Book Image

Cloud Native Applications with Ballerina

By : Dhanushka Madushan
Book Image

Cloud Native Applications with Ballerina

By: Dhanushka Madushan

Overview of this book

The Ballerina programming language was created by WSO2 for the modern needs of developers where cloud native development techniques have become ubiquitous. Ballerina simplifies how programmers develop and deploy cloud native distributed apps and microservices. Cloud Native Applications with Ballerina will guide you through Ballerina essentials, including variables, types, functions, flow control, security, and more. You'll explore networking as an in-built feature in Ballerina, which makes it a first-class language for distributed computing. With this app development book, you'll learn about different networking protocols as well as different architectural patterns that you can use to implement services on the cloud. As you advance, you'll explore multiple design patterns used in microservice architecture and use serverless in Amazon Web Services (AWS) and Microsoft Azure platforms. You will also get to grips with Docker, Kubernetes, and serverless platforms to simplify maintenance and the deployment process. Later, you'll focus on the Ballerina testing framework along with deployment tools and monitoring tools to build fully automated observable cloud applications. By the end of this book, you will have learned how to apply the Ballerina language for building scalable, resilient, secured, and easy-to-maintain cloud native Ballerina projects and applications.
Table of Contents (15 chapters)
1
Section 1: The Basics
4
Section 2: Building Microservices with Ballerina
8
Section 3: Moving on with Cloud Native

Token-based authorization with Ballerina

In the previous section, we discussed the Basic authentication method, which is the simplest way to authenticate and authorize a user. Having Basic authentication is not practical in a larger distributed system that has separate components connected over a network. Every time a user needs to access a resource, the resource function needs to verify the user by calling an authorization server.

Instead of calling an auth server for each request, a token-based authentication method uses a token to access services. This allows the system to avoid using the user's username and password and use a token instead. Token are temporary keys that can be validated with a public key which is published by the token generator. Using the username and password is more vulnerable since these remain unchanged for a long time. Tokens are comparatively short-lived and can revoke access in case of a security threat.

In this section, we will discuss different...