
+
acl.addAccess(TAccessRole.Team, teamId, TAccessLevel.Owner)
|
|
88
|
+
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Read)
|
|
89
|
+
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Write);
|
|
90
|
+
|
|
91
|
+
return acl;
|
|
92
|
+
}
|
|
93
|
+
|
|
94
|
+
private async getSecretByName(secretName: string) {
|
|
95
|
+
try {
|
|
96
|
+
const secrets = [];
|
|
97
|
+
let nextToken: string | undefined;
|
|
98
|
+
do {
|
|
99
|
+
const listResponse: ListSecretsCommandOutput = await this.secretsManager.send(
|
|
100
|
+
new ListSecretsCommand({ NextToken: nextToken, Filters: [{ Key: 'tag-key', Values: [this.scope] }] })
|
|
101
|
+
);
|
|
102
|
+
if (listResponse.SecretList) {
|
|
103
|
+
for (const secret of listResponse.SecretList) {
|
|
104
|
+
if (secret.Name) {
|
|
105
|
+
secrets.push({
|
|
106
|
+
ARN: secret.ARN,
|
|
107
|
+
Name: secret.Name,
|
|
108
|
+
CreatedDate: secret.CreatedDate,
|
|
109
|
+
});
|
|
110
|
+
}
|
|
111
|
+
}
|
|
112
|
+
}
|
|
113
|
+
nextToken = listResponse.NextToken;
|
|
114
|
+
} while (nextToken);
|
|
115
|
+
|
|
116
|
+
const formattedSecrets = [];
|
|
117
|
+
const $promises = [];
|
|
118
|
+
for (const secret of secrets) {
|
|
119
|
+
$promises.push(getSpecificSecret(secret, this.secretsManager));
|
|
120
|
+
}
|
|
121
|
+
const results = await Promise.all($promises);
|
|
122
|
+
for (const result of results) {
|
|
123
|
+
formattedSecrets.push(result);
|
|
124
|
+
}
|
|
125
|
+
const secret = formattedSecrets.find((s) => s.Name === secretName);
|
|
126
|
+
return secret;
|
|
127
|
+
} catch (error) {
|
|
128
|
+
console.error(error);
|
|
129
|
+
}
|
|
130
|
+
|
|
131
|
+
async function getSpecificSecret(secret, secretsManager: SecretsManagerClient) {
|
|
132
|
+
const data: GetSecretValueCommandOutput = await secretsManager.send(new GetSecretValueCommand({ SecretId: secret.ARN }));
|
|
133
|
+
let secretString = data.SecretString;
|
|
134
|
+
let secretName = secret.Name;
|
|
135
|
+
|
|
136
|
+
if (secretString) {
|
|
137
|
+
try {
|
|
138
|
+
let parsedSecret = JSON.parse(secretString);
|
|
139
|
+
if (Object.keys(parsedSecret).length === 1) {
|
|
140
|
+
secretName = Object.keys(parsedSecret)[0];
|
|
141
|
+
secretString = parsedSecret[secretName];
|
|
142
|
+
}
|
|
143
|
+
} catch (error) {}
|
|
144
|
+
}
|
|
145
|
+
return {
|
|
146
|
+
Name: secretName,
|
|
147
|
+
ARN: secret.ARN,
|
|
148
|
+
CreatedDate: secret.CreatedDate,
|
|
149
|
+
SecretId: secret.Name,
|
|
150
|
+
SecretString: secretString,
|
|
151
|
+
};
|
|
152
|
+
}
|
|
153
|
+
}
|
|
154
|
+
}
|
|
@@ -1,12 +1,12 @@
|
|
|
1
|
-
import { ConnectorService, ConnectorServiceProvider } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { TConnectorService } from '@sre/types/SRE.types';
|
|
3
|
-
|
|
4
|
-
import { SecretManagerManagedVault } from './connectors/SecretManagerManagedVault';
|
|
5
|
-
import { NullManagedVault } from './connectors/NullManagedVault.class';
|
|
6
|
-
|
|
7
|
-
export class ManagedVaultService extends ConnectorServiceProvider {
|
|
8
|
-
public register() {
|
|
9
|
-
ConnectorService.register(TConnectorService.ManagedVault, 'SecretManagerManagedVault', SecretManagerManagedVault);
|
|
10
|
-
ConnectorService.register(TConnectorService.ManagedVault, 'NullManagedVault', NullManagedVault);
|
|
11
|
-
}
|
|
12
|
-
}
|
|
1
|
+
import { ConnectorService, ConnectorServiceProvider } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { TConnectorService } from '@sre/types/SRE.types';
|
|
3
|
+
|
|
4
|
+
import { SecretManagerManagedVault } from './connectors/SecretManagerManagedVault';
|
|
5
|
+
