@smythos/sre 1.5.53 → 1.5.54

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (223) hide show
  1. package/CHANGELOG +98 -98
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/bundle-analysis-lazy.html +4949 -0
  5. package/dist/bundle-analysis.html +4949 -0
  6. package/dist/index.js +3 -3
  7. package/dist/index.js.map +1 -1
  8. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +1 -6
  9. package/dist/types/utils/package-manager.utils.d.ts +26 -0
  10. package/package.json +1 -1
  11. package/src/Components/APICall/APICall.class.ts +157 -157
  12. package/src/Components/APICall/AccessTokenManager.ts +166 -166
  13. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  14. package/src/Components/APICall/OAuth.helper.ts +447 -447
  15. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  16. package/src/Components/APICall/parseData.ts +167 -167
  17. package/src/Components/APICall/parseHeaders.ts +41 -41
  18. package/src/Components/APICall/parseProxy.ts +68 -68
  19. package/src/Components/APICall/parseUrl.ts +91 -91
  20. package/src/Components/APIEndpoint.class.ts +234 -234
  21. package/src/Components/APIOutput.class.ts +58 -58
  22. package/src/Components/AgentPlugin.class.ts +102 -102
  23. package/src/Components/Async.class.ts +155 -155
  24. package/src/Components/Await.class.ts +90 -90
  25. package/src/Components/Classifier.class.ts +158 -158
  26. package/src/Components/Component.class.ts +132 -132
  27. package/src/Components/ComponentHost.class.ts +38 -38
  28. package/src/Components/DataSourceCleaner.class.ts +92 -92
  29. package/src/Components/DataSourceIndexer.class.ts +181 -181
  30. package/src/Components/DataSourceLookup.class.ts +161 -161
  31. package/src/Components/ECMASandbox.class.ts +71 -71
  32. package/src/Components/FEncDec.class.ts +29 -29
  33. package/src/Components/FHash.class.ts +33 -33
  34. package/src/Components/FSign.class.ts +80 -80
  35. package/src/Components/FSleep.class.ts +25 -25
  36. package/src/Components/FTimestamp.class.ts +25 -25
  37. package/src/Components/FileStore.class.ts +78 -78
  38. package/src/Components/ForEach.class.ts +97 -97
  39. package/src/Components/GPTPlugin.class.ts +70 -70
  40. package/src/Components/GenAILLM.class.ts +586 -586
  41. package/src/Components/HuggingFace.class.ts +314 -314
  42. package/src/Components/Image/imageSettings.config.ts +70 -70
  43. package/src/Components/ImageGenerator.class.ts +502 -502
  44. package/src/Components/JSONFilter.class.ts +54 -54
  45. package/src/Components/LLMAssistant.class.ts +213 -213
  46. package/src/Components/LogicAND.class.ts +28 -28
  47. package/src/Components/LogicAtLeast.class.ts +85 -85
  48. package/src/Components/LogicAtMost.class.ts +86 -86
  49. package/src/Components/LogicOR.class.ts +29 -29
  50. package/src/Components/LogicXOR.class.ts +34 -34
  51. package/src/Components/MCPClient.class.ts +138 -138
  52. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  53. package/src/Components/MemoryReadKeyVal.class.ts +66 -66
  54. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  55. package/src/Components/MemoryWriteObject.class.ts +97 -97
  56. package/src/Components/MultimodalLLM.class.ts +128 -128
  57. package/src/Components/OpenAPI.class.ts +72 -72
  58. package/src/Components/PromptGenerator.class.ts +122 -122
  59. package/src/Components/ScrapflyWebScrape.class.ts +159 -159
  60. package/src/Components/ServerlessCode.class.ts +123 -123
  61. package/src/Components/TavilyWebSearch.class.ts +98 -98
  62. package/src/Components/VisionLLM.class.ts +104 -104
  63. package/src/Components/ZapierAction.class.ts +127 -127
  64. package/src/Components/index.ts +97 -97
  65. package/src/Core/AgentProcess.helper.ts +240 -240
  66. package/src/Core/Connector.class.ts +123 -123
  67. package/src/Core/ConnectorsService.ts +197 -197
  68. package/src/Core/DummyConnector.ts +49 -49
  69. package/src/Core/HookService.ts +105 -105
  70. package/src/Core/SmythRuntime.class.ts +235 -235
  71. package/src/Core/SystemEvents.ts +16 -16
  72. package/src/Core/boot.ts +56 -56
  73. package/src/config.ts +15 -15
  74. package/src/constants.ts +126 -126
  75. package/src/data/hugging-face.params.json +579 -579
  76. package/src/helpers/AWSLambdaCode.helper.ts +590 -590
  77. package/src/helpers/BinaryInput.helper.ts +331 -331
  78. package/src/helpers/Conversation.helper.ts +1119 -1119
  79. package/src/helpers/ECMASandbox.helper.ts +54 -54
  80. package/src/helpers/JsonContent.helper.ts +97 -97
  81. package/src/helpers/LocalCache.helper.ts +97 -97
  82. package/src/helpers/Log.helper.ts +274 -274
  83. package/src/helpers/OpenApiParser.helper.ts +150 -150
  84. package/src/helpers/S3Cache.helper.ts +147 -147
  85. package/src/helpers/SmythURI.helper.ts +5 -5
  86. package/src/helpers/Sysconfig.helper.ts +77 -77
  87. package/src/helpers/TemplateString.helper.ts +243 -243
  88. package/src/helpers/TypeChecker.helper.ts +329 -329
  89. package/src/index.ts +3 -3
  90. package/src/index.ts.bak +3 -3
  91. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  92. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  93. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  94. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  95. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
  96. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  97. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  98. package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -297
  99. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  100. package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
  101. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  102. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  103. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  104. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  105. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  106. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  107. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  108. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  109. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  110. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
  111. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  112. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  113. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  114. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  115. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  116. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  117. package/src/subsystems/IO/Log.service/index.ts +13 -13
  118. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  119. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  120. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  121. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  122. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  123. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  124. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  125. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  126. package/src/subsystems/IO/Router.service/index.ts +11 -11
