2021-02-26 21:40:08 +08:00
---
title: consumer-restriction
---
2020-06-08 12:49:46 +08:00
<!--
#
# Licensed to the Apache Software Foundation (ASF) under one or more
# contributor license agreements. See the NOTICE file distributed with
# this work for additional information regarding copyright ownership.
# The ASF licenses this file to You under the Apache License, Version 2.0
# (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
-->
2021-02-26 21:40:08 +08:00
## Summary
2021-01-03 11:26:40 +08:00
2020-11-02 14:06:00 +08:00
- [Introduction ](#introduction )
- [Attributes ](#attributes )
- [Example ](#example )
- [How to restrict consumer_name ](#how-to-restrict-consumer_name )
- [How to restrict service_id ](#how-to-restrict-service_id )
- [Disable Plugin ](#disable-plugin )
2020-06-08 12:49:46 +08:00
2020-11-02 14:06:00 +08:00
## Introduction
2020-06-08 12:49:46 +08:00
2020-11-02 14:06:00 +08:00
The `consumer-restriction` makes corresponding access restrictions based on different objects selected.
2020-06-08 12:49:46 +08:00
## Attributes
2020-11-02 14:06:00 +08:00
|Name | Type | Requirement | Default | Valid | Description |
|-----------|-------------|--------------|---------------|---------------------------------|-------------------------------------------------------------------------------------------------------------------- |
| type | string | optional | consumer_name | ["consumer_name", "service_id"] | According to different objects, corresponding restrictions, support `consumer_name` , `service_id` . |
2021-03-08 18:00:29 +08:00
| whitelist | array[string] | required | | | Grant full access to all users specified in the provided list , **has the priority over `allowed_by_methods`** |
| blacklist | array[string] | required | | | Reject connection to all users specified in the provided list , **has the priority over `whitelist`** |
2020-11-02 14:06:00 +08:00
| rejected_code | integer | optional | 403 | [200,...] | The HTTP status code returned when the request is rejected. |
2021-03-08 18:00:29 +08:00
| allowed_by_methods | array[object] | optional | | | Set a list of allowed HTTP methods for the selected user , HTTP methods can be `["GET", "POST", "PUT", "DELETE", "PATCH", "HEAD", "OPTIONS", "CONNECT", "TRACE"]` |
2020-06-08 12:49:46 +08:00
2020-11-02 14:06:00 +08:00
For the `type` field is an enumerated type, it can be `consumer_name` or `service_id` . They stand for the following meanings:
2021-01-03 11:26:40 +08:00
2020-11-02 14:06:00 +08:00
* **consumer_name**: Add the `username` of `consumer` to a whitelist or blacklist (supporting single or multiple consumers) to restrict access to services or routes.
* **service_id**: Add the `id` of the `service` to a whitelist or blacklist (supporting one or more services) to restrict access to the service. It needs to be used in conjunction with authorized plugins.
2020-06-08 12:49:46 +08:00
2020-11-02 14:06:00 +08:00
## Example
2020-06-08 12:49:46 +08:00
2020-11-02 14:06:00 +08:00
### How to restrict `consumer_name`
The following is an example. The `consumer-restriction` plugin is enabled on the specified route to restrict consumer access.
2020-06-08 12:49:46 +08:00
```shell
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/consumers -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -i -d '
2020-06-08 12:49:46 +08:00
{
"username": "jack1",
"plugins": {
"basic-auth": {
"username":"jack2019",
"password": "123456"
}
}
}'
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/consumers -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -i -d '
2020-06-08 12:49:46 +08:00
{
"username": "jack2",
"plugins": {
"basic-auth": {
"username":"jack2020",
"password": "123456"
}
}
}'
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
2020-06-08 12:49:46 +08:00
{
"uri": "/index.html",
"upstream": {
"type": "roundrobin",
"nodes": {
"127.0.0.1:1980": 1
}
},
"plugins": {
"basic-auth": {},
"consumer-restriction": {
"whitelist": [
"jack1"
]
}
}
}'
```
2020-11-02 14:06:00 +08:00
**Test Plugin**
2020-06-08 12:49:46 +08:00
Requests from jack1:
```shell
2020-11-02 14:06:00 +08:00
curl -u jack2019:123456 http://127.0.0.1:9080/index.html
2020-06-08 12:49:46 +08:00
HTTP/1.1 200 OK
...
```
Requests from jack2:
```shell
2020-11-02 14:06:00 +08:00
curl -u jack2020:123456 http://127.0.0.1:9080/index.html -i
2020-06-08 12:49:46 +08:00
HTTP/1.1 403 Forbidden
...
