EasyREST is a lightweight, extensible REST service that provides a unified API for performing CRUD and aggregating queries on relational databases. Its key innovation is the use of a plugin system that allows you to connect to virtually any database or data source simply by writing a plugin that conforms to the EasyREST interface.
EasyREST handles authentication via JWT, validates and sanitizes request parameters at the controller level, and then passes safe SQL expressions or commands to the plugins. The service supports complex queries including aggregations, aliasing, advanced WHERE conditions, and the use of context variables that allow you to influence query behavior dynamically.
- Architecture
- EasyREST Distributions
- Query Capabilities
- Supported Databases and Caches
- Configuration Parameters
- Examples
- Developing External Plugins
- API Documentation
- License
EasyREST's design emphasizes simplicity, extensibility, and security. It follows a modular architecture where the core server is responsible for:
- Authentication & Authorization: Validates JWT tokens and verifies scopes.
- Parameter Validation: Ensures that all parameters (select, where, ordering, etc.) are safe before forwarding to the plugins.
- Plugin Orchestration: Loads and manages DB and Cache plugins based on YAML configuration.
- Context Propagation: Extracts contextual information (e.g., timezone, HTTP headers, JWT claims) from each request and passes them to plugins.
flowchart TD
A[HTTP Request] -->|REST API| B[EasyREST Server]
B --> C{Authentication}
C -- Authenticated --> D[Process Request]
C -- Failed/No Auth --> E[401/403 Response]
E --> N[HTTP Response]
D -- Validate Scopes & Params --> D_VALID
D_VALID -- Valid --> X{Apply Context?}
D_VALID -- Invalid --> E2[400/403 Response]
E2 --> N
X -- Yes --> Y[Replace request.* and erctx.* values]
X -- No --> Z[Send as is]
Y --> J[Plugin Client RPC Call]
Z --> J[Plugin Client RPC Call]
J --> K["DB Plugin (e.g., SQLite, Postgres, MySQL, etc)"]
K --> F[Build SQL Query]
F --> L[Database]
L --> M[Return Results to DB Plugin]
M --> J2[Return Results to Plugin Client RPC Call]
J2 --> B2[Return to EasyREST Server]
B2 --> N[HTTP Response]
subgraph "Authentication Layer"
C
subgraph "Auth Plugins (Optional)"
P_Auth[Auth Plugin 1 e.g. JWT]
P_Auth2[Auth Plugin 2 e.g. OIDC]
end
C -->|Via Auth Plugins or Internal| P_Auth
C -->|Via Auth Plugins or Internal| P_Auth2
P_Auth ----> C
P_Auth2 ----> C
end
- RPC Communication: EasyREST uses Hashicorp's go-plugin system to load and communicate with plugins. The server launches plugin processes based on the configuration file and establishes an RPC connection.
- Plugin Loading:
easyrest-gateway
: This binary does not bundle any plugins. It discovers and launches plugin executables (e.g.,easyrest-plugin-sqlite
,easyrest-plugin-mysql
,easyrest-auth-jwt
) based on the URI scheme (for DB/Cache) or plugin name (for Auth), and thepath
setting, or by searching standard system locations.easyrest-server
: This binary comes with built-in support for SQLite, MySQL, PostgreSQL (DB plugins), and Redis, LRU (Cache plugins). If a configured DB/Cache plugin matches one of these built-in types, it's used directly. For other plugin types or if an explicitpath
is provided, it behaves likeeasyrest-gateway
and attempts to load an external plugin executable. Auth plugins are typically loaded externally byeasyrest-server
as well.easyrest-plugin-*
: These are standalone executables, each providing a specific DB or Cache implementation (e.g.,easyrest-plugin-mysql
).easyrest-auth-*
: These are standalone executables, each providing a specific Authentication implementation (e.g.,easyrest-auth-jwt
).
- Data Exchange: The server sends validated and sanitized SQL expressions (for DB plugins), commands (for Cache plugins), or authentication-related data (for Auth plugins) and additional context data to the plugin. Context variables are directly substituted into the query or made available to the plugin.
- Type Registration: For secure and reliable encoding/decoding over RPC, custom types (e.g.,
time.Time
and flattened JWT claims) are registered with the gob package on both the server and plugin sides.
- Pluggable Authentication: Authentication can be handled by one or more configured
AuthPlugin
instances. EachAuthPlugin
is responsible for validating credentials (e.g., a token from theAuthorization
header) and returning claims. - Swagger Security Definitions:
AuthPlugin
instances also provide Swagger 2.0 Security Definition Objects during their initialization. These are merged into the main API's Swagger schema, allowing API clients to understand the authentication methods. - JWT Authentication (Legacy/Fallback): If no
AuthPlugin
is configured or if they don't handle a request, the server can fall back to its legacy JWT verification (usingtoken_secret
from configuration) and extracts claims. - Scope-based Authorization: The service verifies that the claims (from an AuthPlugin or legacy JWT) include the required scope (e.g.,
users-read
for GET operations,users-write
for modifications or wideread
andwrite
for all table names). This is controlled by thecheck_scope
setting. - Token Claims: The claims are flattened and passed to DB/Cache plugins (under the key
claims
in the context map) so that plugins can leverage user-specific information if needed.
EasyREST is available in different binary forms to suit various deployment needs:
- A lean, minimal server binary that contains no built-in plugins.
- It relies entirely on external
easyrest-plugin-*
(for DB/Cache) andeasyrest-auth-*
(for authentication) executables. - For each plugin defined in the configuration,
easyrest-gateway
will search for the corresponding plugin binary (e.g.,easyrest-plugin-mysql
for amysql://
URI, oreasyrest-auth-jwt
for an auth plugin namedjwt
) in standard systemPATH
directories or at the explicitpath
specified in the plugin's configuration. - Ideal for environments where you want to manage plugin binaries separately or use custom-built plugins.
- A comprehensive server binary that includes built-in support for common DB and Cache plugins:
- Database Plugins: MySQL, SQLite, PostgreSQL.
- Cache Plugins: Redis, LRU (in-memory).
- If a DB/Cache plugin configured in
plugins
matches one of these built-in types (e.g.,uri: "sqlite://..."
), the embedded plugin is used by default. - For DB/Cache plugin types not among the built-ins, or if an explicit
path
is provided in its configuration,easyrest-server
will attempt to load it as an external plugin executable, similar toeasyrest-gateway
. - Authentication plugins (
AuthPlugin
) are typically loaded as externaleasyrest-auth-*
executables byeasyrest-server
. - Suitable for most common use cases, providing out-of-the-box support for popular databases and caches, with flexible external authentication.
- These are individual, standalone plugin executables (e.g.,
easyrest-plugin-mysql
,easyrest-plugin-postgres
,easyrest-plugin-redis
). - They implement the
DBPlugin
orCachePlugin
interface. - They are used by
easyrest-gateway
for all DB/Cache plugin needs and byeasyrest-server
for DB/Cache plugins not built into it or when an external version is preferred. - You can build these plugins from their respective source code or use pre-compiled versions if available.
- These are individual, standalone plugin executables (e.g.,
easyrest-auth-jwt
,easyrest-auth-oidc
). - They implement the
AuthPlugin
interface. - They are used by both
easyrest-gateway
andeasyrest-server
to provide authentication mechanisms. - The server loads these based on the
auth_plugins
section in the configuration. - You build these plugins from their source code.
EasyREST supports a wide range of SQL query features by converting URL query parameters into SQL expressions after performing strict validation.
- Basic Selection:
Use the
select
parameter to specify one or more columns. For example:/api/test/users/?select=id,name
- Field Aliasing:
To alias a column, use the syntax
alias:field
. For example,becomes/api/test/users/?select=username:name
SELECT name AS username FROM users
- SQL Functions:
Aggregation functions are supported. For instance,
results in:
/api/test/users/?select=count()
You can also use functions with aliasing:SELECT COUNT(*) AS count FROM users
which translates to:/api/test/orders/?select=total:amount.sum(),order_date
SELECT SUM(amount) AS total, order_date FROM orders GROUP BY order_date
- EasyREST supports common SQL aggregate functions such as
COUNT()
,SUM()
,AVG()
,MIN()
, andMAX()
. - Aggregated fields are automatically excluded from the GROUP BY clause.
- Non-aggregated fields that appear in the
select
parameter are added to a GROUP BY clause automatically.
- Syntax:
Conditions are specified using parameters prefixed with
where.
. For example:This generates:/api/test/users/?where.eq.name=Alice
WHERE name = 'Alice'
- Operators:
Supported operators include:eq
(equals)neq
(not equals)lt
(less than)lte
(less than or equals)gt
(greater than)gte
(greater than or equals)like
(LIKE)ilike
(ILIKE)is
(IS)in
(IN)
EasyREST provides two ways to access context variables in queries:
erctx
Format: Uses underscore notation:erctx.claims_sub
request
Format: Uses JSON path notation:request.claims.sub
Available context variables: timezone
, headers
, claims
, method
, path
, query
, prefer
.
