- Overview
- Deploying a business application with microservices
- Working directory
- Configurations
- Routes
- Replacements
- xs-app.json configuration file
- welcomeFile property
- authenticationMethod property
- routes property
- login property
- logout property
- destinations property
- services property
- compression property
- pluginMetadataEndpoint property
- whitelistService property
- websockets property
- errorPage property
- Complete example of an xs-app.json configuration file
- Headers
- CSRF Protection
- Connectivity
- SaaS Application Registration in CF
- Integration with HTML5 Application Repository
- Integration with Business Services
- Web Sockets
- Session Handling
- Service to Application Router (Beta version)
- Central Logout
- Whitelist Service
- Scaling
- Sizing Guide for Application Router
- Configure server-side HTTPS
- Audit-Log Service
- Troubleshooting
- Extending Application Router
- Best practices
When a business application consists of several different apps (microservices), the application router is used to provide a single entry point to that business application. It has the responsibility to:
- Dispatch requests to backend microservices (reverse proxy)
- Authenticate users
- Serve static content
Let's think of the different apps (microservices) as destinations to which the incoming request will be forwarded. The rules that determine which request should be forwarded to which destination are called routes. For every destination there can be more than one route. You may read more on the concept of routes later in this document. If the backend microservices require authentication, the application router can be configured to authenticate the users and propagate the user information. Again by using routes, the application router can serve static content.
The application router is designed to work in XS Advanced - Cloud Foundry and XS OnPremise Runtime.
A calling component accesses a target service by means of the application router only if there is no JWT token available, for example, if a user invokes the application from a Web browser. If a JWT token is already available, for example, because the user has already been authenticated, or the calling component uses a JWT token for its own OAuth client, the calling component calls the target service directly; it does not need to use the application router.
Note that the application router does not hide the backend microservices in any way. They are still directly accessible bypassing the application router. So the backend microservices must protect all their endpoints by validating the JWT token and implementing proper scope checks. Network isolation is not provided currently by the platform.
For example we can have a business application that has the following structure:
+-- manifest.yml +-- manifest-op.yml | +-- microservice-1 | | +-- ... | | +-- ... | +-- microservice-2 | | +-- ... | | +-- ... | +-- web | | +-- ... | | +-- ...
The manifest.yml file is used to deploy the business application on Cloud Foundry and the manifest-op.yml - on the XS OnPremise Runtime. These files should describe all the microservices for that business application.
Folders are used to isolate the different microservices. Let's assume that the application router is the microservice in the web folder (every business application has its own application router). Here is how we can include the application router:
- Manually create the node_modules folder in the web folder.
- Copy and paste the folder that contains the self-contained application router into node_modules. In this example the name of that folder is @sap/approuter, see the start script in the package.json below.
- Check the version of the application router you just copied.
- Create a package.json file in web with content similar to the following and replace the version's value with the version of your application router:
{
"name": "hello-world-approuter",
"dependencies": {
"@sap/approuter": "2.6.1"
},
"scripts": {
"start": "node node_modules/@sap/approuter/approuter.js"
}
}
In order to use the application router you don't have to write any JavaScript code. Only some configurations have to be provided in the web folder. Here is a complete example:
+-- web | +-- package.json | +-- xs-app.json | +-- resources | | +-- hello-world.html | | +-- my-page.html | +-- node_modules | | +-- ... | +-- default-env.json | +-- default-services.json
The web folder contains the package.json, node_modules, some configuration files used by the application router, and static resources to be served. You can read more about the configurations later in this document.
By default, the application router runs on port 5000 (if started locally) or it takes the port from the PORT
environment variable.
The working directory contains configuration files that the application router needs and static resources that can be served at runtime. In the previous example, the web folder is the working directory. By default the current directory is the working directory. It is possible to configure it during start up of the application router with the following command line argument:
node approuter.js -w <working-dir>
Application router will abort if the working directory does not contain xs-app.json file.
The application router makes use of the following configurations:
-
Main configuration - this is the xs-app.json file. This file is mandatory and contains the main configurations of the application router.
-
UAA configuration - the application router reads this configuration either from the
VCAP_SERVICES
environment variable (when deployed on Cloud Foundry or XS Advanced OnPremise Runtime) or from the default-services.json file (when running locally). Refer to the documentation of the@sap/xsenv
package for more details. -
Configurations from the environment - these configurations are either read from the application router's environment (when deployed on Cloud Foundry or XS Advanced OnPremise Runtime) or from the default-env.json file (when running locally). Refer to the documentation of the
@sap/xsenv
package for more details. The environment variables that the application router takes into account are:
Configuration | Environment variable | Description |
---|---|---|
UAA service name | UAA_SERVICE_NAME |
Contains the name of the UAA service to be used. |
Destinations | destinations |
Provides information about the available destinations. |
Additional headers | httpHeaders |
Provides headers that the application router will return to the client in its responses. |
Additional cookies | COOKIES |
Provides cookies that the application router will return to the client in its responses. Currently only SameSite cookie is supported. |
Plugins | plugins |
A plugin is just like a route except that you can't configure some inner properties. |
Session timeout | SESSION_TIMEOUT |
Positive integer representing the session timeout in minutes. The default timeout is 15 minutes. |
X-Frame-Options | SEND_XFRAMEOPTIONS , httpHeaders |
Configuration for the X-Frame-Options header value. |
Clickjack whitelist service | CJ_PROTECT_WHITELIST |
Configuration for the whitelist service preventing clickjack attacks. |
Web Sockets origins whitelist | WS_ALLOWED_ORIGINS |
Whitelist configuration used for verifying the Origin header of the initial upgrade request when establishing a web socket connection. |
JWT Token refresh | JWT_REFRESH |
The time in minutes before a JWT token expires and the application router should trigger a token refresh routine. |
Incoming connection timeout | INCOMING_CONNECTION_TIMEOUT |
Maximum time in milliseconds for a client connection. After that time the connection is closed. If set to 0, the timeout is disabled. Default: 120000 (2 min) |
Tenant host pattern | TENANT_HOST_PATTERN |
String containing a regular expression with a capturing group. The request host is matched against this regular expression. The value of the first capturing group is used as tenant id. |
Destination host pattern | DESTINATION_HOST_PATTERN |
String containing a regular expression with a capturing group. The request host is matched against this regular expression. The value of the capturing group is used as destination name. |
Compression | COMPRESSION |
Configuration regarding compressing resources before responding to the client. |
Secure flag of session cookie | SECURE_SESSION_COOKIE |
Can be set to true or false . By default, the Secure flag of the session cookie is set depending on the environment the application router runs in. For example, when application router is behind a router (Cloud Foundry's router or SAP Web Dispatcher) that is configured to serve HTTPS traffic, then this flag will be present. During local development the flag is not set. This environment variable can be used to enforce setting or omitting the Secure flag. Note: If the Secure flag is enforced, the application router will reject requests sent over unencrypted connection (http). |
Trusted CA certificates | XS_CACERT_PATH |
List of files paths with trusted CA certificates used for outbound https connections (UAA, destinations, etc.). File paths are separated by path.delimiter. If this is omitted, several well known "root" CAs (like VeriSign) will be used. This variable is set automatically by XSA On-premise runtime. |
Reject untrusted certificates | NODE_TLS_REJECT_UNAUTHORIZED |
By default an outbound https connection is terminated if the remote end does not provide a trusted certificate. This check can be disabled by setting NODE_TLS_REJECT_UNAUTHORIZED to 0 . This is a built-in feature of Node.js. Note: Do not use this in production as it compromises security! |
External reverse proxy flag | EXTERNAL_REVERSE_PROXY |
Boolean value that indicates the use of application router behind an external reverse proxy (outside of Cloud Foundry domain) |
Cross-Origin Resource Sharing | CORS |
Configuration regarding CORS enablement. |
Preserve URL fragment | PRESERVE_FRAGMENT |
Note: The Preserve URL fragment (PRESERVE_FRAGMENT) is being deprecated and will be removed in the near future. When set to true or not set, fragment part of the URL provided during first request of not logged-in user to protected route will be preserved, and after login flow user is redirected to original URL including fragment part. However, this may break programmatic access to Approuter (e.g. e2e tests), since it introduces change in login flow, which is incompatible with Approuter version 4.0.1 and earlier. Setting value to false makes login flow backward compatible, however will not take fragment part of the URL into account. |
Backend Cookies Secret | BACKEND_COOKIES_SECRET |
Secret that is used to encrypt backend session cookies in service to Application Router flow. Should be set in case multiple instances of Application Router are used. By default a random sequence of characters is used. |
Note: all those environment variables are optional.
The destinations configuration can be provided by the destinations
environment variable or by destination service. There has to be a destination for every single app (microservice) that is a part of the business application.
