2019-02-26 16:41:02 +02:00
package oraclecloud
import (
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"encoding/base64"
"encoding/pem"
2019-03-05 20:57:04 +02:00
"io/ioutil"
"os"
2019-02-26 16:41:02 +02:00
"testing"
"time"
"github.com/oracle/oci-go-sdk/common"
"github.com/stretchr/testify/require"
"github.com/xenolf/lego/platform/tester"
)
var envTest = tester . NewEnvTest (
2019-03-05 20:57:04 +02:00
ociPrivkey ,
ociPrivkey + "_FILE" ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass ,
ociTenancyOCID ,
ociUserOCID ,
ociPubkeyFingerprint ,
ociRegion ,
"OCI_COMPARTMENT_OCID" ) .
WithDomain ( "ORACLECLOUD_DOMAIN" )
func TestNewDNSProvider ( t * testing . T ) {
testCases := [ ] struct {
desc string
envVars map [ string ] string
expected string
} {
{
desc : "success" ,
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : mustGeneratePrivateKey ( "secret1" ) ,
ociPrivkeyPass : "secret1" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "us-phoenix-1" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
} ,
{
desc : "success file" ,
envVars : map [ string ] string {
ociPrivkey + "_FILE" : mustGeneratePrivateKeyFile ( "secret1" ) ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "secret1" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "us-phoenix-1" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
} ,
{
desc : "missing credentials" ,
envVars : map [ string ] string { } ,
2019-03-05 20:57:04 +02:00
expected : "oraclecloud: some credentials information are missing: OCI_PRIVKEY,OCI_TENANCY_OCID,OCI_USER_OCID,OCI_PUBKEY_FINGERPRINT,OCI_REGION,OCI_COMPARTMENT_OCID" ,
2019-02-26 16:41:02 +02:00
} ,
{
desc : "missing CompartmentID" ,
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : mustGeneratePrivateKey ( "secret" ) ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "secret" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "us-phoenix-1" ,
"OCI_COMPARTMENT_OCID" : "" ,
} ,
expected : "oraclecloud: some credentials information are missing: OCI_COMPARTMENT_OCID" ,
} ,
{
2019-03-05 20:57:04 +02:00
desc : "missing OCI_PRIVKEY" ,
2019-02-26 16:41:02 +02:00
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : "" ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "secret" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "us-phoenix-1" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
2019-03-05 20:57:04 +02:00
expected : "oraclecloud: some credentials information are missing: OCI_PRIVKEY" ,
2019-02-26 16:41:02 +02:00
} ,
{
desc : "missing OCI_PRIVKEY_PASS" ,
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : mustGeneratePrivateKey ( "secret" ) ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "us-phoenix-1" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
expected : "oraclecloud: can not create client, bad configuration: x509: decryption password incorrect" ,
} ,
{
desc : "missing OCI_TENANCY_OCID" ,
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : mustGeneratePrivateKey ( "secret" ) ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "secret" ,
ociTenancyOCID : "" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "us-phoenix-1" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
expected : "oraclecloud: some credentials information are missing: OCI_TENANCY_OCID" ,
} ,
{
desc : "missing OCI_USER_OCID" ,
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : mustGeneratePrivateKey ( "secret" ) ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "secret" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "us-phoenix-1" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
expected : "oraclecloud: some credentials information are missing: OCI_USER_OCID" ,
} ,
{
desc : "missing OCI_PUBKEY_FINGERPRINT" ,
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : mustGeneratePrivateKey ( "secret" ) ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "secret" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "" ,
ociRegion : "us-phoenix-1" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
expected : "oraclecloud: some credentials information are missing: OCI_PUBKEY_FINGERPRINT" ,
} ,
{
desc : "missing OCI_REGION" ,
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : mustGeneratePrivateKey ( "secret" ) ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "secret" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
