@smythos/sre 1.6.0 → 1.6.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (237) hide show
  1. package/CHANGELOG +111 -111
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/index.js +43 -43
  5. package/dist/index.js.map +1 -1
  6. package/dist/types/index.d.ts +1 -0
  7. package/dist/types/subsystems/LLMManager/LLM.service/connectors/Ollama.class.d.ts +45 -0
  8. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +39 -0
  9. package/dist/types/types/LLM.types.d.ts +2 -0
  10. package/package.json +2 -1
  11. package/src/Components/APICall/APICall.class.ts +161 -161
  12. package/src/Components/APICall/AccessTokenManager.ts +166 -166
  13. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  14. package/src/Components/APICall/OAuth.helper.ts +447 -447
  15. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  16. package/src/Components/APICall/parseData.ts +167 -167
  17. package/src/Components/APICall/parseHeaders.ts +41 -41
  18. package/src/Components/APICall/parseProxy.ts +68 -68
  19. package/src/Components/APICall/parseUrl.ts +91 -91
  20. package/src/Components/APIEndpoint.class.ts +234 -234
  21. package/src/Components/APIOutput.class.ts +58 -58
  22. package/src/Components/AgentPlugin.class.ts +102 -102
  23. package/src/Components/Async.class.ts +155 -155
  24. package/src/Components/Await.class.ts +90 -90
  25. package/src/Components/Classifier.class.ts +158 -158
  26. package/src/Components/Component.class.ts +147 -147
  27. package/src/Components/ComponentHost.class.ts +38 -38
  28. package/src/Components/DataSourceCleaner.class.ts +92 -92
  29. package/src/Components/DataSourceIndexer.class.ts +181 -181
  30. package/src/Components/DataSourceLookup.class.ts +161 -161
  31. package/src/Components/ECMASandbox.class.ts +72 -72
  32. package/src/Components/FEncDec.class.ts +29 -29
  33. package/src/Components/FHash.class.ts +33 -33
  34. package/src/Components/FSign.class.ts +80 -80
  35. package/src/Components/FSleep.class.ts +25 -25
  36. package/src/Components/FTimestamp.class.ts +66 -66
  37. package/src/Components/FileStore.class.ts +78 -78
  38. package/src/Components/ForEach.class.ts +97 -97
  39. package/src/Components/GPTPlugin.class.ts +70 -70
  40. package/src/Components/GenAILLM.class.ts +586 -586
  41. package/src/Components/HuggingFace.class.ts +314 -314
  42. package/src/Components/Image/imageSettings.config.ts +70 -70
  43. package/src/Components/ImageGenerator.class.ts +483 -483
  44. package/src/Components/JSONFilter.class.ts +54 -54
  45. package/src/Components/LLMAssistant.class.ts +213 -213
  46. package/src/Components/LogicAND.class.ts +28 -28
  47. package/src/Components/LogicAtLeast.class.ts +85 -85
  48. package/src/Components/LogicAtMost.class.ts +86 -86
  49. package/src/Components/LogicOR.class.ts +29 -29
  50. package/src/Components/LogicXOR.class.ts +34 -34
  51. package/src/Components/MCPClient.class.ts +137 -137
  52. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  53. package/src/Components/MemoryReadKeyVal.class.ts +67 -67
  54. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  55. package/src/Components/MemoryWriteObject.class.ts +97 -97
  56. package/src/Components/MultimodalLLM.class.ts +128 -128
  57. package/src/Components/OpenAPI.class.ts +72 -72
  58. package/src/Components/PromptGenerator.class.ts +122 -122
  59. package/src/Components/ScrapflyWebScrape.class.ts +183 -183
  60. package/src/Components/ServerlessCode.class.ts +123 -123
  61. package/src/Components/TavilyWebSearch.class.ts +103 -103
  62. package/src/Components/VisionLLM.class.ts +104 -104
  63. package/src/Components/ZapierAction.class.ts +127 -127
  64. package/src/Components/index.ts +97 -97
  65. package/src/Core/AgentProcess.helper.ts +240 -240
  66. package/src/Core/Connector.class.ts +123 -123
  67. package/src/Core/ConnectorsService.ts +197 -197
  68. package/src/Core/DummyConnector.ts +49 -49
  69. package/src/Core/HookService.ts +105 -105
  70. package/src/Core/SmythRuntime.class.ts +241 -241
  71. package/src/Core/SystemEvents.ts +16 -16
  72. package/src/Core/boot.ts +56 -56
  73. package/src/config.ts +15 -15
  74. package/src/constants.ts +126 -126
  75. package/src/data/hugging-face.params.json +579 -579
  76. package/src/helpers/AWSLambdaCode.helper.ts +624 -599
  77. package/src/helpers/BinaryInput.helper.ts +331 -331
  78. package/src/helpers/Conversation.helper.ts +1157 -1157
  79. package/src/helpers/ECMASandbox.helper.ts +64 -64
  80. package/src/helpers/JsonContent.helper.ts +97 -97
  81. package/src/helpers/LocalCache.helper.ts +97 -97
  82. package/src/helpers/Log.helper.ts +274 -274
  83. package/src/helpers/OpenApiParser.helper.ts +150 -150
  84. package/src/helpers/S3Cache.helper.ts +147 -147
  85. package/src/helpers/SmythURI.helper.ts +5 -5
  86. package/src/helpers/Sysconfig.helper.ts +95 -95
  87. package/src/helpers/TemplateString.helper.ts +243 -243
  88. package/src/helpers/TypeChecker.helper.ts +329 -329
  89. package/src/index.ts +4 -3
  90. package/src/index.ts.bak +4 -3
  91. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  92. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  93. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  94. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  95. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +145 -145
  96. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  97. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  98. package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -301
  99. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  100. package/src/subsystems/AgentManager/AgentRuntime.class.ts +557 -557
  101. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  102. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  103. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  104. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  105. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  106. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  107. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  108. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  109. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  110. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +171 -172
  111. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  112. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  113. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  114. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  115. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  116. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  117. package/src/subsystems/IO/Log.service/index.ts +13 -13
  118. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  119. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  120. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  121. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  122. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  123. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  124. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  125. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  126. package/src/subsystems/IO/Router.service/index.ts +11 -11
  127. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +488 -488
  128. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  129. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  130. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  131. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  132. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  133. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +465 -465
  134. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +387 -387
  135. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +408 -408
  136. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  137. package/src/subsystems/IO/VectorDB.service/embed/GoogleEmbedding.ts +118 -118
  138. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  139. package/src/subsystems/IO/VectorDB.service/embed/index.ts +26 -26
  140. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  141. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  142. package/src/subsystems/LLMManager/LLM.inference.ts +345 -345
  143. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +492 -492
  144. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  145. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +666 -666
  146. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +407 -407
  147. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +92 -92
  148. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +983 -983