2020-11-02 14:06:00 +08:00
{"message":"The consumer_name is forbidden."}
```
2021-03-08 18:00:29 +08:00
### How to restrict `allowed_by_methods`
This example restrict the user `jack1` to only `POST` on the resource
```shell
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
{
"uri": "/index.html",
"upstream": {
"type": "roundrobin",
"nodes": {
"127.0.0.1:1980": 1
}
},
"plugins": {
"basic-auth": {},
"consumer-restriction": {
"allowed_by_methods":[{
"user": "jack1",
"methods": ["POST"]
}]
}
}
}'
```
**Test Plugin**
Requests from jack1:
```shell
curl -u jack2019:123456 http://127.0.0.1:9080/index.html
HTTP/1.1 403 Forbidden
...
{"message":"The consumer_name is forbidden."}
```
Add the capability for `jack1` to get the resource
```shell
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
{
"uri": "/index.html",
"upstream": {
"type": "roundrobin",
"nodes": {
"127.0.0.1:1980": 1
}
},
"plugins": {
"basic-auth": {},
"consumer-restriction": {
"allowed_by_methods":[{
"user": "jack1",
"methods": ["POST","GET"]
}]
}
}
}'
```
Requests from jack1:
```shell
curl -u jack2019:123456 http://127.0.0.1:9080/index.html
HTTP/1.1 200 OK
```
2020-11-02 14:06:00 +08:00
## How to restrict `service_id`
The `service_id` method needs to be used together with the authorization plug-in. Here, the key-auth authorization plug-in is taken as an example.
1. Create two services.
```shell
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/services/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
2020-11-02 14:06:00 +08:00
{
"upstream": {
"nodes": {
"127.0.0.1:1980": 1
},
"type": "roundrobin"
},
"desc": "new service 001"
}'
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/services/2 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
2020-11-02 14:06:00 +08:00
{
"upstream": {
"nodes": {
"127.0.0.1:1980": 1
},
"type": "roundrobin"
},
"desc": "new service 002"
}'
2020-06-08 12:49:46 +08:00
```
2020-11-02 14:06:00 +08:00
2. Bind the `consumer-restriction` plugin on the `consumer` (need to cooperate with an authorized plugin to bind), and add the `service_id` whitelist list.
```shell
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/consumers -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
2020-11-02 14:06:00 +08:00
{
"username": "new_consumer",
"plugins": {
"key-auth": {
"key": "auth-jack"
},
"consumer-restriction": {
"type": "service_id",
"whitelist": [
"1"
],
"rejected_code": 403
}
}
}'
```
3. Open the `key-auth` plugin on the route and bind the `service_id` to `1` .
```shell
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
2020-11-02 14:06:00 +08:00
{
"uri": "/index.html",
"upstream": {
"type": "roundrobin",
"nodes": {
"127.0.0.1:1980": 1
}
},
"service_id": 1,
"plugins": {
"key-auth": {
}
}
}'
```
**Test Plugin**
```shell
curl http://127.0.0.1:9080/index.html -H 'apikey: auth-jack' -i
HTTP/1.1 200 OK
...
```
The `service_id` in the whitelist column allows access, and the plug-in configuration takes effect.
4. Open the `key-auth` plugin on the route and bind the `service_id` to `2` .
```shell
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
2020-11-02 14:06:00 +08:00
{
"uri": "/index.html",
"upstream": {
"type": "roundrobin",
"nodes": {
"127.0.0.1:1980": 1
}
},
"service_id": 2,
"plugins": {
"key-auth": {
}
}
}'
```
**Test Plugin**
```shell
curl http://127.0.0.1:9080/index.html -H 'apikey: auth-jack' -i
HTTP/1.1 403 Forbidden
...
{"message":"The service_id is forbidden."}
```
It means that the `service_id` that is not in the whitelist is denied access, and the plug-in configuration takes effect.
2020-06-08 12:49:46 +08:00
## Disable Plugin
When you want to disable the `consumer-restriction` plugin, it is very simple,
you can delete the corresponding json configuration in the plugin configuration,
no need to restart the service, it will take effect immediately:
```shell
2020-11-28 19:05:14 +08:00
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
2020-06-08 12:49:46 +08:00
{
"uri": "/index.html",
"upstream": {
"type": "roundrobin",
"nodes": {
"127.0.0.1:1980": 1
}
},
"plugins": {
"basic-auth": {}
}
}'
```
The `consumer-restriction` plugin has been disabled now. It works for other plugins.