forked from TrueCloudLab/lego
route53: fix challenge. (#665)
This commit is contained in:
parent
21f6cd8a12
commit
20d50a559f
6 changed files with 225 additions and 106 deletions
|
@ -33,7 +33,6 @@
|
||||||
max-per-linter = 0
|
max-per-linter = 0
|
||||||
max-same = 0
|
max-same = 0
|
||||||
exclude = [
|
exclude = [
|
||||||
"session.New is deprecated:", # providers/dns/route53/route53_integration_test.go | providers/dns/route53/route53_test.go
|
|
||||||
"func (.+)disableAuthz(.) is unused", # acme/client.go#disableAuthz
|
"func (.+)disableAuthz(.) is unused", # acme/client.go#disableAuthz
|
||||||
"type (.+)deactivateAuthMessage(.) is unused", # acme/messages.go#deactivateAuthMessage
|
"type (.+)deactivateAuthMessage(.) is unused", # acme/messages.go#deactivateAuthMessage
|
||||||
"(.)limitReader(.) - (.)numBytes(.) always receives (.)1048576(.)", # acme/crypto.go#limitReader
|
"(.)limitReader(.) - (.)numBytes(.) always receives (.)1048576(.)", # acme/crypto.go#limitReader
|
||||||
|
|
|
@ -12,10 +12,10 @@ func WaitFor(timeout, interval time.Duration, f func() (bool, error)) error {
|
||||||
log.Infof("Wait [timeout: %s, interval: %s]", timeout, interval)
|
log.Infof("Wait [timeout: %s, interval: %s]", timeout, interval)
|
||||||
|
|
||||||
var lastErr string
|
var lastErr string
|
||||||
timeup := time.After(timeout)
|
timeUp := time.After(timeout)
|
||||||
for {
|
for {
|
||||||
select {
|
select {
|
||||||
case <-timeup:
|
case <-timeUp:
|
||||||
return fmt.Errorf("time limit exceeded: last error: %s", lastErr)
|
return fmt.Errorf("time limit exceeded: last error: %s", lastErr)
|
||||||
default:
|
default:
|
||||||
}
|
}
|
||||||
|
|
|
@ -24,8 +24,11 @@ func newMockServer(t *testing.T, responses MockResponseMap) *httptest.Server {
|
||||||
path := r.URL.Path
|
path := r.URL.Path
|
||||||
resp, ok := responses[path]
|
resp, ok := responses[path]
|
||||||
if !ok {
|
if !ok {
|
||||||
msg := fmt.Sprintf("Requested path not found in response map: %s", path)
|
resp, ok = responses[r.RequestURI]
|
||||||
require.FailNow(t, msg)
|
if !ok {
|
||||||
|
msg := fmt.Sprintf("Requested path not found in response map: %s", path)
|
||||||
|
require.FailNow(t, msg)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
w.Header().Set("Content-Type", "application/xml")
|
w.Header().Set("Content-Type", "application/xml")
|
|
@ -44,17 +44,16 @@ type DNSProvider struct {
|
||||||
config *Config
|
config *Config
|
||||||
}
|
}
|
||||||
|
|
||||||
// customRetryer implements the client.Retryer interface by composing the
|
// customRetryer implements the client.Retryer interface by composing the DefaultRetryer.
|
||||||
// DefaultRetryer. It controls the logic for retrying recoverable request
|
// It controls the logic for retrying recoverable request errors (e.g. when rate limits are exceeded).
|
||||||
// errors (e.g. when rate limits are exceeded).
|
|
||||||
type customRetryer struct {
|
type customRetryer struct {
|
||||||
client.DefaultRetryer
|
client.DefaultRetryer
|
||||||
}
|
}
|
||||||
|
|
||||||
// RetryRules overwrites the DefaultRetryer's method.
|
// RetryRules overwrites the DefaultRetryer's method.
|
||||||
// It uses a basic exponential backoff algorithm that returns an initial
|
// It uses a basic exponential backoff algorithm:
|
||||||
// delay of ~400ms with an upper limit of ~30 seconds which should prevent
|
// that returns an initial delay of ~400ms with an upper limit of ~30 seconds,
|
||||||
// causing a high number of consecutive throttling errors.
