You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+71-40Lines changed: 71 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,51 +1,54 @@
1
-
# Lambda Dynamic Renderer
1
+
# Lambda Dynamic Prerenderer
2
2
3
3
## Introduction
4
4
5
-
Dynamic Rendering is, as the name implies, about rendering a page based on a dynamic condition. What we want to do is solve the very common problem of modern Progressive Web Apps not working very well with some older crawlers that are unfortunately still in use across the web, such as on those used by Facebook and LinkedIn. Our condition is therefore ”if a crawler sees the page, give it prerendered markup”.
5
+
Dynamic Rendering is, as the name implies, about rendering a page based on a dynamic condition. What we want to do is solve the very common problem of modern Progressive Web Apps not working very well with some older crawlers that are unfortunately still in use across the web, such as on those used by Facebook and LinkedIn. Our condition is therefore ”if a crawler or bot sees the page, give it prerendered markup”.
6
6
7
7
For this to work, we need to intercept the browser’s request BEFORE it actually hits the server to see whether the visitor is a bot or not. This repo assumes Amazon Web Services (AWS) for the entire solution. For the edge function capability, this responsibility could probably be doled out to Cloudflare Workers or similar as well.
8
8
9
9
The individual services used will be:
10
10
11
-
- S3 bucket for hosting a static page; I’ve included a very basic routed React application in the `public` folder if you need something to experiment with
12
-
- CloudFront for adding edge locations and a CDN for the S3-hosted site
13
-
- Serverless Lambda@Edge functions to intercept the browser request
14
-
- Serverless ”regular” Lambda function to run a lightweight instance of Google’s headless browser, [Puppeteer](https://www.github.com/GoogleChrome/puppeteer)
11
+
- S3 bucket for hosting a static page. I’ve included a very basic routed React application in the `public` folder if you need something to experiment with.
12
+
- CloudFront for adding edge locations and a CDN for the S3-hosted site.
13
+
- Serverless Lambda@Edge functions (4, to be exact) to intercept the browser request.
14
+
- Serverless ”regular” Lambda function to run a lightweight instance of Google’s headless browser, [Puppeteer](https://www.github.com/GoogleChrome/puppeteer).
15
15
16
16
All of this magic can be fairly tedious to work with from scratch, especially if you are not accustomed to AWS. Combined with the slow deployment times, it’s not really the most user-friendly mini-project I’ve done. I hope I spare some of you out there a bit of wasted effort!
17
17
18
-
The below helps with the overall steps for manually setting everything up. You should be able to set up with Terraform or similar as well. Lambda@Edge functions through Serverless has proven hard, even with a fairly well-documented package out, so unfortunately you will have to deploy them manually through the web frontend.
18
+
The below helps with the overall steps for setting everything up, with some steps automated and some manual. Since my last version, Serverless Framework has added more support for Lambda@Edge functions, but still not enough to make my capable of deploying all the functions and setting up the Cloudfront the way it's needed. Note that I am not saying it's not possible, but you won't find it working like that in this repo. [You should be able to automate everything (minus function deployment) through Terraform](https://transcend.io/blog/lambda-edge-functions-in-terraform) if that's your poison of choice.
19
19
20
-
## Try it!
21
-
22
-
Curl or GET `https://uxj5ky4iw8.execute-api.eu-north-1.amazonaws.com/dev/prerender?url=http://d13x2tqlfdnb32.cloudfront.net/thatview`.
20
+
_An improvement on this prerenderer would be to include render-caching capabilities so you need to do less processing._
23
21
24
22
## Instructions
25
23
26
24
### Prerequisites
27
25
28
26
- You will need an AWS account
29
-
- Highly likely that you must have the AWS SDK installed
30
-
- Highly likely that you must be logged in through the terminal/environment
27
+
- Highly likely that you need to have the AWS SDK installed
28
+
- Highly likely that you need to be logged in through the terminal/environment
31
29
- Optional: A REST client like Insomnia if you don't really love curl'ing in your terminal
32
30
33
31
### Create a static build of a site
34
32
35
33
Use whatever you want!
