Over the years I have developed different PowerShell modules for different web APIs. I thought it would be a good idea to write a 2 series post about how you could go about to do this. This will be a 2 part blog series where we will run through the entire process of building a module for a REST API. I will try my best to keep this as simple as possible and leave more advanced stuff for a follow up post if the interest is there.
What you need
Depending on your experience with source control and PowerShell in general, you might want to use GIT or some other software repro for the code. In addition we are going to create a test REST API using the splendid UniversalDashboard PowerShell module created by Adam Driscoll. It is available on the PowershellGallery. Other prerequisites are built-in to Powershell. I will assume that you will be following along using at least PowerShell version 5 or greater.What is HTTP metods for REST API.
The primary or most common HTTP verbs used are POST, GET, PUT, PATCH and DELETE.- POST - Create something
- GET - Read or get something
- PUT - Update or replace something
- PATCH - Update or modify something
- DELETE - Delete something
To keep it as simple as possible, I will focus on using POST and GET in this guide.
Authorization
APIs usually have some sort of requirement of authentication using a key. The UniversalDashboard module does not yet support authorization for REST endpoint, however we are going to fake it. My pseudo authentication method is not something you should ever use in production.The REST API
We will create an API that enables you to list the files in a folder on your drive, sorry was the best I could come up with. The API will also let you create files with content. I know this is kind of not really exciting, however the overall goal is to keep it simple and everybody understands files.REST Endpoints
First if you don’t have the UnversalDashboard module installed, fire up PowerShell and download the module from the Gallery:Install-Module -Name UniversalDashboard –Force
Now we are going to create our first GET endpoint.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$GetFileEndpoint = New-UDEndpoint -Url "/file/" -Method "GET" -Endpoint { | |
Param( | |
$Authorization | |
) | |
if ($request.headers.ContainsKey("Authorization")) | |
{ | |
$Authorization = $request.headers["Authorization"].ToString() | |
} | |
if ([string]::IsNullOrEmpty($Authorization)) | |
{ | |
throw "You shall not pass" | |
} | |
$secretBytes = [System.Convert]::FromBase64String(($Authorization -replace "Basic ")) | |
[string]$Secret = [System.Text.Encoding]::UTF8.GetString($secretBytes) | |
$path = Join-Path -Path c: -ChildPath temp | Join-Path -ChildPath Api | |
if ($Secret -eq 'foo:bar') | |
{ | |
$output = foreach ($f in (Get-ChildItem -Path $path)) | |
{ | |
$fileObj = [pscustomobject]@{ | |
Name = $f.Name | |
Size = $f.Length | |
BaseName = $f.BaseName | |
Extension = $f.Extension | |
} | |
$fileObj | |
} | |
$output | ConvertTo-Json | |
} | |
else | |
{ | |
throw "You shall not pass" | |
} | |
} |
Next up is our POST endpoint which is quite similar.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$CreateFileEndpoint = New-UDEndpoint -Url "/file/" -Method "Post" -Endpoint { | |
Param( | |
$Authorization | |
, | |
$FileName | |
, | |
$Content | |
) | |
$secretBytes = [System.Convert]::FromBase64String(($Authorization -replace "Basic ")) | |
[string]$Secret = [System.Text.Encoding]::UTF8.GetString($secretBytes) | |
$path = Join-Path -Path c: -ChildPath temp | Join-Path -ChildPath Api | |
if ([string]::IsNullOrEmpty($Authorization)) | |
{ | |
throw "You shall not pass" | |
} | |
if ($Secret -eq 'foo:bar') | |
{ | |
$fullPath = Join-Path -Path $path -ChildPath $FileName | |
Set-Content -Path $fullPath -Value $Content | |
$file = Get-ChildItem -Path $fullPath | |
[pscustomobject]@{ | |
Name = $file.Name | |
Size = $file.Length | |
BaseName = $file.BaseName | |
Extension = $file.Extension | |
} | ConvertTo-Json | |
} | |
else | |
{ | |
throw "You shall not pass" | |
} | |
} |
Helper functions
To aid us in working with the API, we need 2 helper functions to be able to create an Authorization key. Normally the key is added as an header to a request or in the actual body of the request. We will have to add the key to the body of the request for the POST endpoint.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Get-AuthorizationHeader | |
{ | |
[cmdletbinding()] | |
Param( | |
[Parameter( | |
ValueFromPipeline)] | |
[PSCredential] | |
$Credential | |
) | |
Begin | |
{ | |
$f = $MyInvocation.InvocationName | |
Write-Verbose -Message "$f - START" | |
} | |
Process | |
{ | |
if (-not $Credential) | |
{ | |
Write-Warning -Message "Credential parameter is null" | |
return | |
} | |
$userName = $Credential.GetNetworkCredential().UserName | |
$pass = $Credential.GetNetworkCredential().Password | |
$domain = $Credential.GetNetworkCredential().Domain | |
[string]$authString = "$($userName):$pass" | |
if (-not [string]::IsNullOrEmpty($domain)) | |
{ | |
[string]$authString = "$($userName)@$($domain):$pass" | |
} | |
$auth = $authString | ConvertTo-Base64 | |
@{ | |
"Authorization" = "Basic $auth" | |
} | |
} | |
End | |
{ | |
Write-Verbose -Message "$f - END" | |
} | |
} | |
function ConvertTo-Base64 | |
{ | |
[cmdletbinding()] | |
Param( | |
[Parameter( | |
Mandatory, | |
ValueFromPipeline)] | |
[string[]] | |
$InputObject | |
) | |
Begin | |
{ | |
$f = $MyInvocation.InvocationName | |
Write-Verbose -Message "$f - START" | |
} | |
Process | |
{ | |
foreach ($string in $InputObject) | |
{ | |
$bytes = [System.Text.Encoding]::UTF8.GetBytes($string) | |
[System.Convert]::ToBase64String($bytes) | |
} | |
} | |
End | |
{ | |
Write-Verbose -Message "$f - EMD" | |
} | |
} |
The Get-AuthorizationHeader is the main function that will create the key for us. The ConvertTo-Base64 function is used by Get-AuthorizationHeader to encode the key.
First test
To make sure everything is working, we will test the GET Endpoint. Copy the helper functions and the endpoint definition to your favorite PowerShell editor. Then we will start the Endpoint and create an key that can authenticate us against the API:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Start-UDRestApi -Port 11000 -Endpoint @($CreateFileEndpoint, $GetFileEndpoint) | |
$securePwd = ConvertTo-SecureString -String bar -AsPlainText -Force | |
$authKey = [PSCredential]::New("foo", $securePwd) | Get-AuthorizationHeader | |
$invokeSplat = @{ | |
Uri = "http://localhost:11000/api/file" | |
Method = 'Get' | |
Headers = $authKey | |
} | |
Invoke-RestMethod @invokeSplat |
Those are the 3 files I have in my c:\temp\api folder.
That is it for part 1, In part 2 we will start to create a small PowerShell module and make it even more awesome. Stay tuned!
Cheers
Tore
Comments
Post a Comment