@webiny/api-page-builder-import-export 0.0.0-unstable.8c4d9f045a → 0.0.0-unstable.990c3ab1b6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/client.js +6 -16
- package/client.js.map +1 -1
- package/exportPages/combine/index.js +11 -19
- package/exportPages/combine/index.js.map +1 -1
- package/exportPages/process/index.js +19 -35
- package/exportPages/process/index.js.map +1 -1
- package/exportPages/s3Stream.js +4 -25
- package/exportPages/s3Stream.js.map +1 -1
- package/exportPages/utils.js +19 -32
- package/exportPages/utils.js.map +1 -1
- package/exportPages/zipper.js +31 -45
- package/exportPages/zipper.js.map +1 -1
- package/graphql/crud/pageImportExportTasks.crud.js +34 -75
- package/graphql/crud/pageImportExportTasks.crud.js.map +1 -1
- package/graphql/crud/pages.crud.js +22 -40
- package/graphql/crud/pages.crud.js.map +1 -1
- package/graphql/crud.js +1 -6
- package/graphql/crud.js.map +1 -1
- package/graphql/graphql/pageImportExportTasks.gql.js +2 -7
- package/graphql/graphql/pageImportExportTasks.gql.js.map +1 -1
- package/graphql/graphql/pages.gql.js +2 -7
- package/graphql/graphql/pages.gql.js.map +1 -1
- package/graphql/graphql/utils/resolve.d.ts +1 -1
- package/graphql/graphql/utils/resolve.js +0 -3
- package/graphql/graphql/utils/resolve.js.map +1 -1
- package/graphql/graphql.js +1 -5
- package/graphql/graphql.js.map +1 -1
- package/graphql/index.js +1 -6
- package/graphql/index.js.map +1 -1
- package/importPages/create/index.js +9 -20
- package/importPages/create/index.js.map +1 -1
- package/importPages/process/index.js +24 -29
- package/importPages/process/index.js.map +1 -1
- package/importPages/utils.js +45 -127
- package/importPages/utils.js.map +1 -1
- package/mockSecurity.js +0 -2
- package/mockSecurity.js.map +1 -1
- package/package.json +27 -27
- package/types.js +0 -5
- package/types.js.map +1 -1
package/client.js
CHANGED
@@ -1,18 +1,11 @@
|
|
1
1
|
"use strict";
|
2
2
|
|
3
|
-
var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault");
|
4
|
-
|
3
|
+
var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault").default;
|
5
4
|
Object.defineProperty(exports, "__esModule", {
|
6
5
|
value: true
|
7
6
|
});
|
8
7
|
exports.invokeHandlerClient = invokeHandlerClient;
|
9
|
-
|
10
|
-
var _defineProperty2 = _interopRequireDefault(require("@babel/runtime/helpers/defineProperty"));
|
11
|
-
|
12
|
-
function ownKeys(object, enumerableOnly) { var keys = Object.keys(object); if (Object.getOwnPropertySymbols) { var symbols = Object.getOwnPropertySymbols(object); enumerableOnly && (symbols = symbols.filter(function (sym) { return Object.getOwnPropertyDescriptor(object, sym).enumerable; })), keys.push.apply(keys, symbols); } return keys; }
|
13
|
-
|
14
|
-
function _objectSpread(target) { for (var i = 1; i < arguments.length; i++) { var source = null != arguments[i] ? arguments[i] : {}; i % 2 ? ownKeys(Object(source), !0).forEach(function (key) { (0, _defineProperty2.default)(target, key, source[key]); }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(target, Object.getOwnPropertyDescriptors(source)) : ownKeys(Object(source)).forEach(function (key) { Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source, key)); }); } return target; }
|
15
|
-
|
8
|
+
var _objectSpread2 = _interopRequireDefault(require("@babel/runtime/helpers/objectSpread2"));
|
16
9
|
async function invokeHandlerClient({
|
17
10
|
context,
|
18
11
|
name,
|
@@ -27,26 +20,23 @@ async function invokeHandlerClient({
|
|
27
20
|
request
|
28
21
|
} = context;
|
29
22
|
const tenantId = context.tenancy.getCurrentTenant().id;
|
30
|
-
|
31
|
-
const headers = _objectSpread(_objectSpread({}, request.headers), {}, {
|
23
|
+
const headers = (0, _objectSpread2.default)((0, _objectSpread2.default)({}, request.headers), {}, {
|
32
24
|
["x-tenant"]: request.headers["x-tenant"] || tenantId
|
33
25
|
});
|
34
|
-
|
35
26
|
delete headers["content-length"];
|
36
27
|
const invocationArgs = {
|
37
28
|
httpMethod: request.method,
|
38
29
|
body: request.body,
|
39
30
|
headers,
|
40
|
-
|
41
31
|
/**
|
42
32
|
* Required until type augmentation works correctly.
|
43
33
|
*/
|
44
34
|
cookies: request.cookies
|
45
|
-
};
|
46
|
-
|
35
|
+
};
|
36
|
+
// Invoke handler
|
47
37
|
await context.handlerClient.invoke({
|
48
38
|
name: name,
|
49
|
-
payload:
|
39
|
+
payload: (0, _objectSpread2.default)((0, _objectSpread2.default)({}, payload), invocationArgs),
|
50
40
|
await: false,
|
51
41
|
description
|
52
42
|
});
|
package/client.js.map
CHANGED
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"names":["invokeHandlerClient","context","name","payload","description","request","tenantId","tenancy","getCurrentTenant","id","headers","invocationArgs","httpMethod","method","body","cookies","handlerClient","invoke","await"],"sources":["client.ts"],"sourcesContent":["import { PbPageImportExportContext } from \"~/graphql/types\";\n\nexport interface InvokeHandlerClientParams<TParams> {\n context: PbPageImportExportContext;\n name: string;\n payload: TParams;\n description: string;\n}\n\nexport async function invokeHandlerClient<TParams>({\n context,\n name,\n payload,\n description\n}: InvokeHandlerClientParams<TParams>) {\n /*\n * Prepare \"invocationArgs\", we're hacking our wat here.\n * They are necessary to setup the \"context.pageBuilder\" object among other things in IMPORT_PAGE_FUNCTION\n */\n const { request } = context;\n\n const tenantId = context.tenancy.getCurrentTenant().id;\n\n const headers = {\n ...request.headers,\n [\"x-tenant\"]: request.headers[\"x-tenant\"] || tenantId\n };\n delete headers[\"content-length\"];\n const invocationArgs = {\n httpMethod: request.method,\n body: request.body,\n headers,\n /**\n * Required until type augmentation works correctly.\n */\n cookies: (request as any).cookies\n };\n // Invoke handler\n await context.handlerClient.invoke<TParams & any>({\n name: name,\n payload: {\n ...payload,\n ...invocationArgs\n },\n await: false,\n description\n });\n}\n"],"mappings":"
|
1
|
+
{"version":3,"names":["invokeHandlerClient","context","name","payload","description","request","tenantId","tenancy","getCurrentTenant","id","headers","invocationArgs","httpMethod","method","body","cookies","handlerClient","invoke","await"],"sources":["client.ts"],"sourcesContent":["import { PbPageImportExportContext } from \"~/graphql/types\";\n\nexport interface InvokeHandlerClientParams<TParams> {\n context: PbPageImportExportContext;\n name: string;\n payload: TParams;\n description: string;\n}\n\nexport async function invokeHandlerClient<TParams>({\n context,\n name,\n payload,\n description\n}: InvokeHandlerClientParams<TParams>) {\n /*\n * Prepare \"invocationArgs\", we're hacking our wat here.\n * They are necessary to setup the \"context.pageBuilder\" object among other things in IMPORT_PAGE_FUNCTION\n */\n const { request } = context;\n\n const tenantId = context.tenancy.getCurrentTenant().id;\n\n const headers = {\n ...request.headers,\n [\"x-tenant\"]: request.headers[\"x-tenant\"] || tenantId\n };\n delete headers[\"content-length\"];\n const invocationArgs = {\n httpMethod: request.method,\n body: request.body,\n headers,\n /**\n * Required until type augmentation works correctly.\n */\n cookies: (request as any).cookies\n };\n // Invoke handler\n await context.handlerClient.invoke<TParams & any>({\n name: name,\n payload: {\n ...payload,\n ...invocationArgs\n },\n await: false,\n description\n });\n}\n"],"mappings":";;;;;;;;AASO,eAAeA,mBAAmB,CAAU;EAC/CC,OAAO;EACPC,IAAI;EACJC,OAAO;EACPC;AACgC,CAAC,EAAE;EACnC;AACJ;AACA;AACA;EACI,MAAM;IAAEC;EAAQ,CAAC,GAAGJ,OAAO;EAE3B,MAAMK,QAAQ,GAAGL,OAAO,CAACM,OAAO,CAACC,gBAAgB,EAAE,CAACC,EAAE;EAEtD,MAAMC,OAAO,+DACNL,OAAO,CAACK,OAAO;IAClB,CAAC,UAAU,GAAGL,OAAO,CAACK,OAAO,CAAC,UAAU,CAAC,IAAIJ;EAAQ,EACxD;EACD,OAAOI,OAAO,CAAC,gBAAgB,CAAC;EAChC,MAAMC,cAAc,GAAG;IACnBC,UAAU,EAAEP,OAAO,CAACQ,MAAM;IAC1BC,IAAI,EAAET,OAAO,CAACS,IAAI;IAClBJ,OAAO;IACP;AACR;AACA;IACQK,OAAO,EAAGV,OAAO,CAASU;EAC9B,CAAC;EACD;EACA,MAAMd,OAAO,CAACe,aAAa,CAACC,MAAM,CAAgB;IAC9Cf,IAAI,EAAEA,IAAI;IACVC,OAAO,8DACAA,OAAO,GACPQ,cAAc,CACpB;IACDO,KAAK,EAAE,KAAK;IACZd;EACJ,CAAC,CAAC;AACN"}
|
@@ -4,17 +4,11 @@ Object.defineProperty(exports, "__esModule", {
|
|
4
4
|
value: true
|
5
5
|
});
|
6
6
|
exports.default = void 0;
|
7
|
-
|
8
7
|
var _types = require("../../types");
|
9
|
-
|
10
8
|
var _s3Stream = require("../s3Stream");
|
11
|
-
|
12
9
|
var _zipper = require("../zipper");
|
13
|
-
|
14
10
|
var _mockSecurity = require("../../mockSecurity");
|
15
|
-
|
16
11
|
var _handlerAws = require("@webiny/handler-aws");
|
17
|
-
|
18
12
|
/**
|
19
13
|
* Handles the export pages combine workflow.
|
20
14
|
*/
|
@@ -33,10 +27,8 @@ var _default = () => {
|
|
33
27
|
identity
|
34
28
|
} = payload;
|
35
29
|
(0, _mockSecurity.mockSecurity)(identity, context);
|
36
|
-
|
37
30
|
try {
|
38
31
|
const task = await pageBuilder.pageImportExportTask.getTask(taskId);
|
39
|
-
|
40
32
|
if (!task) {
|
41
33
|
return {
|
42
34
|
data: null,
|
@@ -45,13 +37,12 @@ var _default = () => {
|
|
45
37
|
}
|
46
38
|
};
|
47
39
|
}
|
48
|
-
|
49
40
|
const {
|
50
41
|
exportPagesDataKey
|
51
|
-
} = task.input;
|
42
|
+
} = task.input;
|
52
43
|
|
44
|
+
// Get all files (zip) from given key
|
53
45
|
const listObjectResponse = await _s3Stream.s3Stream.listObject(exportPagesDataKey);
|
54
|
-
|
55
46
|
if (!listObjectResponse.Contents) {
|
56
47
|
return {
|
57
48
|
data: null,
|
@@ -60,14 +51,16 @@ var _default = () => {
|
|
60
51
|
}
|
61
52
|
};
|
62
53
|
}
|
54
|
+
const zipFileKeys = listObjectResponse.Contents.filter(file => file.Key !== exportPagesDataKey).map(file => file.Key).filter(Boolean);
|
63
55
|
|
64
|
-
|
65
|
-
|
66
|
-
const zipOfZip = new _zipper.ZipOfZip(zipFileKeys); // Upload
|
56
|
+
// Prepare zip of all zips
|
57
|
+
const zipOfZip = new _zipper.ZipOfZip(zipFileKeys);
|
67
58
|
|
59
|
+
// Upload
|
68
60
|
const pageExportUpload = await zipOfZip.process();
|
69
|
-
log(`Done uploading... File is located at ${pageExportUpload.Location} `);
|
61
|
+
log(`Done uploading... File is located at ${pageExportUpload.Location} `);
|
70
62
|
|
63
|
+
// Update task status and save export page data key
|
71
64
|
await pageBuilder.pageImportExportTask.updateTask(taskId, {
|
72
65
|
status: _types.PageImportExportTaskStatus.COMPLETED,
|
73
66
|
data: {
|
@@ -75,18 +68,19 @@ var _default = () => {
|
|
75
68
|
key: pageExportUpload.Key,
|
76
69
|
url: _s3Stream.s3Stream.getPresignedUrl(pageExportUpload.Key)
|
77
70
|
}
|
78
|
-
});
|
71
|
+
});
|
79
72
|
|
73
|
+
// Remove individual zip files from storage
|
80
74
|
const deleteFilePromises = zipFileKeys.map(key => _s3Stream.s3Stream.deleteObject(key));
|
81
75
|
await Promise.all(deleteFilePromises);
|
82
76
|
log(`Successfully deleted ${deleteFilePromises.length} zip files.`);
|
83
77
|
} catch (e) {
|
84
78
|
log("[EXPORT_PAGES_COMBINE] Error => ", e);
|
79
|
+
|
85
80
|
/**
|
86
81
|
* In case of error, we'll update the task status to "failed",
|
87
82
|
* so that, client can show notify the user appropriately.
|
88
83
|
*/
|
89
|
-
|
90
84
|
await pageBuilder.pageImportExportTask.updateTask(taskId, {
|
91
85
|
status: _types.PageImportExportTaskStatus.FAILED,
|
92
86
|
error: {
|
@@ -103,12 +97,10 @@ var _default = () => {
|
|
103
97
|
}
|
104
98
|
};
|
105
99
|
}
|
106
|
-
|
107
100
|
return {
|
108
101
|
data: "",
|
109
102
|
error: null
|
110
103
|
};
|
111
104
|
});
|
112
105
|
};
|
113
|
-
|
114
106
|
exports.default = _default;
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"names":["createRawEventHandler","payload","context","log","console","pageBuilder","taskId","identity","mockSecurity","task","pageImportExportTask","getTask","data","error","message","exportPagesDataKey","input","listObjectResponse","s3Stream","listObject","Contents","zipFileKeys","filter","file","Key","map","Boolean","zipOfZip","ZipOfZip","pageExportUpload","process","Location","updateTask","status","PageImportExportTaskStatus","COMPLETED","key","url","getPresignedUrl","deleteFilePromises","deleteObject","Promise","all","length","e","FAILED","name","stack","code"],"sources":["index.ts"],"sourcesContent":["import { PageImportExportTaskStatus, PbPageImportExportContext } from \"~/types\";\nimport { s3Stream } from \"../s3Stream\";\nimport { ZipOfZip } from \"../zipper\";\nimport { mockSecurity } from \"~/mockSecurity\";\nimport { SecurityIdentity } from \"@webiny/api-security/types\";\nimport { createRawEventHandler } from \"@webiny/handler-aws\";\n\nexport interface Payload {\n taskId: string;\n identity: SecurityIdentity;\n}\n\nexport interface Response {\n data: string | null;\n error: Partial<Error> | null;\n}\n\n/**\n * Handles the export pages combine workflow.\n */\nexport default () => {\n return createRawEventHandler<Payload, PbPageImportExportContext, Response>(\n async ({ payload, context }) => {\n const log = console.log;\n\n log(\"RUNNING Export Pages Combine Handler\");\n const { pageBuilder } = context;\n const { taskId, identity } = payload;\n\n mockSecurity(identity, context);\n\n try {\n const task = await pageBuilder.pageImportExportTask.getTask(taskId);\n if (!task) {\n return {\n data: null,\n error: {\n message: `There is no task with ID \"${taskId}\".`\n }\n };\n }\n\n const { exportPagesDataKey } = task.input;\n\n // Get all files (zip) from given key\n const listObjectResponse = await s3Stream.listObject(exportPagesDataKey);\n if (!listObjectResponse.Contents) {\n return {\n data: null,\n error: {\n message:\n \"There is no Contents defined on S3 Stream while combining pages.\"\n }\n };\n }\n\n const zipFileKeys = listObjectResponse.Contents.filter(\n file => file.Key !== exportPagesDataKey\n )\n .map(file => file.Key)\n .filter(Boolean) as string[];\n\n // Prepare zip of all zips\n const zipOfZip = new ZipOfZip(zipFileKeys);\n\n // Upload\n const pageExportUpload = await zipOfZip.process();\n log(`Done uploading... File is located at ${pageExportUpload.Location} `);\n\n // Update task status and save export page data key\n await pageBuilder.pageImportExportTask.updateTask(taskId, {\n status: PageImportExportTaskStatus.COMPLETED,\n data: {\n message: `Finish uploading page export.`,\n key: pageExportUpload.Key,\n url: s3Stream.getPresignedUrl(pageExportUpload.Key)\n }\n });\n\n // Remove individual zip files from storage\n const deleteFilePromises = zipFileKeys.map(key => s3Stream.deleteObject(key));\n await Promise.all(deleteFilePromises);\n log(`Successfully deleted ${deleteFilePromises.length} zip files.`);\n } catch (e) {\n log(\"[EXPORT_PAGES_COMBINE] Error => \", e);\n\n /**\n * In case of error, we'll update the task status to \"failed\",\n * so that, client can show notify the user appropriately.\n */\n await pageBuilder.pageImportExportTask.updateTask(taskId, {\n status: PageImportExportTaskStatus.FAILED,\n error: {\n name: e.name,\n message: e.message,\n stack: e.stack,\n code: \"EXPORT_FAILED\"\n }\n });\n\n return {\n data: null,\n error: {\n message: e.message\n }\n };\n }\n return {\n data: \"\",\n error: null\n };\n }\n );\n};\n"],"mappings":"
|
1
|
+
{"version":3,"names":["createRawEventHandler","payload","context","log","console","pageBuilder","taskId","identity","mockSecurity","task","pageImportExportTask","getTask","data","error","message","exportPagesDataKey","input","listObjectResponse","s3Stream","listObject","Contents","zipFileKeys","filter","file","Key","map","Boolean","zipOfZip","ZipOfZip","pageExportUpload","process","Location","updateTask","status","PageImportExportTaskStatus","COMPLETED","key","url","getPresignedUrl","deleteFilePromises","deleteObject","Promise","all","length","e","FAILED","name","stack","code"],"sources":["index.ts"],"sourcesContent":["import { PageImportExportTaskStatus, PbPageImportExportContext } from \"~/types\";\nimport { s3Stream } from \"../s3Stream\";\nimport { ZipOfZip } from \"../zipper\";\nimport { mockSecurity } from \"~/mockSecurity\";\nimport { SecurityIdentity } from \"@webiny/api-security/types\";\nimport { createRawEventHandler } from \"@webiny/handler-aws\";\n\nexport interface Payload {\n taskId: string;\n identity: SecurityIdentity;\n}\n\nexport interface Response {\n data: string | null;\n error: Partial<Error> | null;\n}\n\n/**\n * Handles the export pages combine workflow.\n */\nexport default () => {\n return createRawEventHandler<Payload, PbPageImportExportContext, Response>(\n async ({ payload, context }) => {\n const log = console.log;\n\n log(\"RUNNING Export Pages Combine Handler\");\n const { pageBuilder } = context;\n const { taskId, identity } = payload;\n\n mockSecurity(identity, context);\n\n try {\n const task = await pageBuilder.pageImportExportTask.getTask(taskId);\n if (!task) {\n return {\n data: null,\n error: {\n message: `There is no task with ID \"${taskId}\".`\n }\n };\n }\n\n const { exportPagesDataKey } = task.input;\n\n // Get all files (zip) from given key\n const listObjectResponse = await s3Stream.listObject(exportPagesDataKey);\n if (!listObjectResponse.Contents) {\n return {\n data: null,\n error: {\n message:\n \"There is no Contents defined on S3 Stream while combining pages.\"\n }\n };\n }\n\n const zipFileKeys = listObjectResponse.Contents.filter(\n file => file.Key !