Gathering detailed insights and metrics for multer-s3-transform
Gathering detailed insights and metrics for multer-s3-transform
Gathering detailed insights and metrics for multer-s3-transform
Gathering detailed insights and metrics for multer-s3-transform
npm install multer-s3-transform
Module System
Min. Node Version
Typescript Support
Node Version
NPM Version
9 Stars
110 Commits
13 Forks
1 Watching
12 Branches
1 Contributors
Updated on 09 Nov 2023
JavaScript (100%)
Cumulative downloads
Total Downloads
Last day
4.6%
518
Compared to previous day
Last week
11.1%
3,145
Compared to previous week
Last month
-5.8%
12,303
Compared to previous month
Last year
230.7%
801,766
Compared to previous year
3
8
This project is no longer being maintained. Originally a fork of Multer S3 with the added Transform property
Streaming multer storage engine for AWS S3.
This project is mostly an integration piece for existing code samples from Multer's storage engine documentation with s3fs as the substitution piece for file system. Existing solutions I found required buffering the multipart uploads into the actual filesystem which is difficult to scale.
1npm install --save multer-s3-transform
1var aws = require('aws-sdk') 2var express = require('express') 3var multer = require('multer') 4var multerS3 = require('multer-s3-transform') 5 6var app = express() 7var s3 = new aws.S3({ /* ... */ }) 8 9var upload = multer({ 10 storage: multerS3({ 11 s3: s3, 12 bucket: 'some-bucket', 13 metadata: function (req, file, cb) { 14 cb(null, {fieldName: file.fieldname}); 15 }, 16 key: function (req, file, cb) { 17 cb(null, Date.now().toString()) 18 } 19 }) 20}) 21 22app.post('/upload', upload.array('photos', 3), function(req, res, next) { 23 res.send('Successfully uploaded ' + req.files.length + ' files!') 24})
Each file contains the following information exposed by multer-s3
:
Key | Description | Note |
---|---|---|
size | Size of the file in bytes | |
bucket | The bucket used to store the file | S3Storage |
key | The name of the file | S3Storage |
acl | Access control for the file | S3Storage |
contentType | The mimetype used to upload the file | S3Storage |
metadata | The metadata object to be sent to S3 | S3Storage |
location | The S3 url to access the file | S3Storage |
etag | The etag of the uploaded file in S3 | S3Storage |
contentDisposition | The contentDisposition used to upload the file | S3Storage |
storageClass | The storageClass to be used for the uploaded file in S3 | S3Storage |
versionId | The versionId is an optional param returned by S3 for versioned buckets. | S3Storage |
ACL values can be set by passing an optional acl
parameter into the multerS3
object.
1var upload = multer({ 2 storage: multerS3({ 3 s3: s3, 4 bucket: 'some-bucket', 5 acl: 'public-read', 6 key: function (req, file, cb) { 7 cb(null, Date.now().toString()) 8 } 9 }) 10})
Available options for canned ACL.
ACL Option | Permissions added to ACL |
---|---|
private | Owner gets FULL_CONTROL . No one else has access rights (default). |
public-read | Owner gets FULL_CONTROL . The AllUsers group gets READ access. |
public-read-write | Owner gets FULL_CONTROL . The AllUsers group gets READ and WRITE access. Granting this on a bucket is generally not recommended. |
aws-exec-read | Owner gets FULL_CONTROL . Amazon EC2 gets READ access to GET an Amazon Machine Image (AMI) bundle from Amazon S3. |
authenticated-read | Owner gets FULL_CONTROL . The AuthenticatedUsers group gets READ access. |
bucket-owner-read | Object owner gets FULL_CONTROL . Bucket owner gets READ access. If you specify this canned ACL when creating a bucket, Amazon S3 ignores it. |
bucket-owner-full-control | Both the object owner and the bucket owner get FULL_CONTROL over the object. If you specify this canned ACL when creating a bucket, Amazon S3 ignores it. |
log-delivery-write | The LogDelivery group gets WRITE and READ_ACP permissions on the bucket. For more information on logs. |
The metadata
option is a callback that accepts the request and file, and returns a metadata object to be saved to S3.
Here is an example that stores all fields in the request body as metadata, and uses an id
param as the key:
1var opts = { 2 s3: s3, 3 bucket: config.originalsBucket, 4 metadata: function (req, file, cb) { 5 cb(null, Object.assign({}, req.body)); 6 }, 7 key: function (req, file, cb) { 8 cb(null, req.params.id + ".jpg"); 9 } 10 };
The optional cacheControl
option sets the Cache-Control
HTTP header that will be sent if you're serving the files directly from S3. You can pass either a string or a function that returns a string.
Here is an example that will tell browsers and CDNs to cache the file for one year:
1var upload = multer({ 2 storage: multerS3({ 3 s3: s3, 4 bucket: 'some-bucket', 5 cacheControl: 'max-age=31536000', 6 key: function (req, file, cb) { 7 cb(null, Date.now().toString()) 8 } 9 }) 10})
The optional contentType
option can be used to set Content/mime type of the file. By default the content type is set to application/octet-stream
. If you want multer-s3 to automatically find the content-type of the file, use the multerS3.AUTO_CONTENT_TYPE
constant. Here is an example that will detect the content type of the file being uploaded.
