This repository will guide you to get Kong in front of OpenFaas.
Please, go to this repository and install OpenFaas, this repository use a PersistenVolumeClaim, ajust with your kubernetes configuration.
After install OpenFaas, you can install Kong, this repository use the same namespace of OpenFaas.
Enter in yaml folder, inside this folter you will find some yaml files, install in this order:
kubectl create -f kong-db-dep.yml
kubectl create -f kong-migrations.yml
kubectl create -f kong-dep.yml
After Kong installation you can install the UI interface, KONGA
kubectl create -f konga-dep.yml
Note: Ajust the Ingress sections on files, accordly your configurations.
You can do this task with two ways, command line or through KONGA web interface.
Here you can get with command line to configure endpoits.
curl -k -X PUT \
https://${INGRESS_ADMIN_URL}/services/function \
-d 'url=http://gateway:8080/function'
curl -k -X POST \
https://${INGRESS_ADMIN_URL}/services/function/routes \
-d 'name=function' \
-d 'protocols=http' \
--data-urlencode 'paths[]=/function'
curl -k -X PUT \
https://${INGRESS_ADMIN_URL}/services/async-function \
-d 'url=http://gateway:8080/async-function'
curl -k -X POST \
https://${INGRESS_ADMIN_URL}/services/async-function/routes \
-d 'name=async-function' \
-d 'protocols=http' \
--data-urlencode 'paths[]=/async-function'
The -k options in curl is necessary if you are using self-signed certificates.
Kong Admin API only supports authentication in enterprise edition, so, as best practice, don't publish kong adm Ingress, use KONGA to manage kong adm.
Kong support a lot of authentication methods, like basic, api key, oauth2, jwt etc.
To simplify this deploy, we will use basic authentication.
curl -k -X POST https://${INGRESS_ADMIN_URL}/plugins \
-d 'name=basic-auth' \
-d 'config.hide_credentials=true'
curl -k https://${INGRESS_ADMIN_URL}/consumers/ -d 'username=Aladdin'
curl -k -X POST https://${INGRESS_ADMIN_URL}/consumers/aladdin/basic-auth \
-d 'username=Aladdin' \
-d 'password=OpenSesame'
$ curl -k https://${INGRESS_PROXY_URL}/function/func_echoit -d 'hello world'
{"message": "Unauthorized"}
$ curl -k https://${INGRESS_PROXY_URL}/function/func_echoit -d 'hello world' \
-H 'Authorization: Basic xxxxxx'
{"message": "Invalid authentication credentials"}
$ echo -n aladdin:OpenSesame | base64
YWxhZGRpbjpPcGVuU2VzYW1l
$ curl -k https://${INGRESS_PROXY_URL}/function/func_echoit -d 'hello world' \
-H 'Authorization: Basic YWxhZGRpbjpPcGVuU2VzYW1l'
hello world
curl -k -X PUT \
https://${INGRESS_ADMIN_URL}/services/ui \
-d 'url=http://gateway:8080/ui'
curl -k -X POST \
https://${INGRESS_ADMIN_URL}/services/ui/routes \
-d 'name=ui' \
-d 'protocols=http' \
--data-urlencode 'paths[]=/ui'
curl -k -X PUT \
https://${INGRESS_ADMIN_URL}/services/system-functions \
-d 'url=http://gateway:8080/system/functions'
curl -k -X POST \
https://${INGRESS_ADMIN_URL}/services/system-functions/routes \
-d 'name=system-functions' \
-d 'protocols=http' \
--data-urlencode 'paths[]=/system/functions'
Now visit https://${INGRESS_PROXY_URL}/ui/ in your browser where you will be asked for credentials.
This part, is the same OpenFaas doc Original
Basic authentication does not protect from man in the middle attacks, so lets add SSL to encrypt the communication.
Create a cert. Here in the demo, we are creating selfsigned certs, but in production you should skip this step and use your existing certificates (or get some from Lets Encrypt).
openssl req -x509 -nodes -days 365 -newkey rsa:2048 \
-keyout /tmp/selfsigned.key -out /tmp/selfsigned.pem \
-subj "/C=US/ST=CA/L=L/O=OrgName/OU=IT Department/CN=example.com"
kong_admin_curl -X POST http://localhost:8001/certificates \
-F "cert=$(cat /tmp/selfsigned.pem)" \
-F "key=$(cat /tmp/selfsigned.key)" \
-F "snis=example.com"
HTTP/1.1 201 Created
...
kong_admin_curl -i -X POST http://localhost:8001/apis \
-d "name=ssl-api" \
-d "upstream_url=http://gateway:8080" \
-d "hosts=example.com"
HTTP/1.1 201 Created
...
Verify that the cert is now in use. Note the '-k' parameter is just here to work around the fact that we are using self signed certs.
curl -k https://localhost:8443/function/func_echoit \
-d 'hello world' -H 'Host: example.com '\
-H 'Authorization: Basic YWxhZGRpbjpPcGVuU2VzYW1l'
hello world
Between OpenFaaS and Kong a lot of ports are exposed on your host machine. Most importantly you should hide port 8080 since that is where OpenFaaS's functions live which you were trying to secure in the first place. In the end it is best to only expose either 8000 or 8443 out of your network depending if you added SSL or not.
Another option concerning port 8000 is to expose both 8000 and 8443 and enable https_only which is used to notify clients to upgrade to https from http.