-
Notifications
You must be signed in to change notification settings - Fork 339
/
forward_auth.go
126 lines (117 loc) · 4.62 KB
/
forward_auth.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
// Licensed to the Apache Software Foundation (ASF) under one or more
// contributor license agreements. See the NOTICE file distributed with
// this work for additional information regarding copyright ownership.
// The ASF licenses this file to You under the Apache License, Version 2.0
// (the "License"); you may not use this file except in compliance with
// the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package annotations
import (
"fmt"
"net/http"
"time"
ginkgo "github.com/onsi/ginkgo/v2"
"github.com/stretchr/testify/assert"
"github.com/apache/apisix-ingress-controller/test/e2e/scaffold"
)
var _ = ginkgo.Describe("suite-annotations: froward-auth annotations", func() {
s := scaffold.NewDefaultScaffold()
ginkgo.JustBeforeEach(func() {
// create an external auth service
json := `{
"uri":"/auth",
"plugins":{
"serverless-pre-function":{
"phase":"rewrite",
"functions":[
"return function (conf, ctx)\n local core = require(\"apisix.core\");\n local authorization = core.request.header(ctx, \"Authorization\");\n if authorization == \"123\" then\n core.response.exit(200);\n elseif authorization == \"321\" then\n core.response.set_header(\"X-User-ID\", \"i-am-user\");\n core.response.exit(200);\n else core.response.set_header(\"Location\", \"http://example.com/auth\");\n core.response.exit(403);\n end\nend"
]
}
}
}`
assert.Nil(ginkgo.GinkgoT(), s.CreateApisixRouteByApisixAdmin("auth", []byte(json)), "create forward-auth serverless route")
})
ginkgo.It("enable in ingress networking/v1", func() {
backendSvc, backendPort := s.DefaultHTTPBackend()
ing := fmt.Sprintf(`
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
annotations:
kubernetes.io/ingress.class: apisix
k8s.apisix.apache.org/auth-uri: %s
k8s.apisix.apache.org/auth-request-headers: Authorization
k8s.apisix.apache.org/auth-upstream-headers: X-User-ID
k8s.apisix.apache.org/auth-client-headers: Location
name: ingress-v1
spec:
rules:
- host: httpbin.org
http:
paths:
- path: /ip
pathType: Exact
backend:
service:
name: %s
port:
number: %d
`, "http://127.0.0.1:9080/auth", backendSvc, backendPort[0])
err := s.CreateResourceFromString(ing)
assert.Nil(ginkgo.GinkgoT(), err, "creating ingress")
time.Sleep(5 * time.Second)
resp := s.NewAPISIXClient().GET("/ip").WithHeader("Host", "httpbin.org").WithHeader("Authorization", "123").Expect()
resp.Status(http.StatusOK)
resp = s.NewAPISIXClient().GET("/ip").WithHeader("Host", "httpbin.org").WithHeader("Authorization", "321").Expect()
resp.Status(http.StatusOK)
resp = s.NewAPISIXClient().GET("/ip").WithHeader("Host", "httpbin.org").Expect()
resp.Status(http.StatusForbidden)
resp.Headers().ContainsMap(map[string]interface{}{
"Location": []string{"http://example.com/auth"},
})
})
ginkgo.It("enable in ingress networking/v1beta1", func() {
backendSvc, backendPort := s.DefaultHTTPBackend()
ing := fmt.Sprintf(`
apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
annotations:
kubernetes.io/ingress.class: apisix
k8s.apisix.apache.org/auth-uri: %s
k8s.apisix.apache.org/auth-request-headers: Authorization
k8s.apisix.apache.org/auth-upstream-headers: X-User-ID
k8s.apisix.apache.org/auth-client-headers: Location
name: ingress-v1beta1
spec:
rules:
- host: httpbin.org
http:
paths:
- path: /ip
pathType: Exact
backend:
serviceName: %s
servicePort: %d
`, "http://127.0.0.1:9080/auth", backendSvc, backendPort[0])
err := s.CreateResourceFromString(ing)
assert.Nil(ginkgo.GinkgoT(), err, "creating ingress")
time.Sleep(5 * time.Second)
resp := s.NewAPISIXClient().GET("/ip").WithHeader("Host", "httpbin.org").WithHeader("Authorization", "123").Expect()
resp.Status(http.StatusOK)
resp = s.NewAPISIXClient().GET("/ip").WithHeader("Host", "httpbin.org").WithHeader("Authorization", "321").Expect()
resp.Status(http.StatusOK)
resp = s.NewAPISIXClient().GET("/ip").WithHeader("Host", "httpbin.org").Expect()
resp.Status(http.StatusForbidden)
resp.Headers().ContainsMap(map[string]interface{}{
"Location": []string{"http://example.com/auth"},
})
})
})