  127. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
  128. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  129. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  130. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  131. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  132. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  133. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
  134. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
  135. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
  136. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  137. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  138. package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
  139. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  140. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  141. package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
  142. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
  143. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  144. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
  145. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
  146. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
  147. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
  148. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
  149. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
  150. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
  151. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
  152. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
  153. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  154. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  155. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
  156. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
  157. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  158. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
  160. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
  161. package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
  162. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
  163. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
  164. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  165. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  166. package/src/subsystems/LLMManager/models.ts +2540 -2540
  167. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  168. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  169. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  170. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
  171. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  172. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  173. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  174. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  175. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  176. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  177. package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
  178. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  179. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  180. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  181. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  182. package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
  183. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  184. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
  185. package/src/subsystems/Security/Account.service/index.ts +14 -14
  186. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  187. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  188. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  189. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  190. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  191. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  192. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  193. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  194. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  195. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  196. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  197. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  198. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  199. package/src/types/ACL.types.ts +104 -104
  200. package/src/types/AWS.types.ts +10 -10
  201. package/src/types/Agent.types.ts +61 -61
  202. package/src/types/AgentLogger.types.ts +17 -17
  203. package/src/types/Cache.types.ts +1 -1
  204. package/src/types/Common.types.ts +2 -2
  205. package/src/types/LLM.types.ts +496 -496
  206. package/src/types/Redis.types.ts +8 -8
  207. package/src/types/SRE.types.ts +64 -64
  208. package/src/types/Security.types.ts +14 -14
  209. package/src/types/Storage.types.ts +5 -5
  210. package/src/types/VectorDB.types.ts +86 -86
  211. package/src/utils/base64.utils.ts +275 -275
  212. package/src/utils/cli.utils.ts +68 -68
  213. package/src/utils/data.utils.ts +322 -322
  214. package/src/utils/date-time.utils.ts +22 -22
  215. package/src/utils/general.utils.ts +238 -238
  216. package/src/utils/index.ts +12 -12
  217. package/src/utils/lazy-client.ts +261 -261
  218. package/src/utils/numbers.utils.ts +13 -13
  219. package/src/utils/oauth.utils.ts +35 -35
  220. package/src/utils/string.utils.ts +414 -414
  221. package/src/utils/url.utils.ts +19 -19
  222. package/src/utils/validation.utils.ts +74 -74
  223. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
@@ -1,489 +1,489 @@
1
- import { ConnectorService } from '@sre/Core/ConnectorsService';
2
- import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
3
- import { ACL } from '@sre/Security/AccessControl/ACL.class';
4
- import { DEFAULT_TEAM_ID, IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
5
- import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
6
- import { getMimeType } from '@sre/utils';
7
- import mime from 'mime';
8
- import { Readable } from 'stream';
9
- import { StorageConnector } from './StorageConnector';
10
- import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
11
- import { CacheConnector } from '@sre/MemoryManager/Cache.service/CacheConnector';
12
- import crypto from 'crypto';
13
- import { JSONContentHelper } from '@sre/helpers/JsonContent.helper';
14
- import { SystemEvents } from '@sre/Core/SystemEvents';
15
-
16
- export type TSmythFSURI = {
17
- hash: string;
18
- team: string;
19
- path: string;
20
- };
21
-
22
- // SystemEvents.on('SRE:Booted', () => {
23
- // const router = ConnectorService.getRouterConnector();
24
- // if (router && router?.get instanceof Function) {
25
