apigee-access
v1.4.0
Published
Provides access to Apigee-specific functionality
Downloads
2,278
Readme
apigee-access
The apigee-access module allows Node.js applications running on the Apigee Edge platform a way to access Apigee-specific functionality. You can use this module to:
- Access and modify "flow variables" within the Apigee message context.
- Retrieve sensitive data from the the secure store (AKA "vault").
- Use the built-in distributed cache.
- Use the built-in distributed quota service.
- Use the OAuth service.
Use this module when you deploy a Node.js program to Apigee Edge to access Apigee-specific functionality. You can use it to build an application that is optimized for Apigee Edge, or it may be used to build higher-level functionality.
To support local development and testing, this module works in a local mode with no dependencies on Apigee functionality. When deployed to Apigee Edge, this functionality is replaced with native Apigee functionality.
This module is intended for use by developers who intend to primarily deploy to Apigee. For a more comprehensive set of tools that may be used in a variety of environments both inside and outside Apigee, please see our suite of "Volos" modules:
https://www.npmjs.org/search?q=volos
When Should I Use This?
Use this module:
- When you are an Apigee Edge user who is combining the traditional policy-based configuration of an API proxy with Node.js code.
- When you are an Apigee Edge user who wants to take advantage of the built-in distributed cache, quota, OAuth, and analytics available on the platform.
- If you wish to use Apigee Edge's secure storage Vaults (more info).
When Should I Not Use This?
Do not use this module:
If you are not deploying to Apigee Edge, then this module makes no sense.
If you don't know what we're talking about so far, then you don't need this module.
Behavior when Deployed to Apigee Edge
Variable Access: Variables set by other Apigee Edge policies are visible to this module, and variables added or modified by this module are visible to subsequent policies.
Cache: Items placed in the cache are visible to all instances of the application deployed to Apigee Edge.
Behavior when Running Outside Apigee
Variable Access: Variables are only visible to the current Node.js application. A (small) set of pre-defined variables is also populated for testing.
Cache: Items in the cache are only visible to the current Node.js application.
Secure Store: The secure store service will fail with an error when used outside Apigee Edge.
Quota: The quota service will fail with an error when used outside Apigee Edge.
OAuth: The OAuth service will fail with an error when used outside Apigee Edge.
Example
When creating an API proxy in Apigee, it is common to set variables that can be used to pass information from one policy to the next.
Imagine that an Edge policy running on the request path has set a variable called "AuthenticatedUserId". Using this module, you may access that variable as follows:
var http = require('http');
var apigee = require('apigee-access');
http.createServer(function (request, response) {
var userId = apigee.getVariable(request, 'AuthenticatedUserId');
console.log('Authenticated Apigee User ID is %s', userId);
response.writeHead(200, {'Content-Type': 'text/plain'});
response.end('Hello World\n');
}).listen(8124);
console.log('Server running at http://127.0.0.1:8124/');
Detailed Documentation
Methods
The module supports the following methods. Note that some methods require a request object that came from the http module. The methods are described in more detail in the following sections.
getVariable(request, name);
setVariable(request, name, value);
setIntVariable(request, name, value);
deleteVariable(request, name);
getCache(name);
getQuota(options);
getMode();
And the following constant properties:
APIGEE_MODE = 'apigee';
STANDALONE_MODE = 'standalone';
Accessing Variables
Since 1.0.0
Variables are part of the flow of each message through the Apigee Edge product. Among other things, they represent the context between the different policies that may affect the message as it flows through Apigee. There are a few reasons to access this data from Node.js:
To gain access to variables that may have been set by Apigee policies that ran before the Node.js code was invoked.
To set variables from Node.js that might be used by other Apigee policies that run after the Node.js code.
To access predefined variables in Apigee Edge that are not available using standard Node.js HTTP request objects, such as timestamps on the message.
