nitric

command module
v0.13.0-rc.3 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jan 4, 2022 License: Apache-2.0 Imports: 14 Imported by: 0

README

Nitric Logo

test status codecov Quality Gate Status

Nitric is a portable, provider independent runtime for cloud-native and serverless applications. Using Nitric, applications take advantage of cloud-native services for activities like eventing, queues, compute, CDN, storage, caches, etc. without direct integration to cloud specific APIs.

This decoupling enables applications to remain portable between cloud-providers and alternate deployment options such as Kubernetes or stand-alone servers, from a single application codebase.

Documentation

The full documentation is available at nitric.io/docs

We also have a getting started guide for AWS, Google Cloud and Azure

Status

Nitric is currently in Public Preview, anyone can use or deploy applications, but work remains and changes are likely

Nitric Membrane

The Membrane is at the heart of the solution. Nitric applications communicate with the Membrane via gRPC to access the following services in a provider agnostic way:

  • Events
  • Queues
  • Storage & Buckets
  • Document Store
  • Secret Store

Additional services on our roadmap include:

  • Authentication
  • Email
  • Logging

If you have any requests or suggestions let us know in the issues.

SDKs are available for many languages, providing an idiomatic wrapper around the gRPC client.

If you have additional languages you would like support for let us know in the issues, we also welcome community contribtions for new language support.

Architecture

The Nitric Membrane runs alongside your code as a separate process or side-car container. The process provides a Gateway server which accepts incoming triggers such as HTTP Requests, Events, etc., translates them into a standard trigger format and forwards them to your Service or Function. The Gateway also accepts a standard response format from your application and serializes it into an appropriate format based on the initial request.

The Membrane also provides an API Server, with APIs for services such as Events, State, Auth, etc., which are implemented via provider specific plugins. Application code interacts with these services via gRPC, either directly or via a language SDK, enabling complete freedom in terms of the language or runtime you use to develop.

By wrapping both in-bound and out-bound communication in this way, the Membrane ensures maximum portability of applications via an intuitive set of services and APIs. The plugin based architecture ensures new and variety provider services can continue to be safely added without breaking application code.

nitric membrane architecture diagram

Documentation on key components is available in the Membrane Plugin SDK.

Configuration

Membrane configuration options can be found here

Membrane Binary Options

The Nitric Membrane comes in two variants Pluggable or Static.

Static

For each supported provider (e.g. AWS, Google Cloud, Azure, etc.) we provide a static binary which includes all of the default service plugins for that provider. The static membrane binaries are far smaller than the equivalent pluggable binary, which uses separate plugin files. As a result, this is the most size efficient option when running Nitric on a single provider or when custom service implementations aren't required.

Pluggable

In cases where provider or service implementation flexibility is needed the pluggable membrane may be used. The pluggable variant loads service implementations (e.g. the AWS S3 implementation of the Storage service) via Go Plugin Service Factories. This enables runtime loading of service implementations, as well as custom service implementations within a provider as an alternative to the fixed set of plugins in the static membranes.

Service customization and multiplexing is currently on the roadmap.

Development

Requirements

  • Git
  • Golang (1.16)
  • Make
  • Docker
  • Google Protocol Buffers Compiler

Getting Started

Install dependencies
make install-tools
Install Protocol Buffers

Download the Google Protobuf Compiler (standalone binary called protoc) from https://github.com/protocolbuffers/protobuf and add it to your $PATH.

On MacOS with Homebrew, you can run brew install protobuf

Run unit tests

make test

Run integration tests

make test-integration

Build Static Membranes

AWS
Standard Binary

Linux support only - used in container images and for production.

make aws-static
Cross-platform Binary

Useful for local testing

make aws-static-xp
Container Images
make aws-docker
Google Cloud Platform
Standard Binary

Linux support only - used in container images and for production.

make gcp-static
Cross-platform Binary

Useful for local testing

make gcp-static-xp
Container Images
make gcp-docker
Dev Membrane

Note: the Dev Membrane should only be used for local development and testing.

Standard Binary

The dev binary is always cross-platform, since it doesn't need to be optimized for production deployments.

make dev-static
Container Images
make dev-docker

Run Locally

To run the membrane server locally, perform a local build of the membrane binary for the platform you're targeting, then run the resulting binary.

Example building and running the static Google Cloud Membrane locally
# Make the GCP Static Cross-platform binary
make gcp-static-xp

# Run the membrane binary
./bin/membrane

Note: for the AWS membrane, the Lambda Gateway (default) will fail to start. Instead, set the GATEWAY_ENVIRONMENT environment variable so that the HTTP gateway is launched instead.

# Make the AWS Static Cross-platform binary
make aws-static-xp

# Set environment variable in subshell, then run the membrane binary
(export GATEWAY_ENVIRONMENT=http; ./bin/membrane)
Running without a child process

It can be useful to run the Membrane in a 'service only' mode, where the cloud APIs are available but you don't need/want to start a child process to handle incoming request. This can be achieved by setting the MIN_WORKERS variable to 0:

(export MIN_WORKERS=0; ./bin/membrane)

Project Structure

The Membrane project source code structure is outlined below:

Directory Package Description
/interfaces/nitric/v1 v1 protoc generated GRPC services code
/pkg/adapters/grpc grpc GRPC service to SDK adaptors
/pkg/membrane membrane membrane application
/pkg/plugins/... ... Cloud service SDK plugins
/pkg/providers/... main Cloud provider main application and plugin injection
/pkg/sdk sdk SDK service interfaces
/pkg/triggers triggers provides Nitric event triggers
/pkg/utils utils provides utility functions
/pkg/worker worker Membrane workers representing function/service connections
/tests/mocks/... ... Cloud service SDK mocks
/tests/plugins/... ... Plugin services integration test suites
/tools tools include for 3rd party build tools

Membrane Service Invocation

A Nitric SDK service invocation sequence diagram is provided below.

SDK Service Invocation Sequence Diagram

  1. SDK Client - Application process makes SDK service call via GRPC client
  2. GRPC Server - Membrane process GRPC server receives call, and registered service handles call [/pkg/membrane]
  3. GRPC Document Service - delegates the call to the service adaptor [/interfaces/nitric/v1/document_grpc.pb.go]
  4. GRPC Document Adaptor - service adaptor delegates call to Cloud service plugin [/pkg/adapters/grpc/document_grpc.go]
  5. Document Service Plugin (DynamoDB) - Cloud service plugin makes remote call to Cloud's API [/pkg/plugins/document/dynamodb/dynamodb.go]
  6. DynamoDB API - Cloud API makes remote call to Cloud service

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis
cloud
aws Module
azure Module
common Module
debug Module
gcp Module
core module
e2e module
pkg
plugins/gateway/app_platform
The Digital Ocean App Platform HTTP gateway plugin
The Digital Ocean App Platform HTTP gateway plugin
plugins/gateway/base_http
The Digital Ocean App Platform HTTP gateway plugin
The Digital Ocean App Platform HTTP gateway plugin
plugins/gateway/cloudrun
The GCP HTTP gateway plugin for CloudRun
The GCP HTTP gateway plugin for CloudRun
plugins/gateway/dev
The AWS HTTP gateway plugin
The AWS HTTP gateway plugin
plugins/gateway/ecs
The AWS HTTP gateway plugin for ECS
The AWS HTTP gateway plugin for ECS
provider
aws Module
test module
tests

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL