Book Image

Building Microservices with Micronaut®

By : Nirmal Singh, Zack Dawood
Book Image

Building Microservices with Micronaut®

By: Nirmal Singh, Zack Dawood

Overview of this book

The open source Micronaut® framework is a JVM-based toolkit designed to create microservices quickly and easily. This book will help full-stack and Java developers build modular, high-performing, and reactive microservice-based apps using the Micronaut framework. You'll start by building microservices and learning about the core components, such as ahead-of-time compilation, reflection-less dependency injection, and reactive baked-in HTTP clients and servers. Next, you will work on a real-time microservice application and learn how to integrate Micronaut projects with different kinds of relational and non-relational databases. You'll also learn how to employ different security mechanisms to safeguard your microservices and integrate microservices using event-driven architecture in the Apache Kafka ecosystem. As you advance, you'll get to grips with automated testing and popular testing tools. The book will help you understand how you can easily handle microservice concerns in Micronaut projects, such as service discovery, API documentation, distributed configuration management, fallbacks, and circuit breakers. Finally, you'll explore the deployment and maintenance aspects of microservices and get up to speed with the Internet of Things (IoT) using the Framework. By the end of this book, you'll be able to build, test, deploy, and maintain your own microservice apps using the framework.
Table of Contents (20 chapters)
1
Section 1: Core Concepts and Basics
3
Section 2: Microservices Development
8
Section 3: Microservices Testing
10
Section 4: Microservices Deployment
13
Section 5: Microservices Maintenance
15
Section 6: IoT with Micronaut and Closure

Working on RESTful microservices in the Micronaut framework

In order to dive into the security aspects of the Micronaut framework, we will continue working on the pet-clinic application. The following table summarizes the changes we will be making to secure each of the microservices in the application:

Table 4.1 – Securing the microservices in the pet-clinic application

To secure the desired endpoints in the microservices, we will focus on the following two key aspects:

  • Identity provider: Essentially, an identity provider owns the concerns regarding storing and maintaining digital identities. Furthermore, it resolves any security claim by authenticating the submitted digital identity with its quorum of stored identities.
  • Authentication strategy: The authentication strategy will dictate how a microservice will communicate with the identity provider to authenticate and authorize the user requests.

Adding to the diagram of the components...