Tutorial: Creating a simple Lambda@Edge function
This tutorial shows you how to get started with Lambda@Edge by helping you create and add a sample Node.js function that runs in CloudFront. The example that we walk through adds HTTP security headers to a response, which can improve security and privacy for a website. You don't need a website for this walkthrough. In it, we simply add security headers to a response when CloudFront retrieves a file.
This example describes the steps to create and configure a Lambda@Edge function. When you create your own Lambda@Edge solution, you follow similar steps and choose from the same options.
Topics
Step 1: Sign up for an AWS account
If you haven't already done so, sign up for Amazon Web Services at https://aws.amazon.com/. Choose Sign Up Now and enter the required information.
Step 2: Create a CloudFront distribution
Before you create the example Lambda@Edge function, you must have a CloudFront environment to work with that includes an origin to serve content from.
Are you new to CloudFront? CloudFront delivers content through a worldwide network of edge locations. When you set up a Lambda function with CloudFront, the function can customize content closer to viewers, improving performance. If you're not familiar with CloudFront, take a few minutes before you complete the tutorial to read a short overview and learn a bit about how CloudFront caches and serves content.
For this example, you create a CloudFront distribution that uses an Amazon S3 bucket as the origin for the distribution. If you already have an environment to use, you can skip this step.
To create a CloudFront distribution with an Amazon S3 origin
-
Create an Amazon S3 bucket with a file or two, such as image files, for sample content. For help, follow the steps in Upload your content to Amazon S3. Make sure that you set permissions to grant public read access to the objects in your bucket.
-
Create a CloudFront distribution and add your S3 bucket as an origin, by following the steps in Create a CloudFront web distribution. If you already have a distribution, you can add the bucket as an origin for that distribution instead.
Tip
Make a note of your distribution ID. Later in this tutorial when you add a CloudFront trigger for your function, you must choose the ID for your distribution in a drop-down list—for example, E653W22221KDDL.
Step 3: Create your function
In this step, you create a Lambda function, starting with a blueprint template that's provided in the Lambda Console. The function adds code to update security headers in your CloudFront distribution.
Are you new to Lambda or Lambda@Edge? Lambda@Edge lets you use CloudFront triggers to invoke a Lambda function. When you associate a CloudFront distribution with a Lambda function, CloudFront intercepts requests and responses at CloudFront edge locations and runs the function. Lambda functions can improve security or customize information close to your viewers, to improve performance. In this tutorial, the function that we create updates the security headers in a CloudFront response.
There are several steps to take when you create a Lambda function. In this tutorial, you use a blueprint template as the basis for your function, and then update the function with code that sets the security headers. Finally, you add and deploy a CloudFront trigger to run the function.
To create a Lambda function
-
Sign in to the AWS Management Console and open the AWS Lambda console at https://console.aws.amazon.com/lambda/
. Important
Make sure that you're in the US-East-1 (N. Virginia) Region (us-east-1). You must be in this Region to create Lambda@Edge functions.
-
Choose Create function.
-
On the Create function page, choose Use a blueprint, and then filter for the CloudFront blueprints by entering
cloudfront
in the search field. The Keyword : cloudfront is shown, and all the blueprints that are tagged for CloudFront are listed.Note
CloudFront blueprints are available only in the US-East-1 (N. Virginia) Region (us-east-1).
-
Choose the cloudfront-modify-response-header blueprint as the template for your function.
-
Enter the following information about your function:
- Name
-
Enter a name for your function.
- Execution role
-
Choose how to set the permissions for your function. To use the recommended basic Lambda@Edge permissions policy template, choose Create a new role from AWS policy templates.
- Role name
-
Enter a name for the role that the policy template creates.
- Policy templates
-
Lambda automatically adds the policy template Basic Edge Lambda permissions because you chose a CloudFront blueprint as the basis for your function. This policy template adds execution role permissions that allow CloudFront to run your Lambda function for you in CloudFront locations around the world. For more information, see Setting IAM permissions and roles for Lambda@Edge.
-
Choose Create function. Lambda creates the function, and on the next page you see your function configuration.
-
In the Designer section of the page, choose your function name, as shown in the following image. In this example, the function name is ExampleFunction.
-
Scroll down to the Function code section of the page, as shown in the following image.
Replace the template code with a function that modifies the security headers that your origin returns. For example, you could use code similar to the following:
'use strict'; exports.handler = (event, context, callback) => { //Get contents of response const response = event.Records[0].cf.response; const headers = response.headers; //Set new headers headers['strict-transport-security'] = [{key: 'Strict-Transport-Security', value: 'max-age= 63072000; includeSubdomains; preload'}]; headers['content-security-policy'] = [{key: 'Content-Security-Policy', value: "default-src 'none'; img-src 'self'; script-src 'self'; style-src 'self'; object-src 'none'"}]; headers['x-content-type-options'] = [{key: 'X-Content-Type-Options', value: 'nosniff'}]; headers['x-frame-options'] = [{key: 'X-Frame-Options', value: 'DENY'}]; headers['x-xss-protection'] = [{key: 'X-XSS-Protection', value: '1; mode=block'}]; headers['referrer-policy'] = [{key: 'Referrer-Policy', value: 'same-origin'}]; //Return modified response callback(null, response); };
-
Choose Save to save your updated code.
