lego/providers/dns/vinyldns/vinyldns_test.go

244 lines
6.1 KiB
Go
Raw Normal View History

2021-04-10 14:18:48 +00:00
package vinyldns
import (
"net/http"
"testing"
"time"
"github.com/go-acme/lego/v4/platform/tester"
"github.com/stretchr/testify/require"
)
const envDomain = envNamespace + "DOMAIN"
const (
targetRootDomain = "example.com"
targetDomain = "host." + targetRootDomain
zoneID = "00000000-0000-0000-0000-000000000000"
newRecordSetID = "11000000-0000-0000-0000-000000000000"
newCreateChangeID = "20000000-0000-0000-0000-000000000000"
recordID = "30000000-0000-0000-0000-000000000000"
)
var envTest = tester.NewEnvTest(
EnvAccessKey,
EnvSecretKey,
EnvHost).
WithDomain(envDomain)
func TestNewDNSProvider(t *testing.T) {
testCases := []struct {
desc string
envVars map[string]string
expected string
}{
{
desc: "success",
envVars: map[string]string{
EnvAccessKey: "123",
EnvSecretKey: "456",
EnvHost: "https://example.org",
},
},
{
desc: "missing all credentials",
envVars: map[string]string{
EnvHost: "https://example.org",
},
expected: "vinyldns: some credentials information are missing: VINYLDNS_ACCESS_KEY,VINYLDNS_SECRET_KEY",
},
{
desc: "missing access key",
envVars: map[string]string{
EnvSecretKey: "456",
EnvHost: "https://example.org",
},
expected: "vinyldns: some credentials information are missing: VINYLDNS_ACCESS_KEY",
},
{
desc: "missing secret key",
envVars: map[string]string{
EnvAccessKey: "123",
EnvHost: "https://example.org",
},
expected: "vinyldns: some credentials information are missing: VINYLDNS_SECRET_KEY",
},
{
desc: "missing host",
envVars: map[string]string{
EnvAccessKey: "123",
EnvSecretKey: "456",
},
expected: "vinyldns: some credentials information are missing: VINYLDNS_HOST",
},
}
for _, test := range testCases {
t.Run(test.desc, func(t *testing.T) {
defer envTest.RestoreEnv()
envTest.ClearEnv()
envTest.Apply(test.envVars)
p, err := NewDNSProvider()
if test.expected == "" {
require.NoError(t, err)
require.NotNil(t, p)
require.NotNil(t, p.config)
require.NotNil(t, p.client)
} else {
require.EqualError(t, err, test.expected)
}
})
}
}
func TestNewDNSProviderConfig(t *testing.T) {
testCases := []struct {
desc string
accessKey string
secretKey string
host string
expected string
}{
{
desc: "success",
accessKey: "123",
secretKey: "456",
host: "https://example.org",
},
{
desc: "missing all credentials",
host: "https://example.org",
expected: "vinyldns: credentials are missing",
},
{
desc: "missing access key",
secretKey: "456",
host: "https://example.org",
expected: "vinyldns: credentials are missing",
},
{
desc: "missing secret key",
accessKey: "123",
host: "https://example.org",
expected: "vinyldns: credentials are missing",
},
{
desc: "missing host",
accessKey: "123",
secretKey: "456",
expected: "vinyldns: host is missing",
},
}
for _, test := range testCases {
t.Run(test.desc, func(t *testing.T) {
config := NewDefaultConfig()
config.AccessKey = test.accessKey
config.SecretKey = test.secretKey
config.Host = test.host
p, err := NewDNSProviderConfig(config)
if test.expected == "" {
require.NoError(t, err)
require.NotNil(t, p)
require.NotNil(t, p.config)
require.NotNil(t, p.client)
} else {
require.EqualError(t, err, test.expected)
}
})
}
}
func TestDNSProvider_Present(t *testing.T) {
testCases := []struct {
desc string
keyAuth string
handler http.Handler
}{
{
desc: "new record",
keyAuth: "123456d==",
handler: newMockRouter().
Get("/zones/name/"+targetRootDomain+".", http.StatusOK, "zoneByName").
Get("/zones/"+zoneID+"/recordsets", http.StatusOK, "recordSetsListAll-empty").
Post("/zones/"+zoneID+"/recordsets", http.StatusAccepted, "recordSetUpdate-create").
Get("/zones/"+zoneID+"/recordsets/"+newRecordSetID+"/changes/"+newCreateChangeID, http.StatusOK, "recordSetChange-create"),
},
{
desc: "existing record",
keyAuth: "123456d==",
handler: newMockRouter().
Get("/zones/name/"+targetRootDomain+".", http.StatusOK, "zoneByName").
Get("/zones/"+zoneID+"/recordsets", http.StatusOK, "recordSetsListAll"),
},
{
desc: "duplicate key",
keyAuth: "abc123!!",
handler: newMockRouter().
Get("/zones/name/"+targetRootDomain+".", http.StatusOK, "zoneByName").
Get("/zones/"+zoneID+"/recordsets", http.StatusOK, "recordSetsListAll").
Put("/zones/"+zoneID+"/recordsets/"+recordID, http.StatusAccepted, "recordSetUpdate-create").
Get("/zones/"+zoneID+"/recordsets/"+newRecordSetID+"/changes/"+newCreateChangeID, http.StatusOK, "recordSetChange-create"),
},
}
for _, test := range testCases {
t.Run(test.desc, func(t *testing.T) {
t.Parallel()
2023-05-05 07:49:38 +00:00
mux, p := setupTest(t)
2021-04-10 14:18:48 +00:00
mux.Handle("/", test.handler)
err := p.Present(targetDomain, "token"+test.keyAuth, test.keyAuth)
require.NoError(t, err)
})
}
}
func TestDNSProvider_CleanUp(t *testing.T) {
2023-05-05 07:49:38 +00:00
mux, p := setupTest(t)
2021-04-10 14:18:48 +00:00
mux.Handle("/", newMockRouter().
Get("/zones/name/"+targetRootDomain+".", http.StatusOK, "zoneByName").
Get("/zones/"+zoneID+"/recordsets", http.StatusOK, "recordSetsListAll").
Delete("/zones/"+zoneID+"/recordsets/"+recordID, http.StatusAccepted, "recordSetDelete").
Get("/zones/"+zoneID+"/recordsets/"+newRecordSetID+"/changes/"+newCreateChangeID, http.StatusOK, "recordSetChange-delete"),
)
err := p.CleanUp(targetDomain, "123456d==", "123456d==")
require.NoError(t, err)
}
func TestLivePresent(t *testing.T) {
if !envTest.IsLiveTest() {
t.Skip("skipping live test")
}
envTest.RestoreEnv()
provider, err := NewDNSProvider()
require.NoError(t, err)
err = provider.Present(envTest.GetDomain(), "", "123d==")
require.NoError(t, err)
}
func TestLiveCleanUp(t *testing.T) {
if !envTest.IsLiveTest() {
t.Skip("skipping live test")
}
envTest.RestoreEnv()
provider, err := NewDNSProvider()
require.NoError(t, err)
time.Sleep(2 * time.Second)
err = provider.CleanUp(envTest.GetDomain(), "", "123d==")
require.NoError(t, err)
}