- Implements Apache APISIX packaging for Cloudron platform. - Includes Dockerfile, CloudronManifest.json, and start.sh. - Configured to use Cloudron's etcd addon. 🤖 Generated with Gemini CLI Co-Authored-By: Gemini <noreply@google.com>
131 lines
3.6 KiB
Lua
131 lines
3.6 KiB
Lua
--
|
|
-- Licensed to the Apache Software Foundation (ASF) under one or more
|
|
-- contributor license agreements. See the NOTICE file distributed with
|
|
-- this work for additional information regarding copyright ownership.
|
|
-- The ASF licenses this file to You under the Apache License, Version 2.0
|
|
-- (the "License"); you may not use this file except in compliance with
|
|
-- the License. You may obtain a copy of the License at
|
|
--
|
|
-- http://www.apache.org/licenses/LICENSE-2.0
|
|
--
|
|
-- Unless required by applicable law or agreed to in writing, software
|
|
-- distributed under the License is distributed on an "AS IS" BASIS,
|
|
-- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
-- See the License for the specific language governing permissions and
|
|
-- limitations under the License.
|
|
--
|
|
|
|
local core = require("apisix.core")
|
|
local type = type
|
|
local setmetatable = setmetatable
|
|
|
|
local ngx_update_time = ngx.update_time
|
|
local ngx_time = ngx.time
|
|
local ngx_encode_args = ngx.encode_args
|
|
|
|
local http = require("resty.http")
|
|
local jwt = require("resty.jwt")
|
|
|
|
|
|
local function get_timestamp()
|
|
ngx_update_time()
|
|
return ngx_time()
|
|
end
|
|
|
|
|
|
local _M = {}
|
|
|
|
|
|
function _M.generate_access_token(self)
|
|
if not self.access_token or get_timestamp() > self.access_token_expire_time - 60 then
|
|
self:refresh_access_token()
|
|
end
|
|
return self.access_token
|
|
end
|
|
|
|
|
|
function _M.refresh_access_token(self)
|
|
local http_new = http.new()
|
|
local res, err = http_new:request_uri(self.token_uri, {
|
|
ssl_verify = self.ssl_verify,
|
|
method = "POST",
|
|
body = ngx_encode_args({
|
|
grant_type = "urn:ietf:params:oauth:grant-type:jwt-bearer",
|
|
assertion = self:generate_jwt_token()
|
|
}),
|
|
headers = {
|
|
["Content-Type"] = "application/x-www-form-urlencoded",
|
|
},
|
|
})
|
|
|
|
if not res then
|
|
core.log.error("failed to refresh google oauth access token, ", err)
|
|
return
|
|
end
|
|
|
|
if res.status ~= 200 then
|
|
core.log.error("failed to refresh google oauth access token: ", res.body)
|
|
return
|
|
end
|
|
|
|
res, err = core.json.decode(res.body)
|
|
if not res then
|
|
core.log.error("failed to parse google oauth response data: ", err)
|
|
return
|
|
end
|
|
|
|
self.access_token = res.access_token
|
|
self.access_token_type = res.token_type
|
|
self.access_token_expire_time = get_timestamp() + res.expires_in
|
|
end
|
|
|
|
|
|
function _M.generate_jwt_token(self)
|
|
local payload = core.json.encode({
|
|
iss = self.client_email,
|
|
aud = self.token_uri,
|
|
scope = self.scope,
|
|
iat = get_timestamp(),
|
|
exp = get_timestamp() + (60 * 60)
|
|
})
|
|
|
|
local jwt_token = jwt:sign(self.private_key, {
|
|
header = { alg = "RS256", typ = "JWT" },
|
|
payload = payload,
|
|
})
|
|
|
|
return jwt_token
|
|
end
|
|
|
|
|
|
function _M.new(config, ssl_verify)
|
|
local oauth = {
|
|
client_email = config.client_email,
|
|
private_key = config.private_key,
|
|
project_id = config.project_id,
|
|
token_uri = config.token_uri or "https://oauth2.googleapis.com/token",
|
|
auth_uri = config.auth_uri or "https://accounts.google.com/o/oauth2/auth",
|
|
entries_uri = config.entries_uri,
|
|
access_token = nil,
|
|
access_token_type = nil,
|
|
access_token_expire_time = 0,
|
|
}
|
|
|
|
oauth.ssl_verify = ssl_verify
|
|
|
|
if config.scope then
|
|
if type(config.scope) == "string" then
|
|
oauth.scope = config.scope
|
|
end
|
|
|
|
if type(config.scope) == "table" then
|
|
oauth.scope = core.table.concat(config.scope, " ")
|
|
end
|
|
end
|
|
|
|
return setmetatable(oauth, { __index = _M })
|
|
end
|
|
|
|
|
|
return _M
|