eoapi-cdk 5.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. package/.devcontainer/devcontainer.json +4 -0
  2. package/.github/workflows/build.yaml +73 -0
  3. package/.github/workflows/conventional-pr.yaml +26 -0
  4. package/.github/workflows/distribute.yaml +45 -0
  5. package/.github/workflows/docs.yaml +26 -0
  6. package/.github/workflows/test.yaml +13 -0
  7. package/.github/workflows/tox.yaml +24 -0
  8. package/.jsii +5058 -0
  9. package/.nvmrc +1 -0
  10. package/CHANGELOG.md +195 -0
  11. package/README.md +50 -0
  12. package/diagrams/bastion_diagram.excalidraw +1416 -0
  13. package/diagrams/bastion_diagram.png +0 -0
  14. package/diagrams/ingestor_diagram.excalidraw +2274 -0
  15. package/diagrams/ingestor_diagram.png +0 -0
  16. package/lib/bastion-host/index.d.ts +117 -0
  17. package/lib/bastion-host/index.js +162 -0
  18. package/lib/bootstrapper/index.d.ts +57 -0
  19. package/lib/bootstrapper/index.js +73 -0
  20. package/lib/bootstrapper/runtime/Dockerfile +18 -0
  21. package/lib/bootstrapper/runtime/handler.py +235 -0
  22. package/lib/database/index.d.ts +60 -0
  23. package/lib/database/index.js +84 -0
  24. package/lib/database/instance-memory.json +525 -0
  25. package/lib/index.d.ts +6 -0
  26. package/lib/index.js +19 -0
  27. package/lib/ingestor-api/index.d.ts +54 -0
  28. package/lib/ingestor-api/index.js +147 -0
  29. package/lib/ingestor-api/runtime/dev_requirements.txt +2 -0
  30. package/lib/ingestor-api/runtime/requirements.txt +12 -0
  31. package/lib/ingestor-api/runtime/src/__init__.py +0 -0
  32. package/lib/ingestor-api/runtime/src/collection.py +36 -0
  33. package/lib/ingestor-api/runtime/src/config.py +46 -0
  34. package/lib/ingestor-api/runtime/src/dependencies.py +94 -0
  35. package/lib/ingestor-api/runtime/src/handler.py +9 -0
  36. package/lib/ingestor-api/runtime/src/ingestor.py +82 -0
  37. package/lib/ingestor-api/runtime/src/loader.py +21 -0
  38. package/lib/ingestor-api/runtime/src/main.py +125 -0
  39. package/lib/ingestor-api/runtime/src/schemas.py +148 -0
  40. package/lib/ingestor-api/runtime/src/services.py +44 -0
  41. package/lib/ingestor-api/runtime/src/utils.py +52 -0
  42. package/lib/ingestor-api/runtime/src/validators.py +72 -0
  43. package/lib/ingestor-api/runtime/tests/__init__.py +0 -0
  44. package/lib/ingestor-api/runtime/tests/conftest.py +271 -0
  45. package/lib/ingestor-api/runtime/tests/test_collection.py +35 -0
  46. package/lib/ingestor-api/runtime/tests/test_collection_endpoint.py +41 -0
  47. package/lib/ingestor-api/runtime/tests/test_ingestor.py +60 -0
  48. package/lib/ingestor-api/runtime/tests/test_registration.py +198 -0
  49. package/lib/ingestor-api/runtime/tests/test_utils.py +35 -0
  50. package/lib/stac-api/index.d.ts +50 -0
  51. package/lib/stac-api/index.js +60 -0
  52. package/lib/stac-api/runtime/requirements.txt +8 -0
  53. package/lib/stac-api/runtime/src/__init__.py +0 -0
  54. package/lib/stac-api/runtime/src/app.py +58 -0
  55. package/lib/stac-api/runtime/src/config.py +96 -0
  56. package/lib/stac-api/runtime/src/handler.py +9 -0
  57. package/lib/titiler-pgstac-api/index.d.ts +33 -0
  58. package/lib/titiler-pgstac-api/index.js +67 -0
  59. package/lib/titiler-pgstac-api/runtime/Dockerfile +20 -0
  60. package/lib/titiler-pgstac-api/runtime/dev_requirements.txt +1 -0
  61. package/lib/titiler-pgstac-api/runtime/requirements.txt +3 -0
  62. package/lib/titiler-pgstac-api/runtime/src/__init__.py +3 -0
  63. package/lib/titiler-pgstac-api/runtime/src/handler.py +23 -0
  64. package/lib/titiler-pgstac-api/runtime/src/utils.py +26 -0
  65. package/package.json +81 -0
  66. package/tox.ini +52 -0
  67. package/tsconfig.tsbuildinfo +18116 -0
@@ -0,0 +1,147 @@
1
+ "use strict";
2
+ var _a;
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.StacIngestor = void 0;
5
+ const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
6
+ const aws_cdk_lib_1 = require("aws-cdk-lib");
7
+ const aws_lambda_python_alpha_1 = require("@aws-cdk/aws-lambda-python-alpha");
8
+ const constructs_1 = require("constructs");
9
+ class StacIngestor extends constructs_1.Construct {
10
+ constructor(scope, id, props) {
11
+ super(scope, id);
12
+ this.table = this.buildTable();
13
+ const env = {
14
+ DYNAMODB_TABLE: this.table.tableName,
15
+ ROOT_PATH: `/${props.stage}`,
16
+ NO_PYDANTIC_SSM_SETTINGS: "1",
17
+ STAC_URL: props.stacUrl,
18
+ DATA_ACCESS_ROLE: props.dataAccessRole.roleArn,
19
+ ...props.apiEnv,
20
+ };
21
+ this.handlerRole = new aws_cdk_lib_1.aws_iam.Role(this, "execution-role", {
22
+ description: "Role used by STAC Ingestor. Manually defined so that we can choose a name that is supported by the data access roles trust policy",
23
+ assumedBy: new aws_cdk_lib_1.aws_iam.ServicePrincipal("lambda.amazonaws.com"),
24
+ managedPolicies: [
25
+ aws_cdk_lib_1.aws_iam.ManagedPolicy.fromAwsManagedPolicyName("service-role/AWSLambdaBasicExecutionRole"),
26
+ aws_cdk_lib_1.aws_iam.ManagedPolicy.fromAwsManagedPolicyName("service-role/AWSLambdaVPCAccessExecutionRole"),
27
+ ],
28
+ });
29
+ const handler = this.buildApiLambda({
30
+ table: this.table,
31
+ env,
32
+ dataAccessRole: props.dataAccessRole,
33
+ stage: props.stage,
34
+ dbSecret: props.stacDbSecret,
35
+ dbVpc: props.vpc,
36
+ dbSecurityGroup: props.stacDbSecurityGroup,
37
+ subnetSelection: props.subnetSelection,
38
+ });
39
+ this.buildApiEndpoint({
40
+ handler,
41
+ stage: props.stage,
42
+ endpointConfiguration: props.apiEndpointConfiguration,
43
+ policy: props.apiPolicy,
44
+ });
45
+ this.buildIngestor({
46
+ table: this.table,
47
+ env: env,
48
+ dbSecret: props.stacDbSecret,
49
+ dbVpc: props.vpc,
50
+ dbSecurityGroup: props.stacDbSecurityGroup,
51
+ subnetSelection: props.subnetSelection,
52
+ });
53
+ this.registerSsmParameter({
54
+ name: "dynamodb_table",
55
+ value: this.table.tableName,
56
+ description: "Name of table used to store ingestions",
57
+ });
58
+ }
59
+ buildTable() {
60
+ const table = new aws_cdk_lib_1.aws_dynamodb.Table(this, "ingestions-table", {
61
+ partitionKey: { name: "created_by", type: aws_cdk_lib_1.aws_dynamodb.AttributeType.STRING },
62
+ sortKey: { name: "id", type: aws_cdk_lib_1.aws_dynamodb.AttributeType.STRING },
63
+ billingMode: aws_cdk_lib_1.aws_dynamodb.BillingMode.PAY_PER_REQUEST,
64
+ removalPolicy: aws_cdk_lib_1.RemovalPolicy.DESTROY,
65
+ stream: aws_cdk_lib_1.aws_dynamodb.StreamViewType.NEW_IMAGE,
66
+ });
67
+ table.addGlobalSecondaryIndex({
68
+ indexName: "status",
69
+ partitionKey: { name: "status", type: aws_cdk_lib_1.aws_dynamodb.AttributeType.STRING },
70
+ sortKey: { name: "created_at", type: aws_cdk_lib_1.aws_dynamodb.AttributeType.STRING },
71
+ });
72
+ return table;
73
+ }
74
+ buildApiLambda(props) {
75
+ const handler = new aws_lambda_python_alpha_1.PythonFunction(this, "api-handler", {
76
+ entry: `${__dirname}/runtime`,
77
+ index: "src/handler.py",
78
+ runtime: aws_cdk_lib_1.aws_lambda.Runtime.PYTHON_3_9,
79
+ timeout: aws_cdk_lib_1.Duration.seconds(30),
80
+ environment: { DB_SECRET_ARN: props.dbSecret.secretArn, ...props.env },
81
+ vpc: props.dbVpc,
82
+ vpcSubnets: props.subnetSelection,
83
+ allowPublicSubnet: true,
84
+ role: this.handlerRole,
85
+ memorySize: 2048,
86
+ });
87
+ // Allow handler to read DB secret
88
+ props.dbSecret.grantRead(handler);
89
+ // Allow handler to connect to DB
90
+ props.dbSecurityGroup.addIngressRule(handler.connections.securityGroups[0], aws_cdk_lib_1.aws_ec2.Port.tcp(5432), "Allow connections from STAC Ingestor");
91
+ props.table.grantReadWriteData(handler);
92
+ return handler;
93
+ }
94
+ buildIngestor(props) {
95
+ const handler = new aws_lambda_python_alpha_1.PythonFunction(this, "stac-ingestor", {
96
+ entry: `${__dirname}/runtime`,
97
+ index: "src/ingestor.py",
98
+ runtime: aws_cdk_lib_1.aws_lambda.Runtime.PYTHON_3_9,
99
+ timeout: aws_cdk_lib_1.Duration.seconds(180),
100
+ environment: { DB_SECRET_ARN: props.dbSecret.secretArn, ...props.env },
101
+ vpc: props.dbVpc,
102
+ vpcSubnets: props.subnetSelection,
103
+ allowPublicSubnet: true,
104
+ memorySize: 2048,
105
+ });
106
+ // Allow handler to read DB secret
107
+ props.dbSecret.grantRead(handler);
108
+ // Allow handler to connect to DB
109
+ props.dbSecurityGroup.addIngressRule(handler.connections.securityGroups[0], aws_cdk_lib_1.aws_ec2.Port.tcp(5432), "Allow connections from STAC Ingestor");
110
+ // Allow handler to write results back to DBƒ
111
+ props.table.grantWriteData(handler);
112
+ // Trigger handler from writes to DynamoDB table
113
+ handler.addEventSource(new aws_cdk_lib_1.aws_lambda_event_sources.DynamoEventSource(props.table, {
114
+ // Read when batches reach size...
115
+ batchSize: 1000,
116
+ // ... or when window is reached.
117
+ maxBatchingWindow: aws_cdk_lib_1.Duration.seconds(10),
118
+ // Read oldest data first.
