@smythos/sre 1.5.50 → 1.5.52
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +98 -98
- package/LICENSE +18 -18
- package/README.md +135 -135
- package/dist/index.js +3 -3
- package/dist/index.js.map +1 -1
- package/dist/types/Components/APICall/AccessTokenManager.d.ts +3 -2
- package/dist/types/Components/APICall/OAuth.helper.d.ts +3 -2
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +6 -1
- package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +39 -0
- package/package.json +1 -1
- package/src/Components/APICall/APICall.class.ts +156 -156
- package/src/Components/APICall/AccessTokenManager.ts +166 -130
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
- package/src/Components/APICall/OAuth.helper.ts +446 -294
- package/src/Components/APICall/mimeTypeCategories.ts +46 -46
- package/src/Components/APICall/parseData.ts +167 -167
- package/src/Components/APICall/parseHeaders.ts +41 -41
- package/src/Components/APICall/parseProxy.ts +68 -68
- package/src/Components/APICall/parseUrl.ts +91 -91
- package/src/Components/APIEndpoint.class.ts +234 -234
- package/src/Components/APIOutput.class.ts +58 -58
- package/src/Components/AgentPlugin.class.ts +102 -102
- package/src/Components/Async.class.ts +155 -155
- package/src/Components/Await.class.ts +90 -90
- package/src/Components/Classifier.class.ts +158 -158
- package/src/Components/Component.class.ts +132 -132
- package/src/Components/ComponentHost.class.ts +38 -38
- package/src/Components/DataSourceCleaner.class.ts +92 -92
- package/src/Components/DataSourceIndexer.class.ts +181 -181
- package/src/Components/DataSourceLookup.class.ts +161 -161
- package/src/Components/ECMASandbox.class.ts +71 -71
- package/src/Components/FEncDec.class.ts +29 -29
- package/src/Components/FHash.class.ts +33 -33
- package/src/Components/FSign.class.ts +80 -80
- package/src/Components/FSleep.class.ts +25 -25
- package/src/Components/FTimestamp.class.ts +25 -25
- package/src/Components/FileStore.class.ts +78 -78
- package/src/Components/ForEach.class.ts +97 -97
- package/src/Components/GPTPlugin.class.ts +70 -70
- package/src/Components/GenAILLM.class.ts +586 -586
- package/src/Components/HuggingFace.class.ts +314 -314
- package/src/Components/Image/imageSettings.config.ts +70 -70
- package/src/Components/ImageGenerator.class.ts +502 -502
- package/src/Components/JSONFilter.class.ts +54 -54
- package/src/Components/LLMAssistant.class.ts +213 -213
- package/src/Components/LogicAND.class.ts +28 -28
- package/src/Components/LogicAtLeast.class.ts +85 -85
- package/src/Components/LogicAtMost.class.ts +86 -86
- package/src/Components/LogicOR.class.ts +29 -29
- package/src/Components/LogicXOR.class.ts +34 -34
- package/src/Components/MCPClient.class.ts +138 -138
- package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
- package/src/Components/MemoryReadKeyVal.class.ts +66 -66
- package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
- package/src/Components/MemoryWriteObject.class.ts +97 -97
- package/src/Components/MultimodalLLM.class.ts +128 -128
- package/src/Components/OpenAPI.class.ts +72 -72
- package/src/Components/PromptGenerator.class.ts +122 -122
- package/src/Components/ScrapflyWebScrape.class.ts +159 -159
- package/src/Components/ServerlessCode.class.ts +123 -123
- package/src/Components/TavilyWebSearch.class.ts +98 -98
- package/src/Components/VisionLLM.class.ts +104 -104
- package/src/Components/ZapierAction.class.ts +127 -127
- package/src/Components/index.ts +97 -97
- package/src/Core/AgentProcess.helper.ts +240 -240
- package/src/Core/Connector.class.ts +123 -123
- package/src/Core/ConnectorsService.ts +197 -197
- package/src/Core/DummyConnector.ts +49 -49
- package/src/Core/HookService.ts +105 -105
- package/src/Core/SmythRuntime.class.ts +235 -235
- package/src/Core/SystemEvents.ts +16 -16
- package/src/Core/boot.ts +56 -56
- package/src/config.ts +15 -15
- package/src/constants.ts +126 -126
- package/src/data/hugging-face.params.json +579 -579
- package/src/helpers/AWSLambdaCode.helper.ts +590 -587
- package/src/helpers/BinaryInput.helper.ts +331 -331
- package/src/helpers/Conversation.helper.ts +1119 -1119
- package/src/helpers/ECMASandbox.helper.ts +54 -54
- package/src/helpers/JsonContent.helper.ts +97 -97
- package/src/helpers/LocalCache.helper.ts +97 -97
- package/src/helpers/Log.helper.ts +274 -274
- package/src/helpers/OpenApiParser.helper.ts +150 -150
- package/src/helpers/S3Cache.helper.ts +147 -147
