@smythos/sre 1.5.53 → 1.5.54

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (223) hide show
  1. package/CHANGELOG +98 -98
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/bundle-analysis-lazy.html +4949 -0
  5. package/dist/bundle-analysis.html +4949 -0
  6. package/dist/index.js +3 -3
  7. package/dist/index.js.map +1 -1
  8. package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +1 -6
  9. package/dist/types/utils/package-manager.utils.d.ts +26 -0
  10. package/package.json +1 -1
  11. package/src/Components/APICall/APICall.class.ts +157 -157
  12. package/src/Components/APICall/AccessTokenManager.ts +166 -166
  13. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  14. package/src/Components/APICall/OAuth.helper.ts +447 -447
  15. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  16. package/src/Components/APICall/parseData.ts +167 -167
  17. package/src/Components/APICall/parseHeaders.ts +41 -41
  18. package/src/Components/APICall/parseProxy.ts +68 -68
  19. package/src/Components/APICall/parseUrl.ts +91 -91
  20. package/src/Components/APIEndpoint.class.ts +234 -234
  21. package/src/Components/APIOutput.class.ts +58 -58
  22. package/src/Components/AgentPlugin.class.ts +102 -102
  23. package/src/Components/Async.class.ts +155 -155
  24. package/src/Components/Await.class.ts +90 -90
  25. package/src/Components/Classifier.class.ts +158 -158
  26. package/src/Components/Component.class.ts +132 -132
  27. package/src/Components/ComponentHost.class.ts +38 -38
  28. package/src/Components/DataSourceCleaner.class.ts +92 -92
  29. package/src/Components/DataSourceIndexer.class.ts +181 -181
  30. package/src/Components/DataSourceLookup.class.ts +161 -161
  31. package/src/Components/ECMASandbox.class.ts +71 -71
  32. package/src/Components/FEncDec.class.ts +29 -29
  33. package/src/Components/FHash.class.ts +33 -33
  34. package/src/Components/FSign.class.ts +80 -80
  35. package/src/Components/FSleep.class.ts +25 -25
  36. package/src/Components/FTimestamp.class.ts +25 -25
  37. package/src/Components/FileStore.class.ts +78 -78
  38. package/src/Components/ForEach.class.ts +97 -97
  39. package/src/Components/GPTPlugin.class.ts +70 -70
  40. package/src/Components/GenAILLM.class.ts +586 -586
  41. package/src/Components/HuggingFace.class.ts +314 -314
  42. package/src/Components/Image/imageSettings.config.ts +70 -70
  43. package/src/Components/ImageGenerator.class.ts +502 -502
  44. package/src/Components/JSONFilter.class.ts +54 -54
  45. package/src/Components/LLMAssistant.class.ts +213 -213
  46. package/src/Components/LogicAND.class.ts +28 -28
  47. package/src/Components/LogicAtLeast.class.ts +85 -85
  48. package/src/Components/LogicAtMost.class.ts +86 -86
  49. package/src/Components/LogicOR.class.ts +29 -29
  50. package/src/Components/LogicXOR.class.ts +34 -34
  51. package/src/Components/MCPClient.class.ts +138 -138
  52. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  53. package/src/Components/MemoryReadKeyVal.class.ts +66 -66
  54. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  55. package/src/Components/MemoryWriteObject.class.ts +97 -97
  56. package/src/Components/MultimodalLLM.class.ts +128 -128
  57. package/src/Components/OpenAPI.class.ts +72 -72
  58. package/src/Components/PromptGenerator.class.ts +122 -122
  59. package/src/Components/ScrapflyWebScrape.class.ts +159 -159
  60. package/src/Components/ServerlessCode.class.ts +123 -123
  61. package/src/Components/TavilyWebSearch.class.ts +98 -98
  62. package/src/Components/VisionLLM.class.ts +104 -104
  63. package/src/Components/ZapierAction.class.ts +127 -127
  64. package/src/Components/index.ts +97 -97
  65. package/src/Core/AgentProcess.helper.ts +240 -240
  66. package/src/Core/Connector.class.ts +123 -123
  67. package/src/Core/ConnectorsService.ts +197 -197
  68. package/src/Core/DummyConnector.ts +49 -49
  69. package/src/Core/HookService.ts +105 -105
  70. package/src/Core/SmythRuntime.class.ts +235 -235
  71. package/src/Core/SystemEvents.ts +16 -16
  72. package/src/Core/boot.ts +56 -56
  73. package/src/config.ts +15 -15
  74. package/src/constants.ts +126 -126
  75. package/src/data/hugging-face.params.json +579 -579
  76. package/src/helpers/AWSLambdaCode.helper.ts +590 -590
  77. package/src/helpers/BinaryInput.helper.ts +331 -331
  78. package/src/helpers/Conversation.helper.ts +1119 -1119
  79. package/src/helpers/ECMASandbox.helper.ts +54 -54
  80. package/src/helpers/JsonContent.helper.ts +97 -97
  81. package/src/helpers/LocalCache.helper.ts +97 -97
  82. package/src/helpers/Log.helper.ts +274 -274
  83. package/src/helpers/OpenApiParser.helper.ts +150 -150
