This repository has been archived. There will likely be no further development on the project and security vulnerabilities may be unaddressed.
This repository contains a Python application which is used to store and modify user information for the NGINX Ingenious application. The Ingenious application has been developed by the NGINX Professional Services team to provide a reference architecture for building your own microservices based application using NGINX as the service mesh.
The default configuration for all the components of the MRA, including the User Manager service, is to use the Fabric Model Architecture. Instructions for using the Router Mesh or Proxy Model architectures will be made available in the future.
As a single service in the set of services which comprise the NGINX Microservices Reference Architecture application, Ingenious, the User Manager service is not meant to function as a standalone service. Once you have built the image, it can be deployed to a container engine along with the other components of the Ingenious application, and then the application will be accessible via your browser.
There are detailed instructions for building the service below, and in order to get started quickly, you can follow these simple instructions to quickly build the image.
- (Optional) If you don't already have an NGINX Plus license, you can request a temporary developer license here. If you do have a license, then skip to the next step.
- Copy your licenses to the /mra-user-manager/nginx/ssl directory
- Run the command
docker build . -t <your-image-repo-name>/user-manager:quickstart
where is the username for where you store your Docker images - Once the image has been built, push it to your image repository with the command
docker push -t <your-image-repo-name>/user-manager:quickstart
At this point, you will have an image that is suitable for deployment on to a Kubernetes installation, and you can deploy the image by creating YAML files and uploading them to your Kubernetes installation.
To build a customized image for different container engines or to set other options, please follow the directions below.
The Dockerfile for the User Manager service is based on the python:3.5 image, and installs NGINX open source or NGINX Plus. Note that NGINX Plus includes features which make discovery of other services possible, include additional load balancing algorithms, create persistent SSL/TLS connections, and provide advanced health check functionality.
Please refer to the comments in the Dockerfile for details about each command which is used to build the image.
The command, or entrypoint, for the Dockerfile is the start.sh script. This script sets some local variables, then runs uwsgi to execute the logic in the app.py file. It also starts NGINX to send requests to the port opened by UWSGI. The configuration for UWSGI is found in uwsgi.ini
The Dockerfile sets some ENV arguments which are used when the image is built:
-
USE_NGINX_PLUS
The default value is true. When this value is set to false, NGINX open source will be built in to the image and several features, including service discovery and advanced load balancing will be disabled. See installing nginx plus -
USE_VAULT
The default value is false. Setting this value to true will cause install-nginx.sh to look for a file named vault_env.sh which contains the VAULT_ADDR and VAULT_TOKEN environment variables to retrieve NGINX Plus keys from a vault server.#!/bin/bash export VAULT_ADDR=<your-vault-address> export VAULT_TOKEN=<your-vault-token>
You must be certain to include the vault_env.sh file when USE_VAULT is true. There is an entry in the .gitignore file for vault_env.sh
In the future, we will release an article on our blog describing how to use vault with NGINX.
-
CONTAINER_ENGINE
The container engine used to run the images in a container. CONTAINER_ENGINE can be one of the following values- kubernetes (default): to run on Kubernetes When the nginx.conf file is built, the fabric_config_k8s.yaml will be used to populate the open source version of the nginx.conf template
- mesos: to run on DC/OS When the nginx.conf file is built, the fabric_config.yaml will be used to populate the open source version of the nginx.conf template
- local: to run in containers on the machine where the repository has been cloned When the nginx.conf file is built, the fabric_config_local.yaml will be used to populate the open source version of the nginx.conf template
Set the USE_NGINX_PLUS property to false in the Dockerfile
Before installing NGINX Plus, you'll need to obtain your license keys. If you do not already have a valid NGINX Plus subscription, you can request developer licenses here
Set the USE_NGINX_PLUS property to true in the Dockerfile
By default USE_VAULT is set to false, and you must manually copy your nginx-repo.crt and nginx-repo.key files to the /mra-user-manager/nginx/ssl/ directory.
Download the nginx-repo.crt and nginx-repo.key files for your NGINX Plus Developer License or subscription, and move them to the root directory of this project. You can then copy both of these files to the /nginx/ssl directory of each microservice using the command below:
cp nginx-repo.crt nginx-repo.key <repository>/nginx/ssl/
If USE_VAULT is set to true, you must have installed a vault server and written the contents of the nginx-repo.crt and nginx-repo.key file to vault server. Refer to the vault documentation for instructions configuring a vault server and adding values to it.
As described above, the CONTAINER_ENGINE environment variable must be set to one of the following three options. The install-nginx.sh file uses this value to determine which template file to use when populating the nginx.conf file.
- kubernetes
- mesos
- local
Replace <your-image-repo-name> with the username for where you store your Docker images, and execute the command below to build the image. The <tag> argument is optional and defaults to latest
docker build . -t <your-image-repo-name>/user-manager:<tag>
In order to run the image, some environment variables must be set so that they are available during runtime.
Variable Name | Description | Example Value |
---|---|---|
ALBUM_MANAGER_URL | http://localhost/album-manager | |
AWS_ACCESS_KEY_ID | Your AWS Key for S3 | ABCD1234ABCD1234ABCD1234 |
AWS_REGION | The region where your S3 instance is running | us-west-1 |
AWS_SECRET_ACCESS_KEY | Your AWS Secret Access Key | ABCD1234ABCD1234ABCD1234 |
DB_ENDPOINT | The host of the DynamoDB instance | http://dynamo-db:8000 |
DEV_MODE | (Optional) For development only, monitor python modules to trigger reload | false |
VERIFY_CERTS | (Optional) For development, set an environment variable to disable HTTPS certificate verification | false |
When the DEV_MODE environment variable is set to true, the start.sh script will add the py-autoreload option to the command that starts the python application. As a result any changes made to the app.py file will be picked up by the application. A side-effect of enabling py-autoreload will cause the log continuously output
user-manager | uwsgi_check_logrotate()/lseek(): Illegal seek [core/logging.c line 494]
We plan to address the logging issue in a future release.
Method | Endpoint | Description | Parameters |
---|---|---|---|
GET | / | Succesful operation | |
POST | /users | Creates user | body - user information |
GET | /users/facebook/{id} | Get user by Facebook id | id - id for user |
GET | /users/google/{id} | Get user by Google id | id - id for user |
GET | /users/local/{id} | Get user by local id | id - id for user |
GET | /users/email/{email} | Get user by email | email - email of user |
POST | /users/email/auth | Authenticate user | body - user information |
GET | /users/{id} | Get user by user id | id - id for user |
PUT | /users/{id} | Update user by user id | id - id for user |
DELETE | /users/{id} | Delete user by user id | id - id for user |
In this service, the nginx/ssl/dhparam.pem file is provided for ease of setup. In production environments, it is highly recommended for secure key-exchange to replace this file with your own generated DH parameter.
You can generate your own dhparam.pem file using the command below:
openssl dhparam -out nginx/ssl/dhparam.pem 2048