Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
s3-asset-uploader
Advanced tools
Synchronizes a local directory with an Amazon S3 bucket
Key | Type | Description |
---|---|---|
path (REQUIRED) | string | the base path to synchronize with S3 |
ignorePaths | Array.<(RegExp|string)> | skip these paths when gathering files |
digestFileKey | AWS.S3.ObjectKey | the destination key of the generated digest file |
prefix | string | prepended to file names (but not digestFileKey !) when uploaded |
headers | S3UploadHeaders | extra params used by AWS.S3 upload method |
gzipHeaders | S3UploadHeaders | extra params used by AWS.S3 upload method for GZIP files |
gzipHashedFileKeyRegexp | RegExp | gzip the hashed files that match this pattern |
noUpload | boolean | don't upload anything, just generate a digest mapping |
noUploadDigestFile | boolean | don't upload the digest mapping file |
noUploadOriginalFiles | boolean | don't upload the original (unhashed) files |
noUploadHashedFiles | boolean | don't upload the hashed files |
forceUpload | boolean | skip shouldUpload etag modified lookup for keys before uploading; does not override noUpload* options |
hashedOriginalFileRegexp | `RegExp | boolean` |
includePseudoUnhashedOriginalFilesInDigest | boolean | add pseudo-entries to the digest for the "unhashed" variant of hashed original files |
const { S3Sync } = require('s3-asset-uploader')
const config = {
key: '<aws-access-key-id>',
secret: '<aws-secret-access-key>',
bucket: '<aws-s3-bucket-name>'
}
const options = {
path: './public',
ignorePaths: ['js/vendor', '.DS_Store'],
prefix: 'assets',
digestFileKey: 'config/asset-map.json'
}
const s3SyncUploader = new S3Sync(config, options)
s3SyncUploader.run()
.then(digest => {
console.log('S3 Sync complete! Digest: ', digest)
})
.catch(err => {
console.error('S3 Sync failed: ', err)
})
To see what's going on under the hood, add s3-asset-uploader
to your DEBUG
environment variable:
DEBUG=s3-asset-uploader
For more information on configuring the debug
logger, see: https://github.com/visionmedia/debug#readme
FAQs
AWS S3 Asset Uploader
We found that s3-asset-uploader demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 6 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.