The Prefer
header can pass plugin-specific context or influence server behavior (e.g., Prefer: timezone=UTC tx=rollback
). Standard keys timezone
and tx
are recognized. Plugins can access other Prefer
key-value pairs via ctx["prefer"]
.
Database plugins handle these context variables differently:
- MySQL Plugin: Sets session variables (e.g.,
@erctx_claims_sub
,@request_claims_sub
) for the current connection. - PostgreSQL Plugin: Uses
set_config()
to set session-local configuration parameters (e.g.,current_setting(\'erctx.claims_sub\', true)
).
- Insertion (POST): JSON body. Context variables can be used in values.
- Update (PATCH): JSON body and optional
where
conditions. Context variables can be used in data and conditions. - Deletion (DELETE): Based on
where
parameters. Context variables can be used in conditions.
EasyREST can connect to various data stores through its plugin system.
- Plugin Type:
sqlite
(e.g.,uri: "sqlite://./test.db"
) - Built-in with
easyrest-server
. Can be used aseasyrest-plugin-sqlite
witheasyrest-gateway
. - A simple, file-based relational database. Good for development, testing, or small applications.
- Schema is introspected from the database file.
- Plugin Type:
mysql
(e.g.,uri: "mysql://user:pass@host:port/dbname"
) - Built-in with
easyrest-server
. Can be used aseasyrest-plugin-mysql
witheasyrest-gateway
.
- Context Injection: Injects
erctx.
andrequest.
context variables as MySQL session variables (e.g.,@erctx_claims_sub
). - Stored Procedure Calls: Executes stored procedures within a transaction.
- Connection Pooling: Uses a MySQL connection pool for performance.
- UTF8MB4 Support: Operates with
utf8mb4
andutf8mb4_general_ci
.
These parameters can be appended to the MySQL URI query string (e.g., ?maxOpenConns=50&parseTime=true
):
maxOpenConns
: Max open connections (default: 100).maxIdleConns
: Max idle connections (default: 20).connMaxLifetime
: Connection reuse time in minutes (default: 5).connMaxIdleTime
: Connection idle time in minutes (default: 10).timeout
: Query timeout in seconds (default: 30).parseTime
: Parse MySQL TIME/TIMESTAMP/DATETIME astime.Time
(recommended:true
).
Example URI: mysql://root:root@localhost:3307/easyrestdb?maxOpenConns=100&maxIdleConns=20&connMaxLifetime=5&connMaxIdleTime=10&timeout=30&parseTime=true
The plugin sets session variables before executing SQL. For a context variable like claims.sub
(value user123
), it would be:
SET @erctx_claims_sub = \'user123\', @request_claims_sub = \'user123\';
These can be used in triggers, stored procedures, or queries:
-- In a trigger or stored procedure
IF OLD.created_by != @request_claims_sub AND @request_claims_role != \'admin\' THEN ...
-- In a query via API
/api/mydb/products/?where.eq.created_by=erctx.claims_sub
- The plugin introspects table and view schemas.
- An example schema, including tables and a stored function (
doSomething
), is available inschemas/mysql.sql
. This file demonstrates table creation and how to define functions that can be called via the RPC endpoint. It also shows how to use session variables (set from context) in triggers (before_product_update
) and functions (getMyProducts
). - Note on Functions vs. Views for Row-Level Security: MySQL does not allow session variables directly in
CREATE VIEW
. Use stored functions for dynamic, user-context-aware data filtering, as they can access session variables.
To run MySQL in Docker for development (e.g., on port 3307):
docker run --name mysql-easyrest -p 3307:3306 \
-e MYSQL_ROOT_PASSWORD=root \
-e MYSQL_DATABASE=easyrestdb \
-d mysql:8
Apply your schema (e.g., contents of schemas/mysql.sql
):
docker exec -i mysql-easyrest mysql -uroot -proot easyrestdb < schemas/mysql.sql
- Plugin Type:
postgres
(e.g.,uri: "postgres://user:pass@host:port/dbname"
) - Built-in with
easyrest-server
. Can be used aseasyrest-plugin-postgres
witheasyrest-gateway
.
- Context Injection: Uses
set_config()
to makeerctx.
andrequest.
context variables available viacurrent_setting()
. - Function Calls: Executes PostgreSQL functions within a transaction.
- Connection Pooling: Efficient connection management.
- COPY Support: Uses
COPY FROM
for bulk inserts (threshold configurable).
