@smythos/sre 1.6.8 → 1.6.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (239) hide show
  1. package/CHANGELOG +111 -111
  2. package/LICENSE +18 -18
  3. package/README.md +135 -135
  4. package/dist/bundle-analysis-lazy.html +4949 -0
  5. package/dist/bundle-analysis.html +4949 -0
  6. package/dist/index.js +2 -2
  7. package/dist/index.js.map +1 -1
  8. package/dist/types/Components/Triggers/Gmail.trigger.d.ts +58 -0
  9. package/dist/types/Components/Triggers/GmailTrigger.class.d.ts +44 -0
  10. package/dist/types/Components/Triggers/Trigger.class.d.ts +21 -0
  11. package/dist/types/Components/Triggers/WhatsApp.trigger.d.ts +22 -0
  12. package/dist/types/helpers/AIPerformanceAnalyzer.helper.d.ts +45 -0
  13. package/dist/types/helpers/AIPerformanceCollector.helper.d.ts +111 -0
  14. package/dist/types/subsystems/IO/Storage.service/connectors/AzureBlobStorage.class.d.ts +211 -0
  15. package/dist/types/subsystems/IO/VectorDB.service/connectors/WeaviateVectorDB.class.d.ts +187 -0
  16. package/dist/types/subsystems/PerformanceManager/Performance.service/PerformanceConnector.d.ts +102 -0
  17. package/dist/types/subsystems/PerformanceManager/Performance.service/connectors/LocalPerformanceConnector.class.d.ts +100 -0
  18. package/dist/types/subsystems/PerformanceManager/Performance.service/index.d.ts +22 -0
  19. package/dist/types/subsystems/Security/Credentials/Credentials.class.d.ts +2 -0
  20. package/dist/types/subsystems/Security/Credentials/ManagedOAuth2Credentials.class.d.ts +18 -0
  21. package/dist/types/subsystems/Security/Credentials/OAuth2Credentials.class.d.ts +14 -0
  22. package/dist/types/types/Performance.types.d.ts +468 -0
  23. package/dist/types/utils/package-manager.utils.d.ts +26 -0
  24. package/package.json +1 -1
  25. package/src/Components/APICall/APICall.class.ts +161 -161
  26. package/src/Components/APICall/AccessTokenManager.ts +166 -166
  27. package/src/Components/APICall/ArrayBufferResponse.helper.ts +58 -58
  28. package/src/Components/APICall/OAuth.helper.ts +447 -447
  29. package/src/Components/APICall/mimeTypeCategories.ts +46 -46
  30. package/src/Components/APICall/parseData.ts +167 -167
  31. package/src/Components/APICall/parseHeaders.ts +41 -41
  32. package/src/Components/APICall/parseProxy.ts +68 -68
  33. package/src/Components/APICall/parseUrl.ts +91 -91
  34. package/src/Components/APIEndpoint.class.ts +234 -234
  35. package/src/Components/APIOutput.class.ts +58 -58
  36. package/src/Components/AgentPlugin.class.ts +102 -102
  37. package/src/Components/Async.class.ts +155 -155
  38. package/src/Components/Await.class.ts +90 -90
  39. package/src/Components/Classifier.class.ts +158 -158
  40. package/src/Components/Component.class.ts +147 -147
  41. package/src/Components/ComponentHost.class.ts +38 -38
  42. package/src/Components/DataSourceCleaner.class.ts +92 -92
  43. package/src/Components/DataSourceIndexer.class.ts +181 -181
  44. package/src/Components/DataSourceLookup.class.ts +161 -161
  45. package/src/Components/ECMASandbox.class.ts +72 -72
  46. package/src/Components/FEncDec.class.ts +29 -29
  47. package/src/Components/FHash.class.ts +33 -33
  48. package/src/Components/FSign.class.ts +80 -80
  49. package/src/Components/FSleep.class.ts +25 -25
  50. package/src/Components/FTimestamp.class.ts +66 -66
  51. package/src/Components/FileStore.class.ts +78 -78
  52. package/src/Components/ForEach.class.ts +97 -97
  53. package/src/Components/GPTPlugin.class.ts +70 -70
  54. package/src/Components/GenAILLM.class.ts +586 -586
  55. package/src/Components/HuggingFace.class.ts +313 -313
  56. package/src/Components/Image/imageSettings.config.ts +70 -70
  57. package/src/Components/ImageGenerator.class.ts +483 -483
  58. package/src/Components/JSONFilter.class.ts +54 -54
  59. package/src/Components/LLMAssistant.class.ts +213 -213
  60. package/src/Components/LogicAND.class.ts +28 -28
  61. package/src/Components/LogicAtLeast.class.ts +85 -85
  62. package/src/Components/LogicAtMost.class.ts +86 -86
  63. package/src/Components/LogicOR.class.ts +29 -29
  64. package/src/Components/LogicXOR.class.ts +34 -34
  65. package/src/Components/MCPClient.class.ts +137 -137
  66. package/src/Components/MemoryDeleteKeyVal.class.ts +70 -70
  67. package/src/Components/MemoryReadKeyVal.class.ts +67 -67
  68. package/src/Components/MemoryWriteKeyVal.class.ts +62 -62
  69. package/src/Components/MemoryWriteObject.class.ts +97 -97
  70. package/src/Components/MultimodalLLM.class.ts +128 -128
  71. package/src/Components/OpenAPI.class.ts +72 -72
  72. package/src/Components/PromptGenerator.class.ts +122 -122
  73. package/src/Components/ScrapflyWebScrape.class.ts +183 -183
  74. package/src/Components/ServerlessCode.class.ts +123 -123
  75. package/src/Components/TavilyWebSearch.class.ts +103 -103
  76. package/src/Components/VisionLLM.class.ts +104 -104
  77. package/src/Components/ZapierAction.class.ts +127 -127
  78. package/src/Components/index.ts +97 -97
  79. package/src/Core/AgentProcess.helper.ts +240 -240
  80. package/src/Core/Connector.class.ts +123 -123
  81. package/src/Core/ConnectorsService.ts +197 -197
  82. package/src/Core/DummyConnector.ts +49 -49
  83. package/src/Core/HookService.ts +105 -105
  84. package/src/Core/SmythRuntime.class.ts +241 -241
  85. package/src/Core/SystemEvents.ts +16 -16
  86. package/src/Core/boot.ts +56 -56
  87. package/src/config.ts +15 -15
  88. package/src/constants.ts +126 -126
  89. package/src/data/hugging-face.params.json +579 -579
  90. package/src/helpers/AWSLambdaCode.helper.ts +624 -624
  91. package/src/helpers/BinaryInput.helper.ts +331 -331
  92. package/src/helpers/Conversation.helper.ts +1157 -1157
  93. package/src/helpers/ECMASandbox.helper.ts +64 -64
  94. package/src/helpers/JsonContent.helper.ts +97 -97
  95. package/src/helpers/LocalCache.helper.ts +97 -97
  96. package/src/helpers/Log.helper.ts +274 -274
  97. package/src/helpers/OpenApiParser.helper.ts +150 -150
  98. package/src/helpers/S3Cache.helper.ts +147 -147
  99. package/src/helpers/SmythURI.helper.ts +5 -5
  100. package/src/helpers/Sysconfig.helper.ts +95 -95
  101. package/src/helpers/TemplateString.helper.ts +243 -243
  102. package/src/helpers/TypeChecker.helper.ts +329 -329
  103. package/src/index.ts +3 -3
  104. package/src/index.ts.bak +3 -3
  105. package/src/subsystems/AgentManager/Agent.class.ts +1114 -1114
  106. package/src/subsystems/AgentManager/Agent.helper.ts +3 -3
  107. package/src/subsystems/AgentManager/AgentData.service/AgentDataConnector.ts +230 -230
  108. package/src/subsystems/AgentManager/AgentData.service/connectors/CLIAgentDataConnector.class.ts +66 -66
  109. package/src/subsystems/AgentManager/AgentData.service/connectors/LocalAgentDataConnector.class.ts +145 -145
  110. package/src/subsystems/AgentManager/AgentData.service/connectors/NullAgentData.class.ts +39 -39
  111. package/src/subsystems/AgentManager/AgentData.service/index.ts +18 -18
  112. package/src/subsystems/AgentManager/AgentLogger.class.ts +301 -301
  113. package/src/subsystems/AgentManager/AgentRequest.class.ts +51 -51
  114. package/src/subsystems/AgentManager/AgentRuntime.class.ts +557 -557
  115. package/src/subsystems/AgentManager/AgentSSE.class.ts +101 -101
  116. package/src/subsystems/AgentManager/AgentSettings.class.ts +52 -52
  117. package/src/subsystems/AgentManager/Component.service/ComponentConnector.ts +32 -32
  118. package/src/subsystems/AgentManager/Component.service/connectors/LocalComponentConnector.class.ts +60 -60
  119. package/src/subsystems/AgentManager/Component.service/index.ts +11 -11
  120. package/src/subsystems/AgentManager/EmbodimentSettings.class.ts +47 -47
  121. package/src/subsystems/AgentManager/ForkedAgent.class.ts +154 -154
  122. package/src/subsystems/AgentManager/OSResourceMonitor.ts +77 -77
  123. package/src/subsystems/ComputeManager/Code.service/CodeConnector.ts +98 -98
  124. package/src/subsystems/ComputeManager/Code.service/connectors/AWSLambdaCode.class.ts +171 -171
  125. package/src/subsystems/ComputeManager/Code.service/connectors/ECMASandbox.class.ts +131 -131
  126. package/src/subsystems/ComputeManager/Code.service/index.ts +13 -13
  127. package/src/subsystems/IO/CLI.service/CLIConnector.ts +47 -47
  128. package/src/subsystems/IO/CLI.service/index.ts +9 -9
  129. package/src/subsystems/IO/Log.service/LogConnector.ts +32 -32
  130. package/src/subsystems/IO/Log.service/connectors/ConsoleLog.class.ts +28 -28
  131. package/src/subsystems/IO/Log.service/index.ts +13 -13
  132. package/src/subsystems/IO/NKV.service/NKVConnector.ts +43 -43
  133. package/src/subsystems/IO/NKV.service/connectors/NKVLocalStorage.class.ts +234 -234
  134. package/src/subsystems/IO/NKV.service/connectors/NKVRAM.class.ts +204 -204
  135. package/src/subsystems/IO/NKV.service/connectors/NKVRedis.class.ts +182 -182
  136. package/src/subsystems/IO/NKV.service/index.ts +14 -14
  137. package/src/subsystems/IO/Router.service/RouterConnector.ts +21 -21
  138. package/src/subsystems/IO/Router.service/connectors/ExpressRouter.class.ts +48 -48
  139. package/src/subsystems/IO/Router.service/connectors/NullRouter.class.ts +40 -40
  140. package/src/subsystems/IO/Router.service/index.ts +11 -11
  141. package/src/subsystems/IO/Storage.service/SmythFS.class.ts +488 -488
  142. package/src/subsystems/IO/Storage.service/StorageConnector.ts +66 -66
  143. package/src/subsystems/IO/Storage.service/connectors/LocalStorage.class.ts +327 -327
  144. package/src/subsystems/IO/Storage.service/connectors/S3Storage.class.ts +482 -482
  145. package/src/subsystems/IO/Storage.service/index.ts +13 -13
