@smythos/sre 1.5.53 → 1.5.54
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +98 -98
- package/LICENSE +18 -18
- package/README.md +135 -135
- package/dist/bundle-analysis-lazy.html +4949 -0
- package/dist/bundle-analysis.html +4949 -0
- package/dist/index.js +3 -3
- package/dist/index.js.map +1 -1
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +1 -6
- package/dist/types/utils/package-manager.utils.d.ts +26 -0
- package/package.json +1 -1
- package/src/Components/APICall/APICall.class.ts +157 -157
- package/src/Components/APICall/AccessTokenManager.ts +166 -166
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
- package/src/Components/APICall/OAuth.helper.ts +447 -447
- package/src/Components/APICall/mimeTypeCategories.ts +46 -46
- package/src/Components/APICall/parseData.ts +167 -167
- package/src/Components/APICall/parseHeaders.ts +41 -41
- package/src/Components/APICall/parseProxy.ts +68 -68
- package/src/Components/APICall/parseUrl.ts +91 -91
- package/src/Components/APIEndpoint.class.ts +234 -234
- package/src/Components/APIOutput.class.ts +58 -58
- package/src/Components/AgentPlugin.class.ts +102 -102
- package/src/Components/Async.class.ts +155 -155
- package/src/Components/Await.class.ts +90 -90
- package/src/Components/Classifier.class.ts +158 -158
- package/src/Components/Component.class.ts +132 -132
- package/src/Components/ComponentHost.class.ts +38 -38
- package/src/Components/DataSourceCleaner.class.ts +92 -92
- package/src/Components/DataSourceIndexer.class.ts +181 -181
- package/src/Components/DataSourceLookup.class.ts +161 -161
- package/src/Components/ECMASandbox.class.ts +71 -71
- package/src/Components/FEncDec.class.ts +29 -29
- package/src/Components/FHash.class.ts +33 -33
- package/src/Components/FSign.class.ts +80 -80
- package/src/Components/FSleep.class.ts +25 -25
- package/src/Components/FTimestamp.class.ts +25 -25
- package/src/Components/FileStore.class.ts +78 -78
- package/src/Components/ForEach.class.ts +97 -97
- package/src/Components/GPTPlugin.class.ts +70 -70
- package/src/Components/GenAILLM.class.ts +586 -586
- package/src/Components/HuggingFace.class.ts +314 -314
- package/src/Components/Image/imageSettings.config.ts +70 -70
- package/src/Components/ImageGenerator.class.ts +502 -502
- package/src/Components/JSONFilter.class.ts +54 -54
- package/src/Components/LLMAssistant.class.ts +213 -213
- package/src/Components/LogicAND.class.ts +28 -28
- package/src/Components/LogicAtLeast.class.ts +85 -85
- package/src/Components/LogicAtMost.class.ts +86 -86
- package/src/Components/LogicOR.class.ts +29 -29
- package/src/Components/LogicXOR.class.ts +34 -34
- package/src/Components/MCPClient.class.ts +138 -138
- package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
- package/src/Components/MemoryReadKeyVal.class.ts +66 -66
- package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
- package/src/Components/MemoryWriteObject.class.ts +97 -97
- package/src/Components/MultimodalLLM.class.ts +128 -128
- package/src/Components/OpenAPI.class.ts +72 -72
- package/src/Components/PromptGenerator.class.ts +122 -122
- package/src/Components/ScrapflyWebScrape.class.ts +159 -159
- package/src/Components/ServerlessCode.class.ts +123 -123
- package/src/Components/TavilyWebSearch.class.ts +98 -98
- package/src/Components/VisionLLM.class.ts +104 -104
- package/src/Components/ZapierAction.class.ts +127 -127
- package/src/Components/index.ts +97 -97
- package/src/Core/AgentProcess.helper.ts +240 -240
- package/src/Core/Connector.class.ts +123 -123
- package/src/Core/ConnectorsService.ts +197 -197
- package/src/Core/DummyConnector.ts +49 -49
- package/src/Core/HookService.ts +105 -105
- package/src/Core/SmythRuntime.class.ts +235 -235
- package/src/Core/SystemEvents.ts +16 -16
- package/src/Core/boot.ts +56 -56
- package/src/config.ts +15 -15
- package/src/constants.ts +126 -126
- package/src/data/hugging-face.params.json +579 -579
- package/src/helpers/AWSLambdaCode.helper.ts +590 -590
