This repository contains a Books API powered by Amazon API Gateway, AWS Lambda and Amazon DynamoDB. Resources are defined and provisioned using AWS SAM.
For CI/CD it assumes there are two environments: staging and production. Pipeline is implemented using AWS CDK.
Table of contents:
- Architecture
- Requirements
- Project Structure
- Using SAM to deploy the app
- Using SAM Accelerate for development
- Testing your lambda locally
- Monitoring
- Tracing
- CI/CD
- Getting a token to manually test the API
Application is an RESTful API around the book resource. It currently supports an endpoint for registering new books and another one for retrieving them. This API is implemented using Amazon API Gateway and AWS Lambda where authentication is provided by Amazon Cognito. Amazon DynamoDB is the chosen data store.
- Node.js v22.6.0
- npm 10.9.2
- AWS SAM CLI 1.134.0 or above.
- AWS CDK Toolkit 2.180.0 or above.
- AWS CLI. You must have run
aws configure
to set up your terminal. - Create a Github Connection to your repository and note down the connection ARN as you will need it in upcoming steps.
aws-serverless-books-api-sample
|- events // HTTP request samples to test the app locally using sam local
|- images // images for this README
|- pipeline // CDK app defining a CI/CD pipeline for the API
|- src // source code
|- template.yml
AWS SAM template is defined in the root directory through a YAML file. It defines:
- An input
Parameter
that specifies to which environment we are going to be deploying to. - A
Condition
that based on the parameter above determines if this is a deployment to production or not. This is needed as different resources and configurations will be used based on the environment. Global
section to define those parameters that are common to multiple resources in the template.Books
API that glues together the configuration for our API including monitoring, tracing or authorization methods.- Lambda function called
CreateBook
which is responsible for grabbing book attributes from the HTTP request and storing them into a DynamoDB table. Configuration:- Built-in IAM policy that allows this function to perform write operations into the DynamoDB table.
- Creating books is an action that is only reserved to logged users and hence, this endpoint defines authorization through an Amazon Cognito User pool.
GetAllBooks
function peforms a scan over the book table and return all results back to the client. Considerations:- Read permission over books table is granted through another built-in IAM policy called
DynamoDBReadPolicy
. - Geting all books is a public operation that everyone can call and hence, no authentication is defined.
- Read permission over books table is granted through another built-in IAM policy called
- The deployment behaviour for these Lambda functions is different based on the target environment:
- For staging, new versions are deployed to an alias named after the environment with a bluen/green approach.
- For production, we use a more conservative approach that allows us to gradually shift traffic towards the new version. During the time this deployment lasts, each function has a CloudWatch alarm (with suffix
AliasErrorMetricGreaterThanZeroAlarm
) that monitors if the new version of the function throws errors, performing a rollback in case it does. - Only for the function creating a new book, its deployment performs a check (or smoke test) for the new version before shifting traffic to it through a Lambda function (
CreateBookPreTraffic
). If it fails, traffic is not routed to the new version and deployment is considered failed.
- All Lambda functions are written in Typescript. Compiling options (through (esbuild)[https://esbuild.github.io/]) are defined through the
Metadata
section for each function. - DynamoDB table:
Books
. - Users that are allowed to create new books need to be registered in the
CognitoUserPool
. In order to get a token, we need to define a client and domain (instructions to manually get a token using Postman are explained below). Aformentioned client only supports the OAuth implicit grant.- In order to perform automated tests in staging and given how implicit grant works (through a web browser), only for this environment we will enable username and password auth so that we can get a token programatically and hence, be able to fully tests our endpoints. This also forces us to allow the
aws.cognito.signin.user.admin
scope (only scope that can be obtained when generating an access token through Cognito SDK).
- In order to perform automated tests in staging and given how implicit grant works (through a web browser), only for this environment we will enable username and password auth so that we can get a token programatically and hence, be able to fully tests our endpoints. This also forces us to allow the
Packaging and deploying the app to AWS is relatively straight forward since all configuration is defined in template.yml
.
-
Build your functions to prepare the application for subsequent steps in the development workflow, such as local testing or deploying to the AWS.
npm install -g esbuild sam build
-
Package your Lambda functions and store them safely in a S3 bucket. This command outputs the corresponding version of your
template.yml
pointing to where your artifacts have been stored in S3.sam package --s3-bucket my-artifacts-bucket --s3-prefix my-prefix --output-template-file out.yml
-
Deploy a new version of your app using the artifacts the command above just generated (using staging as the target environment for demo purposes):
sam deploy --template-file out.yml --stack-name my-stack-staging --parameter-overrides ParameterKey=Environment,ParameterValue=staging --capabilities CAPABILITY_IAM
You can monitor how the deployment is happening through AWS CodeDeploy as the above will create a new application in this service alongside a deployment group for your function.
These three commands will be used in both Build
and Deploy
steps of our pipeline.
AWS SAM Accelerate provides a faster development experience by automatically syncing your local changes to the cloud. This is particularly useful during development as it eliminates the need to run the full build-package-deploy cycle for every code change you want to try out.
-
To sync all resources in your application to AWS:
sam sync --stack-name <my-dev-stack>
-
To sync only code changes for a specific Lambda function (e.g., CreateBook):
sam sync --stack-name <my-dev-stack> --code --resource-id CreateBook
-
To enable watch mode, which automatically syncs changes when files are modified:
sam sync --stack-name <my-dev-stack> --watch
-
To watch only a specific Lambda function for changes (e.g., GetAllBooks):
sam sync --stack-name my-stack-dev --watch --code --resource-id GetAllBooks
The watch mode is particularly useful during active development as it detects file changes and automatically syncs them to AWS without requiring manual intervention. This significantly speeds up the development cycle compared to traditional deployment methods.