== exportPagesDataKey\n )\n .map(file => file.Key)\n .filter(Boolean) as string[];\n\n // Prepare zip of all zips\n const zipOfZip = new ZipOfZip(zipFileKeys);\n\n // Upload\n const pageExportUpload = await zipOfZip.process();\n log(`Done uploading... File is located at ${pageExportUpload.Location} `);\n\n // Update task status and save export page data key\n await pageBuilder.pageImportExportTask.updateTask(taskId, {\n status: PageImportExportTaskStatus.COMPLETED,\n data: {\n message: `Finish uploading page export.`,\n key: pageExportUpload.Key,\n url: s3Stream.getPresignedUrl(pageExportUpload.Key)\n }\n });\n\n // Remove individual zip files from storage\n const deleteFilePromises = zipFileKeys.map(key => s3Stream.deleteObject(key));\n await Promise.all(deleteFilePromises);\n log(`Successfully deleted ${deleteFilePromises.length} zip files.`);\n } catch (e) {\n log(\"[EXPORT_PAGES_COMBINE] Error => \", e);\n\n /**\n * In case of error, we'll update the task status to \"failed\",\n * so that, client can show notify the user appropriately.\n */\n await pageBuilder.pageImportExportTask.updateTask(taskId, {\n status: PageImportExportTaskStatus.FAILED,\n error: {\n name: e.name,\n message: e.message,\n stack: e.stack,\n code: \"EXPORT_FAILED\"\n }\n });\n\n return {\n data: null,\n error: {\n message: e.message\n }\n };\n }\n return {\n data: \"\",\n error: null\n };\n }\n );\n};\n"],"mappings":";;;;;;AAAA;AACA;AACA;AACA;AAEA;AAYA;AACA;AACA;AAFA,eAGe,MAAM;EACjB,OAAO,IAAAA,iCAAqB,EACxB,OAAO;IAAEC,OAAO;IAAEC;EAAQ,CAAC,KAAK;IAC5B,MAAMC,GAAG,GAAGC,OAAO,CAACD,GAAG;IAEvBA,GAAG,CAAC,sCAAsC,CAAC;IAC3C,MAAM;MAAEE;IAAY,CAAC,GAAGH,OAAO;IAC/B,MAAM;MAAEI,MAAM;MAAEC;IAAS,CAAC,GAAGN,OAAO;IAEpC,IAAAO,0BAAY,EAACD,QAAQ,EAAEL,OAAO,CAAC;IAE/B,IAAI;MACA,MAAMO,IAAI,GAAG,MAAMJ,WAAW,CAACK,oBAAoB,CAACC,OAAO,CAACL,MAAM,CAAC;MACnE,IAAI,CAACG,IAAI,EAAE;QACP,OAAO;UACHG,IAAI,EAAE,IAAI;UACVC,KAAK,EAAE;YACHC,OAAO,EAAG,6BAA4BR,MAAO;UACjD;QACJ,CAAC;MACL;MAEA,MAAM;QAAES;MAAmB,CAAC,GAAGN,IAAI,CAACO,KAAK;;MAEzC;MACA,MAAMC,kBAAkB,GAAG,MAAMC,kBAAQ,CAACC,UAAU,CAACJ,kBAAkB,CAAC;MACxE,IAAI,CAACE,kBAAkB,CAACG,QAAQ,EAAE;QAC9B,OAAO;UACHR,IAAI,EAAE,IAAI;UACVC,KAAK,EAAE;YACHC,OAAO,EACH;UACR;QACJ,CAAC;MACL;MAEA,MAAMO,WAAW,GAAGJ,kBAAkB,CAACG,QAAQ,CAACE,MAAM,CAClDC,IAAI,IAAIA,IAAI,CAACC,GAAG,KAAKT,kBAAkB,CAC1C,CACIU,GAAG,CAACF,IAAI,IAAIA,IAAI,CAACC,GAAG,CAAC,CACrBF,MAAM,CAACI,OAAO,CAAa;;MAEhC;MACA,MAAMC,QAAQ,GAAG,IAAIC,gBAAQ,CAACP,WAAW,CAAC;;MAE1C;MACA,MAAMQ,gBAAgB,GAAG,MAAMF,QAAQ,CAACG,OAAO,EAAE;MACjD3B,GAAG,CAAE,wCAAuC0B,gBAAgB,CAACE,QAAS,GAAE,CAAC;;MAEzE;MACA,MAAM1B,WAAW,CAACK,oBAAoB,CAACsB,UAAU,CAAC1B,MAAM,EAAE;QACtD2B,MAAM,EAAEC,iCAA0B,CAACC,SAAS;QAC5CvB,IAAI,EAAE;UACFE,OAAO,EAAG,+BAA8B;UACxCsB,GAAG,EAAEP,gBAAgB,CAACL,GAAG;UACzBa,GAAG,EAAEnB,kBAAQ,CAACoB,eAAe,CAACT,gBAAgB,CAACL,GAAG;QACtD;MACJ,CAAC,CAAC;;MAEF;MACA,MAAMe,kBAAkB,GAAGlB,WAAW,CAACI,GAAG,CAACW,GAAG,IAAIlB,kBAAQ,CAACsB,YAAY,CAACJ,GAAG,CAAC,CAAC;MAC7E,MAAMK,OAAO,CAACC,GAAG,CAACH,kBAAkB,CAAC;MACrCpC,GAAG,CAAE,wBAAuBoC,kBAAkB,CAACI,MAAO,aAAY,CAAC;IACvE,CAAC,CAAC,OAAOC,CAAC,EAAE;MACRzC,GAAG,CAAC,kCAAkC,EAAEyC,CAAC,CAAC;;MAE1C;AAChB;AACA;AACA;MACgB,MAAMvC,WAAW,CAACK,oBAAoB,CAACsB,UAAU,CAAC1B,MAAM,EAAE;QACtD2B,MAAM,EAAEC,iCAA0B,CAACW,MAAM;QACzChC,KAAK,EAAE;UACHiC,IAAI,EAAEF,CAAC,CAACE,IAAI;UACZhC,OAAO,EAAE8B,CAAC,CAAC9B,OAAO;UAClBiC,KAAK,EAAEH,CAAC,CAACG,KAAK;UACdC,IAAI,EAAE;QACV;MACJ,CAAC,CAAC;MAEF,OAAO;QACHpC,IAAI,EAAE,IAAI;QACVC,KAAK,EAAE;UACHC,OAAO,EAAE8B,CAAC,CAAC9B;QACf;MACJ,CAAC;IACL;IACA,OAAO;MACHF,IAAI,EAAE,EAAE;MACRC,KAAK,EAAE;IACX,CAAC;EACL,CAAC,CACJ;AACL,CAAC;AAAA"}
|
@@ -4,21 +4,13 @@ Object.defineProperty(exports, "__esModule", {
|
|
4
4
|
value: true
|
5
5
|
});
|
6
6
|
exports.default = void 0;
|
7
|
-
|
8
7
|
var _types = require("../../types");
|
9
|
-
|
10
8
|
var _client = require("../../client");
|
11
|
-
|
12
9
|
var _handlerGraphql = require("@webiny/handler-graphql");
|
13
|
-
|
14
10
|
var _utils = require("../utils");
|
15
|
-
|
16
11
|
var _mockSecurity = require("../../mockSecurity");
|
17
|
-
|
18
12
|
var _utils2 = require("@webiny/utils");
|
19
|
-
|
20
13
|
var _handlerAws = require("@webiny/handler-aws");
|
21
|
-
|
22
14
|
/**
|
23
15
|
* Handles the export pages process workflow.
|
24
16
|
*/
|
@@ -40,11 +32,10 @@ var _default = configuration => {
|
|
40
32
|
taskId,
|
41
33
|
subTaskIndex,
|
42
34
|
identity
|
43
|
-
} = payload;
|
35
|
+
} = payload;
|
36
|
+
// Disable authorization; this is necessary because we call Page Builder CRUD methods which include authorization checks
|
44
37
|
// and this Lambda is invoked internally, without credentials.
|
45
|
-
|
46
38
|
(0, _mockSecurity.mockSecurity)(identity, context);
|
47
|
-
|
48
39
|
try {
|
49
40
|
/*
|
50
41
|
* Note: We're not going to DB for finding the next sub-task to process,
|
@@ -55,7 +46,6 @@ var _default = configuration => {
|
|
55
46
|
* Base condition!!
|
56
47
|
* Bail out early, if task not found or task's status is not "pending".
|
57
48
|
*/
|
58
|
-
|
59
49
|
if (!subTask || subTask.status !== _types.PageImportExportTaskStatus.PENDING) {
|
60
50
|
noPendingTask = true;
|
61
51
|
return {
|
@@ -65,7 +55,6 @@ var _default = configuration => {
|
|
65
55
|
} else {
|
66
56
|
noPendingTask = false;
|
67
57
|
}
|
68
|
-
|
69
58
|
log(`Fetched sub task => ${subTask.id}`);
|
70
59
|
const {
|
71
60
|
input
|
@@ -75,15 +64,14 @@ var _default = configuration => {
|
|
75
64
|
exportPagesDataKey,
|
76
65
|
revisionType
|
77
66
|
} = input;
|
67
|
+
|
78
68
|
/**
|
79
69
|
* At the moment, we only export a single revision of the page.
|
80
70
|
* It could be "published" or "latest" depending upon user input.
|
81
71
|
*
|
82
72
|
* Note: In case of no "published" revision available, we use the latest revision.
|
83
73
|
*/
|
84
|
-
|
85
74
|
let page;
|
86
|
-
|
87
75
|
try {
|
88
76
|
if (revisionType === _types.PageExportRevisionType.PUBLISHED) {
|
89
77
|
// Get "published" page.
|
@@ -102,36 +90,35 @@ var _default = configuration => {
|
|
102
90
|
throw e;
|
103
91
|
}
|
104
92
|
}
|
105
|
-
|
106
93
|
if (!page) {
|
107
94
|
log(`Unable to load page "${pageId}"`);
|
108
95
|
throw new _handlerGraphql.NotFoundError(`Unable to load page "${pageId}"`);
|
109
96
|
}
|
97
|
+
log(`Processing page key "${pageId}" | version ${page.version} | ${page.status}`);
|
110
98
|
|
111
|
-
|
112
|
-
|
99
|
+
// Mark task status as PROCESSING
|
113
100
|
subTask = await pageBuilder.pageImportExportTask.updateSubTask(taskId, subTask.id, {
|
114
101
|
status: _types.PageImportExportTaskStatus.PROCESSING
|
115
|
-
});
|
116
|
-
|
102
|
+
});
|
103
|
+
// Update stats in main task
|
117
104
|
await pageBuilder.pageImportExportTask.updateStats(taskId, {
|
118
105
|
prevStatus: prevStatusOfSubTask,
|
119
106
|
nextStatus: _types.PageImportExportTaskStatus.PROCESSING
|
120
107
|
});
|
121
108
|
prevStatusOfSubTask = subTask.status;
|
122
|
-
log(`Extracting page data and uploading to storage...`);
|
123
|
-
|
109
|
+
log(`Extracting page data and uploading to storage...`);
|
110
|
+
// Extract Page
|
124
111
|
const pageDataZip = await (0, _utils.exportPage)(page, exportPagesDataKey, fileManager);
|
125
|
-
log(`Finish uploading zip...`);
|
126
|
-
|
112
|
+
log(`Finish uploading zip...`);
|
113
|
+
// Update task record in DB
|
127
114
|
subTask = await pageBuilder.pageImportExportTask.updateSubTask(taskId, subTask.id, {
|
128
115
|
status: _types.PageImportExportTaskStatus.COMPLETED,
|
129
116
|
data: {
|
130
117
|
message: `Finish uploading data for page "${page.id}" v${page.version} (${page.status}).`,
|
131
118
|
key: pageDataZip.Key
|
132
119
|
}
|
133
|
-
});
|
134
|
-
|
120
|
+
});
|
121
|
+
// Update stats in main task
|
135
122
|
await pageBuilder.pageImportExportTask.updateStats(taskId, {
|
136
123
|
prevStatus: prevStatusOfSubTask,
|
137
124
|
nextStatus: _types.PageImportExportTaskStatus.COMPLETED
|
@@ -139,7 +126,6 @@ var _default = configuration => {
|
|
139
126
|
prevStatusOfSubTask = subTask.status;
|
140
127
|
} catch (e) {
|
141
128
|
log("[EXPORT_PAGES_PROCESS] Error => ", e);
|
142
|
-
|
143
129
|
if (subTask && subTask.id) {
|
144
130
|
/**
|
145
131
|
* In case of error, we'll update the task status to "failed",
|
@@ -153,15 +139,15 @@ var _default = configuration => {
|
|
153
139
|
stack: e.stack,
|
154
140
|
code: "EXPORT_FAILED"
|
155
141
|
}
|
156
|
-
});
|
142
|
+
});
|
157
143
|
|
144
|
+
// Update stats in main task
|
158
145
|
await pageBuilder.pageImportExportTask.updateStats(taskId, {
|
159
146
|
prevStatus: prevStatusOfSubTask,
|
160
147
|
nextStatus: _types.PageImportExportTaskStatus.FAILED
|
161
148
|
});
|
162
149
|
prevStatusOfSubTask = subTask.status;
|
163
150
|
}
|
164
|
-
|
165
151
|
return {
|
166
152
|
data: null,
|
167
153
|
error: {
|
@@ -171,8 +157,8 @@ var _default = configuration => {
|
|
171
157
|
} finally {
|
172
158
|
// Base condition!