  84. package/src/helpers/S3Cache.helper.ts +147 -147
  85. package/src/helpers/SmythURI.helper.ts +5 -5
  86. package/src/helpers/Sysconfig.helper.ts +77 -77
  87. package/src/helpers/TemplateString.helper.ts +243 -243
  88. package/src/helpers/TypeChecker.helper.ts +329 -329
  89. package/src/index.ts +3 -3
  90. package/src/index.ts.bak +3 -3
  91. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  92. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  93. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  94. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  95. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
  96. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  97. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  98. package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -297
  99. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  100. package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
  101. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  102. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  103. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  104. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  105. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  106. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  107. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  108. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  109. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  110. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
  111. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  112. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  113. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  114. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  115. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  116. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  117. package/src/subsystems/IO/Log.service/index.ts +13 -13
  118. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  119. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  120. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  121. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  122. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  123. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  124. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  125. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  126. package/src/subsystems/IO/Router.service/index.ts +11 -11
  127. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
  128. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  129. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  130. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  131. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  132. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  133. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
  134. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
  135. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
  136. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  137. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  138. package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
  139. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  140. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  141. package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
  142. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
  143. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  144. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
  145. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
  146. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
  147. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
  148. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
  149. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
  150. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
  151. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
  152. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
  153. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  154. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  155. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
  156. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
  157. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  158. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
  160. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
  161. package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
  162. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
  163. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
