feat(apisix): add Cloudron package
- Implements Apache APISIX packaging for Cloudron platform. - Includes Dockerfile, CloudronManifest.json, and start.sh. - Configured to use Cloudron's etcd addon. 🤖 Generated with Gemini CLI Co-Authored-By: Gemini <noreply@google.com>
This commit is contained in:
468
CloudronPackages/APISIX/apisix-source/apisix/admin/resource.lua
Normal file
468
CloudronPackages/APISIX/apisix-source/apisix/admin/resource.lua
Normal file
@@ -0,0 +1,468 @@
|
||||
--
|
||||
-- Licensed to the Apache Software Foundation (ASF) under one or more
|
||||
-- contributor license agreements. See the NOTICE file distributed with
|
||||
-- this work for additional information regarding copyright ownership.
|
||||
-- The ASF licenses this file to You under the Apache License, Version 2.0
|
||||
-- (the "License"); you may not use this file except in compliance with
|
||||
-- the License. You may obtain a copy of the License at
|
||||
--
|
||||
-- http://www.apache.org/licenses/LICENSE-2.0
|
||||
--
|
||||
-- Unless required by applicable law or agreed to in writing, software
|
||||
-- distributed under the License is distributed on an "AS IS" BASIS,
|
||||
-- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
-- See the License for the specific language governing permissions and
|
||||
-- limitations under the License.
|
||||
--
|
||||
local core = require("apisix.core")
|
||||
local utils = require("apisix.admin.utils")
|
||||
local apisix_ssl = require("apisix.ssl")
|
||||
local apisix_consumer = require("apisix.consumer")
|
||||
local setmetatable = setmetatable
|
||||
local tostring = tostring
|
||||
local ipairs = ipairs
|
||||
local type = type
|
||||
|
||||
|
||||
local _M = {
|
||||
list_filter_fields = {},
|
||||
}
|
||||
local mt = {
|
||||
__index = _M
|
||||
}
|
||||
|
||||
|
||||
local no_id_res = {
|
||||
consumers = true,
|
||||
plugin_metadata = true
|
||||
}
|
||||
|
||||
|
||||
local function split_typ_and_id(id, sub_path)
|
||||
local uri_segs = core.utils.split_uri(sub_path)
|
||||
local typ = id
|
||||
local id = nil
|
||||
if #uri_segs > 0 then
|
||||
id = uri_segs[1]
|
||||
end
|
||||
return typ, id
|
||||
end
|
||||
|
||||
|
||||
local function check_forbidden_properties(conf, forbidden_properties)
|
||||
local not_allow_properties = "the property is forbidden: "
|
||||
|
||||
if conf then
|
||||
for _, v in ipairs(forbidden_properties) do
|
||||
if conf[v] then
|
||||
return not_allow_properties .. " " .. v
|
||||
end
|
||||
end
|
||||
|
||||
if conf.upstream then
|
||||
for _, v in ipairs(forbidden_properties) do
|
||||
if conf.upstream[v] then
|
||||
return not_allow_properties .. " upstream." .. v
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
if conf.plugins then
|
||||
for _, v in ipairs(forbidden_properties) do
|
||||
if conf.plugins[v] then
|
||||
return not_allow_properties .. " plugins." .. v
|
||||
end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
return nil
|
||||
end
|
||||
|
||||
|
||||
function _M:check_conf(id, conf, need_id, typ, allow_time)
|
||||
if self.name == "secrets" then
|
||||
id = typ .. "/" .. id
|
||||
end
|
||||
-- check if missing configurations
|
||||
if not conf then
|
||||
return nil, {error_msg = "missing configurations"}
|
||||
end
|
||||
|
||||
-- check id if need id
|
||||
if not no_id_res[self.name] then
|
||||
id = id or conf.id
|
||||
if need_id and not id then
|
||||
return nil, {error_msg = "missing ".. self.kind .. " id"}
|
||||
end
|
||||
|
||||
if not need_id and id then
|
||||
return nil, {error_msg = "wrong ".. self.kind .. " id, do not need it"}
|
||||
end
|
||||
|
||||