Proceed to the next section to add a CloudFront trigger to run the function.
Step 4: Add a CloudFront trigger to run the function
Now that you have a Lambda function to update security headers, configure the CloudFront trigger to run your function to add the headers in any response that CloudFront receives from the origin for your distribution.
To configure the CloudFront trigger for your function
-
In the Designer section of the page, choose CloudFront, as shown in the following image.
-
Scroll down to the Configure triggers section of the page, then choose Deploy to Lambda@Edge.
-
On the Deploy to Lambda@Edge page, under Configure CloudFront trigger, enter the following information:
- Distribution
-
The CloudFront distribution ID to associate with your function. In the drop-down list, choose the distribution ID.
- Cache behavior
-
The cache behavior to use with the trigger. For this example, leave the value set to *, which means your distribution's default cache behavior. For more information, see Cache behavior settings in the Values that you specify when you create or update a distribution topic.
- CloudFront event
-
The trigger that specifies when your function runs. We want the security headers function to run whenever CloudFront returns a response from the origin. So in the drop-down list, choose Origin response. For more information, see Adding triggers for a Lambda@Edge function.
-
Under Confirm deploy to Lambda@Edge, select the check box to acknowledge that the trigger will be deployed and run your function in all AWS locations.
-
Choose Deploy to add the trigger and replicate the function to AWS locations worldwide. Then, if necessary, close the Deploy to Lambda@Edge page.
-
Wait for the function to replicate. This typically takes several minutes.
You can check to see if replication is finished by going to the CloudFront console
and viewing your distribution. Wait for the distribution status to change from In Progress back to Deployed, which means that your function has been replicated. To verify that the function works, follow the steps in the next section.
Step 5: Verify that the function runs
Now that you've created your Lambda function and configured a trigger to run it for a CloudFront distribution, check to make sure that the function is accomplishing what you expect it to. In this example, we check the HTTP headers that CloudFront returns, to make sure that the security headers are added.
To verify that your Lambda@Edge function adds security headers
-
In a browser, enter the URL for a file in your S3 bucket. For example, you might use a URL similar to
https://d111111abcdef8.cloudfront.net/image.jpg
.For more information about the CloudFront domain name to use in the file URL, see Customizing the URL format for files in CloudFront.
-
Open your browser's Web Developer toolbar. For example, in your browser window in Chrome, open the context (right-click) menu, and then choose Inspect.
-
Choose the Network tab.
-
Reload the page to view your image, and then choose an HTTP request on the left pane. You see the HTTP headers displayed in a separate pane.
-
Look through the list of HTTP headers to verify that the expected security headers are included in the list. For example, you might see headers similar to those shown in the following screenshot.
If the security headers are included in your headers list, great! You've successfully created your first Lambda@Edge function. If CloudFront returns errors or there are other issues, continue to the next step to troubleshoot the issues.
Step 6: Troubleshoot issues
If CloudFront returns errors or doesn't add the security headers as expected, you can investigate your function's execution by looking at CloudWatch Logs. Be sure to use the logs stored in the AWS location that is closest to the location where the function is executed.
For example, if you view the file from London, try changing the Region in the CloudWatch console to Europe (London).
To examine CloudWatch logs for your Lambda@Edge function
Sign in to the AWS Management Console and open the CloudWatch console at https://console.aws.amazon.com/cloudwatch/
. -
Change Region to the location that is shown when you view the file in your browser. This is where the function is executing.
-
In the left pane, choose Logs to view the logs for your distribution.
For more information, see Monitoring CloudFront metrics with Amazon CloudWatch.
Step 7: Clean up your example resources
If you created an Amazon S3 bucket and CloudFront distribution just for this tutorial, delete the AWS resources that you allocated so that you no longer accrue charges. After you delete your AWS resources, any content that you added is no longer available.
Tasks
Delete the S3 bucket
Before you delete your Amazon S3 bucket, make sure that logging is disabled for the bucket. Otherwise, AWS continues to write logs to your bucket as you delete it.
To disable logging for a bucket
Open the Amazon S3 console at https://console.aws.amazon.com/s3/
. -
Select your bucket, and then choose Properties.
-
From Properties, choose Logging.
-
Clear the Enabled check box.
-
Choose Save.
Now, you can delete your bucket. For more information, see Deleting a bucket in the Amazon Simple Storage Service Console User Guide.
Delete the CloudFront distribution
Before you delete a CloudFront distribution, you must disable it. A disabled distribution is no longer functional and does not accrue charges. You can enable a disabled distribution at any time. After you delete a disabled distribution, it's no longer available.
To disable and delete a CloudFront distribution
Open the CloudFront console at https://console.aws.amazon.com/cloudfront/v3/home
. -
Select the distribution that you want to disable, and then choose Disable.
-
When prompted for confirmation, choose Yes, Disable.
-
Select the disabled distribution, and then choose Delete.
-
When prompted for confirmation, choose Yes, Delete.
Resources for learning more
Now that you have a basic idea of how Lambda@Edge functions work, learn more by reading the following: