@smythos/sre 1.6.8 → 1.6.10
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG +111 -111
- package/LICENSE +18 -18
- package/README.md +135 -135
- package/dist/bundle-analysis-lazy.html +4949 -0
- package/dist/bundle-analysis.html +4949 -0
- package/dist/index.js +2 -2
- package/dist/index.js.map +1 -1
- package/dist/types/Components/Triggers/Gmail.trigger.d.ts +58 -0
- package/dist/types/Components/Triggers/GmailTrigger.class.d.ts +44 -0
- package/dist/types/Components/Triggers/Trigger.class.d.ts +21 -0
- package/dist/types/Components/Triggers/WhatsApp.trigger.d.ts +22 -0
- package/dist/types/helpers/AIPerformanceAnalyzer.helper.d.ts +45 -0
- package/dist/types/helpers/AIPerformanceCollector.helper.d.ts +111 -0
- package/dist/types/subsystems/IO/Storage.service/connectors/AzureBlobStorage.class.d.ts +211 -0
- package/dist/types/subsystems/IO/VectorDB.service/connectors/WeaviateVectorDB.class.d.ts +187 -0
- package/dist/types/subsystems/PerformanceManager/Performance.service/PerformanceConnector.d.ts +102 -0
- package/dist/types/subsystems/PerformanceManager/Performance.service/connectors/LocalPerformanceConnector.class.d.ts +100 -0
- package/dist/types/subsystems/PerformanceManager/Performance.service/index.d.ts +22 -0
- package/dist/types/subsystems/Security/Credentials/Credentials.class.d.ts +2 -0
- package/dist/types/subsystems/Security/Credentials/ManagedOAuth2Credentials.class.d.ts +18 -0
- package/dist/types/subsystems/Security/Credentials/OAuth2Credentials.class.d.ts +14 -0
- package/dist/types/types/Performance.types.d.ts +468 -0
- package/dist/types/utils/package-manager.utils.d.ts +26 -0
- package/package.json +1 -1
- package/src/Components/APICall/APICall.class.ts +161 -161
- package/src/Components/APICall/AccessTokenManager.ts +166 -166
- package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
- package/src/Components/APICall/OAuth.helper.ts +447 -447
- package/src/Components/APICall/mimeTypeCategories.ts +46 -46
- package/src/Components/APICall/parseData.ts +167 -167
- package/src/Components/APICall/parseHeaders.ts +41 -41
- package/src/Components/APICall/parseProxy.ts +68 -68
- package/src/Components/APICall/parseUrl.ts +91 -91
- package/src/Components/APIEndpoint.class.ts +234 -234
- package/src/Components/APIOutput.class.ts +58 -58
- package/src/Components/AgentPlugin.class.ts +102 -102
- package/src/Components/Async.class.ts +155 -155
- package/src/Components/Await.class.ts +90 -90
- package/src/Components/Classifier.class.ts +158 -158
- package/src/Components/Component.class.ts +147 -147
- package/src/Components/ComponentHost.class.ts +38 -38
- package/src/Components/DataSourceCleaner.class.ts +92 -92
- package/src/Components/DataSourceIndexer.class.ts +181 -181
- package/src/Components/DataSourceLookup.class.ts +161 -161
- package/src/Components/ECMASandbox.class.ts +72 -72
- package/src/Components/FEncDec.class.ts +29 -29
- package/src/Components/FHash.class.ts +33 -33
- package/src/Components/FSign.class.ts +80 -80
- package/src/Components/FSleep.class.ts +25 -25
- package/src/Components/FTimestamp.class.ts +66 -66
- package/src/Components/FileStore.class.ts +78 -78
- package/src/Components/ForEach.class.ts +97 -97
- package/src/Components/GPTPlugin.class.ts +70 -70
- package/src/Components/GenAILLM.class.ts +586 -586
- package/src/Components/HuggingFace.class.ts +313 -313
- package/src/Components/Image/imageSettings.config.ts +70 -70
- package/src/Components/ImageGenerator.class.ts +483 -483
- package/src/Components/JSONFilter.class.ts +54 -54
- package/src/Components/LLMAssistant.class.ts +213 -213
- package/src/Components/LogicAND.class.ts +28 -28
- package/src/Components/LogicAtLeast.class.ts +85 -85
- package/src/Components/LogicAtMost.class.ts +86 -86
- package/src/Components/LogicOR.class.ts +29 -29
- package/src/Components/LogicXOR.class.ts +34 -34
- package/src/Components/MCPClient.class.ts +137 -137
- package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
- package/src/Components/MemoryReadKeyVal.class.ts +67 -67
- package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
- package/src/Components/MemoryWriteObject.class.ts +97 -97
- package/src/Components/MultimodalLLM.class.ts +128 -128
- package/src/Components/OpenAPI.class.ts +72 -72
- package/src/Components/PromptGenerator.class.ts +122 -122
- package/src/Components/ScrapflyWebScrape.class.ts +183 -183
- package/src/Components/ServerlessCode.class.ts +123 -123
- package/src/Components/TavilyWebSearch.class.ts +103 -103
- package/src/Components/VisionLLM.class.ts +104 -104
- package/src/Components/ZapierAction.class.ts +127 -127
- package/src/Components/index.ts +97 -97
- package/src/Core/AgentProcess.helper.ts +240 -240
- package/src/Core/Connector.class.ts +123 -123
- package/src/Core/ConnectorsService.ts +197 -197
- package/src/Core/DummyConnector.ts +49 -49
- package/src/Core/HookService.ts +105 -105
- package/src/Core/SmythRuntime.class.ts +241 -241
- package/src/Core/SystemEvents.ts +16 -16
- package/src/Core/boot.ts +56 -56
- package/src/config.ts +15 -15
- package/src/constants.ts +126 -126
- package/src/data/hugging-face.params.json +579 -579
- package/src/helpers/AWSLambdaCode.helper.ts +624 -624
- package/src/helpers/BinaryInput.helper.ts +331 -331
- package/src/helpers/Conversation.helper.ts +1157 -1157
- package/src/helpers/ECMASandbox.helper.ts +64 -64
- package/src/helpers/JsonContent.helper.ts +97 -97
- package/src/helpers/LocalCache.helper.ts +97 -97
- package/src/helpers/Log.helper.ts +274 -274
- package/src/helpers/OpenApiParser.helper.ts +150 -150
- package/src/helpers/S3Cache.helper.ts +147 -147
- package/src/helpers/SmythURI.helper.ts +5 -5
- package/src/helpers/Sysconfig.helper.ts +95 -95
- package/src/helpers/TemplateString.helper.ts +243 -243
