@smythos/sre 1.6.8 → 1.6.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (239) hide show
  1. package/CHANGELOG +111 -111
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/bundle-analysis-lazy.html +4949 -0
  5. package/dist/bundle-analysis.html +4949 -0
  6. package/dist/index.js +2 -2
  7. package/dist/index.js.map +1 -1
  8. package/dist/types/Components/Triggers/Gmail.trigger.d.ts +58 -0
  9. package/dist/types/Components/Triggers/GmailTrigger.class.d.ts +44 -0
  10. package/dist/types/Components/Triggers/Trigger.class.d.ts +21 -0
  11. package/dist/types/Components/Triggers/WhatsApp.trigger.d.ts +22 -0
  12. package/dist/types/helpers/AIPerformanceAnalyzer.helper.d.ts +45 -0
  13. package/dist/types/helpers/AIPerformanceCollector.helper.d.ts +111 -0
  14. package/dist/types/subsystems/IO/Storage.service/connectors/AzureBlobStorage.class.d.ts +211 -0
  15. package/dist/types/subsystems/IO/VectorDB.service/connectors/WeaviateVectorDB.class.d.ts +187 -0
  16. package/dist/types/subsystems/PerformanceManager/Performance.service/PerformanceConnector.d.ts +102 -0
  17. package/dist/types/subsystems/PerformanceManager/Performance.service/connectors/LocalPerformanceConnector.class.d.ts +100 -0
  18. package/dist/types/subsystems/PerformanceManager/Performance.service/index.d.ts +22 -0
  19. package/dist/types/subsystems/Security/Credentials/Credentials.class.d.ts +2 -0
  20. package/dist/types/subsystems/Security/Credentials/ManagedOAuth2Credentials.class.d.ts +18 -0
  21. package/dist/types/subsystems/Security/Credentials/OAuth2Credentials.class.d.ts +14 -0
  22. package/dist/types/types/Performance.types.d.ts +468 -0
  23. package/dist/types/utils/package-manager.utils.d.ts +26 -0
  24. package/package.json +1 -1
  25. package/src/Components/APICall/APICall.class.ts +161 -161
  26. package/src/Components/APICall/AccessTokenManager.ts +166 -166
  27. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  28. package/src/Components/APICall/OAuth.helper.ts +447 -447
  29. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  30. package/src/Components/APICall/parseData.ts +167 -167
  31. package/src/Components/APICall/parseHeaders.ts +41 -41
  32. package/src/Components/APICall/parseProxy.ts +68 -68
  33. package/src/Components/APICall/parseUrl.ts +91 -91
  34. package/src/Components/APIEndpoint.class.ts +234 -234
  35. package/src/Components/APIOutput.class.ts +58 -58
  36. package/src/Components/AgentPlugin.class.ts +102 -102
  37. package/src/Components/Async.class.ts +155 -155
  38. package/src/Components/Await.class.ts +90 -90
  39. package/src/Components/Classifier.class.ts +158 -158
  40. package/src/Components/Component.class.ts +147 -147
  41. package/src/Components/ComponentHost.class.ts +38 -38
  42. package/src/Components/DataSourceCleaner.class.ts +92 -92
  43. package/src/Components/DataSourceIndexer.class.ts +181 -181
  44. package/src/Components/DataSourceLookup.class.ts +161 -161
  45. package/src/Components/ECMASandbox.class.ts +72 -72
  46. package/src/Components/FEncDec.class.ts +29 -29
  47. package/src/Components/FHash.class.ts +33 -33
  48. package/src/Components/FSign.class.ts +80 -80
  49. package/src/Components/FSleep.class.ts +25 -25
  50. package/src/Components/FTimestamp.class.ts +66 -66
  51. package/src/Components/FileStore.class.ts +78 -78
  52. package/src/Components/ForEach.class.ts +97 -97
  53. package/src/Components/GPTPlugin.class.ts +70 -70
  54. package/src/Components/GenAILLM.class.ts +586 -586
  55. package/src/Components/HuggingFace.class.ts +313 -313
  56. package/src/Components/Image/imageSettings.config.ts +70 -70
  57. package/src/Components/ImageGenerator.class.ts +483 -483
  58. package/src/Components/JSONFilter.class.ts +54 -54
  59. package/src/Components/LLMAssistant.class.ts +213 -213
  60. package/src/Components/LogicAND.class.ts +28 -28
  61. package/src/Components/LogicAtLeast.class.ts +85 -85
  62. package/src/Components/LogicAtMost.class.ts +86 -86
  63. package/src/Components/LogicOR.class.ts +29 -29
  64. package/src/Components/LogicXOR.class.ts +34 -34
  65. package/src/Components/MCPClient.class.ts +137 -137
  66. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  67. package/src/Components/MemoryReadKeyVal.class.ts +67 -67
  68. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  69. package/src/Components/MemoryWriteObject.class.ts +97 -97
  70. package/src/Components/MultimodalLLM.class.ts +128 -128
  71. package/src/Components/OpenAPI.class.ts +72 -72
  72. package/src/Components/PromptGenerator.class.ts +122 -122
  73. package/src/Components/ScrapflyWebScrape.class.ts +183 -183
  74. package/src/Components/ServerlessCode.class.ts +123 -123
  75. package/src/Components/TavilyWebSearch.class.ts +103 -103
  76. package/src/Components/VisionLLM.class.ts +104 -104
  77. package/src/Components/ZapierAction.class.ts +127 -127
  78. package/src/Components/index.ts +97 -97
  79. package/src/Core/AgentProcess.helper.ts +240 -240
  80. package/src/Core/Connector.class.ts +123 -123
  81. package/src/Core/ConnectorsService.ts +197 -197
  82. package/src/Core/DummyConnector.ts +49 -49
  83. package/src/Core/HookService.ts +105 -105
  84. package/src/Core/SmythRuntime.class.ts +241 -241
  85. package/src/Core/SystemEvents.ts +16 -16
  86. package/src/Core/boot.ts +56 -56
  87. package/src/config.ts +15 -15
  88. package/src/constants.ts +126 -126
  89. package/src/data/hugging-face.params.json +579 -579
  90. package/src/helpers/AWSLambdaCode.helper.ts +624 -624
  91. package/src/helpers/BinaryInput.helper.ts +331 -331
  92. package/src/helpers/Conversation.helper.ts +1157 -1157
  93. package/src/helpers/ECMASandbox.helper.ts +64 -64
  94. package/src/helpers/JsonContent.helper.ts +97 -97
  95. package/src/helpers/LocalCache.helper.ts +97 -97
  96. package/src/helpers/Log.helper.ts +274 -274
  97. package/src/helpers/OpenApiParser.helper.ts +150 -150
  98. package/src/helpers/S3Cache.helper.ts +147 -147
  99. package/src/helpers/SmythURI.helper.ts +5 -5
  100. package/src/helpers/Sysconfig.helper.ts +95 -95
  101. package/src/helpers/TemplateString.helper.ts +243 -243
  102. package/src/helpers/TypeChecker.helper.ts +329 -329
  103. package/src/index.ts +3 -3
  104. package/src/index.ts.bak +3 -3
  105. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  106. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  107. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  108. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  109. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +145 -145
  110. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  111. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  112. package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -301
  113. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  114. package/src/subsystems/AgentManager/AgentRuntime.class.ts +557 -557
  115. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  116. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  117. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  118. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  119. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  120. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  121. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  122. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  123. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  124. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +171 -171