  149. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +319 -319
  150. package/src/subsystems/LLMManager/LLM.service/connectors/Ollama.class.ts +362 -0
  151. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +257 -257
  152. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +430 -430
  153. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +503 -503
  154. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
  155. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  156. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  157. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
  158. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
  159. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  160. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
  161. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
  162. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +478 -478
  163. package/src/subsystems/LLMManager/LLM.service/index.ts +47 -44
  164. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +303 -303
  165. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +271 -271
  166. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  167. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  168. package/src/subsystems/LLMManager/models.ts +2540 -2540
  169. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  170. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  171. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  172. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +214 -214
  173. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  174. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  175. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  176. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  177. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  178. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  179. package/src/subsystems/MemoryManager/RuntimeContext.ts +277 -277
  180. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  181. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  182. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  183. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  184. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  185. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +170 -170
  186. package/src/subsystems/Security/Account.service/connectors/MySQLAccount.class.ts +76 -76
  187. package/src/subsystems/Security/Account.service/index.ts +14 -14
  188. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  189. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  190. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  191. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  192. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  193. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  194. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  195. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  196. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  197. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  198. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  199. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  200. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  201. package/src/types/ACL.types.ts +104 -104
  202. package/src/types/AWS.types.ts +10 -10
  203. package/src/types/Agent.types.ts +61 -61
  204. package/src/types/AgentLogger.types.ts +17 -17
  205. package/src/types/Cache.types.ts +1 -1
  206. package/src/types/Common.types.ts +2 -2
  207. package/src/types/LLM.types.ts +520 -519
  208. package/src/types/Redis.types.ts +8 -8
  209. package/src/types/SRE.types.ts +64 -64
  210. package/src/types/Security.types.ts +14 -14
  211. package/src/types/Storage.types.ts +5 -5
  212. package/src/types/VectorDB.types.ts +86 -86
  213. package/src/utils/base64.utils.ts +275 -275
  214. package/src/utils/cli.utils.ts +68 -68
  215. package/src/utils/data.utils.ts +322 -322
  216. package/src/utils/date-time.utils.ts +22 -22
  217. package/src/utils/general.utils.ts +238 -238
  218. package/src/utils/index.ts +12 -12
  219. package/src/utils/lazy-client.ts +261 -261
  220. package/src/utils/numbers.utils.ts +13 -13
  221. package/src/utils/oauth.utils.ts +35 -35