- package/src/helpers/BinaryInput.helper.ts +331 -331
- package/src/helpers/Conversation.helper.ts +1119 -1119
- package/src/helpers/ECMASandbox.helper.ts +54 -54
- package/src/helpers/JsonContent.helper.ts +97 -97
- package/src/helpers/LocalCache.helper.ts +97 -97
- package/src/helpers/Log.helper.ts +274 -274
- package/src/helpers/OpenApiParser.helper.ts +150 -150
- package/src/helpers/S3Cache.helper.ts +147 -147
- package/src/helpers/SmythURI.helper.ts +5 -5
- package/src/helpers/Sysconfig.helper.ts +77 -77
- package/src/helpers/TemplateString.helper.ts +243 -243
- package/src/helpers/TypeChecker.helper.ts +329 -329
- package/src/index.ts +3 -3
- package/src/index.ts.bak +3 -3
- package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
- package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -297
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
- package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
- package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
- package/src/subsystems/IO/CLI.service/index.ts +9 -9
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
- package/src/subsystems/IO/Log.service/index.ts +13 -13
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
- package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
- package/src/subsystems/IO/NKV.service/index.ts +14 -14
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
- package/src/subsystems/IO/Router.service/index.ts +11 -11
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
- package/src/subsystems/IO/Storage.service/index.ts +13 -13
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
- package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
- package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
- package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
- package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
- package/src/subsystems/LLMManager/custom-models.ts +854 -854
- package/src/subsystems/LLMManager/models.ts +2540 -2540
- package/src/subsystems/LLMManager/paramMappings.ts +69 -69
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
- package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
- package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
- package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
- package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
- package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
- package/src/subsystems/Security/Account.service/index.ts +14 -14
- package/src/subsystems/Security/Credentials.helper.ts +62 -62
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
- package/src/subsystems/Security/SecureConnector.class.ts +110 -110
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
- package/src/subsystems/Security/Vault.service/index.ts +12 -12
- package/src/types/ACL.types.ts +104 -104
- package/src/types/AWS.types.ts +10 -10
- package/src/types/Agent.types.ts +61 -61
- package/src/types/AgentLogger.types.ts +17 -17
- package/src/types/Cache.types.ts +1 -1
- package/src/types/Common.types.ts +2 -2
- package/src/types/LLM.types.ts +496 -496
- package/src/types/Redis.types.ts +8 -8
- package/src/types/SRE.types.ts +64 -64
- package/src/types/Security.types.ts +14 -14
- package/src/types/Storage.types.ts +5 -5
- package/src/types/VectorDB.types.ts +86 -86
- package/src/utils/base64.utils.ts +275 -275
- package/src/utils/cli.utils.ts +68 -68
- package/src/utils/data.utils.ts +322 -322
- package/src/utils/date-time.utils.ts +22 -22
- package/src/utils/general.utils.ts +238 -238
- package/src/utils/index.ts +12 -12
- package/src/utils/lazy-client.ts +261 -261
- package/src/utils/numbers.utils.ts +13 -13
- package/src/utils/oauth.utils.ts +35 -35
- package/src/utils/string.utils.ts +414 -414
- package/src/utils/url.utils.ts +19 -19
- package/src/utils/validation.utils.ts +74 -74
- package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
|
@@ -1,208 +1,208 @@
|
|
|
1
|
-