  125. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  126. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  127. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  128. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  129. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  130. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  131. package/src/subsystems/IO/Log.service/index.ts +13 -13
  132. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  133. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  134. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  135. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  136. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  137. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  138. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  139. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  140. package/src/subsystems/IO/Router.service/index.ts +11 -11
  141. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +488 -488
  142. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  143. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  144. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  145. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  146. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  147. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +465 -465
  148. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +387 -387
  149. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +408 -408
  150. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  151. package/src/subsystems/IO/VectorDB.service/embed/GoogleEmbedding.ts +118 -118
  152. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  153. package/src/subsystems/IO/VectorDB.service/embed/index.ts +26 -26
  154. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  155. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  156. package/src/subsystems/LLMManager/LLM.inference.ts +345 -345
  157. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +492 -492
  158. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  159. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +666 -666
  160. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +407 -407
  161. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +92 -92
  162. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +983 -983
  163. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +319 -319
  164. package/src/subsystems/LLMManager/LLM.service/connectors/Ollama.class.ts +361 -361
  165. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +257 -257
  166. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +430 -430
  167. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +503 -503
  168. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
  169. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  170. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  171. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
  172. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
  173. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  174. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
  175. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
  176. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +478 -478
  177. package/src/subsystems/LLMManager/LLM.service/index.ts +47 -47
  178. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +303 -303
  179. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +280 -271
  180. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  181. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  182. package/src/subsystems/LLMManager/models.ts +2540 -2540
  183. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  184. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  185. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  186. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +214 -214
  187. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  188. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  189. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  190. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  191. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  192. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  193. package/src/subsystems/MemoryManager/RuntimeContext.ts +277 -277
  194. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  195. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  196. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  197. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  198. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  199. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +170 -170
  200. package/src/subsystems/Security/Account.service/connectors/MySQLAccount.class.ts +76 -76
  201. package/src/subsystems/Security/Account.service/index.ts +14 -14
  202. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  203. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  204. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  205. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  206. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  207. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  208. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  209. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  210. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  211. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  212. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  213. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  214. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  215. package/src/types/ACL.types.ts +104 -104
  216. package/src/types/AWS.types.ts +10 -10
  217. package/src/types/Agent.types.ts +61 -61
  218. package/src/types/AgentLogger.types.ts +17 -17
  219. package/src/types/Cache.types.ts +1 -1
  220. package/src/types/Common.types.ts +2 -2
  221. package/src/types/LLM.types.ts +520 -520
  222. package/src/types/Redis.types.ts +8 -8
  223. package/src/types/SRE.types.ts +64 -64
  224. package/src/types/Security.types.ts +14 -14
  225. package/src/types/Storage.types.ts +5 -5
  226. package/src/types/VectorDB.types.ts +86 -86
  227. package/src/utils/base64.utils.ts +275 -275
  228. package/src/utils/cli.utils.ts +68 -68
  229. package/src/utils/data.utils.ts +322 -322
  230. package/src/utils/date-time.utils.ts +22 -22
  231. package/src/utils/general.utils.ts +238 -238
  232. package/src/utils/index.ts +12 -12
  233. package/src/utils/lazy-client.ts +261 -261
  234. package/src/utils/numbers.utils.ts +13 -13
  235. package/src/utils/oauth.utils.ts +35 -35
  236. package/src/utils/string.utils.ts +414 -414
  237. package/src/utils/url.utils.ts +19 -19
  238. package/src/utils/validation.utils.ts +74 -74
  239. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
@@ -1,488 +1,488 @@
1
- import { ConnectorService } from '@sre/Core/ConnectorsService';
2
- import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
3
- import { ACL } from '@sre/Security/AccessControl/ACL.class';
4
- import { DEFAULT_TEAM_ID, IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
5
- import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
6
- import { getMimeType } from '@sre/utils';
7
- import mime from 'mime';
8
- import { Readable } from 'stream';
9
- import { StorageConnector } from './StorageConnector';
10
