A REST API to support Reef Guide (AIMS), built with Express, TypeScript, Zod and Prisma, deployable to AWS using CDK.
- Express.js backend with TypeScript
- Prisma ORM for database operations
- Passport based JWT authentication
- AWS CDK for infrastructure as code
- Serverless deployment using AWS Lambda and API Gateway
- Environment-based configuration with Zod validation
- Basic docker compose
- Node.js (v18+)
- AWS CLI configured with appropriate permissions
- Docker (for local development with Prisma)
- Clone the repository
- Install dependencies:
npm install
- Generate Prisma client:
npm run prisma-generate
- Set up environment variables: Copy
.env.example
to.env
- Generate JWT keys:
npm run local-keys
- Start up psql
docker compose up
- Run DB migration
npm run db-reset
- Start server with auto-restart
npm run dev
Ensure you have your npm
environment setup and installed as above i.e.
nvm use 20
npm install
Start by creating a configuration file, using either the local or remote method below.
create a config json file in configs
e.g. dev.json
. The sample.json
includes example values.
Next, run npm run aws-keys -- <secret name e.g. dev-reefguide-creds>
with appropriate AWS creds in the environment, this creates an AWS secret manager with a generated keypair for JWT signing.
Then open this secret and add DATABASE_URL
and DIRECT_URL
fields which correspond to prisma values for the postgresql DB provider.
With a configuration repo which conforms to the specifications defined below in config, you can pull it with the config script.
./config <stage> <namespace> --target <repo clone string>
e.g.
./config org dev --target git@github.com:org/repo.git
First, export your config file path
export CONFIG_FILE_NAME=<file name.json e.g. dev.json>
e.g.
export CONFIG_FILE_NAME=dev.json
Then, ensure you have AWS credentials active for the target environment, you can check using
aws sts get-caller-identity
Then, ensure your CDK environment is bootstrapped (if on new account)
npx cdk bootstrap
then run a diff
npx cdk diff
when ready,
npx cdk deploy
- Start the development server:
npm run dev
- Run linter:
npm run lint
- Run tests:
npm run test
- Type checking:
npm run typecheck
WARNING: Running the tests involves resetting the specified DB in your .env file. Double check you are not targetting a production DB before running tests.
Setup a local psql DB for integration testing.
docker-compose up
Then, keeping this running, change your .env to specify the local DB.
If you get a connection error, try 127.0.0.1
instead of localhost
.
DATABASE_URL=postgresql://admin:password@localhost:5432
DIRECT_URL=postgresql://admin:password@localhost:5432
Then migrate the DB to latest
npm run db-reset
Also ensure the rest of your .env file is suitable, specifically, generating local keys is needed
npm run local-keys
Now run tests
npm run test
- Reset database:
npm run db-reset
- Open Prisma Studio:
npm run studio
- Other prisma ops
npx prisma ...
- Configure AWS credentials
- Set up environment-specific config in
configs/[env].json
- Deploy:
CONFIG_FILE_NAME=[env].json npx cdk deploy
src/
: Source codeapi/
: API-related codedb/
: Database schemas and migrationsinfra/
: AWS CDK infrastructure code
test/
: Test filesconfigs/
: Environment-specific configurationsscripts/
: Utility scripts
config.ts
: Loads and validates environment variablesinfra_config.ts
: Defines CDK stack configuration schema
Run tests with npm test
. Tests use Jest and Supertest for API testing.
- Uses
helmet
for HTTP headers - JWT-based authentication with RS256 algorithm
- Secrets management using AWS Secrets Manager
- Include the JWT token in the Authorization header for authenticated requests
- Handle token expiration (default 1 hour) by refreshing or redirecting to login
-
VPC: A Virtual Private Cloud with public subnets.
-
ECS Cluster: Hosts the ReefGuideAPI Fargate service.
-
Application Load Balancer (ALB): Handles incoming traffic and distributes it to the ECS services.
-
API Gateway: Manages the REST API for the Web API service.
-
Lambda Function: Runs the Web API service.
-
EFS (Elastic File System): Provides persistent storage for the ReefGuideAPI service.
-
S3 Bucket: Used for intermediary data transfer between the user and the EC2 service instance which mounts the EFS.
-
EC2 Instance: Manages the EFS filesystem.
-
Route 53: Handles DNS routing.
-
ACM (AWS Certificate Manager): Manages SSL/TLS certificates.
-
Secrets Manager: Stores sensitive configuration data.
- The infrastructure is defined using AWS CDK in TypeScript.
- Configuration is loaded from JSON files in the
configs/
directory. - The
ReefGuideAPI
andWebAPI
are deployed as separate constructs.
- Runs as a Fargate service in the ECS cluster.
- Uses an Application Load Balancer for traffic distribution.
- Implements auto-scaling based on CPU and memory utilization.
- Utilizes EFS for persistent storage.
- Deployed as a Lambda function.
- Exposed via API Gateway.
- Uses AWS Secrets Manager for storing sensitive data.
- Uses a shared Application Load Balancer for the ReefGuideAPI.
- API Gateway handles routing for the WebAPI.
- Route 53 manages DNS records for both services.
- SSL/TLS certificates are managed through ACM.
- Secrets are stored in AWS Secrets Manager.
- IAM roles control access to various AWS services.
- Ensure AWS CLI is configured with appropriate permissions.
- Create a configuration file in
configs/
(e.g.,dev.json
). - Run
npm run aws-keys -- <secret name>
to set up JWT keys in Secrets Manager. - Add database connection strings to the created secret.
- Bootstrap CDK environment:
npx cdk bootstrap
- Review changes:
npx cdk diff
- Deploy:
CONFIG_FILE_NAME=[env].json npx cdk deploy
- Modify
src/infra/components/
files to adjust individual service configurations. - Update
src/infra/infra.ts
to change overall stack structure. - Adjust auto-scaling, instance types, and other parameters in the configuration JSON files.
- Update the
src/db/schema.prisma
with your new models - Apply the migration - heeding warnings
npx prisma migrate dev
This section documents the CRUD (Create, Read, Update, Delete) endpoints for polygons and notes in our API.
All routes are prefixed with /api
.
All prefixed with /auth
.
- Endpoint: POST
/register
- Body:
{ "email": "string", "password": "string" }
- Response:
- Success (201):
{ "userId": "string" }
- Error (400):
{ "message": "User already exists" }
- Success (201):
- Endpoint: POST
/login
- Body:
{ "email": "string", "password": "string" }
- Response:
- Success (200):
{ "token": "JWT_token_string", "refreshToken": "refresh_token_string" }
- Error (401):
{ "message": "Invalid credentials" }
- Success (200):
- Endpoint: POST
/token
- Body:
{ "refreshToken": "string" }
- Response:
- Success (200):
{ "token": "new_JWT_token_string" }
- Error (401):
{ "message": "Invalid refresh token" }
- Success (200):
- Endpoint: GET
/profile
- Headers:
Authorization: Bearer JWT_token_string
- Response:
- Success (200):
{ "user": { "id": "string", "email": "string", "roles": ["string"] } }
- Error (401):
{ "message": "Unauthorized" }
- Error (500):
{ "message": "User object was not available after authorisation." }
- Success (200):
- All endpoints use JSON for request and response bodies.
- The register endpoint now returns only the user ID on success.
- The login endpoint now returns both a JWT token and a refresh token.
- A new endpoint has been added for refreshing the JWT token using a refresh token.
- The profile endpoint now includes user roles in the response.
- Error responses may vary based on the specific error encountered.
Retrieves a specific polygon by ID.
- Authentication: Required (JWT)
- Authorization: User must own the polygon or be an admin
- Parameters:
id
(path parameter): ID of the polygon
- Response: Returns the polygon object
Retrieves all polygons for the authenticated user, or all polygons if the user is an admin.
- Authentication: Required (JWT)
- Response: Returns an array of polygon objects
Creates a new polygon.
- Authentication: Required (JWT)
- Request Body:
polygon
(JSON): GeoJSON representation of the polygon
- Response: Returns the created polygon object
Updates an existing polygon.