expected : "oraclecloud: some credentials information are missing: OCI_REGION" ,
} ,
{
desc : "missing OCI_REGION" ,
envVars : map [ string ] string {
2019-03-05 20:57:04 +02:00
ociPrivkey : mustGeneratePrivateKey ( "secret" ) ,
2019-02-26 16:41:02 +02:00
ociPrivkeyPass : "secret" ,
ociTenancyOCID : "ocid1.tenancy.oc1..secret" ,
ociUserOCID : "ocid1.user.oc1..secret" ,
ociPubkeyFingerprint : "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00" ,
ociRegion : "" ,
"OCI_COMPARTMENT_OCID" : "123" ,
} ,
expected : "oraclecloud: some credentials information are missing: OCI_REGION" ,
} ,
}
for _ , test := range testCases {
t . Run ( test . desc , func ( t * testing . T ) {
2019-03-05 20:57:04 +02:00
defer func ( ) {
privKeyFile := os . Getenv ( ociPrivkey + "_FILE" )
if privKeyFile != "" {
_ = os . Remove ( privKeyFile )
}
envTest . RestoreEnv ( )
} ( )
2019-02-26 16:41:02 +02:00
envTest . ClearEnv ( )
envTest . Apply ( test . envVars )
p , err := NewDNSProvider ( )
if len ( test . expected ) == 0 {
require . NoError ( t , err )
require . NotNil ( t , p )
require . NotNil ( t , p . config )
require . NotNil ( t , p . client )
} else {
require . EqualError ( t , err , test . expected )
}
} )
}
}
func TestNewDNSProviderConfig ( t * testing . T ) {
testCases := [ ] struct {
desc string
compartmentID string
configurationProvider common . ConfigurationProvider
expected string
} {
{
desc : "invalid configuration" ,
configurationProvider : & configProvider { } ,
compartmentID : "123" ,
2019-03-05 20:57:04 +02:00
expected : "oraclecloud: can not create client, bad configuration: x509: decryption password incorrect" ,
2019-02-26 16:41:02 +02:00
} ,
{
desc : "OCIConfigProvider is missing" ,
compartmentID : "123" ,
expected : "oraclecloud: OCIConfigProvider is missing" ,
} ,
{
desc : "missing CompartmentID" ,
expected : "oraclecloud: CompartmentID is missing" ,
} ,
}
for _ , test := range testCases {
t . Run ( test . desc , func ( t * testing . T ) {
config := NewDefaultConfig ( )
config . CompartmentID = test . compartmentID
config . OCIConfigProvider = test . configurationProvider
p , err := NewDNSProviderConfig ( config )
if len ( test . expected ) == 0 {
require . NoError ( t , err )
require . NotNil ( t , p )
require . NotNil ( t , p . config )
require . NotNil ( t , p . client )
} else {
require . EqualError ( t , err , test . expected )
}
} )
}
}
func TestLivePresent ( t * testing . T ) {
if ! envTest . IsLiveTest ( ) {
t . Skip ( "skipping live test" )
}
envTest . RestoreEnv ( )
provider , err := NewDNSProvider ( )
require . NoError ( t , err )
err = provider . Present ( envTest . GetDomain ( ) , "" , "123d==" )
require . NoError ( t , err )
}
func TestLiveCleanUp ( t * testing . T ) {
if ! envTest . IsLiveTest ( ) {
t . Skip ( "skipping live test" )
}
envTest . RestoreEnv ( )
provider , err := NewDNSProvider ( )
require . NoError ( t , err )
time . Sleep ( 1 * time . Second )
err = provider . CleanUp ( envTest . GetDomain ( ) , "" , "123d==" )
require . NoError ( t , err )
}
func mustGeneratePrivateKey ( pwd string ) string {
2019-03-05 20:57:04 +02:00
block , err := generatePrivateKey ( pwd )
2019-02-26 16:41:02 +02:00
if err != nil {
panic ( err )
}
2019-03-05 20:57:04 +02:00
return base64 . StdEncoding . EncodeToString ( pem . EncodeToMemory ( block ) )
}
func mustGeneratePrivateKeyFile ( pwd string ) string {
block , err := generatePrivateKey ( pwd )
if err != nil {
panic ( err )
}
file , err := ioutil . TempFile ( "" , "lego_oci_*.pem" )
if err != nil {
panic ( err )
}
err = pem . Encode ( file , block )
if err != nil {
panic ( err )
}
return file . Name ( )
}
func generatePrivateKey ( pwd string ) ( * pem . Block , error ) {
key , err := rsa . GenerateKey ( rand . Reader , 512 )
if err != nil {
return nil , err
}
2019-02-26 16:41:02 +02:00
block := & pem . Block {
Type : "RSA PRIVATE KEY" ,
Bytes : x509 . MarshalPKCS1PrivateKey ( key ) ,
}
if pwd != "" {
block , err = x509 . EncryptPEMBlock ( rand . Reader , block . Type , block . Bytes , [ ] byte ( pwd ) , x509 . PEMCipherAES256 )
if err != nil {
2019-03-05 20:57:04 +02:00
return nil , err
2019-02-26 16:41:02 +02:00
}
}
2019-03-05 20:57:04 +02:00
return block , nil
2019-02-26 16:41:02 +02:00
}