For a complete list of predefined flow variables refer to the Apigee Edge Variables reference. Policy variables are described in the Apigee Edge Policy Reference
Getting a variable
var apigee = require('apigee-access');
// "httpRequest" must be a request object that came from the http module
var val1 = apigee.getVariable(request, 'TestVariable');
var val2 = apigee.getVariable(request, 'request.client.ip');
The value may be a string or a number, depending on the type that was set using "setVariable," or if the variable is built in to Apigee, depending on the type of the built-in variable.
Setting a variable
Some variables are read-only -- an exception will be thrown if you try to set one of them.
var apigee = require('apigee-access');
// "httpRequest" must be a request object that came from the http module
apigee.setVariable(request, 'TestVariable', 'bar');
// This will throw an exception
apigee.setVariable(request, 'client.ip', 'Invalid');
For each variable, the key must be a string. The value may be a number, String, boolean, null, or undefined.
Setting an integer variable
var apigee = require('apigee-access');
// Convert "123" to an integer and set it
apigee.setIntVariable(request, 'TestVariable', '123');
// Use something that's already a number
apigee.setIntVariable(request, 'TestVariable2', 42);
"setIntVariable" is a convenience method that first coerces "value" to an integer, and then sets it. "value" must be a string or number.
Deleting a variable
It is an error to delete a read-only variable. For a complete list of read-only variables, see the Apigee Edge Variables Reference.
apigee.deleteVariable(request, 'TestVariable');
// This will throw an exception
apigee.deleteVariable(request, 'client.ip');
Pre-Defined Variables Within Apigee Edge
You can find the link of supported variables at the following page. These are the variables that are available when you deploy a Node.js application to Apigee Edge.
You may of course add your own variables with your own names.
You can find the complete list of pre-defined variables in the Variables Reference.
Running Outside Apigee Edge
This module also works outside of Apigee Edge, but not all the pre-defined variables are supported. This table shows which ones are available. These variables are supported here in order to support local development and testing of Node.js applications for Apigee Edge.
Again, on the Apigee Edge platform, a much larger set of pre-defined variables is supported -- please refer to the Apigee Edge Variables Reference.
This module works outside Apigee mainly for testing purposes. Missing a variable that you need for a test? Open a GitHub issue and we can add it, or send a pull request.
Determining the Deployment Mode
As mentioned previously, you can use this module in an application that is deployed to Apigee Edge or in standalone mode on your local machine. To determine which mode you are running in:
var apigee = require('apigee-access')
console.log('The deployment mode is ' + apigee.getMode());
The getMode() method returns a string that determines where the module has been deployed.
If it returns the string "apigee," then the application is running on Apigee Edge and all functionality is supported.
If it returns the string "standalone," then the application is running outside the Apigee Edge environment, and the default functionality described at the top of the document takes effect.
Working with the Cache
Since 1.1.0
The cache may be used to store strings or data. Like most caches, it is a least-recently-used cache with a maximum size.
Inside Apigee Edge, the cache is distributed between all nodes where the Node.js application executes.
Configuration of the cache is managed via a "cache resource." You can use the Apigee Edge API to manually create cache resources, or you can use the default resource.
For an introduction to caching on Apigee Edge, refer to the Persistence documentation topic on the Apigee Edge website.
When this module is used outside of Apigee Edge, the cache is stored in memory inside Node.js. This support is provided primarily for testing purposes.
This module provides low-level cache access, and only works on Apigee Edge. For a more comprehensive cache implementation that can work on a variety of environments, use Volos:
Accessing a cache
var apigee = require('apigee-access');
// Look up the cache named "cache" and create it if necessary. The
// resulting cache uses a pre-defined set of configuration parameters
// that should be workable for most situations.
var cache = apigee.getCache('cache');
// Get access to a custom cache resource
var customCache = apigee.getCache('MyCustomCache',
{ resource: 'MyCustomrResource'} );
To use a cache, call "getCache". This takes a name, and an optional configuration object.
