@smythos/sre 1.5.46 → 1.5.50
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +98 -90
- package/LICENSE +18 -18
- package/README.md +135 -135
- package/dist/bundle-analysis-lazy.html +4949 -0
- package/dist/bundle-analysis.html +4949 -0
- package/dist/index.js +3 -3
- package/dist/index.js.map +1 -1
- package/dist/types/Components/MCPClient.class.d.ts +1 -0
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +1 -6
- package/dist/types/utils/package-manager.utils.d.ts +26 -0
- package/package.json +1 -1
- package/src/Components/APICall/APICall.class.ts +156 -156
- package/src/Components/APICall/AccessTokenManager.ts +130 -130
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
- package/src/Components/APICall/OAuth.helper.ts +294 -294
- package/src/Components/APICall/mimeTypeCategories.ts +46 -46
- package/src/Components/APICall/parseData.ts +167 -167
- package/src/Components/APICall/parseHeaders.ts +41 -41
- package/src/Components/APICall/parseProxy.ts +68 -68
- package/src/Components/APICall/parseUrl.ts +91 -91
- package/src/Components/APIEndpoint.class.ts +234 -234
- package/src/Components/APIOutput.class.ts +58 -58
- package/src/Components/AgentPlugin.class.ts +102 -102
- package/src/Components/Async.class.ts +155 -155
- package/src/Components/Await.class.ts +90 -90
- package/src/Components/Classifier.class.ts +158 -158
- package/src/Components/Component.class.ts +132 -132
- package/src/Components/ComponentHost.class.ts +38 -38
- package/src/Components/DataSourceCleaner.class.ts +92 -92
- package/src/Components/DataSourceIndexer.class.ts +181 -181
- package/src/Components/DataSourceLookup.class.ts +161 -161
- package/src/Components/ECMASandbox.class.ts +71 -71
- package/src/Components/FEncDec.class.ts +29 -29
- package/src/Components/FHash.class.ts +33 -33
- package/src/Components/FSign.class.ts +80 -80
- package/src/Components/FSleep.class.ts +25 -25
- package/src/Components/FTimestamp.class.ts +25 -25
- package/src/Components/FileStore.class.ts +78 -78
- package/src/Components/ForEach.class.ts +97 -97
- package/src/Components/GPTPlugin.class.ts +70 -70
- package/src/Components/GenAILLM.class.ts +586 -586
- package/src/Components/HuggingFace.class.ts +314 -314
- package/src/Components/Image/imageSettings.config.ts +70 -70
- package/src/Components/ImageGenerator.class.ts +502 -502
- package/src/Components/JSONFilter.class.ts +54 -54
- package/src/Components/LLMAssistant.class.ts +213 -213
- package/src/Components/LogicAND.class.ts +28 -28
- package/src/Components/LogicAtLeast.class.ts +85 -85
- package/src/Components/LogicAtMost.class.ts +86 -86
- package/src/Components/LogicOR.class.ts +29 -29
- package/src/Components/LogicXOR.class.ts +34 -34
- package/src/Components/MCPClient.class.ts +138 -112
- package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
- package/src/Components/MemoryReadKeyVal.class.ts +66 -66
- package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
- package/src/Components/MemoryWriteObject.class.ts +97 -97
- package/src/Components/MultimodalLLM.class.ts +128 -128
- package/src/Components/OpenAPI.class.ts +72 -72
- package/src/Components/PromptGenerator.class.ts +122 -122
- package/src/Components/ScrapflyWebScrape.class.ts +159 -159
- package/src/Components/ServerlessCode.class.ts +123 -123
- package/src/Components/TavilyWebSearch.class.ts +98 -98
- package/src/Components/VisionLLM.class.ts +104 -104
- package/src/Components/ZapierAction.class.ts +127 -127
- package/src/Components/index.ts +97 -97
- package/src/Core/AgentProcess.helper.ts +240 -240
- package/src/Core/Connector.class.ts +123 -123
- package/src/Core/ConnectorsService.ts +197 -197
- package/src/Core/DummyConnector.ts +49 -49
- package/src/Core/HookService.ts +105 -105
- package/src/Core/SmythRuntime.class.ts +235 -235
- package/src/Core/SystemEvents.ts +16 -16
- package/src/Core/boot.ts +56 -56
- package/src/config.ts +15 -15
- package/src/constants.ts +126 -126
- package/src/data/hugging-face.params.json +579 -579
- package/src/helpers/AWSLambdaCode.helper.ts +587 -587
- package/src/helpers/BinaryInput.helper.ts +331 -331
- package/src/helpers/Conversation.helper.ts +1119 -1119
- package/src/helpers/ECMASandbox.helper.ts +54 -54
- package/src/helpers/JsonContent.helper.ts +97 -97
- package/src/helpers/LocalCache.helper.ts +97 -97
- package/src/helpers/Log.helper.ts +274 -274
- package/src/helpers/OpenApiParser.helper.ts +150 -150
- package/src/helpers/S3Cache.helper.ts +147 -147
- package/src/helpers/SmythURI.helper.ts +5 -5
- package/src/helpers/Sysconfig.helper.ts +77 -77
- package/src/helpers/TemplateString.helper.ts +243 -243
- package/src/helpers/TypeChecker.helper.ts +329 -329
- package/src/index.ts +3 -3
- package/src/index.ts.bak +3 -3
- package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
- package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
- package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
- package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
- package/src/subsystems/IO/CLI.service/index.ts +9 -9
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
- package/src/subsystems/IO/Log.service/index.ts +13 -13
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
- package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
- package/src/subsystems/IO/NKV.service/index.ts +14 -14
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
- package/src/subsystems/IO/Router.service/index.ts +11 -11
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
- package/src/subsystems/IO/Storage.service/index.ts +13 -13
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
- package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
- package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
- package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
- package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
- package/src/subsystems/LLMManager/custom-models.ts +854 -854
- package/src/subsystems/LLMManager/models.ts +2540 -2540
- package/src/subsystems/LLMManager/paramMappings.ts +69 -69
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
- package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
- package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
- package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
- package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
- package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
