@smythos/sre 1.5.53 → 1.5.54
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +98 -98
- package/LICENSE +18 -18
- package/README.md +135 -135
- package/dist/bundle-analysis-lazy.html +4949 -0
- package/dist/bundle-analysis.html +4949 -0
- package/dist/index.js +3 -3
- package/dist/index.js.map +1 -1
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +1 -6
- package/dist/types/utils/package-manager.utils.d.ts +26 -0
- package/package.json +1 -1
- package/src/Components/APICall/APICall.class.ts +157 -157
- package/src/Components/APICall/AccessTokenManager.ts +166 -166
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
- package/src/Components/APICall/OAuth.helper.ts +447 -447
- package/src/Components/APICall/mimeTypeCategories.ts +46 -46
- package/src/Components/APICall/parseData.ts +167 -167
- package/src/Components/APICall/parseHeaders.ts +41 -41
- package/src/Components/APICall/parseProxy.ts +68 -68
- package/src/Components/APICall/parseUrl.ts +91 -91
- package/src/Components/APIEndpoint.class.ts +234 -234
- package/src/Components/APIOutput.class.ts +58 -58
- package/src/Components/AgentPlugin.class.ts +102 -102
- package/src/Components/Async.class.ts +155 -155
- package/src/Components/Await.class.ts +90 -90
- package/src/Components/Classifier.class.ts +158 -158
- package/src/Components/Component.class.ts +132 -132
- package/src/Components/ComponentHost.class.ts +38 -38
- package/src/Components/DataSourceCleaner.class.ts +92 -92
- package/src/Components/DataSourceIndexer.class.ts +181 -181
- package/src/Components/DataSourceLookup.class.ts +161 -161
- package/src/Components/ECMASandbox.class.ts +71 -71
- package/src/Components/FEncDec.class.ts +29 -29
- package/src/Components/FHash.class.ts +33 -33
- package/src/Components/FSign.class.ts +80 -80
- package/src/Components/FSleep.class.ts +25 -25
- package/src/Components/FTimestamp.class.ts +25 -25
- package/src/Components/FileStore.class.ts +78 -78
- package/src/Components/ForEach.class.ts +97 -97
- package/src/Components/GPTPlugin.class.ts +70 -70
- package/src/Components/GenAILLM.class.ts +586 -586
- package/src/Components/HuggingFace.class.ts +314 -314
- package/src/Components/Image/imageSettings.config.ts +70 -70
- package/src/Components/ImageGenerator.class.ts +502 -502
- package/src/Components/JSONFilter.class.ts +54 -54
- package/src/Components/LLMAssistant.class.ts +213 -213
- package/src/Components/LogicAND.class.ts +28 -28
- package/src/Components/LogicAtLeast.class.ts +85 -85
- package/src/Components/LogicAtMost.class.ts +86 -86
- package/src/Components/LogicOR.class.ts +29 -29
- package/src/Components/LogicXOR.class.ts +34 -34
- package/src/Components/MCPClient.class.ts +138 -138
- package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
- package/src/Components/MemoryReadKeyVal.class.ts +66 -66
- package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
- package/src/Components/MemoryWriteObject.class.ts +97 -97
- package/src/Components/MultimodalLLM.class.ts +128 -128
- package/src/Components/OpenAPI.class.ts +72 -72
- package/src/Components/PromptGenerator.class.ts +122 -122
- package/src/Components/ScrapflyWebScrape.class.ts +159 -159
- package/src/Components/ServerlessCode.class.ts +123 -123
- package/src/Components/TavilyWebSearch.class.ts +98 -98
- package/src/Components/VisionLLM.class.ts +104 -104
- package/src/Components/ZapierAction.class.ts +127 -127
- package/src/Components/index.ts +97 -97
- package/src/Core/AgentProcess.helper.ts +240 -240
- package/src/Core/Connector.class.ts +123 -123
- package/src/Core/ConnectorsService.ts +197 -197
- package/src/Core/DummyConnector.ts +49 -49
- package/src/Core/HookService.ts +105 -105
- package/src/Core/SmythRuntime.class.ts +235 -235
- package/src/Core/SystemEvents.ts +16 -16
- package/src/Core/boot.ts +56 -56
- package/src/config.ts +15 -15
- package/src/constants.ts +126 -126
- package/src/data/hugging-face.params.json +579 -579
- package/src/helpers/AWSLambdaCode.helper.ts +590 -590
- package/src/helpers/BinaryInput.helper.ts +331 -331
- package/src/helpers/Conversation.helper.ts +1119 -1119
- package/src/helpers/ECMASandbox.helper.ts +54 -54
- package/src/helpers/JsonContent.helper.ts +97 -97
- package/src/helpers/LocalCache.helper.ts +97 -97
- package/src/helpers/Log.helper.ts +274 -274
- package/src/helpers/OpenApiParser.helper.ts +150 -150
- package/src/helpers/S3Cache.helper.ts +147 -147
- package/src/helpers/SmythURI.helper.ts +5 -5
- package/src/helpers/Sysconfig.helper.ts +77 -77
- package/src/helpers/TemplateString.helper.ts +243 -243
- package/src/helpers/TypeChecker.helper.ts +329 -329
- package/src/index.ts +3 -3
- package/src/index.ts.bak +3 -3
- package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
- package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -297
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
- package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
- package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
- package/src/subsystems/IO/CLI.service/index.ts +9 -9
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
- package/src/subsystems/IO/Log.service/index.ts +13 -13
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
- package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
- package/src/subsystems/IO/NKV.service/index.ts +14 -14
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
- package/src/subsystems/IO/Router.service/index.ts +11 -11
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
- package/src/subsystems/IO/Storage.service/index.ts +13 -13
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
- package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
- package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
- package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
- package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
- package/src/subsystems/LLMManager/custom-models.ts +854 -854
- package/src/subsystems/LLMManager/models.ts +2540 -2540
- package/src/subsystems/LLMManager/paramMappings.ts +69 -69
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
- package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
- package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
- package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
- package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
- package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
- package/src/subsystems/Security/Account.service/index.ts +14 -14
- package/src/subsystems/Security/Credentials.helper.ts +62 -62
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
- package/src/subsystems/Security/SecureConnector.class.ts +110 -110
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
- package/src/subsystems/Security/Vault.service/index.ts +12 -12
- package/src/types/ACL.types.ts +104 -104
- package/src/types/AWS.types.ts +10 -10
- package/src/types/Agent.types.ts +61 -61
- package/src/types/AgentLogger.types.ts +17 -17
- package/src/types/Cache.types.ts +1 -1
- package/src/types/Common.types.ts +2 -2
- package/src/types/LLM.types.ts +496 -496
- package/src/types/Redis.types.ts +8 -8
- package/src/types/SRE.types.ts +64 -64
- package/src/types/Security.types.ts +14 -14
- package/src/types/Storage.types.ts +5 -5
- package/src/types/VectorDB.types.ts +86 -86
- package/src/utils/base64.utils.ts +275 -275
- package/src/utils/cli.utils.ts +68 -68
- package/src/utils/data.utils.ts +322 -322
- package/src/utils/date-time.utils.ts +22 -22
- package/src/utils/general.utils.ts +238 -238
- package/src/utils/index.ts +12 -12
- package/src/utils/lazy-client.ts +261 -261
- package/src/utils/numbers.utils.ts +13 -13
- package/src/utils/oauth.utils.ts +35 -35
- package/src/utils/string.utils.ts +414 -414
- package/src/utils/url.utils.ts +19 -19
- package/src/utils/validation.utils.ts +74 -74
- package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
|
@@ -1,327 +1,327 @@
|
|
|
1
|
-
//==[ SRE: LocalStorage ]======================
|
|
2
|
-
|
|
3
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
4
|
-
import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
|
|
5
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
6
|
-
import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
|
|
7
|
-
import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
|
|
8
|
-
//import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
9
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
10
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
11
|
-
import fs, { existsSync } from 'fs';
|
|
12
|
-
import os from 'os';
|
|
13
|
-
import path from 'path';
|
|
14
|
-
import { findSmythPath } from '../../../..';
|
|
15
|
-
|
|
16
|
-
const console = Logger('LocalStorage');
|
|
17
|
-
|
|
18
|
-
export type LocalStorageConfig = {
|
|
19
|
-
/**
|
|
20
|
-
* The folder to use for the local storage.
|
|
21
|
-
*
|
|
22
|
-
* If not provided, the default folder will be used.
