<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Amine Traibi</title>
    <description>The latest articles on DEV Community by Amine Traibi (@amine_traibi_ae1205ea170a).</description>
    <link>https://dev.to/amine_traibi_ae1205ea170a</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3823105%2F367c1506-b137-44d2-b7a2-fcc2cf9a6e37.png</url>
      <title>DEV Community: Amine Traibi</title>
      <link>https://dev.to/amine_traibi_ae1205ea170a</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/amine_traibi_ae1205ea170a"/>
    <language>en</language>
    <item>
      <title>The Cloud Resume Challenge: CI/CD, Python, and Surviving a Security Scare</title>
      <dc:creator>Amine Traibi</dc:creator>
      <pubDate>Fri, 13 Mar 2026 23:11:43 +0000</pubDate>
      <link>https://dev.to/amine_traibi_ae1205ea170a/the-cloud-resume-challenge-cicd-python-and-surviving-a-security-scare-4af7</link>
      <guid>https://dev.to/amine_traibi_ae1205ea170a/the-cloud-resume-challenge-cicd-python-and-surviving-a-security-scare-4af7</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Theoretical knowledge is foundational, but engineering competency is built through implementation.&lt;/p&gt;

&lt;p&gt;I realized that understanding the theory of services like S3, Lambda, and DynamoDB wasn't enough. I wanted to demonstrate that I could orchestrate them into a secure, automated, production-grade application.&lt;/p&gt;

&lt;p&gt;The Cloud Resume Challenge—created by Forrest Brazeal—was the perfect framework to bridge the gap between architectural concepts and real-world DevOps implementation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2ypr1gx388bo3obes22r.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2ypr1gx388bo3obes22r.gif" alt="Challenge Accepted" width="480" height="270"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here is how I built a serverless resume website, automated the deployment with GitHub Actions, and solved the engineering hurdles along the way&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Architecture&lt;/strong&gt;&lt;br&gt;
The project requirement is simple: "Host a resume online." But the architecture I implemented is pure Cloud Engineering:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Frontend&lt;/strong&gt;: HTML/CSS hosted on S3, accelerated by CloudFront (HTTPS) for global caching.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Backend&lt;/strong&gt;: An AWS Lambda function (Python) handling API requests.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Database&lt;/strong&gt;: DynamoDB (NoSQL) for storing the visitor count.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Infrastructure&lt;/strong&gt;: Fully automated CI/CD pipelines using &lt;strong&gt;GitHub&lt;/strong&gt; Actions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Level 1: The Frontend Glue (JavaScript)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The website itself is static HTML/CSS, but making it dynamic required JavaScript. I wrote a script to fetch the visitor count from my API Gateway trigger.&lt;/p&gt;

&lt;p&gt;The biggest hurdle here was CORS (Cross-Origin Resource Sharing). My JavaScript running on aminetraibi.com was trying to talk to an AWS Lambda URL, and the browser blocked it for security reasons.&lt;/p&gt;

&lt;p&gt;The Fix: I had to configure my Python Lambda function to return specific headers (Access-Control-Allow-Origin: *) so the browser would accept the response.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="c1"&gt;// Fetching the view count&lt;/span&gt;
&lt;span class="nf"&gt;fetch&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;apiUrl&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;then&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;response&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="nx"&gt;response&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;json&lt;/span&gt;&lt;span class="p"&gt;())&lt;/span&gt;
    &lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;then&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;data&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="nb"&gt;document&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;getElementById&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="s1"&gt;counter&lt;/span&gt;&lt;span class="dl"&gt;'&lt;/span&gt;&lt;span class="p"&gt;).&lt;/span&gt;&lt;span class="nx"&gt;innerText&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nx"&gt;data&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;views&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
    &lt;span class="p"&gt;});&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Level 2: The Backend Logic (Python &amp;amp; DynamoDB)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I needed an atomic counter that increments every time the page loads. I wrote a Python script using boto3 to talk to DynamoDB.&lt;/p&gt;

