Skip to content

Holds a combination of application and infrastructure code for the ReefGuide's web API.

License

Notifications You must be signed in to change notification settings

open-AIMS/reefguide-web-api

Repository files navigation

ReefGuide Web API

A REST API to support Reef Guide (AIMS), built with Express, TypeScript, Zod and Prisma, deployable to AWS using CDK.

Features

  • Express.js backend with TypeScript
  • Prisma ORM for database operations
  • Passport based JWT authentication
  • AWS CDK for infrastructure as code
  • Serverless deployment using AWS Lambda and API Gateway
  • Environment-based configuration with Zod validation
  • Basic docker compose

Prerequisites

  • Node.js (v18+)
  • AWS CLI configured with appropriate permissions
  • Docker (for local development with Prisma)

Setup (local)

  1. Clone the repository
  2. Install dependencies: npm install
  3. Generate Prisma client: npm run prisma-generate
  4. Set up environment variables: Copy .env.example to .env
  5. Generate JWT keys: npm run local-keys
  6. Start up psql docker compose up
  7. Run DB migration npm run db-reset
  8. Start server with auto-restart npm run dev

Setup and deploy with AWS

Ensure you have your npm environment setup and installed as above i.e.

nvm use 20
npm install

Start by creating a configuration file, using either the local or remote method below.

Local configuration method (new deployment)

create a config json file in configs e.g. dev.json. The sample.json includes example values.

Next, run npm run aws-keys -- <secret name e.g. dev-reefguide-creds> with appropriate AWS creds in the environment, this creates an AWS secret manager with a generated keypair for JWT signing.

Then open this secret and add DATABASE_URL and DIRECT_URL fields which correspond to prisma values for the postgresql DB provider.

Remote configuration method (existing configuration)

With a configuration repo which conforms to the specifications defined below in config, you can pull it with the config script.

./config <stage> <namespace> --target <repo clone string>

e.g.

./config org dev --target git@github.com:org/repo.git

Deploying with CDK

First, export your config file path

export CONFIG_FILE_NAME=<file name.json e.g. dev.json>

e.g.

export CONFIG_FILE_NAME=dev.json

Then, ensure you have AWS credentials active for the target environment, you can check using

aws sts get-caller-identity

Then, ensure your CDK environment is bootstrapped (if on new account)

npx cdk bootstrap

then run a diff

npx cdk diff

when ready,

npx cdk deploy

Development

  • Start the development server: npm run dev
  • Run linter: npm run lint
  • Run tests: npm run test
  • Type checking: npm run typecheck

Testing

WARNING: Running the tests involves resetting the specified DB in your .env file. Double check you are not targetting a production DB before running tests.

Setup a local psql DB for integration testing.

docker-compose up

Then, keeping this running, change your .env to specify the local DB. If you get a connection error, try 127.0.0.1 instead of localhost.

DATABASE_URL=postgresql://admin:password@localhost:5432
DIRECT_URL=postgresql://admin:password@localhost:5432

Then migrate the DB to latest

npm run db-reset

Also ensure the rest of your .env file is suitable, specifically, generating local keys is needed

npm run local-keys

Now run tests

npm run test

Database

  • Reset database: npm run db-reset
  • Open Prisma Studio: npm run studio
  • Other prisma ops npx prisma ...

Deployment

  1. Configure AWS credentials
  2. Set up environment-specific config in configs/[env].json
  3. Deploy: CONFIG_FILE_NAME=[env].json npx cdk deploy

Project Structure

  • src/: Source code
    • api/: API-related code
    • db/: Database schemas and migrations
    • infra/: AWS CDK infrastructure code
  • test/: Test files
  • configs/: Environment-specific configurations
  • scripts/: Utility scripts

Configuration

  • config.ts: Loads and validates environment variables
  • infra_config.ts: Defines CDK stack configuration schema

Testing

Run tests with npm test. Tests use Jest and Supertest for API testing.

Security

  • Uses helmet for HTTP headers
  • JWT-based authentication with RS256 algorithm
  • Secrets management using AWS Secrets Manager

Notes

  • Include the JWT token in the Authorization header for authenticated requests
  • Handle token expiration (default 1 hour) by refreshing or redirecting to login

CDK Infrastructure

Components

  1. VPC: A Virtual Private Cloud with public subnets.

  2. ECS Cluster: Hosts the ReefGuideAPI Fargate service.

  3. Application Load Balancer (ALB): Handles incoming traffic and distributes it to the ECS services.

  4. API Gateway: Manages the REST API for the Web API service.

  5. Lambda Function: Runs the Web API service.

  6. EFS (Elastic File System): Provides persistent storage for the ReefGuideAPI service.

  7. S3 Bucket: Used for intermediary data transfer between the user and the EC2 service instance which mounts the EFS.

  8. EC2 Instance: Manages the EFS filesystem.

  9. Route 53: Handles DNS routing.

  10. ACM (AWS Certificate Manager): Manages SSL/TLS certificates.

  11. Secrets Manager: Stores sensitive configuration data.

Configuration

  • The infrastructure is defined using AWS CDK in TypeScript.
  • Configuration is loaded from JSON files in the configs/ directory.
  • The ReefGuideAPI and WebAPI are deployed as separate constructs.

