@smythos/sre 1.5.50 → 1.5.52

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (225) hide show
  1. package/CHANGELOG +98 -98
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/index.js +3 -3
  5. package/dist/index.js.map +1 -1
  6. package/dist/types/Components/APICall/AccessTokenManager.d.ts +3 -2
  7. package/dist/types/Components/APICall/OAuth.helper.d.ts +3 -2
  8. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +6 -1
  9. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +39 -0
  10. package/package.json +1 -1
  11. package/src/Components/APICall/APICall.class.ts +156 -156
  12. package/src/Components/APICall/AccessTokenManager.ts +166 -130
  13. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  14. package/src/Components/APICall/OAuth.helper.ts +446 -294
  15. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  16. package/src/Components/APICall/parseData.ts +167 -167
  17. package/src/Components/APICall/parseHeaders.ts +41 -41
  18. package/src/Components/APICall/parseProxy.ts +68 -68
  19. package/src/Components/APICall/parseUrl.ts +91 -91
  20. package/src/Components/APIEndpoint.class.ts +234 -234
  21. package/src/Components/APIOutput.class.ts +58 -58
  22. package/src/Components/AgentPlugin.class.ts +102 -102
  23. package/src/Components/Async.class.ts +155 -155
  24. package/src/Components/Await.class.ts +90 -90
  25. package/src/Components/Classifier.class.ts +158 -158
  26. package/src/Components/Component.class.ts +132 -132
  27. package/src/Components/ComponentHost.class.ts +38 -38
  28. package/src/Components/DataSourceCleaner.class.ts +92 -92
  29. package/src/Components/DataSourceIndexer.class.ts +181 -181
  30. package/src/Components/DataSourceLookup.class.ts +161 -161
  31. package/src/Components/ECMASandbox.class.ts +71 -71
  32. package/src/Components/FEncDec.class.ts +29 -29
  33. package/src/Components/FHash.class.ts +33 -33
  34. package/src/Components/FSign.class.ts +80 -80
  35. package/src/Components/FSleep.class.ts +25 -25
  36. package/src/Components/FTimestamp.class.ts +25 -25
  37. package/src/Components/FileStore.class.ts +78 -78
  38. package/src/Components/ForEach.class.ts +97 -97
  39. package/src/Components/GPTPlugin.class.ts +70 -70
  40. package/src/Components/GenAILLM.class.ts +586 -586
  41. package/src/Components/HuggingFace.class.ts +314 -314
  42. package/src/Components/Image/imageSettings.config.ts +70 -70
  43. package/src/Components/ImageGenerator.class.ts +502 -502
  44. package/src/Components/JSONFilter.class.ts +54 -54
  45. package/src/Components/LLMAssistant.class.ts +213 -213
  46. package/src/Components/LogicAND.class.ts +28 -28
  47. package/src/Components/LogicAtLeast.class.ts +85 -85
  48. package/src/Components/LogicAtMost.class.ts +86 -86
  49. package/src/Components/LogicOR.class.ts +29 -29
  50. package/src/Components/LogicXOR.class.ts +34 -34
  51. package/src/Components/MCPClient.class.ts +138 -138
  52. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  53. package/src/Components/MemoryReadKeyVal.class.ts +66 -66
  54. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  55. package/src/Components/MemoryWriteObject.class.ts +97 -97
  56. package/src/Components/MultimodalLLM.class.ts +128 -128
  57. package/src/Components/OpenAPI.class.ts +72 -72
  58. package/src/Components/PromptGenerator.class.ts +122 -122
  59. package/src/Components/ScrapflyWebScrape.class.ts +159 -159
  60. package/src/Components/ServerlessCode.class.ts +123 -123
  61. package/src/Components/TavilyWebSearch.class.ts +98 -98
  62. package/src/Components/VisionLLM.class.ts +104 -104
  63. package/src/Components/ZapierAction.class.ts +127 -127
  64. package/src/Components/index.ts +97 -97
  65. package/src/Core/AgentProcess.helper.ts +240 -240
  66. package/src/Core/Connector.class.ts +123 -123
  67. package/src/Core/ConnectorsService.ts +197 -197
  68. package/src/Core/DummyConnector.ts +49 -49
  69. package/src/Core/HookService.ts +105 -105
  70. package/src/Core/SmythRuntime.class.ts +235 -235
  71. package/src/Core/SystemEvents.ts +16 -16
  72. package/src/Core/boot.ts +56 -56
  73. package/src/config.ts +15 -15
  74. package/src/constants.ts +126 -126
  75. package/src/data/hugging-face.params.json +579 -579
  76. package/src/helpers/AWSLambdaCode.helper.ts +590 -587
  77. package/src/helpers/BinaryInput.helper.ts +331 -331
  78. package/src/helpers/Conversation.helper.ts +1119 -1119
  79. package/src/helpers/ECMASandbox.helper.ts +54 -54
  80. package/src/helpers/JsonContent.helper.ts +97 -97
  81. package/src/helpers/LocalCache.helper.ts +97 -97
  82. package/src/helpers/Log.helper.ts +274 -274
  83. package/src/helpers/OpenApiParser.helper.ts +150 -150
  84. package/src/helpers/S3Cache.helper.ts +147 -147
  85. package/src/helpers/SmythURI.helper.ts +5 -5
  86. package/src/helpers/Sysconfig.helper.ts +77 -77
  87. package/src/helpers/TemplateString.helper.ts +243 -243
  88. package/src/helpers/TypeChecker.helper.ts +329 -329
  89. package/src/index.ts +3 -3
  90. package/src/index.ts.bak +3 -3
  91. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  92. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  93. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  94. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  95. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
  96. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  97. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  98. package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
  99. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  100. package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
  101. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  102. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  103. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  104. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  105. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  106. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  107. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  108. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  109. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  110. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
  111. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  112. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  113. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  114. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  115. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  116. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  117. package/src/subsystems/IO/Log.service/index.ts +13 -13
  118. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  119. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  120. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  121. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  122. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  123. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  124. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  125. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  126. package/src/subsystems/IO/Router.service/index.ts +11 -11
  127. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
  128. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  129. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  130. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  131. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  132. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  133. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
  134. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
  135. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
  136. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  137. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  138. package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
  139. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  140. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  141. package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
  142. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
  143. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  144. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
  145. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
  146. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
  147. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
  148. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
  149. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
  150. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
  151. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
  152. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
  153. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  154. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  155. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
  156. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
  157. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  158. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
  160. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
  161. package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
  162. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
  163. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
  164. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  165. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  166. package/src/subsystems/LLMManager/models.ts +2540 -2540
  167. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  168. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  169. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  170. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
  171. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  172. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  173. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  174. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  175. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  176. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  177. package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
  178. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  179. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  180. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  181. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  182. package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
  183. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  184. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
  185. package/src/subsystems/Security/Account.service/index.ts +14 -14
  186. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  187. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  188. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  189. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  190. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  191. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  192. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  193. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  194. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  195. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  196. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  197. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  198. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  199. package/src/types/ACL.types.ts +104 -104
  200. package/src/types/AWS.types.ts +10 -10
  201. package/src/types/Agent.types.ts +61 -61
  202. package/src/types/AgentLogger.types.ts +17 -17
  203. package/src/types/Cache.types.ts +1 -1
  204. package/src/types/Common.types.ts +2 -2
  205. package/src/types/LLM.types.ts +496 -496
  206. package/src/types/Redis.types.ts +8 -8
  207. package/src/types/SRE.types.ts +64 -64
  208. package/src/types/Security.types.ts +14 -14
  209. package/src/types/Storage.types.ts +5 -5
  210. package/src/types/VectorDB.types.ts +86 -86
  211. package/src/utils/base64.utils.ts +275 -275
  212. package/src/utils/cli.utils.ts +68 -68
  213. package/src/utils/data.utils.ts +322 -322
  214. package/src/utils/date-time.utils.ts +22 -22
  215. package/src/utils/general.utils.ts +238 -238
  216. package/src/utils/index.ts +12 -12
  217. package/src/utils/lazy-client.ts +261 -261
  218. package/src/utils/numbers.utils.ts +13 -13
  219. package/src/utils/oauth.utils.ts +35 -35
  220. package/src/utils/string.utils.ts +414 -414
  221. package/src/utils/url.utils.ts +19 -19
  222. package/src/utils/validation.utils.ts +74 -74
  223. package/dist/bundle-analysis-lazy.html +0 -4949
  224. package/dist/bundle-analysis.html +0 -4949
  225. package/dist/types/utils/package-manager.utils.d.ts +0 -26
package/dist/index.js CHANGED
@@ -1,4 +1,4 @@
1