|
// which should prevent causing a high number of consecutive throttling errors.
|
||||||
// For reference: Route 53 enforces an account-wide(!) 5req/s query limit.
|
// For reference: Route 53 enforces an account-wide(!) 5req/s query limit.
|
||||||
func (d customRetryer) RetryRules(r *request.Request) time.Duration {
|
func (d customRetryer) RetryRules(r *request.Request) time.Duration {
|
||||||
retryCount := r.RetryCount
|
retryCount := r.RetryCount
|
||||||
|
@ -66,57 +65,81 @@ func (d customRetryer) RetryRules(r *request.Request) time.Duration {
|
||||||
return time.Duration(delay) * time.Millisecond
|
return time.Duration(delay) * time.Millisecond
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewDNSProvider returns a DNSProvider instance configured for the AWS
|
// NewDNSProvider returns a DNSProvider instance configured for the AWS Route 53 service.
|
||||||
// Route 53 service.
|
|
||||||
//
|
//
|
||||||
// AWS Credentials are automatically detected in the following locations
|
// AWS Credentials are automatically detected in the following locations and prioritized in the following order:
|
||||||
// and prioritized in the following order:
|
|
||||||
// 1. Environment variables: AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY,
|
// 1. Environment variables: AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY,
|
||||||
// AWS_REGION, [AWS_SESSION_TOKEN]
|
// AWS_REGION, [AWS_SESSION_TOKEN]
|
||||||
// 2. Shared credentials file (defaults to ~/.aws/credentials)
|
// 2. Shared credentials file (defaults to ~/.aws/credentials)
|
||||||
// 3. Amazon EC2 IAM role
|
// 3. Amazon EC2 IAM role
|
||||||
//
|
//
|
||||||
// If AWS_HOSTED_ZONE_ID is not set, Lego tries to determine the correct
|
// If AWS_HOSTED_ZONE_ID is not set, Lego tries to determine the correct public hosted zone via the FQDN.
|
||||||
// public hosted zone via the FQDN.
|
|
||||||
//
|
//
|
||||||
// See also: https://github.com/aws/aws-sdk-go/wiki/configuring-sdk
|
// See also: https://github.com/aws/aws-sdk-go/wiki/configuring-sdk
|
||||||
func NewDNSProvider() (*DNSProvider, error) {
|
func NewDNSProvider() (*DNSProvider, error) {
|
||||||
return NewDNSProviderConfig(NewDefaultConfig())
|
return NewDNSProviderConfig(NewDefaultConfig())
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewDNSProviderConfig takes a given config ans returns a custom configured
|
// NewDNSProviderConfig takes a given config ans returns a custom configured DNSProvider instance
|
||||||
// DNSProvider instance
|
|
||||||
func NewDNSProviderConfig(config *Config) (*DNSProvider, error) {
|
func NewDNSProviderConfig(config *Config) (*DNSProvider, error) {
|
||||||
if config == nil {
|
if config == nil {
|
||||||
return nil, errors.New("route53: the configuration of the Route53 DNS provider is nil")
|
return nil, errors.New("route53: the configuration of the Route53 DNS provider is nil")
|
||||||
}
|
}
|
||||||
|
|
||||||
r := customRetryer{}
|
retry := customRetryer{}
|
||||||
r.NumMaxRetries = config.MaxRetries
|
retry.NumMaxRetries = config.MaxRetries
|
||||||
sessionCfg := request.WithRetryer(aws.NewConfig(), r)
|
sessionCfg := request.WithRetryer(aws.NewConfig(), retry)
|
||||||
|
|
||||||
sess, err := session.NewSessionWithOptions(session.Options{Config: *sessionCfg})
|
sess, err := session.NewSessionWithOptions(session.Options{Config: *sessionCfg})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
cl := route53.New(sess)
|
|
||||||
|
|
||||||
return &DNSProvider{
|
cl := route53.New(sess)
|
||||||
client: cl,
|
return &DNSProvider{client: cl, config: config}, nil
|
||||||
config: config,
|
|
||||||
}, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Timeout returns the timeout and interval to use when checking for DNS
|
// Timeout returns the timeout and interval to use when checking for DNS
|
||||||
// propagation.
|
// propagation.
|
||||||
func (r *DNSProvider) Timeout() (timeout, interval time.Duration) {
|
func (d *DNSProvider) Timeout() (timeout, interval time.Duration) {
|
||||||
return r.config.PropagationTimeout, r.config.PollingInterval
|
return d.config.PropagationTimeout, d.config.PollingInterval
|
||||||
}
|
}
|
||||||
|
|
||||||
// Present creates a TXT record using the specified parameters
|
// Present creates a TXT record using the specified parameters
|
||||||
func (r *DNSProvider) Present(domain, token, keyAuth string) error {
|
func (d *DNSProvider) Present(domain, token, keyAuth string) error {
|
||||||
fqdn, value, _ := acme.DNS01Record(domain, keyAuth)
|
fqdn, value, _ := acme.DNS01Record(domain, keyAuth)
|
||||||
|
|
||||||
err := r.changeRecord("UPSERT", fqdn, `"`+value+`"`, r.config.TTL)
|
hostedZoneID, err := d.getHostedZoneID(fqdn)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("route53: failed to determine hosted zone ID: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
records, err := d.getExistingRecordSets(hostedZoneID, fqdn)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("route53: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
realValue := `"` + value + `"`
|
||||||
|
|
||||||
|
var found bool
|
||||||
|
for _, record := range records {
|
||||||
|
if aws.StringValue(record.Value) == realValue {
|
||||||
|
found = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if !found {
|
||||||
|
records = append(records, &route53.ResourceRecord{Value: aws.String(realValue)})
|
||||||
|
}
|
||||||
|
|
||||||
|
recordSet := &route53.ResourceRecordSet{
|
||||||
|
Name: aws.String(fqdn),
|
||||||
|
Type: aws.String("TXT"),
|
||||||
|
TTL: aws.Int64(int64(d.config.TTL)),
|
||||||
|
ResourceRecords: records,
|
||||||
|
}
|
||||||
|
|
||||||
|
err = d.changeRecord(route53.ChangeActionUpsert, hostedZoneID, recordSet)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("route53: %v", err)
|
return fmt.Errorf("route53: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -124,61 +147,101 @@ func (r *DNSProvider) Present(domain, token, keyAuth string) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// CleanUp removes the TXT record matching the specified parameters
|
// CleanUp removes the TXT record matching the specified parameters
|
||||||
func (r *DNSProvider) CleanUp(domain, token, keyAuth string) error {
|
func (d *DNSProvider) CleanUp(domain, token, keyAuth string) error {
|
||||||
fqdn, value, _ := acme.DNS01Record(domain, keyAuth)
|
fqdn, _, _ := acme.DNS01Record(domain, keyAuth)
|
||||||
|
|
||||||
err := r.changeRecord("DELETE", fqdn, `"`+value+`"`, r.config.TTL)
|
hostedZoneID, err := d.getHostedZoneID(fqdn)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to determine Route 53 hosted zone ID: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
records, err := d.getExistingRecordSets(hostedZoneID, fqdn)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("route53: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(records) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
recordSet := &route53.ResourceRecordSet{
|
||||||
|
Name: aws.String(fqdn),
|
||||||
|
Type: aws.String("TXT"),
|
||||||
|
TTL: aws.Int64(int64(d.config.TTL)),
|
||||||
|
ResourceRecords: records,
|
||||||
|
}
|
||||||
|
|
||||||
|
err = d.changeRecord(route53.ChangeActionDelete, hostedZoneID, recordSet)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("route53: %v", err)
|
return fmt.Errorf("route53: %v", err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *DNSProvider) changeRecord(action, fqdn, value string, ttl int) error {
|
func (d *DNSProvider) changeRecord(action, hostedZoneID string, recordSet *route53.ResourceRecordSet) error {
|
||||||
hostedZoneID, err := r.getHostedZoneID(fqdn)
|
recordSetInput := &route53.ChangeResourceRecordSetsInput{
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to determine Route 53 hosted zone ID: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
recordSet := newTXTRecordSet(fqdn, value, ttl)
|
|
||||||
reqParams := &route53.ChangeResourceRecordSetsInput{
|
|
||||||
HostedZoneId: aws.String(hostedZoneID),
|
HostedZoneId: aws.String(hostedZoneID),
|
||||||
ChangeBatch: &route53.ChangeBatch{
|
ChangeBatch: &route53.ChangeBatch{
|
||||||
Comment: aws.String("Managed by Lego"),
|
Comment: aws.String("Managed by Lego"),