- package/src/subsystems/Security/Account.service/index.ts +14 -14
- package/src/subsystems/Security/Credentials.helper.ts +62 -62
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
- package/src/subsystems/Security/SecureConnector.class.ts +110 -110
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
- package/src/subsystems/Security/Vault.service/index.ts +12 -12
- package/src/types/ACL.types.ts +104 -104
- package/src/types/AWS.types.ts +10 -10
- package/src/types/Agent.types.ts +61 -61
- package/src/types/AgentLogger.types.ts +17 -17
- package/src/types/Cache.types.ts +1 -1
- package/src/types/Common.types.ts +2 -2
- package/src/types/LLM.types.ts +496 -496
- package/src/types/Redis.types.ts +8 -8
- package/src/types/SRE.types.ts +64 -64
- package/src/types/Security.types.ts +14 -14
- package/src/types/Storage.types.ts +5 -5
- package/src/types/VectorDB.types.ts +86 -86
- package/src/utils/base64.utils.ts +275 -275
- package/src/utils/cli.utils.ts +68 -68
- package/src/utils/data.utils.ts +322 -322
- package/src/utils/date-time.utils.ts +22 -22
- package/src/utils/general.utils.ts +238 -238
- package/src/utils/index.ts +12 -12
- package/src/utils/lazy-client.ts +261 -261
- package/src/utils/numbers.utils.ts +13 -13
- package/src/utils/oauth.utils.ts +35 -35
- package/src/utils/string.utils.ts +414 -414
- package/src/utils/url.utils.ts +19 -19
- package/src/utils/validation.utils.ts +74 -74
- package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
|
@@ -1,489 +1,489 @@
|
|
|
1
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
3
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
4
|
-
import { DEFAULT_TEAM_ID, IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
5
|
-
import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
|
|
6
|
-
import { getMimeType } from '@sre/utils';
|
|
7
|
-
import mime from 'mime';
|
|
8
|
-
import { Readable } from 'stream';
|
|
9
|
-
import { StorageConnector } from './StorageConnector';
|
|
10
|
-
import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
11
|
-
import { CacheConnector } from '@sre/MemoryManager/Cache.service/CacheConnector';
|
|
12
|
-
import crypto from 'crypto';
|
|
13
|
-
import { JSONContentHelper } from '@sre/helpers/JsonContent.helper';
|
|
14
|
-
import { SystemEvents } from '@sre/Core/SystemEvents';
|
|
15
|
-
|
|
16
|
-
export type TSmythFSURI = {
|
|
17
|
-
hash: string;
|
|
18
|
-
team: string;
|
|
19
|
-
path: string;
|
|
20
|
-
};
|
|
21
|
-
|
|
22
|
-
// SystemEvents.on('SRE:Booted', () => {
|
|
23
|
-
// const router = ConnectorService.getRouterConnector();
|
|
24
|
-
// if (router && router?.get instanceof Function) {
|
|
25
|
-
// router.get('/_temp/:uid', SmythFS.Instance.serveTempContent.bind(SmythFS.Instance));
|
|
26
|
-
// router.get('/storage/:file_id', SmythFS.Instance.serveResource.bind(SmythFS.Instance));
|
|
27
|
-
// }
|
|
28
|
-
// });
|
|
29
|
-
|
|
30
|
-
export class SmythFS {
|
|
31
|
-
private hash: string; // Store the instance hash for URL generation
|
|
32
|
-
|
|
33
|
-
static instances: any = {};
|
|
34
|
-
|
|
35
|
-
// Centralized hash generation to ensure consistency
|
|
36
|
-
private static generateInstanceHash(storageName: string, cacheName: string): string {
|
|
37
|
-
const instanceProps = `${storageName}:${cacheName}`;
|
|
38
|
-
return crypto.createHash('sha256').update(instanceProps).digest('hex').substring(0, 6);
|
|
39
|
-
}
|
|
40
|
-
|
|
41
|
-
// Default singleton instance (most common use case)
|
|
42
|
-
public static get Instance(): SmythFS {
|
|
43
|
-
return SmythFS.getInstance(); // Uses default empty string providers
|
|
44
|
-
}
|
|
45
|
-
|
|
46
|
-
// Multiton pattern - get instance based on storage and cache provider combination
|
|
47
|
-
public static getInstance(storageProvider: string | StorageConnector = '', cacheProvider: string | CacheConnector = ''): SmythFS {
|
|
48
|
-
// First get the actual connector names to calculate the correct hash
|
|
49
|
-
const storage = storageProvider instanceof StorageConnector ? storageProvider : ConnectorService.getStorageConnector(storageProvider);
|
|
50
|
-
const cache = cacheProvider instanceof CacheConnector ? cacheProvider : ConnectorService.getCacheConnector(cacheProvider);
|
|
51
|
-
const hash = SmythFS.generateInstanceHash(storage.name, cache.name);
|
|
52
|
-
|
|
53
|
-
if (SmythFS.instances[hash]) {
|
|
54
|
-
return SmythFS.instances[hash];
|
|
55
|
-
}
|
|
56
|
-
|
|
57
|
-
const instance = new SmythFS(storage, cache);
|
|
58
|
-
|
|
59
|
-
//register routes
|
|
60
|
-
const router = ConnectorService.getRouterConnector();
|
|
61
|
-
if (router && router?.get instanceof Function) {
|
|
62
|
-
router.get(`/_temp/${hash}/:uid`, instance.serveTempContent.bind(instance));
|
|
63
|
-
router.get(`/storage/${hash}/:file_id`, instance.serveResource.bind(instance));
|
|
64
|
-
}
|
|
65
|
-
|
|
66
|
-
SmythFS.instances[hash] = instance;
|
|
67
|
-
return instance;
|
|
68
|
-
}
|
|
69
|
-
|
|
70
|
-
private constructor(private storage: StorageConnector, private cache: CacheConnector) {
|
|
71
|
-
//SmythFS cannot be used without SRE
|
|
72
|
-
if (!ConnectorService.ready) {
|
|
73
|
-
throw new Error('SRE not available');
|
|
74
|
-
}
|
|
75
|
-
|
|
76
|
-
// Use centralized hash generation method
|
|
77
|
-
this.hash = SmythFS.generateInstanceHash(this.storage.name, this.cache.name);
|
|
78
|
-
}
|
|
79
|
-
|
|
80
|
-
// public getStoragePath(uri: string) {
|
|
81
|
-
// const smythURI = this.URIParser(uri);
|
|
82
|
-
// if (!smythURI) throw new Error('Invalid Resource URI');
|
|
83
|
-
// return `teams/${smythURI.team}${smythURI.path}`;
|
|
84
|
-
// }
|
|
85
|
-
|
|
86
|
-
public getBaseUri(candidate: IAccessCandidate) {
|
|
87
|
-
const uri = `smythfs://${candidate.id}.${candidate.role}`;
|
|
88
|
-
|
|
89
|
-
return uri;
|
|
90
|
-
}
|
|
91
|
-
|
|
92
|
-
/**
|
|
93
|
-
* Reads a resource from smyth file system
|
|
94
|
-
* @param uri smythfs:// uri
|
|
95
|
-
* @param candidate
|
|
96
|
-
* @returns
|
|
97
|
-
*/
|
|
98
|
-
public async read(uri: string, candidate?: IAccessCandidate): Promise<Buffer> {
|
|
99
|
-
const smythURI = await this.URIParser(uri);
|
|
100
|
-
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
101
|
-
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
102
|
-
|
|
103
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
104
|
-
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
105
|
-
if (!isMember) throw new Error('Access Denied');
|
|
106
|
-
|
|
107
|
-
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
108
|
-
|
|
109
|
-
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
110
|
-
|
|
111
|
-
const data = await this.storage.requester(_candidate).read(resourceId);
|
|
112
|
-
|
|
113
|
-
return data ? this.toBuffer(data) : null;
|
|
114
|
-
}
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
public async getMetadata(uri: string, candidate?: IAccessCandidate) {
|
|
118
|
-
const smythURI = await this.URIParser(uri);
|
|
119
|
-
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
120
|
-
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
121
|
-
|
|
122
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
123
|
-
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
124
|
-
if (!isMember) throw new Error('Access Denied');
|
|
125
|
-
|
|
126
|
-
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
127
|
-
|
|
128
|
-
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
129
|
-
|
|
130
|
-
return await this.storage.requester(_candidate).getMetadata(resourceId);
|
|
131
|
-
}
|
|
132
|
-
|
|
133
|
-
public async write(uri: string, data: StorageData, candidate?: IAccessCandidate, metadata?: StorageMetadata, ttl?: number) {
|
|
134
|
-
const smythURI = await this.URIParser(uri);
|
|
135
|
-
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
136
|
-
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
137
|
-
|
|
138
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
139
|
-
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
140
|
-
if (!isMember) throw new Error('Access Denied');
|
|
141
|
-
|
|
142
|
-
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
143
|
-
//when we write a file, it does not exist we need to explicitly provide a resource team in order to have access rights set properly
|
|
144
|
-
|
|
145
|
-
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
146
|
-
|
|
147
|
-
let acl: ACL;
|
|
148
|
-
|
|
149
|
-
//give team read access if this is a team resource and not the default team
|
|
150
|
-
//because the default team is a fallback used when no team is specified or account connector is not available
|
|
151
|
-
//in that case we need to only allow the creator to access the resource
|
|
152
|
-
if (smythURI.team && smythURI.team !== DEFAULT_TEAM_ID) {
|
|
153
|
-
acl = new ACL()
|
|
154
|
-
//.addAccess(candidate.role, candidate.id, TAccessLevel.Owner) // creator is owner
|
|
155
|
-
.addAccess(TAccessRole.Team, smythURI.team, TAccessLevel.Read).ACL as ACL; // team has read access
|
|
156
|
-
}
|
|
157
|
-
|
|
158
|
-
if (!metadata) metadata = {};
|
|
159
|
-
if (!metadata?.ContentType) {
|
|
160
|
-
metadata.ContentType = await getMimeType(data);
|
|
161
|
-
if (!metadata.ContentType) {
|
|
162
|
-
const ext: any = uri.split('.').pop();
|
|
163
|
-
if (ext) {
|
|
164
|
-
metadata.ContentType = mime.getType(ext) || 'application/octet-stream';
|
|
165
|
-
}
|
|
166
|
-
}
|
|
167
|
-
}
|
|
168
|
-
await this.storage.requester(_candidate).write(resourceId, data, acl, metadata);
|
|
169
|
-
|
|
170
|
-
if (ttl) {
|
|
171
|
-
await this.storage.requester(_candidate).expire(resourceId, ttl);
|
|
172
|
-
}
|
|
173
|
-
}
|
|
174
|
-
|
|
175
|
-
public async delete(uri: string, candidate?: IAccessCandidate) {
|
|
176
|
-
const smythURI = await this.URIParser(uri);
|
|
177
|
-
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
178
|
-
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
179
|
-
|
|
180
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
181
|
-
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
182
|
-
if (!isMember) throw new Error('Access Denied');
|
|
183
|
-
|
|
184
|
-
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
185
|
-
|
|
186
|
-
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
187
|
-
|
|
188
|
-
await this.storage.requester(_candidate).delete(resourceId);
|
|
189
|
-
}
|
|
190
|
-
|
|
191
|
-
//TODO: should we require access token here ?
|
|
192
|
-
public async exists(uri: string, candidate?: IAccessCandidate) {
|
|
193
|
-
const smythURI = await this.URIParser(uri);
|
|
194
|
-
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
195
|
-
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
196
|
-
|
|
197
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
198
|
-
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
199
|
-
if (!isMember) throw new Error('Access Denied');
|
|
200
|
-
|
|
201
|
-
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
202
|
-
|
|
203
|
-
//in order to get a consistent access check in case of inexisting resource, we need to explicitly set a default resource team
|
|
204
|
-
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
205
|
-
|
|
206
|
-
return await this.storage.requester(_candidate).exists(resourceId);
|
|
207
|
-
}
|
|
208
|
-
|
|
209
|
-
//#region Temp URL (mainly used for returning agent output to user for temporary access)
|
|
210
|
-
public async genTempUrl(uri: string, candidate?: IAccessCandidate, ttlSeconds: number = 3600) {
|
|
211
|
-
const smythURI = await this.URIParser(uri);
|
|
212
|
-
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
213
|
-
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
214
|
-
|
|
215
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
216
|
-
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
217
|
-
if (!isMember) throw new Error('Access Denied');
|
|
218
|
-
|
|
219
|
-
const exists = await this.exists(uri, candidate);
|
|
220
|
-
if (!exists) throw new Error('Resource does not exist');
|
|
221
|
-
|
|
222
|
-
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
223
|
-
|
|
224
|
-
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
225
|
-
const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
|
|
226
|
-
|
|
227
|
-
const uid = crypto.randomUUID();
|
|
228
|
-
const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
|
|
229
|
-
|
|
230
|
-
await this.cache.requester(tempUserCandidate).set(
|
|
231
|
-
`pub_url:${uid}`,
|
|
232
|
-
JSON.stringify({
|
|
233
|
-
accessCandidate: _candidate,
|
|
234
|
-
uri,
|
|
235
|
-
contentType: resourceMetadata?.ContentType,
|
|
236
|
-
}),
|
|
237
|
-
undefined,
|
|
238
|
-
undefined,
|
|
239
|
-
ttlSeconds
|
|
240
|
-
); // 1 hour
|
|
241
|
-
|
|
242
|
-
const baseUrl = ConnectorService.getRouterConnector().baseUrl;
|
|
243
|
-
return `${baseUrl}/_temp/${this.hash}/${uid}`;
|
|
244
|
-
}
|
|
245
|
-
|
|
246
|
-
public async destroyTempUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {
|
|
247
|
-
// Parse URL with new format: /_temp/{hash}/{uid}
|
|
248
|
-
const tempPath = url.split('/_temp/')[1];
|
|
249
|
-
if (!tempPath) throw new Error('Invalid Temp URL format');
|
|
250
|
-
|
|
251
|
-
const uid = tempPath.split('/')[1]?.split('?')[0]; // get uid and remove query params
|
|
252
|
-
if (!uid) throw new Error('Invalid Temp URL format');
|
|
253
|
-
|
|
254
|
-
let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
|
|
255
|
-
if (!cacheVal) throw new Error('Invalid Temp URL');
|
|
256
|
-
cacheVal = JSONContentHelper.create(cacheVal).tryParse();
|
|
257
|
-
await this.cache.requester(AccessCandidate.user(`system-${uid}`)).delete(`pub_url:${uid}`);
|
|
258
|
-
if (delResource) {
|
|
259
|
-
await this.delete(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
|
|
260
|
-
}
|
|
261
|
-
}
|
|
262
|
-
|
|
263
|
-
public async serveTempContent(req: any, res: any) {
|
|
264
|
-
try {
|
|
265
|
-
const { uid } = req.params;
|
|
266
|
-
let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
|
|
267
|
-
if (!cacheVal) {
|
|
268
|
-
res.writeHead(404, { 'Content-Type': 'text/plain' });
|
|
269
|
-
res.end('Invalid Temp URL');
|
|
270
|
-
return;
|
|
271
|
-
}
|
|
272
|
-
cacheVal = JSONContentHelper.create(cacheVal).tryParse();
|
|
273
|
-
const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
|
|
274
|
-
|
|
275
|
-
const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
|
|
276
|
-
|
|
277
|
-
const contentType = cacheVal.contentType || 'application/octet-stream';
|
|
278
|
-
|
|
279
|
-
res.writeHead(200, {
|
|
280
|
-
'Content-Type': contentType,
|
|
281
|
-
'Content-Disposition': 'inline',
|
|
282
|
-
'Content-Length': contentBuffer.length,
|
|
283
|
-
});
|
|
284
|
-
|
|
285
|
-
res.end(contentBuffer);
|
|
286
|
-
} catch (error) {
|
|
287
|
-
console.error('Error serving temp content:', error);
|
|
288
|
-
res.writeHead(500, { 'Content-Type': 'text/plain' });
|
|
289
|
-
res.end('Internal Server Error');
|
|
290
|
-
}
|
|
291
|
-
}
|
|
292
|
-
//#endregion
|
|
293
|
-
|
|
294
|
-
//#region Resource Serving
|
|
295
|
-
|
|
296
|
-
/**
|
|
297
|
-
* Generates a public url for the resource
|
|
298
|
-
* @param uri
|
|
299
|
-
* @param candidate
|
|
300
|
-
* @returns
|
|
301
|
-
*/
|
|
302
|
-
public async genResourceUrl(uri: string, candidate?: IAccessCandidate) {
|
|
303
|
-
const smythURI = await this.URIParser(uri);
|
|
304
|
-
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
305
|
-
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
306
|
-
|
|
307
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
308
|
-
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
309
|
-
if (!isMember) throw new Error('Access Denied');
|
|
310
|
-
|
|
311
|
-
const exists = await this.exists(uri, candidate);
|
|
312
|
-
if (!exists) throw new Error('Resource does not exist');
|
|
313
|
-
|
|
314
|
-
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
315
|
-
if (_candidate.role !== TAccessRole.Agent) {
|
|
316
|
-
throw new Error('Only agents can generate resource urls');
|
|
317
|
-
}
|
|
318
|
-
const agentId = _candidate.id;
|
|
319
|
-
|
|
320
|
-
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
321
|
-
const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
|
|
322
|
-
|
|
323
|
-
const uid = crypto.randomUUID(); // maybe instead of a random uuid, u can use the resource
|
|
324
|
-
const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
|
|
325
|
-
|
|
326
|
-
await this.cache.requester(tempUserCandidate).set(
|
|
327
|
-
`storage_url-${uid}`,
|
|
328
|
-
JSON.stringify({
|
|
329
|
-
accessCandidate: _candidate,
|
|
330
|
-
uri,
|
|
331
|
-
contentType: resourceMetadata?.ContentType,
|
|
332
|
-
}),
|
|
333
|
-
undefined,
|
|
334
|
-
undefined
|
|
335
|
-
// 3600 // 1 hour
|
|
336
|
-
);
|
|
337
|
-
|
|
338
|
-
const contentType = resourceMetadata?.ContentType;
|
|
339
|
-
const ext = contentType ? mime.getExtension(contentType) : undefined;
|
|
340
|
-
|
|
341
|
-
// get the agent domain
|
|
342
|
-
const agentDataConnector = ConnectorService.getAgentDataConnector();
|
|
343
|
-
const baseUrl = ConnectorService.getRouterConnector().baseUrl;
|
|
344
|
-
const domain = agentDataConnector.getAgentConfig(agentId)?.agentStageDomain
|
|
345
|
-
? `https://${agentDataConnector.getAgentConfig(agentId).agentStageDomain}`
|
|
346
|
-
: baseUrl;
|
|
347
|
-
|
|
348
|
-
return `${domain}/storage/${this.hash}/${uid}${ext ? `.${ext}` : ''}`;
|
|
349
|
-
}
|
|
350
|
-
public async destroyResourceUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {}
|
|
351
|
-
public async serveResource(req: any, res: any) {
|
|
352
|
-
try {
|
|
353
|
-
const { file_id } = req.params;
|
|
354
|
-
const [uid, extention] = file_id.split('.');
|
|
355
|
-
let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`storage_url-${uid}`);
|
|
356
|
-
if (!cacheVal) {
|
|
357
|
-
res.writeHead(404, { 'Content-Type': 'text/plain' });
|
|
358
|
-
res.end('Invalid Resource URL');
|
|
359
|
-
return;
|
|
360
|
-
}
|
|
361
|
-
cacheVal = JSONContentHelper.create(cacheVal).tryParse();
|
|
362
|
-
const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
|
|
363
|
-
|
|
364
|
-
const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
|
|
365
|
-
|
|
366
|
-
const contentType = cacheVal.contentType || 'application/octet-stream';
|
|
367
|
-
|
|
368
|
-
res.writeHead(200, {
|
|
369
|
-
'Content-Type': contentType,
|
|
370
|
-
'Content-Disposition': 'inline',
|
|
371
|
-
'Content-Length': contentBuffer.length,
|
|
372
|
-
});
|
|
373
|
-
|
|
374
|
-
res.end(contentBuffer);
|
|
375
|
-
} catch (error) {
|
|
376
|
-
console.error('Error serving storage resource content:', error);
|
|
377
|
-
res.writeHead(500, { 'Content-Type': 'text/plain' });
|
|
378
|
-
res.end('Internal Server Error');
|
|
379
|
-
}
|
|
380
|
-
}
|
|
381
|
-
//#endregion
|
|
382
|
-
|
|
383
|
-
private async URIParser(uri: string) {
|
|
384
|
-
const parts = uri.split('://');
|
|
385
|
-
if (parts.length !== 2) return undefined;
|
|
386
|
-
if (parts[0].toLowerCase() !== 'smythfs') return undefined;
|
|
387
|
-
const parsed = this.CaseSensitiveURL(`http://${parts[1]}`);
|
|
388
|
-
const tld = parsed.hostname.split('.').pop();
|
|
389
|
-
if (tld !== 'team' && tld !== 'user' && tld !== 'agent' && tld !== 'smyth') throw new Error('Invalid Resource URI');
|
|
390
|
-
