269 lines
7.9 KiB
Go
269 lines
7.9 KiB
Go
|
package oraclecloud
|
||
|
|
||
|
import (
|
||
|
"crypto/rand"
|
||
|
"crypto/rsa"
|
||
|
"crypto/x509"
|
||
|
"encoding/base64"
|
||
|
"encoding/pem"
|
||
|
"testing"
|
||
|
"time"
|
||
|
|
||
|
"github.com/oracle/oci-go-sdk/common"
|
||
|
"github.com/stretchr/testify/require"
|
||
|
"github.com/xenolf/lego/platform/tester"
|
||
|
)
|
||
|
|
||
|
var envTest = tester.NewEnvTest(
|
||
|
ociPrivkeyBase64,
|
||
|
ociPrivkeyPass,
|
||
|
ociTenancyOCID,
|
||
|
ociUserOCID,
|
||
|
ociPubkeyFingerprint,
|
||
|
ociRegion,
|
||
|
"OCI_COMPARTMENT_OCID").
|
||
|
WithDomain("ORACLECLOUD_DOMAIN")
|
||
|
|
||
|
func TestNewDNSProvider(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
desc string
|
||
|
envVars map[string]string
|
||
|
expected string
|
||
|
}{
|
||
|
{
|
||
|
desc: "success",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: mustGeneratePrivateKey("secret1"),
|
||
|
ociPrivkeyPass: "secret1",
|
||
|
ociTenancyOCID: "ocid1.tenancy.oc1..secret",
|
||
|
ociUserOCID: "ocid1.user.oc1..secret",
|
||
|
ociPubkeyFingerprint: "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
||
|
ociRegion: "us-phoenix-1",
|
||
|
"OCI_COMPARTMENT_OCID": "123",
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
desc: "missing credentials",
|
||
|
envVars: map[string]string{},
|
||
|
expected: "oraclecloud: some credentials information are missing: OCI_PRIVKEY_BASE64,OCI_TENANCY_OCID,OCI_USER_OCID,OCI_PUBKEY_FINGERPRINT,OCI_REGION,OCI_COMPARTMENT_OCID",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing CompartmentID",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: mustGeneratePrivateKey("secret"),
|
||
|
ociPrivkeyPass: "secret",
|
||
|
ociTenancyOCID: "ocid1.tenancy.oc1..secret",
|
||
|
ociUserOCID: "ocid1.user.oc1..secret",
|
||
|
ociPubkeyFingerprint: "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
||
|
ociRegion: "us-phoenix-1",
|
||
|
"OCI_COMPARTMENT_OCID": "",
|
||
|
},
|
||
|
expected: "oraclecloud: some credentials information are missing: OCI_COMPARTMENT_OCID",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing OCI_PRIVKEY_BASE64",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: "",
|
||
|
ociPrivkeyPass: "secret",
|
||
|
ociTenancyOCID: "ocid1.tenancy.oc1..secret",
|
||
|
ociUserOCID: "ocid1.user.oc1..secret",
|
||
|
ociPubkeyFingerprint: "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
||
|
ociRegion: "us-phoenix-1",
|
||
|
"OCI_COMPARTMENT_OCID": "123",
|
||
|
},
|
||
|
expected: "oraclecloud: some credentials information are missing: OCI_PRIVKEY_BASE64",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing OCI_PRIVKEY_PASS",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: mustGeneratePrivateKey("secret"),
|
||
|
ociPrivkeyPass: "",
|
||
|
ociTenancyOCID: "ocid1.tenancy.oc1..secret",
|
||
|
ociUserOCID: "ocid1.user.oc1..secret",
|
||
|
ociPubkeyFingerprint: "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
||
|
ociRegion: "us-phoenix-1",
|
||
|
"OCI_COMPARTMENT_OCID": "123",
|
||
|
},
|
||
|
expected: "oraclecloud: can not create client, bad configuration: x509: decryption password incorrect",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing OCI_TENANCY_OCID",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: mustGeneratePrivateKey("secret"),
|
||
|
ociPrivkeyPass: "secret",
|
||
|
ociTenancyOCID: "",
|
||
|
ociUserOCID: "ocid1.user.oc1..secret",
|
||
|
ociPubkeyFingerprint: "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
||
|
ociRegion: "us-phoenix-1",
|
||
|
"OCI_COMPARTMENT_OCID": "123",
|
||
|
},
|
||
|
expected: "oraclecloud: some credentials information are missing: OCI_TENANCY_OCID",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing OCI_USER_OCID",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: mustGeneratePrivateKey("secret"),
|
||
|
ociPrivkeyPass: "secret",
|
||
|
ociTenancyOCID: "ocid1.tenancy.oc1..secret",
|
||
|
ociUserOCID: "",
|
||
|
ociPubkeyFingerprint: "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
||
|
ociRegion: "us-phoenix-1",
|
||
|
"OCI_COMPARTMENT_OCID": "123",
|
||
|
},
|
||
|
expected: "oraclecloud: some credentials information are missing: OCI_USER_OCID",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing OCI_PUBKEY_FINGERPRINT",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: mustGeneratePrivateKey("secret"),
|
||
|
ociPrivkeyPass: "secret",
|
||
|
ociTenancyOCID: "ocid1.tenancy.oc1..secret",
|
||
|
ociUserOCID: "ocid1.user.oc1..secret",
|
||
|
ociPubkeyFingerprint: "",
