Coder Social home page Coder Social logo

ivangfr / springboot-kong-plugins Goto Github PK

View Code? Open in Web Editor NEW
14.0 2.0 15.0 1.74 MB

The goal of this project is to create a simple Spring Boot REST API and securing it with Kong using the LDAP Authentication and Basic Authentication plugins. Besides, we will explore more plugins that Kong offers like: Rate Limiting and Prometheus plugins.

Shell 76.48% Java 23.52%
spring-boot kong openldap java docker ldap phpldapadmin postgresql kong-plugin web

springboot-kong-plugins's Introduction

springboot-kong-plugins

The goal of this project is to create a simple Spring Boot REST API and securing it with Kong using the LDAP Authentication and Basic Authentication plugins. Besides, we will explore more plugins that Kong offers like: Rate Limiting and Prometheus plugins.

Proof-of-Concepts & Articles

On ivangfr.github.io, I have compiled my Proof-of-Concepts (PoCs) and articles. You can easily search for the technology you are interested in by using the filter. Who knows, perhaps I have already implemented a PoC or written an article about what you are looking for.

Additional Readings

Project Diagram

project-diagram

Application

  • simple-service

    Spring Boot Java Web application that exposes two endpoints:

    • /api/public: that can be access by anyone, it is not secured;
    • /api/private: that must be accessed only by authenticated users.

Prerequisites

Run application during development using Maven

  • Open a terminal and navigate to springboot-kong-plugins root folder

  • Run the command below to start

    ./mvnw clean spring-boot:run --projects simple-service
    
  • Open another terminal and call application endpoints

    curl -i localhost:8080/api/public
    curl -i localhost:8080/api/private
    curl -i localhost:8080/actuator/beans
    curl -i localhost:8080/actuator/health
    
  • To stop, go to the terminal where the application is running and press Ctrl+C

Build application Docker Image

  • In a terminal, make sure you are in springboot-kong-plugins root folder

  • Build Docker Image

    • JVM
      ./docker-build.sh
      
    • Native
      ./docker-build.sh native
      

Test application Docker Image

  • In a terminal, run the following command

    docker run --rm -p 8080:8080 --name simple-service ivanfranchin/simple-service:1.0.0
    
  • Open another terminal and call application endpoints

    curl -i localhost:8080/api/public
    curl -i localhost:8080/api/private
    curl -i localhost:8080/actuator/beans
    curl -i localhost:8080/actuator/health
    
  • To stop, go to the terminal where the application is running and press Ctrl+C

Initialize Environment

  • In a terminal, make use you are in springboot-kong-plugins root folder

  • Run the following script

    ./init-environment.sh
    

    Note: simple-service application is running as a Docker container. The container does not expose any port to HOST machine. So, it cannot be accessed directly, forcing the caller to use Kong as gateway server in order to access it.

Import OpenLDAP Users

The LDIF file that we will use, ldap/ldap-mycompany-com.ldif, has already a pre-defined structure for mycompany.com. Basically, it has 2 groups (developers and admin) and 4 users (Bill Gates, Steve Jobs, Mark Cuban and Ivan Franchin). Besides, it's defined that Bill Gates, Steve Jobs and Mark Cuban belong to developers group and Ivan Franchin belongs to admin group.

Bill Gates > username: bgates, password: 123
Steve Jobs > username: sjobs, password: 123
Mark Cuban > username: mcuban, password: 123
Ivan Franchin > username: ifranchin, password: 123

There are two ways to import those users: by running a script or using phpldapadmin

Import users running a script

  • In another terminal, make use you are in springboot-kong-plugins root folder

  • Run the following script

    ./import-openldap-users.sh
    
  • Check users imported using ldapsearch

    ldapsearch -x -D "cn=admin,dc=mycompany,dc=com" \
      -w admin -H ldap://localhost:389 \
      -b "ou=users,dc=mycompany,dc=com" \
      -s sub "(uid=*)"
    

Import users using phpldapadmin

  • Access https://localhost:6443

  • Login with the credentials

    Login DN: cn=admin,dc=mycompany,dc=com
    Password: admin
    
  • Import the file ldap/ldap-mycompany-com.ldif

  • You should see something like

    openldap

Kong

In a terminal, follow the steps below to configure Kong

Check Status

  • Before starting, check if Kong admin API is accessible

    curl -I http://localhost:8001
    

    It should return

    HTTP/1.1 200 OK
    

Add Service

  1. The following call will add the simple-service service

    curl -i -X POST http://localhost:8001/services/ \
      -d "name=simple-service" \
      -d "protocol=http" \
      -d "host=simple-service" \
      -d "port=8080"
    
  2. [Optional] To list all services run

    curl -i http://localhost:8001/services
    

Add routes

  1. One default route for the service, no specific path included

    curl -i -X POST http://localhost:8001/services/simple-service/routes/ \
      -d "name=simple-service-default" \
      -d "protocols[]=http" \
      -d "hosts[]=simple-service"
    
