@smythos/sre 1.5.53 → 1.5.54
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +98 -98
- package/LICENSE +18 -18
- package/README.md +135 -135
- package/dist/bundle-analysis-lazy.html +4949 -0
- package/dist/bundle-analysis.html +4949 -0
- package/dist/index.js +3 -3
- package/dist/index.js.map +1 -1
- package/dist/types/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.d.ts +1 -6
- package/dist/types/utils/package-manager.utils.d.ts +26 -0
- package/package.json +1 -1
- package/src/Components/APICall/APICall.class.ts +157 -157
- package/src/Components/APICall/AccessTokenManager.ts +166 -166
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
- package/src/Components/APICall/OAuth.helper.ts +447 -447
- package/src/Components/APICall/mimeTypeCategories.ts +46 -46
- package/src/Components/APICall/parseData.ts +167 -167
- package/src/Components/APICall/parseHeaders.ts +41 -41
- package/src/Components/APICall/parseProxy.ts +68 -68
- package/src/Components/APICall/parseUrl.ts +91 -91
- package/src/Components/APIEndpoint.class.ts +234 -234
- package/src/Components/APIOutput.class.ts +58 -58
- package/src/Components/AgentPlugin.class.ts +102 -102
- package/src/Components/Async.class.ts +155 -155
- package/src/Components/Await.class.ts +90 -90
- package/src/Components/Classifier.class.ts +158 -158
- package/src/Components/Component.class.ts +132 -132
- package/src/Components/ComponentHost.class.ts +38 -38
- package/src/Components/DataSourceCleaner.class.ts +92 -92
- package/src/Components/DataSourceIndexer.class.ts +181 -181
- package/src/Components/DataSourceLookup.class.ts +161 -161
- package/src/Components/ECMASandbox.class.ts +71 -71
- package/src/Components/FEncDec.class.ts +29 -29
- package/src/Components/FHash.class.ts +33 -33
- package/src/Components/FSign.class.ts +80 -80
- package/src/Components/FSleep.class.ts +25 -25
- package/src/Components/FTimestamp.class.ts +25 -25
- package/src/Components/FileStore.class.ts +78 -78
- package/src/Components/ForEach.class.ts +97 -97
- package/src/Components/GPTPlugin.class.ts +70 -70
- package/src/Components/GenAILLM.class.ts +586 -586
- package/src/Components/HuggingFace.class.ts +314 -314
- package/src/Components/Image/imageSettings.config.ts +70 -70
- package/src/Components/ImageGenerator.class.ts +502 -502
- package/src/Components/JSONFilter.class.ts +54 -54
- package/src/Components/LLMAssistant.class.ts +213 -213
- package/src/Components/LogicAND.class.ts +28 -28
- package/src/Components/LogicAtLeast.class.ts +85 -85
- package/src/Components/LogicAtMost.class.ts +86 -86
- package/src/Components/LogicOR.class.ts +29 -29
- package/src/Components/LogicXOR.class.ts +34 -34
- package/src/Components/MCPClient.class.ts +138 -138
- package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
- package/src/Components/MemoryReadKeyVal.class.ts +66 -66
- package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
- package/src/Components/MemoryWriteObject.class.ts +97 -97
- package/src/Components/MultimodalLLM.class.ts +128 -128
- package/src/Components/OpenAPI.class.ts +72 -72
- package/src/Components/PromptGenerator.class.ts +122 -122
- package/src/Components/ScrapflyWebScrape.class.ts +159 -159
- package/src/Components/ServerlessCode.class.ts +123 -123
- package/src/Components/TavilyWebSearch.class.ts +98 -98
- package/src/Components/VisionLLM.class.ts +104 -104
- package/src/Components/ZapierAction.class.ts +127 -127
- package/src/Components/index.ts +97 -97
- package/src/Core/AgentProcess.helper.ts +240 -240
- package/src/Core/Connector.class.ts +123 -123
- package/src/Core/ConnectorsService.ts +197 -197
- package/src/Core/DummyConnector.ts +49 -49
- package/src/Core/HookService.ts +105 -105
- package/src/Core/SmythRuntime.class.ts +235 -235
- package/src/Core/SystemEvents.ts +16 -16
- package/src/Core/boot.ts +56 -56
- package/src/config.ts +15 -15
- package/src/constants.ts +126 -126
- package/src/data/hugging-face.params.json +579 -579
- package/src/helpers/AWSLambdaCode.helper.ts +590 -590
- package/src/helpers/BinaryInput.helper.ts +331 -331
- package/src/helpers/Conversation.helper.ts +1119 -1119
- package/src/helpers/ECMASandbox.helper.ts +54 -54
- package/src/helpers/JsonContent.helper.ts +97 -97
- package/src/helpers/LocalCache.helper.ts +97 -97
- package/src/helpers/Log.helper.ts +274 -274
- package/src/helpers/OpenApiParser.helper.ts +150 -150
- package/src/helpers/S3Cache.helper.ts +147 -147