- package/src/helpers/TypeChecker.helper.ts +329 -329
- package/src/index.ts +3 -3
- package/src/index.ts.bak +3 -3
- package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
- package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
- package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
- package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
- package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +145 -145
- package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
- package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
- package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -301
- package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
- package/src/subsystems/AgentManager/AgentRuntime.class.ts +557 -557
- package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
- package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
- package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
- package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
- package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
- package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
- package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
- package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
- package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
- package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +171 -171
- package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
- package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
- package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
- package/src/subsystems/IO/CLI.service/index.ts +9 -9
- package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
- package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
- package/src/subsystems/IO/Log.service/index.ts +13 -13
- package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
- package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
- package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
- package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
- package/src/subsystems/IO/NKV.service/index.ts +14 -14
- package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
- package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
- package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
- package/src/subsystems/IO/Router.service/index.ts +11 -11
- package/src/subsystems/IO/Storage.service/SmythFS.class.ts +488 -488
- package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
- package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
- package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
- package/src/subsystems/IO/Storage.service/index.ts +13 -13
- package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
- package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +465 -465
- package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +387 -387
- package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +408 -408
- package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
- package/src/subsystems/IO/VectorDB.service/embed/GoogleEmbedding.ts +118 -118
- package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
- package/src/subsystems/IO/VectorDB.service/embed/index.ts +26 -26
- package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
- package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
- package/src/subsystems/LLMManager/LLM.inference.ts +345 -345
- package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +492 -492
- package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
- package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +666 -666
- package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +407 -407
- package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +92 -92
- package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +983 -983
- package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +319 -319
- package/src/subsystems/LLMManager/LLM.service/connectors/Ollama.class.ts +361 -361
- package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +257 -257
- package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +430 -430
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +503 -503
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
- package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
- package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +478 -478
- package/src/subsystems/LLMManager/LLM.service/index.ts +47 -47
- package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +303 -303
- package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +280 -271
- package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
- package/src/subsystems/LLMManager/custom-models.ts +854 -854
- package/src/subsystems/LLMManager/models.ts +2540 -2540
- package/src/subsystems/LLMManager/paramMappings.ts +69 -69
- package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
- package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
- package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +214 -214
- package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
- package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
- package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
- package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
- package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
- package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
- package/src/subsystems/MemoryManager/RuntimeContext.ts +277 -277
- package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
- package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
- package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
- package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
