Hosting a Vue.js Single Page Application (SPA) on AWS Simple Storage Service (S3)
%20on%20%2008c4957b6a8e48cfb0191d8ba0795406/Host-Static-Website-on-AWS.png)
Recently, I was responsible for deploying and hosting a Vue.js frontend application on AWS. This project required HTTPS, a custom domain, a hosting service for the deployment files, and a content delivery network. As such, I decided to share the process as a step-by-step tutorial to help others who may need it.
Objectives
In this tutorial, we will do the following:
- Set up a custom domain name
- Set up an S3 bucket to store and host our application file
- Set up an SSL Certificate, and redirect all HTTP traffic to HTTPS
- Create an IAM policy, a user, and access credentials
- Programmatically access AWS using aws-cli command and deploy files to S3
- Set up a CloudFront distribution and resolve it to our custom domain name
- Set up a bucket policy to restrict access to bucket content
Requirements
We need an AWS account to be able to host and secure our single-page application in the cloud. To accomplish our objectives, we will use the following services:
- AWS S3: since our application is static, we can host the files in an S3 bucket. In addition to being highly scalable, reliable, and delivering high performance, S3 is also highly secure.
- AWS Certificate Manager: this allows us to generate a custom SSL certificate for our distribution and redirect all HTTP traffic to HTTPS.
- CloudFront: is a Content Delivery Network (CDN) that securely delivers content globally, offering low latency and high transfer speed. It provides distribution for our site at edge locations worldwide.
- IAM: is used to create temporary credentials that programmatically access and deploy our files to AWS S3.
- Route 53: this provides domain registration, DNS & traffic management services. We’ll set up Route 53 to point to our CloudFront distribution.
Some of the benefits of using the above choice of services are:
- They are serverless
- Cost efficient and employs a pay-as-you-go model
- Scalable and high performance
- Ease of use and maintenance
- No upfront cost
See below the architecture pattern for our hosted single-page application on AWS Cloud.
%20on%20%2008c4957b6a8e48cfb0191d8ba0795406/Architecture_Diagram_1.png)
By the end of this tutorial, you will have successfully hosted your application on AWS, and it will be globally available. Alright, let’s get started.
Step 1: Build the Site for Production
Depending on how you’ve created your site, I’ll leave it to you to build the production codebase. I used Vue Cli to code my web application, so I will use the npm run build command to compile my production site.
%20on%20%2008c4957b6a8e48cfb0191d8ba0795406/Building_SPA_1.png)
We have successfully built the web application, and this created a dist directory.
%20on%20%2008c4957b6a8e48cfb0191d8ba0795406/Building_SPA_2.png)
Step 2: Set up a Domain in Route 53
- Register a domain: myexample.com on AWS
- Navigate to Route 53 dashboard. Click on Register domain
- Accept terms and conditions to proceed. Click complete order
- Your domain will appear as a pending request. You will receive an email confirmation with a verification link from Amazon Registrar.
- Create a Hosted Zone in AWS:
- Navigate to Route 53 dashboard. Click on create hosted zone
- Change registrar DNS: this change allows Route 53 to handle DNS. Set the DNS servers to the values in the NS record in the Hosted Zone you created in Route 53.
Step 3: Host the single-page application in S3
- Create a bucket
- Navigate to Amazon S3. Click on Create bucket
- Disable Access Control List, then uncheck Block Public Access settings (this grants public read access to this bucket).
- Click Create bucket.
- Turn on static website hosting
- Navigate to the properties tab
- Scroll down, then click on Edit static website hosting
- Upload Files: copy in the built website files (including your index.html, favicon, JS, CSS, and any images).
- Navigate to the properties tab to get the URL endpoint to your website.
- Open the URL in a new tab to see the hosted web application. It will output an error as we are yet to set an explicit bucket policy.
- Configure the bucket policy: in the permissions tab, set the bucket policy to allow public access to the bucket.
- Paste the JSON policy, replacing BUCKET-NAME-GOES-HERE with the name of your S3 bucket:
{ "Version":"2012-10-17", "Statement":[{ "Sid":"PublicReadGetObject", "Effect":"Allow", "Principal": "*", "Action":["s3:GetObject"], "Resource":["arn:aws:s3:::BUCKET-NAME-GOES-HERE/*" ] } ]
- Click on Save changes.
Now, our bucket is all set to be served up.
Step 4: Set up IAM User for Programmatic Access to the S3 Bucket
This process enables us to programmatically access AWS S3 from our local machine using the aws-cli. We will use the credentials to show that we are authorized to make changes to the S3 bucket. To accomplish this, we need to create an IAM policy and user.
- Navigate to the IAM dashboard, then select policies
- Click on the JSON tab. Paste in the JSON code, then replace BUCKET-NAME-GOES-HERE with your bucket name
{ "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "s3:PutObject", "s3:GetObject", "s3:ListBucket", "s3:DeleteObject", "s3:GetBucketPolicy" ], "Resource": [ "arn:aws:s3:::BUCKET-NAME-GOES-HERE", "arn:aws:s3:::BUCKET-NAME-GOES-HERE/*" ] } ] }
This policy grants read and write access to our S3 bucket
- Next, we’ll create an IAM user and attach this policy to its set of permissions. We will use this user’s credentials to access S3 using aws-cli.
