Skip to content

Fabric Gateway

Fabric Gateway is a Kubernetes control plane for Skipper, the open-source HTTP router. It delivers a feature-rich API gateway that secures applications at the point of ingress to a Kubernetes cluster. It is a security-audited and scalable solution that makes it easy for developers to secure and monitor APIs at scale.

Gateway only

Configuration

Fabric Gateway is configured via a Kubernetes Custom Resource Definition (CRD) of kind FabricGateway. To enable for an application create the FabricGateway resource in your cluster.

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: my-app-gateway
spec:
  # Simple Mode with static Service
  x-fabric-service:
    - host: my-app.smart-product-platform-test.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  x-fabric-admins:
    - bmooney
    - fmoloney
    - cgallagher
    - jblogs
  paths:
    /api/resource:
      post:
        x-fabric-privileges:
          - "spp-application.write"
        x-fabric-ratelimits:
          default-rate: 10
          # Valid values are 'hour', 'minute' and 'second', defaults to 'minute' if omitted.
          period: minute
          target:
            stups_spp_service_name: 50
    /api/resource/*:
      get:
        x-fabric-privileges:
          - "spp-application.read"
      put:
        x-fabric-privileges:
          - "spp-application.write"
        x-fabric-ratelimits:
          default-rate: 10
      patch:
        x-fabric-privileges:
          - "spp-application.write"
        x-fabric-ratelimits:
          default-rate: 10
    /events:
      post:
        x-fabric-privileges:
          - "spp-application.read"

Gateway can be configured to work in Dynamic Mode with an external Kubernetes service provider such as StackSets, or in Simple Mode with a static service defined. See Dynamic Mode and Simple Mode sub-sections below.

N.B. If using FabricGateway to manage auth for your service, remove any existing ingress resources for your service. You should not have both as an existing ingress could allow unauthenticated traffic to your backend service.

Dynamic Mode - Externally Managed Services (eg StackSets)

In Dynamic Mode Fabric Gateway will work with an external operator that manages the creation of Kubernetes services. This is enabled by setting the x-external-service-provider key as per the below example.

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: stackset-managed-test
spec:
  x-external-service-provider:
    hosts:
      - stackset-managed-test.cluster.zalan.do
    stackSetName: <name-of-stackset-k8s-resource>
  paths:
    /resources:
      get: {}

In the above example, we are not defining any services (and it is illegal to define services via the x-fabric-service key if you have the x-external-service-provider set) in the Gateway resource. Instead, we are saying that these services will be provided by a StackSet operator. The created gateway will not generate any ingress resources until the named StackSet is present and has service details available.

Versioned Hosts

When using the stackset integration, the gateway will also configure a host for accessing each stack individually, ignoring traffic-switching. For example, if you have stacks my-stack-v1 and my-stack-v2 and the gateway operator has set VERSIONED_HOSTS_BASE_DOMAIN to cluster.zalan.do, you will be able to access the stacks at https://my-stack-v1.cluster.zalan.do and https://my-stack-v2.cluster.zalan.do respectively.

For these hosts:

  • All authorization, cors and other configured rules will still apply.
  • Rate-limiting is done by path and shared between hosts. This means you can use up the rate-limit by using any combination of versioned hosts and the main traffic-switched host. In the above example, hitting https://my-stack-v1.cluster.zalan.do/api, then https://my-stack-v2.cluster.zalan.do/api, then https://my-stack.cluster.zalan.do/api counts as 3 towards your rate-limit for the /api path.

Simple Mode - Static Service

In Simple Mode an existing Kubernetes service is declared in the FabricGateway resource. This is done by setting the x-fabric-service key as per the below example.

