@smythos/sre 1.5.53 → 1.5.54

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (223) hide show
  1. package/CHANGELOG +98 -98
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/bundle-analysis-lazy.html +4949 -0
  5. package/dist/bundle-analysis.html +4949 -0
  6. package/dist/index.js +3 -3
  7. package/dist/index.js.map +1 -1
  8. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +1 -6
  9. package/dist/types/utils/package-manager.utils.d.ts +26 -0
  10. package/package.json +1 -1
  11. package/src/Components/APICall/APICall.class.ts +157 -157
  12. package/src/Components/APICall/AccessTokenManager.ts +166 -166
  13. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  14. package/src/Components/APICall/OAuth.helper.ts +447 -447
  15. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  16. package/src/Components/APICall/parseData.ts +167 -167
  17. package/src/Components/APICall/parseHeaders.ts +41 -41
  18. package/src/Components/APICall/parseProxy.ts +68 -68
  19. package/src/Components/APICall/parseUrl.ts +91 -91
  20. package/src/Components/APIEndpoint.class.ts +234 -234
  21. package/src/Components/APIOutput.class.ts +58 -58
  22. package/src/Components/AgentPlugin.class.ts +102 -102
  23. package/src/Components/Async.class.ts +155 -155
  24. package/src/Components/Await.class.ts +90 -90
  25. package/src/Components/Classifier.class.ts +158 -158
  26. package/src/Components/Component.class.ts +132 -132
  27. package/src/Components/ComponentHost.class.ts +38 -38
  28. package/src/Components/DataSourceCleaner.class.ts +92 -92
  29. package/src/Components/DataSourceIndexer.class.ts +181 -181
  30. package/src/Components/DataSourceLookup.class.ts +161 -161
  31. package/src/Components/ECMASandbox.class.ts +71 -71
  32. package/src/Components/FEncDec.class.ts +29 -29
  33. package/src/Components/FHash.class.ts +33 -33
  34. package/src/Components/FSign.class.ts +80 -80
  35. package/src/Components/FSleep.class.ts +25 -25
  36. package/src/Components/FTimestamp.class.ts +25 -25
  37. package/src/Components/FileStore.class.ts +78 -78
  38. package/src/Components/ForEach.class.ts +97 -97
  39. package/src/Components/GPTPlugin.class.ts +70 -70
  40. package/src/Components/GenAILLM.class.ts +586 -586
  41. package/src/Components/HuggingFace.class.ts +314 -314
  42. package/src/Components/Image/imageSettings.config.ts +70 -70
  43. package/src/Components/ImageGenerator.class.ts +502 -502
  44. package/src/Components/JSONFilter.class.ts +54 -54
  45. package/src/Components/LLMAssistant.class.ts +213 -213
  46. package/src/Components/LogicAND.class.ts +28 -28
  47. package/src/Components/LogicAtLeast.class.ts +85 -85
  48. package/src/Components/LogicAtMost.class.ts +86 -86
  49. package/src/Components/LogicOR.class.ts +29 -29
  50. package/src/Components/LogicXOR.class.ts +34 -34
  51. package/src/Components/MCPClient.class.ts +138 -138
  52. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  53. package/src/Components/MemoryReadKeyVal.class.ts +66 -66
  54. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  55. package/src/Components/MemoryWriteObject.class.ts +97 -97
  56. package/src/Components/MultimodalLLM.class.ts +128 -128
  57. package/src/Components/OpenAPI.class.ts +72 -72
  58. package/src/Components/PromptGenerator.class.ts +122 -122
  59. package/src/Components/ScrapflyWebScrape.class.ts +159 -159
  60. package/src/Components/ServerlessCode.class.ts +123 -123
  61. package/src/Components/TavilyWebSearch.class.ts +98 -98
  62. package/src/Components/VisionLLM.class.ts +104 -104
  63. package/src/Components/ZapierAction.class.ts +127 -127
  64. package/src/Components/index.ts +97 -97
  65. package/src/Core/AgentProcess.helper.ts +240 -240
  66. package/src/Core/Connector.class.ts +123 -123
  67. package/src/Core/ConnectorsService.ts +197 -197
  68. package/src/Core/DummyConnector.ts +49 -49
  69. package/src/Core/HookService.ts +105 -105
  70. package/src/Core/SmythRuntime.class.ts +235 -235
  71. package/src/Core/SystemEvents.ts +16 -16
  72. package/src/Core/boot.ts +56 -56
  73. package/src/config.ts +15 -15
  74. package/src/constants.ts +126 -126
  75. package/src/data/hugging-face.params.json +579 -579
  76. package/src/helpers/AWSLambdaCode.helper.ts +590 -590
  77. package/src/helpers/BinaryInput.helper.ts +331 -331
  78. package/src/helpers/Conversation.helper.ts +1119 -1119
  79. package/src/helpers/ECMASandbox.helper.ts +54 -54
  80. package/src/helpers/JsonContent.helper.ts +97 -97
  81. package/src/helpers/LocalCache.helper.ts +97 -97
  82. package/src/helpers/Log.helper.ts +274 -274
  83. package/src/helpers/OpenApiParser.helper.ts +150 -150
  84. package/src/helpers/S3Cache.helper.ts +147 -147
  85. package/src/helpers/SmythURI.helper.ts +5 -5
  86. package/src/helpers/Sysconfig.helper.ts +77 -77
  87. package/src/helpers/TemplateString.helper.ts +243 -243
  88. package/src/helpers/TypeChecker.helper.ts +329 -329
  89. package/src/index.ts +3 -3
  90. package/src/index.ts.bak +3 -3
  91. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  92. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  93. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  94. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  95. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
  96. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  97. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  98. package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -297
  99. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  100. package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
  101. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  102. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  103. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  104. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  105. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  106. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  107. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  108. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  109. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  110. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
  111. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  112. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  113. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  114. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  115. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  116. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  117. package/src/subsystems/IO/Log.service/index.ts +13 -13
