NOTE: This package is under active development right now (2014-5-12). It has bugs and the API may continue to change. Please help test it and fix bugs, but don't use in production yet.
A Meteor package that adds Amazon S3 storage for CollectionFS.
Install using Meteorite. When in a Meteor app directory, enter:
$ meteor add cfs:s3
- In AWS S3, create a new bucket for your CFS store. Enter the name of the bucket for the
bucket
option in your S3 store options. - Select the bucket, and then select Properties. Note the region, and enter the correct region in your S3 store options in your project. S3 displays the region name rather than the actual region, so you need to check out this table and use the corresponding value from the "Region" column for your store
region
value. Alternatively, you can specify theendpoint
option, using the value from that same table. - In AWS IAM, create a new user. Copy the generated key and secret and paste into the S3 store options in your project.
- Select your newly created user. In the bottom area, select Permissions > Attach User Policy.
- Select Custom Policy.
- To create the custom policy, give it any name you want, and then copy and paste the example policy below. Replace "mybucketname" with your actual bucket name.
{
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:ListAllMyBuckets",
"s3:ListBucket"
],
"Resource": "arn:aws:s3:::*"
},
{
"Action": [
"s3:PutObject",
"s3:PutObjectAcl",
"s3:GetObject",
"s3:GetObjectAcl",
"s3:DeleteObject",
"s3:DeleteObjectAcl"
],
"Effect": "Allow",
"Resource": [
"arn:aws:s3:::mybucketname/*"
]
}
]
}
You may have to wait for an unknown number of minutes for the new security to take effect.
Perform the steps in the "S3 Setup" section, putting the necessary information into your S3Store options, like so:
var imageStore = new FS.Store.S3("images", {
region: "my-s3-region", //optional in most cases
accessKeyId: "account or IAM key", //required if environment variables are not set
secretAccessKey: "account or IAM secret", //required if environment variables are not set
bucket: "mybucket", //required
ACL: "myValue", //optional, default is 'private', but you can allow public or secure access routed through your app URL
folder: "folder/in/bucket", //optional, which folder (key prefix) in the bucket to use
// The rest are generic store options supported by all storage adapters
transformWrite: myTransformWriteFunction, //optional
transformRead: myTransformReadFunction, //optional
maxTries: 1 //optional, default 5
});
Images = new FS.Collection("images", {
stores: [imageStore]
});
- Initially try specifying only the
accessKeyId
,secretAccessKey
, andbucket
options. Then, if it doesn't work, try adding theregion
option. Theregion
option is not usually necessary, but for some S3 regions and setups, you might need it. - Once you have things working, you can add any other global configuration options supported by the
aws-sdk
. The most common will beACL
, for which the allowed values are:- "private"
- "public-read"
- "public-read-write"
- "authenticated-read"
- "bucket-owner-read"
- "bucket-owner-full-control"
Refer to the CollectionFS package documentation for more information.
There are two approaches to safely storing your S3 credentials:
- As system environment variables (Amazon's recommended approach).
- As given in the above code but located in a directory named
server
(note: wrapping inMeteor.isServer
is NOT secure).
For Step 2:
You need to define your store in two files: one located in a server
director and one located in a client
directory. In the client-side-only file, simply don't define any options when creating your FS.Store variable. Example:
Client (client/collections_client/avatars.js)
var avatarStoreLarge = new FS.Store.S3("avatarsLarge");
var avatarStoreSmall = new FS.Store.S3("avatarsSmall");
Avatars = new FS.Collection("avatars", {
stores: [avatarStoreSmall, avatarStoreLarge],
filter: {
allow: {
contentTypes: ['image/*']
}
}
})
Server (server/collections_server/avatars.js)
var avatarStoreLarge = new FS.Store.S3("avatarsLarge", {
accessKeyId: "ID-HERE",
secretAccessKey: "ACCESS-KEY-HERE",
bucket: "avatars.large",
transformWrite: function(fileObj, readStream, writeStream) {
gm(readStream, fileObj.name()).resize('250', '250').stream().pipe(writeStream)
}
})
var avatarStoreSmall = new FS.Store.S3("avatarsSmall", {
accessKeyId: "ID-HERE",
secretAccessKey: "ACCESS-KEY-HERE",
bucket: "avatars.small",
beforeWrite: function(fileObj) {
fileObj.size(20, {store: "avatarStoreSmall", save: false});
},
transformWrite: function(fileObj, readStream, writeStream) {
gm(readStream, fileObj.name()).resize('20', '20').stream().pipe(writeStream)
}
})
Avatars = new FS.Collection("avatars", {
stores: [avatarStoreSmall, avatarStoreLarge],
filter: {
allow: {
contentTypes: ['image/*']
}
}
})
Note: Only the Stores are different between client and server (the collections should be identical). Perform all transforms and such client-side.
In addition to the core CollectionFS team, the following people have contributed:
@Sanjo
(Add yourself if you submit a PR.)