  164. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  165. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  166. package/src/subsystems/LLMManager/models.ts +2540 -2540
  167. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  168. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  169. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  170. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
  171. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  172. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  173. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  174. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  175. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  176. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  177. package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
  178. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  179. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  180. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  181. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  182. package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
  183. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  184. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
  185. package/src/subsystems/Security/Account.service/index.ts +14 -14
  186. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  187. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  188. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  189. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  190. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  191. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  192. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  193. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  194. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  195. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  196. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  197. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  198. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  199. package/src/types/ACL.types.ts +104 -104
  200. package/src/types/AWS.types.ts +10 -10
  201. package/src/types/Agent.types.ts +61 -61
  202. package/src/types/AgentLogger.types.ts +17 -17
  203. package/src/types/Cache.types.ts +1 -1
  204. package/src/types/Common.types.ts +2 -2
  205. package/src/types/LLM.types.ts +496 -496
  206. package/src/types/Redis.types.ts +8 -8
  207. package/src/types/SRE.types.ts +64 -64
  208. package/src/types/Security.types.ts +14 -14
  209. package/src/types/Storage.types.ts +5 -5
  210. package/src/types/VectorDB.types.ts +86 -86
  211. package/src/utils/base64.utils.ts +275 -275
  212. package/src/utils/cli.utils.ts +68 -68
  213. package/src/utils/data.utils.ts +322 -322
  214. package/src/utils/date-time.utils.ts +22 -22
  215. package/src/utils/general.utils.ts +238 -238
  216. package/src/utils/index.ts +12 -12
  217. package/src/utils/lazy-client.ts +261 -261
  218. package/src/utils/numbers.utils.ts +13 -13
  219. package/src/utils/oauth.utils.ts +35 -35
  220. package/src/utils/string.utils.ts +414 -414
  221. package/src/utils/url.utils.ts +19 -19
  222. package/src/utils/validation.utils.ts +74 -74
  223. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
@@ -1,208 +1,208 @@
1
- //import { xxh3 } from '@node-rs/xxhash';
2
- import xxhash from 'xxhashjs';
3
- import { IACL, IAccessRequest, LevelMap, ReverseLevelMap, ReverseRoleMap, RoleMap, TACLEntry, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
4
-
5
- const ACLHashAlgo = {
6
- none: (source) => source,
7
- //xxh3: (source) => xxh3.xxh64(source.toString()).toString(16),
8
- xxh3: (source) => {
9
- const h64 = xxhash.h64(); // Use xxhashjs's h64 function
10
- return source ? h64.update(source.toString()).digest().toString(16) : null;
11
- },
12
- };
13
-
14
- export class ACL implements IACL {
15
- public hashAlgorithm?: string | undefined;
16
- public entries?: {
17
- [key in TAccessRole]?: TACLEntry | undefined;
18
- };
19
- public migrated?: boolean | undefined;
20
- //private acl: TACL;
21
- public get ACL(): IACL {
22
- return {
23
- hashAlgorithm: this.hashAlgorithm,
24
- entries: JSON.parse(JSON.stringify(this.entries)),
25
- migrated: this.migrated,
26
- };
27
- }
28
- public get serializedACL(): string {
29
- return this.serializeACL(this);
30
- }
31
-
32
- constructor(acl?: IACL | string) {
33
- if (typeof acl === 'string') {
34
- this.deserializeACL(acl);
35
- } else {
36
- this.hashAlgorithm = acl?.hashAlgorithm;
37
- this.entries = acl?.entries ? JSON.parse(JSON.stringify(acl?.entries)) : {};
38
- this.migrated = acl?.migrated;
39
- }
40
- if (!this.hashAlgorithm) this.hashAlgorithm = 'xxh3';