The destinations configuration is an array of objects. Here are the properties that a destination can have:
Property | Type | Optional | Description |
---|---|---|---|
name | String | A unique alphanumeric identifier of the destination. | |
url | String | URL of the app (microservice). | |
proxyHost | String | x | The host of the proxy server used in case the request should go through a proxy to reach the destination. |
proxyPort | String | x | The port of the proxy server used in case the request should go through a proxy to reach the destination. |
forwardAuthToken | Boolean | x | If true the OAuth token will be sent to the destination. The default value is false . This token contains user identity, scopes and other attributes. It is signed by the UAA so it can be used for user authentication and authorization with backend services. |
strictSSL | Boolean | x | Configures whether the application router should reject untrusted certificates. The default value is true .Note: Do not use this in production as it compromises security! |
timeout | Number | x | Positive integer representing the maximum wait time for a response (in milliseconds) from the destination. Default is 30000ms. |
setXForwardedHeaders | Boolean | x | If true , the application router adds X-Forwarded-(Host, Path, Proto) headers to the backend request.Default value is true. |
proxyType | String | x | Configures whether the destination is used to access applications in on-premise networks or on public Internet. Possible value: OnPremise . if the property is not provided, it is assumed that it is a public Internet access. Note: if OnPremise value is set, binding to SAP Cloud Platform connectivity service is required, and forwardAuthToken property should not be set. |
Note: The timeout specified will also apply to the destination's logout path or service's logout path (if you have set one).
Note: proxyHost
and proxyPort
are optional, but if one of them is defined, then the other one becomes mandatory.
Sample content of the destinations environment variable:
[
{
"name" : "ui5",
"url" : "https://sapui5.netweaver.ondemand.com",
"proxyHost" : "proxy",
"proxyPort" : "8080",
"forwardAuthToken" : false,
"timeout" : 1200
}
]
It is also possible to include the destinations in the manifest.yml and manifest-op.yml files:
- name: node-hello-world
memory: 100M
path: web
env:
destinations: >
[
{"name":"ui5", "url":"https://sapui5.netweaver.ondemand.com"}
]
Destination configuration can also be read from destination service
.
Here are the Approuter limitations to destination properties configuration from destination service :
Property | Additional Property | Description |
---|---|---|
Type | only HTTP supported. |
|
Authentication | All authentication types are supported. Note: User and Password are mandatory if the authentication type is basic authentication .Note: if the authentication type set to principal propagation the ProxyType have to be on-premise .Note: if the authentication type set to OAuth2SAMLBearerAssertion , uaa.user scope in xs-security.json is required. |
|
ProxyType | Supported proxy type : on-premise , internet .Note: if ProxyType set to on-premise , binding to SAP Cloud Platform connectivity service is required. |
Property | Additional Property | Description |
---|---|---|
HTML5.ForwardAuthToken | x | If true the OAuth token will be sent to the destination. The default value is false . This token contains user identity, scopes and other attributes. It is signed by the UAA so it can be used for user authentication and authorization with backend services.Note: if ProxyType set to on-premise , ForwardAuthToken property should not be set.Note: if Authentication type is other than NoAuthentication, ForwardAuthToken property should not be set. |
HTML5.Timeout | x | Positive integer representing the maximum wait time for a response (in milliseconds) from the destination. Default is 30000ms.Note: The timeout specified will also apply to the destination's logout path or service's logout path (if you have set one). |
HTML5.PreserveHostHeader | x | If true , the application router preserves the host header in the backend request.This is expected by some back-end systems like AS ABAP, which do not process x-forwarded-* headers. |
HTML5.DynamicDestination | x | If true , the application router allows to use this destination dynamically on host or path level. |
HTML5.SetXForwardedHeaders | x | If true , the application router adds X-Forwarded-(Host, Path, Proto) headers to the backend request.Default value is true. |
sap-client | x | If provided, the application router propagates the sap-client and its value as a header in the backend request. This is expected by ABAP back-end systems. |
Note:
- In case destination with the same name is defined both in environment destination and destination service, the destination configuration will load from the environment.
- Destination service available only in Cloud Foundry.
- Destinations on destination service instance level are supported.
The User Account and Authentication (UAA) server is responsible for user authentication.
In Cloud Foundry and XS OnPremise Runtime a service is created for this configuration and by using the standard service binding mechanism
the content of this configuration is available in the VCAP_SERVICES
environment variable.
Note: The service should have xsuaa
in its tags or the environment variable UAA_SERVICE_NAME
should be specified (stating the exact name of the UAA service).
During local development the UAA configuration is provided in the default-services.json file.
When the UAA is used for authentication the user is redirected to the UAA's login page to enter their credentials.
Sample content for a default-services.json file:
{
"uaa": {
"url" : "http://my.uaa.server/",
"clientid" : "client-id",
"clientsecret" : "client-secret",
"xsappname" : "my-business-application"
}
}
The application router supports the $XSAPPNAME
placeholder (upper case letters). You may use it in your route configurations in the scope property.
The value of $XSAPPNAME
is taken from the UAA configuration (the xsappname
property).
If configured, the application router can send additional http headers in its responses to the client.
Additional headers can be set in the httpHeaders
environment variable.
Sample configuration for additional headers:
[
{
"X-Frame-Options": "ALLOW-FROM http://localhost"
},
{
"Test-Additional-Header": "1"
}
]
In this case the application router will send two additional headers in the responses to the client.
If configured, the application router will send additional cookies in its responses to the client.
Additional cookies can be set in the COOKIES
environment variable.
Example of configuration for cookies in the manifest.yml :
env:
COOKIES: >
{ "SameSite":"None" }
In this example, the application router sets the SameSite cookie attribute to None for the JSESSIONID cookie in the responses to the client.
Note: Currently, only the SameSite cookie is supported
A plugin serves almost the same purpose as routes. The difference is that plugins can be configured through the environment and that way you can add new routes to the application router without changing the design-time artefact xs-app.json. The plugin configuration properties are the same as those of a route except that you can't configure localDir
, replace
and cacheControl
.
Property | Type | Optional | Description |
---|---|---|---|
name | String | The name of this plugin | |
source | String/Object | Describes a regular expression that matches the incoming request URL. Note: A request matches a particular route if its path contains the given pattern. To ensure the RegExp matches the complete path, use the following form: ^$`. Note: Be aware that the RegExp is applied to on the full URL including query parameters. |
|
target | String | x | Defines how the incoming request path will be rewritten for the corresponding destination. |
destination | String | An alphanumeric name of the destination to which the incoming request should be forwarded. | |
authenticationType | String | x | The value can be xsuaa , basic or none . The default one is xsuaa . When xsuaa is used the specified UAA server will handle the authentication (the user is redirected to the UAA's login form). The basic mechanism works with SAP HANA users. If none is used then no authentication is needed for this route. |
csrfProtection | Boolean | x | Enable CSRF protection for this route. The default value is true . |
scope | Array/String/Object | x | Scopes are related to the permissions a user needs to access a resource. This property holds the required scopes to access the target path. Access is granted if the user has at least one of the listed scopes. |
Sample content of the plugins
environment variable:
[
{
"name": "insecurePlugin",
"source": "/plugin",
"destination": "plugin",
"target": "/",
"csrfProtection": false,
"scope": ["viewer", "reader"]
},
{
"name": "publicPlugin",
"source": "/public-plugin",
"destination": "publicPlugin",
"authenticationType": "none"
}
]
For example, if you have the following line in your manifest.yml or manifest-op.yml file:
- name: node-hello-world
memory: 100M
path: web
env:
SESSION_TIMEOUT: 40
After 40 minutes of user inactivity (no requests have been sent to the application router), a Central Logout will be triggered due to session timeout.
Note: The application router depends on the UAA server for user authentication, if the authenticationType
for a route is xsuaa
. The UAA server may have a different session timeout configured.
It is recommended that the configurations of the application router and the UAA are identical.
Application router sends X-Frame-Options
header by default with value SAMEORIGIN
. This behaviour can be changed in 2 ways:
- Disable sending the default header value by setting
SEND_XFRAMEOPTIONS
environment variable tofalse
- Override the value to be sent via additional headers configuration
The CORS keyword enables you to provide support for cross-origin requests, for example, by allowing the modification of the request header. Cross-origin resource sharing (CORS) permits Web pages from other domains to make HTTP requests to your application domain, where normally such requests would automatically be refused by the Web browser's security policy. Cross-origin resource sharing(CORS) is a mechanism that allows restricted resources on a webpage to be requested from another domain (/protocol/port) outside the domain (/protocol/port) from which the first resource was served. CORS configuration enables you to define details to control access to your application resource from other Web browsers. For example, you can specify where requests can originate from or what is allowed in the request and response headers.
The Cross-Origin configuration is provided in the CORS
environment variable.