  118. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  119. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  120. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  121. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  122. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  123. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  124. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  125. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  126. package/src/subsystems/IO/Router.service/index.ts +11 -11
  127. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
  128. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  129. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  130. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  131. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  132. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  133. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
  134. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
  135. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
  136. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  137. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  138. package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
  139. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  140. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  141. package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
  142. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
  143. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  144. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
  145. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
  146. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
  147. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
  148. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
  149. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
  150. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
  151. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
  152. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
  153. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  154. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  155. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
  156. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
  157. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  158. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
  160. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
  161. package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
  162. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
  163. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
  164. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  165. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  166. package/src/subsystems/LLMManager/models.ts +2540 -2540
  167. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  168. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  169. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  170. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
  171. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  172. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  173. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  174. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  175. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  176. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  177. package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
  178. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  179. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  180. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  181. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  182. package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
  183. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  184. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
  185. package/src/subsystems/Security/Account.service/index.ts +14 -14
  186. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  187. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  188. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  189. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  190. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  191. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  192. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  193. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  194. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  195. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  196. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  197. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  198. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  199. package/src/types/ACL.types.ts +104 -104
  200. package/src/types/AWS.types.ts +10 -10
  201. package/src/types/Agent.types.ts +61 -61
  202. package/src/types/AgentLogger.types.ts +17 -17
  203. package/src/types/Cache.types.ts +1 -1
  204. package/src/types/Common.types.ts +2 -2
  205. package/src/types/LLM.types.ts +496 -496
  206. package/src/types/Redis.types.ts +8 -8
  207. package/src/types/SRE.types.ts +64 -64
  208. package/src/types/Security.types.ts +14 -14
  209. package/src/types/Storage.types.ts +5 -5
  210. package/src/types/VectorDB.types.ts +86 -86
  211. package/src/utils/base64.utils.ts +275 -275
  212. package/src/utils/cli.utils.ts +68 -68
  213. package/src/utils/data.utils.ts +322 -322
  214. package/src/utils/date-time.utils.ts +22 -22
  215. package/src/utils/general.utils.ts +238 -238
  216. package/src/utils/index.ts +12 -12
  217. package/src/utils/lazy-client.ts +261 -261
  218. package/src/utils/numbers.utils.ts +13 -13
  219. package/src/utils/oauth.utils.ts +35 -35
  220. package/src/utils/string.utils.ts +414 -414
  221. package/src/utils/url.utils.ts +19 -19
  222. package/src/utils/validation.utils.ts +74 -74
  223. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
@@ -1,327 +1,327 @@
1
- //==[ SRE: LocalStorage ]======================
2
-
3
- import { Logger } from '@sre/helpers/Log.helper';
4
- import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
5
- import { ACL } from '@sre/Security/AccessControl/ACL.class';
6
- import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
7
- import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
8
- //import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
9
- import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
10
- import { SecureConnector } from '@sre/Security/SecureConnector.class';
11
- import fs, { existsSync } from 'fs';
12
- import os from 'os';
13
- import path from 'path';
14
- import { findSmythPath } from '../../../..';
15
-
16
- const console = Logger('LocalStorage');
17
-
18
- export type LocalStorageConfig = {
19
- /**
20
- * The folder to use for the local storage.
