| -- |
| -- Licensed to the Apache Software Foundation (ASF) under one or more |
| -- contributor license agreements. See the NOTICE file distributed with |
| -- this work for additional information regarding copyright ownership. |
| -- The ASF licenses this file to You under the Apache License, Version 2.0 |
| -- (the "License"); you may not use this file except in compliance with |
| -- the License. You may obtain a copy of the License at |
| -- |
| -- http://www.apache.org/licenses/LICENSE-2.0 |
| -- |
| -- Unless required by applicable law or agreed to in writing, software |
| -- distributed under the License is distributed on an "AS IS" BASIS, |
| -- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| -- See the License for the specific language governing permissions and |
| -- limitations under the License. |
| -- |
| local core = require("apisix.core") |
| local utils = require("apisix.admin.utils") |
| local apisix_ssl = require("apisix.ssl") |
| local setmetatable = setmetatable |
| local tostring = tostring |
| local type = type |
| |
| |
| local _M = { |
| need_v3_filter = true, |
| } |
| |
| |
| local mt = { |
| __index = _M |
| } |
| |
| |
| local no_id_res = { |
| consumers = true, |
| plugin_metadata = true |
| } |
| |
| |
| local function split_typ_and_id(id, sub_path) |
| local uri_segs = core.utils.split_uri(sub_path) |
| local typ = id |
| local id = nil |
| if #uri_segs > 0 then |
| id = uri_segs[1] |
| end |
| return typ, id |
| end |
| |
| |
| function _M:check_conf(id, conf, need_id, typ) |
| if self.name == "secrets" then |
| id = typ .. "/" .. id |
| end |
| -- check if missing configurations |
| if not conf then |
| return nil, {error_msg = "missing configurations"} |
| end |
| |
| -- check id if need id |
| if not no_id_res[self.name] then |
| id = id or conf.id |
| if need_id and not id then |
| return nil, {error_msg = "missing ".. self.kind .. " id"} |
| end |
| |
| if not need_id and id then |
| return nil, {error_msg = "wrong ".. self.kind .. " id, do not need it"} |
| end |
| |
| if need_id and conf.id and tostring(conf.id) ~= tostring(id) then |
| return nil, {error_msg = "wrong ".. self.kind .. " id"} |
| end |
| |
| conf.id = id |
| end |
| |
| core.log.info("conf : ", core.json.delay_encode(conf)) |
| |
| -- check the resource own rules |
| if self.name ~= "secrets" then |
| core.log.info("schema: ", core.json.delay_encode(self.schema)) |
| end |
| |
| local ok, err = self.checker(id, conf, need_id, self.schema, typ) |
| |
| if not ok then |
| return ok, err |
| else |
| if no_id_res[self.name] then |
| return ok |
| else |
| return need_id and id or true |
| end |
| end |
| end |
| |
| |
| function _M:get(id, conf, sub_path) |
| if core.table.array_find(self.unsupported_methods, "get") then |
| return 405, {error_msg = "not supported `GET` method for " .. self.kind} |
| end |
| |
| local key = "/" .. self.name |
| local typ = nil |
| if self.name == "secrets" then |
| key = key .. "/" |
| typ, id = split_typ_and_id(id, sub_path) |
| end |
| |
| if id then |
| if self.name == "secrets" then |
| key = key .. typ |
| end |
| key = key .. "/" .. id |
| end |
| |
| local res, err = core.etcd.get(key, not id) |
| if not res then |
| core.log.error("failed to get ", self.kind, "[", key, "] from etcd: ", err) |
| return 503, {error_msg = err} |
| end |
| |
| if self.name == "ssls" then |
| -- not return private key for security |
| if res.body and res.body.node and res.body.node.value then |
| res.body.node.value.key = nil |
| end |
| end |
| |
| utils.fix_count(res.body, id) |
| return res.status, res.body |
| end |
| |
| |
| function _M:post(id, conf, sub_path, args) |
| if core.table.array_find(self.unsupported_methods, "post") then |
| return 405, {error_msg = "not supported `POST` method for " .. self.kind} |
| end |
| |
| local id, err = self:check_conf(id, conf, false) |
| if not id then |
| return 400, err |
| end |
| |
| if self.name == "ssls" then |
| -- encrypt private key |
| conf.key = apisix_ssl.aes_encrypt_pkey(conf.key) |
| |
| if conf.keys then |
| for i = 1, #conf.keys do |
| conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i]) |
| end |
| end |
| end |
| |
| local key = "/" .. self.name |
| utils.inject_timestamp(conf) |
| |
| local ttl = nil |
| if args then |
| ttl = args.ttl |
| end |
| |
| local res, err = core.etcd.push(key, conf, ttl) |
| if not res then |
| core.log.error("failed to post ", self.kind, "[", key, "] to etcd: ", err) |
| return 503, {error_msg = err} |
| end |
| |
| return res.status, res.body |
| end |
| |
| |
| function _M:put(id, conf, sub_path, args) |
| if core.table.array_find(self.unsupported_methods, "put") then |
| return 405, {error_msg = "not supported `PUT` method for " .. self.kind} |
| end |
| |
| local key = "/" .. self.name |
| local typ = nil |
| if self.name == "secrets" then |
| typ, id = split_typ_and_id(id, sub_path) |
| key = key .. "/" .. typ |
| end |
| |
| local need_id = not no_id_res[self.name] |