- package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
- package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +170 -170
- package/src/subsystems/Security/Account.service/connectors/MySQLAccount.class.ts +76 -76
- package/src/subsystems/Security/Account.service/index.ts +14 -14
- package/src/subsystems/Security/Credentials.helper.ts +62 -62
- package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
- package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
- package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
- package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
- package/src/subsystems/Security/SecureConnector.class.ts +110 -110
- package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
- package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
- package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
- package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
- package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
- package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
- package/src/subsystems/Security/Vault.service/index.ts +12 -12
- package/src/types/ACL.types.ts +104 -104
- package/src/types/AWS.types.ts +10 -10
- package/src/types/Agent.types.ts +61 -61
- package/src/types/AgentLogger.types.ts +17 -17
- package/src/types/Cache.types.ts +1 -1
- package/src/types/Common.types.ts +2 -2
- package/src/types/LLM.types.ts +520 -520
- package/src/types/Redis.types.ts +8 -8
- package/src/types/SRE.types.ts +64 -64
- package/src/types/Security.types.ts +14 -14
- package/src/types/Storage.types.ts +5 -5
- package/src/types/VectorDB.types.ts +86 -86
- package/src/utils/base64.utils.ts +275 -275
- package/src/utils/cli.utils.ts +68 -68
- package/src/utils/data.utils.ts +322 -322
- package/src/utils/date-time.utils.ts +22 -22
- package/src/utils/general.utils.ts +238 -238
- package/src/utils/index.ts +12 -12
- package/src/utils/lazy-client.ts +261 -261
- package/src/utils/numbers.utils.ts +13 -13
- package/src/utils/oauth.utils.ts +35 -35
- package/src/utils/string.utils.ts +414 -414
- package/src/utils/url.utils.ts +19 -19
- package/src/utils/validation.utils.ts +74 -74
- package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
|
@@ -1,221 +1,221 @@
|
|
|
1
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
-
import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
5
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
6
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
7
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
8
|
-
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
9
|
-
import { EncryptionSettings } from '@sre/types/Security.types';
|
|
10
|
-
import { IVaultRequest, VaultConnector } from '../VaultConnector';
|
|
11
|
-
import os from 'os';
|
|
12
|
-
import crypto from 'crypto';
|
|
13
|
-
import fs from 'fs';
|
|
14
|
-
import * as readlineSync from 'readline-sync';
|
|
15
|
-
import path from 'path';
|
|
16
|
-
import * as chokidar from 'chokidar';
|
|
17
|
-
import { findSmythPath } from '../../../../helpers/Sysconfig.helper';
|
|
18
|
-
|
|
19
|
-
const console = Logger('JSONFileVault');
|
|
20
|
-
|
|
21
|
-
export type JSONFileVaultConfig = {
|
|
22
|
-
file?: string;
|
|
23
|
-
fileKey?: string;
|
|
24
|
-
shared?: string;
|
|
25
|
-
};
|
|
26
|
-
|
|
27
|
-
export class JSONFileVault extends VaultConnector {
|
|
28
|
-
public name: string = 'JSONFileVault';
|
|
29
|
-
private vaultData: any;
|
|
30
|
-
private index: any;
|
|
31
|
-
private shared: string;
|
|
32
|
-
private vaultFile: string;
|
|
33
|
-
private watcher: chokidar.FSWatcher | null = null;
|
|
34
|
-
|
|
35
|
-
constructor(protected _settings: JSONFileVaultConfig) {
|
|
36
|
-
super(_settings);
|
|
37
|
-
//if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
|
|
38
|
-
|
|
39
|
-
this.shared = _settings.shared || ''; //if config.shared, all keys are accessible to all teams, and they are set under the 'shared' teamId
|
|
40
|
-
|
|
41
|
-
this.vaultFile = this.findVaultFile(_settings.file);
|
|
42
|
-
this.fetchVaultData(this.vaultFile, _settings);
|
|
43
|
-
this.initFileWatcher();
|
|
44
|
-
}
|
|
45
|
-
|
|
46
|
-
private findVaultFile(vaultFile) {
|
|
47
|
-
let _vaultFile = vaultFile;
|
|
48
|
-
|
|
49
|
-
if (fs.existsSync(_vaultFile)) {
|
|
50
|
-
return _vaultFile;
|
|
51
|
-
}
|
|
52
|
-
console.warn('Vault file not found in:', _vaultFile);
|
|
53
|
-
|
|
54
|
-
//try to find the .smyth directory and check if it contains a valid vault
|
|
55
|
-
|
|
56
|
-
_vaultFile = findSmythPath('.sre/vault.json', (dir, success, nextDir) => {
|
|
57
|
-
if (!success) {
|
|
58
|
-
console.warn('Vault file not found in:', nextDir);
|
|
59
|
-
}
|
|
60
|
-
});
|
|
61
|
-
|
|
62
|
-
if (fs.existsSync(_vaultFile)) {
|
|
63
|
-
console.warn('Using alternative vault file found in : ', _vaultFile);
|
|
64
|
-
return _vaultFile;
|
|
65
|
-
}
|
|
66
|
-
|
|
67
|
-
console.warn('!!! All attempts to find the vault file failed !!!');
|
|
68
|
-
console.warn('!!! Will continue without vault !!!');
|
|
69
|
-
console.warn('!!! Many features might not work !!!');
|
|
70
|
-
|
|
71
|
-
return null;
|
|
72
|
-
}
|
|
73
|
-
|
|
74
|
-
private getMasterKeyInteractive(): string {
|
|
75
|
-
//read master key using readline-sync (blocking)
|
|
76
|
-
|
|
77
|
-
process.stdout.write('\x1b[1;37m===[ Encrypted Vault Detected ]=================================\x1b[0m\n');
|
|
78
|
-
const masterKey = readlineSync.question('Enter master key: ', {
|
|
79
|
-
hideEchoBack: true,
|
|
80
|
-
mask: '*',
|
|
81
|
-
});
|
|
82
|
-
console.info('Master key entered');
|
|
83
|
-
return masterKey;
|
|
84
|
-
}
|
|
85
|
-
|
|
86
|
-
/**
|
|
87
|
-
* Resolves environment variable references in vault values.
|
|
88
|
-
* Supports syntax: $env(VARIABLE_NAME)
|
|
89
|
-
* @param value The value to process
|
|
90
|
-
* @returns The value with environment variables resolved
|
|
91
|
-
*/
|
|
92
|
-
private resolveEnvironmentVariables(value: any): any {
|
|
93
|
-
if (typeof value !== 'string') {
|
|
94
|
-
return value;
|
|
95
|
-
}
|
|
96
|
-
|
|
97
|
-
// Match $env(VARIABLE_NAME) pattern
|
|
98
|
-
const envVarPattern = /\$env\(([^)]+)\)/g;
|
|
99
|
-
|
|
100
|
-
return value.replace(envVarPattern, (match, envVarName) => {
|
|
101
|
-
const envValue = process.env[envVarName];
|
|
102
|
-
if (envValue === undefined) {
|
|
103
|
-
console.warn(`Environment variable ${envVarName} not found, keeping original value: ${match}`);
|
|
104
|
-
return match;
|
|
105
|
-
}
|
|
106
|
-
return envValue;
|
|
107
|
-
});
|
|
108
|
-
}
|
|
109
|
-
|
|
110
|
-
@SecureConnector.AccessControl
|
|
111
|
-
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
112
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
113
|
-
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
114
|
-
|
|
115
|
-
const rawValue = this.vaultData?.[teamId]?.[keyId] || this.vaultData?.[this.shared]?.[keyId];
|
|
116
|
-
|
|
117
|
-
// Resolve environment variables if the value contains $env() references
|
|
118
|
-
return this.resolveEnvironmentVariables(rawValue);
|
|
119
|
-
}
|
|
120
|
-
|
|
121
|
-
@SecureConnector.AccessControl
|
|
122
|
-
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
123
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
124
|
-
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
125
|
-
return !!(this.vaultData?.[teamId]?.[keyId] || this.vaultData?.[this.shared]?.[keyId]);
|
|
126
|
-
}
|
|
127
|
-
|
|
128
|
-
@SecureConnector.AccessControl
|
|
129
|
-
protected async listKeys(acRequest: AccessRequest) {
|
|
130
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
131
|
-
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
132
|
-
return Object.keys(this.vaultData?.[teamId] || this.vaultData?.[this.shared] || {});
|
|
133
|
-
}
|
|
134
|
-
|
|
135
|
-
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
136
|
-
const accountConnector = ConnectorService.getAccountConnector();
|
|
137
|
-
const teamId = /*this.sharedVault ? 'shared' : */ await accountConnector.getCandidateTeam(candidate);
|
|
138
|
-
|
|
139
|
-
const acl = new ACL();
|
|
140
|
-
|
|
141
|
-
if (resourceId && typeof this.vaultData?.[teamId]?.[resourceId] !== 'string') {
|
|
142
|
-
if (this.shared && typeof this.vaultData?.[this.shared]?.[resourceId] === 'string') {
|
|
143
|
-
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
144
|
-
}
|
|
145
|
-
|
|
146
|
-
return acl;
|
|
147
|
-
}
|
|
148
|
-
|
|
149
|
-
acl.addAccess(TAccessRole.Team, teamId, TAccessLevel.Owner)
|
|
150
|
-
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Read)
|
|
151
|
-
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Write);
|
|
152
|
-
|
|
153
|
-
if (this.shared && typeof this.vaultData?.[this.shared]?.[resourceId] === 'string') {
|
|
154
|
-
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
155
|
-
}
|
|
156
|
-
|
|
157
|
-
return acl;
|
|
158
|
-
}
|
|
159
|
-
|
|
160
|
-
private fetchVaultData(vaultFile: string, _settings: JSONFileVaultConfig) {
|
|
161
|
-
if (fs.existsSync(vaultFile)) {
|
|
162
|
-
try {
|
|
163
|
-
if (_settings.fileKey && fs.existsSync(_settings.fileKey)) {
|
|
164
|
-
try {
|
|
165
|
-
const privateKey = fs.readFileSync(_settings.fileKey, 'utf8');
|
|
166
|
-
const encryptedVault = fs.readFileSync(vaultFile, 'utf8').toString();
|
|
167
|
-
const decryptedBuffer = crypto.privateDecrypt(
|
|
168
|
-
{
|
|
169
|
-
key: privateKey,
|
|
170
|
-
padding: crypto.constants.RSA_PKCS1_OAEP_PADDING,
|
|
171
|
-
},
|
|
172
|
-
Buffer.from(encryptedVault, 'base64')
|
|
173
|
-
);
|
|
174
|
-