  222. package/src/utils/string.utils.ts +414 -414
  223. package/src/utils/url.utils.ts +19 -19
  224. package/src/utils/validation.utils.ts +74 -74
  225. package/dist/bundle-analysis-lazy.html +0 -4949
  226. package/dist/bundle-analysis.html +0 -4949
  227. package/dist/types/Components/Triggers/GmailTrigger.class.d.ts +0 -13
  228. package/dist/types/Components/Triggers/Trigger.class.d.ts +0 -3
  229. package/dist/types/helpers/AIPerformanceAnalyzer.helper.d.ts +0 -45
  230. package/dist/types/helpers/AIPerformanceCollector.helper.d.ts +0 -111
  231. package/dist/types/subsystems/IO/Storage.service/connectors/AzureBlobStorage.class.d.ts +0 -211
  232. package/dist/types/subsystems/IO/VectorDB.service/connectors/WeaviateVectorDB.class.d.ts +0 -187
  233. package/dist/types/subsystems/PerformanceManager/Performance.service/PerformanceConnector.d.ts +0 -102
  234. package/dist/types/subsystems/PerformanceManager/Performance.service/connectors/LocalPerformanceConnector.class.d.ts +0 -100
  235. package/dist/types/subsystems/PerformanceManager/Performance.service/index.d.ts +0 -22
  236. package/dist/types/types/Performance.types.d.ts +0 -468
  237. package/dist/types/utils/package-manager.utils.d.ts +0 -26
@@ -1,208 +1,208 @@
1
- //import { xxh3 } from '@node-rs/xxhash';
2
- import xxhash from 'xxhashjs';
3
- import { IACL, IAccessRequest, LevelMap, ReverseLevelMap, ReverseRoleMap, RoleMap, TACLEntry, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
4
-
5
- const ACLHashAlgo = {
6
- none: (source) => source,
7
- //xxh3: (source) => xxh3.xxh64(source.toString()).toString(16),
8
- xxh3: (source) => {
9
- const h64 = xxhash.h64(); // Use xxhashjs's h64 function
10
- return source ? h64.update(source.toString()).digest().toString(16) : null;
11
- },
12
- };
13
-
14
- export class ACL implements IACL {
15
- public hashAlgorithm?: string | undefined;
16
- public entries?: {
17
- [key in TAccessRole]?: TACLEntry | undefined;
18
- };
19
- public migrated?: boolean | undefined;
20
- //private acl: TACL;
21
- public get ACL(): IACL {
22
- return {
23
- hashAlgorithm: this.hashAlgorithm,
24
- entries: JSON.parse(JSON.stringify(this.entries)),
25
- migrated: this.migrated,
26
- };
27
- }
28
- public get serializedACL(): string {
29
- return this.serializeACL(this);
30
- }
31
-
32
- constructor(acl?: IACL | string) {
33
- if (typeof acl === 'string') {
34
- this.deserializeACL(acl);
35
- } else {
36
- this.hashAlgorithm = acl?.hashAlgorithm;
37
- this.entries = acl?.entries ? JSON.parse(JSON.stringify(acl?.entries)) : {};
38
- this.migrated = acl?.migrated;
39
- }
40
- if (!this.hashAlgorithm) this.hashAlgorithm = 'xxh3';
41
- if (!this.entries) this.entries = {};
42
- }
43
-
44
- static from(acl?: IACL | string): ACL {
45
- return new ACL(acl);
46
- }
47
-
48
- /**
49
- * This function checks if the candidate has access to the requested level
50
- * it only checks the exact access level, not the higher levels
51
- * Examples :
52
- * - if the candidate has read access, it will return true only if the requested level is read
53
- * - if the current ACL has team access but the candidate is an agent, it will not match the team access
54
- * @param acRequest
55
- * @returns
56
- */
57
- public checkExactAccess(acRequest: IAccessRequest): boolean {
58
- if (!this?.entries) return false; // cannot determine the access rights, prefer to deny access
59
-
60
- const role = this?.entries[acRequest.candidate.role];
61
- if (!role) return false;
62
- let entryId = acRequest.candidate.id;
63
-
64
- if (!ACLHashAlgo[this.hashAlgorithm]) {
65
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
66
- }
67
-
68
- entryId = ACLHashAlgo[this.hashAlgorithm](entryId);
69
-
70
- const access = role[entryId];
71
- if (!access) return false;
72
-
73
- const levels = Array.isArray(acRequest.level) ? acRequest.level : [acRequest.level];
74
-
75
- return levels.every((level) => access.includes(level));
76
- //return access.includes(req.level);
77
- }
78
-
79
- public addPublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
80
- if (!this?.entries[TAccessRole.Public]) this.entries[TAccessRole.Public] = {};
81
- if (!ACLHashAlgo[this.hashAlgorithm]) {
82
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
83
- }
84
- const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
