npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

pulumi-aws-django

v1.28.0

Published

This is a library for deploying Django applications to AWS using ECS Fargate.

Readme

pulumi-aws-django

This is a library for deploying Django applications to AWS using ECS Fargate.

About

pulumi-aws-django aims to demonstrate best-practices for building web applications in AWS cloud. Executing the code in this project will build cloud resources such as networks, servers and databases that power a web application that can run securely on the public internet.

You don't need to use this library directly in your code. It is recommended that you use this repo as a guide. It includes common patterns that are used when working with Infrastructure as Code.

Companion application

This project has a companion repo that contains a Django (Python) web application backend and a Nuxt.js frontend site (server-rendered Vue.js written in TypeScript). This project can be found here:

https://github.com/briancaffey/django-step-by-step/

Related projects

This project is has been written with the two other main Infrastructure as Code tools: Terraform and CDK. You can find these repos here:

Getting started with examples

First install Pulumi:

brew install pulumi/tap/pulumi

Then authenticate with:

pulumi login

Prerequisites

Using this repo assumes that you have the following:

  • a domain name (e.g. example.com)
  • a Route 53 public hosted zone for a domain name
  • an Amazon Certificate Manager certificate that covers (*.example.com)
  • an AWS AIM role for deploying infrastructure via GitHub Actions (Terraform code in this repo for creating the least-privilege role coming soon!)

Usage

First you deploy the base stack, then you deploy the app stack.

The base stack deploys long-lived resources that shouldn't need to be updated frequently, these include:

  • VPC
  • ElastiCache
  • S3
  • Security Groups
  • Load balancer
  • RDS

The app stack deploys resources primarily for ECS services that run the application processes, these include:

  • ECS cluster for the environment
  • web-facing services (for running gunicorn and for running the frontend UI app)
  • celery worker for asynchronous task processing
  • celery beat for scheduled tasks
  • management_command for running migrations and other "pre-update" tasks (collectstatic, loading fixtures, etc.)
  • All backend environment variables are configured here (shared between all backend services)
  • Route 53 record for the environment (e.g. <env_name>.example.com)
  • IAM resources (this might be able to be moved to the base stack)

Local Examples

It is best to deploy cloud infrastructure with automated pipelines that execute Infrastructure as Code. For testing and development you can deploy locally.

First, export environment variables:

export DOMAIN_NAME=example.com
export CERTIFICATE_ARN=arn:aws:acm:us-east-1:111111111111:certificate/11111111-1111-1111-1111-111111111111
export AWS_REGION=us-east-1
export AWS_ACCESS_KEY_ID=abc
export AWS_SESSION_TOKEN=123
export COMPANY_NAME=abc
export AWS_ACCOUNT_ID=123456789

The Makefile documents the commands that can be used to set up infrastructure. Here are the commands that can be used to create and destroy the base layer of infrastructure.

build:
	yarn build

ecs-base-init:	build
	pulumi -C examples/ecs/base stack init dev

ecs-base-preview:	build
	pulumi -C examples/ecs/base --stack dev --non-interactive preview

ecs-base-up:	build
	pulumi -C examples/ecs/base --non-interactive up --yes

ecs-base-refresh:	build
	pulumi -C examples/ecs/base --non-interactive refresh --yes

ecs-base-destroy:	build
	pulumi -C examples/ecs/base --stack dev --non-interactive destroy --yes

ecs-base-rm:	build
	pulumi -C examples/ecs/base stack rm dev --yes

There are similar commands for building the app stack infrastructure.

GitHub Actions

TODO - add a section here about using this repo with GitHub Actions

Release Process

Releases are managed by release-please. The following secrets have been added to this GitHub repository:

  • NPM_TOKEN (npm API key)
  • GH_PAT (GitHub Personal Access Token with the ability to update workflows)

TODO

Add a stack that includes:

  • AIM role with permission to create base and app stacks (least-privilege)
  • ECR repositories with lifecycle rules
  • Hosted zone
  • ACM certificate