- import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
11
- import { CacheConnector } from '@sre/MemoryManager/Cache.service/CacheConnector';
12
- import crypto from 'crypto';
13
- import { JSONContentHelper } from '@sre/helpers/JsonContent.helper';
14
- import { SystemEvents } from '@sre/Core/SystemEvents';
15
-
16
- export type TSmythFSURI = {
17
- hash: string;
18
- team: string;
19
- path: string;
20
- };
21
-
22
- // SystemEvents.on('SRE:Booted', () => {
23
- // const router = ConnectorService.getRouterConnector();
24
- // if (router && router?.get instanceof Function) {
25
- // router.get('/_temp/:uid', SmythFS.Instance.serveTempContent.bind(SmythFS.Instance));
26
- // router.get('/storage/:file_id', SmythFS.Instance.serveResource.bind(SmythFS.Instance));
27
- // }
28
- // });
29
-
30
- export class SmythFS {
31
- private hash: string; // Store the instance hash for URL generation
32
-
33
- static instances: any = {};
34
-
35
- // Centralized hash generation to ensure consistency
36
- private static generateInstanceHash(storageName: string, cacheName: string): string {
37
- const instanceProps = `${storageName}:${cacheName}`;
38
- return crypto.createHash('sha256').update(instanceProps).digest('hex').substring(0, 6);
39
- }
40
-
41
- // Default singleton instance (most common use case)
42
- public static get Instance(): SmythFS {
43
- return SmythFS.getInstance(); // Uses default empty string providers
44
- }
45
-
46
- // Multiton pattern - get instance based on storage and cache provider combination
47
- public static getInstance(storageProvider: string | StorageConnector = '', cacheProvider: string | CacheConnector = ''): SmythFS {
48
- // First get the actual connector names to calculate the correct hash
49
- const storage = storageProvider instanceof StorageConnector ? storageProvider : ConnectorService.getStorageConnector(storageProvider);
50
- const cache = cacheProvider instanceof CacheConnector ? cacheProvider : ConnectorService.getCacheConnector(cacheProvider);
51
- const hash = SmythFS.generateInstanceHash(storage.name, cache.name);
52
-
53
- if (SmythFS.instances[hash]) {
54
- return SmythFS.instances[hash];
55
- }
56
-
57
- const instance = new SmythFS(storage, cache);
58
-
59
- //register routes
60
- const router = ConnectorService.getRouterConnector();
61
- if (router && router?.get instanceof Function) {
62
- router.get(`/_temp/${hash}/:uid`, instance.serveTempContent.bind(instance));
63
- router.get(`/storage/${hash}/:file_id`, instance.serveResource.bind(instance));
64
- }
65
-
66
- SmythFS.instances[hash] = instance;
67
- return instance;
68
- }
69
-
70
- private constructor(private storage: StorageConnector, private cache: CacheConnector) {
71
- //SmythFS cannot be used without SRE
72
- // if (!ConnectorService.ready) {
73
- // throw new Error('SRE not available');
74
- // }
75
-
76
- // Use centralized hash generation method
77
- this.hash = SmythFS.generateInstanceHash(this.storage.name, this.cache.name);
78
- }
79
-
80
- // public getStoragePath(uri: string) {
81
- // const smythURI = this.URIParser(uri);
82
- // if (!smythURI) throw new Error('Invalid Resource URI');
83
- // return `teams/${smythURI.team}${smythURI.path}`;
84
- // }
85
-
86
- public getBaseUri(candidate: IAccessCandidate) {
87
- const uri = `smythfs://${candidate.id}.${candidate.role}`;
88
-
89
- return uri;
90
- }
91
-
92
- /**
93
- * Reads a resource from smyth file system
94
- * @param uri smythfs:// uri
95
- * @param candidate
96
- * @returns
97
- */
98
- public async read(uri: string, candidate?: IAccessCandidate): Promise<Buffer> {
99
- const smythURI = await this.URIParser(uri);
100
- if (!smythURI) throw new Error('Invalid Resource URI');
101
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
102
-
103
- const accountConnector = ConnectorService.getAccountConnector();
104
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
105
- if (!isMember) throw new Error('Access Denied');
106
-
107
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
108
-
109
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
110
-
111
- const data = await this.storage.requester(_candidate).read(resourceId);
112
-
113
- return data ? this.toBuffer(data) : null;
114
- }
115
-
116
- public async getMetadata(uri: string, candidate?: IAccessCandidate) {
117
- const smythURI = await this.URIParser(uri);
118
- if (!smythURI) throw new Error('Invalid Resource URI');
119
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
120
-
121
- const accountConnector = ConnectorService.getAccountConnector();
122
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
123
- if (!isMember) throw new Error('Access Denied');
124
-
125
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
126
-
127
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
128
-
129
- return await this.storage.requester(_candidate).getMetadata(resourceId);
130
- }
131
-
132
- public async write(uri: string, data: StorageData, candidate?: IAccessCandidate, metadata?: StorageMetadata, ttl?: number) {
133
- const smythURI = await this.URIParser(uri);
134
- if (!smythURI) throw new Error('Invalid Resource URI');
135
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
136
-
137
- const accountConnector = ConnectorService.getAccountConnector();
138
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
139
- if (!isMember) throw new Error('Access Denied');
140
-
141
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
142
- //when we write a file, it does not exist we need to explicitly provide a resource team in order to have access rights set properly
143
-
144
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
145
-
146
- let acl: ACL;
147
-
148
- //give team read access if this is a team resource and not the default team
149
- //because the default team is a fallback used when no team is specified or account connector is not available
150
- //in that case we need to only allow the creator to access the resource
151
- if (smythURI.team && smythURI.team !== DEFAULT_TEAM_ID) {
152
- acl = new ACL()
153
- //.addAccess(candidate.role, candidate.id, TAccessLevel.Owner) // creator is owner
154
- .addAccess(TAccessRole.Team, smythURI.team, TAccessLevel.Read).ACL as ACL; // team has read access
155
- }
156
-
157
- if (!metadata) metadata = {};
158
- if (!metadata?.ContentType) {
159
- metadata.ContentType = await getMimeType(data);
160
- if (!metadata.ContentType) {
161
- const ext: any = uri.split('.').pop();
162
- if (ext) {
163
- metadata.ContentType = mime.getType(ext) || 'application/octet-stream';
164
- }
165
- }
166
- }
167
- await this.storage.requester(_candidate).write(resourceId, data, acl, metadata);
168
-
169
- if (ttl) {
170
- await this.storage.requester(_candidate).expire(resourceId, ttl);
171
- }
172
- }
173
-
174
- public async delete(uri: string, candidate?: IAccessCandidate) {
175
- const smythURI = await this.URIParser(uri);
176
- if (!smythURI) throw new Error('Invalid Resource URI');
177
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
178
-
179
- const accountConnector = ConnectorService.getAccountConnector();
180
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
181
- if (!isMember) throw new Error('Access Denied');
182
-
183
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
184
-
185
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
186
-
187
- await this.storage.requester(_candidate).delete(resourceId);
188
- }
189
-
190
- //TODO: should we require access token here ?