|
||||||
Changes: []*route53.Change{
|
Changes: []*route53.Change{{
|
||||||
{
|
Action: aws.String(action),
|
||||||
Action: aws.String(action),
|
ResourceRecordSet: recordSet,
|
||||||
ResourceRecordSet: recordSet,
|
}},
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
resp, err := r.client.ChangeResourceRecordSets(reqParams)
|
resp, err := d.client.ChangeResourceRecordSets(recordSetInput)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to change record set: %v", err)
|
return fmt.Errorf("failed to change record set: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
statusID := resp.ChangeInfo.Id
|
changeID := resp.ChangeInfo.Id
|
||||||
|
|
||||||
return acme.WaitFor(r.config.PropagationTimeout, r.config.PollingInterval, func() (bool, error) {
|
return acme.WaitFor(d.config.PropagationTimeout, d.config.PollingInterval, func() (bool, error) {
|
||||||
reqParams := &route53.GetChangeInput{
|
reqParams := &route53.GetChangeInput{Id: changeID}
|
||||||
Id: statusID,
|
|
||||||
}
|
resp, err := d.client.GetChange(reqParams)
|
||||||
resp, err := r.client.GetChange(reqParams)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, fmt.Errorf("failed to query change status: %v", err)
|
return false, fmt.Errorf("failed to query change status: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if aws.StringValue(resp.ChangeInfo.Status) == route53.ChangeStatusInsync {
|
if aws.StringValue(resp.ChangeInfo.Status) == route53.ChangeStatusInsync {
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
return false, nil
|
return false, fmt.Errorf("unable to retrieve change: ID=%s", aws.StringValue(changeID))
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func (r *DNSProvider) getHostedZoneID(fqdn string) (string, error) {
|
func (d *DNSProvider) getExistingRecordSets(hostedZoneID string, fqdn string) ([]*route53.ResourceRecord, error) {
|
||||||
if r.config.HostedZoneID != "" {
|
listInput := &route53.ListResourceRecordSetsInput{
|
||||||
return r.config.HostedZoneID, nil
|
HostedZoneId: aws.String(hostedZoneID),
|
||||||
|
StartRecordName: aws.String(fqdn),
|
||||||
|
StartRecordType: aws.String("TXT"),
|
||||||
|
}
|
||||||
|
|
||||||
|
recordSetsOutput, err := d.client.ListResourceRecordSets(listInput)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if recordSetsOutput == nil {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var records []*route53.ResourceRecord
|
||||||
|
|
||||||
|
for _, recordSet := range recordSetsOutput.ResourceRecordSets {
|
||||||
|
if aws.StringValue(recordSet.Name) == fqdn {
|
||||||
|
records = append(records, recordSet.ResourceRecords...)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return records, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *DNSProvider) getHostedZoneID(fqdn string) (string, error) {
|
||||||
|
if d.config.HostedZoneID != "" {
|
||||||
|
return d.config.HostedZoneID, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
authZone, err := acme.FindZoneByFqdn(fqdn, acme.RecursiveNameservers)
|
authZone, err := acme.FindZoneByFqdn(fqdn, acme.RecursiveNameservers)
|
||||||
|
@ -190,7 +253,7 @@ func (r *DNSProvider) getHostedZoneID(fqdn string) (string, error) {
|
||||||
reqParams := &route53.ListHostedZonesByNameInput{
|
reqParams := &route53.ListHostedZonesByNameInput{
|
||||||
DNSName: aws.String(acme.UnFqdn(authZone)),
|
DNSName: aws.String(acme.UnFqdn(authZone)),
|
||||||
}
|
}
|
||||||
resp, err := r.client.ListHostedZonesByName(reqParams)
|
resp, err := d.client.ListHostedZonesByName(reqParams)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
@ -214,14 +277,3 @@ func (r *DNSProvider) getHostedZoneID(fqdn string) (string, error) {
|
||||||
|
|
||||||
return hostedZoneID, nil
|
return hostedZoneID, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func newTXTRecordSet(fqdn, value string, ttl int) *route53.ResourceRecordSet {
|
|
||||||
return &route53.ResourceRecordSet{
|
|
||||||
Name: aws.String(fqdn),
|
|
||||||
Type: aws.String("TXT"),
|
|
||||||
TTL: aws.Int64(int64(ttl)),
|
|
||||||
ResourceRecords: []*route53.ResourceRecord{
|
|
||||||
{Value: aws.String(value)},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
|
@ -26,7 +26,9 @@ func TestRoute53TTL(t *testing.T) {
|
||||||
|
|
||||||
// we need a separate R53 client here as the one in the DNS provider is unexported.
