eoapi-cdk 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.devcontainer/devcontainer.json +4 -0
- package/.github/workflows/build.yaml +73 -0
- package/.github/workflows/conventional-pr.yaml +26 -0
- package/.github/workflows/distribute.yaml +45 -0
- package/.github/workflows/docs.yaml +26 -0
- package/.github/workflows/test.yaml +13 -0
- package/.github/workflows/tox.yaml +24 -0
- package/.jsii +5058 -0
- package/.nvmrc +1 -0
- package/CHANGELOG.md +195 -0
- package/README.md +50 -0
- package/diagrams/bastion_diagram.excalidraw +1416 -0
- package/diagrams/bastion_diagram.png +0 -0
- package/diagrams/ingestor_diagram.excalidraw +2274 -0
- package/diagrams/ingestor_diagram.png +0 -0
- package/lib/bastion-host/index.d.ts +117 -0
- package/lib/bastion-host/index.js +162 -0
- package/lib/bootstrapper/index.d.ts +57 -0
- package/lib/bootstrapper/index.js +73 -0
- package/lib/bootstrapper/runtime/Dockerfile +18 -0
- package/lib/bootstrapper/runtime/handler.py +235 -0
- package/lib/database/index.d.ts +60 -0
- package/lib/database/index.js +84 -0
- package/lib/database/instance-memory.json +525 -0
- package/lib/index.d.ts +6 -0
- package/lib/index.js +19 -0
- package/lib/ingestor-api/index.d.ts +54 -0
- package/lib/ingestor-api/index.js +147 -0
- package/lib/ingestor-api/runtime/dev_requirements.txt +2 -0
- package/lib/ingestor-api/runtime/requirements.txt +12 -0
- package/lib/ingestor-api/runtime/src/__init__.py +0 -0
- package/lib/ingestor-api/runtime/src/collection.py +36 -0
- package/lib/ingestor-api/runtime/src/config.py +46 -0
- package/lib/ingestor-api/runtime/src/dependencies.py +94 -0
- package/lib/ingestor-api/runtime/src/handler.py +9 -0
- package/lib/ingestor-api/runtime/src/ingestor.py +82 -0
- package/lib/ingestor-api/runtime/src/loader.py +21 -0
- package/lib/ingestor-api/runtime/src/main.py +125 -0
- package/lib/ingestor-api/runtime/src/schemas.py +148 -0
- package/lib/ingestor-api/runtime/src/services.py +44 -0
- package/lib/ingestor-api/runtime/src/utils.py +52 -0
- package/lib/ingestor-api/runtime/src/validators.py +72 -0
- package/lib/ingestor-api/runtime/tests/__init__.py +0 -0
- package/lib/ingestor-api/runtime/tests/conftest.py +271 -0
- package/lib/ingestor-api/runtime/tests/test_collection.py +35 -0
- package/lib/ingestor-api/runtime/tests/test_collection_endpoint.py +41 -0
- package/lib/ingestor-api/runtime/tests/test_ingestor.py +60 -0
- package/lib/ingestor-api/runtime/tests/test_registration.py +198 -0
- package/lib/ingestor-api/runtime/tests/test_utils.py +35 -0
- package/lib/stac-api/index.d.ts +50 -0
- package/lib/stac-api/index.js +60 -0
- package/lib/stac-api/runtime/requirements.txt +8 -0
- package/lib/stac-api/runtime/src/__init__.py +0 -0
- package/lib/stac-api/runtime/src/app.py +58 -0
- package/lib/stac-api/runtime/src/config.py +96 -0
- package/lib/stac-api/runtime/src/handler.py +9 -0
- package/lib/titiler-pgstac-api/index.d.ts +33 -0
- package/lib/titiler-pgstac-api/index.js +67 -0
- package/lib/titiler-pgstac-api/runtime/Dockerfile +20 -0
- package/lib/titiler-pgstac-api/runtime/dev_requirements.txt +1 -0
- package/lib/titiler-pgstac-api/runtime/requirements.txt +3 -0
- package/lib/titiler-pgstac-api/runtime/src/__init__.py +3 -0
- package/lib/titiler-pgstac-api/runtime/src/handler.py +23 -0
- package/lib/titiler-pgstac-api/runtime/src/utils.py +26 -0
- package/package.json +81 -0
- package/tox.ini +52 -0
- package/tsconfig.tsbuildinfo +18116 -0
|
@@ -0,0 +1,147 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
var _a;
|
|
3
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
4
|
+
exports.StacIngestor = void 0;
|
|
5
|
+
const JSII_RTTI_SYMBOL_1 = Symbol.for("jsii.rtti");
|
|
6
|
+
const aws_cdk_lib_1 = require("aws-cdk-lib");
|
|
7
|
+
const aws_lambda_python_alpha_1 = require("@aws-cdk/aws-lambda-python-alpha");
|
|
8
|
+
const constructs_1 = require("constructs");
|
|
9
|
+
class StacIngestor extends constructs_1.Construct {
|
|
10
|
+
constructor(scope, id, props) {
|
|
11
|
+
super(scope, id);
|
|
12
|
+
this.table = this.buildTable();
|
|
13
|
+
const env = {
|
|
14
|
+
DYNAMODB_TABLE: this.table.tableName,
|
|
15
|
+
ROOT_PATH: `/${props.stage}`,
|
|
16
|
+
NO_PYDANTIC_SSM_SETTINGS: "1",
|
|
17
|
+
STAC_URL: props.stacUrl,
|
|
18
|
+
DATA_ACCESS_ROLE: props.dataAccessRole.roleArn,
|
|
19
|
+
...props.apiEnv,
|
|
20
|
+
};
|
|
21
|
+
this.handlerRole = new aws_cdk_lib_1.aws_iam.Role(this, "execution-role", {
|
|
22
|
+
description: "Role used by STAC Ingestor. Manually defined so that we can choose a name that is supported by the data access roles trust policy",
|
|
23
|
+