191
- public async exists(uri: string, candidate?: IAccessCandidate) {
192
- const smythURI = await this.URIParser(uri);
193
- if (!smythURI) throw new Error('Invalid Resource URI');
194
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
195
-
196
- const accountConnector = ConnectorService.getAccountConnector();
197
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
198
- if (!isMember) throw new Error('Access Denied');
199
-
200
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
201
-
202
- //in order to get a consistent access check in case of inexisting resource, we need to explicitly set a default resource team
203
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
204
-
205
- return await this.storage.requester(_candidate).exists(resourceId);
206
- }
207
-
208
- //#region Temp URL (mainly used for returning agent output to user for temporary access)
209
- public async genTempUrl(uri: string, candidate?: IAccessCandidate, ttlSeconds: number = 3600) {
210
- const smythURI = await this.URIParser(uri);
211
- if (!smythURI) throw new Error('Invalid Resource URI');
212
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
213
-
214
- const accountConnector = ConnectorService.getAccountConnector();
215
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
216
- if (!isMember) throw new Error('Access Denied');
217
-
218
- const exists = await this.exists(uri, candidate);
219
- if (!exists) throw new Error('Resource does not exist');
220
-
221
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
222
-
223
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
224
- const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
225
-
226
- const uid = crypto.randomUUID();
227
- const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
228
-
229
- await this.cache.requester(tempUserCandidate).set(
230
- `pub_url:${uid}`,
231
- JSON.stringify({
232
- accessCandidate: _candidate,
233
- uri,
234
- contentType: resourceMetadata?.ContentType,
235
- }),
236
- undefined,
237
- undefined,
238
- ttlSeconds
239
- ); // 1 hour
240
-
241
- const baseUrl = ConnectorService.getRouterConnector().baseUrl;
242
- return `${baseUrl}/_temp/${this.hash}/${uid}`;
243
- }
244
-
245
- public async destroyTempUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {
246
- // Parse URL with new format: /_temp/{hash}/{uid}
247
- const tempPath = url.split('/_temp/')[1];
248
- if (!tempPath) throw new Error('Invalid Temp URL format');
249
-
250
- const uid = tempPath.split('/')[1]?.split('?')[0]; // get uid and remove query params
251
- if (!uid) throw new Error('Invalid Temp URL format');
252
-
253
- let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
254
- if (!cacheVal) throw new Error('Invalid Temp URL');
255
- cacheVal = JSONContentHelper.create(cacheVal).tryParse();
256
- await this.cache.requester(AccessCandidate.user(`system-${uid}`)).delete(`pub_url:${uid}`);
257
- if (delResource) {
258
- await this.delete(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
259
- }
260
- }
261
-
262
- public async serveTempContent(req: any, res: any) {
263
- try {
264
- const { uid } = req.params;
265
- let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
266
- if (!cacheVal) {
267
- res.writeHead(404, { 'Content-Type': 'text/plain' });
268
- res.end('Invalid Temp URL');
269
- return;
270
- }
271
- cacheVal = JSONContentHelper.create(cacheVal).tryParse();
272
- const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
273
-
274
- const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
275
-
276
- const contentType = cacheVal.contentType || 'application/octet-stream';
277
-
278
- res.writeHead(200, {
279
- 'Content-Type': contentType,
280
- 'Content-Disposition': 'inline',
281
- 'Content-Length': contentBuffer.length,
282
- });
283
-
284
- res.end(contentBuffer);
285
- } catch (error) {
286
- console.error('Error serving temp content:', error);
287
- res.writeHead(500, { 'Content-Type': 'text/plain' });
288
- res.end('Internal Server Error');
289
- }
290
- }
291
- //#endregion
292
-
293
- //#region Resource Serving
294
-
295
- /**
296
- * Generates a public url for the resource
297
- * @param uri
298
- * @param candidate
299
- * @returns
300
- */
301
- public async genResourceUrl(uri: string, candidate?: IAccessCandidate) {
302
- const smythURI = await this.URIParser(uri);
303
- if (!smythURI) throw new Error('Invalid Resource URI');
304
- candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
305
-
306
- const accountConnector = ConnectorService.getAccountConnector();
307
- const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
308
- if (!isMember) throw new Error('Access Denied');
309
-
310
- const exists = await this.exists(uri, candidate);
311
- if (!exists) throw new Error('Resource does not exist');
312
-
313
- const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
314
- if (_candidate.role !== TAccessRole.Agent) {
315
- throw new Error('Only agents can generate resource urls');
316
- }
317
- const agentId = _candidate.id;
318
-
319
- const resourceId = `teams/${smythURI.team}${smythURI.path}`;
320
- const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
321
-
322
- const uid = crypto.randomUUID(); // maybe instead of a random uuid, u can use the resource
323
- const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
324
-
325
- await this.cache.requester(tempUserCandidate).set(
326
- `storage_url-${uid}`,
327
- JSON.stringify({
328
- accessCandidate: _candidate,
329
- uri,
330
- contentType: resourceMetadata?.ContentType,
331
- }),
332
- undefined,
333
- undefined
334
- // 3600 // 1 hour
335
- );
336
-
337
- const contentType = resourceMetadata?.ContentType;
338
- const ext = contentType ? mime.getExtension(contentType) : undefined;
339
-
340
- // get the agent domain
341
- const agentDataConnector = ConnectorService.getAgentDataConnector();
342
- const baseUrl = ConnectorService.getRouterConnector().baseUrl;
343
- const domain = agentDataConnector.getAgentConfig(agentId)?.agentStageDomain
344
- ? `https://${agentDataConnector.getAgentConfig(agentId).agentStageDomain}`
345
- : baseUrl;
346
-
347
- return `${domain}/storage/${this.hash}/${uid}${ext ? `.${ext}` : ''}`;
348
- }
349
- public async destroyResourceUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {}
350
- public async serveResource(req: any, res: any) {
351
- try {
352
- const { file_id } = req.params;
353
- const [uid, extention] = file_id.split('.');
354
- let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`storage_url-${uid}`);
355
- if (!cacheVal) {
356
- res.writeHead(404, { 'Content-Type': 'text/plain' });
357
- res.end('Invalid Resource URL');
358
- return;
359
- }
360
- cacheVal = JSONContentHelper.create(cacheVal).tryParse();
361
- const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
362
-
363
- const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
364
-
365
- const contentType = cacheVal.contentType || 'application/octet-stream';
366
-
367
- res.writeHead(200, {
368
- 'Content-Type': contentType,
369
- 'Content-Disposition': 'inline',
370
- 'Content-Length': contentBuffer.length,
371
- });
372
-
373
- res.end(contentBuffer);
374
- } catch (error) {
375
- console.error('Error serving storage resource content:', error);
376
- res.writeHead(500, { 'Content-Type': 'text/plain' });
377
- res.end('Internal Server Error');
378
- }
379
- }
380
- //#endregion
381
-
382
- private async URIParser(uri: string) {
383
- const parts = uri.split('://');
384
- if (parts.length !== 2) return undefined;
385
- if (parts[0].toLowerCase() !== 'smythfs') return undefined;
386
- const parsed = this.CaseSensitiveURL(`http://${parts[1]}`);
387
- const tld = parsed.hostname.split('.').pop();
388
- if (tld !== 'team' && tld !== 'user' && tld !== 'agent' && tld !== 'smyth') throw new Error('Invalid Resource URI');
389
- let team = tld === 'team' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
390
- const user = tld === 'user' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
391
- const agent = tld === 'agent' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
392
- const smyth = tld === 'smyth' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
393
-
394
- let basePath = '';
395
- if (!team) {
396
- let candidate: IAccessCandidate;
397
- if (user) {
398
- candidate = AccessCandidate.user(user);
399
- basePath = '.user/' + user;
400
- } else if (agent) {
401
- candidate = AccessCandidate.agent(agent);
402
- basePath = '.agent/' + agent;
403
- }
404
-
405
- if (candidate) {
406
- team = await ConnectorService.getAccountConnector().getCandidateTeam(candidate);
407
- }
408
- }
409
-
410
- // create a default candidate based on the uri
411
- let defaultCandidate: IAccessCandidate;
412
-
413
- if (team) {
414
- defaultCandidate = AccessCandidate.team(team);
415
- } else if (user) {
416
- defaultCandidate = AccessCandidate.user(user);
417
- } else if (agent) {
418
- defaultCandidate = AccessCandidate.agent(agent);
419
- }
420
-
421
- return {
422
- hash: parsed.hash,
423
- team,
424
- user,
425
- agent,
426
- smyth,
427
- defaultCandidate,
428
- path: basePath + parsed.pathname,
429
- };
430
- }
431
-
432
- private CaseSensitiveURL(urlString: string) {
433
- // First, extract the original hostname for case preservation
434
- const parts = urlString.split('://');
435
- if (parts.length !== 2) return null;
436
-
437
- const afterProtocol = parts[1];
438
- const hostnameEnd = Math.min(
439
- ...[afterProtocol.indexOf('/'), afterProtocol.indexOf('?'), afterProtocol.indexOf('#'), afterProtocol.length].filter((i) => i >= 0)
440
- );
441
-
442
- const originalHostnamePart = afterProtocol.substring(0, hostnameEnd);
443
- const [originalHostname, originalPort] = originalHostnamePart.split(':');
444
-
445
- // Use URL constructor for robust parsing of everything else
446
- const parsed = new URL(urlString);
447
-
448
- // Explicitly copy URL properties since they're not enumerable
449
- return {
450
- protocol: parsed.protocol,
451
- hostname: originalHostname, // Case-sensitive hostname
452
- port: parsed.port,
453
- pathname: parsed.pathname,
454
- search: parsed.search,
455
- searchParams: parsed.searchParams,
456
- hash: parsed.hash,
457
- href: parsed.href,
458
- origin: parsed.origin,
459
- host: originalHostname + (parsed.port ? `:${parsed.port}` : ''),
460
- originalPort: originalPort || null,
461
- };
462
- }
463
-
464
- private async toBuffer(data: StorageData): Promise<Buffer> {
465
- if (Buffer.isBuffer(data)) {
466
- return data;
467
- } else if (typeof data === 'string') {
468
- return Buffer.from(data, 'utf-8');
469
- } else if (data instanceof Uint8Array) {
470
- return Buffer.from(data);
471
- } else if (data instanceof Readable) {
472
- return new Promise<Buffer>((resolve, reject) => {
473
- const chunks: Buffer[] = [];
474
- data.on('data', (chunk) => {
475
- chunks.push(Buffer.isBuffer(chunk) ? chunk : Buffer.from(chunk));
476
- });
477
- data.on('end', () => {
478
- resolve(Buffer.concat(chunks));
479
- });
480
- data.on('error', (err) => {
481
- reject(err);
482
- });
483
- });
484
- } else {
485
- throw new Error('Unsupported data type');
486
- }
487
- }
488
- }
1
+ import { ConnectorService } from '@sre/Core/ConnectorsService';
2
+ import { AccessCandidate } from '@sre/Security/AccessControl/AccessCandidate.class';
3
+ import { ACL } from '@sre/Security/AccessControl/ACL.class';
4
+ import { DEFAULT_TEAM_ID, IAccessCandidate, TAccessLevel, TAccessRole } from '@sre/types/ACL.types';
5
+ import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
6
+ import { getMimeType } from '@sre/utils';
7
+ import mime from 'mime';
8
+ import { Readable } from 'stream';
9
+ import { StorageConnector } from './StorageConnector';
10
+ import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
11
+ import { CacheConnector } from '@sre/MemoryManager/Cache.service/CacheConnector';
12
+ import crypto from 'crypto';
13
+ import { JSONContentHelper } from '@sre/helpers/JsonContent.helper';
14
+ import { SystemEvents } from '@sre/Core/SystemEvents';
15
+
16
+ export type TSmythFSURI = {
17
+ hash: string;
18
+ team: string;
19
+ path: string;
20
+ };
21
+
22
+ // SystemEvents.on('SRE:Booted', () => {
23
+ // const router = ConnectorService.getRouterConnector();
24
+ // if (router && router?.get instanceof Function) {
25
+ // router.get('/_temp/:uid', SmythFS.Instance.serveTempContent.bind(SmythFS.Instance));
26
+ // router.get('/storage/:file_id', SmythFS.Instance.serveResource.bind(SmythFS.Instance));
27
+ // }
28
+ // });
29
+
30
+ export class SmythFS {
31
+ private hash: string; // Store the instance hash for URL generation
32
+
33
+ static instances: any = {};
34
+
35
+ // Centralized hash generation to ensure consistency
36
+ private static generateInstanceHash(storageName: string, cacheName: string): string {
37
+ const instanceProps = `${storageName}:${cacheName}`;
38
+ return crypto.createHash('sha256').update(instanceProps).digest('hex').substring(0, 6);
39
+ }
40
+
41
+ // Default singleton instance (most common use case)
42
+ public static get Instance(): SmythFS {
43
+ return SmythFS.getInstance(); // Uses default empty string providers
44
+ }
45
+
46
+ // Multiton pattern - get instance based on storage and cache provider combination
47
+ public static getInstance(storageProvider: string | StorageConnector = '', cacheProvider: string | CacheConnector = ''): SmythFS {
48
+ // First get the actual connector names to calculate the correct hash
49
+ const storage = storageProvider instanceof StorageConnector ? storageProvider : ConnectorService.getStorageConnector(storageProvider);
50
+ const cache = cacheProvider instanceof CacheConnector ? cacheProvider : ConnectorService.getCacheConnector(cacheProvider);
51
+ const hash = SmythFS.generateInstanceHash(storage.name, cache.name);
52
+
53
+ if (SmythFS.instances[hash]) {
54
+ return SmythFS.instances[hash];
55
+ }
56
+
57
+ const instance = new SmythFS(storage, cache);
58
+
59
+ //register routes
60
+ const router = ConnectorService.getRouterConnector();
61
+ if (router && router?.get instanceof Function) {
62
+ router.get(`/_temp/${hash}/:uid`, instance.serveTempContent.bind(instance));
63
+ router.get(`/storage/${hash}/:file_id`, instance.serveResource.bind(instance));
64
+ }
65
+
66
+ SmythFS.instances[hash] = instance;
67
+ return instance;
68
+ }
69
+
70
+ private constructor(private storage: StorageConnector, private cache: CacheConnector) {
71
+ //SmythFS cannot be used without SRE
72
+ // if (!ConnectorService.ready) {
73
+ // throw new Error('SRE not available');
74
+ // }
75
+
76
+ // Use centralized hash generation method
77
+ this.hash = SmythFS.generateInstanceHash(this.storage.name, this.cache.name);
78
+ }
79
+
80
+ // public getStoragePath(uri: string) {
81
+ // const smythURI = this.URIParser(uri);
82
+ // if (!smythURI) throw new Error('Invalid Resource URI');
83
+ // return `teams/${smythURI.team}${smythURI.path}`;
84
+ // }
85
+
86
+ public getBaseUri(candidate: IAccessCandidate) {
87
+ const uri = `smythfs://${candidate.id}.${candidate.role}`;
88
+
89
+ return uri;
90
+ }
91
+
92
+ /**
93
+ * Reads a resource from smyth file system
94
+ * @param uri smythfs:// uri
95
+ * @param candidate
96
+ * @returns
97
+ */
98
+ public async read(uri: string, candidate?: IAccessCandidate): Promise<Buffer> {
99
+ const smythURI = await this.URIParser(uri);
100
+ if (!smythURI) throw new Error('Invalid Resource URI');
101
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
102
+
103
+ const accountConnector = ConnectorService.getAccountConnector();
104
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
105
+ if (!isMember) throw new Error('Access Denied');
106
+
107
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
108
+
109
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
110
+
111
+ const data = await this.storage.requester(_candidate).read(resourceId);
112
+
113
+ return data ? this.toBuffer(data) : null;
114
+ }
115
+
116
+ public async getMetadata(uri: string, candidate?: IAccessCandidate) {
117
+ const smythURI = await this.URIParser(uri);
118
+ if (!smythURI) throw new Error('Invalid Resource URI');
119
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
120
+
121
+ const accountConnector = ConnectorService.getAccountConnector();
122
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
123
+ if (!isMember) throw new Error('Access Denied');
124
+
125
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
126
+
127
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
128
+
129
+ return await this.storage.requester(_candidate).getMetadata(resourceId);
130
+ }
131
+
132
+ public async write(uri: string, data: StorageData, candidate?: IAccessCandidate, metadata?: StorageMetadata, ttl?: number) {
133
+ const smythURI = await this.URIParser(uri);
134
+ if (!smythURI) throw new Error('Invalid Resource URI');
135
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
136
+
137
+ const accountConnector = ConnectorService.getAccountConnector();
138
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
139
+ if (!isMember) throw new Error('Access Denied');
140
+
141
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
142
+ //when we write a file, it does not exist we need to explicitly provide a resource team in order to have access rights set properly
143
+
144
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
145
+
146
+ let acl: ACL;
147
+
148
+ //give team read access if this is a team resource and not the default team
149
+ //because the default team is a fallback used when no team is specified or account connector is not available
150
+ //in that case we need to only allow the creator to access the resource
151
+ if (smythURI.team && smythURI.team !== DEFAULT_TEAM_ID) {
152
+ acl = new ACL()
153
+ //.addAccess(candidate.role, candidate.id, TAccessLevel.Owner) // creator is owner
154
+ .addAccess(TAccessRole.Team, smythURI.team, TAccessLevel.Read).ACL as ACL; // team has read access
155
+ }
156
+
157
+ if (!metadata) metadata = {};
158
+ if (!metadata?.ContentType) {
159
+ metadata.ContentType = await getMimeType(data);
160
+ if (!metadata.ContentType) {
161
+ const ext: any = uri.split('.').pop();
162
+ if (ext) {
163
+ metadata.ContentType = mime.getType(ext) || 'application/octet-stream';
164
+ }
165
+ }
166
+ }
167
+ await this.storage.requester(_candidate).write(resourceId, data, acl, metadata);
168
+
169
+ if (ttl) {
170
+ await this.storage.requester(_candidate).expire(resourceId, ttl);
171
+ }
172
+ }
173
+
174
+ public async delete(uri: string, candidate?: IAccessCandidate) {
175
+ const smythURI = await this.URIParser(uri);
176
+ if (!smythURI) throw new Error('Invalid Resource URI');
177
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
178
+
179
+ const accountConnector = ConnectorService.getAccountConnector();
180
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
181
+ if (!isMember) throw new Error('Access Denied');
182
+
183
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
184
+
185
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
186
+
187
+ await this.storage.requester(_candidate).delete(resourceId);
188
+ }
189
+
190
+ //TODO: should we require access token here ?