|
173
159
|
if (noPendingTask) {
|
174
|
-
log(`No pending sub-task for task ${taskId}`);
|
175
|
-
|
160
|
+
log(`No pending sub-task for task ${taskId}`);
|
161
|
+
// Combine individual page zip files.
|
176
162
|
await (0, _client.invokeHandlerClient)({
|
177
163
|
context,
|
178
164
|
name: configuration.handlers.combine,
|
@@ -183,8 +169,8 @@ var _default = configuration => {
|
|
183
169
|
description: "Export pages - combine"
|
184
170
|
});
|
185
171
|
} else {
|
186
|
-
console.log(`Invoking PROCESS for task "${subTaskIndex + 1}"`);
|
187
|
-
|
172
|
+
console.log(`Invoking PROCESS for task "${subTaskIndex + 1}"`);
|
173
|
+
// We want to continue with Self invocation no matter if current page error out.
|
188
174
|
await (0, _client.invokeHandlerClient)({
|
189
175
|
context,
|
190
176
|
name: configuration.handlers.process,
|
@@ -197,12 +183,10 @@ var _default = configuration => {
|
|
197
183
|
});
|
198
184
|
}
|
199
185
|
}
|
200
|
-
|
201
186
|
return {
|
202
187
|
data: "",
|
203
188
|
error: null
|
204
189
|
};
|
205
190
|
});
|
206
191
|
};
|
207
|
-
|
208
192
|
exports.default = _default;
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"names":["configuration","createRawEventHandler","payload","context","log","console","subTask","noPendingTask","prevStatusOfSubTask","PageImportExportTaskStatus","PENDING","pageBuilder","fileManager","taskId","subTaskIndex","identity","mockSecurity","pageImportExportTask","getSubTask","zeroPad","status","data","error","id","input","pageId","exportPagesDataKey","revisionType","page","PageExportRevisionType","PUBLISHED","getPublishedPageById","getPage","e","NotFoundError","version","updateSubTask","PROCESSING","updateStats","prevStatus","nextStatus","pageDataZip","exportPage","COMPLETED","message","key","Key","FAILED","name","stack","code","invokeHandlerClient","handlers","combine","security","getIdentity","description","process"],"sources":["index.ts"],"sourcesContent":["import {\n PageExportRevisionType,\n PageImportExportTaskStatus,\n PbPageImportExportContext\n} from \"~/types\";\nimport { invokeHandlerClient } from \"~/client\";\nimport { NotFoundError } from \"@webiny/handler-graphql\";\nimport { exportPage } from \"~/exportPages/utils\";\nimport { Payload as ExtractPayload } from \"../combine\";\nimport { mockSecurity } from \"~/mockSecurity\";\nimport { SecurityIdentity } from \"@webiny/api-security/types\";\nimport { zeroPad } from \"@webiny/utils\";\nimport { createRawEventHandler } from \"@webiny/handler-aws\";\n\ninterface Configuration {\n handlers: {\n process: string;\n combine: string;\n };\n}\n\nexport interface Payload {\n taskId: string;\n subTaskIndex: number;\n identity?: SecurityIdentity;\n}\n\nexport interface Response {\n data: string | null;\n error: Partial<Error> | null;\n}\n\n/**\n * Handles the export pages process workflow.\n */\nexport default (configuration: Configuration) => {\n return createRawEventHandler<Payload, PbPageImportExportContext, Response>(\n async ({ payload, context }) => {\n const log = console.log;\n let subTask;\n let noPendingTask = true;\n let prevStatusOfSubTask = PageImportExportTaskStatus.PENDING;\n\n log(\"RUNNING Export Pages Process Handler\");\n const { pageBuilder, fileManager } = context;\n const { taskId, subTaskIndex, identity } = payload;\n // Disable authorization; this is necessary because we call Page Builder CRUD methods which include authorization checks\n // and this Lambda is invoked internally, without credentials.\n mockSecurity(identity as SecurityIdentity, context);\n\n try {\n /*\n * Note: We're not going to DB for finding the next sub-task to process,\n * because the data might be out of sync due to GSI eventual consistency.\n */\n subTask = await pageBuilder.pageImportExportTask.getSubTask(\n taskId,\n zeroPad(subTaskIndex, 5)\n );\n /**\n * Base condition!!\n * Bail out early, if task not found or task's status is not \"pending\".\n */\n if (!subTask || subTask.status !== PageImportExportTaskStatus.PENDING) {\n noPendingTask = true;\n return {\n data: \"\",\n error: null\n };\n } else {\n noPendingTask = false;\n }\n\n log(`Fetched sub task => ${subTask.id}`);\n\n const { input } = subTask;\n const { pageId, exportPagesDataKey, revisionType } = input;\n\n /**\n * At the moment, we only export a single revision of the page.\n * It could be \"published\" or \"latest\" depending upon user input.\n *\n * Note: In case of no \"published\" revision available, we use the latest revision.\n */\n let page;\n try {\n if (revisionType === PageExportRevisionType.PUBLISHED) {\n // Get \"published\" page.\n page = await pageBuilder.getPublishedPageById({ id: pageId });\n } else {\n // Get \"latest\" page.\n page = await pageBuilder.getPage(pageId);\n }\n } catch (e) {\n // If we're looking for \"published\" page and doesn't found it, get latest page.\n if (\n revisionType === PageExportRevisionType.PUBLISHED &&\n e instanceof NotFoundError\n ) {\n page = await pageBuilder.getPage(pageId);\n } else {\n throw e;\n }\n }\n\n if (!page) {\n log(`Unable to load page \"${pageId}\"`);\n throw new NotFoundError(`Unable to load page \"${pageId}\"`);\n }\n\n log(`Processing page key \"${pageId}\" | version ${page.version} | ${page.status}`);\n\n // Mark task status as PROCESSING\n subTask = await pageBuilder.pageImportExportTask.updateSubTask(taskId, subTask.id, {\n status: PageImportExportTaskStatus.PROCESSING\n });\n // Update stats in main task\n await pageBuilder.pageImportExportTask.updateStats(taskId, {\n prevStatus: prevStatusOfSubTask,\n nextStatus: PageImportExportTaskStatus.PROCESSING\n });\n prevStatusOfSubTask = subTask.status;\n\n log(`Extracting page data and uploading to storage...`);\n // Extract Page\n const pageDataZip = await exportPage(page, exportPagesDataKey, fileManager);\n log(`Finish uploading zip...`);\n // Update task record in DB\n subTask = await pageBuilder.pageImportExportTask.updateSubTask(taskId, subTask.id, {\n status: PageImportExportTaskStatus.COMPLETED,\n data: {\n message: `Finish uploading data for page \"${page.id}\" v${page.version} (${page.status}).`,\n key: pageDataZip.Key\n }\n });\n // Update stats in main task\n await pageBuilder.pageImportExportTask.updateStats(taskId, {\n prevStatus: prevStatusOfSubTask,\n nextStatus: PageImportExportTaskStatus.COMPLETED\n });\n prevStatusOfSubTask = subTask.status;\n } catch (e) {\n log(\"[EXPORT_PAGES_PROCESS] Error => \", e);\n\n if (subTask && subTask.id) {\n /**\n * In case of error, we'll update the task status to \"failed\",\n * so that, client can show notify the user appropriately.