All files / lib/lambda getPackageActions.ts

100% Statements 16/16
100% Branches 8/8
100% Functions 1/1
100% Lines 16/16

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54                      1x 7x 1x           6x 6x   5x   4x 1x           3x   3x 1x         2x 2x   2x             2x     1x  
import { APIGatewayEvent } from "aws-lambda";
import { response } from "libs/handler-lib";
import { getAvailableActions } from "shared-utils";
import { handleOpensearchError } from "./utils";
import {
  getAuthDetails,
  isAuthorizedToGetPackageActions,
  lookupUserAttributes,
} from "../libs/api/auth/user";
import { getPackage } from "../libs/api/package/getPackage";
 
export const getPackageActions = async (event: APIGatewayEvent) => {
  if (!event.body) {
    return response({
      statusCode: 400,
      body: { message: "Event body required" },
    });
  }
 
  try {
    const body = JSON.parse(event.body);
 
    const result = await getPackage(body.id);
 
    if (result === undefined || !result.found) {
      return response({
        statusCode: 404,
        body: { message: "No record found for the given id" },
      });
    }
 
    const passedStateAuth = await isAuthorizedToGetPackageActions(event, result._source.state);
 
    if (!passedStateAuth)
      return response({
        statusCode: 401,
        body: { message: "Not authorized to view resources from this state" },
      });
 
    const authDetails = getAuthDetails(event);
    const userAttr = await lookupUserAttributes(authDetails.userId, authDetails.poolId);
 
    return response({
      statusCode: 200,
      body: {
        actions: getAvailableActions(userAttr, result._source),
      },
    });
  } catch (err) {
    return response(handleOpensearchError(err));
  }
};
export const handler = getPackageActions;