|
|
23
|
-
* The default folder is ~/.smyth/storage
|
|
24
|
-
*/
|
|
25
|
-
folder?: string;
|
|
26
|
-
};
|
|
27
|
-
|
|
28
|
-
//TODO : detect and store ContentType metadata when saving
|
|
29
|
-
|
|
30
|
-
export class LocalStorage extends StorageConnector {
|
|
31
|
-
public name = 'LocalStorage';
|
|
32
|
-
private folder: string;
|
|
33
|
-
private storagePrefix = 'local';
|
|
34
|
-
private metadataPrefix = '.local.metadata';
|
|
35
|
-
private isInitialized = false;
|
|
36
|
-
|
|
37
|
-
constructor(protected _settings?: LocalStorageConfig) {
|
|
38
|
-
super(_settings);
|
|
39
|
-
//if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
|
|
40
|
-
|
|
41
|
-
this.folder = this.findStorageFolder(_settings?.folder);
|
|
42
|
-
this.initialize();
|
|
43
|
-
if (!fs.existsSync(this.folder)) {
|
|
44
|
-
//throw new Error('Invalid folder provided');
|
|
45
|
-
console.error(`Invalid folder provided: ${this.folder}`);
|
|
46
|
-
}
|
|
47
|
-
}
|
|
48
|
-
|
|
49
|
-
private findStorageFolder(folder) {
|
|
50
|
-
let _storageFolder = folder;
|
|
51
|
-
|
|
52
|
-
if (fs.existsSync(_storageFolder)) {
|
|
53
|
-
return _storageFolder;
|
|
54
|
-
}
|
|
55
|
-
|
|
56
|
-
_storageFolder = findSmythPath('storage');
|
|
57
|
-
|
|
58
|
-
if (fs.existsSync(_storageFolder)) {
|
|
59
|
-
console.warn('Using alternative storage folder found in : ', _storageFolder);
|
|
60
|
-
return _storageFolder;
|
|
61
|
-
}
|
|
62
|
-
|
|
63
|
-
console.warn('!!! All attempts to find an existing storage folder failed !!!');
|
|
64
|
-
console.warn('!!! I will use this folder: ', _storageFolder);
|
|
65
|
-
return _storageFolder;
|
|
66
|
-
}
|
|
67
|
-
|
|
68
|
-
/**
|
|
69
|
-
* Reads an object from the local storage.
|
|
70
|
-
*
|
|
71
|
-
* @param {string} resourceId - The key of the object to be read.
|
|
72
|
-
* @returns {Promise<any>} - A promise that resolves with the object data.
|
|
73
|
-
*/
|
|
74
|
-
|
|
75
|
-
@SecureConnector.AccessControl
|
|
76
|
-
public async read(acRequest: AccessRequest, resourceId: string) {
|
|
77
|
-
if (!this.isInitialized) {
|
|
78
|
-
await this.initialize();
|
|
79
|
-
}
|
|
80
|
-
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
81
|
-
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
82
|
-
try {
|
|
83
|
-
const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
|
|
84
|
-
if (!fs.existsSync(filePath)) return undefined;
|
|
85
|
-
const data = fs.readFileSync(filePath, null);
|
|
86
|
-
return data;
|
|
87
|
-
} catch (error) {
|
|
88
|
-
console.error(`Error reading object from local storage`, error.name, error.message);
|
|
89
|
-
throw error;
|
|
90
|
-
}
|
|
91
|
-
}
|
|
92
|
-
|
|
93
|
-
@SecureConnector.AccessControl
|
|
94
|
-
async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
|
|
95
|
-
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
96
|
-
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
97
|
-
|
|
98
|
-
try {
|
|
99
|
-
const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
|
|
100
|
-
if (!fs.existsSync(metadataFilePath)) return undefined;
|
|
101
|
-
const data = fs.readFileSync(metadataFilePath, 'utf-8');
|
|
102
|
-
return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
|
|
103
|
-
} catch (error) {
|
|
104
|
-
console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
|
|
105
|
-
throw error;
|
|
106
|
-
}
|
|
107
|
-
}
|
|
108
|
-
|
|
109
|
-
@SecureConnector.AccessControl
|
|
110
|
-
async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
|
|
111
|
-
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
112
|
-
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
113
|
-
|
|
114
|
-
try {
|
|
115
|
-
let fileMetadata = await this.getMetadata(acRequest, resourceId);
|
|
116
|
-
if (!fileMetadata) fileMetadata = {};
|
|
117
|
-
|
|
118
|
-
fileMetadata = { ...fileMetadata, ...metadata };
|
|
119
|
-
|
|
120
|
-
//now we can write the metadata
|
|
121
|
-
const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
|
|
122
|
-
const serializedMetadata = this.serializeMetadata(fileMetadata);
|
|
123
|
-
fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
|
|
124
|
-
} catch (error) {
|
|
125
|
-
console.error(`Error setting metadata in local storage`, error.name, error.message);
|
|
126
|
-
throw error;
|
|
127
|
-
}
|
|
128
|
-
}
|
|
129
|
-
/**
|
|
130
|
-
* Writes an object to the local storage.
|
|
131
|
-
*
|
|
132
|
-
* @param {string} resourceId - The key of the object to be written.
|
|
133
|
-
* @param {any} value - The value of the object to be written.
|
|
134
|
-
* @param {Metadata} metadata - Optional metadata to be associated with the object.