The CORS configuration is an array of objects. Here are the properties that a CORS object can have:
Property | Type | Optional | Description |
---|---|---|---|
uriPattern | String | A regular expression representing for which source routes CORS configuration is applicable. To ensure the RegExp matches the complete path, surround it with ^ and $. Defaults: none. | |
allowedOrigin | Array | A comma-separated list of objects that each one of them containing host name, port and protocol that are allowed by the server.for example: [{?host?: "www.sap.com"}] or [{?host?: ?.sap.com?}]. Note: matching is case-sensitive. In addition, if port or protocol are not specified the default is ?__?. Defaults: none. | |
allowedMethods | Array of upper-case HTTP methods | x | Comma-separated list of HTTP methods that are allowed by the server. Defaults: [?GET?, ?POST?, ?HEAD?, ?OPTIONS?] (all) applies. Note: matching is case-sensitive. |
maxAge | Number | x | A single value specifying how long, in seconds, a preflight response should be cached. A negative value will prevent CORS Filter from adding this response header to pre-flight response. Defaults: 1800. |
allowedHeaders | Array of headers | x | Comma-separated list of request headers that are allowed by the serve. Defaults: [?Origin?, ?Accept?, ?X-Requested-With?, ?Content-Type?, ?Access-Control-Request-Method?, ?Access-Control-Request-Headers?]. |
exposeHeaders | Array of headers | x | Comma-separated list of response headers (other than simple headers) that can be exposed. Defaults: none. |
allowedCredentials | Boolean | x | A flag that indicates whether the resource supports user credentials. Defaults: true. |
Sample content of the CORS environment variable:
[
{
"uriPattern": "^\route1$",
"allowedMethods": [
"GET"
],
"allowedOrigin": [
{
"host": "my_example.my_domain",
"protocol": "https",
"port": 345
}
],
"maxAge": 3600,
"allowedHeaders": [
"Authorization",
"Content-Type"
],
"exposeHeaders": [
"customHeader1",
"customHeader2"
],
"allowedCredentials": true
}
]
It is also possible to include the CORS in the manifest.yml and manifest-op.yml files:
- name: node-hello-world
memory: 100M
path: web
env:
CORS: >
[
{
"allowedOrigin":[
{
"host":"my_host",
"protocol":"https"
}
],
"uriPattern":"^/route1$"
}
]
For route with source that match the REGEX ?^\route1$?, the CORS configuration is enabled.
A route is a configuration that instructs the application router how to process an incoming request with a specific path.
Property | Type | Optional | Description |
---|---|---|---|
source | String/Object | Describes a regular expression that matches the incoming request URL. Note: A request matches a particular route if its path contains the given pattern. To ensure the RegExp matches the complete path, use the following form: ^$`. Note: Be aware that the RegExp is applied to on the full URL including query parameters. |
|
httpMethods | Array of upper-case HTTP methods | x | Which HTTP methods will be served by this route; the methods supported are: DELETE , GET , HEAD , OPTIONS , POST , PUT , TRACE , PATCH (no extension methods are supported). If this option is not specified, the route will serve any HTTP method. |
target | String | x | Defines how the incoming request path will be rewritten for the corresponding destination or static resource. |
destination | String | x | The name of the destination to which the incoming request should be forwarded. The destination name can be a static string or a regular expression that defines how to dynamically fetch the destination name from the source property or from the host. |
service | String | x | The name of the service to which the incoming request should be forwarded. |
endpoint | String | x | The name of the endpoint within the service to which the incoming request should be forwarded. Can only be used in a route containing a service attribute. |
localDir | String | x | Folder in the working directory from which the application router will serve static content Note: localDir routes support only HEAD and GET requests; requests with any other method receive a 405 Method Not Allowed. |
replace | Object | x | An object that contains the configuration for replacing placeholders with values from the environment. It is only relevant for static resources. Its structure is described in Replacements. |
authenticationType | String | x | The value can be xsuaa , basic or none . The default one is xsuaa . When xsuaa is used the specified UAA server will handle the authentication (the user is redirected to the UAA's login form). The basic mechanism works with SAP HANA users. If none is used then no authentication is needed for this route. |
csrfProtection | Boolean | x | Enable CSRF protection for this route. The default value is true . |
scope | Array/String/Object | x | Scopes are related to the permissions a user needs to access a resource. This property holds the required scopes to access the target path. |
cacheControl | String | x | String representing the value of the Cache-Control header, which is set on the response when serving static resources. By default the Cache-Control header is not set. It is only relevant for static resources. |
identityProvider | String | x | The name of the identity provider to use if provided in route’s definition. If not provided, the route will be authenticated with the default identity provider. Note: If the authenticationType is set to Basic Authentication or None, do not define the identityProvider property. |
Note: The properties destination
, localDir
and service
are optional, but exactly one of them must be defined.
Note: When using the property replace
it is mandatory to define the localDir
property.
Note: The cacheControl property is effective only when one of the following settings is performed:
- The localDir property was set
- A service pointing to HTML5 Application Repository ("service": "html5-apps-repo-rt") was set
For example, if you have a configuration with the following destination:
[
{
"name" : "app-1",
"url" : "http://localhost:3001"
}
]
Here are some sample route configurations:
- Route with a
destination
and notarget
{
"source": "^/app1/(.*)$",
"destination": "app-1"
}
Since there is no target
property for that route, no path rewriting will take place.
If we receive /app1/a/b as a path, then a request to http://localhost:3001/app1/a/b is sent.
The source path is appended to the destination URL.
- Route with case-insensitive matching
{
"source": {
"path": "^/app1/(.*)$",
"matchCase": false
},
"destination": "app-1"
}
This example is much like the previous one,
but instead of accepting only paths starting with /app1/, we accept any variation of app1's case.
That means if we receive /ApP1/a/B, then a request to http://localhost:3001/ApP1/a/B is sent.
Note: The property matchCase
has to be of type boolean. It is optional and has a default value true
.
- Route with a
destination
and atarget
{
"source": "^/app1/(.*)$",
"target": "/before/$1/after",
"destination": "app-1"
}
- Route with a
service
, atarget
and anendpoint
{
"source": "^/odata/v2/(.*)$",
"target": "$1",
"service": "com.sap.appbasic.country",
"endpoint": "countryservice"
}
When a request with path /app1/a/b is received, the path rewriting is done according to the rules in the target
property.
The request will be forwarded to http://localhost:3001/before/a/b/after.
Note: In regular expressions there is the term capturing group. If a part of a regular expression is surrounded with parenthesis, then what has been matched can be accessed using $ + the number of the group (starting from 1).
In the last example $1 is mapped to the (.*) part of the regular expression in the source
property.
- Route with dynamic
destination
andtarget
{
"source": "^/destination/([^/]+)/(.*)$",
"target": "$2",
"destination": "$1",
"authenticationType": "xsuaa"
}
If you have a another destination configured:
[
{
"name" : "myDestination",
"url" : "http://localhost:3002"
}
]
when a request with the path /destination/myDestination/myTarget is received, the destination will be replaced with the url from "myDestination", the target will get "myTarget" and the request will be redirected to http://localhost:3002/myTarget
Note: You can use a dynamic value (regex) or a static string for both destination and target values
Note: The approuter first looks for the destination name in the mainfest.yaml file, and if not found, looks for it in the destination service.
- Destination In Host
For legacy applications that do not support relative URL paths, you need to define your URL in the following way to enable the destination to be extracted from the host the url should be defined in the following way:
https://<tenant>-<destination>.<customdomain>/<pathtofile>
To enable the application router to determine the destination of the URL host, a DESTINATION_HOST_PATTERN attribute must be provided as an environment variable.
Example: When a request with the path https://myDestination.some-approuter.someDomain.com/app1/myTarget is received, the following route is used:
{
"source": "^/app1/([^/]+)/",
"target": "$1",
"destination": "*",
"authenticationType": "xsuaa"
}
In this example, the target will be extracted from the source and the ‘$1’ value is replaced with ‘myTarget’. The destination value is extracted from the host and the ‘*’ value is replaced with ‘myDestination’.
- Route with a
localDir
and notarget
{
"source": "^/web-pages/(.*)$",
"localDir": "my-static-resources"
}
Since there is no target
property for that route, no path rewriting will take place.
If we receive a request with a path /web-pages/welcome-page.html, the local file at my-static-resources/web-pages/welcome-page.html
under the working directory will be served.
- Route with a
localDir
and atarget
{
"source": "^/web-pages/(.*)$",
"target": "$1",
"localDir": "my-static-resources"
}
If we receive a request with a path '/web-pages/welcome-page.html', the local file at 'my-static-resources/welcome-page.html'
under the working directory will be served.
Note: The capturing group used in the target
property.
