This is an automated email from the ASF dual-hosted git repository.
ronething pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix.git
The following commit(s) were added to refs/heads/master by this push:
new d38d5b698 fix: encryption/decryption for non-auth plugins in consumer
(#11600)
d38d5b698 is described below
commit d38d5b698be0913ee1c28980f57f7545ad99e603
Author: Ashing Zheng <[email protected]>
AuthorDate: Wed Sep 25 09:31:20 2024 +0800
fix: encryption/decryption for non-auth plugins in consumer (#11600)
Signed-off-by: ashing <[email protected]>
---
apisix/plugin.lua | 5 +-
t/node/consumer-plugin3.t | 159 ++++++++++++++++++++++++++++++++++++++++++++++
2 files changed, 163 insertions(+), 1 deletion(-)
diff --git a/apisix/plugin.lua b/apisix/plugin.lua
index 3d3c4b39b..dc22459aa 100644
--- a/apisix/plugin.lua
+++ b/apisix/plugin.lua
@@ -934,7 +934,10 @@ local function get_plugin_schema_for_gde(name, schema_type)
local schema
if schema_type == core.schema.TYPE_CONSUMER then
- schema = plugin_schema.consumer_schema
+ -- when we use a non-auth plugin in the consumer,
+ -- where the consumer_schema field does not exist,
+ -- we need to fallback to it's schema for encryption and decryption.
+ schema = plugin_schema.consumer_schema or plugin_schema.schema
elseif schema_type == core.schema.TYPE_METADATA then
schema = plugin_schema.metadata_schema
else
diff --git a/t/node/consumer-plugin3.t b/t/node/consumer-plugin3.t
new file mode 100644
index 000000000..345bccd92
--- /dev/null
+++ b/t/node/consumer-plugin3.t
@@ -0,0 +1,159 @@
+#
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+use t::APISIX 'no_plan';
+
+repeat_each(1);
+no_long_string();
+no_shuffle();
+no_root_location();
+
+run_tests;
+
+__DATA__
+
+=== TEST 1: add consumer with csrf plugin (data encryption enabled)
+--- yaml_config
+apisix:
+ data_encryption:
+ enable_encrypt_fields: true
+ keyring:
+ - edd1c9f0985e76a2
+--- config
+ location /t {
+ content_by_lua_block {
+ local t = require("lib.test_admin").test
+ local json = require("toolkit.json")
+ local code, body = t('/apisix/admin/consumers',
+ ngx.HTTP_PUT,
+ [[{
+ "username": "jack",
+ "plugins": {
+ "key-auth": {
+ "key": "key-a"
+ },
+ "csrf": {
+ "key": "userkey",
+ "expires": 1000000000
+ }
+ }
+ }]]
+ )
+ if code >= 300 then
+ ngx.status = code
+ ngx.say(body)
+ return
+ end
+
+ ngx.sleep(0.1)
+
+ -- verify csrf key is decrypted in admin API
+ local code, message, res = t('/apisix/admin/consumers/jack',
+ ngx.HTTP_GET
+ )
+ if code >= 300 then
+ ngx.status = code
+ ngx.say(message)
+ return
+ end
+ local consumer = json.decode(res)
+ ngx.say(consumer.value.plugins["csrf"].key)
+
+ -- verify csrf key is encrypted in etcd
+ local etcd = require("apisix.core.etcd")
+ local res = assert(etcd.get('/consumers/jack'))
+ ngx.say(res.body.node.value.plugins["csrf"].key)
+ }
+ }
+--- request
+GET /t
+--- response_body
+userkey
+mt39FazQccyMqt4ctoRV7w==
+--- no_error_log
+[error]
+
+
+
+=== TEST 2: add route
+--- config
+ location /t {
+ content_by_lua_block {
+ local t = require("lib.test_admin").test
+ local code, body = t('/apisix/admin/routes/1',
+ ngx.HTTP_PUT,
+ [[{
+ "uri": "/hello",
+ "plugins": {
+ "key-auth": {}
+ },
+ "upstream": {
+ "nodes": {
+ "127.0.0.1:1980": 1
+ },
+ "type": "roundrobin"
+ }
+ }]]
+ )
+
+ if code >= 300 then
+ ngx.status = code
+ end
+ ngx.say(body)
+ }
+ }
+--- request
+GET /t
+--- response_body
+passed
+
+
+
+=== TEST 3: invalid request - no csrf token
+--- yaml_config
+apisix:
+ data_encryption:
+ enable_encrypt_fields: true
+ keyring:
+ - edd1c9f0985e76a2
+--- request
+POST /hello
+--- more_headers
+apikey: key-a
+--- error_code: 401
+--- response_body
+{"error_msg":"no csrf token in headers"}
+
+
+
+=== TEST 4: valid request - with csrf token
+--- yaml_config
+apisix:
+ data_encryption:
+ enable_encrypt_fields: true
+ keyring:
+ - edd1c9f0985e76a2
+--- request
+POST /hello
+--- more_headers
+apikey: key-a
+apisix-csrf-token:
eyJyYW5kb20iOjAuNDI5ODYzMTk3MTYxMzksInNpZ24iOiI0ODRlMDY4NTkxMWQ5NmJhMDc5YzQ1ZGI0OTE2NmZkYjQ0ODhjODVkNWQ0NmE1Y2FhM2UwMmFhZDliNjE5OTQ2IiwiZXhwaXJlcyI6MjY0MzExOTYyNH0=
+Cookie:
apisix-csrf-token=eyJyYW5kb20iOjAuNDI5ODYzMTk3MTYxMzksInNpZ24iOiI0ODRlMDY4NTkxMWQ5NmJhMDc5YzQ1ZGI0OTE2NmZkYjQ0ODhjODVkNWQ0NmE1Y2FhM2UwMmFhZDliNjE5OTQ2IiwiZXhwaXJlcyI6MjY0MzExOTYyNH0=
+--- response_body
+hello world
+--- no_error_log
+[error]