mirror of
https://github.com/usual2970/certimate.git
synced 2025-10-05 22:14:53 +00:00
test: add some unit test cases for new Deployer
This commit is contained in:
119
internal/pkg/core/deployer/providers/local/local_test.go
Normal file
119
internal/pkg/core/deployer/providers/local/local_test.go
Normal file
@@ -0,0 +1,119 @@
|
||||
package local_test
|
||||
|
||||
import (
|
||||
"context"
|
||||
"os"
|
||||
"testing"
|
||||
|
||||
dLocal "github.com/usual2970/certimate/internal/pkg/core/deployer/providers/local"
|
||||
)
|
||||
|
||||
/*
|
||||
Shell command to run this test:
|
||||
|
||||
CERTIMATE_DEPLOYER_LOCAL_INPUTCERTPATH="/path/to/your-input-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_INPUTKEYPATH="/path/to/your-input-key.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_OUTPUTCERTPATH="/path/to/your-output-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_OUTPUTKEYPATH="/path/to/your-output-key.pem" \
|
||||
go test -v -run TestDeploy local_test.go
|
||||
*/
|
||||
func TestDeploy(t *testing.T) {
|
||||
envPrefix := "CERTIMATE_DEPLOYER_LOCAL_"
|
||||
tInputCertData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTCERTPATH"))
|
||||
tInputKeyData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTKEYPATH"))
|
||||
tOutputCertPath := os.Getenv(envPrefix + "OUTPUTCERTPATH")
|
||||
tOutputKeyPath := os.Getenv(envPrefix + "OUTPUTKEYPATH")
|
||||
|
||||
deployer, err := dLocal.New(&dLocal.LocalDeployerConfig{
|
||||
OutputCertPath: tOutputCertPath,
|
||||
OutputKeyPath: tOutputKeyPath,
|
||||
})
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
res, err := deployer.Deploy(context.Background(), string(tInputCertData), string(tInputKeyData))
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
t.Logf("ok: %v", res)
|
||||
}
|
||||
|
||||
/*
|
||||
Shell command to run this test:
|
||||
|
||||
CERTIMATE_DEPLOYER_LOCAL_INPUTCERTPATH="/path/to/your-input-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_INPUTKEYPATH="/path/to/your-input-key.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_OUTPUTCERTPATH="/path/to/your-output-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_PFXPASSWORD="your-pfx-password" \
|
||||
go test -v -run TestDeploy_PFX local_test.go
|
||||
*/
|
||||
func TestDeploy_PFX(t *testing.T) {
|
||||
envPrefix := "CERTIMATE_DEPLOYER_LOCAL_"
|
||||
tInputCertData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTCERTPATH"))
|
||||
tInputKeyData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTKEYPATH"))
|
||||
tOutputCertPath := os.Getenv(envPrefix + "OUTPUTCERTPATH")
|
||||
tPfxPassword := os.Getenv(envPrefix + "PFXPASSWORD")
|
||||
|
||||
deployer, err := dLocal.New(&dLocal.LocalDeployerConfig{
|
||||
OutputFormat: dLocal.OUTPUT_FORMAT_PFX,
|
||||
OutputCertPath: tOutputCertPath,
|
||||
PfxPassword: tPfxPassword,
|
||||
})
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
res, err := deployer.Deploy(context.Background(), string(tInputCertData), string(tInputKeyData))
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
t.Logf("ok: %v", res)
|
||||
}
|
||||
|
||||
/*
|
||||
Shell command to run this test:
|
||||
|
||||
CERTIMATE_DEPLOYER_LOCAL_INPUTCERTPATH="/path/to/your-input-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_INPUTKEYPATH="/path/to/your-input-key.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_OUTPUTCERTPATH="/path/to/your-output-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_JKSALIAS="your-jks-alias" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_JKSKEYPASS="your-jks-keypass" \
|
||||
CERTIMATE_DEPLOYER_LOCAL_JKSSTOREPASS="your-jks-storepass" \
|
||||
go test -v -run TestDeploy_JKS local_test.go
|
||||
*/
|
||||
func TestDeploy_JKS(t *testing.T) {
|
||||
envPrefix := "CERTIMATE_DEPLOYER_LOCAL_"
|
||||
tInputCertData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTCERTPATH"))
|
||||
tInputKeyData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTKEYPATH"))
|
||||
tOutputCertPath := os.Getenv(envPrefix + "OUTPUTCERTPATH")
|
||||
tJksAlias := os.Getenv(envPrefix + "JKSALIAS")
|
||||
tJksKeypass := os.Getenv(envPrefix + "JKSKEYPASS")
|
||||
tJksStorepass := os.Getenv(envPrefix + "JKSSTOREPASS")
|
||||
|
||||
deployer, err := dLocal.New(&dLocal.LocalDeployerConfig{
|
||||
OutputFormat: dLocal.OUTPUT_FORMAT_JKS,
|
||||
OutputCertPath: tOutputCertPath,
|
||||
JksAlias: tJksAlias,
|
||||
JksKeypass: tJksKeypass,
|
||||
JksStorepass: tJksStorepass,
|
||||
})
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
res, err := deployer.Deploy(context.Background(), string(tInputCertData), string(tInputKeyData))
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
t.Logf("ok: %v", res)
|
||||
}
|
56
internal/pkg/core/deployer/providers/ssh/ssh_test.go
Normal file
56
internal/pkg/core/deployer/providers/ssh/ssh_test.go
Normal file
@@ -0,0 +1,56 @@
|
||||
package ssh_test
|
||||
|
||||
import (
|
||||
"context"
|
||||
"os"
|
||||
"strconv"
|
||||
"testing"
|
||||
|
||||
dSsh "github.com/usual2970/certimate/internal/pkg/core/deployer/providers/ssh"
|
||||
)
|
||||
|
||||
/*
|
||||
Shell command to run this test:
|
||||
|
||||
CERTIMATE_DEPLOYER_SSH_INPUTCERTPATH="/path/to/your-input-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_SSH_INPUTKEYPATH="/path/to/your-input-key.pem" \
|
||||
CERTIMATE_DEPLOYER_SSH_SSHHOST="localhost" \
|
||||
CERTIMATE_DEPLOYER_SSH_SSHPORT=22 \
|
||||
CERTIMATE_DEPLOYER_SSH_SSHUSERNAME="root" \
|
||||
CERTIMATE_DEPLOYER_SSH_SSHPASSWORD="password" \
|
||||
CERTIMATE_DEPLOYER_SSH_OUTPUTCERTPATH="/path/to/your-output-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_SSH_OUTPUTKEYPATH="/path/to/your-output-key.pem" \
|
||||
go test -v -run TestDeploy ssh_test.go
|
||||
*/
|
||||
func TestDeploy(t *testing.T) {
|
||||
envPrefix := "CERTIMATE_DEPLOYER_LOCAL_"
|
||||
tInputCertData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTCERTPATH"))
|
||||
tInputKeyData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTKEYPATH"))
|
||||
tSshHost := os.Getenv(envPrefix + "SSHHOST")
|
||||
tSshPort, _ := strconv.ParseInt(os.Getenv(envPrefix+"SSHPORT"), 10, 32)
|
||||
tSshUsername := os.Getenv(envPrefix + "SSHUSERNAME")
|
||||
tSshPassword := os.Getenv(envPrefix + "SSHPASSWORD")
|
||||
tOutputCertPath := os.Getenv(envPrefix + "OUTPUTCERTPATH")
|
||||
tOutputKeyPath := os.Getenv(envPrefix + "OUTPUTKEYPATH")
|
||||
|
||||
deployer, err := dSsh.New(&dSsh.SshDeployerConfig{
|
||||
SshHost: tSshHost,
|
||||
SshPort: int32(tSshPort),
|
||||
SshUsername: tSshUsername,
|
||||
SshPassword: tSshPassword,
|
||||
OutputCertPath: tOutputCertPath,
|
||||
OutputKeyPath: tOutputKeyPath,
|
||||
})
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
res, err := deployer.Deploy(context.Background(), string(tInputCertData), string(tInputKeyData))
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
t.Logf("ok: %v", res)
|
||||
}
|
@@ -77,5 +77,9 @@ func (d *WebhookDeployer) Deploy(ctx context.Context, certPem string, privkeyPem
|
||||
|
||||
d.logger.Appendt("Webhook Response", string(resp))
|
||||
|
||||
return &deployer.DeployResult{}, nil
|
||||
return &deployer.DeployResult{
|
||||
DeploymentData: map[string]any{
|
||||
"responseText": string(resp),
|
||||
},
|
||||
}, nil
|
||||
}
|
||||
|
40
internal/pkg/core/deployer/providers/webhook/webhook_test.go
Normal file
40
internal/pkg/core/deployer/providers/webhook/webhook_test.go
Normal file
@@ -0,0 +1,40 @@
|
||||
package webhook_test
|
||||
|
||||
import (
|
||||
"context"
|
||||
"os"
|
||||
"testing"
|
||||
|
||||
dpWebhook "github.com/usual2970/certimate/internal/pkg/core/deployer/providers/webhook"
|
||||
)
|
||||
|
||||
/*
|
||||
Shell command to run this test:
|
||||
|
||||
CERTIMATE_DEPLOYER_WEBHOOK_INPUTCERTPATH="/path/to/your-input-cert.pem" \
|
||||
CERTIMATE_DEPLOYER_WEBHOOK_INPUTKEYPATH="/path/to/your-input-key.pem" \
|
||||
CERTIMATE_DEPLOYER_WEBHOOK_URL="https://example.com/your-webhook-url" \
|
||||
go test -v -run TestDeploy webhook_test.go
|
||||
*/
|
||||
func TestDeploy(t *testing.T) {
|
||||
envPrefix := "CERTIMATE_DEPLOYER_WEBHOOK_"
|
||||
tInputCertData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTCERTPATH"))
|
||||
tInputKeyData, _ := os.ReadFile(os.Getenv(envPrefix + "INPUTKEYPATH"))
|
||||
tUrl := os.Getenv(envPrefix + "URL")
|
||||
|
||||
deployer, err := dpWebhook.New(&dpWebhook.WebhookDeployerConfig{
|
||||
Url: tUrl,
|
||||
})
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
res, err := deployer.Deploy(context.Background(), string(tInputCertData), string(tInputKeyData))
|
||||
if err != nil {
|
||||
t.Errorf("err: %+v", err)
|
||||
panic(err)
|
||||
}
|
||||
|
||||
t.Logf("ok: %v", res)
|
||||
}
|
Reference in New Issue
Block a user