- Route with
localDir
andcacheControl
{
"source": "^/web-pages/",
"localDir": "my-static-resources",
"cacheControl": "public, max-age=1000,must-revalidate"
}
- Route with
service
"html5-apps-repo-rt" andcacheControl
{
"source": "^/index.html$",
"service": "html5-apps-repo-rt",
"authenticationType": "xsuaa",
"cacheControl":"public,max-age=1000,must-revalidate"
}
- Route with
httpMethods
restrictions
The httpMethods
option allows you to split the same path across different targets depending on the HTTP method. For example:
{
"source": "^/app1/(.*)$",
"target": "/before/$1/after",
"httpMethods": ["GET", "POST"]
}
This route will be able to serve only GET and POST requests. Any other method (including extension ones) will get a 405 Method Not Allowed response. The same endpoint can be split across multiple destinations depending on the HTTP method of the requests:
{
"source": "^/app1/(.*)$",
"destination" : "dest-1",
"httpMethods": ["GET"]
},
{
"source": "^/app1/(.*)$",
"destination" : "dest-2",
"httpMethods": ["DELETE", "POST", "PUT"]
}
The setup above will route GET requests to the target dest-1, DELETE, POST and PUT to dest-2, and any other method receives a 405. It is also possible to specify "catchAll" routes, namely those that do not specify httpMethods
restrictions:
{
"source": "^/app1/(.*)$",
"destination" : "dest-1",
"httpMethods": ["GET"]
},
{
"source": "^/app1/(.*)$",
"destination" : "dest-2"
}
In the setup above, GET requests will be routed to dest-1, and all the rest to dest-2.
Why using httpMethods
? It is often useful to split the implementation of microservices across multiple, highly specialized applications. For example, a Java application written to serve high amounts of GET requests that return large payloads is implemented, sized, scaled and load-tested differently than applications that offer APIs to upload limited amounts of data. httpMethods
allows you to split your REST APIs, e.g., /Things to different applications depending on the HTTP methods of the requests, without having to make the difference visible in the URL of the endpoints.
Another usecase for httpMethods
is to "disable" parts of the REST API. For example, it may be necessary to disable some endpoints that accept DELETE for external usage. By whitelisting in the relative route only the allow methods, you can hide functionalities of your microservice that should not be consumable without having to modify the code or configurations of your service.
Note: localDir
and httpMethods
are incompatible. The following route is invalid:
{
"source": "^/app1/(.*)$",
"target": "/before/$1/after",
"localDir": "resources",
"httpMethods": ["GET", "POST"]
}
However, since localDir
supports only GET and HEAD requests, returning 405 to requests with any other method, any localDir
route is "implicitly" restricted in terms of supported HTTP methods.
- Route with a
scope
An application specific scope has the following format:
<application-name>.<scope-name>
It is possible to configure what scope the user needs to possess in order to access a specific resource. Those configurations are per route.
In this example, the user should have at least one of the scopes in order to access the corresponding resource.
{
"source": "^/web-pages/(.*)$",
"target": "$1",
"scope": ["$XSAPPNAME.viewer", "$XSAPPNAME.reader", "$XSAPPNAME.writer"]
}
For convenience if our route requires only one scope the scope
property can be a string instead of an array. The following configuration is valid as well:
{
"source": "^/web-pages/(.*)$",
"target": "$1",
"scope": "$XSAPPNAME.viewer"
}
You can configure scopes for the different HTTP methods (GET, POST, PUT, HEAD, DELETE, CONNECT, TRACE, PATCH and OPTIONS). If some of the HTTP methods are not explicitly set, the behaviour for them is defined by the default
property. In case there is no default
property specified and the HTTP method is also not specified, the request is rejected by default.
{
"source": "^/web-pages/(.*)$",
"target": "$1",
"scope": {
"GET": "$XSAPPNAME.viewer",
"POST": ["$XSAPPNAME.reader", "$XSAPPNAME.writer"],
"default": "$XSAPPNAME.guest"
}
}
The application router supports the $XSAPPNAME
placeholder. Its value is taken (and then substituted in the routes) from the UAA configuration.
You may read more about it here.
Note: The substitution is case sensitive.
You can use the name of the business application directly instead of using the $XSAPPNAME
placeholder:
{
"source": "^/backend/(.*)$",
"scope": "my-business-application.viewer"
}
- Examples for Routes With
identityProvider
For example, we can define several identity providers for different types of users. In this example, there are 2 categories: hospital patients and hospital personnel:
- patientsIDP – use for authenticating patients.
- hospitalIDP – use for authenticating all hospital personnel (doctors, nurses etc..).
We can configure 2 routes with the following identityProvider properties:
[
{
"source": "^/patients/sap/opu/odata/(.*)",
"target": "/sap/opu/odata$1",
"destination": "backend",
"authenticationType": "xsuaa",
"identityProvider": "patientsIDP"
},
{
"source": "^/hospital/sap/opu/odata/(.*)",
"target": "/sap/opu/odata$1",
"destination": "backend", "authenticationType": "xsuaa",
"identityProvider": "hospitalIDP"
}
]
So, a patient who tries to log into the system will be authenticated by patientIDP, and a doctor who tries to log in will be authenticated by hospitalIDP.
Note: After logging in using one of the identity providers, to switch to the other one it is necessary to logout and perform a new log in.
Note: Currently, dynamic provisioning of the subscriber account identity provider is not supported.
Note: Identity provider configuration is only supported in the client side login redirect flow.
This object configures the placeholder replacement in static text resources.
Property | Type | Description |
---|---|---|
pathSuffixes | Array | An array containing the path suffixes that are relative to localDir . Only files with a path ending with any of these suffixes will be processed. |
vars | Array | A whitelist with the environment variables that will be replaced in the files matching the suffix. |
services | Object | An object describing bound services that will provide replacement values. Each property of this object is used to lookup a separate service. The property names are arbitrary. Service lookup format is described in Service Query section in @sap/xsenv documentation. |
The supported tags for replacing environment variables are: {{ENV_VAR}}
and {{{ENV_VAR}}}
.
If there is such an environment variable it will be replaced, otherwise it will be just an empty string.
For services you can specify a property from the credentials
section of the service binding which will be replaced.
For example {{{my_service.property}}}
and {{my_service.property}}
Every variable that is replaced using two-brackets syntax will be HTML-escaped.
For example if the value of the environment variable is ab"cd
the result will be ab&quot;cd
.
The triple brackets syntax is used when the replaced values don't need to be escaped and all values will be unchanged.
For example, if somewhere in your xs-app.json you have a route:
{
"source": "^/get/home(.*)",
"target": "$1",
"localDir": "resources",
"replace": {
"pathSuffixes": ["index.html"],
"vars": ["escaped_text", "NOT_ESCAPED"],
"services": {
"my-sapui5-service": {
"tag": "ui5"
}
}
}
}
and you have the following index.html
:
<html>
<head>
<title>{{escaped_text}}</title>
<script src="{{{NOT_ESCAPED}}}/index.js"/>
<script src="{{{my-sapui5-service.url}}}"/>
</head>
</html>
then in index.html
, {{escaped_text}}
and {{{NOT_ESCAPED}}}
will be replaced with the values of the environment variables escaped_text
and NOT_ESCAPED
.
If you have a service in VCAP_SERVICES like:
{
"sapui5_service": [{
"name": "sapui5",
"tags": ["ui5"],
"credentials": {
"url": "http://sapui5url"
}
}]
}
then {{{my-sapui5-service.url}}}
will be replaced with the url
property from sapui5
service - in this case http://sapui5url
.
Note: All index.html files will be processed.
If you want to replace only specific files, you have to set the path of the file relative to localDir
.
Note: All files should be UTF-8 encoded.
Note: If a service is not found an error is thrown on startup.
Note: If a service and an environment variable from vars
have the same name, an error is thrown on startup.
The returned content type is based on the file extension. Currently the supported file extensions are:
- .json - application/json
- .txt - text/plain
- .html - text/html
- .js - application/javascript
- .css - test/css
If the file extension is different, the default content type is text/html
.
Example for pathSuffixes
:
{
"pathSuffixes": [".html"]
}
The suffix .html
means that all files with the extension .html under localDir
and it's subfolders will be processed.
{
"pathSuffixes": ["/abc/main.html", "some.html"]
}
The suffix /abc/main.html
means that all files named main.html which are inside a folder named abc will be processed.
The suffix some.html
means that all files which have a name that ends with some.html will be processed. For example: some.html
, awesome.html
.
{
"pathSuffixes": ["/some.html"]
}
The suffix /some.html
means that all files which have the exact name some.html will be processed. For example: some.html
, /abc/some.html
.
Note: URL path parameters are not supported for replacements. For example, replacements will not work if the path looks like '/test;color=red/index.html'. For more information regarding path parameters refer to http://tools.ietf.org/html/rfc3986#section-3.3.