85
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
86
-
87
- if (!this?.entries[TAccessRole.Public]![hashedOwner]) this.entries[TAccessRole.Public]![hashedOwner] = [];
88
- //acl[TAccessRole.Public]![hashedOwner]!.push(level);
89
- //concatenate the levels
90
- const curLevel: any = this.entries[TAccessRole.Public]![hashedOwner]!;
91
- this.entries[TAccessRole.Public]![hashedOwner] = [...curLevel, ...level];
92
-
93
- return this;
94
- }
95
- public removePublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
96
- if (!this?.entries[TAccessRole.Public]) return this;
97
- const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
98
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
99
-
100
- //remove the levels
101
- const curLevel = this[TAccessRole.Public]![hashedOwner]!;
102
- this[TAccessRole.Public]![hashedOwner] = curLevel.filter((l) => !level.includes(l));
103
-
104
- return this;
105
- }
106
- public addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
107
- if (role === TAccessRole.Public) {
108
- throw new Error('Adding public access using addAccess method is not allowed. Use addPublicAccess method instead.');
109
- }
110
- const _level = Array.isArray(level) ? level : [level];
111
- if (!this?.entries[role]) this.entries[role] = {};
112
- if (!ACLHashAlgo[this.hashAlgorithm]) {
113
- throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
114
- }
115
- const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
116
-
117
- if (!hashedOwner) {
118
- throw new Error(`Invalid ownerId: ${role}:${ownerId}`);
119
- }
120
-
121
- if (!this?.entries[role]![hashedOwner]) this.entries[role]![hashedOwner] = [];
122
- //acl[role]![ownerId]!.push(level);
123
- //concatenate the levels
124
- const curLevel = this.entries[role]![hashedOwner]!;
125
- this.entries[role]![hashedOwner] = [...curLevel, ..._level];
126
-
127
- return this;
128
- }
129
- public static addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
130
- return ACL.from().addAccess(role, ownerId, level);
131
- }
132
-
133
- public removeAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
134
- const _level = Array.isArray(level) ? level : [level];
135
- if (!this[role]) return this;
136
- if (!this[role]![ownerId]) return this;
137
- //acl[role]![ownerId] = acl[role]![ownerId]!.filter((l) => l !== level);
138
- //remove the levels
139
- const curLevel = this[role]![ownerId]!;
140
- this[role]![ownerId] = curLevel.filter((l) => !_level.includes(l));
141
-
142
- return this;
143
- }
144
-
145
- private serializeACL(tacl: IACL): string {
146
- let compressed = '';
147
-
148
- if (tacl.hashAlgorithm) {
149
- compressed += `h:${tacl.hashAlgorithm}|`;
150
- }
151
-
152
- if (tacl.entries) {
153
- for (const [role, entries] of Object.entries(tacl.entries)) {
154
- const roleShort = RoleMap[role]; // Use the mapping for role
155
- const entriesArray: any[] = [];
156
-
157
- for (const [hashedOwnerKey, accessLevels] of Object.entries(entries || {})) {
158
- if (accessLevels) {
159
- const accessLevelsShort = accessLevels.map((level) => LevelMap[level]).join('');
160
- entriesArray.push(`${hashedOwnerKey}/${accessLevelsShort}`);
161
- }
162
- }
163
-
164
- if (entriesArray.length > 0) {
165
- compressed += `${roleShort}:${entriesArray.join(',')}|`;
166
- }
167
- }
168
- }
169
-
170
- // Remove the trailing '|'
171
- if (compressed.endsWith('|')) {
172
- compressed = compressed.slice(0, -1);
173
- }
174
-
175
- return compressed;
176
- }
177
-
178
- private deserializeACL(compressed: string) {
179
- const parts = compressed.split('|');
180
- this.hashAlgorithm = '';
181
- this.entries = {};
182
-
183
- for (const part of parts) {
184
- if (part.startsWith('h:')) {
185
- this.hashAlgorithm = part.substring(2);
186
- } else {
187
- const [roleShort, entries] = part.split(':');
188
- const role = ReverseRoleMap[roleShort]; // Use the reverse mapping for role
189
-
190
- if (role) {
191
- const entriesObj = {};
192
- const entriesArray = entries.split(',');
193
-
194
- for (const entry of entriesArray) {
195
- const [hashedOwnerKey, accessLevelsShort] = entry.split('/');
196
- const accessLevels = accessLevelsShort.split('').map((short) => ReverseLevelMap[short]);
197
-
198
- entriesObj[hashedOwnerKey] = accessLevels;
199
- }
200
-
201
- this.entries[role] = entriesObj;
202
- }
203
- }
204
- }
205
-
206
- //return tacl;
207
- }
208
- }
1
+ //import { xxh3 } from '@node-rs/xxhash';
2
+ import xxhash from 'xxhashjs';
3
+ import { IACL, IAccessRequest, LevelMap, ReverseLevelMap, ReverseRoleMap, RoleMap, TACLEntry, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
4
+
5
+ const ACLHashAlgo = {
6
+ none: (source) => source,
7
+ //xxh3: (source) => xxh3.xxh64(source.toString()).toString(16),
8
+ xxh3: (source) => {
9
+ const h64 = xxhash.h64(); // Use xxhashjs's h64 function
10
+ return source ? h64.update(source.toString()).digest().toString(16) : null;
11
+ },
12
+ };
13
+
14
+ export class ACL implements IACL {
15
+ public hashAlgorithm?: string | undefined;
16
+ public entries?: {
17
+ [key in TAccessRole]?: TACLEntry | undefined;
18
+ };
19
+ public migrated?: boolean | undefined;
20
+ //private acl: TACL;
21
+ public get ACL(): IACL {
22
+ return {
23
+ hashAlgorithm: this.hashAlgorithm,
24
+ entries: JSON.parse(JSON.stringify(this.entries)),
25
+ migrated: this.migrated,
26
+ };
27
+ }
28
+ public get serializedACL(): string {
29
+ return this.serializeACL(this);
30
+ }
31
+
32
+ constructor(acl?: IACL | string) {
33
+ if (typeof acl === 'string') {
34
+ this.deserializeACL(acl);
35
+ } else {
36
+ this.hashAlgorithm = acl?.hashAlgorithm;
37
+ this.entries = acl?.entries ? JSON.parse(JSON.stringify(acl?.entries)) : {};
38
+ this.migrated = acl?.migrated;
39
+ }
40
+ if (!this.hashAlgorithm) this.hashAlgorithm = 'xxh3';
41
+ if (!this.entries) this.entries = {};
42
+ }
43
+
44
+ static from(acl?: IACL | string): ACL {
45
+ return new ACL(acl);
46
+ }
47
+
48
+ /**
49
+ * This function checks if the candidate has access to the requested level
50
+ * it only checks the exact access level, not the higher levels
51
+ * Examples :
52
+ * - if the candidate has read access, it will return true only if the requested level is read
53
+ * - if the current ACL has team access but the candidate is an agent, it will not match the team access
54
+ * @param acRequest
55
+ * @returns
56
+ */
57
+ public checkExactAccess(acRequest: IAccessRequest): boolean {
58
+ if (!this?.entries) return false; // cannot determine the access rights, prefer to deny access
59
+
60
+ const role = this?.entries[acRequest.candidate.role];
61
+ if (!role) return false;
62
+ let entryId = acRequest.candidate.id;
63
+
64
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
65
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
66
+ }
67
+
68
+ entryId = ACLHashAlgo[this.hashAlgorithm](entryId);
69
+
70
+ const access = role[entryId];
71
+ if (!access) return false;
72
+
73
+ const levels = Array.isArray(acRequest.level) ? acRequest.level : [acRequest.level];
74
+
75
+ return levels.every((level) => access.includes(level));
76
+ //return access.includes(req.level);
77
+ }
78
+
79
+ public addPublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
80
+ if (!this?.entries[TAccessRole.Public]) this.entries[TAccessRole.Public] = {};
81
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
82
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
83
+ }
84
+ const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
85
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
86
+
87
+ if (!this?.entries[TAccessRole.Public]![hashedOwner]) this.entries[TAccessRole.Public]![hashedOwner] = [];
88
+ //acl[TAccessRole.Public]![hashedOwner]!.push(level);
89
+ //concatenate the levels
90
+ const curLevel: any = this.entries[TAccessRole.Public]![hashedOwner]!;
91
+ this.entries[TAccessRole.Public]![hashedOwner] = [...curLevel, ...level];
92
+
93
+ return this;
94
+ }
95
+ public removePublicAccess(level: TAccessLevel | TAccessLevel[]): ACL {
96
+ if (!this?.entries[TAccessRole.Public]) return this;
97
+ const ownerId = TAccessRole.Public; //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
98
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
99
+
100
+ //remove the levels
101
+ const curLevel = this[TAccessRole.Public]![hashedOwner]!;
102
+ this[TAccessRole.Public]![hashedOwner] = curLevel.filter((l) => !level.includes(l));
103
+
104
+ return this;
105
+ }
106
+ public addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
107
+ if (role === TAccessRole.Public) {
108
+ throw new Error('Adding public access using addAccess method is not allowed. Use addPublicAccess method instead.');