Note that sam sync
is intended for development purposes only and not recommended for production deployments. For production, use CI/CD pipelines.
Create a docker network and run a local dynamodb container in it:
docker network create my-network
docker run -d --network my-network -v "$PWD":/dynamodb_local_db -p 8000:8000 \
--network-alias=dynamodb --name dynamodb \
amazon/dynamodb-local -jar DynamoDBLocal.jar -sharedDb
Create the following table in the local DynamoDB:
aws dynamodb create-table --table-name books \
--attribute-definitions AttributeName=isbn,AttributeType=S \
--key-schema AttributeName=isbn,KeyType=HASH \
--endpoint-url http://localhost:8000 \
--provisioned-throughput ReadCapacityUnits=5,WriteCapacityUnits=5
Check previous step ran successfully:
aws dynamodb list-tables --endpoint-url http://localhost:8000
aws dynamodb describe-table --table-name books --endpoint-url http://localhost:8000
Finally, test your function with a dummy event (that can be generated with sam local generate-event sqs receive-message
):
sam local invoke CreateBook -e events/create-book-request.json --env-vars events/env.json --debug-port 5858 --docker-network my-network
sam local invoke GetAllBooks -e events/get-all-books-request.json --env-vars events/env.json --debug-port 5858 --docker-network my-network
Notice that our lambda functions will point to the local DynamoDB container for the command above through its HTTP layer. Condition is based on AWS_SAM_LOCAL
which automatically gets set by sam
when executing local
commands. Similarly, integration with AWS X-Ray is only performed outside local environment.
A very similar approach using Docker will be taken to perform end-to-end tests for our Lambda function and its integration with DynamoDB.
AWS SAM CLI allows to monitor any Lambda function given its logical id within a stack or its name as we would visualize them using Cloudwatch. For ie:
sam logs -n CreateBook --stack-name BooksApiStaging --tail
Once we start interacting with the API through the two available endpoints, traces will be stored in AWS X-Ray since TracingEnabled
was set to true
in the definition of BooksApi
in template.yml
.
By navigating through the AWS console to AWS X-Ray, we can load the service map of our API and look for application issues, bottlenecks or specific areas that need improving.
Source -> Build -> Staging (Deploy + Test) -> Production (Manual approval + Deploy)
Stages and actions are implemented using AWS CodePipeline, AWS CodeBuild and AWS CodeDeploy (behind the scenes through sam deploy
command).
Pipeline itself is defined and provisioned by AWS CDK using Typescript.
To get it provisioned follow these steps:
-
First, create a parameter in your AWS account so AWS CodePipeline can connect to Github and pull source code
aws ssm put-parameter --name github_connection_arn --value <YOUR_GITHUB_CONNECTION_ARN>
-
Install AWS CDK Toolkit:
npm install -g aws-cdk
-
Then, fetch dependencies and provision pipeline:
cd pipeline npm i # bootstrap cdk for the target accont and region export ACCOUNT_ID=$(aws sts get-caller-identity --query 'Account' --output text) export AWS_REGION=$(aws configure get region) cdk bootstrap aws://$ACCOUNT_ID/$AWS_REGION npm run build cdk deploy
There will be a summary of security-related changes that needs to be approved to continue with the CloudFormation stack creation.
NOTES:
-
This step needs to be implemented only once when starting to work on the project.
-
Update the variables
gitRepo
,gitOwner
andgitBranch
onpipeline/lib/pipeline_stack.ts
to point to your Github repository.- To successfully connect to it you should create the corresponding connection (click here to learn how).
-
Artifacts generated by the pipeline are stored in an Amazon S3 bucket called
ci-cd-pipeline-artifacts-{accountId}
. -
Artifacts which are specific for the application are stored in an Amazon S3 bucket called
books-api-artifacts-{accountId}
. -
These buckets are created by our CDK script and hence, they cannot exist before running it.
-
Build stage doesn't only generate API artifacts, it also run a suite of unit tests for our AWS Lambda functions.
-
Once the application is deployed in staging, end-to-end tests are executed automatically. These tests interact directly with the provisioned app. Certain parameters such as the API endpoint or DynamoDB table name are made available to this action through CloudFormation Outputs.
Any user that wants to create books using the API directly, needs an OAuth2 token that grants access to the operation.
Since template.yml
took care of provisioning all the necessary components from an infrastructure point of view, the only step left is to create such user and create a book on his behalf:
- Navigate to Cognito using the AWS console and choose "User Pools", then the pool you want to create the user for (
staging-books-api-user-pool
orproduction-books-api-user-pool
). - Go to "App clients" under "Applications" and note down the Client ID and Allowed callback URL (from "Login pages" tab). Similarly, navigate to "Domain" under "Branding" and make of a note of it (contains
book-api-{env}-{accountId}
). - Open the Postman app (you can get it here).
- Configure a new request: POST HTTP method and URL of our REST API.
- In the authorization tab, select "OAuth 2.0" type, click on "Get New Access Token" and fill up the form with the values you took before:
-
First time, you will need to sign up by introducing email and password. You would need to confirm the user which you can do directly from the Cognito console in the "Users" page. Going forward, you will only need to sign in as the user already exists.
-
Upon a successful signing in, you are given a token that you can attach directly to the HTTP request using the
Authorization
header. -
At last, go to the Body tab and enter the book you would like to create according to the schema defined in our functions (remember to change the content-type of the request body to raw-JSON), click Send and all being well you should receive a 201 response code.
Check our contribution guidelines before submitting a pull request. Any contribution must be done to the develop
branch.
See CONTRIBUTING for more information.
This library is licensed under the MIT-0 License. See the LICENSE file.