assumedBy: new aws_cdk_lib_1.aws_iam.ServicePrincipal("lambda.amazonaws.com"),
|
|
24
|
+
managedPolicies: [
|
|
25
|
+
aws_cdk_lib_1.aws_iam.ManagedPolicy.fromAwsManagedPolicyName("service-role/AWSLambdaBasicExecutionRole"),
|
|
26
|
+
aws_cdk_lib_1.aws_iam.ManagedPolicy.fromAwsManagedPolicyName("service-role/AWSLambdaVPCAccessExecutionRole"),
|
|
27
|
+
],
|
|
28
|
+
});
|
|
29
|
+
const handler = this.buildApiLambda({
|
|
30
|
+
table: this.table,
|
|
31
|
+
env,
|
|
32
|
+
dataAccessRole: props.dataAccessRole,
|
|
33
|
+
stage: props.stage,
|
|
34
|
+
dbSecret: props.stacDbSecret,
|
|
35
|
+
dbVpc: props.vpc,
|
|
36
|
+
dbSecurityGroup: props.stacDbSecurityGroup,
|
|
37
|
+
subnetSelection: props.subnetSelection,
|
|
38
|
+
});
|
|
39
|
+
this.buildApiEndpoint({
|
|
40
|
+
handler,
|
|
41
|
+
stage: props.stage,
|
|
42
|
+
endpointConfiguration: props.apiEndpointConfiguration,
|
|
43
|
+
policy: props.apiPolicy,
|
|
44
|
+
});
|
|
45
|
+
this.buildIngestor({
|
|
46
|
+
table: this.table,
|
|
47
|
+
env: env,
|
|
48
|
+
dbSecret: props.stacDbSecret,
|
|
49
|
+
dbVpc: props.vpc,
|
|
50
|
+
dbSecurityGroup: props.stacDbSecurityGroup,
|
|
51
|
+
subnetSelection: props.subnetSelection,
|
|
52
|
+
});
|
|
53
|
+
this.registerSsmParameter({
|
|
54
|
+
name: "dynamodb_table",
|
|
55
|
+
value: this.table.tableName,
|
|
56
|
+
description: "Name of table used to store ingestions",
|
|
57
|
+
});
|
|
58
|
+
}
|
|
59
|
+
buildTable() {
|
|
60
|
+
const table = new aws_cdk_lib_1.aws_dynamodb.Table(this, "ingestions-table", {
|
|
61
|
+
partitionKey: { name: "created_by", type: aws_cdk_lib_1.aws_dynamodb.AttributeType.STRING },
|
|
62
|
+
sortKey: { name: "id", type: aws_cdk_lib_1.aws_dynamodb.AttributeType.STRING },
|
|
63
|
+
billingMode: aws_cdk_lib_1.aws_dynamodb.BillingMode.PAY_PER_REQUEST,
|
|
64
|
+
removalPolicy: aws_cdk_lib_1.RemovalPolicy.DESTROY,
|
|
65
|
+
stream: aws_cdk_lib_1.aws_dynamodb.StreamViewType.NEW_IMAGE,
|
|
66
|
+
});
|
|
67
|
+
table.addGlobalSecondaryIndex({
|
|
68
|
+
indexName: "status",
|
|
69
|
+
partitionKey: { name: "status", type: aws_cdk_lib_1.aws_dynamodb.AttributeType.STRING },
|
|
70
|
+
sortKey: { name: "created_at", type: aws_cdk_lib_1.aws_dynamodb.AttributeType.STRING },
|
|
71
|
+
});
|
|
72
|
+
return table;
|
|
73
|
+
}
|
|
74
|
+
buildApiLambda(props) {
|
|
75
|
+
const handler = new aws_lambda_python_alpha_1.PythonFunction(this, "api-handler", {
|
|
76
|
+
entry: `${__dirname}/runtime`,
|
|
77
|
+
index: "src/handler.py",
|
|
78
|
+
runtime: aws_cdk_lib_1.aws_lambda.Runtime.PYTHON_3_9,
|
|
79
|
+
timeout: aws_cdk_lib_1.Duration.seconds(30),
|
|
80
|
+
environment: { DB_SECRET_ARN: props.dbSecret.secretArn, ...props.env },
|
|
81
|
+
vpc: props.dbVpc,
|
|
82
|
+
vpcSubnets: props.subnetSelection,
|
|
83
|
+
allowPublicSubnet: true,
|
|
84
|
+
role: this.handlerRole,
|
|
85
|
+
memorySize: 2048,
|
|
86
|
+
});
|
|
87
|
+
// Allow handler to read DB secret
|
|
88
|
+
props.dbSecret.grantRead(handler);
|
|
89
|
+
// Allow handler to connect to DB
|
|
90
|
+
props.dbSecurityGroup.addIngressRule(handler.connections.securityGroups[0], aws_cdk_lib_1.aws_ec2.Port.tcp(5432), "Allow connections from STAC Ingestor");
|
|
91
|
+
props.table.grantReadWriteData(handler);
|
|
92
|
+
return handler;
|
|
93
|
+
}
|
|
94
|
+
buildIngestor(props) {
|
|
95
|
+
const handler = new aws_lambda_python_alpha_1.PythonFunction(this, "stac-ingestor", {
|
|
96
|
+
entry: `${__dirname}/runtime`,
|
|
97
|
+
index: "src/ingestor.py",
|
|
98
|
+
runtime: aws_cdk_lib_1.aws_lambda.Runtime.PYTHON_3_9,
|
|
99
|
+
timeout: aws_cdk_lib_1.Duration.seconds(180),
|
|
100
|
+
environment: { DB_SECRET_ARN: props.dbSecret.secretArn, ...props.env },
|
|
101
|
+
vpc: props.dbVpc,
|
|
102
|
+
vpcSubnets: props.subnetSelection,
|
|
103
|
+
allowPublicSubnet: true,
|
|
104
|
+
memorySize: 2048,
|
|
105
|
+
});
|
|
106
|
+
// Allow handler to read DB secret
|
|
107
|
+
props.dbSecret.grantRead(handler);
|
|
108
|
+
// Allow handler to connect to DB
|
|
109
|
+
props.dbSecurityGroup.addIngressRule(handler.connections.securityGroups[0], aws_cdk_lib_1.aws_ec2.Port.tcp(5432), "Allow connections from STAC Ingestor");
|
|
110
|
+
// Allow handler to write results back to DBƒ
|
|
111
|
+
props.table.grantWriteData(handler);
|
|
112
|
+
// Trigger handler from writes to DynamoDB table
|
|
113
|
+
handler.addEventSource(new aws_cdk_lib_1.aws_lambda_event_sources.DynamoEventSource(props.table, {
|
|
114
|
+
// Read when batches reach size...
|
|
115
|
+
batchSize: 1000,
|
|
116
|
+
// ... or when window is reached.
|
|
117
|
+
maxBatchingWindow: aws_cdk_lib_1.Duration.seconds(10),
|
|
118
|
+
// Read oldest data first.
