mirror of
https://gitee.com/iresty/apisix.git
synced 2024-11-30 02:57:49 +08:00
feat(plugin): azure serverless functions (#5479)
Co-authored-by: 罗泽轩 <spacewanderlzx@gmail.com>
This commit is contained in:
parent
1018576e30
commit
3a6a4db281
137
apisix/plugins/azure-functions.lua
Normal file
137
apisix/plugins/azure-functions.lua
Normal file
@ -0,0 +1,137 @@
|
||||
--
|
||||
-- Licensed to the Apache Software Foundation (ASF) under one or more
|
||||
-- contributor license agreements. See the NOTICE file distributed with
|
||||
-- this work for additional information regarding copyright ownership.
|
||||
-- The ASF licenses this file to You under the Apache License, Version 2.0
|
||||
-- (the "License"); you may not use this file except in compliance with
|
||||
-- the License. You may obtain a copy of the License at
|
||||
--
|
||||
-- http://www.apache.org/licenses/LICENSE-2.0
|
||||
--
|
||||
-- Unless required by applicable law or agreed to in writing, software
|
||||
-- distributed under the License is distributed on an "AS IS" BASIS,
|
||||
-- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
-- See the License for the specific language governing permissions and
|
||||
-- limitations under the License.
|
||||
|
||||
local core = require("apisix.core")
|
||||
local http = require("resty.http")
|
||||
local plugin = require("apisix.plugin")
|
||||
local ngx = ngx
|
||||
local plugin_name = "azure-functions"
|
||||
|
||||
local schema = {
|
||||
type = "object",
|
||||
properties = {
|
||||
function_uri = {type = "string"},
|
||||
authorization = {
|
||||
type = "object",
|
||||
properties = {
|
||||
apikey = {type = "string"},
|
||||
clientid = {type = "string"}
|
||||
}
|
||||
},
|
||||
timeout = {type = "integer", minimum = 100, default = 3000},
|
||||
ssl_verify = {type = "boolean", default = true},
|
||||
keepalive = {type = "boolean", default = true},
|
||||
keepalive_timeout = {type = "integer", minimum = 1000, default = 60000},
|
||||
keepalive_pool = {type = "integer", minimum = 1, default = 5}
|
||||
},
|
||||
required = {"function_uri"}
|
||||
}
|
||||
|
||||
local metadata_schema = {
|
||||
type = "object",
|
||||
properties = {
|
||||
master_apikey = {type = "string", default = ""},
|
||||
master_clientid = {type = "string", default = ""}
|
||||
}
|
||||
}
|
||||
|
||||
local _M = {
|
||||
version = 0.1,
|
||||
priority = -1900,
|
||||
name = plugin_name,
|
||||
schema = schema,
|
||||
metadata_schema = metadata_schema
|
||||
}
|
||||
|
||||
function _M.check_schema(conf, schema_type)
|
||||
if schema_type == core.schema.TYPE_METADATA then
|
||||
return core.schema.check(metadata_schema, conf)
|
||||
end
|
||||
return core.schema.check(schema, conf)
|
||||
end
|
||||
|
||||
function _M.access(conf, ctx)
|
||||
local uri_args = core.request.get_uri_args(ctx)
|
||||
local headers = core.request.headers(ctx) or {}
|
||||
local req_body, err = core.request.get_body()
|
||||
|
||||
if err then
|
||||
core.log.error("error while reading request body: ", err)
|
||||
return 400
|
||||
end
|
||||
|
||||
-- set authorization headers if not already set by the client
|
||||
-- we are following not to overwrite the authz keys
|
||||
if not headers["x-functions-key"] and
|
||||
not headers["x-functions-clientid"] then
|
||||
if conf.authorization then
|
||||
headers["x-functions-key"] = conf.authorization.apikey
|
||||
headers["x-functions-clientid"] = conf.authorization.clientid
|
||||
else
|
||||
-- If neither api keys are set with the client request nor inside the plugin attributes
|
||||
-- plugin will fallback to the master key (if any) present inside the metadata.