  146. package/src/subsystems/IO/VectorDB.service/VectorDBConnector.ts +108 -108
  147. package/src/subsystems/IO/VectorDB.service/connectors/MilvusVectorDB.class.ts +465 -465
  148. package/src/subsystems/IO/VectorDB.service/connectors/PineconeVectorDB.class.ts +387 -387
  149. package/src/subsystems/IO/VectorDB.service/connectors/RAMVecrtorDB.class.ts +408 -408
  150. package/src/subsystems/IO/VectorDB.service/embed/BaseEmbedding.ts +107 -107
  151. package/src/subsystems/IO/VectorDB.service/embed/GoogleEmbedding.ts +118 -118
  152. package/src/subsystems/IO/VectorDB.service/embed/OpenAIEmbedding.ts +109 -109
  153. package/src/subsystems/IO/VectorDB.service/embed/index.ts +26 -26
  154. package/src/subsystems/IO/VectorDB.service/index.ts +14 -14
  155. package/src/subsystems/LLMManager/LLM.helper.ts +251 -251
  156. package/src/subsystems/LLMManager/LLM.inference.ts +345 -345
  157. package/src/subsystems/LLMManager/LLM.service/LLMConnector.ts +492 -492
  158. package/src/subsystems/LLMManager/LLM.service/LLMCredentials.helper.ts +171 -171
  159. package/src/subsystems/LLMManager/LLM.service/connectors/Anthropic.class.ts +666 -666
  160. package/src/subsystems/LLMManager/LLM.service/connectors/Bedrock.class.ts +407 -407
  161. package/src/subsystems/LLMManager/LLM.service/connectors/Echo.class.ts +92 -92
  162. package/src/subsystems/LLMManager/LLM.service/connectors/GoogleAI.class.ts +983 -983
  163. package/src/subsystems/LLMManager/LLM.service/connectors/Groq.class.ts +319 -319
  164. package/src/subsystems/LLMManager/LLM.service/connectors/Ollama.class.ts +361 -361
  165. package/src/subsystems/LLMManager/LLM.service/connectors/Perplexity.class.ts +257 -257
  166. package/src/subsystems/LLMManager/LLM.service/connectors/VertexAI.class.ts +430 -430
  167. package/src/subsystems/LLMManager/LLM.service/connectors/openai/OpenAIConnector.class.ts +503 -503
  168. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ChatCompletionsApiInterface.ts +524 -524
  169. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterface.ts +100 -100
  170. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/OpenAIApiInterfaceFactory.ts +81 -81
  171. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/ResponsesApiInterface.ts +1145 -1145
  172. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/constants.ts +13 -13
  173. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/index.ts +4 -4
  174. package/src/subsystems/LLMManager/LLM.service/connectors/openai/apiInterfaces/utils.ts +11 -11
  175. package/src/subsystems/LLMManager/LLM.service/connectors/openai/types.ts +32 -32
  176. package/src/subsystems/LLMManager/LLM.service/connectors/xAI.class.ts +478 -478
  177. package/src/subsystems/LLMManager/LLM.service/index.ts +47 -47
  178. package/src/subsystems/LLMManager/ModelsProvider.service/ModelsProviderConnector.ts +303 -303
  179. package/src/subsystems/LLMManager/ModelsProvider.service/connectors/JSONModelsProvider.class.ts +280 -271
  180. package/src/subsystems/LLMManager/ModelsProvider.service/index.ts +11 -11
  181. package/src/subsystems/LLMManager/custom-models.ts +854 -854
  182. package/src/subsystems/LLMManager/models.ts +2540 -2540
  183. package/src/subsystems/LLMManager/paramMappings.ts +69 -69
  184. package/src/subsystems/MemoryManager/Cache.service/CacheConnector.ts +86 -86
  185. package/src/subsystems/MemoryManager/Cache.service/connectors/LocalStorageCache.class.ts +297 -297
  186. package/src/subsystems/MemoryManager/Cache.service/connectors/RAMCache.class.ts +214 -214
  187. package/src/subsystems/MemoryManager/Cache.service/connectors/RedisCache.class.ts +252 -252
  188. package/src/subsystems/MemoryManager/Cache.service/connectors/S3Cache.class.ts +373 -373
  189. package/src/subsystems/MemoryManager/Cache.service/index.ts +15 -15
  190. package/src/subsystems/MemoryManager/LLMCache.ts +72 -72
  191. package/src/subsystems/MemoryManager/LLMContext.ts +124 -124
  192. package/src/subsystems/MemoryManager/LLMMemory.service/LLMMemoryConnector.ts +26 -26
  193. package/src/subsystems/MemoryManager/RuntimeContext.ts +277 -277
  194. package/src/subsystems/Security/AccessControl/ACL.class.ts +208 -208
  195. package/src/subsystems/Security/AccessControl/AccessCandidate.class.ts +82 -82
  196. package/src/subsystems/Security/AccessControl/AccessRequest.class.ts +52 -52
  197. package/src/subsystems/Security/Account.service/AccountConnector.ts +44 -44
  198. package/src/subsystems/Security/Account.service/connectors/DummyAccount.class.ts +130 -130
  199. package/src/subsystems/Security/Account.service/connectors/JSONFileAccount.class.ts +170 -170
  200. package/src/subsystems/Security/Account.service/connectors/MySQLAccount.class.ts +76 -76
  201. package/src/subsystems/Security/Account.service/index.ts +14 -14
