Skip to content

Instantly share code, notes, and snippets.

View jigarshah2811's full-sized avatar
💭
Learning cloud tools/tech and programming!

Jigar Shah jigarshah2811

💭
Learning cloud tools/tech and programming!
View GitHub Profile
@jigarshah2811
jigarshah2811 / REST-API-Design
Created April 29, 2019 18:37
Best practice: REST API Design
Hi,
The best practice for REST APIs is to use verbs provided by default HTTP methods. Such as, GET, POST, PUT, PATCH, DELETE. On a noun/resource such as ‘users’ in this case.
So the APIs become,
/users: a collection of users
/users/username1: a resource with information about a specific user
And operations on this resource becomes standard HTTP methods.
The APIs in attached xls should use,
@jigarshah2811
jigarshah2811 / My-Intro-To-Team
Created November 14, 2018 19:50
My-Intro-To-Team
Hello team, I am Jigar Shah, gifted with sense and enthusiastic to solve real-world problems through computer science fundamentals ☺
I was working with ACI in Cisco for 3yrs, previously working with AWS (Seattle), IBM, Honeywell(Phoenix) and eInfochips. I love building large-scale enterprise-grade solutions by providing cloud/data-center infrastructure and platform services required for web-apps to perform at large-scale. I designed and developed IaaS/PaaS solutions to provision compute/network/database/storage, provide high availability, reliability, scalability, security through clustering, replicaion, sharding, SOA and micro-services architecture to cater application needs. Prior to working with Multi-site controller, APIC infra in Cisco, I have worked with DynamoDB No-Sql DB service in AWS, worked with BlueGene-Q super-computer control systems components in IBM and worked on real-time avionics RTOS and firmware in Honeywell. https://www.linkedin.com/in/jigarshah2811/
I love playing peak-a-boo with my g
@jigarshah2811
jigarshah2811 / Design-AuthN-AuthZ
Last active November 9, 2018 20:50
Design-AuthN-AuthZ
###Authentication and Authorization Service design
Authentication service: CRUD on user, Local auth, remote auth (Radius/Tacacs+/Ldap), generating JWT token, validating JWT token signature, refreshing JWT token.
Authorization service: Intercepts the API through istio sidecar proxy, validates against RBAC policy and allow/deny to route that API call request to independent micro-service. Exposes interface for admin to define RBAC policies. For user RBAC: policy defines as User->Role->Permission, for service RBAC: policy defines as Service->Role
[Flow diagram](https://www.draw.io/?lightbox=1&highlight=0000ff&edit=_blank&layers=1&nav=1#G13iqU6740_tfflBeqRixg_YxVts56PysP)