21
- *
22
- * If not provided, the default folder will be used.
23
- * The default folder is ~/.smyth/storage
24
- */
25
- folder?: string;
26
- };
27
-
28
- //TODO : detect and store ContentType metadata when saving
29
-
30
- export class LocalStorage extends StorageConnector {
31
- public name = 'LocalStorage';
32
- private folder: string;
33
- private storagePrefix = 'local';
34
- private metadataPrefix = '.local.metadata';
35
- private isInitialized = false;
36
-
37
- constructor(protected _settings?: LocalStorageConfig) {
38
- super(_settings);
39
- //if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
40
-
41
- this.folder = this.findStorageFolder(_settings?.folder);
42
- this.initialize();
43
- if (!fs.existsSync(this.folder)) {
44
- //throw new Error('Invalid folder provided');
45
- console.error(`Invalid folder provided: ${this.folder}`);
46
- }
47
- }
48
-
49
- private findStorageFolder(folder) {
50
- let _storageFolder = folder;
51
-
52
- if (fs.existsSync(_storageFolder)) {
53
- return _storageFolder;
54
- }
55
-
56
- _storageFolder = findSmythPath('storage');
57
-
58
- if (fs.existsSync(_storageFolder)) {
59
- console.warn('Using alternative storage folder found in : ', _storageFolder);
60
- return _storageFolder;
61
- }
62
-
63
- console.warn('!!! All attempts to find an existing storage folder failed !!!');
64
- console.warn('!!! I will use this folder: ', _storageFolder);
65
- return _storageFolder;
66
- }
67
-
68
- /**
69
- * Reads an object from the local storage.
70
- *
71
- * @param {string} resourceId - The key of the object to be read.
72
- * @returns {Promise<any>} - A promise that resolves with the object data.
73
- */
74
-
75
- @SecureConnector.AccessControl
76
- public async read(acRequest: AccessRequest, resourceId: string) {
77
- if (!this.isInitialized) {
78
- await this.initialize();
79
- }
80
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
81
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
82
- try {
83
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
84
- if (!fs.existsSync(filePath)) return undefined;
85
- const data = fs.readFileSync(filePath, null);
86
- return data;
87
- } catch (error) {
88
- console.error(`Error reading object from local storage`, error.name, error.message);
89
- throw error;
90
- }
91
- }
92
-
93
- @SecureConnector.AccessControl
94
- async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
95
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
96
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
97
-
98
- try {
99
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
100
- if (!fs.existsSync(metadataFilePath)) return undefined;
101
- const data = fs.readFileSync(metadataFilePath, 'utf-8');
102
- return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
103
- } catch (error) {
104
- console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
105
- throw error;
106
- }
107
- }
108
-
109
- @SecureConnector.AccessControl
110
- async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
111
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
112
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
113
-
114
- try {
115
- let fileMetadata = await this.getMetadata(acRequest, resourceId);
116
- if (!fileMetadata) fileMetadata = {};
117
-
118
- fileMetadata = { ...fileMetadata, ...metadata };
119
-
120
- //now we can write the metadata
121
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
122
- const serializedMetadata = this.serializeMetadata(fileMetadata);
123
- fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
124
- } catch (error) {
125
- console.error(`Error setting metadata in local storage`, error.name, error.message);
126
- throw error;
127
- }
128
- }
129
- /**
130
- * Writes an object to the local storage.