|
||||
local metadata = plugin.plugin_metadata(plugin_name)
|
||||
if metadata then
|
||||
headers["x-functions-key"] = metadata.value.master_apikey
|
||||
headers["x-functions-clientid"] = metadata.value.master_clientid
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
headers["host"] = nil
|
||||
local params = {
|
||||
method = ngx.req.get_method(),
|
||||
body = req_body,
|
||||
query = uri_args,
|
||||
headers = headers,
|
||||
keepalive = conf.keepalive,
|
||||
ssl_verify = conf.ssl_verify
|
||||
}
|
||||
|
||||
-- Keepalive options
|
||||
if conf.keepalive then
|
||||
params.keepalive_timeout = conf.keepalive_timeout
|
||||
params.keepalive_pool = conf.keepalive_pool
|
||||
end
|
||||
|
||||
local httpc = http.new()
|
||||
httpc:set_timeout(conf.timeout)
|
||||
|
||||
local res, err = httpc:request_uri(conf.function_uri, params)
|
||||
|
||||
if not res or err then
|
||||
core.log.error("failed to process azure function, err: ", err)
|
||||
return 503
|
||||
end
|
||||
|
||||
-- According to RFC7540 https://datatracker.ietf.org/doc/html/rfc7540#section-8.1.2.2, endpoint
|
||||
-- must not generate any connection specific headers for HTTP/2 requests.
|
||||
local response_headers = res.headers
|
||||
if ngx.var.http2 then
|
||||
response_headers["Connection"] = nil
|
||||
response_headers["Keep-Alive"] = nil
|
||||
response_headers["Proxy-Connection"] = nil
|
||||
response_headers["Upgrade"] = nil
|
||||
response_headers["Transfer-Encoding"] = nil
|
||||
end
|
||||
|
||||
-- setting response headers
|
||||
core.response.set_header(response_headers)
|
||||
|
||||
return res.status, res.body
|
||||
end
|
||||
|
||||
return _M
|
@ -354,6 +354,7 @@ plugins: # plugin list (sorted by priority)
|
||||
# <- recommend to use priority (0, 100) for your custom plugins
|
||||
- example-plugin # priority: 0
|
||||
#- skywalking # priority: -1100
|
||||
- azure-functions # priority: -1900
|
||||
- serverless-post-function # priority: -2000
|
||||
- ext-plugin-post-req # priority: -3000
|
||||
|
||||
|
@ -127,7 +127,8 @@
|
||||
"type": "category",
|
||||
"label": "Serverless",
|
||||
"items": [
|
||||
"plugins/serverless"
|
||||
"plugins/serverless",
|
||||
"plugins/azure-functions"
|
||||
]
|
||||
},
|
||||
{
|
||||
|
140
docs/en/latest/plugins/azure-functions.md
Normal file
140
docs/en/latest/plugins/azure-functions.md
Normal file
@ -0,0 +1,140 @@
|
||||
---
|
||||
title: azure-functions
|
||||
---
|
||||
|
||||
<!--
|
||||
#
|
||||
# Licensed to the Apache Software Foundation (ASF) under one or more
|
||||
# contributor license agreements. See the NOTICE file distributed with
|
||||
# this work for additional information regarding copyright ownership.
|
||||
# The ASF licenses this file to You under the Apache License, Version 2.0
|
||||
# (the "License"); you may not use this file except in compliance with
|
||||
# the License. You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
-->
|
||||
|
||||
## Summary
|
||||
|
||||
- [Summary](#summary)
|
||||
- [Name](#name)
|
||||
- [Attributes](#attributes)
|
||||
- [Metadata](#metadata)
|
||||
- [How To Enable](#how-to-enable)
|
||||
- [Disable Plugin](#disable-plugin)
|
||||
|
||||
## Name
|
||||
|
||||
`azure-functions` is a serverless plugin built into Apache APISIX for seamless integration with [Azure Serverless Function](https://azure.microsoft.com/en-in/services/functions/) as a dynamic upstream to proxy all requests for a particular URI to the Microsoft Azure cloud, one of the most used public cloud platforms for production environment. If enabled, this plugin terminates the ongoing request to that particular URI and initiates a new request to the azure faas (the new upstream) on behalf of the client with the suitable authorization details set by the users, request headers, request body, params ( all these three components are passed from the original request ) and returns the response body, status code and the headers back to the original client that has invoked the request to the APISIX agent.