- // router.get('/_temp/:uid', SmythFS.Instance.serveTempContent.bind(SmythFS.Instance));
26
- // router.get('/storage/:file_id', SmythFS.Instance.serveResource.bind(SmythFS.Instance));
27
- // }
28
- // });
29
-
30
- export class SmythFS {
31
- private hash: string; // Store the instance hash for URL generation
32
-
33
- static instances: any = {};
34
-
35
- // Centralized hash generation to ensure consistency
36
- private static generateInstanceHash(storageName: string, cacheName: string): string {
37
- const instanceProps = `${storageName}:${cacheName}`;
38
- return crypto.createHash('sha256').update(instanceProps).digest('hex').substring(0, 6);
39
- }
40
-
41
- // Default singleton instance (most common use case)
42
- public static get Instance(): SmythFS {
43
- return SmythFS.getInstance(); // Uses default empty string providers
44
- }
45
-
46
- // Multiton pattern - get instance based on storage and cache provider combination
47
- public static getInstance(storageProvider: string | StorageConnector = '', cacheProvider: string | CacheConnector = ''): SmythFS {
48
- // First get the actual connector names to calculate the correct hash
49
- const storage = storageProvider instanceof StorageConnector ? storageProvider : ConnectorService.getStorageConnector(storageProvider);
50
- const cache = cacheProvider instanceof CacheConnector ? cacheProvider : ConnectorService.getCacheConnector(cacheProvider);
51
- const hash = SmythFS.generateInstanceHash(storage.name, cache.name);
52
-
53
- if (SmythFS.instances[hash]) {
54
- return SmythFS.instances[hash];
55
- }
56
-
57
- const instance = new SmythFS(storage, cache);
58
-
59
- //register routes
60
- const router = ConnectorService.getRouterConnector();
61
- if (router && router?.get instanceof Function) {
62
- router.get(`/_temp/${hash}/:uid`, instance.serveTempContent.bind(instance));
63
- router.get(`/storage/${hash}/:file_id`, instance.serveResource.bind(instance));
64
- }
65
-
66
- SmythFS.instances[hash] = instance;
67
- return instance;
68
- }
69
-
70
- private constructor(private storage: StorageConnector, private cache: CacheConnector) {
71
- //SmythFS cannot be used without SRE
72
- if (!ConnectorService.ready) {
73
- throw new Error('SRE not available');
74
- }
75
-
76
- // Use centralized hash generation method
77
- this.hash = SmythFS.generateInstanceHash(this.storage.name, this.cache.name);
78
- }
79
-
80
- // public getStoragePath(uri: string) {
81
- // const smythURI = this.URIParser(uri);
82
- // if (!smythURI) throw new Error('Invalid Resource URI');
83
- // return `teams/${smythURI.team}${smythURI.path}`;
84
- // }
85
-
86
- public getBaseUri(candidate: IAccessCandidate) {
87
- const uri = `smythfs://${candidate.id}.${candidate.role}`;
88
-
89
- return uri;
90
- }
91
-
92
- /**
93
- * Reads a resource from smyth file system
94
- * @param uri smythfs:// uri
95
- * @param candidate
96
- * @returns
97
- */
98
- public async read(uri: string, candidate?: IAccessCandidate): Promise<Buffer> {
99
- const smythURI = await this.URIParser(uri);
100
- if (!smythURI) throw new Error('Invalid Resource URI');
101
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
102
-
103
- const accountConnector = ConnectorService.getAccountConnector();
104
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
105
- if (!isMember) throw new Error('Access Denied');
106
-
107
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
108
-
109
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
110
-
111
- const data = await this.storage.requester(_candidate).read(resourceId);
112
-
113
- return data ? this.toBuffer(data) : null;
114
- }
115
-
116
-
117
- public async getMetadata(uri: string, candidate?: IAccessCandidate) {
118
- const smythURI = await this.URIParser(uri);
119
- if (!smythURI) throw new Error('Invalid Resource URI');
120
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
121
-
122
- const accountConnector = ConnectorService.getAccountConnector();
123
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
124
- if (!isMember) throw new Error('Access Denied');
125
-
126
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
127
-
128
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
129
-
130
- return await this.storage.requester(_candidate).getMetadata(resourceId);
131
- }
132
-
133
- public async write(uri: string, data: StorageData, candidate?: IAccessCandidate, metadata?: StorageMetadata, ttl?: number) {
134
- const smythURI = await this.URIParser(uri);
135
- if (!smythURI) throw new Error('Invalid Resource URI');
136
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
137
-
138
- const accountConnector = ConnectorService.getAccountConnector();
139
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
140
- if (!isMember) throw new Error('Access Denied');
141
-
142
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
143
- //when we write a file, it does not exist we need to explicitly provide a resource team in order to have access rights set properly
144
-
145
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
146
-
147
- let acl: ACL;
148
-
149
- //give team read access if this is a team resource and not the default team
150
- //because the default team is a fallback used when no team is specified or account connector is not available
151
- //in that case we need to only allow the creator to access the resource
152
- if (smythURI.team && smythURI.team !== DEFAULT_TEAM_ID) {
153
- acl = new ACL()
154
- //.addAccess(candidate.role, candidate.id, TAccessLevel.Owner) // creator is owner
155
- .addAccess(TAccessRole.Team, smythURI.team, TAccessLevel.Read).ACL as ACL; // team has read access
156
- }
157
-
158
- if (!metadata) metadata = {};
159
- if (!metadata?.ContentType) {
160
- metadata.ContentType = await getMimeType(data);
161
- if (!metadata.ContentType) {
162
- const ext: any = uri.split('.').pop();
163
- if (ext) {
164
- metadata.ContentType = mime.getType(ext) || 'application/octet-stream';
165
- }
166
- }
167
- }
168
- await this.storage.requester(_candidate).write(resourceId, data, acl, metadata);
169
-
170
- if (ttl) {
171
- await this.storage.requester(_candidate).expire(resourceId, ttl);
172
- }
173
- }
174
-
175
- public async delete(uri: string, candidate?: IAccessCandidate) {
176
- const smythURI = await this.URIParser(uri);
177
- if (!smythURI) throw new Error('Invalid Resource URI');
178
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
179
-
180
- const accountConnector = ConnectorService.getAccountConnector();
181
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
182
- if (!isMember) throw new Error('Access Denied');
183
-
184
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
185
-
186
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
187
-
188
- await this.storage.requester(_candidate).delete(resourceId);
189
- }
190
-
191
- //TODO: should we require access token here ?