|
|
119
|
+
startingPosition: aws_cdk_lib_1.aws_lambda.StartingPosition.TRIM_HORIZON,
|
|
120
|
+
retryAttempts: 1,
|
|
121
|
+
}));
|
|
122
|
+
return handler;
|
|
123
|
+
}
|
|
124
|
+
buildApiEndpoint(props) {
|
|
125
|
+
return new aws_cdk_lib_1.aws_apigateway.LambdaRestApi(this, `${aws_cdk_lib_1.Stack.of(this).stackName}-ingestor-api`, {
|
|
126
|
+
handler: props.handler,
|
|
127
|
+
proxy: true,
|
|
128
|
+
cloudWatchRole: true,
|
|
129
|
+
deployOptions: { stageName: props.stage },
|
|
130
|
+
endpointExportName: `${aws_cdk_lib_1.Stack.of(this)}-ingestor-api`,
|
|
131
|
+
endpointConfiguration: props.endpointConfiguration,
|
|
132
|
+
policy: props.policy,
|
|
133
|
+
});
|
|
134
|
+
}
|
|
135
|
+
registerSsmParameter(props) {
|
|
136
|
+
const parameterNamespace = aws_cdk_lib_1.Stack.of(this).stackName;
|
|
137
|
+
return new aws_cdk_lib_1.aws_ssm.StringParameter(this, `${props.name.replace("_", "-")}-parameter`, {
|
|
138
|
+
description: props.description,
|
|
139
|
+
parameterName: `/${parameterNamespace}/${props.name}`,
|
|
140
|
+
stringValue: props.value,
|
|
141
|
+
});
|
|
142
|
+
}
|
|
143
|
+
}
|
|
144
|
+
exports.StacIngestor = StacIngestor;
|
|
145
|
+
_a = JSII_RTTI_SYMBOL_1;
|
|
146
|
+
StacIngestor[_a] = { fqn: "eoapi-cdk.StacIngestor", version: "5.0.0" };
|
|
147
|
+
//# sourceMappingURL=data:application/json;base64,{"version":3,"file":"index.js","sourceRoot":"","sources":["index.ts"],"names":[],"mappings":";;;;;AAAA,6CAYqB;AACrB,8EAAkE;AAClE,2CAAuC;AAEvC,MAAa,YAAa,SAAQ,sBAAS;IAIzC,YAAY,KAAgB,EAAE,EAAU,EAAE,KAAwB;QAChE,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC,CAAC;QAEjB,IAAI,CAAC,KAAK,GAAG,IAAI,CAAC,UAAU,EAAE,CAAC;QAE/B,MAAM,GAAG,GAA2B;YAClC,cAAc,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS;YACpC,SAAS,EAAE,IAAI,KAAK,CAAC,KAAK,EAAE;YAC5B,wBAAwB,EAAE,GAAG;YAC7B,QAAQ,EAAE,KAAK,CAAC,OAAO;YACvB,gBAAgB,EAAE,KAAK,CAAC,cAAc,CAAC,OAAO;YAC9C,GAAG,KAAK,CAAC,MAAM;SAChB,CAAC;QAEF,IAAI,CAAC,WAAW,GAAG,IAAI,qBAAG,CAAC,IAAI,CAAC,IAAI,EAAE,gBAAgB,EAAE;YACtD,WAAW,EACT,mIAAmI;YACrI,SAAS,EAAE,IAAI,qBAAG,CAAC,gBAAgB,CAAC,sBAAsB,CAAC;YAC3D,eAAe,EAAE;gBACf,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CACxC,0CAA0C,CAC3C;gBACD,qBAAG,CAAC,aAAa,CAAC,wBAAwB,CACxC,8CAA8C,CAC/C;aACF;SACF,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,IAAI,CAAC,cAAc,CAAC;YAClC,KAAK,EAAE,IAAI,CAAC,KAAK;YACjB,GAAG;YACH,cAAc,EAAE,KAAK,CAAC,cAAc;YACpC,KAAK,EAAE,KAAK,CAAC,KAAK;YAClB,QAAQ,EAAE,KAAK,CAAC,YAAY;YAC5B,KAAK,EAAE,KAAK,CAAC,GAAG;YAChB,eAAe,EAAE,KAAK,CAAC,mBAAmB;YAC1C,eAAe,EAAE,KAAK,CAAC,eAAe;SACvC,CAAC,CAAC;QAEH,IAAI,CAAC,gBAAgB,CAAC;YACpB,OAAO;YACP,KAAK,EAAE,KAAK,CAAC,KAAK;YAClB,qBAAqB,EAAE,KAAK,CAAC,wBAAwB;YACrD,MAAM,EAAE,KAAK,CAAC,SAAS;SACxB,CAAC,CAAC;QAEH,IAAI,CAAC,aAAa,CAAC;YACjB,KAAK,EAAE,IAAI,CAAC,KAAK;YACjB,GAAG,EAAE,GAAG;YACR,QAAQ,EAAE,KAAK,CAAC,YAAY;YAC5B,KAAK,EAAE,KAAK,CAAC,GAAG;YAChB,eAAe,EAAE,KAAK,CAAC,mBAAmB;YAC1C,eAAe,EAAE,KAAK,CAAC,eAAe;SACvC,CAAC,CAAC;QAEH,IAAI,CAAC,oBAAoB,CAAC;YACxB,IAAI,EAAE,gBAAgB;YACtB,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS;YAC3B,WAAW,EAAE,wCAAwC;SACtD,CAAC,CAAC;IACL,CAAC;IAEO,UAAU;QAChB,MAAM,KAAK,GAAG,IAAI,0BAAQ,CAAC,KAAK,CAAC,IAAI,EAAE,kBAAkB,EAAE;YACzD,YAAY,EAAE,EAAE,IAAI,EAAE,YAAY,EAAE,IAAI,EAAE,0BAAQ,CAAC,aAAa,CAAC,MAAM,EAAE;YACzE,OAAO,EAAE,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,0BAAQ,CAAC,aAAa,CAAC,MAAM,EAAE;YAC5D,WAAW,EAAE,0BAAQ,CAAC,WAAW,CAAC,eAAe;YACjD,aAAa,EAAE,2BAAa,CAAC,OAAO;YACpC,MAAM,EAAE,0BAAQ,CAAC,cAAc,CAAC,SAAS;SAC1C,CAAC,CAAC;QAEH,KAAK,CAAC,uBAAuB,CAAC;YAC5B,SAAS,EAAE,QAAQ;YACnB,YAAY,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE,IAAI,EAAE,0BAAQ,CAAC,aAAa,CAAC,MAAM,EAAE;YACrE,OAAO,EAAE,EAAE,IAAI,EAAE,YAAY,EAAE,IAAI,EAAE,0BAAQ,CAAC,aAAa,CAAC,MAAM,EAAE;SACrE,CAAC,CAAC;QAEH,OAAO,KAAK,CAAC;IACf,CAAC;IAEO,cAAc,CAAC,KAStB;QAEC,MAAM,OAAO,GAAG,IAAI,wCAAc,CAAC,IAAI,EAAE,aAAa,EAAE;YACtD,KAAK,EAAE,GAAG,SAAS,UAAU;YAC7B,KAAK,EAAE,gBAAgB;YACvB,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,UAAU;YAClC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YAC7B,WAAW,EAAE,EAAE,aAAa,EAAE,KAAK,CAAC,QAAQ,CAAC,SAAS,EAAE,GAAG,KAAK,CAAC,GAAG,EAAE;YACtE,GAAG,EAAE,KAAK,CAAC,KAAK;YAChB,UAAU,EAAE,KAAK,CAAC,eAAe;YACjC,iBAAiB,EAAE,IAAI;YACvB,IAAI,EAAE,IAAI,CAAC,WAAW;YACtB,UAAU,EAAE,IAAI;SACjB,CAAC,CAAC;QAEH,kCAAkC;QAClC,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAElC,iCAAiC;QACjC,KAAK,CAAC,eAAe,CAAC,cAAc,CAClC,OAAO,CAAC,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC,EACrC,qBAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,EAClB,sCAAsC,CACvC,CAAC;QAEF,KAAK,CAAC,KAAK,CAAC,kBAAkB,CAAC,OAAO,CAAC,CAAC;QAExC,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,aAAa,CAAC,KAOrB;QACC,MAAM,OAAO,GAAG,IAAI,wCAAc,CAAC,IAAI,EAAE,eAAe,EAAE;YACxD,KAAK,EAAE,GAAG,SAAS,UAAU;YAC7B,KAAK,EAAE,iBAAiB;YACxB,OAAO,EAAE,wBAAM,CAAC,OAAO,CAAC,UAAU;YAClC,OAAO,EAAE,sBAAQ,CAAC,OAAO,CAAC,GAAG,CAAC;YAC9B,WAAW,EAAE,EAAE,aAAa,EAAE,KAAK,CAAC,QAAQ,CAAC,SAAS,EAAE,GAAG,KAAK,CAAC,GAAG,EAAE;YACtE,GAAG,EAAE,KAAK,CAAC,KAAK;YAChB,UAAU,EAAE,KAAK,CAAC,eAAe;YACjC,iBAAiB,EAAE,IAAI;YACvB,UAAU,EAAE,IAAI;SACjB,CAAC,CAAC;QAEH,kCAAkC;QAClC,KAAK,CAAC,QAAQ,CAAC,SAAS,CAAC,OAAO,CAAC,CAAC;QAElC,iCAAiC;QACjC,KAAK,CAAC,eAAe,CAAC,cAAc,CAClC,OAAO,CAAC,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC,EACrC,qBAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,EAClB,sCAAsC,CACvC,CAAC;QAEF,6CAA6C;QAC7C,KAAK,CAAC,KAAK,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAEpC,gDAAgD;QAChD,OAAO,CAAC,cAAc,CACpB,IAAI,sCAAM,CAAC,iBAAiB,CAAC,KAAK,CAAC,KAAK,EAAE;YACxC,kCAAkC;YAClC,SAAS,EAAE,IAAI;YACf,iCAAiC;YACjC,iBAAiB,EAAE,sBAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;YACvC,0BAA0B;YAC1B,gBAAgB,EAAE,wBAAM,CAAC,gBAAgB,CAAC,YAAY;YACtD,aAAa,EAAE,CAAC;SACjB,CAAC,CACH,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAEO,gBAAgB,CAAC,KAKxB;QACC,OAAO,IAAI,4BAAU,CAAC,aAAa,CACjC,IAAI,EACJ,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,eAAe,EAC1C;YACE,OAAO,EAAE,KAAK,CAAC,OAAO;YACtB,KAAK,EAAE,IAAI;YAEX,cAAc,EAAE,IAAI;YACpB,aAAa,EAAE,EAAE,SAAS,EAAE,KAAK,CAAC,KAAK,EAAE;YACzC,kBAAkB,EAAE,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,eAAe;YAEpD,qBAAqB,EAAE,KAAK,CAAC,qBAAqB;YAClD,MAAM,EAAE,KAAK,CAAC,MAAM;SACrB,CACF,CAAC;IACJ,CAAC;IAEO,oBAAoB,CAAC,KAI5B;QACC,MAAM,kBAAkB,GAAG,mBAAK,CAAC,EAAE,CAAC,IAAI,CAAC,CAAC,SAAS,CAAC;QACpD,OAAO,IAAI,qBAAG,CAAC,eAAe,CAC5B,IAAI,EACJ,GAAG,KAAK,CAAC,IAAI,CAAC,OAAO,CAAC,GAAG,EAAE,GAAG,CAAC,YAAY,EAC3C;YACE,WAAW,EAAE,KAAK,CAAC,WAAW;YAC9B,aAAa,EAAE,IAAI,kBAAkB,IAAI,KAAK,CAAC,IAAI,EAAE;YACrD,WAAW,EAAE,KAAK,CAAC,KAAK;SACzB,CACF,CAAC;IACJ,CAAC;;AAlNH,oCAmNC","sourcesContent":["import {\n  aws_apigateway as apigateway,\n  aws_dynamodb as dynamodb,\n  aws_ec2 as ec2,\n  aws_iam as iam,\n  aws_lambda as lambda,\n  aws_lambda_event_sources as events,\n  aws_secretsmanager as secretsmanager,\n  aws_ssm as ssm,\n  Duration,\n  RemovalPolicy,\n  Stack,\n} from \"aws-cdk-lib\";\nimport { PythonFunction } from \"@aws-cdk/aws-lambda-python-alpha\";\nimport { Construct } from \"constructs\";\n\nexport class StacIngestor extends Construct {\n  table: dynamodb.Table;\n  public handlerRole: iam.Role;\n\n  constructor(scope: Construct, id: string, props: StacIngestorProps) {\n    super(scope, id);\n\n    this.table = this.buildTable();\n\n    const env: Record<string, string> = {\n      DYNAMODB_TABLE: this.table.tableName,\n      ROOT_PATH: `/${props.stage}`,\n      NO_PYDANTIC_SSM_SETTINGS: \"1\",\n      STAC_URL: props.stacUrl,\n      DATA_ACCESS_ROLE: props.dataAccessRole.roleArn,\n      ...props.apiEnv,\n    };\n\n    this.handlerRole = new iam.Role(this, \"execution-role\", {\n      description:\n        \"Role used by STAC Ingestor. Manually defined so that we can choose a name that is supported by the data access roles trust policy\",\n      assumedBy: new iam.ServicePrincipal(\"lambda.amazonaws.com\"),\n      managedPolicies: [\n        iam.ManagedPolicy.fromAwsManagedPolicyName(\n          \"service-role/AWSLambdaBasicExecutionRole\",\n        ),\n        iam.ManagedPolicy.fromAwsManagedPolicyName(\n          \"service-role/AWSLambdaVPCAccessExecutionRole\",\n        ),\n      ],\n    });\n    \n    const handler = this.buildApiLambda({\n      table: this.table,\n      env,\n      dataAccessRole: props.dataAccessRole,\n      stage: props.stage,\n      dbSecret: props.stacDbSecret,\n      dbVpc: props.vpc,\n      dbSecurityGroup: props.stacDbSecurityGroup,\n      subnetSelection: props.subnetSelection,\n    });\n\n    this.buildApiEndpoint({\n      handler,\n      stage: props.stage,\n      endpointConfiguration: props.apiEndpointConfiguration,\n      policy: props.apiPolicy,\n    });\n\n    this.buildIngestor({\n      table: this.table,\n      env: env,\n      dbSecret: props.stacDbSecret,\n      dbVpc: props.vpc,\n      dbSecurityGroup: props.stacDbSecurityGroup,\n      subnetSelection: props.subnetSelection,\n    });\n\n    this.registerSsmParameter({\n      name: \"dynamodb_table\",\n      value: this.table.tableName,\n      description: \"Name of table used to store ingestions\",\n    });\n  }\n\n  private buildTable(): dynamodb.Table {\n    const table = new dynamodb.Table(this, \"ingestions-table\", {\n      partitionKey: { name: \"created_by\", type: dynamodb.AttributeType.STRING },\n      sortKey: { name: \"id\", type: dynamodb.AttributeType.STRING },\n      billingMode: dynamodb.BillingMode.PAY_PER_REQUEST,\n      removalPolicy: RemovalPolicy.DESTROY,\n      stream: dynamodb.StreamViewType.NEW_IMAGE,\n    });\n\n    table.addGlobalSecondaryIndex({\n      indexName: \"status\",\n      partitionKey: { name: \"status\", type: dynamodb.AttributeType.STRING },\n      sortKey: { name: \"created_at\", type: dynamodb.AttributeType.STRING },\n    });\n\n    return table;\n  }\n\n  private buildApiLambda(props: {\n    table: dynamodb.ITable;\n    env: Record<string, string>;\n    dataAccessRole: iam.IRole;\n    stage: string;\n    dbSecret: secretsmanager.ISecret;\n    dbVpc: ec2.IVpc;\n    dbSecurityGroup: ec2.ISecurityGroup;\n    subnetSelection: ec2.SubnetSelection\n  }): PythonFunction {\n    \n    const handler = new PythonFunction(this, \"api-handler\", {\n      entry: `${__dirname}/runtime`,\n      index: \"src/handler.py\",\n      runtime: lambda.Runtime.PYTHON_3_9,\n      timeout: Duration.seconds(30),\n      environment: { DB_SECRET_ARN: props.dbSecret.secretArn, ...props.env },\n      vpc: props.dbVpc,\n      vpcSubnets: props.subnetSelection,\n      allowPublicSubnet: true,\n      role: this.handlerRole,\n      memorySize: 2048,\n    });\n\n    // Allow handler to read DB secret\n    props.dbSecret.grantRead(handler);\n\n    // Allow handler to connect to DB\n    props.dbSecurityGroup.addIngressRule(\n      handler.connections.securityGroups[0],\n      