131
- *
132
- * @param {string} resourceId - The key of the object to be written.
133
- * @param {any} value - The value of the object to be written.
134
- * @param {Metadata} metadata - Optional metadata to be associated with the object.
135
- * @returns {Promise<void>} - A promise that resolves when the object has been written.
136
- */
137
- @SecureConnector.AccessControl
138
- async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
139
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
140
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
141
- if (!this.isInitialized) {
142
- await this.initialize();
143
- }
144
- const accessCandidate = acRequest.candidate;
145
-
146
- let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
147
- let fileMetadata = {
148
- ...metadata,
149
- acl: localACL,
150
- };
151
-
152
- //now we can write the file
153
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
154
- fs.writeFileSync(filePath, value as Buffer);
155
- //now we can write the metadata
156
- await this.setMetadata(acRequest, resourceId, fileMetadata);
157
- }
158
-
159
- /**
160
- * Deletes an object from the local storage.
161
- *
162
- * @param {string} resourceId - The key of the object to be deleted.
163
- * @returns {Promise<void>} - A promise that resolves when the object has been deleted.
164
- */
165
- @SecureConnector.AccessControl
166
- async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
167
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
168
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
169
-
170
- try {
171
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
172
- if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
173
-
174
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
175
- if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
176
- } catch (error) {
177
- console.error(`Error deleting object from local storage`, error.name, error.message);
178
- throw error;
179
- }
180
- }
181
-
182
- @SecureConnector.AccessControl
183
- async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
184
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
185
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
186
- if (!this.isInitialized) {
187
- await this.initialize();
188
- }
189
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
190
- return !!fs.existsSync(filePath);
191
- }
192
-
193
- //this determines the access rights for the requested resource
194
- //the connector should check if the resource exists or not
195
- //if the resource exists we read it's ACL and return it
196
- //if the resource does not exist we return an write access ACL for the candidate
197
- public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
198
- if (!this.isInitialized) {
199
- await this.initialize();
200
- }
201
- const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
202
-
203
- if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
204
-
205
- const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
206
- const exists = metadata !== undefined; //undefined metadata means the resource does not exist
207
-
208
- if (!exists) {
209
- //the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
210
- return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
211
- }
212
- try {
213
- let metadataObject = JSON.parse(metadata);
214
- return ACL.from(metadataObject?.['acl'] as IACL);
215
- } catch (error) {
216
- console.error(`Error parsing metadata in local storage`, error.name, error.message);
217
- throw error;
218
- }
219
- }
220
-
221
- @SecureConnector.AccessControl
222
- async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
223
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
224
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
225
-
226
- try {
227
- const fileMetadata = await this.getMetadata(acRequest, resourceId);
228
- return ACL.from(fileMetadata?.['acl'] as IACL);
229
- } catch (error) {
230
- console.error(`Error getting access rights in local storage`, error.name, error.message);
231
- throw error;
232
- }
233
- }
234
-
235
- @SecureConnector.AccessControl
236
- async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
237
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
238
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
239
-
240
- try {
241
- let fileMetadata = await this.getMetadata(acRequest, resourceId);
242
- if (!fileMetadata) fileMetadata = {};
243
- //when setting ACL make sure to not lose ownership
244
- fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
245
- await this.setMetadata(acRequest, resourceId, fileMetadata);
246
- } catch (error) {
247
- console.error(`Error setting access rights in local storage`, error);
248
- throw error;
249
- }
250
- }
251
-
252
