Nitric is a portable, provider independent runtime for cloud-native and serverless applications. Using Nitric, applications take advantage of cloud-native services for activities like eventing, queues, compute, CDN, storage, caches, etc. without direct integration to cloud specific APIs.
This decoupling enables applications to remain portable between cloud-providers and alternate deployment options such as Kubernetes or stand-alone servers, from a single application codebase.
Documentation
The full documentation is available at nitric.io/docs
We also have a getting started guide for AWS, Google Cloud and Azure
Status
Nitric is currently in Public Preview, anyone can use or deploy applications, but work remains and changes are likely
Nitric Membrane
The Membrane is at the heart of the solution. Nitric applications communicate with the Membrane via gRPC to access the following services in a provider agnostic way:
- Events
- Queues
- Storage & Buckets
- Document Store
- Secret Store
Additional services on our roadmap include:
- Authentication
- Email
- Logging
If you have any requests or suggestions let us know in the issues.
SDKs are available for many languages, providing an idiomatic wrapper around the gRPC client.
If you have additional languages you would like support for let us know in the issues, we also welcome community contribtions for new language support.
Architecture
The Nitric Membrane runs alongside your code as a separate process or side-car container. The process provides a Gateway server which accepts incoming triggers such as HTTP Requests, Events, etc., translates them into a standard trigger format and forwards them to your Service or Function. The Gateway also accepts a standard response format from your application and serializes it into an appropriate format based on the initial request.
The Membrane also provides an API Server, with APIs for services such as Events, State, Auth, etc., which are implemented via provider specific plugins. Application code interacts with these services via gRPC, either directly or via a language SDK, enabling complete freedom in terms of the language or runtime you use to develop.
By wrapping both in-bound and out-bound communication in this way, the Membrane ensures maximum portability of applications via an intuitive set of services and APIs. The plugin based architecture ensures new and variety provider services can continue to be safely added without breaking application code.
Documentation on key components is available in the Membrane Plugin SDK.
Configuration
Membrane configuration options can be found here
Membrane Binary Options
The Nitric Membrane comes in two variants Pluggable
or Static
.
Static
For each supported provider (e.g. AWS, Google Cloud, Azure, etc.) we provide a static binary which includes all of the default service plugins for that provider.
The static membrane binaries are far smaller than the equivalent pluggable binary, which uses separate plugin files. As a result, this is the most size efficient option when running Nitric on a single provider or when custom service implementations aren't required.
Pluggable
In cases where provider or service implementation flexibility is needed the pluggable membrane may be used. The pluggable
variant loads service implementations (e.g. the AWS S3 implementation of the Storage service) via Go Plugin Service
Factories. This enables runtime loading of service implementations, as well as custom service implementations within a
provider as an alternative to the fixed set of plugins in the static membranes.
Service customization and multiplexing is currently on the roadmap.
Development
Requirements
- Git
- Golang (1.16)
- Make
- Docker
- Google Protocol Buffers Compiler
Getting Started
Install dependencies
make install-tools
Install Protocol Buffers
Download the Google Protobuf Compiler (standalone binary called protoc
) from https://github.com/protocolbuffers/protobuf and add it to your $PATH.
On MacOS with Homebrew, you can run brew install protobuf
Run unit tests
make test
Run integration tests
make test-integration
Build Static Membranes
AWS
Standard Binary
Linux support only - used in container images and for production.
make aws-static
Useful for local testing
make aws-static-xp
Container Images
make aws-docker
Standard Binary
Linux support only - used in container images and for production.
make gcp-static
Useful for local testing
make gcp-static-xp
Container Images
make gcp-docker
Dev Membrane
Note: the Dev Membrane should only be used for local development and testing.
Standard Binary
The dev binary is always cross-platform, since it doesn't need to be optimized for production deployments.
make dev-static
Container Images
make dev-docker
Run Locally
To run the membrane server locally, perform a local build of the membrane binary for the platform you're targeting, then run the resulting binary.
Example building and running the static Google Cloud Membrane locally
# Make the GCP Static Cross-platform binary
make gcp-static-xp
# Run the membrane binary
./bin/membrane
Note: for the AWS membrane, the Lambda Gateway (default) will fail to start. Instead, set the GATEWAY_ENVIRONMENT
environment variable so that the HTTP gateway is launched instead.
# Make the AWS Static Cross-platform binary
make aws-static-xp
# Set environment variable in subshell, then run the membrane binary
(export GATEWAY_ENVIRONMENT=http; ./bin/membrane)
Running without a child process
It can be useful to run the Membrane in a 'service only' mode, where the cloud APIs are available but you don't need/want to start a child process to handle incoming request. This can be achieved by setting the MIN_WORKERS variable to 0
:
(export MIN_WORKERS=0; ./bin/membrane)
Project Structure
The Membrane project source code structure is outlined below:
Directory |
Package |
Description |
/interfaces/nitric/v1 |
v1 |
protoc generated GRPC services code |
/pkg/adapters/grpc |
grpc |
GRPC service to SDK adaptors |
/pkg/membrane |
membrane |
membrane application |
/pkg/plugins/... |
... |
Cloud service SDK plugins |
/pkg/providers/... |
main |
Cloud provider main application and plugin injection |
/pkg/sdk |
sdk |
SDK service interfaces |
/pkg/triggers |
triggers |
provides Nitric event triggers |
/pkg/utils |
utils |
provides utility functions |
/pkg/worker |
worker |
Membrane workers representing function/service connections |
/tests/mocks/... |
... |
Cloud service SDK mocks |
/tests/plugins/... |
... |
Plugin services integration test suites |
/tools |
tools |
include for 3rd party build tools |
Membrane Service Invocation
A Nitric SDK service invocation sequence diagram is provided below.
- SDK Client - Application process makes SDK service call via GRPC client
- GRPC Server - Membrane process GRPC server receives call, and registered service handles call [
/pkg/membrane
]
- GRPC Document Service - delegates the call to the service adaptor [
/interfaces/nitric/v1/document_grpc.pb.go
]
- GRPC Document Adaptor - service adaptor delegates call to Cloud service plugin [
/pkg/adapters/grpc/document_grpc.go
]
- Document Service Plugin (DynamoDB) - Cloud service plugin makes remote call to Cloud's API [
/pkg/plugins/document/dynamodb/dynamodb.go
]
- DynamoDB API - Cloud API makes remote call to Cloud service