The configuration object may be empty, or it may contain the following optional parameters:
resource: The name of an Apigee "cache resource" where the data should be stored. Cache resources are used to fine-tune memory allocation and other cache parameters. If not specified, a default resource will be used. If the cache resource does not exist, then an error will be thrown. See below for more documentation in this feature.
scope: Specifies whether cache entries are prefixed to prevent collisions. Valid values are "global", "application," and "exclusive". These are defined below. The default scope is "exclusive."
defaultTtl: Specifies the default time to live for a cache entry, in seconds. If not specified then the default TTL in the cache resource will be used.
timeout: How long to wait to fetch a result from the distributed cache, in seconds. The default 30 seconds. Latency-sensitive applications may wish to reduce this in order to prevent slow response times if the cache infrastructure is overloaded.
For information about how to create a cache resource, see the Apigee Edge doc topic Manage Caches for an Environment.
The following values are valid for the "scope" field:
global: All cache entries may be seen by all Node.js applications in the same Apigee "environment."
application: All cache entries may be seen by all Node.js caches that are part of the same Apigee Edge application.
exclusive: Cache entries are only seen by Node.js caches in the same application that have the same name. This is the default.
Inserting or Replacing an item
var apigee = require('apigee-access');
var cache = apigee.getCache();
// Insert a string with a timeout of 120 seconds
cache.put('key2', 'Hello, World!', 120);
// Insert a string and get notified when insert is complete
cache.put('key4', 'Hello, World!', function(err) {
// "err" will be undefined unless there was an error on insert
});
"put" takes four parameters:
key (required): A string that uniquely identifies the item in the cache.
data (required): A string, Buffer, or object that represents the data to cache. Any other data type will result in an error. For convenience, objects will be converted into a string using "JSON.stringify".
ttl (optional): The maximum time to persist the data in the cache, in seconds. If not specified then a default TTL will be used.
callback (optional): If specified, a function that will be called once the data is safely in the cache. It will be called with an Error object as the first parameter if there is an insertion error, and otherwise it will be called with no parameters.
Retrieving an item
var apigee = require('apigee-access');
var cache = apigee.getCache();
cache.get('key', function(err, data) {
// If there was an error, then "err" will be set
// "data" is the item that was retrieved
// It will be a Buffer or a String depending on what was inserted..
});
"get" takes two parameters:
key (required): A string that uniquely identifies the item in the cache.
callback (required): A function that will be called when the data is available.
The callback must be a function that takes two parameters:
The first is an error -- if there is an error while retrieving from the cache, then an Error object will be set here. Otherwise this parameter will be set to "undefined".
The second is the data retrieved, if any. It will be one of four values:
- If a string was inserted, it will be a string.
- If a Buffer was inserted, it will be a Buffer.
- If an object was inserted, it will be a string containing the JSON version of the object as produced by "JSON.stringify".
- If nothing was found, then it will be "undefined".
Invalidating an Item
var apigee = require('apigee-access');
var cache = apigee.getCache();
cache.remove('key');
This method invalidates the key. Like "put," it optionally takes a function as the second parameter, which will be called with an Error object as the first parameter if there is an error.
Once a key is invalidated, subsequent "get" requests will return "undefined" unless another value is inserted.
Using the Secure Store
Since 1.2.0
The secure store service is a feature of Apigee Edge that allows sensitive data, such as security credentials for back-end services, to be stored in encrypted format so that they are protected from unauthorized use.
For example, the secure store may be used to store a password required by a Node.js application in order to reach a protected resource, such as a database server. The developer of the application can store the password in the secure store via API before deployment, and the application can look up the value at runtime.
By doing this, there is therefore no need to include the password in the source code control system, or to deploy it alonside the Node.js source code to Apigee. Instead, the value is stored by Apigee in encrypted form and it will only be retrieved when the application needs it.
Each Apigee Edge "organization" has a set of secure stores, and each environment has an additional store. That way organizations that have different security requirements for different back ends can store different secure values.
Storing data in the Secure Store by Organization
Data is stored in the secure store using the Apigee Edge management API:
GET /o/{organization}/vaults
Retrieve the names of all the secure stores.