191
+ public async exists(uri: string, candidate?: IAccessCandidate) {
192
+ const smythURI = await this.URIParser(uri);
193
+ if (!smythURI) throw new Error('Invalid Resource URI');
194
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
195
+
196
+ const accountConnector = ConnectorService.getAccountConnector();
197
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
198
+ if (!isMember) throw new Error('Access Denied');
199
+
200
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
201
+
202
+ //in order to get a consistent access check in case of inexisting resource, we need to explicitly set a default resource team
203
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
204
+
205
+ return await this.storage.requester(_candidate).exists(resourceId);
206
+ }
207
+
208
+ //#region Temp URL (mainly used for returning agent output to user for temporary access)
209
+ public async genTempUrl(uri: string, candidate?: IAccessCandidate, ttlSeconds: number = 3600) {
210
+ const smythURI = await this.URIParser(uri);
211
+ if (!smythURI) throw new Error('Invalid Resource URI');
212
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
213
+
214
+ const accountConnector = ConnectorService.getAccountConnector();
215
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
216
+ if (!isMember) throw new Error('Access Denied');
217
+
218
+ const exists = await this.exists(uri, candidate);
219
+ if (!exists) throw new Error('Resource does not exist');
220
+
221
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
222
+
223
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
224
+ const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
225
+
226
+ const uid = crypto.randomUUID();
227
+ const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
228
+
229
+ await this.cache.requester(tempUserCandidate).set(
230
+ `pub_url:${uid}`,
231
+ JSON.stringify({
232
+ accessCandidate: _candidate,
233
+ uri,
234
+ contentType: resourceMetadata?.ContentType,
235
+ }),
236
+ undefined,
237
+ undefined,
238
+ ttlSeconds
239
+ ); // 1 hour
240
+
241
+ const baseUrl = ConnectorService.getRouterConnector().baseUrl;
242
+ return `${baseUrl}/_temp/${this.hash}/${uid}`;
243
+ }
244
+
245
+ public async destroyTempUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {
246
+ // Parse URL with new format: /_temp/{hash}/{uid}
247
+ const tempPath = url.split('/_temp/')[1];
248
+ if (!tempPath) throw new Error('Invalid Temp URL format');
249
+
250
+ const uid = tempPath.split('/')[1]?.split('?')[0]; // get uid and remove query params
251
+ if (!uid) throw new Error('Invalid Temp URL format');
252
+
253
+ let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
254
+ if (!cacheVal) throw new Error('Invalid Temp URL');
255
+ cacheVal = JSONContentHelper.create(cacheVal).tryParse();
256
+ await this.cache.requester(AccessCandidate.user(`system-${uid}`)).delete(`pub_url:${uid}`);
257
+ if (delResource) {
258
+ await this.delete(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
259
+ }
260
+ }
261
+
262
+ public async serveTempContent(req: any, res: any) {
263
+ try {
264
+ const { uid } = req.params;
265
+ let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`pub_url:${uid}`);
266
+ if (!cacheVal) {
267
+ res.writeHead(404, { 'Content-Type': 'text/plain' });
268
+ res.end('Invalid Temp URL');
269
+ return;
270
+ }
271
+ cacheVal = JSONContentHelper.create(cacheVal).tryParse();
272
+ const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
273
+
274
+ const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
275
+
276
+ const contentType = cacheVal.contentType || 'application/octet-stream';
277
+
278
+ res.writeHead(200, {
279
+ 'Content-Type': contentType,
280
+ 'Content-Disposition': 'inline',
281
+ 'Content-Length': contentBuffer.length,
282
+ });
283
+
284
+ res.end(contentBuffer);
285
+ } catch (error) {
286
+ console.error('Error serving temp content:', error);
287
+ res.writeHead(500, { 'Content-Type': 'text/plain' });
288
+ res.end('Internal Server Error');
289
+ }
290
+ }
291
+ //#endregion
292
+
293
+ //#region Resource Serving
294
+
295
+ /**
296
+ * Generates a public url for the resource
297
+ * @param uri
298
+ * @param candidate
299
+ * @returns
300
+ */
301
+ public async genResourceUrl(uri: string, candidate?: IAccessCandidate) {
302
+ const smythURI = await this.URIParser(uri);
303
+ if (!smythURI) throw new Error('Invalid Resource URI');
304
+ candidate = candidate || smythURI.defaultCandidate; //fallback to default candidate if not provided
305
+
306
+ const accountConnector = ConnectorService.getAccountConnector();
307
+ const isMember = await accountConnector.isTeamMember(smythURI.team, candidate);
308
+ if (!isMember) throw new Error('Access Denied');
309
+
310
+ const exists = await this.exists(uri, candidate);
311
+ if (!exists) throw new Error('Resource does not exist');
312
+
313
+ const _candidate = candidate instanceof AccessCandidate ? candidate : new AccessCandidate(candidate);
314
+ if (_candidate.role !== TAccessRole.Agent) {
315
+ throw new Error('Only agents can generate resource urls');
316
+ }
317
+ const agentId = _candidate.id;
318
+
319
+ const resourceId = `teams/${smythURI.team}${smythURI.path}`;
320
+ const resourceMetadata = await this.storage.requester(_candidate).getMetadata(resourceId);
321
+
322
+ const uid = crypto.randomUUID(); // maybe instead of a random uuid, u can use the resource
323
+ const tempUserCandidate = AccessCandidate.user(`system-${uid}`);
324
+
325
+ await this.cache.requester(tempUserCandidate).set(
326
+ `storage_url-${uid}`,
327
+ JSON.stringify({
328
+ accessCandidate: _candidate,
329
+ uri,
330
+ contentType: resourceMetadata?.ContentType,
331
+ }),
332
+ undefined,
333