- Enter a name for your user and check the Access Type box for “Programmatic access”. Click on Next: Permissions
- Click on Next: Tags. We don’t need to do anything here. Click on Next: Review.
- Click on Create user to finish. This step will create the user’s credentials and output an Access key ID and a Secret access key (we will use these keys to access our S3 bucket).
Step 5: Deploy to S3 Bucket from the CLI
We’ll set up a local AWS profile using aws configure command with the credentials generated from the above step:
~/$ aws configure --profile S3-VueJs-User1
AWS Access Key ID [************]: PASTE ACCESS KEY ID FROM AWS
AWS Secret Access Key [********]: PASTE SECRET ACCESS KEY FROM AWS
Default region name [None]: us-east-1
Default output format [None]: None
Running aws configure sets up credentials in a file stored at ~/.aws/credentials. After setting up the AWS profile, we can proceed to access our S3 bucket from the CLI.
- Run the below command to list all objects in the created bucket (replace BUCKET-NAME-GOES-HERE with your bucket name)
~/$ aws --region us-east-1 --profile S3-VueJs-User1 s3 ls s3://BUCKET-NAME-GOES-HERE
- The above command should do nothing as our bucket is currently empty. It means we now have access to the S3 bucket (the IAM user and permissions were correct).
- Now proceed to deploy the production server (./dist ) to our S3 bucket using the sync command (replace BUCKET-NAME-GOES-HERE with your bucket name)
~/$ aws --region us-east-1 --profile S3-VueJs-User1 s3 sync ./dist s3://BUCKET-NAME-GOES-HERE –delete
- Next, click on the properties tab for the S3 bucket. Scroll down to static website hosting to locate the bucket website endpoint URL. Open the URL in your browser, and you will see that your application is live.
Note: One of the limitations of static web hosting is that S3 website endpoints do not support HTTPS.
Step 5: Request SSL Certificate using AWS Certificate Manager (ACM)
ACM offers free public certificates to provide Secure Socket Layer (SSL) and Transport Layer Security (TSL) encryption for your websites over the internet.
- Set the domain name to your registered domain name(myexample.com)
- This creates a CNAME record in the DNS settings for your domain, according to the values given to you here, and verifies that your own the domain. Check ACM to confirm the status of the issued certificate.
Step 6: Set up our CloudFront Distribution
CloudFront is a Content Delivery Network (CDN) that caches and serves copies of our websites at edge locations, thereby making our website faster to access. CloudFront also enables us to configure HTTPS while improving the performance of our site.
- Create the First Distribution
- Navigate to Amazon CloudFront, then click on Create a CloudFront distribution
- Configure the Origin Domain Name to your S3 bucket URL endpoint (my-example-bucket.s3.us-east-1.amazonaws.com)
- Click Create new origin access identity (OAI): CloudFront will use the OAI to access the content of our S3 bucket
- Change the Viewer Protocol Policy to Redirect HTTP to HTTPS
- Set CNAME to your primary domain name (myexample.com)
- Select the custom SSL Certificate earlier created with ACM
- Set default root object for distribution to index.html
- Create the Second Distribution
- Replicate step 1 to step 5 as shown in the first distribution
- Set CNAME to your primary domain name (www.myexample.com)
- Set up Error Page redirects to index.html
This setting will redirect all error responses to index.html, letting the single-page application handle routing.
- Navigate to the distribution Error page tab.
- We will create two custom error responses (403 Forbidden and 404 Not Found). Click on Create custom error response
- Set Error caching minimum TTL to 0 seconds
- Set Customized error response to Yes
- Set Response Page Path to /index.html
- Repeat the above steps for the second distribution
Step 7: Configure Route53 DNS record
This configuration points Route53 to our CloudFront distribution. We will create an A Record, which will serve as an alias that resolves our custom domain name to our CloudFront distribution.
- Navigate to Route 53, then click on the created hosted zone
- Click on Create record (Root Domain)
- Keep the record name blank to create a record for your root domain (myexample.com)
- Set the record type to A-IPv4 address
- Set Alias to Yes
- Set Alias target to your First CloudFront distribution from the dropdown
- Click on Create record (Sub-Domain)
- For the record name enter www to create a record for your sub-domain (www.myexample.com)
- Repeat steps 2 and 3 above
- Set Alias target to your Second CloudFront distribution from the dropdown
Step 8: Modify S3 Bucket Policy
Lastly, we will navigate to our S3 bucket to remove the bucket policy added in Step 3 above. This modification will remove public access to our S3 bucket, and grants access to CloudFront only.
%20on%20%2008c4957b6a8e48cfb0191d8ba0795406/Step_7a_Update_Bucket_Policy.png)
Note: Making changes to your SPA can take some time to propagate. However, you can create a CloudFront Invalidation to clear the cache for CloudFront when testing new configurations.
That’s it for today, great work. Now, if you try accessing the URL, you should see that your site is live. Also, let’s check if the HTTPS configuration is working and if HTTP redirects to HTTPS.
Conclusion
The goal of this tutorial was to guide us through the steps of deploying a Vue.js application to AWS for hosting and making the necessary changes to allow HTTPS and a custom domain name.
Thanks for reading!
If you enjoyed reading this post, follow on Twitter and Medium for more content. Please, If you have any feedback, suggestions, or something you’d like to see in a future post. Kindly leave them in the comments below, and I’ll do my best to get back to you.