Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/alessfg/nginx-api-gateway-demo
Demo showcasing how to set up and configure NGINX Plus as an API gateway
https://github.com/alessfg/nginx-api-gateway-demo
api api-gateway nginx nginx-api-gateway nginx-app-protect
Last synced: 25 days ago
JSON representation
Demo showcasing how to set up and configure NGINX Plus as an API gateway
- Host: GitHub
- URL: https://github.com/alessfg/nginx-api-gateway-demo
- Owner: alessfg
- License: mit
- Created: 2021-11-12T15:15:28.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-11-01T18:09:31.000Z (about 2 years ago)
- Last Synced: 2023-03-10T03:42:19.924Z (over 1 year ago)
- Topics: api, api-gateway, nginx, nginx-api-gateway, nginx-app-protect
- Language: HCL
- Homepage:
- Size: 84.2 MB
- Stars: 6
- Watchers: 2
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
README
# NGINX API Gateway Demo
## Overview
This demo uses Terraform to automate the setup of an NGINX Plus (and NGINX App Protect WAF) API gateway pseudo-production environment that includes a mock API backend database.
A PDF containing accompanying slides for this demo can also be found under the name of [`Deploy and Secure Your API Gateway with NGINX.pdf`](Deploy%20and%20Secure%20Your%20API%20Gateway%20with%20NGINX.pdf).
## Requirements
### Terraform
This demo has been developed and tested with Terraform `0.13` through `1.1.5`.
Instructions on how to install Terraform can be found in the [Terraform website](https://www.terraform.io/downloads.html).
### NGINX Plus & NGINX App Protect WAF
You will need to download the NGINX Plus (including NGINX App Protect WAF) license to a known location. You can specify the location of the license in the corresponding Terraform variables.
### AWS R53
You will need to create R53 hosted zone beforehand. Make sure you own the domain you are using through the R53 hosted zone or you risk running into DNS issues. You should specify the R53 hosted zone `id` as well as a FQDN for the NGINX Plus API gateway and backend API in the corresponding Terraform variables.
## Deployment
To use the provided Terraform scripts, you need to:
1. Export your AWS credentials as environment variables (or alternatively, tweak the AWS provider in [`terraform/provider.tf`](terraform/provider.tf)).
2. Set up default values for variables missing a value in [`terraform/variables.tf`](terraform/variables.tf) (you can find example values commented out in the file). Alternatively, you can input those variables at runtime (beware of dictionary values if you do the latter).Once you have configured your Terraform environment, you can either:
* Run [`./setup.sh`](setup.sh) to initialize the AWS Terraform provider and start a Terraform deployment on AWS.
* Run `terraform init` and `terraform apply`.And finally, once you are done playing with the demo, you can destroy the AWS infrastructure by either:
* Run [`./cleanup.sh`](cleanup.sh) to destroy your Terraform deployment.
* Run `terraform destroy`.## Demo Overview
You will find a series of NGINX configuration files in the [`nginx_api_gateway_config`](nginx_api_gateway_config/) folder. The folder is divided into individual steps, meant to be copied into their respective directory in order. By default, the folder is uploaded to your NGINX API gateway instance.
Do note that you will have to replace the `` placeholder value found in the API backends NGINX configuration file in Step 3 with the corresponding value you used when deploying the Terraform environment (see [`nginx_api_gateway_config/step_3/api_backends.conf`](nginx_api_gateway_config/step_3/api_backends.conf) for more details).
A deployment script to help you copy the configuration files, [`deploy.sh`](nginx_api_gateway_config/deploy.sh), is also provided. To run the script, use the step number as a parameter, e.g. `./deploy.sh 1` for step 1. You might need to make the deployment script executable by running `sudo chmod +x deploy.sh`.
### Step 1 -> Define the entry point of the NGINX API gateway
To deploy:
`./deploy.sh 1`
To test:
`curl -s http://localhost:8080`
Expected response:
```html
400 Bad Request
400 Bad Request
nginx/1.19.5```
### Step 2 -> Define default JSON error codes
To deploy:
`./deploy.sh 2`
To test:
`curl -s http://localhost:8080`
Expected response:
```json
{"status":400,"message":"Bad request"}
```To test (headers):
`curl -sI http://localhost:8080`
Expected response:
```text
HTTP/1.1 400 Bad Request
...
```### Step 3 -> Define the API endpoints and upstream/backend servers
To deploy:
`./deploy.sh 3`
To test:
`curl -s http://localhost:8080/api/f1/drivers/hamilton | jq`
Expected response:
```json
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
"limit": "30",
"offset": "0",
"total": "1",
"DriverTable": {
"driverId": "hamilton",
"Drivers": [{
"driverId": "hamilton",
"permanentNumber": "44",
"code": "HAM",
"url": "http://en.wikipedia.org/wiki/Lewis_Hamilton",
"givenName": "Lewis",
"familyName": "Hamilton",
"dateOfBirth": "1985-01-07",
"nationality": "British"
}]
}
}}
```### Step 4 -> Enable rate limiting
To deploy:
`./deploy.sh 4`
To test (run multiple times in quick succession):
`curl -s http://localhost:8080/api/f1/drivers/hamilton`
Expected response:
```json
{"status":429,"message":"API rate limit exceeded"}
```### Step 5 -> Set up API Key authentication
To deploy:
`./deploy.sh 5`
To test (unauthorized requests):
`curl -s http://localhost:8080/api/f1/drivers/hamilton`
Expected response (unauthorized requests):
```json
{"status":401,"message":"Unauthorized"}
```To test (authorized requests):
`curl -sH "apikey: 7B5zIqmRGXmrJTFmKa99vcit" http://localhost:8080/api/f1/drivers/hamilton | jq`
Expected response (authorized requests):
```json
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
...
}}
```### Step 6 -> Set up JWT authentication
To deploy:
`./deploy.sh 6`
To test (unauthorized requests):
`curl -s http://localhost:8080/api/f1/drivers/hamilton`
Expected response (unauthorized requests):
```json
{"status":401,"message":"Unauthorized"}
```To test (authorized request):
`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" http://localhost:8080/api/f1/drivers/hamilton | jq`
Expected response (authorized request):
```json
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
...
}}
```To test (missing JWT claims):
`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6ZmFsc2V9.i7o5c8MEGZWD223IWFIs-Qn6f8FBe_DjvZWn-xBzcvI" -X DELETE http://localhost:8080/api/f1/drivers/hamilton`
Expected response (missing JWT claims):
```json
{"status":405,"message":"Method not allowed"}
```### Step 7 -> Set up JSON body validation using NJS (optional, NGINX App Protect WAF -step 8- will validate JSON bodies)
To deploy:
`./deploy.sh 7`
To test (incorrect JSON):
`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d 'garbage123' http://localhost:8080/api/f1/seasons`
Expected response (incorrect JSON):
```text
HTTP/1.1 415 Unsupported Media Type
```To test (correct JSON):
`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d '{"season":"2020"}' http://localhost:8080/api/f1/seasons`
Expected response (correct JSON):
```text
HTTP/1.1 200 OK
```### Step 8 -> Set up NGINX App Protect WAF protection using an OpenAPI spec file
To deploy:
`./deploy.sh 8`
To test:
`curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d 'garbage123' http://localhost:8080/api/f1/seasons`
Expected response:
```json
HTTP/1.1 403 Forbidden
{"supportID": "4839869788531770938"}
```**Note:** SupportID is a unique identifier so your ID will be different
To check logs:
`sudo cat /var/log/app_protect/security.log`
Expected response:
```text
attack_type="HTTP Parser Attack”... support_id="4839869788531771448”...
```**Note:** Check that the supportID you received in the previous step is present in the security log
## Author Information
[Alessandro Fael Garcia](https://github.com/alessfg)