|
||||
|
||||
## Attributes
|
||||
|
||||
| Name | Type | Requirement | Default | Valid | Description |
|
||||
| ----------- | ------ | ----------- | ------- | ----- | ------------------------------------------------------------ |
|
||||
| function_uri | string | required | | | The azure function endpoint which triggers the serverless function code (eg. http://test-apisix.azurewebsites.net/api/HttpTrigger). |
|
||||
| authorization | object | optional | | | Authorization credentials to access the cloud function. |
|
||||
| authorization.apikey | string | optional | | | Field inside _authorization_. The generate API Key to authorize requests to that endpoint. | |
|
||||
| authorization.clientid | string | optional | | | Field inside _authorization_. The Client ID ( azure active directory ) to authorize requests to that endpoint. | |
|
||||
| timeout | integer | optional | 3000 | [100,...] | Proxy request timeout in milliseconds. |
|
||||
| ssl_verify | boolean | optional | true | true/false | If enabled performs SSL verification of the server. |
|
||||
| keepalive | boolean | optional | true | true/false | To reuse the same proxy connection in near future. Set to false to disable keepalives and immediately close the connection. |
|
||||
| keepalive_pool | integer | optional | 5 | [1,...] | The maximum number of connections in the pool. |
|
||||
| keepalive_timeout | integer | optional | 60000 | [1000,...] | The maximal idle timeout (ms). |
|
||||
|
||||
## Metadata
|
||||
|
||||
| Name | Type | Requirement | Default | Valid | Description |
|
||||
| ----------- | ------ | ----------- | ------- | ----- | ---------------------------------------------------------------------- |
|
||||
| master_apikey | string | optional | "" | | The API KEY secret that could be used to access the azure function uri. |
|
||||
| master_clientid | string | optional | "" | | The Client ID (active directory) that could be used the authorize the function uri |
|
||||
|
||||
Metadata for `azure-functions` plugin provides the functionality for authorization fallback. It defines `master_apikey` and `master_clientid` (azure active directory client id) where users (optionally) can define the master API key or Client ID for mission-critical application deployment. So if there are no authorization details found inside the plugin attribute the authorization details present in the metadata kicks in.
|
||||
|
||||
The relative priority ordering is as follows:
|
||||
|
||||
- First, the plugin looks for `x-functions-key` or `x-functions-clientid` keys inside the request header to the APISIX agent.
|
||||
- If they are not found, the azure-functions plugin checks for the authorization details inside plugin attributes. If present, it adds the respective header to the request sent to the Azure cloud function.
|
||||
- If no authorization details are found inside plugin attributes, APISIX fetches the metadata config for this plugin and uses the master keys.
|
||||
|
||||
To add a new Master APIKEY, make a request to _/apisix/admin/plugin_metadata_ endpoint with the updated metadata as follows:
|
||||
|
||||
```shell
|
||||
$ curl http://127.0.0.1:9080/apisix/admin/plugin_metadata/azure-functions -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
|
||||
{
|
||||
"master_apikey" : "<Your azure master access key>"
|
||||
}'
|
||||
```
|
||||
|
||||
## How To Enable
|
||||
|
||||
The following is an example of how to enable the azure-function faas plugin for a specific route URI. We are assuming your cloud function is already up and running.