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: stackset-managed-test
spec:
  x-fabric-service:
    - host: my-app.smart-product-platform-test.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  paths:
    /resources:
      get: {}

For servicePort, you must specify a named port from your service definition. If you don’t specify servicePort, Fabric Gateway defaults to a port named ‘http’.
Below is an example of a service with a named port:

apiVersion: v1
kind: Service
metadata:
  labels:
    application: "{{ APPLICATION }}"
    version: "{{ VERSION }}"
  name: "{{ APPLICATION }}"
spec:
  selector:
    application: "{{ APPLICATION }}"
  type: ClusterIP
  ports:
    - name: http
      port: 80
      targetPort: 8080

Gateway Features

Fabric Gateway provides the following features.

Authentication

Fabric Gateway can be used in place of internal logic for authenticating access from other services using the Zalando IAM service. As we only accept service and employee tokens, the gateway is not a candidate for customer auth workflows. There will be a header added to the request, X-TokenInfo-Forward. This will contain the json response retrieved from from the Token Info endpoint, but only the fields uid, scope and realm.

Authorization

To confirm that each authenticated token is from a valid service or employee, the gateway will implicitly add a scope check for the uid scope. It is possible to add further scope restrictions to an endpoint by adding the scope name to the x-fabric-privileges key. For example if you have a privilege section for an endpoint defined as per below, then the token will need the implicit uid scope as well as both of the defined events.write and service.write scopes before it will be allowed to access the endpoint.

...
    /events:
      post:
        x-fabric-privileges:
          - "events.write"
          - "service.write"

Admin Access

Team members can be added to your x-fabric-admins list. The uids in this list will have access to all endpoints and will not be subject to rate-limiting or other authentication rules.

Rate Limiting

If a client of the gateway is getting rate limited, they will get a 429 HTTP response code. There will also be some headers included to indicate when they will be able to make requests again. Below is a sample rate limited response from the gateway.
The Retry-After header, shows the number of seconds before you may attempt a new request. The informational X-Rate-Limit header always shows the number of requests per hour which the client is allowed to make, regardless of which period is used when configuring the rate-limit.

curl -i -H "Authorization: Bearer $FDA" https://fgtestapp.smart-product-platform-test.zalan.do/limited/me

HTTP/2 429
date: Tue, 26 Mar 2019 12:05:51 GMT
content-type: text/plain; charset=utf-8
content-length: 18
retry-after: 53
server: Skipper
x-content-type-options: nosniff
x-rate-limit: 120

N.B. If you want to apply a service specific rate-limit, then the service name must be prepended with stups_. This can be seen in the x-fabric-ratelimits.target section of the main Configuration example above.

Encryption In Transit

The gateway (via the underlying Load Balancer) ensures that no requests are hitting your service unless they are encrypted using https. This is achieved at the Load Balancer which will respond with a 308 redirect to any non TLS traffic. This is an extra layer of security to ensure that people are not interacting with your service in an insecure manner.

An example request can be seen below:

curl -i -H "Authentication: Bearer $(ztoken)" http://fgtestapp.smart-product-platform-test.zalan.do/resources
HTTP/1.1 308 Permanent Redirect
Location: https://fgtestapp.smart-product-platform-test.zalan.do/resources
Server: Skipper
Date: Thu, 23 Sep 2021 07:40:00 GMT
Transfer-Encoding: chunked

Multiple Hosts

All created Skipper routes will match incoming requests first by their host.
If you have multiple hosts for a service, then each of these needs to be listed in the gateway resource.

Service Whitelisting

You can define either a global or a route-level whitelist for your gateway as per the below examples. What this means is that only services whose names are defined in the whitelist will be able to interact with your service. All other access requirements, i.e. scopes and rate limits, will still apply to the whitelisted service.

