Skip to content

A sample implementation of the Time-addressable Media Store API

License

Notifications You must be signed in to change notification settings

awslabs/time-addressable-media-store

Time-addressable Media Store implementation

This solution deploys the AWS Infrastructure required to create a sample implementation of the BBC TAMS API.

Pre-requisites

Before deploying this solution a CloudWatch log role ARN needs to be created and API Gateway configured to make use of it in your chosen region.

Deploy the sample application

The Serverless Application Model Command Line Interface (SAM CLI) is an extension of the AWS CLI that adds functionality for building and testing Lambda applications. It uses Docker to run your functions in an Amazon Linux environment that matches Lambda. It can also emulate your application's build environment and API.

To use the SAM CLI, you need the following tools.

To build and deploy your application for the first time, run the following in your shell:

sam build --use-container
sam deploy --guided

The first command will build the source of your application. The second command will package and deploy your application to AWS, with a series of prompts:

  • Stack Name: The name of the stack to deploy to CloudFormation. This should be unique to your account and region, and a good starting point would be something matching your project name.
  • AWS Region: The AWS region you want to deploy your app to.
  • EnableWebhooks: Specify whether you want the solution deployed with Webhooks.
  • Confirm changes before deploy: If set to yes, any change sets will be shown to you before execution for manual review. If set to no, the AWS SAM CLI will automatically deploy application changes.
  • Allow SAM CLI IAM role creation: Many AWS SAM templates, including this example, create AWS IAM roles required for the AWS Lambda function(s) included to access AWS services. By default, these are scoped down to minimum required permissions. To deploy an AWS CloudFormation stack which creates or modifies IAM roles, the CAPABILITY_IAM value for capabilities must be provided. If permission isn't provided through this prompt, to deploy this example you must explicitly pass --capabilities CAPABILITY_IAM to the sam deploy command.
  • Save arguments to samconfig.toml: If set to yes, your choices will be saved to a configuration file inside the project, so that in the future you can just re-run sam deploy without parameters to deploy changes to your application.

You can find your API Gateway Endpoint URL in the output values displayed after deployment.

Usage

Access to the API is controlled by Cognito. The solution comes with an App Client already created for you. If required, you can create others for differing access patterns as required.

Whether you are using the pre-configured App Client or whether you create your own, you will need to authenticate with the API using an Authorization header. The header follows the traditional Bearer {token} syntax.

The guide below assumes you are using Client credentials OAuth 2.0 grant for "machine-to-machine" access using the pre-configured App Client. It also describes how to generate the access token you will need to place in the header.

To request an access token, you will require 4 pieces of information:

  • Client Id: This can be retrieved from the Outputs of the Cloudformation Stack created during deployment or by browsing to the Cognito User Pool console and locating the App Client named server-to-server.

  • Client Secret: This can be retrieved from the Cognito User Pool console and locating the App Client named server-to-server. Click on this App Client to view its details and you will see an option to copy the Client secret. NOTE: This Client secret is confidential, and care should be taken to store this value securely so that 3rd parties are not able to access it.

  • Token URL: This can be retrieved from the Outputs of the Cloudformation Stack created during deployment.

  • OAuth scope(s): Access to API methods is controlled by specific scopes. The options available are:

    • tams-api/read - required for GET and HEAD methods

    • tams-api/write - required for PUT and POST methods

    • tams-api/delete - required for DELETE methods

      NOTE: Supplying more than one scope is allowed, it just means the resulting token will be able to call a combination of allowed methods.

To request a token, you need to POST to the TOKEN Url:

curl -X POST -d 'client_id=XXX&client_secret=XXX&grant_type=client_credentials&scope=tams-api/read' https://XXXXX

This request will return JSON that will contain the access_token. Take the value of this token and create the Authorization header. Pass this header on all requests to the API to be authenticated.

Currently Authorization is purely handled by which OAuth scopes are assigned to the App Client within Cognito. Creating a new client with only tams-api/read will result in "read only" access to the API.

Architecture Diagram

Architecture Diagram

Cleanup

To delete the solution, use the SAM CLI, you can run the following:

sam delete

Security

See CONTRIBUTING for more information.

License

This library is licensed under the MIT-0 License. See the LICENSE file.

About

A sample implementation of the Time-addressable Media Store API

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks