Add a Create Note API
Let’s get started on our backend by first adding an API to create a note. This API will take the note object as the input and store it in the database with a new id. The note object will contain the content
field (the content of the note) and an attachment
field (the URL to the uploaded file).
Add the Function
Let’s add our first function.
Create a new file called create.js
in our project root with the following.
import * as uuid from "uuid";
import AWS from "aws-sdk";
const dynamoDb = new AWS.DynamoDB.DocumentClient();
export function main(event, context, callback) {
// Request body is passed in as a JSON encoded string in 'event.body'
const data = JSON.parse(event.body);
const params = {
TableName: process.env.tableName,
// 'Item' contains the attributes of the item to be created
// - 'userId': user identities are federated through the
// Cognito Identity Pool, we will use the identity id
// as the user id of the authenticated user
// - 'noteId': a unique uuid
// - 'content': parsed from request body
// - 'attachment': parsed from request body
// - 'createdAt': current Unix timestamp
Item: {
userId: event.requestContext.identity.cognitoIdentityId,
noteId: uuid.v1(),
content: data.content,
attachment: data.attachment,
createdAt: Date.now()
}
};
dynamoDb.put(params, (error, data) => {
// Set response headers to enable CORS (Cross-Origin Resource Sharing)
const headers = {
"Access-Control-Allow-Origin": "*",
"Access-Control-Allow-Credentials": true
};
// Return status code 500 on error
if (error) {
const response = {
statusCode: 500,
headers: headers,
body: JSON.stringify({ status: false })
};
callback(null, response);
return;
}
// Return status code 200 and the newly created item
const response = {
statusCode: 200,
headers: headers,
body: JSON.stringify(params.Item)
};
callback(null, response);
});
}
There are some helpful comments in the code but we are doing a few simple things here.
- The AWS JS SDK assumes the region based on the current region of the Lambda function. So if your DynamoDB table is in a different region, make sure to set it by calling
AWS.config.update({ region: "my-region" });
before initializing the DynamoDB client. - Parse the input from the
event.body
. This represents the HTTP request parameters. - We read the name of our DynamoDB table from the environment variable using
process.env.tableName
. We’ll be setting this in ourserverless.yml
below. We do this so we won’t have to hardcode it in every function. - The
userId
is a Federated Identity id that comes in as a part of the request. This is set after our user has been authenticated via the User Pool. We are going to expand more on this in the coming chapters when we set up our Cognito Identity Pool. However, if you want to use the user’s User Pool user Id; take a look at the Mapping Cognito Identity Id and User Pool Id chapter. - Make a call to DynamoDB to put a new object with a generated
noteId
and the current date as thecreatedAt
. - Upon success, return the newly created note object with the HTTP status code
200
and response headers to enable CORS (Cross-Origin Resource Sharing). - And if the DynamoDB call fails then return an error with the HTTP status code
500
.
Configure the API Endpoint
Now let’s define the API endpoint for our function.
Open the serverless.yml
file and replace it with the following.
service: notes-api
# Create an optimized package for our functions
package:
individually: true
plugins:
- serverless-bundle # Package our functions with Webpack
- serverless-offline
- serverless-dotenv-plugin # Load .env as environment variables
provider:
name: aws
runtime: nodejs12.x
stage: prod
region: us-east-1
# These environment variables are made available to our functions
# under process.env.
environment:
tableName: notes
# 'iamRoleStatements' defines the permission policy for the Lambda function.
# In this case Lambda functions are granted with permissions to access DynamoDB.
iamRoleStatements:
- Effect: Allow
Action:
- dynamodb:Scan
- dynamodb:Query
- dynamodb:GetItem
- dynamodb:PutItem
- dynamodb:UpdateItem
- dynamodb:DeleteItem
- dynamodb:DescribeTable
Resource: "arn:aws:dynamodb:us-east-1:*:*"
functions:
# Defines an HTTP API endpoint that calls the main function in create.js
# - path: url path is /notes
# - method: POST request
# - cors: enabled CORS (Cross-Origin Resource Sharing) for browser cross
# domain api call
# - authorizer: authenticate using the AWS IAM role
create:
handler: create.main
events:
- http:
path: notes
method: post
cors: true
authorizer: aws_iam
Here we are adding our newly added create function to the configuration. We specify that it handles post
requests at the /notes
endpoint. This pattern of using a single Lambda function to respond to a single HTTP event is very much like the Microservices architecture. We discuss this and a few other patterns in the chapter on organizing Serverless Framework projects. We set CORS support to true. This is because our frontend is going to be served from a different domain. As the authorizer we are going to restrict access to our API based on the user’s IAM credentials. We will touch on this and how our User Pool works with this, in the Cognito Identity Pool chapter.
The environment:
block allows us to define environment variables for our Lambda function. These are made available under the process.env
Node.js variable. In our specific case, we are using process.env.tableName
to access the name of our DynamoDB table.
The iamRoleStatements
section is telling AWS which resources our Lambda functions have access to. In this case we are saying that our Lambda functions can carry out the above listed actions on DynamoDB. We specify DynamoDB using arn:aws:dynamodb:us-east-1:*:*
. This is roughly pointing to every DynamoDB table in the us-east-1
region. We can be more specific here by specifying the table name but we’ll leave this as an exercise for the reader. Just make sure to use the region that the DynamoDB table was created in, as this can be a common source of issues later on. For us the region is us-east-1
.
Test
Now we are ready to test our new API. To be able to test it on our local we are going to mock the input parameters.
In our project root, create a mocks/
directory.
$ mkdir mocks
Create a mocks/create-event.json
file and add the following.
{
"body": "{\"content\":\"hello world\",\"attachment\":\"hello.jpg\"}",
"requestContext": {
"identity": {
"cognitoIdentityId": "USER-SUB-1234"
}
}
}
You might have noticed that the body
and requestContext
fields are the ones we used in our create function. In this case the cognitoIdentityId
field is just a string we are going to use as our userId
. We can use any string here; just make sure to use the same one when we test our other functions.
And to invoke our function we run the following in the root directory.
$ serverless invoke local --function create --path mocks/create-event.json
If you have multiple profiles for your AWS SDK credentials, you will need to explicitly pick one. Use the following command instead:
$ AWS_PROFILE=myProfile serverless invoke local --function create --path mocks/create-event.json
Where myProfile
is the name of the AWS profile you want to use. If you need more info on how to work with AWS profiles in Serverless, refer to our Configure multiple AWS profiles chapter.
The response should look similar to this.
{
statusCode: 200,
headers: {
'Access-Control-Allow-Origin': '*',
'Access-Control-Allow-Credentials': true
},
body: '{"userId":"USER-SUB-1234","noteId":"578eb840-f70f-11e6-9d1a-1359b3b22944","content":"hello world","attachment":"hello.jpg","createdAt":1487800950620}'
}
Make a note of the noteId
in the response. We are going to use this newly created note in the next chapter.
Refactor Our Code
Before we move on to the next chapter, let’s quickly refactor the code since we are going to be doing much of the same for all of our APIs.
Start by replacing our create.js
with the following.
import * as uuid from "uuid";
import handler from "./libs/handler-lib";
import dynamoDb from "./libs/dynamodb-lib";
export const main = handler(async (event, context) => {
const data = JSON.parse(event.body);
const params = {
TableName: process.env.tableName,
// 'Item' contains the attributes of the item to be created
// - 'userId': user identities are federated through the
// Cognito Identity Pool, we will use the identity id
// as the user id of the authenticated user
// - 'noteId': a unique uuid
// - 'content': parsed from request body
// - 'attachment': parsed from request body
// - 'createdAt': current Unix timestamp
Item: {
userId: event.requestContext.identity.cognitoIdentityId,
noteId: uuid.v1(),
content: data.content,
attachment: data.attachment,
createdAt: Date.now()
}
};
await dynamoDb.put(params);
return params.Item;
});
This code doesn’t work just yet but it shows you what we want to accomplish:
- We want to make our Lambda function
async
, and simply return the results. Without having to call thecallback
method. - We want to simplify how we make calls to DynamoDB. We don’t want to have to create a
new AWS.DynamoDB.DocumentClient()
. We also want to use async/await when working with our database calls. - We want to centrally handle any errors in our Lambda functions.
- Finally, since all of our Lambda functions will be handling API endpoints, we want to handle our HTTP responses in one place.
To do all of this let’s first create our dynamodb-lib
.
In our project root, create a libs/
directory.
$ mkdir libs
$ cd libs
Create a libs/dynamodb-lib.js
file with:
import AWS from "aws-sdk";
const client = new AWS.DynamoDB.DocumentClient();
export default {
get : (params) => client.get(params).promise(),
put : (params) => client.put(params).promise(),
query : (params) => client.query(params).promise(),
update: (params) => client.update(params).promise(),
delete: (params) => client.delete(params).promise(),
};
Here we are using the promise form of the DynamoDB methods. Promises are a method for managing asynchronous code that serve as an alternative to the standard callback function syntax. It will make our code a lot easier to read. And we are exposing the DynamoDB client methods that we are going to need in this guide.
Also create a libs/handler-lib.js
file with the following.
export default function handler(lambda) {
return async function (event, context) {
let body, statusCode;
try {
// Run the Lambda
body = await lambda(event, context);
statusCode = 200;
} catch (e) {
body = { error: e.message };
statusCode = 500;
}
// Return HTTP response
return {
statusCode,
body: JSON.stringify(body),
headers: {
"Access-Control-Allow-Origin": "*",
"Access-Control-Allow-Credentials": true,
},
};
};
}
Let’s go over this in detail.
- We are creating a
handler
function that we’ll use as a wrapper around our Lambda functions. - It takes our Lambda function as the argument.
- We then run the Lambda function in a
try/catch
block. - On success, we
JSON.stringify
the result and return it with a200
status code. - If there is an error then we return the error message with a
500
status code.
It’s important to note that the handler-lib.js
needs to be imported before we import anything else. This is because we’ll be adding some error handling to it later that needs to be initialized when our Lambda function is first invoked.
Next, we are going to write the API to get a note given its id.
Common Issues
-
Response
statusCode: 500
If you see a
statusCode: 500
response when you invoke your function, here is how to debug it. The error is generated by our code in thecatch
block. Adding aconsole.log
in ourlibs/handler-lib.js
, should give you a clue about what the issue is.} catch (e) { // Print out the full error console.log(e); body = { error: e.message }; statusCode = 500; }
For help and discussion
Comments on this chapter