serverless-wso2-apim v0.7.2
serverless-wso2-apim
Serverless Framework plugin to manage APIs on WSO2 API Manager.
Compatible with
- Serverless Framework 1.75 and higher
- Node.js 14 and lower
- WSO2 API Manager 2.6.0
- WSO2 API Manager 3.2.0
Features
- Create, Update and Publish your API definitions via
sls deploy. - Manage your API definitions via
sls infoandsls remove. - Supports
HTTPandJMSbackends with mediation policies & additional API properties. - Uploads backend certificates (including CAs) to enable HTTP/s connectivity with backends.
- Supports
Swagger 2.0andOpenAPI 3.0specifications and will publish them to WSO2 Store / Dev Portal. - Automatically detects the version of WSO2 API Manager running.
Install Plugin
Discover it on npmjs.com @ here
yarn add -D serverless-wso2-apimornpm install --save serverless-wso2-apimThen in
serverless.ymladd following entry to the plugins array:plugins: - serverless-wso2-apim
Using the Plugin
Make sure you have a Serverless project set up as described here.
Add configuration options to your Serverless configuration, as below.
custom: wso2apim: enabled: true host: "wso2-apimanager.com" port: 443 user: "user@tenant" pass: "password" gatewayEnv: "Production and Sandbox"Add one or more API definitions to your Serverless configuration, as below.
serverless.yml:custom: wso2apim: apidefs: - myAwesomeAPI: # Your API Definition Identifier name: "MyAwesomeAPI" # (CANNOT BE UPDATED LATER) Your API Name version: "v1" # (CANNOT BE UPDATED LATER) Your API Version, which also forms a part of the API URL ultimately rootContext: "/myawesomeapi" # (CANNOT BE UPDATED LATER) Your API Context, which will be exposed by WSO2 API Gateway. Must be unique per Gateway Environment. description: "My Awesome API" visibility: "PUBLIC" backend: http: # HTTP-based Backends baseUrl: "https://backend:port/123" certChain: "file://certs/backend.cer" mediationPolicies: # Optional in: "log_in_message" out: "None" fault: "None" apiProperties: # Optional "property1": "value1" "property2": "value2" maxTps: 100 tags: - my-awesome-api - awesomeness swaggerSpec: # Swagger 2.0 / OpenAPI 3.0 specification in YMLRun
sls deployto create-and-publish (or) update-and-republish API definitions (and associated backend certificates, if supplied) in WSO2 API Manager.Run
sls infoto view the status of API deployment on WSO2 API Manager.Run
sls removeto delete API definitions (and associated backend certificates, if exists) when there are no active subscriptions exist on those APIs.
Configuration Reference
custom.wso2apim.*
Parameter What? Usage Example enabledDefault is true. When set tofalseexplicitly, deployment of APIs on WSO2 will be skipped. Suitable for offline testing etc.truehostWSO2 API Manager Hostname wso2-apimanager.comportWSO2 API Manager Port 443userUsername with an optional tenant symbol. user@tenantpassPassword, supports Serverless Variables syntax. xxxgatewayEnvTarget gateway environment, as configured in your WSO2 installation. Production and Sandbox
custom.wso2apim.apidefs.<Your-API>.*
Parameter What? Usage Example name(CANNOT BE UPDATED LATER) Your API Name MyAwesomeAPIversion(CANNOT BE UPDATED LATER) Your API Version, which also forms a part of the API URL ultimately. v1rootContext(CANNOT BE UPDATED LATER) Your API Context, which will be exposed by WSO2 API Gateway. Must be unique per Gateway Environment. /myawesomeapidescriptionFree-form text My Awesome APIvisibilitySupports PUBLIC(Visible to everyone) andPRIVATE(Visible to current tenant). Kept in the api for backwards compatibility. Please use fields forsubscriberVisibilityandpublisherVisibility.PUBLICsubscriberVisibilityVisibility of the API in the developer portal. Supports PUBLIC(Visible to everyone) andPRIVATE(Visible to current tenant) andRESTRICTED(Visible to it's tenant domain and only to the user roles that you specify. You should provide the roles in thesubscriberVisibilityRoles.).RESTRICTEDsubscriberVisibilityRolesThe user roles that are able to access the API in Store. Only applicable in combination with subscriberVisibility.adminpublisherVisibilityVisibility of the API in the publisher portal. Supports PRIVATE(Visible to all logged in publishers/creators) andRESTRICTED(Visible to logged in publishers/creators with the roles that you specify. You should provide the roles in thepublisherVisibilityRoles.).RESTRICTEDpublisherVisibilityRolesThe user roles that are able to access the API in Store. Only applicable in combination with publisherVisibility.adminbackendSupports httpandjmsbackends. Note: One API definition supports only one backend.backend.http.baseUrlYour HTTP backend base URL. It supports: a. URL - Any valid HTTP URL. b. AWS CloudFormation Export - Exported value must contain a valid HTTP URL. This value is only being used for the Production Endpoint, the Sandbox Endpoint is not supported anymore https://backend:port/123(or)!ImportValue xxbackend.http.certChainOptional, your backend certificate chain in PEM (base64) format. It supports: a. File system - Path must be relative to where serverless.ymlis located. b. AWS Certificate ARN c. AWS CloudFormation Export - Exported value must contain a valid AWS Certificate ARN.file://certs/backend.cer(or)arn:aws:acm:..