- package/src/helpers/SmythURI.helper.ts +5 -5
- package/src/helpers/Sysconfig.helper.ts +77 -77
- package/src/helpers/TemplateString.helper.ts +243 -243
- package/src/helpers/TypeChecker.helper.ts +329 -329
- package/src/index.ts +3 -3
- package/src/index.ts.bak +3 -3
- package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
- package/src/subsystems/AgentManager/AgentLogger.class.ts +297 -297
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
- package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
- package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
- package/src/subsystems/IO/CLI.service/index.ts +9 -9
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
- package/src/subsystems/IO/Log.service/index.ts +13 -13
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
- package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
- package/src/subsystems/IO/NKV.service/index.ts +14 -14
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
- package/src/subsystems/IO/Router.service/index.ts +11 -11
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
- package/src/subsystems/IO/Storage.service/index.ts +13 -13
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
- package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
- package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
- package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
- package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
- package/src/subsystems/LLMManager/custom-models.ts +854 -854
- package/src/subsystems/LLMManager/models.ts +2540 -2540
- package/src/subsystems/LLMManager/paramMappings.ts +69 -69
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
- package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
- package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
- package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
- package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
- package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
- package/src/subsystems/Security/Account.service/index.ts +14 -14
- package/src/subsystems/Security/Credentials.helper.ts +62 -62
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
- package/src/subsystems/Security/SecureConnector.class.ts +110 -110
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
- package/src/subsystems/Security/Vault.service/index.ts +12 -12
- package/src/types/ACL.types.ts +104 -104
- package/src/types/AWS.types.ts +10 -10
- package/src/types/Agent.types.ts +61 -61
- package/src/types/AgentLogger.types.ts +17 -17
- package/src/types/Cache.types.ts +1 -1
- package/src/types/Common.types.ts +2 -2
- package/src/types/LLM.types.ts +496 -496
- package/src/types/Redis.types.ts +8 -8
- package/src/types/SRE.types.ts +64 -64
- package/src/types/Security.types.ts +14 -14
- package/src/types/Storage.types.ts +5 -5
- package/src/types/VectorDB.types.ts +86 -86
- package/src/utils/base64.utils.ts +275 -275
- package/src/utils/cli.utils.ts +68 -68
- package/src/utils/data.utils.ts +322 -322
- package/src/utils/date-time.utils.ts +22 -22
- package/src/utils/general.utils.ts +238 -238
- package/src/utils/index.ts +12 -12
- package/src/utils/lazy-client.ts +261 -261
- package/src/utils/numbers.utils.ts +13 -13
- package/src/utils/oauth.utils.ts +35 -35
- package/src/utils/string.utils.ts +414 -414
- package/src/utils/url.utils.ts +19 -19
- package/src/utils/validation.utils.ts +74 -74
- package/dist/bundle-analysis-lazy.html +0 -4949
- package/dist/bundle-analysis.html +0 -4949
- package/dist/types/utils/package-manager.utils.d.ts +0 -26
|
@@ -1,29 +1,29 @@
|
|
|
1
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
2
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
3
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
4
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
5
|
-
import { IAccessCandidate, IACL } from '@sre/types/ACL.types';
|
|
6
|
-
|
|
7
|
-
export interface IVaultRequest {
|
|
8
|
-
get(keyId: string): Promise<string>;
|
|
9
|
-
exists(keyId: string): Promise<boolean>;
|
|
10
|
-
listKeys(): Promise<string[]>;
|
|
11
|
-
}
|
|
12
|
-
|
|
13
|
-
export abstract class VaultConnector extends SecureConnector {
|
|
14
|
-
constructor(protected _settings?: any) {
|
|
15
|
-
super(_settings);
|
|
16
|
-
}
|
|
17
|
-
requester(candidate: AccessCandidate): IVaultRequest {
|
|
18
|
-
return {
|
|
19
|
-
get: async (keyId: string) => this.get(candidate.readRequest, keyId),
|
|
20
|
-
exists: async (keyId: string) => this.exists(candidate.readRequest, keyId),
|
|
21
|
-
listKeys: async () => this.listKeys(candidate.readRequest),
|
|
22
|
-
};
|
|
23
|
-
}
|
|
24
|
-
|
|
25
|
-
public abstract getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL>;
|
|
26
|
-
protected abstract get(acRequest: AccessRequest, keyId: string): Promise<string>;
|
|
27
|
-
protected abstract exists(acRequest: AccessRequest, keyId: string): Promise<boolean>;
|
|
28
|
-
protected abstract listKeys(acRequest: AccessRequest): Promise<string[]>;
|
|
29
|
-
}
|
|
1
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
2
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
3
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
4
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
5
|
+
import { IAccessCandidate, IACL } from '@sre/types/ACL.types';
|
|
6
|
+
|
|
7
|
+
export interface IVaultRequest {
|
|
8
|
+
get(keyId: string): Promise<string>;
|
|
9
|
+
exists(keyId: string): Promise<boolean>;
|
|
10
|
+
listKeys(): Promise<string[]>;
|
|
11
|
+
}
|
|
12
|
+
|
|
13
|
+
export abstract class VaultConnector extends SecureConnector {
|
|
14
|
+
constructor(protected _settings?: any) {
|
|
15
|
+
super(_settings);
|
|
16
|
+
}
|
|
17
|
+
requester(candidate: AccessCandidate): IVaultRequest {
|
|
18
|
+
return {
|
|
19
|
+
get: async (keyId: string) => this.get(candidate.readRequest, keyId),
|
|
20
|
+
exists: async (keyId: string) => this.exists(candidate.readRequest, keyId),
|
|
21
|
+
listKeys: async () => this.listKeys(candidate.readRequest),
|
|
22
|
+
};
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
public abstract getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL>;
|
|
26
|
+
protected abstract get(acRequest: AccessRequest, keyId: string): Promise<string>;
|
|
27
|
+
protected abstract exists(acRequest: AccessRequest, keyId: string): Promise<boolean>;
|
|
28
|
+
protected abstract listKeys(acRequest: AccessRequest): Promise<string[]>;
|
|
29
|
+
}
|
|
@@ -1,46 +1,46 @@
|
|
|
1
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
4
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
6
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
7
|
-
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
8
|
-
import { IVaultRequest, VaultConnector } from '../VaultConnector';
|
|
9
|
-
|
|
10
|
-
const console = Logger('HashicorpVault');
|
|
11
|
-
export class HashicorpVault extends VaultConnector {
|
|
12
|
-
public name: string = 'HashicorpVault';
|
|
13
|
-
|
|
14
|
-
constructor(protected _settings: any) {
|
|
15
|
-
super(_settings);
|
|
16
|
-
//hashicorp client/api
|
|
17
|
-
}
|
|
18
|
-
|
|
19
|
-
@SecureConnector.AccessControl
|
|
20
|
-
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
21
|
-
return null;
|
|
22
|
-
}
|
|
23
|
-
|
|
24
|
-
@SecureConnector.AccessControl
|
|
25
|
-
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
26
|
-
return false;
|
|
27
|
-
}
|
|
28
|
-
|
|
29
|
-
@SecureConnector.AccessControl
|
|
30
|
-
protected async listKeys(acRequest: AccessRequest) {
|
|
31
|
-
return [];
|
|
32
|
-
}
|
|
33
|
-
|
|
34
|
-
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
35
|
-
//FIXME : this is for dev, it always give full access, we must update the logic
|
|
36
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
37
|
-
const teamId = await accountConnector.getCandidateTeam(candidate);
|
|
38
|
-
const acl = new ACL();
|
|
39
|
-
|
|
40
|
-
acl.addAccess(TAccessRole.Team, teamId, TAccessLevel.Owner)
|
|
41
|
-
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Read)
|
|
42
|
-
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Write);
|
|
43
|
-
|
|
44
|
-
return acl;
|
|
45
|
-
}
|
|
46
|
-
}
|
|
1
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
4
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
6
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
7
|
+
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
8
|
+
import { IVaultRequest, VaultConnector } from '../VaultConnector';
|
|
9
|
+
|
|
10
|
+
const console = Logger('HashicorpVault');
|
|
11
|
+
export class HashicorpVault extends VaultConnector {
|
|
12
|
+
public name: string = 'HashicorpVault';
|
|
13
|
+
|
|
14
|
+
constructor(protected _settings: any) {
|
|
15
|
+
super(_settings);
|
|
16
|
+
//hashicorp client/api
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
@SecureConnector.AccessControl
|
|
20
|
+
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
21
|