Append to the PostgreSQL URI query string (e.g., ?maxOpenConns=50&sslmode=disable
):
maxOpenConns
: Max open connections (default by pgx driver, typically ~100).maxConns
is an alias used by the plugin.minConns
: Minimum connections in pool (default by pgx driver).maxIdleConns
is an alias.connMaxLifetime
: Connection lifetime (e.g.,5m
).connMaxIdleTime
: Connection idle time (e.g.,10m
).timeout
: Query timeout (e.g.,30s
).bulkThreshold
: Row count to triggerCOPY
for inserts (default: 100).autoCleanup
: For the cache feature if pg is used as cache; enables periodic cleanup of expired items (true
or1
).- Standard PostgreSQL parameters like
sslmode
,search_path
are also supported.
Example URI: postgres://user:pass@host:5433/dbname?sslmode=disable&maxConns=100&minConns=25&connMaxLifetime=5m&timeout=30s&bulkThreshold=100
The plugin uses SELECT set_config('request.claims_sub', 'user123', true);
for context variables.
Access them in SQL:
-- In a function or query
WHERE created_by = current_setting(\'request.claims_sub\', TRUE);
-- In a query via API
/api/pgdb/products/?where.eq.created_by=request.claims.sub
- The plugin introspects schemas for tables, views, and functions/procedures from
information_schema
andpg_catalog
. - It determines column types, nullability, defaults, function parameters, and return types to build the API schema.
- The logic for schema discovery is implemented in the plugin itself (see
GetSchema
and related functions inplugins/postgres/postgres.go
). It maps PostgreSQL types (e.g.,INTEGER
,VARCHAR
,TIMESTAMP
) to JSON schema types (integer
,string
). - Example SQL for defining tables, functions (like
doSomething
,getMyProducts
), and triggers (likebefore_product_update
) that can leverage context variables viacurrent_setting()
can be found by inspecting the test schemas used with the plugin or adapting generic PostgreSQL examples.
To run PostgreSQL in Docker (e.g., on port 5433):
docker run --name pg-easyrest -p 5433:5432 \
-e POSTGRES_PASSWORD=root \
-e POSTGRES_DB=easyrestdb \
-d postgres:15
Apply your schema:
docker exec -i pg-easyrest psql -U postgres -d easyrestdb < your_schema.sql
- Plugin Type:
redis
(e.g.,uri: "redis://host:port/0"
) - Built-in with
easyrest-server
(as a cache plugin). Can be used aseasyrest-plugin-redis
witheasyrest-gateway
.
- Cache Operations: Supports
SET
(with TTL) andGET
. - Connection Pooling: Uses
go-redis/redis
library's pooling. - Flexible Configuration: Via Redis URI.
The URI can include standard Redis parameters and go-redis
specific options:
- Scheme:
redis://
orrediss://
(for TLS) - User/Password:
user:password@
- Host and Port:
host:port
- Database Number:
/db_number
- Query Parameters:
protocol
,client_name
,max_retries
,min_retry_backoff
,max_retry_backoff
,dial_timeout
,read_timeout
,write_timeout
,pool_fifo
,pool_size
,pool_timeout
,min_idle_conns
,max_idle_conns
,conn_max_idle_time
,conn_max_lifetime
,skip_verify
(for TLS).
Example URI: redis://user:password@myredishost:6379/1?dialTimeout=5s&readTimeout=2s&poolSize=100&minIdleConns=10
To run Redis in Docker:
docker run --name redis-easyrest -p 6379:6379 -d valkey/valkey:8
- Plugin Type:
lru
(e.g.,uri: "lru://?size=1000&ttl=5m"
) - Built-in with
easyrest-server
(as a cache plugin). - A simple in-memory Least Recently Used (LRU) cache.
- Configuration via URI query parameters:
size
: Maximum number of items in the cache (default: 1000).ttl
: Default time-to-live for cache entries (e.g.,5m
,1h
, default: 0 - no TTL).
EasyREST is configured via a YAML file or environment variables.
Command-line: ./easyrest-server -config /path/to/custom-config.yaml
Environment: ER_CONFIG_FILE
# Server settings
port: 8080 # Default: 8080
default_timezone: "GMT" # Default: "GMT" or system timezone
access_log: false # Enable access logging (default: false)
# Authentication & Authorization
check_scope: true # Enable JWT scope checking (default: true)
token_user_search: "sub" # JWT claim for user ID (default: "sub")
# CORS settings (optional)
cors:
enabled: true # Enable CORS headers (default: false)
origins: ["*"] # List of allowed origins
methods: ["GET", "POST", "PUT", "DELETE", "OPTIONS"] # Allowed HTTP methods
headers: ["Content-Type", "Authorization", "X-Requested-With"] # Allowed headers
max_age: 86400 # Cache duration for preflight requests
# TLS settings (optional)
tls_enabled: false
tls_cert_file: "/path/to/cert.pem"
tls_key_file: "/path/to/key.pem"
# Plugin settings
plugin_log: true # Enable logging from plugins (default: false). Set to false to disable.
