@smythos/sre 1.5.46 → 1.5.50
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +98 -90
- package/LICENSE +18 -18
- package/README.md +135 -135
- package/dist/bundle-analysis-lazy.html +4949 -0
- package/dist/bundle-analysis.html +4949 -0
- package/dist/index.js +3 -3
- package/dist/index.js.map +1 -1
- package/dist/types/Components/MCPClient.class.d.ts +1 -0
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +1 -6
- package/dist/types/utils/package-manager.utils.d.ts +26 -0
- package/package.json +1 -1
- package/src/Components/APICall/APICall.class.ts +156 -156
- package/src/Components/APICall/AccessTokenManager.ts +130 -130
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
- package/src/Components/APICall/OAuth.helper.ts +294 -294
- package/src/Components/APICall/mimeTypeCategories.ts +46 -46
- package/src/Components/APICall/parseData.ts +167 -167
- package/src/Components/APICall/parseHeaders.ts +41 -41
- package/src/Components/APICall/parseProxy.ts +68 -68
- package/src/Components/APICall/parseUrl.ts +91 -91
- package/src/Components/APIEndpoint.class.ts +234 -234
- package/src/Components/APIOutput.class.ts +58 -58
- package/src/Components/AgentPlugin.class.ts +102 -102
- package/src/Components/Async.class.ts +155 -155
- package/src/Components/Await.class.ts +90 -90
- package/src/Components/Classifier.class.ts +158 -158
- package/src/Components/Component.class.ts +132 -132
- package/src/Components/ComponentHost.class.ts +38 -38
- package/src/Components/DataSourceCleaner.class.ts +92 -92
- package/src/Components/DataSourceIndexer.class.ts +181 -181
- package/src/Components/DataSourceLookup.class.ts +161 -161
- package/src/Components/ECMASandbox.class.ts +71 -71
- package/src/Components/FEncDec.class.ts +29 -29
- package/src/Components/FHash.class.ts +33 -33
- package/src/Components/FSign.class.ts +80 -80
- package/src/Components/FSleep.class.ts +25 -25
- package/src/Components/FTimestamp.class.ts +25 -25
- package/src/Components/FileStore.class.ts +78 -78
- package/src/Components/ForEach.class.ts +97 -97
- package/src/Components/GPTPlugin.class.ts +70 -70
- package/src/Components/GenAILLM.class.ts +586 -586
- package/src/Components/HuggingFace.class.ts +314 -314
- package/src/Components/Image/imageSettings.config.ts +70 -70
- package/src/Components/ImageGenerator.class.ts +502 -502
- package/src/Components/JSONFilter.class.ts +54 -54
- package/src/Components/LLMAssistant.class.ts +213 -213
- package/src/Components/LogicAND.class.ts +28 -28
- package/src/Components/LogicAtLeast.class.ts +85 -85
- package/src/Components/LogicAtMost.class.ts +86 -86
- package/src/Components/LogicOR.class.ts +29 -29
- package/src/Components/LogicXOR.class.ts +34 -34
- package/src/Components/MCPClient.class.ts +138 -112
- package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
- package/src/Components/MemoryReadKeyVal.class.ts +66 -66
- package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
- package/src/Components/MemoryWriteObject.class.ts +97 -97
- package/src/Components/MultimodalLLM.class.ts +128 -128
- package/src/Components/OpenAPI.class.ts +72 -72
- package/src/Components/PromptGenerator.class.ts +122 -122
- package/src/Components/ScrapflyWebScrape.class.ts +159 -159
- package/src/Components/ServerlessCode.class.ts +123 -123
- package/src/Components/TavilyWebSearch.class.ts +98 -98
- package/src/Components/VisionLLM.class.ts +104 -104
- package/src/Components/ZapierAction.class.ts +127 -127
- package/src/Components/index.ts +97 -97
- package/src/Core/AgentProcess.helper.ts +240 -240
- package/src/Core/Connector.class.ts +123 -123
- package/src/Core/ConnectorsService.ts +197 -197
- package/src/Core/DummyConnector.ts +49 -49
- package/src/Core/HookService.ts +105 -105
- package/src/Core/SmythRuntime.class.ts +235 -235
- package/src/Core/SystemEvents.ts +16 -16
- package/src/Core/boot.ts +56 -56
- package/src/config.ts +15 -15
- package/src/constants.ts +126 -126
- package/src/data/hugging-face.params.json +579 -579
- package/src/helpers/AWSLambdaCode.helper.ts +587 -587
- package/src/helpers/BinaryInput.helper.ts +331 -331
- package/src/helpers/Conversation.helper.ts +1119 -1119
- package/src/helpers/ECMASandbox.helper.ts +54 -54
- package/src/helpers/JsonContent.helper.ts +97 -97
- package/src/helpers/LocalCache.helper.ts +97 -97
- package/src/helpers/Log.helper.ts +274 -274
- package/src/helpers/OpenApiParser.helper.ts +150 -150
- package/src/helpers/S3Cache.helper.ts +147 -147
- package/src/helpers/SmythURI.helper.ts +5 -5
- package/src/helpers/Sysconfig.helper.ts +77 -77
- package/src/helpers/TemplateString.helper.ts +243 -243
- package/src/helpers/TypeChecker.helper.ts +329 -329
- package/src/index.ts +3 -3
- package/src/index.ts.bak +3 -3
- package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
- package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
- package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
- package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
- package/src/subsystems/IO/CLI.service/index.ts +9 -9
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
- package/src/subsystems/IO/Log.service/index.ts +13 -13
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