119
+ startingPosition: aws_cdk_lib_1.aws_lambda.StartingPosition.TRIM_HORIZON,
120
+ retryAttempts: 1,
121
+ }));
122
+ return handler;
123
+ }
124
+ buildApiEndpoint(props) {
125
+ return new aws_cdk_lib_1.aws_apigateway.LambdaRestApi(this, `${aws_cdk_lib_1.Stack.of(this).stackName}-ingestor-api`, {
126
+ handler: props.handler,
127
+ proxy: true,
128
+ cloudWatchRole: true,
129
+ deployOptions: { stageName: props.stage },
130
+ endpointExportName: `${aws_cdk_lib_1.Stack.of(this)}-ingestor-api`,
131
+ endpointConfiguration: props.endpointConfiguration,
132
+ policy: props.policy,
133
+ });
134
+ }
135
+ registerSsmParameter(props) {
136
+ const parameterNamespace = aws_cdk_lib_1.Stack.of(this).stackName;
137
+ return new aws_cdk_lib_1.aws_ssm.StringParameter(this, `${props.name.replace("_", "-")}-parameter`, {
138
+ description: props.description,
139
+ parameterName: `/${parameterNamespace}/${props.name}`,
140
+ stringValue: props.value,
141
+ });
142
+ }
143
+ }
144
+ exports.StacIngestor = StacIngestor;
145
+ _a = JSII_RTTI_SYMBOL_1;
146
+ StacIngestor[_a] = { fqn: "eoapi-cdk.StacIngestor", version: "5.0.0" };
147
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA,6CAYqB;AACrB,8EAAkE;AAClE,2CAAuC;AAEvC,MAAa,YAAa,SAAQ,sBAAS;IAIzC,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwB;QAChE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QAE/B,MAAM,GAAG,GAA2B;YAClC,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS;YACpC,SAAS,EAAE,IAAI,KAAK,CAAC,KAAK,EAAE;YAC5B,wBAAwB,EAAE,GAAG;YAC7B,QAAQ,EAAE,KAAK,CAAC,OAAO;YACvB,gBAAgB,EAAE,KAAK,CAAC,cAAc,CAAC,OAAO;YAC9C,GAAG,KAAK,CAAC,MAAM;SAChB,CAAC;QAEF,IAAI,CAAC,WAAW,GAAG,IAAI,qBAAG,CAAC,IAAI,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACtD,WAAW,EACT,mIAAmI;YACrI,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,sBAAsB,CAAC;YAC3D,eAAe,EAAE;gBACf,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CACxC,0CAA0C,CAC3C;gBACD,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CACxC,8CAA8C,CAC/C;aACF;SACF,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,IAAI,CAAC,cAAc,CAAC;YAClC,KAAK,EAAE,IAAI,CAAC,KAAK;YACjB,GAAG;YACH,cAAc,EAAE,KAAK,CAAC,cAAc;YACpC,KAAK,EAAE,KAAK,CAAC,KAAK;YAClB,QAAQ,EAAE,KAAK,CAAC,YAAY;YAC5B,KAAK,EAAE,KAAK,CAAC,GAAG;YAChB,eAAe,EAAE,KAAK,CAAC,mBAAmB;YAC1C,eAAe,EAAE,KAAK,CAAC,eAAe;SACvC,CAAC,CAAC;QAEH,IAAI,CAAC,gBAAgB,CAAC;YACpB,OAAO;YACP,KAAK,EAAE,KAAK,CAAC,KAAK;YAClB,qBAAqB,EAAE,KAAK,CAAC,wBAAwB;YACrD,MAAM,EAAE,KAAK,CAAC,SAAS;SACxB,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC;YACjB,KAAK,EAAE,IAAI,CAAC,KAAK;YACjB,GAAG,EAAE,GAAG;YACR,QAAQ,EAAE,KAAK,CAAC,YAAY;YAC5B,KAAK,EAAE,KAAK,CAAC,GAAG;YAChB,eAAe,EAAE,KAAK,CAAC,mBAAmB;YAC1C,eAAe,EAAE,KAAK,CAAC,eAAe;SACvC,CAAC,CAAC;QAEH,IAAI,CAAC,oBAAoB,CAAC;YACxB,IAAI,EAAE,gBAAgB;YACtB,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS;YAC3B,WAAW,EAAE,wCAAwC;SACtD,CAAC,CAAC;IACL,CAAC;IAEO,UAAU;QAChB,MAAM,KAAK,GAAG,IAAI,0BAAQ,CAAC,KAAK,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACzD,YAAY,EAAE,EAAE,IAAI,EAAE,YAAY,EAAE,IAAI,EAAE,0BAAQ,CAAC,aAAa,CAAC,MAAM,EAAE;YACzE,OAAO,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,0BAAQ,CAAC,aAAa,CAAC,MAAM,EAAE;YAC5D,WAAW,EAAE,0BAAQ,CAAC,WAAW,CAAC,eAAe;YACjD,aAAa,EAAE,2BAAa,CAAC,OAAO;YACpC,MAAM,EAAE,0BAAQ,CAAC,cAAc,CAAC,SAAS;SAC1C,CAAC,CAAC;QAEH,KAAK,CAAC,uBAAuB,CAAC;YAC5B,SAAS,EAAE,QAAQ;YACnB,YAAY,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAE,0BAAQ,CAAC,aAAa,CAAC,MAAM,EAAE;YACrE,OAAO,EAAE,EAAE,IAAI,EAAE,YAAY,EAAE,IAAI,EAAE,0BAAQ,CAAC,aAAa,CAAC,MAAM,EAAE;SACrE,CAAC,CAAC;QAEH,OAAO,KAAK,CAAC;IACf,CAAC;IAEO,cAAc,CAAC,KAStB;QAEC,MAAM,OAAO,GAAG,IAAI,wCAAc,CAAC,IAAI,EAAE,aAAa,EAAE;YACtD,KAAK,EAAE,GAAG,SAAS,UAAU;YAC7B,KAAK,EAAE,gBAAgB;YACvB,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,UAAU;YAClC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,WAAW,EAAE,EAAE,aAAa,EAAE,KAAK,CAAC,QAAQ,CAAC,SAAS,EAAE,GAAG,KAAK,CAAC,GAAG,EAAE;YACtE,GAAG,EAAE,KAAK,CAAC,KAAK;YAChB,UAAU,EAAE,KAAK,CAAC,eAAe;YACjC,iBAAiB,EAAE,IAAI;YACvB,IAAI,EAAE,IAAI,CAAC,WAAW;YACtB,UAAU,EAAE,IAAI;SACjB,CAAC,CAAC;QAEH,kCAAkC;QAClC,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAElC,iCAAiC;QACjC,KAAK,CAAC,eAAe,CAAC,cAAc,CAClC,OAAO,CAAC,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC,EACrC,qBAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,EAClB,sCAAsC,CACvC,CAAC;QAEF,KAAK,CAAC,KAAK,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;QAExC,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,aAAa,CAAC,KAOrB;QACC,MAAM,OAAO,GAAG,IAAI,wCAAc,CAAC,IAAI,EAAE,eAAe,EAAE;YACxD,KAAK,EAAE,GAAG,SAAS,UAAU;YAC7B,KAAK,EAAE,iBAAiB;YACxB,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,UAAU;YAClC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,GAAG,CAAC;YAC9B,WAAW,EAAE,EAAE,aAAa,EAAE,KAAK,CAAC,QAAQ,CAAC,SAAS,EAAE,GAAG,KAAK,CAAC,GAAG,EAAE;YACtE,GAAG,EAAE,KAAK,CAAC,KAAK;YAChB,UAAU,EAAE,KAAK,CAAC,eAAe;YACjC,iBAAiB,EAAE,IAAI;YACvB,UAAU,EAAE,IAAI;SACjB,CAAC,CAAC;QAEH,kCAAkC;QAClC,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAElC,iCAAiC;QACjC,KAAK,CAAC,eAAe,CAAC,cAAc,CAClC,OAAO,CAAC,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC,EACrC,qBAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,EAClB,sCAAsC,CACvC,CAAC;QAEF,6CAA6C;QAC7C,KAAK,CAAC,KAAK,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAEpC,gDAAgD;QAChD,OAAO,CAAC,cAAc,CACpB,IAAI,sCAAM,CAAC,iBAAiB,CAAC,KAAK,CAAC,KAAK,EAAE;YACxC,kCAAkC;YAClC,SAAS,EAAE,IAAI;YACf,iCAAiC;YACjC,iBAAiB,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACvC,0BAA0B;YAC1B,gBAAgB,EAAE,wBAAM,CAAC,gBAAgB,CAAC,YAAY;YACtD,aAAa,EAAE,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,gBAAgB,CAAC,KAKxB;QACC,OAAO,IAAI,4BAAU,CAAC,aAAa,CACjC,IAAI,EACJ,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,eAAe,EAC1C;YACE,OAAO,EAAE,KAAK,CAAC,OAAO;YACtB,KAAK,EAAE,IAAI;YAEX,cAAc,EAAE,IAAI;YACpB,aAAa,EAAE,EAAE,SAAS,EAAE,KAAK,CAAC,KAAK,EAAE;YACzC,kBAAkB,EAAE,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,eAAe;YAEpD,qBAAqB,EAAE,KAAK,CAAC,qBAAqB;YAClD,MAAM,EAAE,KAAK,CAAC,MAAM;SACrB,CACF,CAAC;IACJ,CAAC;IAEO,oBAAoB,CAAC,KAI5B;QACC,MAAM,kBAAkB,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC;QACpD,OAAO,IAAI,qBAAG,CAAC,eAAe,CAC5B,IAAI,EACJ,GAAG,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,YAAY,EAC3C;YACE,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,IAAI,kBAAkB,IAAI,KAAK,CAAC,IAAI,EAAE;YACrD,WAAW,EAAE,KAAK,CAAC,KAAK;SACzB,CACF,CAAC;IACJ,CAAC;;AAlNH,oCAmNC","sourcesContent":["import {\n  aws_apigateway as apigateway,\n  aws_dynamodb as dynamodb,\n  aws_ec2 as ec2,\n  aws_iam as iam,\n  aws_lambda as lambda,\n  aws_lambda_event_sources as events,\n  aws_secretsmanager as secretsmanager,\n  aws_ssm as ssm,\n  Duration,\n  RemovalPolicy,\n  Stack,\n} from \"aws-cdk-lib\";\nimport { PythonFunction } from \"@aws-cdk/aws-lambda-python-alpha\";\nimport { Construct } from \"constructs\";\n\nexport class StacIngestor extends Construct {\n  table: dynamodb.Table;\n  public handlerRole: iam.Role;\n\n  constructor(scope: Construct, id: string, props: StacIngestorProps) {\n    super(scope, id);\n\n    this.table = this.buildTable();\n\n    const env: Record<string, string> = {\n      DYNAMODB_TABLE: this.table.tableName,\n      ROOT_PATH: `/${props.stage}`,\n      NO_PYDANTIC_SSM_SETTINGS: \"1\",\n      STAC_URL: props.stacUrl,\n      DATA_ACCESS_ROLE: props.dataAccessRole.roleArn,\n      ...props.apiEnv,\n    };\n\n    this.handlerRole = new iam.Role(this, \"execution-role\", {\n      description:\n        \"Role used by STAC Ingestor. Manually defined so that we can choose a name that is supported by the data access roles trust policy\",\n      assumedBy: new iam.ServicePrincipal(\"lambda.amazonaws.com\"),\n      managedPolicies: [\n        iam.ManagedPolicy.fromAwsManagedPolicyName(\n          \"service-role/AWSLambdaBasicExecutionRole\",\n        ),\n        iam.ManagedPolicy.fromAwsManagedPolicyName(\n          \"service-role/AWSLambdaVPCAccessExecutionRole\",\n        ),\n      ],\n    });\n    \n    const handler = this.buildApiLambda({\n      table: this.table,\n      env,\n      dataAccessRole: props.dataAccessRole,\n      stage: props.stage,\n      dbSecret: props.stacDbSecret,\n      dbVpc: props.vpc,\n      dbSecurityGroup: props.stacDbSecurityGroup,\n      subnetSelection: props.subnetSelection,\n    });\n\n    this.buildApiEndpoint({\n      