ec2.Port.tcp(5432),\n      \"Allow connections from STAC Ingestor\"\n    );\n\n    props.table.grantReadWriteData(handler);\n\n    return handler;\n  }\n\n  private buildIngestor(props: {\n    table: dynamodb.ITable;\n    env: Record<string, string>;\n    dbSecret: secretsmanager.ISecret;\n    dbVpc: ec2.IVpc;\n    dbSecurityGroup: ec2.ISecurityGroup;\n    subnetSelection: ec2.SubnetSelection;\n  }): PythonFunction {\n    const handler = new PythonFunction(this, \"stac-ingestor\", {\n      entry: `${__dirname}/runtime`,\n      index: \"src/ingestor.py\",\n      runtime: lambda.Runtime.PYTHON_3_9,\n      timeout: Duration.seconds(180),\n      environment: { DB_SECRET_ARN: props.dbSecret.secretArn, ...props.env },\n      vpc: props.dbVpc,\n      vpcSubnets: props.subnetSelection,\n      allowPublicSubnet: true,\n      memorySize: 2048,\n    });\n\n    // Allow handler to read DB secret\n    props.dbSecret.grantRead(handler);\n\n    // Allow handler to connect to DB\n    props.dbSecurityGroup.addIngressRule(\n      handler.connections.securityGroups[0],\n      ec2.Port.tcp(5432),\n      \"Allow connections from STAC Ingestor\"\n    );\n\n    // Allow handler to write results back to DBƒ\n    props.table.grantWriteData(handler);\n\n    // Trigger handler from writes to DynamoDB table\n    handler.addEventSource(\n      new events.DynamoEventSource(props.table, {\n        // Read when batches reach size...\n        batchSize: 1000,\n        // ... or when window is reached.\n        maxBatchingWindow: Duration.seconds(10),\n        // Read oldest data first.\n        startingPosition: lambda.StartingPosition.TRIM_HORIZON,\n        retryAttempts: 1,\n      })\n    );\n\n    return handler;\n  }\n\n  private buildApiEndpoint(props: {\n    handler: lambda.IFunction;\n    stage: string;\n    policy?: iam.PolicyDocument;\n    endpointConfiguration?: apigateway.EndpointConfiguration;\n  }): apigateway.LambdaRestApi {\n    return new apigateway.LambdaRestApi(\n      this,\n      `${Stack.of(this).stackName}-ingestor-api`,\n      {\n        handler: props.handler,\n        proxy: true,\n\n        cloudWatchRole: true,\n        deployOptions: { stageName: props.stage },\n        endpointExportName: `${Stack.of(this)}-ingestor-api`,\n\n        endpointConfiguration: props.endpointConfiguration,\n        policy: props.policy,\n      }\n    );\n  }\n\n  private registerSsmParameter(props: {\n    name: string;\n    value: string;\n    description: string;\n  }): ssm.IStringParameter {\n    const parameterNamespace = Stack.of(this).stackName;\n    return new ssm.StringParameter(\n      this,\n      `${props.name.replace(\"_\", \"-\")}-parameter`,\n      {\n        description: props.description,\n        parameterName: `/${parameterNamespace}/${props.name}`,\n        stringValue: props.value,\n      }\n    );\n  }\n}\n\nexport interface StacIngestorProps {\n  /**\n   * ARN of AWS Role used to validate access to S3 data\n   */\n  readonly dataAccessRole: iam.IRole;\n\n  /**\n   * URL of STAC API\n   */\n  readonly stacUrl: string;\n\n  /**\n   * Stage of deployment (e.g. `dev`, `prod`)\n   */\n  readonly stage: string;\n\n  /**\n   * Secret containing pgSTAC DB connection information\n   */\n  readonly stacDbSecret: secretsmanager.ISecret;\n\n  /**\n   * VPC running pgSTAC DB\n   */\n  readonly vpc: ec2.IVpc;\n\n  /**\n   * Security Group used by pgSTAC DB\n   */\n  readonly stacDbSecurityGroup: ec2.ISecurityGroup;\n\n  /**\n   * Boolean indicating whether or not pgSTAC DB is in a public subnet\n   */\n  readonly subnetSelection: ec2.SubnetSelection;\n\n  /**\n   * Environment variables to be sent to Lambda.\n   */\n  readonly apiEnv?: Record<string, string>;\n\n  /**\n   * API Endpoint Configuration, useful for creating private APIs.\n   */\n  readonly apiEndpointConfiguration?: apigateway.EndpointConfiguration;\n\n  /**\n   * API Policy Document, useful for creating private APIs.\n   */\n  readonly apiPolicy?: iam.PolicyDocument;\n}\n"]}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
Authlib==1.0.1
|
|
2
|
+
cachetools==5.1.0
|
|
3
|
+
fastapi>=0.75.1
|
|
4
|
+
mangum>=0.15.0
|
|
5
|
+
orjson>=3.6.8
|
|
6
|
+
psycopg[binary,pool]>=3.0.15
|
|
7
|
+
pydantic_ssm_settings>=0.2.0
|
|
8
|
+
pydantic>=1.9.0
|
|
9
|
+
pypgstac==0.6.13
|
|
10
|
+
requests>=2.27.1
|
|
11
|
+
# Waiting for https://github.com/stac-utils/stac-pydantic/pull/116
|
|
12
|
+
stac-pydantic @ git+https://github.com/alukach/stac-pydantic.git@patch-1
|
|
File without changes
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
import os
|
|
2
|
+
|
|
3
|
+
from pypgstac.db import PgstacDB
|
|
4
|
+
from pypgstac.load import Methods
|
|
5
|
+
|
|
6
|
+
from .loader import Loader
|
|
7
|
+
from .schemas import StacCollection
|
|
8
|
+
from .utils import get_db_credentials
|
|
9
|
+
|
|
10
|
+
|
|
11
|
+
def ingest(collection: StacCollection):
|
|
12
|
+
"""
|
|
13
|
+
Takes a collection model,
|
|
14
|
+
does necessary preprocessing,
|
|
15
|
+
and loads into the PgSTAC collection table
|
|
16
|
+
"""
|
|
17
|
+
try:
|
|
18
|
+
creds = get_db_credentials(os.environ["DB_SECRET_ARN"])
|
|
19
|
+
with PgstacDB(dsn=creds.dsn_string, debug=True) as db:
|
|
20
|
+
loader = Loader(db=db)
|
|
21
|
+
collection = [
|
|
22
|
+
collection.to_dict()
|
|
23
|
+
] # pypgstac wants either a string or an Iterable of dicts.
