log:
level: info (1)
mechanisms:
authenticators:
- id: anonymous_authenticator (2)
type: anonymous
authorizers:
- id: deny_all_requests (3)
type: deny
- id: allow_all_requests (4)
type: allow
finalizers:
- id: create_jwt (5)
type: jwt
default_rule: (6)
methods:
- GET
- POST
execute:
- authenticator: anonymous_authenticator
- authorizer: deny_all_requests
providers:
file_system: (7)
src: /heimdall/conf/rule.yaml
watch: true
Proxy Service Quickstart
This document describes a simple use case in which you’ll see heimdall’s proxy service in action. Here, we’ll create a minimal but complete environment for running heimdall within containers.
Prerequisites
Configure
Heimdall can be configured via environment variables, as well as using a configuration file. For simplicity reasons, we’ll use a configuration file here.
Create a config file (
config.yaml
) with the following content:1 Here we are setting the log level to info
to be able to see any log output. By default, heimdall logs onerror
log level.2 Configures the anonymous
authenticator.3 Configures the deny
authorizer, which rejects all requests.4 Configures the allow
authorizer. It will be used in our rule to allow requests.5 Configures the jwt
finalizer to create JSON Web Tokens.6 Configures the default rule, which is applied if no other rule matches. 7 Configures the file_system
provider, which will load rules from the file system.Put together, this configuration will let heimdall create a JSON Web Token (JWT) with
sub
claim set toanonymous
for every request on every URL for the HTTP methods GET and POST. The JWT itself will be put into theAuthorization
header as a bearer token. The above default rule does not forward requests, instead it just rejects them with thedeny
authenticator. To forward requests to the upstream service, we need a configuration of an authorization mechanism in a specific rule, which we’re going to define next.Create a rule file (
rule.yaml
) with the following contents:version: "1alpha3" rules: - id: rule1 (1) match: url: http://<**>/anonymous forward_to: host: upstream execute: - authorizer: allow_all_requests - finalizer: create_jwt - id: rule2 (2) match: url: http://<**>/public forward_to: host: upstream execute: - authorizer: allow_all_requests
1 This rule matches any hostname and the /anonymous
path and forwards the request to our upstream service (which we’re going to define next). In addition, it reuses the configuration from the default rule. Here, the methods, which are allowed, as well as the authenticator. So we don’t need to define them in the rule.2 This rule matches any host and the /public
path and forwards the request as the previous rule to our upstream service. This rule doesn’t perform any kind of request verification or transformation.Create or copy the following
docker-compose.yaml
file and modify it to include the correct paths to yourconfig.yaml
andrule.yaml
files:version: "3" services: heimdall: (1) image: dadrus/heimdall:latest volumes: # Mount your config file: - ./config.yaml:/heimdall/conf/config.yaml:ro # Mount your rule file: - ./rule.yaml:/heimdall/conf/rule.yaml:ro ports: - 4455:4455 command: -c /heimdall/conf/config.yaml serve proxy upstream: (2) image: containous/whoami:latest
1 Configures heimdall to use our config and rule files and to run in proxy operation mode. 2 Configures the "upstream" service. Here it is a very simple service, which just echoes back everything it receives.
Run
Run docker compose:
$ docker-compose up
Docker will automatically download the required container images. Then, heimdall will start in the proxy mode and run with the configuration details set in the previous steps. You’ll then be able to see an output similar to
Creating network "heimdall_default" with the default driver
Starting heimdall_heimdall_1 ... done
Starting heimdall_upstream_1 ... done
Attaching to heimdall_heimdall_1, heimdall_upstream_1
upstream_1 | Starting up on port 80
heimdall_1 | 2022-08-04T07:50:08+02:00 INF No opentracing provider configured. Tracing will be disabled.
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Instantiating in memory cache
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Loading pipeline definitions
heimdall_1 | 2022-08-04T07:50:08+02:00 WRN Key store is not configured. NEVER DO IT IN PRODUCTION!!!!