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: my-app-gateway
spec:
  x-fabric-service:
    - host: my-app.smart-product-platform-test.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  x-fabric-admins:
    - jblogs
  x-fabric-whitelist:
    - stups_some-whitelisted-service
  paths:
    /api/resource:
      get:
        x-fabric-privileges:
          - "spp-application.write"
      post:
        x-fabric-privileges:
          - "spp-application.write"
        # This is a more fine-grained whitelist and overrides the global whitelist. Only some-other-service can access this path.
        # This id is taken from the "sub" field of a JWT token. For a service, this value is always "stups_" followed by the application's Kio id.
        # some-whitelisted-service from the global whitelist cannot access this path.
        x-fabric-whitelist:
          service-list:
            - stups_some-other-service
      head:
        x-fabric-privileges:
          - "spp-application.read"
        # Another type of fine-grained whitelist over-ride is to disabled whitelisting altogether and allow any
        # service which has the correct scopes to access the route.
        x-fabric-whitelist:
          state: disabled
          service-list: []
    /api/resource/{resource_id}:
      put:
        # This whitelist config overrides the global whitelist and because of the empty whitelist
        # no other service will be able to access this route. i.e. Only defined admins would be able to access the
        # route
        x-fabric-whitelist:
          service-list: []

Employee Whitelisting

Employee tokens do not use scopes, so in order to allow certain employees access to an endpoint we must whitelist their uid. Note that this is different to Admin Access since admins are not subject to rate limits.
In the example below, we can see that the /api/resource get endpoint can be accessed by services with the spp-application.write scope or the employee whose uid is useruid. The service and the employee will be subject to a ratelimit of 5 requests per minute. It is also possible to whitelist all employee tokens for an endpoint. In the example of the /api/secondary-resource, we can see that the employee access type is set to allow_all. This means that all employee tokens will be allowed access to this endpoint in spite of any scope restrictions which are present. Each employee will still be subject to the 5 requests per second rate limit. N.B. It’s important to note that you cannot define a user-list if you have the access type set to allow_all.

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: my-app-gateway
spec:
  x-fabric-service:
    - host: my-app.smart-product-platform-test.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  paths:
    /api/resource:
      get:
        x-fabric-privileges:
          - "spp-application.write"
        x-fabric-employee-access:
          type: allow_list
          user-list:
            - useruid
        x-fabric-ratelimits:
          default-rate: 5
    /api/secondary-resource:
      get:
        x-fabric-privileges:
          - "spp-application.write"
        x-fabric-employee-access:
          type: allow_all
        x-fabric-ratelimits:
          default-rate: 5

CORS Support

For browser applications to communicate directly with an API, the API needs to support Cross-Origin Resource Sharing. The Gateway supports this by automatically adding an OPTIONS endpoint to each of your paths to handle browser Preflight Requests. The origins and headers you configure will be allowed in the response headers. Additionally, configuring cors support causes the Access-Control-Allow-Origin header to contain the request’s Origin if you have whitelisted it here.

Note: We do not allow * to be used as an allowed origin. Every Gateway API will want to allow the Authorization and Content-Type headers here, to allow auth tokens and the application/json Content-Type to be used.

In the example below, they gateway will generate an OPTIONS route for the /api/resources path. This will support preflighted requests for your listed HTTP verbs, allowedOrigins and allowedHeaders. Once the preflight is done, the actual request will also automatically have the right Access-Control-Allow-Origin header if the request Origin is allowed.

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: my-app-gateway
spec:
  x-fabric-service:
    - host: my-app.smart-product-platform-test.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  x-fabric-cors-support:
    allowedOrigins:
      - example.com
      - example-other.com
    allowedHeaders:
      - Authorization
      - Content-Type
      - X-Flow-Id
  paths:
    /api/resource:
      get:
        x-fabric-privileges:
          - "spp-application.write"

Compression

It is possible to enable compression of responses on Skipper. This is managed at a global level by the gateway by using the x-fabric-compression-support key. This enables you to set a compression factor for a specific content/type. This is explained in more detail in the Skipper docs. It’s important to note that whether or not the compression is applied is still dependant on the client providing the appropriate Accept-Encoding header, and will only be applied to service routes (i.e. not to admin routes).