- Authentication: Required (JWT)
- Authorization: User must own the polygon or be an admin
- Parameters:
id
(path parameter): ID of the polygon to update
- Request Body:
polygon
(JSON): Updated GeoJSON representation of the polygon
- Response: Returns the updated polygon object
Deletes a polygon.
- Authentication: Required (JWT)
- Authorization: User must own the polygon or be an admin
- Parameters:
id
(path parameter): ID of the polygon to delete
- Response: 204 No Content on success
Retrieves all notes for the authenticated user, or all notes if the user is an admin.
- Authentication: Required (JWT)
- Response: Returns an array of note objects
Retrieves all notes for a specific polygon.
- Authentication: Required (JWT)
- Authorization: User must own the polygon or be an admin
- Parameters:
id
(path parameter): ID of the polygon
- Response: Returns an array of note objects associated with the polygon
Creates a new note for a given polygon.
- Authentication: Required (JWT)
- Authorization: User must own the polygon or be an admin
- Request Body:
content
(string): Content of the notepolygonId
(number): ID of the polygon to associate the note with
- Response: Returns the created note object
Updates an existing note.
- Authentication: Required (JWT)
- Authorization: User must own the note or be an admin
- Parameters:
id
(path parameter): ID of the note to update
- Request Body:
content
(string): Updated content of the note
- Response: Returns the updated note object
All endpoints require JWT authentication. Admin users have access to all resources, while regular users can only access their own resources. Invalid requests or unauthorized access attempts will result in appropriate error responses.
Routes for managing the ReefGuideAPI ECS cluster scaling and status.
Retrieves the current status of the ECS cluster.
- Authentication: Required (JWT)
- Authorization: Admin only
- Parameters: None
- Response: Returns the cluster status object
{
"runningCount": 5,
"pendingCount": 0,
"desiredCount": 3,
"deployments": [
{
"status": "PRIMARY",
"taskDefinition": "arn:aws:ecs:ap-southeast-2:xxx:task-definition/xxx:8",
"desiredCount": 3,
"pendingCount": 0,
"runningCount": 3,
"failedTasks": 0,
"rolloutState": "IN_PROGRESS",
"rolloutStateReason": "ECS deployment ecs-svc/1311621013630114425 in progress."
},
{
"status": "ACTIVE",
"taskDefinition": "arn:aws:ecs:ap-southeast-2:xxx:task-definition/xxx:8",
"desiredCount": 0,
"pendingCount": 0,
"runningCount": 2,
"failedTasks": 0,
"rolloutState": "COMPLETED",
"rolloutStateReason": "ECS deployment ecs-svc/4408993298399279146 completed."
}
],
"events": [
{
"createdAt": "2024-10-23T01:03:38.329Z",
"message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k) registered 2 targets in (target-group arn:aws:elasticloadbalancing:ap-southeast-2:xxx:targetgroup/reefgu-reefg-PAREXETNHOCW/e5dd5bec27f8064b)"
},
{
"createdAt": "2024-10-23T01:03:17.851Z",
"message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k) registered 1 targets in (target-group arn:aws:elasticloadbalancing:ap-southeast-2:xxx:targetgroup/reefgu-reefg-PAREXETNHOCW/e5dd5bec27f8064b)"
},
{
"createdAt": "2024-10-23T01:02:36.941Z",
"message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k) has started 2 tasks: (task 04dfb8c773cc47a1b0442dc1cabc497a) (task 239bccf79b8841c2afc9009496987dc0)."
},
{
"createdAt": "2024-10-23T01:02:14.081Z",
"message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k, taskSet ecs-svc/4408993298399279146) has begun draining connections on 1 tasks."
},
{
"createdAt": "2024-10-23T01:02:14.077Z",
"message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k) deregistered 1 targets in (target-group arn:aws:elasticloadbalancing:ap-southeast-2:xxx:targetgroup/reefgu-reefg-PAREXETNHOCW/e5dd5bec27f8064b)"
}
],
"serviceStatus": "ACTIVE"
}
Scales the ECS cluster to a specified number of tasks.
- Authentication: Required (JWT)
- Authorization: Admin only
- Parameters: None
- Request Body:
{
"desiredCount": number // Between 0 and 10 inclusive
}
- Response: 200 OK
Forces a new deployment of the service, which will pull the latest version of the container image.