ReefGuideAPI

  • Runs as a Fargate service in the ECS cluster.
  • Uses an Application Load Balancer for traffic distribution.
  • Implements auto-scaling based on CPU and memory utilization.
  • Utilizes EFS for persistent storage.

WebAPI

  • Deployed as a Lambda function.
  • Exposed via API Gateway.
  • Uses AWS Secrets Manager for storing sensitive data.

Networking

  • Uses a shared Application Load Balancer for the ReefGuideAPI.
  • API Gateway handles routing for the WebAPI.
  • Route 53 manages DNS records for both services.

Security

  • SSL/TLS certificates are managed through ACM.
  • Secrets are stored in AWS Secrets Manager.
  • IAM roles control access to various AWS services.

CDK Deployment

  1. Ensure AWS CLI is configured with appropriate permissions.
  2. Create a configuration file in configs/ (e.g., dev.json).
  3. Run npm run aws-keys -- <secret name> to set up JWT keys in Secrets Manager.
  4. Add database connection strings to the created secret.
  5. Bootstrap CDK environment: npx cdk bootstrap
  6. Review changes: npx cdk diff
  7. Deploy: CONFIG_FILE_NAME=[env].json npx cdk deploy

Customization

  • Modify src/infra/components/ files to adjust individual service configurations.
  • Update src/infra/infra.ts to change overall stack structure.
  • Adjust auto-scaling, instance types, and other parameters in the configuration JSON files.

Using Prisma ORM

Creating a new entity

  1. Update the src/db/schema.prisma with your new models
  2. Apply the migration - heeding warnings
npx prisma migrate dev

Routes

This section documents the CRUD (Create, Read, Update, Delete) endpoints for polygons and notes in our API.

Base URL

All routes are prefixed with /api.

Auth Routes

All prefixed with /auth.

1. Register

  • Endpoint: POST /register
  • Body:
    {
      "email": "string",
      "password": "string"
    }
  • Response:
    • Success (201): { "userId": "string" }
    • Error (400): { "message": "User already exists" }

2. Login

  • Endpoint: POST /login
  • Body:
    {
      "email": "string",
      "password": "string"
    }
  • Response:
    • Success (200): { "token": "JWT_token_string", "refreshToken": "refresh_token_string" }
    • Error (401): { "message": "Invalid credentials" }

3. Refresh Token

  • Endpoint: POST /token
  • Body:
    {
      "refreshToken": "string"
    }
  • Response:
    • Success (200): { "token": "new_JWT_token_string" }
    • Error (401): { "message": "Invalid refresh token" }

4. Get User Profile

  • Endpoint: GET /profile
  • Headers: Authorization: Bearer JWT_token_string
  • Response:
    • Success (200): { "user": { "id": "string", "email": "string", "roles": ["string"] } }
    • Error (401): { "message": "Unauthorized" }
    • Error (500): { "message": "User object was not available after authorisation." }

Notes

  • All endpoints use JSON for request and response bodies.
  • The register endpoint now returns only the user ID on success.
  • The login endpoint now returns both a JWT token and a refresh token.
  • A new endpoint has been added for refreshing the JWT token using a refresh token.
  • The profile endpoint now includes user roles in the response.
  • Error responses may vary based on the specific error encountered.

Polygons

GET /polygons/:id

Retrieves a specific polygon by ID.

  • Authentication: Required (JWT)
  • Authorization: User must own the polygon or be an admin
  • Parameters:
    • id (path parameter): ID of the polygon
  • Response: Returns the polygon object

GET /polygons

Retrieves all polygons for the authenticated user, or all polygons if the user is an admin.

  • Authentication: Required (JWT)
  • Response: Returns an array of polygon objects

POST /polygons

Creates a new polygon.

  • Authentication: Required (JWT)
  • Request Body:
    • polygon (JSON): GeoJSON representation of the polygon
  • Response: Returns the created polygon object

PUT /polygons/:id

Updates an existing polygon.

  • Authentication: Required (JWT)
  • Authorization: User must own the polygon or be an admin
  • Parameters:
    • id (path parameter): ID of the polygon to update
  • Request Body:
    • polygon (JSON): Updated GeoJSON representation of the polygon
  • Response: Returns the updated polygon object

DELETE /polygons/:id

Deletes a polygon.

  • Authentication: Required (JWT)
  • Authorization: User must own the polygon or be an admin
  • Parameters:
    • id (path parameter): ID of the polygon to delete
  • Response: 204 No Content on success

Notes

GET /notes

Retrieves all notes for the authenticated user, or all notes if the user is an admin.

  • Authentication: Required (JWT)
  • Response: Returns an array of note objects

GET /notes/:id

Retrieves all notes for a specific polygon.

  • Authentication: Required (JWT)
  • Authorization: User must own the polygon or be an admin
  • Parameters:
    • id (path parameter): ID of the polygon
  • Response: Returns an array of note objects associated with the polygon

POST /notes

Creates a new note for a given polygon.

  • Authentication: Required (JWT)
  • Authorization: User must own the polygon or be an admin
  • Request Body:
    • content (string): Content of the note
    • polygonId (number): ID of the polygon to associate the note with
  • Response: Returns the created note object

PUT /notes/:id

Updates an existing note.

  • Authentication: Required (JWT)
  • Authorization: User must own the note or be an admin
  • Parameters:
    • id (path parameter): ID of the note to update
  • Request Body:
    • content (string): Updated content of the note
  • Response: Returns the updated note object

All endpoints require JWT authentication. Admin users have access to all resources, while regular users can only access their own resources. Invalid requests or unauthorized access attempts will result in appropriate error responses.

Cluster Management

Routes for managing the ReefGuideAPI ECS cluster scaling and status.

GET /admin/status

Retrieves the current status of the ECS cluster.

  • Authentication: Required (JWT)
  • Authorization: Admin only
  • Parameters: None
  • Response: Returns the cluster status object
{
  "runningCount": 5,
  "pendingCount": 0,
  "desiredCount": 3,
  "deployments": [
    {
      "status": "PRIMARY",
      "taskDefinition": "arn:aws:ecs:ap-southeast-2:xxx:task-definition/xxx:8",
      "desiredCount": 3,
      "pendingCount": 0,
      "runningCount": 3,
      "failedTasks": 0,
      "rolloutState": "IN_PROGRESS",
      "rolloutStateReason": "ECS deployment ecs-svc/1311621013630114425 in progress."
    },
    {
      "status": "ACTIVE",
      "taskDefinition": "arn:aws:ecs:ap-southeast-2:xxx:task-definition/xxx:8",
      "desiredCount": 0,
      "pendingCount": 0,
      "runningCount": 2,
      "failedTasks": 0,
      "rolloutState": "COMPLETED",
      "rolloutStateReason": "ECS deployment ecs-svc/4408993298399279146 completed."
    }
  ],
  "events": [
    {
      "createdAt": "2024-10-23T01:03:38.329Z",
      "message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k) registered 2 targets in (target-group arn:aws:elasticloadbalancing:ap-southeast-2:xxx:targetgroup/reefgu-reefg-PAREXETNHOCW/e5dd5bec27f8064b)"
    },
    {
      "createdAt": "2024-10-23T01:03:17.851Z",
      "message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k) registered 1 targets in (target-group arn:aws:elasticloadbalancing:ap-southeast-2:xxx:targetgroup/reefgu-reefg-PAREXETNHOCW/e5dd5bec27f8064b)"
    },
    {
      "createdAt": "2024-10-23T01:02:36.941Z",
      "message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k) has started 2 tasks: (task 04dfb8c773cc47a1b0442dc1cabc497a) (task 239bccf79b8841c2afc9009496987dc0)."
    },
    {
      "createdAt": "2024-10-23T01:02:14.081Z",
      "message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k, taskSet ecs-svc/4408993298399279146) has begun draining connections on 1 tasks."
    },
    {
      "createdAt": "2024-10-23T01:02:14.077Z",
      "message": "(service reefguide-reefguideapireefguideserviceService9CF43A7C-warFx9zMuB8k) deregistered 1 targets in (target-group arn:aws:elasticloadbalancing:ap-southeast-2:xxx:targetgroup/reefgu-reefg-PAREXETNHOCW/e5dd5bec27f8064b)"
    }
  ],
  "serviceStatus": "ACTIVE"
}

POST /admin/scale

Scales the ECS cluster to a specified number of tasks.

