arrow_back

Apigee Lab 10: Handling Faults

ログイン 参加
700 以上のラボとコースにアクセス

Apigee Lab 10: Handling Faults

ラボ 1時間 30分 universal_currency_alt クレジット: 5 show_chart 入門
info このラボでは、学習をサポートする AI ツールが組み込まれている場合があります。
700 以上のラボとコースにアクセス

Overview

In this lab, you learn about handling faults in an Apigee proxy.

Objectives

In this lab, you learn how to perform the following tasks:

  • Rewrite an error for a fault generated by a policy.
  • Manually raise a fault, specifying the error response.
  • Allow only approved operations through to the target.

Setup

For each lab, you get a new Google Cloud project and set of resources for a fixed time at no cost.

  1. Sign in to Qwiklabs using an incognito window.

  2. Note the lab's access time (for example, 1:15:00), and make sure you can finish within that time.
    There is no pause feature. You can restart if needed, but you have to start at the beginning.

  3. When ready, click Start lab.

  4. Note your lab credentials (Username and Password). You will use them to sign in to the Google Cloud Console.

  5. Click Open Google Console.

  6. Click Use another account and copy/paste credentials for this lab into the prompts.
    If you use other credentials, you'll receive errors or incur charges.

  7. Accept the terms and skip the recovery resource page.

Activate Google Cloud Shell

Google Cloud Shell is a virtual machine that is loaded with development tools. It offers a persistent 5GB home directory and runs on the Google Cloud.

Google Cloud Shell provides command-line access to your Google Cloud resources.

  1. In Cloud console, on the top right toolbar, click the Open Cloud Shell button.

  2. Click Continue.

It takes a few moments to provision and connect to the environment. When you are connected, you are already authenticated, and the project is set to your PROJECT_ID. For example:

gcloud is the command-line tool for Google Cloud. It comes pre-installed on Cloud Shell and supports tab-completion.

  • You can list the active account name with this command:
gcloud auth list

Output:

Credentialed accounts: - @.com (active)

Example output:

Credentialed accounts: - google1623327_student@qwiklabs.net
  • You can list the project ID with this command:
gcloud config list project

Output:

[core] project =

Example output:

[core] project = qwiklabs-gcp-44776a13dea667a6 Note: Full documentation of gcloud is available in the gcloud CLI overview guide .

Preloaded assets

These assets have already been added to the Apigee organization:

  • The retail-v1 API proxy
  • The oauth-v1 API proxy (for generating OAuth tokens)
  • The backend-credentials shared flow (used by retail-v1)
  • The TS-Retail target server in the eval environment (used by retail-v1)

These assets will be added to the Apigee organization as soon as the runtime is available:

  • The API products, developer, and developer app (used by retail-v1)
  • The ProductsKVM key value map in the eval environment (used by backend-credentials)
  • The ProductsKVM key value map entries backendId and backendSecret

The highlighted items are used during this lab.

Note: Revision 1 of the retail-v1 proxy is marked as deployed, and is immutable. If you ever make a mistake in your proxy code that you can't recover from, you can select revision 1 and restart editing from there.

Task 1. Rewrite the error generated by the JSONThreatProtection policy

In this task, you add a FaultRule to handle a JSONThreatProtection policy fault and rewrite the error message.

Pin the Apigee console page

  1. In the Google Cloud console, on the Navigation menu (), look for Apigee in the Pinned Products section.

    The Apigee console page will open.

  2. If Apigee is not pinned, search for Apigee in the top search bar and navigate to the Apigee service.

  3. Hover over the name, then click the pin icon ().

    The Apigee console page will now be pinned to the Navigation menu.

Create a FaultRule

  1. On the left navigation menu, select Proxy development > API proxies.

  2. Select the retail-v1 proxy.

  3. Click the Develop tab.

    You are modifying the version of the retail-v1 proxy that was created during Labs 1 through 9.

  4. In the Navigator pane, click Proxy endpoints > default.

  5. Click on the default proxy endpoint in the Navigator.

    In the default.xml pane, you see the XML representation of the default proxy endpoint. In the file you might see an empty FaultRules element: <FaultRules/>.

  6. If you have an empty FaultRules element (<FaultRules/>) in default.xml, delete that line.

  7. Create a new FaultRules element at the same location, inside the ProxyEndpoint element:

    <FaultRules> <FaultRule name="JSONThreat"> <Condition>jsonattack.JSONTP-Protect.failed == true</Condition> </FaultRule> </FaultRules>

    This is a fault rule that is executed when the JSONThreatProtection policy raises a fault. The policy name in the condition (JSONTP-Protect) must exactly match the name of the JSONThreatProtection policy in your proxy. Fault variables that are generated by the JSONThreatProtection policy are listed in the documentation for the policy.

Rewrite the error message using an AssignMessage policy

The FaultRules flows do not show up in the graphical representation of the proxy endpoint, so you will need to create a policy without attaching it to a flow, and then add it to the XML.

  1. In the Navigator pane, for Policies, click Add Policy (+).

  2. In the Create policy pane, for Select policy, select Mediation > Assign Message.

  3. Specify the following values:

    Property Value
    Name AM-400JSONThreat
    Display name AM-400JSONThreat
  4. Click Create.

  5. Click on Policies > AM-400JSONThreat.

  6. Replace the AssignMessage configuration with:

    <AssignMessage continueOnError="false" enabled="true" name="AM-400JSONThreat"> <AssignVariable> <Name>jsonThreatErrorRegex</Name> <Value>JSONThreatProtection\[JSONTP-Protect\]\: Execution failed. reason\: JSONThreatProtection\[JSONTP-Protect\]\: </Value> </AssignVariable> <Set> <Payload contentType="application/json">{ "error":"Invalid JSON payload: {replaceFirst(error.message,jsonThreatErrorRegex,'')}" } </Payload> <StatusCode>400</StatusCode> <ReasonPhrase>Bad Request</ReasonPhrase> </Set> <IgnoreUnresolvedVariables>true</IgnoreUnresolvedVariables> <AssignTo createNew="false" transport="http" type="response"/> </AssignMessage>

    This policy rewrites the error response that was generated by the JSONThreatProtection policy. The status code is set to 400 Bad Request, which is more appropriate than the default status code provided by the policy (500 Internal Server Error).

    The replaceFirst template inside the payload is used to strip off the beginning of the error message. error.message for this policy looks like this:

    JSONThreatProtection[JSONTP-Protect]: Execution failed. reason: JSONThreatProtection[JSONTP-Protect]: Exceeded array element count at line 1

    The square brackets ([ ]) and colons (:) in the regular expression must be escaped by using a backslash because they are reserved characters in regular expressions.

  7. In the Navigator pane, click Proxy endpoints > default.

  8. Insert the following step inside the FaultRule element:

    <Step> <Condition>fault.name Matches "ExecutionFailed"</Condition> <Name>AM-400JSONThreat</Name> </Step>

    The final FaultRules section in the ProxyEndpoint looks like this:

    <FaultRules> <FaultRule name="JSONThreat"> <Condition>jsonattack.JSONTP-Protect.failed == true</Condition> <Step> <Condition>fault.name Matches "ExecutionFailed"</Condition> <Name>AM-400JSONThreat</Name> </Step> </FaultRule> </FaultRules>
  9. Click Save, and then click Save as New Revision.

Task 2. Validate incoming requests

In this task you raise a fault if the request is not correct.

You may have noticed that if you do not pass a Content-Type header set to application/json, the JSONThreatProtection policy will not validate the request.

To prevent this scenario, you should raise a fault if the Content-Type header is required but not correctly specified.

Create a conditional RaiseFault policy

  1. In the Navigator pane, click Proxy endpoints > default > createOrder.

  2. In the createOrder request flow, click Add Policy Step (+).

  3. In the Add policy step pane, select Create new policy, and then select Mediation > Raise Fault.

  4. Specify the following values:

    Property Value
    Name RF-InvalidContentType
    Display name RF-InvalidContentType
    Condition request.header.Content-Type != "application/json"
  5. Click Add.

  6. In the Navigator pane, click Policies > RF-InvalidContentType.

  7. Change the RF-InvalidContentType policy configuration to:

    <RaiseFault continueOnError="false" enabled="true" name="RF-InvalidContentType"> <FaultResponse> <Set> <Headers/> <Payload contentType="application/json">{ "error":"Content-Type header must be application/json" } </Payload> <StatusCode>400</StatusCode> <ReasonPhrase>Bad Request</ReasonPhrase> </Set> </FaultResponse> <IgnoreUnresolvedVariables>true</IgnoreUnresolvedVariables> </RaiseFault> Note: Because you are setting the desired response in this policy, you do not need to create a corresponding FaultRule.
  8. In the Navigator pane, click Proxy endpoints > default > createOrder.

  9. In the Request createOrder flow*, select the the RaiseFault policy and drag it so it precedes the JSONThreatProtection policy:

    The createOrder flow XML should now look like this:

    <Flow name="createOrder"> <Description>Create a new order</Description> <Request> <Step> <Condition>request.header.Content-Type != "application/json"</Condition> <Name>RF-InvalidContentType</Name> </Step> <Step> <Name>JSONTP-Protect</Name> </Step> </Request> <Response/> <Condition>(proxy.pathsuffix MatchesPath "/orders") and (request.verb = "POST")</Condition> </Flow>
  10. Click Save.

Task 3. Create a new default conditional flow to handle requests to invalid resources

In this task, you block all requests that don't match a conditional flow in the proxy endpoint request.

Add a new conditional flow

  1. In the Navigator pane, click Proxy endpoints > default.

  2. In the graphical representation of the default proxy endpoint, click Add Conditional Flow (+):

  3. Set the following properties. Because the wizard does not allow you to create a flow without a condition, you will remove the condition manually:

    Property Value
    Flow Name 404NotFound
    Description Return 404 Not Found
    Condition Type select Custom
    Condition DELETE THIS
  4. Click Add.

  5. Remove the "DELETE THIS" condition from the 404NotFound flow. This flow should always be the last flow in the list of conditional flows. With no condition, the 404NotFound flow will always be executed if none of the previous flows are executed.

    After you remove the "DELETE THIS" condition, your 404NotFound flow should look like this:

    <Flow name="404NotFound"> <Description>Return 404 Not Found</Description> <Request/> <Response/> </Flow>

Add a new RaiseFault policy

  1. In the Navigator pane, click Proxy endpoints > default > 404NotFound.

  2. In the 404NotFound request flow, click Add Policy Step (+).

  3. In the Add policy step pane, select Create new policy, and then select Mediation > Raise Fault.

  4. Specify the following values:

    Property Value
    Name RF-404NotFound
    Display name RF-404NotFound
  5. Click Add.

  6. In the Navigator pane, click Policies > RF-404NotFound.

  7. Change the RF-404NotFound policy configuration to:

    <RaiseFault continueOnError="false" enabled="true" name="RF-404NotFound"> <FaultResponse> <Set> <Headers/> <Payload contentType="application/json">{ "error":"Invalid request: {request.verb} {proxy.basepath}{proxy.pathsuffix}" } </Payload> <StatusCode>404</StatusCode> <ReasonPhrase>Not Found</ReasonPhrase> </Set> </FaultResponse> <IgnoreUnresolvedVariables>true</IgnoreUnresolvedVariables> </RaiseFault>
  8. Click Save, and then click Deploy.

  9. To specify that you want the new revision deployed to the eval environment, select eval as the Environment, and then click Deploy.

  10. Click Confirm.

Check deployment status

A proxy that is deployed and ready to take traffic will show a green status on the Overview tab.

When a proxy is marked as deployed but the runtime is not yet available and the environment is not yet attached, you may see a red warning sign. Hold the pointer over the Status icon to see the current status.

If the proxy is deployed and shows as green, your proxy is ready for API traffic. If your proxy is not deployed because there are no runtime pods, you can check the provisioning status.

Check provisioning status

  • In Cloud Shell, to confirm that the runtime instance has been installed and the eval environment has been attached, run the following commands:

    export PROJECT_ID=$(gcloud config list --format 'value(core.project)'); echo "PROJECT_ID=${PROJECT_ID}"; export INSTANCE_NAME=eval-instance; export ENV_NAME=eval; export PREV_INSTANCE_STATE=; echo "waiting for runtime instance ${INSTANCE_NAME} to be active"; while : ; do export INSTANCE_STATE=$(curl -s -H "Authorization: Bearer $(gcloud auth print-access-token)" -X GET "https://apigee.googleapis.com/v1/organizations/${PROJECT_ID}/instances/${INSTANCE_NAME}" | jq "select(.state != null) | .state" --raw-output); [[ "${INSTANCE_STATE}" == "${PREV_INSTANCE_STATE}" ]] || (echo; echo "INSTANCE_STATE=${INSTANCE_STATE}"); export PREV_INSTANCE_STATE=${INSTANCE_STATE}; [[ "${INSTANCE_STATE}" != "ACTIVE" ]] || break; echo -n "."; sleep 5; done; echo; echo "instance created, waiting for environment ${ENV_NAME} to be attached to instance"; while : ; do export ATTACHMENT_DONE=$(curl -s -H "Authorization: Bearer $(gcloud auth print-access-token)" -X GET "https://apigee.googleapis.com/v1/organizations/${PROJECT_ID}/instances/${INSTANCE_NAME}/attachments" | jq "select(.attachments != null) | .attachments[] | select(.environment == \"${ENV_NAME}\") | .environment" --join-output); [[ "${ATTACHMENT_DONE}" != "${ENV_NAME}" ]] || break; echo -n "."; sleep 5; done; echo "***ORG IS READY TO USE***";

    When the script returns ORG IS READY TO USE, you can proceed to the next steps.

While you are waiting

While you wait, learn more by reviewing:

Task 4. Test the retail API

In this task, you validate the three changes you made to the proxy.

Test the API proxy using private DNS

The eval environment in the Apigee organization can be called using the hostname eval.example.com. The DNS entry for this hostname has been created within your project, and it resolves to the IP address of the Apigee runtime instance. This DNS entry has been created in a private zone, which means it is only visible on the internal network.

Cloud Shell does not reside on the internal network, so Cloud Shell commands cannot resolve this DNS entry. A virtual machine (VM) within your project can access the private zone DNS. A virtual machine named apigeex-test-vm was automatically created for this purpose. You can make API proxy calls from this machine.

The curl command will be used to send API requests to an API proxy. The -k option for curl tells it to skip verification of the TLS certificate. For this lab, the Apigee runtime uses a self-signed certificate. For a production environment, you should use certificates that have been created by a trusted certificate authority (CA).

  1. In Cloud Shell, open a new tab, and then open an SSH connection to your test VM:

    TEST_VM_ZONE=$(gcloud compute instances list --filter="name=('apigeex-test-vm')" --format "value(zone)") gcloud compute ssh apigeex-test-vm --zone=${TEST_VM_ZONE} --force-key-file-overwrite

    The first gcloud command retrieves the zone of the test VM, and the second opens the SSH connection to the VM.

  2. If asked to authorize, click Authorize.

    For each question asked in the Cloud Shell, click Enter or Return to specify the default input.

    Your logged in identity is the owner of the project, so SSH to this machine is allowed.

    Your Cloud Shell session is now running inside the VM.

Store the app's key in a shell variable

The API key may be retrieved directly from the app accessible on the Publish > Apps page. It can also be retrieved via Apigee API call.

  • In the Cloud Shell SSH session, run the following command:

    export PROJECT_ID=$(gcloud config list --format 'value(core.project)'); echo "PROJECT_ID=${PROJECT_ID}" export API_KEY=$(curl -q -s -H "Authorization: Bearer $(gcloud auth print-access-token)" -X GET "https://apigee.googleapis.com/v1/organizations/${PROJECT_ID}/developers/joe@example.com/apps/retail-app" | jq --raw-output '.credentials[0].consumerKey'); echo "export API_KEY=${API_KEY}" >> ~/.bashrc; echo "API_KEY=${API_KEY}"

    This command retrieves a Google Cloud access token for the logged-in user, sending it as a Bearer token to the Apigee API call. It retrieves the retail-app app details as a JSON response, which is parsed by jq to retrieve the app's key. That key is then put into the API_KEY environment variable, and the export command is concatenated onto the .bashrc file which runs automatically when starting a the SSH session.

    Note: If you run the command and it shows API_KEY=null, the runtime instance is probably not yet available.

Test the JSONThreatProtection policy error

When a POST /orders payload exceeds the limits specified in the JSONTP-Protect JSONThreatProtection policy, the error should now be simpler.

