Files
ReachableCEO 54cc5f7308 feat(apisix): add Cloudron package
- Implements Apache APISIX packaging for Cloudron platform.
- Includes Dockerfile, CloudronManifest.json, and start.sh.
- Configured to use Cloudron's etcd addon.

🤖 Generated with Gemini CLI
Co-Authored-By: Gemini <noreply@google.com>
2025-09-04 09:42:47 -05:00

655 lines
17 KiB
Perl

#
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
use t::APISIX 'no_plan';
repeat_each(1);
no_long_string();
no_root_location();
add_block_preprocessor(sub {
my ($block) = @_;
if (!defined $block->request) {
$block->set_value("request", "GET /t");
}
});
run_tests();
__DATA__
=== TEST 1: opa with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.opa")
local ok, err = plugin.check_schema({host = "http://127.0.0.1:8181", policy = "example/allow"})
ngx.say(ok and "done" or err)
}
}
--- response_body
done
--- error_log
Using opa host with no TLS is a security risk
=== TEST 2: opa with TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.opa")
local ok, err = plugin.check_schema({host = "https://127.0.0.1:8181", policy = "example/allow"})
ngx.say(ok and "done" or err)
}
}
--- response_body
done
--- no_error_log
Using opa host with no TLS is a security risk
=== TEST 3: openid-connect with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.openid-connect")
local ok, err = plugin.check_schema({
client_id = "a",
client_secret = "b",
discovery = "http://a.com",
introspection_endpoint = "http://b.com",
redirect_uri = "http://c.com",
post_logout_redirect_uri = "http://d.com",
proxy_opts = {
http_proxy = "http://e.com"
}
})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- response_body
done
--- error_log
Using openid-connect discovery with no TLS is a security risk
Using openid-connect introspection_endpoint with no TLS is a security risk
Using openid-connect redirect_uri with no TLS is a security risk
Using openid-connect post_logout_redirect_uri with no TLS is a security risk
Using openid-connect proxy_opts.http_proxy with no TLS is a security risk
=== TEST 4: openid-connect with TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.openid-connect")
local ok, err = plugin.check_schema({
client_id = "a",
client_secret = "b",
discovery = "https://a.com",
introspection_endpoint = "https://b.com",
redirect_uri = "https://c.com",
post_logout_redirect_uri = "https://d.com",
proxy_opts = {
http_proxy = "https://e.com"
}
})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- response_body
done
--- no_error_log
Using openid-connect discovery with no TLS is a security risk
Using openid-connect introspection_endpoint with no TLS is a security risk
Using openid-connect redirect_uri with no TLS is a security risk
Using openid-connect post_logout_redirect_uri with no TLS is a security risk
Using openid-connect proxy_opts.http_proxy with no TLS is a security risk
=== TEST 5: opentelemetry with no TLS
--- extra_yaml_config
plugins:
- opentelemetry
--- config
location /t {
content_by_lua_block {
local t = require("lib.test_admin").test
local code, body = t('/apisix/admin/plugin_metadata/opentelemetry',
ngx.HTTP_PUT,
[[{
"batch_span_processor": {
"max_export_batch_size": 1,
"inactive_timeout": 0.5
},
"trace_id_source": "x-request-id",
"collector": {
"address": "http://127.0.0.1:4318",
"request_timeout": 3,
"request_headers": {
"foo": "bar"
}
}
}]]
)
if code >= 300 then
ngx.status = code
end
local code, body = t('/apisix/admin/routes/1',
ngx.HTTP_PUT,
[[{
"plugins": {
"opentelemetry": {
"sampler": {
"name": "always_on"
}
}
},
"upstream": {
"nodes": {
"127.0.0.1:1980": 1
},
"type": "roundrobin"
},
"uri": "/opentracing"
}]]
)
if code >= 300 then
ngx.status = code
end
--- deleting this data so this doesn't effect when metadata schema is validated
--- at init in next test.
local code, body = t('/apisix/admin/plugin_metadata/opentelemetry',
ngx.HTTP_DELETE)
if code >= 300 then
ngx.status = code
end
ngx.say(body)
}
}
--- request
GET /t
--- error_log
Using opentelemetry collector.address with no TLS is a security risk
=== TEST 6: opentelemetery with TLS
--- extra_yaml_config
plugins:
- opentelemetry
--- config
location /t {
content_by_lua_block {
local t = require("lib.test_admin").test
local code, body = t('/apisix/admin/plugin_metadata/opentelemetry',
ngx.HTTP_PUT,
[[{
"batch_span_processor": {
"max_export_batch_size": 1,
"inactive_timeout": 0.5
},
"trace_id_source": "x-request-id",
"collector": {
"address": "https://127.0.0.1:4318",
"request_timeout": 3,
"request_headers": {
"foo": "bar"
}
}
}]]
)
if code >= 300 then
ngx.status = code
end
local code, body = t('/apisix/admin/routes/1',
ngx.HTTP_PUT,
[[{
"plugins": {
"opentelemetry": {
"sampler": {
"name": "always_on"
}
}
},
"upstream": {
"nodes": {
"127.0.0.1:1980": 1
},
"type": "roundrobin"
},
"uri": "/opentracing"
}]]
)
if code >= 300 then
ngx.status = code
end
ngx.say(body)
}
}
--- request
GET /t
--- no_error_log
Using opentelemetry collector.address with no TLS is a security risk
=== TEST 7: openwhisk with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.openwhisk")
local ok, err = plugin.check_schema({
api_host = "http://127.0.0.1:3233",
service_token = "test:test",
namespace = "test",
action = "test"
})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- response_body
done
--- error_log
Using openwhisk api_host with no TLS is a security risk
=== TEST 8: openwhisk with TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.openwhisk")
local ok, err = plugin.check_schema({api_host = "https://127.0.0.1:3233", service_token = "test:test", namespace = "test", action = "test"})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- response_body