192
- public async exists(uri: string, candidate?: IAccessCandidate) {
193
- const smythURI = await this.URIParser(uri);
194
- if (!smythURI) throw new Error('Invalid Resource URI');
195
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
196
-
197
- const accountConnector = ConnectorService.getAccountConnector();
198
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
199
- if (!isMember) throw new Error('Access Denied');
200
-
201
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
202
-
203
- //in order to get a consistent access check in case of inexisting resource, we need to explicitly set a default resource team
204
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
205
-
206
- return await this.storage.requester(_candidate).exists(resourceId);
207
- }
208
-
209
- //#region Temp URL (mainly used for returning agent output to user for temporary access)
210
- public async genTempUrl(uri: string, candidate?: IAccessCandidate, ttlSeconds: number = 3600) {
211
- const smythURI = await this.URIParser(uri);
212
- if (!smythURI) throw new Error('Invalid Resource URI');
213
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
214
-
215
- const accountConnector = ConnectorService.getAccountConnector();
216
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
217
- if (!isMember) throw new Error('Access Denied');
218
-
219
- const exists = await this.exists(uri, candidate);
220
- if (!exists) throw new Error('Resource does not exist');
221
-
222
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
223
-
224
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
225
- const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
226
-
227
- const uid = crypto.randomUUID();
228
- const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
229
-
230
- await this.cache.requester(tempUserCandidate).set(
231
- `pub_url:${uid}`,
232
- JSON.stringify({
233
- accessCandidate: _candidate,
234
- uri,
235
- contentType: resourceMetadata?.ContentType,
236
- }),
237
- undefined,
238
- undefined,
239
- ttlSeconds
240
- ); // 1 hour
241
-
242
- const baseUrl = ConnectorService.getRouterConnector().baseUrl;
243
- return `${baseUrl}/_temp/${this.hash}/${uid}`;
244
- }
245
-
246
- public async destroyTempUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {
247
- // Parse URL with new format: /_temp/{hash}/{uid}
248
- const tempPath = url.split('/_temp/')[1];
249
- if (!tempPath) throw new Error('Invalid Temp URL format');
250
-
251
- const uid = tempPath.split('/')[1]?.split('?')[0]; // get uid and remove query params
252
- if (!uid) throw new Error('Invalid Temp URL format');
253
-
254
- let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
255
- if (!cacheVal) throw new Error('Invalid Temp URL');
256
- cacheVal = JSONContentHelper.create(cacheVal).tryParse();
257
- await this.cache.requester(AccessCandidate.user(`system-${uid}`)).delete(`pub_url:${uid}`);
258
- if (delResource) {
259
- await this.delete(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
260
- }
261
- }
262
-
263
- public async serveTempContent(req: any, res: any) {
264
- try {
265
- const { uid } = req.params;
266
- let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
267
- if (!cacheVal) {
268
- res.writeHead(404, { 'Content-Type': 'text/plain' });
269
- res.end('Invalid Temp URL');
270
- return;
271
- }
272
- cacheVal = JSONContentHelper.create(cacheVal).tryParse();
273
- const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
274
-
275
- const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
276
-
277
- const contentType = cacheVal.contentType || 'application/octet-stream';
278
-
279
- res.writeHead(200, {
280
- 'Content-Type': contentType,
281
- 'Content-Disposition': 'inline',
282
- 'Content-Length': contentBuffer.length,
283
- });
284
-
285
- res.end(contentBuffer);
286
- } catch (error) {
287
- console.error('Error serving temp content:', error);
288
- res.writeHead(500, { 'Content-Type': 'text/plain' });
289
- res.end('Internal Server Error');
290
- }
291
- }
292
- //#endregion
293
-
294
- //#region Resource Serving
295
-
296
- /**
297
- * Generates a public url for the resource
298
- * @param uri
299
- * @param candidate
300
- * @returns
301
- */
302
- public async genResourceUrl(uri: string, candidate?: IAccessCandidate) {
303
- const smythURI = await this.URIParser(uri);
304
- if (!smythURI) throw new Error('Invalid Resource URI');
305
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
306
-
307
- const accountConnector = ConnectorService.getAccountConnector();
308
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
309
- if (!isMember) throw new Error('Access Denied');
310
-
311
- const exists = await this.exists(uri, candidate);
312
- if (!exists) throw new Error('Resource does not exist');
313
-
314
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
315
- if (_candidate.role !== TAccessRole.Agent) {
316
- throw new Error('Only agents can generate resource urls');
317
- }
318
- const agentId = _candidate.id;
319
-
320
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
321
- const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
322
-
323
- const uid = crypto.randomUUID(); // maybe instead of a random uuid, u can use the resource
324
- const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
325
-
326
- await this.cache.requester(tempUserCandidate).set(
327
- `storage_url-${uid}`,
328
- JSON.stringify({
329
- accessCandidate: _candidate,
330
- uri,
331
- contentType: resourceMetadata?.ContentType,
332
- }),
333
- undefined,
334
- undefined
335
- // 3600 // 1 hour
336
- );
337
-
338
- const contentType = resourceMetadata?.ContentType;
339
- const ext = contentType ? mime.getExtension(contentType) : undefined;
340
-
341
- // get the agent domain
342
- const agentDataConnector = ConnectorService.getAgentDataConnector();
343
- const baseUrl = ConnectorService.getRouterConnector().baseUrl;
344
- const domain = agentDataConnector.getAgentConfig(agentId)?.agentStageDomain
345
- ? `https://${agentDataConnector.getAgentConfig(agentId).agentStageDomain}`
346
- : baseUrl;
347
-
348
- return `${domain}/storage/${this.hash}/${uid}${ext ? `.${ext}` : ''}`;
349
- }
350
- public async destroyResourceUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {}
351
- public async serveResource(req: any, res: any) {
352
- try {
353
- const { file_id } = req.params;
354