handler,\n      stage: props.stage,\n      endpointConfiguration: props.apiEndpointConfiguration,\n      policy: props.apiPolicy,\n    });\n\n    this.buildIngestor({\n      table: this.table,\n      env: env,\n      dbSecret: props.stacDbSecret,\n      dbVpc: props.vpc,\n      dbSecurityGroup: props.stacDbSecurityGroup,\n      subnetSelection: props.subnetSelection,\n    });\n\n    this.registerSsmParameter({\n      name: \"dynamodb_table\",\n      value: this.table.tableName,\n      description: \"Name of table used to store ingestions\",\n    });\n  }\n\n  private buildTable(): dynamodb.Table {\n    const table = new dynamodb.Table(this, \"ingestions-table\", {\n      partitionKey: { name: \"created_by\", type: dynamodb.AttributeType.STRING },\n      sortKey: { name: \"id\", type: dynamodb.AttributeType.STRING },\n      billingMode: dynamodb.BillingMode.PAY_PER_REQUEST,\n      removalPolicy: RemovalPolicy.DESTROY,\n      stream: dynamodb.StreamViewType.NEW_IMAGE,\n    });\n\n    table.addGlobalSecondaryIndex({\n      indexName: \"status\",\n      partitionKey: { name: \"status\", type: dynamodb.AttributeType.STRING },\n      sortKey: { name: \"created_at\", type: dynamodb.AttributeType.STRING },\n    });\n\n    return table;\n  }\n\n  private buildApiLambda(props: {\n    table: dynamodb.ITable;\n    env: Record<string, string>;\n    dataAccessRole: iam.IRole;\n    stage: string;\n    dbSecret: secretsmanager.ISecret;\n    dbVpc: ec2.IVpc;\n    dbSecurityGroup: ec2.ISecurityGroup;\n    subnetSelection: ec2.SubnetSelection\n  }): PythonFunction {\n    \n    const handler = new PythonFunction(this, \"api-handler\", {\n      entry: `${__dirname}/runtime`,\n      index: \"src/handler.py\",\n      runtime: lambda.Runtime.PYTHON_3_9,\n      timeout: Duration.seconds(30),\n      environment: { DB_SECRET_ARN: props.dbSecret.secretArn, ...props.env },\n      vpc: props.dbVpc,\n      vpcSubnets: props.subnetSelection,\n      allowPublicSubnet: true,\n      role: this.handlerRole,\n      memorySize: 2048,\n    });\n\n    // Allow handler to read DB secret\n    props.dbSecret.grantRead(handler);\n\n    // Allow handler to connect to DB\n    props.dbSecurityGroup.addIngressRule(\n      handler.connections.securityGroups[0],\n      ec2.Port.tcp(5432),\n      \"Allow connections from STAC Ingestor\"\n    );\n\n    props.table.grantReadWriteData(handler);\n\n    return handler;\n  }\n\n  private buildIngestor(props: {\n    table: dynamodb.ITable;\n    env: Record<string, string>;\n    dbSecret: secretsmanager.ISecret;\n    dbVpc: ec2.IVpc;\n    dbSecurityGroup: ec2.ISecurityGroup;\n    subnetSelection: ec2.SubnetSelection;\n  }): PythonFunction {\n    const handler = new PythonFunction(this, \"stac-ingestor\", {\n      entry: `${__dirname}/runtime`,\n      index: \"src/ingestor.py\",\n      runtime: lambda.Runtime.PYTHON_3_9,\n      timeout: Duration.seconds(180),\n      environment: { DB_SECRET_ARN: props.dbSecret.secretArn, ...props.env },\n      vpc: props.dbVpc,\n      vpcSubnets: props.subnetSelection,\n      allowPublicSubnet: true,\n      memorySize: 2048,\n    });\n\n    // Allow handler to read DB secret\n    props.dbSecret.grantRead(handler);\n\n    // Allow handler to connect to DB\n    props.dbSecurityGroup.addIngressRule(\n      handler.connections.securityGroups[0],\n      ec2.Port.tcp(5432),\n      \"Allow connections from STAC Ingestor\"\n    );\n\n    // Allow handler to write results back to DBƒ\n    props.table.grantWriteData(handler);\n\n    // Trigger handler from writes to DynamoDB table\n    handler.addEventSource(\n      new events.DynamoEventSource(props.table, {\n        // Read when batches reach size...\n        batchSize: 1000,\n        // ... or when window is reached.\n        maxBatchingWindow: Duration.seconds(10),\n        // Read oldest data first.