GET /o/{organization}/vaults/{name}
Retrieve a list of entries (but not their encrypted values) from a named vault.
GET /o/{organization}/vaults/{name}/entries/{entryname}
Retrieve a single entry (but not its encrypted value).
POST /o/{organization}/vaults
{ "name": "{name}" }
curl https://api.enterprise.apigee.com/v1/o/testorg/vaults
-H "Content-Type: application/json"
-d '{"name": "test2" }' -X POST
Create a new vault named "name" with no values
POST /o/{organization}/vaults/{vaultname}/entries
{ "name": "{entryname}", "value": "{securevalue}" }
curl https://api.enterprise.apigee.com/v1/o/testorg/vaults/test2/entries
-H "Content-Type: application/json"
-d '{"name": "value1", "value": "verysecret" }' -X POST
Place a new entry in the vault with the specified name and secure value.
PUT /o/{organization}/vaults/{vaultname}/entries/{entryname}
curl https://api.enterprise.apigee.com/v1/o/testorg/vaults/test2/entries/value1
-d 'verymoresecret' -X PUT
Replace the value of the specified entry with a new value
POST /o/{organization}/vaults/{vaultname}/entries/{entryname}?action=verify
curl https://api.enterprise.apigee.com/v1/o/testorg/vaults/test2/entries/value1?action=verify
-d 'verymoresecret' -X POST
Return "true" if the specified value matches what is already in the store, and "false" if it does not. In both cases, an HTTP status code of 200 is used. This may be used to validate the contents of the store. Note that once stored, there is no API to retrieve the unencrypted value.
DELETE /o/{organization}/vaults/{vaultname}/entries/{entryname}
Delete the specified vault entry
DELETE /o/{organization}/vaults/{name}
Delete the entire vault.
Storing data by Environment
The above API may also be invoked on the "environment" path. In that case, the data is qualified by environment. This way, at runtime different values may be stored depending on where the Node.js script is running:
GET /o/{organization}/vaults
GET /o/{organization}/vaults/{name}
GET /o/{organization}/vaults/{name}/entries/{entryname}
POST /o/{organization}/vaults
POST /o/{organization}/vaults/{vaultname}/entries
PUT /o/{organization}/vaults/{vaultname}/entries/{entryname}
POST /o/{organization}/vaults/{vaultname}/entries/{entryname}?action=verify
DELETE /o/{organization}/vaults/{vaultname}/entries/{entryname}
DELETE /o/{organization}/vaults/{name}
Retrieving values from the Secure Store
The "getVault" method is used to retrieve a particular vault, either per organization or based on the current environment where the Node.js code is running.
"getVault" takes two parameters:
- The name of the vault to retrieve.
- The "scope," which may be "organization" or "environment." If not specified, then "organization" is assumed.
The object returned by "getVault" has two methods:
getKeys(callback): Return an array containing the names of all the keys in the specified vault. The "callback" function will be called with two arguments: An error if the operation fails, or "undefined" if it does not, and the actual array as the second argument.
get(key, callback): Return the secure value associated with a particular key. The "callback" function will be called with two arguments: An error if the operation fails, or "undefined" if it does not, and the actual value as the second argument.
Example 1 (simple case)
var apigee = require('apigee-access');
var orgVault = apigee.getVault('vault1', 'organization');
orgVault.get('key1', function(err, secretValue) {
// use the secret value here
});
Example 2 (retrieve a token from vault when running on Edge or pass via command line when working locally)
var apigee = require('apigee-access');
var token = "";
if (apigee.getMode() === 'apigee') { // test to see if running on Edge
var orgVault = apigee.getVault('gitlab', 'organization');
orgVault.get('token', function(err, secretValue) {
if (err) {
console.log(err);
next(err);
} else {
token = secretValue;
}
});
} else {
if (process.argv[2]) { // if local, grab from token command line arguments
token = process.argv[2];
}
}
Using the Quota Service
Since 1.2.0
The quota service is set up to give direct access to the quota service built in to Apigee Edge. Here is an example of how it is used:
var apigee = require('apigee-access');
var quota = apigee.getQuota();
quota.apply({ identifier: 'Foo', allow: 10, timeUnit: 'hour' },
function(err, result) {
console.log('Quota applied: %j', result);
});
The quota service is a low-level object that works only inside Apigee Edge. For a more comprehensive quota implementation that can work in many environments, use Volos:
Getting access to the Quota object
To get access to the Quota object, call "getQuota()".