|
// we need a separate R53 client here as the one in the DNS provider is unexported.
|
||||||
fqdn := "_acme-challenge." + r53Domain + "."
|
fqdn := "_acme-challenge." + r53Domain + "."
|
||||||
svc := route53.New(session.New())
|
sess, err := session.NewSession()
|
||||||
|
require.NoError(t, err)
|
||||||
|
svc := route53.New(sess)
|
||||||
|
|
||||||
defer func() {
|
defer func() {
|
||||||
errC := provider.CleanUp(r53Domain, "foo", "bar")
|
errC := provider.CleanUp(r53Domain, "foo", "bar")
|
||||||
|
|
|
@ -11,6 +11,7 @@ import (
|
||||||
"github.com/aws/aws-sdk-go/aws/session"
|
"github.com/aws/aws-sdk-go/aws/session"
|
||||||
"github.com/aws/aws-sdk-go/service/route53"
|
"github.com/aws/aws-sdk-go/service/route53"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
|
@ -47,7 +48,18 @@ func restoreEnv() {
|
||||||
os.Setenv("AWS_TTL", r53AwsTTL)
|
os.Setenv("AWS_TTL", r53AwsTTL)
|
||||||
os.Setenv("AWS_PROPAGATION_TIMEOUT", r53AwsPropagationTimeout)
|
os.Setenv("AWS_PROPAGATION_TIMEOUT", r53AwsPropagationTimeout)
|
||||||
os.Setenv("AWS_POLLING_INTERVAL", r53AwsPollingInterval)
|
os.Setenv("AWS_POLLING_INTERVAL", r53AwsPollingInterval)
|
||||||
|
}
|
||||||
|
|
||||||
|
func cleanEnv() {
|
||||||
|
os.Unsetenv("AWS_ACCESS_KEY_ID")
|
||||||
|
os.Unsetenv("AWS_SECRET_ACCESS_KEY")
|
||||||
|
os.Unsetenv("AWS_REGION")
|
||||||
|
os.Unsetenv("AWS_HOSTED_ZONE_ID")
|
||||||
|
|
||||||
|
os.Unsetenv("AWS_MAX_RETRIES")
|
||||||
|
os.Unsetenv("AWS_TTL")
|
||||||
|
os.Unsetenv("AWS_PROPAGATION_TIMEOUT")
|
||||||
|
os.Unsetenv("AWS_POLLING_INTERVAL")
|
||||||
}
|
}
|
||||||
|
|
||||||
func makeRoute53Provider(ts *httptest.Server) *DNSProvider {
|
func makeRoute53Provider(ts *httptest.Server) *DNSProvider {
|
||||||
|
@ -58,75 +70,126 @@ func makeRoute53Provider(ts *httptest.Server) *DNSProvider {
|
||||||
MaxRetries: aws.Int(1),
|
MaxRetries: aws.Int(1),
|
||||||
}
|
}
|
||||||
|
|
||||||
client := route53.New(session.New(config))
|
sess, err := session.NewSession(config)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
client := route53.New(sess)
|
||||||
cfg := NewDefaultConfig()
|
cfg := NewDefaultConfig()
|
||||||
return &DNSProvider{client: client, config: cfg}
|
return &DNSProvider{client: client, config: cfg}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestCredentialsFromEnv(t *testing.T) {
|
func Test_loadCredentials_FromEnv(t *testing.T) {
|
||||||
defer restoreEnv()
|
defer restoreEnv()
|
||||||
os.Setenv("AWS_ACCESS_KEY_ID", "123")
|
os.Setenv("AWS_ACCESS_KEY_ID", "123")
|
||||||
os.Setenv("AWS_SECRET_ACCESS_KEY", "123")
|
os.Setenv("AWS_SECRET_ACCESS_KEY", "456")
|
||||||
os.Setenv("AWS_REGION", "us-east-1")
|
os.Setenv("AWS_REGION", "us-east-1")
|
||||||
|
|
||||||
config := &aws.Config{
|
config := &aws.Config{
|
||||||
CredentialsChainVerboseErrors: aws.Bool(true),
|
CredentialsChainVerboseErrors: aws.Bool(true),
|
||||||
