Compare commits
2 Commits
main
...
dev/migrat
Author | SHA1 | Date | |
---|---|---|---|
1c68b310b7 | |||
943b1cb30e |
11
Dockerfile
11
Dockerfile
@ -1,8 +1,13 @@
|
|||||||
FROM nginx:alpine
|
FROM traefik:v2.9.5
|
||||||
|
|
||||||
LABEL author="Piotr Biernat"
|
LABEL author="Piotr Biernat"
|
||||||
LABEL service="api-gw"
|
LABEL service="api-gateway"
|
||||||
LABEL vendor="Egommerce"
|
LABEL vendor="Egommerce"
|
||||||
LABEL version="1.0"
|
LABEL version="1.0"
|
||||||
|
|
||||||
COPY ./data/etc/nginx/ /etc/nginx/
|
COPY ./api-gateway/etc /etc/traefik
|
||||||
|
COPY ./api-gateway/plugins /plugins-local
|
||||||
|
|
||||||
|
EXPOSE 443 8080
|
||||||
|
|
||||||
|
# ENTRYPOINT ["/traefik"] # FIXME stack->stack config.yml
|
||||||
|
15
api-gateway/.vscode/launch.json
vendored
Normal file
15
api-gateway/.vscode/launch.json
vendored
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
// Use IntelliSense to learn about possible attributes.
|
||||||
|
// Hover to view descriptions of existing attributes.
|
||||||
|
// For more information, visit: https://go.microsoft.com/fwlink/?linkid=830387
|
||||||
|
"version": "0.2.0",
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"type": "java",
|
||||||
|
"name": "Debug App",
|
||||||
|
"request": "launch",
|
||||||
|
"mainClass": "com.egommerce.apigateway.Bootstrap",
|
||||||
|
"projectName": "api-gateway"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
4
api-gateway/.vscode/settings.json
vendored
Normal file
4
api-gateway/.vscode/settings.json
vendored
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
{
|
||||||
|
"java.configuration.updateBuildConfiguration": "interactive",
|
||||||
|
"maven.view": "hierarchical"
|
||||||
|
}
|
76
api-gateway/etc/traefik.yml
Normal file
76
api-gateway/etc/traefik.yml
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
################################################################
|
||||||
|
# global:
|
||||||
|
# checkNewVersion: true
|
||||||
|
# sendAnonymousUsage: true
|
||||||
|
|
||||||
|
################################################################
|
||||||
|
entryPoints:
|
||||||
|
https:
|
||||||
|
address: :443
|
||||||
|
transport:
|
||||||
|
respondingTimeouts:
|
||||||
|
readTimeout: '10ms'
|
||||||
|
writeTimeout: '10ms'
|
||||||
|
idleTimeout: '20ms'
|
||||||
|
db:
|
||||||
|
address: :5432
|
||||||
|
mongodb:
|
||||||
|
address: :27017
|
||||||
|
eventbus:
|
||||||
|
address: :5672
|
||||||
|
# redis:
|
||||||
|
# address: :6379
|
||||||
|
|
||||||
|
################################################################
|
||||||
|
serversTransport:
|
||||||
|
# # insecureSkipVerify: true
|
||||||
|
rootCAs:
|
||||||
|
- /etc/traefik/certs/identity-svc/server.cert
|
||||||
|
- /etc/traefik/certs/basket-svc/server.cert
|
||||||
|
- /etc/traefik/certs/catalog-svc/server.cert
|
||||||
|
- /etc/traefik/certs/postgres-db/server.cert
|
||||||
|
# - /etc/traefik/certs/api-eventbus/server.cert
|
||||||
|
|
||||||
|
################################################################
|
||||||
|
api:
|
||||||
|
insecure: true
|
||||||
|
# dashboard: true
|
||||||
|
|
||||||
|
################################################################
|
||||||
|
providers:
|
||||||
|
# file:
|
||||||
|
# directory: /etc/traefik/services
|
||||||
|
################################################################
|
||||||
|
docker:
|
||||||
|
# Docker server endpoint. Can be a tcp or a unix socket endpoint.
|
||||||
|
# endpoint: unix:///var/run/docker.sock
|
||||||
|
exposedByDefault: false
|
||||||
|
# network: api-gateway-network
|
||||||
|
# useBindPortIP: true
|
||||||
|
|
||||||
|
# Default host rule.
|
||||||
|
# Optional
|
||||||
|
# Default: "Host(`{{ normalize .Name }}`)"
|
||||||
|
# defaultRule: Host(`{{ normalize .Name }}.docker.localhost`)
|
||||||
|
################################################################
|
||||||
|
consulCatalog:
|
||||||
|
exposedByDefault: false
|
||||||
|
# serviceName: api-gateway
|
||||||
|
refreshInterval: 30s
|
||||||
|
endpoint:
|
||||||
|
address: api-registry:8500
|
||||||
|
|
||||||
|
################################################################
|
||||||
|
log:
|
||||||
|
level: DEBUG
|
||||||
|
# filePath: log/traefik.log
|
||||||
|
# format: json
|
||||||
|
|
||||||
|
################################################################
|
||||||
|
# accessLog: {}
|
||||||
|
|
||||||
|
################################################################
|
||||||
|
experimental:
|
||||||
|
localPlugins:
|
||||||
|
requestid:
|
||||||
|
moduleName: "git.pbiernat.dev/traefik/plugin-requestid"
|
@ -0,0 +1,6 @@
|
|||||||
|
displayName: Add X-Request-ID Header
|
||||||
|
type: middleware
|
||||||
|
import: git.pbiernat.dev/traefik/plugin-requestid
|
||||||
|
summary: 'Add a X-Request-ID header for tracing'
|
||||||
|
|
||||||
|
testData: {}
|
@ -0,0 +1,3 @@
|
|||||||
|
# plugin-requestid
|
||||||
|
|
||||||
|
Add X-Request-ID header
|
@ -0,0 +1,3 @@
|
|||||||
|
module git.pbiernat.dev/traefik/plugin-requestid
|
||||||
|
|
||||||
|
go 1.18
|
@ -0,0 +1,61 @@
|
|||||||
|
package plugin_requestid
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"net/http"
|
||||||
|
)
|
||||||
|
|
||||||
|
const defaultHeaderName = "X-Request-ID"
|
||||||
|
|
||||||
|
// Config plugin configuration
|
||||||
|
type Config struct {
|
||||||
|
HeaderName string `json:"headerName"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreateConfig create default plugin configuration
|
||||||
|
func CreateConfig() *Config {
|
||||||
|
return &Config{
|
||||||
|
HeaderName: defaultHeaderName,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RequestIDHeader
|
||||||
|
type RequestIDHeader struct {
|
||||||
|
headerName string
|
||||||
|
name string
|
||||||
|
next http.Handler
|
||||||
|
}
|
||||||
|
|
||||||
|
// New create new RequestIDHeader
|
||||||
|
func New(ctx context.Context, next http.Handler, config *Config, name string) (http.Handler, error) {
|
||||||
|
hdr := &RequestIDHeader{
|
||||||
|
next: next,
|
||||||
|
name: name,
|
||||||
|
}
|
||||||
|
|
||||||
|
if config == nil {
|
||||||
|
return nil, fmt.Errorf("config can not be nil")
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.HeaderName == "" {
|
||||||
|
hdr.headerName = defaultHeaderName
|
||||||
|
} else {
|
||||||
|
hdr.headerName = config.HeaderName
|
||||||
|
}
|
||||||
|
|
||||||
|
return hdr, nil
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *RequestIDHeader) ServeHTTP(rw http.ResponseWriter, req *http.Request) {
|
||||||
|
uuid := newUUID().String()
|
||||||
|
|
||||||
|
// header injection to backend service
|
||||||
|
req.Header.Add(r.headerName, uuid)
|
||||||
|
|
||||||
|
// header injection to client response
|
||||||
|
rw.Header().Add(r.headerName, uuid)
|
||||||
|
|
||||||
|
r.next.ServeHTTP(rw, req)
|
||||||
|
}
|
@ -0,0 +1,58 @@
|
|||||||
|
// source: https://github.com/trinnylondon/traefik-add-trace-id/blob/master/rand-utils.go
|
||||||
|
package plugin_requestid
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/rand"
|
||||||
|
"encoding/hex"
|
||||||
|
"io"
|
||||||
|
)
|
||||||
|
|
||||||
|
var rander = rand.Reader // random function
|
||||||
|
type UUID [16]byte
|
||||||
|
|
||||||
|
func must(uuid UUID, err error) UUID {
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
return uuid
|
||||||
|
}
|
||||||
|
|
||||||
|
func newUUID() UUID {
|
||||||
|
return must(newRandom())
|
||||||
|
}
|
||||||
|
|
||||||
|
func newRandom() (UUID, error) {
|
||||||
|
return newRandomFromReader(rander)
|
||||||
|
}
|
||||||
|
|
||||||
|
// newRandomFromReader returns a UUID based on bytes read from a given io.Reader.
