lego/providers/dns/auroradns/auroradns_test.go

221 lines
5.3 KiB
Go
Raw Permalink Normal View History

2019-03-11 16:56:48 +00:00
package auroradns
2016-10-12 00:42:20 +00:00
import (
"fmt"
2021-08-25 09:44:11 +00:00
"io"
2016-10-12 00:42:20 +00:00
"net/http"
"net/http/httptest"
"testing"
2020-09-02 01:20:01 +00:00
"github.com/go-acme/lego/v4/platform/tester"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
2016-10-12 00:42:20 +00:00
)
var envTest = tester.NewEnvTest(EnvAPIKey, EnvSecret)
func setupTest(t *testing.T) (*DNSProvider, *http.ServeMux) {
t.Helper()
mux := http.NewServeMux()
server := httptest.NewServer(mux)
t.Cleanup(server.Close)
config := NewDefaultConfig()
config.APIKey = "asdf1234"
config.Secret = "key"
config.BaseURL = server.URL
provider, err := NewDNSProviderConfig(config)
require.NoError(t, err)
2016-10-12 00:42:20 +00:00
return provider, mux
}
2016-10-12 00:42:20 +00:00
func TestNewDNSProvider(t *testing.T) {
testCases := []struct {
desc string
envVars map[string]string
expected string
}{
{
desc: "success",
envVars: map[string]string{
EnvAPIKey: "123",
EnvSecret: "456",
},
},
{
desc: "missing credentials",
envVars: map[string]string{
EnvAPIKey: "",
EnvSecret: "",
},
expected: "aurora: some credentials information are missing: AURORA_API_KEY,AURORA_SECRET",
},
{
desc: "missing api key",
envVars: map[string]string{
EnvAPIKey: "",
EnvSecret: "456",
},
expected: "aurora: some credentials information are missing: AURORA_API_KEY",
},
{
desc: "missing secret key",
envVars: map[string]string{
EnvAPIKey: "123",
EnvSecret: "",
},
expected: "aurora: some credentials information are missing: AURORA_SECRET",
},
}
for _, test := range testCases {
t.Run(test.desc, func(t *testing.T) {
defer envTest.RestoreEnv()
envTest.ClearEnv()
envTest.Apply(test.envVars)
p, err := NewDNSProvider()
2021-03-04 19:16:59 +00:00
if test.expected == "" {
require.NoError(t, err)
require.NotNil(t, p)
require.NotNil(t, p.config)
require.NotNil(t, p.client)
} else {
require.EqualError(t, err, test.expected)
}
})
}
}
func TestNewDNSProviderConfig(t *testing.T) {
testCases := []struct {
desc string
apiKey string
secret string
expected string
}{
{
desc: "success",
apiKey: "123",
secret: "456",
},
{
desc: "missing credentials",
apiKey: "",
secret: "",
expected: "aurora: some credentials information are missing",
},
{
desc: "missing user id",
apiKey: "",
secret: "456",
expected: "aurora: some credentials information are missing",
},
{
desc: "missing key",
apiKey: "123",
secret: "",
expected: "aurora: some credentials information are missing",
},
}
for _, test := range testCases {
t.Run(test.desc, func(t *testing.T) {
config := NewDefaultConfig()
config.APIKey = test.apiKey
config.Secret = test.secret
p, err := NewDNSProviderConfig(config)
2021-03-04 19:16:59 +00:00
if test.expected == "" {
require.NoError(t, err)
require.NotNil(t, p)
require.NotNil(t, p.config)
require.NotNil(t, p.client)
} else {
require.EqualError(t, err, test.expected)
}
})
}
}
func TestDNSProvider_Present(t *testing.T) {
provider, mux := setupTest(t)
mux.HandleFunc("/zones", func(w http.ResponseWriter, r *http.Request) {
assert.Equal(t, http.MethodGet, r.Method, "method")
w.WriteHeader(http.StatusCreated)
fmt.Fprintf(w, `[{
2016-10-12 00:42:20 +00:00
"id": "c56a4180-65aa-42ec-a945-5fd21dec0538",
"name": "example.com"
}]`)
})
2016-10-12 00:42:20 +00:00
mux.HandleFunc("/zones/c56a4180-65aa-42ec-a945-5fd21dec0538/records", func(w http.ResponseWriter, r *http.Request) {
assert.Equal(t, http.MethodPost, r.Method)
assert.Equal(t, "application/json", r.Header.Get("Content-Type"), "Content-Type")
2016-10-12 00:42:20 +00:00
2021-08-25 09:44:11 +00:00
reqBody, err := io.ReadAll(r.Body)
require.NoError(t, err)
assert.Equal(t, `{"type":"TXT","name":"_acme-challenge","content":"w6uP8Tcg6K2QR905Rms8iXTlksL6OD1KOWBxTK7wxPI","ttl":300}`, string(reqBody))
2016-10-12 00:42:20 +00:00
w.WriteHeader(http.StatusCreated)
fmt.Fprintf(w, `{
"id": "c56a4180-65aa-42ec-a945-5fd21dec0538",
"type": "TXT",
"name": "_acme-challenge",
"ttl": 300
}`)
})
2016-10-12 00:42:20 +00:00
err := provider.Present("example.com", "", "foobar")
require.NoError(t, err, "fail to create TXT record")
2016-10-12 00:42:20 +00:00
}
func TestDNSProvider_CleanUp(t *testing.T) {
provider, mux := setupTest(t)
2016-10-12 00:42:20 +00:00
mux.HandleFunc("/zones", func(w http.ResponseWriter, r *http.Request) {
assert.Equal(t, http.MethodGet, r.Method)
w.WriteHeader(http.StatusCreated)
fmt.Fprintf(w, `[{
2016-10-12 00:42:20 +00:00
"id": "c56a4180-65aa-42ec-a945-5fd21dec0538",
"name": "example.com"
}]`)
})
2016-10-12 00:42:20 +00:00
mux.HandleFunc("/zones/c56a4180-65aa-42ec-a945-5fd21dec0538/records", func(w http.ResponseWriter, r *http.Request) {
assert.Equal(t, http.MethodPost, r.Method)
w.WriteHeader(http.StatusCreated)
fmt.Fprintf(w, `{
2016-10-12 00:42:20 +00:00
"id": "ec56a4180-65aa-42ec-a945-5fd21dec0538",
"type": "TXT",
"name": "_acme-challenge",
"ttl": 300
}`)
})
2016-10-12 00:42:20 +00:00
mux.HandleFunc("/zones/c56a4180-65aa-42ec-a945-5fd21dec0538/records/ec56a4180-65aa-42ec-a945-5fd21dec0538", func(w http.ResponseWriter, r *http.Request) {
assert.Equal(t, http.MethodDelete, r.Method)
2016-10-12 00:42:20 +00:00
assert.Equal(t, "application/json", r.Header.Get("Content-Type"), "Content-Type")
2016-10-12 00:42:20 +00:00
w.WriteHeader(http.StatusCreated)
fmt.Fprintf(w, `{}`)
})
2016-10-12 00:42:20 +00:00
err := provider.Present("example.com", "", "foobar")
require.NoError(t, err, "fail to create TXT record")
2016-10-12 00:42:20 +00:00
err = provider.CleanUp("example.com", "", "foobar")
require.NoError(t, err, "fail to remove TXT record")
2016-10-12 00:42:20 +00:00
}