+
return null;
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
@SecureConnector.AccessControl
|
|
25
|
+
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
26
|
+
return false;
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
@SecureConnector.AccessControl
|
|
30
|
+
protected async listKeys(acRequest: AccessRequest) {
|
|
31
|
+
return [];
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
35
|
+
//FIXME : this is for dev, it always give full access, we must update the logic
|
|
36
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
37
|
+
const teamId = await accountConnector.getCandidateTeam(candidate);
|
|
38
|
+
const acl = new ACL();
|
|
39
|
+
|
|
40
|
+
acl.addAccess(TAccessRole.Team, teamId, TAccessLevel.Owner)
|
|
41
|
+
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Read)
|
|
42
|
+
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Write);
|
|
43
|
+
|
|
44
|
+
return acl;
|
|
45
|
+
}
|
|
46
|
+
}
|
|
@@ -1,221 +1,221 @@
|
|
|
1
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
-
import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
5
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
6
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
7
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
8
|
-
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
9
|
-
import { EncryptionSettings } from '@sre/types/Security.types';
|
|
10
|
-
import { IVaultRequest, VaultConnector } from '../VaultConnector';
|
|
11
|
-
import os from 'os';
|
|
12
|
-
import crypto from 'crypto';
|
|
13
|
-
import fs from 'fs';
|
|
14
|
-
import * as readlineSync from 'readline-sync';
|
|
15
|
-
import path from 'path';
|
|
16
|
-
import * as chokidar from 'chokidar';
|
|
17
|
-
import { findSmythPath } from '../../../../helpers/Sysconfig.helper';
|
|
18
|
-
|
|
19
|
-
const console = Logger('JSONFileVault');
|
|
20
|
-
|
|
21
|
-
export type JSONFileVaultConfig = {
|
|
22
|
-
file?: string;
|
|
23
|
-
fileKey?: string;
|
|
24
|
-
shared?: string;
|
|
25
|
-
};
|
|
26
|
-
|
|
27
|
-
export class JSONFileVault extends VaultConnector {
|
|
28
|
-
public name: string = 'JSONFileVault';
|
|
29
|
-
private vaultData: any;
|
|
30
|
-
private index: any;
|
|
31
|
-
private shared: string;
|
|
32
|
-
private vaultFile: string;
|
|
33
|
-
private watcher: chokidar.FSWatcher | null = null;
|
|
34
|
-
|
|
35
|
-
constructor(protected _settings: JSONFileVaultConfig) {
|
|
36
|
-
super(_settings);
|
|
37
|
-
//if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
|
|
38
|
-
|
|
39
|
-
this.shared = _settings.shared || ''; //if config.shared, all keys are accessible to all teams, and they are set under the 'shared' teamId
|
|
40
|
-
|
|
41
|
-
this.vaultFile = this.findVaultFile(_settings.file);
|
|
42
|
-
this.fetchVaultData(this.vaultFile, _settings);
|
|
43
|
-
this.initFileWatcher();
|
|
44
|
-
}
|
|
45
|
-
|
|
46
|
-
private findVaultFile(vaultFile) {
|
|
47
|
-
let _vaultFile = vaultFile;
|
|
48
|
-
|
|
49
|
-
if (fs.existsSync(_vaultFile)) {
|
|
50
|
-
return _vaultFile;
|
|
51
|
-
}
|
|
52
|
-
console.warn('Vault file not found in:', _vaultFile);
|
|
53
|
-
|
|
54
|
-
//try to find the .smyth directory and check if it contains a valid vault
|
|
55
|
-
|
|
56
|
-
_vaultFile = findSmythPath('.sre/vault.json', (dir, success, nextDir) => {
|
|
57
|
-
if (!success) {
|
|
58
|
-
console.warn('Vault file not found in:', nextDir);
|
|
59
|
-
}
|
|
60
|
-
});
|
|
61
|
-
|
|
62
|
-
if (fs.existsSync(_vaultFile)) {
|
|
63
|
-
console.warn('Using alternative vault file found in : ', _vaultFile);
|
|
64
|
-
return _vaultFile;
|
|
65
|
-
}
|
|
66
|
-
|
|
67
|
-
console.warn('!!! All attempts to find the vault file failed !!!');
|
|
68
|
-
console.warn('!!! Will continue without vault !!!');
|
|
69
|
-
console.warn('!!! Many features might not work !!!');
|
|
70
|
-
|
|
71
|
-
return null;
|
|
72
|
-
}
|
|
73
|
-
|
|
74
|
-
private getMasterKeyInteractive(): string {
|
|
75
|
-
//read master key using readline-sync (blocking)
|
|
76
|
-
|
|
77
|
-
process.stdout.write('\x1b[1;37m===[ Encrypted Vault Detected ]=================================\x1b[0m\n');
|
|
78
|
-
const masterKey = readlineSync.question('Enter master key: ', {
|
|
79
|
-
hideEchoBack: true,
|
|
80
|
-
mask: '*',
|
|
81
|
-
});
|
|
82
|
-
console.info('Master key entered');
|
|
83
|
-
return masterKey;
|
|
84
|
-
}
|
|
85
|
-
|
|
86
|
-
/**
|
|
87
|
-
* Resolves environment variable references in vault values.