36
34
37
-
A basic, routed React application is available in the `s3` folder if you need something to experiment with. The routes are `/thisview` and `/thatview`.
35
+
A basic, routed React application is available in the `demo-site-s3` folder if you need something to experiment with. The routes are `/thisview` and `/thatview`.
36
+
37
+
### Deploy the site and prerendering engine (automated)
38
+
39
+
Make sure you have an AWS account and that you're logged in through the terminal/environment.
40
+
41
+
1. Open `deploy-demo-site.sh` and set a unique bucket name
42
+
2. Run `deploy-demo-site.sh`
43
+
3. Upon successful deployment you will receive an endpoint URL such as `https://uxj5ky4iw8.execute-api.eu-north-1.amazonaws.com/dev/prerender`
44
+
4. Try running a GET request to the prerenderer, like so: `https://uxj5ky4iw8.execute-api.eu-north-1.amazonaws.com/dev/prerender?url=http://d13x2tqlfdnb32.cloudfront.net/`
45
+
5. Copy the endpoint URL, and paste it into the `PRERENDERER_ENDPOINT` constant in `src/edge/originResponse.js` (should be line 3)
38
46
39
-
### Deploy the prerendering engine
47
+
### Deploy the site and prerendering engine (manual)
40
48
41
-
1. Have an AWS account and be logged in through the terminal/environment
42
-
2. Install the dependencies in the repo with `yarn` or `npm install`
43
-
3. Run `sls deploy` to deploy the package with Serverless
44
-
4. Upon successful push, you will receive an endpoint URL, such as `https://uxj5ky4iw8.execute-api.eu-north-1.amazonaws.com/dev/prerender?url=http://d13x2tqlfdnb32.cloudfront.net/thatview`
45
-
5. Test running a GET request to the prerenderer, like so: `https://uxj5ky4iw8.execute-api.eu-north-1.amazonaws.com/dev/prerender?url=http://d13x2tqlfdnb32.cloudfront.net/thatview`
46
-
6. Copy the endpoint URL, and paste it into the `BASE_URL_RENDERER` constant in `functions/edgePrerenderResponse.js` (should be line 26)
49
+
Make sure you have an AWS account and that you're logged in through the terminal/environment.
47
50
48
-
### Host it in S3
51
+
####Host the site in S3
49
52
50
53
1. Go to https://s3.console.aws.amazon.com/s3/
51
54
2. Deactivate anything to do with blocking access (for now, switch on things later as needed and what works)
@@ -54,11 +57,19 @@ A basic, routed React application is available in the `s3` folder if you need so
54
57
5. In the Permissions tab, add a Bucket Policy (located in `snippets/bucket-policy.json`)
55
58
6. In the Permissions tab, add a CORS configuration (located in `snippets/cors.xml`)
56
59
60
+
#### Deploy prerenderer
61
+
62
+
7. Install the dependencies in the repo with `yarn` or `npm install`
63
+
8. Run `sls deploy` to deploy the package with Serverless
64
+
9. Upon successful deployment you will receive an endpoint URL such as `https://uxj5ky4iw8.execute-api.eu-north-1.amazonaws.com/dev/prerender`
65
+
10. Try running a GET request to the prerenderer, like so: `https://uxj5ky4iw8.execute-api.eu-north-1.amazonaws.com/dev/prerender?url=http://d13x2tqlfdnb32.cloudfront.net/`
66
+
11. Copy the endpoint URL, and paste it into the `PRERENDERER_ENDPOINT` constant in `src/edge/originResponse.js` (should be line 3)
67
+
57
68
### Set up a CloudFront distribution for the site
58
69
59
-
1. Go to https://console.aws.amazon.com/cloudfront/
70
+
1. Go to [https://console.aws.amazon.com/cloudfront/](https://console.aws.amazon.com/cloudfront/)
60
71
2. Click _Create new Distribution_
61
-
3. Make sure that Origin Domain Name is the endpoint URL from S3 (the one seen in ”Static website hosting” ex. http://prerender-demo.s3-website.eu-north-1.amazonaws.com)
72
+
3. Make sure that Origin Domain Name is the endpoint URL from S3 (the one seen in ”Static website hosting”, which looks something like `http://prerender-demo.s3-website.eu-north-1.amazonaws.com`)