This is the main configuration file of the application router. It contains a JSON object with the following properties:
Property | Type | Optional | Description |
---|---|---|---|
welcomeFile | String | x | The client is redirected to this page by default, if the request does not have a path. For more information, see welcomeFile. |
authenticationMethod | String | x | If set to none the UAA login roundtrip is disabled. If the property is not set and authentication is defined per route, the value is set to route by default. |
sessionTimeout | Number | x | Used to set session timeout. The default is 15 minutes. If the SESSION_TIMEOUT environment variable is set this property will be overwritten. |
routes | Array | x | Contains all route configurations. The position of a configuration in this array is of significance for the application router in case a path matches more than one source. The first route whose source matches the path of the incoming request gets activated. |
login | Object | x | Contains the configuration for the endpoint of the application router which will be used by the UAA during the OAuth2 authentication routine. By default this endpoint is /login/callback . |
logout | Object | x | Provides options for a Central Logout endpoint and a page to which the client to be redirected by the UAA after logout. |
destinations | Object | x | Additional options for your destinations (besides the ones in the destinations environment variable). |
services | Object | x | Additional options for your business services. |
compression | Object | x | Configuration regarding compressing resources before responding to the client. If the COMPRESSION environment variable is set it will overwrite existing values. |
pluginMetadataEndpoint | String | x | Adds an endpoint that will serve a JSON representing all configured plugins. |
whitelistService | Object | x | Options for the whitelist service preventing clickjack attacks. |
websockets | Object | x | Options for the web socket communication. |
errorPage | Array | x | Optional configuration to set-up a custom error pages whenever the approuter encouters an error. |
Approuter will redirect to this URL when /
(root path) is requested.
This could be a file located inside the static resources folder or a resource hosted at a different location.
Note: Approuter will serve the content of the resource instead of returning a redirect if the request contains a x-csrf-token: fetch
header.
See CSRF Protection.
Example:
"welcomeFile": "/web-pages/hello-world.html"
web-pages
has to be a part of a local resource or an external destination
{
"source": "^/web-pages/(.*)$",
"localDir": "my-static-resources"
}
or
{
"source": "^/web-pages/(.*)$",
"target": "$1",
"destination": "mydest"
}
Note: If there isn't a route with a localDir property, the folloing default is added to the list of routes:
{
"source": "^/(.*)$",
"localDir": "resources"
}
It may have the following values:
none
- disables authentication for all routesroute
- authentication type is defined in the route configurations
The default value is route
.
It holds an array of route configuration objects. The order of the configurations is important for the application router.
The first route whose source
pattern gets matched with the path of the incoming request will be activated.
See Routes for more info.
A redirect to the application router at a specific endpoint takes place during OAuth2 authentication with UAA. This endpoint can be configured in order to avoid possible collisions. For example:
"login": {
"callbackEndpoint": "/custom/login/callback"
}
The default endpoint is /login/callback
.
In this object you can define your business application's central logout endpoint through the logoutEndpoint
property.
For example, if somewhere in your xs-app.json you have:
"logout": {
"logoutEndpoint": "/my/logout"
}
This will open an endpoint on application router which, when requested, will trigger the central logout routine. Changing the browser location from the client-side JavaScript code:
window.location.replace('/my/logout');
will trigger client initiated central Logout.
In addition, a page to which the user will be redirected by the UAA after logout can be configured using the logoutPage
property.
It may hold:
- URL path - the UAA will redirect the user back to the application router and the path will be interpreted according the configured routes.
The logoutEndpoint
can be called with query parameters. For example:
window.location.replace('/my/logout?siteId=3');
These parameters will be appended as is to the redirect url set by the logoutPage
property.
For example, if the logout section is the following:
"logout": {
"logoutEndpoint": "/logout",
"logoutPage": "/logoff.html"
},
The redirect url will end with:
/logoff.html?siteId=3
Note: The resource that matches the path should not require authentication. The property authenticationType
should be set to none
for that particular route.
Example:
{
"authenticationMethod": "route",
"logout": {
"logoutEndpoint": "/my/logout",
"logoutPage": "/logout-page.html"
},
"routes": [
{
"source": "^/logout-page.html$",
"localDir": "my-static-resources",
"authenticationType": "none"
}
]
}
In this case my-static-resources (contains logout-page.html) is a folder with static resources in the working directory of the application router.
Note: Be sure that your main route in your xs-app.json resource that matches the path is not cached by browser. Therefore, the best practice here would be to model cacheControl accordingly:
{
"routes": [
{
"source": "^/ui/index.html",
"target": "index.html",
"localDir": "web",
"cacheControl": "no-cache, no-store, must-revalidate"
}
]
}
- Absolute http(s) URL - the UAA will redirect the user to a page (or application) different from the application router. For example:
"logout": {
"logoutEndpoint": "/my/logout",
"logoutPage": "http://employees.portal"
}
Note: UAA will execute redirect only in case redirect URL is a valid redirect-uri in xs-security.json - redirect-uris are maintained as part of the oauth2-configuration section in the UAA application security descriptor JSON file given at the creation of the service instance. For example:
UAA application security descriptor:
"oauth2-configuration": {
"redirect-uris":
[
"http://employees.portal"
]
}
Let's say you have a destination called node-backend
. You can specify options for it by adding the destinations
property in your xs-app.json:
"destinations": {
"node-backend": {}
}
The value of node-backend
should be an object with the following properties:
Property | Type | Optional | Description |
---|---|---|---|
logoutPath | String | x | The logout endpoint for your destination. |
logoutMethod | String | x | Could be POST, PUT, GET. The default value is POST. |
The logoutPath
will be called when Central Logout is triggered or a session is deleted due to timeout.
The request to the logoutPath
will contain additional headers, including the JWT token.
The logoutMethod
property specifies the HTTP method with which the logoutPath
will be requested. For example:
{
"destinations": {
"node-backend": {
"logoutPath": "/ui5logout",
"logoutMethod": "GET"
}
}
}
Let's say you have a service called com.sap.appbasic.country
. You can specify options for it by adding the services
property in your xs-app.json:
"services": {
"com.sap.appbasic.country": {}
}
The value of com.sap.appbasic.country
should be an object with the following properties:
Property | Type | Optional | Description |
---|---|---|---|
endpoint | String | x | The name of the attribute in the VCAP_SERVICES that contains the URL of the service. |
logoutPath | String | x | The path to be used when logging out from the service. |
logoutMethod | String | x | Could be POST, PUT, GET. The default value is POST. |
The logoutPath
will be called when Central Logout is triggered or a session is deleted due to timeout.
The request to the logoutPath
will contain additional headers, including the JWT token in header authorization
and approuter host in header x-approuter-host
.
The logoutMethod
property specifies the HTTP method with which the logoutPath
will be requested. For example:
{
"services": {
"com.sap.appbasic.country": {
"endpoint": "countryservice",
"logoutPath": "/countrieslogout",
"logoutMethod": "GET"
}
}
}
By default text resources are compressed before being sent to the client.
The default threshold for using compression is 1K. Text resources under this size will not be compressed.
If you need to change the compression size threshold, you can add the optional property minSize
.
Here is an example of a compression section (2048 bytes):
{
"compression": {
"minSize": 2048
}
}
Property | Type | Optional | Description |
---|---|---|---|
minSize | Number | x | Text resources larger than this size will be compressed. |
enabled | Boolean | x | Globally disables or enables compression. Default value is true. |
Note: There are 3 ways to disable compression:
- Global - within the compression section add
"enabled": false
- Front-End - the client sends a header Accept-Encoding which omits gzip
- Backend - the application sends a header Cache-Control with the 'no-transform' directive
Example of globally disabling compression using the environment variable COMPRESSION
:
{
"enabled": false
}
Note: The header field Content-Length
is used to determine the resource size.
If Content-Length
is missing, the chunk size is used to determine whether to compress the resource.
For more information, see the npm module compression.
Example:
{
"pluginMetadataEndpoint": "/metadata"
}
Note: If you request relative path /metadata
of your application, you will receive a JSON with configured plugins.
Enabling the whitelist service is used for prevention of clickjack attacks.
An endpoint accepting GET requests will be opened at the relative path configured in the endpoint
property.
For more details see Whitelist service section.
Example:
{
"whitelistService": {
"endpoint": "/whitelist/service"
}
}
For more details about the web socket communication see Web sockets section.
Example:
{
"websockets": {
"enabled": true
}
}
To use Websockets when approuter is integrated with HTML5 Application Repository, this property should be added to the xs-app.json of the deployed HTML5 application. When an incoming request for an application in the repository goes through approuter, approuter retrieves the application's configuration from the repository. If this flag is set, approuter creates a websockets connection with the backend (the target url of the request) and acts as a proxy which delivers messages on top of ws protocol from the backend to the user and vice versa.