  202. package/src/subsystems/Security/Credentials.helper.ts +62 -62
  203. package/src/subsystems/Security/ManagedVault.service/ManagedVaultConnector.ts +38 -38
  204. package/src/subsystems/Security/ManagedVault.service/connectors/NullManagedVault.class.ts +53 -53
  205. package/src/subsystems/Security/ManagedVault.service/connectors/SecretManagerManagedVault.ts +154 -154
  206. package/src/subsystems/Security/ManagedVault.service/index.ts +12 -12
  207. package/src/subsystems/Security/SecureConnector.class.ts +110 -110
  208. package/src/subsystems/Security/Vault.service/Vault.helper.ts +30 -30
  209. package/src/subsystems/Security/Vault.service/VaultConnector.ts +29 -29
  210. package/src/subsystems/Security/Vault.service/connectors/HashicorpVault.class.ts +46 -46
  211. package/src/subsystems/Security/Vault.service/connectors/JSONFileVault.class.ts +221 -221
  212. package/src/subsystems/Security/Vault.service/connectors/NullVault.class.ts +54 -54
  213. package/src/subsystems/Security/Vault.service/connectors/SecretsManager.class.ts +140 -140
  214. package/src/subsystems/Security/Vault.service/index.ts +12 -12
  215. package/src/types/ACL.types.ts +104 -104
  216. package/src/types/AWS.types.ts +10 -10
  217. package/src/types/Agent.types.ts +61 -61
  218. package/src/types/AgentLogger.types.ts +17 -17
  219. package/src/types/Cache.types.ts +1 -1
  220. package/src/types/Common.types.ts +2 -2
  221. package/src/types/LLM.types.ts +520 -520
  222. package/src/types/Redis.types.ts +8 -8
  223. package/src/types/SRE.types.ts +64 -64
  224. package/src/types/Security.types.ts +14 -14
  225. package/src/types/Storage.types.ts +5 -5
  226. package/src/types/VectorDB.types.ts +86 -86
  227. package/src/utils/base64.utils.ts +275 -275
  228. package/src/utils/cli.utils.ts +68 -68
  229. package/src/utils/data.utils.ts +322 -322
  230. package/src/utils/date-time.utils.ts +22 -22
  231. package/src/utils/general.utils.ts +238 -238
  232. package/src/utils/index.ts +12 -12
  233. package/src/utils/lazy-client.ts +261 -261
  234. package/src/utils/numbers.utils.ts +13 -13
  235. package/src/utils/oauth.utils.ts +35 -35
  236. package/src/utils/string.utils.ts +414 -414
  237. package/src/utils/url.utils.ts +19 -19
  238. package/src/utils/validation.utils.ts +74 -74
  239. package/dist/types/subsystems/LLMManager/ModelsProvider.service/connectors/SmythModelsProvider.class.d.ts +0 -39
@@ -1,327 +1,327 @@
1
- //==[ SRE: LocalStorage ]======================
2
-
3
- import { Logger } from '@sre/helpers/Log.helper';
4
- import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
5
- import { ACL } from '@sre/Security/AccessControl/ACL.class';
6
- import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
7
- import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
8
- //import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
9
- import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
10
- import { SecureConnector } from '@sre/Security/SecureConnector.class';
11
- import fs, { existsSync } from 'fs';
12
- import os from 'os';
13
- import path from 'path';
14
- import { findSmythPath } from '../../../..';
15
-
16
- const console = Logger('LocalStorage');
17
-
18
- export type LocalStorageConfig = {
19
- /**
20
- * The folder to use for the local storage.
21
- *
22
- * If not provided, the default folder will be used.
23
- * The default folder is ~/.smyth/storage
24
- */
25
- folder?: string;
26
- };
27
-
28
- //TODO : detect and store ContentType metadata when saving
29
-
30
- export class LocalStorage extends StorageConnector {
31
- public name = 'LocalStorage';
32
- private folder: string;
33
- private storagePrefix = 'local';
34
- private metadataPrefix = '.local.metadata';
35
- private isInitialized = false;
36
-
37
- constructor(protected _settings?: LocalStorageConfig) {
38
- super(_settings);
39
- //if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
40
-
41
- this.folder = this.findStorageFolder(_settings?.folder);
42
- this.initialize();
43
- if (!fs.existsSync(this.folder)) {
44
- //throw new Error('Invalid folder provided');
45
- console.error(`Invalid folder provided: ${this.folder}`);
46
- }
47
- }
48
-
49
- private findStorageFolder(folder) {
50
- let _storageFolder = folder;
51
-
52
- if (fs.existsSync(_storageFolder)) {
53
- return _storageFolder;
54
- }
55
-
56
- _storageFolder = findSmythPath('storage');
57
-
58
- if (fs.existsSync(_storageFolder)) {
59
- console.warn('Using alternative storage folder found in : ', _storageFolder);
60
- return _storageFolder;
61
- }
62
-
63
- console.warn('!!! All attempts to find an existing storage folder failed !!!');
64
- console.warn('!!! I will use this folder: ', _storageFolder);
65
- return _storageFolder;
66
- }
67
-
68
- /**
69
- * Reads an object from the local storage.
70
- *
71
- * @param {string} resourceId - The key of the object to be read.
72
- * @returns {Promise<any>} - A promise that resolves with the object data.
73
- */
74
-
75
- @SecureConnector.AccessControl
76
- public async read(acRequest: AccessRequest, resourceId: string) {
77
- if (!this.isInitialized) {
78
- await this.initialize();
79
- }
80
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
81
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
82
- try {
83
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
84
- if (!fs.existsSync(filePath)) return undefined;
85
- const data = fs.readFileSync(filePath, null);
86
- return data;
87
- } catch (error) {
88
- console.error(`Error reading object from local storage`, error.name, error.message);
89
- throw error;
90
- }
91
- }
92
-
93
- @SecureConnector.AccessControl
94
- async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
95
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
96
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
97
-
98
- try {
99
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
100
- if (!fs.existsSync(metadataFilePath)) return undefined;
101
- const data = fs.readFileSync(metadataFilePath, 'utf-8');
102
- return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
103
- } catch (error) {
104
- console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
105
- throw error;
106
- }
107
- }
108
-
109
- @SecureConnector.AccessControl
110
- async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
111
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
112
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
113
-
114
- try {
115
- let fileMetadata = await this.getMetadata(acRequest, resourceId);
116
- if (!fileMetadata) fileMetadata = {};
117
-
118
- fileMetadata = { ...fileMetadata, ...metadata };
119
-
120
- //now we can write the metadata
121
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
122
- const serializedMetadata = this.serializeMetadata(fileMetadata);
123
- fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
124
- } catch (error) {
125
- console.error(`Error setting metadata in local storage`, error.name, error.message);
126
- throw error;
127
- }
128
- }
129
- /**
130
- * Writes an object to the local storage.
131
- *
132
- * @param {string} resourceId - The key of the object to be written.
133
- * @param {any} value - The value of the object to be written.
134
- * @param {Metadata} metadata - Optional metadata to be associated with the object.
135
- * @returns {Promise<void>} - A promise that resolves when the object has been written.
136
- */
137
- @SecureConnector.AccessControl
138
- async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
139
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
140
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
141
- if (!this.isInitialized) {
142
- await this.initialize();
143
- }
144
- const accessCandidate = acRequest.candidate;
145
-
146
- let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
147
- let fileMetadata = {
148
- ...metadata,
149
- acl: localACL,
150
- };
151
-
152
- //now we can write the file
153
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
154
- fs.writeFileSync(filePath, value as Buffer);
155
- //now we can write the metadata
156
- await this.setMetadata(acRequest, resourceId, fileMetadata);
157
- }
158
-
159
- /**
160
- * Deletes an object from the local storage.
161
- *
162
- * @param {string} resourceId - The key of the object to be deleted.
163
- * @returns {Promise<void>} - A promise that resolves when the object has been deleted.
164
- */
165
- @SecureConnector.AccessControl
166
- async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
167
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
168
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
169
-
170
- try {
171
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
172
- if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
173
-
174
- const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
175
- if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
176
- } catch (error) {
177
- console.error(`Error deleting object from local storage`, error.name, error.message);
178
- throw error;
179
- }
180
- }
181
-
182
- @SecureConnector.AccessControl
183
- async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
184
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
185
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
186
- if (!this.isInitialized) {
187
- await this.initialize();
188
- }
189
- const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
190
- return !!fs.existsSync(filePath);
191
- }
192
-
193
- //this determines the access rights for the requested resource
194
- //the connector should check if the resource exists or not
195
- //if the resource exists we read it's ACL and return it
196
- //if the resource does not exist we return an write access ACL for the candidate
197
- public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
198
- if (!this.isInitialized) {
199
- await this.initialize();
200
- }
201
- const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
202
-
203
- if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
204
-
205
- const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
206
- const exists = metadata !== undefined; //undefined metadata means the resource does not exist
207
-
208
- if (!exists) {
209
- //the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
210
- return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
211
- }
212
- try {
213
- let metadataObject = JSON.parse(metadata);
214
- return ACL.from(metadataObject?.['acl'] as IACL);
215
- } catch (error) {
216
- console.error(`Error parsing metadata in local storage`, error.name, error.message);
217
- throw error;
218
- }
219
- }
220
-
221
- @SecureConnector.AccessControl
222
- async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
223
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
224
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
225