62
73
4. Set _Allowed HTTP Methods_ to "GET, HEAD, OPTIONS, PUT, POST, PATCH, DELETE"
63
74
5. Set cache TTL items to 0 when initially testing this (you probably want caching later, though!)
64
75
6. Set _Compress Objects Automatically_ to "Yes"
@@ -73,16 +84,20 @@ A basic, routed React application is available in the `s3` folder if you need so
73
84
- Set _HTTP Response Code_ to 200
74
85
- The format is identical between all three error codes, except for the HTTP Error Code (400, 403, 404)
75
86
76
-
This is going to deploy for 10-15 minutes or so, so continue with the rest below.
87
+
This is going to deploy for 5-15 minutes, so continue with the rest below.
88
+
89
+
### Create Lambda@Edge functions (automated)
90
+
91
+
This is highly recommended, and will save you _lots_ of time compared to doing it manually.
77
92
78
-
### Create Lambda@Edge functions
93
+
- Run `npm run deploy:edge`
79
94
80
-
These lambdas will be copy-pasted into the web code editor as support via Serverless is kind of wonky.
95
+
### Create Lambda@Edge functions (manual)
81
96
82
-
1. Go to https://console.aws.amazon.com/lambda/
97
+
1. Go to [https://console.aws.amazon.com/lambda/](https://console.aws.amazon.com/lambda/)
83
98
2. Click _Create new function_
84
99
3. Select _Author from scratch_
85
-
4. Give it a good name; Node version should be 8.10
100
+
4. Give it a good name; Node version should be 12
86
101
5. In _Execution Role_, choose _Create a new role with basic Lambda permissions_
87
102
6. For each function, copy-paste the supplied lambda code into the code editor
88
103
7. Under _Add triggers_ click _CloudFront_ and then _Deploy to Lambda@Edge_
@@ -93,9 +108,9 @@ These lambdas will be copy-pasted into the web code editor as support via Server
93
108
12. If you cannot deploy, you should do the next section in a new tab (you need to do it anyway)
94
109
13. Repeat for all 4 functions
95
110
96
-
### Go to IAM and give permissions to the lambdas
111
+
####Go to IAM and give permissions to the lambdas
97
112
98
-
1. Go to https://console.aws.amazon.com/iam/
113
+
1. Go to [https://console.aws.amazon.com/iam/](https://console.aws.amazon.com/iam/)
99
114
2. Go to _Roles_
100
115
3. You should have roles created for each of the edge functions
101
116
@@ -105,18 +120,18 @@ I am overreaching a bit on what to create, but at least the following works for
105
120
106
121
4. Under Permissions, click _Attach policies_
107
122
5. Filter for `AWSLambdaBasicExecutionRole` and attach it
108
-
6. When it's added, click _Add inline policy_, and go to the _JSON_ tab; paste in the contents of `snippets/log-policy.json`, save it
109
-
7. When it's added, go to the _Trust relationships_ tab and click _Edit trust relationship_; paste in the contents of `snippets/trust-policy.json`, save it
123
+
6. When it's added, click _Add inline policy_, and go to the _JSON_ tab; paste in the contents of `snippets/lambda-log-policy.json`, save it
124
+
7. When it's added, go to the _Trust relationships_ tab and click _Edit trust relationship_; paste in the contents of `snippets/lambda-iam-trust-policy.json`, save it
110
125
111
126
### Link all Lambda Function Associations and whitelist headers
112
127
113
-
1. Go to https://console.aws.amazon.com/lambda/
114
-
2. For each Lambda, note the ARN in the right corner (something like arn:aws:lambda:us-east-1:487572315234:function:PrerenderRequest:12)
128
+
1. Go to [https://console.aws.amazon.com/lambda/](https://console.aws.amazon.com/lambda/)
129
+
2. For each Lambda, note the ARN in the right corner (something like `arn:aws:lambda:us-east-1:487572315234:function:PrerenderRequest:12`)
115
130