|
|
24
|
+
loader.load_collections(file=collection, insert_mode=Methods.upsert)
|
|
25
|
+
except Exception as e:
|
|
26
|
+
print(f"Encountered failure loading collection into pgSTAC: {e}")
|
|
27
|
+
|
|
28
|
+
|
|
29
|
+
def delete(collection_id: str):
|
|
30
|
+
"""
|
|
31
|
+
Deletes the collection from the database
|
|
32
|
+
"""
|
|
33
|
+
creds = get_db_credentials(os.environ["DB_SECRET_ARN"])
|
|
34
|
+
with PgstacDB(dsn=creds.dsn_string, debug=True) as db:
|
|
35
|
+
loader = Loader(db=db)
|
|
36
|
+
loader.delete_collection(collection_id)
|
|
@@ -0,0 +1,46 @@
|
|
|
1
|
+
import os
|
|
2
|
+
from getpass import getuser
|
|
3
|
+
from typing import Optional
|
|
4
|
+
|
|
5
|
+
from pydantic import AnyHttpUrl, BaseSettings, Field, constr
|
|
6
|
+
from pydantic_ssm_settings import AwsSsmSourceConfig
|
|
7
|
+
|
|
8
|
+
AwsArn = constr(regex=r"^arn:aws:iam::\d{12}:role/.+")
|
|
9
|
+
|
|
10
|
+
|
|
11
|
+
class Settings(BaseSettings):
|
|
12
|
+
dynamodb_table: str
|
|
13
|
+
|
|
14
|
+
root_path: Optional[str] = Field(description="Path from where to serve this URL.")
|
|
15
|
+
|
|
16
|
+
jwks_url: Optional[AnyHttpUrl] = Field(
|
|
17
|
+
description="URL of JWKS, e.g. https://cognito-idp.{region}.amazonaws.com/{userpool_id}/.well-known/jwks.json" # noqa
|
|
18
|
+
)
|
|
19
|
+
|
|
20
|
+
stac_url: AnyHttpUrl = Field(description="URL of STAC API")
|
|
21
|
+
|
|
22
|
+
data_access_role: AwsArn = Field(
|
|
23
|
+
description="ARN of AWS Role used to validate access to S3 data"
|
|
24
|
+
)
|
|
25
|
+
|
|
26
|
+
requester_pays: Optional[bool] = Field(
|
|
27
|
+
description="Path from where to serve this URL.", default=False
|
|
28
|
+
)
|
|
29
|
+
|
|
30
|
+
class Config(AwsSsmSourceConfig):
|
|
31
|
+
env_file = ".env"
|
|
32
|
+
|
|
33
|
+
@classmethod
|
|
34
|
+
def from_ssm(cls, stack: str):
|
|
35
|
+
return cls(_secrets_dir=f"/{stack}")
|
|
36
|
+
|
|
37
|
+
|
|
38
|
+
settings = (
|
|
39
|
+
Settings()
|
|
40
|
+
if os.environ.get("NO_PYDANTIC_SSM_SETTINGS")
|
|
41
|
+
else Settings.from_ssm(
|
|
42
|
+
stack=os.environ.get(
|
|
43
|
+
"STACK", f"veda-stac-ingestion-system-{os.environ.get('STAGE', getuser())}"
|
|
44
|
+
),
|
|
45
|
+
)
|
|
46
|
+
)
|
|
@@ -0,0 +1,94 @@
|
|
|
1
|
+
import logging
|
|
2
|
+
from typing import Optional
|
|
3
|
+
|
|
4
|
+
import boto3
|
|
5
|
+
import requests
|
|
6
|
+
from authlib.jose import JsonWebKey, JsonWebToken, JWTClaims, KeySet, errors
|
|
7
|
+
from cachetools import TTLCache, cached
|
|
8
|
+
from fastapi import Depends, HTTPException, Request, security
|
|
9
|
+
|
|
10
|
+
from . import config, services
|
|
11
|
+
|
|
12
|
+
logger = logging.getLogger(__name__)
|
|
13
|
+
|
|
14
|
+
token_scheme = security.HTTPBearer()
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
def get_settings(request: Request) -> config.Settings:
|
|
18
|
+
return request.app.extra["settings"]
|
|
19
|
+
|
|
20
|
+
|
|
21
|
+
def get_jwks_url(settings: config.Settings = Depends(get_settings)) -> str:
|
|
22
|
+
return settings.jwks_url
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
@cached(TTLCache(maxsize=1, ttl=3600))
|
|
26
|
+
def get_jwks(jwks_url: str = Depends(get_jwks_url)) -> KeySet:
|
|
27
|
+
with requests.get(jwks_url) as response:
|
|
28
|
+
response.raise_for_status()
|
|
29
|
+
return JsonWebKey.import_key_set(response.json())
|
|
30
|
+
|
|
31
|
+
|
|
32
|
+
def decode_token(
|
|
33
|
+
token: security.HTTPAuthorizationCredentials = Depends(token_scheme),
|
|
34
|
+
jwks: KeySet = Depends(get_jwks),
|
|
35
|
+
) -> JWTClaims:
|
|
36
|
+
"""
|
|
37
|
+
Validate & decode JWT
|
|
38
|
+
"""
|
|
39
|
+
try:
|
|
40
|
+
claims = JsonWebToken(["RS256"]).decode(
|
|
41
|
+
s=token.credentials,
|
|
42
|
+
key=jwks,
|
|
43
|
+
claims_options={
|
|
44
|
+
# # Example of validating audience to match expected value
|
|
45
|
+
# "aud": {"essential": True, "values": [APP_CLIENT_ID]}
|
|
46
|
+
},
|
|
47
|
+
)
|
|
48
|
+
|
|
49
|
+
if "client_id" in claims:
|
|
50
|
+
# Insert Cognito's `client_id` into `aud` claim if `aud` claim is unset
|
|
51
|
+
claims.setdefault("aud", claims["client_id"])
|
|
52
|
+
|
|
53
|
+
claims.validate()
|
|
54
|
+
return claims
|
|
55
|
+
except errors.JoseError: #
|
|
56
|
+
logger.exception("Unable to decode token")