# --- Plugin Definitions (DB & Cache) ---
# Option 1: Include external YAML files containing DB/Cache plugin definitions
plugin_configs:
- ./plugins/database1.yaml
- /etc/easyrest/shared_plugins.yaml
# Option 2: Define DB/Cache plugins directly in the main config file
plugins:
# The key ('test', 'orders', 'inventory') becomes the API path segment (/api/test/, /api/orders/, /api/inventory)
test:
# URI format: <plugin_type>://<connection_details>
# The plugin_type (e.g., 'sqlite') determines the executable name (easyrest-plugin-sqlite)
uri: "sqlite://./test.db"
path: "" # Optional: Explicit path to plugin binary. If empty, server searches.
title: "Main Test Database API" # Optional: Custom title for this API in Swagger
enable_cache: true # Enable ETag caching for this connection
cache_name: "redis_cache" # Specify which cache plugin to use for ETags for this DB plugin
db_tx_end: commit-allow-override # Explicitly set default behavior
# Define tables/functions accessible without authentication
public:
table:
- public_info
func:
- get_server_status
# Define tables/functions to hide completely from the API schema
exclude:
table:
- internal_metadata
- migration_history
func:
- internal_cleanup_job
cache_invalidation_map:
process_order:
- orders
- order_items
orders:
uri: "sqlite:///data/orders.db"
enable_cache: true
cache_name: "redis_cache"
cache_invalidation_map:
process_order:
- orders
- order_items
inventory:
uri: "sqlite:///data/inventory.db"
# Example for a postgres plugin:
postgres_db:
uri: "postgres://user:password@host:port/database?sslmode=disable"
enable_cache: true
cache_name: "redis_cache" # Assuming a redis cache plugin named "redis_cache" is defined
# Example for an external Redis Cache Plugin
redis_cache:
uri: "redis://localhost:6379/0"
# path: "/opt/plugins/easyrest-plugin-redis" # Optional if in PATH
# --- Authentication Plugin Definitions ---
auth_plugins:
# The key (e.g., 'jwt_main', 'oidc_provider') is an identifier for the auth plugin instance.
# It's also used to find the plugin binary if 'path' is not specified (e.g., 'easyrest-auth-jwt_main').
jwt:
path: "" # Optional: Explicit path to the 'easyrest-auth-jwt' binary.
# If empty, server searches for 'easyrest-auth-jwt' in standard locations.
settings: # This map[string]any is passed directly to the AuthPlugin's Init method.
jwt_secret: "a-very-secure-secret-for-jwt"
token_type: "Bearer"
# other JWT specific settings like userinfo_endpoint etc.
# Example for another auth plugin, perhaps OpenID Connect
# oidc:
# path: "/opt/custom_plugins/easyrest-auth-myoidc" # Path to a custom OIDC auth plugin
# settings:
# discovery_url: "https://example.com/.well-known/openid-configuration"
# client_id: "my-client-id"
# scopes_supported: ["openid", "profile", "email"]
# --- Example External Plugin File (e.g., ./plugins/database1.yaml) --- Structure for DB/Cache plugins:
# - name: plugin_name # Name used in API path
# uri: "plugin_type://connection_string"
# path: "/path/to/plugin/binary" # Optional: Explicit path to plugin binary
# title: "Custom API Title" # Optional: Override the default API title in Swagger
# enable_cache: true # Optional: Enable ETag caching (default: false)
# cache_name: "specific_cache_plugin_name" # Optional
# public: # Optional: Define tables/functions accessible without JWT authentication
# table:
# - public_table1
# - public_table2
# func:
# - public_rpc1
# exclude: # Optional: Define tables/functions to hide from the API schema
# table:
# - hidden_table1
# func:
# - hidden_rpc1
# cache_invalidation_map: # Optional: Map RPC function names to tables whose ETags should be invalidated
# rpc_function_name:
# - table1_to_invalidate
# - table2_to_invalidate
# db_tx_end: "commit" # Optional
Key Configuration Sections:
-
Server Settings: Basic server parameters like
port
,default_timezone
. -
Authentication & Authorization: JWT settings (
token_secret
is mandatory), scope checking. -
CORS: Cross-Origin Resource Sharing settings.
-
TLS: Enable HTTPS by providing certificate and key files.
-
Plugin Settings:
plugin_log
: Controls whether plugin logs are captured by the server.plugin_configs
: A list of paths to external YAML files. Each file can define one or more plugins using the structure shown in the example.plugins
: A map for defining plugins directly. The map key (e.g.,test
) is used as the database identifier in API requests (/api/test/
).- Plugin Definition Attributes:
name
: (Required in external files, derived from map key in inline definitions) The identifier used in the API path (/api/<name>/
).uri
: (Required) Specifies the plugin type and connection details. The type (e.g.,sqlite
) maps to the executable name (easyrest-plugin-sqlite
).path
: (Optional) Explicit path to the plugin executable. If omitted, EasyREST searches standard locations.title
: (Optional) A custom title for this specific plugin's API documentation (Swagger schema). If omitted, the default title "EasyRest API" is used.enable_cache
: (Optional, defaults tofalse
) Iftrue
, enables ETag generation and checking (If-Match
,If-None-Match
) for requests to this DB plugin's tables. Requires at least one Cache plugin to be configured and loaded. This setting itself does not affect Cache plugins directly but enables the caching mechanism for operations related to this specific DB plugin.cache_name
: (Optional) Specifies the name (key fromplugins
map orname
from an external file) of the Cache plugin that should be used for ETag caching for this DB plugin. If omitted, EasyREST first looks for a Cache plugin with the same name as this DB plugin (e.g., if the DB plugin name istest
, it looks for Cache plugintest
). If not found, it falls back to the first available Cache plugin. This setting allows flexible linking between DB and Cache plugins.cache_invalidation_map
: (Optional) A map where keys are RPC function names (used via/api/<name>/rpc/<function_name>
) and values are lists of table names. When a listed RPC function is successfully executed for this DB plugin (<name>
), the ETags for the specified tables associated with this same DB plugin are invalidated in the corresponding Cache plugin. This is useful if an RPC call modifies data in related tables.db_tx_end
: (Optional, defaults tocommit-allow-override
) Defines the default transaction handling behavior for write operations (POST, PATCH, DELETE) and RPC calls handled by this DB plugin, and whether thePrefer: tx=
header can override it. -commit
: Always commit the transaction upon successful completion of the operation. IgnorePrefer: tx=rollback
. -commit-allow-override
: Commit by default, but allowPrefer: tx=rollback
to force a rollback even on success. (Default behavior) -rollback
: Always roll back the transaction, even upon successful completion. IgnorePrefer: tx=commit
. Useful for read-only simulations or dry runs. -rollback-allow-override
: Roll back by default, but allowPrefer: tx=commit
to force a commit on success.public
: (Optional) Defines tables and RPC functions within this plugin that are accessible without any authentication (no JWT required). -table
: A list of table names that can be accessed publicly. -func
: A list of RPC function names that can be called publicly.exclude
: (Optional) Defines tables and RPC functions within this plugin that should be completely hidden from the API. They will not appear in the generated Swagger schema. -table
: A list of table names to exclude. -func
: A list of RPC function names to exclude.
-
Auth Plugin Definitions (
auth_plugins
section):- This is a map where each key is a unique name for an authentication plugin instance (e.g.,
jwt_main
,oidc_internal
). - Auth Plugin Attributes:
path
: (Optional) Explicit path to the authentication plugin executable (e.g.,/usr/local/bin/easyrest-auth-myjwt
). If omitted, the server searches for an executable namedeasyrest-auth-<key_name>
(e.g., if config hasauth_plugins: { myjwt: { ... } }
, the binary should beeasyrest-auth-myjwt
).settings
: (Required) Amap[string]any
that is passed directly to theAuthPlugin
'sInit(settings map[string]any)
method. This allows passing arbitrary configuration to the authentication plugin (e.g., JWT secrets, OIDC discovery URLs, API keys, etc.). The structure of this map is defined by the specific auth plugin.
- This is a map where each key is a unique name for an authentication plugin instance (e.g.,
-
The server merges plugin definitions from
plugin_configs
files and the inlineplugins
map. Definitions in the inline map take precedence if names conflict. Auth plugins are defined separately inauth_plugins
.
Imagine you have two SQLite databases:
-
Test Database (
ER_DB_TEST
):- Path:
./test.db
- Table:
users
Structure:id
(auto-increment),name
(text),update_field
(text)
- Path:
-
Orders Database (
ER_DB_ORDERS
):- Path:
./orders.db
- Table:
orders
Structure:id
(auto-increment),items
(integer),order_date
(date),amount
(real)
- Path:
Create a config.yaml
file (or specify a different one with -config
):
port: 8080
token_secret: "your-secret"
token_user_search: "sub"
default_timezone: "America/Los_Angeles"
plugins:
test:
uri: "sqlite://./test.db"
orders:
uri: "sqlite://./orders.db"
Query Examples:
-
Using Context Variables:
GET /api/test/users/?select=id,name&where.eq.name=request.claims.sub
or
GET /api/test/users/?select=id,name&where.eq.name=erctx.claims_sub
-
Aggregating Queries:
GET /api/orders/?select=total:amount.sum(),order_date
→
SELECT SUM(amount) AS total, order_date FROM orders GROUP BY order_date;
-
Data Insertion with Context:
POST /api/test/users/ Body: [{"name": "request.claims.sub", "update_field": "new"}]
Each plugin endpoint (/api/<plugin-name>/
) provides a Swagger 2.0 JSON schema describing available tables and their structure. This documentation can be used to understand the database schema and build client applications.
For example:
GET /api/test/
Returns a Swagger 2.0 JSON schema for all tables in the test database.
External plugins allow you to extend EasyREST with support for different database backends, caching systems, or authentication mechanisms. A single plugin binary can provide implementations for the DBPlugin
interface, the CachePlugin
interface, the AuthPlugin
interface, or any combination of them.
To create an external plugin:
-
Create a New Repository: For instance, create a repository named
easyrest-my-custom-plugin
. -
Import Required Modules: In your plugin's
go.mod
, add the necessary EasyREST and go-plugin dependencies:require ( github.com/onegreyonewhite/easyrest v0.x.x // Use the appropriate version github.com/hashicorp/go-plugin v1.x.x // Use the appropriate version )
Then, import the required packages in your Go files:
import ( "context" // Often needed for context handling in implementations "time" // Often needed for cache TTLs easyrest "github.com/onegreyonewhite/easyrest/plugin" hplugin "github.com/hashicorp/go-plugin" // Your specific DB/Cache/Auth driver or library imports, e.g.: // _ "github.com/go-sql-driver/mysql" // "github.com/redis/go-redis/v9" // "github.com/golang-jwt/jwt/v5" )
-
Implement the Interface(s): Create a struct (or structs) that implements the methods defined in
easyrest.DBPlugin
,easyrest.CachePlugin
, and/oreasyrest.AuthPlugin
interfaces fromgithub.com/onegreyonewhite/easyrest/plugin
.// Example structure implementing all three interfaces type MyCustomPlugin struct { // Add fields for DB connections, cache clients, auth settings, etc. } // --- DBPlugin Implementation (Example) --- func (p *MyCustomPlugin) InitConnection(uri string) error { /* ... */ return nil } func (p *MyCustomPlugin) TableGet(userID string, table string, selectFields []string, where map[string]any, ordering []string, groupBy []string, limit, offset int, ctx map[string]any) ([]map[string]any, error) { /* ... */ return nil, nil } func (p *MyCustomPlugin) TableCreate(userID string, table string, data []map[string]any, ctx map[string]any) ([]map[string]any, error) { /* ... */ return nil, nil } func (p *MyCustomPlugin) TableUpdate(userID string, table string, data map[string]any, where map[string]any, ctx map[string]any) (int, error) { /* ... */ return 0, nil } func (p *MyCustomPlugin) TableDelete(userID string, table string, where map[string]any, ctx map[string]any) (int, error) { /* ... */ return 0, nil } func (p *MyCustomPlugin) CallFunction(userID string, funcName string, data map[string]any, ctx map[string]any) (any, error) { /* ... */ return nil, nil } func (p *MyCustomPlugin) GetSchema(ctx map[string]any) (any, error) { /* ... */ return nil, nil } // --- CachePlugin Implementation (Example) --- // InitConnection can be shared if URI contains info for both DB and Cache, or distinct if plugin handles them separately. // For simplicity, assuming it's called if "cache" is in pluginMap. // func (p *MyCustomPlugin) InitConnection(uri string) error { /* Cache specific init if needed */ return nil } func (p *MyCustomPlugin) Get(key string) (string, error) { /* ... */ return "", nil } func (p *MyCustomPlugin) Set(key string, value string, ttl time.Duration) error { /* ... */ return nil } // Delete method signature might have changed, refer to the interface in plugin/plugin.go // func (p *MyCustomPlugin) Delete(keys []string) error { /* ... */ return nil } // --- AuthPlugin Implementation (Example) --- func (p *MyCustomPlugin) Init(settings map[string]any) (map[string]any, error) { // Initialize authentication mechanism with provided settings. // 'settings' comes from the `auth_plugins.<plugin_name>.settings` in server config. // Example: read a JWT secret or OIDC discovery URL from settings. // Return a Swagger 2.0 Security Definition Object as map[string]any // For example, for an API Key: // return map[string]any{ // "type": "apiKey", // "name": "X-API-KEY", // "in": "header", // }, nil // Or for OAuth2: // return map[string]any{ // "type": "oauth2", // "flow": "implicit", // "authorizationUrl": "https://example.com/oauth/authorize", // "scopes": map[string]string{ // "read:stuff": "read your stuff", // "write:stuff": "write your stuff", // }, // }, nil // If no security definition is provided by this plugin, return nil for the schema. return nil, nil } func (p *MyCustomPlugin) Authenticate(authHeader string) (map[string]any, error) { // Authenticate the request based on the authHeader (e.g., "Bearer <token>"). // Parse the token, validate it, etc. // Return claims as map[string]any or an error. // Example: // if authHeader == "Bearer valid_token" { // return map[string]any{"sub": "user123", "scope": "read write"}, nil // } // return nil, errors.New("invalid token") return nil, nil } // Note: A plugin doesn't *have* to implement all interfaces. // If it only implements DBPlugin, only register "db". // If it only implements CachePlugin, only register "cache". // If it only implements AuthPlugin, only register "auth".
-
Register and Serve the Plugin: In your plugin's
main
package (main.go
), register your implementation(s) and start the plugin server. Use theeasyrest.Handshake
configuration.func main() { // Create an instance of your plugin implementation impl := &MyCustomPlugin{} // Assuming MyCustomPlugin implements one or more interfaces // Define the plugins provided by this binary pluginMap := map[string]hplugin.Plugin{} // Conditionally register implementations based on what MyCustomPlugin provides: // If MyCustomPlugin implements easyrest.DBPlugin // pluginMap["db"] = &easyrest.DBPluginPlugin{Impl: impl} // If MyCustomPlugin implements easyrest.CachePlugin // pluginMap["cache"] = &easyrest.CachePluginPlugin{Impl: impl} // If MyCustomPlugin implements easyrest.AuthPlugin pluginMap["auth"] = &easyrest.AuthPluginPlugin{Impl: impl} // Serve the plugin(s) hplugin.Serve(&hplugin.ServeConfig{ HandshakeConfig: easyrest.Handshake, Plugins: pluginMap, // Only include the services this plugin binary actually provides }) }
Important: Ensure your struct
impl
actually implements the methods for the interfaces you are registering. The keys"db"
,"cache"
, and"auth"
are fixed and tell the EasyREST server which interface to expect. -
Build and Deploy: Build the plugin binary. The naming convention is important for auto-discovery if a
path
is not specified in the server configuration:- For DB or Cache plugins, the name typically relates to the
uri
scheme (e.g.,easyrest-plugin-mysql
formysql://
). - For Auth plugins, the name should be
easyrest-auth-<key_name_in_config>
(e.g., if config hasauth_plugins: { myjwt: { ... } }
, the binary should beeasyrest-auth-myjwt
). - The server searches in
PATH
, current working directory, and the server's executable directory. OS/Arch specific names are also checked (e.g.,easyrest-auth-myjwt-linux-amd64
).
Alternatively, specify the exact path to the plugin binary in the EasyREST configuration file.
- For DB or Cache plugins, the name typically relates to the
-
Configure EasyREST: Update your EasyREST YAML configuration:
- For DB/Cache plugins, use the
plugins
section. - For Auth plugins, use the new
auth_plugins
section, providing the necessarysettings
for your plugin'sInit
method.
# In your server's config.yaml plugins: # ... your DB/Cache plugin configurations ... # my_database: # uri: "customdb://..." # Assuming your plugin handles 'customdb' # path: "/path/to/your/easyrest-my-custom-plugin" # If it also serves DB auth_plugins: my_auth_instance_name: # This name is used for auto-discovery if path is empty (easyrest-auth-my_auth_instance_name) path: "/path/to/your/easyrest-my-custom-plugin" # Or specify path directly settings: # Settings specific to your MyCustomPlugin's Init method api_key_secret: "some_secret_value_for_auth" # ... other settings
- For DB/Cache plugins, use the
EasyREST is licensed under the terms of the Apache License 2.0. See the file "LICENSE" for more information.
Copyright 2025 Sergei Kliuikov