if need_id and conf.id and tostring(conf.id) ~= tostring(id) then
|
||||
return nil, {error_msg = "wrong ".. self.kind .. " id"}
|
||||
end
|
||||
|
||||
conf.id = id
|
||||
end
|
||||
|
||||
-- check create time and update time
|
||||
if not allow_time then
|
||||
local forbidden_properties = {"create_time", "update_time"}
|
||||
local err = check_forbidden_properties(conf, forbidden_properties)
|
||||
if err then
|
||||
return nil, {error_msg = err}
|
||||
end
|
||||
end
|
||||
|
||||
core.log.info("conf : ", core.json.delay_encode(conf))
|
||||
|
||||
-- check the resource own rules
|
||||
if self.name ~= "secrets" then
|
||||
core.log.info("schema: ", core.json.delay_encode(self.schema))
|
||||
end
|
||||
|
||||
local ok, err = self.checker(id, conf, need_id, self.schema, typ)
|
||||
|
||||
if not ok then
|
||||
return ok, err
|
||||
else
|
||||
if no_id_res[self.name] then
|
||||
return ok
|
||||
else
|
||||
return need_id and id or true
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
function _M:get(id, conf, sub_path)
|
||||
if core.table.array_find(self.unsupported_methods, "get") then
|
||||
return 405, {error_msg = "not supported `GET` method for " .. self.kind}
|
||||
end
|
||||
|
||||
local key = "/" .. self.name
|
||||
local typ = nil
|
||||
if self.name == "secrets" then
|
||||
key = key .. "/"
|
||||
typ, id = split_typ_and_id(id, sub_path)
|
||||
end
|
||||
|
||||
if id then
|
||||
if self.name == "secrets" then
|
||||
key = key .. typ
|
||||
end
|
||||
key = key .. "/" .. id
|
||||
end
|
||||
|
||||
-- some resources(consumers) have sub resources(credentials),
|
||||
-- the key format of sub resources will differ from the main resource
|
||||
if self.get_resource_etcd_key then
|
||||
key = self.get_resource_etcd_key(id, conf, sub_path)
|
||||
end
|
||||
|
||||
local res, err = core.etcd.get(key, not id)
|
||||
if not res then
|
||||
core.log.error("failed to get ", self.kind, "[", key, "] from etcd: ", err)
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
|
||||
if self.name == "ssls" then
|
||||
-- not return private key for security
|
||||
if res.body and res.body.node and res.body.node.value then
|
||||
res.body.node.value.key = nil
|
||||
end
|
||||
end
|
||||
|
||||
-- consumers etcd range response will include credentials, so need to filter out them
|
||||
if self.name == "consumers" and res.body.list then
|
||||
res.body.list = apisix_consumer.filter_consumers_list(res.body.list)
|
||||
res.body.total = #res.body.list
|
||||
end
|
||||
|
||||
utils.fix_count(res.body, id)
|
||||
return res.status, res.body
|
||||
end
|
||||
|
||||
|
||||
function _M:post(id, conf, sub_path, args)
|
||||
if core.table.array_find(self.unsupported_methods, "post") then
|
||||
return 405, {error_msg = "not supported `POST` method for " .. self.kind}
|
||||
end
|
||||
|
||||
local id, err = self:check_conf(id, conf, false)
|
||||
if not id then
|
||||
return 400, err
|
||||
end
|
||||
|
||||
if self.name == "ssls" then
|
||||
-- encrypt private key
|
||||
conf.key = apisix_ssl.aes_encrypt_pkey(conf.key)
|
||||
|
||||
if conf.keys then
|
||||
for i = 1, #conf.keys do
|
||||
conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i])
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
local key = "/" .. self.name
|
||||
utils.inject_timestamp(conf)
|
||||
|
||||
local ttl = nil
|
||||
if args then
|
||||
ttl = args.ttl
|
||||
end
|
||||
|
||||
local res, err = core.etcd.push(key, conf, ttl)
|
||||
if not res then
|
||||
core.log.error("failed to post ", self.kind, "[", key, "] to etcd: ", err)
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
|
||||
return res.status, res.body