- @SecureConnector.AccessControl
253
- async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
254
- console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
255
- }
256
-
257
- private async initialize() {
258
- const storageFolderPath = path.join(this.folder, this.storagePrefix);
259
- if (!existsSync(storageFolderPath)) {
260
- fs.mkdirSync(storageFolderPath, { recursive: true });
261
- }
262
- const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
263
- if (!existsSync(metadataFolderPath)) {
264
- fs.mkdirSync(metadataFolderPath, { recursive: true });
265
- fs.writeFileSync(
266
- path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
267
- 'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
268
- );
269
- }
270
- this.isInitialized = true;
271
- }
272
-
273
- private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
274
- const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
275
- const folder = path.dirname(fullPath);
276
- if (createFoldersIfNotExists && !fs.existsSync(folder)) {
277
- fs.mkdirSync(folder, { recursive: true });
278
- }
279
-
280
- return fullPath;
281
- }
282
-
283
- private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
284
- const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
285
- const folder = path.dirname(fullPath);
286
- if (createFoldersIfNotExists && !fs.existsSync(folder)) {
287
- fs.mkdirSync(folder, { recursive: true });
288
- }
289
-
290
- return fullPath;
291
- }
292
-
293
- private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
294
- let updatedMetadata = {};
295
- if (metadata['acl']) {
296
- if (metadata['acl']) {
297
- updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
298
- }
299
-
300
- delete metadata['acl'];
301
- }
302
-
303
- for (let key in metadata) {
304
- updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
305
- }
306
-
307
- return updatedMetadata;
308
- }
309
-
310
- private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
311
- let deserializedMetadata: Record<string, any> = {};
312
-
313
- for (let key in metadata) {
314
- if (key === 'acl') {
315
- deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
316
- continue;
317
- }
318
-
319
- try {
320
- deserializedMetadata[key] = JSON.parse(metadata[key]);
321
- } catch (error) {
322
- deserializedMetadata[key] = metadata[key];
323
- }
324
- }
325
- return deserializedMetadata;
326
- }
327
- }
1
+ //==[ SRE: LocalStorage ]======================
2
+
3
+ import { Logger } from '@sre/helpers/Log.helper';
4
+ import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
5
+ import { ACL } from '@sre/Security/AccessControl/ACL.class';
6
+ import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
7
+ import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
8
+ //import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
9
+ import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
10
+ import { SecureConnector } from '@sre/Security/SecureConnector.class';
11
+ import fs, { existsSync } from 'fs';
12
+ import os from 'os';
13
+ import path from 'path';
14
+ import { findSmythPath } from '../../../..';
15
+
16
+ const console = Logger('LocalStorage');
17
+
18
+ export type LocalStorageConfig = {
19
+ /**
20
+ * The folder to use for the local storage.
21
+ *
22
+ * If not provided, the default folder will be used.
23
+ * The default folder is ~/.smyth/storage
24
+ */
25
+ folder?: string;
26
+ };
27
+
28
+ //TODO : detect and store ContentType metadata when saving
29
+
30
+ export class LocalStorage extends StorageConnector {
31
+ public name = 'LocalStorage';
32
+ private folder: string;
33
+ private storagePrefix = 'local';
34
+ private metadataPrefix = '.local.metadata';
35
+ private isInitialized = false;
36
+
37
+ constructor(protected _settings?: LocalStorageConfig) {
38
+ super(_settings);
39
+ //if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
40
+
41
+ this.folder = this.findStorageFolder(_settings?.folder);
42
+ this.initialize();
43
+ if (!fs.existsSync(this.folder)) {
44
+ //throw new Error('Invalid folder provided');
45
+ console.error(`Invalid folder provided: ${this.folder}`);
46
+ }
47
+ }
48
+
49
+ private findStorageFolder(folder) {
50
+ let _storageFolder = folder;
51
+
52
+ if (fs.existsSync(_storageFolder)) {
53
+ return _storageFolder;
54
+ }
55
+
56
+ _storageFolder = findSmythPath('storage');
57
+
58
+ if (fs.existsSync(_storageFolder)) {
59
+ console.warn('Using alternative storage folder found in : ', _storageFolder);
60
+ return _storageFolder;
61
+ }
62
+
63
+ console.warn('!!! All attempts to find an existing storage folder failed !!!');
64
+ console.warn('!!! I will use this folder: ', _storageFolder);
65
+ return _storageFolder;
66
+ }
67
+
68
+ /**
69
+ * Reads an object from the local storage.
70
+ *
71
+ * @param {string} resourceId - The key of the object to be read.
72
+ * @returns {Promise<any>} - A promise that resolves with the object data.
73
+ */
74
+
75
+ @SecureConnector.AccessControl
76
+ public async read(acRequest: AccessRequest, resourceId: string) {
77
+ if (!this.isInitialized) {
78
+ await this.initialize();
79
+ }
80
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
81
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
82
+ try {
83
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
84
+ if (!fs.existsSync(filePath)) return undefined;
85
+ const data = fs.readFileSync(filePath, null);
86
+ return data;
87
+ } catch (error) {
88
+ console.error(`Error reading object from local storage`, error.name, error.message);
89
+ throw error;
90
+ }
91
+ }
92
+
93
+ @SecureConnector.AccessControl
94
+ async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
95
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
96
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
97
+
98
+ try {
99
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
100
+ if (!fs.existsSync(metadataFilePath)) return undefined;
101
+ const data = fs.readFileSync(metadataFilePath, 'utf-8');
102
+ return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
103
+ } catch (error) {
104
+ console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
105
+ throw error;
106
+ }
107
+ }
108
+
109
+ @SecureConnector.AccessControl
110
+ async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
111
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
112
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
113
+
114
+ try {
115
+ let fileMetadata = await this.getMetadata(acRequest, resourceId);
116
+ if (!fileMetadata) fileMetadata = {};
117
+
118
+ fileMetadata = { ...fileMetadata, ...metadata };
119
+
120
+ //now we can write the metadata
121
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
122
+ const serializedMetadata = this.serializeMetadata(fileMetadata);
123
+ fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
124
+ } catch (error) {
125
+ console.error(`Error setting metadata in local storage`, error.name, error.message);
126
+ throw error;
127
+ }
128
+ }
129
+ /**
130
+ * Writes an object to the local storage.
131
+ *
132
+ * @param {string} resourceId - The key of the object to be written.
133
+ * @param {any} value - The value of the object to be written.
134
+ * @param {Metadata} metadata - Optional metadata to be associated with the object.
135
+ * @returns {Promise<void>} - A promise that resolves when the object has been written.
136
+ */
137
+ @SecureConnector.AccessControl
138
+ async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
139
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
140
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
141
+ if (!this.isInitialized) {
142
+ await this.initialize();
143
+ }
144
+ const accessCandidate = acRequest.candidate;
145
+
146
+ let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
147
+ let fileMetadata = {
148
+ ...metadata,
149
+ acl: localACL,
150
+ };
151
+
152
+ //now we can write the file
153
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
154
+ fs.writeFileSync(filePath, value as Buffer);
155
+ //now we can write the metadata
156
+ await this.setMetadata(acRequest, resourceId, fileMetadata);
157
+ }
158
+
159
+ /**
160
+ * Deletes an object from the local storage.
161
+ *
162
+ * @param {string} resourceId - The key of the object to be deleted.
163
+ * @returns {Promise<void>} - A promise that resolves when the object has been deleted.