this.vaultData = JSON.parse(decryptedBuffer.toString('utf8'));
|
|
175
|
-
} catch (error) {
|
|
176
|
-
throw new Error('Failed to decrypt vault');
|
|
177
|
-
}
|
|
178
|
-
} else {
|
|
179
|
-
this.vaultData = JSON.parse(fs.readFileSync(vaultFile).toString());
|
|
180
|
-
}
|
|
181
|
-
} catch (e) {
|
|
182
|
-
console.error('Error parsing vault file:', e);
|
|
183
|
-
console.error('!!! Vault features might not work properly !!!');
|
|
184
|
-
this.vaultData = {};
|
|
185
|
-
}
|
|
186
|
-
|
|
187
|
-
if (this.vaultData?.encrypted && this.vaultData?.algorithm && this.vaultData?.data) {
|
|
188
|
-
//this is an encrypted vault we need to request the master key
|
|
189
|
-
this.setInteraction(this.getMasterKeyInteractive.bind(this));
|
|
190
|
-
}
|
|
191
|
-
|
|
192
|
-
for (let teamId in this.vaultData) {
|
|
193
|
-
for (let resourceId in this.vaultData[teamId]) {
|
|
194
|
-
if (!this.index) this.index = {};
|
|
195
|
-
if (!this.index[resourceId]) this.index[resourceId] = {};
|
|
196
|
-
const value = this.vaultData[teamId][resourceId];
|
|
197
|
-
this.index[resourceId][teamId] = value;
|
|
198
|
-
}
|
|
199
|
-
}
|
|
200
|
-
}
|
|
201
|
-
}
|
|
202
|
-
|
|
203
|
-
private initFileWatcher() {
|
|
204
|
-
this.watcher = chokidar.watch(this.vaultFile, {
|
|
205
|
-
persistent: false, // Don't keep the process running
|
|
206
|
-
ignoreInitial: true,
|
|
207
|
-
});
|
|
208
|
-
|
|
209
|
-
this.watcher.on('change', () => {
|
|
210
|
-
this.fetchVaultData(this.vaultFile, this._settings);
|
|
211
|
-
});
|
|
212
|
-
}
|
|
213
|
-
|
|
214
|
-
public async stop() {
|
|
215
|
-
super.stop();
|
|
216
|
-
if (this.watcher) {
|
|
217
|
-
this.watcher.close();
|
|
218
|
-
this.watcher = null;
|
|
219
|
-
}
|
|
220
|
-
}
|
|
221
|
-
}
|
|
1
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
+
import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
5
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
6
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
7
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
8
|
+
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
9
|
+
import { EncryptionSettings } from '@sre/types/Security.types';
|
|
10
|
+
import { IVaultRequest, VaultConnector } from '../VaultConnector';
|
|
11
|
+
import os from 'os';
|
|
12
|
+
import crypto from 'crypto';
|
|
13
|
+
import fs from 'fs';
|
|
14
|
+
import * as readlineSync from 'readline-sync';
|
|
15
|
+
import path from 'path';
|
|
16
|
+
import * as chokidar from 'chokidar';
|
|
17
|
+
import { findSmythPath } from '../../../../helpers/Sysconfig.helper';
|
|
18
|
+
|
|
19
|
+
const console = Logger('JSONFileVault');
|
|
20
|
+
|
|
21
|
+
export type JSONFileVaultConfig = {
|
|
22
|
+
file?: string;
|
|
23
|
+
fileKey?: string;
|
|
24
|
+
shared?: string;
|
|
25
|
+
};
|
|
26
|
+
|
|
27
|
+
export class JSONFileVault extends VaultConnector {
|
|
28
|
+
public name: string = 'JSONFileVault';
|
|
29
|
+
private vaultData: any;
|
|
30
|
+
private index: any;
|
|
31
|
+
private shared: string;
|
|
32
|
+
private vaultFile: string;
|
|
33
|
+
private watcher: chokidar.FSWatcher | null = null;
|
|
34
|
+
|
|
35
|
+
constructor(protected _settings: JSONFileVaultConfig) {
|
|
36
|
+
super(_settings);
|
|
37
|
+
//if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
|
|
38
|
+
|
|
39
|
+
this.shared = _settings.shared || ''; //if config.shared, all keys are accessible to all teams, and they are set under the 'shared' teamId
|
|
40
|
+
|
|
41
|
+
this.vaultFile = this.findVaultFile(_settings.file);
|
|
42
|
+
this.fetchVaultData(this.vaultFile, _settings);
|
|
43
|
+
this.initFileWatcher();
|
|
44
|
+
}
|
|
45
|
+
|
|
46
|
+
private findVaultFile(vaultFile) {
|
|
47
|
+
let _vaultFile = vaultFile;
|
|
48
|
+
|
|
49
|
+
if (fs.existsSync(_vaultFile)) {
|
|
50
|
+
return _vaultFile;
|
|
51
|
+
}
|
|
52
|
+