+ undefined
334
+ // 3600 // 1 hour
335
+ );
336
+
337
+ const contentType = resourceMetadata?.ContentType;
338
+ const ext = contentType ? mime.getExtension(contentType) : undefined;
339
+
340
+ // get the agent domain
341
+ const agentDataConnector = ConnectorService.getAgentDataConnector();
342
+ const baseUrl = ConnectorService.getRouterConnector().baseUrl;
343
+ const domain = agentDataConnector.getAgentConfig(agentId)?.agentStageDomain
344
+ ? `https://${agentDataConnector.getAgentConfig(agentId).agentStageDomain}`
345
+ : baseUrl;
346
+
347
+ return `${domain}/storage/${this.hash}/${uid}${ext ? `.${ext}` : ''}`;
348
+ }
349
+ public async destroyResourceUrl(url: string, { delResource }: { delResource: boolean } = { delResource: false }) {}
350
+ public async serveResource(req: any, res: any) {
351
+ try {
352
+ const { file_id } = req.params;
353
+ const [uid, extention] = file_id.split('.');
354
+ let cacheVal = await this.cache.requester(AccessCandidate.user(`system-${uid}`)).get(`storage_url-${uid}`);
355
+ if (!cacheVal) {
356
+ res.writeHead(404, { 'Content-Type': 'text/plain' });
357
+ res.end('Invalid Resource URL');
358
+ return;
359
+ }
360
+ cacheVal = JSONContentHelper.create(cacheVal).tryParse();
361
+ const content = await this.read(cacheVal.uri, AccessCandidate.clone(cacheVal.accessCandidate));
362
+
363
+ const contentBuffer = Buffer.isBuffer(content) ? content : Buffer.from(content, 'binary');
364
+
365
+ const contentType = cacheVal.contentType || 'application/octet-stream';
366
+
367
+ res.writeHead(200, {
368
+ 'Content-Type': contentType,
369
+ 'Content-Disposition': 'inline',
370
+ 'Content-Length': contentBuffer.length,
371
+ });
372
+
373
+ res.end(contentBuffer);
374
+ } catch (error) {
375
+ console.error('Error serving storage resource content:', error);
376
+ res.writeHead(500, { 'Content-Type': 'text/plain' });
377
+ res.end('Internal Server Error');
378
+ }
379
+ }
380
+ //#endregion
381
+
382
+ private async URIParser(uri: string) {
383
+ const parts = uri.split('://');
384
+ if (parts.length !== 2) return undefined;
385
+ if (parts[0].toLowerCase() !== 'smythfs') return undefined;
386
+ const parsed = this.CaseSensitiveURL(`http://${parts[1]}`);
387
+ const tld = parsed.hostname.split('.').pop();
388
+ if (tld !== 'team' && tld !== 'user' && tld !== 'agent' && tld !== 'smyth') throw new Error('Invalid Resource URI');
389
+ let team = tld === 'team' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
390
+ const user = tld === 'user' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
391
+ const agent = tld === 'agent' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
392
+ const smyth = tld === 'smyth' ? parsed.hostname.replace(`.${tld}`, '') : undefined;
393
+
394
+ let basePath = '';
395
+ if (!team) {
396
+ let candidate: IAccessCandidate;
397
+ if (user) {
398
+ candidate = AccessCandidate.user(user);
399
+ basePath = '.user/' + user;
400
+ } else if (agent) {
401
+ candidate = AccessCandidate.agent(agent);
402
+ basePath = '.agent/' + agent;
403
+ }
404
+
405
+ if (candidate) {
406
+ team = await ConnectorService.getAccountConnector().getCandidateTeam(candidate);
407
+ }
408
+ }
409
+
410
+ // create a default candidate based on the uri
411
+ let defaultCandidate: IAccessCandidate;
412
+
413
+ if (team) {
414
+ defaultCandidate = AccessCandidate.team(team);
415
+ } else if (user) {
416
+ defaultCandidate = AccessCandidate.user(user);
417
+ } else if (agent) {
418
+ defaultCandidate = AccessCandidate.agent(agent);
419
+ }
420
+
421
+ return {
422
+ hash: parsed.hash,
423
+ team,
424
+ user,
425
+ agent,
426
+ smyth,
427
+ defaultCandidate,
428
+ path: basePath + parsed.pathname,
429
+ };
430
+ }
431
+
432
+ private CaseSensitiveURL(urlString: string) {
433
+ // First, extract the original hostname for case preservation
434
+ const parts = urlString.split('://');
435
+ if (parts.length !== 2) return null;
436
+
437
+ const afterProtocol = parts[1];
438
+ const hostnameEnd = Math.min(
439
+ ...[afterProtocol.indexOf('/'), afterProtocol.indexOf('?'), afterProtocol.indexOf('#'), afterProtocol.length].filter((i) => i >= 0)
440
+ );
441
+
442
+ const originalHostnamePart = afterProtocol.substring(0, hostnameEnd);
443
+ const [originalHostname, originalPort] = originalHostnamePart.split(':');
444
+
445
+ // Use URL constructor for robust parsing of everything else
446
+ const parsed = new URL(urlString);
447
+
448
+ // Explicitly copy URL properties since they're not enumerable
449
+ return {
450
+ protocol: parsed.protocol,
451
+ hostname: originalHostname, // Case-sensitive hostname
452
+ port: parsed.port,
453
+ pathname: parsed.pathname,
454
+ search: parsed.search,
455
+ searchParams: parsed.searchParams,
456
+ hash: parsed.hash,
457
+ href: parsed.href,
458
+ origin: parsed.origin,
459
+ host: originalHostname + (parsed.port ? `:${parsed.port}` : ''),
460
+ originalPort: originalPort || null,
461
+ };
462
+ }
463
+
464
+ private async toBuffer(data: StorageData): Promise<Buffer> {
465
+ if (Buffer.isBuffer(data)) {
466
+ return data;
467
+ } else if (typeof data === 'string') {
468
+ return Buffer.from(data, 'utf-8');
469
+ } else if (data instanceof Uint8Array) {
470
+ return Buffer.from(data);
471
+ } else if (data instanceof Readable) {
472
+ return new Promise<Buffer>((resolve, reject) => {
473
+ const chunks: Buffer[] = [];
474
+ data.on('data', (chunk) => {
475
+ chunks.push(Buffer.isBuffer(chunk) ? chunk : Buffer.from(chunk));
476
+ });
477
+ data.on('end', () => {
478
+ resolve(Buffer.concat(chunks));
479
+ });
480
+ data.on('error', (err) => {
481
+ reject(err);
482
+ });
483
+ });
484
+ } else {
485
+ throw new Error('Unsupported data type');
486
+ }
487
+ }
488
+ }