//import { xxh3 } from '@node-rs/xxhash';
|
|
2
|
-
import xxhash from 'xxhashjs';
|
|
3
|
-
import { IACL, IAccessRequest, LevelMap, ReverseLevelMap, ReverseRoleMap, RoleMap, TACLEntry, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
4
|
-
|
|
5
|
-
const ACLHashAlgo = {
|
|
6
|
-
none: (source) => source,
|
|
7
|
-
//xxh3: (source) => xxh3.xxh64(source.toString()).toString(16),
|
|
8
|
-
xxh3: (source) => {
|
|
9
|
-
const h64 = xxhash.h64(); // Use xxhashjs's h64 function
|
|
10
|
-
return source ? h64.update(source.toString()).digest().toString(16) : null;
|
|
11
|
-
},
|
|
12
|
-
};
|
|
13
|
-
|
|
14
|
-
export class ACL implements IACL {
|
|
15
|
-
public hashAlgorithm?: string | undefined;
|
|
16
|
-
public entries?: {
|
|
17
|
-
[key in TAccessRole]?: TACLEntry | undefined;
|
|
18
|
-
};
|
|
19
|
-
public migrated?: boolean | undefined;
|
|
20
|
-
//private acl: TACL;
|
|
21
|
-
public get ACL(): IACL {
|
|
22
|
-
return {
|
|
23
|
-
hashAlgorithm: this.hashAlgorithm,
|
|
24
|
-
entries: JSON.parse(JSON.stringify(this.entries)),
|
|
25
|
-
migrated: this.migrated,
|
|
26
|
-
};
|
|
27
|
-
}
|
|
28
|
-
public get serializedACL(): string {
|
|
29
|
-
return this.serializeACL(this);
|
|
30
|
-
}
|
|
31
|
-
|
|
32
|
-
constructor(acl?: IACL | string) {
|
|
33
|
-
if (typeof acl === 'string') {
|
|
34
|
-
this.deserializeACL(acl);
|
|
35
|
-
} else {
|
|
36
|
-
this.hashAlgorithm = acl?.hashAlgorithm;
|
|
37
|
-
this.entries = acl?.entries ? JSON.parse(JSON.stringify(acl?.entries)) : {};
|
|
38
|
-
this.migrated = acl?.migrated;
|
|
39
|
-
}
|
|
40
|
-
if (!this.hashAlgorithm) this.hashAlgorithm = 'xxh3';
|
|
41
|
-
if (!this.entries) this.entries = {};
|
|
42
|
-
}
|
|
43
|
-
|
|
44
|
-
static from(acl?: IACL | string): ACL {
|
|
45
|
-
return new ACL(acl);
|
|
46
|
-
}
|
|
47
|
-
|
|
48
|
-
/**
|
|
49
|
-
* This function checks if the candidate has access to the requested level
|
|
50
|
-
* it only checks the exact access level, not the higher levels
|
|
51
|
-
* Examples :
|
|
52
|
-
* - if the candidate has read access, it will return true only if the requested level is read
|
|
53
|
-
* - if the current ACL has team access but the candidate is an agent, it will not match the team access
|
|
54
|
-
* @param acRequest
|
|
55
|
-
* @returns
|
|
56
|
-
*/
|
|
57
|
-
public checkExactAccess(acRequest: IAccessRequest): boolean {
|
|
58
|
-
if (!this?.entries) return false; // cannot determine the access rights, prefer to deny access
|
|
59
|
-
|
|
60
|
-
const role = this?.entries[acRequest.candidate.role];
|
|
61
|
-
if (!role) return false;
|
|
62
|
-
let entryId = acRequest.candidate.id;
|
|
63
|
-
|
|
64
|
-
if (!ACLHashAlgo[this.hashAlgorithm]) {
|
|
65
|
-
throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
|
|
66
|
-
}
|
|
67
|
-
|
|
68
|
-
entryId = ACLHashAlgo[this.hashAlgorithm](entryId);
|
|
69
|
-
|
|
70
|
-
const access = role[entryId];
|
|
71
|
-
if (!access) return false;
|
|
72
|
-
|
|
73
|
-
const levels = Array.isArray(acRequest.level) ? acRequest.level : [acRequest.level];
|
|
74
|
-
|
|
75
|
-
return levels.every((level) => access.includes(level));
|
|
76
|
-
//return access.includes(req.level);
|
|
77
|
-
}
|
|
78
|
-
|
|
79
|
-
public addPublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
|
|
80
|
-
if (!this?.entries[TAccessRole.Public]) this.entries[TAccessRole.Public] = {};
|
|
81
|
-
if (!ACLHashAlgo[this.hashAlgorithm]) {
|
|
82
|
-
throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
|
|
83
|
-
}
|
|
84
|
-
const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
|
|
85
|
-
const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
|
|
86
|
-
|
|
87
|
-
if (!this?.entries[TAccessRole.Public]![hashedOwner]) this.entries[TAccessRole.Public]![hashedOwner] = [];
|
|
88
|
-
//acl[TAccessRole.Public]![hashedOwner]!.push(level);
|
|
89
|
-
//concatenate the levels
|
|
90
|
-
const curLevel: any = this.entries[TAccessRole.Public]![hashedOwner]!;
|
|
91
|
-
this.entries[TAccessRole.Public]![hashedOwner] = [...curLevel, ...level];
|
|
92
|
-
|
|
93
|
-
return this;
|
|
94
|
-
}
|
|
95
|
-
public removePublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
|
|
96
|
-
if (!this?.entries[TAccessRole.Public]) return this;
|
|
97
|
-
const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
|
|
98
|
-
const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
|
|
99
|
-
|
|
100
|
-
//remove the levels
|
|
101
|
-
const curLevel = this[TAccessRole.Public]![hashedOwner]!;
|
|
102
|
-
this[TAccessRole.Public]![hashedOwner] = curLevel.filter((l) => !level.includes(l));
|
|
103
|
-
|
|
104
|
-
return this;
|
|
105
|
-
}
|
|
106
|
-
public addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
|
|
107
|
-
if (role === TAccessRole.Public) {
|
|
108
|
-
throw new Error('Adding public access using addAccess method is not allowed. Use addPublicAccess method instead.');
|
|
109
|
-
}
|
|
110
|
-
const _level = Array.isArray(level) ? level : [level];
|
|
111
|
-
if (!this?.entries[role]) this.entries[role] = {};
|
|
112
|
-
if (!ACLHashAlgo[this.hashAlgorithm]) {
|
|
113
|
-
throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
|
|
114
|
-
}
|
|
115
|
-
const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
|
|
116
|
-
|
|
117
|
-
if (!hashedOwner) {
|
|
118
|
-
throw new Error(`Invalid ownerId: ${role}:${ownerId}`);
|
|
119
|
-
}
|
|
120
|
-
|
|
121
|
-
if (!this?.entries[role]![hashedOwner]) this.entries[role]![hashedOwner] = [];
|
|
122
|
-
//acl[role]![ownerId]!.push(level);
|
|
123
|
-
//concatenate the levels
|
|
124
|
-
const curLevel = this.entries[role]![hashedOwner]!;
|
|
125
|
-
this.entries[role]![hashedOwner] = [...curLevel, ..._level];
|
|
126
|
-
|
|
127
|
-
return this;
|
|
128
|
-
}
|
|
129
|
-
public static addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
|
|
130
|
-
return ACL.from().addAccess(role, ownerId, level);
|
|
131
|
-
}
|
|
132
|
-
|
|
133
|
-
public removeAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
|
|
134
|
-
const _level = Array.isArray(level) ? level : [level];
|
|
135
|
-
if (!this[role]) return this;
|
|
136
|
-
if (!this[role]![ownerId]) return this;
|
|
137
|
-
//acl[role]![ownerId] = acl[role]![ownerId]!.filter((l) => l !== level);
|
|
138
|
-
//remove the levels
|
|
139
|
-
const curLevel = this[role]![ownerId]!;
|
|
140
|
-
this[role]![ownerId] = curLevel.filter((l) => !_level.includes(l));
|
|
141
|
-
|
|
142
|
-
return this;
|
|
143
|
-
}
|
|
144
|
-
|
|
145
|
-
private serializeACL(tacl: IACL): string {
|
|
146
|
-
let compressed = '';
|
|
147
|
-
|
|
148
|
-
if (tacl.hashAlgorithm) {
|
|
149
|
-
compressed += `h:${tacl.hashAlgorithm}|`;
|
|
150
|
-
}
|
|
151
|
-
|
|
152
|
-
if (tacl.entries) {
|
|
153
|
-
for (const [role, entries] of Object.entries(tacl.entries)) {
|
|
154
|
-
const roleShort = RoleMap[role]; // Use the mapping for role
|
|
155
|
-
const entriesArray: any[] = [];
|
|
156
|
-
|
|
157
|
-
for (const [hashedOwnerKey, accessLevels] of Object.entries(entries || {})) {
|
|
158
|
-
if (accessLevels) {
|
|
159
|
-
const accessLevelsShort = accessLevels.map((level) => LevelMap[level]).join('');
|
|
160
|
-
entriesArray.push(`${hashedOwnerKey}/${accessLevelsShort}`);
|
|
161
|
-
}
|
|
162
|
-
}
|
|
163
|
-
|
|
164
|
-
if (entriesArray.length > 0) {
|
|
165
|
-
compressed += `${roleShort}:${entriesArray.join(',')}|`;
|
|
166
|
-
}
|
|
167
|
-
}
|
|
168
|
-
}
|
|
169
|
-
|
|
170
|
-
// Remove the trailing '|'
|
|
171
|
-
if (compressed.endsWith('|')) {
|
|
172
|
-
compressed = compressed.slice(0, -1);
|
|
173
|
-
}
|
|
174
|
-
|
|
175
|
-
return compressed;
|
|
176
|
-
}
|
|
177
|
-
|
|
178
|
-
private deserializeACL(compressed: string) {
|
|
179
|
-
const parts = compressed.split('|');
|
|
180
|
-
this.hashAlgorithm = '';
|
|
181
|
-
this.entries = {};
|
|
182
|
-
|
|
183
|
-
for (const part of parts) {
|
|
184
|
-
if (part.startsWith('h:')) {
|
|
185
|
-
this.hashAlgorithm = part.substring(2);
|
|
186
|
-
} else {
|
|
187
|
-
const [roleShort, entries] = part.split(':');
|
|
188
|
-
const role = ReverseRoleMap[roleShort]; // Use the reverse mapping for role
|
|
189
|
-
|
|
190
|
-
if (role) {
|
|
191
|
-
const entriesObj = {};
|
|
192
|
-
const entriesArray = entries.split(',');
|
|
193
|
-
|
|
194
|
-
for (const entry of entriesArray) {
|
|
195
|
-
const [hashedOwnerKey, accessLevelsShort] = entry.split('/');
|
|
196
|
-
const accessLevels = accessLevelsShort.split('').map((short) => ReverseLevelMap[short]);
|
|
197
|
-
|
|
198
|
-
entriesObj[hashedOwnerKey] = accessLevels;
|
|
199
|
-
}
|
|
200
|
-
|
|
201
|
-
this.entries[role] = entriesObj;
|
|
202
|
-
}
|
|
203
|
-
}
|
|
204
|
-
}
|
|
205
|
-
|
|
206
|
-
//return tacl;
|
|
207
|
-
}
|
|
208
|
-
}
|
|
1
|
+
//import { xxh3 } from '@node-rs/xxhash';
|
|
2
|
+
import xxhash from 'xxhashjs';
|
|
3
|
+
import { IACL, IAccessRequest, LevelMap, ReverseLevelMap, ReverseRoleMap, RoleMap, TACLEntry, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
4
|
+
|
|
5
|
+
const ACLHashAlgo = {
|
|
6
|
+
none: (source) => source,
|
|
7
|
+
//xxh3: (source) => xxh3.xxh64(source.toString()).toString(16),
|
|
8
|
+
xxh3: (source) => {
|
|
9
|
+
const h64 = xxhash.h64(); // Use xxhashjs's h64 function
|
|
10
|
+
return source ? h64.update(source.toString()).digest().toString(16) : null;
|
|
11
|
+
},
|
|
12
|
+
};
|
|
13
|
+
|
|
14
|
+
export class ACL implements IACL {
|
|
15
|
+
public hashAlgorithm?: string | undefined;
|
|
16
|
+
public entries?: {
|
|
17
|
+
[key in TAccessRole]?: TACLEntry | undefined;
|
|
18
|
+
};
|
|
19
|
+
public migrated?: boolean | undefined;
|
|
20
|
+
//private acl: TACL;
|
|
21
|
+
public get ACL(): IACL {
|
|
22
|
+
return {
|
|
23
|
+
hashAlgorithm: this.hashAlgorithm,
|
|
24
|
+
entries: JSON.parse(JSON.stringify(this.entries)),
|
|
25
|
+
migrated: this.migrated,
|
|
26
|
+
};
|
|
27
|
+
}
|
|
28
|
+
public get serializedACL(): string {
|
|
29
|
+
return this.serializeACL(this);
|
|
30
|
+
}
|
|
31
|
+
|
|
32
|
+
constructor(acl?: IACL | string) {
|
|
33
|
+
if (typeof acl === 'string') {
|
|
34
|
+
this.deserializeACL(acl);
|
|
35
|
+
} else {
|
|
36
|
+
this.hashAlgorithm = acl?.hashAlgorithm;
|
|
37
|
+
this.entries = acl?.entries ? JSON.parse(JSON.stringify(acl?.entries)) : {};
|
|
38
|
+
this.migrated = acl?.migrated;
|
|
39
|
+
}
|
|
40
|
+
if (!this.hashAlgorithm) this.hashAlgorithm = 'xxh3';
|
|
41
|
+
if (!this.entries) this.entries = {};
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
static from(acl?: IACL | string): ACL {
|
|
45
|
+
return new ACL(acl);
|
|
46
|
+
}
|
|
47
|
+
|
|
48
|
+
/**
|
|
49
|
+
* This function checks if the candidate has access to the requested level
|
|
50
|
+
* it only checks the exact access level, not the higher levels
|
|
51
|
+
* Examples :
|
|
52
|
+
* - if the candidate has read access, it will return true only if the requested level is read
|
|
53
|
+
* - if the current ACL has team access but the candidate is an agent, it will not match the team access
|
|
54
|
+
* @param acRequest
|
|
55
|
+
* @returns
|
|
56
|
+
*/
|
|
57
|
+
public checkExactAccess(acRequest: IAccessRequest): boolean {
|
|
58
|
+
if (!this?.entries) return false; // cannot determine the access rights, prefer to deny access
|
|
59
|
+
|
|
60
|
+
const role = this?.entries[acRequest.candidate.role];
|
|
61
|
+
if (!role) return false;
|
|
62
|
+
let entryId = acRequest.candidate.id;
|
|
63
|
+
|
|
64
|
+
if (!ACLHashAlgo[this.hashAlgorithm]) {
|
|
65
|
+
throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
entryId = ACLHashAlgo[this.hashAlgorithm](entryId);
|
|
69
|
+
|
|
70
|
+
const access = role[entryId];
|
|
71
|
+
if (!access) return false;
|
|
72
|
+
|
|
73
|
+
const levels = Array.isArray(acRequest.level) ? acRequest.level : [acRequest.level];
|
|
74
|
+
|
|
75
|
+
return levels.every((level) => access.includes(level));
|
|
76
|
+
//return access.includes(req.level);
|
|
77
|
+
}
|
|
78
|
+
|
|
79
|
+
public addPublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
|
|
80
|
+
if (!this?.entries[TAccessRole.Public]) this.entries[TAccessRole.Public] = {};
|
|
81
|
+
if (!ACLHashAlgo[this.hashAlgorithm]) {
|
|
82
|
+
throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
|
|
83
|
+
}
|
|
84
|
+
const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
|
|
85
|
+
const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
|
|
86
|
+
|
|
87
|
+
if (!this?.entries[TAccessRole.Public]![hashedOwner]) this.entries[TAccessRole.Public]![hashedOwner] = [];
|
|
88
|
+
//acl[TAccessRole.Public]![hashedOwner]!.push(level);
|
|
89
|
+
//concatenate the levels
|
|
90
|
+
const curLevel: any = this.entries[TAccessRole.Public]![hashedOwner]!;
|
|
91
|
+
this.entries[TAccessRole.Public]![hashedOwner] = [...curLevel, ...level];
|
|
92
|
+
|
|
93
|
+
return this;
|
|
94
|
+
}
|
|
95
|
+
public removePublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
|
|
96
|
+
if (!this?.entries[TAccessRole.Public]) return this;
|
|
97
|
+
const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
|
|
98
|
+
const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
|
|
99
|
+
|
|
100
|
+
//remove the levels
|
|
101
|
+
const curLevel = this[TAccessRole.Public]![hashedOwner]!;
|
|
102
|
+
this[TAccessRole.Public]![hashedOwner] = curLevel.filter((l) => !level.includes(l));
|
|
103
|
+
|
|
104
|
+
return this;
|
|
105
|
+
}
|
|
106
|
+
public addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
|
|
107
|
+
if (role === TAccessRole.Public) {
|
|
108
|
+
throw new Error('Adding public access using addAccess method is not allowed. Use addPublicAccess method instead.');
|
|
109
|
+
}
|
|
110
|
+
const _level = Array.isArray(level) ? level : [level];
|
|
111
|
+
if (!this?.entries[role]) this.entries[role] = {};
|
|
112
|
+
if (!ACLHashAlgo[this.hashAlgorithm]) {
|
|
113
|
+
throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
|
|
114
|
+
}
|
|
115
|
+
const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
|
|
116
|
+
|
|
117
|
+
if (!hashedOwner) {
|
|
118
|
+
throw new Error(`Invalid ownerId: ${role}:${ownerId}`);
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
if (!this?.entries[role]![hashedOwner]) this.entries[role]![hashedOwner] = [];
|
|
122
|
+
//acl[role]![ownerId]!.push(level);
|
|
123
|
+
//concatenate the levels
|
|
124
|
+
const curLevel = this.entries[role]![hashedOwner]!;
|
|
125
|
+
this.entries[role]![hashedOwner] = [...curLevel, ..._level];
|
|
126
|
+
|
|
127
|
+
return this;
|
|
128
|
+
}
|
|
129
|
+
public static addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
|
|
130
|
+
return ACL.from().addAccess(role, ownerId, level);
|
|
131
|
+
}
|
|
132
|
+
|
|
133
|
+
public removeAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
|
|
134
|
+
const _level = Array.isArray(level) ? level : [level];
|
|
135
|
+
if (!this[role]) return this;
|
|
136
|
+
if (!this[role]![ownerId]) return this;
|
|
137
|
+
//acl[role]![ownerId] = acl[role]![ownerId]!.filter((l) => l !== level);
|
|
138
|
+
//remove the levels
|
|
139
|
+
const curLevel = this[role]![ownerId]!;
|
|
140
|
+
this[role]![ownerId] = curLevel.filter((l) => !_level.includes(l));
|
|
141
|
+
|
|
142
|
+
return this;
|
|
143
|
+
}
|
|
144
|
+
|
|
145
|
+
private serializeACL(tacl: IACL): string {
|
|
146
|
+
let compressed = '';
|
|
147
|
+
|
|
148
|
+
if (tacl.hashAlgorithm) {
|
|
149
|
+
compressed += `h:${tacl.hashAlgorithm}|`;
|
|
150
|
+
}
|
|
151
|
+
|
|
152
|
+
if (tacl.entries) {
|
|
153
|
+
for (const [role, entries] of Object.entries(tacl.entries)) {
|
|
154
|
+
const roleShort = RoleMap[role]; // Use the mapping for role
|
|
155
|
+
const entriesArray: any[] = [];
|
|
156
|
+
|
|
157
|
+
for (const [hashedOwnerKey, accessLevels] of Object.entries(entries || {})) {
|
|
158
|
+
if (accessLevels) {
|
|
159
|
+
const accessLevelsShort = accessLevels.map((level) => LevelMap[level]).join('');
|
|
160
|
+
entriesArray.push(`${hashedOwnerKey}/${accessLevelsShort}`);
|
|
161
|
+
}
|
|
162
|
+
}
|
|
163
|
+
|
|
164
|
+
if (entriesArray.length > 0) {
|
|
165
|
+
compressed += `${roleShort}:${entriesArray.join(',')}|`;
|
|
166
|
+
}
|
|
167
|
+
}
|
|
168
|
+
}
|
|
169
|
+
|
|
170
|
+
// Remove the trailing '|'
|
|
171
|
+
if (compressed.endsWith('|')) {
|
|
172
|
+
compressed = compressed.slice(0, -1);
|
|
173
|
+
}
|
|
174
|
+
|
|
175
|
+
return compressed;
|
|
176
|
+
}
|
|
177
|
+
|
|
178
|
+
private deserializeACL(compressed: string) {
|
|
179
|
+
const parts = compressed.split('|');
|
|
180
|
+
this.hashAlgorithm = '';
|
|
181
|
+
this.entries = {};
|
|
182
|
+
|
|
183
|
+
for (const part of parts) {
|
|
184
|
+
if (part.startsWith('h:')) {
|
|
185
|
+
this.hashAlgorithm = part.substring(2);
|
|
186
|
+
} else {
|
|
187
|
+
const [roleShort, entries] = part.split(':');
|
|
188
|
+
const role = ReverseRoleMap[roleShort]; // Use the reverse mapping for role
|
|
189
|
+
|
|
190
|
+
if (role) {
|
|
191
|
+
const entriesObj = {};
|
|
192
|
+
const entriesArray = entries.split(',');
|
|
193
|
+
|
|
194
|
+
for (const entry of entriesArray) {
|
|
195
|
+
const [hashedOwnerKey, accessLevelsShort] = entry.split('/');
|
|
196
|
+
const accessLevels = accessLevelsShort.split('').map((short) => ReverseLevelMap[short]);
|
|
197
|
+
|
|
198
|
+
entriesObj[hashedOwnerKey] = accessLevels;
|
|
199
|
+
}
|
|
200
|
+
|
|
201
|
+
this.entries[role] = entriesObj;
|
|
202
|
+
}
|
|
203
|
+
}
|
|
204
|
+
}
|
|
205
|
+
|
|
206
|
+
//return tacl;
|
|
207
|
+
}
|
|
208
|
+
}
|
|
@@ -1,82 +1,82 @@
|
|
|
1
|
-
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
2
|
-
import { AccessRequest } from './AccessRequest.class';
|
|
3
|
-
|
|
4
|
-
export class AccessCandidate implements IAccessCandidate {
|
|
5
|
-
public role: TAccessRole;
|
|
6
|
-
public id: string;
|
|
7
|
-
//public _candidate: TAccessCandidate;
|
|
8
|
-
constructor(candidate?: IAccessCandidate) {
|
|
9
|
-
//this._candidate = candidate || { role: TAccessRole.Public, id: '' };
|
|
10
|
-
|
|
11
|
-
this.role = candidate ? candidate.role : TAccessRole.Public;
|
|
12
|
-
this.id = candidate ? this._validateId(candidate.id) : '';
|
|
13
|
-
}
|
|
14
|
-
|
|
15
|
-
private _validateId(id: string) {
|
|
16
|
-
if (/[^a-zA-Z0-9-]/.test(id))
|
|
17
|
-
throw new Error(`Access Candidate ID can only contain alphanumeric characters and hyphens, invalid id: ${id}`);
|
|
18
|
-
return id;
|
|
19
|
-
}
|
|
20
|
-
|
|
21
|
-
public toString(): string {
|
|
22
|
-
return `AC:R[${this.role}]:ID[${this.id}]`;
|
|
23
|
-
}
|
|
24
|
-
|
|
25
|
-
public get request(): AccessRequest {
|
|
26
|
-
return new AccessRequest(this);
|
|
27
|
-
}
|
|
28
|
-
|
|
29
|
-
public get readRequest(): AccessRequest {
|
|
30
|
-
return new AccessRequest(this).setLevel(TAccessLevel.Read);
|
|
31
|
-
}
|
|
32
|
-
public get writeRequest(): AccessRequest {
|
|
33
|
-
return new AccessRequest(this).setLevel(TAccessLevel.Write);
|
|
34
|
-
}
|
|
35
|
-
public get ownerRequest(): AccessRequest {
|
|
36
|
-
return new AccessRequest(this).setLevel(TAccessLevel.Owner);
|
|
37
|
-
}
|
|
38
|
-
|
|
39
|
-
public static clone(candidate: IAccessCandidate): AccessCandidate {
|
|
40
|
-
return new AccessCandidate(candidate);
|
|
41
|
-
}
|
|
42
|
-
|
|
43
|
-
public team(teamId: string): AccessCandidate {
|
|
44
|
-
this.role = TAccessRole.Team;
|
|
45
|
-
this.id = teamId;
|
|
46
|
-
|
|
47
|
-
return this;
|
|
48
|
-
}
|
|
49
|
-
static team(teamId: string): AccessCandidate {
|
|
50
|
-
return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
|
|
51
|
-
}
|
|
52
|
-
|
|
53
|
-
public agent(agentId: string): AccessCandidate {
|
|
54
|
-
this.role = TAccessRole.Agent;
|
|
55
|
-
this.id = agentId;
|
|
56
|
-
return this;
|
|
57
|
-
}
|
|
58
|
-
static agent(agentId: string): AccessCandidate {
|
|
59
|
-
return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
|
|
60
|
-
}
|
|