console.warn('Vault file not found in:', _vaultFile);
|
|
53
|
+
|
|
54
|
+
//try to find the .smyth directory and check if it contains a valid vault
|
|
55
|
+
|
|
56
|
+
_vaultFile = findSmythPath('.sre/vault.json', (dir, success, nextDir) => {
|
|
57
|
+
if (!success) {
|
|
58
|
+
console.warn('Vault file not found in:', nextDir);
|
|
59
|
+
}
|
|
60
|
+
});
|
|
61
|
+
|
|
62
|
+
if (fs.existsSync(_vaultFile)) {
|
|
63
|
+
console.warn('Using alternative vault file found in : ', _vaultFile);
|
|
64
|
+
return _vaultFile;
|
|
65
|
+
}
|
|
66
|
+
|
|
67
|
+
console.warn('!!! All attempts to find the vault file failed !!!');
|
|
68
|
+
console.warn('!!! Will continue without vault !!!');
|
|
69
|
+
console.warn('!!! Many features might not work !!!');
|
|
70
|
+
|
|
71
|
+
return null;
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
private getMasterKeyInteractive(): string {
|
|
75
|
+
//read master key using readline-sync (blocking)
|
|
76
|
+
|
|
77
|
+
process.stdout.write('\x1b[1;37m===[ Encrypted Vault Detected ]=================================\x1b[0m\n');
|
|
78
|
+
const masterKey = readlineSync.question('Enter master key: ', {
|
|
79
|
+
hideEchoBack: true,
|
|
80
|
+
mask: '*',
|
|
81
|
+
});
|
|
82
|
+
console.info('Master key entered');
|
|
83
|
+
return masterKey;
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
/**
|
|
87
|
+
* Resolves environment variable references in vault values.
|
|
88
|
+
* Supports syntax: $env(VARIABLE_NAME)
|
|
89
|
+
* @param value The value to process
|
|
90
|
+
* @returns The value with environment variables resolved
|
|
91
|
+
*/
|
|
92
|
+
private resolveEnvironmentVariables(value: any): any {
|
|
93
|
+
if (typeof value !== 'string') {
|
|
94
|
+
return value;
|
|
95
|
+
}
|
|
96
|
+
|
|
97
|
+
// Match $env(VARIABLE_NAME) pattern
|
|
98
|
+
const envVarPattern = /\$env\(([^)]+)\)/g;
|
|
99
|
+
|
|
100
|
+
return value.replace(envVarPattern, (match, envVarName) => {
|
|
101
|
+
const envValue = process.env[envVarName];
|
|
102
|
+
if (envValue === undefined) {
|
|
103
|
+
console.warn(`Environment variable ${envVarName} not found, keeping original value: ${match}`);
|
|
104
|
+
return match;
|
|
105
|
+
}
|
|
106
|
+
return envValue;
|
|
107
|
+
});
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
@SecureConnector.AccessControl
|
|
111
|
+
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
112
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
113
|
+
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
114
|
+
|
|
115
|
+
const rawValue = this.vaultData?.[teamId]?.[keyId] || this.vaultData?.[this.shared]?.[keyId];
|
|
116
|
+
|
|
117
|
+
// Resolve environment variables if the value contains $env() references
|
|
118
|
+
return this.resolveEnvironmentVariables(rawValue);
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
@SecureConnector.AccessControl
|
|
122
|
+
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
123
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
124
|
+
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
125
|
+
return !!(this.vaultData?.[teamId]?.[keyId] || this.vaultData?.[this.shared]?.[keyId]);
|
|
126
|
+
}
|
|
127
|
+
|
|
128
|
+
@SecureConnector.AccessControl
|
|
129
|
+
protected async listKeys(acRequest: AccessRequest) {
|
|
130
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
131
|
+
const teamId = await accountConnector.getCandidateTeam(acRequest.candidate);
|
|
132
|
+
return Object.keys(this.vaultData?.[teamId] || this.vaultData?.[this.shared] || {});
|
|
133
|
+
}
|
|
134
|
+
|
|
135
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
136
|
+
const accountConnector = ConnectorService.getAccountConnector();
|
|
137
|
+
const teamId = /*this.sharedVault ? 'shared' : */ await accountConnector.getCandidateTeam(candidate);
|
|
138
|
+
|
|
139
|
+
const acl = new ACL();
|
|
140
|
+
|
