Press n or j to go to the next uncovered block, b, p or k for the previous block.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 | 1x 7x 1x 6x 6x 5x 4x 1x 3x 3x 1x 2x 2x 2x 2x 1x | import { APIGatewayEvent } from "aws-lambda"; import { response } from "libs/handler-lib"; import { getAvailableActions } from "shared-utils"; import { handleOpensearchError } from "./utils"; import { getAuthDetails, isAuthorizedToGetPackageActions, lookupUserAttributes, } from "../libs/api/auth/user"; import { getPackage } from "../libs/api/package/getPackage"; export const getPackageActions = async (event: APIGatewayEvent) => { if (!event.body) { return response({ statusCode: 400, body: { message: "Event body required" }, }); } try { const body = JSON.parse(event.body); const result = await getPackage(body.id); if (result === undefined || !result.found) { return response({ statusCode: 404, body: { message: "No record found for the given id" }, }); } const passedStateAuth = await isAuthorizedToGetPackageActions(event, result._source.state); if (!passedStateAuth) return response({ statusCode: 401, body: { message: "Not authorized to view resources from this state" }, }); const authDetails = getAuthDetails(event); const userAttr = await lookupUserAttributes(authDetails.userId, authDetails.poolId); return response({ statusCode: 200, body: { actions: getAvailableActions(userAttr, result._source), }, }); } catch (err) { return response(handleOpensearchError(err)); } }; export const handler = getPackageActions; |