Skip to content

fireproof-storage/valid-cid-s3-bucket

 
 

Repository files navigation

Fireproof S3 bucket adapter

This uses verified uploads, addressed by content hash identifier.

  • User-agent pings a Lambda API with the intended hash identifier and size for the object they are about to upload.
  • Lambda returns a signed URL from an AWS account private key. The URL authorizes the holder to upload only the object matching content identifer (thanks to platform level hash validation in S3/R2/Azure).
  • The client PUTs to the URL and the content is written.
  • Subsequent reads for that content identifier will return the content, nothing invalid can overwrite it.

Because the files Fireproof writes are encrypted by the browser, and the metadata is not stored in the bucket (but rather in your secure session storage) this bucket is safe for public reads.

Read on to learn how to deploy, etc. This is based on...

S3 presigned URLs with SAM, auth and sample frontend

This example application shows how to upload objects to S3 directly from your end-user application using Signed URLs.

To learn more about how this application works, see the AWS Compute Blog post: https://aws.amazon.com/blogs/compute/uploading-to-amazon-s3-directly-from-a-web-or-mobile-application/

Important: this application uses various AWS services and there are costs associated with these services after the Free Tier usage - please see the AWS Pricing page for details. You are responsible for any AWS costs incurred. No warranty is implied in this example.

.
├── README.MD                   <-- This instructions file
├── frontend                    <-- Simple JavaScript application illustrating upload
├── getSignedURL                <-- Source code for the serverless backend

Requirements

Installation Instructions

  1. Create an AWS account if you do not already have one and login.

  2. Clone the repo onto your local development machine using git clone.

Installing the application

There are two SAM templates available - one provides an open API, the other uses an authorizer. From the command line, deploy the chosen SAM template:

cd .. 
sam deploy --guided

When prompted for parameters, enter:

  • Stack Name: s3Uploader
  • AWS Region: your preferred AWS Region (e.g. us-east-1)
  • Answer 'No' to UploadRequestFunction may not have authorization defined, Is this okay? question, and accept others defaults.

This takes several minutes to deploy. At the end of the deployment, note the output values, as you need these later.

Testing with the frontend application

The frontend code is saved in the frontend subdirectory.

  1. Before running, you need to set the API Gateway endpoint from the backend deployment on line 29 in the index.html file.

  2. You cannot run this directly on a local browser, due to way CORS works with localhost. Either copy the file to an S3 bucket, or deploy using AWS Amplify Console.

  3. Once the page is loaded from a remote location, upload a JPG file in the front-end and you will see the object in the backend S3 bucket.

Next steps

The AWS Compute Blog post at the top of this README file contains additional information about this pattern.

If you have any questions, please raise an issue in the GitHub repo.

==============================================

Copyright 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.

SPDX-License-Identifier: MIT-0

Releases

No releases published

Packages

No packages published

Languages

  • TypeScript 79.1%
  • HTML 20.9%