- package/src/helpers/SmythURI.helper.ts +5 -5
- package/src/helpers/Sysconfig.helper.ts +77 -77
- package/src/helpers/TemplateString.helper.ts +243 -243
- package/src/helpers/TypeChecker.helper.ts +329 -329
- package/src/index.ts +3 -3
- package/src/index.ts.bak +3 -3
- package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +142 -142
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
- package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -297
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +559 -559
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +172 -172
- package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
- package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
- package/src/subsystems/IO/CLI.service/index.ts +9 -9
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
- package/src/subsystems/IO/Log.service/index.ts +13 -13
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
- package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
- package/src/subsystems/IO/NKV.service/index.ts +14 -14
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
- package/src/subsystems/IO/Router.service/index.ts +11 -11
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +489 -489
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
- package/src/subsystems/IO/Storage.service/index.ts +13 -13
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +454 -454
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +384 -384
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +421 -421
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +21 -21
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
- package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
- package/src/subsystems/LLMManager/LLM.inference.ts +339 -339
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +489 -489
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +659 -659
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +400 -400
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +77 -77
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +757 -757
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +304 -304
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +250 -250
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +423 -423
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +488 -488
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
- package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +471 -471
- package/src/subsystems/LLMManager/LLM.service/index.ts +44 -44
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +300 -300
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +252 -252
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
- package/src/subsystems/LLMManager/custom-models.ts +854 -854
- package/src/subsystems/LLMManager/models.ts +2540 -2540
- package/src/subsystems/LLMManager/paramMappings.ts +69 -69
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +201 -201
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
- package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
- package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
- package/src/subsystems/MemoryManager/RuntimeContext.ts +266 -266
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
- package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
- package/src/subsystems/Security/Account.service/connectors/AWSAccount.class.ts +76 -76
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +159 -159
- package/src/subsystems/Security/Account.service/index.ts +14 -14
- package/src/subsystems/Security/Credentials.helper.ts +62 -62
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
- package/src/subsystems/Security/SecureConnector.class.ts +110 -110
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
- package/src/subsystems/Security/Vault.service/index.ts +12 -12
- package/src/types/ACL.types.ts +104 -104
- package/src/types/AWS.types.ts +10 -10
- package/src/types/Agent.types.ts +61 -61
- package/src/types/AgentLogger.types.ts +17 -17
- package/src/types/Cache.types.ts +1 -1
- package/src/types/Common.types.ts +2 -2
- package/src/types/LLM.types.ts +496 -496
- package/src/types/Redis.types.ts +8 -8
- package/src/types/SRE.types.ts +64 -64
- package/src/types/Security.types.ts +14 -14
- package/src/types/Storage.types.ts +5 -5
- package/src/types/VectorDB.types.ts +86 -86
- package/src/utils/base64.utils.ts +275 -275