- import dotenv from"dotenv";import Joi from"joi";import"dotenv/config";import winston from"winston";import Transport from"winston-transport";import pLimit from"p-limit";import axios,{AxiosHeaders}from"axios";import*as fs from"fs";import fs__default,{existsSync,mkdirSync,writeFileSync,readFileSync,unlinkSync}from"fs";import*as FileType from"file-type";import{fileTypeFromBuffer}from"file-type";import{isBinaryFileSync}from"isbinaryfile";import EventEmitter$1,{EventEmitter}from"events";import crypto$1,{createHash,randomUUID}from"crypto";import{encode,encodeChat}from"gpt-tokenizer";import path from"path";import os from"os";import"process";import mime from"mime";import{Readable}from"stream";import xxhash from"xxhashjs";import{jsonrepair}from"jsonrepair";import yaml from"js-yaml";import{EventSource}from"eventsource";import*as acorn from"acorn";import dayjs from"dayjs";import querystring from"querystring";import{HfInference}from"@huggingface/inference";import{Runware}from"@runware/sdk-js";import FormData from"form-data";import{SocksProxyAgent}from"socks-proxy-agent";import OAuth from"oauth-1.0a";import zl from"zip-lib";import{LambdaClient,GetFunctionCommand,UpdateFunctionCodeCommand,Runtime,CreateFunctionCommand,InvokeCommand,UpdateFunctionConfigurationCommand}from"@aws-sdk/client-lambda";import{IAMClient,GetRoleCommand,CreateRoleCommand}from"@aws-sdk/client-iam";import{Client}from"@modelcontextprotocol/sdk/client/index.js";import{SSEClientTransport}from"@modelcontextprotocol/sdk/client/sse.js";import{StreamableHTTPClientTransport}from"@modelcontextprotocol/sdk/client/streamableHttp.js";import{GetBucketLifecycleConfigurationCommand,PutBucketLifecycleConfigurationCommand,S3Client,HeadObjectCommand,DeleteObjectCommand,GetObjectCommand,PutObjectCommand,PutObjectTaggingCommand,GetObjectTaggingCommand,CopyObjectCommand}from"@aws-sdk/client-s3";import"ses";import imageSize from"image-size";import{execSync}from"child_process";import{Pinecone}from"@pinecone-database/pinecone";import OpenAI,{toFile,OpenAI as OpenAI$1}from"openai";import{MilvusClient,DataType,ErrorCode}from"@zilliz/milvus2-sdk-node";import{GoogleGenerativeAI,FunctionCallingMode}from"@google/generative-ai";import{GoogleAIFileManager,FileState}from"@google/generative-ai/server";import{GoogleGenAI}from"@google/genai";import Anthropic from"@anthropic-ai/sdk";import Groq from"groq-sdk";import{BedrockRuntimeClient,ConverseCommand,ConverseStreamCommand}from"@aws-sdk/client-bedrock-runtime";import{VertexAI}from"@google-cloud/vertexai";import*as chokidar from"chokidar";import chokidar__default from"chokidar";import fs$1 from"fs/promises";import IORedis from"ioredis";import mysql from"mysql2/promise";import{SecretsManagerClient,ListSecretsCommand,GetSecretValueCommand,PutSecretValueCommand,CreateSecretCommand,DeleteSecretCommand}from"@aws-sdk/client-secrets-manager";import*as readlineSync from"readline-sync";var version="1.5.50";dotenv.config();const config={env:{LOG_LEVEL:process.env.LOG_LEVEL||"none",LOG_FILTER:process.env.LOG_FILTER||"",NODE_ENV:process.env?.NODE_ENV}},REQUEST_METHODS=["GET","POST","PUT","PATCH","DELETE","HEAD","OPTIONS"],REQUEST_CONTENT_TYPES={none:"none",urlEncodedFormData:"application/x-www-form-urlencoded",multipartFormData:"multipart/form-data",json:"application/json",text:"text/plain",xml:"application/xml",binary:"binary"};var EMBODIMENT_TYPES=(EMBODIMENT_TYPES2=>(EMBODIMENT_TYPES2.ChatBot="chatBot",EMBODIMENT_TYPES2.ChatGPT="chatGPT",EMBODIMENT_TYPES2))(EMBODIMENT_TYPES||{});const ERR_MSG_INVALID_IMAGE_SOURCE="Please provide a valid Image Source. Supported image sources are: HTTP(S) URL, Base64 string, Data URL, Output Image from other component(s).",ERR_MSG_INVALID_BINARY="Please provide a valid data that is either a Blob, SmythFileObject (Binary Output from any Component), ArrayBuffer, Buffer, Base64 string, Data URL, or HTTP(s) URL",ERR_MSG_MAX_DEPTH="The maximum depth has been exceeded for the provided array or object.",ERR_MSG_MAX_ARRAY_SIZE="The maximum array size has been exceeded for the provided array.",ERR_MSG_MAX_OBJECT_SIZE="The maximum object size has been exceeded for the provided object.",MAX_DEPTH=10,MAX_OBJECT_SIZE=1e3,MAX_ARRAY_SIZE=1e3,MAX_FILE_SIZE=10*1024*1024,MAX_FILE_COUNT=10,DEFAULT_MAX_TOKENS_FOR_LLM=2048,S3_DAILY_PURGE_LIFECYCLE_TAG="ExpirationPolicy=DeleteDaily",S3_WEEKLY_PURGE_LIFECYCLE_TAG="ExpirationPolicy=DeleteWeekly",S3_MONTHLY_PURGE_LIFECYCLE_TAG="ExpirationPolicy=DeleteMonthly",TOOL_USE_DEFAULT_MODEL="gpt-4o-mini",COMP_NAMES={apiCall:"APICall",code:"Code",llmPrompt:"PromptGenerator",visionLLM:"VisionLLM"},JSON_RESPONSE_INSTRUCTION=`
1
+ import dotenv from"dotenv";import Joi from"joi";import"dotenv/config";import winston from"winston";import Transport from"winston-transport";import pLimit from"p-limit";import axios,{AxiosHeaders}from"axios";import*as fs from"fs";import fs__default,{existsSync,mkdirSync,writeFileSync,readFileSync,unlinkSync}from"fs";import*as FileType from"file-type";import{fileTypeFromBuffer}from"file-type";import{isBinaryFileSync}from"isbinaryfile";import EventEmitter$1,{EventEmitter}from"events";import crypto$1,{createHash,randomUUID}from"crypto";import{encode,encodeChat}from"gpt-tokenizer";import path from"path";import os from"os";import"process";import mime from"mime";import{Readable}from"stream";import xxhash from"xxhashjs";import{jsonrepair}from"jsonrepair";import yaml from"js-yaml";import{EventSource}from"eventsource";import*as acorn from"acorn";import dayjs from"dayjs";import querystring from"querystring";import{HfInference}from"@huggingface/inference";import{Runware}from"@runware/sdk-js";import FormData from"form-data";import{SocksProxyAgent}from"socks-proxy-agent";import OAuth from"oauth-1.0a";import zl from"zip-lib";import{LambdaClient,GetFunctionCommand,UpdateFunctionCodeCommand,Runtime,CreateFunctionCommand,InvokeCommand,UpdateFunctionConfigurationCommand}from"@aws-sdk/client-lambda";import{IAMClient,GetRoleCommand,CreateRoleCommand}from"@aws-sdk/client-iam";import{Client}from"@modelcontextprotocol/sdk/client/index.js";import{SSEClientTransport}from"@modelcontextprotocol/sdk/client/sse.js";import{StreamableHTTPClientTransport}from"@modelcontextprotocol/sdk/client/streamableHttp.js";import{GetBucketLifecycleConfigurationCommand,PutBucketLifecycleConfigurationCommand,S3Client,HeadObjectCommand,DeleteObjectCommand,GetObjectCommand,PutObjectCommand,PutObjectTaggingCommand,GetObjectTaggingCommand,CopyObjectCommand}from"@aws-sdk/client-s3";import"ses";import imageSize from"image-size";import{execSync}from"child_process";import{Pinecone}from"@pinecone-database/pinecone";import OpenAI,{toFile,OpenAI as OpenAI$1}from"openai";import{MilvusClient,DataType,ErrorCode}from"@zilliz/milvus2-sdk-node";import{GoogleGenerativeAI,FunctionCallingMode}from"@google/generative-ai";import{GoogleAIFileManager,FileState}from"@google/generative-ai/server";import{GoogleGenAI}from"@google/genai";import Anthropic from"@anthropic-ai/sdk";import Groq from"groq-sdk";import{BedrockRuntimeClient,ConverseCommand,ConverseStreamCommand}from"@aws-sdk/client-bedrock-runtime";import{VertexAI}from"@google-cloud/vertexai";import*as chokidar from"chokidar";import chokidar__default from"chokidar";import fs$1 from"fs/promises";import IORedis from"ioredis";import mysql from"mysql2/promise";import{SecretsManagerClient,ListSecretsCommand,GetSecretValueCommand,PutSecretValueCommand,CreateSecretCommand,DeleteSecretCommand}from"@aws-sdk/client-secrets-manager";import*as readlineSync from"readline-sync";var version="1.5.52";dotenv.config();const config={env:{LOG_LEVEL:process.env.LOG_LEVEL||"none",LOG_FILTER:process.env.LOG_FILTER||"",NODE_ENV:process.env?.NODE_ENV}},REQUEST_METHODS=["GET","POST","PUT","PATCH","DELETE","HEAD","OPTIONS"],REQUEST_CONTENT_TYPES={none:"none",urlEncodedFormData:"application/x-www-form-urlencoded",multipartFormData:"multipart/form-data",json:"application/json",text:"text/plain",xml:"application/xml",binary:"binary"};var EMBODIMENT_TYPES=(EMBODIMENT_TYPES2=>(EMBODIMENT_TYPES2.ChatBot="chatBot",EMBODIMENT_TYPES2.ChatGPT="chatGPT",EMBODIMENT_TYPES2))(EMBODIMENT_TYPES||{});const ERR_MSG_INVALID_IMAGE_SOURCE="Please provide a valid Image Source. Supported image sources are: HTTP(S) URL, Base64 string, Data URL, Output Image from other component(s).",ERR_MSG_INVALID_BINARY="Please provide a valid data that is either a Blob, SmythFileObject (Binary Output from any Component), ArrayBuffer, Buffer, Base64 string, Data URL, or HTTP(s) URL",ERR_MSG_MAX_DEPTH="The maximum depth has been exceeded for the provided array or object.",ERR_MSG_MAX_ARRAY_SIZE="The maximum array size has been exceeded for the provided array.",ERR_MSG_MAX_OBJECT_SIZE="The maximum object size has been exceeded for the provided object.",MAX_DEPTH=10,MAX_OBJECT_SIZE=1e3,MAX_ARRAY_SIZE=1e3,MAX_FILE_SIZE=10*1024*1024,MAX_FILE_COUNT=10,DEFAULT_MAX_TOKENS_FOR_LLM=2048,S3_DAILY_PURGE_LIFECYCLE_TAG="ExpirationPolicy=DeleteDaily",S3_WEEKLY_PURGE_LIFECYCLE_TAG="ExpirationPolicy=DeleteWeekly",S3_MONTHLY_PURGE_LIFECYCLE_TAG="ExpirationPolicy=DeleteMonthly",TOOL_USE_DEFAULT_MODEL="gpt-4o-mini",COMP_NAMES={apiCall:"APICall",code:"Code",llmPrompt:"PromptGenerator",visionLLM:"VisionLLM"},JSON_RESPONSE_INSTRUCTION=`
2
2
  Respond ONLY with a valid, parsable JSON object. Follow these strict guidelines:
3
3
  1. The response must begin with '{' and end with '}'.
4
4
  2. Use double quotes for all keys and string values.
@@ -110,7 +110,7 @@ ${error?.message||JSON.stringify(error)}`,_debug:logger2.output}}}}const imageGe
110
110
  ${revised_prompt}`),imageGenerator.reportUsage({cost},{modelEntryName:model,keySource:APIKeySource.Smyth,agentId:agent.id,teamId:agent.teamId}),{output}},runware:async({model,prompt,config:config2,agent,input})=>{const teamId=agent.teamId,apiKey=await getCredentials(AccessCandidate.team(teamId),"runware");if(!apiKey)throw new Error("Runware API key is missing. Please provide a valid key to continue.");const runware=new Runware({apiKey});await runware.ensureConnection();const negativePrompt=config2?.data?.negativePrompt||"",files=parseFiles(input,config2);let seedImage=Array.isArray(files)?files[0]:files;seedImage=await normalizeImageInput(seedImage);const imageRequestArgs={model:await agent.modelsProvider.getModelId(model),positivePrompt:prompt,width:+config2?.data?.width||1024,height:+config2?.data?.height||1024,numberResults:1,outputType:"URL",outputFormat:config2?.data?.outputFormat||"JPEG",includeCost:!0};seedImage&&(imageRequestArgs.seedImage=seedImage,imageRequestArgs.strength=+config2?.data?.strength||.5),negativePrompt&&(imageRequestArgs.negativePrompt=negativePrompt);try{const firstImage=(await runware.requestImages(imageRequestArgs))[0];let output=firstImage.imageURL;return imageGenerator.reportUsage({cost:firstImage.cost},{modelEntryName:model,keySource:APIKeySource.Smyth,agentId:agent.id,teamId:agent.teamId}),{output}}catch(error){throw new Error(`Runware Image Generation Error: ${error?.message||JSON.stringify(error)}`)}finally{await runware.disconnect()}},imagen:async({model,prompt,config:config2,logger:logger2,agent,input})=>{try{const llmInference=await LLMInference$1.getInstance(model,AccessCandidate.agent(agent.id));if(!llmInference.connector)return{_error:`The model '${model}' is not available. Please try a different one.`,_debug:logger2.output};if(parseFiles(input,config2).length>0)throw new Error("Google AI Image Generation Error: Image editing is not supported. Imagen models only support image generation.");let args={model,aspectRatio:config2?.data?.aspectRatio||config2?.data?.size||"1:1",numberOfImages:config2?.data?.numberOfImages||1,personGeneration:config2?.data?.personGeneration||"allow_adult"};const response=await llmInference.imageGenRequest({query:prompt,params:{...args,agentId:agent.id}}),modelName=model.replace(BUILT_IN_MODEL_PREFIX,""),cost=IMAGEN_4_COST_MAP[modelName];if(cost&&cost>0){const numberOfImages=args.numberOfImages||1,totalCost=cost*numberOfImages;imageGenerator.reportUsage({cost:totalCost},{modelEntryName:model,keySource:model.startsWith(BUILT_IN_MODEL_PREFIX)?APIKeySource.Smyth:APIKeySource.User,agentId:agent.id,teamId:agent.teamId})}let output=response?.data?.[0]?.b64_json;if(output){const binaryInput=BinaryInput.from(output),agentId=typeof agent=="object"&&agent.id?agent.id:agent;return{output:await binaryInput.getJsonData(AccessCandidate.agent(agentId))}}else return output=response?.data?.[0]?.url,{output}}catch(error){throw new Error(`Google AI Image Generation Error: ${error?.message||JSON.stringify(error)}`)}},reportTokenUsage(usage,metadata){const usageData={sourceId:`api:imagegen.