1var upload = multer({ 2 storage: multerS3({ 3 s3: s3, 4 bucket: 'some-bucket', 5 contentType: multerS3.AUTO_CONTENT_TYPE, 6 key: function (req, file, cb) { 7 cb(null, Date.now().toString()) 8 } 9 }) 10})
You may also use a function as the contentType
, which should be of the form function(req, file, cb)
.
storageClass values can be set by passing an optional storageClass
parameter into the multerS3
object.
1var upload = multer({ 2 storage: multerS3({ 3 s3: s3, 4 bucket: 'some-bucket', 5 acl: 'public-read', 6 storageClass: 'REDUCED_REDUNDANCY', 7 key: function (req, file, cb) { 8 cb(null, Date.now().toString()) 9 } 10 }) 11})
The optional contentDisposition
option can be used to set the Content-Disposition
header for the uploaded file. By default, the contentDisposition
isn't forwarded. As an example below, using the value attachment
forces the browser to download the uploaded file instead of trying to open it.
1var upload = multer({ 2 storage: multerS3({ 3 s3: s3, 4 bucket: 'some-bucket', 5 acl: 'public-read', 6 contentDisposition: 'attachment', 7 key: function (req, file, cb) { 8 cb(null, Date.now().toString()) 9 } 10 }) 11})
An overview of S3's server-side encryption can be found in the [S3 Docs] (http://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html); be advised that customer-managed keys (SSE-C) is not implemented at this time.
You may use the S3 server-side encryption functionality via the optional serverSideEncryption
and sseKmsKeyId
parameters. Full documentation of these parameters in relation to the S3 API can be found [here] (http://docs.aws.amazon.com/AWSJavaScriptSDK/latest/AWS/S3.html#upload-property) and [here] (http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingServerSideEncryption.html).
serverSideEncryption
has two valid values: 'AES256' and 'aws:kms'. 'AES256' utilizes the S3-managed key system, while 'aws:kms' utilizes the AWS KMS system and accepts the optional sseKmsKeyId
parameter to specify the key ID of the key you wish to use. Leaving sseKmsKeyId
blank when 'aws:kms' is specified will use the default KMS key. Note: You must instantiate the S3 instance with signatureVersion: 'v4'
in order to use KMS-managed keys [[Docs]] (http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingAWSSDK.html#specify-signature-version), and the specified key must be in the same AWS region as the S3 bucket used.
1var upload = multer({ 2 storage: multerS3({ 3 s3: s3, 4 bucket: 'some-bucket', 5 acl: 'authenticated-read', 6 contentDisposition: 'attachment', 7 serverSideEncryption: 'AES256', 8 key: function(req, file, cb) { 9 cb(null, Date.now().toString()) 10 } 11 }) 12})
The optional shouldTransform
option tells multer whether it should transform the file before it is uploaded. By default, it is set to false
. If set to true
, transforms
option must be added, which tells how to transform the file. transforms
option should be an Array
, containing objects with can have properties id
, key
and transform
.
1var upload = multer({ 2 storage: multerS3({ 3 s3: s3, 4 bucket: 'some-bucket', 5 shouldTransform: function (req, file, cb) { 6 cb(null, /^image/i.test(file.mimetype)) 7 }, 8 transforms: [{ 9 id: 'original', 10 key: function (req, file, cb) { 11 cb(null, 'image-original.jpg') 12 }, 13 transform: function (req, file, cb) { 14 cb(null, sharp().jpeg()) 15 } 16 }, { 17 id: 'thumbnail', 18 key: function (req, file, cb) { 19 cb(null, 'image-thumbnail.jpg') 20 }, 21 transform: function (req, file, cb) { 22 cb(null, sharp().resize(100, 100).jpeg()) 23 } 24 }] 25 }) 26})
If this option is used, each file passed to your router request will have a transforms
array, with every transform you defined.
1{ 2 "data": { 3 "fieldname": "image", 4 "originalname": "image.jpg", 5 "encoding": "7bit", 6 "mimetype": "image/jpg", 7 "transforms": [ 8 { 9 "id": "thumbnail", 10 "size": 2440, 11 "bucket": "some-bucket", 12 "key": "image-thumbnail.jpg", 13 "acl": "public-read", 14 "contentType": "image/jpg", 15 "metadata": null, 16 "location": "https://some-bucket.s3.us-east-1.amazonaws.com/image-thumbnail.jpg", 17 "etag": "\"9d554e03e37c79bff7ce31d375900db6\"" 18 }, 19 { 20 "id": "original", 21 "size": 18006, 22 "bucket": "some-bucket", 23 "key": "image-original.jpg", 24 "acl": "public-read", 25 "contentType": "image/jpg", 26 "metadata": null, 27 "location": "https://some-bucket.s3.us-east-1.amazonaws.com/image-original.jpg", 28 "etag": "\"76c09df7bdd752a749f91b9663838fb2\"" 29 }, 30 ] 31 } 32}
The tests mock all access to S3 and can be run completely offline.
1npm test
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
license file detected
Details
Reason
Found 2/28 approved changesets -- score normalized to 0
Reason
project is archived
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
Reason
project is not fuzzed
Details
Reason
branch protection not enabled on development/release branches
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Reason
24 existing vulnerabilities detected
Details
Score
Last Scanned on 2024-11-18
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More