\n */\n subTask = await pageBuilder.pageImportExportTask.updateSubTask(\n taskId,\n subTask.id,\n {\n status: PageImportExportTaskStatus.FAILED,\n error: {\n name: e.name,\n message: e.message,\n stack: e.stack,\n code: \"EXPORT_FAILED\"\n }\n }\n );\n\n // Update stats in main task\n await pageBuilder.pageImportExportTask.updateStats(taskId, {\n prevStatus: prevStatusOfSubTask,\n nextStatus: PageImportExportTaskStatus.FAILED\n });\n prevStatusOfSubTask = subTask.status;\n }\n\n return {\n data: null,\n error: {\n message: e.message\n }\n };\n } finally {\n // Base condition!\n if (noPendingTask) {\n log(`No pending sub-task for task ${taskId}`);\n // Combine individual page zip files.\n await invokeHandlerClient<ExtractPayload>({\n context,\n name: configuration.handlers.combine,\n payload: {\n taskId,\n identity: context.security.getIdentity()\n },\n description: \"Export pages - combine\"\n });\n } else {\n console.log(`Invoking PROCESS for task \"${subTaskIndex + 1}\"`);\n // We want to continue with Self invocation no matter if current page error out.\n await invokeHandlerClient<Payload>({\n context,\n name: configuration.handlers.process,\n payload: {\n taskId,\n subTaskIndex: subTaskIndex + 1,\n identity: context.security.getIdentity()\n },\n description: \"Export pages - process - subtask\"\n });\n }\n }\n return {\n data: \"\",\n error: null\n };\n }\n );\n};\n"],"mappings":";;;;;;;AAAA;;AAKA;;AACA;;AACA;;AAEA;;AAEA;;AACA;;AAoBA;AACA;AACA;eACgBA,aAAD,IAAkC;EAC7C,OAAO,IAAAC,iCAAA,EACH,OAAO;IAAEC,OAAF;IAAWC;EAAX,CAAP,KAAgC;IAC5B,MAAMC,GAAG,GAAGC,OAAO,CAACD,GAApB;IACA,IAAIE,OAAJ;IACA,IAAIC,aAAa,GAAG,IAApB;IACA,IAAIC,mBAAmB,GAAGC,iCAAA,CAA2BC,OAArD;IAEAN,GAAG,CAAC,sCAAD,CAAH;IACA,MAAM;MAAEO,WAAF;MAAeC;IAAf,IAA+BT,OAArC;IACA,MAAM;MAAEU,MAAF;MAAUC,YAAV;MAAwBC;IAAxB,IAAqCb,OAA3C,CAR4B,CAS5B;IACA;;IACA,IAAAc,0BAAA,EAAaD,QAAb,EAA2CZ,OAA3C;;IAEA,IAAI;MACA;AAChB;AACA;AACA;MACgBG,OAAO,GAAG,MAAMK,WAAW,CAACM,oBAAZ,CAAiCC,UAAjC,CACZL,MADY,EAEZ,IAAAM,eAAA,EAAQL,YAAR,EAAsB,CAAtB,CAFY,CAAhB;MAIA;AAChB;AACA;AACA;;MACgB,IAAI,CAACR,OAAD,IAAYA,OAAO,CAACc,MAAR,KAAmBX,iCAAA,CAA2BC,OAA9D,EAAuE;QACnEH,aAAa,GAAG,IAAhB;QACA,OAAO;UACHc,IAAI,EAAE,EADH;UAEHC,KAAK,EAAE;QAFJ,CAAP;MAIH,CAND,MAMO;QACHf,aAAa,GAAG,KAAhB;MACH;;MAEDH,GAAG,CAAE,uBAAsBE,OAAO,CAACiB,EAAG,EAAnC,CAAH;MAEA,MAAM;QAAEC;MAAF,IAAYlB,OAAlB;MACA,MAAM;QAAEmB,MAAF;QAAUC,kBAAV;QAA8BC;MAA9B,IAA+CH,KAArD;MAEA;AAChB;AACA;AACA;AACA;AACA;;MACgB,IAAII,IAAJ;;MACA,IAAI;QACA,IAAID,YAAY,KAAKE,6BAAA,CAAuBC,SAA5C,EAAuD;UACnD;UACAF,IAAI,GAAG,MAAMjB,WAAW,CAACoB,oBAAZ,CAAiC;YAAER,EAAE,EAAEE;UAAN,CAAjC,CAAb;QACH,CAHD,MAGO;UACH;UACAG,IAAI,GAAG,MAAMjB,WAAW,CAACqB,OAAZ,CAAoBP,MAApB,CAAb;QACH;MACJ,CARD,CAQE,OAAOQ,CAAP,EAAU;QACR;QACA,IACIN,YAAY,KAAKE,6BAAA,CAAuBC,SAAxC,IACAG,CAAC,YAAYC,6BAFjB,EAGE;UACEN,IAAI,GAAG,MAAMjB,WAAW,CAACqB,OAAZ,CAAoBP,MAApB,CAAb;QACH,CALD,MAKO;UACH,MAAMQ,CAAN;QACH;MACJ;;MAED,IAAI,CAACL,IAAL,EAAW;QACPxB,GAAG,CAAE,wBAAuBqB,MAAO,GAAhC,CAAH;QACA,MAAM,IAAIS,6BAAJ,CAAmB,wBAAuBT,MAAO,GAAjD,CAAN;MACH;;MAEDrB,GAAG,CAAE,wBAAuBqB,MAAO,eAAcG,IAAI,CAACO,OAAQ,MAAKP,IAAI,CAACR,MAAO,EAA5E,CAAH,CA5DA,CA8DA;;MACAd,OAAO,GAAG,MAAMK,WAAW,CAACM,oBAAZ,CAAiCmB,aAAjC,CAA+CvB,MAA/C,EAAuDP,OAAO,CAACiB,EAA/D,EAAmE;QAC/EH,MAAM,EAAEX,iCAAA,CAA2B4B;MAD4C,CAAnE,CAAhB,CA/DA,CAkEA;;MACA,MAAM1B,WAAW,CAACM,oBAAZ,CAAiCqB,WAAjC,CAA6CzB,MAA7C,EAAqD;QACvD0B,UAAU,EAAE/B,mBAD2C;QAEvDgC,UAAU,EAAE/B,iCAAA,CAA2B4B;MAFgB,CAArD,CAAN;MAIA7B,mBAAmB,GAAGF,OAAO,CAACc,MAA9B;MAEAhB,GAAG,CAAE,kDAAF,CAAH,CAzEA,CA0EA;;MACA,MAAMqC,WAAW,GAAG,MAAM,IAAAC,iBAAA,EAAWd,IAAX,EAAiBF,kBAAjB,EAAqCd,WAArC,CAA1B;MACAR,GAAG,CAAE,yBAAF,CAAH,CA5EA,CA6EA;;MACAE,OAAO,GAAG,MAAMK,WAAW,CAACM,oBAAZ,CAAiCmB,aAAjC,CAA+CvB,MAA/C,EAAuDP,OAAO,CAACiB,EAA/D,EAAmE;QAC/EH,MAAM,EAAEX,iCAAA,CAA2BkC,SAD4C;QAE/EtB,IAAI,EAAE;UACFuB,OAAO,EAAG,mCAAkChB,IAAI,CAACL,EAAG,MAAKK,IAAI,CAACO,OAAQ,KAAIP,IAAI,CAACR,MAAO,IADpF;UAEFyB,GAAG,EAAEJ,WAAW,CAACK;QAFf;MAFyE,CAAnE,CAAhB,CA9EA,CAqFA;;MACA,MAAMnC,WAAW,CAACM,oBAAZ,CAAiCqB,WAAjC,CAA6CzB,MAA7C,EAAqD;QACvD0B,UAAU,EAAE/B,mBAD2C;QAEvDgC,UAAU,EAAE/B,iCAAA,CAA2BkC;MAFgB,CAArD,CAAN;MAIAnC,mBAAmB,GAAGF,OAAO,CAACc,MAA9B;IACH,CA3FD,CA2FE,OAAOa,CAAP,EAAU;MACR7B,GAAG,CAAC,kCAAD,EAAqC6B,CAArC,CAAH;;MAEA,IAAI3B,OAAO,IAAIA,OAAO,CAACiB,EAAvB,EAA2B;QACvB;AACpB;AACA;AACA;QACoBjB,OAAO,GAAG,MAAMK,WAAW,CAACM,oBAAZ,CAAiCmB,aAAjC,CACZvB,MADY,EAEZP,OAAO,CAACiB,EAFI,EAGZ;UACIH,MAAM,EAAEX,iCAAA,CAA2BsC,MADvC;UAEIzB,KAAK,EAAE;YACH0B,IAAI,EAAEf,CAAC,CAACe,IADL;YAEHJ,OAAO,EAAEX,CAAC,CAACW,OAFR;YAGHK,KAAK,EAAEhB,CAAC,CAACgB,KAHN;YAIHC,IAAI,EAAE;UAJH;QAFX,CAHY,CAAhB,CALuB,CAmBvB;;QACA,MAAMvC,WAAW,CAACM,oBAAZ,CAAiCqB,WAAjC,CAA6CzB,MAA7C,EAAqD;UACvD0B,UAAU,EAAE/B,mBAD2C;UAEvDgC,UAAU,EAAE/B,iCAAA,CAA2BsC;QAFgB,CAArD,CAAN;QAIAvC,mBAAmB,GAAGF,OAAO,CAACc,MAA9B;MACH;;MAED,OAAO;QACHC,IAAI,EAAE,IADH;QAEHC,KAAK,EAAE;UACHsB,OAAO,EAAEX,CAAC,CAACW;QADR;MAFJ,CAAP;IAMH,CA/HD,SA+HU;MACN;MACA,IAAIrC,aAAJ,EAAmB;QACfH,GAAG,CAAE,gCAA+BS,MAAO,EAAxC,CAAH,CADe,CAEf;;QACA,MAAM,IAAAsC,2BAAA,EAAoC;UACtChD,OADsC;UAEtC6C,IAAI,EAAEhD,aAAa,CAACoD,QAAd,CAAuBC,OAFS;UAGtCnD,OAAO,EAAE;YACLW,MADK;YAELE,QAAQ,EAAEZ,OAAO,CAACmD,QAAR,CAAiBC,WAAjB;UAFL,CAH6B;UAOtCC,WAAW,EAAE;QAPyB,CAApC,CAAN;MASH,CAZD,MAYO;QACHnD,OAAO,CAACD,GAAR,CAAa,8BAA6BU,YAAY,GAAG,CAAE,GAA3D,EADG,CAEH;;QACA,MAAM,IAAAqC,2BAAA,EAA6B;UAC/BhD,OAD+B;UAE/B6C,IAAI,EAAEhD,aAAa,CAACoD,QAAd,CAAuBK,OAFE;UAG/BvD,OAAO,EAAE;YACLW,MADK;YAELC,YAAY,EAAEA,YAAY,GAAG,CAFxB;YAGLC,QAAQ,EAAEZ,OAAO,CAACmD,QAAR,CAAiBC,WAAjB;UAHL,CAHsB;UAQ/BC,WAAW,EAAE;QARkB,CAA7B,CAAN;MAUH;IACJ;;IACD,OAAO;MACHnC,IAAI,EAAE,EADH;MAEHC,KAAK,EAAE;IAFJ,CAAP;EAIH,CA9KE,CAAP;AAgLH,C"}
|
1
|
+
{"version":3,"names":["configuration","createRawEventHandler","payload","context","log","console","subTask","noPendingTask","prevStatusOfSubTask","PageImportExportTaskStatus","PENDING","pageBuilder","fileManager","taskId","subTaskIndex","identity","mockSecurity","pageImportExportTask","getSubTask","zeroPad","status","data","error","id","input","pageId","exportPagesDataKey","revisionType","page","PageExportRevisionType","PUBLISHED","getPublishedPageById","getPage","e","NotFoundError","version","updateSubTask","PROCESSING","updateStats","prevStatus","nextStatus","pageDataZip","exportPage","COMPLETED","message","key","Key","FAILED","name","stack","code","invokeHandlerClient","handlers","combine","security","getIdentity","description","process"],"sources":["index.ts"],"sourcesContent":["import {\n PageExportRevisionType,\n PageImportExportTaskStatus,\n PbPageImportExportContext\n} from \"~/types\";\nimport { invokeHandlerClient } from \"~/client\";\nimport { NotFoundError } from \"@webiny/handler-graphql\";\nimport { exportPage } from \"~/exportPages/utils\";\nimport { Payload as ExtractPayload } from \"../combine\";\nimport { mockSecurity } from \"~/mockSecurity\";\nimport { SecurityIdentity } from \"@webiny/api-security/types\";\nimport { zeroPad } from \"@webiny/utils\";\nimport { createRawEventHandler } from \"@webiny/handler-aws\";\n\ninterface Configuration {\n handlers: {\n process: string;\n combine: string;\n };\n}\n\nexport interface Payload {\n taskId: string;\n subTaskIndex: number;\n identity?: SecurityIdentity;\n}\n\nexport interface Response {\n data: string | null;\n error: Partial<Error> | null;\n}\n\n/**\n * Handles the export pages process workflow.\n */\nexport default (configuration: Configuration) => {\n return createRawEventHandler<Payload, PbPageImportExportContext, Response>(\n async ({ payload, context }) => {\n const log = console.log;\n let subTask;\n let noPendingTask = true;\n let prevStatusOfSubTask = PageImportExportTaskStatus.PENDING;\n\n log(\"RUNNING Export Pages Process Handler\");\n const { pageBuilder, fileManager } = context;\n const { taskId, subTaskIndex, identity } = payload;\n // Disable authorization; this is necessary because we call Page Builder CRUD methods which include authorization checks\n // and this Lambda is invoked internally, without credentials.\n mockSecurity(identity as SecurityIdentity, context);\n\n try {\n /*\n * Note: We're not going to DB for finding the next sub-task to process,\n * because the data might be out of sync due to GSI eventual consistency.\n */\n subTask = await pageBuilder.pageImportExportTask.getSubTask(\n taskId,\n zeroPad(subTaskIndex, 5)\n );\n /**\n * Base condition!!\n * Bail out early, if task not found or task's status is not \"pending\".\n */\n if (!subTask || subTask.status !== PageImportExportTaskStatus.PENDING) {\n noPendingTask = true;\n return {\n data: \"\",\n error: null\n };\n } else {\n noPendingTask = false;\n }\n\n log(`Fetched sub task => ${subTask.id}`);\n\n const { input } = subTask;\n const { pageId, exportPagesDataKey, revisionType } = input;\n\n /**\n * At the moment, we only export a single revision of the page.\n * It could be \"published\" or \"latest\" depending upon user input.\n *\n * Note: In case of no \"published\" revision available, we use the latest revision.\n */\n let page;\n try {\n if (revisionType === PageExportRevisionType.PUBLISHED) {\n // Get \"published\" page.\n page = await pageBuilder.getPublishedPageById({ id: pageId });\n } else {\n // Get \"latest\" page.\n page = await pageBuilder.getPage(pageId);\n }\n } catch (e) {\n // If we're looking for \"published\" page and doesn't found it, get latest page.\n if (\n revisionType === PageExportRevisionType.PUBLISHED &&\n e instanceof NotFoundError\n ) {\n page = await pageBuilder.getPage(pageId);\n } else {\n throw e;\n }\n }\n\n if (!page) {\n log(`Unable to load page \"${pageId}\"`);\n throw new NotFoundError(`Unable to load page \"${pageId}\"`);\n }\n\n log(`Processing page key \"${pageId}\" | version ${page.version} | ${page.status}`);\n\n // Mark task status as PROCESSING\n subTask = await pageBuilder.pageImportExportTask.updateSubTask(taskId, subTask.id, {\n status: PageImportExportTaskStatus.PROCESSING\n });\n // Update stats in main task\n await pageBuilder.pageImportExportTask.updateStats(taskId, {\n prevStatus: prevStatusOfSubTask,\n nextStatus: PageImportExportTaskStatus.PROCESSING\n });\n prevStatusOfSubTask = subTask.status;\n\n log(`Extracting page data and uploading to storage...`);\n // Extract Page\n const pageDataZip = await exportPage(page, exportPagesDataKey, fileManager);\n log(`Finish uploading zip...`);\n // Update task record in DB\n subTask = await pageBuilder.pageImportExportTask.updateSubTask(taskId, subTask.id, {\n status: PageImportExportTaskStatus.COMPLETED,\n data: {\n message: `Finish uploading data for page \"${page.id}\" v${page.version} (${page.status}).`,\n key: pageDataZip.Key\n }\n });\n // Update stats in main task\n await pageBuilder.pageImportExportTask.updateStats(taskId, {\n prevStatus: prevStatusOfSubTask,\n nextStatus: PageImportExportTaskStatus.COMPLETED\n });\n prevStatusOfSubTask = subTask.status;\n } catch (e) {\n log(\"[EXPORT_PAGES_PROCESS] Error => \", e);\n\n if (subTask && subTask.id) {\n /**\n * In case of error, we'll update the task status to \"failed\",\n * so that, client can show notify the user appropriately.\n */\n subTask = await pageBuilder.pageImportExportTask.updateSubTask(\n taskId,\n subTask.id,\n {\n status: PageImportExportTaskStatus.FAILED,\n error: {\n name: e.name,\n message: e.message,\n stack: e.stack,\n code: \"EXPORT_FAILED\"\n }\n }\n );\n\n // Update stats in main task\n await pageBuilder.pageImportExportTask.updateStats(taskId, {\n prevStatus: prevStatusOfSubTask,\n nextStatus: PageImportExportTaskStatus.FAILED\n });\n prevStatusOfSubTask = subTask.status;\n }\n\n return {\n data: null,\n error: {\n message: e.message\n }\n };\n } finally {\n // Base condition!\n if (noPendingTask) {\n log(`No pending sub-task for task ${taskId}`);\n // Combine individual page zip files.\n await invokeHandlerClient<ExtractPayload>({\n context,\n name: configuration.handlers.combine,\n payload: {\n taskId,\n identity: context.security.getIdentity()\n },\n description: \"Export pages - combine\"\n });\n } else {\n console.log(`Invoking PROCESS for task \"${subTaskIndex + 1}\"`);\n // We want to continue with Self invocation no matter if current page error out.\n await invokeHandlerClient<Payload>({\n context,\n name: configuration.handlers.process,\n payload: {\n taskId,\n subTaskIndex: subTaskIndex + 1,\n identity: context.security.getIdentity()\n },\n description: \"Export pages - process - subtask\"\n });\n }\n }\n return {\n data: \"\",\n error: null\n };\n }\n );\n};\n"],"mappings":";;;;;;AAAA;AAKA;AACA;AACA;AAEA;AAEA;AACA;AAoBA;AACA;AACA;AAFA,eAGgBA,aAA4B,IAAK;EAC7C,OAAO,IAAAC,iCAAqB,EACxB,OAAO;IAAEC,OAAO;IAAEC;EAAQ,CAAC,KAAK;IAC5B,MAAMC,GAAG,GAAGC,OAAO,CAACD,GAAG;IACvB,IAAIE,OAAO;IACX,IAAIC,aAAa,GAAG,IAAI;IACxB,IAAIC,mBAAmB,GAAGC,iCAA0B,CAACC,OAAO;IAE5DN,GAAG,CAAC,sCAAsC,CAAC;IAC3C,MAAM;MAAEO,WAAW;MAAEC;IAAY,CAAC,GAAGT,OAAO;IAC5C,MAAM;MAAEU,MAAM;MAAEC,YAAY;MAAEC;IAAS,CAAC,GAAGb,OAAO;IAClD;IACA;IACA,IAAAc,0BAAY,EAACD,QAAQ,EAAsBZ,OAAO,CAAC;IAEnD,IAAI;MACA;AAChB;AACA;AACA;MACgBG,OAAO,GAAG,MAAMK,WAAW,CAACM,oBAAoB,CAACC,UAAU,CACvDL,MAAM,EACN,IAAAM,eAAO,EAACL,YAAY,EAAE,CAAC,CAAC,CAC3B;MACD;AAChB;AACA;AACA;MACgB,IAAI,CAACR,OAAO,IAAIA,OAAO,CAACc,MAAM,KAAKX,iCAA0B,CAACC,OAAO,EAAE;QACnEH,aAAa,GAAG,IAAI;QACpB,OAAO;UACHc,IAAI,EAAE,EAAE;UACRC,KAAK,EAAE;QACX,CAAC;MACL,CAAC,MAAM;QACHf,aAAa,GAAG,KAAK;MACzB;MAEAH,GAAG,CAAE,uBAAsBE,OAAO,CAACiB,EAAG,EAAC,CAAC;MAExC,MAAM;QAAEC;MAAM,CAAC,GAAGlB,OAAO;MACzB,MAAM;QAAEmB,MAAM;QAAEC,kBAAkB;QAAEC;MAAa,CAAC,GAAGH,KAAK;;MAE1D;AAChB;AACA;AACA;AACA;AACA;MACgB,IAAII,IAAI;MACR,IAAI;QACA,IAAID,YAAY,KAAKE,6BAAsB,CAACC,SAAS,EAAE;UACnD;UACAF,IAAI,GAAG,MAAMjB,WAAW,CAACoB,oBAAoB,CAAC;YAAER,EAAE,EAAEE;UAAO,CAAC,CAAC;QACjE,CAAC,MAAM;UACH;UACAG,IAAI,GAAG,MAAMjB,WAAW,CAACqB,OAAO,CAACP,MAAM,CAAC;QAC5C;MACJ,CAAC,CAAC,OAAOQ,CAAC,EAAE;QACR;QACA,IACIN,YAAY,KAAKE,6BAAsB,CAACC,SAAS,IACjDG,CAAC,YAAYC,6BAAa,EAC5B;UACEN,IAAI,GAAG,MAAMjB,WAAW,CAACqB,OAAO,CAACP,MAAM,CAAC;QAC5C,CAAC,MAAM;UACH,MAAMQ,CAAC;QACX;MACJ;MAEA,IAAI,CAACL,IAAI,EAAE;QACPxB,GAAG,CAAE,wBAAuBqB,MAAO,GAAE,CAAC;QACtC,MAAM,IAAIS,6BAAa,CAAE,wBAAuBT,MAAO,GAAE,CAAC;MAC9D;MAEArB,GAAG,CAAE,wBAAuBqB,MAAO,eAAcG,IAAI,CAACO,OAAQ,MAAKP,IAAI,CAACR,MAAO,EAAC,CAAC;;MAEjF;MACAd,OAAO,GAAG,MAAMK,WAAW,CAACM,oBAAoB,CAACmB,aAAa,CAACvB,MAAM,EAAEP,OAAO,CAACiB,EAAE,EAAE;QAC/EH,MAAM,EAAEX,iCAA0B,CAAC4B;MACvC,CAAC,CAAC;MACF;MACA,MAAM1B,WAAW,CAACM,oBAAoB,CAACqB,WAAW,CAACzB,MAAM,EAAE;QACvD0B,UAAU,EAAE/B,mBAAmB;QAC/BgC,UAAU,EAAE/B,iCAA0B,CAAC4B;MAC3C,CAAC,CAAC;MACF7B,mBAAmB,GAAGF,OAAO,CAACc,MAAM;MAEpChB,GAAG,CAAE,kDAAiD,CAAC;MACvD;MACA,MAAMqC,WAAW,GAAG,MAAM,IAAAC,iBAAU,EAACd,IAAI,EAAEF,kBAAkB,EAAEd,WAAW,CAAC;MAC3ER,GAAG,CAAE,yBAAwB,CAAC;MAC9B;MACAE,OAAO,GAAG,MAAMK,WAAW,CAACM,oBAAoB,CAACmB,aAAa,CAACvB,MAAM,EAAEP,OAAO,CAACiB,EAAE,EAAE;QAC/EH,MAAM,EAAEX,iCAA0B,CAACkC,SAAS;QAC5CtB,IAAI,EAAE;UACFuB,OAAO,EAAG,mCAAkChB,IAAI,CAACL,EAAG,MAAKK,IAAI,CAACO,OAAQ,KAAIP,IAAI,CAACR,MAAO,IAAG;UACzFyB,GAAG,EAAEJ,WAAW,CAACK;QACrB;MACJ,CAAC,CAAC;MACF;MACA,MAAMnC,WAAW,CAACM,oBAAoB,CAACqB,WAAW,CAACzB,MAAM,EAAE;QACvD0B,UAAU,EAAE/B,mBAAmB;QAC/BgC,UAAU,EAAE/B,iCAA0B,CAACkC;MAC3C,CAAC,CAAC;MACFnC,mBAAmB,GAAGF,OAAO,CAACc,MAAM;IACxC,CAAC,CAAC,OAAOa,CAAC,EAAE;MACR7B,GAAG,CAAC,kCAAkC,EAAE6B,CAAC,CAAC;MAE1C,IAAI3B,OAAO,IAAIA,OAAO,CAACiB,EAAE,EAAE;QACvB;AACpB;AACA;AACA;QACoBjB,OAAO,GAAG,MAAMK,WAAW,CAACM,oBAAoB,CAACmB,aAAa,CAC1DvB,MAAM,EACNP,OAAO,CAACiB,EAAE,EACV;UACIH,MAAM,EAAEX,iCAA0B,CAACsC,MAAM;UACzCzB,KAAK,EAAE;YACH0B,IAAI,EAAEf,CAAC,CAACe,IAAI;YACZJ,OAAO,EAAEX,CAAC,CAACW,OAAO;YAClBK,KAAK,EAAEhB,CAAC,CAACgB,KAAK;YACdC,IAAI,EAAE;UACV;QACJ,CAAC,CACJ;;QAED;QACA,MAAMvC,WAAW,CAACM,oBAAoB,CAACqB,WAAW,CAACzB,MAAM,EAAE;UACvD0B,UAAU,EAAE/B,mBAAmB;UAC/BgC,UAAU,EAAE/B,iCAA0B,CAACsC;QAC3C,CAAC,CAAC;QACFvC,mBAAmB,GAAGF,OAAO,CAACc,MAAM;MACxC;MAEA,OAAO;QACHC,IAAI,EAAE,IAAI;QACVC,KAAK,EAAE;UACHsB,OAAO,EAAEX,CAAC,CAACW;QACf;MACJ,CAAC;IACL,CAAC,SAAS;MACN;MACA,IAAIrC,aAAa,EAAE;QACfH,GAAG,CAAE,gCAA+BS,MAAO,EAAC,CAAC;QAC7C;QACA,MAAM,IAAAsC,2BAAmB,EAAiB;UACtChD,OAAO;UACP6C,IAAI,EAAEhD,aAAa,CAACoD,QAAQ,CAACC,OAAO;UACpCnD,OAAO,EAAE;YACLW,MAAM;YACNE,QAAQ,EAAEZ,OAAO,CAACmD,QAAQ,CAACC,WAAW;UAC1C,CAAC;UACDC,WAAW,EAAE;QACjB,CAAC,CAAC;MACN,CAAC,MAAM;QACHnD,OAAO,CAACD,GAAG,CAAE,8BAA6BU,YAAY,GAAG,CAAE,GAAE,CAAC;QAC9D;QACA,MAAM,IAAAqC,2BAAmB,EAAU;UAC/BhD,OAAO;UACP6C,IAAI,EAAEhD,aAAa,CAACoD,QAAQ,CAACK,OAAO;UACpCvD,OAAO,EAAE;YACLW,MAAM;YACNC,YAAY,EAAEA,YAAY,GAAG,CAAC;YAC9BC,QAAQ,EAAEZ,OAAO,CAACmD,QAAQ,CAACC,WAAW;UAC1C,CAAC;UACDC,WAAW,EAAE;QACjB,CAAC,CAAC;MACN;IACJ;IACA,OAAO;MACHnC,IAAI,EAAE,EAAE;MACRC,KAAK,EAAE;IACX,CAAC;EACL,CAAC,CACJ;AACL,CAAC;AAAA"}
|
package/exportPages/s3Stream.js
CHANGED
@@ -1,24 +1,15 @@
|
|
1
1
|
"use strict";
|
2
2
|
|
3
|
-
var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault");
|
4
|
-
|
3
|
+
var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault").default;
|
5
4
|
Object.defineProperty(exports, "__esModule", {
|
6
5
|
value: true
|
7
6
|
});
|
8
7
|
exports.s3Stream = void 0;
|
9
|
-
|
8
|
+
var _objectSpread2 = _interopRequireDefault(require("@babel/runtime/helpers/objectSpread2"));
|
10
9
|
var _defineProperty2 = _interopRequireDefault(require("@babel/runtime/helpers/defineProperty"));
|
11
|
-
|
12
10
|
var _stream = require("stream");
|
13
|
-
|
14
11
|
var _s = _interopRequireDefault(require("aws-sdk/clients/s3"));
|
15
|
-
|
16
|
-
function ownKeys(object, enumerableOnly) { var keys = Object.keys(object); if (Object.getOwnPropertySymbols) { var symbols = Object.getOwnPropertySymbols(object); enumerableOnly && (symbols = symbols.filter(function (sym) { return Object.getOwnPropertyDescriptor(object, sym).enumerable; })), keys.push.apply(keys, symbols); } return keys; }
|
17
|
-
|
18
|
-
function _objectSpread(target) { for (var i = 1; i < arguments.length; i++) { var source = null != arguments[i] ? arguments[i] : {}; i % 2 ? ownKeys(Object(source), !0).forEach(function (key) { (0, _defineProperty2.default)(target, key, source[key]); }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(target, Object.getOwnPropertyDescriptors(source)) : ownKeys(Object(source)).forEach(function (key) { Object.defineProperty(target, key, Object.getOwnPropertyDescriptor(source, key)); }); } return target; }
|
19
|
-
|
20
12
|
const ARCHIVE_CONTENT_TYPE = "application/zip";
|
21
|
-
|
22
13
|
class S3Stream {
|
23
14
|
constructor() {
|
24
15
|
(0, _defineProperty2.default)(this, "s3", void 0);
|
@@ -28,22 +19,19 @@ class S3Stream {
|
|
28
19
|
});
|
29
20
|
this.bucket = process.env.S3_BUCKET;
|
30
21
|
}
|
31
|
-
|
32
22
|
getPresignedUrl(key) {
|
33
23
|
return this.s3.getSignedUrl("getObject", {
|
34
24
|
Bucket: this.bucket,
|
35
25
|
Key: key,
|
36
26
|
Expires: 604800 // 1 week
|
37
|
-
|
38
27
|
});
|
39
28
|
}
|
29
|
+
|
40
30
|
/**
|
41
31
|
* We're checking if the file is accessible on S3 by getting object meta data.
|
42
32
|
* It help us to filter files that we need to download as part of export data.
|
43
33
|
* @param Key {string}
|
44
34
|
*/
|
45
|
-
|
46
|
-
|
47
35
|
async isFileAccessible(Key) {
|
48
36
|
try {
|
49
37
|
await this.getObjectHead(Key);
|
@@ -54,21 +42,18 @@ class S3Stream {
|
|
54
42
|
return false;
|
55
43
|
}
|
56
44
|
}
|
57
|
-
|
58
45
|
getObjectHead(Key) {
|
59
46
|
return this.s3.headObject({
|
60
47
|
Bucket: this.bucket,
|
61
48
|
Key
|
62
49
|
}).promise();
|
63
50
|
}
|
64
|
-
|
65
51
|
readStream(Key) {
|
66
52
|
return this.s3.getObject({
|
67
53
|
Bucket: this.bucket,
|
68
54
|
Key
|
69
55
|
}).createReadStream();
|
70
56
|
}
|
71
|
-
|
72
57
|
writeStream(Key, contentType = ARCHIVE_CONTENT_TYPE) {
|
73
58
|
const streamPassThrough = new _stream.Stream.PassThrough();
|
74
59
|
const params = {
|
@@ -80,36 +65,30 @@ class S3Stream {
|
|
80
65
|
};
|
81
66
|
return {
|
82
67
|
streamPassThrough: streamPassThrough,
|
83
|
-
|
84
68
|
/**
|
85
69
|
* We're not using the `FileManager` storage plugin here because it currently doesn't support streams.
|
86
70
|
*/
|
87
71
|
streamPassThroughUploadPromise: this.s3.upload(params).promise()
|
88
72
|
};
|
89
73
|
}
|
90
|
-
|
91
74
|
upload(params) {
|
92
|
-
return this.s3.upload(
|
75
|
+
return this.s3.upload((0, _objectSpread2.default)({
|
93
76
|
ACL: "private",
|
94
77
|
Bucket: this.bucket
|
95
78
|
}, params)).promise();
|
96
79
|
}
|
97
|
-
|
98
80
|
listObject(prefix) {
|
99
81
|
return this.s3.listObjects({
|
100
82
|
Bucket: this.bucket,
|
101
83
|
Prefix: prefix
|
102
84
|
}).promise();
|
103
85
|
}
|
104
|
-
|
105
86
|
deleteObject(key) {
|
106
87
|
return this.s3.deleteObject({
|
107
88
|
Key: key,
|
108
89
|
Bucket: this.bucket
|
109
90
|
}).promise();
|
110
91
|
}
|
111
|
-
|
112
92
|
}
|
113
|
-
|
114
93
|
const s3Stream = new S3Stream();
|
115
94
|
exports.s3Stream = s3Stream;
|
@@ -1 +1 @@
|
|
1
|
-
{"version":3,"names":["ARCHIVE_CONTENT_TYPE","S3Stream","constructor","s3","S3","region","process","env","AWS_REGION","bucket","S3_BUCKET","getPresignedUrl","key","getSignedUrl","Bucket","Key","Expires","isFileAccessible","getObjectHead","error","console","warn","log","headObject","promise","readStream","getObject","createReadStream","writeStream","contentType","streamPassThrough","Stream","PassThrough","params","ACL","Body","ContentType","streamPassThroughUploadPromise","upload","listObject","prefix","listObjects","Prefix","deleteObject","s3Stream"],"sources":["s3Stream.ts"],"sourcesContent":["import { Stream, PassThrough, Readable } from \"stream\";\nimport S3 from \"aws-sdk/clients/s3\";\n\nconst ARCHIVE_CONTENT_TYPE = \"application/zip\";\n\nclass S3Stream {\n s3: S3;\n bucket: string;\n\n constructor() {\n this.s3 = new S3({\n region: process.env.AWS_REGION as string\n });\n this.bucket = process.env.S3_BUCKET as string;\n }\n\n getPresignedUrl(key: string) {\n return this.s3.getSignedUrl(\"getObject\", {\n Bucket: this.bucket,\n Key: key,\n Expires: 604800 // 1 week\n });\n }\n\n /**\n * We're checking if the file is accessible on S3 by getting object meta data.\n * It help us to filter files that we need to download as part of export data.\n * @param Key {string}\n */\n async isFileAccessible(Key: string): Promise<boolean> {\n try {\n await this.getObjectHead(Key);\n return true;\n } catch (error) {\n console.warn(`Error while fetching meta data for file \"${Key}\"`);\n console.log(error);\n return false;\n }\n }\n\n getObjectHead(Key: string): Promise<S3.HeadObjectOutput> {\n return this.s3.headObject({ Bucket: this.bucket, Key }).promise();\n }\n\n readStream(Key: string): Readable {\n return this.s3.getObject({ Bucket: this.bucket, Key }).createReadStream();\n }\n\n writeStream(\n Key: string,\n contentType: string = ARCHIVE_CONTENT_TYPE\n ): {\n streamPassThrough: PassThrough;\n streamPassThroughUploadPromise: Promise<S3.ManagedUpload.SendData>;\n } {\n const streamPassThrough = new Stream.PassThrough();\n\n const params: S3.PutObjectRequest = {\n ACL: \"private\",\n Body: streamPassThrough,\n Bucket: this.bucket,\n ContentType: contentType,\n Key\n };\n\n return {\n streamPassThrough: streamPassThrough,\n /**\n * We're not using the `FileManager` storage plugin here because it currently doesn't support streams.\n */\n streamPassThroughUploadPromise: this.s3.upload(params).promise()\n };\n }\n\n upload(params: {\n Key: string;\n ContentType: string;\n Body: Buffer;\n }): Promise<S3.ManagedUpload.SendData> {\n return this.s3\n .upload({\n ACL: \"private\",\n Bucket: this.bucket,\n ...params\n })\n .promise();\n }\n\n listObject(prefix: string): Promise<S3.ListObjectsOutput> {\n return this.s3\n .listObjects({\n Bucket: this.bucket,\n Prefix: prefix\n })\n .promise();\n }\n\n deleteObject(key: string): Promise<S3.DeleteObjectOutput> {\n return this.s3.deleteObject({ Key: key, Bucket: this.bucket }).promise();\n }\n}\n\nexport const s3Stream = new S3Stream();\n"],"mappings":"
|
1
|
+
{"version":3,"names":["ARCHIVE_CONTENT_TYPE","S3Stream","constructor","s3","S3","region","process","env","AWS_REGION","bucket","S3_BUCKET","getPresignedUrl","key","getSignedUrl","Bucket","Key","Expires","isFileAccessible","getObjectHead","error","console","warn","log","headObject","promise","readStream","getObject","createReadStream","writeStream","contentType","streamPassThrough","Stream","PassThrough","params","ACL","Body","ContentType","streamPassThroughUploadPromise","upload","listObject","prefix","listObjects","Prefix","deleteObject","s3Stream"],"sources":["s3Stream.ts"],"sourcesContent":["import { Stream, PassThrough, Readable } from \"stream\";\nimport S3 from \"aws-sdk/clients/s3\";\n\nconst ARCHIVE_CONTENT_TYPE = \"application/zip\";\n\nclass S3Stream {\n s3: S3;\n bucket: string;\n\n constructor() {\n this.s3 = new S3({\n region: process.env.AWS_REGION as string\n });\n this.bucket = process.env.S3_BUCKET as string;\n }\n\n getPresignedUrl(key: string) {\n return this.s3.getSignedUrl(\"getObject\", {\n Bucket: this.bucket,\n Key: key,\n Expires: 604800 // 1 week\n });\n }\n\n /**\n * We're checking if the file is accessible on S3 by getting object meta data.\n * It help us to filter files that we need to download as part of export data.\n * @param Key {string}\n */\n async isFileAccessible(Key: string): Promise<boolean> {\n try {\n await this.getObjectHead(Key);\n return true;\n } catch (error) {\n console.warn(`Error while fetching meta data for file \"${Key}\"`);\n console.log(error);\n return false;\n }\n }\n\n getObjectHead(Key: string): Promise<S3.HeadObjectOutput> {\n return this.s3.headObject({ Bucket: this.bucket, Key }).promise();\n }\n\n readStream(Key: string): Readable {\n return this.s3.getObject({ Bucket: this.bucket, Key }).createReadStream();\n }\n\n writeStream(\n Key: string,\n contentType: string = ARCHIVE_CONTENT_TYPE\n ): {\n streamPassThrough: PassThrough;\n streamPassThroughUploadPromise: Promise<S3.ManagedUpload.SendData>;\n } {\n const streamPassThrough = new Stream.PassThrough();\n\n const params: S3.PutObjectRequest = {\n ACL: \"private\",\n Body: streamPassThrough,\n Bucket: this.bucket,\n ContentType: contentType,\n Key\n };\n\n return {\n streamPassThrough: streamPassThrough,\n /**\n * We're not using the `FileManager` storage plugin here because it currently doesn't support streams.\n */\n streamPassThroughUploadPromise: this.s3.upload(params).promise()\n };\n }\n\n upload(params: {\n Key: string;\n ContentType: string;\n Body: Buffer;\n }): Promise<S3.ManagedUpload.SendData> {\n return this.s3\n .upload({\n ACL: \"private\",\n Bucket: this.bucket,\n ...params\n })\n .promise();\n }\n\n listObject(prefix: string): Promise<S3.ListObjectsOutput> {\n return this.s3\n .listObjects({\n Bucket: this.bucket,\n Prefix: prefix\n })\n .promise();\n }\n\n deleteObject(key: string): Promise<S3.DeleteObjectOutput> {\n return this.s3.deleteObject({ Key: key, Bucket: this.bucket }).promise();\n }\n}\n\nexport const s3Stream = new S3Stream();\n"],"mappings":";;;;;;;;;AAAA;AACA;AAEA,MAAMA,oBAAoB,GAAG,iBAAiB;AAE9C,MAAMC,QAAQ,CAAC;EAIXC,WAAW,GAAG;IAAA;IAAA;IACV,IAAI,CAACC,EAAE,GAAG,IAAIC,UAAE,CAAC;MACbC,MAAM,EAAEC,OAAO,CAACC,GAAG,CAACC;IACxB,CAAC,CAAC;IACF,IAAI,CAACC,MAAM,GAAGH,OAAO,CAACC,GAAG,CAACG,SAAmB;EACjD;EAEAC,eAAe,CAACC,GAAW,EAAE;IACzB,OAAO,IAAI,CAACT,EAAE,CAACU,YAAY,CAAC,WAAW,EAAE;MACrCC,MAAM,EAAE,IAAI,CAACL,MAAM;MACnBM,GAAG,EAAEH,GAAG;MACRI,OAAO,EAAE,MAAM,CAAC;IACpB,CAAC,CAAC;EACN;;EAEA;AACJ;AACA;AACA;AACA;EACI,MAAMC,gBAAgB,CAACF,GAAW,EAAoB;IAClD,IAAI;MACA,MAAM,IAAI,CAACG,aAAa,CAACH,GAAG,CAAC;MAC7B,OAAO,IAAI;IACf,CAAC,CAAC,OAAOI,KAAK,EAAE;MACZC,OAAO,CAACC,IAAI,CAAE,4CAA2CN,GAAI,GAAE,CAAC;MAChEK,OAAO,CAACE,GAAG,CAACH,KAAK,CAAC;MAClB,OAAO,KAAK;IAChB;EACJ;EAEAD,aAAa,CAACH,GAAW,EAAgC;IACrD,OAAO,IAAI,CAACZ,EAAE,CAACoB,UAAU,CAAC;MAAET,MAAM,EAAE,IAAI,CAACL,MAAM;MAAEM;IAAI,CAAC,CAAC,CAACS,OAAO,EAAE;EACrE;EAEAC,UAAU,CAACV,GAAW,EAAY;IAC9B,OAAO,IAAI,CAACZ,EAAE,CAACuB,SAAS,CAAC;MAAEZ,MAAM,EAAE,IAAI,CAACL,MAAM;MAAEM;IAAI,CAAC,CAAC,CAACY,gBAAgB,EAAE;EAC7E;EAEAC,WAAW,CACPb,GAAW,EACXc,WAAmB,GAAG7B,oBAAoB,EAI5C;IACE,MAAM8B,iBAAiB,GAAG,IAAIC,cAAM,CAACC,WAAW,EAAE;IAElD,MAAMC,MAA2B,GAAG;MAChCC,GAAG,EAAE,SAAS;MACdC,IAAI,EAAEL,iBAAiB;MACvBhB,MAAM,EAAE,IAAI,CAACL,MAAM;MACnB2B,WAAW,EAAEP,WAAW;MACxBd;IACJ,CAAC;IAED,OAAO;MACHe,iBAAiB,EAAEA,iBAAiB;MACpC;AACZ;AACA;MACYO,8BAA8B,EAAE,IAAI,CAAClC,EAAE,CAACmC,MAAM,CAACL,MAAM,CAAC,CAACT,OAAO;IAClE,CAAC;EACL;EAEAc,MAAM,CAACL,MAIN,EAAsC;IACnC,OAAO,IAAI,CAAC9B,EAAE,CACTmC,MAAM;MACHJ,GAAG,EAAE,SAAS;MACdpB,MAAM,EAAE,IAAI,CAACL;IAAM,GAChBwB,MAAM,EACX,CACDT,OAAO,EAAE;EAClB;EAEAe,UAAU,CAACC,MAAc,EAAiC;IACtD,OAAO,IAAI,CAACrC,EAAE,CACTsC,WAAW,CAAC;MACT3B,MAAM,EAAE,IAAI,CAACL,MAAM;MACnBiC,MAAM,EAAEF;IACZ,CAAC,CAAC,CACDhB,OAAO,EAAE;EAClB;EAEAmB,YAAY,CAAC/B,GAAW,EAAkC;IACtD,OAAO,IAAI,CAACT,EAAE,CAACwC,YAAY,CAAC;MAAE5B,GAAG,EAAEH,GAAG;MAAEE,MAAM,EAAE,IAAI,CAACL;IAAO,CAAC,CAAC,CAACe,OAAO,EAAE;EAC5E;AACJ;AAEO,MAAMoB,QAAQ,GAAG,IAAI3C,QAAQ,EAAE;AAAC"}
|