Generating an RSA key pair.
heimdall_1 | 2022-08-04T07:50:08+02:00 WRN No key id for signer configured. Taking first entry from the
key store
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Starting cache evictor
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Starting rule definition loader
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Starting rule definitions provider: file_system
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Loading initial rule set
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Rule set changed src=file_system:/heimdall/conf/rule.yaml
type=Create
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Loading rule set src=file_system:/heimdall/conf/rule.yaml
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Metrics service starts listening on: :9000
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Proxy service starts listening on: :4455
heimdall_1 | 2022-08-04T07:50:08+02:00 INF Management service starts listening on: :4457
Ignore the warnings. They are expected and will not have any effects in this case.
Use
Send a request to heimdall’s proxy endpoint:
$ curl -v 127.0.0.1:4455/foobar
Here, heimdall will not match any of the defined rules, which will result in the execution of the default rule. Thus, you’ll see 403 Forbidden
as answer.
Try sending requests to the /public
and the /anonymous
endpoints and see what happens. In both cases, the response will be an HTTP 200 OK
. And the response from the /anonymous
endpoint will also contain an Authorization
header containing a JWT, e.g. as shown below.
* Trying 127.0.0.1:4455...
* Connected to 127.0.0.1 (127.0.0.1) port 4455 (#0)
> GET /foobar HTTP/1.1
> Host: 127.0.0.1:4455
> User-Agent: curl/7.74.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Thu, 04 Aug 2022 07:53:41 GMT
< Content-Type: text/plain; charset=utf-8
< Content-Length: 872
<
Hostname: 4f809f75f31b
IP: 127.0.0.1
IP: 172.22.0.3
RemoteAddr: 172.22.0.2:42100
GET /foobar HTTP/1.1
Host: upstream
User-Agent: curl/7.74.0
Accept: */*
Authorization: Bearer eyJhbGciOiJQUzI1NiIsImtpZCI6IjNhYjFiMDdmMmMyNjlkMWVlMTRjNzQ2NDA4
OTAyZjRlNWQ1MDAyOTgiLCJ0eXAiOiJKV1QifQ.eyJleHAiOjE2NTkzMzczMjEsImlhdCI6MTY1OTMzNzAyMSw
iaXNzIjoiaGVpbWRhbGwiLCJqdGkiOiJjMmEzNjczMy04ZDBjLTQzYWQtOGFkNi0xM2Q4NGVhNDI1MTgiLCJuY
mYiOjE2NTkzMzcwMjEsInN1YiI6ImFub255bW91cyJ9.gw-h15LaUUYV-Sjk6Vf-kZflnZxn88lejVIIatKliv
FkeUz8oo9x9juKBSzr4nIVWjGZ_atGVmLoKshudHdnpvABx5cgBaz2_KDgifVzGORE1zld9vGDpU7IPjOyC9-M
b7vOOA1fq9pbQ4nfXw100AJJKFXSct9cYa3163kk_s-jEIPclhB0ZiPqGI-t_GiYJBCVKOTJPkkLKB51KCgn2y
PvO3qLCwO81JdCSFG9k2WLjWZlQe-a8u4El-2qctx8yB-vBFPIaQlwCJh66of3hcUs98IoVlMLGdTJSI4pX9nK
s8OMxVO37eI501gZXXkF5IiSsRAqV_o8pMcGZ47Ztg
Forwarded: for=172.22.0.1;proto=http
X-Forwarded-For: 172.22.0.1
* Connection #0 to host 127.0.0.1 left intact
You should also be able to see similar output as below from the docker-compose environment:
...
2022-08-04T07:53:41+02:00 INF TX started _client_ip=127.0.0.1 _http_host=127.0.0.1:4455 _http_method=GET
_http_path=/foobar _http_scheme=http _http_user_agent=curl/7.74.0 _tx_start=1659599621
2022-08-04T07:53:41+02:00 INF TX finished _access_granted=true _body_bytes_sent=872 _client_ip=127.0.0.1
_http_host=127.0.0.1:4455 _http_method=GET _http_path=/foobar _http_scheme=http _http_status_code=200
_http_user_agent=curl/7.74.0 _subject=anonymous _tx_duration_ms=0 _tx_start=1659599621
By the way, this quickstart is also available on GitHub.
Last updated on Nov 23, 2023