let team = tld === 'team' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
|
|
391
|
-
const user = tld === 'user' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
|
|
392
|
-
const agent = tld === 'agent' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
|
|
393
|
-
const smyth = tld === 'smyth' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
|
|
394
|
-
|
|
395
|
-
let basePath = '';
|
|
396
|
-
if (!team) {
|
|
397
|
-
let candidate: IAccessCandidate;
|
|
398
|
-
if (user) {
|
|
399
|
-
candidate = AccessCandidate.user(user);
|
|
400
|
-
basePath = '.user/' + user;
|
|
401
|
-
} else if (agent) {
|
|
402
|
-
candidate = AccessCandidate.agent(agent);
|
|
403
|
-
basePath = '.agent/' + agent;
|
|
404
|
-
}
|
|
405
|
-
|
|
406
|
-
if (candidate) {
|
|
407
|
-
team = await ConnectorService.getAccountConnector().getCandidateTeam(candidate);
|
|
408
|
-
}
|
|
409
|
-
}
|
|
410
|
-
|
|
411
|
-
// create a default candidate based on the uri
|
|
412
|
-
let defaultCandidate: IAccessCandidate;
|
|
413
|
-
|
|
414
|
-
if (team) {
|
|
415
|
-
defaultCandidate = AccessCandidate.team(team);
|
|
416
|
-
} else if (user) {
|
|
417
|
-
defaultCandidate = AccessCandidate.user(user);
|
|
418
|
-
} else if (agent) {
|
|
419
|
-
defaultCandidate = AccessCandidate.agent(agent);
|
|
420
|
-
}
|
|
421
|
-
|
|
422
|
-
return {
|
|
423
|
-
hash: parsed.hash,
|
|
424
|
-
team,
|
|
425
|
-
user,
|
|
426
|
-
agent,
|
|
427
|
-
smyth,
|
|
428
|
-
defaultCandidate,
|
|
429
|
-
path: basePath + parsed.pathname,
|
|
430
|
-
};
|
|
431
|
-
}
|
|
432
|
-
|
|
433
|
-
private CaseSensitiveURL(urlString: string) {
|
|
434
|
-
// First, extract the original hostname for case preservation
|
|
435
|
-
const parts = urlString.split('://');
|
|
436
|
-
if (parts.length !== 2) return null;
|
|
437
|
-
|
|
438
|
-
const afterProtocol = parts[1];
|
|
439
|
-
const hostnameEnd = Math.min(
|
|
440
|
-
...[afterProtocol.indexOf('/'), afterProtocol.indexOf('?'), afterProtocol.indexOf('#'), afterProtocol.length].filter((i) => i >= 0)
|
|
441
|
-
);
|
|
442
|
-
|
|
443
|
-
const originalHostnamePart = afterProtocol.substring(0, hostnameEnd);
|
|
444
|
-
const [originalHostname, originalPort] = originalHostnamePart.split(':');
|
|
445
|
-
|
|
446
|
-
// Use URL constructor for robust parsing of everything else
|
|
447
|
-
const parsed = new URL(urlString);
|
|
448
|
-
|
|
449
|
-
// Explicitly copy URL properties since they're not enumerable
|
|
450
|
-
return {
|
|
451
|
-
protocol: parsed.protocol,
|
|
452
|
-
hostname: originalHostname, // Case-sensitive hostname
|
|
453
|
-
port: parsed.port,
|
|
454
|
-
pathname: parsed.pathname,
|
|
455
|
-
search: parsed.search,
|
|
456
|
-
searchParams: parsed.searchParams,
|
|
457
|
-
hash: parsed.hash,
|
|
458
|
-
href: parsed.href,
|
|
459
|
-
origin: parsed.origin,
|
|
460
|
-
host: originalHostname + (parsed.port ? `:${parsed.port}` : ''),
|
|
461
|
-
originalPort: originalPort || null,
|
|
462
|
-
};
|
|
463
|
-
}
|
|
464
|
-
|
|
465
|
-
private async toBuffer(data: StorageData): Promise<Buffer> {
|
|
466
|
-
if (Buffer.isBuffer(data)) {
|
|
467
|
-
return data;
|
|
468
|
-
} else if (typeof data === 'string') {
|
|
469
|
-
return Buffer.from(data, 'utf-8');
|
|
470
|
-
} else if (data instanceof Uint8Array) {
|
|
471
|
-
return Buffer.from(data);
|
|
472
|
-
} else if (data instanceof Readable) {
|
|
473
|
-
return new Promise<Buffer>((resolve, reject) => {
|
|
474
|
-
const chunks: Buffer[] = [];
|
|
475
|
-
data.on('data', (chunk) => {
|
|
476
|
-
chunks.push(Buffer.isBuffer(chunk) ? chunk : Buffer.from(chunk));
|
|
477
|
-
});
|
|
478
|
-
data.on('end', () => {
|
|
479
|
-
resolve(Buffer.concat(chunks));
|
|
480
|
-
});
|
|
481
|
-
data.on('error', (err) => {
|
|
482
|
-
reject(err);
|
|
483
|
-
});
|
|
484
|
-
});
|
|
485
|
-
} else {
|
|
486
|
-
throw new Error('Unsupported data type');
|
|
487
|
-
}
|
|
488
|
-
}
|
|
489
|
-
}
|
|
1
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
3
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
4
|
+
import { DEFAULT_TEAM_ID, IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
5
|
+
import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
|
|
6
|
+
import { getMimeType } from '@sre/utils';
|
|
7
|
+
import mime from 'mime';
|
|
8
|
+
import { Readable } from 'stream';
|
|
9
|
+
import { StorageConnector } from './StorageConnector';
|
|
10
|
+
import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
11
|
+
import { CacheConnector } from '@sre/MemoryManager/Cache.service/CacheConnector';
|
|
12
|
+
import crypto from 'crypto';
|
|
13
|
+
import { JSONContentHelper } from '@sre/helpers/JsonContent.helper';
|
|
14
|
+
import { SystemEvents } from '@sre/Core/SystemEvents';
|
|
15
|
+
|
|
16
|
+
export type TSmythFSURI = {
|
|
17
|
+
hash: string;
|
|
18
|
+
team: string;
|
|
19
|
+
path: string;
|
|
20
|
+
};
|
|
21
|
+
|
|
22
|
+
// SystemEvents.on('SRE:Booted', () => {
|
|
23
|
+
// const router = ConnectorService.getRouterConnector();
|
|
24
|
+
// if (router && router?.get instanceof Function) {
|
|
25
|
+
// router.get('/_temp/:uid', SmythFS.Instance.serveTempContent.bind(SmythFS.Instance));
|
|
26
|
+
// router.get('/storage/:file_id', SmythFS.Instance.serveResource.bind(SmythFS.Instance));
|
|
27
|
+
// }
|
|
28
|
+
// });
|
|
29
|
+
|
|
30
|
+
export class SmythFS {
|
|
31
|
+
private hash: string; // Store the instance hash for URL generation
|
|
32
|
+
|
|
33
|
+
static instances: any = {};
|
|
34
|
+
|
|
35
|
+
// Centralized hash generation to ensure consistency
|
|
36
|
+
private static generateInstanceHash(storageName: string, cacheName: string): string {
|
|
37
|
+
const instanceProps = `${storageName}:${cacheName}`;
|
|
38
|
+
return crypto.createHash('sha256').update(instanceProps).digest('hex').substring(0, 6);
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
// Default singleton instance (most common use case)
|
|
42
|
+
public static get Instance(): SmythFS {
|
|
43
|
+
return SmythFS.getInstance(); // Uses default empty string providers
|
|
44
|
+
}
|
|
45
|
+
|
|
46
|
+
// Multiton pattern - get instance based on storage and cache provider combination
|
|
47
|
+
public static getInstance(storageProvider: string | StorageConnector = '', cacheProvider: string | CacheConnector = ''): SmythFS {
|
|
48
|
+
// First get the actual connector names to calculate the correct hash
|
|
49
|
+
const storage = storageProvider instanceof StorageConnector ? storageProvider : ConnectorService.getStorageConnector(storageProvider);
|
|
50
|
+
const cache = cacheProvider instanceof CacheConnector ? cacheProvider : ConnectorService.getCacheConnector(cacheProvider);
|
|
51
|
+
const hash = SmythFS.generateInstanceHash(storage.name, cache.name);
|
|
52
|
+
|
|
53
|
+
if (SmythFS.instances[hash]) {
|
|
54
|
+
return SmythFS.instances[hash];
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
const instance = new SmythFS(storage, cache);
|
|
58
|
+
|
|
59
|
+
//register routes
|
|
60
|
+
const router = ConnectorService.getRouterConnector();
|
|
61
|
+
if (router && router?.get instanceof Function) {
|
|
62
|
+
router.get(`/_temp/${hash}/:uid`, instance.serveTempContent.bind(instance));
|
|
63
|
+
router.get(`/storage/${hash}/:file_id`, instance.serveResource.bind(instance));
|
|
64
|
+
}
|
|
65
|
+
|
|
66
|
+
SmythFS.instances[hash] = instance;
|
|
67
|
+
return instance;
|
|
68
|
+
}
|
|
69
|
+
|
|
70
|
+
private constructor(private storage: StorageConnector, private cache: CacheConnector) {
|
|
71
|
+
//SmythFS cannot be used without SRE
|
|
72
|
+
if (!ConnectorService.ready) {
|
|
73
|
+
throw new Error('SRE not available');
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
// Use centralized hash generation method
|
|
77
|
+
this.hash = SmythFS.generateInstanceHash(this.storage.name, this.cache.name);
|
|
78
|
+
}
|
|
79
|
+
|
|
80
|
+
// public getStoragePath(uri: string) {
|
|
81
|
+
// const smythURI = this.URIParser(uri);
|
|
82
|
+
// if (!smythURI) throw new Error('Invalid Resource URI');
|
|
83
|
+
// return `teams/${smythURI.team}${smythURI.path}`;
|
|
84
|
+
// }
|
|
85
|
+
|
|
86
|
+
public getBaseUri(candidate: IAccessCandidate) {
|
|
87
|
+
const uri = `smythfs://${candidate.id}.${candidate.role}`;
|
|
88
|
+
|
|
89
|
+
return uri;
|
|
90
|
+
}
|
|
91
|
+
|
|
92
|
+
/**
|
|
93
|
+
* Reads a resource from smyth file system
|
|
94
|
+
* @param uri smythfs:// uri
|
|
95
|
+
* @param candidate
|
|
96
|
+
* @returns
|
|
97
|
+
*/
|
|
98
|
+
public async read(uri: string, candidate?: IAccessCandidate): Promise<Buffer> {
|
|
99
|
+
const smythURI = await this.URIParser(uri);
|
|
100
|
+
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
101
|
+
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
102
|
+
|
|
103
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
104
|
+
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
105
|
+
if (!isMember) throw new Error('Access Denied');
|
|
106
|
+
|
|
107
|
+
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
108
|
+
|
|
109
|
+
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
110
|
+
|
|
111
|
+
const data = await this.storage.requester(_candidate).read(resourceId);
|
|
112
|
+
|
|
113
|
+
return data ? this.toBuffer(data) : null;
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
|
|
117
|
+
public async getMetadata(uri: string, candidate?: IAccessCandidate) {
|
|
118
|
+
const smythURI = await this.URIParser(uri);
|
|
119
|
+
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
120
|
+
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
121
|
+
|
|
122
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
123
|
+
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
124
|
+
if (!isMember) throw new Error('Access Denied');
|
|
125
|
+
|
|
126
|
+
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
127
|
+
|
|
128
|
+
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
129
|
+
|
|
130
|
+
return await this.storage.requester(_candidate).getMetadata(resourceId);
|
|
131
|
+
}
|
|
132
|
+
|
|
133
|
+
public async write(uri: string, data: StorageData, candidate?: IAccessCandidate, metadata?: StorageMetadata, ttl?: number) {
|
|
134
|
+
const smythURI = await this.URIParser(uri);
|
|
135
|
+
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
136
|
+
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
137
|
+
|
|
138
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
139
|
+
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
140
|
+
if (!isMember) throw new Error('Access Denied');
|
|
141
|
+
|
|
142
|
+
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
143
|
+
//when we write a file, it does not exist we need to explicitly provide a resource team in order to have access rights set properly
|
|
144
|
+
|
|
145
|
+
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
146
|
+
|
|
147
|
+
let acl: ACL;
|
|
148
|
+
|
|
149
|
+
//give team read access if this is a team resource and not the default team
|
|
150
|
+
//because the default team is a fallback used when no team is specified or account connector is not available
|
|
151
|
+
//in that case we need to only allow the creator to access the resource
|
|
152
|
+
if (smythURI.team && smythURI.team !== DEFAULT_TEAM_ID) {
|
|
153
|
+
acl = new ACL()
|
|
154
|
+
//.addAccess(candidate.role, candidate.id, TAccessLevel.Owner) // creator is owner
|
|
155
|
+
.addAccess(TAccessRole.Team, smythURI.team, TAccessLevel.Read).ACL as ACL; // team has read access
|
|
156
|
+
}
|
|
157
|
+
|
|
158
|
+
if (!metadata) metadata = {};
|
|
159
|
+
if (!metadata?.ContentType) {
|
|
160
|
+
metadata.ContentType = await getMimeType(data);
|
|
161
|
+
if (!metadata.ContentType) {
|
|
162
|
+
const ext: any = uri.split('.').pop();
|
|
163
|
+
if (ext) {
|
|
164
|
+
metadata.ContentType = mime.getType(ext) || 'application/octet-stream';
|
|
165
|
+
}
|
|
166
|
+
}
|
|
167
|
+
}
|
|
168
|
+
await this.storage.requester(_candidate).write(resourceId, data, acl, metadata);
|
|
169
|
+
|
|
170
|
+
if (ttl) {
|
|
171
|
+
await this.storage.requester(_candidate).expire(resourceId, ttl);
|
|
172
|
+
}
|
|
173
|
+
}
|
|
174
|
+
|
|
175
|
+
public async delete(uri: string, candidate?: IAccessCandidate) {
|
|
176
|
+
const smythURI = await this.URIParser(uri);
|
|
177
|
+
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
178
|
+
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
179
|
+
|
|
180
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
181
|
+
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
182
|
+
if (!isMember) throw new Error('Access Denied');
|
|
183
|
+
|
|
184
|
+
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
185
|
+
|
|
186
|
+
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
187
|
+
|
|
188
|
+
await this.storage.requester(_candidate).delete(resourceId);
|
|
189
|
+
}
|
|
190
|
+
|
|
191
|
+
//TODO: should we require access token here ?
|
|
192
|
+
public async exists(uri: string, candidate?: IAccessCandidate) {
|
|
193
|
+
const smythURI = await this.URIParser(uri);
|
|
194
|
+
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
195
|
+
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
196
|
+
|
|
197
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
198
|
+
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
199
|
+
if (!isMember) throw new Error('Access Denied');
|
|
200
|
+
|
|
201
|
+
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
202
|
+
|
|
203
|
+
//in order to get a consistent access check in case of inexisting resource, we need to explicitly set a default resource team
|
|
204
|
+
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
205
|
+
|
|
206
|
+
return await this.storage.requester(_candidate).exists(resourceId);
|
|
207
|
+
}
|
|
208
|
+
|
|
209
|
+
//#region Temp URL (mainly used for returning agent output to user for temporary access)
|
|
210
|
+
public async genTempUrl(uri: string, candidate?: IAccessCandidate, ttlSeconds: number = 3600) {
|
|
211
|
+
const smythURI = await this.URIParser(uri);
|
|
212
|
+
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
213
|
+
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
214
|
+
|
|
215
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
216
|
+
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
217
|
+
if (!isMember) throw new Error('Access Denied');
|
|
218
|
+
|
|
219
|
+
const exists = await this.exists(uri, candidate);
|
|
220
|
+
if (!exists) throw new Error('Resource does not exist');
|
|
221
|
+
|
|
222
|
+
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
223
|
+
|
|
224
|
+
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
225
|
+
const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
|
|
226
|
+
|
|
227
|
+
const uid = crypto.randomUUID();
|
|
228
|
+
const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
|
|
229
|
+
|
|
230
|
+
await this.cache.requester(tempUserCandidate).set(
|
|
231
|
+
`pub_url:${uid}`,
|
|
232
|
+
JSON.stringify({
|
|
233
|
+
accessCandidate: _candidate,
|
|
234
|
+
uri,
|
|
235
|
+
contentType: resourceMetadata?.ContentType,
|
|
236
|
+
}),
|
|
237
|
+
undefined,
|
|
238
|
+
undefined,
|
|
239
|
+
ttlSeconds
|
|
240
|
+
); // 1 hour
|
|
241
|
+
|
|
242
|
+
const baseUrl = ConnectorService.getRouterConnector().baseUrl;
|
|
243
|
+
return `${baseUrl}/_temp/${this.hash}/${uid}`;
|
|
244
|
+
}
|
|
245
|
+
|
|
246
|
+
public async destroyTempUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {
|
|
247
|
+
// Parse URL with new format: /_temp/{hash}/{uid}
|
|
248
|
+
const tempPath = url.split('/_temp/')[1];
|
|
249
|
+
if (!tempPath) throw new Error('Invalid Temp URL format');
|
|
250
|
+
|
|
251
|
+
const uid = tempPath.split('/')[1]?.split('?')[0]; // get uid and remove query params
|
|
252
|
+
if (!uid) throw new Error('Invalid Temp URL format');
|
|
253
|
+
|
|
254
|
+
let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
|
|
255
|
+
if (!cacheVal) throw new Error('Invalid Temp URL');
|
|
256
|
+
cacheVal = JSONContentHelper.create(cacheVal).tryParse();
|
|
257
|
+
await this.cache.requester(AccessCandidate.user(`system-${uid}`)).delete(`pub_url:${uid}`);
|
|
258
|
+
if (delResource) {
|
|
259
|
+
await this.delete(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
|
|
260
|
+
}
|
|
261
|
+
}
|
|
262
|
+
|
|
263
|
+
public async serveTempContent(req: any, res: any) {
|
|
264
|
+
try {
|
|
265
|
+
const { uid } = req.params;
|
|
266
|
+
let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
|
|
267
|
+
if (!cacheVal) {
|
|
268
|
+
res.writeHead(404, { 'Content-Type': 'text/plain' });
|
|
269
|
+
res.end('Invalid Temp URL');
|
|
270
|
+
return;
|
|
271
|
+
}
|
|
272
|
+
cacheVal = JSONContentHelper.create(cacheVal).tryParse();
|
|
273
|
+
const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
|
|
274
|
+
|
|
275
|
+
const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
|
|
276
|
+
|
|
277
|
+
const contentType = cacheVal.contentType || 'application/octet-stream';
|
|
278
|
+
|
|
279
|
+
res.writeHead(200, {
|
|
280
|
+
'Content-Type': contentType,
|
|
281
|
+
'Content-Disposition': 'inline',
|
|
282
|
+
'Content-Length': contentBuffer.length,
|
|
283
|
+
});
|
|
284
|
+
|
|
285
|
+
res.end(contentBuffer);
|
|
286
|
+
} catch (error) {
|
|
287
|
+
console.error('Error serving temp content:', error);
|
|
288
|
+
res.writeHead(500, { 'Content-Type': 'text/plain' });
|
|
289
|
+
res.end('Internal Server Error');
|
|
290
|
+
}
|
|
291
|
+
}
|
|
292
|
+
//#endregion
|
|
293
|
+
|
|
294
|
+
//#region Resource Serving
|
|
295
|
+
|
|
296
|
+
/**
|
|
297
|
+
* Generates a public url for the resource
|
|
298
|
+
* @param uri
|
|
299
|
+
* @param candidate
|
|
300
|
+
* @returns
|
|
301
|
+
*/
|
|
302
|
+
public async genResourceUrl(uri: string, candidate?: IAccessCandidate) {
|
|
303
|
+
const smythURI = await this.URIParser(uri);
|
|
304
|
+
if (!smythURI) throw new Error('Invalid Resource URI');
|
|
305
|
+
candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
|
|
306
|
+
|
|
307
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
308
|
+
const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
|
|
309
|
+
if (!isMember) throw new Error('Access Denied');
|
|
310
|
+
|
|
311
|
+
const exists = await this.exists(uri, candidate);
|
|
312
|
+
if (!exists) throw new Error('Resource does not exist');
|
|
313
|
+
|
|
314
|
+
const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
|
|
315
|
+
if (_candidate.role !== TAccessRole.Agent) {
|
|
316
|
+
throw new Error('Only agents can generate resource urls');
|
|
317
|
+
}
|
|
318
|
+
const agentId = _candidate.id;
|
|
319
|
+
|
|
320
|
+
const resourceId = `teams/${smythURI.team}${smythURI.path}`;
|
|
321
|
+
const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
|
|
322
|
+
|
|
323
|
+
const uid = crypto.randomUUID(); // maybe instead of a random uuid, u can use the resource
|
|
324
|
+
const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
|
|
325
|
+
|
|
326
|
+
await this.cache.requester(tempUserCandidate).set(
|
|
327
|
+
`storage_url-${uid}`,
|
|
328
|
+
JSON.stringify({
|
|
329
|
+
accessCandidate: _candidate,
|
|
330
|
+
uri,
|
|
331
|
+
contentType: resourceMetadata?.ContentType,
|
|
332
|
+
}),
|
|
333
|
+
undefined,
|
|
334
|
+
undefined
|
|
335
|
+
// 3600 // 1 hour
|
|
336
|
+
);
|
|
337
|
+
|
|
338
|
+