- package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
- package/src/subsystems/IO/NKV.service/index.ts +14 -14
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
- package/src/subsystems/IO/Router.service/index.ts +11 -11
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
- package/src/subsystems/IO/Storage.service/index.ts +13 -13
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
- package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
- package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
- package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
- package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
- package/src/subsystems/LLMManager/custom-models.ts +854 -854
- package/src/subsystems/LLMManager/models.ts +2540 -2540
- package/src/subsystems/LLMManager/paramMappings.ts +69 -69
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
- package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
- package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
- package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
- package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
- package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
- package/src/subsystems/Security/Account.service/index.ts +14 -14
- package/src/subsystems/Security/Credentials.helper.ts +62 -62
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
- package/src/subsystems/Security/SecureConnector.class.ts +110 -110
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
- package/src/subsystems/Security/Vault.service/index.ts +12 -12
- package/src/types/ACL.types.ts +104 -104
- package/src/types/AWS.types.ts +10 -10
- package/src/types/Agent.types.ts +61 -61
- package/src/types/AgentLogger.types.ts +17 -17
- package/src/types/Cache.types.ts +1 -1
- package/src/types/Common.types.ts +2 -2
- package/src/types/LLM.types.ts +496 -496
- package/src/types/Redis.types.ts +8 -8
- package/src/types/SRE.types.ts +64 -64
- package/src/types/Security.types.ts +14 -14
- package/src/types/Storage.types.ts +5 -5
- package/src/types/VectorDB.types.ts +86 -86
- package/src/utils/base64.utils.ts +275 -275
- package/src/utils/cli.utils.ts +68 -68
- package/src/utils/data.utils.ts +322 -322
- package/src/utils/date-time.utils.ts +22 -22
- package/src/utils/general.utils.ts +238 -238
- package/src/utils/index.ts +12 -12
- package/src/utils/lazy-client.ts +261 -261
- package/src/utils/numbers.utils.ts +13 -13
- package/src/utils/oauth.utils.ts +35 -35
- package/src/utils/string.utils.ts +414 -414
- package/src/utils/url.utils.ts +19 -19
- package/src/utils/validation.utils.ts +74 -74
- package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
|
@@ -1,294 +1,294 @@
|
|
|
1
|
-
// helper.ts
|
|
2
|
-
import crypto from 'crypto';
|
|
3
|
-
import OAuth from 'oauth-1.0a';
|
|
4
|
-
import AccessTokenManager from './AccessTokenManager';
|
|
5
|
-
import { REQUEST_CONTENT_TYPES } from '@sre/constants';
|
|
6
|
-
import axios, { AxiosRequestConfig } from 'axios';
|
|
7
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
8
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
9
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
10
|
-
import { TemplateString } from '@sre/helpers/TemplateString.helper';
|
|
11
|
-
import { SystemEvents } from '@sre/Core/SystemEvents';
|
|
12
|
-
|
|
13
|
-
const console = Logger('OAuth.helper');
|
|
14
|
-
let managedVault: any;
|
|
15
|
-
|
|
16
|
-
SystemEvents.on('SRE:Booted', () => {
|
|
17
|
-
try {
|
|
18
|
-
managedVault = ConnectorService.getManagedVaultConnector();
|
|
19
|
-
} catch (error) {
|
|
20
|
-
console.warn('Could not find a compatible ManagedVault connector, OAuth APICalls will not work');
|
|
21
|
-
}
|
|
22
|
-
});
|
|
23
|
-
|
|
24
|
-
export function extractAdditionalParamsForOAuth1(reqConfig: AxiosRequestConfig = {}) {
|
|
25
|
-
let additionalParams = {};
|
|
26
|
-
// Parse URL parameters using URL and URLSearchParams
|
|
27
|
-
const url = new URL(reqConfig.url);
|
|
28
|
-
const searchParams = url.searchParams;
|
|
29
|
-
additionalParams = Object.fromEntries(searchParams.entries());
|
|
30
|
-
|
|
31
|
-
// Check content type and add required parameters for OAuth 1 signature
|
|
32
|
-
const contentType = reqConfig.headers?.['Content-Type'] || '';
|
|
33
|
-
if (contentType === REQUEST_CONTENT_TYPES.urlEncodedFormData) {
|
|
34
|
-
// For form data, include the form parameters in the signature
|
|
35
|
-
if (typeof reqConfig.data === 'string') {
|
|
36
|
-
const formData = new URLSearchParams(reqConfig.data);
|
|
37
|
-
additionalParams = { ...additionalParams, ...Object.fromEntries(formData) };
|
|
38
|
-
}
|
|
39
|
-
} else if (contentType === REQUEST_CONTENT_TYPES.json) {
|
|
40
|
-
// For JSON data, include a hash of the request body
|
|
41
|
-
if (reqConfig.data) {
|
|
42
|
-
const hash = crypto.createHash('sha1').update(JSON.stringify(reqConfig.data)).digest('base64');
|
|
43
|
-
additionalParams['oauth_body_hash'] = hash;
|
|
44
|
-
}
|
|
45
|
-
} else if (contentType === REQUEST_CONTENT_TYPES.multipartFormData) {
|
|
46
|
-
const formData = reqConfig.data as FormData;
|
|
47
|
-
for (const [key, value] of formData.entries()) {
|
|
48
|
-
// Exclude binary form data (File, Blob, etc.)