|
||||
|
||||
```shell
|
||||
# enable azure function for a route
|
||||
curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
|
||||
{
|
||||
"plugins": {
|
||||
"azure-functions": {
|
||||
"function_uri": "http://test-apisix.azurewebsites.net/api/HttpTrigger",
|
||||
"authorization": {
|
||||
"apikey": "<Generated API key to access the Azure-Function>"
|
||||
}
|
||||
}
|
||||
},
|
||||
"uri": "/azure"
|
||||
}'
|
||||
```
|
||||
|
||||
Now any requests (HTTP/1.1, HTTPS, HTTP2) to URI `/azure` will trigger an HTTP invocation to the aforesaid function URI and response body along with the response headers and response code will be proxied back to the client. For example ( here azure cloud function just take the `name` query param and returns `Hello $name` ) :
|
||||
|
||||
```shell
|
||||
$ curl -i -XGET http://localhost:9080/azure\?name=apisix
|
||||
HTTP/1.1 200 OK
|
||||
Content-Type: text/plain; charset=utf-8
|
||||
Transfer-Encoding: chunked
|
||||
Connection: keep-alive
|
||||
Request-Context: appId=cid-v1:38aae829-293b-43c2-82c6-fa94aec0a071
|
||||
Date: Wed, 17 Nov 2021 14:46:55 GMT
|
||||
Server: APISIX/2.10.2
|
||||
|
||||
Hello, apisix
|
||||
```
|
||||
|
||||
For requests where the mode of communication between the client and the Apache APISIX gateway is HTTP/2, the example looks like ( make sure you are running APISIX agent with `enable_http2: true` for a port in conf.yaml or uncomment port 9081 of `node_listen` field inside [config-default.yaml](../../../../conf/config-default.yaml) ) :
|
||||
|
||||
```shell
|
||||
$ curl -i -XGET --http2 --http2-prior-knowledge http://localhost:9081/azure\?name=apisix
|
||||
HTTP/2 200
|
||||
content-type: text/plain; charset=utf-8
|
||||
request-context: appId=cid-v1:38aae829-293b-43c2-82c6-fa94aec0a071
|
||||
date: Wed, 17 Nov 2021 14:54:07 GMT
|
||||
server: APISIX/2.10.2
|
||||
|
||||
Hello, apisix
|
||||
```
|
||||
|
||||
## Disable Plugin
|
||||
|
||||
Remove the corresponding JSON configuration in the plugin configuration to disable the `azure-functions` plugin and add the suitable upstream configuration.
|
||||
APISIX plugins are hot-reloaded, therefore no need to restart APISIX.
|
||||
|
||||
```shell
|
||||
$ curl http://127.0.0.1:9080/apisix/admin/routes/1 -H 'X-API-KEY: edd1c9f034335f136f87ad84b625c8f1' -X PUT -d '
|
||||
{
|
||||
"uri": "/azure",
|
||||
"plugins": {},
|
||||
"upstream": {
|
||||
"type": "roundrobin",
|
||||
"nodes": {
|
||||
"127.0.0.1:1980": 1
|
||||
}
|
||||
}
|
||||
}'
|
||||
```
|
2
t/admin/plugins.t
vendored
2
t/admin/plugins.t
vendored
@ -40,7 +40,7 @@ __DATA__
|
||||
--- request
|
||||
GET /apisix/admin/plugins/list
|
||||
--- response_body_like eval
|
||||
qr/\["real-ip","client-control","ext-plugin-pre-req","zipkin","request-id","fault-injection","serverless-pre-function","batch-requests","cors","ip-restriction","ua-restriction","referer-restriction","uri-blocker","request-validation","openid-connect","authz-casbin","wolf-rbac","ldap-auth","hmac-auth","basic-auth","jwt-auth","key-auth","consumer-restriction","authz-keycloak","proxy-mirror","proxy-cache","proxy-rewrite","api-breaker","limit-conn","limit-count","limit-req","gzip","server-info","traffic-split","redirect","response-rewrite","grpc-transcode","prometheus","datadog","echo","http-logger","skywalking-logger","sls-logger","tcp-logger","kafka-logger","syslog","udp-logger","example-plugin","serverless-post-function","ext-plugin-post-req"\]/
