►
From YouTube: Catalog and expose your APIs through a Developer Portal
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
A
This
developer
portal,
so
we
have
two
components
here:
the
first
one
is
this
glue
mesh
portal
server,
which
is
a
back
end
that
provides
a
well-defined
API.
That's
going
to
be
used
by
the
developer
portal
content
to
know
which
API
to
show
which
user
when
they've
been
authenticated.
So
we
first
need
to
configure
this
component
and
to
expose
this
API
provided
by
this
component.
So
we
can
go
ahead
and
create
this
route
table
for
sending
requests
to
this
portal
server.
We
see
another
nice
feature
of
these
route
tables
where
you
can
define
a
default
destination.
A
So,
basically,
to
summarize
I
want
to
expose
the
back
end
API,
both
securely
and
publicly,
so
that
if
there
is
a
quest
that
is
coming
from
a
user
who
is
not
authenticated
in
the
portal,
it's
going
to
follow
these
specific
routes
and
I'm
going
to
show
you
the
public
apis
I
want
to
expose
these
apis
publicly
and
if
a
user
goes
through
this
route
and
they
are
authenticated,
then
we're
good.
Then
I
want
to
demonstrate
to
them
that
the
API
that
they
should
have
access
to.
A
So
it's
kind
of
the
API
product
so
I
want
to
expose
my
API
that
is
composed
of
the
open,
library.org
and
the
product
page
API
stitched
together.
So
that's
my
portal
object
and
now
again
you
can
basically
send
the
same
request
that
I
sent
before.
In
that
case,
you
see
I'm,
not
authenticated,
so
I
don't
see
any
sort
of
apis
returned.
A
A
A
I
I'll
just
go
ahead
and
create
a
Docker
image
for
it
and
I'm
just
going
to
push
this
to
a
local
registry,
but
obviously,
in
your
case
you're,
probably
not
going
to
use
a
local
registry.
You
probably
have
a
public
registry
like
Docker
Hub
or
the
GitHub
container
registry,
I
already
compiled
it
and
then
and
then
I'm
going
to
go
ahead
and
deploy
this
application.
Just
like
a
standard
kubernetes
deployment
now
here
in
my
kubernetes
cluster
I
can
even
deploy
it
in
the
glue
mesh
add-ons
namespace,
but
it
could
really
be
deployed
anywhere.
A
So
if
I
go
to
my
first
cluster
I
can
see
that
there
is
this
front
end
being
initialized,
and
now
I
can
expose
this
content
so
again
using
a
route
table.
You
start
to
see,
what's
really
used
and
then
we
can
also
go
ahead
and
Define
different
paths
and
we
Define
which
one
we
want
to
authenticate
the
user.
A
We
can
see
that
right
now,
I
don't
have
any
apis
that
are
public,
so
I
cannot
see
any
API
and
I
can
also
see
that
right
now
we
use
this
secret
for
applying
the
oauth
workflow,
because
we
also
want
to
secure.
If
you
remember
here,
I
said,
if
the
requests
go
to
this
path
with
the
with
the
login.
So
if
the
user
goes
ahead
and
clicks
on
the
login
button,
I
want
to
make
sure
that
it's
going
to
be
authenticated.
A
That's
why
I
went
ahead
and
added
this
oauth
equals
true,
so
I'm
going
to
configure
the
oidc
workflow
for
the
front
end.
So
if
you've
already
watched
the
video
where
I
explain
how
to
do
that
for
the
HTTP
bin,
it's
following
the
exact
same
example
in
principle.
Applying
this
to
the
wrap
table
with
oauth
equals
true
and
defining
different
different
parameters
for
key
globe.
So
I
can
go
ahead
and
secure
access
here
and
I
can
go
ahead
and
create
the
xdoth
server
again.