|
|
49
|
-
if (typeof value === 'object' && value !== null && 'size' in value && 'type' in value) {
|
|
50
|
-
continue;
|
|
51
|
-
}
|
|
52
|
-
|
|
53
|
-
additionalParams[key] = value;
|
|
54
|
-
}
|
|
55
|
-
}
|
|
56
|
-
|
|
57
|
-
return additionalParams;
|
|
58
|
-
}
|
|
59
|
-
|
|
60
|
-
export const buildOAuth1Header = (url, method, oauth1Credentials, additionalParams = {}) => {
|
|
61
|
-
const oauth = new OAuth({
|
|
62
|
-
consumer: {
|
|
63
|
-
key: oauth1Credentials.consumerKey,
|
|
64
|
-
secret: oauth1Credentials.consumerSecret,
|
|
65
|
-
},
|
|
66
|
-
signature_method: 'HMAC-SHA1',
|
|
67
|
-
hash_function(base_string, key) {
|
|
68
|
-
return crypto.createHmac('sha1', key).update(base_string).digest('base64');
|
|
69
|
-
},
|
|
70
|
-
});
|
|
71
|
-
|
|
72
|
-
// Include additional parameters if necessary (e.g., for non-standard providers)
|
|
73
|
-
const requestData = {
|
|
74
|
-
url,
|
|
75
|
-
method,
|
|
76
|
-
...additionalParams,
|
|
77
|
-
};
|
|
78
|
-
const signedRequest = oauth.authorize(requestData, { key: oauth1Credentials.token, secret: oauth1Credentials.tokenSecret });
|
|
79
|
-
return oauth.toHeader(signedRequest);
|
|
80
|
-
};
|
|
81
|
-
|
|
82
|
-
export const retrieveOAuthTokens = async (agent, config) => {
|
|
83
|
-
let tokenKey: any = null;
|
|
84
|
-
try {
|
|
85
|
-
tokenKey = `OAUTH_${config.componentId ?? config.id}_TOKENS`;
|
|
86
|
-
|
|
87
|
-
try {
|
|
88
|
-
const result: any = await managedVault.user(AccessCandidate.agent(agent.id)).get(tokenKey);
|
|
89
|
-
const tokensData = typeof result === 'object' ? result : JSON.parse(result || '{}');
|
|
90
|
-
|
|
91
|
-
if (!tokensData) {
|
|
92
|
-
throw new Error('Failed to retrieve OAuth tokens from vault. Please authenticate ...');
|
|
93
|
-
}
|
|
94
|
-
|
|
95
|
-
const primaryToken = tokensData.primary; // accessToken or token
|
|
96
|
-
const secondaryToken = tokensData.secondary; // refreshToken or tokenSecret
|
|
97
|
-
const type = tokensData.type; // oauth || oauth2
|
|
98
|
-
|
|
99
|
-
// Add warning logs for OAuth2
|
|
100
|
-
if (type === 'oauth2' && config.data.oauthService !== 'OAuth2 Client Credentials') {
|
|
101
|
-
if (!secondaryToken) {
|
|
102
|
-
console.warn('Warning: refresh_token is missing for OAuth2');
|
|
103
|
-
}
|
|
104
|
-
if (!tokensData.expires_in) {
|
|
105
|
-
console.warn('Warning: expires_in is missing for OAuth2.');
|
|
106
|
-
}
|
|
107
|
-
}
|
|
108
|
-
|
|
109
|
-
// sometimes refreshToken is not available . e.g in case of linkedIn. so only add check for primary token
|
|
110
|
-
if (config.data.oauthService !== 'OAuth2 Client Credentials') {
|
|
111
|
-
if (!primaryToken) {
|
|
112
|
-
throw new Error('Retrieved OAuth tokens do not exist, invalid OR incomplete. Please authenticate ...');
|
|
113
|
-
}
|
|
114
|
-
}
|
|
115
|
-
|
|
116
|
-
const responseData: any = {
|
|
117
|
-
primaryToken,
|
|
118
|
-
secondaryToken,
|
|
119
|
-
type,
|
|
120
|
-
};
|
|
121
|
-
|
|
122
|
-
if (type === 'oauth') {
|
|
123
|
-
// Check and assign if present
|
|
124
|
-
if ('consumerKey' in tokensData) responseData.consumerKey = tokensData.consumerKey;
|
|
125
|
-
if ('consumerSecret' in tokensData) responseData.consumerSecret = tokensData.consumerSecret;
|
|
126
|
-
responseData.team = tokensData.team;
|
|
127
|
-
} else if (type === 'oauth2') {
|
|
128
|
-
// Check and assign if present
|
|
129
|
-
responseData.tokenURL = tokensData.tokenURL;
|
|
130
|
-
if ('clientID' in tokensData) responseData.clientID = tokensData.clientID;
|
|
131
|
-
if ('clientSecret' in tokensData) responseData.clientSecret = tokensData.clientSecret;
|
|
132
|
-
responseData.expiresIn = tokensData.expires_in ?? 0; // Optional property, default to 0 if not present. time to expire access token
|
|
133
|
-
responseData.team = tokensData.team;
|
|
134
|
-
}
|
|
135
|
-
|
|
136
|
-
return { responseData, data: tokensData, keyId: tokenKey };
|
|
137
|
-
} catch (error) {
|
|
138
|
-
throw new Error(`Failed to parse retrieved tokens: ${error}`);
|
|
139
|
-
}
|
|
140
|
-
} catch (error) {
|
|
141
|
-
console.error('Error retrieving OAuth tokens:', error);
|
|
142
|
-
throw error; // rethrow for potential handling by the calling code
|
|
143
|
-
}
|
|
144
|
-
};
|
|
145
|
-
|
|
146
|
-
export const handleOAuthHeaders = async (agent, config, reqConfig, logger, additionalParams = {}, rootUrl) => {
|
|
147
|
-
let headers = {}; // Initialize headers as an empty object
|
|
148
|
-
const { responseData: oauthTokens, data, keyId } = await retrieveOAuthTokens(agent, config);
|
|
149
|
-
|
|
150
|
-
try {
|
|
151
|
-
// Extract template variable key IDs for consumerKey, consumerSecret, clientID, and clientSecret
|
|
152
|
-
const keys = ['consumerKey', 'consumerSecret', 'clientID', 'clientSecret'];
|
|
153
|
-
let oAuthConfigString = JSON.stringify({
|
|
154
|
-
consumerKey: config.data.consumerKey,
|
|
155
|
-
consumerSecret: config.data.consumerSecret,
|
|
156
|
-
clientID: config.data.clientID,
|
|
157
|
-
clientSecret: config.data.clientSecret,
|
|
158
|
-
tokenURL: config.data.tokenURL,
|
|
159
|
-
});
|
|
160
|
-
|
|
161
|
-
oAuthConfigString = await TemplateString(oAuthConfigString).parseTeamKeysAsync(oauthTokens.team || agent.teamId).asyncResult;
|
|
162
|
-
|
|
163
|
-
const oAuthConfig = JSON.parse(oAuthConfigString);
|
|
164
|
-
|
|
165
|
-
if (oAuthConfig.oauthService === 'OAuth2 Client Credentials') {
|
|
166
|
-
const accessToken = await getClientCredentialToken(data, logger, keyId, oauthTokens, config, agent);
|
|
167
|
-
headers['Authorization'] = `Bearer ${accessToken}`;
|
|
168
|
-
} else {
|
|
169
|
-
if (oauthTokens.type === 'oauth') {
|
|
170
|
-
// For OAuth1, generate and replace the signature in headers
|
|
171
|
-
const oauthHeader = buildOAuth1Header(
|
|
172
|
-
rootUrl,
|
|
173
|
-
reqConfig.method,
|
|
174
|
-
{
|
|
175
|
-
consumerKey: oAuthConfig.consumerKey,
|
|
176
|
-
consumerSecret: oAuthConfig.consumerSecret,
|
|
177
|
-
token: oauthTokens.primaryToken,
|
|
178
|
-
tokenSecret: oauthTokens.secondaryToken,
|
|
179
|
-
},
|
|
180
|
-
additionalParams,
|
|
181
|
-
);
|
|
182
|
-
|
|
183
|
-
headers = { ...reqConfig.headers, ...oauthHeader };
|
|
184
|
-
logger.debug('OAuth1 access token check success.');
|
|
185
|
-
} else if (oauthTokens.type === 'oauth2') {
|
|
186
|
-
// For OAuth2, add the 'Authorization' header with the bearer token
|
|
187
|
-
const accessTokenManager = new AccessTokenManager(
|
|
188
|
-
oAuthConfig.clientID,
|
|
189
|
-
oAuthConfig.clientSecret,
|
|
190
|
-
oauthTokens.secondaryToken,
|
|
191
|
-
oAuthConfig.tokenURL,
|
|
192
|
-
oauthTokens.expiresIn,
|
|
193
|
-
oauthTokens.primaryToken,
|
|
194
|
-
data,
|
|
195
|
-
keyId,
|
|
196
|
-
logger,
|
|
197
|
-
agent,
|
|
198
|
-
);
|
|
199
|
-
|
|
200
|
-
const accessToken = await accessTokenManager.getAccessToken();
|
|
201
|
-
headers['Authorization'] = `Bearer ${accessToken}`;
|
|
202
|
-
}
|
|
203
|
-
}
|
|
204
|
-
return headers;
|
|
205
|
-
} catch (error) {
|
|
206
|
-
logger.error(`Access token check failed: ${error}`);
|
|
207
|
-
throw error;
|
|
208
|
-
}
|
|
209
|
-
};
|
|
210
|
-
|
|
211
|
-
const getKeyIdsFromTemplateVars = (str: string): string[] => {
|
|
212
|
-
if (!str) return [];
|
|
213
|
-
|
|
214
|
-
const pattern = /{{KEY\((.*?)\)}}/g;
|
|
215
|
-
const keyIds: any = [];
|
|
216
|
-
let match: any = [];
|
|
217
|
-
|
|
218
|
-
while ((match = pattern.exec(str)) !== null) {
|
|
219
|
-
if (match?.length < 2) continue;
|
|
220
|
-
keyIds.push(match[1]);
|
|
221
|
-
}
|
|
222
|
-
|
|
223
|
-
return keyIds;
|
|
224
|
-
};
|
|
225
|
-
|
|
226
|
-
async function getClientCredentialToken(data, logger, keyId, oauthTokens, config, agent) {
|
|
227
|
-
const logAndThrowError = (message) => {
|
|
228
|
-
logger.debug(message);
|
|
229
|
-