done
--- no_error_log
Using openwhisk api_host with no TLS is a security risk
=== TEST 9: rocketmq with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.rocketmq-logger")
local ok, err = plugin.check_schema({
topic = "test",
key = "key1",
nameserver_list = {
"127.0.0.1:3"
},
use_tls = false
})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- response_body
done
--- error_log
Keeping use_tls disabled in rocketmq-logger configuration is a security risk
=== TEST 10: rocketmq with TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.rocketmq-logger")
local ok, err = plugin.check_schema({
topic = "test",
key = "key1",
nameserver_list = {
"127.0.0.1:3"
},
use_tls = true
})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- response_body
done
--- no_error_log
Keeping use_tls disabled in rocketmq-logger configuration is a security risk
=== TEST 11: skywalking-logger with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.skywalking-logger")
local ok, err = plugin.check_schema({endpoint_addr = "http://127.0.0.1"})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- response_body
done
--- error_log
Using skywalking-logger endpoint_addr with no TLS is a security risk
=== TEST 12: skywalking-logger with TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.skywalking-logger")
local ok, err = plugin.check_schema({endpoint_addr = "https://127.0.0.1"})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- response_body
done
--- no_error_log
Using skywalking-logger endpoint_addr with no TLS is a security risk
=== TEST 13: skywalking with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.skywalking")
local ok, err = plugin.check_schema({endpoint_addr = "http://127.0.0.1:12800"})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- request
GET /t
--- response_body
done
--- error_log
Using skywalking endpoint_addr with no TLS is a security risk
=== TEST 14: skywalking with TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.skywalking")
local ok, err = plugin.check_schema({endpoint_addr = "https://127.0.0.1:12800"})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- request
GET /t
--- response_body
done
--- no_error_log
Using skywalking endpoint_addr with no TLS is a security risk
=== TEST 15: syslog with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.syslog")
local ok, err = plugin.check_schema({
host = "127.0.0.1",
port = 5140,
tls = false
})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- request
GET /t
--- response_body
done
--- error_log
Keeping tls disabled in syslog configuration is a security risk
=== TEST 16: syslog with TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.syslog")
local ok, err = plugin.check_schema({
host = "127.0.0.1",
port = 5140,
tls = true
})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- request
GET /t
--- response_body
done
--- no_error_log
Keeping tls disabled in syslog configuration is a security risk
=== TEST 17: tcp-logger with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.tcp-logger")
local ok, err = plugin.check_schema({host = "127.0.0.1", port = 3000, tls = false})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- request
GET /t
--- response_body
done
--- error_log
Keeping tls disabled in tcp-logger configuration is a security risk
=== TEST 18: tcp-logger with TLS
--- config
location /t {
content_by_lua_block {
local t = require("lib.test_admin").test
local code, body = t('/apisix/admin/routes/1',
ngx.HTTP_PUT,
[[{
"plugins": {
"tcp-logger": {
"host": "127.0.0.1",
"port": 3000,
"tls": true
}
},
"upstream": {
"nodes": {
"127.0.0.1:1980": 1
},
"type": "roundrobin"
},
"uri": "/hello"
}]]
)
if code >= 300 then
ngx.status = code
end
ngx.say(body)
}
}
--- request
GET /t
--- response_body
passed
--- no_error_log
Keeping tls disabled in tcp-logger configuration is a security risk
=== TEST 19: wolf-rbac with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.wolf-rbac")
local conf = {
server = "http://127.0.0.1:12180"
}
local ok, err = plugin.check_schema(conf)
if not ok then
ngx.say(err)
end
ngx.say(require("toolkit.json").encode(conf))
}
}
--- response_body_like eval
qr/\{"appid":"unset","header_prefix":"X-","server":"http:\/\/127\.0\.0\.1:12180"\}/
--- error_log
Using wolf-rbac server with no TLS is a security risk
=== TEST 20: wolf-rbac with TLS
--- config
location /t {
content_by_lua_block {
local t = require("lib.test_admin").test
local code, body = t('/apisix/admin/consumers',
ngx.HTTP_PUT,
[[{
"username": "wolf_rbac_unit_test",
"plugins": {
"wolf-rbac": {
"appid": "wolf-rbac-app",
"server": "https://127.0.0.1:1982"
}
}
}]]
)
if code >= 300 then
ngx.status = code
end
ngx.say(body)
}
}
--- response_body
passed
--- no_error_log
Using wolf-rbac server with no TLS is a security risk
=== TEST 21: zipkin with no TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.zipkin")
local ok, err = plugin.check_schema({endpoint = 'http://127.0.0.1', sample_ratio = 0.001})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- request
GET /t
--- response_body
done
--- error_log
Using zipkin endpoint with no TLS is a security risk
=== TEST 22: zipkin with TLS
--- config
location /t {
content_by_lua_block {
local plugin = require("apisix.plugins.zipkin")
local ok, err = plugin.check_schema({endpoint = 'https://127.0.0.1', sample_ratio = 0.001})
if not ok then
ngx.say(err)
end
ngx.say("done")
}
}
--- request
GET /t
--- response_body
done
--- no_error_log
Using zipkin endpoint with no TLS is a security risk