- package/src/utils/cli.utils.ts +68 -68
- package/src/utils/data.utils.ts +322 -322
- package/src/utils/date-time.utils.ts +22 -22
- package/src/utils/general.utils.ts +238 -238
- package/src/utils/index.ts +12 -12
- package/src/utils/lazy-client.ts +261 -261
- package/src/utils/numbers.utils.ts +13 -13
- package/src/utils/oauth.utils.ts +35 -35
- package/src/utils/string.utils.ts +414 -414
- package/src/utils/url.utils.ts +19 -19
- package/src/utils/validation.utils.ts +74 -74
- package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
|
@@ -1,159 +1,159 @@
|
|
|
1
|
-
import { Connector } from '@sre/Core/Connector.class';
|
|
2
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
3
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
4
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
6
|
-
import { DEFAULT_TEAM_ID, IAccessCandidate, IACL, TAccessRole } from '@sre/types/ACL.types';
|
|
7
|
-
import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
|
|
8
|
-
import { AccountConnector } from '../AccountConnector';
|
|
9
|
-
import { KeyValueObject } from '@sre/types/Common.types';
|
|
10
|
-
import * as fs from 'fs';
|
|
11
|
-
import * as path from 'path';
|
|
12
|
-
|
|
13
|
-
/*
|
|
14
|
-
JSONAccount format
|
|
15
|
-
|
|
16
|
-
{
|
|
17
|
-
"team1": {
|
|
18
|
-
users: {
|
|
19
|
-
"user1": {
|
|
20
|
-
"settings": {
|
|
21
|
-
"setting1": "value1",
|
|
22
|
-
"setting2": "value2"
|
|
23
|
-
}
|
|
24
|
-
}
|
|
25
|
-
},
|
|
26
|
-
"agents": {
|
|
27
|
-
"agent1": {
|
|
28
|
-
"settings": {
|
|
29
|
-
"setting1": "value1",
|
|
30
|
-
"setting2": "value2"
|
|
31
|
-
}
|
|
32
|
-
}
|
|
33
|
-
},
|
|
34
|
-
"settings": {
|
|
35
|
-
"setting1": "value1",
|
|
36
|
-
"setting2": "value2"
|
|
37
|
-
}
|
|
38
|
-
}
|
|
39
|
-
}
|
|
40
|
-
|
|
41
|
-
*/
|
|
42
|
-
|
|
43
|
-
export type TJSONFileAccountSettings = {
|
|
44
|
-
file: string;
|
|
45
|
-
};
|
|
46
|
-
|
|
47
|
-
export class JSONFileAccount extends AccountConnector {
|
|
48
|
-
public name = 'JSONFileAccount';
|
|
49
|
-
private data: any = {};
|
|
50
|
-
private file: string;
|
|
51
|
-
|
|
52
|
-
constructor(protected _settings: TJSONFileAccountSettings) {
|
|
53
|
-
super(_settings);
|
|
54
|
-
this.file = _settings.file;
|
|
55
|
-
this.loadData();
|
|
56
|
-
}
|
|
57
|
-
|
|
58
|
-
private loadData() {
|
|
59
|
-
try {
|
|
60
|
-
const fileContent = fs.readFileSync(this.file, 'utf-8');
|
|
61
|
-
this.data = JSON.parse(fileContent);
|
|
62
|
-
} catch (error) {
|
|
63
|
-
console.error('Error loading JSON account data:', error);
|
|
64
|
-
this.data = {};
|
|
65
|
-
}
|
|
66
|
-
}
|
|
67
|
-
|
|
68
|
-
private saveData() {
|
|
69
|
-
try {
|
|
70
|
-
fs.writeFileSync(this.file, JSON.stringify(this.data, null, 2));
|
|
71
|
-
} catch (error) {
|
|
72
|
-
console.error('Error saving JSON account data:', error);
|
|
73
|
-
}
|
|
74
|
-
}
|
|
75
|
-
|
|
76
|
-
public async isTeamMember(team: string, candidate: IAccessCandidate): Promise<boolean> {
|
|
77
|
-
if (!this.data[team]) return false;
|
|
78
|
-
|
|
79
|
-
if (candidate.role === TAccessRole.User) {
|
|
80
|
-
return !!this.data[team].users?.[candidate.id];
|
|
81
|
-
} else if (candidate.role === TAccessRole.Agent) {
|
|
82
|
-
return !!this.data[team].agents?.[candidate.id];
|
|
83
|
-
}
|
|
84
|
-
|
|
85
|
-
return false;
|
|
86
|
-
}
|
|
87
|
-
|
|
88
|
-
public async getCandidateTeam(candidate: IAccessCandidate): Promise<string | undefined> {
|
|
89
|
-
if (candidate.role === TAccessRole.Team) {
|
|
90
|
-
return candidate.id;
|
|
91
|
-
}
|
|
92
|
-
|
|
93
|
-
// Search through all teams to find where the candidate belongs
|
|
94
|
-
for (const [teamId, teamData] of Object.entries(this.data)) {
|
|
95
|
-
const typedTeamData = teamData as { users?: Record<string, any>; agents?: Record<string, any> };
|
|
96
|
-
if (candidate.role === TAccessRole.User && typedTeamData.users?.[candidate.id]) {
|
|
97
|
-
return teamId;
|
|
98
|
-
}
|
|
99
|
-
if (candidate.role === TAccessRole.Agent && typedTeamData.agents?.[candidate.id]) {
|
|
100
|
-
return teamId;
|
|
101
|
-
}
|
|
102
|
-
}
|
|
103
|
-
|
|
104
|
-
return DEFAULT_TEAM_ID;
|
|
105
|
-
}
|
|
106
|
-
|
|
107
|
-
public async getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL> {
|
|
108
|
-
throw new Error('getResourceACL Method not implemented.');
|
|
109
|
-
}
|
|
110
|
-
|
|
111
|
-
public async getAllTeamSettings(acRequest: AccessRequest, teamId: string): Promise<KeyValueObject[]> {
|
|
112
|
-
if (!this.data[teamId]?.settings) return [];
|
|
113
|
-
|
|
114
|
-
return Object.entries(this.data[teamId].settings).map(([key, value]) => ({
|
|
115
|
-
key,
|
|
116
|
-
value: value as string,
|
|
117
|
-
}));
|
|
118
|
-
}
|
|
119
|
-
|
|
120
|
-
public async getAllUserSettings(acRequest: AccessRequest, accountId: string): Promise<KeyValueObject[]> {
|
|
121
|
-
// Search through all teams to find user settings
|
|
122
|
-
for (const teamData of Object.values(this.data)) {
|
|
123
|
-
const typedTeamData = teamData as { users?: Record<string, { settings?: Record<string, any> }> };
|
|
124
|
-
if (typedTeamData.users?.[accountId]?.settings) {
|
|
125
|
-
return Object.entries(typedTeamData.users[accountId].settings).map(([key, value]) => ({
|
|
126
|
-
key,
|
|
127
|
-
value: value as string,
|
|
128
|
-
}));
|
|
129
|
-
}
|
|
130
|
-
}
|
|
131
|
-
return [];
|
|
132
|
-
}
|
|
133
|
-
|
|
134
|
-
public async getTeamSetting(acRequest: AccessRequest, teamId: string, settingKey: string): Promise<string> {
|
|
135
|
-
return this.data[teamId]?.settings?.[settingKey] || '';
|
|
136
|
-
}
|
|
137
|
-
|
|
138
|
-
public async getUserSetting(acRequest: AccessRequest, accountId: string, settingKey: string): Promise<string> {
|
|
139
|
-
// Search through all teams to find user setting
|
|
140
|
-
for (const teamData of Object.values(this.data)) {
|
|
141
|
-
const typedTeamData = teamData as { users?: Record<string, { settings?: Record<string, any> }> };
|
|
142
|
-
if (typedTeamData.users?.[accountId]?.settings?.[settingKey]) {
|
|
143
|
-
return typedTeamData.users[accountId].settings[settingKey];
|
|
144
|
-
}
|
|
145
|
-
}
|
|
146
|
-
return '';
|
|
147
|
-
}
|
|
148
|
-
|
|
149
|
-
public async getAgentSetting(acRequest: AccessRequest, agentId: string, settingKey: string): Promise<string> {
|
|
150
|
-
// Search through all teams to find agent setting
|
|
151
|
-
for (const teamData of Object.values(this.data)) {
|
|
152
|
-
const typedTeamData = teamData as { agents?: Record<string, { settings?: Record<string, any> }> };
|
|
153
|
-
if (typedTeamData.agents?.[agentId]?.settings?.[settingKey]) {
|
|
154
|
-
return typedTeamData.agents[agentId].settings[settingKey];
|
|
155
|
-
}
|
|
156
|
-
}
|
|
157
|
-
return '';
|
|
158
|
-
}
|
|
159
|
-
}
|
|
1
|
+
import { Connector } from '@sre/Core/Connector.class';
|
|
2
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
3
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
4
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
6
|
+
import { DEFAULT_TEAM_ID, IAccessCandidate, IACL, TAccessRole } from '@sre/types/ACL.types';
|
|
7
|
+
import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
|
|
8
|
+
import { AccountConnector } from '../AccountConnector';
|
|
9
|
+
import { KeyValueObject } from '@sre/types/Common.types';
|
|
10
|
+
import * as fs from 'fs';
|
|
11
|
+
import * as path from 'path';
|
|
12
|
+
|
|
13
|
+
/*
|
|
14
|
+
JSONAccount format
|
|
15
|
+
|
|
16
|
+
{
|
|
17
|
+
"team1": {
|
|
18
|
+
users: {
|
|
19
|
+
"user1": {
|
|
20
|
+
"settings": {
|
|
21
|
+
"setting1": "value1",
|
|
22
|
+
"setting2": "value2"
|
|
23
|
+
}
|
|
24
|
+
}
|
|
25
|
+
},
|
|
26
|
+
"agents": {
|
|
27
|
+
"agent1": {
|
|
28
|
+
"settings": {
|
|
29
|
+
"setting1": "value1",
|
|
30
|
+
"setting2": "value2"
|
|
31
|
+
}
|
|
32
|
+
}
|
|
33
|
+
},
|
|
34
|
+
"settings": {
|
|
35
|
+
"setting1": "value1",
|
|
36
|
+
"setting2": "value2"
|
|
37
|
+
}
|
|
38
|
+
}
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
*/
|
|
42
|
+
|
|
43
|
+
export type TJSONFileAccountSettings = {
|
|
44
|
+
file: string;
|
|
45
|
+
};
|
|
46
|
+
|
|
47
|
+
export class JSONFileAccount extends AccountConnector {
|
|
48
|
+
public name = 'JSONFileAccount';
|
|
49
|
+
private data: any = {};
|
|
50
|
+
private file: string;
|
|
51
|
+
|
|
52
|
+
constructor(protected _settings: TJSONFileAccountSettings) {
|
|
53
|
+
super(_settings);
|
|
54
|
+
this.file = _settings.file;
|
|
55
|
+
this.loadData();
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
private loadData() {
|
|
59
|
+
try {
|
|
60
|
+
const fileContent = fs.readFileSync(this.file, 'utf-8');
|
|
61
|
+
this.data = JSON.parse(fileContent);
|
|
62
|
+
} catch (error) {
|
|
63
|
+
console.error('Error loading JSON account data:', error);
|
|
64
|
+
this.data = {};
|
|
65
|
+
}
|
|
66
|
+
}
|
|
67
|
+
|
|
68
|
+
private saveData() {
|
|
69
|
+
try {
|
|
70
|
+
fs.writeFileSync(this.file, JSON.stringify(this.data, null, 2));
|
|
71
|
+
} catch (error) {
|
|
72
|
+
console.error('Error saving JSON account data:', error);
|
|
73
|
+
}
|
|
74
|
+
}
|
|
75
|
+
|
|
76
|
+
public async isTeamMember(team: string, candidate: IAccessCandidate): Promise<boolean> {
|
|
77
|
+
if (!this.data[team]) return false;
|
|
78
|
+
|
|
79
|
+
if (candidate.role === TAccessRole.User) {
|
|
80
|
+
return !!this.data[team].users?.[candidate.id];
|
|
81
|
+
} else if (candidate.role === TAccessRole.Agent) {
|
|
82
|
+
return !!this.data[team].agents?.[candidate.id];
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
return false;
|
|
86
|
+
}
|
|
87
|
+
|
|
88
|
+
public async getCandidateTeam(candidate: IAccessCandidate): Promise<string | undefined> {
|
|
89
|
+
if (candidate.role === TAccessRole.Team) {
|
|
90
|
+
return candidate.id;
|
|
91
|
+
}
|
|
92
|
+
|
|
93
|
+
// Search through all teams to find where the candidate belongs
|
|
94
|
+
for (const [teamId, teamData] of Object.entries(this.data)) {
|
|
95
|
+
const typedTeamData = teamData as { users?: Record<string, any>; agents?: Record<string, any> };
|
|
96
|
+
if (candidate.role === TAccessRole.User && typedTeamData.users?.[candidate.id]) {
|
|
97
|
+
return teamId;
|
|
98
|
+
}
|
|
99
|
+
if (candidate.role === TAccessRole.Agent && typedTeamData.agents?.[candidate.id]) {
|
|
100
|
+
return teamId;
|
|
101
|
+
}
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
return DEFAULT_TEAM_ID;
|
|
105
|
+
}
|
|
106
|
+
|
|
107
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL> {
|
|
108
|
+
throw new Error('getResourceACL Method not implemented.');
|
|
109
|
+
}
|
|
110
|
+
|
|
111
|
+
public async getAllTeamSettings(acRequest: AccessRequest, teamId: string): Promise<KeyValueObject[]> {
|
|
112
|
+
if (!this.data[teamId]?.settings) return [];
|
|
113
|
+
|
|
114
|
+
return Object.entries(this.data[teamId].settings).map(([key, value]) => ({
|
|
115
|
+
key,
|
|
116
|
+
value: value as string,
|
|
117
|
+
}));
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
public async getAllUserSettings(acRequest: AccessRequest, accountId: string): Promise<KeyValueObject[]> {
|
|
121
|
+
// Search through all teams to find user settings
|
|
122
|
+
for (const teamData of Object.values(this.data)) {
|
|
123
|
+
const typedTeamData = teamData as { users?: Record<string, { settings?: Record<string, any> }> };
|
|
124
|
+
if (typedTeamData.users?.[accountId]?.settings) {
|
|
125
|
+
return Object.entries(typedTeamData.users[accountId].settings).map(([key, value]) => ({
|
|
126
|
+
key,
|
|
127
|
+
value: value as string,
|
|
128
|
+
}));
|
|
129
|
+
}
|
|
130
|
+
}
|
|
131
|
+
return [];
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
public async getTeamSetting(acRequest: AccessRequest, teamId: string, settingKey: string): Promise<string> {
|
|
135
|
+
return this.data[teamId]?.settings?.[settingKey] || '';
|
|
136
|
+
}
|
|
137
|
+
|
|
138
|
+
public async getUserSetting(acRequest: AccessRequest, accountId: string, settingKey: string): Promise<string> {
|
|
139
|
+
// Search through all teams to find user setting
|
|
140
|
+
for (const teamData of Object.values(this.data)) {
|
|
141
|
+
const typedTeamData = teamData as { users?: Record<string, { settings?: Record<string, any> }> };
|
|
142
|
+
if (typedTeamData.users?.[accountId]?.settings?.[settingKey]) {
|
|
143
|
+
return typedTeamData.users[accountId].settings[settingKey];
|
|
144
|
+
}
|
|
145
|
+
}
|
|
146
|
+
return '';
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
public async getAgentSetting(acRequest: AccessRequest, agentId: string, settingKey: string): Promise<string> {
|
|
150
|
+
// Search through all teams to find agent setting
|
|
151
|
+
for (const teamData of Object.values(this.data)) {
|
|
152
|
+
const typedTeamData = teamData as { agents?: Record<string, { settings?: Record<string, any> }> };
|
|
153
|
+
if (typedTeamData.agents?.[agentId]?.settings?.[settingKey]) {
|
|
154
|
+
return typedTeamData.agents[agentId].settings[settingKey];
|
|
155
|
+
}
|
|
156
|
+
}
|
|
157
|
+
return '';
|
|
158
|
+
}
|
|
159
|
+
}
|
|
@@ -1,14 +1,14 @@
|
|
|
1
|
-
//==[ SRE: LLM ]======================
|
|
2
|
-
|
|
3
|
-
import { ConnectorService, ConnectorServiceProvider } from '@sre/Core/ConnectorsService';
|
|
4
|
-
import { TConnectorService } from '@sre/types/SRE.types';
