@aws-cdk/aws-apigatewayv2
    TypeScript icon, indicating that this package has built-in type declarations

    1.134.0 • Public • Published

    AWS::APIGatewayv2 Construct Library


    Features Stability
    CFN Resources Stable
    Higher level constructs for HTTP APIs Experimental
    Higher level constructs for Websocket APIs Experimental

    CFN Resources: All classes with the Cfn prefix in this module (CFN Resources) are always stable and safe to use.

    Experimental: Higher level constructs in this module that are marked as experimental are under active development. They are subject to non-backward compatible changes or removal in any future version. These are not subject to the Semantic Versioning model and breaking changes will be announced in the release notes. This means that while you may use them, you may need to update your source code when upgrading to a newer version of this package.


    Table of Contents

    Introduction

    Amazon API Gateway is an AWS service for creating, publishing, maintaining, monitoring, and securing REST, HTTP, and WebSocket APIs at any scale. API developers can create APIs that access AWS or other web services, as well as data stored in the AWS Cloud. As an API Gateway API developer, you can create APIs for use in your own client applications. Read the Amazon API Gateway Developer Guide.

    This module supports features under API Gateway v2 that lets users set up Websocket and HTTP APIs. REST APIs can be created using the @aws-cdk/aws-apigateway module.

    HTTP API

    HTTP APIs enable creation of RESTful APIs that integrate with AWS Lambda functions, known as Lambda proxy integration, or to any routable HTTP endpoint, known as HTTP proxy integration.

    Defining HTTP APIs

    HTTP APIs have two fundamental concepts - Routes and Integrations.

    Routes direct incoming API requests to backend resources. Routes consist of two parts: an HTTP method and a resource path, such as, GET /books. Learn more at Working with routes. Use the ANY method to match any methods for a route that are not explicitly defined.

    Integrations define how the HTTP API responds when a client reaches a specific Route. HTTP APIs support Lambda proxy integration, HTTP proxy integration and, AWS service integrations, also known as private integrations. Learn more at Configuring integrations.

    Integrations are available at the aws-apigatewayv2-integrations module and more information is available in that module. As an early example, the following code snippet configures a route GET /books with an HTTP proxy integration all configures all other HTTP method calls to /books to a lambda proxy.

    import { HttpProxyIntegration, LambdaProxyIntegration } from '@aws-cdk/aws-apigatewayv2-integrations';
    
    const getBooksIntegration = new HttpProxyIntegration({
      url: 'https://get-books-proxy.myproxy.internal',
    });
    
    declare const booksDefaultFn: lambda.Function;
    const booksDefaultIntegration = new LambdaProxyIntegration({
      handler: booksDefaultFn,
    });
    
    const httpApi = new apigwv2.HttpApi(this, 'HttpApi');
    
    httpApi.addRoutes({
      path: '/books',
      methods: [ apigwv2.HttpMethod.GET ],
      integration: getBooksIntegration,
    });
    httpApi.addRoutes({
      path: '/books',
      methods: [ apigwv2.HttpMethod.ANY ],
      integration: booksDefaultIntegration,
    });

    The URL to the endpoint can be retrieved via the apiEndpoint attribute. By default this URL is enabled for clients. Use disableExecuteApiEndpoint to disable it.

    const httpApi = new apigwv2.HttpApi(this, 'HttpApi', {
      disableExecuteApiEndpoint: true,
    });

    The defaultIntegration option while defining HTTP APIs lets you create a default catch-all integration that is matched when a client reaches a route that is not explicitly defined.

    import { HttpProxyIntegration } from '@aws-cdk/aws-apigatewayv2-integrations';
    
    new apigwv2.HttpApi(this, 'HttpProxyApi', {
      defaultIntegration: new HttpProxyIntegration({
        url:'http://example.com',
      }),
    });

    Cross Origin Resource Sharing (CORS)

    Cross-origin resource sharing (CORS) is a browser security feature that restricts HTTP requests that are initiated from scripts running in the browser. Enabling CORS will allow requests to your API from a web application hosted in a domain different from your API domain.

    When configured CORS for an HTTP API, API Gateway automatically sends a response to preflight OPTIONS requests, even if there isn't an OPTIONS route configured. Note that, when this option is used, API Gateway will ignore CORS headers returned from your backend integration. Learn more about Configuring CORS for an HTTP API.

    The corsPreflight option lets you specify a CORS configuration for an API.

    new apigwv2.HttpApi(this, 'HttpProxyApi', {
      corsPreflight: {
        allowHeaders: ['Authorization'],
        allowMethods: [
          apigwv2.CorsHttpMethod.GET,
          apigwv2.CorsHttpMethod.HEAD,
          apigwv2.CorsHttpMethod.OPTIONS,
          apigwv2.CorsHttpMethod.POST,
        ],
        allowOrigins: ['*'],
        maxAge: Duration.days(10),
      },
    });

    Publishing HTTP APIs

    A Stage is a logical reference to a lifecycle state of your API (for example, dev, prod, beta, or v2). API stages are identified by their stage name. Each stage is a named reference to a deployment of the API made available for client applications to call.

