forked from TrueCloudLab/lego
138 lines
3.8 KiB
Go
138 lines
3.8 KiB
Go
|
package dnschallenge
|
||
|
|
||
|
import (
|
||
|
"crypto"
|
||
|
"crypto/rand"
|
||
|
"crypto/rsa"
|
||
|
"fmt"
|
||
|
"os"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/stretchr/testify/assert"
|
||
|
"github.com/stretchr/testify/require"
|
||
|
"github.com/xenolf/lego/certificate"
|
||
|
"github.com/xenolf/lego/challenge"
|
||
|
"github.com/xenolf/lego/challenge/dns01"
|
||
|
"github.com/xenolf/lego/e2e/loader"
|
||
|
"github.com/xenolf/lego/lego"
|
||
|
"github.com/xenolf/lego/providers/dns"
|
||
|
"github.com/xenolf/lego/registration"
|
||
|
)
|
||
|
|
||
|
var load = loader.EnvLoader{
|
||
|
PebbleOptions: &loader.CmdOption{
|
||
|
HealthCheckURL: "https://localhost:15000/dir",
|
||
|
Args: []string{"-strict", "-config", "fixtures/pebble-config-dns.json", "-dnsserver", "localhost:8053"},
|
||
|
Env: []string{"PEBBLE_VA_NOSLEEP=1", "PEBBLE_WFE_NONCEREJECT=20"},
|
||
|
Dir: "../",
|
||
|
},
|
||
|
LegoOptions: []string{
|
||
|
"LEGO_CA_CERTIFICATES=../fixtures/certs/pebble.minica.pem",
|
||
|
"EXEC_PATH=../fixtures/update-dns.sh",
|
||
|
},
|
||
|
ChallSrv: &loader.CmdOption{
|
||
|
Args: []string{"-http01", ":5012", "-tlsalpn01", ":5011"},
|
||
|
},
|
||
|
}
|
||
|
|
||
|
func TestMain(m *testing.M) {
|
||
|
os.Exit(load.MainTest(m))
|
||
|
}
|
||
|
|
||
|
func TestDNSHelp(t *testing.T) {
|
||
|
output, err := load.RunLego("dnshelp")
|
||
|
if err != nil {
|
||
|
fmt.Fprintf(os.Stderr, "%s\n", output)
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
|
||
|
fmt.Fprintf(os.Stdout, "%s\n", output)
|
||
|
}
|
||
|
|
||
|
func TestChallengeDNS_Run(t *testing.T) {
|
||
|
loader.CleanLegoFiles()
|
||
|
|
||
|
output, err := load.RunLego(
|
||
|
"-m", "hubert@hubert.com",
|
||
|
"--accept-tos",
|
||
|
"-x", "http-01",
|
||
|
"-x", "tls-alpn-01",
|
||
|
"--dns-disable-cp",
|
||
|
"--dns-resolvers", ":8053",
|
||
|
"--dns", "exec",
|
||
|
"-s", "https://localhost:15000/dir",
|
||
|
"-d", "*.légo.acme",
|
||
|
"-d", "légo.acme",
|
||
|
"--http", ":5004",
|
||
|
"--tls", ":5003",
|
||
|
"run")
|
||
|
|
||
|
if len(output) > 0 {
|
||
|
fmt.Fprintf(os.Stdout, "%s\n", output)
|
||
|
}
|
||
|
if err != nil {
|
||
|
t.Fatal(err)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func TestChallengeDNS_Client_Obtain(t *testing.T) {
|
||
|
err := os.Setenv("LEGO_CA_CERTIFICATES", "../fixtures/certs/pebble.minica.pem")
|
||
|
require.NoError(t, err)
|
||
|
defer func() { _ = os.Unsetenv("LEGO_CA_CERTIFICATES") }()
|
||
|
|
||
|
err = os.Setenv("EXEC_PATH", "../fixtures/update-dns.sh")
|
||
|
require.NoError(t, err)
|
||
|
defer func() { _ = os.Unsetenv("EXEC_PATH") }()
|
||
|
|
||
|
privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
|
||
|
require.NoError(t, err, "Could not generate test key")
|
||
|
|
||
|
user := &fakeUser{privateKey: privateKey}
|
||
|
config := lego.NewConfig(user)
|
||
|
config.CADirURL = "https://localhost:15000/dir"
|
||
|
|
||
|
client, err := lego.NewClient(config)
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
provider, err := dns.NewDNSChallengeProviderByName("exec")
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
err = client.Challenge.SetDNS01Provider(provider,
|
||
|
dns01.AddRecursiveNameservers([]string{":8053"}),
|
||
|
dns01.DisableCompletePropagationRequirement())
|
||
|
client.Challenge.Exclude([]challenge.Type{challenge.HTTP01, challenge.TLSALPN01})
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
|
||
|
require.NoError(t, err)
|
||
|
user.registration = reg
|
||
|
|
||
|
domains := []string{"*.légo.acme", "légo.acme"}
|
||
|
|
||
|
request := certificate.ObtainRequest{
|
||
|
Domains: domains,
|
||
|
Bundle: true,
|
||
|
PrivateKey: privateKey,
|
||
|
}
|
||
|
resource, err := client.Certificate.Obtain(request)
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
require.NotNil(t, resource)
|
||
|
assert.Equal(t, "*.xn--lgo-bma.acme", resource.Domain)
|
||
|
assert.Regexp(t, `https://localhost:15000/certZ/[\w\d]{14,}`, resource.CertURL)
|
||
|
assert.Regexp(t, `https://localhost:15000/certZ/[\w\d]{14,}`, resource.CertStableURL)
|
||
|
assert.NotEmpty(t, resource.Certificate)
|
||
|
assert.NotEmpty(t, resource.IssuerCertificate)
|
||
|
assert.Empty(t, resource.CSR)
|
||
|
}
|
||
|
|
||
|
type fakeUser struct {
|
||
|
email string
|
||
|
privateKey crypto.PrivateKey
|
||
|
registration *registration.Resource
|
||
|
}
|
||
|
|
||
|
func (f *fakeUser) GetEmail() string { return f.email }
|
||
|
func (f *fakeUser) GetRegistration() *registration.Resource { return f.registration }
|
||
|
func (f *fakeUser) GetPrivateKey() crypto.PrivateKey { return f.privateKey }
|