|
||||||
|
func newRandomFromReader(r io.Reader) (UUID, error) {
|
||||||
|
var uuid UUID
|
||||||
|
_, err := io.ReadFull(r, uuid[:])
|
||||||
|
if err != nil {
|
||||||
|
return UUID{}, err
|
||||||
|
}
|
||||||
|
uuid[6] = (uuid[6] & 0x0f) | 0x40 // Version 4
|
||||||
|
uuid[8] = (uuid[8] & 0x3f) | 0x80 // Variant is 10
|
||||||
|
return uuid, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// String returns the string form of uuid, xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
|
||||||
|
// , or "" if uuid is invalid.
|
||||||
|
func (uuid UUID) String() string {
|
||||||
|
var buf [36]byte
|
||||||
|
encodeHex(buf[:], uuid)
|
||||||
|
return string(buf[:])
|
||||||
|
}
|
||||||
|
|
||||||
|
func encodeHex(dst []byte, uuid UUID) {
|
||||||
|
hex.Encode(dst, uuid[:4])
|
||||||
|
dst[8] = '-'
|
||||||
|
hex.Encode(dst[9:13], uuid[4:6])
|
||||||
|
dst[13] = '-'
|
||||||
|
hex.Encode(dst[14:18], uuid[6:8])
|
||||||
|
dst[18] = '-'
|
||||||
|
hex.Encode(dst[19:23], uuid[8:10])
|
||||||
|
dst[23] = '-'
|
||||||
|
hex.Encode(dst[24:], uuid[10:])
|
||||||
|
}
|
@ -1,43 +0,0 @@
|
|||||||
include apigw_backends.conf;
|
|
||||||
include apigw_keys.conf;
|
|
||||||
|
|
||||||
server {
|
|
||||||
access_log /var/log/nginx/apigw_access.log main;
|
|
||||||
error_log /var/log/nginx/apigw_error.log warn;
|
|
||||||
|
|
||||||
listen 80;
|
|
||||||
# listen 443 ssl;
|
|
||||||
# server_name apigw_svc; # container name from stack config
|
|
||||||
# server_name api.example.com;
|
|
||||||
|
|
||||||
# TLS config
|
|
||||||
# ssl_certificate /etc/ssl/certs/apigw.example.com.crt;
|
|
||||||
# ssl_certificate_key /etc/ssl/private/apigw.example.com.key;
|
|
||||||
# ssl_session_cache shared:SSL:10m;
|
|
||||||
# ssl_session_timeout 5m;
|
|
||||||
# ssl_ciphers HIGH:!aNULL:!MD5;
|
|
||||||
# ssl_protocols TLSv1.2 TLSv1.3;
|
|
||||||
|
|
||||||
# API definitions, one per file
|
|
||||||
include apigw_conf.d/*.conf;
|
|
||||||
|
|
||||||
# Error responses
|
|
||||||
# error_page 404 = @400; # Treat invalid paths as bad requests
|
|
||||||
proxy_intercept_errors on; # Do not send backend errors to client
|
|
||||||
include apigw_json_errors.conf; # API client-friendly JSON errors
|
|
||||||
default_type application/json; # If no content-type, assume JSON
|
|
||||||
|
|
||||||
# API key validation
|
|
||||||
location = /_validate_apikey {
|
|
||||||
internal;
|
|
||||||
|
|
||||||
if ($http_apikey = "") {
|
|
||||||
return 401; # Unauthorized
|
|
||||||
}
|
|
||||||
if ($apigw_client_name = "") {
|
|
||||||
return 403; # Forbidden
|
|
||||||
}
|
|
||||||
|
|
||||||