|
||||
qr/\["real-ip","client-control","ext-plugin-pre-req","zipkin","request-id","fault-injection","serverless-pre-function","batch-requests","cors","ip-restriction","ua-restriction","referer-restriction","uri-blocker","request-validation","openid-connect","authz-casbin","wolf-rbac","ldap-auth","hmac-auth","basic-auth","jwt-auth","key-auth","consumer-restriction","authz-keycloak","proxy-mirror","proxy-cache","proxy-rewrite","api-breaker","limit-conn","limit-count","limit-req","gzip","server-info","traffic-split","redirect","response-rewrite","grpc-transcode","prometheus","datadog","echo","http-logger","skywalking-logger","sls-logger","tcp-logger","kafka-logger","syslog","udp-logger","example-plugin","azure-functions","serverless-post-function","ext-plugin-post-req"\]/
|
||||
--- no_error_log
|
||||
[error]
|
||||
|
||||
|
@ -197,11 +197,11 @@ function _M.test(uri, method, body, pattern, headers)
|
||||
end
|
||||
|
||||
if res.status >= 300 then
|
||||
return res.status, res.body
|
||||
return res.status, res.body, res.headers
|
||||
end
|
||||
|
||||
if pattern == nil then
|
||||
return res.status, "passed", res.body
|
||||
return res.status, "passed", res.body, res.headers
|
||||
end
|
||||
|
||||
local res_data = json.decode(res.body)
|
||||
@ -210,7 +210,7 @@ function _M.test(uri, method, body, pattern, headers)
|
||||
return 500, "failed, " .. err, res_data
|
||||
end
|
||||
|
||||
return 200, "passed", res_data
|
||||
return 200, "passed", res_data, res.headers
|
||||
end
|
||||
|
||||
|
||||
|
377
t/plugin/azure-functions.t
vendored
Normal file
377
t/plugin/azure-functions.t
vendored
Normal file
@ -0,0 +1,377 @@
|
||||
#
|
||||
# Licensed to the Apache Software Foundation (ASF) under one or more
|
||||
# contributor license agreements. See the NOTICE file distributed with
|
||||
# this work for additional information regarding copyright ownership.
|
||||
# The ASF licenses this file to You under the Apache License, Version 2.0
|
||||
# (the "License"); you may not use this file except in compliance with
|
||||
# the License. You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
use t::APISIX 'no_plan';
|
||||
|
||||
repeat_each(1);
|
||||
no_long_string();
|
||||
no_root_location();
|
||||
no_shuffle();
|
||||
|
||||
add_block_preprocessor(sub {
|
||||
my ($block) = @_;
|
||||
|
||||
my $inside_lua_block = $block->inside_lua_block // "";
|
||||
chomp($inside_lua_block);
|
||||
my $http_config = $block->http_config // <<_EOC_;
|
||||
|
||||
server {
|
||||
listen 8765;
|
||||
|
||||
location /httptrigger {
|
||||
content_by_lua_block {
|
||||
ngx.req.read_body()
|
||||
local msg = "faas invoked"
|
||||
ngx.header['Content-Length'] = #msg + 1
|
||||
ngx.header['X-Extra-Header'] = "MUST"
|
||||
ngx.header['Connection'] = "Keep-Alive"
|
||||
ngx.say(msg)
|
||||
}
|
||||
}
|
||||
|
||||
location /azure-demo {
|
||||
content_by_lua_block {
|
||||
$inside_lua_block
|
||||
}
|
||||
}
|
||||
}
|
||||
_EOC_
|
||||
|
||||
$block->set_value("http_config", $http_config);
|
||||
|
||||
if (!$block->request) {
|
||||
$block->set_value("request", "GET /t");
|
||||
}
|
||||
if (!$block->no_error_log && !$block->error_log) {
|
||||
$block->set_value("no_error_log", "[error]\n[alert]");
|
||||
}
|
||||
});
|
||||
|
||||
run_tests;
|
||||
|
||||
__DATA__
|
||||
|
||||
=== TEST 1: sanity
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local plugin = require("apisix.plugins.azure-functions")