throw new Error(message);
|
|
230
|
-
};
|
|
231
|
-
|
|
232
|
-
try {
|
|
233
|
-
data = data[keyId] || {};
|
|
234
|
-
const { clientID, clientSecret, tokenURL } = config.data;
|
|
235
|
-
const currentTime = new Date().getTime();
|
|
236
|
-
// Check for token expiration
|
|
237
|
-
if (!oauthTokens.expiresIn || currentTime >= Number(oauthTokens.expiresIn)) {
|
|
238
|
-
// Verify required parameters
|
|
239
|
-
if (!clientID || !clientSecret || !tokenURL) {
|
|
240
|
-
logAndThrowError('Missing client_id, client_secret OR token_url');
|
|
241
|
-
}
|
|
242
|
-
|
|
243
|
-
const params = new URLSearchParams({
|
|
244
|
-
grant_type: 'client_credentials',
|
|
245
|
-
client_id: clientID,
|
|
246
|
-
client_secret: clientSecret,
|
|
247
|
-
});
|
|
248
|
-
|
|
249
|
-
const response = await axios.post(tokenURL, params.toString(), {
|
|
250
|
-
headers: { 'Content-Type': 'application/x-www-form-urlencoded' },
|
|
251
|
-
});
|
|
252
|
-
|
|
253
|
-
console.log('Access token refreshed successfully.');
|
|
254
|
-
logger.debug('Access token refreshed successfully.');
|
|
255
|
-
|
|
256
|
-
const newAccessToken = response.data.access_token;
|
|
257
|
-
const expiresInMilliseconds = response.data.expires_in * 1000;
|
|
258
|
-
const expirationTimestamp = currentTime + expiresInMilliseconds;
|
|
259
|
-
|
|
260
|
-
// Set data if it's empty
|
|
261
|
-
if (Object.keys(data).length === 0) {
|
|
262
|
-
data = {
|
|
263
|
-
primary: '',
|
|
264
|
-
secondary: '',
|
|
265
|
-
type: 'oauth2',
|
|
266
|
-
tokenURL,
|
|
267
|
-
expires_in: '',
|
|
268
|
-
team: agent.teamId,
|
|
269
|
-
oauth_info: {
|
|
270
|
-
oauth_keys_prefix: `OAUTH_${config.componentId ?? config.id}`,
|
|
271
|
-
service: 'oauth2_client_credentials',
|
|
272
|
-
tokenURL,
|
|
273
|
-
clientID,
|
|
274
|
-
clientSecret,
|
|
275
|
-
},
|
|
276
|
-
};
|
|
277
|
-
}
|
|
278
|
-
|
|
279
|
-
data.primary = newAccessToken;
|
|
280
|
-
data.expires_in = expirationTimestamp.toString();
|
|
281
|
-
//const oauthTeamSettings = new OauthTeamSettings();
|
|
282
|
-
//const save = await oauthTeamSettings.update({ keyId: keyId, data: data });
|
|
283
|
-
await managedVault.user(AccessCandidate.agent(agent.id)).set(keyId, data);
|
|
284
|
-
|
|
285
|
-
return newAccessToken;
|
|
286
|
-
} else {
|
|
287
|
-
console.log('Access token value is still valid.');
|
|
288
|
-
logger.debug('Access token value is still valid.');
|
|
289
|
-
return oauthTokens.primaryToken;
|
|
290
|
-
}
|
|
291
|
-
} catch (error) {
|
|
292
|
-
logAndThrowError(`Failed to refresh access token: ${error}`);
|
|
293
|
-
}
|
|
294
|
-
}
|
|
1
|
+
// helper.ts
|
|
2
|
+
import crypto from 'crypto';
|
|
3
|
+
import OAuth from 'oauth-1.0a';
|
|
4
|
+
import AccessTokenManager from './AccessTokenManager';
|
|
5
|
+
import { REQUEST_CONTENT_TYPES } from '@sre/constants';
|
|
6
|
+
import axios, { AxiosRequestConfig } from 'axios';
|
|
7
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
8
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
9
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
10
|
+
import { TemplateString } from '@sre/helpers/TemplateString.helper';
|
|
11
|
+
import { SystemEvents } from '@sre/Core/SystemEvents';
|
|
12
|
+
|
|
13
|
+
const console = Logger('OAuth.helper');
|
|
14
|
+
let managedVault: any;
|
|
15
|
+
|
|
16
|
+
SystemEvents.on('SRE:Booted', () => {
|
|
17
|
+
try {
|
|
18
|
+
managedVault = ConnectorService.getManagedVaultConnector();
|
|
19
|
+
} catch (error) {
|
|
20
|
+
console.warn('Could not find a compatible ManagedVault connector, OAuth APICalls will not work');
|
|
21
|
+
}
|
|
22
|
+
});
|
|
23
|
+
|
|
24
|
+
export function extractAdditionalParamsForOAuth1(reqConfig: AxiosRequestConfig = {}) {
|
|
25
|
+
let additionalParams = {};
|
|
26
|
+
// Parse URL parameters using URL and URLSearchParams
|
|
27
|
+
const url = new URL(reqConfig.url);
|
|
28
|
+