By default, errors originating in the application router are shown the status code of the error.
It is also possible to display a custom error page using the errorPage
property.
The property is an array of objects, each object having the following properties:
Property | Type | Optional | Description |
---|---|---|---|
status | Number/Array | HTTP status code | |
file | String | File path relative to the working directory of the application router |
Example:
{ "errorPage" : [
{"status": [400,401,402], "file": "./custom-err-40x.html"},
{"status": 501, "file": "./http_resources/custom-err-501.html"}
]
}
In the example above 400, 401 and 402 errors would be shown the content of ./custom-err-4xx.html
and for 501 errors the user would see ./http_resources/custom-err-501.html
.
Note: The errorPage conifiguration section has no effect on errors generated outside of the application router.
{
"welcomeFile": "index.html",
"authenticationMethod": "route",
"sessionTimeout": 10,
"pluginMetadataEndpoint": "/metadata",
"routes": [
{
"source": "^/sap/ui5/1(.*)$",
"target": "$1",
"destination": "ui5",
"csrfProtection": false
},
{
"source": "/employeeData/(.*)",
"target": "/services/employeeService/$1",
"destination": "employeeServices",
"authenticationType": "xsuaa",
"scope": ["$XSAPPNAME.viewer", "$XSAPPNAME.writer"],
"csrfProtection": true
},
{
"source": "^/(.*)$",
"target": "/web/$1",
"localDir": "static-content",
"replace": {
"pathSuffixes": ["/abc/index.html"],
"vars": ["NAME"]
}
}
],
"login": {
"callbackEndpoint": "/custom/login/callback"
},
"logout": {
"logoutEndpoint": "/my/logout",
"logoutPage": "/logout-page.html"
},
"destinations": {
"employeeServices": {
"logoutPath": "/services/employeeService/logout",
"logoutMethod": "GET"
}
},
"compression": {
"minSize": 2048
},
"whitelistService": {
"endpoint": "/whitelist/service"
},
"websockets": {
"enabled": true
},
"errorPage": [
{"status": [400,401,402], "file": "/custom-err-4xx.html"},
{"status": 501, "file": "/custom-err-501.html"}
]
}
With HTML5 Application Repository integration (xs-app.json file stored in HTML5 Application Repository):
{
"welcomeFile": "index.html",
"authenticationMethod": "route",
"routes": [
{
"source": "/employeeData/(.*)",
"target": "/services/employeeService/$1",
"destination": "employeeServices",
"authenticationType": "xsuaa",
"scope": ["$XSAPPNAME.viewer", "$XSAPPNAME.writer"],
"csrfProtection": true
},
{
"source": "^/odata/v2/(.*)$",
"target": "$1",
"service": "com.sap.appbasic.country",
"endpoint": "countryservice"
},
{
"source": "^(/.*)$",
"target": "$1",
"service": "html5-apps-repo-rt",
"authenticationType": "xsuaa"
}
],
"logout": {
"logoutEndpoint": "/my/logout",
"logoutPage": "/logout-page.html"
},
"destinations": {
"employeeServices": {
"logoutPath": "/services/employeeService/logout",
"logoutMethod": "GET"
}
},
"services": {
"com.sap.appbasic.country": {
"logoutPath": "/countryService/logout",
"endpoint": "countryservice",
"logoutMethod": "GET"
}
}
}
Note: The route in bold is the route that provides access to the HTML5 Application Repository service.
The application router passes the following x-forwarding-* headers to the route targets:
Header Name | Description |
---|---|
x-forwarded-host | Contains the Host header which was sent by the client to the application router. |
x-forwarded-proto | Contains the protocol which was used by the client to connect to the application router. |
x-forwarded-for | Contains the address of the client which connects to the application router. |
x-forwarded-path | Contains the original path which was requested by the client. |
If a client performs a path rewriting, it sends the x-forwarded-proto, x-forwarded-host, and the x-forwarded-path headers to the application router. The values of these headers are forwarded to the route targets without modifications instead of being generated from the application router request URL. The x-forwarded-path header of a request does not impact the source pattern of routes in the xs-app.json.
Hop-by-hop headers are meaningful only for a single transport-level connection and therefore are not forwarded by the application router. These headers are:
- Connection
- Keep-Alive
- Public
- Proxy-Authenticate
- Transfer-Encoding
- Upgrade
- x-custom-host: Contains the internal reverse proxy host. Relevant only if the application router is used behind an internal reverse proxy as well as an external reverse proxy (EXTERNAL_REVERSE_PROXY environment variable is set to true). Add this header to the request to internal reverse proxy.
In a multi-tenancy landscape, the application router will calculate the tenant id based on the value of a certain request header as follows:
- x-custom-host header or host if EXTERNAL_REVERSE_PROXY is true
- x-forwarded-host header or host if EXTERNAL_REVERSE_PROXY is false or not specified
- x-approuter-authorization: Contains the JWT token to support the Service to Application Router scenario.
Caution: You should not use SAP Cloud Platform beta features in subaccounts that belong to productive enterprise accounts. Any use of beta functionality is at the customer's own risk, and SAP shall not be liable for errors or damages caused by the use of beta features. For more information, see Using Beta Features in Subaccounts.
By default the application router enables CSRF protection for any HTTP method that is not HEAD
or GET
and the route is not public.
A path is considered public, if it does not require authentication. This is the case for routes with authenticationType: none
or if authentication is disabled completely via the top level property authenticationMethod: none
.
To obtain a CSRF token one must send a GET
or HEAD
request with a x-csrf-token: fetch
header to the application router.
The application router will return the created token in a x-csrf-token: <token>
header, where <token>
will be the value of the CSRF token.
If a CSRF protected route is requested with any of the above mentioned methods,
x-csrf-token: <token>
header should be present in the request with the previously obtained token.
This request must use the same session as the fetch token request.
If the x-csrf-token
header is not present or invalid, the application router will return status code 403 Forbidden and a response header x-csrf-token: Required
.
The application router supports integration with SAP Cloud Platform connectivity service. The connectivity service handles proxy access to SAP Cloud Platform cloud connector, which tunnels connections to private network systems. In order to use connectivity, a connectivity service instance should be created and bound to the Approuter application. In addition, the relevant destination configurations should have proxyType=OnPremise
. Also, a valid XSUAA login token should be obtained via the login flow.
The application router supports SaaS registration. A SaaS business application based on application router may be registered in the SaaS registry by creating and binding a SaaS Registry service instance. After fulfilling the CIS process to enable application subscription, the SaaS business application will be visible in the SAP Cloud Platform cockpit in the Cloud Foundry environment for all entitled customers. Once a customer is entitled to the SaaS business application, the subaccounts (tenants) created under the global account will be able to view, subscribe to, and unsubscribe from the application. When a tenant is subscribed/unsubscribed to/from an application, the tenant will be subscribed/unsubscribed:
- In the XSUAA instance of the application itself
- In the reuse services (e.g.: destination ), if the application is dependent on the reuse service. Also, onboarding and offboarding callbacks will be triggered for the subscribed/unsubscribed application and for the reuse services.
The application router should be configured to handle multi-tenant access by maintaining the TENANT_HOST_PATTERN environment configuration.
The SaaS Registry service should be available in your space marketplace.
SaaS business applications should grant LPS the authorization to invoke the application's callbacks. Callback scope should be granted to LPS in the application router’s xs-security.json file:
xs-security.json:
...
{
"name":"$XSAPPNAME.Callback",
"description":"With this scope set, the callbacks for tenant onboarding,
offboarding and getDependencies can be called.",
"grant-as-authority-to-apps":[
"$XSAPPNAME(application,sap-provisioning,tenant-onboarding)"
]
}
...
In the manifest.yaml, which is used for the multi-tenant application deployment, the environment variable SAP_JWT_TRUST_ACL should be added. Example:
env:
SAP_JWT_TRUST_ACL: "[{\"clientid\":\"*\",\"identityzone\":\" sap-provisioning \"}]"
For a customer to be able to subscribe to an application through the SAP Cloud Platform cockpit, each SaaS business application should register itself on all CF landscapes where it is deployed.
To register a SaaS application in LPS, a service instance of saas-registry should be created and the SaaS business application should be bound to it. The instance of saas-registry is created with a configuration json - saas-config.json:. In the configuration.json file a url for the getDependencies and onSubscription callbacks must be provided. Note that the path segment of these urls are configurable however the tenantId url variable in onSubscription callback must be provided anyway.
{
"appId" : "<appId>", # xsappname generated by XSUAA - can be obtained by checking the xsuaa-> xsappname by executing: cf env <application name>
"appName" : "<appName>", # Business application name to be shown to subscribers
"appUrls": {
"getDependencies" : "<approuter-host>/callback/v1.0/dependencies",
"onSubscription" : "<approuter-host>/callback/v1.0/tenants/{tenantId}"
},
"providerTenantId" : "<tenant>" # Approuter provider account tenant ID.
}
The application router supports seamless integration with the HTML5 Application Repository service. When the application router interacts with HTML5 Application Repository to serve HTML5 Applications, all static content and routes (xs-app.json) are retrieved from HTML5 Application Repository. In case application router needs to route to non HTML5 Applications, it is possible to model that in the xs-app.json of the application router.
To integrate HTML5 Application Repository to an application router based it is required to create an instance of html5-apps-repo service of plan app-runtime and bind it to the application. xs-app.json routes that are used to retrieve static content from HTML5 Application Repository may be modeled in the following format:
{
"source": "^(/.*)",
"target": "$1",
"service": "html5-apps-repo-rt",
"authenticationType": "xsuaa"
}
The following limitations apply when application router is bound to HTML5 Application Repository service:
- It is not possible to implement the "first" middleware slot to provide routes dynamically.
- No option apart from workingDir can be provided in application router start.
- External session management via extensibility is not supported
Note: Mixed scenario of modeling part of the static content in local resources folder and also retrieving static content from HTML5 Application Repository is not supported.
Note: This feature is only supported in Cloud Foundry. There is no HTML5 Application Repository service in XSA.
During runtime, based on request url path (see URL Format), application router will try to fetch the xs-app.json file from the corresponding HTML5 Application in HTML5 Application Repository and use it for routing the request. The following algorithm is applied for request processing:
- If no HTML5 Application is found in HTML5 Application Repository for current request, central application router xs-app.json will be used for routing
- If HTML5 Application exists in HTML5 Application Repository but no xs-app.json file is returned, an error message will be issued and request processing will be stopped.
A valid request to application router that uses HTML5 Application Repository must have the following format:
https://<tenantId>.<appRouterHost>.<domain>/<bsPrefix>.<appName-appVersion>/<resourcePath>
bsPrefix (business service prefix) - Optional
- It should be used in case the application is provided by a business service bound to this approuter
appName (application name) - Mandatory
- Used to uniquely identify the application in HTML5 Application Repository persistence
- Must not contain dots or special characters
appVersion (application version) - Optional
- Used to uniquely identify a specific application version in HTML5 Application Repository persistence
- If no version provided, default application version will be used
resourcePath (path to file)
- The path to the file as it was stored in HTML5 Application Repository persistence
A cache buster allows the application router to notify the browser to refresh the resources only when the application resources have been changed. Otherwise the resources are always fetched from the browser's cache. This flow applies to requests that should be forwarded to HTML5 Application Repository. If requests are forwarded to backend applications that return data, cache buster handling is not applied.
- When the second path segment of the request url contains the pattern “
timestamp”, this segment is removed from the subsequent request to HTML5 Application Repository - In case the request had a cache buster segment, application router adds to corresponding response the header: Cache-Control: public, max-age=31536000
Note: Cache buster flow is only supported in HTML5 Application Repository integration flow.
Application router supports integration with Business Services. Business Services are a flavour of reuse-services that expose specific information in VCAP_SERVICES credentials block that enable application router to serve Business Service UI and/or data.
- Business Service UI must be stored in HTML5 Application Repository to be accessible from application router
- Business Service UI must be defined as "public" to be accessible from an application router in a different space than the one from where the UI was uploaded
- Business Service data can be served using two grant types:
- User Token Grant: Application router performs a token exchange between login JWT token and Business Service token and uses it to trigger a request to the Business Service endpoint
- Client Credentials Grant: Application router generates a client_credentials token and uses it to trigger a request to the Business Service endpoint
While binding a Business Service instance to application router the following information should be provided in VCAP_SERVICES credentials:
- sap.cloud.service: Service name as referenced from xs-app.json route and business service prefix (if Business Service UI provided) - Mandatory
- sap.cloud.service.alias: Short service name alias for user friendly URL business service prefix- Optional
- endpoints: One or more endpoints that can be used to access Business Service data.
- html5-apps-repo: html5-apps-repo.app_host_id contains one or more html5-apps-repo service instance GUIDs that can be used to retrieve Business Service UIs - Optional
- saasregistryenabled: flag that indicates that this Business Service supports SaaS Registry subscription. If provided, application router will return this Business Service xsappname in SaaS Registry getDependencies callback - Optional
- grant_type: the grant type that should be used to trigger requests to the Business Service. Allowed values: user_token or client_credentials. Default value, in case this attribute is not provided, user_token - Optional
The value of endpoints
should be an object with the following properties:
Property | Type | Optional | Default | Description |
---|---|---|---|---|
url | String | URL to access the Business Service data. | ||
timeout | Number | x | 30000ms | Positive integer representing the maximum wait time for a response (in milliseconds) from the Business Service. |
For example:
"country": [
{
...
"credentials": {
"sap.cloud.service": "com.sap.appbasic.country",
"sap.cloud.service.alias": "country",
"endpoints": {
"countryservice": { "url": https://icf-countriesapp-test-service.cfapps.sap.hana.ondemand.com/odata/v2/countryservice"},
"countryconfig": {
"url": https://icf-countriesapp-test-service.cfapps.sap.hana.ondemand.com/rest/v1/countryconfig",
"timeout": 120000
}
},
"html5-apps-repo": {
"app_host_id": "1bd7c044-6cf4-4c5a-b904-2d3f44cd5569, 1cd7c044-6cf4-4c5a-b904-2d3f44cd54445"
},
"saasregistryenabled": true,
"grant_type": "user_token"
....
To access Business Service data xs-app.json configuration file should have a route referencing a specific sap.cloud.service or sap.cloud.service.alias via the service attribute. If an endpoint attribute is also modeled, it will be used to get the service url otherwise the fallback url or uri attribute will be used.
For example:
"routes": [
{
"source": "^/odata/v2/(.*)$",
"target": "$1",
"service": "com.sap.appbasic.country",
"endpoint": "countryservice"
},
In order to support JWT token exchange, the login JWT token should contain the uaa.user scope. For that the xs-security configuration must contain a role template that references the uaa.user scope. For example:
{
"xsappname" : "simple-approuter",
"tenant-mode" : "shared",
"scopes": [
{
"name": "uaa.user",
"description": "UAA"
},
{
"name": "$XSAPPNAME.simple-approuter.admin",
"description": "Simple approuter administrator"
}
],
"role-templates": [
{
"name": "Token_Exchange",
"description": "UAA",
"scope-references": [
"uaa.user"
]
},
{
"name": "simple-approuter-admin",
"description": "Simple approuter administrator",
"scope-references": [
"$XSAPPNAME.simple-approuter.admin"
]
}
]
}
Business Service UI's must be stored in HTML5 Application Repository and defined in their manifest.json files as "public: true" in order to be accessible from an application router application that is typically running in a different space than the Business Service space. In addition dataSources uris must be relative to base url (no slash as first character).
Business Service manifest.json example:
{
“sap.app”: {
“id”:“com.sap.appbasic.country.list”,
“applicationVersion: {
“version”: “1.0.0”
},
"dataSources": {
"mainService":{
"uri": "odata/v2/countryservice",
"type": "OData"
}
},
“sap.cloud”: {
"public": true,
“service”: “com.sap.appbasic.country“
}
}
A Business Service that exposes UI must provide one or more app-host GUIDs in an html5-apps-repo block in VCAP_SERVICES credentials (see Business Service credentials).
To access Business Service UI the request url that hits application router must contain a business service prefix as described above.
Request URL example:
https://approuter-repo-examples.cfapps.sap.hana.ondemand.com/comsapappbasiccountry.comsapappbasicscountrylist/test/flpSandbox.html
In this example "comsapappbasiccountry" is the business service prefix which matches the sap.cloud.service attribute in country service VCAP_SERVICES credentials (without dots). The "comsapappbasicscountrylist" is the name of the HTML5 Application as defined in the app.id attribute in the manifest.json (without dots).
The application router is capable of forwarding web socket communication.
In order to use the web socket communication, it should be enabled through the websockets property.
If the backend service requires authentication then the upgrade request should contain a valid session cookie.
The destination schemas "ws" and "wss" are supported in addition to "http" and "https".
When the application router receives an upgrade request, it verifies that the Origin
header holds the URL of the application router.
If this is not the case, then an HTTP response with status 403 is returned to the client.
This origin verification can be further configured via the environment variable WS_ALLOWED_ORIGINS
.
It contains the allowed origins the application router verifies against. It's structure is the same as CJ_PROTECT_WHITELIST
.
Note: A current limitation is that a web socket ping is not forwarded to the backend service.
The application router establishes a session with the client (browser) using a session cookie.
The application router intercepts all session cookies, sent by backend services and stores them in its own session. Backend session cookies are not sent to the client in order to prevent cookie collisions. Upon subsequent requests the application router sends back the cookies to the respective backend services so they can establish their own sessions. Note: Non-session cookies from backend services are forwarded to the client. Cookie collisions may occur and the application should be able to handle them.
If a pending request is canceled, the request cancellation will be propagated to the backend service.
- CSRF token - the generated CSRF token so it can be verified against the token in the request, see CSRF Protection above.
- OAuth token - JSON Web Token (JWT) fetched from UAA and forwarded to backend services in the Authorization header. The client never gets this token.
The application router refreshes the JWT automatically before it expires (if the session is valid). By default this routine is triggered 5 minutes before the expiration of the JWT.
This can also be configured via the
JWT_REFRESH
environment variable (the value is in minutes). IfJWT_REFRESH
is set to 0 then the refresh is disabled. - OAuth scopes - scopes owned by the current user, used to check if the user has the scope required for each request. See
scope
in Routes. - Backend session cookies - all session cookies sent by backend services.
- Business Services OAuth tokens - JSON Web Token (JWT) exchanged and used to access re-use services bound to the application router
Note: If the JWT is close to expiration and the session is still active a JWT refresh will be triggered in JWT_REFRESH
minutes before expiration.
JWT_REFRESH
is an environment variable stating the number of minutes before the JWT expiration the refresh will be triggered. The default value is 5 minutes.
The application router can receive a consumer service xsuaa JWT token and use it to access the UI and the data. The JWT token is passed to the application router in the "x-approuter-authorization" header of the request. For more information, see Authorization Header.
Note: The xsuaa JWT token is generated with the same xsuaa service instance that is bound to the application router.
Caution: You should not use SAP Cloud Platform beta features in subaccounts that belong to productive enterprise accounts. Any use of beta functionality is at the customer's own risk, and SAP shall not be liable for errors or damages caused by the use of beta features. For more information, see Using Beta Features in Subaccounts.
Central Logout can be client initiated or can be triggered due to session timeout.
- Client initiated
- Deletes the user session.
- Requests all backend services logout paths (if configured in the destinations property).
- Request all business services logout paths (if configured in the services property).
- Redirects the client to logout from UAA.
- If configured, redirects back to a custom page (for XS OnPremise Runtime only). For more information, see logout-property.
- Session timeout
- Deletes the user session.
- Requests all backend services logout paths (if configured in the destinations property).
- Requests all business services logout paths (if configured in the services property).
The session timeout can be configured with the SESSION_TIMEOUT variable through the environment.
What is it for? A protection concept is designed in SAP that uses UI libraries and whitelist service for proper clickjack protection of applications. The general idea is that when an html page needs to be rendered in a frame, a check is done by calling the whitelist service to validate if the parent frame is allowed to render the content in a frame. The actual check is provided by the whitelist service.
To enable the service and open the service endpoint you need to configure the whitelistService property in xs-app.json.
The whitelist service reads allowed hostnames and domains from the environment variable CJ_PROTECT_WHITELIST
.
The content is a JSON array of object with the following properties:
Property | Type | Optional | Description |
---|---|---|---|
protocol | String | x | URI scheme, for example http . |
host | String | Hostname / domain - valid hostname, or domain defined with a star (*), for example some.concrete.hostname , or *.example.domain . |
|
port | String / Number | x | Port string or number containing a valid port. |
Example:
[
{
"protocol": "http",
"host": "*.example.domain",
"port": 12345
},
{
"host": "some.concrete.hostname",
}
]
Matching is done against provided properties. For example if only host is provided then the service will return framing: true
for all and matching will be for all schemas and protocols.
The service accepts only GET
requests and the response is a JSON object.
The whitelist service call uses the parent origin as URI parameter (URL encoded) as follows:
GET url/to/whitelist/service?parentOrigin=https://parent.domain.com
The response is a JSON object with following properties:
{
"version" : "1.0",
"active" : true | false, // indicates whether framing control is switched on
"origin" : "<same as passed to service>",
"framing" : true | false // if active, describes if framing should be allowed
}
The property active
will have value false
only in case CJ_PROTECT_WHITELIST
is not provided.
Note: Keep in mind that the application router sends by default the X-Frame-Options header with value SAMEORIGIN
, in the case whitelist service is enabled, this header value probably needs to be changed, see the X-Frame-Options header section for details how to change it.
The application router keeps all established sessions in local memory and does not sync them across multiple instances. In order to scale the application router to multiple instances, session stickiness should be enabled. This means that each HTTP session is handled by the same application router instance.
In Cloud Foundry's router, session stickiness is enabled from version 0.1.0.
In SAP HANA XS Advanced OnPremise Runtime session stickiness is enabled, if SAP Web Dispatcher is used as a router.
This is set by default from version 0.1535 of SAP HANA XS Advanced runtime.
If your on-premise runtime uses nginx as router, you can switch to SAP Web Dispatcher by passing the command line option --router=webdispatcher
to xs-controller
.
The memory consumption of the application router is described in the sizing guide.
You can configure application router to accept only HTTPS connections. See httpsOptions
option of start function.
The application router logs information regarding unauthorized requests. To avoid exposure of private information such as user id and IP address, you must bind the consuming application to an instance of the audit-log service.
If you do not bind the consuming application to the audit-log service, the application router will log this information to the console output, using asterisks to mask the user id and IP address. (This is the default behavior.)
The application router uses @sap/logging package so all of its features are available to control logging.
For example to set all logging and tracing to finest level set XS_APP_LOG_LEVEL
environment variable to debug
.
If the application is deployed on Cloud Foundry, you can change the log level by running command:
cf set-env <application-name> XS_APP_LOG_LEVEL DEBUG
If the application is deployed on XS Advanced On-premise Runtime, you can change the log level without restarting the application. For example this command will set all logging and tracing to finest level.
xs set-logging-level <application-name> "*" debug
See @sap/logging documentation for details.
You can enable additional traces of the incoming and outgoing requests by setting the environment variable REQUEST_TRACE
to true
.
When enabled they will log basic information for every incoming and outgoing request of the application router. This could have a performance impact.
Some of the libraries used by this package employ other tracing mechanisms. For example many use the popular debug package. This means that by setting DEBUG
environment variable, you can enable additional traces. Set it to *
to enable all of them, but be careful as the output may be overwhelming.
In addition internal Node.js traces can be enabled via NODE_DEBUG
environment variable. This post describes it in more detail.
Warning: Enabling some of these options may trace security sensitive data, so use with caution.
The @sap/logging package sets the header 'x-request-id' in the application router's responses. This is useful if you would like to search entries belonging to a particular request execution in the application router's logs and traces. Note that the application router does not change the headers received from the backend and being forwarded to the client. If the backend is a Node.js application which uses the @sap/logging package (and also sets the 'x-request-id' header), then the value of the header that the client will receive will be the one coming from the backend and not the one of the application router itself.
See extending for information how to extend the application router with custom logic.
Setting the Content-Security-Policy
header - this is a response header which informs browsers (capable of interpreting it) about the trusted sources
from which an application expects to load resources. This mechanism allows the client to detect and block malicious scripts injected into an application.
A value can be set via the httpHeaders
environment variable in the additional headers configuration.
The value represents a security policy which contains directive-value pairs. The value of a directive is a whitelist of trusted sources.
Refer to the Content-Security-Policy
specification for more information on the header's value.
Note: Usage of the Content-Security-Policy
header is considered second line of defense. An application should always provide proper input validation and output encoding.
- If you to enable login in same browser window as doctor and patient you can create 2 cf routes to same approuter:
https://approuter-doctors.cfapps.hana.com/myapp/doctors/index.html
{
"source": "^/doctors(/.*)",
"target": "$1",
"service": "html5-apps-repo-rt",
"authenticationType": "xsuaa",
"identityProvider": "doctorsIDP"
}
https://approuter-patients.cfapps.hana.com/myapp/patients/index.html
{
"source": "^/patients(/.*)",
"target": "$1",
"service": "html5-apps-repo-rt",
"authenticationType": "xsuaa",
"identityProvider": "patrientsIDP"
}
- If you to enable single access at a time (force logout from doctors idp and re-login to patients idp), create a single cf route
https://approuter-hospital.cfapps.hana.com/myapp/doctors/index.html
{
"source": "^/doctors(/.*)",
"target": "$1",
"service": "html5-apps-repo-rt",
"authenticationType": "xsuaa",
"identityProvider": "doctorsIDP"
}
https://approuter-hospital.cfapps.hana.com/myapp/patients/index.html
{
"source": "^/patients(/.*)",
"target": "$1",
"service": "html5-apps-repo-rt",
"authenticationType": "xsuaa",
"identityProvider": "patrientsIDP"
}