  • In the Cloud Shell SSH session, execute this curl command:

    curl -i -k -H "Content-Type: application/json" -H "apikey: ${API_KEY}" -X POST "https://eval.example.com/retail/v1/orders" -d \ '{ "orderNumber": 342345, "lineItems": [ { "productId": "ME089LLA", "quantity": 1 }, { "productId": "MD388LLA", "quantity": 2 }, { "productId": "ME761LLB", "quantity": 3 }, { "productId": "MD878LLA", "quantity": 4 } ], "promisedDeliveryDate": "30 Oct 2020", "deliveryNotes": "If not home, please place inside backyard gate", "destination": { "addressType": "home", "address": { "streetAddr1": "1 Main St." } } }'

    This payload contains an array with four product objects, but only three array elements are allowed by the JSONTP-Protect policy.

    If you rewrote the error message correctly, this clean error message should be displayed:

    { "error": "Invalid JSON payload: Exceeded array element count at line 7" }

    Your fault rule is not successfully rewriting the error if your error looks like this:

    { "fault": { "faultstring": "JSONThreatProtection[JSONTP-Protect]: Execution failed. reason: JSONThreatProtection[JSONTP-Protect]: Exceeded array element count at line 7", "detail": { "errorcode": "steps.jsonthreatprotection.ExecutionFailed" } } } Note: Use the debug tool to debug any issues.

Test the incorrect content type error

When the Content-Type header is not application/json, an error should be returned.

  • Test the call without a Content-Type header:

    curl -i -k -H "apikey: ${API_KEY}" -X POST "https://eval.example.com/retail/v1/orders" -d \ '{ "orderNumber": 342345, "lineItems": [ { "productId": "ME089LLA", "quantity": 1 }, { "productId": "MD388LLA", "quantity": 2 }, { "productId": "ME761LLB", "quantity": 3 }, { "productId": "MD878LLA", "quantity": 4 } ], "promisedDeliveryDate": "30 Oct 2020", "deliveryNotes": "If not home, please place inside backyard gate", "destination": { "addressType": "home", "address": { "streetAddr1": "1 Main St." } } }'

    The proxy should now return a 400 Bad Request error, indicating that the Content-Type header must be application/json:

    { "error": "Content-Type header must be application/json" }

    If you use the debug tool to debug the proxy, the result is that the RF-InvalidContentType RaiseFault policy returns the error, and the JSONThreatProtection policy does not run.

    Note: Use the debug tool to debug any issues.

Test the 404 Not Found error

When a request does not match any existing conditional flows, a 404 Not Found error should be returned.

  • Test an invalid API request:

    curl -i -k -H "apikey: ${API_KEY}" -X GET "https://eval.example.com/retail/v1/tests"

    You should receive a 404 error:

    { "error": "Invalid request: GET /retail/v1/tests" } Note: If you add new flows using the UI + (add flow) button, the new flow will automatically be added to the end of the list of conditional flows. You must always ensure that the 404 flow is the last flow listed in the conditional flows.

Congratulations!

In this lab, you learned how to handle faults and manually raise faults.

End your lab

When you have completed your lab, click End Lab. Google Cloud Skills Boost removes the resources you’ve used and cleans the account for you.

You will be given an opportunity to rate the lab experience. Select the applicable number of stars, type a comment, and then click Submit.

The number of stars indicates the following:

  • 1 star = Very dissatisfied
  • 2 stars = Dissatisfied
  • 3 stars = Neutral
  • 4 stars = Satisfied
  • 5 stars = Very satisfied

You can close the dialog box if you don't want to provide feedback.

For feedback, suggestions, or corrections, please use the Support tab.

Copyright 2022 Google LLC All rights reserved. Google and the Google logo are trademarks of Google LLC. All other company and product names may be trademarks of the respective companies with which they are associated.

始める前に

  1. ラボでは、Google Cloud プロジェクトとリソースを一定の時間利用します
  2. ラボには時間制限があり、一時停止機能はありません。ラボを終了した場合は、最初からやり直す必要があります。
  3. 画面左上の [ラボを開始] をクリックして開始します

このコンテンツは現在ご利用いただけません

利用可能になりましたら、メールでお知らせいたします

ありがとうございます。

利用可能になりましたら、メールでご連絡いたします

1 回に 1 つのラボ

既存のラボをすべて終了して、このラボを開始することを確認してください

シークレット ブラウジングを使用してラボを実行する

このラボの実行には、シークレット モードまたはシークレット ブラウジング ウィンドウを使用してください。これにより、個人アカウントと受講者アカウントの競合を防ぎ、個人アカウントに追加料金が発生することを防ぎます。