const searchParams = url.searchParams;
|
|
29
|
+
additionalParams = Object.fromEntries(searchParams.entries());
|
|
30
|
+
|
|
31
|
+
// Check content type and add required parameters for OAuth 1 signature
|
|
32
|
+
const contentType = reqConfig.headers?.['Content-Type'] || '';
|
|
33
|
+
if (contentType === REQUEST_CONTENT_TYPES.urlEncodedFormData) {
|
|
34
|
+
// For form data, include the form parameters in the signature
|
|
35
|
+
if (typeof reqConfig.data === 'string') {
|
|
36
|
+
const formData = new URLSearchParams(reqConfig.data);
|
|
37
|
+
additionalParams = { ...additionalParams, ...Object.fromEntries(formData) };
|
|
38
|
+
}
|
|
39
|
+
} else if (contentType === REQUEST_CONTENT_TYPES.json) {
|
|
40
|
+
// For JSON data, include a hash of the request body
|
|
41
|
+
if (reqConfig.data) {
|
|
42
|
+
const hash = crypto.createHash('sha1').update(JSON.stringify(reqConfig.data)).digest('base64');
|
|
43
|
+
additionalParams['oauth_body_hash'] = hash;
|
|
44
|
+
}
|
|
45
|
+
} else if (contentType === REQUEST_CONTENT_TYPES.multipartFormData) {
|
|
46
|
+
const formData = reqConfig.data as FormData;
|
|
47
|
+
for (const [key, value] of formData.entries()) {
|
|
48
|
+
// Exclude binary form data (File, Blob, etc.)
|
|
49
|
+
if (typeof value === 'object' && value !== null && 'size' in value && 'type' in value) {
|
|
50
|
+
continue;
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
additionalParams[key] = value;
|
|
54
|
+
}
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
return additionalParams;
|
|
58
|
+
}
|
|
59
|
+
|
|
60
|
+
export const buildOAuth1Header = (url, method, oauth1Credentials, additionalParams = {}) => {
|
|
61
|
+
const oauth = new OAuth({
|
|
62
|
+
consumer: {
|
|
63
|
+
key: oauth1Credentials.consumerKey,
|
|
64
|
+
secret: oauth1Credentials.consumerSecret,
|
|
65
|
+
},
|
|
66
|
+
signature_method: 'HMAC-SHA1',
|
|
67
|
+
hash_function(base_string, key) {
|
|
68
|
+
return crypto.createHmac('sha1', key).update(base_string).digest('base64');
|
|
69
|
+
},
|
|
70
|
+
});
|
|
71
|
+
|
|
72
|
+
// Include additional parameters if necessary (e.g., for non-standard providers)
|
|
73
|
+
const requestData = {
|
|
74
|
+
url,
|
|
75
|
+
method,
|
|
76
|
+
...additionalParams,
|
|
77
|
+
};
|
|
78
|
+
const signedRequest = oauth.authorize(requestData, { key: oauth1Credentials.token, secret: oauth1Credentials.tokenSecret });
|
|
79
|
+
return oauth.toHeader(signedRequest);
|
|
80
|
+
};
|
|
81
|
+
|
|
82
|
+
export const retrieveOAuthTokens = async (agent, config) => {
|
|
83
|
+
let tokenKey: any = null;
|
|
84
|
+
try {
|
|
85
|
+
tokenKey = `OAUTH_${config.componentId ?? config.id}_TOKENS`;
|
|
86
|
+
|
|
87
|
+
try {
|
|
88
|
+
const result: any = await managedVault.user(AccessCandidate.agent(agent.id)).get(tokenKey);
|
|
89
|
+
const tokensData = typeof result === 'object' ? result : JSON.parse(result || '{}');
|
|
90
|
+
|
|
91
|
+
if (!tokensData) {
|
|
92
|
+
throw new Error('Failed to retrieve OAuth tokens from vault. Please authenticate ...');
|
|
93
|
+
}
|
|
94
|
+
|
|
95
|
+
const primaryToken = tokensData.primary; // accessToken or token
|
|
96
|
+
const secondaryToken = tokensData.secondary; // refreshToken or tokenSecret
|
|
97
|
+
const type = tokensData.type; // oauth || oauth2
|
|
98
|
+
|
|
99
|
+
// Add warning logs for OAuth2
|
|
100
|
+
if (type === 'oauth2' && config.data.oauthService !== 'OAuth2 Client Credentials') {
|
|
101
|
+
if (!secondaryToken) {
|
|
102
|
+
console.warn('Warning: refresh_token is missing for OAuth2');
|
|
103
|
+
}
|
|
104
|
+
if (!tokensData.expires_in) {
|
|
105
|
+
console.warn('Warning: expires_in is missing for OAuth2.');
|
|
106
|
+
}
|
|
107
|
+
}
|
|
108
|
+
|
|
109
|
+
// sometimes refreshToken is not available . e.g in case of linkedIn. so only add check for primary token
|
|
110
|
+
if (config.data.oauthService !== 'OAuth2 Client Credentials') {
|
|
111
|
+
if (!primaryToken) {
|
|
112
|
+
throw new Error('Retrieved OAuth tokens do not exist, invalid OR incomplete. Please authenticate ...');
|
|
113
|
+
}
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
const responseData: any = {
|
|
117
|
+
primaryToken,
|
|
118
|
+
secondaryToken,
|
|
119
|
+
type,
|
|
120
|
+
};
|
|
121
|
+
|
|
122
|
+
if (type === 'oauth') {
|
|
123
|
+
// Check and assign if present
|
|
124
|
+
if ('consumerKey' in tokensData) responseData.consumerKey = tokensData.consumerKey;
|
|
125
|
+
if ('consumerSecret' in tokensData) responseData.consumerSecret = tokensData.consumerSecret;
|
|
126
|
+
responseData.team = tokensData.team;
|
|
127
|
+
} else if (type === 'oauth2') {
|
|
128
|
+
// Check and assign if present
|
|
129
|
+
responseData.tokenURL = tokensData.tokenURL;
|
|
130
|
+
if ('clientID' in tokensData) responseData.clientID = tokensData.clientID;
|
|
131
|
+
if ('clientSecret' in tokensData) responseData.clientSecret = tokensData.clientSecret;
|
|
132
|
+
responseData.expiresIn = tokensData.expires_in ?? 0; // Optional property, default to 0 if not present. time to expire access token
|
|
133
|
+
responseData.team = tokensData.team;
|
|
134
|
+
}
|
|
135
|
+
|
|
136
|
+
return { responseData, data: tokensData, keyId: tokenKey };
|
|
137
|
+
} catch (error) {
|
|
138
|
+
throw new Error(`Failed to parse retrieved tokens: ${error}`);
|
|
139
|
+
}
|
|
140
|
+
} catch (error) {
|
|
141
|
+
console.error('Error retrieving OAuth tokens:', error);
|
|
142
|
+
throw error; // rethrow for potential handling by the calling code
|
|
143
|
+
}
|
|
144
|
+
};
|
|
145
|
+
|
|
146
|
+
export const handleOAuthHeaders = async (agent, config, reqConfig, logger, additionalParams = {}, rootUrl) => {
|
|
147
|
+
let headers = {}; // Initialize headers as an empty object
|
|
148
|
+
const { responseData: oauthTokens, data, keyId } = await retrieveOAuthTokens(agent, config);
|
|
149
|
+
|
|
150
|
+
try {
|
|
151
|
+
// Extract template variable key IDs for consumerKey, consumerSecret, clientID, and clientSecret
|
|
152
|
+
const keys = ['consumerKey', 'consumerSecret', 'clientID', 'clientSecret'];
|
|
153
|
+
let oAuthConfigString = JSON.stringify({
|
|
154
|
+
consumerKey: config.data.consumerKey,
|
|
155
|
+
consumerSecret: config.data.consumerSecret,
|
|
156
|
+
clientID: config.data.clientID,
|
|
157
|
+
clientSecret: config.data.clientSecret,
|
|
158
|
+
tokenURL: config.data.tokenURL,
|
|
159
|
+
});
|
|
160
|
+
|
|
161
|
+
oAuthConfigString = await TemplateString(oAuthConfigString).parseTeamKeysAsync(oauthTokens.team || agent.teamId).asyncResult;
|
|
162
|
+
|
|
163
|
+
const oAuthConfig = JSON.parse(oAuthConfigString);
|
|
164
|
+
|
|
165
|
+
if (oAuthConfig.oauthService === 'OAuth2 Client Credentials') {
|
|
166
|
+
const accessToken = await getClientCredentialToken(data, logger, keyId, oauthTokens, config, agent);
|
|
167
|
+
headers['Authorization'] = `Bearer ${accessToken}`;
|
|
168
|
+
} else {
|
|
169
|
+
if (oauthTokens.type === 'oauth') {
|
|
170
|
+
// For OAuth1, generate and replace the signature in headers
|
|
171
|
+
const oauthHeader = buildOAuth1Header(
|
|
172
|
+
rootUrl,
|
|
173
|
+
reqConfig.method,
|
|
174
|
+
{
|
|
175
|
+
consumerKey: oAuthConfig.consumerKey,
|
|
176
|
+
consumerSecret: oAuthConfig.consumerSecret,
|
|
177
|
+
token: oauthTokens.primaryToken,
|
|
178
|
+
tokenSecret: oauthTokens.secondaryToken,
|
|
179
|
+
},
|
|
180
|
+
additionalParams,
|
|
181
|
+
);
|
|
182
|
+
|
|
183
|
+
headers = { ...reqConfig.headers, ...oauthHeader };
|
|
184
|
+
logger.debug('OAuth1 access token check success.');
|
|
185
|
+
} else if (oauthTokens.type === 'oauth2') {
|
|
186
|
+
// For OAuth2, add the 'Authorization' header with the bearer token
|
|
187
|
+
const accessTokenManager = new AccessTokenManager(
|
|
188
|
+
oAuthConfig.clientID,
|
|
189
|
+
oAuthConfig.clientSecret,
