ToolJet/plugins/packages/s3/lib/index.ts
Vishnu.Nemarugommula 2d97089e79
Create a new Bucket functionality for S3
Issue:#5690
2023-11-06 13:36:07 +05:30

124 lines
4 KiB
TypeScript

import {
createBucket,
getObject,
uploadObject,
listBuckets,
listObjects,
signedUrlForGet,
signedUrlForPut,
removeObject,
} from './operations';
import AWS from 'aws-sdk';
import { S3Client } from '@aws-sdk/client-s3';
import { fromInstanceMetadata } from '@aws-sdk/credential-providers';
import { QueryError, QueryResult, QueryService, ConnectionTestResult } from '@tooljet-plugins/common';
import { SourceOptions, QueryOptions, Operation, AssumeRoleCredentials } from './types';
export default class S3QueryService implements QueryService {
async run(sourceOptions: SourceOptions, queryOptions: QueryOptions, dataSourceId: string): Promise<QueryResult> {
const operation: Operation = queryOptions.operation;
const client = await this.getConnection(sourceOptions);
let result = {};
try {
switch (operation) {
case Operation.CreateBucket:
result = await createBucket(client, queryOptions);
break;
case Operation.ListBuckets:
result = await listBuckets(client, {});
break;
case Operation.ListObjects:
result = await listObjects(client, queryOptions);
break;
case Operation.GetObject:
result = await getObject(client, queryOptions);
break;
case Operation.UploadObject:
result = await uploadObject(client, queryOptions);
break;
case Operation.SignedUrlForGet:
result = await signedUrlForGet(client, queryOptions);
break;
case Operation.SignedUrlForPut:
result = await signedUrlForPut(client, queryOptions);
break;
case Operation.RemoveObject:
result = await removeObject(client, queryOptions);
break;
}
} catch (error) {
throw new QueryError('Query could not be completed', error.message, {});
}
return {
status: 'ok',
data: result,
};
}
async testConnection(sourceOptions: SourceOptions): Promise<ConnectionTestResult> {
const client: S3Client = await this.getConnection(sourceOptions);
await listBuckets(client, {});
return {
status: 'ok',
};
}
async getAssumeRoleCredentials(roleArn: string): Promise<AssumeRoleCredentials> {
const sts = new AWS.STS();
return new Promise((resolve, reject) => {
const timestamp = new Date().getTime();
const roleName = roleArn.split('/')[1];
const params = {
RoleArn: roleArn,
RoleSessionName: `s3-${roleName}-${timestamp}`,
};
sts.assumeRole(params, (err, data) => {
if (err) {
reject(err);
} else {
resolve({
accessKeyId: data.Credentials.AccessKeyId,
secretAccessKey: data.Credentials.SecretAccessKey,
sessionToken: data.Credentials.SessionToken,
});
}
});
});
}
async getConnection(sourceOptions: SourceOptions): Promise<any> {
const useAWSInstanceProfile = sourceOptions['instance_metadata_credentials'] === 'aws_instance_credentials';
const region = sourceOptions['region'];
const useRoleArn = sourceOptions['instance_metadata_credentials'] === 'aws_arn_role';
if (useAWSInstanceProfile) {
const client = new S3Client({ region, credentials: fromInstanceMetadata() });
return client;
} else if (useRoleArn) {
const assumeRoleCredentials = await this.getAssumeRoleCredentials(sourceOptions['role_arn']);
const credentials = new AWS.Credentials(
assumeRoleCredentials.accessKeyId,
assumeRoleCredentials.secretAccessKey,
assumeRoleCredentials.sessionToken
);
const client = new S3Client({ region, credentials });
return client;
} else {
const credentials = new AWS.Credentials(sourceOptions['access_key'], sourceOptions['secret_key']);
const endpointOptions = sourceOptions.endpoint_enabled && {
endpoint: sourceOptions?.endpoint,
forcePathStyle: true,
};
return new S3Client({ region, credentials, ...endpointOptions });
}
}
}