AWS API Gateway provides a bundle of functionality for proxying inbound HTTP requests to different containers and services running inside AWS.
API Gateways can easily be deployed by using AWS SAM to manage serverless stacks of gateways and lambda functions.
Custom Lambda Authorizer for Custom Auth Header
By default AWS API Gateway has a built in mechanism for passing a pre-shared API key via the x-api-key
header in a HTTP request. However, this header name cannot be customised. If we need to build in compatibility with some existing REST convention (e.g. passing api keys via Authorization: Bearer <token>
instead of x-api-key: <token>
) this presents a challenge.
To get around this we can create a custom custom lambda function that checks whether the current user should be allowed to call the API or not.
import logger
def auth_handler(event, context):
"""Lambda function to authorize API Gateway requests using an API key."""
logger.info("Received event: %s", event)
if "authorizationToken" not in event:
logger.warning("No authorization token provided")
authorization_header = event.get("authorizationToken")
api_key = authorization_header[len("Bearer "):] if authorization_header.startswith("Bearer ") else None
action = "Allow"
# ARN looks like arn:aws:execute-api:<region-name>:<account-number>:<gateway-id>/<stage-name>/<method-name>/<resource-path>
# we want to allow access to all methods for the given resource path by replacing /<method-name>/<resource-path> with /*
# Modify the Resource to allow access to all methods for the current ARN
resource_arn = event["methodArn"].split("/", 1)[0] + "/*"
policy = {
"principalId": "x-api-key",
"policyDocument": {
"Version": "2012-10-17",
"Statement": [
{
"Action": "execute-api:Invoke",
"Effect": action,
"Resource": resource_arn,
},
],
},
}
if api_key is not None:
policy["usageIdentifierKey"] = api_key
logger.info("Generated policy: %s", policy)
return policy
Troubleshooting Inconsistent Authorizers
If you find that authorizers sometimes let you in - perhaps you can successfully GET but following this with a POST fails, it might be because AWS is caching the authorizer result and your methodARN is too granular. In the example above we discard the Method (e.g. GET or POST) and just grant an Allow to ‘*‘ for the given lambda function.
Resources:
Setting up Logging for API Gateway
Using AWS SAM:
Resources:
AccessLogGroup:
Type: AWS::Logs::LogGroup
Properties:
LogGroupName: !Sub "/aws/apigateway/${ApiGateway}/${EnvironmentName}"
RetentionInDays: 7
ApiGateway:
Type: AWS::Serverless::Api
Properties:
Name: my-api-gateway
StageName: prod
AccessLogSetting:
DestinationArn: !GetAtt AccessLogGroup.Arn
Format: '{"requestTime":"$context.requestTime","requestId":"$context.requestId","httpMethod":"$context.httpMethod","path":"$context.path","resourcePath":"$context.resourcePath","status":$context.status,"responseLatency":$context.responseLatency}'
# other stuff ...
TracingEnabled: true # turns on x-ray tracing
MethodSettings:
- ResourcePath: "/*"
HttpMethod: "*"
ThrottlingBurstLimit: 2
ThrottlingRateLimit: 2
# for logging
LoggingLevel: INFO
DataTraceEnabled: true
MetricsEnabled: true
The access logs will be in CloudWatch under “/aws/apigateway/gateway-name/stage-name” but these won’t help you to debug issues with authorizers. They simply provide a log of who accessed the api.
The more interesting logs are the execution logs. They can be found in Cloudflare with the pattern API-Gateway-Execution-Logs_<GATEWAY_ID>/<STAGE_NAME>