- Implements Apache APISIX packaging for Cloudron platform. - Includes Dockerfile, CloudronManifest.json, and start.sh. - Configured to use Cloudron's etcd addon. 🤖 Generated with Gemini CLI Co-Authored-By: Gemini <noreply@google.com>
474 lines
20 KiB
Perl
474 lines
20 KiB
Perl
#
|
|
# Licensed to the Apache Software Foundation (ASF) under one or more
|
|
# contributor license agreements. See the NOTICE file distributed with
|
|
# this work for additional information regarding copyright ownership.
|
|
# The ASF licenses this file to You under the Apache License, Version 2.0
|
|
# (the "License"); you may not use this file except in compliance with
|
|
# the License. You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
use t::APISIX 'no_plan';
|
|
|
|
log_level('debug');
|
|
repeat_each(1);
|
|
no_long_string();
|
|
no_root_location();
|
|
# no_shuffle();
|
|
|
|
add_block_preprocessor(sub {
|
|
my ($block) = @_;
|
|
|
|
if ((!defined $block->error_log) && (!defined $block->no_error_log)) {
|
|
$block->set_value("no_error_log", "[error]");
|
|
}
|
|
|
|
if (!defined $block->request) {
|
|
$block->set_value("request", "GET /t");
|
|
}
|
|
});
|
|
|
|
run_tests();
|
|
|
|
__DATA__
|
|
|
|
=== TEST 1: Create route (jwt local, audience required)
|
|
It reuses Keycloak's TLS private key to export the public key.
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local t = require("lib.test_admin").test
|
|
local code, body = t('/apisix/admin/routes/1',
|
|
ngx.HTTP_PUT,
|
|
[[{
|
|
"plugins": {
|
|
"openid-connect": {
|
|
"client_id": "apisix",
|
|
"client_secret": "secret",
|
|
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
|
"bearer_only": true,
|
|
"claim_validator": {
|
|
"audience": {
|
|
"required": true
|
|
}
|
|
},
|
|
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
|
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
|
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
|
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
|
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
|
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
|
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
|
[[QQIDAQAB\n]] ..
|
|
[[-----END PUBLIC KEY-----",
|
|
"token_signing_alg_values_expected": "RS256"
|
|
}
|
|
},
|
|
"upstream": {
|
|
"nodes": {
|
|
"127.0.0.1:1980": 1
|
|
},
|
|
"type": "roundrobin"
|
|
},
|
|
"uri": "/hello"
|
|
}]]
|
|
)
|
|
|
|
if code >= 300 then
|
|
ngx.status = code
|
|
end
|
|
ngx.say(body)
|
|
}
|
|
}
|
|
--- response_body
|
|
passed
|
|
|
|
|
|
|
|
=== TEST 2: Access route with a valid token (with audience)
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local http = require "resty.http"
|
|
local httpc = http.new()
|
|
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
|
method = "POST",
|
|
body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack",
|
|
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
local access_token = require("toolkit.json").decode(res.body).access_token
|
|
local res, err = httpc:request_uri("http://127.0.0.1:1980/hello", {
|
|
method = "GET",
|
|
headers = { Authorization = "Bearer " .. access_token }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
ngx.status = res.status
|
|
}
|
|
}
|
|
|
|
|
|
|
|
=== TEST 3: Update route (jwt local, audience required, custom claim)
|
|
Use a custom non-existent claim to simulate the case where the standard field "aud" is not included.
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local t = require("lib.test_admin").test
|
|
local code, body = t('/apisix/admin/routes/1',
|
|
ngx.HTTP_PUT,
|
|
[[{
|
|
"plugins": {
|
|
"openid-connect": {
|
|
"client_id": "apisix",
|
|
"client_secret": "secret",
|
|
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
|
"bearer_only": true,
|
|
"claim_validator": {
|
|
"audience": {
|
|
"claim": "custom_claim",
|
|
"required": true
|
|
}
|
|
},
|
|
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
|
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
|
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
|
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
|
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
|
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
|
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
|
[[QQIDAQAB\n]] ..
|
|
[[-----END PUBLIC KEY-----",
|
|
"token_signing_alg_values_expected": "RS256"
|
|
}
|
|
},
|
|
"upstream": {
|
|
"nodes": {
|
|
"127.0.0.1:1980": 1
|
|
},
|
|
"type": "roundrobin"
|
|
},
|
|
"uri": "/hello"
|
|
}]]
|
|
)
|
|
|
|
if code >= 300 then
|
|
ngx.status = code
|
|
end
|
|
ngx.say(body)
|
|
}
|
|
}
|
|
--- response_body
|
|
passed
|
|
|
|
|
|
|
|
=== TEST 4: Access route with an invalid token (without audience)
|
|
Use a custom non-existent claim to simulate the case where the standard field "aud" is not included.
|
|
Note the assertion in the error log, where it is shown that the custom claim field name did take effect.
