2019-02-26 14:41:02 +00:00
package oraclecloud
import (
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"encoding/base64"
"encoding/pem"
2019-03-05 18:57:04 +00:00
"io/ioutil"
"os"
2019-02-26 14:41:02 +00:00
"testing"
"time"
2019-07-30 19:19:32 +00:00
"github.com/go-acme/lego/v3/platform/tester"
2019-02-26 14:41:02 +00:00
"github.com/oracle/oci-go-sdk/common"
"github.com/stretchr/testify/require"
)
2020-03-11 22:51:10 +00:00
const envDomain = envNamespace + "DOMAIN"
2019-02-26 14:41:02 +00:00
var envTest = tester . NewEnvTest (
2020-03-11 22:51:10 +00:00
envPrivKey ,
EnvPrivKeyFile ,
EnvPrivKeyPass ,
EnvTenancyOCID ,
EnvUserOCID ,
EnvPubKeyFingerprint ,
EnvRegion ,
EnvCompartmentOCID ) .
WithDomain ( envDomain )
2019-02-26 14:41:02 +00:00
func TestNewDNSProvider ( t * testing . T ) {
testCases := [ ] struct {
desc string
envVars map [ string ] string
expected string
} {
{
desc : "success" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : mustGeneratePrivateKey ( "secret1" ) ,
EnvPrivKeyPass : "secret1" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "us-phoenix-1" ,
EnvCompartmentOCID : "123" ,
2019-03-05 18:57:04 +00:00
} ,
} ,
{
desc : "success file" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
EnvPrivKeyFile : mustGeneratePrivateKeyFile ( "secret1" ) ,
EnvPrivKeyPass : "secret1" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "us-phoenix-1" ,
EnvCompartmentOCID : "123" ,
2019-02-26 14:41:02 +00:00
} ,
} ,
{
desc : "missing credentials" ,
envVars : map [ string ] string { } ,
2019-03-05 18:57:04 +00:00
expected : "oraclecloud: some credentials information are missing: OCI_PRIVKEY,OCI_TENANCY_OCID,OCI_USER_OCID,OCI_PUBKEY_FINGERPRINT,OCI_REGION,OCI_COMPARTMENT_OCID" ,
2019-02-26 14:41:02 +00:00
} ,
{
desc : "missing CompartmentID" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : mustGeneratePrivateKey ( "secret" ) ,
EnvPrivKeyPass : "secret" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "us-phoenix-1" ,
EnvCompartmentOCID : "" ,
2019-02-26 14:41:02 +00:00
} ,
expected : "oraclecloud: some credentials information are missing: OCI_COMPARTMENT_OCID" ,
} ,
{
2019-03-05 18:57:04 +00:00
desc : "missing OCI_PRIVKEY" ,
2019-02-26 14:41:02 +00:00
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : "" ,
EnvPrivKeyPass : "secret" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "us-phoenix-1" ,
EnvCompartmentOCID : "123" ,
2019-02-26 14:41:02 +00:00
} ,
2019-03-05 18:57:04 +00:00
expected : "oraclecloud: some credentials information are missing: OCI_PRIVKEY" ,
2019-02-26 14:41:02 +00:00
} ,
{
desc : "missing OCI_PRIVKEY_PASS" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : mustGeneratePrivateKey ( "secret" ) ,
EnvPrivKeyPass : "" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "us-phoenix-1" ,
EnvCompartmentOCID : "123" ,
2019-02-26 14:41:02 +00:00
} ,
expected : "oraclecloud: can not create client, bad configuration: x509: decryption password incorrect" ,
} ,
{
desc : "missing OCI_TENANCY_OCID" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : mustGeneratePrivateKey ( "secret" ) ,
EnvPrivKeyPass : "secret" ,
EnvTenancyOCID : "" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "us-phoenix-1" ,
EnvCompartmentOCID : "123" ,
2019-02-26 14:41:02 +00:00
} ,
expected : "oraclecloud: some credentials information are missing: OCI_TENANCY_OCID" ,
} ,
{
desc : "missing OCI_USER_OCID" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : mustGeneratePrivateKey ( "secret" ) ,
EnvPrivKeyPass : "secret" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "us-phoenix-1" ,
EnvCompartmentOCID : "123" ,
2019-02-26 14:41:02 +00:00
} ,
expected : "oraclecloud: some credentials information are missing: OCI_USER_OCID" ,
} ,
{
desc : "missing OCI_PUBKEY_FINGERPRINT" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : mustGeneratePrivateKey ( "secret" ) ,
EnvPrivKeyPass : "secret" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "" ,
EnvRegion : "us-phoenix-1" ,
EnvCompartmentOCID : "123" ,
2019-02-26 14:41:02 +00:00
} ,
expected : "oraclecloud: some credentials information are missing: OCI_PUBKEY_FINGERPRINT" ,
} ,
{
desc : "missing OCI_REGION" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : mustGeneratePrivateKey ( "secret" ) ,
EnvPrivKeyPass : "secret" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "" ,
EnvCompartmentOCID : "123" ,
2019-02-26 14:41:02 +00:00
} ,
expected : "oraclecloud: some credentials information are missing: OCI_REGION" ,
} ,
{
desc : "missing OCI_REGION" ,
envVars : map [ string ] string {
2020-03-11 22:51:10 +00:00
envPrivKey : mustGeneratePrivateKey ( "secret" ) ,
EnvPrivKeyPass : "secret" ,
EnvTenancyOCID : "ocid1.tenancy.oc1..secret" ,
EnvUserOCID : "ocid1.user.oc1..secret" ,
EnvPubKeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
EnvRegion : "" ,
EnvCompartmentOCID : "123" ,
2019-02-26 14:41:02 +00:00
} ,
expected : "oraclecloud: some credentials information are missing: OCI_REGION" ,
} ,
}
for _ , test := range testCases {
t . Run ( test . desc , func ( t * testing . T ) {
2019-03-05 18:57:04 +00:00
defer func ( ) {
2020-03-11 22:51:10 +00:00
privKeyFile := os . Getenv ( EnvPrivKeyFile )
2019-03-05 18:57:04 +00:00
if privKeyFile != "" {
_ = os . Remove ( privKeyFile )
}
envTest . RestoreEnv ( )
} ( )
2019-02-26 14:41:02 +00:00
envTest . ClearEnv ( )
envTest . Apply ( test . envVars )
p , err := NewDNSProvider ( )
if len ( test . expected ) == 0 {
require . NoError ( t , err )
require . NotNil ( t , p )
require . NotNil ( t , p . config )
require . NotNil ( t , p . client )
} else {
require . EqualError ( t , err , test . expected )
}
} )
}
}
func TestNewDNSProviderConfig ( t * testing . T ) {
testCases := [ ] struct {
desc string
compartmentID string
configurationProvider common . ConfigurationProvider
expected string
} {
{
desc : "invalid configuration" ,
configurationProvider : & configProvider { } ,
compartmentID : "123" ,
2019-03-05 18:57:04 +00:00
expected : "oraclecloud: can not create client, bad configuration: x509: decryption password incorrect" ,
2019-02-26 14:41:02 +00:00
} ,
{
desc : "OCIConfigProvider is missing" ,
compartmentID : "123" ,
expected : "oraclecloud: OCIConfigProvider is missing" ,
} ,
{
desc : "missing CompartmentID" ,
expected : "oraclecloud: CompartmentID is missing" ,
} ,
}
for _ , test := range testCases {
t . Run ( test . desc , func ( t * testing . T ) {
config := NewDefaultConfig ( )
config . CompartmentID = test . compartmentID
config . OCIConfigProvider = test . configurationProvider
p , err := NewDNSProviderConfig ( config )
if len ( test . expected ) == 0 {
require . NoError ( t , err )
require . NotNil ( t , p )
require . NotNil ( t , p . config )
require . NotNil ( t , p . client )
} else {
require . EqualError ( t , err , test . expected )
}
} )
}
}
func TestLivePresent ( t * testing . T ) {
if ! envTest . IsLiveTest ( ) {
t . Skip ( "skipping live test" )
}
envTest . RestoreEnv ( )
provider , err := NewDNSProvider ( )
require . NoError ( t , err )
err = provider . Present ( envTest . GetDomain ( ) , "" , "123d==" )
require . NoError ( t , err )
}
func TestLiveCleanUp ( t * testing . T ) {
if ! envTest . IsLiveTest ( ) {
t . Skip ( "skipping live test" )
}
envTest . RestoreEnv ( )
provider , err := NewDNSProvider ( )
require . NoError ( t , err )
time . Sleep ( 1 * time . Second )
err = provider . CleanUp ( envTest . GetDomain ( ) , "" , "123d==" )
require . NoError ( t , err )
}
func mustGeneratePrivateKey ( pwd string ) string {
2019-03-05 18:57:04 +00:00
block , err := generatePrivateKey ( pwd )
2019-02-26 14:41:02 +00:00
if err != nil {
panic ( err )
}
2019-03-05 18:57:04 +00:00
return base64 . StdEncoding . EncodeToString ( pem . EncodeToMemory ( block ) )
}
func mustGeneratePrivateKeyFile ( pwd string ) string {
block , err := generatePrivateKey ( pwd )
if err != nil {
panic ( err )
}
file , err := ioutil . TempFile ( "" , "lego_oci_*.pem" )
if err != nil {
panic ( err )
}
err = pem . Encode ( file , block )
if err != nil {
panic ( err )
}
return file . Name ( )
}
func generatePrivateKey ( pwd string ) ( * pem . Block , error ) {
key , err := rsa . GenerateKey ( rand . Reader , 512 )
if err != nil {
return nil , err
}
2019-02-26 14:41:02 +00:00
block := & pem . Block {
Type : "RSA PRIVATE KEY" ,
Bytes : x509 . MarshalPKCS1PrivateKey ( key ) ,
}
if pwd != "" {
block , err = x509 . EncryptPEMBlock ( rand . Reader , block . Type , block . Bytes , [ ] byte ( pwd ) , x509 . PEMCipherAES256 )
if err != nil {
2019-03-05 18:57:04 +00:00
return nil , err
2019-02-26 14:41:02 +00:00
}
}
2019-03-05 18:57:04 +00:00
return block , nil
2019-02-26 14:41:02 +00:00
}