feat(apisix): add Cloudron package
- Implements Apache APISIX packaging for Cloudron platform. - Includes Dockerfile, CloudronManifest.json, and start.sh. - Configured to use Cloudron's etcd addon. 🤖 Generated with Gemini CLI Co-Authored-By: Gemini <noreply@google.com>
This commit is contained in:
473
CloudronPackages/APISIX/apisix-source/t/plugin/openid-connect7.t
Normal file
473
CloudronPackages/APISIX/apisix-source/t/plugin/openid-connect7.t
Normal file
@@ -0,0 +1,473 @@
|
||||
#
|
||||
# Licensed to the Apache Software Foundation (ASF) under one or more
|
||||
# contributor license agreements. See the NOTICE file distributed with
|
||||
# this work for additional information regarding copyright ownership.
|
||||
# The ASF licenses this file to You under the Apache License, Version 2.0
|
||||
# (the "License"); you may not use this file except in compliance with
|
||||
# the License. You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
use t::APISIX 'no_plan';
|
||||
|
||||
log_level('debug');
|
||||
repeat_each(1);
|
||||
no_long_string();
|
||||
no_root_location();
|
||||
# no_shuffle();
|
||||
|
||||
add_block_preprocessor(sub {
|
||||
my ($block) = @_;
|
||||
|
||||
if ((!defined $block->error_log) && (!defined $block->no_error_log)) {
|
||||
$block->set_value("no_error_log", "[error]");
|
||||
}
|
||||
|
||||
if (!defined $block->request) {
|
||||
$block->set_value("request", "GET /t");
|
||||
}
|
||||
});
|
||||
|
||||
run_tests();
|
||||
|
||||
__DATA__
|
||||
|
||||
=== TEST 1: Create route (jwt local, audience required)
|
||||
It reuses Keycloak's TLS private key to export the public key.
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
local code, body = t('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"plugins": {
|
||||
"openid-connect": {
|
||||
"client_id": "apisix",
|
||||
"client_secret": "secret",
|
||||
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
||||
"bearer_only": true,
|
||||
"claim_validator": {
|
||||
"audience": {
|
||||
"required": true
|
||||
}
|
||||
},
|
||||
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
||||
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
||||
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
||||
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
||||
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
||||
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
||||
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
||||
[[QQIDAQAB\n]] ..
|
||||
[[-----END PUBLIC KEY-----",
|
||||
"token_signing_alg_values_expected": "RS256"
|
||||
}
|
||||
},
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1980": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/hello"
|
||||
}]]
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
end
|
||||
ngx.say(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
passed
|
||||
|
||||
|
||||
|
||||
=== TEST 2: Access route with a valid token (with audience)
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local http = require "resty.http"
|
||||
local httpc = http.new()
|
||||
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
||||
method = "POST",
|
||||
body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack",
|
||||
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
local access_token = require("toolkit.json").decode(res.body).access_token
|
||||
local res, err = httpc:request_uri("http://127.0.0.1:1980/hello", {
|
||||
method = "GET",
|
||||
headers = { Authorization = "Bearer " .. access_token }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
ngx.status = res.status
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
=== TEST 3: Update route (jwt local, audience required, custom claim)
|
||||
Use a custom non-existent claim to simulate the case where the standard field "aud" is not included.
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
local code, body = t('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"plugins": {
|
||||
"openid-connect": {
|
||||
"client_id": "apisix",
|
||||
"client_secret": "secret",
|
||||
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
||||
"bearer_only": true,
|
||||
"claim_validator": {
|
||||
"audience": {
|
||||
"claim": "custom_claim",
|
||||
"required": true
|
||||
}
|
||||
},
|
||||
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
||||
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
||||
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
||||
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
||||
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
||||
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
||||
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
||||
[[QQIDAQAB\n]] ..
|
||||
[[-----END PUBLIC KEY-----",
|
||||
"token_signing_alg_values_expected": "RS256"
|
||||
}
|
||||
},
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1980": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/hello"
|
||||
}]]
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
end
|
||||
ngx.say(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
passed
|
||||
|
||||
|
||||
|
||||
=== TEST 4: Access route with an invalid token (without audience)
|
||||
Use a custom non-existent claim to simulate the case where the standard field "aud" is not included.
|
||||
Note the assertion in the error log, where it is shown that the custom claim field name did take effect.
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local http = require "resty.http"
|
||||
local httpc = http.new()
|
||||
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
||||
method = "POST",
|
||||
body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack",
|
||||
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
local access_token = require("toolkit.json").decode(res.body).access_token
|
||||
res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", {
|
||||
method = "GET",
|
||||
headers = { Authorization = "Bearer " .. access_token }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
ngx.status = res.status
|
||||
ngx.say(res.body)
|
||||
}
|
||||
}
|
||||
--- error_code: 403
|
||||
--- response_body
|
||||
{"error":"required audience claim not present"}
|
||||
--- error_log
|
||||
OIDC introspection failed: required audience (custom_claim) not present
|
||||
|
||||
|
||||
|
||||
=== TEST 5: Update route (jwt local, audience required, custom claim)
|
||||
Use "iss" to fake "aud".