|
141
|
+
if (resourceId && typeof this.vaultData?.[teamId]?.[resourceId] !== 'string') {
|
|
142
|
+
if (this.shared && typeof this.vaultData?.[this.shared]?.[resourceId] === 'string') {
|
|
143
|
+
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
144
|
+
}
|
|
145
|
+
|
|
146
|
+
return acl;
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
acl.addAccess(TAccessRole.Team, teamId, TAccessLevel.Owner)
|
|
150
|
+
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Read)
|
|
151
|
+
.addAccess(TAccessRole.Team, teamId, TAccessLevel.Write);
|
|
152
|
+
|
|
153
|
+
if (this.shared && typeof this.vaultData?.[this.shared]?.[resourceId] === 'string') {
|
|
154
|
+
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
155
|
+
}
|
|
156
|
+
|
|
157
|
+
return acl;
|
|
158
|
+
}
|
|
159
|
+
|
|
160
|
+
private fetchVaultData(vaultFile: string, _settings: JSONFileVaultConfig) {
|
|
161
|
+
if (fs.existsSync(vaultFile)) {
|
|
162
|
+
try {
|
|
163
|
+
if (_settings.fileKey && fs.existsSync(_settings.fileKey)) {
|
|
164
|
+
try {
|
|
165
|
+
const privateKey = fs.readFileSync(_settings.fileKey, 'utf8');
|
|
166
|
+
const encryptedVault = fs.readFileSync(vaultFile, 'utf8').toString();
|
|
167
|
+
const decryptedBuffer = crypto.privateDecrypt(
|
|
168
|
+
{
|
|
169
|
+
key: privateKey,
|
|
170
|
+
padding: crypto.constants.RSA_PKCS1_OAEP_PADDING,
|
|
171
|
+
},
|
|
172
|
+
Buffer.from(encryptedVault, 'base64')
|
|
173
|
+
);
|
|
174
|
+
this.vaultData = JSON.parse(decryptedBuffer.toString('utf8'));
|
|
175
|
+
} catch (error) {
|
|
176
|
+
throw new Error('Failed to decrypt vault');
|
|
177
|
+
}
|
|
178
|
+
} else {
|
|
179
|
+
this.vaultData = JSON.parse(fs.readFileSync(vaultFile).toString());
|
|
180
|
+
}
|
|
181
|
+
} catch (e) {
|
|
182
|
+
console.error('Error parsing vault file:', e);
|
|
183
|
+
console.error('!!! Vault features might not work properly !!!');
|
|
184
|
+
this.vaultData = {};
|
|
185
|
+
}
|
|
186
|
+
|
|
187
|
+
if (this.vaultData?.encrypted && this.vaultData?.algorithm && this.vaultData?.data) {
|
|
188
|
+
//this is an encrypted vault we need to request the master key
|
|
189
|
+
this.setInteraction(this.getMasterKeyInteractive.bind(this));
|
|
190
|
+
}
|
|
191
|
+
|
|
192
|
+
for (let teamId in this.vaultData) {
|
|
193
|
+
for (let resourceId in this.vaultData[teamId]) {
|
|
194
|
+
if (!this.index) this.index = {};
|
|
195
|
+
if (!this.index[resourceId]) this.index[resourceId] = {};
|
|
196
|
+
const value = this.vaultData[teamId][resourceId];
|
|
197
|
+
this.index[resourceId][teamId] = value;
|
|
198
|
+
}
|
|
199
|
+
}
|
|
200
|
+
}
|
|
201
|
+
}
|
|
202
|
+
|
|
203
|
+
private initFileWatcher() {
|
|
204
|
+
this.watcher = chokidar.watch(this.vaultFile, {
|
|
205
|
+
persistent: false, // Don't keep the process running
|
|
206
|
+
ignoreInitial: true,
|
|
207
|
+
});
|
|
208
|
+
|
|
209
|
+
this.watcher.on('change', () => {
|
|
210
|
+
this.fetchVaultData(this.vaultFile, this._settings);
|
|
211
|
+
});
|
|
212
|
+
}
|
|
213
|
+
|
|
214
|
+
public async stop() {
|
|
215
|
+
super.stop();
|
|
216
|
+
if (this.watcher) {
|
|
217
|
+
this.watcher.close();
|
|
218
|
+
this.watcher = null;
|
|
219
|
+
}
|
|
220
|
+
}
|
|
221
|
+
}
|
|
@@ -1,54 +1,54 @@
|
|
|
1
|
-
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
-
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
-
import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
-
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
5
|
-
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
6
|
-
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
7
|
-
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
8
|
-
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
9
|
-
|
|
10
|
-
import { IVaultRequest, VaultConnector } from '../VaultConnector';
|
|
11
|
-
import crypto from 'crypto';
|
|
12
|
