2 unstable releases
0.2.0 | Oct 2, 2020 |
---|---|
0.1.0 | May 29, 2020 |
#50 in #lambda
30 downloads per month
18KB
237 lines
minlambda
A minimalist AWS Lambda runtime for Rust.
fn main() -> ! {
minlambda::run_ok(|_: serde::de::IgnoredAny| "Hello, world!")
}
What it does
minlambda implements the AWS Lambda runtime interface, deserializing events and serializing responses with Serde JSON.
To communicate with the runtime API over HTTP, minlambda uses a purpose-built HTTP client.
What it doesn't
minlambda doesn't parse response headers in the invocation event (other than the request ID). This includes the function deadline, function ARN, AWS X-Ray tracing header, or additional AWS Mobile SDK data. The crate author has never needed these and, well, this is a minimal runtime.
minlambda doesn't run your handler in an async runtime. If you're using async code, you can
create a runtime outside of lambda::run
and call its blocking function (e.g. Tokio's
Runtime::block_on
). An example for Tokio is available.
When not to use this
Probably most of the time.
If you're using Lambda to interact with other AWS services, which is very likely, you are probably using an SDK (such as Rusoto) that probably relies on hyper and Tokio, and you're not really reducing your total dependency closure compared to the AWS Labs runtime.
The HTTP client was built to work with Lambda's runtime API, and not to be a generic RFC-compliant HTTP client; if Lambda's underlying interface subtly changes, this runtime could break unexpectedly. (This probably won't happen: we believe that the subset of the HTTP spec we implement is by the book.)
When to use this
You like simple things, or your code already has minimal dependencies.
Examples
Some lovely examples are available in our repository.
Building Lambda functions
Building binaries that actually work in the Lambda execution environment is a bit of an art, as it contains stable (old) versions of glibc and the like. Your compiler is probably targeting a system with newer shared libraries and symbol versions than what the execution environment has available, resulting in cryptic dynamic linker errors at runtime.
If you find the musl libc toolchain reasonable to work with, building a fully static binary is probably the way to go. If you find containers reasonable to work with, using softprops/lambda-rust is probably the way to go.
Disclaimer
The author of this crate works at AWS, but this is not an official AWS project, nor does it necessarily represent opinions of or recommended best-practices on AWS.
Dependencies
~0.5–1MB
~20K SLoC