Serverless supports all Cognito User Pool Triggers as specified here. Use this guide to understand the event objects that will be passed to your function.
This will create a Cognito User Pool with the specified name. You can reference the same pool multiple times.
functions:
preSignUp:
handler: preSignUp.handler
events:
- cognitoUserPool:
pool: MyUserPool
trigger: PreSignUp
customMessage:
handler: customMessage.handler
events:
- cognitoUserPool:
pool: MyUserPool
trigger: CustomMessage
This will create multiple Cognito User Pools with their specified names:
functions:
preSignUpForPool1:
handler: preSignUp.handler
events:
- cognitoUserPool:
pool: MyUserPool1
trigger: PreSignUp
preSignUpForPool2:
handler: preSignUp.handler
events:
- cognitoUserPool:
pool: MyUserPool2
trigger: PreSignUp
You can also deploy the same function for different user pools:
functions:
preSignUp:
handler: preSignUp.handler
events:
- cognitoUserPool:
pool: MyUserPool1
trigger: PreSignUp
- cognitoUserPool:
pool: MyUserPool2
trigger: PreSignUp
There are two types of Custom Sender Triggers, CustomSMSSender
and CustomEmailSender
, both documented by AWS.
In order to use these triggers, you must supply a kmsKeyId
and (optionally) the lambdaVersion
of the function. Only 1 kmsKeyId
can be supplied per Cognito User Pool.
functions:
customSMSSenderFunction:
handler: customSMSSender.handler
events:
- cognitoUserPool:
pool: MyUserPool1
trigger: CustomSMSSender
# Required with CustomSMSSender and CustomEmailSender Triggers
# Can either be KMS Key ARN string or reference to KMS Key Resource ARN (see customEmailSenderFunction below)
kmsKeyId: 'arn:aws:kms:eu-west-1:111111111111:key/12345678-9abc-def0-1234-56789abcdef1'
customEmailSenderFunction:
handler: customEmailSender.handler
events:
- cognitoUserPool:
pool: MyUserPool2
trigger: CustomEmailSender
kmsKeyId:
Fn::GetAtt: ['kmsKey', 'Arn']
resources:
Resources:
# Used to show use in supplying kmsKeyId in customEmailSenderFunction, not needed when kmsKeyId is a string as shown in customSMSSenderFunction
kmsKey:
Type: AWS::KMS::Key
Properties:
Description: MyKMSKey
Enabled: true
KeyPolicy:
Version: '2012-10-17'
Id: my-kms-key
Statement:
Sid: Enable IAM User Permissions
Principal:
AWS:
- Fn::Sub: arn:aws:iam::${AWS::AccountId}:root
Effect: Allow
Action: kms:*
Resource: '*'
# Used to show how CustomSenderSources can be used with overriding the generated User Pool, as described below
# This makes it such that when a user signs up, they are automatically sent a verification email, triggering our
# CustomEmailSender
CognitoUserPoolMyUserPool2:
Type: AWS::Cognito::UserPool
Properties:
UsernameAttributes:
- 'email'
AutoVerifiedAttributes:
- 'email'
EmailVerificationMessage: 'email message: {####}'
EmailVerificationSubject: 'email subject: {####}'
NOTE: The only supported value for lambdaVersion is V1_0
, as documented by AWS.
For custom senders, the event.triggerSource
type does not get populated by the type of custom sender, rather may be populated by another trigger source. Instead, event.request.type
is populated with either customEmailSenderRequestV1
or customSMSSenderRequestV1
, respectively documented by AWS here and here
// customSender.js
function handler(event, context, callback) {
if (event.request.type === 'customEmailSenderRequestV1') {
// ...
}
if (event.request.type === 'customSMSSenderRequestV1') {
// ...
}
}
For custom messages, you will need to check event.triggerSource
type inside your handler function:
// customMessage.js
function handler(event, context, callback) {
if (event.triggerSource === 'CustomMessage_AdminCreateUser') {
// ...
}
if (event.triggerSource === 'CustomMessage_ResendCode') {
// ...
}
}
Sometimes you might want to attach Lambda functions to existing Cognito User Pools. In that case you just need to set the existing
event configuration property to true
. All the other config parameters can also be used on existing user pools:
IMPORTANT: You can only attach 1 existing Cognito User Pool per function.
NOTE: Using the existing
config will add an additional Lambda function and IAM Role to your stack. The Lambda function backs-up the Custom Cognito User Pool Resource which is used to support existing user pools.
functions:
users:
handler: users.handler
events:
- cognitoUserPool:
pool: legacy-user-pool
trigger: CustomMessage
existing: true
A Cognito User Pool created by an event can be overridden by using the logical resource name in Resources
:
functions:
preSignUp:
handler: preSignUpForPool1.handler
events:
- cognitoUserPool:
pool: MyUserPool
trigger: PreSignUp
postConfirmation:
handler: postConfirmation.handler
events:
- cognitoUserPool:
pool: MyUserPool
trigger: PostConfirmation
resources:
Resources:
CognitoUserPoolMyUserPool:
Type: AWS::Cognito::UserPool
A Cognito User Pool with triggers attached may not be correctly updated by AWS Cloudformation on subsequent deployments. To circumvent this issue you can use the forceDeploy
flag which will try to force Cloudformation to update the triggers no matter what. This flag has to be used in conjunction with the existing: true
flag.
functions:
preSignUp:
handler: preSignUp.handler
events:
- cognitoUserPool:
pool: MyUserPool1
trigger: PreSignUp
existing: true
forceDeploy: true