|
||||
local conf = {
|
||||
function_uri = "http://some-url.com"
|
||||
}
|
||||
local ok, err = plugin.check_schema(conf)
|
||||
if not ok then
|
||||
ngx.say(err)
|
||||
end
|
||||
ngx.say("done")
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
done
|
||||
|
||||
|
||||
|
||||
=== TEST 2: function_uri missing
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local plugin = require("apisix.plugins.azure-functions")
|
||||
local ok, err = plugin.check_schema({})
|
||||
if not ok then
|
||||
ngx.say(err)
|
||||
else
|
||||
ngx.say("done")
|
||||
end
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
property "function_uri" is required
|
||||
|
||||
|
||||
|
||||
=== TEST 3: create route with azure-function plugin enabled
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
|
||||
local code, body = t('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"plugins": {
|
||||
"azure-functions": {
|
||||
"function_uri": "http://localhost:8765/httptrigger"
|
||||
}
|
||||
},
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1982": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/azure"
|
||||
}]],
|
||||
[[{
|
||||
"node": {
|
||||
"value": {
|
||||
"plugins": {
|
||||
"azure-functions": {
|
||||
"keepalive": true,
|
||||
"timeout": 3000,
|
||||
"ssl_verify": true,
|
||||
"keepalive_timeout": 60000,
|
||||
"keepalive_pool": 5,
|
||||
"function_uri": "http://localhost:8765/httptrigger"
|
||||
}
|
||||
},
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1982": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/azure"
|
||||
},
|
||||
"key": "/apisix/routes/1"
|
||||
},
|
||||
"action": "set"
|
||||
}]]
|
||||
)
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say("fail")
|
||||
return
|
||||
end
|
||||
|
||||
ngx.say(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
passed
|
||||
|
||||
|
||||
|
||||
=== TEST 4: Test plugin endpoint
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
local core = require("apisix.core")
|
||||
|
||||
local code, _, body, headers = t("/azure", "GET")
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say(body)
|
||||
return
|
||||
end
|
||||
|
||||
-- headers proxied 2 times -- one by plugin, another by this test case
|
||||
core.response.set_header(headers)
|
||||
ngx.print(body)
|
||||
}
|
||||
}
|
||||
--- response_body
|
||||
faas invoked
|
||||
--- response_headers
|
||||
Content-Length: 13
|
||||
X-Extra-Header: MUST
|
||||
|
||||
|
||||
|
||||
=== TEST 5: http2 check response body and headers
|
||||
--- http2
|
||||
--- request
|
||||
GET /azure
|
||||
--- response_body
|
||||
faas invoked
|
||||
|
||||
|
||||
|
||||
=== TEST 6: check HTTP/2 response headers (must not contain any connection specific info)
|
||||
First fetch the header from curl with -I then check the count of Connection
|
||||
The full header looks like the format shown below
|
||||
|
||||
HTTP/2 200
|
||||
content-type: text/plain
|
||||
x-extra-header: MUST
|
||||
content-length: 13
|
||||
date: Wed, 17 Nov 2021 13:53:08 GMT
|
||||
server: APISIX/2.10.2
|
||||
|
||||
--- http2
|
||||
--- request
|
||||
HEAD /azure
|
||||
--- response_headers
|
||||
Connection:
|
||||
Upgrade:
|
||||
Keep-Alive:
|
||||
content-type: text/plain
|
||||
x-extra-header: MUST
|
||||
content-length: 13
|
||||
|
||||
|
||||
|
||||
=== TEST 7: check authz header
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
-- passing an apikey
|
||||
