This demo uses Terraform to automate the setup of an NGINX Plus (and NGINX App Protect WAF) API gateway pseudo-production environment that includes a mock API backend database.
A PDF containing accompanying slides for this demo can also be found under the name of Deploy and Secure Your API Gateway with NGINX.pdf
.
This demo has been developed and tested with Terraform 0.13
through 1.1.5
.
Instructions on how to install Terraform can be found in the Terraform website.
You will need to download the NGINX Plus (including NGINX App Protect WAF) license to a known location. You can specify the location of the license in the corresponding Terraform variables.
You will need to create R53 hosted zone beforehand. Make sure you own the domain you are using through the R53 hosted zone or you risk running into DNS issues. You should specify the R53 hosted zone id
as well as a FQDN for the NGINX Plus API gateway and backend API in the corresponding Terraform variables.
To use the provided Terraform scripts, you need to:
- Export your AWS credentials as environment variables (or alternatively, tweak the AWS provider in
terraform/provider.tf
). - Set up default values for variables missing a value in
terraform/variables.tf
(you can find example values commented out in the file). Alternatively, you can input those variables at runtime (beware of dictionary values if you do the latter).
Once you have configured your Terraform environment, you can either:
- Run
./setup.sh
to initialize the AWS Terraform provider and start a Terraform deployment on AWS. - Run
terraform init
andterraform apply
.
And finally, once you are done playing with the demo, you can destroy the AWS infrastructure by either:
- Run
./cleanup.sh
to destroy your Terraform deployment. - Run
terraform destroy
.
You will find a series of NGINX configuration files in the nginx_api_gateway_config
folder. The folder is divided into individual steps, meant to be copied into their respective directory in order. By default, the folder is uploaded to your NGINX API gateway instance.
Do note that you will have to replace the <backend-api-fqdn>
placeholder value found in the API backends NGINX configuration file in Step 3 with the corresponding value you used when deploying the Terraform environment (see nginx_api_gateway_config/step_3/api_backends.conf
for more details).
A deployment script to help you copy the configuration files, deploy.sh
, is also provided. To run the script, use the step number as a parameter, e.g. ./deploy.sh 1
for step 1. You might need to make the deployment script executable by running sudo chmod x deploy.sh
.
To deploy:
./deploy.sh 1
To test:
curl -s http://localhost:8080
Expected response:
<html>
<head><title>400 Bad Request</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<hr><center>nginx/1.19.5</center>
</body>
</html>
To deploy:
./deploy.sh 2
To test:
curl -s http://localhost:8080
Expected response:
{"status":400,"message":"Bad request"}
To test (headers):
curl -sI http://localhost:8080
Expected response:
HTTP/1.1 400 Bad Request
...
To deploy:
./deploy.sh 3
To test:
curl -s http://localhost:8080/api/f1/drivers/hamilton | jq
Expected response:
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
"limit": "30",
"offset": "0",
"total": "1",
"DriverTable": {
"driverId": "hamilton",
"Drivers": [{
"driverId": "hamilton",
"permanentNumber": "44",
"code": "HAM",
"url": "http://en.wikipedia.org/wiki/Lewis_Hamilton",
"givenName": "Lewis",
"familyName": "Hamilton",
"dateOfBirth": "1985-01-07",
"nationality": "British"
}]
}
}}
To deploy:
./deploy.sh 4
To test (run multiple times in quick succession):
curl -s http://localhost:8080/api/f1/drivers/hamilton
Expected response:
{"status":429,"message":"API rate limit exceeded"}
To deploy:
./deploy.sh 5
To test (unauthorized requests):
curl -s http://localhost:8080/api/f1/drivers/hamilton
Expected response (unauthorized requests):
{"status":401,"message":"Unauthorized"}
To test (authorized requests):
curl -sH "apikey: 7B5zIqmRGXmrJTFmKa99vcit" http://localhost:8080/api/f1/drivers/hamilton | jq
Expected response (authorized requests):
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
...
}}
To deploy:
./deploy.sh 6
To test (unauthorized requests):
curl -s http://localhost:8080/api/f1/drivers/hamilton
Expected response (unauthorized requests):
{"status":401,"message":"Unauthorized"}
To test (authorized request):
curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" http://localhost:8080/api/f1/drivers/hamilton | jq
Expected response (authorized request):
{"MRData": {
"xmlns": "http://ergast.com/mrd/1.4",
"series": "f1",
"url": "http://ergast.com/api/f1/drivers/hamilton",
...
}}
To test (missing JWT claims):
curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6ZmFsc2V9.i7o5c8MEGZWD223IWFIs-Qn6f8FBe_DjvZWn-xBzcvI" -X DELETE http://localhost:8080/api/f1/drivers/hamilton
Expected response (missing JWT claims):
{"status":405,"message":"Method not allowed"}
Step 7 -> Set up JSON body validation using NJS (optional, NGINX App Protect WAF -step 8- will validate JSON bodies)
To deploy:
./deploy.sh 7
To test (incorrect JSON):
curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d 'garbage123' http://localhost:8080/api/f1/seasons
Expected response (incorrect JSON):
HTTP/1.1 415 Unsupported Media Type
To test (correct JSON):
curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d '{"season":"2020"}' http://localhost:8080/api/f1/seasons
Expected response (correct JSON):
HTTP/1.1 200 OK
To deploy:
./deploy.sh 8
To test:
curl -sH "Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhZG1pbiI6dHJ1ZX0.kFplw9Kkg-6DLFGfVZAPIuWgGPMY9nnMZMQ2iIRN8_s" -i -X POST -d 'garbage123' http://localhost:8080/api/f1/seasons
Expected response:
HTTP/1.1 403 Forbidden
{"supportID": "4839869788531770938"}
Note: SupportID is a unique identifier so your ID will be different
To check logs:
sudo cat /var/log/app_protect/security.log
Expected response:
attack_type="HTTP Parser Attack”... support_id="4839869788531771448”...
Note: Check that the supportID you received in the previous step is present in the security log