|
|
135
|
-
* @returns {Promise<void>} - A promise that resolves when the object has been written.
|
|
136
|
-
*/
|
|
137
|
-
@SecureConnector.AccessControl
|
|
138
|
-
async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
|
|
139
|
-
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
140
|
-
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
141
|
-
if (!this.isInitialized) {
|
|
142
|
-
await this.initialize();
|
|
143
|
-
}
|
|
144
|
-
const accessCandidate = acRequest.candidate;
|
|
145
|
-
|
|
146
|
-
let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
|
|
147
|
-
let fileMetadata = {
|
|
148
|
-
...metadata,
|
|
149
|
-
acl: localACL,
|
|
150
|
-
};
|
|
151
|
-
|
|
152
|
-
//now we can write the file
|
|
153
|
-
const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
|
|
154
|
-
fs.writeFileSync(filePath, value as Buffer);
|
|
155
|
-
//now we can write the metadata
|
|
156
|
-
await this.setMetadata(acRequest, resourceId, fileMetadata);
|
|
157
|
-
}
|
|
158
|
-
|
|
159
|
-
/**
|
|
160
|
-
* Deletes an object from the local storage.
|
|
161
|
-
*
|
|
162
|
-
* @param {string} resourceId - The key of the object to be deleted.
|
|
163
|
-
* @returns {Promise<void>} - A promise that resolves when the object has been deleted.
|
|
164
|
-
*/
|
|
165
|
-
@SecureConnector.AccessControl
|
|
166
|
-
async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
|
|
167
|
-
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
168
|
-
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
169
|
-
|
|
170
|
-
try {
|
|
171
|
-
const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
|
|
172
|
-
if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
|
|
173
|
-
|
|
174
|
-
const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
|
|
175
|
-
if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
|
|
176
|
-
} catch (error) {
|
|
177
|
-
console.error(`Error deleting object from local storage`, error.name, error.message);
|
|
178
|
-
throw error;
|
|
179
|
-
}
|
|
180
|
-
}
|
|
181
|
-
|
|
182
|
-
@SecureConnector.AccessControl
|
|
183
|
-
async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
|
|
184
|
-
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
185
|
-
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
186
|
-
if (!this.isInitialized) {
|
|
187
|
-
await this.initialize();
|
|
188
|
-
}
|
|
189
|
-
const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
|
|
190
|
-
return !!fs.existsSync(filePath);
|
|
191
|
-
}
|
|
192
|
-
|
|
193
|
-
//this determines the access rights for the requested resource
|
|
194
|
-
//the connector should check if the resource exists or not
|
|
195
|
-
//if the resource exists we read it's ACL and return it
|
|
196
|
-
//if the resource does not exist we return an write access ACL for the candidate
|
|
197
|
-
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
198
|
-
if (!this.isInitialized) {
|
|
199
|
-
await this.initialize();
|
|
200
|
-
}
|
|
201
|
-
const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
|
|
202
|
-
|
|
203
|
-
if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
|
|
204
|
-
|
|
205
|
-
const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
|
|
206
|
-
const exists = metadata !== undefined; //undefined metadata means the resource does not exist
|
|
207
|
-
|
|
208
|
-
if (!exists) {
|
|
209
|
-
//the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
|
|
210
|
-
return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
|
|
211
|
-
}
|
|
212
|
-
try {
|
|
213
|
-
let metadataObject = JSON.parse(metadata);
|
|
214
|
-
return ACL.from(metadataObject?.['acl'] as IACL);
|
|
215
|
-
} catch (error) {
|
|
216
|
-
console.error(`Error parsing metadata in local storage`, error.name, error.message);
|
|
217
|
-
throw error;
|
|
218
|
-
}
|
|
219
|
-
}
|
|
220
|
-
|
|
221
|
-
@SecureConnector.AccessControl
|
|
222
|
-
async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
|
|
223
|
-
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
224
|
-
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
225
|
-
|
|
226
|
-
try {
|
|
227
|
-
const fileMetadata = await this.getMetadata(acRequest, resourceId);
|
|
228
|
-
return ACL.from(fileMetadata?.['acl'] as IACL);
|
|
229
|
-
} catch (error) {
|
|
230
|
-
console.error(`Error getting access rights in local storage`, error.name, error.message);
|
|
231
|
-
throw error;
|
|
232
|
-
}
|
|
233
|
-
}
|
|
234
|
-
|
|
235
|
-
@SecureConnector.AccessControl
|
|
236
|
-