|
|
57
|
+
raise HTTPException(status_code=403, detail="Bad auth token")
|
|
58
|
+
|
|
59
|
+
|
|
60
|
+
def get_username_from_token(
|
|
61
|
+
claims: Optional[security.HTTPBasicCredentials] = Depends(decode_token),
|
|
62
|
+
):
|
|
63
|
+
return claims["sub"]
|
|
64
|
+
|
|
65
|
+
|
|
66
|
+
def get_username_from_request(provided_by: str):
|
|
67
|
+
return provided_by
|
|
68
|
+
|
|
69
|
+
|
|
70
|
+
get_username = (
|
|
71
|
+
get_username_from_token if config.settings.jwks_url else get_username_from_request
|
|
72
|
+
)
|
|
73
|
+
|
|
74
|
+
|
|
75
|
+
def get_table(settings: config.Settings = Depends(get_settings)):
|
|
76
|
+
client = boto3.resource("dynamodb")
|
|
77
|
+
return client.Table(settings.dynamodb_table)
|
|
78
|
+
|
|
79
|
+
|
|
80
|
+
def get_db(table=Depends(get_table)) -> services.Database:
|
|
81
|
+
return services.Database(table=table)
|
|
82
|
+
|
|
83
|
+
|
|
84
|
+
def fetch_ingestion(
|
|
85
|
+
ingestion_id: str,
|
|
86
|
+
db: services.Database = Depends(get_db),
|
|
87
|
+
username: str = Depends(get_username),
|
|
88
|
+
):
|
|
89
|
+
try:
|
|
90
|
+
return db.fetch_one(username=username, ingestion_id=ingestion_id)
|
|
91
|
+
except services.NotInDb:
|
|
92
|
+
raise HTTPException(
|
|
93
|
+
status_code=404, detail="No ingestion found with provided ID"
|
|
94
|
+
)
|
|
@@ -0,0 +1,82 @@
|
|
|
1
|
+
import os
|
|
2
|
+
from datetime import datetime
|
|
3
|
+
from typing import TYPE_CHECKING, Iterator, List, Optional, Sequence
|
|
4
|
+
|
|
5
|
+
from boto3.dynamodb.types import TypeDeserializer
|
|
6
|
+
|
|
7
|
+
from .config import settings
|
|
8
|
+
from .dependencies import get_table
|
|
9
|
+
from .schemas import Ingestion, Status
|
|
10
|
+
from .utils import get_db_credentials, load_items
|
|
11
|
+
|
|
12
|
+
if TYPE_CHECKING:
|
|
13
|
+
from aws_lambda_typing import context as context_
|
|
14
|
+
from aws_lambda_typing import events
|
|
15
|
+
from aws_lambda_typing.events.dynamodb_stream import DynamodbRecord
|
|
16
|
+
|
|
17
|
+
|
|
18
|
+
def get_queued_ingestions(records: List["DynamodbRecord"]) -> Iterator[Ingestion]:
|
|
19
|
+
deserializer = TypeDeserializer()
|
|
20
|
+
for record in records:
|
|
21
|
+
# Parse Record
|
|
22
|
+
parsed = {
|
|
23
|
+
k: deserializer.deserialize(v)
|
|
24
|
+
for k, v in record["dynamodb"]["NewImage"].items()
|
|
25
|
+
}
|
|
26
|
+
ingestion = Ingestion.parse_obj(parsed)
|
|
27
|
+
if ingestion.status == Status.queued:
|
|
28
|
+
yield ingestion
|
|
29
|
+
|
|
30
|
+
|
|
31
|
+
def update_dynamodb(
|
|
32
|
+
ingestions: Sequence[Ingestion],
|
|
33
|
+
status: Status,
|
|
34
|
+
message: Optional[str] = None,
|
|
35
|
+
):
|
|
36
|
+
"""
|
|
37
|
+
Bulk update DynamoDB with ingestion results.
|
|
38
|
+
"""
|
|
39
|
+
# Update records in DynamoDB
|
|
40
|
+
print(f"Updating ingested items status in DynamoDB, marking as {status}...")
|
|
41
|
+
table = get_table(settings)
|
|
42
|
+
with table.batch_writer(overwrite_by_pkeys=["created_by", "id"]) as batch:
|
|
43
|
+
for ingestion in ingestions:
|
|
44
|
+
batch.put_item(
|
|
45
|
+
Item=ingestion.copy(
|
|
46
|
+
update={
|
|
47
|
+
"status": status,
|
|
48
|
+
"message": message,
|
|
49
|
+
"updated_at": datetime.now(),
|
|
50
|
+
}
|
|
51
|
+
).dynamodb_dict()
|
|
52
|
+
)
|
|
53
|
+
|
|
54
|
+
|
|
55
|
+
def handler(event: "events.DynamoDBStreamEvent", context: "context_.Context"):
|
|
56
|
+
# Parse input
|
|
57
|
+
ingestions = list(get_queued_ingestions(event["Records"]))
|
|
58
|
+
if not ingestions:
|
|
59
|
+
print("No queued ingestions to process")
|
|
60
|
+
return
|
|
61
|
+
|
|
62
|
+
# Insert into PgSTAC DB
|
|
63
|
+
outcome = Status.succeeded
|
|
64
|
+
message = None
|
|
65
|
+
try:
|
|
66
|
+
load_items(
|
|
67
|
+
creds=get_db_credentials(os.environ["DB_SECRET_ARN"]),
|
|
68
|
+
ingestions=ingestions,
|
|
69
|
+
)
|
|
70
|
+
except Exception as e:
|
|
71
|
+
print(f"Encountered failure loading items into pgSTAC: {e}")
|
|
72
|
+
outcome = Status.failed
|
|
73
|
+
message = str(e)
|
|
74
|
+
|
|
75
|
+
# Update DynamoDB with outcome
|
|
76
|
+
update_dynamodb(
|
|
77
|
+
ingestions=ingestions,
|
|
78
|
+
status=outcome,
|
|
79
|
+
message=message,
|
|
80
|
+
)
|
|
81
|
+
|
|
82
|
+
print("Completed batch...")