return 204; # OK (no content)
|
|
||||||
}
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
upstream identity_api {
|
|
||||||
# zone inventory_service 64k;
|
|
||||||
server identity_svc:8080; # container name from stack config
|
|
||||||
}
|
|
||||||
|
|
||||||
upstream basket_api {
|
|
||||||
# zone pricing_service 64k;
|
|
||||||
server basket_svc:8080; # container name from stack config
|
|
||||||
}
|
|
@ -1,14 +0,0 @@
|
|||||||
# Basket API
|
|
||||||
#
|
|
||||||
location /api/basket/ {
|
|
||||||
access_log /var/log/nginx/basket_access.log main;
|
|
||||||
error_log /var/log/nginx/basket_error.log warn;
|
|
||||||
|
|
||||||
auth_request /_validate_apikey;
|
|
||||||
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header User-Agent "api-gw"; # TMP - FIXME
|
|
||||||
|
|
||||||
proxy_pass http://basket_api/;
|
|
||||||
}
|
|
@ -1,32 +0,0 @@
|
|||||||
# Identity API
|
|
||||||
#
|
|
||||||
location /api/identity/ {
|
|
||||||
access_log /var/log/nginx/identity_access.log main;
|
|
||||||
error_log /var/log/nginx/identity_error.log warn;
|
|
||||||
|
|
||||||
auth_request /_validate_apikey;
|
|
||||||
|
|
||||||
proxy_set_header Host $host;
|
|
||||||
proxy_set_header X-Real-IP $remote_addr;
|
|
||||||
proxy_set_header User-Agent "egommerce-api-gateway/0.1"; # TMP - FIXME
|
|
||||||
|
|
||||||
proxy_pass http://identity_api/;
|
|
||||||
}
|
|
||||||
|
|
||||||
# # URI routing
|
|
||||||
# #
|
|
||||||
# location = /api/warehouse/inventory { # Complete inventory
|
|
||||||
# proxy_pass http://warehouse_inventory;
|
|
||||||
# }
|
|
||||||
|
|
||||||
# location ~ ^/api/warehouse/inventory/shelf/[^/]+$ { # Shelf inventory
|
|
||||||
# proxy_pass http://warehouse_inventory;
|
|
||||||
# }
|
|
||||||
|
|
||||||
# location ~ ^/api/warehouse/inventory/shelf/[^/]+/box/[^/]+$ { # Box on shelf
|
|
||||||
# proxy_pass http://warehouse_inventory;
|
|
||||||
# }
|
|
||||||
|
|
||||||
# location ~ ^/api/warehouse/pricing/[^/]+$ { # Price for specific item
|
|
||||||
# proxy_pass http://warehouse_pricing;
|
|
||||||
# }
|
|
@ -1,11 +0,0 @@
|
|||||||
error_page 400 = @400;
|
|
||||||
location @400 { return 400 '{"status":400,"message":"Bad request"}\n'; }
|
|
||||||
|
|
||||||
error_page 401 = @401;
|
|
||||||
location @401 { return 401 '{"status":401,"message":"Unauthorized"}\n'; }
|
|
||||||
|
|
||||||
error_page 403 = @403;
|
|
||||||
location @403 { return 403 '{"status":403,"message":"Forbidden"}\n'; }
|
|
||||||
|
|
||||||
error_page 404 = @404;
|
|
||||||
location @404 { return 404 '{"status":404,"message":"Resource not found"}\n'; }
|
|
@ -1,9 +0,0 @@
|
|||||||
