feat(apisix): add Cloudron package
- Implements Apache APISIX packaging for Cloudron platform. - Includes Dockerfile, CloudronManifest.json, and start.sh. - Configured to use Cloudron's etcd addon. 🤖 Generated with Gemini CLI Co-Authored-By: Gemini <noreply@google.com>
This commit is contained in:
@@ -0,0 +1,176 @@
|
||||
--
|
||||
-- Licensed to the Apache Software Foundation (ASF) under one or more
|
||||
-- contributor license agreements. See the NOTICE file distributed with
|
||||
-- this work for additional information regarding copyright ownership.
|
||||
-- The ASF licenses this file to You under the Apache License, Version 2.0
|
||||
-- (the "License"); you may not use this file except in compliance with
|
||||
-- the License. You may obtain a copy of the License at
|
||||
--
|
||||
-- http://www.apache.org/licenses/LICENSE-2.0
|
||||
--
|
||||
-- Unless required by applicable law or agreed to in writing, software
|
||||
-- distributed under the License is distributed on an "AS IS" BASIS,
|
||||
-- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
-- See the License for the specific language governing permissions and
|
||||
-- limitations under the License.
|
||||
--
|
||||
local core = require("apisix.core")
|
||||
local http = require("resty.http")
|
||||
local session = require("resty.session")
|
||||
local ngx = ngx
|
||||
local rand = math.random
|
||||
local tostring = tostring
|
||||
|
||||
|
||||
local plugin_name = "authz-casdoor"
|
||||
local schema = {
|
||||
type = "object",
|
||||
properties = {
|
||||
-- Note: endpoint_addr and callback_url should not end with '/'
|
||||
endpoint_addr = {type = "string", pattern = "^[^%?]+[^/]$"},
|
||||
client_id = {type = "string"},
|
||||
client_secret = {type = "string"},
|
||||
callback_url = {type = "string", pattern = "^[^%?]+[^/]$"}
|
||||
},
|
||||
encrypt_fields = {"client_secret"},
|
||||
required = {
|
||||
"callback_url", "endpoint_addr", "client_id", "client_secret"
|
||||
}
|
||||
}
|
||||
|
||||
local _M = {
|
||||
version = 0.1,
|
||||
priority = 2559,
|
||||
name = plugin_name,
|
||||
schema = schema
|
||||
}
|
||||
|
||||
local function fetch_access_token(code, conf)
|
||||
local client = http.new()
|
||||
local url = conf.endpoint_addr .. "/api/login/oauth/access_token"
|
||||
local res, err = client:request_uri(url, {
|
||||
method = "POST",
|
||||
body = ngx.encode_args({
|
||||
code = code,
|
||||
grant_type = "authorization_code",
|
||||
client_id = conf.client_id,
|
||||
client_secret = conf.client_secret
|
||||
}),
|
||||
headers = {
|
||||
["Content-Type"] = "application/x-www-form-urlencoded"
|
||||
}
|
||||
})
|
||||
|
||||
if not res then
|
||||
return nil, nil, err
|
||||
end
|
||||
local data, err = core.json.decode(res.body)
|
||||
|
||||
if err or not data then
|
||||
err = "failed to parse casdoor response data: " .. err .. ", body: " .. res.body
|
||||
return nil, nil, err
|
||||
end
|
||||
|
||||
if not data.access_token then
|
||||
return nil, nil,
|
||||
"failed when accessing token: no access_token contained"
|
||||
end
|
||||
-- In the reply of casdoor, setting expires_in to 0 indicates that the access_token is invalid.
|
||||
if not data.expires_in or data.expires_in == 0 then
|
||||
return nil, nil, "failed when accessing token: invalid access_token"
|
||||
end
|
||||
|
||||
return data.access_token, data.expires_in, nil
|
||||
end
|
||||
|
||||
|
||||
function _M.check_schema(conf)
|
||||
local check = {"endpoint_addr", "callback_url"}
|
||||
core.utils.check_https(check, conf, plugin_name)
|
||||
return core.schema.check(schema, conf)
|
||||
end
|
||||
|
||||
|
||||
function _M.access(conf, ctx)
|
||||
local current_uri = ctx.var.uri
|
||||
local session_obj_read, session_present = session.open()
|
||||
-- step 1: check whether hits the callback
|
||||
local m, err = ngx.re.match(conf.callback_url, ".+//[^/]+(/.*)", "jo")
|
||||
if err or not m then
|
||||
core.log.error(err)
|
||||
return 503
|
||||
end
|
||||
local real_callback_url = m[1]
|
||||
if current_uri == real_callback_url then
|
||||
if not session_present then
|
||||
err = "no session found"
|
||||
core.log.error(err)
|
||||
return 503
|
||||
end
|
||||
local state_in_session = session_obj_read.data.state
|
||||
if not state_in_session then
|
||||
err = "no state found in session"
|
||||
core.log.error(err)
|
||||
return 503
|
||||
end
|
||||
local args = core.request.get_uri_args(ctx)
|
||||
if not args or not args.code or not args.state then
|
||||
err = "failed when accessing token. Invalid code or state"
|
||||
core.log.error(err)
|
||||
return 400, err
|
||||
end
|
||||
if args.state ~= tostring(state_in_session) then
|
||||
err = "invalid state"
|
||||
core.log.error(err)
|
||||
return 400, err
|
||||
end
|
||||
if not args.code then
|
||||
err = "invalid code"
|
||||
core.log.error(err)
|
||||
return 400, err
|
||||
end
|
||||
local access_token, lifetime, err =
|
||||
fetch_access_token(args.code, conf)
|
||||
if not access_token then
|
||||
core.log.error(err)
|
||||
return 503
|
||||
end
|
||||
local original_url = session_obj_read.data.original_uri
|
||||
if not original_url then
|
||||
err = "no original_url found in session"
|
||||
core.log.error(err)
|
||||
return 503
|
||||
end
|
||||
local session_obj_write = session.new {
|
||||
cookie = {lifetime = lifetime}
|
||||
}
|
||||
session_obj_write:start()
|
||||
session_obj_write.data.access_token = access_token
|
||||
session_obj_write:save()
|
||||
core.response.set_header("Location", original_url)
|
||||
return 302
|
||||
end
|
||||
|
||||
-- step 2: check whether session exists
|
||||
if not (session_present and session_obj_read.data.access_token) then
|
||||
-- session not exists, redirect to login page
|
||||
local state = rand(0x7fffffff)
|
||||
local session_obj_write = session.start()
|
||||
session_obj_write.data.original_uri = current_uri
|
||||
session_obj_write.data.state = state
|
||||
session_obj_write:save()
|
||||
|
||||
local redirect_url = conf.endpoint_addr .. "/login/oauth/authorize?" .. ngx.encode_args({
|
||||
response_type = "code",
|
||||
scope = "read",
|
||||
state = state,
|
||||
client_id = conf.client_id,
|
||||
redirect_uri = conf.callback_url
|
||||
})
|
||||
core.response.set_header("Location", redirect_url)
|
||||
return 302
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
return _M
|
Reference in New Issue
Block a user