    Use HttpStage to create a Stage resource for HTTP APIs. The following code sets up a Stage, whose URL is available at https://{api_id}.execute-api.{region}.amazonaws.com/beta.

    declare const api: apigwv2.HttpApi;
    
    new apigwv2.HttpStage(this, 'Stage', {
      httpApi: api,
      stageName: 'beta',
    });

    If you omit the stageName will create a $default stage. A $default stage is one that is served from the base of the API's URL - https://{api_id}.execute-api.{region}.amazonaws.com/.

    Note that, HttpApi will always creates a $default stage, unless the createDefaultStage property is unset.

    Custom Domain

    Custom domain names are simpler and more intuitive URLs that you can provide to your API users. Custom domain name are associated to API stages.

    The code snippet below creates a custom domain and configures a default domain mapping for your API that maps the custom domain to the $default stage of the API.

    import * as acm from '@aws-cdk/aws-certificatemanager';
    import { LambdaProxyIntegration } from '@aws-cdk/aws-apigatewayv2-integrations';
    
    const certArn = 'arn:aws:acm:us-east-1:111111111111:certificate';
    const domainName = 'example.com';
    
    const dn = new apigwv2.DomainName(this, 'DN', {
      domainName,
      certificate: acm.Certificate.fromCertificateArn(this, 'cert', certArn),
    });
    
    declare const handler: lambda.Function;
    const api = new apigwv2.HttpApi(this, 'HttpProxyProdApi', {
      defaultIntegration: new LambdaProxyIntegration({ handler }),
      // https://${dn.domainName}/foo goes to prodApi $default stage
      defaultDomainMapping: {
        domainName: dn,
        mappingKey: 'foo',
      },
    });

    To migrate a domain endpoint from one type to another, you can add a new endpoint configuration via addEndpoint() and then configure DNS records to route traffic to the new endpoint. After that, you can remove the previous endpoint configuration. Learn more at Migrating a custom domain name

    To associate a specific Stage to a custom domain mapping -

    declare const api: apigwv2.HttpApi;
    declare const dn: apigwv2.DomainName;
    
    api.addStage('beta', {
      stageName: 'beta',
      autoDeploy: true,
      // https://${dn.domainName}/bar goes to the beta stage
      domainMapping: {
        domainName: dn,
        mappingKey: 'bar',
      },
    });

    The same domain name can be associated with stages across different HttpApi as so -

    import { LambdaProxyIntegration } from '@aws-cdk/aws-apigatewayv2-integrations';
    
    declare const handler: lambda.Function;
    declare const dn: apigwv2.DomainName;
    
    const apiDemo = new apigwv2.HttpApi(this, 'DemoApi', {
      defaultIntegration: new LambdaProxyIntegration({ handler }),
      // https://${dn.domainName}/demo goes to apiDemo $default stage
      defaultDomainMapping: {
        domainName: dn,
        mappingKey: 'demo',
      },
    });

    The mappingKey determines the base path of the URL with the custom domain. Each custom domain is only allowed to have one API mapping with undefined mappingKey. If more than one API mappings are specified, mappingKey will be required for all of them. In the sample above, the custom domain is associated with 3 API mapping resources across different APIs and Stages.

    API Stage URL
    api $default https://${domainName}/foo
    api beta https://${domainName}/bar
    apiDemo $default https://${domainName}/demo

    You can retrieve the full domain URL with mapping key using the domainUrl property as so -

    declare const apiDemo: apigwv2.HttpApi;
    const demoDomainUrl = apiDemo.defaultStage?.domainUrl; // returns "https://example.com/demo"

    Mutual TLS (mTLS)

    Mutual TLS can be configured to limit access to your API based by using client certificates instead of (or as an extension of) using authorization headers.

    import * as s3 from '@aws-cdk/aws-s3';
    const certArn = 'arn:aws:acm:us-east-1:111111111111:certificate';
    const domainName = 'example.com';
    const bucket = new s3.Bucket.fromBucketName(stack, 'TrustStoreBucket', ...);
    
    new DomainName(stack, 'DomainName', {
      domainName,
      certificate: Certificate.fromCertificateArn(stack, 'cert', certArn),
      mtls: {
        bucket,
        key: 'someca.pem',
        version: 'version',
      },
    })

    Instructions for configuring your trust store can be found here

    Managing access

    API Gateway supports multiple mechanisms for controlling and managing access to your HTTP API through authorizers.

    These authorizers can be found in the APIGatewayV2-Authorizers constructs library.