map $http_apikey $apigw_client_name {
|
|
||||||
default "";
|
|
||||||
|
|
||||||
"R7HVf14WE5m4d5L3uv2sZU8Y" "identity_api";
|
|
||||||
"fd7uAN3/GKIfvFrOdfEAoo1y" "basket_api";
|
|
||||||
}
|
|
||||||
|
|
||||||
# $ openssl rand -base64 18
|
|
||||||
# 7B5zIqmRGXmrJTFmKa99vcit
|
|
@ -1,32 +0,0 @@
|
|||||||
|
|
||||||
user nginx;
|
|
||||||
worker_processes auto;
|
|
||||||
|
|
||||||
error_log /var/log/nginx/error.log notice;
|
|
||||||
pid /var/run/nginx.pid;
|
|
||||||
|
|
||||||
|
|
||||||
events {
|
|
||||||
worker_connections 1024;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
http {
|
|
||||||
include /etc/nginx/mime.types;
|
|
||||||
default_type application/octet-stream;
|
|
||||||
|
|
||||||
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
|
|
||||||
'$status $body_bytes_sent "$http_referer" '
|
|
||||||
'"$http_user_agent" "$http_x_forwarded_for"';
|
|
||||||
|
|
||||||
access_log /var/log/nginx/access.log main;
|
|
||||||
|
|
||||||
sendfile on;
|
|
||||||
#tcp_nopush on;
|
|
||||||
|
|
||||||
keepalive_timeout 65;
|
|
||||||
|
|
||||||
#gzip on;
|
|
||||||
|
|
||||||
include /etc/nginx/apigw.conf;
|
|
||||||
}
|
|
@ -1,14 +1,14 @@
|
|||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
# RUN IN REPO ROOT DIR !!
|
# RUN IN REPO ROOT DIR !!
|
||||||
|
|
||||||
export IMAGE_NAME="git.pbiernat.dev/egommerce/apigw-svc"
|
export IMAGE_NAME="git.pbiernat.dev/egommerce/api-gateway"
|
||||||
|
|
||||||
TARGET=${1:-latest}
|
TARGET=${1:-latest}
|
||||||
|
|
||||||
echo "Building: $IMAGE_NAME:$TARGET"
|
echo "Building: $IMAGE_NAME:$TARGET"
|
||||||
if [ $TARGET = "dev" ]
|
if [ $TARGET = "dev" ]
|
||||||
then
|
then
|
||||||
docker build --rm --no-cache -t "$IMAGE_NAME:dev" . >/dev/null 2>&1
|
docker build --rm --no-cache -t "$IMAGE_NAME:dev" . # >/dev/null 2>&1
|
||||||
else
|
else
|
||||||
docker build --rm --cache-from "$IMAGE_NAME:$TARGET" -t "$IMAGE_NAME:$TARGET" . >/dev/null 2>&1
|
docker build --rm --cache-from "$IMAGE_NAME:$TARGET" -t "$IMAGE_NAME:$TARGET" . >/dev/null 2>&1
|
||||||
fi
|
fi
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
# RUN IN REPO ROOT DIR !!
|
# RUN IN REPO ROOT DIR !!
|
||||||
|
|
||||||
export IMAGE_NAME="git.pbiernat.dev/egommerce/apigw-svc"
|
export IMAGE_NAME="git.pbiernat.dev/egommerce/api-gateway"
|
||||||
|
|
||||||
echo $DOCKER_PASSWORD | docker login git.pbiernat.dev -u $DOCKER_USERNAME --password-stdin
|
echo $DOCKER_PASSWORD | docker login git.pbiernat.dev -u $DOCKER_USERNAME --password-stdin
|
||||||
docker push "$IMAGE_NAME:latest"
|
docker push "$IMAGE_NAME:latest"
|
||||||
|
Loading…
Reference in New Issue
Block a user