(or)!ImportValue xxbackend.jms.destinationYour JMS Destination (queue or topic name) MY.BACKEND.TOPICbackend.jms.parametersList of JMS connection parameters to be used in key:valueform as described here.transport.jms.ConnectionFactory: 'My-ConnectionFactory'backend.endpointTypeOptional, defaults to http. If you are using a non standard WSO2 extension, you might want to be able to override this.http,jms,lambdasecuritySchemeOptional, defaults to oath2. Supportsmutualssl,oauth2,apiKeyandbasicAuth. .securityScheme.mutualsslRequires securityScheme.mutualssl.enabledandsecurityScheme.mutualssl.clientCertto be defined. .securityScheme.mutualssl.clientCertRequired with mutualssl, your client certificate chain in PEM (base64) format. It supports: a. File system - Path must be relative to where serverless.ymlis located. b. AWS Certificate ARN c. AWS CloudFormation Export - Exported value must contain a valid AWS Certificate ARN.file://certs/backend.cer(or)arn:aws:acm:..(or)!ImportValue xxsecurityScheme.mutualssl.enabledRequired with securityScheme.mutualssl. Expectstrueorfalse.securityScheme.oauth2Requires securityScheme.oauth2.enabledto be defined. .securityScheme.oauth2.enabledRequired with securityScheme.oauth2. Expectstrueorfalse.securityScheme.oauth2.mandatoryOptional with securityScheme.oauth2. Expectstrueorfalse.securityScheme.oauth2.keyManagerOptional with securityScheme.oauth2. Array of keys to be used by APIsecurityScheme.apiKeyRequires securityScheme.apiKey.enabledto be defined. .securityScheme.apiKey.enabledRequired with securityScheme.apiKey. Expectstrueorfalse.securityScheme.basicAuthRequires securityScheme.basicAuth.enabledto be defined. .securityScheme.basicAuth.enabledRequired with securityScheme.basicAuth. Expectstrueorfalse.mediationPoliciesOptional, your choice of mediation policies (or) sequences. They can manipulate input/output/fault messages as described here. mediationPolicies.inInput mediation policy, it manipulates the request going to your backend. log_in_messagemediationPolicies.outOutput mediation policy, it manipulates the response going back to your API consumer. json_validatormediationPolicies.faultFault mediation policy, it manipulates the fault handling. NoneapiPropertiesOptional, List of API properties to be used in key:valueform as described here.'property1': 'value1'maxTpsMax. Transactions per second, used for throttling. 100corsOptional, a CORS configuration to enable. Omit this property to disable CORS. See below for properties. cors.originsString array of allowed origins. Default: ['*']cors.headersString array of allowed headers. Default: ['Authorization', 'Access-Control-Allow-Origin', 'Content-Type', 'SOAPAction']cors.methodsString array of allowed methods. Default: ['GET', 'PUT', 'POST', 'DELETE', 'PATCH', 'OPTIONS']cors.credentialsAllow credentials (boolean). Default: falsetruetagsTags as an array that show up in WSO2 console. businessInformationOptional, business contact information to the APIs. When specified, it will overwrite the values specified in swaggerSpec.info.contact.emailandswaggerSpec.info.contact.namepropertiesbusinessInformation.businessOwnerOptional, business owner name businessInformation.technicalOwnerOptional, technical owner name businessInformation.businessOwnerEmailOptional, business owner email businessInformation.technicalOwnerEmailOptional, technical owner email swaggerSpecSwagger 2.0 / OpenAPI 3.0 specification in YML
💡Tip : Organize your project files efficiently.
You can spread the configuration across multiple files, so you can manage it better. Bonus, you can use linters and validators effectively on your swaggerSpec.
serverless.yml:
custom:
wso2apim:
apidefs:
- ${file('./myAwesomeAPI.yml')}myAwesomeAPI.yml:
name: "MyAwesomeAPI"
version: "v1"
rootContext: "/myawesomeapi"
---
swaggerSpec: ${file(./myAwesomeAPI.swagger.yml)}myAwesomeAPI.swagger.yml:
openapi: 3.0.0
info:
contact:
name: The Awesome Team
email: xx@xx.com
paths:
/pet:
post:
summary: Add a new pet to the store
responses:
"201":
description: Pet created
"405":
description: Invalid inputWhat's coming up?
- For a full list of backlog items, click here
Need Help?
- Create an issue here
License
12 months ago
12 months ago
1 year ago
1 year ago
1 year ago
1 year ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
2 years ago
3 years ago
3 years ago
2 years ago
3 years ago
3 years ago
3 years ago
3 years ago
3 years ago
4 years ago
4 years ago
4 years ago
4 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
