- Implements Apache APISIX packaging for Cloudron platform. - Includes Dockerfile, CloudronManifest.json, and start.sh. - Configured to use Cloudron's etcd addon. 🤖 Generated with Gemini CLI Co-Authored-By: Gemini <noreply@google.com>
456 lines
13 KiB
Perl
456 lines
13 KiB
Perl
#
|
|
# Licensed to the Apache Software Foundation (ASF) under one or more
|
|
# contributor license agreements. See the NOTICE file distributed with
|
|
# this work for additional information regarding copyright ownership.
|
|
# The ASF licenses this file to You under the Apache License, Version 2.0
|
|
# (the "License"); you may not use this file except in compliance with
|
|
# the License. You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
|
|
BEGIN {
|
|
our $token_file = "/tmp/var/run/secrets/kubernetes.io/serviceaccount/token";
|
|
our $token_value = eval {`cat $token_file 2>/dev/null`};
|
|
|
|
our $yaml_config = <<_EOC_;
|
|
apisix:
|
|
node_listen: 1984
|
|
deployment:
|
|
role: data_plane
|
|
role_data_plane:
|
|
config_provider: yaml
|
|
discovery:
|
|
kubernetes:
|
|
- id: first
|
|
service:
|
|
host: "127.0.0.1"
|
|
port: "6443"
|
|
client:
|
|
token_file: "/tmp/var/run/secrets/kubernetes.io/serviceaccount/token"
|
|
watch_endpoint_slices: true
|
|
- id: second
|
|
service:
|
|
schema: "http"
|
|
host: "127.0.0.1"
|
|
port: "6445"
|
|
client:
|
|
token_file: "/tmp/var/run/secrets/kubernetes.io/serviceaccount/token"
|
|
watch_endpoint_slices: true
|
|
|
|
_EOC_
|
|
|
|
our $single_yaml_config = <<_EOC_;
|
|
apisix:
|
|
node_listen: 1984
|
|
deployment:
|
|
role: data_plane
|
|
role_data_plane:
|
|
config_provider: yaml
|
|
discovery:
|
|
kubernetes:
|
|
service:
|
|
host: "127.0.0.1"
|
|
port: "6443"
|
|
client:
|
|
token_file: "/tmp/var/run/secrets/kubernetes.io/serviceaccount/token"
|
|
watch_endpoint_slices: true
|
|
_EOC_
|
|
|
|
our $scale_ns_c = <<_EOC_;
|
|
[
|
|
{
|
|
"op": "replace_endpointslices",
|
|
"name": "ep",
|
|
"namespace": "ns-c",
|
|
"endpoints": [
|
|
{
|
|
"addresses": [
|
|
"10.0.0.1"
|
|
],
|
|
"conditions": {
|
|
"ready": true,
|
|
"serving": true,
|
|
"terminating": false
|
|
},
|
|
"nodeName": "kind-control-plane"
|
|
}
|
|
]
|
|
"ports": [
|
|
{
|
|
"name": "p1",
|
|
"port": 5001
|
|
}
|
|
]
|
|
}
|
|
]
|
|
_EOC_
|
|
|
|
}
|
|
|
|
use t::APISIX 'no_plan';
|
|
|
|
repeat_each(1);
|
|
log_level('warn');
|
|
no_root_location();
|
|
no_shuffle();
|
|
workers(4);
|
|
|
|
add_block_preprocessor(sub {
|
|
my ($block) = @_;
|
|
|
|
my $apisix_yaml = $block->apisix_yaml // <<_EOC_;
|
|
routes: []
|
|
#END
|
|
_EOC_
|
|
|
|
$block->set_value("apisix_yaml", $apisix_yaml);
|
|
|
|
my $main_config = $block->main_config // <<_EOC_;
|
|
env KUBERNETES_SERVICE_HOST=127.0.0.1;
|
|
env KUBERNETES_SERVICE_PORT=6443;
|
|
env KUBERNETES_CLIENT_TOKEN=$::token_value;
|
|
env KUBERNETES_CLIENT_TOKEN_FILE=$::token_file;
|
|
_EOC_
|
|
|
|
$block->set_value("main_config", $main_config);
|
|
|
|
my $config = $block->config // <<_EOC_;
|
|
location /queries {
|
|
content_by_lua_block {
|
|
local core = require("apisix.core")
|
|
local d = require("apisix.discovery.kubernetes")
|
|
|
|
ngx.sleep(1)
|
|
|
|
ngx.req.read_body()
|
|
local request_body = ngx.req.get_body_data()
|
|
local queries = core.json.decode(request_body)
|
|
local response_body = "{"
|
|
for _,query in ipairs(queries) do
|
|
local nodes = d.nodes(query)
|
|
if nodes==nil or #nodes==0 then
|
|
response_body=response_body.." "..0
|
|
else
|
|
response_body=response_body.." "..#nodes
|
|
end
|
|
end
|
|
ngx.say(response_body.." }")
|
|
}
|
|
}
|
|
|
|
location /operators {
|
|
content_by_lua_block {
|
|
local http = require("resty.http")
|
|
local core = require("apisix.core")
|
|
local ipairs = ipairs
|
|
|
|
ngx.req.read_body()
|
|
local request_body = ngx.req.get_body_data()
|
|
local operators = core.json.decode(request_body)
|
|
|
|
core.log.info("get body ", request_body)
|
|
core.log.info("get operators ", #operators)
|
|
for _, op in ipairs(operators) do
|
|
local method, path, body
|
|
local headers = {
|
|
["Host"] = "127.0.0.1:6445"
|
|
}
|
|
|
|
if op.op == "replace_endpointslices" then
|
|
method = "PATCH"
|
|
path = "/apis/discovery.k8s.io/namespaces/" .. op.namespace .. "/endpointslices/" .. op.name
|
|
if #op.endpoints == 0 then
|
|
body = '[{"path":"/endpoints","op":"replace","value":[]}]'
|
|
else
|
|
local t = { { op = "replace", path = "/endpoints", value = op.endpoints } }
|
|
body = core.json.encode(t, true)
|
|
end
|
|
headers["Content-Type"] = "application/json-patch+json"
|
|
end
|
|
|
|
if op.op == "replace_labels" then
|
|
method = "PATCH"
|
|
path = "/apis/discovery.k8s.io/namespaces/" .. op.namespace .. "/endpointslices/" .. op.name
|
|
local t = { { op = "replace", path = "/metadata/labels", value = op.labels } }
|
|
body = core.json.encode(t, true)
|
|
headers["Content-Type"] = "application/json-patch+json"
|
|
end
|
|
|
|
local httpc = http.new()
|
|
core.log.info("begin to connect ", "127.0.0.1:6445")
|
|
local ok, message = httpc:connect({
|
|
scheme = "http",
|
|
host = "127.0.0.1",
|
|
port = 6445,
|
|
})
|
|
if not ok then
|
|
core.log.error("connect 127.0.0.1:6445 failed, message : ", message)
|
|
ngx.say("FAILED")
|
|
end
|
|
local res, err = httpc:request({
|
|
method = method,
|
|
path = path,
|
|
headers = headers,
|
|
body = body,
|
|
})
|
|
if err ~= nil then
|
|
core.log.err("operator k8s cluster error: ", err)
|
|
return 500
|
|
end
|
|
|
|
ngx.sleep(1)
|
|
|
|
local k8s = require("apisix.discovery.kubernetes")
|
|
local data = k8s.dump_data()
|
|
ngx.say(core.json.encode(data,true))
|
|
|
|
if res.status ~= 200 and res.status ~= 201 and res.status ~= 409 then
|
|
return res.status
|
|
end
|
|
end
|
|
ngx.say("DONE")
|
|
}
|
|
}
|
|
|
|
location /dump {
|
|
content_by_lua_block {
|
|
local json_decode = require("toolkit.json").decode
|
|
local core = require("apisix.core")
|
|
local http = require "resty.http"
|
|
local httpc = http.new()
|
|
|
|
ngx.sleep(1)
|
|
|
|
local dump_uri = "http://127.0.0.1:" .. ngx.var.server_port .. "/v1/discovery/kubernetes/dump"
|
|
local res, err = httpc:request_uri(dump_uri, { method = "GET"})
|
|
if err then
|
|
ngx.log(ngx.ERR, err)
|
|
ngx.status = res.status
|
|
return
|
|
end
|
|
|
|
local body = json_decode(res.body)
|
|
local endpoints = body.endpoints
|
|
ngx.say(core.json.encode(endpoints,true))
|
|
}
|
|
}
|
|
|
|
_EOC_
|
|
|
|
$block->set_value("config", $config);
|
|
|
|
});
|
|
|
|
run_tests();
|
|
|
|
__DATA__
|
|
|
|
=== TEST 1: create namespace and endpoints
|
|
--- yaml_config eval: $::yaml_config
|
|
--- request
|
|
POST /operators
|
|
[
|
|
{
|
|
"op": "replace_endpointslices",
|
|
"namespace": "ns-a",
|
|
"name": "ep",
|
|
"endpoints": [
|
|
{
|
|
"addresses": [
|
|
"10.0.0.1",
|
|
"10.0.0.2"
|
|
],
|
|
"conditions": {
|
|
"ready": true,
|
|
"serving": true,
|
|
"terminating": false
|
|
},
|
|
"nodeName": "kind-control-plane"
|
|
},
|
|
{
|
|
"addresses": [
|
|
"20.0.0.1",
|
|
"20.0.0.2"
|
|
],
|
|
"conditions": {
|
|
"ready": false,
|
|
"serving": false,
|
|
"terminating": false
|
|
},
|
|
"nodeName": "kind-control-plane"
|
|
}
|
|
],
|
|
"ports": [
|
|
{
|
|
"name": "p",
|
|
"port": 5001
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"op": "create_namespace",
|
|
"name": "ns-b"
|
|
},
|
|
{
|
|
"op": "replace_endpointslices",
|
|
"namespace": "ns-b",
|
|
"name": "ep",
|
|
"endpoints": [
|
|
{
|
|
"addresses": [
|
|
"10.0.0.1",
|
|
"10.0.0.2"
|
|
],
|
|
"conditions": {
|
|
"ready": true,
|
|
"serving": true,
|
|
"terminating": false
|
|
},
|
|
"nodeName": "kind-control-plane"
|
|
},
|
|
{
|
|
"addresses": [
|
|
"20.0.0.1",
|
|
"20.0.0.2"
|
|
],
|
|
"conditions": {
|
|
"ready": false,
|
|
"serving": true,
|
|
"terminating": false
|
|
},
|
|
"nodeName": "kind-control-plane"
|
|
}
|
|
],
|
|
"ports": [
|
|
{
|
|
"name": "p",
|
|
"port": 5002
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"op": "create_namespace",
|
|
"name": "ns-c"
|
|
},
|
|
{
|
|
"op": "replace_endpointslices",
|
|
"namespace": "ns-c",
|
|
"name": "ep",
|
|
"endpoints": [
|
|
{
|
|
"addresses": [
|
|
"10.0.0.1",
|
|
"10.0.0.2"
|
|
],
|
|
"conditions": {
|
|
"ready": true,
|
|
"serving": true,
|
|
"terminating": false
|
|
},
|
|
"nodeName": "kind-control-plane"
|
|
},
|
|
{
|
|
"addresses": [
|
|
"20.0.0.1",
|
|
"20.0.0.2"
|
|
],
|
|
"conditions": {
|
|
"ready": true,
|
|
"serving": true,
|
|
"terminating": false
|
|
},
|
|
"nodeName": "kind-control-plane"
|
|
}
|
|
],
|
|
"ports": [
|
|
{
|
|
"name": "p",
|
|
"port": 5003
|
|
}
|
|
]
|
|
}
|
|
]
|
|
--- more_headers
|
|
Content-type: application/json
|
|
--- response_body_like
|
|
.*"name":"default/kubernetes".*
|
|
|
|
|
|
|
|
=== TEST 2: use default parameters
|
|
--- yaml_config eval: $::yaml_config
|
|
--- request
|
|
GET /queries
|
|
[
|
|
"first/ns-a/ep:p1","first/ns-a/ep:p2","first/ns-b/ep:p1","first/ns-b/ep:p2","first/ns-c/ep:5001","first/ns-c/ep:5002",
|
|
"second/ns-a/ep:p1","second/ns-a/ep:p2","second/ns-b/ep:p1","second/ns-b/ep:p2","second/ns-c/ep:5001","second/ns-c/ep:5002"
|
|
]
|
|
--- more_headers
|
|
Content-type: application/json
|
|
--- response_body eval
|
|
qr{ 0 0 2 2 0 0 0 0 2 2 0 0 }
|
|
|
|
|
|
|
|
=== TEST 3: use specify environment parameters
|
|
--- yaml_config
|
|
apisix:
|
|
node_listen: 1984
|
|
deployment:
|
|
role: data_plane
|
|
role_data_plane:
|
|
config_provider: yaml
|
|
discovery:
|
|
kubernetes:
|
|
- id: first
|
|
service:
|
|
host: ${KUBERNETES_SERVICE_HOST}
|
|
port: ${KUBERNETES_SERVICE_PORT}
|
|
client:
|
|
token: ${KUBERNETES_CLIENT_TOKEN}
|
|
watch_endpoint_slices: true
|
|
- id: second
|
|
service:
|
|
schema: "http"
|
|
host: "127.0.0.1"
|
|
port: "6445"
|
|
client:
|
|
token: ${KUBERNETES_CLIENT_TOKEN}
|
|
watch_endpoint_slices: true
|
|
|
|
--- request
|
|
GET /queries
|
|
[
|
|
"first/ns-a/ep:p1","first/ns-a/ep:p2","first/ns-b/ep:p1","first/ns-b/ep:p2","first/ns-c/ep:5001","first/ns-c/ep:5002",
|
|
"second/ns-a/ep:p1","second/ns-a/ep:p2","second/ns-b/ep:p1","second/ns-b/ep:p2","second/ns-c/ep:5001","second/ns-c/ep:5002"
|
|
]
|
|
--- more_headers
|
|
Content-type: application/json
|
|
--- response_body eval
|
|
qr{ 0 0 2 2 0 0 0 0 2 2 0 0 }
|
|
|
|
|
|
|
|
=== TEST 4: test dump
|
|
--- yaml_config eval: $::yaml_config
|
|
--- request
|
|
GET /dump
|
|
--- response_body_like
|
|
.*"name":"default/kubernetes".*
|
|
|
|
|
|
|
|
=== TEST 5: test single mode dump
|
|
--- yaml_config eval: $::single_yaml_config
|
|
--- request
|
|
GET /dump
|
|
--- response_body_like
|
|
.*"name":"default/kubernetes".*
|