Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/alessfg/nginx-api-gateway-demo

Demo showcasing how to set up and configure NGINX Plus as an API gateway
https://github.com/alessfg/nginx-api-gateway-demo

api api-gateway nginx nginx-api-gateway nginx-app-protect

Last synced: 25 days ago
JSON representation

Demo showcasing how to set up and configure NGINX Plus as an API gateway

Awesome Lists containing this project

README

        

# NGINX API Gateway Demo

## Overview

This demo uses Terraform to automate the setup of an NGINX Plus (and NGINX App Protect WAF) API gateway pseudo-production environment that includes a mock API backend database.

A PDF containing accompanying slides for this demo can also be found under the name of [`Deploy and Secure Your API Gateway with NGINX.pdf`](Deploy%20and%20Secure%20Your%20API%20Gateway%20with%20NGINX.pdf).

## Requirements

### Terraform

This demo has been developed and tested with Terraform `0.13` through `1.1.5`.

Instructions on how to install Terraform can be found in the [Terraform website](https://www.terraform.io/downloads.html).

### NGINX Plus & NGINX App Protect WAF

You will need to download the NGINX Plus (including NGINX App Protect WAF) license to a known location. You can specify the location of the license in the corresponding Terraform variables.

### AWS R53

You will need to create R53 hosted zone beforehand. Make sure you own the domain you are using through the R53 hosted zone or you risk running into DNS issues. You should specify the R53 hosted zone `id` as well as a FQDN for the NGINX Plus API gateway and backend API in the corresponding Terraform variables.

## Deployment

To use the provided Terraform scripts, you need to:

1. Export your AWS credentials as environment variables (or alternatively, tweak the AWS provider in [`terraform/provider.tf`](terraform/provider.tf)).
2. Set up default values for variables missing a value in [`terraform/variables.tf`](terraform/variables.tf) (you can find example values commented out in the file). Alternatively, you can input those variables at runtime (beware of dictionary values if you do the latter).

Once you have configured your Terraform environment, you can either:

* Run [`./setup.sh`](setup.sh) to initialize the AWS Terraform provider and start a Terraform deployment on AWS.
* Run `terraform init` and `terraform apply`.

And finally, once you are done playing with the demo, you can destroy the AWS infrastructure by either:

* Run [`./cleanup.sh`](cleanup.sh) to destroy your Terraform deployment.
* Run `terraform destroy`.

## Demo Overview

You will find a series of NGINX configuration files in the [`nginx_api_gateway_config`](nginx_api_gateway_config/) folder. The folder is divided into individual steps, meant to be copied into their respective directory in order. By default, the folder is uploaded to your NGINX API gateway instance.

Do note that you will have to replace the `` placeholder value found in the API backends NGINX configuration file in Step 3 with the corresponding value you used when deploying the Terraform environment (see [`nginx_api_gateway_config/step_3/api_backends.conf`](nginx_api_gateway_config/step_3/api_backends.conf) for more details).

A deployment script to help you copy the configuration files, [`deploy.sh`](nginx_api_gateway_config/deploy.sh), is also provided. To run the script, use the step number as a parameter, e.g. `./deploy.sh 1` for step 1. You might need to make the deployment script executable by running `sudo chmod +x deploy.sh`.

### Step 1 -> Define the entry point of the NGINX API gateway

To deploy:

`./deploy.sh 1`

To test:

`curl -s http://localhost:8080`

Expected response:

```html

400 Bad Request

400 Bad Request



nginx/1.19.5

```

### Step 2 -> Define default JSON error codes

To deploy:

`./deploy.sh 2`

To test:

`curl -s http://localhost:8080`

Expected response:

```json
{"status":400,"message":"Bad request"}
```

To test (headers):

`curl -sI http://localhost:8080`

Expected response:

```text
HTTP/1.1 400 Bad Request
...
```

### Step 3 -> Define the API endpoints and upstream/backend servers

To deploy:

`./deploy.sh 3`

To test:

`curl -s http://localhost:8080/api/f1/drivers/hamilton | jq`

Expected response:

```json
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
"limit": "30",
"offset": "0",
"total": "1",
"DriverTable": {
"driverId": "hamilton",
"Drivers": [{
"driverId": "hamilton",
"permanentNumber": "44",
"code": "HAM",
"url": "http://en.wikipedia.org/wiki/Lewis_Hamilton",
"givenName": "Lewis",
"familyName": "Hamilton",
"dateOfBirth": "1985-01-07",
"nationality": "British"
}]
}
}}
```

### Step 4 -> Enable rate limiting

To deploy:

`./deploy.sh 4`

To test (run multiple times in quick succession):

`curl -s http://localhost:8080/api/f1/drivers/hamilton`

Expected response:

```json
{"status":429,"message":"API rate limit exceeded"}
```

### Step 5 -> Set up API Key authentication

To deploy:

`./deploy.sh 5`

To test (unauthorized requests):

`curl -s http://localhost:8080/api/f1/drivers/hamilton`

Expected response (unauthorized requests):

```json
{"status":401,"message":"Unauthorized"}
```

To test (authorized requests):

`curl -sH "apikey: 7B5zIqmRGXmrJTFmKa99vcit" http://localhost:8080/api/f1/drivers/hamilton | jq`

Expected response (authorized requests):

```json
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
...
}}
```

### Step 6 -> Set up JWT authentication

To deploy:

`./deploy.sh 6`

To test (unauthorized requests):

`curl -s http://localhost:8080/api/f1/drivers/hamilton`

Expected response (unauthorized requests):

```json
{"status":401,"message":"Unauthorized"}
```

To test (authorized request):

`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" http://localhost:8080/api/f1/drivers/hamilton | jq`

Expected response (authorized request):

```json
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
...
}}
```

To test (missing JWT claims):

`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6ZmFsc2V9.i7o5c8MEGZWD223IWFIs-Qn6f8FBe_DjvZWn-xBzcvI" -X DELETE http://localhost:8080/api/f1/drivers/hamilton`

Expected response (missing JWT claims):

```json
{"status":405,"message":"Method not allowed"}
```

### Step 7 -> Set up JSON body validation using NJS (optional, NGINX App Protect WAF -step 8- will validate JSON bodies)

To deploy:

`./deploy.sh 7`

To test (incorrect JSON):

`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d 'garbage123' http://localhost:8080/api/f1/seasons`

Expected response (incorrect JSON):

```text
HTTP/1.1 415 Unsupported Media Type
```

To test (correct JSON):

`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d '{"season":"2020"}' http://localhost:8080/api/f1/seasons`

Expected response (correct JSON):

```text
HTTP/1.1 200 OK
```

### Step 8 -> Set up NGINX App Protect WAF protection using an OpenAPI spec file

To deploy:

`./deploy.sh 8`

To test:

`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d 'garbage123' http://localhost:8080/api/f1/seasons`

Expected response:

```json
HTTP/1.1 403 Forbidden
{"supportID": "4839869788531770938"}
```

**Note:** SupportID is a unique identifier so your ID will be different

To check logs:

`sudo cat /var/log/app_protect/security.log`

Expected response:

```text
attack_type="HTTP Parser Attack”... support_id="4839869788531771448”...
```

**Note:** Check that the supportID you received in the previous step is present in the security log

## Author Information

[Alessandro Fael Garcia](https://github.com/alessfg)