This is an automated email from the ASF dual-hosted git repository.
shreemaanabhishek pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix.git
The following commit(s) were added to refs/heads/master by this push:
new 528ec8971 feat(jwt-auth): support configuring `key_claim_name` (#11772)
528ec8971 is described below
commit 528ec8971d05bee0449e58198ac3a454ff9b2028
Author: Shreemaan Abhishek <[email protected]>
AuthorDate: Wed Nov 27 13:09:53 2024 +0545
feat(jwt-auth): support configuring `key_claim_name` (#11772)
---
apisix/plugins/jwt-auth.lua | 10 ++-
ci/common.sh | 4 +
docs/en/latest/plugins/jwt-auth.md | 1 +
t/plugin/jwt-auth4.t | 162 +++++++++++++++++++++++++++++++++++++
4 files changed, 175 insertions(+), 2 deletions(-)
diff --git a/apisix/plugins/jwt-auth.lua b/apisix/plugins/jwt-auth.lua
index 740efcdc6..87f421499 100644
--- a/apisix/plugins/jwt-auth.lua
+++ b/apisix/plugins/jwt-auth.lua
@@ -48,7 +48,12 @@ local schema = {
hide_credentials = {
type = "boolean",
default = false
- }
+ },
+ key_claim_name = {
+ type = "string",
+ default = "key",
+ minLength = 1,
+ },
},
}
@@ -240,7 +245,8 @@ function _M.rewrite(conf, ctx)
return 401, {message = "JWT token invalid"}
end
- local user_key = jwt_obj.payload and jwt_obj.payload.key
+ local key_claim_name = conf.key_claim_name
+ local user_key = jwt_obj.payload and jwt_obj.payload[key_claim_name]
if not user_key then
return 401, {message = "missing user key in JWT token"}
end
diff --git a/ci/common.sh b/ci/common.sh
index ae5d12b2b..8c8a40435 100644
--- a/ci/common.sh
+++ b/ci/common.sh
@@ -33,6 +33,10 @@ create_lua_deps() {
echo "Create lua deps"
make deps
+
+ # just for jwt-auth test
+ luarocks install lua-resty-openssl --tree deps
+
# maybe reopen this feature later
# luarocks install luacov-coveralls --tree=deps --local > build.log 2>&1
|| (cat build.log && exit 1)
# for github action cache
diff --git a/docs/en/latest/plugins/jwt-auth.md
b/docs/en/latest/plugins/jwt-auth.md
index a3522efe7..1f8f47092 100644
--- a/docs/en/latest/plugins/jwt-auth.md
+++ b/docs/en/latest/plugins/jwt-auth.md
@@ -47,6 +47,7 @@ For Consumer:
| exp | integer | False
| 86400 | [1,...] | Expiry time of the token in
seconds.
|
| base64_secret | boolean | False
| false | | Set to true if the secret is
base64 encoded.
|
| lifetime_grace_period | integer | False
| 0 | [0,...] | Define the leeway in seconds to
account for clock skew between the server that generated the jwt and the server
validating it. Value should be zero (0) or a positive integer. |
+| key_claim_name | string | False
| key | | The name of the JWT claim that
contains the user key (corresponds to Consumer's key attribute). |
NOTE: `encrypt_fields = {"secret"}` is also defined in the schema, which means
that the field will be stored encrypted in etcd. See [encrypted storage
fields](../plugin-develop.md#encrypted-storage-fields).
diff --git a/t/plugin/jwt-auth4.t b/t/plugin/jwt-auth4.t
new file mode 100644
index 000000000..075fbb85f
--- /dev/null
+++ b/t/plugin/jwt-auth4.t
@@ -0,0 +1,162 @@
+#
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+use t::APISIX 'no_plan';
+
+repeat_each(1);
+no_long_string();
+no_root_location();
+no_shuffle();
+
+add_block_preprocessor(sub {
+ my ($block) = @_;
+
+ if ((!defined $block->error_log) && (!defined $block->no_error_log)) {
+ $block->set_value("no_error_log", "[error]");
+ }
+
+ if (!defined $block->request) {
+ $block->set_value("request", "GET /t");
+ if (!$block->response_body) {
+ $block->set_value("response_body", "passed\n");
+ }
+ }
+});
+
+run_tests;
+
+__DATA__
+
+=== TEST 1: add consumer with username and plugins
+--- config
+ location /t {
+ content_by_lua_block {
+ local t = require("lib.test_admin").test
+ local code, body = t('/apisix/admin/consumers',
+ ngx.HTTP_PUT,
+ [[{
+ "username": "jack",
+ "plugins": {
+ "jwt-auth": {
+ "key": "user-key",
+ "secret": "my-secret-key"
+ }
+ }
+ }]]
+ )
+
+ if code >= 300 then
+ ngx.status = code
+ end
+ ngx.say(body)
+ }
+ }
+--- response_body
+passed
+
+
+
+=== TEST 2: enable jwt auth plugin using admin api
+--- config
+ location /t {
+ content_by_lua_block {
+ local t = require("lib.test_admin").test
+ local code, body = t('/apisix/admin/routes/1',
+ ngx.HTTP_PUT,
+ [[{
+ "plugins": {
+ "jwt-auth": {
+ "key": "user-key",
+ "secret": "my-secret-key",
+ "key_claim_name": "iss"
+ }
+ },
+ "upstream": {
+ "nodes": {
+ "127.0.0.1:1980": 1
+ },
+ "type": "roundrobin"
+ },
+ "uri": "/hello"
+ }]]
+ )
+
+ if code >= 300 then
+ ngx.status = code
+ end
+ ngx.say(body)
+ }
+ }
+--- response_body
+passed
+
+
+
+=== TEST 3: verify (in header)
+--- config
+ location /t {
+ content_by_lua_block {
+ local function gen_token(payload)
+ local buffer = require "string.buffer"
+ local openssl_mac = require "resty.openssl.mac"
+
+ local base64 = require "ngx.base64"
+ local base64_encode = base64.encode_base64url
+
+ local json = require("cjson")
+
+ local function sign(data, key)
+ return openssl_mac.new(key, "HMAC", nil,
"sha256"):final(data)
+ end
+ local header = { typ = "JWT", alg = "HS256" }
+ local buf = buffer.new()
+
+
buf:put(base64_encode(json.encode(header))):put("."):put(base64_encode(json.encode(payload)))
+
+ local ok, signature = pcall(sign, buf:tostring(),
"my-secret-key")
+ if not ok then
+ return nil, signature
+ end
+
+ buf:put("."):put(base64_encode(signature))
+
+ return buf:get()
+ end
+
+ local payload = {
+ sub = "1234567890",
+ iss = "user-key",
+ exp = 9916239022
+ }
+
+ local token = gen_token(payload)
+
+ local http = require("resty.http")
+ local uri = "http://127.0.0.1:" .. ngx.var.server_port .. "/hello"
+ local opt = {method = "POST", headers = {["Authorization"] =
"Bearer " .. token}}
+ local httpc = http.new()
+ local res = httpc:request_uri(uri, opt)
+ assert(res.status == 200)
+
+ ngx.print(res.body)
+ }
+ }
+--- request
+GET /t
+--- more_headers
+--- response_body
+hello world