YouTube Path is a frontend-only web application that allows you to analyse your YouTube watch history. 😊
Try it out at my-youtube-path.com.
This is a Next.js project bootstrapped with create-next-app.
First, run the development server:
npm run dev
# or
yarn dev
# or
pnpm dev
# or
bun devOpen http://localhost:3000 with your browser to see the result.
You can start editing the page by modifying app/page.tsx. The page auto-updates as you edit the file.
This project uses next/font to automatically optimize and load Inter, a custom Google Font.
- AWS Account
- Hosted zone in Route53
- User with following policies attached
Create a user in the AWS account where the app should be deployed with the following policies. (Please adapt account ID, hosted zone ID, domain, domain certificate etc. in CloudFormation and policy templates accordingly.)
CloudFormation (needed for /infrastructure/frontend.yaml, /infrastructure/file-upload.yaml and /infrastructure/posthog-proxy.yaml):
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudformation:CreateStack",
"cloudformation:DescribeStackEvents",
"cloudformation:DescribeStacks",
"cloudformation:UpdateStack",
"cloudformation:DeleteStack",
"cloudformation:ListStackResources",
"cloudformation:CreateChangeSet",
"cloudformation:DescribeChangeSet",
"cloudformation:ExecuteChangeSet",
"cloudformation:GetTemplateSummary"
],
"Resource": [
"*"
]
}
]
}S3 (needed for /infrastructure/frontend.yaml):
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:ListBucket",
"s3:GetBucketLocation"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"s3:CreateBucket",
"s3:DeleteBucket",
"s3:PutBucketWebsite",
"s3:PutBucketPolicy",
"s3:PutBucketCors",
"s3:GetBucketWebsite",
"s3:PutBucketPublicAccessBlock",
"s3:GetBucketPolicy"
],
"Resource": "arn:aws:s3:::youtube-path-*"
},
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:DeleteObject"
],
"Resource": "arn:aws:s3:::youtube-path-*/*"
}
]
}CloudFront (needed for /infrastructure/frontend.yaml and /infrastructure/posthog-proxy.yaml):
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cloudfront:CreateDistribution",
"cloudfront:GetDistribution",
"cloudfront:UpdateDistribution",
"cloudfront:DeleteDistribution",
"cloudfront:ListDistributions",
"cloudfront:CreateInvalidation",
"cloudfront:TagResource",
"cloudfront:ListTagsForResource",
"cloudfront:CreateCachePolicy",
"cloudfront:GetCachePolicy",
"cloudfront:UpdateCachePolicy",
"cloudfront:DeleteCachePolicy",
"cloudfront:ListCachePolicies",
"cloudfront:CreateOriginRequestPolicy",
"cloudfront:GetOriginRequestPolicy",
"cloudfront:UpdateOriginRequestPolicy",
"cloudfront:DeleteOriginRequestPolicy",
"cloudfront:ListOriginRequestPolicies",
"cloudfront:CreateResponseHeadersPolicy",
"cloudfront:GetResponseHeadersPolicy",
"cloudfront:UpdateResponseHeadersPolicy",
"cloudfront:DeleteResponseHeadersPolicy",
"cloudfront:ListResponseHeadersPolicies"
],
"Resource": "*"
}
]
}Route53 (needed for /infrastructure/frontend.yaml):
Replace "Z06009411YUFOH75I3G4S" with the correct hosted zone ID.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Route53Permissions",
"Effect": "Allow",
"Action": [
"route53:GetHostedZone",
"route53:ChangeResourceRecordSets",
"route53:ListResourceRecordSets",
"route53:GetChange"
],
"Resource": [
"arn:aws:route53:::hostedzone/Z06009411YUFOH75I3G4S",
"arn:aws:route53:::change/*"
]
}
]
}IAM (needed for /infrastructure/file-upload.yaml):
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"iam:CreateRole",
"iam:DeleteRole",
"iam:AttachRolePolicy",
"iam:DetachRolePolicy",
"iam:DeleteRolePolicy",
"iam:GetRolePolicy",
"iam:PutRolePolicy",
"iam:GetRole",
"iam:PassRole"
],
"Resource": "arn:aws:iam::611312332993:role/YouTubePathFileUploadLambdaExecutionRole"
}
]
}Lambda (needed for /infrastructure/file-upload.yaml):
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"lambda:CreateFunction",
"lambda:GetFunction",
"lambda:DeleteFunction",
"lambda:InvokeFunction",
"lambda:AddPermission",
"lambda:RemovePermission",
"lambda:UpdateFunctionCode",
"lambda:UpdateFunctionConfiguration"
],
"Resource": "arn:aws:lambda:eu-central-1:611312332993:function:PreSignedUrlFunction"
}
]
}API Gateway (needed for /infrastructure/file-upload.yaml):
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"apigateway:POST",
"apigateway:GET",
"apigateway:PUT",
"apigateway:DELETE",
"apigateway:PATCH"
],
"Resource": "arn:aws:apigateway:eu-central-1::/*"
}
]
}After creating the user with the needed policies, define the necessary secrets in GitHub Actions (used in .github/workflows/deploy.yaml):
AWS_ACCESS_KEY_IDAWS_SECRET_ACCESS_KEYAWS_REGION
After doing that the Deployment pipeline should be ran automatically by GitHub Actions on every commit to the main branch.