npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

update-lambda-edge

v1.2.0

Published

Scripts for updating CloudFront distributions with new Lambda@Edge function versions

Downloads

4,121

Readme

Update Lambda@Edge

Provides some handy functions for pushing new code to Lambda@Edge and updating CloudFront triggers.

Can be easily integrated into a CI/CD pipeline, or used as an ad-hoc CLI for managing Lambda@Edge functions.

Install

To install this as a global command line tool:

$ npm i update-lambda-edge -g

To install in a project for use in an NPM script:

$ npm i -D update-lambda-edge

To use without installing globally:

$ npx update-lambda-edge [command] [...options]

Usage

There are four commands for deploying changes to Lambda@Edge functions:

  • push: Pushes a Lambda ZIP file to S3 so that it can be deployed later
  • deploy: Deploys the code in the ZIP file to the Lambda
  • publish: Publishes a new version of the Lambda because Lambda@Edge requires versions to be explicitly references ("$LATEST" is not allowed)
  • activate: Updates the CloudFront configuration to point to the newly published (or previously published) Lambda version

Ad-hoc Usage

All commands can be executed ad-hoc. That is, each required option can be specified each time the command is executed. For example, to execute push, all of the following options are required:

$ update-lambda-edge push --bucket my-s3-bucket --key path/to/code-bundle.zip --file-path dist/local/code-bundle.zip --function-name my-viewer-request-lambda

It is quite verbose, but manageable when it does not need to be executed often and there is only a single Lambda.

Configuration File

The preferred way is to use a configuration file that specifies information about all Lambda@Edge functions for a specific CloudFront distribution. Even if there is only one Lambda@Edge function attached to the distribution, the configuration file can simplify the commands considerably.

Note: If your S3 bucket used to store the Lambda ZIP files is in a different AWS region than where the base Lambda functions are deployed, replace awsRegion with s3Region and lambdaRegion. This might be the case if your company has strict security or compliance requirements.

Start with this configuration file template and modify to fit your needs (triggers can be removed if not used):

{
  "awsRegion": "us-east-1",
  "autoIncrementVersion": true,
  "cfDistributionID": "1XY234ABC",
  "cacheBehaviorPath": "default",
  "lambdaCodeS3Bucket": "my-s3-bucket",
  "cfTriggers": [
    {
      "cfTriggerName": "viewer-request",
      "lambdaFunctionName": "my-viewer-request-lambda",
      "lambdaCodeS3Key": "path/to/code-bundle.zip",
      "lambdaCodeFilePath": "dist/local/code-bundle.zip"
    },
    {
      "cfTriggerName": "origin-request",
      "lambdaFunctionName": "my-origin-request-lambda",
      "lambdaCodeS3Key": "path/to/code-bundle.zip",
      "lambdaCodeFilePath": "dist/local/code-bundle.zip"
    },
    {
      "cfTriggerName": "origin-response",
      "lambdaFunctionName": "my-origin-response-lambda",
      "lambdaCodeS3Key": "path/to/code-bundle.zip",
      "lambdaCodeFilePath": "dist/local/code-bundle.zip"
    },
    {
      "cfTriggerName": "viewer-response",
      "lambdaFunctionName": "my-viewer-response-lambda",
      "lambdaCodeS3Key": "path/to/code-bundle.zip",
      "lambdaCodeFilePath": "dist/local/code-bundle.zip"
    },
  ]
}

Using a configuration file, the same command above looks like this:

$ update-lambda-edge push --config cloudfront-config.json --vreq

Much simpler. The --vreq option specifies that only the Viewer Request code bundle should be pushed to S3. Omitting all trigger specifiers will act on all configured triggers.

Each option specified in the configuration file can be overridden with command line options. For example, to push to a different location in the S3 bucket as a one-off, you can specify a different key:

$ update-lambda-edge push --config cloudfront-config.json --key new/location/in/the/same/bucket/code-bundle.zip --vreq

Lambda Versioning

By default, each command will auto-increment the version of the Lambda. This works by retrieving all the version information for the specified Lambda function, finds the latest, then increments it by 1. This behavior can be overridden by specifying a specific version number using the --lambda-version CLI option (there is no configuration file option).

How auto-incrementing affects each command:

  • push: Appends the next version number to the S3 Key. Example: path/to/code-bundle-5.zip (assuming version 4 of the Lambda is the latest).
  • deploy: Looks for the zip file with the next version number appended. Same example as push.
  • publish: No effect. Publishing a Lambda always auto-increments, which is why the functionality is mirrored in this library.
  • activate: Activates the latest version of the Lambda, even if it is not sequentially next. Example: if the active version is 3, but version 5 is the latest published version, then version 5 is activated.

Global Options

The following options are global to all commands:

  • --dry-run: Executes the command but does not make any changes in AWS. Note: it still needs to access AWS for metadata such as Lambda versions and CloudFront configurations.
  • --pwd: Sets the present working directory. All relative paths (for config file and local file path) will resolve from this value. Defaults to process.cwd()
  • --region: Sets the AWS region for both S3 and Lambda. Defaults to 'us-east-1'
  • --s3-region: Sets the AWS region for S3. Overrides the --region option, requires --lambda-region to be set also.
  • --lambda-region: Sets the AWS region for Lambda. Overrides the --region option, requires --s3-region to be set also.
  • --config: The path to the configuration file (can be relative to pwd or absolute)
  • --vreq: If using a configuration file, executes the command for the Viewer Request trigger (if configured)
  • --oreq: If using a configuration file, executes the command for the Origin Request trigger (if configured)
  • --ores: If using a configuration file, executes the command for the Origin Response trigger (if configured)
  • --vres: If using a configuration file, executes the command for the Viewer Response trigger (if configured)

Available commands

push

Pushes a Lambda ZIP file to S3 so that it can be deployed later.

Required options

  • S3 Bucket
    • CLI: --bucket
    • Config: lambdaCodeS3Bucket
  • Lambda function name
    • CLI: --function-name
    • Config: cfTriggers[].lambdaFunctionName
  • S3 Key to store code bundle (must be a .zip file)
    • CLI: --key
    • Config: cfTriggers[].lambdaCodeS3Key
  • Path to local code bundle (must be a .zip file)
    • CLI: --file-path
    • Config: cfTriggers[].lambdaCodeFilePath

Optional options

  • Lambda code version (overrides auto-increment)
    • CLI: --lambda-version
    • Config: none
    • Note: if auto-increment is set to false and no version is specified, then the base S3 Key is used with no version number appended.

deploy

Deploys the code in a ZIP file to the Lambda.

Required options

  • S3 Bucket
    • CLI: --bucket
    • Config: lambdaCodeS3Bucket
  • Lambda function name
    • CLI: --function-name
    • Config: cfTriggers[].lambdaFunctionName
  • S3 Key to store code bundle (must be a .zip file)
    • CLI: --key
    • Config: cfTriggers[].lambdaCodeS3Key

Optional options

  • Lambda code version (overrides auto-increment)
    • CLI: --lambda-version
    • Config: none
    • Note: if auto-increment is set to false and no version is specified, then the base S3 Key is used with no version number appended.

publish

Publishes a new version of the Lambda and gives it the next sequential version number.

Required options

  • Lambda function name
    • CLI: --function-name
    • Config: cfTriggers[].lambdaFunctionName

activate

Updates the CloudFront configuration to point to the newly published (or previously published) Lambda version.

Required options

  • CloudFront Distribution ID
    • CLI: --distribution-id
    • Config: cfDistributionID
  • Lambda function name
    • CLI: --function-name
    • Config: cfTriggers[].lambdaFunctionName

Optional options

  • CacheBehavior PathPattern
    • CLI: --cache-behavior-path
    • Config: cacheBehaviorPath
    • Note: used to identify the cache behavior to attach the Lambdas to. If left blank, will default to the DefaultCacheBehavior
  • Lambda code version (overrides auto-increment)
    • CLI: --lambda-version
    • Config: none
    • Note: unless the version number is explicitly set, this command will activate the latest version.

Integrating Into a CI/CD Pipeline

There are many ways to do this, but this is how I have set it up with my monorepo and NPM scripts. Note: I'm not showing it here, but I have also paired this with Lerna so that only changed Lambdas are deployed.

First, create separate configuration files for each environment:

  • config-dev.json
  • config-qa.json
  • config-prod.json

Then, set up some NPM scripts:

{
  "scripts": {
    "lambda:push": "update-lambda-edge push --config config-${DEPLOY_ENV}.json",
    "lambda:deploy": "update-lambda-edge deploy --config config-${DEPLOY_ENV}.json",
    "lambda:publish": "update-lambda-edge publish --config config-${DEPLOY_ENV}.json",
    "lambda:activate": "update-lambda-edge activate --config config-${DEPLOY_ENV}.json",
    "env:dev": "DEPLOY_ENV=dev npm run",
    "env:qa": "DEPLOY_ENV=qa npm run",
    "env:prod": "DEPLOY_ENV=prod npm run"
  }
}

The "env:xxx" commands are pretty handy...

I am using a Jenkins Multibranch Pipeline, so in my "Deploy - Dev" stage I run the following commands:

// ...
stage('Deploy - Dev') {
  when {
    branch dev
  }
  
  steps {
    sh ''' \
      npm run env:dev -- lambda:push
      npm run env:dev -- lambda:deploy
      npm run env:dev -- lambda:publish
      npm run env:dev -- lambda:activate    
    '''
  }
}
// ...

And my "Deploy - QA" stage:

// ...
stage('Deploy - QA') {
  when {
    branch release
  }
  
  steps {
    sh ''' \
      npm run env:qa -- lambda:push
      npm run env:qa -- lambda:deploy
      npm run env:qa -- lambda:publish
      npm run env:qa -- lambda:activate    
      
      // just push the code bundle to Prod S3 bucket, don't activate it yet, though
      npm run env:prod -- lambda:push
    '''
  }
}
// ...

Then I have a downstream job to run the rest of the Prod commands to activate them.

Contributing

Feel free to open an issue with a feature request or a pull request.

License

ISC