By using distroless, you ensure a low weight for your container. This full example will get you everything you need to run an API in a container that you can then use to deploy to a cloud provider like Azure.
This repository gives you a good starting point with a Dockerfile, GitHub Actions workflow, and Rust code.
The access token will need to be added as an Action secret. Create one with enough permissions to write to packages.
Copy the generated token and add it as a Github repository secret with the name PAT
. (If that link doesn't work, make sure you're reading this on your own copy of the repo, not the original template.)
You'll need the following:
- An Azure subscription ID find it here or follow this guide
- A Service Principal with the following details the AppID, password, and tenant information. Create one with:
az ad sp create-for-rbac -n "REST API Service Principal"
and assign the IAM role for the subscription. Alternatively set the proper role access using the following command (use a real subscription id and replace it):
az ad sp create-for-rbac --name "CICD" --role contributor --scopes /subscriptions/$AZURE_SUBSCRIPTION_ID --sdk-auth
Capture the output and add it as a Github repository secret with the name AZURE_CREDENTIALS
. (If that link doesn't work, make sure you're reading this on your own copy of the repo, not the original template.)
Make sure you have one instance already created, and then capture the name and resource group. These will be used in the workflow file.
Unlike other language runtimes like Python, you don't need to change the default container service. Rust will be more than happy to use a single CPU!
There are a few things that might get you into a failed state when deploying:
- Not using authentication for accessing the remote registry (ghcr.io in this case). Authentication is always required
- Not using a PAT (Personal Access Token) or using a PAT that doesn't have write permissions for "packages".
- Different port than 80 in the container. By default Azure Container Apps use 80. Update to match the container.
If running into trouble, check logs in the portal or use the following with the Azure CLI:
az containerapp logs show --name $CONTAINER_APP_NAME --resource-group $RESOURCE_GROUP_NAME --follow
Update both variables to match your environment
NOTE Settings for Packages in your repo may need updating. Go to Action Settings and scroll down to "Workflow Permissions" and make sure it shows "Read and write permissions" as selected, otherwise you'll see a 403 Forbidden
Although there are a few best practices for using the FastAPI framework, there are many different other suggestions to build solid HTTP APIs that can be applicable anywhere.
The HTTP specification has several error codes available. Make use of the appropriate error code to match the condition that caused it. For example the 401
HTTP code can be used when access is unauthorized. You shouldn't use a single error code as a catch-all error.
Here are some common scenarios associated with HTTP error codes:
400 Bad request
: Use this to indicate a schema problem. For example if the server expected a string but got an integer401 Unauthorized
: When authentication is required and it wasn't present or satisfied404 Not found
: When the resource doesn't exist
Note that it is a good practice to use 404 Not Found
to protect from requests that try to find if a resource exists without being authenticated. A good example of this is a service that doesn't want to expose usernames unless you are authenticated.
GET | POST | PUT | HEAD |
---|---|---|---|
Read Only | Write Only | Update existing | Does it exist? |