mirror of
https://github.com/umputun/reproxy.git
synced 2025-07-12 22:20:55 +02:00
fix: issue new cert correctly in tests, added test for DNS-01 challenge
This commit is contained in:
committed by
Yelshat Duskaliyev
parent
9f1fd3e86a
commit
72c8292d5f
@ -1,7 +1,9 @@
|
||||
package proxy
|
||||
|
||||
import (
|
||||
"context"
|
||||
"crypto/tls"
|
||||
"net"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"os"
|
||||
@ -9,6 +11,8 @@ import (
|
||||
"testing"
|
||||
|
||||
log "github.com/go-pkgz/lgr"
|
||||
"github.com/libdns/libdns"
|
||||
"github.com/miekg/dns"
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
"github.com/umputun/reproxy/app/proxy/acmetest"
|
||||
@ -87,3 +91,92 @@ func TestSSL_ACME_HTTPChallengeRouter(t *testing.T) {
|
||||
require.NoError(t, err)
|
||||
assert.NotNil(t, cert)
|
||||
}
|
||||
|
||||
func TestSSL_ACME_DNSChallenge(t *testing.T) {
|
||||
log.Setup(log.Debug, log.LevelBraces)
|
||||
|
||||
dir, err := os.MkdirTemp("", "acme")
|
||||
require.NoError(t, err)
|
||||
log.Printf("[DEBUG] acme dir: %s", dir)
|
||||
defer os.RemoveAll(dir)
|
||||
|
||||
var expectedToken string
|
||||
cas := acmetest.NewACMEServer(t,
|
||||
acmetest.CheckDNS(func(domain string) (exists bool, value string, err error) {
|
||||
assert.Equal(t, "example.com", domain)
|
||||
return true, expectedToken, nil
|
||||
}),
|
||||
)
|
||||
|
||||
dnsListener, err := net.ListenPacket("udp", ":0")
|
||||
require.NoError(t, err)
|
||||
dnsPort := strings.TrimPrefix(dnsListener.LocalAddr().String(), "[::]:")
|
||||
|
||||
dnsMock := &dns.Server{
|
||||
Addr: "localhost:" + dnsPort,
|
||||
Net: "udp",
|
||||
PacketConn: dnsListener,
|
||||
Handler: dns.HandlerFunc(func(w dns.ResponseWriter, r *dns.Msg) {
|
||||
msg := &dns.Msg{}
|
||||
msg.SetReply(r)
|
||||
|
||||
switch r.Question[0].Qtype {
|
||||
case dns.TypeSOA:
|
||||
msg.Answer = []dns.RR{&dns.SOA{
|
||||
Hdr: dns.RR_Header{
|
||||
Name: "example.com.",
|
||||
Rrtype: dns.TypeSOA,
|
||||
Class: dns.ClassINET,
|
||||
Ttl: 0,
|
||||
},
|
||||
Ns: "ns1.example.com.",
|
||||
Mbox: "hostmaster.example.com.",
|
||||
}}
|
||||
case dns.TypeTXT:
|
||||
assert.Equal(t, "_acme-challenge.example.com.", r.Question[0].Name)
|
||||
msg.Answer = []dns.RR{&dns.TXT{
|
||||
Hdr: dns.RR_Header{Name: r.Question[0].Name, Rrtype: dns.TypeTXT, Class: dns.ClassINET, Ttl: 0},
|
||||
Txt: []string{expectedToken},
|
||||
}}
|
||||
default:
|
||||
msg.SetRcode(r, dns.RcodeNameError)
|
||||
}
|
||||
|
||||
_ = w.WriteMsg(msg)
|
||||
}),
|
||||
}
|
||||
|
||||
go func() { require.NoError(t, dnsMock.ActivateAndServe()) }()
|
||||
defer dnsMock.Shutdown()
|
||||
|
||||
t.Log("dns server started at", dnsMock.Addr)
|
||||
|
||||
p := Http{
|
||||
SSLConfig: SSLConfig{
|
||||
ACMELocation: dir,
|
||||
FQDNs: []string{"example.com", "localhost"},
|
||||
ACMEDirectory: cas.URL(),
|
||||
DNSProvider: &dnsProviderMock{
|
||||
AppendRecordsFunc: func(ctx context.Context, zone string, recs []libdns.Record) ([]libdns.Record, error) {
|
||||
assert.Equal(t, "example.com.", zone)
|
||||
assert.Equal(t, 1, len(recs))
|
||||
assert.Equal(t, "_acme-challenge", recs[0].Name)
|
||||
assert.Equal(t, "TXT", recs[0].Type)
|
||||
assert.NotEmpty(t, recs[0].Value)
|
||||
expectedToken = recs[0].Value
|
||||
return recs, nil
|
||||
},
|
||||
DeleteRecordsFunc: func(ctx context.Context, zone string, recs []libdns.Record) ([]libdns.Record, error) {
|
||||
return recs, nil
|
||||
},
|
||||
},
|
||||
},
|
||||
dnsResolvers: []string{dnsMock.Addr},
|
||||
}
|
||||
|
||||
m := p.makeAutocertManager()
|
||||
|
||||
cert, err := m.GetCertificate(&tls.ClientHelloInfo{ServerName: "example.com"})
|
||||
require.NoError(t, err)
|
||||
assert.NotNil(t, cert)
|
||||
}
|
||||
|
Reference in New Issue
Block a user