npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

turbogate

v2.0.6

Published

Micro framework and code generator to build truly serverless well validated and well documeted REST APIs using AWS CDK Typescript in turbo speed.

Downloads

36

Readme

Turbogate

Turbogate is a micro framework and code generator aimed at building truly serverless, well validated, well documented REST APIs using AWS CDK TypeScript in turbo speed.

No more...

  • ...manual and repetitive creation and wiring of constructs such as API gateways, API gateway resources, lambdas, lambda integrations, lambda authorizers, etc.
  • ...tediously writing request validation boilerplate.
  • ...several hundred lines of code to grant the same permissions and pass in the same environment values over and over again.

Simply no more spending and hour for an endpoint that would take minutes in classic server-based environments while still building truly serverless.

Features

Automatic creation of boilerplate

Simply define the fundamental structure of your API and turbogate will generate boilerplate for all endpoints and authorizers. You only have to fill in the gaps (lambda business code and data structures).

Automatic creation and wiring of all required AWS constructs

Once you filled the gaps in the boilerplate you are done. Everything else is automatically generated and wired up during cdk synth. Of cause you can pass in custom configurations for lambdas, lambda integrations, api gateway etc.

Automatic prevalidation

All contextual data your business code needs (request, environment data, authorizer context) is automatically parsed and prevalidated at runtime using Zod. This way you can use it strongly typed in your business code without writing validation logic over and over again.

Automatic OpenAPI 3.1 spec generation

Generate complete OpenAPI 3.1 spec from your API. Turbogate uses zod-to-open-api under the hood to gather information regarding request and response data and automatically combines those with all information regarding paths, authorizers and some additional metadata. The result is a concise OpenAPI spec that is suitable to generate developer documentation pages or SDKs/clients.

DRY declaration and definition of environment data and permissions

Define lambda environment variables and permissions once and attach them to lambdas IoC style. No more myDynamoTable.grantRead(...) a dozen times in your IaC code.

Maximum adaptability

Turbogate was developed with the modern TypeScript developer in mind. It (mostly) follows a functional approach instead of using classes. The code that defines an endpoint or authorizer is generated as fully adapatable boilerplate for you along with some recommdendations on what to look out for if you want to change it. This means, while you of cause can use turbogate in full auto pilot to power code a 30+ endpoint API in a day, you could as well dive down deep into its mode of operation and precisely adjust most of it to your needs without having to change anything about the framework itself.

Getting started

The following step-by-step tutorial will show you how to setup turbogate in your CDK project. An example project with a small demo app can be found here. Each step of the step-by-step instructions will link to a commit in that repo. However, it is a good idea to clone the repo and take a look at it locally. The repo is complete and ready to deploy.

All examples user yarn, adapt to your package manager if needed.

Prerequisites

Turbogate heavily utilizes Zod to define and validate inbound, outbound and config data structures. You should at least have a basic understanding on how to use Zod.

It is also a good idea to have a look at zod-to-openapi in case you want to make use of the OpenAPI spec generation feature. You do not need to set anything up. Everything is wired up for you. But you should know the .openapi(...)-method

The moduleResolution in your tsconfig.json needs to be set to Node16 (or another supported strategy, see Why?). You need to set the module field accordingly (e.g. also Node16).

Turbogate uses the NodejsFunction construct that uses ESBuild to automatically transpile, bundle and minify the lambda handlers written in TS. Currently ESBuild will bundle all exports from an index files as soon as you import one export (see here). So to not blow up the deployed lambdas to 10MB+ sizes due to bundling the complete CDK package (and others) due to importing some files from turbogate we need to expose two different entrypoints. One for use in the IaC code and one for the lambdas production code. To be able to do so we need the exports field in the package.json which TypeScript only understands when in certain module resolution strategies (see here).

Related commit in demo repo.

1. Installation

Adding packages

Turbogate has some dev peer dependencies. You probably already have most of them installed in a Typescript CDK project.

yarn add aws-cdk-lib tsx @asteasolutions/zod-to-openapi @types/aws-lambda -D

Next, install the runtime peer dependency Zod.

yarn add zod

Then install the main package:

yarn add turbogate

[!IMPORTANT] When you setup a project with cdk init the default synth method is ts-node. ts-node struggles with mixed ESM and CommonJS modules. If you not already have switched to tsx in your CDK project you should do that now. Else you might see something SyntaxError: Unexpected token 'export' during synth.

So it is recommended to update the app value in your cdk.json from npx ts-node --prefer-ts-exts ... to yarn tsx ....

Adding wiring

Finally, in the entrypoint file of your CDK project (the file where the app is initialized and the stack constructors are called) add this import statement to the very top of the file:

import { wireTurbogate } from 'turbogate/local'; // Keep at top of imports!

After your imports add this line:

wireTurbogate; // Do not remove

This will ensure necessary prototype adjustments to be made early enough so CDK does not trip over its own feet during synth.

Related commit in demo repo.

2. Initialization

Navigate to the directory you want the newly created API to reside in. Then run yarn turbogate init my-api. Of cause, replace the my-api with your API name.

cd lib/stacks/my-stack
yarn turbogate init my-api

A folder called my-api-turbogate containing a turbospec.ts file will be created.

Related commit in demo repo.

3. Declare endpoints and authorizers

The turbospec.ts contains some boilerplate for a basic API. Adapt to your needs.

[!TIP] If you declare all your endpoints at once this will create a giant bulk commit as turbogate generates several files per endpoint. A good approach is to gradually add endpoints as you implement them. If you want to initially declare all of them you could do that and then comment out most of them until you want to implement them.

Related commit in demo repo.

4. Generate boilerplate and entrypoint

Once you adapted your turbospec.ts file according to your needs, run:

cd my-api-turbogate
yarn turbogate build

This will create the boilerplate files for your defined authorizers and endpoints as well as the entrypoint my-api-turbogate.ts alongside some boilerplate config and response fragments.

Now, don't be scared. There are nine files per endpoint. This looks like a lot on first sight but the files are quite small and you will soon find that this allows for great overview when working on an endpoint after you spent some with turbogate.

Each generated file contains a header comment explaining its purpose, editability and regenerating behavior. You should take a few minutes to get familiar with those files.

[!TIP] Turbogate offers two ways to organize your endpoints. byResource groups the endpoints in folders named after the first segment of the path of each endpoint. allTogether puts all endpoints together in one folder. The default (and recommended for APIs with more than a couple of endpoints) structure is byResource. You can choose by using the --endpointStructure option.

Related commit in demo repo.

5. Fill the gaps on endpoints and authorizers

Now you need to adjust the generated boilerplate files for you endpoints and authorizers. For endpoints this means defining request and response as well as the business logic. For authorizers this means defining the context and the business logic. For both you can additionally define required environment variables, permissions and documentation.

Prerequisite commit in demo repo (adding a table to use it in the endpoint).

Related commit in demo repo.

6. Add the turbogate to your IaC

To add your turbogate you app you need to create an instance of the generated MyAppTurbogate class within a stack of your application. You will find that the constructor requires you to hand in values for all environment variables declared on your endpoints and authorizers. Additionally, you need to provide hooks that grant the defined permissions.

Related commit in demo repo.

7. Adding OpenAPI spec generation

To enable the generation of an OpenAPI 3.1 spec file just add and empty object to the openapi field of the params object in the constructor call of MyAppTurbogate that you set up in the previous step. When you now run a CDK synth the specfile will automatically be generated.

Related commit in demo repo.

8. Done! 🎉

That's it! That is the groundwork to use turbogate in your project. We added another endpoint (get-item) in the demo repo but the endpoints to update, delete and list items are still waiting to be implemented. Feel free to clone the demo repo to try out turbogate yourself right now.

Additional information: addind and removing endpoints and authorizers

To add an endpoint or authorizer just add in your turbospec.ts and rerun the turbogate build command.

To remove an endpoint remove it in your turbospec.ts and rerun the turbogate build command. Additionally, delete its respective folder. If your endpoint declared unique environment values or permissions that are orphaned now you might also need to remove those values from the constructor arguments of your turbogate.

To remove an authorizer remove it in your turbospec.ts (delcaration of the authorizer itself and all references by endpoints), delete all authorizer.ts files of endpoints that used that authorizer and rerun the turbogate build command. Additionally, delete its respective folder. If your authorizer declared unique environment values or permissions that are orphaned now you might also need to remove those values from the constructor arguments of your turbogate. Also, since you authorizer context probably changed you might need to tidy up the the business code in the main.ts files of the formerly protected endpoints.

[!NOTE] Automatic removal of endpoints and authorizers that are not longer present in the turbospec.ts file is part of the roadmap.

Related commit in demo repo.

Patterns and recommended conventions

Working with constructs created by turbogate

The instance of the turbogate entrypoint class you created in you IaC code exposes the majority of the constructs (API GW,API GW resources, endpoint lambdas, authorizer lambdass, authorizer request authorizers) it dynamically creates during synth as well typed instance variables. This way you can freely customize and extend your turbogate.

Remember: If you need to add custom configs to the constructs that can not be applied post creation, turbogate exposes config.ts files for each endpoint, authorizer and the API GW itself which you can use to inject construct configs.

[!TIP] In case you want to add a completely custom implementation to a path in your API: Turbogate allows you to specify a path without any methods in your turbospec.ts file. This path will be picked up and API GW resources will be created and exposed.

No more cd

The CLI command offers a --root/-r option that allows you to pass in the target directory. Add an entry in the scripts section of your package.json to quickly run a turbogate build from everywhere.

"scripts": {
	"tgb-myapi": "yarn turbogate build -r lib/stacks/my-stack/my-api-turbogate"
}

Code formatting

The boilerplate code files already come formatted in quite common standards. The dynamically generated entrypoint file is currently not perfecly fomatted. To ensure your codebase always adheres to your projects formatting conventions it is a good idea to append a formatting command for your whole turbogate API directory to your build script.

"scripts": {
	"tgb-myapi": "yarn turbogate build -r lib/stacks/my-stack/my-api-turbogate && prettier lib/stacks/my-stack/my-api-turbogate -w"
}

Naming convention recommendation

Do whatever you like but these naming conventions for environment variable and permission names seem to work pretty well.

Environment variable names: Screaming snake case, resource name followed by property name, e.g. MY_TABLE_NAME or MY_SECRET_ARN.

Permission names: Screaming snake case, resource name followed by grant name, e.g. MY_TABLE_READ or MY_SECRET_READ.

Roadmap

  • ~~Adding the possibility to generate complete and verbosely documented OpenAPI spec files from the turbogate definition.~~ ✅

  • Automate removal of endpoints and authorizers (treeshaking).

  • Rename permissions to hooks. Sometimes you need to interact with a lambda after its constructs creation in a way that is not adding any permissions. Therefore the name hooks seems better suited.

Feel free to suggest changes or new features by opening an issue.