${metadata.modelEntryName.replace(BUILT_IN_MODEL_PREFIX,"")}`,keySource:metadata.keySource,input_tokens_txt:usage?.input_tokens_details?.text_tokens||0,input_tokens_img:usage?.input_tokens_details?.image_tokens||0,output_tokens:usage?.output_tokens,input_tokens_cache_read:usage?.prompt_tokens_details?.cached_tokens||0,agentId:metadata.agentId,teamId:metadata.teamId};return SystemEvents.emit("USAGE:API",usageData),usageData},reportUsage(usage,metadata){const usageData={sourceId:"api:imagegen.smyth",keySource:metadata.keySource,cost:usage?.cost,agentId:metadata.agentId,teamId:metadata.teamId};return SystemEvents.emit("USAGE:API",usageData),usageData},isValidImageFile(provider,mimetype){return SUPPORTED_MIME_TYPES_MAP[provider]?.imageGen?.includes(mimetype)}};async function getModelFamily(model,agent){return await isGPTModel(model)?"gpt":await isRunwareModel(model,agent)?"runware":await isDallEModel(model)?"dall-e":await isGoogleAIModel(model,agent)?"imagen":null}function isGPTModel(model){return model?.replace(BUILT_IN_MODEL_PREFIX,"")?.startsWith("gpt")}async function isRunwareModel(model,agent){const provider=await agent.modelsProvider.getProvider(model);return provider==="Runware"||provider?.toLowerCase()==="Runware".toLowerCase()}function isDallEModel(model){return model?.replace(BUILT_IN_MODEL_PREFIX,"")?.startsWith("dall-e")}async function isGoogleAIModel(model,agent){const provider=await agent.modelsProvider.getProvider(model);return provider==="GoogleAI"||provider?.toLowerCase()==="GoogleAI".toLowerCase()||model?.replace(BUILT_IN_MODEL_PREFIX,"")?.includes("imagen")}function parseFiles(input,config2){const mediaTypes=["Image","Audio","Video","Binary"];return config2.inputs?.filter(_input=>mediaTypes.includes(_input.type))?.flatMap(_input=>{const value=input[_input.name];return Array.isArray(value)?value.map(item=>TemplateString(item).parseRaw(input).result):TemplateString(value).parseRaw(input).result})?.filter(file=>file)||[]}var __defProp$16=Object.defineProperty,__defNormalProp$16=(obj,key,value)=>key in obj?__defProp$16(obj,key,{enumerable:!0,configurable:!0,writable:!0,value}):obj[key]=value,__publicField$16=(obj,key,value)=>__defNormalProp$16(obj,key+"",value);class PromptGenerator extends Component{constructor(){super(),__publicField$16(this,"configSchema",Joi.object({model:Joi.string().max(200).required(),prompt:Joi.string().required().max(8e6).label("Prompt"),temperature:Joi.number().min(0).max(5).label("Temperature"),maxTokens:Joi.number().min(1).label("Maximum Tokens"),stopSequences:Joi.string().allow("").max(400).label("Stop Sequences"),topP:Joi.number().min(0).max(1).label("Top P"),topK:Joi.number().min(0).max(500).label("Top K"),frequencyPenalty:Joi.number().min(0).max(2).label("Frequency Penalty"),presencePenalty:Joi.number().min(0).max(2).label("Presence Penalty"),responseFormat:Joi.string().valid("json","text").optional().label("Response Format"),passthrough:Joi.boolean().optional().label("Passthrough")}))}init(){}async process(input,config2,agent){await super.process(input,config2,agent);const logger2=this.createComponentLogger(agent,config2);try{logger2.debug("=== LLM Prompt Log ===");let teamId=agent?.teamId;const passThrough=config2.data.passthrough||!1,model=config2.data.model||"echo",llmInference=await LLMInference$1.getInstance(model,AccessCandidate.agent(agent.id));if(!llmInference.connector)return{_error:`The model '${model}' is not available. Please try a different one.`,_debug:logger2.output};const modelId=await agent.modelsProvider.getModelId(model);logger2.debug(` Model : ${modelId||model}`);let prompt=TemplateString(config2.data.prompt).parse(input).result;logger2.debug(` Prompt
111
111
  `,prompt,`
112
112
  `),config2.data.responseFormat=config2.data?.responseFormat||"json";let response;if(passThrough?response=await new Promise(async(resolve,reject)=>{let _content="";const eventEmitter=await llmInference.promptStream({query:prompt,params:{...config2,model,agentId:agent.id}}).catch(error=>{console.error("Error on promptStream: ",error),reject(error)});eventEmitter.on("content",content=>{typeof agent.callback=="function"&&agent.callback({content}),agent.sse.send("llm/passthrough/content",content),_content+=content}),eventEmitter.on("thinking",thinking=>{typeof agent.callback=="function"&&agent.callback({thinking}),agent.sse.send("llm/passthrough/thinking",thinking)}),eventEmitter.on("end",()=>{console.log("end"),resolve(_content)})}):response=await llmInference.prompt({query:prompt,params:{...config2,agentId:agent.id}}).catch(error=>({error})),!response)return{_error:" LLM Error = Empty Response!",_debug:logger2.output};if(response?.error){const error=response?.error+" "+(response?.details||"");return logger2.error(" LLM Error=",error),{Reply:response?.data,_error:error,_debug:logger2.output}}logger2.debug(` Response
113
- `,response);const result={Reply:response};return result._debug=logger2.output,result}catch(error){return{_error:error.message,_debug:logger2.output}}}}async function parseHeaders(input,config2,agent){const teamId=agent?agent.teamId:null,templateSettings=config2?.template?.settings||{},contentType=config2?.data?.contentType||REQUEST_CONTENT_TYPES.none;let headers=typeof config2?.data?.headers=="object"?JSON.stringify(config2?.data?.headers):config2?.data?.headers||"{}";config2.data._templateVars&&templateSettings&&(headers=await TemplateString(headers).parseComponentTemplateVarsAsync(templateSettings).asyncResult,headers=await TemplateString(headers).parse(config2.data._templateVars).result),headers=await TemplateString(headers).parseTeamKeysAsync(teamId).asyncResult,headers=TemplateString(headers).parse(input).clean().result;let jsonHeaders=JSONContent(headers).tryParse();return typeof jsonHeaders!="object"&&(jsonHeaders={"x-smyth-error":"Error parsing headers"}),jsonHeaders=Object.fromEntries(Object.entries(jsonHeaders).map(([key,value])=>[key.toLowerCase(),value])),!jsonHeaders["content-type"]&&contentType!=="none"&&(jsonHeaders["content-type"]=contentType),new AxiosHeaders(jsonHeaders)}async function parseUrl(input,config2,agent){const teamId=agent?agent.teamId:null,templateSettings=config2?.template?.settings||{};let url=config2?.data?.url.replace(/\+/g,"%20");return config2.data._templateVars&&templateSettings&&(url=await TemplateString(url).parseComponentTemplateVarsAsync(templateSettings).asyncResult,url=await TemplateString(url).parse(config2.data._templateVars).result),url=await TemplateString(url).parseTeamKeysAsync(teamId).asyncResult,url=TemplateString(url).parse(input).clean().result,new URL(url).href}async function parseSmythFsUrl(url,agent){const urlObj=new URL(url),searchParams=urlObj.searchParams,publicUrls=[];for(const[key,value]of searchParams.entries())if(value.startsWith("smythfs://")){const pubUrl=await SmythFS.Instance.genTempUrl(value,AccessCandidate.agent(agent.id));publicUrls.push(pubUrl),searchParams.set(key,pubUrl)}return{url:urlObj.href,publicUrls}}async function destroyPublicUrls(publicUrls){try{await Promise.all(publicUrls.map(url=>SmythFS.Instance.destroyTempUrl(url))),console.log("Successfully cleaned up all temp urls for API Call Component")}catch(error){console.warn("Failed to clean up temp urls for API Call Component:",error)}return!0}async function parseData(input,config2,agent){const teamId=agent?agent.teamId:null,templateSettings=config2?.template?.settings||{},contentType=config2?.data?.contentType||REQUEST_CONTENT_TYPES.none;let body=typeof config2?.data?.body=="string"?config2?.data?.body?.trim():config2?.data?.body;if(!body)return{data:null,headers:{}};config2.data._templateVars&&templateSettings&&(body=await TemplateString(body).parseComponentTemplateVarsAsync(templateSettings).asyncResult),body=await TemplateString(body).parseTeamKeysAsync(teamId).asyncResult;const handler={[REQUEST_CONTENT_TYPES.json]:handleJson,[REQUEST_CONTENT_TYPES.urlEncodedFormData]:handleUrlEncoded,[REQUEST_CONTENT_TYPES.multipartFormData]:handleMultipartFormData,[REQUEST_CONTENT_TYPES.binary]:handleBinary,[REQUEST_CONTENT_TYPES.text]:handleText,[REQUEST_CONTENT_TYPES.none]:handleNone}[contentType]||handleNone,{data=null,headers={}}=await handler(body,input,config2,agent);return{data,headers}}async function handleJson(body,input,config2,agent){const data=TemplateString(body).parse(config2.data._templateVars).parse(input).clean().result;return{data:JSONContent(data).tryParse()}}async function handleUrlEncoded(body,input,config2,agent){const data=TemplateString(body).parse(config2.data._templateVars).parse(input).clean().result,jsonData=JSONContent(data).tryParse();if(typeof jsonData=="object"){const params=new URLSearchParams;for(const key in jsonData)params.append(key,String(jsonData[key]));return{data:params.toString()}}return{data:jsonData}}async function handleMultipartFormData(body,input,config2,agent){const formData=new FormData,_body=typeof body=="string"?JSON.parse(body):body;for(const key in _body){let value=_body[key];if(value=typeof value=="boolean"?String(value):value,value=TemplateString(value).parseRaw(input).result,value instanceof BinaryInput){const buffer=await value.getBuffer(),bufferStream=new Readable;bufferStream.push(buffer||null),bufferStream.push(null);const filename=await value.getName()||key;formData.append(key,bufferStream,{filename,contentType:value.mimetype})}else if(value&&typeof value=="object"&&value?.url){const binaryInput=await BinaryInput.from(value.url,"",value?.mimetype),buffer=await binaryInput.getBuffer(),bufferStream=new Readable;bufferStream.push(buffer||null),bufferStream.push(null);const filename=await binaryInput.getName()||key;formData.append(key,bufferStream,{filename,contentType:binaryInput.mimetype})}else value=TemplateString(value).parse(config2.data._templateVars).parse(input).clean().result,value&&formData.append(key,value)}return{data:formData,headers:formData.getHeaders()}}async function handleBinary(body,input,config2,agent){const value=TemplateString(body).parseRaw(input).result;if(value&&value instanceof BinaryInput)return{data:await value.getBuffer(),headers:{"Content-Type":value.mimetype}};if(value&&typeof value=="object"&&value?.url){const binaryInput=await BinaryInput.from(value.url,"",value?.mimetype);return{data:await binaryInput.getBuffer(),headers:{"Content-Type":binaryInput.mimetype}}}return{data:Buffer.from([]),headers:{}}}async function handleNone(body,input,config2,agent){return{data:typeof body=="string"?body:JSON.stringify(body),headers:{}}}function handleText(body,input,config2,agent){return{data:TemplateString(body).parse(config2.data._templateVars).parse(input).clean().result}}async function parseProxy(input,config2,agent){const teamId=agent?agent.teamId:null,templateSettings=config2?.template?.settings||{};let proxy=config2?.data?.proxy;if(!proxy)return!1;proxy=decodeURIComponent(proxy),config2.data._templateVars&&templateSettings&&(proxy=await TemplateString(proxy).parseComponentTemplateVarsAsync(templateSettings).parse(config2.data._templateVars).asyncResult),proxy=await TemplateString(proxy).parseTeamKeysAsync(teamId).asyncResult,proxy=TemplateString(proxy).parse(input).clean().result;const proxyList=proxy.split(/\n|\\n/).filter(p=>p)||[],randomIdx=Math.floor(Math.random()*proxyList?.length),proxyUrl=proxyList[randomIdx]?.trim(),urlObj=new URL(proxyUrl),protocol=urlObj.protocol.replace(":","");let proxyConfig;if(urlObj.protocol.startsWith("socks")){let proxyUrlString=`${protocol}://${urlObj.hostname}:${urlObj.port}`;(protocol==="socks4"||protocol==="socks4a")&&urlObj.username?proxyUrlString=`${protocol}://${urlObj.username}@${urlObj.hostname}:${urlObj.port}`:protocol==="socks5"&&urlObj.username&&(proxyUrlString=`${protocol}://${urlObj.username}:${urlObj.password}@${urlObj.hostname}:${urlObj.port}`),proxyConfig=new SocksProxyAgent(proxyUrlString)}else proxyConfig={protocol,host:urlObj.hostname,port:parseInt(urlObj.port),auth:urlObj.username?{username:urlObj.username,password:urlObj.password}:void 0};return proxyConfig}const mimeTypeCategories={binary:["image/","multipart/form-data","video/","application/msword","application/octet-stream","application/pdf","application/vnd.ms-excel","application/vnd.ms-powerpoint","application/vnd.oasis.opendocument.text","application/vnd.openxmlformats-officedocument","application/zip","application/x-7z-compressed","application/x-rar-compressed","application/x-tar","application/x-bzip","application/x-bzip2","application/x-gzip","application/vnd.android.package-archive","application/vnd.visio","application/x-deb","application/x-rpm","application/x-executable","font/ttf","font/otf","font/woff","font/woff2","model/"],json:["application/graphql","application/json","application/ld+json","application/vnd.api+json"],text:["text/","application/xml","application/xhtml+xml","application/csv","application/x-www-form-urlencoded","application/x-yaml","application/yaml","application/javascript","application/sql","application/rtf"]},contentHandlers={json:parseJson,text:parseText,binary:parseBinary};function parseJson(data){return JSON.parse(Buffer.from(data).toString("utf8")||"{}")}function parseText(data){return Buffer.from(data).toString("utf8")}async function parseBinary(data,contentType,agentId){return await BinaryInput.from(data,null,contentType).getJsonData(AccessCandidate.agent(agentId))}async function parseArrayBufferResponse(response,agent){if(!response?.data)return null;const data=response.data,contentType=response.headers["content-type"],cleanContentType=contentType?.split(";")[0];let handlerType=Object.keys(mimeTypeCategories).find(type=>mimeTypeCategories[type].includes(cleanContentType));handlerType||(handlerType=Object.keys(mimeTypeCategories).find(type=>mimeTypeCategories[type].some(prefix=>cleanContentType?.startsWith(prefix))));const handler=contentHandlers[handlerType];return handler?handler(data,contentType,agent.id):isBinaryMimeType(contentType)||isBinaryData(data)?parseBinary(data,contentType,agent.id):parseText(data)}var __defProp$15=Object.defineProperty,__defNormalProp$15=(obj,key,value)=>key in obj?