async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
|
|
237
|
-
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
238
|
-
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
239
|
-
|
|
240
|
-
try {
|
|
241
|
-
let fileMetadata = await this.getMetadata(acRequest, resourceId);
|
|
242
|
-
if (!fileMetadata) fileMetadata = {};
|
|
243
|
-
//when setting ACL make sure to not lose ownership
|
|
244
|
-
fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
|
|
245
|
-
await this.setMetadata(acRequest, resourceId, fileMetadata);
|
|
246
|
-
} catch (error) {
|
|
247
|
-
console.error(`Error setting access rights in local storage`, error);
|
|
248
|
-
throw error;
|
|
249
|
-
}
|
|
250
|
-
}
|
|
251
|
-
|
|
252
|
-
@SecureConnector.AccessControl
|
|
253
|
-
async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
|
|
254
|
-
console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
|
|
255
|
-
}
|
|
256
|
-
|
|
257
|
-
private async initialize() {
|
|
258
|
-
const storageFolderPath = path.join(this.folder, this.storagePrefix);
|
|
259
|
-
if (!existsSync(storageFolderPath)) {
|
|
260
|
-
fs.mkdirSync(storageFolderPath, { recursive: true });
|
|
261
|
-
}
|
|
262
|
-
const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
|
|
263
|
-
if (!existsSync(metadataFolderPath)) {
|
|
264
|
-
fs.mkdirSync(metadataFolderPath, { recursive: true });
|
|
265
|
-
fs.writeFileSync(
|
|
266
|
-
path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
|
|
267
|
-
'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
|
|
268
|
-
);
|
|
269
|
-
}
|
|
270
|
-
this.isInitialized = true;
|
|
271
|
-
}
|
|
272
|
-
|
|
273
|
-
private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
|
|
274
|
-
const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
|
|
275
|
-
const folder = path.dirname(fullPath);
|
|
276
|
-
if (createFoldersIfNotExists && !fs.existsSync(folder)) {
|
|
277
|
-
fs.mkdirSync(folder, { recursive: true });
|
|
278
|
-
}
|
|
279
|
-
|
|
280
|
-
return fullPath;
|
|
281
|
-
}
|
|
282
|
-
|
|
283
|
-
private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
|
|
284
|
-
const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
|
|
285
|
-
const folder = path.dirname(fullPath);
|
|
286
|
-
if (createFoldersIfNotExists && !fs.existsSync(folder)) {
|
|
287
|
-
fs.mkdirSync(folder, { recursive: true });
|
|
288
|
-
}
|
|
289
|
-
|
|
290
|
-
return fullPath;
|
|
291
|
-
}
|
|
292
|
-
|
|
293
|
-
private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
|
|
294
|
-
let updatedMetadata = {};
|
|
295
|
-
if (metadata['acl']) {
|
|
296
|
-
if (metadata['acl']) {
|
|
297
|
-
updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
|
|
298
|
-
}
|
|
299
|
-
|
|
300
|
-
delete metadata['acl'];
|
|
301
|
-
}
|
|
302
|
-
|
|
303
|
-
for (let key in metadata) {
|
|
304
|
-
updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
|
|
305
|
-
}
|
|
306
|
-
|
|
307
|
-
return updatedMetadata;
|
|
308
|
-
}
|
|
309
|
-
|
|
310
|
-
private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
|
|
311
|
-
let deserializedMetadata: Record<string, any> = {};
|
|
312
|
-
|
|
313
|
-
for (let key in metadata) {
|
|
314
|
-
if (key === 'acl') {
|
|
315
|
-
deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
|
|
316
|
-
continue;
|
|
317
|
-
}
|
|
318
|
-
|
|
319
|
-
try {
|
|
320
|
-
deserializedMetadata[key] = JSON.parse(metadata[key]);
|
|
321
|
-
} catch (error) {
|
|
322
|
-
deserializedMetadata[key] = metadata[key];
|
|
323
|
-
}
|
|
324
|
-
}
|
|
325
|
-
return deserializedMetadata;
|
|
326
|
-
}
|
|
327
|
-
}
|
|
1
|
+
//==[ SRE: LocalStorage ]======================
|
|
2
|
+
|
|
3
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
4
|
+
import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
|
|
5
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
6
|
+
import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
|
|
7
|
+
import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
|
|
8
|
+
//import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
9
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
10
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
11
|
+
import fs, { existsSync } from 'fs';
|
|
12
|
+
import os from 'os';
|
|
13
|
+
import path from 'path';
|
|
14
|
+
import { findSmythPath } from '../../../..';
|
|
15
|
+
|
|
16
|
+
const console = Logger('LocalStorage');
|
|
17
|
+
|
|
18
|
+
export type LocalStorageConfig = {
|
|
19
|
+
/**
|
|
20
|
+
* The folder to use for the local storage.
|
|
21
|
+
*
|
|
22
|
+
* If not provided, the default folder will be used.
|
|
23
|
+
* The default folder is ~/.smyth/storage
|
|
24
|
+
*/
|
|
25
|
+
folder?: string;
|
|
26
|
+
};
|
|
27
|
+
|
|
28
|
+
//TODO : detect and store ContentType metadata when saving
|
|
29
|
+
|
|
30
|
+
export class LocalStorage extends StorageConnector {
|
|
31
|
+
public name = 'LocalStorage';
|
|
32
|
+
private folder: string;
|
|
33
|
+
private storagePrefix = 'local';
|
|
34
|
+
private metadataPrefix = '.local.metadata';
|
|
35
|
+
private isInitialized = false;
|
|
36
|
+
|
|
37
|
+
constructor(protected _settings?: LocalStorageConfig) {
|
|
38
|
+
super(_settings);
|
|
39
|
+
//if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
|
|
40
|
+
|
|
41
|
+
this.folder = this.findStorageFolder(_settings?.folder);
|
|
42
|
+
this.initialize();
|
|
43
|
+
if (!fs.existsSync(this.folder)) {
|
|
44
|
+
//throw new Error('Invalid folder provided');
|
|
45
|
+
console.error(`Invalid folder provided: ${this.folder}`);
|
|
46
|
+
}
|
|
47
|
+
}
|
|
48
|
+
|
|
49
|
+
private findStorageFolder(folder) {
|
|
50
|
+
let _storageFolder = folder;
|
|
51
|
+
|
|
52
|
+
if (fs.existsSync(_storageFolder)) {
|
|
53
|
+
return _storageFolder;
|
|
54
|
+
}
|
|
55
|
+
|
|
56
|
+
_storageFolder = findSmythPath('storage');
|
|
57
|
+
|
|
58
|
+
if (fs.existsSync(_storageFolder)) {
|
|
59
|
+
console.warn('Using alternative storage folder found in : ', _storageFolder);
|
|
60
|
+
return _storageFolder;
|
|
61
|
+
}
|
|
62
|
+
|
|
63
|
+
console.warn('!!! All attempts to find an existing storage folder failed !!!');
|
|
64
|
+
console.warn('!!! I will use this folder: ', _storageFolder);
|
|
65
|
+
return _storageFolder;
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
/**
|
|
69
|
+
* Reads an object from the local storage.
|
|
70
|
+
*
|
|
71
|
+
* @param {string} resourceId - The key of the object to be read.
|
|
72
|
+
* @returns {Promise<any>} - A promise that resolves with the object data.
|
|
73
|
+
*/
|
|
74
|
+
|
|
75
|
+
@SecureConnector.AccessControl
|
|
76
|
+
public async read(acRequest: AccessRequest, resourceId: string) {
|
|
77
|
+
if (!this.isInitialized) {
|
|
78
|
+
await this.initialize();
|
|
79
|
+
}
|
|
80
|
+
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
81
|
+
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
82
|
+
try {
|
|
83
|
+
const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
|
|
84
|
+
if (!fs.existsSync(filePath)) return undefined;
|
|
85
|
+
const data = fs.readFileSync(filePath, null);
|
|
86
|
+
return data;
|
|
87
|
+
} catch (error) {
|
|
88
|
+
console.error(`Error reading object from local storage`, error.name, error.message);
|
|
89
|
+
throw error;
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
|
|
93
|
+
@SecureConnector.AccessControl
|
|
94
|
+
async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
|
|
95
|
+
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
96
|
+
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
97
|
+
|
|
98
|
+
try {
|
|
99
|
+
const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
|
|
100
|
+
if (!fs.existsSync(metadataFilePath)) return undefined;
|
|
101
|
+
const data = fs.readFileSync(metadataFilePath, 'utf-8');
|
|
102
|
+
return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
|
|
103
|
+
} catch (error) {
|
|
104
|
+
console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
|
|
105
|
+
throw error;
|
|
106
|
+
}
|
|
107
|
+
}
|
|
108
|
+
|
|
109
|
+
@SecureConnector.AccessControl
|
|
110
|
+
async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
|
|
111
|
+
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
112
|
+
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
113
|
+
|
|
114
|
+
try {
|
|
115
|
+
let fileMetadata = await this.getMetadata(acRequest, resourceId);
|
|
116
|
+
if (!fileMetadata) fileMetadata = {};
|
|
117
|
+
|
|
118
|
+
fileMetadata = { ...fileMetadata, ...metadata };
|
|
119
|
+
|
|
120
|
+
//now we can write the metadata
|
|
121
|
+
const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
|
|
122
|
+
const serializedMetadata = this.serializeMetadata(fileMetadata);
|
|
123
|
+
fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
|
|
124
|
+
} catch (error) {
|
|
125
|
+
console.error(`Error setting metadata in local storage`, error.name, error.message);
|
|
126
|
+
throw error;
|
|
127
|
+
}
|
|
128
|
+
}
|
|
129
|
+
/**
|
|
130
|
+
* Writes an object to the local storage.