import { NullManagedVault } from './connectors/NullManagedVault.class';
|
|
6
|
+
|
|
7
|
+
export class ManagedVaultService extends ConnectorServiceProvider {
|
|
8
|
+
public register() {
|
|
9
|
+
ConnectorService.register(TConnectorService.ManagedVault, 'SecretManagerManagedVault', SecretManagerManagedVault);
|
|
10
|
+
ConnectorService.register(TConnectorService.ManagedVault, 'NullManagedVault', NullManagedVault);
|
|
11
|
+
}
|
|
12
|
+
}
|
|
@@ -1,110 +1,110 @@
|
|
|
1
|
-
import { Connector } from '@sre/Core/Connector.class';
|
|
2
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
3
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
4
|
-
import { ACLAccessDeniedError, IAccessCandidate, TAccessLevel, TAccessResult, TAccessTicket } from '@sre/types/ACL.types';
|
|
5
|
-
import { ACL } from './AccessControl/ACL.class';
|
|
6
|
-
import { AccessCandidate } from './AccessControl/AccessCandidate.class';
|
|
7
|
-
import { AccessRequest } from './AccessControl/AccessRequest.class';
|
|
8
|
-
|
|
9
|
-
const console = Logger('SecureConnector');
|
|
10
|
-
|
|
11
|
-
export abstract class SecureConnector<TRequest = any> extends Connector<TRequest> {
|
|
12
|
-
public abstract name: string;
|
|
13
|
-
|
|
14
|
-
//this determines the access rights for the requested resource
|
|
15
|
-
//the connector should check if the resource exists or not
|
|
16
|
-
//if the resource exists we read its ACL and return it
|
|
17
|
-
//if the resource does not exist we return an write access ACL for the candidate
|
|
18
|
-
public abstract getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL>;
|
|
19
|
-
|
|
20
|
-
public async start() {
|
|
21
|
-
console.info(`Starting ${this.name} connector ...`);
|
|
22
|
-
}
|
|
23
|
-
|
|
24
|
-
public async stop() {
|
|
25
|
-
console.info(`Stopping ${this.name} connector ...`);
|
|
26
|
-
}
|
|
27
|
-
|
|
28
|
-
protected async hasAccess(acRequest: AccessRequest) {
|
|
29
|
-
const aclHelper = await this.getResourceACL(acRequest.resourceId, acRequest.candidate).catch((error) => {
|
|
30
|
-
console.error(`Error getting ACL for ${acRequest.resourceId}: ${error}`);
|
|
31
|
-
return null;
|
|
32
|
-
});
|
|
33
|
-
|
|
34
|
-
if (!aclHelper) return false;
|
|
35
|
-
|
|
36
|
-
//const aclHelper = ACLHelper.from(acl);
|
|
37
|
-
|
|
38
|
-
const exactAccess = aclHelper.checkExactAccess(acRequest);
|
|
39
|
-
if (exactAccess) return true;
|
|
40
|
-
|
|
41
|
-
// if the exact access is denied, we check if the candidate has a higher access
|
|
42
|
-
const ownerRequest = AccessRequest.clone(acRequest).setLevel(TAccessLevel.Owner);
|
|
43
|
-
const ownerAccess = aclHelper.checkExactAccess(ownerRequest);
|
|
44
|
-
if (ownerAccess) return true;
|
|
45
|
-
|
|
46
|
-
// if the exact access is denied, we check if the requested resource has a public access
|
|
47
|
-
const publicRequest = AccessRequest.clone(acRequest).setCandidate(AccessCandidate.public());
|
|
48
|
-
const publicAccess = aclHelper.checkExactAccess(publicRequest);
|
|
49
|
-
if (publicAccess) return true;
|
|
50
|
-
|
|
51
|
-
// if the public access is denied, we check if the candidate's team has access
|
|
52
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
53
|
-
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
54
|
-
const teamRequest = AccessRequest.clone(acRequest).setCandidate(AccessCandidate.team(teamId));
|
|
55
|
-
const teamAccess = aclHelper.checkExactAccess(teamRequest);
|
|
56
|
-
if (teamAccess) return true;
|
|
57
|
-
|
|
58
|
-
// if the team access is denied, we check if the team has a higher access
|
|
59
|
-