__defProp$15(obj,key,{enumerable:!0,configurable:!0,writable:!0,value}):obj[key]=value,__publicField$15=(obj,key,value)=>__defNormalProp$15(obj,typeof key!="symbol"?key+"":key,value);const console$q=Logger("AccessTokenManager");let managedVault$1;SystemEvents.on("SRE:Booted",()=>{managedVault$1=ConnectorService.getManagedVaultConnector()});class AccessTokenManager{constructor(clientId,clientSecret,secondaryToken,tokenUrl,expires_in,primaryToken,data,keyId,logger2,agent){__publicField$15(this,"clientId"),__publicField$15(this,"clientSecret"),__publicField$15(this,"primaryToken"),__publicField$15(this,"secondaryToken"),__publicField$15(this,"tokenUrl"),__publicField$15(this,"expires_in"),__publicField$15(this,"data"),__publicField$15(this,"keyId"),__publicField$15(this,"logger"),__publicField$15(this,"agent"),this.clientId=clientId,this.clientSecret=clientSecret,this.primaryToken=primaryToken,this.secondaryToken=secondaryToken,this.tokenUrl=tokenUrl,this.expires_in=expires_in,this.data=data,this.keyId=keyId,this.logger=logger2,this.agent=agent}async getAccessToken(){try{const currentTime=new Date().getTime();if(!this.secondaryToken&&!this.expires_in)return console$q.log("Using long-lived access token"),this.logger.debug("Using long-lived access token. If authentication failes, please re-authenticate and try again"),this.primaryToken;if(!this.expires_in||currentTime>=Number(this.expires_in)){if(!this.secondaryToken)throw this.logger.debug("Refresh token is missing. Please re authenticate"),console$q.log("Refresh token is missing. Please re authenticate..."),new Error("Reauthentication required");return this.logger.debug("Access token is expired or missing. Refreshing access token..."),console$q.log("Access token is expired or missing. Refreshing access token..."),await this.refreshAccessToken()}else return console$q.log("Access token is still valid"),this.logger.debug("Access token is still valid."),this.primaryToken}catch(error){throw console$q.error("Error fetching access token:",error),this.logger.debug("Error fetching access token"),error}}async refreshAccessToken(){try{const response=await axios.post(this.tokenUrl,new URLSearchParams({client_id:this.clientId,client_secret:this.clientSecret,refresh_token:this.secondaryToken,grant_type:"refresh_token"}).toString(),{headers:{"Content-Type":"application/x-www-form-urlencoded"}}),newAccessToken=response?.data?.access_token;console$q.log("Access token refreshed successfully."),this.logger.debug("Access token refreshed successfully.");const expiresInMilliseconds=response?.data?.expires_in?response?.data?.expires_in*1e3:response?.data?.expires_in,expirationTimestamp=expiresInMilliseconds&&new Date().getTime()+expiresInMilliseconds;this.data.primary=newAccessToken,this.data.expires_in=expirationTimestamp&&expirationTimestamp?.toString();const save=await managedVault$1.user(AccessCandidate.agent(this.agent.id)).set(this.keyId,JSON.stringify(this.data));return save&&save.status===200?(console$q.log("Access token value is updated successfully."),this.logger.debug("Access token value is updated successfully.")):(console$q.log("Warning: new access token value is not updated."),this.logger.debug("Warning: new access token value is not updated.")),newAccessToken}catch(error){throw console$q.error("Failed to refresh access token:",error),this.logger.debug(`Failed to refresh access token: ${error}`),new Error("Failed to refresh access token.")}}}const console$p=Logger("OAuth.helper");let managedVault;SystemEvents.on("SRE:Booted",()=>{try{managedVault=ConnectorService.getManagedVaultConnector()}catch{console$p.warn("Could not find a compatible ManagedVault connector, OAuth APICalls will not work")}});function extractAdditionalParamsForOAuth1(reqConfig={}){let additionalParams={};const searchParams=new URL(reqConfig.url).searchParams;additionalParams=Object.fromEntries(searchParams.entries());const contentType=reqConfig.headers?.["Content-Type"]||"";if(contentType===REQUEST_CONTENT_TYPES.urlEncodedFormData){if(typeof reqConfig.data=="string"){const formData=new URLSearchParams(reqConfig.data);additionalParams={...additionalParams,...Object.fromEntries(formData)}}}else if(contentType===REQUEST_CONTENT_TYPES.json){if(reqConfig.data){const hash=crypto$1.createHash("sha1").update(JSON.stringify(reqConfig.data)).digest("base64");additionalParams.oauth_body_hash=hash}}else if(contentType===REQUEST_CONTENT_TYPES.multipartFormData){const formData=reqConfig.data;for(const[key,value]of formData.entries())typeof value=="object"&&value!==null&&"size"in value&&"type"in value||(additionalParams[key]=value)}return additionalParams}const buildOAuth1Header=(url,method,oauth1Credentials,additionalParams={})=>{const oauth=new OAuth({consumer:{key:oauth1Credentials.consumerKey,secret:oauth1Credentials.consumerSecret},signature_method:"HMAC-SHA1",hash_function(base_string,key){return crypto$1.createHmac("sha1",key).update(base_string).digest("base64")}}),requestData={url,method,...additionalParams},signedRequest=oauth.authorize(requestData,{key:oauth1Credentials.token,secret:oauth1Credentials.tokenSecret});return oauth.toHeader(signedRequest)},retrieveOAuthTokens=async(agent,config2)=>{let tokenKey=null;try{tokenKey=`OAUTH_${config2.componentId??config2.id}_TOKENS`;try{const result=await managedVault.user(AccessCandidate.agent(agent.id)).get(tokenKey),tokensData=typeof result=="object"?result:JSON.parse(result||"{}");if(!tokensData)throw new Error("Failed to retrieve OAuth tokens from vault. Please authenticate ...");const primaryToken=tokensData.primary,secondaryToken=tokensData.secondary,type=tokensData.type;if(type==="oauth2"&&config2.data.oauthService!=="OAuth2 Client Credentials"&&(secondaryToken||console$p.warn("Warning: refresh_token is missing for OAuth2"),tokensData.expires_in||console$p.warn("Warning: expires_in is missing for OAuth2.")),config2.data.oauthService!=="OAuth2 Client Credentials"&&!primaryToken)throw new Error("Retrieved OAuth tokens do not exist, invalid OR incomplete. Please authenticate ...");const responseData={primaryToken,secondaryToken,type};return type==="oauth"?("consumerKey"in tokensData&&(responseData.consumerKey=tokensData.consumerKey),"consumerSecret"in tokensData&&(responseData.consumerSecret=tokensData.consumerSecret),responseData.team=tokensData.team):type==="oauth2"&&(responseData.tokenURL=tokensData.tokenURL,"clientID"in tokensData&&(responseData.clientID=tokensData.clientID),"clientSecret"in tokensData&&(responseData.clientSecret=tokensData.clientSecret),responseData.expiresIn=tokensData.expires_in??0,responseData.team=tokensData.team),{responseData,data:tokensData,keyId:tokenKey}}catch(error){throw new Error(`Failed to parse retrieved tokens: ${error}`)}}catch(error){throw console$p.error("Error retrieving OAuth tokens:",error),error}},handleOAuthHeaders=async(agent,config2,reqConfig,logger2,additionalParams={},rootUrl)=>{let headers={};const{responseData:oauthTokens,data,keyId}=await retrieveOAuthTokens(agent,config2);try{const keys=["consumerKey","consumerSecret","clientID","clientSecret"];let oAuthConfigString=JSON.stringify({consumerKey:config2.data.consumerKey,consumerSecret:config2.data.consumerSecret,clientID:config2.data.clientID,clientSecret:config2.data.clientSecret,tokenURL:config2.data.tokenURL});oAuthConfigString=await TemplateString(oAuthConfigString).parseTeamKeysAsync(oauthTokens.team||agent.teamId).asyncResult;const oAuthConfig=JSON.parse(oAuthConfigString);if(oAuthConfig.oauthService==="OAuth2 Client Credentials"){const accessToken=await getClientCredentialToken(data,logger2,keyId,oauthTokens,config2,agent);headers.Authorization=`Bearer ${accessToken}`}else if(oauthTokens.type==="oauth"){const oauthHeader=buildOAuth1Header(rootUrl,reqConfig.method,{consumerKey:oAuthConfig.consumerKey,consumerSecret:oAuthConfig.consumerSecret,token:oauthTokens.primaryToken,tokenSecret:oauthTokens.secondaryToken},additionalParams);headers={...reqConfig.headers,...oauthHeader},logger2.debug("OAuth1 access token check success.")}else if(oauthTokens.type==="oauth2"){const accessToken=await new AccessTokenManager(oAuthConfig.clientID,oAuthConfig.clientSecret,oauthTokens.secondaryToken,oAuthConfig.tokenURL,oauthTokens.expiresIn,oauthTokens.primaryToken,data,keyId,logger2,agent).getAccessToken();headers.Authorization=`Bearer ${accessToken}`}return headers}catch(error){throw logger2.error(`Access token check failed: ${error}`),error}};async function getClientCredentialToken(data,logger2,keyId,oauthTokens,config2,agent){const logAndThrowError=message=>{throw logger2.debug(message),new Error(message)};try{data=data[keyId]||{};const{clientID,clientSecret,tokenURL}=config2.data,currentTime=new Date().getTime();if(!oauthTokens.expiresIn||currentTime>=Number(oauthTokens.expiresIn)){(!clientID||!clientSecret||!tokenURL)&&logAndThrowError("Missing client_id, client_secret OR token_url");const params=new URLSearchParams({grant_type:"client_credentials",client_id:clientID,client_secret:clientSecret}),response=await axios.post(tokenURL,params.toString(),{headers:{"Content-Type":"application/x-www-form-urlencoded"}});console$p.log("Access token refreshed successfully."),logger2.debug("Access token refreshed successfully.");const newAccessToken=response.data.access_token,expiresInMilliseconds=response.data.expires_in*1e3,expirationTimestamp=currentTime+expiresInMilliseconds;return Object.keys(data).length===0&&(data={primary:"",secondary:"",type:"oauth2",tokenURL,expires_in:"",team:agent.teamId,oauth_info:{oauth_keys_prefix:`OAUTH_${config2.componentId??config2.id}`,service:"oauth2_client_credentials",tokenURL,clientID,clientSecret}}),data.primary=newAccessToken,data.expires_in=expirationTimestamp.toString(),await managedVault.user(AccessCandidate.agent(agent.id)).set(keyId,data),newAccessToken}else return console$p.log("Access token value is still valid."),logger2.debug("Access token value is still valid."),oauthTokens.primaryToken}catch(error){logAndThrowError(`Failed to refresh access token: ${error}`)}}var __defProp$14=Object.defineProperty,__defNormalProp$14=(obj,key,value)=>key in obj?__defProp$14(obj,key,{enumerable:!0,configurable:!0,writable:!0,value}):obj[key]=value,__publicField$14=(obj,key,value)=>__defNormalProp$14(obj,typeof key!="symbol"?key+"":key,value);class APICall extends Component{constructor(){super(),__publicField$14(this,"schema",{name:"APICall",description:"Use this component to make an API call",inputs:{},outputs:{Headers:{description:"The headers of the API call response",default:!0},Response:{description:"The response of the API call",default:!0}}}),__publicField$14(this,"configSchema",Joi.object({method:Joi.string().valid("GET","POST","PUT","PATCH","DELETE","HEAD","OPTIONS").required().label("Method"),url:Joi.string().max(8192).required().label("URL"),headers:Joi.any().allow("").label("Headers"),contentType:Joi.string().valid("none","application/json","multipart/form-data","binary","application/x-www-form-urlencoded","text/plain","application/xml").label("Content-Type"),body:Joi.any().allow("").label("Body"),_templateSettings:Joi.object().allow(null).label("Template Settings"),_templateVars:Joi.object().allow(null).label("Template Variables"),proxy:Joi.string().allow("").label("Proxy"),oauthService:Joi.string().allow("").label("OAuth Service"),scope:Joi.string().allow("").label("Scope"),authorizationURL:Joi.string().allow("").label("Authorization URL"),tokenURL:Joi.string().allow("").label("Token URL"),clientID:Joi.string().allow("").label("Client ID"),clientSecret:Joi.string().allow("").label("Client Secret"),oauth2CallbackURL:Joi.string().allow("").label("OAuth2 Callback URL"),callbackURL:Joi.string().allow("").label("Callback URL"),requestTokenURL:Joi.string().allow("").label("Request Token URL"),accessTokenURL:Joi.string().allow("").label("Access Token URL"),userAuthorizationURL:Joi.string().allow("").label("User Authorization URL"),consumerKey:Joi.string().allow("").label("Consumer Key"),consumerSecret:Joi.string().allow("").label("Consumer Secret"),oauth1CallbackURL:Joi.string().allow("").label("OAuth1 Callback URL"),authenticate:Joi.string().allow("").label("Authenticate")}))}init(){}async process(input,config2,agent){await super.process(input,config2,agent);const logger2=this.createComponentLogger(agent,config2);let publicUrls=[];try{logger2.debug("=== API Call Log ===");const method=config2?.data?.method||"get",reqConfig={};reqConfig.method=method,reqConfig.url=await parseUrl(input,config2,agent),{url:reqConfig.url,publicUrls}=await parseSmythFsUrl(reqConfig.url,agent);const{data,headers}=await parseData(input,config2,agent);let dataForDebug;data&&(reqConfig.data=data,dataForDebug=await formatDataForDebug(data,AccessCandidate.agent(agent.id))),reqConfig.headers=(await parseHeaders(input,config2,agent)).concat({...headers});const proxyConfig=await parseProxy(input,config2,agent);if(proxyConfig)if(proxyConfig instanceof SocksProxyAgent){const isSecureEndpoint=reqConfig.url?.startsWith("https://");reqConfig[isSecureEndpoint?"httpsAgent":"httpAgent"]=proxyConfig}else reqConfig.proxy=proxyConfig;let Response={},Headers={},_error;try{if(config2?.data?.oauthService&&config2?.data?.oauthService!=="None"){const rootUrl=new URL(reqConfig.url).origin,additionalParams=extractAdditionalParamsForOAuth1(reqConfig),oauthHeaders=await handleOAuthHeaders(agent,config2,reqConfig,logger2,additionalParams,rootUrl);reqConfig.headers=reqConfig.headers.concat({...oauthHeaders})}reqConfig.responseType="arraybuffer",logger2.debug("Making API call",{...reqConfig,data:dataForDebug});const response=await axios.request(reqConfig),parsedRes=await parseArrayBufferResponse(response,agent);logger2.debug("API call Response Headers",response.headers),Response=parsedRes,logger2.debug(`API call Response