-
import fs from 'fs';
|
|
13
|
-
import * as readlineSync from 'readline-sync';
|
|
14
|
-
|
|
15
|
-
const console = Logger('NullVault');
|
|
16
|
-
export class NullVault extends VaultConnector {
|
|
17
|
-
public name: string = 'NullVault';
|
|
18
|
-
private vaultData: any;
|
|
19
|
-
private index: any;
|
|
20
|
-
private sharedVault: boolean;
|
|
21
|
-
|
|
22
|
-
constructor(protected _settings: any) {
|
|
23
|
-
super(_settings);
|
|
24
|
-
console.warn('NullVault is used : Vault features will not be available');
|
|
25
|
-
}
|
|
26
|
-
|
|
27
|
-
@SecureConnector.AccessControl
|
|
28
|
-
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
29
|
-
console.debug(`Ignored operation:NullVault.get: ${keyId}`);
|
|
30
|
-
return 'NULLKEY';
|
|
31
|
-
}
|
|
32
|
-
|
|
33
|
-
@SecureConnector.AccessControl
|
|
34
|
-
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
35
|
-
console.debug(`Ignored operation:NullVault.exists: ${keyId}`);
|
|
36
|
-
return false;
|
|
37
|
-
}
|
|
38
|
-
|
|
39
|
-
@SecureConnector.AccessControl
|
|
40
|
-
protected async listKeys(acRequest: AccessRequest) {
|
|
41
|
-
console.debug(`Ignored operation:NullVault.listKeys`);
|
|
42
|
-
return [];
|
|
43
|
-
}
|
|
44
|
-
|
|
45
|
-
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
46
|
-
const acl = new ACL();
|
|
47
|
-
|
|
48
|
-
//give just read access by default
|
|
49
|
-
//Cannot write to null vault
|
|
50
|
-
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
51
|
-
|
|
52
|
-
return acl;
|
|
53
|
-
}
|
|
54
|
-
}
|
|
1
|
+
import { ConnectorService } from '@sre/Core/ConnectorsService';
|
|
2
|
+
import { Logger } from '@sre/helpers/Log.helper';
|
|
3
|
+
import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
|
|
4
|
+
import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
|
|
5
|
+
import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
|
|
6
|
+
import { ACL } from '@sre/Security/AccessControl/ACL.class';
|
|
7
|
+
import { SecureConnector } from '@sre/Security/SecureConnector.class';
|
|
8
|
+
import { IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
|
|
9
|
+
|
|
10
|
+
import { IVaultRequest, VaultConnector } from '../VaultConnector';
|
|
11
|
+
import crypto from 'crypto';
|
|
12
|
+
import fs from 'fs';
|
|
13
|
+
import * as readlineSync from 'readline-sync';
|
|
14
|
+
|
|
15
|
+
const console = Logger('NullVault');
|
|
16
|
+
export class NullVault extends VaultConnector {
|
|
17
|
+
public name: string = 'NullVault';
|
|
18
|
+
private vaultData: any;
|
|
19
|
+
private index: any;
|
|
20
|
+
private sharedVault: boolean;
|
|
21
|
+
|
|
22
|
+
constructor(protected _settings: any) {
|
|
23
|
+
super(_settings);
|
|
24
|
+
console.warn('NullVault is used : Vault features will not be available');
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
@SecureConnector.AccessControl
|
|
28
|
+
protected async get(acRequest: AccessRequest, keyId: string) {
|
|
29
|
+
console.debug(`Ignored operation:NullVault.get: ${keyId}`);
|
|
30
|
+
return 'NULLKEY';
|
|
31
|
+
}
|
|
32
|
+
|
|
33
|
+
@SecureConnector.AccessControl
|
|
34
|
+
protected async exists(acRequest: AccessRequest, keyId: string) {
|
|
35
|
+
console.debug(`Ignored operation:NullVault.exists: ${keyId}`);
|
|
36
|
+
return false;
|
|
37
|
+
}
|
|
38
|
+
|
|
39
|
+
@SecureConnector.AccessControl
|
|
40
|
+
protected async listKeys(acRequest: AccessRequest) {
|
|
41
|
+
console.debug(`Ignored operation:NullVault.listKeys`);
|
|
42
|
+
return [];
|
|
43
|
+
}
|
|
44
|
+
|
|
45
|
+
public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
|
|
46
|
+
const acl = new ACL();
|
|
47
|
+
|
|
48
|
+
//give just read access by default
|
|
49
|
+
//Cannot write to null vault
|
|
50
|
+
acl.addAccess(candidate.role, candidate.id, TAccessLevel.Read);
|
|
51
|
+
|
|
52
|
+
return acl;
|
|
53
|
+
}
|
|
54
|
+
}
|