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: my-app-gateway
spec:
  x-fabric-service:
    - host: my-app.cluster.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  x-fabric-compression-support:
    compressionFactor: 3
    encoding: application/json
  paths:
    /api/resource:
      get:
        x-fabric-privileges:
          - "spp-application.write"

Static Endpoint Response

A static response for a particular endpoint can be configured via x-fabric-static-response. This is primarily useful for testing or for blocking access to an endpoint temporarily. Admins will also receive this static response.

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: my-gateway
spec:
  x-fabric-service:
    - host: my-app.smart-product-platform-test.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  paths:
    /api/resource:
      post:
        x-fabric-static-response:
          status: 503
          headers:
            Content-Type: application/problem+json
          body: '{"title": "Service down for maintenance", "status": 503}'

Custom Filter Configuration

In some situations it’s desirable to have the ability to add extra Skipper filters into a gateway managed ingress which aren’t explicitly modeled in the Fabric Gateway Custom Resource Definition. To this end, the gateway operator allows the pass-through of an allow-list of filters which will be appended to the filters present in the proxy routes managed by the gateway operator. This is achieved through the use of an annotation on a gateway resource as outlined in the below example. As can be seen in the example, additional filters need to be populated in an annotation named: fabric/additional-filters and chained (in the usual Skipper manner) by using the -> delimiter.

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: my-app-gateway
  annotations:
    fabric/additional-filters: fadeIn("1m") -> tee("https://some-other-backend.zalandoapis.com/api")
spec:
  x-fabric-service:
    - host: my-app.my-cluster.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  paths:
    /api/resource:
      get:
        x-fabric-privileges:
          - "spp-application.read"

N.B. The addition of filters outside those generated by the gateway operator is inherently unsafe. Work has gone into the gateway operator to ensure that the combinations of filters and predicates used for requests do not result in unexpected behaviour for services, when adding in extra filters, it is impossible for the gateway operator to understand what impact this will have on routing of requests. Therefore, it is important to test any filter additions thoroughly in a staging environment before pushing these changes live.

Other

Path Matching

There are some rules around path matching in the gateway which are outlined below.

  • Dynamic path segments should be represented by either a * or a {named} parameter
  • Wildcard matching of multiple path segments can be performed by using **, the ** must be the last part of the path
  • The paths “/foo” and “/foo/” are not the same. This can be configured in skipper, but the K8s clusters do not have this configured and it would be a breaking change to configure it.

Examples of some valid and invalid paths are outlined below:

apiVersion: zalando.org/v1
kind: FabricGateway
metadata:
  name: my-app-gateway
spec:
  x-fabric-service:
    - host: my-app.smart-product-platform-test.zalan.do
      serviceName: my-app-service-name
      servicePort: http
  x-fabric-admins:
    - jblogs
  paths:
    # This is an exact path match. The only URI that will be matched is a GET request against `/api/resource`
    /api/resource:
      get:
        x-fabric-privileges:
          - "spp-application.read"
    # Match a path which has a dynamic segment. This will match any identifer for the resource
    # e.g. /api/resource/123 /api/resource/abc-123 etc...
    # However this will only match a single path segment so the below would not be matched
    # /api/resource/123/sub-resource
    /api/resource/*:
          get:
            x-fabric-privileges:
              - "spp-application.read"
    # This is the exact same as the above dynamic segment matching, except that the segment is named.
    # The name of the segment currently has no extra significance
    /api/resource/{resource_id}:
          get:
            x-fabric-privileges:
              - "spp-application.read"
    # The double * is a wildcard match. This wildcard will match across multiple segments in the URI
    # For example the following paths would be successfully matched:
    # e.g. /api/someresource/123 /api/someresource/123/sub-resource /api/someresource/123/sub-resource/123
    /api/someresource/**:
      get:
        x-fabric-privileges:
          - "spp-application.read"
    # There is a requirement for ** to be at the end of the path. The below path key would be considered
    # invalid
    /api/someresource/**/subkey:
      get:
        x-fabric-privileges:
          - "spp-application.read"