113
+ `,response);const result={Reply:response};return result._debug=logger2.output,result}catch(error){return{_error:error.message,_debug:logger2.output}}}}async function parseHeaders(input,config2,agent){const teamId=agent?agent.teamId:null,templateSettings=config2?.template?.settings||{},contentType=config2?.data?.contentType||REQUEST_CONTENT_TYPES.none;let headers=typeof config2?.data?.headers=="object"?JSON.stringify(config2?.data?.headers):config2?.data?.headers||"{}";config2.data._templateVars&&templateSettings&&(headers=await TemplateString(headers).parseComponentTemplateVarsAsync(templateSettings).asyncResult,headers=await TemplateString(headers).parse(config2.data._templateVars).result),headers=await TemplateString(headers).parseTeamKeysAsync(teamId).asyncResult,headers=TemplateString(headers).parse(input).clean().result;let jsonHeaders=JSONContent(headers).tryParse();return typeof jsonHeaders!="object"&&(jsonHeaders={"x-smyth-error":"Error parsing headers"}),jsonHeaders=Object.fromEntries(Object.entries(jsonHeaders).map(([key,value])=>[key.toLowerCase(),value])),!jsonHeaders["content-type"]&&contentType!=="none"&&(jsonHeaders["content-type"]=contentType),new AxiosHeaders(jsonHeaders)}async function parseUrl(input,config2,agent){const teamId=agent?agent.teamId:null,templateSettings=config2?.template?.settings||{};let url=config2?.data?.url.replace(/\+/g,"%20");return config2.data._templateVars&&templateSettings&&(url=await TemplateString(url).parseComponentTemplateVarsAsync(templateSettings).asyncResult,url=await TemplateString(url).parse(config2.data._templateVars).result),url=await TemplateString(url).parseTeamKeysAsync(teamId).asyncResult,url=TemplateString(url).parse(input).clean().result,new URL(url).href}async function parseSmythFsUrl(url,agent){const urlObj=new URL(url),searchParams=urlObj.searchParams,publicUrls=[];for(const[key,value]of searchParams.entries())if(value.startsWith("smythfs://")){const pubUrl=await SmythFS.Instance.genTempUrl(value,AccessCandidate.agent(agent.id));publicUrls.push(pubUrl),searchParams.set(key,pubUrl)}return{url:urlObj.href,publicUrls}}async function destroyPublicUrls(publicUrls){try{await Promise.all(publicUrls.map(url=>SmythFS.Instance.destroyTempUrl(url))),console.log("Successfully cleaned up all temp urls for API Call Component")}catch(error){console.warn("Failed to clean up temp urls for API Call Component:",error)}return!0}async function parseData(input,config2,agent){const teamId=agent?agent.teamId:null,templateSettings=config2?.template?.settings||{},contentType=config2?.data?.contentType||REQUEST_CONTENT_TYPES.none;let body=typeof config2?.data?.body=="string"?config2?.data?.body?.trim():config2?.data?.body;if(!body)return{data:null,headers:{}};config2.data._templateVars&&templateSettings&&(body=await TemplateString(body).parseComponentTemplateVarsAsync(templateSettings).asyncResult),body=await TemplateString(body).parseTeamKeysAsync(teamId).asyncResult;const handler={[REQUEST_CONTENT_TYPES.json]:handleJson,[REQUEST_CONTENT_TYPES.urlEncodedFormData]:handleUrlEncoded,[REQUEST_CONTENT_TYPES.multipartFormData]:handleMultipartFormData,[REQUEST_CONTENT_TYPES.binary]:handleBinary,[REQUEST_CONTENT_TYPES.text]:handleText,[REQUEST_CONTENT_TYPES.none]:handleNone}[contentType]||handleNone,{data=null,headers={}}=await handler(body,input,config2,agent);return{data,headers}}async function handleJson(body,input,config2,agent){const data=TemplateString(body).parse(config2.data._templateVars).parse(input).clean().result;return{data:JSONContent(data).tryParse()}}async function handleUrlEncoded(body,input,config2,agent){const data=TemplateString(body).parse(config2.data._templateVars).parse(input).clean().result,jsonData=JSONContent(data).tryParse();if(typeof jsonData=="object"){const params=new URLSearchParams;for(const key in jsonData)params.append(key,String(jsonData[key]));return{data:params.toString()}}return{data:jsonData}}async function handleMultipartFormData(body,input,config2,agent){const formData=new FormData,_body=typeof body=="string"?JSON.parse(body):body;for(const key in _body){let value=_body[key];if(value=typeof value=="boolean"?String(value):value,value=TemplateString(value).parseRaw(input).result,value instanceof BinaryInput){const buffer=await value.getBuffer(),bufferStream=new Readable;bufferStream.push(buffer||null),bufferStream.push(null);const filename=await value.getName()||key;formData.append(key,bufferStream,{filename,contentType:value.mimetype})}else if(value&&typeof value=="object"&&value?.url){const binaryInput=await BinaryInput.from(value.url,"",value?.mimetype),buffer=await binaryInput.getBuffer(),bufferStream=new Readable;bufferStream.push(buffer||null),bufferStream.push(null);const filename=await binaryInput.getName()||key;formData.append(key,bufferStream,{filename,contentType:binaryInput.mimetype})}else value=TemplateString(value).parse(config2.data._templateVars).parse(input).clean().result,value&&formData.append(key,value)}return{data:formData,headers:formData.getHeaders()}}async function handleBinary(body,input,config2,agent){const value=TemplateString(body).parseRaw(input).result;if(value&&value instanceof BinaryInput)return{data:await value.getBuffer(),headers:{"Content-Type":value.mimetype}};if(value&&typeof value=="object"&&value?.url){const binaryInput=await BinaryInput.from(value.url,"",value?.mimetype);return{data:await binaryInput.getBuffer(),headers:{"Content-Type":binaryInput.mimetype}}}return{data:Buffer.from([]),headers:{}}}async function handleNone(body,input,config2,agent){return{data:typeof body=="string"?body:JSON.stringify(body),headers:{}}}function handleText(body,input,config2,agent){return{data:TemplateString(body).parse(config2.data._templateVars).parse(input).clean().result}}async function parseProxy(input,config2,agent){const teamId=agent?agent.teamId:null,templateSettings=config2?.template?.settings||{};let proxy=config2?.data?.proxy;if(!proxy)return!1;proxy=decodeURIComponent(proxy),config2.data._templateVars&&templateSettings&&(proxy=await TemplateString(proxy).parseComponentTemplateVarsAsync(templateSettings).parse(config2.data._templateVars).asyncResult),proxy=await TemplateString(proxy).parseTeamKeysAsync(teamId).asyncResult,proxy=TemplateString(proxy).parse(input).clean().result;const proxyList=proxy.split(/\n|\\n/).filter(p=>p)||[],randomIdx=Math.floor(Math.random()*proxyList?.length),proxyUrl=proxyList[randomIdx]?.trim(),urlObj=new URL(proxyUrl),protocol=urlObj.protocol.replace(":","");let proxyConfig;if(urlObj.protocol.startsWith("socks")){let proxyUrlString=`${protocol}://${urlObj.hostname}:${urlObj.port}`;(protocol==="socks4"||protocol==="socks4a")&&urlObj.username?proxyUrlString=`${protocol}://${urlObj.username}@${urlObj.hostname}:${urlObj.port}`:protocol==="socks5"&&urlObj.username&&(proxyUrlString=`${protocol}://${urlObj.username}:${urlObj.password}@${urlObj.hostname}:${urlObj.port}`),proxyConfig=new SocksProxyAgent(proxyUrlString)}else proxyConfig={protocol,host:urlObj.hostname,port:parseInt(urlObj.port),auth:urlObj.username?{username:urlObj.username,password:urlObj.password}:void 0};return proxyConfig}const mimeTypeCategories={binary:["image/","multipart/form-data","video/","application/msword","application/octet-stream","application/pdf","application/vnd.ms-excel","application/vnd.ms-powerpoint","application/vnd.oasis.opendocument.text","application/vnd.openxmlformats-officedocument","application/zip","application/x-7z-compressed","application/x-rar-compressed","application/x-tar","application/x-bzip","application/x-bzip2","application/x-gzip","application/vnd.android.package-archive","application/vnd.visio","application/x-deb","application/x-rpm","application/x-executable","font/ttf","font/otf","font/woff","font/woff2","model/"],json:["application/graphql","application/json","application/ld+json","application/vnd.api+json"],text:["text/","application/xml","application/xhtml+xml","application/csv","application/x-www-form-urlencoded","application/x-yaml","application/yaml","application/javascript","application/sql","application/rtf"]},contentHandlers={json:parseJson,text:parseText,binary:parseBinary};function parseJson(data){return JSON.parse(Buffer.from(data).toString("utf8")||"{}")}function parseText(data){return Buffer.from(data).toString("utf8")}async function parseBinary(data,contentType,agentId){return await BinaryInput.from(data,null,contentType).getJsonData(AccessCandidate.agent(agentId))}async function parseArrayBufferResponse(response,agent){if(!response?.data)return null;const data=response.data,contentType=response.headers["content-type"],cleanContentType=contentType?.split(";")[0];let handlerType=Object.keys(mimeTypeCategories).find(type=>mimeTypeCategories[type].includes(cleanContentType));handlerType||(handlerType=Object.keys(mimeTypeCategories).find(type=>mimeTypeCategories[type].some(prefix=>cleanContentType?.startsWith(prefix))));const handler=contentHandlers[handlerType];return handler?handler(data,contentType,agent.id):isBinaryMimeType(contentType)||isBinaryData(data)?parseBinary(data,contentType,agent.id):parseText(data)}var __defProp$15=Object.defineProperty,__defNormalProp$15=(obj,key,value)=>key in obj?__defProp$15(obj,key,{enumerable:!0,configurable:!0,writable:!0,value}):obj[key]=value,__publicField$15=(obj,key,value)=>__defNormalProp$15(obj,typeof key!="symbol"?key+"":key,value);const console$q=Logger("AccessTokenManager");let managedVault$1;SystemEvents.on("SRE:Booted",()=>{managedVault$1=ConnectorService.getManagedVaultConnector()});class AccessTokenManager{constructor(clientId,clientSecret,secondaryToken,tokenUrl,expires_in,primaryToken,tokensData,keyId,logger2,agent,isNewStructure=!1){__publicField$15(this,"clientId"),__publicField$15(this,"clientSecret"),__publicField$15(this,"primaryToken"),__publicField$15(this,"secondaryToken"),__publicField$15(this,"tokenUrl"),__publicField$15(this,"expires_in"),__publicField$15(this,"tokensData"),__publicField$15(this,"keyId"),__publicField$15(this,"logger"),__publicField$15(this,"agent"),__publicField$15(this,"isNewStructure"),this.clientId=clientId,this.clientSecret=clientSecret,this.primaryToken=primaryToken,this.secondaryToken=secondaryToken,this.tokenUrl=tokenUrl,this.expires_in=expires_in,this.tokensData=tokensData,this.keyId=keyId,this.logger=logger2,this.agent=agent,this.isNewStructure=isNewStructure}async getAccessToken(){try{const currentTime=new Date().getTime();if(!this.secondaryToken&&!this.expires_in)return console$q.log("Using long-lived access token"),this.logger.debug("Using long-lived access token. If authentication failes, please re-authenticate and try again"),this.primaryToken;if(!this.expires_in||currentTime>=Number(this.expires_in)){if(!this.secondaryToken)throw this.logger.debug("Refresh token is missing. Please re authenticate"),console$q.log("Refresh token is missing. Please re authenticate..."),new Error("Reauthentication required");return this.logger.debug("Access token is expired or missing. Refreshing access token..."),console$q.log("Access token is expired or missing. Refreshing access token..."),await this.refreshAccessToken()}else return console$q.log("Access token is still valid"),this.logger.debug("Access token is still valid."),this.primaryToken}catch(error){throw console$q.error("Error fetching access token:",error),this.logger.debug("Error fetching access token"),error}}async refreshAccessToken(){try{const response=await axios.post(this.tokenUrl,new URLSearchParams({client_id:this.clientId,client_secret:this.clientSecret,refresh_token:this.secondaryToken,grant_type:"refresh_token"}).toString(),{headers:{"Content-Type":"application/x-www-form-urlencoded"}}),newAccessToken=response?.data?.access_token;console$q.log("Access token refreshed successfully."),this.logger.debug("Access token refreshed successfully.");const expiresInMilliseconds=response?.data?.expires_in?response?.data?.expires_in*1e3:response?.data?.expires_in,expirationTimestamp=expiresInMilliseconds&&new Date().getTime()+expiresInMilliseconds;let updatedData;this.isNewStructure?updatedData={...this.tokensData,auth_data:{...this.tokensData?.auth_data??