  • Authentication: Required (JWT)
  • Authorization: Admin only
  • Parameters: None
  • Request Body:
{
  "desiredCount": number // Between 0 and 10 inclusive
}
  • Response: 200 OK

POST /admin/redeploy

Forces a new deployment of the service, which will pull the latest version of the container image.

  • Authentication: Required (JWT)
  • Authorization: Admin only
  • Parameters: None
  • Request Body: None
  • Response: 200 OK
  • Notes:
    • This operation will perform a rolling update with zero downtime
    • Old tasks will be replaced with new tasks pulling the latest image
    • The deployment uses a minimum healthy percent of 50% and maximum percent of 200% to ensure service availability
    • Progress can be monitored via the /cluster/status endpoint

Configuring CDK

This config management system is courtesy of github.com/provena/provena

This repo features a detached configuration management approach. This means that configuration should be stored in a separate private repository. This repo provides a set of utilities which interact with this configuration repository, primary the ./config bash script.

config - Configuration management tool for interacting with a private configuration repository

Usage:
  config NAMESPACE STAGE [OPTIONS]
  config --help | -h
  config --version | -v

Options:
  --target, -t REPO_CLONE_STRING
    The repository clone string

  --repo-dir, -d PATH
    Path to the pre-cloned repository

  --help, -h
    Show this help

  --version, -v
    Show version number

Arguments:
  NAMESPACE
    The namespace to use (e.g., 'rrap')

  STAGE
    The stage to use (e.g., 'dev', 'stage')

Environment Variables:
  DEBUG
    Set to 'true' for verbose output

The central idea of this configuration approach is that each namespace/stage combination contains a set of files, which are gitignored by default in this repo, which are 'merged' into the user's clone of the this repository, allowing temporary access to private information without exposing it in git.

Config path caching

The script builds in functionality to cache the repo which makes available a given namespace/stage combination. These are stored in env.json, at the repository root, which has a structure like so:

{
  "namespace": {
    "stage1": "git@github.com:org/repo.git",
    "stage2": "git@github.com:org/repo.git",
    "stage3": "git@github.com:org/repo.git"
  }
}

This saves using the --target option on every ./config invocation. You can share this file between team members, but we do not recommend committing it to your repository.

Config definitions

Namespace: This is a grouping that we provide to allow you to separate standalone sets of configurations into distinct groups. For example, you may manage multiple organisation's configurations in one repo. You can just use a single namespace if suitable.

Stage: A stage is a set of configurations within a namespace. This represents a 'deployment' of Provena.

Config repository

The configuration repository contains configuration files for the this project.

cdk.context.json

The configuration repo does not contain sample cdk.context.json files, but we recommend including this in this repo to make sure deployments are deterministic. This will be generated upon first CDK deploy.

Structure

The configuration repository is organized using a hierarchical structure based on namespaces and stages:

.
├── README.md
└── <your-namespace>
    ├── base
    ├── dev
    └── feat

Namespaces

A namespace represents a set of related deployment stages, usually one namespace per organisation/use case.

Stages

Within each namespace, there are multiple stages representing different environments/deployment specifications

  • base: Contains common base configurations shared across all stages within the namespace
  • dev: Sample development environment configurations
  • feat: Sample feature branch workflow environment configurations

Feat stage

The feat stage supports the feature branch deployment workflow which is now a part of the open-source workflow. This makes use of environment variable substitution which is described later.

File Organization

Configuration files are placed within the appropriate namespace and stage directories. Currently:

.
├── README.md
└── your-namespace
    └──── dev
        └── configs
            └── dev.json

Usage by config scripts

Base Configurations

Files in the base directory of a namespace are applied first, regardless of the target stage. This allows you to define common configurations that are shared across all stages within a namespace.

Stage-Specific Configurations

Files in stage-specific directories (e.g., dev, test, prod) are applied after the base configurations. They can override or extend the base configurations as needed.

Interaction with Repository

The main repository contains a configuration management script that interacts with this configuration repository. Here's how it works:

  1. The script clones or uses a pre-cloned version of this configuration repository.
  2. It then copies the relevant configuration files based on the specified namespace and stage.
  3. The process follows these steps: a. Copy all files from the <namespace>/base/ directory (if it exists). b. Copy all files from the <namespace>/<stage>/ directory, potentially overwriting files from the base configuration.
  4. The copied configuration files are then used by the this system for the specified namespace and stage.

Best Practices

  1. Use version control: Commit and push changes to this repository regularly.
  2. Document changes: Use clear, descriptive commit messages and update this README if you make structural changes.
  3. Minimize secrets: Avoid storing sensitive information like passwords or API keys directly in these files. Instead, use secure secret management solutions.

About

Holds a combination of application and infrastructure code for the ReefGuide's web API.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published