109
+ }
110
+ const _level = Array.isArray(level) ? level : [level];
111
+ if (!this?.entries[role]) this.entries[role] = {};
112
+ if (!ACLHashAlgo[this.hashAlgorithm]) {
113
+ throw new Error(`Hash algorithm ${this.hashAlgorithm} not supported`);
114
+ }
115
+ const hashedOwner = ACLHashAlgo[this.hashAlgorithm](ownerId);
116
+
117
+ if (!hashedOwner) {
118
+ throw new Error(`Invalid ownerId: ${role}:${ownerId}`);
119
+ }
120
+
121
+ if (!this?.entries[role]![hashedOwner]) this.entries[role]![hashedOwner] = [];
122
+ //acl[role]![ownerId]!.push(level);
123
+ //concatenate the levels
124
+ const curLevel = this.entries[role]![hashedOwner]!;
125
+ this.entries[role]![hashedOwner] = [...curLevel, ..._level];
126
+
127
+ return this;
128
+ }
129
+ public static addAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
130
+ return ACL.from().addAccess(role, ownerId, level);
131
+ }
132
+
133
+ public removeAccess(role: TAccessRole, ownerId: string, level: TAccessLevel | TAccessLevel[]): ACL {
134
+ const _level = Array.isArray(level) ? level : [level];
135
+ if (!this[role]) return this;
136
+ if (!this[role]![ownerId]) return this;
137
+ //acl[role]![ownerId] = acl[role]![ownerId]!.filter((l) => l !== level);
138
+ //remove the levels
139
+ const curLevel = this[role]![ownerId]!;
140
+ this[role]![ownerId] = curLevel.filter((l) => !_level.includes(l));
141
+
142
+ return this;
143
+ }
144
+
145
+ private serializeACL(tacl: IACL): string {
146
+ let compressed = '';
147
+
148
+ if (tacl.hashAlgorithm) {
149
+ compressed += `h:${tacl.hashAlgorithm}|`;
150
+ }
151
+
152
+ if (tacl.entries) {
153
+ for (const [role, entries] of Object.entries(tacl.entries)) {
154
+ const roleShort = RoleMap[role]; // Use the mapping for role
155
+ const entriesArray: any[] = [];
156
+
157
+ for (const [hashedOwnerKey, accessLevels] of Object.entries(entries || {})) {
158
+ if (accessLevels) {
159
+ const accessLevelsShort = accessLevels.map((level) => LevelMap[level]).join('');
160
+ entriesArray.push(`${hashedOwnerKey}/${accessLevelsShort}`);
161
+ }
162
+ }
163
+
164
+ if (entriesArray.length > 0) {
165
+ compressed += `${roleShort}:${entriesArray.join(',')}|`;
166
+ }
167
+ }
168
+ }
169
+
170
+ // Remove the trailing '|'
171
+ if (compressed.endsWith('|')) {
172
+ compressed = compressed.slice(0, -1);
173
+ }
174
+
175
+ return compressed;
176
+ }
177
+
178
+ private deserializeACL(compressed: string) {
179
+ const parts = compressed.split('|');
180
+ this.hashAlgorithm = '';
181
+ this.entries = {};
182
+
183
+ for (const part of parts) {
184
+ if (part.startsWith('h:')) {
185
+ this.hashAlgorithm = part.substring(2);
186
+ } else {
187
+ const [roleShort, entries] = part.split(':');
188
+ const role = ReverseRoleMap[roleShort]; // Use the reverse mapping for role
189
+
190
+ if (role) {
191
+ const entriesObj = {};
192
+ const entriesArray = entries.split(',');
193
+
194
+ for (const entry of entriesArray) {
195
+ const [hashedOwnerKey, accessLevelsShort] = entry.split('/');
196
+ const accessLevels = accessLevelsShort.split('').map((short) => ReverseLevelMap[short]);
197
+
198
+ entriesObj[hashedOwnerKey] = accessLevels;
199
+ }
200
+
201
+ this.entries[role] = entriesObj;
202
+ }
203
+ }
204
+ }
205
+
206
+ //return tacl;
207
+ }
208
+ }
@@ -1,82 +1,82 @@
1
- import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
2
- import { AccessRequest } from './AccessRequest.class';
3
-
4
- export class AccessCandidate implements IAccessCandidate {
5
- public role: TAccessRole;
6
- public id: string;
7
- //public _candidate: TAccessCandidate;
8
- constructor(candidate?: IAccessCandidate) {
9
- //this._candidate = candidate || { role: TAccessRole.Public, id: '' };
10
-
11
- this.role = candidate ? candidate.role : TAccessRole.Public;
12
- this.id = candidate ? this._validateId(candidate.id) : '';
13
- }
14
-
15
- private _validateId(id: string) {
16
- if (/[^a-zA-Z0-9-]/.test(id))
17
- throw new Error(`Access Candidate ID can only contain alphanumeric characters and hyphens, invalid id: ${id}`);
18
- return id;
19
- }
20
-
21
- public toString(): string {
22
- return `AC:R[${this.role}]:ID[${this.id}]`;
23
- }
24
-
25
- public get request(): AccessRequest {
26
- return new AccessRequest(this);
27
- }
28
-
29