{},primary:newAccessToken,secondary:response?.data?.refresh_token??this.secondaryToken,expires_in:(expirationTimestamp??void 0)!==void 0?String(expirationTimestamp):void 0}}:(updatedData={...this.tokensData,primary:newAccessToken,expires_in:(expirationTimestamp??void 0)!==void 0?String(expirationTimestamp):void 0},updatedData.secondary=response?.data?.refresh_token??this.secondaryToken);const save=await managedVault$1.user(AccessCandidate.agent(this.agent.id)).set(this.keyId,JSON.stringify(updatedData));return save&&save.status===200?(console$q.log("Access token value is updated successfully."),this.logger.debug("Access token value is updated successfully.")):(console$q.log("Warning: new access token value is not updated."),this.logger.debug("Warning: new access token value is not updated.")),this.tokensData=updatedData,this.primaryToken=newAccessToken,this.secondaryToken=response?.data?.refresh_token??this.secondaryToken,this.expires_in=(expirationTimestamp??void 0)!==void 0?String(expirationTimestamp):void 0,newAccessToken}catch(error){throw console$q.error("Failed to refresh access token:",error),this.logger.debug(`Failed to refresh access token: ${error}`),new Error("Failed to refresh access token.")}}}const console$p=Logger("OAuth.helper");let managedVault;SystemEvents.on("SRE:Booted",()=>{try{managedVault=ConnectorService.getManagedVaultConnector()}catch{console$p.warn("Could not find a compatible ManagedVault connector, OAuth APICalls will not work")}});function extractAdditionalParamsForOAuth1(reqConfig={}){let additionalParams={};reqConfig.url&&(reqConfig.url.includes("{{")||reqConfig.url.includes("${{"))&&console$p.warn("Warning: URL contains unresolved template variables for OAuth1 signature:",reqConfig.url);try{const searchParams=new URL(reqConfig.url).searchParams;additionalParams=Object.fromEntries(searchParams.entries()),searchParams.toString()&&console$p.debug("OAuth1: Found query parameters:",Object.keys(additionalParams))}catch(error){console$p.warn("Failed to parse URL for OAuth1 parameters:",error)}const headers=reqConfig.headers||{};let contentType="";if(Array.isArray(headers)){const contentTypeHeader=headers.find(h=>Object.keys(h).some(k=>k.toLowerCase()==="content-type"));if(contentTypeHeader){const key=Object.keys(contentTypeHeader).find(k=>k.toLowerCase()==="content-type");contentType=contentTypeHeader[key]}}else contentType=headers["Content-Type"]||headers["content-type"]||"";const method=(reqConfig.method||"GET").toUpperCase();if(contentType.includes(REQUEST_CONTENT_TYPES.urlEncodedFormData)){if(reqConfig.data){let formParams={};if(typeof reqConfig.data=="string"){(reqConfig.data.includes("{{")||reqConfig.data.includes("${{"))&&console$p.warn("Warning: Form data contains unresolved template variables for OAuth1 signature");const formData=new URLSearchParams(reqConfig.data);formParams=Object.fromEntries(formData.entries())}else reqConfig.data instanceof URLSearchParams?formParams=Object.fromEntries(reqConfig.data.entries()):typeof reqConfig.data=="object"&&(formParams=reqConfig.data);console$p.debug("OAuth1: Including form parameters in signature:",Object.keys(formParams)),additionalParams={...additionalParams,...formParams}}}else if(contentType.includes(REQUEST_CONTENT_TYPES.json)||contentType.includes("application/")||contentType.includes("text/")){if(reqConfig.data&&method!=="GET"&&method!=="HEAD"){let bodyString="";typeof reqConfig.data=="string"?bodyString=reqConfig.data:bodyString=JSON.stringify(reqConfig.data),(bodyString.includes("{{")||bodyString.includes("${{"))&&console$p.warn("Warning: Request body contains unresolved template variables for OAuth1 signature");const hash=crypto$1.createHash("sha1").update(bodyString).digest("base64");additionalParams.oauth_body_hash=hash,console$p.debug("OAuth1: Added oauth_body_hash for",contentType)}}else if(contentType.includes(REQUEST_CONTENT_TYPES.multipartFormData)){if(reqConfig.data&&typeof reqConfig.data=="object"&&"entries"in reqConfig.data){const formData=reqConfig.data;for(const[key,value]of formData.entries())if(typeof value=="string")additionalParams[key]=value;else{if(typeof value=="object"&&value!==null&&("size"in value||"type"in value))continue;additionalParams[key]=String(value)}}}else if(!contentType&&(method==="POST"||method==="PUT"||method==="PATCH")&&reqConfig.data){const bodyString=typeof reqConfig.data=="string"?reqConfig.data:JSON.stringify(reqConfig.data),hash=crypto$1.createHash("sha1").update(bodyString).digest("base64");additionalParams.oauth_body_hash=hash}return console$p.debug("OAuth1: Total parameters for signature:",Object.keys(additionalParams).length),additionalParams}const buildOAuth1Header=(url,method,oauth1Credentials,additionalParams={})=>{const oauth=new OAuth({consumer:{key:oauth1Credentials.consumerKey,secret:oauth1Credentials.consumerSecret},signature_method:"HMAC-SHA1",hash_function(base_string,key){return crypto$1.createHmac("sha1",key).update(base_string).digest("base64")}});let baseUrl=url;try{const urlObj=new URL(url);baseUrl=`${urlObj.protocol}//${urlObj.host}${urlObj.pathname}`,console$p.debug("OAuth1: Base URL for signature:",baseUrl)}catch(error){console$p.warn("Failed to parse URL for OAuth1 signature:",error)}const requestData={url:baseUrl,method:method.toUpperCase(),data:additionalParams},token=oauth1Credentials.token&&oauth1Credentials.token!==""?{key:oauth1Credentials.token,secret:oauth1Credentials.tokenSecret||""}:null,signedRequest=oauth.authorize(requestData,token);return oauth.toHeader(signedRequest)},retrieveOAuthTokens=async(agent,config2)=>{let tokenKey=null;try{tokenKey=config2?.data?.oauth_con_id;try{const result=await managedVault.user(AccessCandidate.agent(agent.id)).get(tokenKey),tokensData=typeof result=="object"?result:JSON.parse(result||"{}");if(!tokensData)throw new Error("Failed to retrieve OAuth tokens from vault. Please authenticate ...");const isNewStructure=tokensData.auth_data!==void 0&&tokensData.auth_settings!==void 0,primaryToken=isNewStructure?tokensData.auth_data?.primary:tokensData.primary,secondaryToken=isNewStructure?tokensData.auth_data?.secondary:tokensData.secondary,expiresIn=isNewStructure?tokensData.auth_data?.expires_in:tokensData.expires_in,type=isNewStructure?tokensData.auth_settings?.type:tokensData.type||tokensData.oauth_info?.type,service=isNewStructure?tokensData.auth_settings?.service:tokensData.oauth_info?.service;if(type==="oauth2"&&service!=="oauth2_client_credentials"&&(secondaryToken||console$p.warn("Warning: refresh_token is missing for OAuth2"),expiresIn||console$p.warn("Warning: expires_in is missing for OAuth2.")),service!=="oauth2_client_credentials"&&!primaryToken)throw new Error("Retrieved OAuth tokens do not exist, invalid OR incomplete. Please authenticate ...");const responseData={primaryToken,secondaryToken,type,service};return type==="oauth"?(isNewStructure?(responseData.consumerKey=tokensData.auth_settings?.consumerKey,responseData.consumerSecret=tokensData.auth_settings?.consumerSecret,responseData.tokenURL=tokensData.auth_settings?.tokenURL):(responseData.consumerKey=tokensData.consumerKey||tokensData.oauth_info?.consumerKey,responseData.consumerSecret=tokensData.consumerSecret||tokensData.oauth_info?.consumerSecret,responseData.tokenURL=tokensData.tokenURL||tokensData.oauth_info?.tokenURL),responseData.team=tokensData.team||agent.teamId):type==="oauth2"&&(isNewStructure?(responseData.tokenURL=tokensData.auth_settings?.tokenURL,responseData.clientID=tokensData.auth_settings?.clientID,responseData.clientSecret=tokensData.auth_settings?.clientSecret):(responseData.tokenURL=tokensData.tokenURL||tokensData.oauth_info?.tokenURL,responseData.clientID=tokensData.clientID||tokensData.oauth_info?.clientID,responseData.clientSecret=tokensData.clientSecret||tokensData.oauth_info?.clientSecret),responseData.expiresIn=expiresIn??0,responseData.team=tokensData.team||agent.teamId),{responseData,tokensData,keyId:tokenKey,isNewStructure}}catch(error){throw new Error(`Failed to parse retrieved tokens: ${error}`)}}catch(error){throw console$p.error("Error retrieving OAuth tokens:",error),error}},handleOAuthHeaders=async(agent,config2,reqConfig,logger2,additionalParams={})=>{let headers={};const{responseData:oauthTokens,tokensData,keyId,isNewStructure}=await retrieveOAuthTokens(agent,config2);try{let oAuthConfigString=JSON.stringify({consumerKey:oauthTokens.consumerKey||"",consumerSecret:oauthTokens.consumerSecret||"",clientID:oauthTokens.clientID||"",clientSecret:oauthTokens.clientSecret||"",tokenURL:oauthTokens.tokenURL||""});oAuthConfigString=await TemplateString(oAuthConfigString).parseTeamKeysAsync(oauthTokens.team||agent.teamId).asyncResult;const oAuthConfig=JSON.parse(oAuthConfigString);if(oauthTokens.service==="oauth2_client_credentials"){const accessToken=await getClientCredentialToken(tokensData,logger2,keyId,oauthTokens,config2,agent,isNewStructure);headers.Authorization=`Bearer ${accessToken}`}else if(oauthTokens.type==="oauth"){const oauthHeader=buildOAuth1Header(reqConfig.url,reqConfig.method,{consumerKey:oAuthConfig.consumerKey,consumerSecret:oAuthConfig.consumerSecret,token:oauthTokens.primaryToken,tokenSecret:oauthTokens.secondaryToken},additionalParams);headers={...reqConfig.headers,...oauthHeader},logger2.debug("OAuth1 access token check success.")}else if(oauthTokens.type==="oauth2"){const accessToken=await new AccessTokenManager(oAuthConfig.clientID,oAuthConfig.clientSecret,oauthTokens.secondaryToken,oAuthConfig.tokenURL,oauthTokens.expiresIn,oauthTokens.primaryToken,tokensData,keyId,logger2,agent,isNewStructure).getAccessToken();headers.Authorization=`Bearer ${accessToken}`}return headers}catch(error){throw logger2.error(`Access token check failed: ${error}`),error}};async function getClientCredentialToken(tokensData,logger2,keyId,oauthTokens,config2,agent,isNewStructure=!1){const logAndThrowError=message=>{throw logger2.debug(message),new Error(message)};try{const{clientID,clientSecret,tokenURL}=oauthTokens,currentTime=new Date().getTime();if(!oauthTokens.expiresIn||currentTime>=Number(oauthTokens.expiresIn)){(!clientID||!clientSecret||!tokenURL)&&logAndThrowError("Missing client_id, client_secret OR token_url");const params=new URLSearchParams({grant_type:"client_credentials",client_id:clientID,client_secret:clientSecret}),response=await axios.post(tokenURL,params.toString(),{headers:{"Content-Type":"application/x-www-form-urlencoded"}});console$p.log("Access token refreshed successfully."),logger2.debug("Access token refreshed successfully.");const newAccessToken=response.data.access_token,expiresInMilliseconds=response.data.expires_in*1e3,expirationTimestamp=currentTime+expiresInMilliseconds;let updatedData;if(isNewStructure){const parts=String(config2?.data?.oauth_con_id??"").split("_"),prefixSuffix=parts.length>1?parts[1]:parts[0],oauthKeysPrefix=prefixSuffix?`OAUTH_${prefixSuffix}`:void 0;updatedData={...tokensData||{},auth_data:{...tokensData?.auth_data||{},primary:newAccessToken,expires_in:expirationTimestamp.toString()},auth_settings:{...tokensData?.auth_settings||{},type:"oauth2",tokenURL,clientID,clientSecret,...oauthKeysPrefix?{oauth_keys_prefix:oauthKeysPrefix}:{},service:"oauth2_client_credentials"}}}else updatedData={...tokensData,primary:newAccessToken,expires_in:expirationTimestamp.toString()},updatedData.type||(updatedData.type="oauth2"),updatedData.tokenURL||(updatedData.tokenURL=tokenURL),updatedData.team||(updatedData.team=agent.teamId),updatedData.oauth_info||(updatedData.oauth_info={oauth_keys_prefix:`OAUTH_${config2?.data?.oauth_con_id?.split("_")[1]}`,service:"oauth2_client_credentials",tokenURL,clientID,clientSecret});return await managedVault.user(AccessCandidate.agent(agent.id)).set(keyId,JSON.stringify(updatedData)),newAccessToken}else return console$p.log("Access token value is still valid."),logger2.debug("Access token value is still valid."),oauthTokens.primaryToken}catch(error){logAndThrowError(`Failed to refresh access token: ${error}`)}}var __defProp$14=Object.defineProperty,__defNormalProp$14=(obj,key,value)=>key in obj?