|
|
88
|
-
* Supports syntax: $env(VARIABLE_NAME)
|
|
89
|
-
* @param value The value to process
|
|
90
|
-
* @returns The value with environment variables resolved
|
|
91
|
-
*/
|
|
92
|
-
private resolveEnvironmentVariables(value: any): any {
|
|
93
|
-
if (typeof value !== 'string') {
|
|
94
|
-
return value;
|
|
95
|
-
}
|
|
96
|
-
|
|
97
|
-
// Match $env(VARIABLE_NAME) pattern
|
|
98
|
-
const envVarPattern = /\$env\(([^)]+)\)/g;
|
|
99
|
-
|
|
100
|
-
return value.replace(envVarPattern, (match, envVarName) => {
|
|
101
|
-
const envValue = process.env[envVarName];
|
|
102
|
-
if (envValue === undefined) {
|
|
103
|
-
console.warn(`Environment variable ${envVarName} not found, keeping original value: ${match}`);
|
|
104
|
-
return match;
|
|
105
|
-
}
|
|
106
|
-
return envValue;
|
|
107
|
-
});
|
|
108
|
-
}
|
|
109
|
-
|
|
110
|
-
@SecureConnector.AccessControl
|
|
111
|
-
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
112
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
113
|
-
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
114
|
-
|
|
115
|
-
const rawValue = this.vaultData?.[teamId]?.[keyId] || this.vaultData?.[this.shared]?.[keyId];
|
|
116
|
-
|
|
117
|
-
// Resolve environment variables if the value contains $env() references
|
|
118
|
-
return this.resolveEnvironmentVariables(rawValue);
|
|
119
|
-
}
|
|
120
|
-
|
|
121
|
-
@SecureConnector.AccessControl
|
|
122
|
-
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
123
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
124
|
-
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
125
|
-
return !!(this.vaultData?.[teamId]?.[keyId] || this.vaultData?.[this.shared]?.[keyId]);
|
|
126
|
-
}
|
|
127
|
-
|
|
128
|
-
@SecureConnector.AccessControl
|
|
129
|
-
protected async listKeys(acRequest: AccessRequest) {
|
|
130
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
131
|
-
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
132
|
-
return Object.keys(this.vaultData?.[teamId] || this.vaultData?.[this.shared] || {});
|
|
133
|
-
}
|
|
134
|
-
|
|
135
|
-
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
136
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
137
|
-
const teamId = /*this.sharedVault ? 'shared' : */ await accountConnector.getCandidateTeam(candidate);
|
|
138
|
-
|
|
139
|
-
const acl = new ACL();
|
|
140
|
-
|
|
141
|
-
if (resourceId && typeof this.vaultData?.[teamId]?.[resourceId] !== 'string') {
|
|
142
|
-
if (this.shared && typeof this.vaultData?.[this.shared]?.[resourceId] === 'string') {
|
|
143
|
-
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
144
|
-
}
|
|
145
|
-
|
|
146
|
-
return acl;
|
|
147
|
-
}
|
|
148
|
-
|
|
149
|
-
acl.addAccess(TAccessRole.Team, teamId, TAccessLevel.Owner)
|
|
150
|
-
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Read)
|
|
151
|
-
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Write);
|
|
152
|
-
|
|
153
|
-
if (this.shared && typeof this.vaultData?.[this.shared]?.[resourceId] === 'string') {
|
|
154
|
-
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
155
|
-
}
|
|
156
|
-
|
|
157
|
-
return acl;
|
|
158
|
-
}
|
|
159
|
-
|
|
160
|
-
private fetchVaultData(vaultFile: string, _settings: JSONFileVaultConfig) {
|
|
161
|
-
if (fs.existsSync(vaultFile)) {
|
|
162
|
-
try {
|
|
163
|
-
if (_settings.fileKey && fs.existsSync(_settings.fileKey)) {
|
|
164
|
-
try {
|
|
165
|
-
const privateKey = fs.readFileSync(_settings.fileKey, 'utf8');
|
|
166
|
-
const encryptedVault = fs.readFileSync(vaultFile, 'utf8').toString();
|
|
167
|
-
const decryptedBuffer = crypto.privateDecrypt(
|
|
168
|
-
{
|
|
169
|
-
key: privateKey,
|
|
170
|
-