local code, body = t('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"plugins": {
|
||||
"azure-functions": {
|
||||
"function_uri": "http://localhost:8765/azure-demo",
|
||||
"authorization": {
|
||||
"apikey": "test_key"
|
||||
}
|
||||
}
|
||||
},
|
||||
"upstream": {
|
||||
"nodes": {
|
||||
"127.0.0.1:1982": 1
|
||||
},
|
||||
"type": "roundrobin"
|
||||
},
|
||||
"uri": "/azure"
|
||||
}]]
|
||||
)
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say("fail")
|
||||
return
|
||||
end
|
||||
|
||||
ngx.say(body)
|
||||
|
||||
local code, _, body = t("/azure", "GET")
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say(body)
|
||||
return
|
||||
end
|
||||
ngx.print(body)
|
||||
}
|
||||
}
|
||||
--- inside_lua_block
|
||||
local headers = ngx.req.get_headers() or {}
|
||||
ngx.say("Authz-Header - " .. headers["x-functions-key"] or "")
|
||||
|
||||
--- response_body
|
||||
passed
|
||||
Authz-Header - test_key
|
||||
|
||||
|
||||
|
||||
=== TEST 8: check if apikey doesn't get overrided passed by client to the gateway
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
|
||||
local header = {}
|
||||
header["x-functions-key"] = "must_not_be_overrided"
|
||||
|
||||
-- plugin schema already contains apikey with value "test_key" which won't be respected
|
||||
local code, _, body = t("/azure", "GET", nil, nil, header)
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say(body)
|
||||
return
|
||||
end
|
||||
|
||||
ngx.print(body)
|
||||
}
|
||||
}
|
||||
--- inside_lua_block
|
||||
local headers = ngx.req.get_headers() or {}
|
||||
ngx.say("Authz-Header - " .. headers["x-functions-key"] or "")
|
||||
|
||||
--- response_body
|
||||
Authz-Header - must_not_be_overrided
|
||||
|
||||
|
||||
|
||||
=== TEST 9: fall back to metadata master key
|
||||
--- config
|
||||
location /t {
|
||||
content_by_lua_block {
|
||||
local t = require("lib.test_admin").test
|
||||
|
||||
local code, meta_body = t('/apisix/admin/plugin_metadata/azure-functions',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"master_apikey":"metadata_key"
|
||||
}]],
|
||||
[[{
|
||||
"node": {
|
||||
"value": {
|
||||
"master_apikey": "metadata_key",
|
||||
"master_clientid": ""
|
||||
},
|
||||
"key": "/apisix/plugin_metadata/azure-functions"
|
||||
},
|
||||
"action": "set"
|
||||
}]])
|
||||
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say("fail")
|
||||
return
|
||||
end
|
||||
ngx.say(meta_body)
|
||||
|
||||
-- update plugin attribute
|
||||
local code, body = t('/apisix/admin/routes/1',
|
||||
ngx.HTTP_PUT,
|
||||
[[{
|
||||
"plugins": {
|
||||
"azure-functions": {
|
||||
"function_uri": "http://localhost:8765/azure-demo"
|
||||
}
|
||||
},
|
||||
"uri": "/azure"
|
||||
}]]
|
||||
)
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say("fail")
|
||||
return
|
||||
end
|
||||
|
||||
ngx.say(body)
|
||||
|
||||
-- plugin schema already contains apikey with value "test_key" which won't be respected
|
||||
local code, _, body = t("/azure", "GET")
|
||||
if code >= 300 then
|
||||
ngx.status = code
|
||||
ngx.say(body)
|
||||
return
|
||||
end
|
||||
|
||||
ngx.print(body)
|
||||
}
|
||||
}
|
||||
--- inside_lua_block
|
||||
local headers = ngx.req.get_headers() or {}
|
||||
ngx.say("Authz-Header - " .. headers["x-functions-key"] or "")
|
||||
|
||||
--- response_body
|
||||
passed
|
||||
passed
|
||||
Authz-Header - metadata_key
|
Loading…
Reference in New Issue
Block a user