- Authentication: Required (JWT)
- Authorization: Admin only
- Parameters: None
- Request Body: None
- Response: 200 OK
- Notes:
- This operation will perform a rolling update with zero downtime
- Old tasks will be replaced with new tasks pulling the latest image
- The deployment uses a minimum healthy percent of 50% and maximum percent of 200% to ensure service availability
- Progress can be monitored via the
/cluster/status
endpoint
This config management system is courtesy of github.com/provena/provena
This repo features a detached configuration management approach. This means that configuration should be stored in a separate private repository. This repo provides a set of utilities which interact with this configuration repository, primary the ./config
bash script.
config - Configuration management tool for interacting with a private configuration repository
Usage:
config NAMESPACE STAGE [OPTIONS]
config --help | -h
config --version | -v
Options:
--target, -t REPO_CLONE_STRING
The repository clone string
--repo-dir, -d PATH
Path to the pre-cloned repository
--help, -h
Show this help
--version, -v
Show version number
Arguments:
NAMESPACE
The namespace to use (e.g., 'rrap')
STAGE
The stage to use (e.g., 'dev', 'stage')
Environment Variables:
DEBUG
Set to 'true' for verbose output
The central idea of this configuration approach is that each namespace/stage combination contains a set of files, which are gitignored by default in this repo, which are 'merged' into the user's clone of the this repository, allowing temporary access to private information without exposing it in git.
The script builds in functionality to cache the repo which makes available a given namespace/stage combination. These are stored in env.json
, at the repository root, which has a structure like so:
{
"namespace": {
"stage1": "git@github.com:org/repo.git",
"stage2": "git@github.com:org/repo.git",
"stage3": "git@github.com:org/repo.git"
}
}
This saves using the --target
option on every ./config
invocation. You can share this file between team members, but we do not recommend committing it to your repository.
Namespace: This is a grouping that we provide to allow you to separate standalone sets of configurations into distinct groups. For example, you may manage multiple organisation's configurations in one repo. You can just use a single namespace if suitable.
Stage: A stage is a set of configurations within a namespace. This represents a 'deployment' of Provena.
The configuration repository contains configuration files for the this project.
The configuration repo does not contain sample cdk.context.json
files, but we recommend including this in this repo to make sure deployments are deterministic. This will be generated upon first CDK deploy.
The configuration repository is organized using a hierarchical structure based on namespaces and stages:
.
├── README.md
└── <your-namespace>
├── base
├── dev
└── feat
A namespace represents a set of related deployment stages, usually one namespace per organisation/use case.
Within each namespace, there are multiple stages representing different environments/deployment specifications
base
: Contains common base configurations shared across all stages within the namespacedev
: Sample development environment configurationsfeat
: Sample feature branch workflow environment configurations
The feat stage supports the feature branch deployment workflow which is now a part of the open-source workflow. This makes use of environment variable substitution which is described later.
Configuration files are placed within the appropriate namespace and stage directories. Currently:
.
├── README.md
└── your-namespace
└──── dev
└── configs
└── dev.json
Files in the base
directory of a namespace are applied first, regardless of the target stage. This allows you to define common configurations that are shared across all stages within a namespace.
Files in stage-specific directories (e.g., dev
, test
, prod
) are applied after the base configurations. They can override or extend the base configurations as needed.
The main repository contains a configuration management script that interacts with this configuration repository. Here's how it works:
- The script clones or uses a pre-cloned version of this configuration repository.
- It then copies the relevant configuration files based on the specified namespace and stage.
- The process follows these steps:
a. Copy all files from the
<namespace>/base/
directory (if it exists). b. Copy all files from the<namespace>/<stage>/
directory, potentially overwriting files from the base configuration. - The copied configuration files are then used by the this system for the specified namespace and stage.
- Use version control: Commit and push changes to this repository regularly.
- Document changes: Use clear, descriptive commit messages and update this README if you make structural changes.
- Minimize secrets: Avoid storing sensitive information like passwords or API keys directly in these files. Instead, use secure secret management solutions.