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
"""Utilities to bulk load data into pgstac from json/ndjson."""
|
|
2
|
+
import logging
|
|
3
|
+
|
|
4
|
+
from pypgstac.load import Loader as BaseLoader
|
|
5
|
+
|
|
6
|
+
logger = logging.getLogger(__name__)
|
|
7
|
+
|
|
8
|
+
|
|
9
|
+
class Loader(BaseLoader):
|
|
10
|
+
"""Utilities for loading data and updating collection summaries/extents."""
|
|
11
|
+
|
|
12
|
+
def __init__(self, db) -> None:
|
|
13
|
+
super().__init__(db)
|
|
14
|
+
self.check_version()
|
|
15
|
+
self.conn = self.db.connect()
|
|
16
|
+
|
|
17
|
+
def delete_collection(self, collection_id: str) -> None:
|
|
18
|
+
with self.conn.cursor() as cur:
|
|
19
|
+
with self.conn.transaction():
|
|
20
|
+
logger.info(f"Deleting collection: {collection_id}.")
|
|
21
|
+
cur.execute("SELECT pgstac.delete_collection(%s);", [collection_id])
|
|
@@ -0,0 +1,125 @@
|
|
|
1
|
+
from fastapi import Depends, FastAPI, HTTPException
|
|
2
|
+
|
|
3
|
+
from . import collection as collection_loader
|
|
4
|
+
from . import config, dependencies, schemas, services
|
|
5
|
+
|
|
6
|
+
app = FastAPI(
|
|
7
|
+
root_path=config.settings.root_path,
|
|
8
|
+
settings=config.settings,
|
|
9
|
+
)
|
|
10
|
+
|
|
11
|
+
|
|
12
|
+
@app.get(
|
|
13
|
+
"/ingestions", response_model=schemas.ListIngestionResponse, tags=["Ingestion"]
|
|
14
|
+
)
|
|
15
|
+
async def list_ingestions(
|
|
16
|
+
list_request: schemas.ListIngestionRequest = Depends(),
|
|
17
|
+
db: services.Database = Depends(dependencies.get_db),
|
|
18
|
+
):
|
|
19
|
+
return db.fetch_many(
|
|
20
|
+
status=list_request.status, next=list_request.next, limit=list_request.limit
|
|
21
|
+
)
|
|
22
|
+
|
|
23
|
+
|
|
24
|
+
@app.post(
|
|
25
|
+
"/ingestions",
|
|
26
|
+
response_model=schemas.Ingestion,
|
|
27
|
+
tags=["Ingestion"],
|
|
28
|
+
status_code=201,
|
|
29
|
+
)
|
|
30
|
+
async def create_ingestion(
|
|
31
|
+
item: schemas.AccessibleItem,
|
|
32
|
+
username: str = Depends(dependencies.get_username),
|
|
33
|
+
db: services.Database = Depends(dependencies.get_db),
|
|
34
|
+
) -> schemas.Ingestion:
|
|
35
|
+
return schemas.Ingestion(
|
|
36
|
+
id=item.id,
|
|
37
|
+
created_by=username,
|
|
38
|
+
item=item,
|
|
39
|
+
status=schemas.Status.queued,
|
|
40
|
+
).enqueue(db)
|
|
41
|
+
|
|
42
|
+
|
|
43
|
+
@app.get(
|
|
44
|
+
"/ingestions/{ingestion_id}",
|
|
45
|
+
response_model=schemas.Ingestion,
|
|
46
|
+
tags=["Ingestion"],
|
|
47
|
+
)
|
|
48
|
+
def get_ingestion(
|
|
49
|
+
ingestion: schemas.Ingestion = Depends(dependencies.fetch_ingestion),
|
|
50
|
+
) -> schemas.Ingestion:
|
|
51
|
+
return ingestion
|
|
52
|
+
|
|
53
|
+
|
|
54
|
+
@app.patch(
|
|
55
|
+
"/ingestions/{ingestion_id}",
|
|
56
|
+
response_model=schemas.Ingestion,
|
|
57
|
+
tags=["Ingestion"],
|
|
58
|
+
)
|
|
59
|
+
def update_ingestion(
|
|
60
|
+
update: schemas.UpdateIngestionRequest,
|
|
61
|
+
ingestion: schemas.Ingestion = Depends(dependencies.fetch_ingestion),
|
|
62
|
+
db: services.Database = Depends(dependencies.get_db),
|
|
63
|
+
):
|
|
64
|
+
updated_item = ingestion.copy(update=update.dict(exclude_unset=True))
|
|
65
|
+
return updated_item.save(db)
|
|
66
|
+
|
|
67
|
+
|
|
68
|
+
@app.delete(
|
|
69
|
+
"/ingestions/{ingestion_id}",
|
|
70
|
+
response_model=schemas.Ingestion,
|
|
71
|
+
tags=["Ingestion"],
|
|
72
|
+
)
|
|
73
|
+
def cancel_ingestion(
|
|
74
|
+
ingestion: schemas.Ingestion = Depends(dependencies.fetch_ingestion),
|
|
75
|
+
db: services.Database = Depends(dependencies.get_db),
|
|
76
|
+
) -> schemas.Ingestion:
|
|
77
|
+
if ingestion.status != schemas.Status.queued:
|
|
78
|
+
raise HTTPException(
|
|
79
|
+
status_code=400,
|
|
80
|
+
detail=(
|
|
81
|
+
"Unable to delete ingestion if status is not "
|
|
82
|
+
f"{schemas.Status.queued}"
|
|
83
|
+
),
|
|
84
|
+
)
|
|
85
|
+
return ingestion.cancel(db)
|
|
86
|
+
|
|
87
|
+
|
|
88
|
+
@app.post(
|
|
89
|
+
"/collections",
|
|
90
|
+
tags=["Collection"],
|
|
91
|
+
status_code=201,
|
|
92
|
+
dependencies=[Depends(dependencies.get_username)],
|
|
93
|
+
)
|
|
94
|
+
def publish_collection(collection: schemas.StacCollection):
|
|
95
|
+
# pgstac create collection
|
|
96
|
+
try:
|
|
97
|
+
collection_loader.ingest(collection)
|
|
98
|
+
return {f"Successfully published: {collection.id}"}
|
|
99
|
+
except Exception as e:
|
|
100
|
+
raise HTTPException(
|
|
101
|
+
status_code=400,
|
|
102
|
+
detail=(f"Unable to publish collection: {e}"),
|
|
103
|
+
)
|
|
104
|
+
|
|
105
|
+
|
|
106
|
+
@app.delete(
|
|
107
|
+
"/collections/{collection_id}",
|
|
108
|
+
tags=["Collection"],
|
|
109
|
+
dependencies=[Depends(dependencies.get_username)],
|
|
110
|
+
)
|
|
111
|
+
def delete_collection(collection_id: str):
|
|
112
|
+
try:
|
|
113
|
+
collection_loader.delete(collection_id=collection_id)
|
|
114
|
+
return {f"Successfully deleted: {collection_id}"}
|
|
115
|
+
except Exception as e:
|
|
116
|
+
print(e)
|
|
117
|
+
raise HTTPException(status_code=400, detail=(f"{e}"))
|
|
118
|
+
|
|
119
|
+
|
|
120
|
+
@app.get("/auth/me")
|
|
121
|
+
def who_am_i(username=Depends(dependencies.get_username)):
|
|
122
|
+
"""
|
|
123
|
+
Return username for the provided request
|
|
124
|
+
"""
|
|
125
|
+
return {"username": username}
|