\n        startingPosition: lambda.StartingPosition.TRIM_HORIZON,\n        retryAttempts: 1,\n      })\n    );\n\n    return handler;\n  }\n\n  private buildApiEndpoint(props: {\n    handler: lambda.IFunction;\n    stage: string;\n    policy?: iam.PolicyDocument;\n    endpointConfiguration?: apigateway.EndpointConfiguration;\n  }): apigateway.LambdaRestApi {\n    return new apigateway.LambdaRestApi(\n      this,\n      `${Stack.of(this).stackName}-ingestor-api`,\n      {\n        handler: props.handler,\n        proxy: true,\n\n        cloudWatchRole: true,\n        deployOptions: { stageName: props.stage },\n        endpointExportName: `${Stack.of(this)}-ingestor-api`,\n\n        endpointConfiguration: props.endpointConfiguration,\n        policy: props.policy,\n      }\n    );\n  }\n\n  private registerSsmParameter(props: {\n    name: string;\n    value: string;\n    description: string;\n  }): ssm.IStringParameter {\n    const parameterNamespace = Stack.of(this).stackName;\n    return new ssm.StringParameter(\n      this,\n      `${props.name.replace(\"_\", \"-\")}-parameter`,\n      {\n        description: props.description,\n        parameterName: `/${parameterNamespace}/${props.name}`,\n        stringValue: props.value,\n      }\n    );\n  }\n}\n\nexport interface StacIngestorProps {\n  /**\n   * ARN of AWS Role used to validate access to S3 data\n   */\n  readonly dataAccessRole: iam.IRole;\n\n  /**\n   * URL of STAC API\n   */\n  readonly stacUrl: string;\n\n  /**\n   * Stage of deployment (e.g. `dev`, `prod`)\n   */\n  readonly stage: string;\n\n  /**\n   * Secret containing pgSTAC DB connection information\n   */\n  readonly stacDbSecret: secretsmanager.ISecret;\n\n  /**\n   * VPC running pgSTAC DB\n   */\n  readonly vpc: ec2.IVpc;\n\n  /**\n   * Security Group used by pgSTAC DB\n   */\n  readonly stacDbSecurityGroup: ec2.ISecurityGroup;\n\n  /**\n   * Boolean indicating whether or not pgSTAC DB is in a public subnet\n   */\n  readonly subnetSelection: ec2.SubnetSelection;\n\n  /**\n   * Environment variables to be sent to Lambda.\n   */\n  readonly apiEnv?: Record<string, string>;\n\n  /**\n   * API Endpoint Configuration, useful for creating private APIs.\n   */\n  readonly apiEndpointConfiguration?: apigateway.EndpointConfiguration;\n\n  /**\n   * API Policy Document, useful for creating private APIs.\n   */\n  readonly apiPolicy?: iam.PolicyDocument;\n}\n"]}
@@ -0,0 +1,2 @@
1
+ httpx
2
+ moto[dynamodb, ssm]>=4.0.9
@@ -0,0 +1,12 @@
1
+ Authlib==1.0.1
2
+ cachetools==5.1.0
3
+ fastapi>=0.75.1
4
+ mangum>=0.15.0
5
+ orjson>=3.6.8
6
+ psycopg[binary,pool]>=3.0.15
7
+ pydantic_ssm_settings>=0.2.0
8
+ pydantic>=1.9.0
9
+ pypgstac==0.6.13
10
+ requests>=2.27.1
11
+ # Waiting for https://github.com/stac-utils/stac-pydantic/pull/116
12
+ stac-pydantic @ git+https://github.com/alukach/stac-pydantic.git@patch-1
File without changes
@@ -0,0 +1,36 @@
1
+ import os
2
+
3
+ from pypgstac.db import PgstacDB
4
+ from pypgstac.load import Methods
5
+
6
+ from .loader import Loader
7
+ from .schemas import StacCollection
8
+ from .utils import get_db_credentials
9
+
10
+
11
+ def ingest(collection: StacCollection):
12
+ """
13
+ Takes a collection model,
14
+ does necessary preprocessing,
15
+ and loads into the PgSTAC collection table
16
+ """
17
+ try:
18
+ creds = get_db_credentials(os.environ["DB_SECRET_ARN"])
19
+ with PgstacDB(dsn=creds.dsn_string, debug=True) as db:
20
+ loader = Loader(db=db)
21
+ collection = [
22
+ collection.to_dict()
23
+ ] # pypgstac wants either a string or an Iterable of dicts.
24
+ loader.load_collections(file=collection, insert_mode=Methods.upsert)
25
+ except Exception as e:
26
+ print(f"Encountered failure loading collection into pgSTAC: {e}")
27
+
28
+
29
+ def delete(collection_id: str):
30
+ """
31
+ Deletes the collection from the database
32
+ """
33
+ creds = get_db_credentials(os.environ["DB_SECRET_ARN"])
34
+ with PgstacDB(dsn=creds.dsn_string, debug=True) as db:
35
+ loader = Loader(db=db)
36
+ loader.delete_collection(collection_id)
@@ -0,0 +1,46 @@
1
+ import os
2
+ from getpass import getuser
3
+ from typing import Optional
4
+
5
+ from pydantic import AnyHttpUrl, BaseSettings, Field, constr
6
+ from pydantic_ssm_settings import AwsSsmSourceConfig
7
+
8
+ AwsArn = constr(regex=r"^arn:aws:iam::\d{12}:role/.+")
9
+
10
+
11
+ class Settings(BaseSettings):
12
+ dynamodb_table: str
13
+
14
+ root_path: Optional[str] = Field(description="Path from where to serve this URL.")
