Skip to content

API Gateway

RefArch gateway based on Spring Cloud Gateway.

Usage

The gateway is released as container image ghcr.io/it-at-m/refarch/refarch-gateway and can be used either directly or via the corresponding Helm-Chart.

Features

Beside the default functionality of Spring Cloud Gateway (i.e. routing) following features are preconfigured/provided:

  • OAuth 2.0 based login
  • Route protection
  • CSRF protection with whitelist
  • Cookie to JWT mapping for session management
  • Session synchronisation between multiple instances via Hazelcast (see sections Profiles and Hazelcast)
  • Health and metrics endpoints
  • Request filters (e.g. distributed tracing, error code mapper, parameter pollution, ...)

Routing

Routes are configured via environment variables as listed under Configuration.

By default, routes require authentication through OAuth 2.0 and manage the session between the client and gateway using cookies. The gateway then maps the session cookie to a JWT before routing it.

Beside the default behaviour there are some special route prefixes which are handled different:

  • /public/**: All requests are routed WITHOUT security.
  • /clients/**: Uses JWT for authenticating incoming requests instead of session cookies.

Configuration

Following is a configuration example with description and example values. See also Security for additional security configuration.

Spring can also be configured via environment variables. See according documentation.

yaml
spring:
  profiles:
    active: local,hazelcast-local # see section profiles
  cloud:
    gateway:
      routes:
        - id: backend
          uri: http://backend-service:8080/
          predicates:
            - "Path=/api/backend-service/**"
          filters:
            - RewritePath=/api/backend-service/(?<urlsegments>.*), /$\{urlsegments}
refarch:
  hazelcast:
    service-name: # Kubernetes service name for when using profile `hazelcast-k8s`
  security:
    csrf-whitelisted: # List of routes to disable CSRF protection for (optional)
      - /example/**

# Aliases for `spring.cloud.gateway.globalcors.cors-configurations` to allow configuration via environment variables, as the used glob patterns can't be used there
ALLOWED_ORIGINS_PUBLIC: https://*.example.com,http://localhost:* # List of URIs allowed as origin for public routes (optional)
ALLOWED_ORIGINS_CLIENTS: https://*.example.com,http://localhost:* # List of URIs allowed as origin for client routes (optional)

Security

For authentication via SSO, OAuth 2.0 needs to be configured. See following example or the according Spring documentation.

Alternatively the no-security profile can be used.

yaml
spring:
  session:
    timeout: 10h # should be same as SSO session lifetime (e.g. internally 10h); default: 30m
  security:
    oauth2:
      resourceserver:
        jwt:
          issuer-uri: "https://sso.example/auth/realms/example"
      client:
        provider:
          sso:
            issuer-uri: ${spring.security.oauth2.resourceserver.jwt.issuer-uri}
        registration:
          sso:
            provider: sso
            client-id:
            client-secret:
            # needed for userInfo endpoint
            scope: profile, openid

Profiles

ProfileDescription
no-securityDisables all security mechanisms (e.g. authentication, authorization, CSRF) Routing works as normal.
hazelcast-localConfigures Spring Session Hazelcast for connection via localhost (i.e. local development).
hazelcast-k8sConfigures Spring Session Hazelcast for usage in Kubernetes/OpenShift cluster.

Hazelcast

Beside the already mentioned properties Hazelcast also has the following requirements.

Modular Java

See https://docs.hazelcast.com/hazelcast/5.5/getting-started/install-hazelcast#using-modular-java

Following Java options need to be set. For the gateway image this can be done with JAVA_OPTS_APPEND.

text
--add-modules java.se \
--add-exports java.base/jdk.internal.ref=ALL-UNNAMED \
--add-opens java.base/java.lang=ALL-UNNAMED \
--add-opens java.base/java.nio=ALL-UNNAMED \
--add-opens java.base/sun.nio.ch=ALL-UNNAMED \
--add-opens java.management/sun.management=ALL-UNNAMED \
--add-opens jdk.management/com.ibm.lang.management.internal=ALL-UNNAMED \
--add-opens jdk.management/com.sun.management.internal=ALL-UNNAMED

Kubernetes

For running Hazelcast with profile hazelcast-k8s in Kubernetes port 5701 needs to be accessible. This need to be configured for the Service and Deployment.