|
||||
end
|
||||
|
||||
|
||||
function _M:put(id, conf, sub_path, args)
|
||||
if core.table.array_find(self.unsupported_methods, "put") then
|
||||
return 405, {error_msg = "not supported `PUT` method for " .. self.kind}
|
||||
end
|
||||
|
||||
local key = "/" .. self.name
|
||||
local typ = nil
|
||||
if self.name == "secrets" then
|
||||
typ, id = split_typ_and_id(id, sub_path)
|
||||
key = key .. "/" .. typ
|
||||
end
|
||||
|
||||
local need_id = not no_id_res[self.name]
|
||||
local ok, err = self:check_conf(id, conf, need_id, typ)
|
||||
if not ok then
|
||||
return 400, err
|
||||
end
|
||||
|
||||
if self.name ~= "secrets" then
|
||||
id = ok
|
||||
end
|
||||
|
||||
if self.name == "ssls" then
|
||||
-- encrypt private key
|
||||
conf.key = apisix_ssl.aes_encrypt_pkey(conf.key)
|
||||
|
||||
if conf.keys then
|
||||
for i = 1, #conf.keys do
|
||||
conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i])
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
key = key .. "/" .. id
|
||||
|
||||
if self.get_resource_etcd_key then
|
||||
key = self.get_resource_etcd_key(id, conf, sub_path, args)
|
||||
end
|
||||
|
||||
if self.name == "credentials" then
|
||||
local consumer_key = apisix_consumer.get_consumer_key_from_credential_key(key)
|
||||
local res, err = core.etcd.get(consumer_key, false)
|
||||
if not res then
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
if res.status == 404 then
|
||||
return res.status, {error_msg = "consumer not found"}
|
||||
end
|
||||
if res.status ~= 200 then
|
||||
core.log.debug("failed to get consumer for the credential, credential key: ", key,
|
||||
", consumer key: ", consumer_key, ", res.status: ", res.status)
|
||||
return res.status, {error_msg = "failed to get the consumer"}
|
||||
end
|
||||
end
|
||||
|
||||
if self.name ~= "plugin_metadata" then
|
||||
local ok, err = utils.inject_conf_with_prev_conf(self.kind, key, conf)
|
||||
if not ok then
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
else
|
||||
conf.id = id
|
||||
end
|
||||
|
||||
local ttl = nil
|
||||
if args then
|
||||
ttl = args.ttl
|
||||
end
|
||||
|
||||
local res, err = core.etcd.set(key, conf, ttl)
|
||||
if not res then
|
||||
core.log.error("failed to put ", self.kind, "[", key, "] to etcd: ", err)
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
|
||||
return res.status, res.body
|
||||
end
|
||||
|
||||
-- Keep the unused conf to make the args list consistent with other methods
|
||||
function _M:delete(id, conf, sub_path, uri_args)
|
||||
if core.table.array_find(self.unsupported_methods, "delete") then
|
||||
return 405, {error_msg = "not supported `DELETE` method for " .. self.kind}
|
||||
end
|
||||
|
||||
local key = "/" .. self.name
|
||||
local typ = nil
|
||||
if self.name == "secrets" then
|
||||
typ, id = split_typ_and_id(id, sub_path)
|
||||
end
|
||||
|
||||
if not id then
|
||||
return 400, {error_msg = "missing " .. self.kind .. " id"}
|
||||
end
|
||||
|
||||
-- core.log.error("failed to delete ", self.kind, "[", key, "] in etcd: ", err)
|
||||
|
||||
if self.name == "secrets" then
|
||||
key = key .. "/" .. typ
|
||||
end
|
||||
|
||||
key = key .. "/" .. id
|
||||
|
||||
if self.get_resource_etcd_key then
|
||||
key = self.get_resource_etcd_key(id, conf, sub_path, uri_args)
|
||||
end
|
||||
|
||||
if self.delete_checker and uri_args.force ~= "true" then
|
||||
local code, err = self.delete_checker(id)
|
||||
if err then
|
||||
return code, err
|
||||
end
|
||||
end
|
||||
|
||||
if self.name == "consumers" then
|
||||
local res, err = core.etcd.rmdir(key .. "/credentials/")
|
||||
if not res then