__defProp$14(obj,key,{enumerable:!0,configurable:!0,writable:!0,value}):obj[key]=value,__publicField$14=(obj,key,value)=>__defNormalProp$14(obj,typeof key!="symbol"?key+"":key,value);class APICall extends Component{constructor(){super(),__publicField$14(this,"schema",{name:"APICall",description:"Use this component to make an API call",inputs:{},outputs:{Headers:{description:"The headers of the API call response",default:!0},Response:{description:"The response of the API call",default:!0}}}),__publicField$14(this,"configSchema",Joi.object({method:Joi.string().valid("GET","POST","PUT","PATCH","DELETE","HEAD","OPTIONS").required().label("Method"),url:Joi.string().max(8192).required().label("URL"),headers:Joi.any().allow("").label("Headers"),contentType:Joi.string().valid("none","application/json","multipart/form-data","binary","application/x-www-form-urlencoded","text/plain","application/xml").label("Content-Type"),body:Joi.any().allow("").label("Body"),_templateSettings:Joi.object().allow(null).label("Template Settings"),_templateVars:Joi.object().allow(null).label("Template Variables"),proxy:Joi.string().allow("").label("Proxy"),oauthService:Joi.string().allow("").label("OAuth Service"),scope:Joi.string().allow("").label("Scope"),authorizationURL:Joi.string().allow("").label("Authorization URL"),tokenURL:Joi.string().allow("").label("Token URL"),clientID:Joi.string().allow("").label("Client ID"),clientSecret:Joi.string().allow("").label("Client Secret"),oauth2CallbackURL:Joi.string().allow("").label("OAuth2 Callback URL"),callbackURL:Joi.string().allow("").label("Callback URL"),requestTokenURL:Joi.string().allow("").label("Request Token URL"),accessTokenURL:Joi.string().allow("").label("Access Token URL"),userAuthorizationURL:Joi.string().allow("").label("User Authorization URL"),consumerKey:Joi.string().allow("").label("Consumer Key"),consumerSecret:Joi.string().allow("").label("Consumer Secret"),oauth1CallbackURL:Joi.string().allow("").label("OAuth1 Callback URL"),authenticate:Joi.string().allow("").label("Authenticate"),oauth_con_id:Joi.string().allow("").label("OAuth Connection ID")}))}init(){}async process(input,config2,agent){await super.process(input,config2,agent);const logger2=this.createComponentLogger(agent,config2);let publicUrls=[];try{logger2.debug("=== API Call Log ===");const method=config2?.data?.method||"get",reqConfig={};reqConfig.method=method,reqConfig.url=await parseUrl(input,config2,agent),{url:reqConfig.url,publicUrls}=await parseSmythFsUrl(reqConfig.url,agent);const{data,headers}=await parseData(input,config2,agent);let dataForDebug;data&&(reqConfig.data=data,dataForDebug=await formatDataForDebug(data,AccessCandidate.agent(agent.id))),reqConfig.headers=(await parseHeaders(input,config2,agent)).concat({...headers});const proxyConfig=await parseProxy(input,config2,agent);if(proxyConfig)if(proxyConfig instanceof SocksProxyAgent){const isSecureEndpoint=reqConfig.url?.startsWith("https://");reqConfig[isSecureEndpoint?"httpsAgent":"httpAgent"]=proxyConfig}else reqConfig.proxy=proxyConfig;let Response={},Headers={},_error;try{if(config2?.data?.oauth_con_id!==""&&config2?.data?.oauth_con_id!=="None"){const additionalParams=extractAdditionalParamsForOAuth1(reqConfig),oauthHeaders=await handleOAuthHeaders(agent,config2,reqConfig,logger2,additionalParams);reqConfig.headers=reqConfig.headers.concat({...oauthHeaders})}reqConfig.responseType="arraybuffer",logger2.debug("Making API call",{...reqConfig,data:dataForDebug});const response=await axios.request(reqConfig),parsedRes=await parseArrayBufferResponse(response,agent);logger2.debug("API call Response Headers",response.headers),Response=parsedRes,logger2.debug(`API call Response
114
114
  `,Response),Headers=Object.fromEntries(Object.entries(response.headers))}catch(error){logger2.debug(`Error making API call: ${error.message}`),Headers=error?.response?.headers?Object.fromEntries(Object.entries(error.response.headers)):{},Response=await parseArrayBufferResponse(error.response,agent),_error=error.message}return{Response,Headers,_error,_debug:logger2.output}}catch(error){return{_error:error.message,_debug:logger2.output}}finally{publicUrls.length>0&&await destroyPublicUrls(publicUrls)}}}var __defProp$13=Object.defineProperty,__defNormalProp$13=(obj,key,value)=>key in obj?__defProp$13(obj,key,{enumerable:!0,configurable:!0,writable:!0,value}):obj[key]=value,__publicField$13=(obj,key,value)=>__defNormalProp$13(obj,key+"",value);class VisionLLM extends Component{constructor(){super(),__publicField$13(this,"configSchema",Joi.object({prompt:Joi.string().required().max(8e6).label("Prompt"),maxTokens:Joi.number().min(1).label("Maximum Tokens"),model:Joi.string().max(200).required(),passthrough:Joi.boolean().optional().label("Passthrough")}))}init(){}async process(input,config2,agent){await super.process(input,config2,agent);const logger2=this.createComponentLogger(agent,config2);try{logger2.debug("=== Vision LLM Log ===");const passThrough=config2.data.passthrough||!1,model=config2.data?.model,llmInference=await LLMInference$1.getInstance(model,AccessCandidate.agent(agent.id));if(!llmInference.connector)return{_error:`The model '${model}' is not available. Please try a different one.`,_debug:logger2.output};const modelId=await agent.modelsProvider.getModelId(model);logger2.debug(` Model : ${modelId||model}`);let prompt=TemplateString(config2.data.prompt).parse(input).result;logger2.debug(` Prompt
115
115
  `,prompt,`
116
116
  `);const files=Array.isArray(input.Images)?input.Images:[input.Images];let response;if(passThrough?response=await new Promise(async(resolve,reject)=>{let _content="";const eventEmitter=await llmInference.multimodalStreamRequestLegacy(prompt,files,config2,agent).catch(error=>{console.error("Error on multimodalStreamRequest: ",error),reject(error)});eventEmitter.on("content",content=>{typeof agent.callback=="function"&&agent.callback({content}),agent.sse.send("llm/passthrough/content",content),_content+=content}),eventEmitter.on("thinking",thinking=>{typeof agent.callback=="function"&&agent.callback({thinking}),agent.sse.send("llm/passthrough/thinking",thinking)}),eventEmitter.on("end",()=>{console.log("end"),resolve(_content)})}):response=await llmInference.prompt({query:prompt,files,params:{...config2,agentId:agent.id}}),!response)return{_error:" LLM Error = Empty Response!",_debug:logger2.output};if(response?.error){const error=response?.error+" "+(response?.details||"");return logger2.error(" LLM Error=",error),{Reply:response?.data,_error:error,_debug:logger2.output}}logger2.debug(` Response
@@ -155,7 +155,7 @@ ${JSON.stringify(_error)}
155
155
  } catch (e) {
156
156
  throw e;
157
157
  }
158
- };`}async function zipCode(directory){return new Promise((resolve,reject)=>{zl.archiveFolder(directory,`${directory}.zip`).then(function(){resolve(`${directory}.zip`)},function(err){reject(err)})})}async function createOrUpdateLambdaFunction(functionName,zipFilePath,awsConfigs,envVariables){const client=new LambdaClient({region:awsConfigs.region,credentials:{accessKeyId:awsConfigs.accessKeyId,secretAccessKey:awsConfigs.secretAccessKey}}),functionContent=fs__default.readFileSync(zipFilePath);try{const exisitingFunction=await getDeployedFunction(functionName,awsConfigs);if(exisitingFunction){exisitingFunction.status==="InProgress"&&await verifyFunctionDeploymentStatus(functionName,client);const updateCodeParams={FunctionName:functionName,ZipFile:functionContent},updateFunctionCodeCommand=new UpdateFunctionCodeCommand(updateCodeParams);await client.send(updateFunctionCodeCommand),await verifyFunctionDeploymentStatus(functionName,client),envVariables&&Object.keys(envVariables).length&&(await updateLambdaFunctionConfiguration(client,functionName,envVariables),await verifyFunctionDeploymentStatus(functionName,client))}else{let roleArn="";try{const iamClient=new IAMClient({region:awsConfigs.region,credentials:{accessKeyId:awsConfigs.accessKeyId,secretAccessKey:awsConfigs.secretAccessKey}}),getRoleCommand=new GetRoleCommand({RoleName:`smyth-${functionName}-role`});roleArn=(await iamClient.send(getRoleCommand)).Role.Arn}catch(error){if(error.name==="NoSuchEntityException"){const iamClient=new IAMClient({region:awsConfigs.region,credentials:{accessKeyId:awsConfigs.accessKeyId,secretAccessKey:awsConfigs.secretAccessKey}}),createRoleCommand=new CreateRoleCommand({RoleName:`smyth-${functionName}-role`,AssumeRolePolicyDocument:getLambdaRolePolicy()}),roleResponse=await iamClient.send(createRoleCommand);await waitForRoleDeploymentStatus(`smyth-${functionName}-role`,iamClient),roleArn=roleResponse.Role.Arn}else throw error}const functionParams={Code:{ZipFile:functionContent},FunctionName:functionName,Handler:"index.handler",Role:roleArn,Runtime:Runtime.nodejs18x,Layers:[],Timeout:900,Tags:{"auto-delete":"true"},MemorySize:256,...envVariables&&Object.keys(envVariables).length?{Environment:{Variables:envVariables}}:{}},functionCreateCommand=new CreateFunctionCommand(functionParams),functionResponse=await client.send(functionCreateCommand);await verifyFunctionDeploymentStatus(functionName,client)}}catch(error){throw error}}function updateLambdaFunctionConfiguration(client,functionName,envVariables){const updateFunctionConfigurationParams={FunctionName:functionName,Environment:{Variables:envVariables}},updateFunctionConfigurationCommand=new UpdateFunctionConfigurationCommand(updateFunctionConfigurationParams);return client.send(updateFunctionConfigurationCommand)}async function waitForRoleDeploymentStatus(roleName,client){return new Promise((resolve,reject)=>{try{let interval=setInterval(async()=>{const getRoleCommand=new GetRoleCommand({RoleName:roleName});if((await client.send(getRoleCommand)).Role.AssumeRolePolicyDocument)return clearInterval(interval),resolve(!0)},7e3)}catch{return!1}})}async function verifyFunctionDeploymentStatus(functionName,client){return new Promise((resolve,reject)=>{try{let interval=setInterval(async()=>{const getFunctionCommand=new GetFunctionCommand({FunctionName:functionName});if((await client.send(getFunctionCommand)).Configuration.LastUpdateStatus==="Successful")return clearInterval(interval),resolve(!0)},5e3)}catch{return!1}})}function getLambdaRolePolicy(){return JSON.stringify({Version:"2012-10-17",Statement:[{Effect:"Allow",Principal:{Service:"lambda.amazonaws.com"},Action:"sts:AssumeRole"}]})}async function updateDeployedCodeTTL(agentId,componentId,ttl){await ConnectorService.getCacheConnector().user(AccessCandidate.agent(agentId)).updateTTL(`${cachePrefix}_${agentId}-${componentId}`,ttl)}async function invokeLambdaFunction(functionName,inputs,awsCredentials){try{const client=new LambdaClient({region:awsCredentials.region,...awsCredentials.accessKeyId&&{credentials:{accessKeyId:awsCredentials.accessKeyId,secretAccessKey:awsCredentials.secretAccessKey}}}),invokeCommand=new InvokeCommand({FunctionName:functionName,Payload:new TextEncoder().encode(`${JSON.stringify(inputs)}`),InvocationType:"RequestResponse"}),response=await client.send(invokeCommand);if(response.FunctionError)throw new Error(new TextDecoder().decode(response.Payload));return new TextDecoder().decode(response.Payload)}catch(error){throw error}}async function getDeployedFunction(functionName,awsConfigs){try{const client=new LambdaClient({region:awsConfigs.region,credentials:{accessKeyId:awsConfigs.accessKeyId,secretAccessKey:awsConfigs.secretAccessKey}}),getFunctionCommand=new GetFunctionCommand({FunctionName:functionName}),lambdaResponse=await client.send(getFunctionCommand);return{status:lambdaResponse.Configuration.LastUpdateStatus,functionName:lambdaResponse.Configuration.FunctionName,functionVersion:lambdaResponse.Configuration.Version,updatedAt:lambdaResponse.Configuration.LastModified,role:lambdaResponse.Configuration.Role,runtime:lambdaResponse.Configuration.Runtime,version:lambdaResponse.Configuration.Version}}catch{return null}}async function getLambdaCredentials(agent,config2){let awsAccessKeyId=null,awsSecretAccessKey=null,awsRegion=null,userProvidedKeys=!1;return config2.data.accessKeyId&&config2.data.secretAccessKey&&config2.data.region&&config2.data.use_own_keys&&(userProvidedKeys=!0,[awsAccessKeyId,awsSecretAccessKey]=await Promise.all([VaultHelper.getTeamKey(extractKeyFromTemplateVar(config2.data.accessKeyId),agent?.teamId),VaultHelper.getTeamKey(extractKeyFromTemplateVar(config2.data.secretAccessKey),agent?.teamId)]),awsRegion=config2.data.region),{accessKeyId:awsAccessKeyId,secretAccessKey:awsSecretAccessKey,region:awsRegion,isUserProvidedKeys:userProvidedKeys}}function calculateExecutionCost(executionTime){return executionTime/1e3*Number(PER_SECOND_COST)}function extractKeyFromTemplateVar(input){const regex=/\{\{KEY\((.*?)