Press n or j to go to the next uncovered block, b, p or k for the previous block.
| 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 | 1x 8x 1x 7x 7x 6x 5x 1x 4x 4x 4x 4x 1x 3x 3x 1x 2x 2x 1x | import { APIGatewayEvent } from "aws-lambda";
import { response } from "libs/handler-lib";
import { getAvailableActions } from "shared-utils";
import {
getAuthDetails,
isAuthorizedToGetPackageActions,
lookupUserAttributes,
} from "../libs/api/auth/user";
import { getPackage } from "../libs/api/package/getPackage";
import { getLatestActiveRoleByEmail } from "./user-management/userManagementService";
import { handleOpensearchError } from "./utils";
export const getPackageActions = async (event: APIGatewayEvent) => {
if (!event.body) {
return response({
statusCode: 400,
body: { message: "Event body required" },
});
}
try {
const body = JSON.parse(event.body);
const result = await getPackage(body.id);
if (result === undefined || !result.found) {
return response({
statusCode: 404,
body: { message: "No record found for the given id" },
});
}
const authDetails = getAuthDetails(event);
const userAttr = await lookupUserAttributes(authDetails.userId, authDetails.poolId);
const activeRole = await getLatestActiveRoleByEmail(userAttr.email);
if (!activeRole) {
return response({
statusCode: 401,
body: {
message: "No active role found for user",
},
});
}
const passedStateAuth = await isAuthorizedToGetPackageActions(event, result._source.state);
if (!passedStateAuth)
return response({
statusCode: 403,
body: { message: "Not authorized to view resources from this state" },
});
return response({
statusCode: 200,
body: {
actions: getAvailableActions({ ...userAttr, role: activeRole.role }, result._source),
},
});
} catch (err) {
return response(handleOpensearchError(err));
}
};
export const handler = getPackageActions;
|