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
end
|
||||
|
||||
local res, err = core.etcd.delete(key)
|
||||
if not res then
|
||||
core.log.error("failed to delete ", self.kind, "[", key, "] in etcd: ", err)
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
|
||||
return res.status, res.body
|
||||
end
|
||||
|
||||
|
||||
function _M:patch(id, conf, sub_path, args)
|
||||
if core.table.array_find(self.unsupported_methods, "patch") then
|
||||
return 405, {error_msg = "not supported `PATCH` method for " .. self.kind}
|
||||
end
|
||||
|
||||
local key = "/" .. self.name
|
||||
local typ = nil
|
||||
if self.name == "secrets" then
|
||||
local uri_segs = core.utils.split_uri(sub_path)
|
||||
if #uri_segs < 1 then
|
||||
return 400, {error_msg = "no secret id"}
|
||||
end
|
||||
typ = id
|
||||
id = uri_segs[1]
|
||||
sub_path = core.table.concat(uri_segs, "/", 2)
|
||||
end
|
||||
|
||||
if not id then
|
||||
return 400, {error_msg = "missing " .. self.kind .. " id"}
|
||||
end
|
||||
|
||||
if self.name == "secrets" then
|
||||
key = key .. "/" .. typ
|
||||
end
|
||||
|
||||
key = key .. "/" .. id
|
||||
|
||||
if conf == nil then
|
||||
return 400, {error_msg = "missing new configuration"}
|
||||
end
|
||||
|
||||
if not sub_path or sub_path == "" then
|
||||
if type(conf) ~= "table" then
|
||||
return 400, {error_msg = "invalid configuration"}
|
||||
end
|
||||
end
|
||||
|
||||
local res_old, err = core.etcd.get(key)
|
||||
if not res_old then
|
||||
core.log.error("failed to get ", self.kind, " [", key, "] in etcd: ", err)
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
|
||||
if res_old.status ~= 200 then
|
||||
return res_old.status, res_old.body
|
||||
end
|
||||
core.log.info("key: ", key, " old value: ", core.json.delay_encode(res_old, true))
|
||||
|
||||
local node_value = res_old.body.node.value
|
||||
local modified_index = res_old.body.node.modifiedIndex
|
||||
|
||||
if sub_path and sub_path ~= "" then
|
||||
if self.name == "ssls" then
|
||||
if sub_path == "key" then
|
||||
conf = apisix_ssl.aes_encrypt_pkey(conf)
|
||||
elseif sub_path == "keys" then
|
||||
for i = 1, #conf do
|
||||
conf[i] = apisix_ssl.aes_encrypt_pkey(conf[i])
|
||||
end
|
||||
end
|
||||
end
|
||||
local code, err, node_val = core.table.patch(node_value, sub_path, conf)
|
||||
node_value = node_val
|
||||
if code then
|
||||
return code, {error_msg = err}
|
||||
end
|
||||
utils.inject_timestamp(node_value, nil, true)
|
||||
else
|
||||
if self.name == "ssls" then
|
||||
if conf.key then
|
||||
conf.key = apisix_ssl.aes_encrypt_pkey(conf.key)
|
||||
end
|
||||
|
||||
if conf.keys then
|
||||
for i = 1, #conf.keys do
|
||||
conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i])
|
||||
end
|
||||
end
|
||||
end
|
||||
node_value = core.table.merge(node_value, conf)
|
||||
utils.inject_timestamp(node_value, nil, conf)
|
||||
end
|
||||
|
||||
core.log.info("new conf: ", core.json.delay_encode(node_value, true))
|
||||
|
||||
local ok, err = self:check_conf(id, node_value, true, typ, true)
|
||||
if not ok then
|
||||
return 400, err
|
||||
end
|
||||
|
||||
local ttl = nil
|
||||
if args then
|
||||
ttl = args.ttl
|
||||
end
|
||||
|
||||
local res, err = core.etcd.atomic_set(key, node_value, ttl, modified_index)
|
||||
if not res then
|
||||
core.log.error("failed to set new ", self.kind, "[", key, "] to etcd: ", err)
|
||||
return 503, {error_msg = err}
|
||||
end
|
||||
|
||||
return res.status, res.body
|
||||
end
|
||||
|
||||
|
||||
function _M.new(opt)
|
||||
return setmetatable(opt, mt)
|
||||
end
|
||||
|
||||
|
||||
return _M
|
Reference in New Issue
Block a user