|
|
190
|
+
oauthTokens.secondaryToken,
|
|
191
|
+
oAuthConfig.tokenURL,
|
|
192
|
+
oauthTokens.expiresIn,
|
|
193
|
+
oauthTokens.primaryToken,
|
|
194
|
+
data,
|
|
195
|
+
keyId,
|
|
196
|
+
logger,
|
|
197
|
+
agent,
|
|
198
|
+
);
|
|
199
|
+
|
|
200
|
+
const accessToken = await accessTokenManager.getAccessToken();
|
|
201
|
+
headers['Authorization'] = `Bearer ${accessToken}`;
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
return headers;
|
|
205
|
+
} catch (error) {
|
|
206
|
+
logger.error(`Access token check failed: ${error}`);
|
|
207
|
+
throw error;
|
|
208
|
+
}
|
|
209
|
+
};
|
|
210
|
+
|
|
211
|
+
const getKeyIdsFromTemplateVars = (str: string): string[] => {
|
|
212
|
+
if (!str) return [];
|
|
213
|
+
|
|
214
|
+
const pattern = /{{KEY\((.*?)\)}}/g;
|
|
215
|
+
const keyIds: any = [];
|
|
216
|
+
let match: any = [];
|
|
217
|
+
|
|
218
|
+
while ((match = pattern.exec(str)) !== null) {
|
|
219
|
+
if (match?.length < 2) continue;
|
|
220
|
+
keyIds.push(match[1]);
|
|
221
|
+
}
|
|
222
|
+
|
|
223
|
+
return keyIds;
|
|
224
|
+
};
|
|
225
|
+
|
|
226
|
+
async function getClientCredentialToken(data, logger, keyId, oauthTokens, config, agent) {
|
|
227
|
+
const logAndThrowError = (message) => {
|
|
228
|
+
logger.debug(message);
|
|
229
|
+
throw new Error(message);
|
|
230
|
+
};
|
|
231
|
+
|
|
232
|
+
try {
|
|
233
|
+
data = data[keyId] || {};
|
|
234
|
+
const { clientID, clientSecret, tokenURL } = config.data;
|
|
235
|
+
const currentTime = new Date().getTime();
|
|
236
|
+
// Check for token expiration
|
|
237
|
+
if (!oauthTokens.expiresIn || currentTime >= Number(oauthTokens.expiresIn)) {
|
|
238
|
+
// Verify required parameters
|
|
239
|
+
if (!clientID || !clientSecret || !tokenURL) {
|
|
240
|
+
logAndThrowError('Missing client_id, client_secret OR token_url');
|
|
241
|
+
}
|
|
242
|
+
|
|
243
|
+
const params = new URLSearchParams({
|
|
244
|
+
grant_type: 'client_credentials',
|
|
245
|
+
client_id: clientID,
|
|
246
|
+
client_secret: clientSecret,
|
|
247
|
+
});
|
|
248
|
+
|
|
249
|
+
const response = await axios.post(tokenURL, params.toString(), {
|
|
250
|
+
headers: { 'Content-Type': 'application/x-www-form-urlencoded' },
|
|
251
|
+
});
|
|
252
|
+
|
|
253
|
+
console.log('Access token refreshed successfully.');
|
|
254
|
+
logger.debug('Access token refreshed successfully.');
|
|
255
|
+
|
|
256
|
+
const newAccessToken = response.data.access_token;
|
|
257
|
+
const expiresInMilliseconds = response.data.expires_in * 1000;
|
|
258
|
+
const expirationTimestamp = currentTime + expiresInMilliseconds;
|
|
259
|
+
|
|
260
|
+
// Set data if it's empty
|
|
261
|
+
if (Object.keys(data).length === 0) {
|
|
262
|
+
data = {
|
|
263
|
+
primary: '',
|
|
264
|
+
secondary: '',
|
|
265
|
+
type: 'oauth2',
|
|
266
|
+
tokenURL,
|
|
267
|
+
expires_in: '',
|
|
268
|
+
team: agent.teamId,
|
|
269
|
+
oauth_info: {
|
|
270
|
+
oauth_keys_prefix: `OAUTH_${config.componentId ?? config.id}`,
|
|
271
|
+
service: 'oauth2_client_credentials',
|
|
272
|
+
tokenURL,
|
|
273
|
+
clientID,
|
|
274
|
+
clientSecret,
|
|
275
|
+
},
|
|
276
|
+
};
|
|
277
|
+
}
|
|
278
|
+
|
|
279
|
+
data.primary = newAccessToken;
|
|
280
|
+
data.expires_in = expirationTimestamp.toString();
|
|
281
|
+
//const oauthTeamSettings = new OauthTeamSettings();
|
|
282
|
+
//const save = await oauthTeamSettings.update({ keyId: keyId, data: data });
|
|
283
|
+
await managedVault.user(AccessCandidate.agent(agent.id)).set(keyId, data);
|
|
284
|
+
|
|
285
|
+
return newAccessToken;
|
|
286
|
+
} else {
|
|
287
|
+
console.log('Access token value is still valid.');
|
|
288
|
+
logger.debug('Access token value is still valid.');
|
|
289
|
+
return oauthTokens.primaryToken;
|
|
290
|
+
}
|
|
291
|
+
} catch (error) {
|
|
292
|
+
logAndThrowError(`Failed to refresh access token: ${error}`);
|
|
293
|
+
}
|
|
294
|
+
}
|