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local http = require "resty.http"
|
|
local httpc = http.new()
|
|
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
|
method = "POST",
|
|
body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack",
|
|
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
local access_token = require("toolkit.json").decode(res.body).access_token
|
|
res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", {
|
|
method = "GET",
|
|
headers = { Authorization = "Bearer " .. access_token }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
ngx.status = res.status
|
|
ngx.say(res.body)
|
|
}
|
|
}
|
|
--- error_code: 403
|
|
--- response_body
|
|
{"error":"required audience claim not present"}
|
|
--- error_log
|
|
OIDC introspection failed: required audience (custom_claim) not present
|
|
|
|
|
|
|
|
=== TEST 5: Update route (jwt local, audience required, custom claim)
|
|
Use "iss" to fake "aud".
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local t = require("lib.test_admin").test
|
|
local code, body = t('/apisix/admin/routes/1',
|
|
ngx.HTTP_PUT,
|
|
[[{
|
|
"plugins": {
|
|
"openid-connect": {
|
|
"client_id": "apisix",
|
|
"client_secret": "secret",
|
|
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
|
"bearer_only": true,
|
|
"claim_validator": {
|
|
"audience": {
|
|
"claim": "iss",
|
|
"required": true
|
|
}
|
|
},
|
|
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
|
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
|
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
|
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
|
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
|
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
|
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
|
[[QQIDAQAB\n]] ..
|
|
[[-----END PUBLIC KEY-----",
|
|
"token_signing_alg_values_expected": "RS256"
|
|
}
|
|
},
|
|
"upstream": {
|
|
"nodes": {
|
|
"127.0.0.1:1980": 1
|
|
},
|
|
"type": "roundrobin"
|
|
},
|
|
"uri": "/hello"
|
|
}]]
|
|
)
|
|
|
|
if code >= 300 then
|
|
ngx.status = code
|
|
end
|
|
ngx.say(body)
|
|
}
|
|
}
|
|
--- response_body
|
|
passed
|
|
|
|
|
|
|
|
=== TEST 6: Access route with an valid token (with custom audience claim)
|
|
Use "iss" to fake "aud".
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local http = require "resty.http"
|
|
local httpc = http.new()
|
|
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
|
method = "POST",
|
|
body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack",
|
|
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
local access_token = require("toolkit.json").decode(res.body).access_token
|
|
res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", {
|
|
method = "GET",
|
|
headers = { Authorization = "Bearer " .. access_token }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
ngx.status = res.status
|
|
ngx.say(res.body)
|
|
}
|
|
}
|
|
|
|
|
|
|
|
=== TEST 7: Update route (jwt local, audience required, match client_id)
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local t = require("lib.test_admin").test
|
|
local code, body = t('/apisix/admin/routes/1',
|
|
ngx.HTTP_PUT,
|
|
[[{
|
|
"plugins": {
|
|
"openid-connect": {
|
|
"client_id": "apisix",
|
|
"client_secret": "secret",
|
|
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
|
"bearer_only": true,
|
|
"claim_validator": {
|
|
"audience": {
|
|
"required": true,
|
|
"match_with_client_id": true
|
|
}
|
|
},
|
|
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
|
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
|
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
|
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
|
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
|
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
|
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
|
[[QQIDAQAB\n]] ..
|
|
[[-----END PUBLIC KEY-----",
|
|
"token_signing_alg_values_expected": "RS256"
|
|
}
|
|
},
|
|
"upstream": {
|
|
"nodes": {
|
|
"127.0.0.1:1980": 1
|
|
},
|
|
"type": "roundrobin"
|
|
},
|
|
"uri": "/hello"
|
|
}]]
|
|
)
|
|
|
|
if code >= 300 then
|
|
ngx.status = code
|
|
end
|
|
ngx.say(body)
|
|
}
|
|
}
|
|
--- response_body
|
|
passed
|
|
|
|
|
|
|
|
=== TEST 8: Access route with an valid token (with client id as audience)
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local http = require "resty.http"
|
|
local httpc = http.new()
|
|
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
|
method = "POST",
|
|
body = "client_id=apisix&client_secret=secret&grant_type=password&username=jack&password=jack",
|
|
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
local access_token = require("toolkit.json").decode(res.body).access_token
|
|
res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", {
|
|
method = "GET",
|
|
headers = { Authorization = "Bearer " .. access_token }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
ngx.status = res.status
|
|
ngx.say(res.body)
|
|
}
|
|
}
|
|
|
|
|
|
|
|
=== TEST 9: Update route (jwt local, audience required, match client_id)
|
|
Use the apisix-no-aud client. According to Keycloak's default implementation, when unconfigured,
|
|
only the account is listed as an audience, not the client id.
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local t = require("lib.test_admin").test
|
|
local code, body = t('/apisix/admin/routes/1',
|
|
ngx.HTTP_PUT,
|
|
[[{
|
|
"plugins": {
|
|
"openid-connect": {
|
|
"client_id": "apisix-no-aud",
|
|
"client_secret": "secret",
|
|
"discovery": "http://127.0.0.1:8080/realms/basic/.well-known/openid-configuration",
|
|
"bearer_only": true,
|
|
"claim_validator": {
|
|
"audience": {
|
|
"required": true,
|
|
"match_with_client_id": true
|
|
}
|
|
},
|
|
"public_key": "-----BEGIN PUBLIC KEY-----\n]] ..
|
|
[[MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvxeMCu3jE1QChgzCwlxP\n]] ..
|
|
[[mOkRHQORlOvwGpCX9zRCkMAq7a6jvlQTyM+OOfnnX9xBF4YxRRj3VOqdBJBdEjC2\n]] ..
|
|
[[jLFQUECdqnD+hZaCGIsk91grP4G7XaFqud7nAH1rniMh1rKLy3NFYTl5tK4U2IPP\n]] ..
|
|
[[JzIye8ur2JHyzE+qpcAEp/U6M4I2rdPX1gE2ze8gYuIr1VbCg6Nkt45DslZ2GDI8\n]] ..
|
|
[[2TtwkpMlEjJfmbEnrLHkigPXNs6IHyiFPN95462gPG5TBX3YpxDCP/cnHhMeeyFI\n]] ..
|
|
[[56WNYlhy0iLYmRfiyhKXi76fYKa/PIIUfOSErrKgKsHJp7HQKo48O4Gz5tQyL1IF\n]] ..
|
|
[[QQIDAQAB\n]] ..
|
|
[[-----END PUBLIC KEY-----",
|
|
"token_signing_alg_values_expected": "RS256"
|
|
}
|
|
},
|
|
"upstream": {
|
|
"nodes": {
|
|
"127.0.0.1:1980": 1
|
|
},
|
|
"type": "roundrobin"
|
|
},
|
|
"uri": "/hello"
|
|
}]]
|
|
)
|
|
|
|
if code >= 300 then
|
|
ngx.status = code
|
|
end
|
|
ngx.say(body)
|
|
}
|
|
}
|
|
--- response_body
|
|
passed
|
|
|
|
|
|
|
|
=== TEST 10: Access route with an invalid token (without client id as audience)
|
|
--- config
|
|
location /t {
|
|
content_by_lua_block {
|
|
local http = require "resty.http"
|
|
local httpc = http.new()
|
|
local res, err = httpc:request_uri("http://127.0.0.1:8080/realms/basic/protocol/openid-connect/token", {
|
|
method = "POST",
|
|
body = "client_id=apisix-no-aud&client_secret=secret&grant_type=password&username=jack&password=jack",
|
|
headers = { ["Content-Type"] = "application/x-www-form-urlencoded" }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
local access_token = require("toolkit.json").decode(res.body).access_token
|
|
res, err = httpc:request_uri("http://127.0.0.1:"..ngx.var.server_port.."/hello", {
|
|
method = "GET",
|
|
headers = { Authorization = "Bearer " .. access_token }
|
|
})
|
|
if not res then
|
|
ngx.say("FAILED: ", err)
|
|
return
|
|
end
|
|
ngx.status = res.status
|
|
ngx.say(res.body)
|
|
}
|
|
}
|
|
--- error_code: 403
|
|
--- response_body
|
|
{"error":"mismatched audience"}
|
|
--- error_log
|
|
OIDC introspection failed: audience does not match the client id
|