|
|
131
|
+
*
|
|
132
|
+
* @param {string} resourceId - The key of the object to be written.
|
|
133
|
+
* @param {any} value - The value of the object to be written.
|
|
134
|
+
* @param {Metadata} metadata - Optional metadata to be associated with the object.
|
|
135
|
+
* @returns {Promise<void>} - A promise that resolves when the object has been written.
|
|
136
|
+
*/
|
|
137
|
+
@SecureConnector.AccessControl
|
|
138
|
+
async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
|
|
139
|
+
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
140
|
+
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
141
|
+
if (!this.isInitialized) {
|
|
142
|
+
await this.initialize();
|
|
143
|
+
}
|
|
144
|
+
const accessCandidate = acRequest.candidate;
|
|
145
|
+
|
|
146
|
+
let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
|
|
147
|
+
let fileMetadata = {
|
|
148
|
+
...metadata,
|
|
149
|
+
acl: localACL,
|
|
150
|
+
};
|
|
151
|
+
|
|
152
|
+
//now we can write the file
|
|
153
|
+
const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
|
|
154
|
+
fs.writeFileSync(filePath, value as Buffer);
|
|
155
|
+
//now we can write the metadata
|
|
156
|
+
await this.setMetadata(acRequest, resourceId, fileMetadata);
|
|
157
|
+
}
|
|
158
|
+
|
|
159
|
+
/**
|
|
160
|
+
* Deletes an object from the local storage.
|
|
161
|
+
*
|
|
162
|
+
* @param {string} resourceId - The key of the object to be deleted.
|
|
163
|
+
* @returns {Promise<void>} - A promise that resolves when the object has been deleted.
|
|
164
|
+
*/
|
|
165
|
+
@SecureConnector.AccessControl
|
|
166
|
+
async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
|
|
167
|
+
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
168
|
+
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
169
|
+
|
|
170
|
+
try {
|
|
171
|
+
const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
|
|
172
|
+
if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
|
|
173
|
+
|
|
174
|
+
const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
|
|
175
|
+
if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
|
|
176
|
+
} catch (error) {
|
|
177
|
+
console.error(`Error deleting object from local storage`, error.name, error.message);
|
|
178
|
+
throw error;
|
|
179
|
+
}
|
|
180
|
+
}
|
|
181
|
+
|
|
182
|
+
@SecureConnector.AccessControl
|
|
183
|
+
async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
|
|
184
|
+
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
185
|
+
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
186
|
+
if (!this.isInitialized) {
|
|
187
|
+
await this.initialize();
|
|
188
|
+
}
|
|
189
|
+
const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
|
|
190
|
+
return !!fs.existsSync(filePath);
|
|
191
|
+
}
|
|
192
|
+
|
|
193
|
+
//this determines the access rights for the requested resource
|
|
194
|
+
//the connector should check if the resource exists or not
|
|
195
|
+
//if the resource exists we read it's ACL and return it
|
|
196
|
+
//if the resource does not exist we return an write access ACL for the candidate
|
|
197
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
198
|
+
if (!this.isInitialized) {
|
|
199
|
+
await this.initialize();
|
|
200
|
+
}
|
|
201
|
+
const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
|
|
202
|
+
|
|
203
|
+
if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
|
|
204
|
+
|
|
205
|
+
const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
|
|
206
|
+
const exists = metadata !== undefined; //undefined metadata means the resource does not exist
|
|
207
|
+
|
|
208
|
+
if (!exists) {
|
|
209
|
+
//the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
|
|
210
|
+
return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
|
|
211
|
+
}
|
|
212
|
+
try {
|
|
213
|
+
let metadataObject = JSON.parse(metadata);
|
|
214
|
+
return ACL.from(metadataObject?.['acl'] as IACL);
|
|
215
|
+
} catch (error) {
|
|
216
|
+
console.error(`Error parsing metadata in local storage`, error.name, error.message);
|
|
217
|
+
throw error;
|
|
218
|
+
}
|
|
219
|
+
}
|
|
220
|
+
|
|
221
|
+
@SecureConnector.AccessControl
|
|
222
|
+
async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