Incrementing the quota
To increment the quota value, call "getQuota()" to get an instance of the Quota object, and then call "apply." The first argument to "apply" is an object that may contain the following fields:
- identifier (string, required): A unique identifier of the quota bucket. In practice it might be an application ID, IP address, or username.
- timeUnit (string, required): How long the quota bucket will accumulate until if is reset. Valid values are "minute," "hour," "day," "week," and "month."
- allow (number, required): The maximum value for the quota bucket. This value will be combined with the current value to return whether the quota has succeeded.
- interval (number, optional): Combined with the "timeUnit" to determine how long before the quota is reset. The default is 1. Set to a larger value to allow quotas such as "two hours," "three weeks," and so on.
- weight (number, optional): The value to increment the quota by. Default is 1.
The second argument to "apply" is a function that takes two arguments. The first will be an Error object if the quota cannot be incremented, or undefined if the operation succeeded.
The second is an object that will contain the following fields:
- used (number): The current value of the quota bucket.
- allowed (number): The maximum value of the quota bucket before the quota is considered to be exceeded. The same value was passed as "allow" in the request object.
- isAllowed (boolean): If there is room left in the quota -- true as long as "used" is less than or equal to "allowed."
- expiryTime (long): The timestamp, in milliseconds since 1970 format, when the quota bucket will be reset.
- timestamp (long): The timestamp at which the quota was updated.
For example:
var apigee = require('apigee-access');
var quota = apigee.getQuota();
// Apply a quota of 100 requests per hour
quota.apply({
identifier: 'Foo',
timeUnit: 'hour',
allow: 100
}, quotaResult);
// Apply a quota of 500 requests per five minutes
quota.apply({
identifier: 'Bar',
timeUnit: 'minute',
interval: 5,
allow: 500
}, quotaResult);
// Increment the quota by a value of 10
quota.apply({
identifier: 'Foo',
timeUnit: 'hour',
allow: 100,
weight: 10
}, quotaResult);
function quotaResult(err, r) {
if (err) { console.error('Quota failed'); }
}
Resetting the quota
To reset the quota to zero, call "reset." Reset takes an options argument, the same as apply, and many of the same parameters:
- identifier (string, required): A unique identifier of the quota bucket. In practice it might be an application ID, IP address, or username.
- timeUnit (string, required): How long the quota bucket will accumulate until if is reset. Valid values are "minute," "hour," "day," "week," and "month."
- interval (number, optional): Combined with the "timeUnit" to determine how long before the quota is reset. The default is 1. Set to a larger value to allow
The second argument is a callback that will have an Error object as the first parameter if the reset fails.
Advanced Usage
When creating a quota, an optional "options" object may be included. This object has one optional parameter:
- syncInterval (number, optional): The number of seconds that the distributed quota implementation syncs its state across the network. The default is 10.
This parameter may be used to optimize performance of the distributed quota across the network. Keep in mind that a lower setting will degrade performance and dramatically increase the latency of the "apply" operation. The default setting of 10 seconds is a good setting for many applications.
The interval may be set as low as zero, which means that the state is synchronized every time "apply" is called. Performance will be much, much worse in this case.
Using the OAuth Service
Since 1.2.0
This module provides a low-level interface for getting access to the OAuth service built in to Apigee Edge. It is fully functional but it is not designed to be a complete OAuth 2.0 implementation out of the box. For this purpose, use Volos:
Volos will automatically detect if this module is present and use it for better OAuth performance when it is available.