- const [uid, extention] = file_id.split('.');
355
- let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`storage_url-${uid}`);
356
- if (!cacheVal) {
357
- res.writeHead(404, { 'Content-Type': 'text/plain' });
358
- res.end('Invalid Resource URL');
359
- return;
360
- }
361
- cacheVal = JSONContentHelper.create(cacheVal).tryParse();
362
- const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
363
-
364
- const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
365
-
366
- const contentType = cacheVal.contentType || 'application/octet-stream';
367
-
368
- res.writeHead(200, {
369
- 'Content-Type': contentType,
370
- 'Content-Disposition': 'inline',
371
- 'Content-Length': contentBuffer.length,
372
- });
373
-
374
- res.end(contentBuffer);
375
- } catch (error) {
376
- console.error('Error serving storage resource content:', error);
377
- res.writeHead(500, { 'Content-Type': 'text/plain' });
378
- res.end('Internal Server Error');
379
- }
380
- }
381
- //#endregion
382
-
383
- private async URIParser(uri: string) {
384
- const parts = uri.split('://');
385
- if (parts.length !== 2) return undefined;
386
- if (parts[0].toLowerCase() !== 'smythfs') return undefined;
387
- const parsed = this.CaseSensitiveURL(`http://${parts[1]}`);
388
- const tld = parsed.hostname.split('.').pop();
389
- if (tld !== 'team' && tld !== 'user' && tld !== 'agent' && tld !== 'smyth') throw new Error('Invalid Resource URI');
390
- let team = tld === 'team' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
391
- const user = tld === 'user' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
392
- const agent = tld === 'agent' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
393
- const smyth = tld === 'smyth' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
394
-
395
- let basePath = '';
396
- if (!team) {
397
- let candidate: IAccessCandidate;
398
- if (user) {
399
- candidate = AccessCandidate.user(user);
400
- basePath = '.user/' + user;
401
- } else if (agent) {
402
- candidate = AccessCandidate.agent(agent);
403
- basePath = '.agent/' + agent;
404
- }
405
-
406
- if (candidate) {
407
- team = await ConnectorService.getAccountConnector().getCandidateTeam(candidate);
408
- }
409
- }
410
-
411
- // create a default candidate based on the uri
412
- let defaultCandidate: IAccessCandidate;
413
-
414
- if (team) {
415
- defaultCandidate = AccessCandidate.team(team);
416
- } else if (user) {
417
- defaultCandidate = AccessCandidate.user(user);
418
- } else if (agent) {
419
- defaultCandidate = AccessCandidate.agent(agent);
420
- }
421
-
422
- return {
423
- hash: parsed.hash,
424
- team,
425
- user,
426
- agent,
427
- smyth,
428
- defaultCandidate,
429
- path: basePath + parsed.pathname,
430
- };
431
- }
432
-
433
- private CaseSensitiveURL(urlString: string) {
434
- // First, extract the original hostname for case preservation
435
- const parts = urlString.split('://');
436
- if (parts.length !== 2) return null;
437
-
438
- const afterProtocol = parts[1];
439
- const hostnameEnd = Math.min(
440
- ...[afterProtocol.indexOf('/'), afterProtocol.indexOf('?'), afterProtocol.indexOf('#'), afterProtocol.length].filter((i) => i >= 0)
441
- );
442
-
443
- const originalHostnamePart = afterProtocol.substring(0, hostnameEnd);
444
- const [originalHostname, originalPort] = originalHostnamePart.split(':');
445
-
446
- // Use URL constructor for robust parsing of everything else
447
- const parsed = new URL(urlString);
448
-
449
- // Explicitly copy URL properties since they're not enumerable
450
- return {
451
- protocol: parsed.protocol,
452
- hostname: originalHostname, // Case-sensitive hostname
453
- port: parsed.port,
454
- pathname: parsed.pathname,
455
- search: parsed.search,
456
- searchParams: parsed.searchParams,
457
- hash: parsed.hash,
458
- href: parsed.href,
459
- origin: parsed.origin,
460
- host: originalHostname + (parsed.port ? `:${parsed.port}` : ''),
461
- originalPort: originalPort || null,
462
- };
463
- }
464
-
465
- private async toBuffer(data: StorageData): Promise<Buffer> {
466
- if (Buffer.isBuffer(data)) {
467
- return data;
468
- } else if (typeof data === 'string') {
469
- return Buffer.from(data, 'utf-8');
470
- } else if (data instanceof Uint8Array) {
471
- return Buffer.from(data);
472
- } else if (data instanceof Readable) {
473
- return new Promise<Buffer>((resolve, reject) => {
474
- const chunks: Buffer[] = [];
475
- data.on('data', (chunk) => {
476
- chunks.push(Buffer.isBuffer(chunk) ? chunk : Buffer.from(chunk));
477
- });
478
- data.on('end', () => {
479
- resolve(Buffer.concat(chunks));
480
- });
481
- data.on('error', (err) => {
482
- reject(err);
483
- });
484
- });
485
- } else {
486
- throw new Error('Unsupported data type');
487
- }
488
- }
489
- }
1
+ import { ConnectorService } from '@sre/Core/ConnectorsService';
2
+ import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
3
+ import { ACL } from '@sre/Security/AccessControl/ACL.class';
4
+ import { DEFAULT_TEAM_ID, IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
5
+ import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
6
+ import { getMimeType } from '@sre/utils';
7
+ import mime from 'mime';
8
+ import { Readable } from 'stream';
9
+ import { StorageConnector } from './StorageConnector';
10
+ import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
11
+ import { CacheConnector } from '@sre/MemoryManager/Cache.service/CacheConnector';
12
+ import crypto from 'crypto';
13
+ import { JSONContentHelper } from '@sre/helpers/JsonContent.helper';
14
+ import { SystemEvents } from '@sre/Core/SystemEvents';
15
+
16
+ export type TSmythFSURI = {
17
+ hash: string;
18
+ team: string;
19
+ path: string;
20
+ };
21
+
22
+ // SystemEvents.on('SRE:Booted', () => {
23
+ // const router = ConnectorService.getRouterConnector();
24
+ // if (router && router?.get instanceof Function) {
25
+ // router.get('/_temp/:uid', SmythFS.Instance.serveTempContent.bind(SmythFS.Instance));
26
+ // router.get('/storage/:file_id', SmythFS.Instance.serveResource.bind(SmythFS.Instance));
27
+ // }
28
+ // });
29
+
30
+ export class SmythFS {
31
+ private hash: string; // Store the instance hash for URL generation
32
+
33
+ static instances: any = {};
34
+
35
+ // Centralized hash generation to ensure consistency
36
+ private static generateInstanceHash(storageName: string, cacheName: string): string {
37