const teamOwnerRequest = AccessRequest.clone(teamRequest).setLevel(TAccessLevel.Owner);
|
|
60
|
-
const teamOwnerAccess = aclHelper.checkExactAccess(teamOwnerRequest);
|
|
61
|
-
if (teamOwnerAccess) return true;
|
|
62
|
-
|
|
63
|
-
return false;
|
|
64
|
-
}
|
|
65
|
-
public async getAccessTicket(resourceId: string, request: AccessRequest): Promise<TAccessTicket> {
|
|
66
|
-
const sysAcRequest = AccessRequest.clone(request).resource(resourceId);
|
|
67
|
-
const accessTicket = {
|
|
68
|
-
request,
|
|
69
|
-
access: (await this.hasAccess(sysAcRequest)) ? TAccessResult.Granted : TAccessResult.Denied,
|
|
70
|
-
};
|
|
71
|
-
|
|
72
|
-
return accessTicket as TAccessTicket;
|
|
73
|
-
}
|
|
74
|
-
|
|
75
|
-
//#region [ Decorators ]==========================
|
|
76
|
-
|
|
77
|
-
//AccessControl decorator
|
|
78
|
-
//This decorator will inject the access control logic into storage connector methods
|
|
79
|
-
// in order to work properly, the connector expects the resourceId to be the first argument and the access request to be the second argument
|
|
80
|
-
|
|
81
|
-
static AccessControl(target: any, propertyKey: string, descriptor: PropertyDescriptor) {
|
|
82
|
-
// Store the original method in a variable
|
|
83
|
-
const originalMethod = descriptor.value;
|
|
84
|
-
|
|
85
|
-
// Modify the descriptor's value to wrap the original method
|
|
86
|
-
descriptor.value = async function (...args: any[]) {
|
|
87
|
-
// Extract the method arguments
|
|
88
|
-
const [acRequest, resourceId] = args;
|
|
89
|
-
|
|
90
|
-
if (resourceId !== undefined) {
|
|
91
|
-
//: getAccessTicket requires a resourceId
|
|
92
|
-
//FIXME: implement different access control for resources listing and methods that do not require a resourceId
|
|
93
|
-
// Inject the access control logic
|
|
94
|
-
const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
95
|
-
if (accessTicket.access !== TAccessResult.Granted) {
|
|
96
|
-
console.error(`Access denied for ${acRequest.candidate.id} on ${resourceId}`);
|
|
97
|
-
throw new ACLAccessDeniedError('Access Denied');
|
|
98
|
-
}
|
|
99
|
-
}
|
|
100
|
-
|
|
101
|
-
// Call the original method with the original arguments
|
|
102
|
-
return originalMethod.apply(this, args);
|
|
103
|
-
};
|
|
104
|
-
|
|
105
|
-
// Return the modified descriptor
|
|
106
|
-
return descriptor;
|
|
107
|
-
}
|
|
108
|
-
|
|
109
|
-
//#endregion
|
|
110
|
-
}
|
|
1
|
+
import { Connector } from '@sre/Core/Connector.class';
|
|
2
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
3
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
4
|
+
import { ACLAccessDeniedError, IAccessCandidate, TAccessLevel, TAccessResult, TAccessTicket } from '@sre/types/ACL.types';
|
|
5
|
+
import { ACL } from './AccessControl/ACL.class';
|
|
6
|
+
import { AccessCandidate } from './AccessControl/AccessCandidate.class';
|
|
7
|
+
import { AccessRequest } from './AccessControl/AccessRequest.class';
|
|
8
|
+
|
|
9
|
+
const console = Logger('SecureConnector');
|
|
10
|
+
|
|
11
|
+
export abstract class SecureConnector<TRequest = any> extends Connector<TRequest> {
|
|
12
|
+
public abstract name: string;
|
|
13
|
+
|
|
14
|
+
//this determines the access rights for the requested resource
|
|
15
|
+
//the connector should check if the resource exists or not
|
|
16
|
+
//if the resource exists we read its ACL and return it
|
|
17
|
+
//if the resource does not exist we return an write access ACL for the candidate
|
|
18
|
+
public abstract getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL>;
|
|
19
|
+
|
|
20
|
+
public async start() {
|
|
21
|
+
console.info(`Starting ${this.name} connector ...`);