| local ok, err = self:check_conf(id, conf, need_id, typ) |
| if not ok then |
| return 400, err |
| end |
| |
| if self.name ~= "secrets" then |
| id = ok |
| end |
| |
| if self.name == "ssls" then |
| -- encrypt private key |
| conf.key = apisix_ssl.aes_encrypt_pkey(conf.key) |
| |
| if conf.keys then |
| for i = 1, #conf.keys do |
| conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i]) |
| end |
| end |
| end |
| |
| key = key .. "/" .. id |
| |
| if self.name ~= "plugin_metadata" then |
| local ok, err = utils.inject_conf_with_prev_conf(self.kind, key, conf) |
| if not ok then |
| return 503, {error_msg = err} |
| end |
| end |
| |
| local ttl = nil |
| if args then |
| ttl = args.ttl |
| end |
| |
| local res, err = core.etcd.set(key, conf, ttl) |
| if not res then |
| core.log.error("failed to put ", self.kind, "[", key, "] to etcd: ", err) |
| return 503, {error_msg = err} |
| end |
| |
| return res.status, res.body |
| end |
| |
| -- Keep the unused conf to make the args list consistent with other methods |
| function _M:delete(id, conf, sub_path) |
| if core.table.array_find(self.unsupported_methods, "delete") then |
| return 405, {error_msg = "not supported `DELETE` method for " .. self.kind} |
| end |
| |
| local key = "/" .. self.name |
| local typ = nil |
| if self.name == "secrets" then |
| typ, id = split_typ_and_id(id, sub_path) |
| end |
| |
| if not id then |
| return 400, {error_msg = "missing " .. self.kind .. " id"} |
| end |
| |
| -- core.log.error("failed to delete ", self.kind, "[", key, "] in etcd: ", err) |
| |
| if self.name == "secrets" then |
| key = key .. "/" .. typ |
| end |
| |
| key = key .. "/" .. id |
| |
| if self.delete_checker then |
| local code, err = self.delete_checker(id) |
| if err then |
| return code, err |
| end |
| end |
| |
| local res, err = core.etcd.delete(key) |
| if not res then |
| core.log.error("failed to delete ", self.kind, "[", key, "] in etcd: ", err) |
| return 503, {error_msg = err} |
| end |
| |
| return res.status, res.body |
| end |
| |
| |
| function _M:patch(id, conf, sub_path, args) |
| if core.table.array_find(self.unsupported_methods, "patch") then |
| return 405, {error_msg = "not supported `PATCH` method for " .. self.kind} |
| end |
| |
| local key = "/" .. self.name |
| local typ = nil |
| if self.name == "secrets" then |
| local uri_segs = core.utils.split_uri(sub_path) |
| if #uri_segs < 1 then |
| return 400, {error_msg = "no secret id"} |
| end |
| typ = id |
| id = uri_segs[1] |
| sub_path = core.table.concat(uri_segs, "/", 2) |
| end |
| |
| if not id then |
| return 400, {error_msg = "missing " .. self.kind .. " id"} |
| end |
| |
| if self.name == "secrets" then |
| key = key .. "/" .. typ |
| end |
| |
| key = key .. "/" .. id |
| |
| if conf == nil then |
| return 400, {error_msg = "missing new configuration"} |
| end |
| |
| if not sub_path or sub_path == "" then |
| if type(conf) ~= "table" then |
| return 400, {error_msg = "invalid configuration"} |
| end |
| end |
| |
| local res_old, err = core.etcd.get(key) |
| if not res_old then |
| core.log.error("failed to get ", self.kind, " [", key, "] in etcd: ", err) |
| return 503, {error_msg = err} |
| end |
| |
| if res_old.status ~= 200 then |
| return res_old.status, res_old.body |
| end |
| core.log.info("key: ", key, " old value: ", core.json.delay_encode(res_old, true)) |
| |
| local node_value = res_old.body.node.value |
| local modified_index = res_old.body.node.modifiedIndex |
| |
| if sub_path and sub_path ~= "" then |
| if self.name == "ssls" then |
| if sub_path == "key" then |
| conf = apisix_ssl.aes_encrypt_pkey(conf) |
| elseif sub_path == "keys" then |
| for i = 1, #conf do |
| conf[i] = apisix_ssl.aes_encrypt_pkey(conf[i]) |
| end |
| end |
| end |
| local code, err, node_val = core.table.patch(node_value, sub_path, conf) |
| node_value = node_val |
| if code then |
| return code, {error_msg = err} |
| end |
| utils.inject_timestamp(node_value, nil, true) |
| else |
| if self.name == "ssls" then |
| if conf.key then |
| conf.key = apisix_ssl.aes_encrypt_pkey(conf.key) |
| end |
| |
| if conf.keys then |
| for i = 1, #conf.keys do |
| conf.keys[i] = apisix_ssl.aes_encrypt_pkey(conf.keys[i]) |
| end |
| end |
| end |
| node_value = core.table.merge(node_value, conf) |
| utils.inject_timestamp(node_value, nil, conf) |
| end |
| |
| core.log.info("new conf: ", core.json.delay_encode(node_value, true)) |
| |
| local ok, err = self:check_conf(id, node_value, true, typ) |
| if not ok then |
| return 400, err |
| end |
| |
| local ttl = nil |
| if args then |
| ttl = args.ttl |
| end |
| |
| local res, err = core.etcd.atomic_set(key, node_value, ttl, modified_index) |
| if not res then |
| core.log.error("failed to set new ", self.kind, "[", key, "] to etcd: ", err) |
| return 503, {error_msg = err} |
| end |
| |
| return res.status, res.body |
| end |
| |
| |
| function _M.new(opt) |
| return setmetatable(opt, mt) |
| end |
| |
| |
| return _M |