&lt;p&gt;One specific challenge was handling DynamoDB reserved words. Since "views" is a reserved keyword in DynamoDB, I had to use ExpressionAttributeNames to map it correctly.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Atomic update using UpdateExpression
&lt;/span&gt;&lt;span class="n"&gt;response&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;table&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;update_item&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;
    &lt;span class="n"&gt;Key&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;id&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;page_view&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;
    &lt;span class="n"&gt;UpdateExpression&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;SET #v = #v + :val&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt;
    &lt;span class="n"&gt;ExpressionAttributeNames&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;#v&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;views&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;
    &lt;span class="n"&gt;ExpressionAttributeValues&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;:val&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;},&lt;/span&gt;
    &lt;span class="n"&gt;ReturnValues&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;UPDATED_NEW&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;
&lt;span class="p"&gt;)&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Level 3: The Security Lesson 🚨&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This was the most critical part of my learning journey.&lt;/p&gt;

&lt;p&gt;I learned a hard lesson about Secrets Management. Early in the build, I accidentally committed credentials to the repository.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm4wsqt8fmtyhjxgmcj70.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm4wsqt8fmtyhjxgmcj70.gif" alt="Sweating" width="640" height="360"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I immediately identified the risk, revoked the keys in IAM, and migrated to GitHub Secrets.&lt;/p&gt;

&lt;p&gt;It was a practical lesson in why security must be automated, not manual. I now use a dedicated IAM user with "Least Privilege" permissions, and my keys are injected only at runtime via the CI/CD pipeline.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 4: Automated Testing &amp;amp; Mocking&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The challenge requires Python unit tests. This was one of the hardest parts of the build.&lt;/p&gt;

&lt;p&gt;When I ran tests locally, boto3 tried to connect to the real AWS DynamoDB. However, in the CI/CD environment, I didn't want my tests to rely on an internet connection or require live database permissions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Solution: Mocking&lt;/strong&gt; &lt;br&gt;
I used the unittest.mock library to simulate the AWS services. By mocking the DynamoDB table resource, I could test the logic of my function without making any actual API calls.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmtcgs92ejdsc13wcooye.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmtcgs92ejdsc13wcooye.gif" alt="Hackerman" width="700" height="394"&gt;&lt;/a&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Using MagicMock to fake the database response
&lt;/span&gt;&lt;span class="n"&gt;mock_table&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;MagicMock&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt;
&lt;span class="n"&gt;mock_table&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;update_item&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;return_value&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;Attributes&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;views&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt; &lt;span class="mi"&gt;123&lt;/span&gt;&lt;span class="p"&gt;}}&lt;/span&gt;
&lt;span class="n"&gt;lambda_function&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;table&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;mock_table&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This ensures my pipeline is fast, robust, and doesn't incur AWS costs during testing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 5: CI/CD (The "Green Checkmark")&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The ultimate goal was to move away from the AWS Console ("ClickOps") and use proper DevOps practices.&lt;/p&gt;

&lt;p&gt;I built two separate GitHub Actions workflows:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Frontend Pipeline:&lt;/strong&gt; Detects changes in HTML/CSS, syncs them to S3, and invalidates the CloudFront cache.&lt;br&gt;
&lt;strong&gt;Backend Pipeline:&lt;/strong&gt; Detects changes in Python code, runs the unit tests, zips the code, and updates the Lambda function.&lt;br&gt;
Now, I simply push to main, and the entire application updates itself.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion &amp;amp; Next Steps&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This project forced me to touch every part of the stack: Networking (DNS/Route53), Security (IAM), Compute (Lambda), Database (DynamoDB), and Frontend logic (JavaScript).&lt;/p&gt;

&lt;p&gt;My next milestone is to continue building on this foundation—specifically diving deeper into Infrastructure as Code with Terraform and exploring containerization with Docker/ECS.&lt;/p&gt;

&lt;p&gt;If you are looking for a Cloud Engineer who learns by doing, breaks things, and fixes them—let's connect!&lt;/p&gt;

&lt;p&gt;Check out the live project here:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Live Site:&lt;/strong&gt; &lt;a href="https://aminetraibi.com" rel="noopener noreferrer"&gt;https://aminetraibi.com&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;GitHub Repository:&lt;/strong&gt; &lt;a href="https://github.com/AmineTra/cloud-resume-challenge" rel="noopener noreferrer"&gt;https://github.com/AmineTra/cloud-resume-challenge&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsxrnlmvmex6amnevb33v.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsxrnlmvmex6amnevb33v.gif" alt="Success" width="200" height="270"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>cloudresumechallenge</category>
      <category>devops</category>
      <category>python</category>
    </item>
  </channel>
</rss>
