Skip to content

Latest commit

 

History

History
executable file
·
169 lines (140 loc) · 6.4 KB

File metadata and controls

executable file
·
169 lines (140 loc) · 6.4 KB

API Service

Description

The API Service component’s purpose is to process all API requests and act as a hub for sending requests and data to the correct component or connector. The API Service is a terraform deployable component of the FMA service and is made up of custom handlers. These handlers are responsible for ensuring the correct response and processing of all API calls sent to the FMA Service.

This repository utilizes the serverless-function/scheduled-event managed pipeline and was initially created by the Application Scaffolding Pipeline.

Setup

Installation

This project is managed with Pipenv.

  1. Prior to install first compile the django connector package:
make fma-django-compile
  1. Install your pipenv dependencies and pre-commit More info:
make install

Settings Remote File

There is a file that controls the initial setup of the environment where the api_service will run. (api_service/federated_learning_project/settings_remote.py). The following things will have to be set the developer:

  • Environment Variables to be set

    • FMA_DATABASE_NAME - The name of the metadata database that is desired
    • FMA_DATABASE_HOST - The address that your database will be hosted
    • FMA_DATABASE_PORT- The port the database will use for communication
    • FMA_DB_SECRET_PATH - The path used to store secrets permissions definitions
  • Values to set be within the settings_remote.py file

    • TRUSTED_ORIGIN - The base address where your api service will be hosted
    • AGGREGATOR_LAMBDA_ARN - The arn associated with the aggregator component you wish to spin up

Note: These values must match with the values set to the corresponding terraform deployment resources if terraform is the form of deployment chosen

FMA Settings Description

API Service Settings

The base handler function (handler) within the api_service/service_initialization.py uses the api_service/federated_learning_project/fma_settings.py file to process requests based on what custom handler is set within that file. This handler is customizable for any type of deployment the user wishes to use.

API_SERVICE_SETTINGS = {
    "handler": "django_lambda_handler",
    "secrets_manager": "<name of secrets manager>",
    "secrets_name": ["<name of secrets to pull>"]
}

As shown above, the API_SERVICE_SETTINGS is customized by setting the handler.

The last part of the API_SERVICE_SETTINGS is the secrets_manager and secrets_name. These components are used to tell the handler what type of secrets manager the user is requesting to use and the name of the secrets the user wishes to grab using the specified manager.

Aggregator Settings

The aggregator connector is customizable for many types of deployments. The aggregator’s connector type is decided by the settings file (aggregator/federated_learning_project/fma_settings.py)

INSTALLED_PACKAGES = ["fma_django_connectors"]

AGGREGATOR_SETTINGS = {
    "aggregator_connector_type": "DjangoAggConnector",
    "metadata_connector": {
        "type": "DjangoMetadataConnector",
    },
    "model_data_connector": {
        "type": None
    }
    "secrets_manager": "<name of secrets manager>",
    "secrets_name": ["<name of secrets to pull>"],
}

As seen above, INSTALLED_PACKAGES references the package(s) which contain the connectors being used in the below settings. AGGREGATOR_SETTINGS is customized by setting the aggregator_connector_type. There are also the settings of the underlying connectors that the aggregator connector uses.

  • The model_data_connector is used to push and pull data to and from the resource that stores model data for your federated experiments

  • The metadata_connector is used to push and pull data to and from the resource that stores metadata for your federated experiments

Note: We talk about the model and metadata connectors in greater detail in the “Connectors” component section

The last part of the AGGREGATOR_SETTINGS is the secrets_manager and secrets_name.
These settings are used to tell the aggregator what type of secrets manager the user is requesting to use and the name of the secrets the user wishes to grab using the specified manager.

Local Testing and Development

To run pre-commit hooks. If you want to run the pre-commit fresh over all the files, use the --all-files flag

pipenv run pre-commit run

Use the following command to run the tests:

make test

For testing and coverage reports:

make test-and-coverage

Setting up and running AWS SAM

The template.yaml included in this repo is configured to proved support for sam local invoke info here.

Download and tag the appropriate emulation images:

docker pull <TMP_PATH_TO_IMAGE>
docker tag <TMP_PATH_TO_IMAGE>

Install the AWS SAM CLI (May need to enable proxy):

brew tap aws/tap
brew install aws-sam-cli

To use SAM (specifically sam local start-api), run the following Makefile commands (Requires pipenv steps):

make sam-build-remote
make sam-build-local

Deploying with Terraform

Layout of deployment files

Terraform deployment files for this component can be found in the ./terraform_deploy directory. Deployment information is split between 3 files:

  • iam-lambda.tf
    • Defines all the IAM roles/policies to be created by terraform for your lambda function
  • lambda.tf
    • Defines the actual lambda function to be created as well as the process of zipping your aggregator application code
  • provider.tf
    • Defines process of obtaining necessary credentials that are needed to create your roles, policies, and lambda function

Usage

To deploy with lambda move to the lambda_deploy dir

cd lambda_deploy

Then fill out the 3 files above as instructed. Once that is done run the following commands:

terraform init
terraform plan #optional
terraform apply -auto-approve

If you want to only apply certain parts of the terraform build (e.g. you do not need to create IAM roles) use the following command instead of the above apply command:

terraform apply -target=<1st component to target> -target=<2nd component to target>

Finally, if you wish to see the list of resources that can be specified to target, use this command:

terraform state list