    Metrics

    The API Gateway v2 service sends metrics around the performance of HTTP APIs to Amazon CloudWatch. These metrics can be referred to using the metric APIs available on the HttpApi construct. The APIs with the metric prefix can be used to get reference to specific metrics for this API. For example, the method below refers to the client side errors metric for this API.

    const api = new apigwv2.HttpApi(this, 'my-api');
    const clientErrorMetric = api.metricClientError();

    Please note that this will return a metric for all the stages defined in the api. It is also possible to refer to metrics for a specific Stage using the metric methods from the Stage construct.

    const api = new apigwv2.HttpApi(this, 'my-api');
    const stage = new apigwv2.HttpStage(this, 'Stage', {
      httpApi: api,
    });
    const clientErrorMetric = stage.metricClientError();

    VPC Link

    Private integrations let HTTP APIs connect with AWS resources that are placed behind a VPC. These are usually Application Load Balancers, Network Load Balancers or a Cloud Map service. The VpcLink construct enables this integration. The following code creates a VpcLink to a private VPC.

    import * as ec2 from '@aws-cdk/aws-ec2';
    
    const vpc = new ec2.Vpc(this, 'VPC');
    const vpcLink = new apigwv2.VpcLink(this, 'VpcLink', { vpc });

    Any existing VpcLink resource can be imported into the CDK app via the VpcLink.fromVpcLinkAttributes().

    import * as ec2 from '@aws-cdk/aws-ec2';
    
    declare const vpc: ec2.Vpc;
    const awesomeLink = apigwv2.VpcLink.fromVpcLinkAttributes(this, 'awesome-vpc-link', {
      vpcLinkId: 'us-east-1_oiuR12Abd',
      vpc,
    });

    Private Integration

    Private integrations enable integrating an HTTP API route with private resources in a VPC, such as Application Load Balancers or Amazon ECS container-based applications. Using private integrations, resources in a VPC can be exposed for access by clients outside of the VPC.

    These integrations can be found in the APIGatewayV2-Integrations constructs library.

    WebSocket API

    A WebSocket API in API Gateway is a collection of WebSocket routes that are integrated with backend HTTP endpoints, Lambda functions, or other AWS services. You can use API Gateway features to help you with all aspects of the API lifecycle, from creation through monitoring your production APIs. Read more

    WebSocket APIs have two fundamental concepts - Routes and Integrations.

    WebSocket APIs direct JSON messages to backend integrations based on configured routes. (Non-JSON messages are directed to the configured $default route.)

    Integrations define how the WebSocket API behaves when a client reaches a specific Route. Learn more at Configuring integrations.

    Integrations are available in the aws-apigatewayv2-integrations module and more information is available in that module.

    To add the default WebSocket routes supported by API Gateway ($connect, $disconnect and $default), configure them as part of api props:

    import { LambdaWebSocketIntegration } from '@aws-cdk/aws-apigatewayv2-integrations';
    
    declare const connectHandler: lambda.Function;
    declare const disconnectHandler: lambda.Function;
    declare const defaultHandler: lambda.Function;
    
    const webSocketApi = new apigwv2.WebSocketApi(this, 'mywsapi', {
      connectRouteOptions: { integration: new LambdaWebSocketIntegration({ handler: connectHandler }) },
      disconnectRouteOptions: { integration: new LambdaWebSocketIntegration({ handler: disconnectHandler }) },
      defaultRouteOptions: { integration: new LambdaWebSocketIntegration({ handler: defaultHandler }) },
    });
    
    new apigwv2.WebSocketStage(this, 'mystage', {
      webSocketApi,
      stageName: 'dev',
      autoDeploy: true,
    });

    To retrieve a websocket URL and a callback URL:

    declare const webSocketStage: apigwv2.WebSocketStage;
    
    const webSocketURL = webSocketStage.url;
    // wss://${this.api.apiId}.execute-api.${s.region}.${s.urlSuffix}/${urlPath}
    const callbackURL = webSocketStage.callbackUrl;
    // https://${this.api.apiId}.execute-api.${s.region}.${s.urlSuffix}/${urlPath}

    To add any other route:

    import { LambdaWebSocketIntegration } from '@aws-cdk/aws-apigatewayv2-integrations';
    
    declare const messageHandler: lambda.Function;
    const webSocketApi = new apigwv2.WebSocketApi(this, 'mywsapi');
    webSocketApi.addRoute('sendmessage', {
      integration: new LambdaWebSocketIntegration({
        handler: messageHandler,
      }),
    });

    Manage Connections Permission

    Grant permission to use API Gateway Management API of a WebSocket API by calling the grantManageConnections API. You can use Management API to send a callback message to a connected client, get connection information, or disconnect the client. Learn more at Use @connections commands in your backend service.

    const lambda = new lambda.Function(this, 'lambda', { /* ... */ });
    
    const webSocketApi = new WebSocketApi(stack, 'mywsapi');
    const stage = new WebSocketStage(stack, 'mystage', {
      webSocketApi,
      stageName: 'dev',
    });
    // per stage permission
    stage.grantManageConnections(lambda);
    // for all the stages permission
    webSocketApi.grantManageConnections(lambda);

    Install

    npm i @aws-cdk/aws-apigatewayv2

    DownloadsWeekly Downloads

    207,915

    Version

    1.134.0

    License

    Apache-2.0

    Unpacked Size

    1.7 MB

    Total Files

    57

    Last publish

    Collaborators

    • eladb
    • romainmuller
    • amzn-oss
    • rix0rrr
    • aws-cdk-team