61
|
-
|
|
62
|
-
public user(userId: string): AccessCandidate {
|
|
63
|
-
this.role = TAccessRole.User;
|
|
64
|
-
this.id = userId;
|
|
65
|
-
return this;
|
|
66
|
-
}
|
|
67
|
-
static user(userId: string): AccessCandidate {
|
|
68
|
-
return new AccessCandidate({ role: TAccessRole.User, id: userId });
|
|
69
|
-
}
|
|
70
|
-
|
|
71
|
-
public public(): AccessCandidate {
|
|
72
|
-
this.role = TAccessRole.Public;
|
|
73
|
-
|
|
74
|
-
//public is a special case we use the role as the owner id because public access does not have specific candidate IDs
|
|
75
|
-
this.id = TAccessRole.Public;
|
|
76
|
-
|
|
77
|
-
return this;
|
|
78
|
-
}
|
|
79
|
-
static public(): AccessCandidate {
|
|
80
|
-
return new AccessCandidate({ role: TAccessRole.Public, id: '' });
|
|
81
|
-
}
|
|
82
|
-
}
|
|
1
|
+
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
2
|
+
import { AccessRequest } from './AccessRequest.class';
|
|
3
|
+
|
|
4
|
+
export class AccessCandidate implements IAccessCandidate {
|
|
5
|
+
public role: TAccessRole;
|
|
6
|
+
public id: string;
|
|
7
|
+
//public _candidate: TAccessCandidate;
|
|
8
|
+
constructor(candidate?: IAccessCandidate) {
|
|
9
|
+
//this._candidate = candidate || { role: TAccessRole.Public, id: '' };
|
|
10
|
+
|
|
11
|
+
this.role = candidate ? candidate.role : TAccessRole.Public;
|
|
12
|
+
this.id = candidate ? this._validateId(candidate.id) : '';
|
|
13
|
+
}
|
|
14
|
+
|
|
15
|
+
private _validateId(id: string) {
|
|
16
|
+
if (/[^a-zA-Z0-9-]/.test(id))
|
|
17
|
+
throw new Error(`Access Candidate ID can only contain alphanumeric characters and hyphens, invalid id: ${id}`);
|
|
18
|
+
return id;
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
public toString(): string {
|
|
22
|
+
return `AC:R[${this.role}]:ID[${this.id}]`;
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
public get request(): AccessRequest {
|
|
26
|
+
return new AccessRequest(this);
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
public get readRequest(): AccessRequest {
|
|
30
|
+
return new AccessRequest(this).setLevel(TAccessLevel.Read);
|
|
31
|
+
}
|
|
32
|
+
public get writeRequest(): AccessRequest {
|
|
33
|
+
return new AccessRequest(this).setLevel(TAccessLevel.Write);
|
|
34
|
+
}
|
|
35
|
+
public get ownerRequest(): AccessRequest {
|
|
36
|
+
return new AccessRequest(this).setLevel(TAccessLevel.Owner);
|
|
37
|
+
}
|
|
38
|
+
|
|
39
|
+
public static clone(candidate: IAccessCandidate): AccessCandidate {
|
|
40
|
+
return new AccessCandidate(candidate);
|
|
41
|
+
}
|
|
42
|
+
|
|
43
|
+
public team(teamId: string): AccessCandidate {
|
|
44
|
+
this.role = TAccessRole.Team;
|
|
45
|
+
this.id = teamId;
|
|
46
|
+
|
|
47
|
+
return this;
|
|
48
|
+
}
|
|
49
|
+
static team(teamId: string): AccessCandidate {
|
|
50
|
+
return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
public agent(agentId: string): AccessCandidate {
|
|
54
|
+
this.role = TAccessRole.Agent;
|
|
55
|
+
this.id = agentId;
|
|
56
|
+
return this;
|
|
57
|
+
}
|
|
58
|
+
static agent(agentId: string): AccessCandidate {
|
|
59
|
+
return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
|
|
60
|
+
}
|
|
61
|
+
|
|
62
|
+
public user(userId: string): AccessCandidate {
|
|
63
|
+
this.role = TAccessRole.User;
|
|
64
|
+
this.id = userId;
|
|
65
|
+
return this;
|
|
66
|
+
}
|
|
67
|
+
static user(userId: string): AccessCandidate {
|
|
68
|
+
return new AccessCandidate({ role: TAccessRole.User, id: userId });
|
|
69
|
+
}
|
|
70
|
+
|
|
71
|
+
public public(): AccessCandidate {
|
|
72
|
+
this.role = TAccessRole.Public;
|
|
73
|
+
|
|
74
|
+
//public is a special case we use the role as the owner id because public access does not have specific candidate IDs
|
|
75
|
+
this.id = TAccessRole.Public;
|
|
76
|
+
|
|
77
|
+
return this;
|
|
78
|
+
}
|
|
79
|
+
static public(): AccessCandidate {
|
|
80
|
+
return new AccessCandidate({ role: TAccessRole.Public, id: '' });
|
|
81
|
+
}
|
|
82
|
+
}
|