3. You must have the last part with `:12` or whatever the number might be - this corresponds to the version number, if you don't see it click the Qualifiers/Version box and switch to the version with the highest number
116
-
4. When you have collected all the four ARNs, go to https://console.aws.amazon.com/cloudfront/
131
+
4. When you have collected all the four ARNs, go to [https://console.aws.amazon.com/cloudfront/](https://console.aws.amazon.com/cloudfront/)
117
132
5. Go to _Distribution settings_ and then to _Behaviors_
118
133
6. If you don't have a behavior, create a new one, otherwise edit the previous
119
-
7. Make sure to whitelist the following headers: Access-Control-Request-Headers, Access-Control-Request-Method, Origin, x-prerender-uri, x-resolved-user-agent, x-should-prerender
134
+
7. Make sure to whitelist the following headers: `Access-Control-Request-Headers`, `Access-Control-Request-Method`, `Origin`, `x-prerender-uri`, `x-resolved-user-agent`, `x-should-prerender`
120
135
8. At the bottom, in _Lambda Function Associations_ open one event each for viewer request, origin request, origin response, viewer response
121
136
9. In their respective _Lambda Function ARN_, paste in their corresponding ARN value including the `:12` (or whatever number) bit
122
137
10. Save
@@ -126,17 +141,33 @@ I am overreaching a bit on what to create, but at least the following works for
126
141
127
142
### Test if it will render correctly
128
143
144
+
Services that should be able to give you an indication of functionality:
If you use Insomnia or Postman, you can try GETting your Cloudfront distribution with a header like `googlebot` and it should respond with rendered HTML. Removing the header should in turn start returning the basic HTML again.
132
151
133
152
### Where to find logs?
134
153
135
-
Check the default Cloudwatch logs at [console.aws.amazon.com/cloudwatch/](console.aws.amazon.com/cloudwatch/).
154
+
Check the default Cloudwatch logs at [console.aws.amazon.com/cloudwatch/](console.aws.amazon.com/cloudwatch/). Edge functions are currently only available in the `us-east-1` region, so look for those logs in that region. Logs may also show up in whatever region the CDN thinks you are in, so in case you actually don't find any logs, look in regions close to you.
155
+
156
+
When you test Facebook or similar, the same goes for those: These are most likely going to be run from one of the North American regions.
157
+
158
+
### Teardown
159
+
160
+
Run the `teardown.sh` script. Also read the below from [Serverless Framework's blog post on Lambda@Edge support](https://www.serverless.com/blog/lambda-at-edge-support-added):
161
+
162
+
```
163
+
**A note about removals**
164
+
165
+
When you’re done with testing you might want to remove the service via serverless remove. Note that the removal also takes a little bit longer and won’t remove your Lambda@Edge functions automatically. The reason is that AWS has to cleanup your functions replicas which can take a couple of hours. Removing the Lambda functions too early would result in an error.
136
166
137
-
Edge functions will pop up in whatever region gets the request. This may not always be the most obvious region, but begin in the geographically closest region and start from there.
167
+
The solution for this problem right now is to manually remove the Lambda@Edge functions via the AWS console after a couple of hours. You might want to automate this process with a script which issues AWS SDK calls to streamline this cleanup process.
168
+
```
138
169
139
-
When you test Facebook or similar, the same goes for those: These are going to be run from one of the North American regions.
170
+
Long story short: You will need to remove Cloudfront and Lambda@Edge functions manually.
0 commit comments