41
- if (!this.entries) this.entries = {};
42
- }
43
-
44
- static from(acl?: IACL | string): ACL {
45
- return new ACL(acl);
46
- }
47
-
48
- /**
49
- * This function checks if the candidate has access to the requested level
50
- * it only checks the exact access level, not the higher levels
51
- * Examples :
52
- * - if the candidate has read access, it will return true only if the requested level is read
53
- * - if the current ACL has team access but the candidate is an agent, it will not match the team access
54
- * @param acRequest
55
- * @returns
56
- */
57
- public checkExactAccess(acRequest: IAccessRequest): boolean {
58
- if (!this?.entries) return false; // cannot determine the access rights, prefer to deny access
59
-
60
- const role = this?.entries[acRequest.candidate.role];
61
- if (!role) return false;
62
- let entryId = acRequest.candidate.id;
63
-
64
- if (!ACLHashAlgo[this.hashAlgorithm]) {
65
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
66
- }
67
-
68
- entryId = ACLHashAlgo[this.hashAlgorithm](entryId);
69
-
70
- const access = role[entryId];
71
- if (!access) return false;
72
-
73
- const levels = Array.isArray(acRequest.level) ? acRequest.level : [acRequest.level];
74
-
75
- return levels.every((level) => access.includes(level));
76
- //return access.includes(req.level);
77
- }
78
-
79
- public addPublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
80
- if (!this?.entries[TAccessRole.Public]) this.entries[TAccessRole.Public] = {};
81
- if (!ACLHashAlgo[this.hashAlgorithm]) {
82
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
83
- }
84
- const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
85
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
86
-
87
- if (!this?.entries[TAccessRole.Public]![hashedOwner]) this.entries[TAccessRole.Public]![hashedOwner] = [];
88
- //acl[TAccessRole.Public]![hashedOwner]!.push(level);
89
- //concatenate the levels
90
- const curLevel: any = this.entries[TAccessRole.Public]![hashedOwner]!;
91
- this.entries[TAccessRole.Public]![hashedOwner] = [...curLevel, ...level];
92
-
93
- return this;
94
- }
95
- public removePublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
96
- if (!this?.entries[TAccessRole.Public]) return this;
97
- const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
98
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
99
-
100
- //remove the levels
101
- const curLevel = this[TAccessRole.Public]![hashedOwner]!;
102
- this[TAccessRole.Public]![hashedOwner] = curLevel.filter((l) => !level.includes(l));
103
-
104
- return this;
105
- }
106
- public addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
107
- if (role === TAccessRole.Public) {
108
- throw new Error('Adding public access using addAccess method is not allowed. Use addPublicAccess method instead.');
109
- }
110
- const _level = Array.isArray(level) ? level : [level];
111
- if (!this?.entries[role]) this.entries[role] = {};
112
- if (!ACLHashAlgo[this.hashAlgorithm]) {
113
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
114
- }
115
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
116
-
117
- if (!hashedOwner) {
118
- throw new Error(`Invalid ownerId: ${role}:${ownerId}`);
119
- }
120
-
121
- if (!this?.entries[role]![hashedOwner]) this.entries[role]![hashedOwner] = [];
122
- //acl[role]![ownerId]!.push(level);
123
- //concatenate the levels
124
- const curLevel = this.entries[role]![hashedOwner]!;
125
- this.entries[role]![hashedOwner] = [...curLevel, ..._level];
126
-
127
- return this;
128
- }
129
- public static addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
130
- return ACL.from().addAccess(role, ownerId, level);
131
- }
132
-
133
- public removeAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
134
- const _level = Array.isArray(level) ? level : [level];
135
- if (!this[role]) return this;
136
- if (!this[role]![ownerId]) return this;
137
- //acl[role]![ownerId] = acl[role]![ownerId]!.filter((l) => l !== level);
138
- //remove the levels
139
- const curLevel = this[role]![ownerId]!;
140
- this[role]![ownerId] = curLevel.filter((l) => !_level.includes(l));
141
-
142
- return this;
143
- }
144
-
145
- private serializeACL(tacl: IACL): string {
146
- let compressed = '';
147
-
148
- if (tacl.hashAlgorithm) {
149
- compressed += `h:${tacl.hashAlgorithm}|`;
150
- }
151
-
152
- if (tacl.entries) {
153
- for (const [role, entries] of Object.entries(tacl.entries)) {
154
- const roleShort = RoleMap[role]; // Use the mapping for role
155
- const entriesArray: any[] = [];
156
-
157
- for (const [hashedOwnerKey, accessLevels] of Object.entries(entries || {})) {
158
- if (accessLevels) {
159
