forked from TrueCloudLab/lego
275 lines
6.2 KiB
Go
275 lines
6.2 KiB
Go
|
package liquidweb
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
"io/ioutil"
|
||
|
"net/http"
|
||
|
"net/http/httptest"
|
||
|
"testing"
|
||
|
"time"
|
||
|
|
||
|
"github.com/go-acme/lego/v3/platform/tester"
|
||
|
"github.com/stretchr/testify/assert"
|
||
|
"github.com/stretchr/testify/require"
|
||
|
)
|
||
|
|
||
|
var envTest = tester.NewEnvTest(
|
||
|
"LIQUID_WEB_URL",
|
||
|
"LIQUID_WEB_USERNAME",
|
||
|
"LIQUID_WEB_PASSWORD",
|
||
|
"LIQUID_WEB_ZONE").
|
||
|
WithDomain("LIQUID_WEB_DOMAIN")
|
||
|
|
||
|
func setupTest() (*DNSProvider, *http.ServeMux, func()) {
|
||
|
handler := http.NewServeMux()
|
||
|
server := httptest.NewServer(handler)
|
||
|
|
||
|
config := NewDefaultConfig()
|
||
|
config.Username = "blars"
|
||
|
config.Password = "tacoman"
|
||
|
config.BaseURL = server.URL
|
||
|
config.Zone = "tacoman.com"
|
||
|
|
||
|
provider, err := NewDNSProviderConfig(config)
|
||
|
if err != nil {
|
||
|
panic(err)
|
||
|
}
|
||
|
|
||
|
return provider, handler, server.Close
|
||
|
}
|
||
|
|
||
|
func TestNewDNSProvider(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
desc string
|
||
|
envVars map[string]string
|
||
|
expected string
|
||
|
}{
|
||
|
{
|
||
|
desc: "success",
|
||
|
envVars: map[string]string{
|
||
|
"LIQUID_WEB_URL": "https://storm.com",
|
||
|
"LIQUID_WEB_USERNAME": "blars",
|
||
|
"LIQUID_WEB_PASSWORD": "tacoman",
|
||
|
"LIQUID_WEB_ZONE": "blars.com",
|
||
|
},
|
||
|
},
|
||
|
{
|
||
|
desc: "missing credentials",
|
||
|
envVars: map[string]string{},
|
||
|
expected: "liquidweb: some credentials information are missing: LIQUID_WEB_USERNAME,LIQUID_WEB_PASSWORD,LIQUID_WEB_ZONE",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing username",
|
||
|
envVars: map[string]string{
|
||
|
"LIQUID_WEB_PASSWORD": "tacoman",
|
||
|
"LIQUID_WEB_ZONE": "blars.com",
|
||
|
},
|
||
|
expected: "liquidweb: some credentials information are missing: LIQUID_WEB_USERNAME",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing password",
|
||
|
envVars: map[string]string{
|
||
|
"LIQUID_WEB_USERNAME": "blars",
|
||
|
"LIQUID_WEB_ZONE": "blars.com",
|
||
|
}, expected: "liquidweb: some credentials information are missing: LIQUID_WEB_PASSWORD",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing zone",
|
||
|
envVars: map[string]string{
|
||
|
"LIQUID_WEB_USERNAME": "blars",
|
||
|
"LIQUID_WEB_PASSWORD": "tacoman",
|
||
|
}, expected: "liquidweb: some credentials information are missing: LIQUID_WEB_ZONE",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
for _, test := range testCases {
|
||
|
t.Run(test.desc, func(t *testing.T) {
|
||
|
defer envTest.RestoreEnv()
|
||
|
envTest.ClearEnv()
|
||
|
|
||
|
envTest.Apply(test.envVars)
|
||
|
|
||
|
p, err := NewDNSProvider()
|
||
|
|
||
|
if len(test.expected) == 0 {
|
||
|
require.NoError(t, err)
|
||
|
require.NotNil(t, p)
|
||
|
require.NotNil(t, p.config)
|
||
|
require.NotNil(t, p.client)
|
||
|
require.NotNil(t, p.recordIDs)
|
||
|
} else {
|
||
|
require.EqualError(t, err, test.expected)
|
||
|
}
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestNewDNSProviderConfig(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
desc string
|
||
|
username string
|
||
|
password string
|
||
|
zone string
|
||
|
expected string
|
||
|
}{
|
||
|
{
|
||
|
desc: "success",
|
||
|
username: "acme",
|
||
|
password: "secret",
|
||
|
zone: "example.com",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing credentials",
|
||
|
username: "",
|
||
|
password: "",
|
||
|
zone: "",
|
||
|
expected: "liquidweb: zone is missing",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing username",
|
||
|
username: "",
|
||
|
password: "secret",
|
||
|
zone: "example.com",
|
||
|
expected: "liquidweb: username is missing",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing password",
|
||
|
username: "acme",
|
||
|
password: "",
|
||
|
zone: "example.com",
|
||
|
expected: "liquidweb: password is missing",
|
||
|
},
|
||
|
{
|
||
|
desc: "missing zone",
|
||
|
username: "acme",
|
||
|
password: "secret",
|
||
|
zone: "",
|
||
|
expected: "liquidweb: zone is missing",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
for _, test := range testCases {
|
||
|
t.Run(test.desc, func(t *testing.T) {
|
||
|
config := NewDefaultConfig()
|
||
|
config.Username = test.username
|
||
|
config.Password = test.password
|
||
|
config.Zone = test.zone
|
||
|
|
||
|
p, err := NewDNSProviderConfig(config)
|
||
|
|
||
|
if len(test.expected) == 0 {
|
||
|
require.NoError(t, err)
|
||
|
require.NotNil(t, p)
|
||
|
require.NotNil(t, p.config)
|
||
|
require.NotNil(t, p.client)
|
||
|
require.NotNil(t, p.recordIDs)
|
||
|
} else {
|
||
|
require.EqualError(t, err, test.expected)
|
||
|
}
|
||
|
})
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestDNSProvider_Present(t *testing.T) {
|
||
|
provider, mux, tearDown := setupTest()
|
||
|
defer tearDown()
|
||
|
|
||
|
mux.HandleFunc("/v1/Network/DNS/Record/create", func(w http.ResponseWriter, r *http.Request) {
|
||
|
assert.Equal(t, http.MethodPost, r.Method)
|
||
|
|
||
|
username, password, ok := r.BasicAuth()
|
||
|
assert.Equal(t, "blars", username)
|
||
|
assert.Equal(t, "tacoman", password)
|
||
|
assert.True(t, ok)
|
||
|
|
||
|
reqBody, err := ioutil.ReadAll(r.Body)
|
||
|
if err != nil {
|
||
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
expectedReqBody := `
|
||
|
{
|
||
|
"params": {
|
||
|
"name": "_acme-challenge.tacoman.com",
|
||
|
"rdata": "\"47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU\"",
|
||
|
"ttl": 300,
|
||
|
"type": "TXT",
|
||
|
"zone": "tacoman.com"
|
||
|
}
|
||
|
}`
|
||
|
assert.JSONEq(t, expectedReqBody, string(reqBody))
|
||
|
|
||
|
w.WriteHeader(http.StatusOK)
|
||
|
_, err = fmt.Fprintf(w, `{
|
||
|
"type": "TXT",
|
||
|
"name": "_acme-challenge.tacoman.com",
|
||
|
"rdata": "\"47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU\"",
|
||
|
"ttl": 300,
|
||
|
"id": 1234567,
|
||
|
"prio": null
|
||
|
}`)
|
||
|
if err != nil {
|
||
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||
|
}
|
||
|
})
|
||
|
|
||
|
err := provider.Present("tacoman.com", "", "")
|
||
|
require.NoError(t, err)
|
||
|
}
|
||
|
|
||
|
func TestDNSProvider_CleanUp(t *testing.T) {
|
||
|
provider, mux, tearDown := setupTest()
|
||
|
defer tearDown()
|
||
|
|
||
|
mux.HandleFunc("/v1/Network/DNS/Record/delete", func(w http.ResponseWriter, r *http.Request) {
|
||
|
assert.Equal(t, http.MethodPost, r.Method)
|
||
|
|
||
|
username, password, ok := r.BasicAuth()
|
||
|
assert.Equal(t, "blars", username)
|
||
|
assert.Equal(t, "tacoman", password)
|
||
|
assert.True(t, ok)
|
||
|
|
||
|
_, err := fmt.Fprintf(w, `{"deleted": "123"}`)
|
||
|
if err != nil {
|
||
|
http.Error(w, err.Error(), http.StatusInternalServerError)
|
||
|
return
|
||
|
}
|
||
|
})
|
||
|
|
||
|
provider.recordIDs["123"] = 1234567
|
||
|
|
||
|
err := provider.CleanUp("tacoman.com.", "123", "")
|
||
|
require.NoError(t, err, "fail to remove TXT record")
|
||
|
}
|
||
|
|
||
|
func TestLivePresent(t *testing.T) {
|
||
|
if !envTest.IsLiveTest() {
|
||
|
t.Skip("skipping live test")
|
||
|
}
|
||
|
|
||
|
envTest.RestoreEnv()
|
||
|
|
||
|
provider, err := NewDNSProvider()
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
err = provider.Present(envTest.GetDomain(), "", "123d==")
|
||
|
require.NoError(t, err)
|
||
|
}
|
||
|
|
||
|
func TestLiveCleanUp(t *testing.T) {
|
||
|
if !envTest.IsLiveTest() {
|
||
|
t.Skip("skipping live test")
|
||
|
}
|
||
|
|
||
|
envTest.RestoreEnv()
|
||
|
|
||
|
provider, err := NewDNSProvider()
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
time.Sleep(2 * time.Second)
|
||
|
|
||
|
err = provider.CleanUp(envTest.GetDomain(), "", "123d==")
|
||
|
require.NoError(t, err)
|
||
|
}
|