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
public async stop() {
|
|
25
|
+
console.info(`Stopping ${this.name} connector ...`);
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
protected async hasAccess(acRequest: AccessRequest) {
|
|
29
|
+
const aclHelper = await this.getResourceACL(acRequest.resourceId, acRequest.candidate).catch((error) => {
|
|
30
|
+
console.error(`Error getting ACL for ${acRequest.resourceId}: ${error}`);
|
|
31
|
+
return null;
|
|
32
|
+
});
|
|
33
|
+
|
|
34
|
+
if (!aclHelper) return false;
|
|
35
|
+
|
|
36
|
+
//const aclHelper = ACLHelper.from(acl);
|
|
37
|
+
|
|
38
|
+
const exactAccess = aclHelper.checkExactAccess(acRequest);
|
|
39
|
+
if (exactAccess) return true;
|
|
40
|
+
|
|
41
|
+
// if the exact access is denied, we check if the candidate has a higher access
|
|
42
|
+
const ownerRequest = AccessRequest.clone(acRequest).setLevel(TAccessLevel.Owner);
|
|
43
|
+
const ownerAccess = aclHelper.checkExactAccess(ownerRequest);
|
|
44
|
+
if (ownerAccess) return true;
|
|
45
|
+
|
|
46
|
+
// if the exact access is denied, we check if the requested resource has a public access
|
|
47
|
+
const publicRequest = AccessRequest.clone(acRequest).setCandidate(AccessCandidate.public());
|
|
48
|
+
const publicAccess = aclHelper.checkExactAccess(publicRequest);
|
|
49
|
+
if (publicAccess) return true;
|
|
50
|
+
|
|
51
|
+
// if the public access is denied, we check if the candidate's team has access
|
|
52
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
53
|
+
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
54
|
+
const teamRequest = AccessRequest.clone(acRequest).setCandidate(AccessCandidate.team(teamId));
|
|
55
|
+
const teamAccess = aclHelper.checkExactAccess(teamRequest);
|
|
56
|
+
if (teamAccess) return true;
|
|
57
|
+
|
|
58
|
+
// if the team access is denied, we check if the team has a higher access
|
|
59
|
+
const teamOwnerRequest = AccessRequest.clone(teamRequest).setLevel(TAccessLevel.Owner);
|
|
60
|
+
const teamOwnerAccess = aclHelper.checkExactAccess(teamOwnerRequest);
|
|
61
|
+
if (teamOwnerAccess) return true;
|
|
62
|
+
|
|
63
|
+
return false;
|
|
64
|
+
}
|
|
65
|
+
public async getAccessTicket(resourceId: string, request: AccessRequest): Promise<TAccessTicket> {
|
|
66
|
+
const sysAcRequest = AccessRequest.clone(request).resource(resourceId);
|
|
67
|
+
const accessTicket = {
|
|
68
|
+
request,
|
|
69
|
+
access: (await this.hasAccess(sysAcRequest)) ? TAccessResult.Granted : TAccessResult.Denied,
|
|
70
|
+
};
|
|
71
|
+
|
|
72
|
+
return accessTicket as TAccessTicket;
|
|
73
|
+
}
|
|
74
|
+
|
|
75
|
+
//#region [ Decorators ]==========================
|
|
76
|
+
|
|
77
|
+
//AccessControl decorator
|
|
78
|
+
//This decorator will inject the access control logic into storage connector methods
|
|
79
|
+
// in order to work properly, the connector expects the resourceId to be the first argument and the access request to be the second argument
|
|
80
|
+
|
|
81
|
+
static AccessControl(target: any, propertyKey: string, descriptor: PropertyDescriptor) {
|
|
82
|
+
// Store the original method in a variable
|
|
83
|
+
const originalMethod = descriptor.value;
|
|
84
|
+
|
|
85
|
+
// Modify the descriptor's value to wrap the original method
|
|
86
|
+
descriptor.value = async function (...args: any[]) {
|
|
87
|
+
// Extract the method arguments
|
|
88
|
+
const [acRequest, resourceId] = args;
|
|
89
|
+
|
|
90
|
+
if (resourceId !== undefined) {
|
|
91
|
+
//: getAccessTicket requires a resourceId
|
|
92
|
+
//FIXME: implement different access control for resources listing and methods that do not require a resourceId