const contentType = resourceMetadata?.ContentType;
|
|
339
|
+
const ext = contentType ? mime.getExtension(contentType) : undefined;
|
|
340
|
+
|
|
341
|
+
// get the agent domain
|
|
342
|
+
const agentDataConnector = ConnectorService.getAgentDataConnector();
|
|
343
|
+
const baseUrl = ConnectorService.getRouterConnector().baseUrl;
|
|
344
|
+
const domain = agentDataConnector.getAgentConfig(agentId)?.agentStageDomain
|
|
345
|
+
? `https://${agentDataConnector.getAgentConfig(agentId).agentStageDomain}`
|
|
346
|
+
: baseUrl;
|
|
347
|
+
|
|
348
|
+
return `${domain}/storage/${this.hash}/${uid}${ext ? `.${ext}` : ''}`;
|
|
349
|
+
}
|
|
350
|
+
public async destroyResourceUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {}
|
|
351
|
+
public async serveResource(req: any, res: any) {
|
|
352
|
+
try {
|
|
353
|
+
const { file_id } = req.params;
|
|
354
|
+
const [uid, extention] = file_id.split('.');
|
|
355
|
+
let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`storage_url-${uid}`);
|
|
356
|
+
if (!cacheVal) {
|
|
357
|
+
res.writeHead(404, { 'Content-Type': 'text/plain' });
|
|
358
|
+
res.end('Invalid Resource URL');
|
|
359
|
+
return;
|
|
360
|
+
}
|
|
361
|
+
cacheVal = JSONContentHelper.create(cacheVal).tryParse();
|
|
362
|
+
const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
|
|
363
|
+
|
|
364
|
+
const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
|
|
365
|
+
|
|
366
|
+
const contentType = cacheVal.contentType || 'application/octet-stream';
|
|
367
|
+
|
|
368
|
+
res.writeHead(200, {
|
|
369
|
+
'Content-Type': contentType,
|
|
370
|
+
'Content-Disposition': 'inline',
|
|
371
|
+
'Content-Length': contentBuffer.length,
|
|
372
|
+
});
|
|
373
|
+
|
|
374
|
+
res.end(contentBuffer);
|
|
375
|
+
} catch (error) {
|
|
376
|
+
console.error('Error serving storage resource content:', error);
|
|
377
|
+
res.writeHead(500, { 'Content-Type': 'text/plain' });
|
|
378
|
+
res.end('Internal Server Error');
|
|
379
|
+
}
|
|
380
|
+
}
|
|
381
|
+
//#endregion
|
|
382
|
+
|
|
383
|
+
private async URIParser(uri: string) {
|
|
384
|
+
const parts = uri.split('://');
|
|
385
|
+
if (parts.length !== 2) return undefined;
|
|
386
|
+
if (parts[0].toLowerCase() !== 'smythfs') return undefined;
|
|
387
|
+
const parsed = this.CaseSensitiveURL(`http://${parts[1]}`);
|
|
388
|
+
const tld = parsed.hostname.split('.').pop();
|
|
389
|
+
if (tld !== 'team' && tld !== 'user' && tld !== 'agent' && tld !== 'smyth') throw new Error('Invalid Resource URI');
|
|
390
|
+
let team = tld === 'team' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
|
|
391
|
+
const user = tld === 'user' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
|
|
392
|
+
const agent = tld === 'agent' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
|
|
393
|
+
const smyth = tld === 'smyth' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
|
|
394
|
+
|
|
395
|
+
let basePath = '';
|
|
396
|
+
if (!team) {
|
|
397
|
+
let candidate: IAccessCandidate;
|
|
398
|
+
if (user) {
|
|
399
|
+
candidate = AccessCandidate.user(user);
|
|
400
|
+
basePath = '.user/' + user;
|
|
401
|
+
} else if (agent) {
|
|
402
|
+
candidate = AccessCandidate.agent(agent);
|
|
403
|
+
basePath = '.agent/' + agent;
|
|
404
|
+
}
|
|
405
|
+
|
|
406
|
+
if (candidate) {
|
|
407
|
+
team = await ConnectorService.getAccountConnector().getCandidateTeam(candidate);
|
|
408
|
+
}
|
|
409
|
+
}
|
|
410
|
+
|
|
411
|
+
// create a default candidate based on the uri
|
|
412
|
+
let defaultCandidate: IAccessCandidate;
|
|
413
|
+
|
|
414
|
+
if (team) {
|
|
415
|
+
defaultCandidate = AccessCandidate.team(team);
|
|
416
|
+
} else if (user) {
|
|
417
|
+
defaultCandidate = AccessCandidate.user(user);
|
|
418
|
+
} else if (agent) {
|
|
419
|
+
defaultCandidate = AccessCandidate.agent(agent);
|
|
420
|
+
}
|
|
421
|
+
|
|
422
|
+
return {
|
|
423
|
+
hash: parsed.hash,
|
|
424
|
+
team,
|
|
425
|
+
user,
|
|
426
|
+
agent,
|
|
427
|
+
smyth,
|
|
428
|
+
defaultCandidate,
|
|
429
|
+
path: basePath + parsed.pathname,
|
|
430
|
+
};
|
|
431
|
+
}
|
|
432
|
+
|
|
433
|
+
private CaseSensitiveURL(urlString: string) {
|
|
434
|
+
// First, extract the original hostname for case preservation
|
|
435
|
+
const parts = urlString.split('://');
|
|
436
|
+
if (parts.length !== 2) return null;
|
|
437
|
+
|
|
438
|
+
const afterProtocol = parts[1];
|
|
439
|
+
const hostnameEnd = Math.min(
|
|
440
|
+
...[afterProtocol.indexOf('/'), afterProtocol.indexOf('?'), afterProtocol.indexOf('#'), afterProtocol.length].filter((i) => i >= 0)
|
|
441
|
+
);
|
|
442
|
+
|
|
443
|
+
const originalHostnamePart = afterProtocol.substring(0, hostnameEnd);
|
|
444
|
+
const [originalHostname, originalPort] = originalHostnamePart.split(':');
|
|
445
|
+
|
|
446
|
+
// Use URL constructor for robust parsing of everything else
|
|
447
|
+
const parsed = new URL(urlString);
|
|
448
|
+
|
|
449
|
+
// Explicitly copy URL properties since they're not enumerable
|
|
450
|
+
return {
|
|
451
|
+
protocol: parsed.protocol,
|
|
452
|
+
hostname: originalHostname, // Case-sensitive hostname
|
|
453
|
+
port: parsed.port,
|
|
454
|
+
pathname: parsed.pathname,
|
|
455
|
+
search: parsed.search,
|
|
456
|
+
searchParams: parsed.searchParams,
|
|
457
|
+
hash: parsed.hash,
|
|
458
|
+
href: parsed.href,
|
|
459
|
+
origin: parsed.origin,
|
|
460
|
+
host: originalHostname + (parsed.port ? `:${parsed.port}` : ''),
|
|
461
|
+
originalPort: originalPort || null,
|
|
462
|
+
};
|
|
463
|
+
}
|
|
464
|
+
|
|
465
|
+
private async toBuffer(data: StorageData): Promise<Buffer> {
|
|
466
|
+
if (Buffer.isBuffer(data)) {
|
|
467
|
+
return data;
|
|
468
|
+
} else if (typeof data === 'string') {
|
|
469
|
+
return Buffer.from(data, 'utf-8');
|
|
470
|
+
} else if (data instanceof Uint8Array) {
|
|
471
|
+
return Buffer.from(data);
|
|
472
|
+
} else if (data instanceof Readable) {
|
|
473
|
+
return new Promise<Buffer>((resolve, reject) => {
|
|
474
|
+
const chunks: Buffer[] = [];
|
|
475
|
+
data.on('data', (chunk) => {
|
|
476
|
+
chunks.push(Buffer.isBuffer(chunk) ? chunk : Buffer.from(chunk));
|
|
477
|
+
});
|
|
478
|
+
data.on('end', () => {
|
|
479
|
+
resolve(Buffer.concat(chunks));
|
|
480
|
+
});
|
|
481
|
+
data.on('error', (err) => {
|
|
482
|
+
reject(err);
|
|
483
|
+
});
|
|
484
|
+
});
|
|
485
|
+
} else {
|
|
486
|
+
throw new Error('Unsupported data type');
|
|
487
|
+
}
|
|
488
|
+
}
|
|
489
|
+
}
|