|
|
5
|
-
import { DummyAccount } from './connectors/DummyAccount.class';
|
|
6
|
-
import { AWSAccount } from './connectors/AWSAccount.class';
|
|
7
|
-
import { JSONFileAccount } from './connectors/JSONFileAccount.class';
|
|
8
|
-
export class AccountService extends ConnectorServiceProvider {
|
|
9
|
-
public register() {
|
|
10
|
-
ConnectorService.register(TConnectorService.Account, 'AWSAccount', AWSAccount);
|
|
11
|
-
ConnectorService.register(TConnectorService.Account, 'DummyAccount', DummyAccount);
|
|
12
|
-
ConnectorService.register(TConnectorService.Account, 'JSONFileAccount', JSONFileAccount);
|
|
13
|
-
}
|
|
14
|
-
}
|
|
1
|
+
//==[ SRE: LLM ]======================
|
|
2
|
+
|
|
3
|
+
import { ConnectorService, ConnectorServiceProvider } from '@sre/Core/ConnectorsService';
|
|
4
|
+
import { TConnectorService } from '@sre/types/SRE.types';
|
|
5
|
+
import { DummyAccount } from './connectors/DummyAccount.class';
|
|
6
|
+
import { AWSAccount } from './connectors/AWSAccount.class';
|
|
7
|
+
import { JSONFileAccount } from './connectors/JSONFileAccount.class';
|
|
8
|
+
export class AccountService extends ConnectorServiceProvider {
|
|
9
|
+
public register() {
|
|
10
|
+
ConnectorService.register(TConnectorService.Account, 'AWSAccount', AWSAccount);
|
|
11
|
+
ConnectorService.register(TConnectorService.Account, 'DummyAccount', DummyAccount);
|
|
12
|
+
ConnectorService.register(TConnectorService.Account, 'JSONFileAccount', JSONFileAccount);
|
|
13
|
+
}
|
|
14
|
+
}
|
|
@@ -1,62 +1,62 @@
|
|
|
1
|
-
import { AccessCandidate } from '../..';
|
|
2
|
-
import { ConnectorService } from '../../Core/ConnectorsService';
|
|
3
|
-
|
|
4
|
-
export type TCredentialsRequest = {
|
|
5
|
-
vaultProvider?: string;
|
|
6
|
-
keyName: string;
|
|
7
|
-
mapping?: {
|
|
8
|
-
[key: string]: string;
|
|
9
|
-
};
|
|
10
|
-
};
|
|
11
|
-
|
|
12
|
-
/**
|
|
13
|
-
* Get credentials from a vault
|
|
14
|
-
*
|
|
15
|
-
* @param candidate - The candidate requesting the credentials
|
|
16
|
-
* @param credentialsRequest - The credentials request
|
|
17
|
-
* @returns The credentials
|
|
18
|
-
*/
|
|
19
|
-
export async function getCredentials(
|
|
20
|
-
candidate: AccessCandidate,
|
|
21
|
-
credentialsRequest: TCredentialsRequest | string
|
|
22
|
-
): Promise<string | Record<string, any>> {
|
|
23
|
-
if (typeof credentialsRequest === 'string') {
|
|
24
|
-
credentialsRequest = {
|
|
25
|
-
vaultProvider: '', //default vault provider
|
|
26
|
-
keyName: credentialsRequest, //default key name
|
|
27
|
-
};
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
const vaultConnector = ConnectorService.getVaultConnector(credentialsRequest.vaultProvider || '');
|
|
31
|
-
const vaultRequester = vaultConnector.requester(candidate);
|
|
32
|
-
const credentials = await vaultRequester.get(credentialsRequest.keyName);
|
|
33
|
-
|
|
34
|
-
if (!credentialsRequest.mapping) return credentials;
|
|
35
|
-
|
|
36
|
-
const mappedCredentials = {};
|
|
37
|
-
for (const [key, value] of Object.entries(credentialsRequest.mapping)) {
|
|
38
|
-
mappedCredentials[key] = JSONExpression(credentials, value);
|
|
39
|
-
}
|
|
40
|
-
|
|
41
|
-
return mappedCredentials;
|
|
42
|
-
}
|
|
43
|
-
|
|
44
|
-
/**
|
|
45
|
-
* @param obj - The object to extract the property from
|
|
46
|
-
* @param propertyString - The property to extract from the object
|
|
47
|
-
* @returns The property value
|
|
48
|
-
*/
|
|
49
|
-
function JSONExpression(obj, propertyString) {
|
|
50
|
-
const properties = propertyString.split(/\.|\[|\]\.|\]\[|\]/).filter(Boolean);
|
|
51
|
-
let currentProperty = obj;
|
|
52
|
-
|
|
53
|
-
for (let property of properties) {
|
|
54
|
-
if (currentProperty === undefined || currentProperty === null) {
|
|
55
|
-
return undefined;
|
|
56
|
-
}
|
|
57
|
-
|
|
58
|
-
currentProperty = currentProperty[property];
|
|
59
|
-
}
|
|
60
|
-
|
|
61
|
-
return currentProperty;
|
|
62
|
-
}
|
|
1
|
+
import { AccessCandidate } from '../..';
|
|
2
|
+
import { ConnectorService } from '../../Core/ConnectorsService';
|
|
3
|
+
|
|
4
|
+
export type TCredentialsRequest = {
|
|
5
|
+
vaultProvider?: string;
|
|
6
|
+
keyName: string;
|
|
7
|
+
mapping?: {
|
|
8
|
+
[key: string]: string;
|
|
9
|
+
};
|
|
10
|
+
};
|
|
11
|
+
|
|
12
|
+
/**
|
|
13
|
+
* Get credentials from a vault
|
|
14
|
+
*
|
|
15
|
+
* @param candidate - The candidate requesting the credentials