+ const instanceProps = `${storageName}:${cacheName}`;
38
+ return crypto.createHash('sha256').update(instanceProps).digest('hex').substring(0, 6);
39
+ }
40
+
41
+ // Default singleton instance (most common use case)
42
+ public static get Instance(): SmythFS {
43
+ return SmythFS.getInstance(); // Uses default empty string providers
44
+ }
45
+
46
+ // Multiton pattern - get instance based on storage and cache provider combination
47
+ public static getInstance(storageProvider: string | StorageConnector = '', cacheProvider: string | CacheConnector = ''): SmythFS {
48
+ // First get the actual connector names to calculate the correct hash
49
+ const storage = storageProvider instanceof StorageConnector ? storageProvider : ConnectorService.getStorageConnector(storageProvider);
50
+ const cache = cacheProvider instanceof CacheConnector ? cacheProvider : ConnectorService.getCacheConnector(cacheProvider);
51
+ const hash = SmythFS.generateInstanceHash(storage.name, cache.name);
52
+
53
+ if (SmythFS.instances[hash]) {
54
+ return SmythFS.instances[hash];
55
+ }
56
+
57
+ const instance = new SmythFS(storage, cache);
58
+
59
+ //register routes
60
+ const router = ConnectorService.getRouterConnector();
61
+ if (router && router?.get instanceof Function) {
62
+ router.get(`/_temp/${hash}/:uid`, instance.serveTempContent.bind(instance));
63
+ router.get(`/storage/${hash}/:file_id`, instance.serveResource.bind(instance));
64
+ }
65
+
66
+ SmythFS.instances[hash] = instance;
67
+ return instance;
68
+ }
69
+
70
+ private constructor(private storage: StorageConnector, private cache: CacheConnector) {
71
+ //SmythFS cannot be used without SRE
72
+ if (!ConnectorService.ready) {
73
+ throw new Error('SRE not available');
74
+ }
75
+
76
+ // Use centralized hash generation method
77
+ this.hash = SmythFS.generateInstanceHash(this.storage.name, this.cache.name);
78
+ }
79
+
80
+ // public getStoragePath(uri: string) {
81
+ // const smythURI = this.URIParser(uri);
82
+ // if (!smythURI) throw new Error('Invalid Resource URI');
83
+ // return `teams/${smythURI.team}${smythURI.path}`;
84
+ // }
85
+
86
+ public getBaseUri(candidate: IAccessCandidate) {
87
+ const uri = `smythfs://${candidate.id}.${candidate.role}`;
88
+
89
+ return uri;
90
+ }
91
+
92
+ /**
93
+ * Reads a resource from smyth file system
94
+ * @param uri smythfs:// uri
95
+ * @param candidate
96
+ * @returns
97
+ */
98
+ public async read(uri: string, candidate?: IAccessCandidate): Promise<Buffer> {
99
+ const smythURI = await this.URIParser(uri);
100
+ if (!smythURI) throw new Error('Invalid Resource URI');
101
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
102
+
103
+ const accountConnector = ConnectorService.getAccountConnector();
104
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
105
+ if (!isMember) throw new Error('Access Denied');
106
+
107
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
108
+
109
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
110
+
111
+ const data = await this.storage.requester(_candidate).read(resourceId);
112
+
113
+ return data ? this.toBuffer(data) : null;
114
+ }
115
+
116
+
117
+ public async getMetadata(uri: string, candidate?: IAccessCandidate) {
118
+ const smythURI = await this.URIParser(uri);
119
+ if (!smythURI) throw new Error('Invalid Resource URI');
120
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
121
+
122
+ const accountConnector = ConnectorService.getAccountConnector();
123
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
124
+ if (!isMember) throw new Error('Access Denied');
125
+
126
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
127
+
128
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
129
+
130
+ return await this.storage.requester(_candidate).getMetadata(resourceId);
131
+ }
132
+
133
+ public async write(uri: string, data: StorageData, candidate?: IAccessCandidate, metadata?: StorageMetadata, ttl?: number) {
134
+ const smythURI = await this.URIParser(uri);
135
+ if (!smythURI) throw new Error('Invalid Resource URI');
136
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
137
+
138
+ const accountConnector = ConnectorService.getAccountConnector();
139
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
140
+ if (!isMember) throw new Error('Access Denied');
141
+
142
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
143
+ //when we write a file, it does not exist we need to explicitly provide a resource team in order to have access rights set properly
144
+
145
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
146
+
147
+ let acl: ACL;
148
+
149
+ //give team read access if this is a team resource and not the default team
150
+ //because the default team is a fallback used when no team is specified or account connector is not available
151
+ //in that case we need to only allow the creator to access the resource
152
+ if (smythURI.team && smythURI.team !== DEFAULT_TEAM_ID) {
153
+ acl = new ACL()
154
+ //.addAccess(candidate.role, candidate.id, TAccessLevel.Owner) // creator is owner
155
+ .addAccess(TAccessRole.Team, smythURI.team, TAccessLevel.Read).ACL as ACL; // team has read access
156
+ }
157
+
158
+ if (!metadata) metadata = {};
159
+ if (!metadata?.ContentType) {
160
+ metadata.ContentType = await getMimeType(data);
161
+ if (!metadata.ContentType) {
162
+ const ext: any = uri.split('.').pop();
163
+ if (ext) {
164
+ metadata.ContentType = mime.getType(ext) || 'application/octet-stream';
165
+ }
166
+ }
167
+ }
168
+ await this.storage.requester(_candidate).write(resourceId, data, acl, metadata);
169
+
170
+ if (ttl) {
171
+ await this.storage.requester(_candidate).expire(resourceId, ttl);
172
+ }
173
+ }
174
+
175
+ public async delete(uri: string, candidate?: IAccessCandidate) {
176
+ const smythURI = await this.URIParser(uri);
177
+ if (!smythURI) throw new Error('Invalid Resource URI');
178
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
179
+
180
+ const accountConnector = ConnectorService.getAccountConnector();
181
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
182
+ if (!isMember) throw new Error('Access Denied');
183
+
184
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
185
+
186
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
187
+
188
+ await this.storage.requester(_candidate).delete(resourceId);
189
+ }
190
+
191
+ //TODO: should we require access token here ?
