Quick Start Guide - Binary

Let's host your first API on WSO2 API Microgateway using the WSO2 Microgateway runtime.

Before you begin...

Make sure to install and set up all the installation prerequisites.

Objectives

  • Generate an executable using WSO2 API Microgateway Toolkit
  • Run the API Microgateway
  • Invoke the sample API

Step 1 - Generate an executable using WSO2 API Microgateway Toolkit

Step 1.1 - Initialize a project

  1. Navigate to a preferred workspace folder using the command line. This is the location that is used to store the Microgateway project.
  2. Run the following command to create a project named "petstore" . This will create the folder structure for the artifacts to be included.  Use the -a option to include the API definition to the project as follows.

    Let's use the Petstore sample open API definition

    micro-gw init petstore -a <api definition path>
    micro-gw init petstore -a https://petstore.swagger.io/v2/swagger.json
  3. The project is now initialized. A directory by the name "petstore" has been created within the directory where you executed the init command.

    Note

    The folder structure is similar to the following.

    petstore
    ├── api_definitions
        └──swagger.json
    ├── conf
    │   └── deployment-config.toml
    ├── extensions
    │   ├── extension_filter.bal
    │   ├── startup_extension.bal
    │   └── token_revocation_extension.bal
    ├── grpc_definitions
    ├── interceptors
    ├── lib
    ├── policies.yaml

    Info

Step 1.2 - Build the project

  1. Use your command-line tool to navigate to where the project directory ("petstore") was created.  Execute the following command to build the project. A jar file ( petstore/target/petstore.jar ) is created to expose the API via WSO2 API
    Microgateway.

    micro-gw build petstore

    Info

    Here are the FAQs .

Step 2 - Run the API Microgateway

The executable jar file, which includes the API artifacts of the project, is used as input to the WSO2 API Microgateway runtime component in order to expose the APIs.

Follow the steps below to expose the APIs via WSO2 API Microgateway.

  1. Navigate to the <MGW_HOME>/bin directory. <MGW_HOME> is the installation directory of the WSO2 API Microgateway runtime

    cd <MGW_HOME>/bin
  2. Execute the following command to start WSO2 API Microgateway.

    gateway <path-to-MGW-jar-file>
    gateway /Users/kim/petstore-project/target/petstore-.jar
    [ballerina/http] started HTTPS/WSS listener 0.0.0.0:9096
    [ballerina/http] started HTTP/WS listener 0.0.0.0:9090
    2020-08-14 12:32:17,211 INFO  [wso2/gateway/src/gateway/utils] - [APIGatewayListener] [-] HTTP listener is active on port 9090
    2020-08-14 12:32:17,213 INFO  [wso2/gateway/src/gateway/utils] - [APIGatewayListener] [-] HTTPS listener is active on port 9095
    [ballerina/http] started HTTPS/WSS listener 0.0.0.0:9095

Step 3 - Invoke the sample API

Step 3.1 - Obtain a token

After the APIs are exposed via WSO2 API Microgateway, you can invoke an API with a valid token(JWT or opaque access token) or an API key.  Let's use WSO2 API Microgateway's API key endpoint to obtain an API key in order to access the API.

The below command will retrieve an APIKey token and set it to the shell variable TOKEN.

TOKEN=$(curl -X get "https://localhost:9095/apikey" -H "Authorization:Basic YWRtaW46YWRtaW4=" -k)

Info

  • You can obtain a JWT token from any third-party secure token service or via the WSO2 API Manager.
  • You can obtain an API Key easily from WSO2 API Microgateway. Follow the documentation to Obtain an API Key.
  • Alternatively, you can also use an opaque token to invoke the API.

For more information, see the FAQs on Working with Tokens .

Step 3.2 - Invoke the API

Execute the following cURL command to Invoke the API using the API key.

curl -X GET "https://<MGW-runtime-hostname>:<MGW-runtime-port>/<API-context>/<API-resource>" -H "accept:application/xml" -H "api_key:$TOKEN" -k
curl -X GET "https://localhost:9095/v2/pet/1" -H "accept: application/xml" -H "api_key:$TOKEN" -k

Note

You were able to invoke the API resource pet/{petId} using an API Key in api_key header because the resource is secured with API Key in API definition as follows. For more information, please refer to the documentation on API Key Authentication .

"paths": {
  "/pet/{petId}": {
    "get": {
      "security": [
        {
          "api_key": []
        }
      ]
    }
  }
},
"securityDefinitions": {
  "api_key": {
    "type": "apiKey",
    "name": "api_key",
    "in": "header"
  }
}

Top