serverless-app-client-credentials-to-ssm
v1.2.0
Published
Export Cognito app client credentials to SSM Parameter store
Downloads
2
Maintainers
Readme
serverless-app-client-credentials-to-ssm
Export Cognito app client credentials to SSM Parameter store
Background
Amazon Cognito is a powerful service for application authentication, authorization, and user management . When working with µservice applications, we can use AWS Cognito user pool authentication to implement a fine-grained service-to-service access control where each service has a dedicated resource server with pre-defined scopes for its resources(API Gateway, Lambda etc), and a dedicated app client with limited scopes it needs to access external resources. This service-to-service interaction normally starts with a user pool sign-in with the app client credentials where a JWT token will be returned from Cognito to the initiator for external resource access. We used to copy the app client credentials from AWS console and put to the configuration for each µservice manually. With the increasing number of µservices, we need a tool to do this securely and automatically for us.
How it works
A serverless hook will be triggered after the deployment to pull the app client credentials includes url, clientId, and clientSecret which will be merged as part of the application configuration(auth.cognito
) stored in the configured SSM parameter.
Note: Only when there are changes for any of these three fields will this plugin update the SSM parameter.
Installation
npm install serverless-app-client-credentials-to-ssm --save-dev
Configuration
plugin registration
Inside your project's serverless.yml file add following entry to the plugins section:
plugins:
- serverless-app-client-credentials-to-ssm
plugin configuration
Then you need to add the plugin configuration to the custom section:
custom:
serverless-app-client-credentials-to-ssm:
userPoolId: ${ssm:/layered-apis/userPoolId}
appClientName: ${self:custom.appClientName}
parameterName: /layered-apis/${self:service}/${self:provider.stage}
Sample parameter
{
"auth": {
"cognito": {
"url": "https://asdfafdsa-systems-idp-nonprod.auth.ap-southeast-2.amazoncognito.com/oauth2/token",
"clientId": "h3p4a1sr9pu",
"clientSecret": "s1oglveco0hsfraoag90ebr107rmvo9g7u36h"
}
},
"database": {
"url": "https://asdfafdsa–instance1.123456789012.us-east-1.rds.amazonaws.com",
"username": "9g7u36h",
"password": "eco0hsfraoag90ebr107rmvo"
}
}
License
MIT
Contribute
Yes, highly appreciate for any PRs. Thank you!