|
|
93
|
+
// Inject the access control logic
|
|
94
|
+
const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
95
|
+
if (accessTicket.access !== TAccessResult.Granted) {
|
|
96
|
+
console.error(`Access denied for ${acRequest.candidate.id} on ${resourceId}`);
|
|
97
|
+
throw new ACLAccessDeniedError('Access Denied');
|
|
98
|
+
}
|
|
99
|
+
}
|
|
100
|
+
|
|
101
|
+
// Call the original method with the original arguments
|
|
102
|
+
return originalMethod.apply(this, args);
|
|
103
|
+
};
|
|
104
|
+
|
|
105
|
+
// Return the modified descriptor
|
|
106
|
+
return descriptor;
|
|
107
|
+
}
|
|
108
|
+
|
|
109
|
+
//#endregion
|
|
110
|
+
}
|
|
@@ -1,30 +1,30 @@
|
|
|
1
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { AccessCandidate } from '../AccessControl/AccessCandidate.class';
|
|
3
|
-
import axios from 'axios';
|
|
4
|
-
import config from '@sre/config';
|
|
5
|
-
import qs from 'qs';
|
|
6
|
-
|
|
7
|
-
export class VaultHelper {
|
|
8
|
-
static async getTeamKey(key: string, teamId: string): Promise<string> {
|
|
9
|
-
const vaultConnector = ConnectorService.getVaultConnector();
|
|
10
|
-
return await vaultConnector.requester(AccessCandidate.team(teamId)).get(key);
|
|
11
|
-
}
|
|
12
|
-
|
|
13
|
-
static async getUserKey(key: string, userId: string): Promise<string> {
|
|
14
|
-
const vaultConnector = ConnectorService.getVaultConnector();
|
|
15
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
16
|
-
|
|
17
|
-
const teamId = await accountConnector.getCandidateTeam(AccessCandidate.user(userId));
|
|
18
|
-
|
|
19
|
-
return await vaultConnector.requester(AccessCandidate.team(teamId)).get(key);
|
|
20
|
-
}
|
|
21
|
-
|
|
22
|
-
static async getAgentKey(key: string, agentId: string): Promise<string> {
|
|
23
|
-
const vaultConnector = ConnectorService.getVaultConnector();
|
|
24
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
25
|
-
|
|
26
|
-
const teamId = await accountConnector.getCandidateTeam(AccessCandidate.agent(agentId));
|
|
27
|
-
|
|
28
|
-
return await vaultConnector.requester(AccessCandidate.team(teamId)).get(key);
|
|
29
|
-
}
|
|
30
|
-
}
|
|
1
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { AccessCandidate } from '../AccessControl/AccessCandidate.class';
|
|
3
|
+
import axios from 'axios';
|
|
4
|
+
import config from '@sre/config';
|
|
5
|
+
import qs from 'qs';
|
|
6
|
+
|
|
7
|
+
export class VaultHelper {
|
|
8
|
+
static async getTeamKey(key: string, teamId: string): Promise<string> {
|
|
9
|
+
const vaultConnector = ConnectorService.getVaultConnector();
|
|
10
|
+
return await vaultConnector.requester(AccessCandidate.team(teamId)).get(key);
|
|
11
|
+
}
|
|
12
|
+
|
|
13
|
+
static async getUserKey(key: string, userId: string): Promise<string> {
|
|
14
|
+
const vaultConnector = ConnectorService.getVaultConnector();
|
|
15
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
16
|
+
|
|
17
|
+
const teamId = await accountConnector.getCandidateTeam(AccessCandidate.user(userId));
|
|
18
|
+
|
|
19
|
+
return await vaultConnector.requester(AccessCandidate.team(teamId)).get(key);
|
|
20
|
+
}
|
|
21
|
+
|
|
22
|
+
static async getAgentKey(key: string, agentId: string): Promise<string> {
|
|
23
|
+
const vaultConnector = ConnectorService.getVaultConnector();
|
|
24
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
25
|
+
|
|
26
|
+
const teamId = await accountConnector.getCandidateTeam(AccessCandidate.agent(agentId));
|
|
27
|
+
|
|
28
|
+
return await vaultConnector.requester(AccessCandidate.team(teamId)).get(key);
|
|
29
|
+
}
|
|
30
|
+
}
|