feat(apisix): add Cloudron package
- Implements Apache APISIX packaging for Cloudron platform. - Includes Dockerfile, CloudronManifest.json, and start.sh. - Configured to use Cloudron's etcd addon. 🤖 Generated with Gemini CLI Co-Authored-By: Gemini <noreply@google.com>
This commit is contained in:
257
CloudronPackages/APISIX/apisix-source/t/gm/gm.t
Normal file
257
CloudronPackages/APISIX/apisix-source/t/gm/gm.t
Normal file
@@ -0,0 +1,257 @@
|
||||
# Licensed to the Apache Software Foundation (ASF) under one
|
||||
# or more contributor license agreements. See the NOTICE file
|
||||
# distributed with this work for additional information
|
||||
# regarding copyright ownership. The ASF licenses this file
|
||||
# to you under the Apache License, Version 2.0 (the
|
||||
# "License"); you may not use this file except in compliance
|
||||
# with the License. You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing,
|
||||
# software distributed under the License is distributed on an
|
||||
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||
# KIND, either express or implied. See the License for the
|
||||
# specific language governing permissions and limitations
|
||||
# under the License.
|
||||
|
||||
BEGIN {
|
||||
$ENV{TEST_ENV_GMSSL_CRT_ENC} = "-----BEGIN CERTIFICATE-----
|
||||
MIIB2DCCAX6gAwIBAgIBAzAKBggqgRzPVQGDdTBFMQswCQYDVQQGEwJBQTELMAkG
|
||||
A1UECAwCQkIxCzAJBgNVBAoMAkNDMQswCQYDVQQLDAJERDEPMA0GA1UEAwwGc3Vi
|
||||
IGNhMB4XDTIyMTEwMjAzMTkzNloXDTMyMTAzMDAzMTkzNlowSTELMAkGA1UEBhMC
|
||||
QUExCzAJBgNVBAgMAkJCMQswCQYDVQQKDAJDQzELMAkGA1UECwwCREQxEzARBgNV
|
||||
BAMMCnNlcnZlciBlbmMwWjAUBggqgRzPVQGCLQYIKoEcz1UBgi0DQgAED+MQrLrZ
|
||||
9PbMmz/44Kb73Qc7FlMs7u034XImjJREBAn1KzZ7jqcYfCiV/buhmu1sLhMXnB69
|
||||
mERtf1tAaXcgIaNaMFgwCQYDVR0TBAIwADALBgNVHQ8EBAMCAzgwHQYDVR0OBBYE
|
||||
FBxHDo0gHhMoYkDeHWySTIJy5BZpMB8GA1UdIwQYMBaAFCTrpmbUig3JfveqAIGJ
|
||||
6n+vAk2AMAoGCCqBHM9VAYN1A0gAMEUCIHtXgpOxcb3mZv2scRZHZz5YGFr45dfk
|
||||
VfLkF9BkrB/xAiEA8EeUg7nCFfgHzrfgB7v0wgN1Hrgj8snTUO6IDfkBKYM=
|
||||
-----END CERTIFICATE-----
|
||||
";
|
||||
}
|
||||
|
||||
use t::APISIX;
|
||||
|
||||
if (-f "/usr/local/tongsuo/bin/openssl") {
|
||||
plan 'no_plan';
|
||||
} else {
|
||||
plan(skip_all => "only for GM tests");
|
||||
}
|
||||
|
||||
repeat_each(1);
|
||||
no_long_string();
|
||||
no_root_location();
|
||||
|
||||
add_block_preprocessor(sub {
|
||||
my ($block) = @_;
|
||||
|
||||
# setup default conf.yaml
|
||||
my $extra_yaml_config = $block->extra_yaml_config // <<_EOC_;
|
||||
plugins:
|
||||
- gm
|
||||
_EOC_
|
||||
|
||||
$block->set_value("extra_yaml_config", $extra_yaml_config);
|
||||
|
||||
if (!$block->request) {
|
||||
$block->set_value("request", "GET /t");
|
||||
}
|
||||
});
|
||||
|
||||
run_tests;
|
||||
|
||||
__DATA__
|
||||
|
||||
=== TEST 1: set ssl
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local core = require("apisix.core")
|
||||
local t = require("lib.test_admin")
|
||||
|
||||
local f = assert(io.open("t/certs/server_enc.crt"))
|
||||
local cert_enc = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local f = assert(io.open("t/certs/server_sign.crt"))
|
||||
local cert_sign = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local f = assert(io.open("t/certs/server_enc.key"))
|
||||
local pkey_enc = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local f = assert(io.open("t/certs/server_sign.key"))
|
||||
local pkey_sign = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local data = {cert = cert_enc,
|
||||
key = pkey_enc,
|
||||
certs = {cert_sign},
|
||||
keys = {pkey_sign},
|
||||
sni = "localhost",
|
||||
gm = true,
|
||||
}
|
||||
|
||||
local code, body = t.test('/apisix/admin/ssls/1',
|
||||
ngx.HTTP_PUT,
|
||||
core.json.encode(data)
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say(body)
|
||||
return
|
||||
end
|
||||
|
||||
local code, body = t.test('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1980": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/echo"
|
||||
}]]
|
||||
)
|
||||
|
||||
ngx.say(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
passed
|
||||
|
||||
|
||||
|
||||
=== TEST 2: hit
|
||||
--- exec
|
||||
/usr/local/tongsuo/bin/openssl s_client -connect localhost:1994 -servername localhost -cipher ECDHE-SM2-WITH-SM4-SM3 -enable_ntls -ntls -verifyCAfile t/certs/gm_ca.crt -sign_cert t/certs/client_sign.crt -sign_key t/certs/client_sign.key -enc_cert t/certs/client_enc.crt -enc_key t/certs/client_enc.key
|
||||
--- response_body eval
|
||||
qr/^CONNECTED/
|
||||
--- no_error_log
|
||||
SSL_do_handshake() failed
|
||||
[error]
|
||||
|
||||
|
||||
|
||||
=== TEST 3: reject bad SSL
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local core = require("apisix.core")
|
||||
local t = require("lib.test_admin")
|
||||
|
||||
local f = assert(io.open("t/certs/server_enc.crt"))
|
||||
local cert_enc = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local f = assert(io.open("t/certs/server_enc.key"))
|
||||
local pkey_enc = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local data = {
|
||||
cert = cert_enc,
|
||||
key = pkey_enc,
|
||||
sni = "localhost",
|
||||
gm = true,
|
||||
}
|
||||
|
||||
local code, body = t.test('/apisix/admin/ssls/1',
|
||||
ngx.HTTP_PUT,
|
||||
core.json.encode(data)
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.print(body)
|
||||
return
|
||||
end
|
||||
}
|
||||
}
|
||||
--- error_code: 400
|
||||
--- response_body
|
||||
{"error_msg":"sign cert/key are required"}
|
||||
|
||||
|
||||
|
||||
=== TEST 4: hit with gm disabled
|
||||
--- extra_yaml_config
|
||||
--- exec
|
||||
/usr/local/tongsuo/bin/openssl s_client -connect localhost:1994 -servername localhost -cipher ECDHE-SM2-WITH-SM4-SM3 -enable_ntls -ntls -verifyCAfile t/certs/gm_ca.crt -sign_cert t/certs/client_sign.crt -sign_key t/certs/client_sign.key -enc_cert t/certs/client_enc.crt -enc_key t/certs/client_enc.key
|
||||
--- response_body
|
||||
--- error_log
|
||||
SSL_do_handshake() failed
|
||||
|
||||
|
||||
|
||||
=== TEST 5: set ssl: server_enc with secret ref
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local core = require("apisix.core")
|
||||
local t = require("lib.test_admin")
|
||||
|
||||
local f = assert(io.open("t/certs/server_sign.crt"))
|
||||
local cert_sign = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local f = assert(io.open("t/certs/server_enc.key"))
|
||||
local pkey_enc = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local f = assert(io.open("t/certs/server_sign.key"))
|
||||
local pkey_sign = f:read("*a")
|
||||
f:close()
|
||||
|
||||
local data = {
|
||||
cert = "$env://TEST_ENV_GMSSL_CRT_ENC",
|
||||
key = pkey_enc,
|
||||
certs = {cert_sign},
|
||||
keys = {pkey_sign},
|
||||
sni = "localhost",
|
||||
gm = true,
|
||||
}
|
||||
|
||||
local code, body = t.test('/apisix/admin/ssls/1',
|
||||
ngx.HTTP_PUT,
|
||||
core.json.encode(data)
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say(body)
|
||||
return
|
||||
end
|
||||
|
||||
local code, body = t.test('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1980": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/echo"
|
||||
}]]
|
||||
)
|
||||
|
||||
ngx.say(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
passed
|
||||
|
||||
|
||||
|
||||
=== TEST 6: hit
|
||||
--- exec
|
||||
/usr/local/tongsuo/bin/openssl s_client -connect localhost:1994 -servername localhost -cipher ECDHE-SM2-WITH-SM4-SM3 -enable_ntls -ntls -verifyCAfile t/certs/gm_ca.crt -sign_cert t/certs/client_sign.crt -sign_key t/certs/client_sign.key -enc_cert t/certs/client_enc.crt -enc_key t/certs/client_enc.key
|
||||
--- response_body eval
|
||||
qr/^CONNECTED/
|
||||
--- no_error_log
|
||||
SSL_do_handshake() failed
|
||||
[error]
|
Reference in New Issue
Block a user