Every line of 'fakepath file upload' code snippets is scanned for vulnerabilities by our powerful machine learning engine that combs millions of open source libraries, ensuring your JavaScript code is secure.
135 async function upload(file: string, remotePath: string) { 136 return new Promise((resolve, reject) => { 137 const body = fs.createReadStream(file) 138 const params = { Bucket: bucketName, Key: remotePath, Body: body, ContentType: mime.getType(file) } 139 s3.upload(params, function (err, data) { 140 if (err) { 141 body.destroy() 142 reject(err) 143 } else { 144 body.destroy() 145 resolve() 146 } 147 }) 148 }) 149 }
Secure your code as it's written. Use Snyk Code to scan source code in minutes – no build needed – and fix issues immediately. Enable Snyk Code
141 function fupload(path, blob) { 142 var form = new FormData(), 143 request = new XMLHttpRequest(); 144 log('upload path:', path); 145 form.append('path', path); 146 form.append('blob', blob); 147 request.open( 148 'POST', 149 'http://localhost:9888/upload', // :( 150 true 151 ); 152 request.send(form); 153 }
17 function upload(path, file, metadata) { 18 var ref, task; 19 return _regenerator2.default.wrap(function upload$(_context) { 20 while (1) { 21 switch (_context.prev = _context.next) { 22 case 0: 23 ref = this.app.storage().ref(path); 24 _context.next = 3; 25 return (0, _effects.call)([ref, ref.put], file, metadata); 26 27 case 3: 28 task = _context.sent; 29 return _context.abrupt('return', task); 30 31 case 5: 32 case 'end': 33 return _context.stop(); 34 } 35 } 36 }, _marked[0], this); 37 }