}
|
}
|
||||||
|
|
||||||
sess := session.New(config)
|
sess, err := session.NewSession(config)
|
||||||
_, err := sess.Config.Credentials.Get()
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
value, err := sess.Config.Credentials.Get()
|
||||||
assert.NoError(t, err, "Expected credentials to be set from environment")
|
assert.NoError(t, err, "Expected credentials to be set from environment")
|
||||||
|
|
||||||
|
expected := credentials.Value{
|
||||||
|
AccessKeyID: "123",
|
||||||
|
SecretAccessKey: "456",
|
||||||
|
SessionToken: "",
|
||||||
|
ProviderName: "EnvConfigCredentials",
|
||||||
|
}
|
||||||
|
assert.Equal(t, expected, value)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestRegionFromEnv(t *testing.T) {
|
func Test_loadRegion_FromEnv(t *testing.T) {
|
||||||
defer restoreEnv()
|
defer restoreEnv()
|
||||||
os.Setenv("AWS_REGION", "us-east-1")
|
os.Setenv("AWS_REGION", route53.CloudWatchRegionUsEast1)
|
||||||
|
|
||||||
sess := session.New(aws.NewConfig())
|
sess, err := session.NewSession(aws.NewConfig())
|
||||||
assert.Equal(t, "us-east-1", aws.StringValue(sess.Config.Region), "Expected Region to be set from environment")
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
region := aws.StringValue(sess.Config.Region)
|
||||||
|
assert.Equal(t, route53.CloudWatchRegionUsEast1, region, "Region")
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestHostedZoneIDFromEnv(t *testing.T) {
|
func Test_getHostedZoneID_FromEnv(t *testing.T) {
|
||||||
defer restoreEnv()
|
defer restoreEnv()
|
||||||
|
|
||||||
const testZoneID = "testzoneid"
|
expectedZoneID := "zoneID"
|
||||||
os.Setenv("AWS_HOSTED_ZONE_ID", testZoneID)
|
|
||||||
|
os.Setenv("AWS_HOSTED_ZONE_ID", expectedZoneID)
|
||||||
|
|
||||||
provider, err := NewDNSProvider()
|
provider, err := NewDNSProvider()
|
||||||
assert.NoError(t, err, "Expected no error constructing DNSProvider")
|
assert.NoError(t, err)
|
||||||
|
|
||||||
fqdn, err := provider.getHostedZoneID("whatever")
|
hostedZoneID, err := provider.getHostedZoneID("whatever")
|
||||||
assert.NoError(t, err, "Expected FQDN to be resolved to environment variable value")
|
assert.NoError(t, err, "HostedZoneID")
|
||||||
|
|
||||||
assert.Equal(t, testZoneID, fqdn)
|
assert.Equal(t, expectedZoneID, hostedZoneID)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestConfigFromEnv(t *testing.T) {
|
func TestNewDefaultConfig(t *testing.T) {
|
||||||
defer restoreEnv()
|
defer restoreEnv()
|
||||||
|
|
||||||
config := NewDefaultConfig()
|
testCases := []struct {
|
||||||
assert.Equal(t, config.TTL, 10, "Expected TTL to be use the default")
|
desc string
|
||||||
|
envVars map[string]string
|
||||||
|
expected *Config
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
desc: "default configuration",
|
||||||
|
expected: &Config{
|
||||||
|
MaxRetries: 5,
|
||||||
|
TTL: 10,
|
||||||
|