padding: crypto.constants.RSA_PKCS1_OAEP_PADDING,
|
|
171
|
-
},
|
|
172
|
-
Buffer.from(encryptedVault, 'base64')
|
|
173
|
-
);
|
|
174
|
-
this.vaultData = JSON.parse(decryptedBuffer.toString('utf8'));
|
|
175
|
-
} catch (error) {
|
|
176
|
-
throw new Error('Failed to decrypt vault');
|
|
177
|
-
}
|
|
178
|
-
} else {
|
|
179
|
-
this.vaultData = JSON.parse(fs.readFileSync(vaultFile).toString());
|
|
180
|
-
}
|
|
181
|
-
} catch (e) {
|
|
182
|
-
console.error('Error parsing vault file:', e);
|
|
183
|
-
console.error('!!! Vault features might not work properly !!!');
|
|
184
|
-
this.vaultData = {};
|
|
185
|
-
}
|
|
186
|
-
|
|
187
|
-
if (this.vaultData?.encrypted && this.vaultData?.algorithm && this.vaultData?.data) {
|
|
188
|
-
//this is an encrypted vault we need to request the master key
|
|
189
|
-
this.setInteraction(this.getMasterKeyInteractive.bind(this));
|
|
190
|
-
}
|
|
191
|
-
|
|
192
|
-
for (let teamId in this.vaultData) {
|
|
193
|
-
for (let resourceId in this.vaultData[teamId]) {
|
|
194
|
-
if (!this.index) this.index = {};
|
|
195
|
-
if (!this.index[resourceId]) this.index[resourceId] = {};
|
|
196
|
-
const value = this.vaultData[teamId][resourceId];
|
|
197
|
-
this.index[resourceId][teamId] = value;
|
|
198
|
-
}
|
|
199
|
-
}
|
|
200
|
-
}
|
|
201
|
-
}
|
|
202
|
-
|
|
203
|
-
private initFileWatcher() {
|
|
204
|
-
this.watcher = chokidar.watch(this.vaultFile, {
|
|
205
|
-
persistent: false, // Don't keep the process running
|
|
206
|
-
ignoreInitial: true,
|
|
207
|
-
});
|
|
208
|
-
|
|
209
|
-
this.watcher.on('change', () => {
|
|
210
|
-
this.fetchVaultData(this.vaultFile, this._settings);
|
|
211
|
-
});
|
|
212
|
-
}
|
|
213
|
-
|
|
214
|
-
public async stop() {
|
|
215
|
-
super.stop();
|
|
216
|
-
if (this.watcher) {
|
|
217
|
-
this.watcher.close();
|
|
218
|
-
this.watcher = null;
|
|
219
|
-
}
|
|
220
|
-
}
|
|
221
|
-
}
|
|
1
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
+
import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
5
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
6
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
7
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
8
|
+
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
9
|
+
import { EncryptionSettings } from '@sre/types/Security.types';
|
|
10
|
+
import { IVaultRequest, VaultConnector } from '../VaultConnector';
|
|
11
|
+
import os from 'os';
|
|
12
|
+
import crypto from 'crypto';
|
|
13
|
+
import fs from 'fs';
|
|
14
|
+
import * as readlineSync from 'readline-sync';
|
|
15
|
+
import path from 'path';
|
|
16
|
+
import * as chokidar from 'chokidar';
|
|
17
|
+
import { findSmythPath } from '../../../../helpers/Sysconfig.helper';
|
|
18
|
+
|
|
19
|
+
const console = Logger('JSONFileVault');
|
|
20
|
+
|
|
21
|
+
export type JSONFileVaultConfig = {
|
|
22
|
+
file?: string;
|
|
23
|
+
fileKey?: string;
|
|
24
|
+
shared?: string;
|
|
25
|
+
};
|
|
26
|
+
|
|
27
|
+
export class JSONFileVault extends VaultConnector {
|
|
28
|
+
public name: string = 'JSONFileVault';
|
|
29
|
+
private vaultData: any;
|
|
30
|
+
private index: any;
|
|
31
|
+
private shared: string;
|
|
32
|
+
private vaultFile: string;
|
|
33
|
+
private watcher: chokidar.FSWatcher | null = null;
|
|
34
|
+
|
|
35
|
+
constructor(protected _settings: JSONFileVaultConfig) {
|
|
36
|
+
super(_settings);
|
|
37
|
+
//if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
|
|
38
|
+
|
|
39
|
+
this.shared = _settings.shared || ''; //if config.shared, all keys are accessible to all teams, and they are set under the 'shared' teamId
|
|
40
|
+
|
|
41
|
+
this.vaultFile = this.findVaultFile(_settings.file);
|
|
42
|
+
this.fetchVaultData(this.vaultFile, _settings);
|
|
43
|
+
this.initFileWatcher();
|
|
44
|
+
}
|
|
45
|
+
|
|
46
|
+
private findVaultFile(vaultFile) {
|
|
47
|
+
let _vaultFile = vaultFile;
|
|
48
|
+
|
|
49
|
+
if (fs.existsSync(_vaultFile)) {
|
|
50
|
+
return _vaultFile;
|
|
51
|
+
}
|
|
52
|
+
console.warn('Vault file not found in:', _vaultFile);
|
|
53
|
+
|
|
54
|
+
//try to find the .smyth directory and check if it contains a valid vault
|
|
55
|
+
|
|
56
|
+
_vaultFile = findSmythPath('.sre/vault.json', (dir, success, nextDir) => {
|
|
57
|
+
if (!success) {
|
|
58
|
+
console.warn('Vault file not found in:', nextDir);
|
|
59
|
+
}
|
|
60
|
+
});
|
|
61
|
+
|
|
62
|
+
if (fs.existsSync(_vaultFile)) {
|
|
63
|
+
console.warn('Using alternative vault file found in : ', _vaultFile);
|
|
64
|
+
return _vaultFile;
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
console.warn('!!! All attempts to find the vault file failed !!!');
|
|
68
|
+
console.warn('!!! Will continue without vault !!!');
|
|
69
|
+
console.warn('!!! Many features might not work !!!');
|
|
70
|
+
|
|
71
|
+
return null;
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
private getMasterKeyInteractive(): string {
|
|
75
|
+
//read master key using readline-sync (blocking)
|
|
76
|
+
|
|
77
|
+
process.stdout.write('\x1b[1;37m===[ Encrypted Vault Detected ]=================================\x1b[0m\n');
|
|
78
|
+
const masterKey = readlineSync.question('Enter master key: ', {
|
|
79
|
+
hideEchoBack: true,
|
|
80
|
+
mask: '*',
|
|
81
|
+
});
|
|
82
|
+
console.info('Master key entered');
|
|
83
|
+
return masterKey;
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
/**
|
|
87
|
+
* Resolves environment variable references in vault values.
|
|
88
|
+
* Supports syntax: $env(VARIABLE_NAME)
|
|
89
|
+
* @param value The value to process
|
|
90
|
+
* @returns The value with environment variables resolved
|
|
91
|
+
*/
|
|
92
|
+
private resolveEnvironmentVariables(value: any): any {
|
|
93
|
+
if (typeof value !== 'string') {
|
|
94
|
+
return value;
|
|
95
|
+
}
|
|
96
|
+
|
|
97
|
+
// Match $env(VARIABLE_NAME) pattern
|
|
98
|
+
const envVarPattern = /\$env\(([^)]+)\)/g;
|
|
99
|
+
|
|
100
|
+
return value.replace(envVarPattern, (match, envVarName) => {
|
|
101
|
+
const envValue = process.env[envVarName];
|
|
102
|
+
if (envValue === undefined) {
|
|
103
|
+
console.warn(`Environment variable ${envVarName} not found, keeping original value: ${match}`);
|
|
104
|
+
return match;
|
|
105
|
+
}
|
|
106
|
+
return envValue;
|
|
107
|
+
});
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
@SecureConnector.AccessControl
|
|
111
|
+
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
112
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
113
|
+
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
114
|
+
|
|
115
|
+
const rawValue = this.vaultData?.[teamId]?.[keyId] || this.vaultData?.[this.shared]?.[keyId];
|
|
116
|
+
|
|
117
|
+
// Resolve environment variables if the value contains $env() references
|
|
118
|
+
return this.resolveEnvironmentVariables(rawValue);
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
@SecureConnector.AccessControl
|
|
122
|
+
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
123
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
124
|
+
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
125
|
+
return !!(this.vaultData?.[teamId]?.[keyId] || this.vaultData?.[this.shared]?.[keyId]);
|
|
126
|
+
}
|
|
127
|
+
|
|
128
|
+
@SecureConnector.AccessControl
|
|
129
|
+
protected async listKeys(acRequest: AccessRequest) {
|
|
130
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
131
|
+
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
132
|
+
return Object.keys(this.vaultData?.[teamId] || this.vaultData?.[this.shared] || {});
|
|
133
|
+
}
|
|
134
|
+
|
|
135
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
136
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
137
|
+
const teamId = /*this.sharedVault ? 'shared' : */ await accountConnector.getCandidateTeam(candidate);
|
|
138
|
+
|
|
139
|
+
const acl = new ACL();
|
|
140
|
+
|
|
141
|
+
if (resourceId && typeof this.vaultData?.[teamId]?.[resourceId] !== 'string') {
|
|
142
|
+
if (this.shared && typeof this.vaultData?.[this.shared]?.[resourceId] === 'string') {
|
|
143
|
+
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
return acl;
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
acl.addAccess(TAccessRole.Team, teamId, TAccessLevel.Owner)
|
|
150
|
+
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Read)
|
|
151
|
+
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Write);
|
|
152
|
+
|
|
153
|
+
if (this.shared && typeof this.vaultData?.[this.shared]?.[resourceId] === 'string') {
|
|
154
|
+
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
155
|
+
}
|
|
156
|
+
|
|
157
|
+
return acl;
|
|
158
|
+
}
|
|
159
|
+
|
|
160
|
+
private fetchVaultData(vaultFile: string, _settings: JSONFileVaultConfig) {
|
|
161
|
+
if (fs.existsSync(vaultFile)) {
|
|
162
|
+
try {
|
|
163
|
+
if (_settings.fileKey && fs.existsSync(_settings.fileKey)) {
|
|
164
|
+
try {
|
|
165
|
+
const privateKey = fs.readFileSync(_settings.fileKey, 'utf8');
|
|
166
|
+
const encryptedVault = fs.readFileSync(vaultFile, 'utf8').toString();
|
|
167
|
+
const decryptedBuffer = crypto.privateDecrypt(
|
|
168
|
+
{
|
|
169
|
+
key: privateKey,
|
|
170
|
+
padding: crypto.constants.RSA_PKCS1_OAEP_PADDING,
|
|
171
|
+
},
|
|
172
|
+
Buffer.from(encryptedVault, 'base64')
|
|
173
|
+
);
|
|
174
|
+
this.vaultData = JSON.parse(decryptedBuffer.toString('utf8'));
|
|
175
|
+
} catch (error) {
|
|
176
|
+
throw new Error('Failed to decrypt vault');
|
|
177
|
+
}
|
|
178
|
+
} else {
|
|
179
|
+
this.vaultData = JSON.parse(fs.readFileSync(vaultFile).toString());
|
|
180
|
+
}
|
|
181
|
+
} catch (e) {
|
|
182
|
+
console.error('Error parsing vault file:', e);
|
|
183
|
+
console.error('!!! Vault features might not work properly !!!');
|
|
184
|
+
this.vaultData = {};
|
|
185
|
+
}
|
|
186
|
+
|
|
187
|
+
if (this.vaultData?.encrypted && this.vaultData?.algorithm && this.vaultData?.data) {
|
|
188
|
+
//this is an encrypted vault we need to request the master key
|
|
189
|
+
this.setInteraction(this.getMasterKeyInteractive.bind(this));
|
|
190
|
+
}
|
|
191
|
+
|
|
192
|
+
for (let teamId in this.vaultData) {
|
|
193
|
+
for (let resourceId in this.vaultData[teamId]) {
|
|
194
|
+
if (!this.index) this.index = {};
|
|
195
|
+
if (!this.index[resourceId]) this.index[resourceId] = {};
|
|
196
|
+
const value = this.vaultData[teamId][resourceId];
|
|
197
|
+
this.index[resourceId][teamId] = value;
|
|
198
|
+
}
|
|
199
|
+
}
|
|
200
|
+
}
|
|
201
|
+
}
|
|
202
|
+
|
|
203
|
+
private initFileWatcher() {
|
|
204
|
+
this.watcher = chokidar.watch(this.vaultFile, {
|
|
205
|
+
persistent: false, // Don't keep the process running
|
|
206
|
+
ignoreInitial: true,
|
|
207
|
+
});
|
|
208
|
+
|
|
209
|
+
this.watcher.on('change', () => {
|
|
210
|
+
this.fetchVaultData(this.vaultFile, this._settings);
|
|
211
|
+
});
|
|
212
|
+
}
|
|
213
|
+
|
|
214
|
+
public async stop() {
|
|
215
|
+
super.stop();
|
|
216
|
+
if (this.watcher) {
|
|
217
|
+
this.watcher.close();
|
|
218
|
+
this.watcher = null;
|
|
219
|
+
}
|
|
220
|
+
}
|
|
221
|
+
}
|