- public get readRequest(): AccessRequest {
30
- return new AccessRequest(this).setLevel(TAccessLevel.Read);
31
- }
32
- public get writeRequest(): AccessRequest {
33
- return new AccessRequest(this).setLevel(TAccessLevel.Write);
34
- }
35
- public get ownerRequest(): AccessRequest {
36
- return new AccessRequest(this).setLevel(TAccessLevel.Owner);
37
- }
38
-
39
- public static clone(candidate: IAccessCandidate): AccessCandidate {
40
- return new AccessCandidate(candidate);
41
- }
42
-
43
- public team(teamId: string): AccessCandidate {
44
- this.role = TAccessRole.Team;
45
- this.id = teamId;
46
-
47
- return this;
48
- }
49
- static team(teamId: string): AccessCandidate {
50
- return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
51
- }
52
-
53
- public agent(agentId: string): AccessCandidate {
54
- this.role = TAccessRole.Agent;
55
- this.id = agentId;
56
- return this;
57
- }
58
- static agent(agentId: string): AccessCandidate {
59
- return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
60
- }
61
-
62
- public user(userId: string): AccessCandidate {
63
- this.role = TAccessRole.User;
64
- this.id = userId;
65
- return this;
66
- }
67
- static user(userId: string): AccessCandidate {
68
- return new AccessCandidate({ role: TAccessRole.User, id: userId });
69
- }
70
-
71
- public public(): AccessCandidate {
72
- this.role = TAccessRole.Public;
73
-
74
- //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
75
- this.id = TAccessRole.Public;
76
-
77
- return this;
78
- }
79
- static public(): AccessCandidate {
80
- return new AccessCandidate({ role: TAccessRole.Public, id: '' });
81
- }
82
- }
1
+ import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
2
+ import { AccessRequest } from './AccessRequest.class';
3
+
4
+ export class AccessCandidate implements IAccessCandidate {
5
+ public role: TAccessRole;
6
+ public id: string;
7
+ //public _candidate: TAccessCandidate;
8
+ constructor(candidate?: IAccessCandidate) {
9
+ //this._candidate = candidate || { role: TAccessRole.Public, id: '' };
10
+
11
+ this.role = candidate ? candidate.role : TAccessRole.Public;
12
+ this.id = candidate ? this._validateId(candidate.id) : '';
13
+ }
14
+
15
+ private _validateId(id: string) {
16
+ if (/[^a-zA-Z0-9-]/.test(id))
17
+ throw new Error(`Access Candidate ID can only contain alphanumeric characters and hyphens, invalid id: ${id}`);
18
+ return id;
19
+ }
20
+
21
+ public toString(): string {
22
+ return `AC:R[${this.role}]:ID[${this.id}]`;
23
+ }
24
+
25
+ public get request(): AccessRequest {
26
+ return new AccessRequest(this);
27
+ }
28
+
29
+ public get readRequest(): AccessRequest {
30
+ return new AccessRequest(this).setLevel(TAccessLevel.Read);
31
+ }
32
+ public get writeRequest(): AccessRequest {
33
+ return new AccessRequest(this).setLevel(TAccessLevel.Write);
34
+ }
35
+ public get ownerRequest(): AccessRequest {
36
+ return new AccessRequest(this).setLevel(TAccessLevel.Owner);
37
+ }
38
+
39
+ public static clone(candidate: IAccessCandidate): AccessCandidate {
40
+ return new AccessCandidate(candidate);
41
+ }
42
+
43
+ public team(teamId: string): AccessCandidate {
44
+ this.role = TAccessRole.Team;
45
+ this.id = teamId;
46
+
47
+ return this;
48
+ }
49
+ static team(teamId: string): AccessCandidate {
50
+ return new AccessCandidate({ role: TAccessRole.Team, id: teamId });
51
+ }
52
+
53
+ public agent(agentId: string): AccessCandidate {
54
+ this.role = TAccessRole.Agent;
55
+ this.id = agentId;
56
+ return this;
57
+ }
58
+ static agent(agentId: string): AccessCandidate {
59
+ return new AccessCandidate({ role: TAccessRole.Agent, id: agentId });
60
+ }
61
+
62
+ public user(userId: string): AccessCandidate {
63
+ this.role = TAccessRole.User;
64
+ this.id = userId;
65
+ return this;
66
+ }
67
+ static user(userId: string): AccessCandidate {
68
+ return new AccessCandidate({ role: TAccessRole.User, id: userId });
69
+ }
70
+
71
+ public public(): AccessCandidate {
72
+ this.role = TAccessRole.Public;
73
+
74
+ //public is a special case we use the role as the owner id because public access does not have specific candidate IDs
75
+ this.id = TAccessRole.Public;
76
+
77
+ return this;
78
+ }
79
+ static public(): AccessCandidate {
80
+ return new AccessCandidate({ role: TAccessRole.Public, id: '' });
81
+ }
82
+ }