|
||
|
ociRegion: "us-phoenix-1",
|
||
|
"OCI_COMPARTMENT_OCID": "123",
|
||
|
},
|
||
|
expected: "oraclecloud: some credentials information are missing: OCI_PUBKEY_FINGERPRINT",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing OCI_REGION",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: mustGeneratePrivateKey("secret"),
|
||
|
ociPrivkeyPass: "secret",
|
||
|
ociTenancyOCID: "ocid1.tenancy.oc1..secret",
|
||
|
ociUserOCID: "ocid1.user.oc1..secret",
|
||
|
ociPubkeyFingerprint: "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
||
|
ociRegion: "",
|
||
|
"OCI_COMPARTMENT_OCID": "123",
|
||
|
},
|
||
|
expected: "oraclecloud: some credentials information are missing: OCI_REGION",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing OCI_REGION",
|
||
|
envVars: map[string]string{
|
||
|
ociPrivkeyBase64: mustGeneratePrivateKey("secret"),
|
||
|
ociPrivkeyPass: "secret",
|
||
|
ociTenancyOCID: "ocid1.tenancy.oc1..secret",
|
||
|
ociUserOCID: "ocid1.user.oc1..secret",
|
||
|
ociPubkeyFingerprint: "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
||
|
ociRegion: "",
|
||
|
"OCI_COMPARTMENT_OCID": "123",
|
||
|
},
|
||
|
expected: "oraclecloud: some credentials information are missing: OCI_REGION",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
for _, test := range testCases {
|
||
|
t.Run(test.desc, func(t *testing.T) {
|
||
|
defer envTest.RestoreEnv()
|
||
|
envTest.ClearEnv()
|
||
|
|
||
|
envTest.Apply(test.envVars)
|
||
|
|
||
|
p, err := NewDNSProvider()
|
||
|
|
||
|
if len(test.expected) == 0 {
|
||
|
require.NoError(t, err)
|
||
|
require.NotNil(t, p)
|
||
|
require.NotNil(t, p.config)
|
||
|
require.NotNil(t, p.client)
|
||
|
} else {
|
||
|
require.EqualError(t, err, test.expected)
|
||
|
}
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestNewDNSProviderConfig(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
desc string
|
||
|
compartmentID string
|
||
|
configurationProvider common.ConfigurationProvider
|
||
|
expected string
|
||
|
}{
|
||
|
{
|
||
|
desc: "invalid configuration",
|
||
|
configurationProvider: &configProvider{},
|
||
|
compartmentID: "123",
|
||
|
expected: "oraclecloud: can not create client, bad configuration: PEM data was not found in buffer",
|
||
|
},
|
||
|
{
|
||
|
desc: "OCIConfigProvider is missing",
|
||
|
compartmentID: "123",
|
||
|
expected: "oraclecloud: OCIConfigProvider is missing",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing CompartmentID",
|
||
|
expected: "oraclecloud: CompartmentID is missing",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
for _, test := range testCases {
|
||
|
t.Run(test.desc, func(t *testing.T) {
|
||
|
config := NewDefaultConfig()
|
||
|
config.CompartmentID = test.compartmentID
|
||
|
config.OCIConfigProvider = test.configurationProvider
|
||
|
|
||
|
p, err := NewDNSProviderConfig(config)
|
||
|
|
||
|
if len(test.expected) == 0 {
|
||
|
require.NoError(t, err)
|
||
|
require.NotNil(t, p)
|
||
|
require.NotNil(t, p.config)
|
||
|
require.NotNil(t, p.client)
|
||
|
} else {
|
||
|
require.EqualError(t, err, test.expected)
|
||
|
}
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestLivePresent(t *testing.T) {
|
||
|
if !envTest.IsLiveTest() {
|
||
|
t.Skip("skipping live test")
|
||
|
}
|
||
|
|
||
|
envTest.RestoreEnv()
|
||
|
provider, err := NewDNSProvider()
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
err = provider.Present(envTest.GetDomain(), "", "123d==")
|
||
|
require.NoError(t, err)
|
||
|
}
|
||
|
|
||
|
func TestLiveCleanUp(t *testing.T) {
|
||
|
if !envTest.IsLiveTest() {
|
||
|
t.Skip("skipping live test")
|
||
|
}
|
||
|
|
||
|
envTest.RestoreEnv()
|
||
|
provider, err := NewDNSProvider()
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
time.Sleep(1 * time.Second)
|
||
|
|
||
|
err = provider.CleanUp(envTest.GetDomain(), "", "123d==")
|
||
|
require.NoError(t, err)
|
||
|
}
|
||
|
|
||
|
func mustGeneratePrivateKey(pwd string) string {
|
||
|
key, err := rsa.GenerateKey(rand.Reader, 512)
|
||
|
if err != nil {
|
||
|
panic(err)
|
||
|
}
|
||
|
|
||
|
block := &pem.Block{
|
||
|
Type: "RSA PRIVATE KEY",
|
||
|
Bytes: x509.MarshalPKCS1PrivateKey(key),
|
||
|
}
|
||
|
|
||
|
if pwd != "" {
|
||
|
block, err = x509.EncryptPEMBlock(rand.Reader, block.Type, block.Bytes, []byte(pwd), x509.PEMCipherAES256)
|
||
|
if err != nil {
|
||
|
panic(err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return base64.StdEncoding.EncodeToString(pem.EncodeToMemory(block))
|
||
|
}
|