164
+ */
165
+ @SecureConnector.AccessControl
166
+ async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
167
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
168
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
169
+
170
+ try {
171
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
172
+ if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
173
+
174
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
175
+ if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
176
+ } catch (error) {
177
+ console.error(`Error deleting object from local storage`, error.name, error.message);
178
+ throw error;
179
+ }
180
+ }
181
+
182
+ @SecureConnector.AccessControl
183
+ async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
184
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
185
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
186
+ if (!this.isInitialized) {
187
+ await this.initialize();
188
+ }
189
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
190
+ return !!fs.existsSync(filePath);
191
+ }
192
+
193
+ //this determines the access rights for the requested resource
194
+ //the connector should check if the resource exists or not
195
+ //if the resource exists we read it's ACL and return it
196
+ //if the resource does not exist we return an write access ACL for the candidate
197
+ public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
198
+ if (!this.isInitialized) {
199
+ await this.initialize();
200
+ }
201
+ const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
202
+
203
+ if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
204
+
205
+ const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
206
+ const exists = metadata !== undefined; //undefined metadata means the resource does not exist
207
+
208
+ if (!exists) {
209
+ //the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
210
+ return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
211
+ }
212
+ try {
213
+ let metadataObject = JSON.parse(metadata);
214
+ return ACL.from(metadataObject?.['acl'] as IACL);
215
+ } catch (error) {
216
+ console.error(`Error parsing metadata in local storage`, error.name, error.message);
217
+ throw error;
218
+ }
219
+ }
220
+
221
+ @SecureConnector.AccessControl
222
+ async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
223
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
224
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
225
+
226
+ try {
227
+ const fileMetadata = await this.getMetadata(acRequest, resourceId);
228
+ return ACL.from(fileMetadata?.['acl'] as IACL);
229
+ } catch (error) {
230
+ console.error(`Error getting access rights in local storage`, error.name, error.message);
231
+ throw error;
232
+ }
233
+ }
234
+
235
+ @SecureConnector.AccessControl
236
+ async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
237
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
238
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
239
+
240
+ try {
241
+ let fileMetadata = await this.getMetadata(acRequest, resourceId);
242
+ if (!fileMetadata) fileMetadata = {};
243
+ //when setting ACL make sure to not lose ownership
244
+ fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
245
+ await this.setMetadata(acRequest, resourceId, fileMetadata);
246
+ } catch (error) {
247
+ console.error(`Error setting access rights in local storage`, error);
248
+ throw error;
249
+ }
250
+ }
251
+
252
+ @SecureConnector.AccessControl
253
+ async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
254
+ console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
255
+ }
256
+
257
+ private async initialize() {
258
+ const storageFolderPath = path.join(this.folder, this.storagePrefix);
259
+ if (!existsSync(storageFolderPath)) {
260
+ fs.mkdirSync(storageFolderPath, { recursive: true });
261
+ }
262
+ const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
263
+ if (!existsSync(metadataFolderPath)) {
264
+ fs.mkdirSync(metadataFolderPath, { recursive: true });
265
+ fs.writeFileSync(
266
+ path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
267
+ 'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
268
+ );
269
+ }
270
+ this.isInitialized = true;
271
+ }
272
+
273
+ private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
274
+ const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
275
+ const folder = path.dirname(fullPath);
276
+ if (createFoldersIfNotExists && !fs.existsSync(folder)) {
277
+ fs.mkdirSync(folder, { recursive: true });
278
+ }
279
+
280
+ return fullPath;
281
+ }
282
+
283
+ private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
284
+ const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
285
+ const folder = path.dirname(fullPath);
286
+ if (createFoldersIfNotExists && !fs.existsSync(folder)) {
287
+ fs.mkdirSync(folder, { recursive: true });
288
+ }
289
+
290
+ return fullPath;
291
+ }
292
+
293
+ private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
294
+ let updatedMetadata = {};
295
+ if (metadata['acl']) {
296
+ if (metadata['acl']) {
297
+ updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
298
+ }
299
+
300
+ delete metadata['acl'];
301
+ }
302
+
303
+ for (let key in metadata) {
304
+ updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
305
+ }
306
+
307
+ return updatedMetadata;
308
+ }
309
+
310
+ private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
311
+ let deserializedMetadata: Record<string, any> = {};
312
+
313
+ for (let key in metadata) {
314
+ if (key === 'acl') {
315
+ deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
316
+ continue;
317
+ }
318
+
319
+ try {
320
+ deserializedMetadata[key] = JSON.parse(metadata[key]);
321
+ } catch (error) {
322
+ deserializedMetadata[key] = metadata[key];
323
+ }
324
+ }
325
+ return deserializedMetadata;
326
+ }
327
+ }