- const accessLevelsShort = accessLevels.map((level) => LevelMap[level]).join('');
160
- entriesArray.push(`${hashedOwnerKey}/${accessLevelsShort}`);
161
- }
162
- }
163
-
164
- if (entriesArray.length > 0) {
165
- compressed += `${roleShort}:${entriesArray.join(',')}|`;
166
- }
167
- }
168
- }
169
-
170
- // Remove the trailing '|'
171
- if (compressed.endsWith('|')) {
172
- compressed = compressed.slice(0, -1);
173
- }
174
-
175
- return compressed;
176
- }
177
-
178
- private deserializeACL(compressed: string) {
179
- const parts = compressed.split('|');
180
- this.hashAlgorithm = '';
181
- this.entries = {};
182
-
183
- for (const part of parts) {
184
- if (part.startsWith('h:')) {
185
- this.hashAlgorithm = part.substring(2);
186
- } else {
187
- const [roleShort, entries] = part.split(':');
188
- const role = ReverseRoleMap[roleShort]; // Use the reverse mapping for role
189
-
190
- if (role) {
191
- const entriesObj = {};
192
- const entriesArray = entries.split(',');
193
-
194
- for (const entry of entriesArray) {
195
- const [hashedOwnerKey, accessLevelsShort] = entry.split('/');
196
- const accessLevels = accessLevelsShort.split('').map((short) => ReverseLevelMap[short]);
197
-
198
- entriesObj[hashedOwnerKey] = accessLevels;
199
- }
200
-
201
- this.entries[role] = entriesObj;
202
- }
203
- }
204
- }
205
-
206
- //return tacl;
207
- }
208
- }
1
+ //import { xxh3 } from '@node-rs/xxhash';
2
+ import xxhash from 'xxhashjs';
3
+ import { IACL, IAccessRequest, LevelMap, ReverseLevelMap, ReverseRoleMap, RoleMap, TACLEntry, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
4
+
5
+ const ACLHashAlgo = {
6
+ none: (source) => source,
7
+ //xxh3: (source) => xxh3.xxh64(source.toString()).toString(16),
8
+ xxh3: (source) => {
9
+ const h64 = xxhash.h64(); // Use xxhashjs's h64 function
10
+ return source ? h64.update(source.toString()).digest().toString(16) : null;
11
+ },
12
+ };
13
+
14
+ export class ACL implements IACL {
15
+ public hashAlgorithm?: string | undefined;
16
+ public entries?: {
17
+ [key in TAccessRole]?: TACLEntry | undefined;
18
+ };
19
+ public migrated?: boolean | undefined;
20
+ //private acl: TACL;
21
+ public get ACL(): IACL {
22
+ return {
23
+ hashAlgorithm: this.hashAlgorithm,
24
+ entries: JSON.parse(JSON.stringify(this.entries)),
25
+ migrated: this.migrated,
26
+ };
27
+ }
28
+ public get serializedACL(): string {
29
+ return this.serializeACL(this);
30
+ }
31
+
32
+ constructor(acl?: IACL | string) {
33
+ if (typeof acl === 'string') {
34
+ this.deserializeACL(acl);
35
+ } else {
36
+ this.hashAlgorithm = acl?.hashAlgorithm;
37
+ this.entries = acl?.entries ? JSON.parse(JSON.stringify(acl?.entries)) : {};
38
+ this.migrated = acl?.migrated;
39
+ }
40
+ if (!this.hashAlgorithm) this.hashAlgorithm = 'xxh3';
41
+ if (!this.entries) this.entries = {};
42
+ }
43
+
44
+ static from(acl?: IACL | string): ACL {
45
+ return new ACL(acl);
46
+ }
47
+
48
+ /**
49
+ * This function checks if the candidate has access to the requested level
50
+ * it only checks the exact access level, not the higher levels
51
+ * Examples :
52
+ * - if the candidate has read access, it will return true only if the requested level is read
53
+ * - if the current ACL has team access but the candidate is an agent, it will not match the team access
54
+ * @param acRequest
55
+ * @returns
56
+ */
57
+ public checkExactAccess(acRequest: IAccessRequest): boolean {
58
+ if (!this?.entries) return false; // cannot determine the access rights, prefer to deny access
59
+
60
+ const role = this?.entries[acRequest.candidate.role];
61
+ if (!role) return false;
62
+ let entryId = acRequest.candidate.id;
63
+
64
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
65
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
66
+ }
67
+
68
+ entryId = ACLHashAlgo[this.hashAlgorithm](entryId);
69
+
70
+ const access = role[entryId];
71
+ if (!access) return false;
72
+
73
+ const levels = Array.isArray(acRequest.level) ? acRequest.level : [acRequest.level];
74
+
75
+ return levels.every((level) => access.includes(level));
76
+ //return access.includes(req.level);
77
+ }
78
+
79
+ public addPublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
80
+ if (!this?.entries[TAccessRole.Public]) this.entries[TAccessRole.Public] = {};
81
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
82
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
83
+ }
84
+ const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
85
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
86
+
87
+ if (!this?.entries[TAccessRole.Public]![hashedOwner]) this.entries[TAccessRole.Public]![hashedOwner] = [];
88
+ //acl[TAccessRole.Public]![hashedOwner]!.push(level);
