Skip to content

awswa/CognitoIDToken

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CognitoIDToken API

This project contains source code and supporting files for a serverless application that you can deploy with the SAM CLI. It includes the following files and folders.

  • authorizer - Code for the application's Lambda function.
  • events - Invocation events that you can use to invoke the function.
  • getidtoken/nodejs/node_modules/auth - Lambda Layer to get ID token from Cognito using amazon-cognito-identity-js.
  • template.yaml - A template that defines the application's AWS resources.

Deploy the sample application

To build and deploy your application for the first time, run the following in your shell:

git clone https://github.com/awswa/CognitoIDToken.git
cd CognitoIDToken

Follow the prompts on screen.

sam deploy --guided

The first command will build the source of your application. The second command will package and deploy your application to AWS, with a series of prompts:

  • Stack Name: The name of the stack to deploy to CloudFormation. This should be unique to your account and region, and a good starting point would be something matching your project name.
  • AWS Region: The AWS region you want to deploy your app to.
  • Confirm changes before deploy: If set to yes, any change sets will be shown to you before execution for manual review. If set to no, the AWS SAM CLI will automatically deploy application changes.
  • Allow SAM CLI IAM role creation: Many AWS SAM templates, including this example, create AWS IAM roles required for the AWS Lambda function(s) included to access AWS services. By default, these are scoped down to minimum required permissions. To deploy an AWS CloudFormation stack which creates or modifies IAM roles, the CAPABILITY_IAM value for capabilities must be provided. If permission isn't provided through this prompt, to deploy this example you must explicitly pass --capabilities CAPABILITY_IAM to the sam deploy command.
  • Save arguments to samconfig.toml: If set to yes, your choices will be saved to a configuration file inside the project, so that in the future you can just re-run sam deploy without parameters to deploy changes to your application.

You can find your API Gateway Endpoint URL in the output values displayed after deployment.

How to use API

Please refer to SAM CLI Output or Output tab in Cloudformation stack in AWS Console.

1. Sign up in Cognito

  • Click CognitoSignupURL
  • Check your email and click the link provided to confirm your user. API ONLY works with a confirmed user.

2. Get API Endpoint

  • APIEndpoint

3. Postman or Insomnia or any other tool you prefer

  • Use POST method
  • Use APIEndpoint
  • Use the following payload format:
{
    "username": "[email protected]",
    "password": "yourpassword"
}

Cleanup

To delete the sample application that you created, use the AWS CLI. Assuming you used your project name for the stack name, you can run the following:

aws cloudformation delete-stack --stack-name "Your CloudFormation Stack Name"

Resources

See the AWS SAM developer guide for an introduction to SAM specification, the SAM CLI, and serverless application concepts.

Next, you can use AWS Serverless Application Repository to deploy ready to use Apps that go beyond hello world samples and learn how authors developed their applications: AWS Serverless Application Repository main page

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published