PropagationTimeout: 2 * time.Minute,
|
||||||
|
PollingInterval: 4 * time.Second,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
desc: "",
|
||||||
|
envVars: map[string]string{
|
||||||
|
"AWS_MAX_RETRIES": "10",
|
||||||
|
"AWS_TTL": "99",
|
||||||
|
"AWS_PROPAGATION_TIMEOUT": "60",
|
||||||
|
"AWS_POLLING_INTERVAL": "60",
|
||||||
|
"AWS_HOSTED_ZONE_ID": "abc123",
|
||||||
|
},
|
||||||
|
expected: &Config{
|
||||||
|
MaxRetries: 10,
|
||||||
|
TTL: 99,
|
||||||
|
PropagationTimeout: 60 * time.Second,
|
||||||
|
PollingInterval: 60 * time.Second,
|
||||||
|
HostedZoneID: "abc123",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
os.Setenv("AWS_MAX_RETRIES", "10")
|
for _, test := range testCases {
|
||||||
os.Setenv("AWS_TTL", "99")
|
t.Run(test.desc, func(t *testing.T) {
|
||||||
os.Setenv("AWS_PROPAGATION_TIMEOUT", "60")
|
cleanEnv()
|
||||||
os.Setenv("AWS_POLLING_INTERVAL", "60")
|
for key, value := range test.envVars {
|
||||||
const zoneID = "abc123"
|
os.Setenv(key, value)
|
||||||
os.Setenv("AWS_HOSTED_ZONE_ID", zoneID)
|
}
|
||||||
|
|
||||||
config = NewDefaultConfig()
|
config := NewDefaultConfig()
|
||||||
assert.Equal(t, config.MaxRetries, 10, "Expected PropagationTimeout to be configured from the environment")
|
|
||||||
assert.Equal(t, config.TTL, 99, "Expected TTL to be configured from the environment")
|
assert.Equal(t, test.expected, config)
|
||||||
assert.Equal(t, config.PropagationTimeout, time.Second*60, "Expected PropagationTimeout to be configured from the environment")
|
})
|
||||||
assert.Equal(t, config.PollingInterval, time.Second*60, "Expected PollingInterval to be configured from the environment")
|
}
|
||||||
assert.Equal(t, config.HostedZoneID, zoneID, "Expected HostedZoneID to be configured from the environment")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestRoute53Present(t *testing.T) {
|
func TestRoute53Present(t *testing.T) {
|
||||||
mockResponses := MockResponseMap{
|
mockResponses := MockResponseMap{
|
||||||
"/2013-04-01/hostedzonesbyname": MockResponse{StatusCode: 200, Body: ListHostedZonesByNameResponse},
|
"/2013-04-01/hostedzonesbyname": {StatusCode: 200, Body: ListHostedZonesByNameResponse},
|
||||||
"/2013-04-01/hostedzone/ABCDEFG/rrset/": MockResponse{StatusCode: 200, Body: ChangeResourceRecordSetsResponse},
|
"/2013-04-01/hostedzone/ABCDEFG/rrset/": {StatusCode: 200, Body: ChangeResourceRecordSetsResponse},
|
||||||
"/2013-04-01/change/123456": MockResponse{StatusCode: 200, Body: GetChangeResponse},
|
"/2013-04-01/change/123456": {StatusCode: 200, Body: GetChangeResponse},
|
||||||
|
"/2013-04-01/hostedzone/ABCDEFG/rrset?name=_acme-challenge.example.com.&type=TXT": {
|
||||||
|
StatusCode: 200,
|
||||||
|
Body: "",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
ts := newMockServer(t, mockResponses)
|
ts := newMockServer(t, mockResponses)
|
||||||
|
|
Loading…
Reference in a new issue