89
+ //concatenate the levels
90
+ const curLevel: any = this.entries[TAccessRole.Public]![hashedOwner]!;
91
+ this.entries[TAccessRole.Public]![hashedOwner] = [...curLevel, ...level];
92
+
93
+ return this;
94
+ }
95
+ public removePublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
96
+ if (!this?.entries[TAccessRole.Public]) return this;
97
+ const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
98
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
99
+
100
+ //remove the levels
101
+ const curLevel = this[TAccessRole.Public]![hashedOwner]!;
102
+ this[TAccessRole.Public]![hashedOwner] = curLevel.filter((l) => !level.includes(l));
103
+
104
+ return this;
105
+ }
106
+ public addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
107
+ if (role === TAccessRole.Public) {
108
+ throw new Error('Adding public access using addAccess method is not allowed. Use addPublicAccess method instead.');
109
+ }
110
+ const _level = Array.isArray(level) ? level : [level];
111
+ if (!this?.entries[role]) this.entries[role] = {};
112
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
113
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
114
+ }
115
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
116
+
117
+ if (!hashedOwner) {
118
+ throw new Error(`Invalid ownerId: ${role}:${ownerId}`);
119
+ }
120
+
121
+ if (!this?.entries[role]![hashedOwner]) this.entries[role]![hashedOwner] = [];
122
+ //acl[role]![ownerId]!.push(level);
123
+ //concatenate the levels
124
+ const curLevel = this.entries[role]![hashedOwner]!;
125
+ this.entries[role]![hashedOwner] = [...curLevel, ..._level];
126
+
127
+ return this;
128
+ }
129
+ public static addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
130
+ return ACL.from().addAccess(role, ownerId, level);
131
+ }
132
+
133
+ public removeAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
134
+ const _level = Array.isArray(level) ? level : [level];
135
+ if (!this[role]) return this;
136
+ if (!this[role]![ownerId]) return this;
137
+ //acl[role]![ownerId] = acl[role]![ownerId]!.filter((l) => l !== level);
138
+ //remove the levels
139
+ const curLevel = this[role]![ownerId]!;
140
+ this[role]![ownerId] = curLevel.filter((l) => !_level.includes(l));
141
+
142
+ return this;
143
+ }
144
+
145
+ private serializeACL(tacl: IACL): string {
146
+ let compressed = '';
147
+
148
+ if (tacl.hashAlgorithm) {
149
+ compressed += `h:${tacl.hashAlgorithm}|`;
150
+ }
151
+
152
+ if (tacl.entries) {
153
+ for (const [role, entries] of Object.entries(tacl.entries)) {
154
+ const roleShort = RoleMap[role]; // Use the mapping for role
155
+ const entriesArray: any[] = [];
156
+
157
+ for (const [hashedOwnerKey, accessLevels] of Object.entries(entries || {})) {
158
+ if (accessLevels) {
159
+ const accessLevelsShort = accessLevels.map((level) => LevelMap[level]).join('');
160
+ entriesArray.push(`${hashedOwnerKey}/${accessLevelsShort}`);
161
+ }
162
+ }
163
+
164
+ if (entriesArray.length > 0) {
165
+ compressed += `${roleShort}:${entriesArray.join(',')}|`;
166
+ }
167
+ }
168
+ }
169
+
170
+ // Remove the trailing '|'
171
+ if (compressed.endsWith('|')) {
172
+ compressed = compressed.slice(0, -1);
173
+ }
174
+
175
+ return compressed;
176
+ }
177
+
178
+ private deserializeACL(compressed: string) {
179
+ const parts = compressed.split('|');
180
+ this.hashAlgorithm = '';
181
+ this.entries = {};
182
+
183
+ for (const part of parts) {
184
+ if (part.startsWith('h:')) {
185
+ this.hashAlgorithm = part.substring(2);
186
+ } else {
187
+ const [roleShort, entries] = part.split(':');
188
+ const role = ReverseRoleMap[roleShort]; // Use the reverse mapping for role
189
+
190
+ if (role) {
191
+ const entriesObj = {};
192
+ const entriesArray = entries.split(',');
193
+
194
+ for (const entry of entriesArray) {
195
+ const [hashedOwnerKey, accessLevelsShort] = entry.split('/');
196
+ const accessLevels = accessLevelsShort.split('').map((short) => ReverseLevelMap[short]);
197
+
198
+ entriesObj[hashedOwnerKey] = accessLevels;
199
+ }
200
+
201
+ this.entries[role] = entriesObj;
202
+ }
203
+ }
204
+ }
205
+
206
+ //return tacl;
207
+ }
208
+ }
@@ -1,82 +1,82 @@
1
- import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
2
- import { AccessRequest } from './AccessRequest.class';
3
-
4
- export class AccessCandidate implements IAccessCandidate {
5
- public role: TAccessRole;
6
- public id: string;
7
- //public _candidate: TAccessCandidate;
8
- constructor(candidate?: IAccessCandidate) {
9
- //this._candidate = candidate || { role: TAccessRole.Public, id: '' };
10
-
11
- this.role = candidate ? candidate.role : TAccessRole.Public;
12
