Skip to content

Starter kit enabling near-instant spawning of serverless projects that are 100% version controlled.

Notifications You must be signed in to change notification settings

tommedema/serverless-aws-crud-starter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

73 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

serverless-aws-crud-starter

Serverless is a new paradigm that's easy to get started with but introduces several questions once applied on a larger scale. This starter kit aims to resolve most of these issues in an opinionated manner and allows for the almost instantaneous bootstrapping of maintainable serverless projects. These projects are typically geared towards web applications, including both front and backend. In addition to answering questions on how a large serverless project can remain maintainable, it also provides most of the boilerplate that web applications need, including but not limited to:

  • the spawning of databases
  • authentication, including social providers such as Google and Facebook
  • the ability to perform create, read, update, delete operations with an API
  • the deployment, hosting, and caching of server-side-rendered React applications
  • the automatic configuration of a provided domain name, including HTTPS enforcement and www. prefix forwarding
  • the automatic requesting, validation, and renewal of SSL certificates

All of this is done while adhering to the following core principles of this library:

  • 100% version controlled (infrastructure as code)
  • 100% serverless (potentially infinite scalability)
  • highly maintainable (function and component level modularity)
  • test driven development

An example frontend app is included such that you can quickly get started. Credits for the app itself go to the guys at the excellent Serverless Stack guide.

Getting started

Prerequisites

  1. Node.js
  2. AWS cli
  3. AWS account with an API user with administrator rights

Installation

  1. $ git clone repo
  2. edit package.json with your project's name, AWS region, and optionally define your domain names (per stage)
  3. define aws profile based on project name and stage
  4. npm install
  5. $ STAGE=dev npm run deploy

AWS profile configuration

For security reasons, each project and stage combination is recommended to run on its own sandboxed AWS account. If you are running multiple non-production environments, it's acceptable to deploy these to the same account, but you still need to create an AWS profile for each. A AWS profile is named after the project's name postfixed by a hyphen (-) and the name of your stage. You should add these profiles to your ~/.aws/credentials file. For example:

~/.aws/credentials

[serverless-aws-crud-starter-prod]
aws_access_key_id = XXXXXXXXXXXXXXXXXXXX
aws_secret_access_key = YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY
[serverless-aws-crud-starter-dev]
aws_access_key_id = XXXXXXXXXXXXXXXXXXXX
aws_secret_access_key = YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY

Previewing branches

You can easily preview a new branch by deploying it under a different stage. E.g.: $ STAGE=<my_feature> npm run deploy

Adding a domain

If you have a domain, simply add it to your package.json under slsConfig.domains.${stage_name} where ${stage_name} is the name of your stage or environment (e.g. dev, prod, or a name of a feature branch):

package.json

{
  ...
  "slsConfig": {
    "region": "eu-west-2",
    "domains": {
      "dev": {
        "name": "my-domain.com",
        "requestCertificate": true
      }
    }
  },
  ...
}

Once deployed, you will be informed to set your domain's nameservers. If you have requestCertificate set to true, a certificate will be requested and validated automatically as soon as your nameservers are set up. Once validated, the next deploy will cause the certificate to be activated and for all traffic to start using the https protocol. Certificates are automatically renewed. In summary, you may have to deploy twice to get a fully functioning SSL-enabled domain:

  1. The first deploy creates your hosted zones and informs you about the nameservers you should set your domain to. It will also request a certificate and prepare DNS based domain validation entries for your hosted zone.
  2. Subsequent deploys will check if your domain is now propagating correctly to your hosted zone. If so, it will be verified automatically by AWS Certificate Manager through DNS (this may take up to 2 hours). Once you deploy while the certificate is verified, it will start to be used by the cloudfront distributions and all HTTP traffic will be redirected to HTTPS.

Deploying and removing individual services

To deploy or remove an individual service, simply navigate to that service's directory, and run STAGE=dev npm run deploy or STAGE=dev npm run remove.

Cleanup

To remove a stage, run STAGE=<my_feature> npm run remove in the project directory.

Required knowledge

While this starter helps you get on your way quickly, you'll have to be comfortable with the following technologies to be able to develop it further and customize it to an actual project.

Domain driven design

Serverless.yml and cloudformation templates can quickly grow out of hand, reaching more than a thousand lines for even the simplest applications. Authentication alone requires the setup of a Cognito identity pool, a user pool, a user pool client, as well as at least 2 different user roles. These hundreds of lines of boilerplate code should not obfuscate your business logic. It follows that your serverless project should be designed around domains, such as auth, a CDN, an API, a hosted zone, etc.

Unfortunately this brings you back to some of the traditional infrastructural complications that Serverless tries to prevent, most notably orchestration and between-service communication. Due to a lack of tooling to achieve this in serverless, a simple approach is followed here where services are prefixed by an integer indicating their order of deployment (e.g. 00, 01, NN). Services that depend on another service have to be deployed later than the service they depend on. For example, the web service creates a cloudfront distribution, while the domains service sets up a route53 hosted zone. The domains service then imports ID of the cloudfront distribution in order to associate it with the hosted zone:

WebHostedZoneRecordSetGroup:
  Type: AWS::Route53::RecordSetGroup
  Condition: ShouldSetupDomain
  Properties:
    HostedZoneId:
      Ref: WebHostedZone
    RecordSets:
    - Type: A
      Name: ${{self:custom.slsConfig.domains.${{self:provider.stage}}.name, ''}}
      AliasTarget:
        DNSName: ${{cf:${{self:custom.projectName}}-web-${{self:provider.stage}}.WebCloudfrontDomainName}}
        HostedZoneId: Z2FDTNDATAQYW2

Admittedly, while pragmatic, the approach followed here may be suboptimal (e.g. because it is hard to manually define which service should be deployed first). As the serverless world is still in its early stages, it is hoped that developments in this area can be expected. If you have ideas on how we can do this as part of this starter, please feel free to contribute.

Note that development dependencies are installed on the project level, such that these dependencies can be re-used across services. Other dependencies are installed on the service level.

Future

Find the current roadmap here.

This is only the first phase of this starter. Based on my experience as CTO at a highly valued scale-up, it is the integration of infrastructure, platform, and tooling that enables a development team to achieve a stable and high velocity. The vision of this project is to allow for the near instant spawning of such projects, without having to put much thought into infrastructural or managerial decisions again. This includes a seamless continuous integration or even deployment process, the instant availability of a fully-featured development environment, as well as the use of proven agile software development methodologies such as scrum. As such, in a next phase of this starter, the following optional additions will be considered:

  • automatic setup of a full continuous integration process, with multi-branching
  • automatic provisioning of a fully featured development environment using Cloud9
  • automatic setup of a scrumban project and board for each root project and service, connected with CI

Since these last features are more distant from code, they can be opted out from.

About

Starter kit enabling near-instant spawning of serverless projects that are 100% version controlled.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published