All files / items list.js

81.81% Statements 27/33
60.71% Branches 17/28
100% Functions 1/1
81.81% Lines 27/33

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 1551x 1x 1x   1x 1x     9x   9x   9x 1x                     8x                     8x   8x 1x                       7x             7x                       7x                           7x         7x     7x   7x                       7x                               7x     6x       6x                         1x 1x                     1x  
const { DynamoDBClient } = require('@aws-sdk/client-dynamodb')
const { DynamoDBDocumentClient, QueryCommand, GetCommand } = require('@aws-sdk/lib-dynamodb')
const { authenticateRequest, hasPermission, canAccessEntity } = require('../shared/auth-helper')
 
const client = new DynamoDBClient({})
const docClient = DynamoDBDocumentClient.from(client)
 
async function getItemsHandler(event) {
  try {
    // Authenticate (supports JWT and API keys)
    const auth = await authenticateRequest(event)
 
    if (!auth || auth.error) {
      return {
        statusCode: 401,
        headers: {
          'Content-Type': 'application/json',
          'Access-Control-Allow-Origin': '*'
        },
        body: JSON.stringify({ error: auth?.error || 'Authentication required' })
      }
    }
 
    // Check permission
    Iif (!hasPermission(auth, 'items:read')) {
      return {
        statusCode: 403,
        headers: {
          'Content-Type': 'application/json',
          'Access-Control-Allow-Origin': '*'
        },
        body: JSON.stringify({ error: 'Permission denied: items:read required' })
      }
    }
 
    const entityId = event.pathParameters?.entityId
 
    if (!entityId) {
      return {
        statusCode: 400,
        headers: {
          'Content-Type': 'application/json',
          'Access-Control-Allow-Origin': '*'
        },
        body: JSON.stringify({ error: 'Missing entityId' })
      }
    }
 
    // Verify entity access (important for API keys with allowedEntityIds)
    // First, get the entity to check access
    const entityResult = await docClient.send(
      new GetCommand({
        TableName: process.env.ENTITIES_TABLE_NAME,
        Key: { id: entityId }
      })
    )
 
    Iif (!entityResult.Item) {
      return {
        statusCode: 404,
        headers: {
          'Content-Type': 'application/json',
          'Access-Control-Allow-Origin': '*'
        },
        body: JSON.stringify({ error: 'Entity not found' })
      }
    }
 
    // Check if auth can access this entity
    Iif (!canAccessEntity(auth, entityResult.Item)) {
      return {
        statusCode: 403,
        headers: {
          'Content-Type': 'application/json',
          'Access-Control-Allow-Origin': '*'
        },
        body: JSON.stringify({ error: 'Access denied to this entity' })
      }
    }
 
    // Get tenant from auth context
    // For API keys with wildcard access, use the entity's owner tenant to query items
    const tenantId =
      auth.type === 'apikey' && (auth.allowedEntityIds || []).includes('*')
        ? entityResult.Item.tenantId
        : auth.tenantId
 
    // Pagination support
    const limit = event.queryStringParameters?.limit
      ? parseInt(event.queryStringParameters.limit)
      : 30
    const nextToken = event.queryStringParameters?.nextToken
 
    const queryParams = {
      TableName: process.env.TABLE_NAME,
      KeyConditionExpression: 'entityId = :entityId',
      FilterExpression: 'tenantId = :tenantId',
      ExpressionAttributeValues: {
        ':entityId': entityId,
        ':tenantId': tenantId
      },
      Limit: limit
    }
 
    // Add pagination token if provided
    Iif (nextToken) {
      try {
        queryParams.ExclusiveStartKey = JSON.parse(Buffer.from(nextToken, 'base64').toString())
      } catch {
        return {
          statusCode: 400,
          headers: {
            'Content-Type': 'application/json',
            'Access-Control-Allow-Origin': '*'
          },
          body: JSON.stringify({ error: 'Invalid nextToken' })
        }
      }
    }
 
    // Query items by entityId (partition key) and filter by tenantId
    const result = await docClient.send(new QueryCommand(queryParams))
 
    // Encode LastEvaluatedKey for next request
    const responseNextToken = result.LastEvaluatedKey
      ? Buffer.from(JSON.stringify(result.LastEvaluatedKey)).toString('base64')
      : null
 
    return {
      statusCode: 200,
      headers: {
        'Content-Type': 'application/json',
        'Access-Control-Allow-Origin': '*'
      },
      body: JSON.stringify({
        items: result.Items || [],
        nextToken: responseNextToken,
        hasMore: !!result.LastEvaluatedKey
      })
    }
  } catch (error) {
    console.error('Error fetching items:', error)
    return {
      statusCode: 500,
      headers: {
        'Content-Type': 'application/json',
        'Access-Control-Allow-Origin': '*'
      },
      body: JSON.stringify({ error: 'Failed to fetch items' })
    }
  }
}
 
exports.handler = getItemsHandler