|
|
16
|
+
* @param credentialsRequest - The credentials request
|
|
17
|
+
* @returns The credentials
|
|
18
|
+
*/
|
|
19
|
+
export async function getCredentials(
|
|
20
|
+
candidate: AccessCandidate,
|
|
21
|
+
credentialsRequest: TCredentialsRequest | string
|
|
22
|
+
): Promise<string | Record<string, any>> {
|
|
23
|
+
if (typeof credentialsRequest === 'string') {
|
|
24
|
+
credentialsRequest = {
|
|
25
|
+
vaultProvider: '', //default vault provider
|
|
26
|
+
keyName: credentialsRequest, //default key name
|
|
27
|
+
};
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
const vaultConnector = ConnectorService.getVaultConnector(credentialsRequest.vaultProvider || '');
|
|
31
|
+
const vaultRequester = vaultConnector.requester(candidate);
|
|
32
|
+
const credentials = await vaultRequester.get(credentialsRequest.keyName);
|
|
33
|
+
|
|
34
|
+
if (!credentialsRequest.mapping) return credentials;
|
|
35
|
+
|
|
36
|
+
const mappedCredentials = {};
|
|
37
|
+
for (const [key, value] of Object.entries(credentialsRequest.mapping)) {
|
|
38
|
+
mappedCredentials[key] = JSONExpression(credentials, value);
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
return mappedCredentials;
|
|
42
|
+
}
|
|
43
|
+
|
|
44
|
+
/**
|
|
45
|
+
* @param obj - The object to extract the property from
|
|
46
|
+
* @param propertyString - The property to extract from the object
|
|
47
|
+
* @returns The property value
|
|
48
|
+
*/
|
|
49
|
+
function JSONExpression(obj, propertyString) {
|
|
50
|
+
const properties = propertyString.split(/\.|\[|\]\.|\]\[|\]/).filter(Boolean);
|
|
51
|
+
let currentProperty = obj;
|
|
52
|
+
|
|
53
|
+
for (let property of properties) {
|
|
54
|
+
if (currentProperty === undefined || currentProperty === null) {
|
|
55
|
+
return undefined;
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
currentProperty = currentProperty[property];
|
|
59
|
+
}
|
|
60
|
+
|
|
61
|
+
return currentProperty;
|
|
62
|
+
}
|
|
@@ -1,38 +1,38 @@
|
|
|
1
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
2
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
3
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
4
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
5
|
-
import { IAccessCandidate, IACL } from '@sre/types/ACL.types';
|
|
6
|
-
|
|
7
|
-
/**
|
|
8
|
-
* The managed vault is a vault that is managed by the SRE, its keys are not visible to the user.
|
|
9
|
-
* it's used to store generated tokens at runtime, like OAuth tokens
|
|
10
|
-
*/
|
|
11
|
-
|
|
12
|
-
export interface IManagedVaultRequest {
|
|
13
|
-
get(keyId: string): Promise<string>;
|
|
14
|
-
set(keyId: string, value: string): Promise<void>;
|
|
15
|
-
delete(keyId: string): Promise<void>;
|
|
16
|
-
exists(keyId: string): Promise<boolean>;
|
|
17
|
-
}
|
|
18
|
-
|
|
19
|
-
export abstract class ManagedVaultConnector extends SecureConnector {
|
|
20
|
-
constructor(protected _settings?: any) {
|
|
21
|
-
super(_settings);
|
|
22
|
-
}
|
|
23
|
-
|
|
24
|
-
requester(candidate: AccessCandidate): IManagedVaultRequest {
|
|
25
|
-
return {
|
|
26
|
-
get: async (keyId: string) => this.get(candidate.readRequest, keyId),
|
|
27
|
-
set: async (keyId: string, value: string) => this.set(candidate.writeRequest, keyId, value),
|
|
28
|
-
delete: async (keyId: string) => this.delete(candidate.writeRequest, keyId),
|
|
29
|
-
exists: async (keyId: string) => this.exists(candidate.readRequest, keyId),
|
|
30
|
-
};
|
|
31
|
-
}
|
|
32
|
-
|
|
33
|
-
public abstract getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL>;
|
|
34
|
-
protected abstract get(acRequest: AccessRequest, keyId: string): Promise<string>;
|
|
35
|
-
protected abstract set(acRequest: AccessRequest, keyId: string, value: string): Promise<void>;
|
|
36
|
-
protected abstract delete(acRequest: AccessRequest, keyId: string): Promise<void>;
|
|
37
|
-
protected abstract exists(acRequest: AccessRequest, keyId: string): Promise<boolean>;
|
|
38
|
-
}
|
|
1
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
2
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
3
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
4
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
5
|
+
import { IAccessCandidate, IACL } from '@sre/types/ACL.types';
|
|
6
|
+
|
|
7
|
+
/**
|
|
8
|
+
* The managed vault is a vault that is managed by the SRE, its keys are not visible to the user.
