blob: aec6b840ad909e6123e52381d8e80a47a281d03e [file] [log] [blame]
--
-- Licensed to the Apache Software Foundation (ASF) under one or more
-- contributor license agreements. See the NOTICE file distributed with
-- this work for additional information regarding copyright ownership.
-- The ASF licenses this file to You under the Apache License, Version 2.0
-- (the "License"); you may not use this file except in compliance with
-- the License. You may obtain a copy of the License at
--
-- http://www.apache.org/licenses/LICENSE-2.0
--
-- Unless required by applicable law or agreed to in writing, software
-- distributed under the License is distributed on an "AS IS" BASIS,
-- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-- See the License for the specific language governing permissions and
-- limitations under the License.
--
local core = require("apisix.core")
local utils = require("apisix.admin.utils")
local apisix_ssl = require("apisix.ssl")
local tostring = tostring
local type = type
local _M = {
version = 0.1,
}
local function check_conf(id, conf, need_id)
if not conf then
return nil, {error_msg = "missing configurations"}
end
id = id or conf.id
if need_id and not id then
return nil, {error_msg = "missing ssl id"}
end
if not need_id and id then
return nil, {error_msg = "wrong ssl id, do not need it"}
end
if need_id and conf.id and tostring(conf.id) ~= tostring(id) then
return nil, {error_msg = "wrong ssl id"}
end
conf.id = id
core.log.info("schema: ", core.json.delay_encode(core.schema.ssl))
core.log.info("conf : ", core.json.delay_encode(conf))
local ok, err = core.schema.check(core.schema.ssl, conf)
if not ok then
return nil, {error_msg = "invalid configuration: " .. err}
end
local ok, err = apisix_ssl.validate(conf.cert, conf.key)
if not ok then
return nil, {error_msg = err}
end
local numcerts = conf.certs and #conf.certs or 0
local numkeys = conf.keys and #conf.keys or 0
if numcerts ~= numkeys then
return nil, {error_msg = "mismatched number of certs and keys"}
end
for i = 1, numcerts do
local ok, err = apisix_ssl.validate(conf.certs[i], conf.keys[i])
if not ok then
return nil, {error_msg = "failed to handle cert-key pair[" .. i .. "]: " .. err}
end
end
if conf.client then
if not apisix_ssl.support_client_verification() then
return nil, {error_msg = "client tls verify unsupported"}
end
local ok, err = apisix_ssl.validate(conf.client.ca, nil)
if not ok then
return nil, {error_msg = "failed to validate client_cert: " .. err}
end
end
return need_id and id or true
end
function _M.put(id, conf)
local id, err = check_conf(id, conf, true)
if not id then
return 400, err
end
-- encrypt private key
conf.key = apisix_ssl.aes_encrypt_pkey(conf.key)
if conf.keys then
for i = 1, #conf.keys do
conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i])
end
end
local key = "/ssl/" .. id
local ok, err = utils.inject_conf_with_prev_conf("ssl", key, conf)
if not ok then
return 500, {error_msg = err}
end
local res, err = core.etcd.set(key, conf)
if not res then
core.log.error("failed to put ssl[", key, "]: ", err)
return 500, {error_msg = err}
end
return res.status, res.body
end
function _M.get(id)
local key = "/ssl"
if id then
key = key .. "/" .. id
end
local res, err = core.etcd.get(key, not id)
if not res then
core.log.error("failed to get ssl[", key, "]: ", err)
return 500, {error_msg = err}
end
-- not return private key for security
if res.body and res.body.node and res.body.node.value then
res.body.node.value.key = nil
end
return res.status, res.body
end
function _M.post(id, conf)
local id, err = check_conf(id, conf, false)
if not id then
return 400, err
end
-- encrypt private key
conf.key = apisix_ssl.aes_encrypt_pkey(conf.key)
if conf.keys then
for i = 1, #conf.keys do
conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i])
end
end
local key = "/ssl"
-- core.log.info("key: ", key)
utils.inject_timestamp(conf)
local res, err = core.etcd.push("/ssl", conf)
if not res then
core.log.error("failed to post ssl[", key, "]: ", err)
return 500, {error_msg = err}
end
return res.status, res.body
end
function _M.delete(id)
if not id then
return 400, {error_msg = "missing ssl id"}
end
local key = "/ssl/" .. id
-- core.log.info("key: ", key)
local res, err = core.etcd.delete(key)
if not res then
core.log.error("failed to delete ssl[", key, "]: ", err)
return 500, {error_msg = err}
end
return res.status, res.body
end
function _M.patch(id, conf, sub_path)
if not id then
return 400, {error_msg = "missing route id"}
end
if not conf then
return 400, {error_msg = "missing new configuration"}
end
if type(conf) ~= "table" then
return 400, {error_msg = "invalid configuration"}
end
local key = "/ssl"
if id then
key = key .. "/" .. id
end
local res_old, err = core.etcd.get(key)
if not res_old then
core.log.error("failed to get ssl [", key, "] in etcd: ", err)
return 500, {error_msg = err}
end
if res_old.status ~= 200 then
return res_old.status, res_old.body
end
core.log.info("key: ", key, " old value: ",
core.json.delay_encode(res_old, true))
local node_value = res_old.body.node.value
local modified_index = res_old.body.node.modifiedIndex
if sub_path and sub_path ~= "" then
if sub_path == "key" then
conf = apisix_ssl.aes_encrypt_pkey(conf)
elseif sub_path == "keys" then
for i = 1, #conf do
conf[i] = apisix_ssl.aes_encrypt_pkey(conf[i])
end
end
local code, err, node_val = core.table.patch(node_value, sub_path, conf)
node_value = node_val
if code then
return code, err
end
else
if conf.key then
conf.key = apisix_ssl.aes_encrypt_pkey(conf.key)
end
if conf.keys then
for i = 1, #conf.keys do
conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i])
end
end
node_value = core.table.merge(node_value, conf);
end
utils.inject_timestamp(node_value, nil, conf)
core.log.info("new ssl conf: ", core.json.delay_encode(node_value, true))
local id, err = check_conf(id, node_value, true)
if not id then
return 400, err
end
local res, err = core.etcd.atomic_set(key, node_value, nil, modified_index)
if not res then
core.log.error("failed to set new ssl[", key, "] to etcd: ", err)
return 500, {error_msg = err}
end
return res.status, res.body
end
return _M