192
+ public async exists(uri: string, candidate?: IAccessCandidate) {
193
+ const smythURI = await this.URIParser(uri);
194
+ if (!smythURI) throw new Error('Invalid Resource URI');
195
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
196
+
197
+ const accountConnector = ConnectorService.getAccountConnector();
198
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
199
+ if (!isMember) throw new Error('Access Denied');
200
+
201
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
202
+
203
+ //in order to get a consistent access check in case of inexisting resource, we need to explicitly set a default resource team
204
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
205
+
206
+ return await this.storage.requester(_candidate).exists(resourceId);
207
+ }
208
+
209
+ //#region Temp URL (mainly used for returning agent output to user for temporary access)
210
+ public async genTempUrl(uri: string, candidate?: IAccessCandidate, ttlSeconds: number = 3600) {
211
+ const smythURI = await this.URIParser(uri);
212
+ if (!smythURI) throw new Error('Invalid Resource URI');
213
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
214
+
215
+ const accountConnector = ConnectorService.getAccountConnector();
216
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
217
+ if (!isMember) throw new Error('Access Denied');
218
+
219
+ const exists = await this.exists(uri, candidate);
220
+ if (!exists) throw new Error('Resource does not exist');
221
+
222
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
223
+
224
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
225
+ const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
226
+
227
+ const uid = crypto.randomUUID();
228
+ const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
229
+
230
+ await this.cache.requester(tempUserCandidate).set(
231
+ `pub_url:${uid}`,
232
+ JSON.stringify({
233
+ accessCandidate: _candidate,
234
+ uri,
235
+ contentType: resourceMetadata?.ContentType,
236
+ }),
237
+ undefined,
238
+ undefined,
239
+ ttlSeconds
240
+ ); // 1 hour
241
+
242
+ const baseUrl = ConnectorService.getRouterConnector().baseUrl;
243
+ return `${baseUrl}/_temp/${this.hash}/${uid}`;
244
+ }
245
+
246
+ public async destroyTempUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {
247
+ // Parse URL with new format: /_temp/{hash}/{uid}
248
+ const tempPath = url.split('/_temp/')[1];
249
+ if (!tempPath) throw new Error('Invalid Temp URL format');
250
+
251
+ const uid = tempPath.split('/')[1]?.split('?')[0]; // get uid and remove query params
252
+ if (!uid) throw new Error('Invalid Temp URL format');
253
+
254
+ let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
255
+ if (!cacheVal) throw new Error('Invalid Temp URL');
256
+ cacheVal = JSONContentHelper.create(cacheVal).tryParse();
257
+ await this.cache.requester(AccessCandidate.user(`system-${uid}`)).delete(`pub_url:${uid}`);
258
+ if (delResource) {
259
+ await this.delete(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
260
+ }
261
+ }
262
+
263
+ public async serveTempContent(req: any, res: any) {
264
+ try {
265
+ const { uid } = req.params;
266
+ let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
267
+ if (!cacheVal) {
268
+ res.writeHead(404, { 'Content-Type': 'text/plain' });
269
+ res.end('Invalid Temp URL');
270
+ return;
271
+ }
272
+ cacheVal = JSONContentHelper.create(cacheVal).tryParse();
273
+ const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
274
+
275
+ const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
276
+
277
+ const contentType = cacheVal.contentType || 'application/octet-stream';
278
+
279
+ res.writeHead(200, {
280
+ 'Content-Type': contentType,
281
+ 'Content-Disposition': 'inline',
282
+ 'Content-Length': contentBuffer.length,
283
+ });
284
+
285
+ res.end(contentBuffer);
286
+ } catch (error) {
287
+ console.error('Error serving temp content:', error);
288
+ res.writeHead(500, { 'Content-Type': 'text/plain' });
289
+ res.end('Internal Server Error');
290
+ }
291
+ }
292
+ //#endregion
293
+
294
+ //#region Resource Serving
295
+
296
+ /**
297
+ * Generates a public url for the resource
298
+ * @param uri
299
+ * @param candidate
300
+ * @returns
301
+ */
302
+ public async genResourceUrl(uri: string, candidate?: IAccessCandidate) {
303
+ const smythURI = await this.URIParser(uri);
304
+ if (!smythURI) throw new Error('Invalid Resource URI');
305
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
306
+
307
+ const accountConnector = ConnectorService.getAccountConnector();
308
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
309
+ if (!isMember) throw new Error('Access Denied');
310
+
311
+ const exists = await this.exists(uri, candidate);
312
+ if (!exists) throw new Error('Resource does not exist');
313
+
314
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
315
+ if (_candidate.role !== TAccessRole.Agent) {
316
+ throw new Error('Only agents can generate resource urls');
317
+ }
318
+ const agentId = _candidate.id;
319
+
320
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
321
+ const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
322
+
323
+ const uid = crypto.randomUUID(); // maybe instead of a random uuid, u can use the resource
324
+ const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
325
+
326
+ await this.cache.requester(tempUserCandidate).set(
327
+ `storage_url-${uid}`,
328
+ JSON.stringify({
329
+ accessCandidate: _candidate,
330
+ uri,
331
+ contentType: resourceMetadata?.ContentType,
332
+ }),
333
+ undefined,
334
+ undefined
335
+ // 3600 // 1 hour
336
+ );
337
+
338
+ const contentType = resourceMetadata?.ContentType;
339
+ const ext = contentType ? mime.getExtension(contentType) : undefined;
340
+
341
+ // get the agent domain
342
+ const agentDataConnector = ConnectorService.getAgentDataConnector();
343
+ const baseUrl = ConnectorService.getRouterConnector().baseUrl;
344
+ const domain = agentDataConnector.getAgentConfig(agentId)?.agentStageDomain
345
+ ? `https://${agentDataConnector.getAgentConfig(agentId).agentStageDomain}`
346
+ : baseUrl;
347
+
348
+ return `${domain}/storage/${this.hash}/${uid}${ext ? `.${ext}` : ''}`;
349
+ }
350
+ public async destroyResourceUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {}
351
+ public async serveResource(req: any, res: any) {
352
+ try {
353
+ const { file_id } = req.params;
354
+ const [uid, extention] = file_id.split('.');
355
+ let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`storage_url-${uid}`);
356
+ if (!cacheVal) {
357
+ res.writeHead(404, { 'Content-Type': 'text/plain' });
358
+ res.end('Invalid Resource URL');
359
+ return;
360
+ }
361
+ cacheVal = JSONContentHelper.create(cacheVal).tryParse();
362
+ const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
363
+
364
+ const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
365
+
366
+ const contentType = cacheVal.contentType || 'application/octet-stream';
367
+
368
+ res.writeHead(200, {
369
+ 'Content-Type': contentType,
370
+ 'Content-Disposition': 'inline',
371
+ 'Content-Length': contentBuffer.length,
372
+ });
373
+
374
+ res.end(contentBuffer);
375
+ } catch (error) {
376
+ console.error('Error serving storage resource content:', error);
377
+ res.writeHead(500, { 'Content-Type': 'text/plain' });
378
+ res.end('Internal Server Error');
379
+ }
380
+ }
381
+ //#endregion
382
+
383
+ private async URIParser(uri: string) {
384
+ const parts = uri.split('://');
385
+ if (parts.length !== 2) return undefined;
386
+ if (parts[0].toLowerCase() !== 'smythfs') return undefined;
387
+ const parsed = this.CaseSensitiveURL(`http://${parts[1]}`);
388
+ const tld = parsed.hostname.split('.').pop();
389
+ if (tld !== 'team' && tld !== 'user' && tld !== 'agent' && tld !== 'smyth') throw new Error('Invalid Resource URI');
390
+ let team = tld === 'team' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
391
+ const user = tld === 'user' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
392
+ const agent = tld === 'agent' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
393
+ const smyth = tld === 'smyth' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
394
+
395
+ let basePath = '';
396
+ if (!team) {
397
+ let candidate: IAccessCandidate;
398
+ if (user) {
399
+ candidate = AccessCandidate.user(user);
400
+ basePath = '.user/' + user;
401
+ } else if (agent) {
402
+ candidate = AccessCandidate.agent(agent);
403
+ basePath = '.agent/' + agent;
404
+ }
405
+
406
+ if (candidate) {
407
+ team = await ConnectorService.getAccountConnector().getCandidateTeam(candidate);
408
+ }
409
+ }
410
+
411
+ // create a default candidate based on the uri
412
+ let defaultCandidate: IAccessCandidate;
413
+
414
+ if (team) {
415
+ defaultCandidate = AccessCandidate.team(team);
416
+ } else if (user) {
417
+ defaultCandidate = AccessCandidate.user(user);
418
+ } else if (agent) {
419
+ defaultCandidate = AccessCandidate.agent(agent);
420
+ }
421
+
422
+ return {
423
+ hash: parsed.hash,
424
+ team,
425
+ user,
426
+ agent,
427
+ smyth,
428
+ defaultCandidate,
429
+ path: basePath + parsed.pathname,
430
+ };
431
+ }
432
+
433
+ private CaseSensitiveURL(urlString: string) {
434
+ // First, extract the original hostname for case preservation
435
+ const parts = urlString.split('://');
436
+ if (parts.length !== 2) return null;
437
+
438
+ const afterProtocol = parts[1];
439
+ const hostnameEnd = Math.min(
440
+ ...[afterProtocol.indexOf('/'), afterProtocol.indexOf('?'), afterProtocol.indexOf('#'), afterProtocol.length].filter((i) => i >= 0)
441
+ );
442
+
443
+ const originalHostnamePart = afterProtocol.substring(0, hostnameEnd);
444
+ const [originalHostname, originalPort] = originalHostnamePart.split(':');
445
+
446
+ // Use URL constructor for robust parsing of everything else
447
+ const parsed = new URL(urlString);
448
+
449
+ // Explicitly copy URL properties since they're not enumerable
450
+ return {
451
+ protocol: parsed.protocol,
452
+ hostname: originalHostname, // Case-sensitive hostname
453
+ port: parsed.port,
454
+ pathname: parsed.pathname,
455
+ search: parsed.search,
456
+ searchParams: parsed.searchParams,
457
+ hash: parsed.hash,
458
+ href: parsed.href,
459
+ origin: parsed.origin,
460
+ host: originalHostname + (parsed.port ? `:${parsed.port}` : ''),
461
+ originalPort: originalPort || null,
462
+ };
463
+ }
464
+
465
+ private async toBuffer(data: StorageData): Promise<Buffer> {
466
+ if (Buffer.isBuffer(data)) {
467
+ return data;
468
+ } else if (typeof data === 'string') {
469
+ return Buffer.from(data, 'utf-8');
470
+ } else if (data instanceof Uint8Array) {
471
+ return Buffer.from(data);
472
+ } else if (data instanceof Readable) {
473
+ return new Promise<Buffer>((resolve, reject) => {
474
+ const chunks: Buffer[] = [];
475
+ data.on('data', (chunk) => {
476
+ chunks.push(Buffer.isBuffer(chunk) ? chunk : Buffer.from(chunk));
477
+ });
478
+ data.on('end', () => {
479
+ resolve(Buffer.concat(chunks));
480
+ });
481
+ data.on('error', (err) => {
482
+ reject(err);
483
+ });
484
+ });
485
+ } else {
486
+ throw new Error('Unsupported data type');
487
+ }
488
+ }
489
+ }