|
|
9
|
+
* it's used to store generated tokens at runtime, like OAuth tokens
|
|
10
|
+
*/
|
|
11
|
+
|
|
12
|
+
export interface IManagedVaultRequest {
|
|
13
|
+
get(keyId: string): Promise<string>;
|
|
14
|
+
set(keyId: string, value: string): Promise<void>;
|
|
15
|
+
delete(keyId: string): Promise<void>;
|
|
16
|
+
exists(keyId: string): Promise<boolean>;
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
export abstract class ManagedVaultConnector extends SecureConnector {
|
|
20
|
+
constructor(protected _settings?: any) {
|
|
21
|
+
super(_settings);
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
requester(candidate: AccessCandidate): IManagedVaultRequest {
|
|
25
|
+
return {
|
|
26
|
+
get: async (keyId: string) => this.get(candidate.readRequest, keyId),
|
|
27
|
+
set: async (keyId: string, value: string) => this.set(candidate.writeRequest, keyId, value),
|
|
28
|
+
delete: async (keyId: string) => this.delete(candidate.writeRequest, keyId),
|
|
29
|
+
exists: async (keyId: string) => this.exists(candidate.readRequest, keyId),
|
|
30
|
+
};
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
public abstract getResourceACL(resourceId: string, candidate: IAccessCandidate): Promise<ACL>;
|
|
34
|
+
protected abstract get(acRequest: AccessRequest, keyId: string): Promise<string>;
|
|
35
|
+
protected abstract set(acRequest: AccessRequest, keyId: string, value: string): Promise<void>;
|
|
36
|
+
protected abstract delete(acRequest: AccessRequest, keyId: string): Promise<void>;
|
|
37
|
+
protected abstract exists(acRequest: AccessRequest, keyId: string): Promise<boolean>;
|
|
38
|
+
}
|
|
@@ -1,53 +1,53 @@
|
|
|
1
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
-
//import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
6
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
7
|
-
import { IAccessCandidate, TAccessLevel } from '@sre/types/ACL.types';
|
|
8
|
-
|
|
9
|
-
import { ManagedVaultConnector } from '../ManagedVaultConnector';
|
|
10
|
-
|
|
11
|
-
const console = Logger('NullManagedVault');
|
|
12
|
-
export class NullManagedVault extends ManagedVaultConnector {
|
|
13
|
-
public name: string = 'NullManagedVault';
|
|
14
|
-
|
|
15
|
-
constructor(protected _settings: any) {
|
|
16
|
-
super(_settings);
|
|
17
|
-
}
|
|
18
|
-
|
|
19
|
-
@SecureConnector.AccessControl
|
|
20
|
-
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
21
|
-
console.debug(`Ignored operation:NullManagedVault.get: ${keyId}`);
|
|
22
|
-
return undefined;
|
|
23
|
-
}
|
|
24
|
-
|
|
25
|
-
@SecureConnector.AccessControl
|
|
26
|
-
protected async set(acRequest: AccessRequest, keyId: string, value: string) {
|
|
27
|
-
console.debug(`Ignored operation:NullManagedVault.set: ${keyId} = ${value}`);
|
|
28
|
-
}
|
|
29
|
-
|
|
30
|
-
@SecureConnector.AccessControl
|
|
31
|
-
protected async delete(acRequest: AccessRequest, keyId: string) {
|
|
32
|
-
console.debug(`Ignored operation:NullManagedVault.delete: ${keyId}`);
|
|
33
|
-
}
|
|
34
|
-
|
|
35
|
-
@SecureConnector.AccessControl
|
|
36
|
-
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
37
|
-
console.debug(`Ignored operation:NullManagedVault.exists: ${keyId}`);
|
|
38
|
-
return false;
|
|
39
|
-
}
|
|
40
|
-
|
|
41
|
-
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
42
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
43
|
-
const teamId = await accountConnector.getCandidateTeam(candidate);
|
|
44
|
-
|
|
45
|
-
const acl = new ACL();
|
|
46
|
-
|
|
47
|
-
//give just read access by default
|
|
48
|
-
//Cannot write to null vault
|
|
49
|
-
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
50
|
-
|
|
51
|
-
return acl;
|
|
52
|
-
}
|
|
53
|
-
}
|
|
1
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
+
//import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
5
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
6
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
7
|
+
import { IAccessCandidate, TAccessLevel } from '@sre/types/ACL.types';
|
|
8
|
+
|
|
9
|
+
import { ManagedVaultConnector } from '../ManagedVaultConnector';
|
|
10
|
+
|
|
11
|
+
const console = Logger('NullManagedVault');
|
|
12
|
+
export class NullManagedVault extends ManagedVaultConnector {
|
|
13
|
+
public name: string = 'NullManagedVault';
|
|
14
|
+
|
|
15
|
+
constructor(protected _settings: any) {
|
|
16
|
+
super(_settings);
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
@SecureConnector.AccessControl
|
|
20
|
+
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
21
|
+
console.debug(`Ignored operation:NullManagedVault.get: ${keyId}`);
|
|
22
|
+
return undefined;
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
@SecureConnector.AccessControl
|
|
26
|
+
protected async set(acRequest: AccessRequest, keyId: string, value: string) {
|
|
27
|
+
console.debug(`Ignored operation:NullManagedVault.set: ${keyId} = ${value}`);
|
|
28
|
+
}
|
|
29
|
+
|
|
30
|
+
@SecureConnector.AccessControl
|
|
31
|
+
protected async delete(acRequest: AccessRequest, keyId: string) {
|
|
32
|
+
console.debug(`Ignored operation:NullManagedVault.delete: ${keyId}`);
|
|
33
|
+
}
|
|
34
|
+
|
|
35
|
+
@SecureConnector.AccessControl
|
|
36
|
+
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
37
|
+
console.debug(`Ignored operation:NullManagedVault.exists: ${keyId}`);
|
|
38
|
+
return false;
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
42
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
43
|
+
const teamId = await accountConnector.getCandidateTeam(candidate);
|
|
44
|
+
|
|
45
|
+
const acl = new ACL();
|
|
46
|
+
|
|
47
|
+
//give just read access by default
|
|
48
|
+
//Cannot write to null vault
|
|
49
|
+
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
50
|
+
|
|
51
|
+
return acl;
|
|
52
|
+
}
|
|
53
|
+
}
|