-
226
- try {
227
- const fileMetadata = await this.getMetadata(acRequest, resourceId);
228
- return ACL.from(fileMetadata?.['acl'] as IACL);
229
- } catch (error) {
230
- console.error(`Error getting access rights in local storage`, error.name, error.message);
231
- throw error;
232
- }
233
- }
234
-
235
- @SecureConnector.AccessControl
236
- async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
237
- // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
238
- // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
239
-
240
- try {
241
- let fileMetadata = await this.getMetadata(acRequest, resourceId);
242
- if (!fileMetadata) fileMetadata = {};
243
- //when setting ACL make sure to not lose ownership
244
- fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
245
- await this.setMetadata(acRequest, resourceId, fileMetadata);
246
- } catch (error) {
247
- console.error(`Error setting access rights in local storage`, error);
248
- throw error;
249
- }
250
- }
251
-
252
- @SecureConnector.AccessControl
253
- async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
254
- console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
255
- }
256
-
257
- private async initialize() {
258
- const storageFolderPath = path.join(this.folder, this.storagePrefix);
259
- if (!existsSync(storageFolderPath)) {
260
- fs.mkdirSync(storageFolderPath, { recursive: true });
261
- }
262
- const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
263
- if (!existsSync(metadataFolderPath)) {
264
- fs.mkdirSync(metadataFolderPath, { recursive: true });
265
- fs.writeFileSync(
266
- path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
267
- 'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
268
- );
269
- }
270
- this.isInitialized = true;
271
- }
272
-
273
- private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
274
- const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
275
- const folder = path.dirname(fullPath);
276
- if (createFoldersIfNotExists && !fs.existsSync(folder)) {
277
- fs.mkdirSync(folder, { recursive: true });
278
- }
279
-
280
- return fullPath;
281
- }
282
-
283
- private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
284
- const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
285
- const folder = path.dirname(fullPath);
286
- if (createFoldersIfNotExists && !fs.existsSync(folder)) {
287
- fs.mkdirSync(folder, { recursive: true });
288
- }
289
-
290
- return fullPath;
291
- }
292
-
293
- private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
294
- let updatedMetadata = {};
295
- if (metadata['acl']) {
296
- if (metadata['acl']) {
297
- updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
298
- }
299
-
300
- delete metadata['acl'];
301
- }
302
-
303
- for (let key in metadata) {
304
- updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
305
- }
306
-
307
- return updatedMetadata;
308
- }
309
-
310
- private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
311
- let deserializedMetadata: Record<string, any> = {};
312
-
313
- for (let key in metadata) {
314
- if (key === 'acl') {
315
- deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
316
- continue;
317
- }
318
-
319
- try {
320
- deserializedMetadata[key] = JSON.parse(metadata[key]);
321
- } catch (error) {
322
- deserializedMetadata[key] = metadata[key];
323
- }
324
- }
325
- return deserializedMetadata;
326
- }
327
- }
1
+ //==[ SRE: LocalStorage ]======================
2
+
3
+ import { Logger } from '@sre/helpers/Log.helper';
4
+ import { StorageConnector } from '@sre/IO/Storage.service/StorageConnector';
5
+ import { ACL } from '@sre/Security/AccessControl/ACL.class';
6
+ import { IAccessCandidate, IACL, TAccessLevel, TAccessResult, TAccessRole } from '@sre/types/ACL.types';
7
+ import { StorageData, StorageMetadata } from '@sre/types/Storage.types';
8
+ //import { SmythRuntime } from '@sre/Core/SmythRuntime.class';
9
+ import { AccessRequest } from '@sre/Security/AccessControl/AccessRequest.class';
10
+ import { SecureConnector } from '@sre/Security/SecureConnector.class';
11
+ import fs, { existsSync } from 'fs';
12
+ import os from 'os';
13
+ import path from 'path';
14
+ import { findSmythPath } from '../../../..';
15
+
16
+ const console = Logger('LocalStorage');
17
+
18
+ export type LocalStorageConfig = {
19
+ /**
20
+ * The folder to use for the local storage.
21
+ *
22
+ * If not provided, the default folder will be used.
23
+ * The default folder is ~/.smyth/storage
24
+ */
25
+ folder?: string;
26
+ };
27
+
28
+ //TODO : detect and store ContentType metadata when saving
29
+
30
+ export class LocalStorage extends StorageConnector {
31
+ public name = 'LocalStorage';
32
+ private folder: string;
33
+ private storagePrefix = 'local';
34
+ private metadataPrefix = '.local.metadata';
35
+ private isInitialized = false;
36
+
37
+ constructor(protected _settings?: LocalStorageConfig) {
38
+ super(_settings);
39
+ //if (!SmythRuntime.Instance) throw new Error('SRE not initialized');
40
+
41
+ this.folder = this.findStorageFolder(_settings?.folder);
42
+ this.initialize();
43
+ if (!fs.existsSync(this.folder)) {
44
+ //throw new Error('Invalid folder provided');
45
+ console.error(`Invalid folder provided: ${this.folder}`);
46
+ }
47
+ }
48
+
49
+ private findStorageFolder(folder) {
50
+ let _storageFolder = folder;
51
+
52
+ if (fs.existsSync(_storageFolder)) {
53
+ return _storageFolder;
54
+ }
55
+
56
+ _storageFolder = findSmythPath('storage');
57
+
58
+ if (fs.existsSync(_storageFolder)) {
59
+ console.warn('Using alternative storage folder found in : ', _storageFolder);
60
+ return _storageFolder;
61
+ }
62
+
63
+ console.warn('!!! All attempts to find an existing storage folder failed !!!');
64
+ console.warn('!!! I will use this folder: ', _storageFolder);
65
+ return _storageFolder;
66
+ }
67
+
68
+ /**
69
+ * Reads an object from the local storage.
70
+ *
71
+ * @param {string} resourceId - The key of the object to be read.
72
+ * @returns {Promise<any>} - A promise that resolves with the object data.