\)\}\}/,match=input.match(regex);return match?match[1]:input}function reportUsage({cost,agentId,teamId}){SystemEvents.emit("USAGE:API",{sourceId:"api:serverless_code.smyth",cost,agentId,teamId})}function validateAsyncMainFunction(rawCode){try{let extractPackageName=function(modulePath){return modulePath.startsWith("@")?modulePath.split("/").slice(0,2).join("/"):modulePath.split("/")[0]},processNodeForImports=function(node){if(node){if(node.type==="ImportDeclaration"){const modulePath=node.source.value;modulePath&&!modulePath.startsWith(".")&&!modulePath.startsWith("/")&&libraries.add(extractPackageName(modulePath))}if(node.type==="CallExpression"&&node.callee.type==="Identifier"&&node.callee.name==="require"&&node.arguments.length>0&&node.arguments[0].type==="Literal"){const modulePath=node.arguments[0].value;modulePath&&!modulePath.startsWith(".")&&!modulePath.startsWith("/")&&libraries.add(extractPackageName(modulePath))}if(node.type==="CallExpression"&&node.callee.type==="Import"&&node.arguments.length>0&&node.arguments[0].type==="Literal"){const modulePath=node.arguments[0].value;modulePath&&!modulePath.startsWith(".")&&!modulePath.startsWith("/")&&libraries.add(extractPackageName(modulePath))}for(const key in node)node[key]&&typeof node[key]=="object"&&(Array.isArray(node[key])?node[key].forEach(processNodeForImports):processNodeForImports(node[key]))}};const code=replaceVaultKeysTemplateVars(rawCode,{}),ast=acorn.parse(code,{ecmaVersion:"latest",sourceType:"module"}),libraries=new Set;processNodeForImports(ast);const dependencies=Array.from(libraries);let hasAsyncMain=!1,hasMain=!1,mainParameters=[];for(const node of ast.body)if(node.type==="FunctionDeclaration"){if(node.id?.name==="main"&&(hasMain=!0,node.async)){hasAsyncMain=!0,mainParameters=extractParameters(node.params);break}}else if(node.type==="VariableDeclaration"){for(const declarator of node.declarations)if(declarator.id.type==="Identifier"&&declarator.id.name==="main"&&(hasMain=!0,declarator.init)){if(declarator.init.type==="FunctionExpression"&&declarator.init.async){hasAsyncMain=!0,mainParameters=extractParameters(declarator.init.params);break}else if(declarator.init.type==="ArrowFunctionExpression"&&declarator.init.async){hasAsyncMain=!0,mainParameters=extractParameters(declarator.init.params);break}}}else if(node.type==="ExpressionStatement"&&node.expression.type==="AssignmentExpression"&&node.expression.left.type==="Identifier"&&node.expression.left.name==="main"){hasMain=!0;const right=node.expression.right;if((right.type==="FunctionExpression"||right.type==="ArrowFunctionExpression")&&right.async){hasAsyncMain=!0,mainParameters=extractParameters(right.params);break}}return hasMain?hasAsyncMain?{isValid:!0,parameters:mainParameters,dependencies}:{isValid:!1,error:"Main function exists but is not async",dependencies}:{isValid:!1,error:"No main function found at root level",dependencies}}catch(error){return{isValid:!1,error:`Failed to parse code: ${error.message}`}}}function extractParameters(params){return params.map(param=>param.type==="Identifier"?param.name:param.type==="AssignmentPattern"&&param.left.type==="Identifier"?param.left.name:param.type==="RestElement"&&param.argument.type==="Identifier"?param.argument.name:param.type==="ObjectPattern"?param.name||"[object]":param.type==="ArrayPattern"?"[array]":"[unknown]")}function generateCodeFromLegacyComponent(code_body,code_imports,codeInputs){return`
158
+ };`}async function zipCode(directory){return new Promise((resolve,reject)=>{zl.archiveFolder(directory,`${directory}.zip`).then(function(){resolve(`${directory}.zip`)},function(err){reject(err)})})}async function createOrUpdateLambdaFunction(functionName,zipFilePath,awsConfigs,envVariables){const client=new LambdaClient({region:awsConfigs.region,credentials:{accessKeyId:awsConfigs.accessKeyId,secretAccessKey:awsConfigs.secretAccessKey}}),functionContent=fs__default.readFileSync(zipFilePath);try{const exisitingFunction=await getDeployedFunction(functionName,awsConfigs);if(exisitingFunction){exisitingFunction.status==="InProgress"&&await verifyFunctionDeploymentStatus(functionName,client);const updateCodeParams={FunctionName:functionName,ZipFile:functionContent},updateFunctionCodeCommand=new UpdateFunctionCodeCommand(updateCodeParams);await client.send(updateFunctionCodeCommand),await verifyFunctionDeploymentStatus(functionName,client),envVariables&&Object.keys(envVariables).length&&(await updateLambdaFunctionConfiguration(client,functionName,envVariables),await verifyFunctionDeploymentStatus(functionName,client))}else{let roleArn="";try{const iamClient=new IAMClient({region:awsConfigs.region,credentials:{accessKeyId:awsConfigs.accessKeyId,secretAccessKey:awsConfigs.secretAccessKey}}),getRoleCommand=new GetRoleCommand({RoleName:`smyth-${functionName}-role`});roleArn=(await iamClient.send(getRoleCommand)).Role.Arn}catch(error){if(error.name==="NoSuchEntityException"){const iamClient=new IAMClient({region:awsConfigs.region,credentials:{accessKeyId:awsConfigs.accessKeyId,secretAccessKey:awsConfigs.secretAccessKey}}),createRoleCommand=new CreateRoleCommand({RoleName:`smyth-${functionName}-role`,AssumeRolePolicyDocument:getLambdaRolePolicy()}),roleResponse=await iamClient.send(createRoleCommand);await waitForRoleDeploymentStatus(`smyth-${functionName}-role`,iamClient),roleArn=roleResponse.Role.Arn}else throw error}const functionParams={Code:{ZipFile:functionContent},FunctionName:functionName,Handler:"index.handler",Role:roleArn,Runtime:Runtime.nodejs18x,Layers:[],Timeout:900,Tags:{"auto-delete":"true"},MemorySize:256,...envVariables&&Object.keys(envVariables).length?{Environment:{Variables:envVariables}}:{}},functionCreateCommand=new CreateFunctionCommand(functionParams);await client.send(functionCreateCommand),await verifyFunctionDeploymentStatus(functionName,client),await new Promise(resolve=>setTimeout(resolve,500))}}catch(error){throw error}}function updateLambdaFunctionConfiguration(client,functionName,envVariables){const updateFunctionConfigurationParams={FunctionName:functionName,Environment:{Variables:envVariables}},updateFunctionConfigurationCommand=new UpdateFunctionConfigurationCommand(updateFunctionConfigurationParams);return client.send(updateFunctionConfigurationCommand)}async function waitForRoleDeploymentStatus(roleName,client){return new Promise((resolve,reject)=>{try{let interval=setInterval(async()=>{const getRoleCommand=new GetRoleCommand({RoleName:roleName});if((await client.send(getRoleCommand)).Role.AssumeRolePolicyDocument)return clearInterval(interval),resolve(!0)},7e3)}catch{return!1}})}async function verifyFunctionDeploymentStatus(functionName,client){return new Promise((resolve,reject)=>{try{let interval=setInterval(async()=>{const getFunctionCommand=new GetFunctionCommand({FunctionName:functionName});if((await client.send(getFunctionCommand)).Configuration.LastUpdateStatus==="Successful")return clearInterval(interval),resolve(!0)},5e3)}catch{return!1}})}function getLambdaRolePolicy(){return JSON.stringify({Version:"2012-10-17",Statement:[{Effect:"Allow",Principal:{Service:"lambda.amazonaws.com"},Action:"sts:AssumeRole"}]})}async function updateDeployedCodeTTL(agentId,componentId,ttl){await ConnectorService.getCacheConnector().user(AccessCandidate.agent(agentId)).updateTTL(`${cachePrefix}_${agentId}-${componentId}`,ttl)}async function invokeLambdaFunction(functionName,inputs,awsCredentials){try{const client=new LambdaClient({region:awsCredentials.region,...awsCredentials.accessKeyId&&{credentials:{accessKeyId:awsCredentials.accessKeyId,secretAccessKey:awsCredentials.secretAccessKey}}}),invokeCommand=new InvokeCommand({FunctionName:functionName,Payload:new TextEncoder().encode(`${JSON.stringify(inputs)}`),InvocationType:"RequestResponse"}),response=await client.send(invokeCommand);if(response.FunctionError)throw new Error(new TextDecoder().decode(response.Payload));return new TextDecoder().decode(response.Payload)}catch(error){throw error}}async function getDeployedFunction(functionName,awsConfigs){try{const client=new LambdaClient({region:awsConfigs.region,credentials:{accessKeyId:awsConfigs.accessKeyId,secretAccessKey:awsConfigs.secretAccessKey}}),getFunctionCommand=new GetFunctionCommand({FunctionName:functionName}),lambdaResponse=await client.send(getFunctionCommand);return{status:lambdaResponse.Configuration.LastUpdateStatus,functionName:lambdaResponse.Configuration.FunctionName,functionVersion:lambdaResponse.Configuration.Version,updatedAt:lambdaResponse.Configuration.LastModified,role:lambdaResponse.Configuration.Role,runtime:lambdaResponse.Configuration.Runtime,version:lambdaResponse.Configuration.Version}}catch{return null}}async function getLambdaCredentials(agent,config2){let awsAccessKeyId=null,awsSecretAccessKey=null,awsRegion=null,userProvidedKeys=!1;return config2.data.accessKeyId&&config2.data.secretAccessKey&&config2.data.region&&config2.data.use_own_keys&&(userProvidedKeys=!0,[awsAccessKeyId,awsSecretAccessKey]=await Promise.all([VaultHelper.getTeamKey(extractKeyFromTemplateVar(config2.data.accessKeyId),agent?.teamId),VaultHelper.getTeamKey(extractKeyFromTemplateVar(config2.data.secretAccessKey),agent?.teamId)]),awsRegion=config2.data.region),{accessKeyId:awsAccessKeyId,secretAccessKey:awsSecretAccessKey,region:awsRegion,isUserProvidedKeys:userProvidedKeys}}function calculateExecutionCost(executionTime){return executionTime/1e3*Number(PER_SECOND_COST)}function extractKeyFromTemplateVar(input){const regex=/\{\{KEY\((.*?)\)\}\}/,match=input.match(regex);return match?match[1]:input}function reportUsage({cost,agentId,teamId}){SystemEvents.emit("USAGE:API",{sourceId:"api:serverless_code.smyth",cost,agentId,teamId})}function validateAsyncMainFunction(rawCode){try{let extractPackageName=function(modulePath){return modulePath.startsWith("@")?modulePath.split("/").slice(0,2).join("/"):modulePath.split("/")[0]},processNodeForImports=function(node){if(node){if(node.type==="ImportDeclaration"){const modulePath=node.source.value;modulePath&&!modulePath.startsWith(".")&&!modulePath.startsWith("/")&&libraries.add(extractPackageName(modulePath))}if(node.type==="CallExpression"&&node.callee.type==="Identifier"&&node.callee.name==="require"&&node.arguments.length>0&&node.arguments[0].type==="Literal"){const modulePath=node.arguments[0].value;modulePath&&!modulePath.startsWith(".")&&!modulePath.startsWith("/")&&libraries.add(extractPackageName(modulePath))}if(node.type==="CallExpression"&&node.callee.type==="Import"&&node.arguments.length>0&&node.arguments[0].type==="Literal"){const modulePath=node.arguments[0].value;modulePath&&!modulePath.startsWith(".")&&!modulePath.startsWith("/")&&libraries.add(extractPackageName(modulePath))}for(const key in node)node[key]&&typeof node[key]=="object"&&(Array.isArray(node[key])?node[key].forEach(processNodeForImports):processNodeForImports(node[key]))}};const code=replaceVaultKeysTemplateVars(rawCode,{}),ast=acorn.parse(code,{ecmaVersion:"latest",sourceType:"module"}),libraries=new Set;processNodeForImports(ast);const dependencies=Array.from(libraries);let hasAsyncMain=!1,hasMain=!1,mainParameters=[];for(const node of ast.body)if(node.type==="FunctionDeclaration"){if(node.id?.name==="main"&&(hasMain=!0,node.async)){hasAsyncMain=!0,mainParameters=extractParameters(node.params);break}}else if(node.type==="VariableDeclaration"){for(const declarator of node.declarations)if(declarator.id.type==="Identifier"&&declarator.id.name==="main"&&(hasMain=!0,declarator.init)){if(declarator.init.type==="FunctionExpression"&&declarator.init.async){hasAsyncMain=!0,mainParameters=extractParameters(declarator.init.params);break}else if(declarator.init.type==="ArrowFunctionExpression"&&declarator.init.async){hasAsyncMain=!0,mainParameters=extractParameters(declarator.init.params);break}}}else if(node.type==="ExpressionStatement"&&node.expression.type==="AssignmentExpression"&&node.expression.left.type==="Identifier"&&node.expression.left.name==="main"){hasMain=!0;const right=node.expression.right;if((right.type==="FunctionExpression"||right.type==="ArrowFunctionExpression")&&right.async){hasAsyncMain=!0,mainParameters=extractParameters(right.params);break}}return hasMain?hasAsyncMain?{isValid:!0,parameters:mainParameters,dependencies}:{isValid:!1,error:"Main function exists but is not async",dependencies}:{isValid:!1,error:"No main function found at root level",dependencies}}catch(error){return{isValid:!1,error:`Failed to parse code: ${error.message}`}}}function extractParameters(params){return params.map(param=>param.type==="Identifier"?param.name:param.type==="AssignmentPattern"&&param.left.type==="Identifier"?param.left.name:param.type==="RestElement"&&param.argument.type==="Identifier"?param.argument.name:param.type==="ObjectPattern"?param.name||"[object]":param.type==="ArrayPattern"?"[array]":"[unknown]")}function generateCodeFromLegacyComponent(code_body,code_imports,codeInputs){return`
159
159
  ${code_imports}
160
160
  async function main(${codeInputs.join(", ")}) {
161
161
  ${code_body}