  2. Another route specifically for /api/private endpoint (it will be secured and only accessible by LDAP users)

    curl -i -X POST http://localhost:8001/services/simple-service/routes/ \
      -d "name=simple-service-api-private" \
      -d "protocols[]=http" \
      -d "hosts[]=simple-service" \
      -d "paths[]=/api/private" \
      -d "strip_path=false"
    
  3. Finally, one route for /actuator/beans endpoint (it will be secured and only accessible by pre-defined users)

    curl -i -X POST http://localhost:8001/services/simple-service/routes/ \
      -d "name=simple-service-actuator-beans" \
      -d "protocols[]=http" \
      -d "hosts[]=simple-service" \
      -d "paths[]=/actuator/beans" \
      -d "strip_path=false"
    
  4. [Optional] To list all simple-service routes run

    curl -i http://localhost:8001/services/simple-service/routes
    

Call endpoints

  1. Call /api/public endpoint

    curl -i http://localhost:8000/api/public -H 'Host: simple-service'
    

    It should return

    HTTP/1.1 200
    It is public.
    
  2. Call /api/private endpoint

    curl -i http://localhost:8000/api/private -H 'Host: simple-service'
    

    It should return

    HTTP/1.1 200
    null, it is private.
    

    Note: This endpoint is not secured by the application, that is why the response is returned. The idea is to use Kong to secure it. It will be done on the next steps.

  3. Call /actuator/beans endpoint

    curl -i http://localhost:8000/actuator/beans -H 'Host: simple-service'
    

    It should return

    HTTP/1.1 200
    {"contexts":{"simple-service":{"beans":...
    

    Note: As happened previously with /api/private, /actuator/beans endpoint is not secured by the application. We will use Kong to secure it on the next steps.

Plugins

In this project, we are going to add these plugins: LDAP Authentication, Basic Authentication, Rate Limiting and Prometheus. Please refer to https://konghq.com/plugins for more.

Add LDAP Authentication plugin

The LDAP Authentication plugin will be used to secure the /api/private endpoint.

  1. Add plugin to route simple-service-api-private

    curl -i -X POST http://localhost:8001/routes/simple-service-api-private/plugins \
      -d "name=ldap-auth" \
      -d "config.hide_credentials=true" \
      -d "config.ldap_host=openldap" \
      -d "config.ldap_port=389" \
      -d "config.start_tls=false" \
      -d "config.base_dn=ou=users,dc=mycompany,dc=com" \
      -d "config.verify_ldap_host=false" \
      -d "config.attribute=cn" \
      -d "config.cache_ttl=60" \
      -d "config.header_type=ldap"
    
  2. Try to call /api/private endpoint without credentials

    curl -i http://localhost:8000/api/private -H 'Host: simple-service'
    

    It should return

    HTTP/1.1 401 Unauthorized
    {"message":"Unauthorized"}
    
  3. Call /api/private endpoint using Bill Gates base64 encode credentials

    curl -i http://localhost:8000/api/private \
      -H "Authorization:ldap $(echo -n 'Bill Gates':123 | base64)" \
      -H 'Host: simple-service'
    

    It should return

    HTTP/1.1 200
    Bill Gates, it is private.
    

Add Basic Authentication plugin

The Basic Authentication plugin will be used to secure the /actuator/beans endpoint

  1. Add plugin to route simple-service-actuator-beans

    curl -i -X POST http://localhost:8001/routes/simple-service-actuator-beans/plugins \
      -d "name=basic-auth" \
      -d "config.hide_credentials=true"
    
  2. Try to call /actuator/beans endpoint without credentials.

    curl -i http://localhost:8000/actuator/beans -H 'Host: simple-service'
    

    It should return

    HTTP/1.1 401 Unauthorized
    {"message":"Unauthorized"}
    
  3. Create a consumer

    curl -i -X POST http://localhost:8001/consumers -d "username=ivanfranchin"
    
  4. Create a credential for consumer

    curl -i -X POST http://localhost:8001/consumers/ivanfranchin/basic-auth \
      -d "username=ivan.franchin" \
      -d "password=123"
    
  5. Call /api/private endpoint using ivan.franchin credential

    curl -i -u ivan.franchin:123 http://localhost:8000/actuator/beans -H 'Host: simple-service'
    

    It should return

    HTTP/1.1 200
    {"contentDescriptor":{"providerVersion":...
    
  6. Let's create another consumer just for testing purpose

    curl -i -X POST http://localhost:8001/consumers -d "username=administrator"
    
    curl -i -X POST http://localhost:8001/consumers/administrator/basic-auth \
      -d "username=administrator" \
      -d "password=123"
    

Add Rate Limiting plugin

We are going to add the following rate limitings:

  • /api/public and /actuator/health: one request per second
  • /api/private: 5 requests a minute
  • /actuator/beans: 2 requests a minute or 100 requests an hour
  1. Add plugin to route simple-service-default

    curl -i -X POST http://localhost:8001/routes/simple-service-default/plugins \
      -d "name=rate-limiting" \
      -d "config.second=1"
    
  2. Add plugin to route simple-service-api-private

    curl -i -X POST http://localhost:8001/routes/simple-service-api-private/plugins \
      -d "name=rate-limiting" \
      -d "config.minute=5"
    
  3. Add plugin to route simple-service-actuator-beans

    curl -i -X POST http://localhost:8001/routes/simple-service-actuator-beans/plugins \
      -d "name=rate-limiting" \
      -d "config.minute=2" \
      -d "config.hour=100"
    
  4. Make some calls to these endpoints

    • Test /api/public

      curl -i http://localhost:8000/api/public -H 'Host: simple-service'
      curl -i http://localhost:8000/actuator/health -H 'Host: simple-service'
      
    • Test /actuator/beans

      curl -i -u ivan.franchin:123 http://localhost:8000/actuator/beans -H 'Host: simple-service'
      curl -i -u administrator:123 http://localhost:8000/actuator/beans -H 'Host: simple-service'
      
    • Test /api/private

      curl -i http://localhost:8000/api/private \
        -H "Authorization:ldap $(echo -n 'Bill Gates':123 | base64)" \
        -H 'Host: simple-service'
      
      curl -i http://localhost:8000/api/private \
        -H "Authorization:ldap $(echo -n 'Mark Cuban':123 | base64)" \
        -H 'Host: simple-service'
      
  5. After exceeding some calls in a minute, you should see

    HTTP/1.1 429 Too Many Requests
    {"message":"API rate limit exceeded"}
    

Add Prometheus plugin

  1. Add plugin to simple-service

    curl -i -X POST http://localhost:8001/services/simple-service/plugins -d "name=prometheus"
    
  2. Make some requests to simple-service endpoints

  3. You can see some metrics

    curl -i http://localhost:8001/metrics
    

Shutdown

In a terminal and, inside springboot-kong-plugins root folder, run the following script

./shutdown-environment.sh

Cleanup

To remove the Docker image created by this project, go to a terminal and, inside springboot-kong-plugins root folder, run the script below

./remove-docker-images.sh

Issues

When upgrading postgres to a version above 13.x (using current kong version), there is an error while running kong-database migration

Running kong-database migration
-------------------------------
Error: module 'openssl.rand' not found:No LuaRocks module found for openssl.rand
	no field package.preload['openssl.rand']
	no file './openssl/rand.lua'
	no file './openssl/rand/init.lua'
	no file './openssl/rand.lua'
	no file './openssl/rand/init.lua'
	no file '/usr/local/openresty/site/lualib/openssl/rand.ljbc'
	no file '/usr/local/openresty/site/lualib/openssl/rand/init.ljbc'
	no file '/usr/local/openresty/lualib/openssl/rand.ljbc'
	no file '/usr/local/openresty/lualib/openssl/rand/init.ljbc'
	no file '/usr/local/openresty/site/lualib/openssl/rand.lua'
	no file '/usr/local/openresty/site/lualib/openssl/rand/init.lua'
	no file '/usr/local/openresty/lualib/openssl/rand.lua'
	no file '/usr/local/openresty/lualib/openssl/rand/init.lua'
	no file './openssl/rand.lua'
	no file '/usr/local/openresty/luajit/share/luajit-2.1.0-beta3/openssl/rand.lua'
	no file '/usr/local/share/lua/5.1/openssl/rand.lua'
	no file '/usr/local/share/lua/5.1/openssl/rand/init.lua'
	no file '/usr/local/openresty/luajit/share/lua/5.1/openssl/rand.lua'
	no file '/usr/local/openresty/luajit/share/lua/5.1/openssl/rand/init.lua'
	no file '/home/kong/.luarocks/share/lua/5.1/openssl/rand.lua'
	no file '/home/kong/.luarocks/share/lua/5.1/openssl/rand/init.lua'
	no file '/usr/local/openresty/site/lualib/openssl/rand.so'
	no file '/usr/local/openresty/lualib/openssl/rand.so'
	no file './openssl/rand.so'
	no file '/usr/local/lib/lua/5.1/openssl/rand.so'
	no file '/usr/local/openresty/luajit/lib/lua/5.1/openssl/rand.so'
	no file '/usr/local/lib/lua/5.1/loadall.so'
	no file '/home/kong/.luarocks/lib/lua/5.1/openssl/rand.so'
	no file '/usr/local/openresty/site/lualib/openssl.so'
	no file '/usr/local/openresty/lualib/openssl.so'
	no file './openssl.so'
	no file '/usr/local/lib/lua/5.1/openssl.so'
	no file '/usr/local/openresty/luajit/lib/lua/5.1/openssl.so'
	no file '/usr/local/lib/lua/5.1/loadall.so'
	no file '/home/kong/.luarocks/lib/lua/5.1/openssl.so'

  Run with --v (verbose) or --vv (debug) for more details

springboot-kong-plugins's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.