73
+ */
74
+
75
+ @SecureConnector.AccessControl
76
+ public async read(acRequest: AccessRequest, resourceId: string) {
77
+ if (!this.isInitialized) {
78
+ await this.initialize();
79
+ }
80
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
81
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
82
+ try {
83
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
84
+ if (!fs.existsSync(filePath)) return undefined;
85
+ const data = fs.readFileSync(filePath, null);
86
+ return data;
87
+ } catch (error) {
88
+ console.error(`Error reading object from local storage`, error.name, error.message);
89
+ throw error;
90
+ }
91
+ }
92
+
93
+ @SecureConnector.AccessControl
94
+ async getMetadata(acRequest: AccessRequest, resourceId: string): Promise<StorageMetadata | undefined> {
95
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
96
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
97
+
98
+ try {
99
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
100
+ if (!fs.existsSync(metadataFilePath)) return undefined;
101
+ const data = fs.readFileSync(metadataFilePath, 'utf-8');
102
+ return this.deserializeMetadata(JSON.parse(data)) as StorageMetadata;
103
+ } catch (error) {
104
+ console.error(`Error reading metadata from LocalStorage`, error.name, error.message);
105
+ throw error;
106
+ }
107
+ }
108
+
109
+ @SecureConnector.AccessControl
110
+ async setMetadata(acRequest: AccessRequest, resourceId: string, metadata: StorageMetadata) {
111
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
112
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
113
+
114
+ try {
115
+ let fileMetadata = await this.getMetadata(acRequest, resourceId);
116
+ if (!fileMetadata) fileMetadata = {};
117
+
118
+ fileMetadata = { ...fileMetadata, ...metadata };
119
+
120
+ //now we can write the metadata
121
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId, true);
122
+ const serializedMetadata = this.serializeMetadata(fileMetadata);
123
+ fs.writeFileSync(metadataFilePath, JSON.stringify(serializedMetadata));
124
+ } catch (error) {
125
+ console.error(`Error setting metadata in local storage`, error.name, error.message);
126
+ throw error;
127
+ }
128
+ }
129
+ /**
130
+ * Writes an object to the local storage.
131
+ *
132
+ * @param {string} resourceId - The key of the object to be written.
133
+ * @param {any} value - The value of the object to be written.
134
+ * @param {Metadata} metadata - Optional metadata to be associated with the object.
135
+ * @returns {Promise<void>} - A promise that resolves when the object has been written.
136
+ */
137
+ @SecureConnector.AccessControl
138
+ async write(acRequest: AccessRequest, resourceId: string, value: StorageData, acl?: IACL, metadata?: StorageMetadata): Promise<void> {
139
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
140
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
141
+ if (!this.isInitialized) {
142
+ await this.initialize();
143
+ }
144
+ const accessCandidate = acRequest.candidate;
145
+
146
+ let localACL = ACL.from(acl).addAccess(accessCandidate.role, accessCandidate.id, TAccessLevel.Owner).ACL;
147
+ let fileMetadata = {
148
+ ...metadata,
149
+ acl: localACL,
150
+ };
151
+
152
+ //now we can write the file
153
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId, true);
154
+ fs.writeFileSync(filePath, value as Buffer);
155
+ //now we can write the metadata
156
+ await this.setMetadata(acRequest, resourceId, fileMetadata);
157
+ }
158
+
159
+ /**
160
+ * Deletes an object from the local storage.
161
+ *
162
+ * @param {string} resourceId - The key of the object to be deleted.
163
+ * @returns {Promise<void>} - A promise that resolves when the object has been deleted.
164
+ */
165
+ @SecureConnector.AccessControl
166
+ async delete(acRequest: AccessRequest, resourceId: string): Promise<void> {
167
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
168
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
169
+
170
+ try {
171
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
172
+ if (fs.existsSync(filePath)) fs.unlinkSync(filePath);
173
+
174
+ const metadataFilePath = this.getMetadataFilePath(acRequest.candidate.id, resourceId);
175
+ if (fs.existsSync(metadataFilePath)) fs.unlinkSync(metadataFilePath);
176
+ } catch (error) {
177
+ console.error(`Error deleting object from local storage`, error.name, error.message);
178
+ throw error;
179
+ }
180
+ }
181
+
182
+ @SecureConnector.AccessControl
183
+ async exists(acRequest: AccessRequest, resourceId: string): Promise<boolean> {
184
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
185
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
186
+ if (!this.isInitialized) {
187
+ await this.initialize();
188
+ }
189
+ const filePath = this.getStorageFilePath(acRequest.candidate.id, resourceId);
190
+ return !!fs.existsSync(filePath);
191
+ }
192
+
193
+ //this determines the access rights for the requested resource
194
+ //the connector should check if the resource exists or not
195
+ //if the resource exists we read it's ACL and return it
196
+ //if the resource does not exist we return an write access ACL for the candidate
197
+ public async getResourceACL(resourceId: string, candidate: IAccessCandidate) {
198
+ if (!this.isInitialized) {
199
+ await this.initialize();
200
+ }
201
+ const metadataFilePath = this.getMetadataFilePath(candidate.id, resourceId);
202
+
203
+ if (!fs.existsSync(metadataFilePath)) return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
204
+
205
+ const metadata = fs.readFileSync(metadataFilePath, 'utf-8');
206
+ const exists = metadata !== undefined; //undefined metadata means the resource does not exist
207
+
208
+ if (!exists) {
209
+ //the resource does not exist yet, we grant write access to the candidate in order to allow the resource creation
210
+ return new ACL().addAccess(candidate.role, candidate.id, TAccessLevel.Owner);
211
+ }
212
+ try {
213
+ let metadataObject = JSON.parse(metadata);
214
+ return ACL.from(metadataObject?.['acl'] as IACL);
215
+ } catch (error) {
216
+ console.error(`Error parsing metadata in local storage`, error.name, error.message);
217
+ throw error;
218
+ }
219
+ }
220
+
221
+ @SecureConnector.AccessControl
222
+ async getACL(acRequest: AccessRequest, resourceId: string): Promise<ACL | undefined> {
223
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
224
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
225
+
226
+ try {
227
+ const fileMetadata = await this.getMetadata(acRequest, resourceId);
228
+ return ACL.from(fileMetadata?.['acl'] as IACL);
229
+ } catch (error) {
230
+ console.error(`Error getting access rights in local storage`, error.name, error.message);
231
+ throw error;
232
+ }
233
+ }
234
+
235
+ @SecureConnector.AccessControl
236
+ async setACL(acRequest: AccessRequest, resourceId: string, acl: IACL) {
237
+ // const accessTicket = await this.getAccessTicket(resourceId, acRequest);
238
+ // if (accessTicket.access !== TAccessResult.Granted) throw new Error('Access Denied');
239
+
240
+ try {
241
+ let fileMetadata = await this.getMetadata(acRequest, resourceId);
242
+ if (!fileMetadata) fileMetadata = {};
243
+ //when setting ACL make sure to not lose ownership
244
+ fileMetadata['acl'] = ACL.from(acl).addAccess(acRequest.candidate.role, acRequest.candidate.id, TAccessLevel.Owner).ACL;
245
+ await this.setMetadata(acRequest, resourceId, fileMetadata);
246
+ } catch (error) {
247
+ console.error(`Error setting access rights in local storage`, error);
248
+ throw error;
249
+ }
250
+ }
251
+
252
+ @SecureConnector.AccessControl
253
+ async expire(acRequest: AccessRequest, resourceId: string, ttl: number) {
254
+ console.warn(`LocalStorage.expire is not implemented, request will be ignored for resource ${resourceId} and ttl ${ttl}`);
255
+ }
256
+
257
+ private async initialize() {
258
+ const storageFolderPath = path.join(this.folder, this.storagePrefix);
259
+ if (!existsSync(storageFolderPath)) {
260
+ fs.mkdirSync(storageFolderPath, { recursive: true });
261
+ }
262
+ const metadataFolderPath = path.join(this.folder, this.metadataPrefix);
263
+ if (!existsSync(metadataFolderPath)) {
264
+ fs.mkdirSync(metadataFolderPath, { recursive: true });
265
+ fs.writeFileSync(
266
+ path.join(metadataFolderPath, 'README_IMPORTANT.txt'),
267
+ 'This folder is used for smythOS metadata, do not delete it, it will break SmythOS local filesystem'
268
+ );
269
+ }
270
+ this.isInitialized = true;
271
+ }
272
+
273
+ private getStorageFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
274
+ const fullPath = path.join(this.folder, this.storagePrefix, resourceId);
275
+ const folder = path.dirname(fullPath);
276
+ if (createFoldersIfNotExists && !fs.existsSync(folder)) {
277
+ fs.mkdirSync(folder, { recursive: true });
278
+ }
279
+
280
+ return fullPath;
281
+ }
282
+
283
+ private getMetadataFilePath(candidateId: string, resourceId: string, createFoldersIfNotExists: boolean = false) {
284
+ const fullPath = path.join(this.folder, this.metadataPrefix, resourceId);
285
+ const folder = path.dirname(fullPath);
286
+ if (createFoldersIfNotExists && !fs.existsSync(folder)) {
287
+ fs.mkdirSync(folder, { recursive: true });
288
+ }
289
+
290
+ return fullPath;
291
+ }
292
+
293
+ private serializeMetadata(metadata: Record<string, any>): Record<string, string> {
294
+ let updatedMetadata = {};
295
+ if (metadata['acl']) {
296
+ if (metadata['acl']) {
297
+ updatedMetadata['acl'] = typeof metadata['acl'] == 'string' ? metadata['acl'] : ACL.from(metadata['acl']).serializedACL;
298
+ }
299
+
300
+ delete metadata['acl'];
301
+ }
302
+
303
+ for (let key in metadata) {
304
+ updatedMetadata[key] = typeof metadata[key] === 'string' ? metadata[key] : JSON.stringify(metadata[key]);
305
+ }
306
+
307
+ return updatedMetadata;
308
+ }
309
+
310
+ private deserializeMetadata(metadata: Record<string, string>): Record<string, any> {
311
+ let deserializedMetadata: Record<string, any> = {};
312
+
313
+ for (let key in metadata) {
314
+ if (key === 'acl') {
315
+ deserializedMetadata[key] = ACL.from(metadata[key]).ACL;
316
+ continue;
317
+ }
318
+
319
+ try {
320
+ deserializedMetadata[key] = JSON.parse(metadata[key]);
321
+ } catch (error) {
322
+ deserializedMetadata[key] = metadata[key];
323
+ }
324
+ }
325
+ return deserializedMetadata;
326
+ }
327
+ }