- this.id = candidate ? this._validateId(candidate.id) : '';
13
- }
14
-
15
- private _validateId(id: string) {
16
- if (/[^a-zA-Z0-9-]/.test(id))
17
- throw new Error(`Access Candidate ID can only contain alphanumeric characters and hyphens, invalid id: ${id}`);
18
- return id;
19
- }
20
-
21
- public toString(): string {
22
- return `AC:R[${this.role}]:ID[${this.id}]`;
23
- }
24
-
25
- public get request(): AccessRequest {
26
- return new AccessRequest(this);
27
- }
28
-
29
- public get readRequest(): AccessRequest {
30
- return new AccessRequest(this).setLevel(TAccessLevel.Read);
31
- }
32
- public get writeRequest(): AccessRequest {
33
- return new AccessRequest(this).setLevel(TAccessLevel.Write);
34
- }
35
- public get ownerRequest(): AccessRequest {
36
- return new AccessRequest(this).setLevel(TAccessLevel.Owner);
37
- }
38
-
39
- public static clone(candidate: IAccessCandidate): AccessCandidate {
40
- return new AccessCandidate(candidate);
41
- }
42
-
43
- public team(teamId: string): AccessCandidate {
44
- this.role = TAccessRole.Team;
45
- this.id = teamId;
46
-
47
- return this;
48
- }
49
- static team(teamId: string): AccessCandidate {
50
- return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
51
- }
52
-
53
- public agent(agentId: string): AccessCandidate {
54
- this.role = TAccessRole.Agent;
55
- this.id = agentId;
56
- return this;
57
- }
58
- static agent(agentId: string): AccessCandidate {
59
- return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
60
- }
61
-
62
- public user(userId: string): AccessCandidate {
63
- this.role = TAccessRole.User;
64
- this.id = userId;
65
- return this;
66
- }
67
- static user(userId: string): AccessCandidate {
68
- return new AccessCandidate({ role: TAccessRole.User, id: userId });
69
- }
70
-
71
- public public(): AccessCandidate {
72
- this.role = TAccessRole.Public;
73
-
74
- //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
75
- this.id = TAccessRole.Public;
76
-
77
- return this;
78
- }
79
- static public(): AccessCandidate {
80
- return new AccessCandidate({ role: TAccessRole.Public, id: '' });
81
- }
82
- }
1
+ import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
2
+ import { AccessRequest } from './AccessRequest.class';
3
+
4
+ export class AccessCandidate implements IAccessCandidate {
5
+ public role: TAccessRole;
6
+ public id: string;
7
+ //public _candidate: TAccessCandidate;
8
+ constructor(candidate?: IAccessCandidate) {
9
+ //this._candidate = candidate || { role: TAccessRole.Public, id: '' };
10
+
11
+ this.role = candidate ? candidate.role : TAccessRole.Public;
12
+ this.id = candidate ? this._validateId(candidate.id) : '';
13
+ }
14
+
15
+ private _validateId(id: string) {
16
+ if (/[^a-zA-Z0-9-]/.test(id))
17
+ throw new Error(`Access Candidate ID can only contain alphanumeric characters and hyphens, invalid id: ${id}`);
18
+ return id;
19
+ }
20
+
21
+ public toString(): string {
22
+ return `AC:R[${this.role}]:ID[${this.id}]`;
23
+ }
24
+
25
+ public get request(): AccessRequest {
26
+ return new AccessRequest(this);
27
+ }
28
+
29
+ public get readRequest(): AccessRequest {
30
+ return new AccessRequest(this).setLevel(TAccessLevel.Read);
31
+ }
32
+ public get writeRequest(): AccessRequest {
33
+ return new AccessRequest(this).setLevel(TAccessLevel.Write);
34
+ }
35
+ public get ownerRequest(): AccessRequest {
36
+ return new AccessRequest(this).setLevel(TAccessLevel.Owner);
37
+ }
38
+
39
+ public static clone(candidate: IAccessCandidate): AccessCandidate {
40
+ return new AccessCandidate(candidate);
41
+ }
42
+
43
+ public team(teamId: string): AccessCandidate {
44
+ this.role = TAccessRole.Team;
45
+ this.id = teamId;
46
+
47
+ return this;
48
+ }
49
+ static team(teamId: string): AccessCandidate {
50
+ return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
51
+ }
52
+
53
+ public agent(agentId: string): AccessCandidate {
54
+ this.role = TAccessRole.Agent;
55
+ this.id = agentId;
56
+ return this;
57
+ }
58
+ static agent(agentId: string): AccessCandidate {
59
+ return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
60
+ }
61
+
62
+ public user(userId: string): AccessCandidate {
63
+ this.role = TAccessRole.User;
64
+ this.id = userId;
65
+ return this;
66
+ }
67
+ static user(userId: string): AccessCandidate {
68
+ return new AccessCandidate({ role: TAccessRole.User, id: userId });
69
+ }
70
+
71
+ public public(): AccessCandidate {
72
+ this.role = TAccessRole.Public;
73
+
74
+ //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
75
+ this.id = TAccessRole.Public;
76
+
77
+ return this;
78
+ }
79
+ static public(): AccessCandidate {
80
+ return new AccessCandidate({ role: TAccessRole.Public, id: '' });
81
+ }
82
+ }