|
|
223
|
+
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
224
|
+
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
225
|
+
|
|
226
|
+
try {
|
|
227
|
+
const fileMetadata = await this.getMetadata(acRequest, resourceId);
|
|
228
|
+
return ACL.from(fileMetadata?.['acl'] as IACL);
|
|
229
|
+
} catch (error) {
|
|
230
|
+
console.error(`Error getting access rights in local storage`, error.name, error.message);
|
|
231
|
+
throw error;
|
|
232
|
+
}
|
|
233
|
+
}
|
|
234
|
+
|
|
235
|
+
@SecureConnector.AccessControl
|
|
236
|
+
async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
|
|
237
|
+
// const accessTicket = await this.getAccessTicket(resourceId, acRequest);
|
|
238
|
+
// if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
|
|
239
|
+
|
|
240
|
+
try {
|
|
241
|
+
let fileMetadata = await this.getMetadata(acRequest, resourceId);
|
|
242
|
+
if (!fileMetadata) fileMetadata = {};
|
|
243
|
+
//when setting ACL make sure to not lose ownership
|
|
244
|
+
fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
|
|
245
|
+
await this.setMetadata(acRequest, resourceId, fileMetadata);
|
|
246
|
+
} catch (error) {
|
|
247
|
+
console.error(`Error setting access rights in local storage`, error);
|
|
248
|
+
throw error;
|
|
249
|
+
}
|
|
250
|
+
}
|
|
251
|
+
|
|
252
|
+
@SecureConnector.AccessControl
|
|
253
|
+
async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
|
|
254
|
+
console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
|
|
255
|
+
}
|
|
256
|
+
|
|
257
|
+
private async initialize() {
|
|
258
|
+
const storageFolderPath = path.join(this.folder, this.storagePrefix);
|
|
259
|
+
if (!existsSync(storageFolderPath)) {
|
|
260
|
+
fs.mkdirSync(storageFolderPath, { recursive: true });
|
|
261
|
+
}
|
|
262
|
+
const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
|
|
263
|
+
if (!existsSync(metadataFolderPath)) {
|
|
264
|
+
fs.mkdirSync(metadataFolderPath, { recursive: true });
|
|
265
|
+
fs.writeFileSync(
|
|
266
|
+
path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
|
|
267
|
+
'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
|
|
268
|
+
);
|
|
269
|
+
}
|
|
270
|
+
this.isInitialized = true;
|
|
271
|
+
}
|
|
272
|
+
|
|
273
|
+
private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
|
|
274
|
+
const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
|
|
275
|
+
const folder = path.dirname(fullPath);
|
|
276
|
+
if (createFoldersIfNotExists && !fs.existsSync(folder)) {
|
|
277
|
+
fs.mkdirSync(folder, { recursive: true });
|
|
278
|
+
}
|
|
279
|
+
|
|
280
|
+
return fullPath;
|
|
281
|
+
}
|
|
282
|
+
|
|
283
|
+
private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
|
|
284
|
+
const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
|
|
285
|
+
const folder = path.dirname(fullPath);
|
|
286
|
+
if (createFoldersIfNotExists && !fs.existsSync(folder)) {
|
|
287
|
+
fs.mkdirSync(folder, { recursive: true });
|
|
288
|
+
}
|
|
289
|
+
|
|
290
|
+
return fullPath;
|
|
291
|
+
}
|
|
292
|
+
|
|
293
|
+
private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
|
|
294
|
+
let updatedMetadata = {};
|
|
295
|
+
if (metadata['acl']) {
|
|
296
|
+
if (metadata['acl']) {
|
|
297
|
+
updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
|
|
298
|
+
}
|
|
299
|
+
|
|
300
|
+
delete metadata['acl'];
|
|
301
|
+
}
|
|
302
|
+
|
|
303
|
+
for (let key in metadata) {
|
|
304
|
+
updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
|
|
305
|
+
}
|
|
306
|
+
|
|
307
|
+
return updatedMetadata;
|
|
308
|
+
}
|
|
309
|
+
|
|
310
|
+
private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
|
|
311
|
+
let deserializedMetadata: Record<string, any> = {};
|
|
312
|
+
|
|
313
|
+
for (let key in metadata) {
|
|
314
|
+
if (key === 'acl') {
|
|
315
|
+
deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
|
|
316
|
+
continue;
|
|
317
|
+
}
|
|
318
|
+
|
|
319
|
+
try {
|
|
320
|
+
deserializedMetadata[key] = JSON.parse(metadata[key]);
|
|
321
|
+
} catch (error) {
|
|
322
|
+
deserializedMetadata[key] = metadata[key];
|
|
323
|
+
}
|
|
324
|
+
}
|
|
325
|
+
return deserializedMetadata;
|
|
326
|
+
}
|
|
327
|
+
}
|