15
+
16
+ jwks_url: Optional[AnyHttpUrl] = Field(
17
+ description="URL of JWKS, e.g. https://cognito-idp.{region}.amazonaws.com/{userpool_id}/.well-known/jwks.json" # noqa
18
+ )
19
+
20
+ stac_url: AnyHttpUrl = Field(description="URL of STAC API")
21
+
22
+ data_access_role: AwsArn = Field(
23
+ description="ARN of AWS Role used to validate access to S3 data"
24
+ )
25
+
26
+ requester_pays: Optional[bool] = Field(
27
+ description="Path from where to serve this URL.", default=False
28
+ )
29
+
30
+ class Config(AwsSsmSourceConfig):
31
+ env_file = ".env"
32
+
33
+ @classmethod
34
+ def from_ssm(cls, stack: str):
35
+ return cls(_secrets_dir=f"/{stack}")
36
+
37
+
38
+ settings = (
39
+ Settings()
40
+ if os.environ.get("NO_PYDANTIC_SSM_SETTINGS")
41
+ else Settings.from_ssm(
42
+ stack=os.environ.get(
43
+ "STACK", f"veda-stac-ingestion-system-{os.environ.get('STAGE', getuser())}"
44
+ ),
45
+ )
46
+ )
@@ -0,0 +1,94 @@
1
+ import logging
2
+ from typing import Optional
3
+
4
+ import boto3
5
+ import requests
6
+ from authlib.jose import JsonWebKey, JsonWebToken, JWTClaims, KeySet, errors
7
+ from cachetools import TTLCache, cached
8
+ from fastapi import Depends, HTTPException, Request, security
9
+
10
+ from . import config, services
11
+
12
+ logger = logging.getLogger(__name__)
13
+
14
+ token_scheme = security.HTTPBearer()
15
+
16
+
17
+ def get_settings(request: Request) -> config.Settings:
18
+ return request.app.extra["settings"]
19
+
20
+
21
+ def get_jwks_url(settings: config.Settings = Depends(get_settings)) -> str:
22
+ return settings.jwks_url
23
+
24
+
25
+ @cached(TTLCache(maxsize=1, ttl=3600))
26
+ def get_jwks(jwks_url: str = Depends(get_jwks_url)) -> KeySet:
27
+ with requests.get(jwks_url) as response:
28
+ response.raise_for_status()
29
+ return JsonWebKey.import_key_set(response.json())
30
+
31
+
32
+ def decode_token(
33
+ token: security.HTTPAuthorizationCredentials = Depends(token_scheme),
34
+ jwks: KeySet = Depends(get_jwks),
35
+ ) -> JWTClaims:
36
+ """
37
+ Validate & decode JWT
38
+ """
39
+ try:
40
+ claims = JsonWebToken(["RS256"]).decode(
41
+ s=token.credentials,
42
+ key=jwks,
43
+ claims_options={
44
+ # # Example of validating audience to match expected value
45
+ # "aud": {"essential": True, "values": [APP_CLIENT_ID]}
46
+ },
47
+ )
48
+
49
+ if "client_id" in claims:
50
+ # Insert Cognito's `client_id` into `aud` claim if `aud` claim is unset
51
+ claims.setdefault("aud", claims["client_id"])
52
+
53
+ claims.validate()
54
+ return claims
55
+ except errors.JoseError: #
56
+ logger.exception("Unable to decode token")
57
+ raise HTTPException(status_code=403, detail="Bad auth token")
58
+
59
+
60
+ def get_username_from_token(
61
+ claims: Optional[security.HTTPBasicCredentials] = Depends(decode_token),
62
+ ):
63
+ return claims["sub"]
64
+
65
+
66
+ def get_username_from_request(provided_by: str):
67
+ return provided_by
68
+
69
+
70
+ get_username = (
71
+ get_username_from_token if config.settings.jwks_url else get_username_from_request
72
+ )
73
+
74
+
75
+ def get_table(settings: config.Settings = Depends(get_settings)):
76
+ client = boto3.resource("dynamodb")
77
+ return client.Table(settings.dynamodb_table)
78
+
79
+
80
+ def get_db(table=Depends(get_table)) -> services.Database:
81
+ return services.Database(table=table)
82
+
83
+
84
+ def fetch_ingestion(
85
+ ingestion_id: str,
86
+ db: services.Database = Depends(get_db),
87
+ username: str = Depends(get_username),
88
+ ):
89
+ try:
90
+ return db.fetch_one(username=username, ingestion_id=ingestion_id)
91
+ except services.NotInDb:
92
+ raise HTTPException(
93
+ status_code=404, detail="No ingestion found with provided ID"
94
+ )
@@ -0,0 +1,9 @@
1
+ """
2
+ Entrypoint for Lambda execution.
3
+ """
4
+
5
+ from mangum import Mangum
6
+
7
+ from .main import app
8
+
9
+ handler = Mangum(app, lifespan="off")
@@ -0,0 +1,82 @@
1
+ import os
2
+ from datetime import datetime
3
+ from typing import TYPE_CHECKING, Iterator, List, Optional, Sequence
4
+
5
+ from boto3.dynamodb.types import TypeDeserializer
6
+
7
+ from .config import settings
8
+ from .dependencies import get_table
9
+ from .schemas import Ingestion, Status
10
+ from .utils import get_db_credentials, load_items
11
+
12
+ if TYPE_CHECKING:
13
+ from aws_lambda_typing import context as context_
14
+ from aws_lambda_typing import events
15
+ from aws_lambda_typing.events.dynamodb_stream import DynamodbRecord
16
+
17
+
18
+ def get_queued_ingestions(records: List["DynamodbRecord"]) -> Iterator[Ingestion]:
19
+ deserializer = TypeDeserializer()
20
+ for record in records:
21
+ # Parse Record
22
+ parsed = {
23
+ k: deserializer.deserialize(v)
24
+ for k, v in record["dynamodb"]["NewImage"].items()
25
+ }
26
+ ingestion = Ingestion.parse_obj(parsed)
27
+ if ingestion.status == Status.queued:
28
+ yield ingestion
29
+
30
+
31
+ def update_dynamodb(
32
+ ingestions: Sequence[Ingestion],
33
+ status: Status,
34
+ message: Optional[str] = None,
35
+ ):
36
+ """
37
+ Bulk update DynamoDB with ingestion results.
38
+ """
39
+ # Update records in DynamoDB
40
+ print(f"Updating ingested items status in DynamoDB, marking as {status}...")
41
+ table = get_table(settings)
42
+ with table.batch_writer(overwrite_by_pkeys=["created_by", "id"]) as batch:
43
+ for ingestion in ingestions:
44
+ batch.put_item(
45
+ Item=ingestion.copy(
46
+ update={
47
+ "status": status,
48
+ "message": message,
49
+ "updated_at": datetime.now(),
50
+ }
51
+ ).dynamodb_dict()
52
+ )
53
+
54
+
55
+ def handler(event: "events.DynamoDBStreamEvent", context: "context_.Context"):
56
+ # Parse input
57
+ ingestions = list(get_queued_ingestions(event["Records"]))
58
+ if not ingestions:
59
+ print("No queued ingestions to process")
60
+ return
61
+
62
+ # Insert into PgSTAC DB
63
+ outcome = Status.succeeded
64
+ message = None
65
+ try:
66
+ load_items(
67
+ creds=get_db_credentials(os.environ["DB_SECRET_ARN"]),
68
+ ingestions=ingestions,
69
+ )
70
+ except Exception as e:
71
+ print(f"Encountered failure loading items into pgSTAC: {e}")
72
+ outcome = Status.failed
73
+ message = str(e)
74
+
75
+ # Update DynamoDB with outcome
76
+ update_dynamodb(
77
+ ingestions=ingestions,
78
+ status=outcome,
79
+ message=message,
80
+ )
81
+
82
+ print("Completed batch...")
@@ -0,0 +1,21 @@
1
+ """Utilities to bulk load data into pgstac from json/ndjson."""
2
+ import logging
3
+
4
+ from pypgstac.load import Loader as BaseLoader
5
+
6
+ logger = logging.getLogger(__name__)
7
+
8
+
9
+ class Loader(BaseLoader):
10
+ """Utilities for loading data and updating collection summaries/extents."""
11
+
12
+ def __init__(self, db) -> None:
13
+ super().__init__(db)
14
+ self.check_version()
15
+ self.conn = self.db.connect()
16
+
17
+ def delete_collection(self, collection_id: str) -> None:
18
+ with self.conn.cursor() as cur:
19
+ with self.conn.transaction():
20
+ logger.info(f"Deleting collection: {collection_id}.")
21
+ cur.execute("SELECT pgstac.delete_collection(%s);", [collection_id])
@@ -0,0 +1,125 @@
1
+ from fastapi import Depends, FastAPI, HTTPException
2
+
3
+ from . import collection as collection_loader
4
+ from . import config, dependencies, schemas, services
5
+
6
+ app = FastAPI(
7
+ root_path=config.settings.root_path,
8
+ settings=config.settings,
9
+ )
10
+
11
+
12
+ @app.get(
13
+ "/ingestions", response_model=schemas.ListIngestionResponse, tags=["Ingestion"]
14
+ )
15
+ async def list_ingestions(
16
+ list_request: schemas.ListIngestionRequest = Depends(),
17
+ db: services.Database = Depends(dependencies.get_db),
18
+ ):
19
+ return db.fetch_many(
20
+ status=list_request.status, next=list_request.next, limit=list_request.limit
21
+ )
22
+
23
+
24
+ @app.post(
25
+ "/ingestions",
26
+ response_model=schemas.Ingestion,
27
+ tags=["Ingestion"],
28
+ status_code=201,
29
+ )
30
+ async def create_ingestion(
31
+ item: schemas.AccessibleItem,
32
+ username: str = Depends(dependencies.get_username),
33
+ db: services.Database = Depends(dependencies.get_db),
34
+ ) -> schemas.Ingestion:
35
+ return schemas.Ingestion(
36
+ id=item.id,
37
+ created_by=username,
38
+ item=item,
39
+ status=schemas.Status.queued,
40
+ ).enqueue(db)
41
+
42
+
43
+ @app.get(
44
+ "/ingestions/{ingestion_id}",
45
+ response_model=schemas.Ingestion,
46
+ tags=["Ingestion"],
47
+ )
48
+ def get_ingestion(
49
+ ingestion: schemas.Ingestion = Depends(dependencies.fetch_ingestion),
50
+ ) -> schemas.Ingestion:
51
+ return ingestion
52
+
53
+
54
+ @app.patch(
55
+ "/ingestions/{ingestion_id}",
56
+ response_model=schemas.Ingestion,
57
+ tags=["Ingestion"],
58
+ )
59
+ def update_ingestion(
60
+ update: schemas.UpdateIngestionRequest,
61
+ ingestion: schemas.Ingestion = Depends(dependencies.fetch_ingestion),
62
+ db: services.Database = Depends(dependencies.get_db),
63
+ ):
64
+ updated_item = ingestion.copy(update=update.dict(exclude_unset=True))
65
+ return updated_item.save(db)
66
+
67
+
68
+ @app.delete(
69
+ "/ingestions/{ingestion_id}",
70
+ response_model=schemas.Ingestion,
71
+ tags=["Ingestion"],
72
+ )
73
+ def cancel_ingestion(
74
+ ingestion: schemas.Ingestion = Depends(dependencies.fetch_ingestion),
75
+ db: services.Database = Depends(dependencies.get_db),
76
+ ) -> schemas.Ingestion:
77
+ if ingestion.status != schemas.Status.queued:
78
+ raise HTTPException(
79
+ status_code=400,
80
+ detail=(
81
+ "Unable to delete ingestion if status is not "
82
+ f"{schemas.Status.queued}"
83
+ ),
84
+ )
85
+ return ingestion.cancel(db)
86
+
87
+
88
+ @app.post(
89
+ "/collections",
90
+ tags=["Collection"],
91
+ status_code=201,
92
+ dependencies=[Depends(dependencies.get_username)],
93
+ )
94
+ def publish_collection(collection: schemas.StacCollection):
95
+ # pgstac create collection
96
+ try:
97
+ collection_loader.ingest(collection)
98
+ return {f"Successfully published: {collection.id}"}
99
+ except Exception as e:
100
+ raise HTTPException(
101
+ status_code=400,
102
+ detail=(f"Unable to publish collection: {e}"),
103
+ )
104
+
105
+
106
+ @app.delete(
107
+ "/collections/{collection_id}",
108
+ tags=["Collection"],
109
+ dependencies=[Depends(dependencies.get_username)],
110
+ )
111
+ def delete_collection(collection_id: str):
112
+ try:
113
+ collection_loader.delete(collection_id=collection_id)
114
+ return {f"Successfully deleted: {collection_id}"}
115
+ except Exception as e:
116
+ print(e)
117
+ raise HTTPException(status_code=400, detail=(f"{e}"))
118
+
119
+
120
+ @app.get("/auth/me")
121
+ def who_am_i(username=Depends(dependencies.get_username)):
122
+ """
123
+ Return username for the provided request
124
+ """
125
+ return {"username": username}