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
local code, body = t('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"plugins": {
|
||||
"openid-connect": {
|
||||
"client_id": "apisix",
|
||||
"client_secret": "secret",
|
||||
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
||||
"bearer_only": true,
|
||||
"claim_validator": {
|
||||
"audience": {
|
||||
"claim": "iss",
|
||||
"required": true
|
||||
}
|
||||
},
|
||||
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
||||
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
||||
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
||||
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
||||
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
||||
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
||||
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
||||
[[QQIDAQAB\n]] ..
|
||||
[[-----END PUBLIC KEY-----",
|
||||
"token_signing_alg_values_expected": "RS256"
|
||||
}
|
||||
},
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1980": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/hello"
|
||||
}]]
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
end
|
||||
ngx.say(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
passed
|
||||
|
||||
|
||||
|
||||
=== TEST 6: Access route with an valid token (with custom audience claim)
|
||||
Use "iss" to fake "aud".
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local http = require "resty.http"
|
||||
local httpc = http.new()
|
||||
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
||||
method = "POST",
|
||||
body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack",
|
||||
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
local access_token = require("toolkit.json").decode(res.body).access_token
|
||||
res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", {
|
||||
method = "GET",
|
||||
headers = { Authorization = "Bearer " .. access_token }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
ngx.status = res.status
|
||||
ngx.say(res.body)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
=== TEST 7: Update route (jwt local, audience required, match client_id)
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
local code, body = t('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"plugins": {
|
||||
"openid-connect": {
|
||||
"client_id": "apisix",
|
||||
"client_secret": "secret",
|
||||
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
||||
"bearer_only": true,
|
||||
"claim_validator": {
|
||||
"audience": {
|
||||
"required": true,
|
||||
"match_with_client_id": true
|
||||
}
|
||||
},
|
||||
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
||||
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
||||
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
||||
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
||||
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
||||
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
||||
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
||||
[[QQIDAQAB\n]] ..
|
||||
[[-----END PUBLIC KEY-----",
|
||||
"token_signing_alg_values_expected": "RS256"
|
||||
}
|
||||
},
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1980": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/hello"
|
||||
}]]
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
end
|
||||
ngx.say(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
passed
|
||||
|
||||
|
||||
|
||||
=== TEST 8: Access route with an valid token (with client id as audience)
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local http = require "resty.http"
|
||||
local httpc = http.new()
|
||||
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
||||
method = "POST",
|
||||
body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack",
|
||||
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
local access_token = require("toolkit.json").decode(res.body).access_token
|
||||
res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", {
|
||||
method = "GET",
|
||||
headers = { Authorization = "Bearer " .. access_token }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
ngx.status = res.status
|
||||
ngx.say(res.body)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
=== TEST 9: Update route (jwt local, audience required, match client_id)
|
||||
Use the apisix-no-aud client. According to Keycloak's default implementation, when unconfigured,
|
||||
only the account is listed as an audience, not the client id.
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
local code, body = t('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"plugins": {
|
||||
"openid-connect": {
|
||||
"client_id": "apisix-no-aud",
|
||||
"client_secret": "secret",
|
||||
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
||||
"bearer_only": true,
|
||||
"claim_validator": {
|
||||
"audience": {
|
||||
"required": true,
|
||||
"match_with_client_id": true
|
||||
}
|
||||
},
|
||||
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
||||
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
||||
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
||||
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
||||
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
||||
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
||||
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
||||
[[QQIDAQAB\n]] ..
|
||||
[[-----END PUBLIC KEY-----",
|
||||
"token_signing_alg_values_expected": "RS256"
|
||||
}
|
||||
},
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1980": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/hello"
|
||||
}]]
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
end
|
||||
ngx.say(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
passed
|
||||
|
||||
|
||||
|
||||
=== TEST 10: Access route with an invalid token (without client id as audience)
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local http = require "resty.http"
|
||||
local httpc = http.new()
|
||||
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
||||
method = "POST",
|
||||
body = "client_id=apisix-no-aud&client_secret=secret&grant_type=password&username=jack&password=jack",
|
||||
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
local access_token = require("toolkit.json").decode(res.body).access_token
|
||||
res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", {
|
||||
method = "GET",
|
||||
headers = { Authorization = "Bearer " .. access_token }
|
||||
})
|
||||
if not res then
|
||||
ngx.say("FAILED: ", err)
|
||||
return
|
||||
end
|
||||
ngx.status = res.status
|
||||
ngx.say(res.body)
|
||||
}
|
||||
}
|
||||
--- error_code: 403
|
||||
--- response_body
|
||||
{"error":"mismatched audience"}
|
||||
--- error_log
|
||||
OIDC introspection failed: audience does not match the client id
|
Reference in New Issue
Block a user