package awsutil import ( "fmt" "io/ioutil" "net/http" "net/http/httptest" "os" "os/user" "testing" "github.com/aws/aws-sdk-go/aws" ) const testConfigFile = `[default] region=%s output=json` var ( shouldTestFiles = os.Getenv("VAULT_ACC_AWS_FILES") == "1" expectedTestRegion = "us-west-2" unexpectedTestRegion = "us-east-2" regionEnvKeys = []string{"AWS_REGION", "AWS_DEFAULT_REGION"} ) func TestGetRegion_UserConfigPreferredFirst(t *testing.T) { configuredRegion := expectedTestRegion cleanupEnv := setEnvRegion(t, unexpectedTestRegion) defer cleanupEnv() cleanupFile := setConfigFileRegion(t, unexpectedTestRegion) defer cleanupFile() cleanupMetadata := setInstanceMetadata(t, unexpectedTestRegion) defer cleanupMetadata() result, err := GetRegion(configuredRegion) if err != nil { t.Fatal(err) } if result != expectedTestRegion { t.Fatalf("expected: %s; actual: %s", expectedTestRegion, result) } } func TestGetRegion_EnvVarsPreferredSecond(t *testing.T) { configuredRegion := "" cleanupEnv := setEnvRegion(t, expectedTestRegion) defer cleanupEnv() cleanupFile := setConfigFileRegion(t, unexpectedTestRegion) defer cleanupFile() cleanupMetadata := setInstanceMetadata(t, unexpectedTestRegion) defer cleanupMetadata() result, err := GetRegion(configuredRegion) if err != nil { t.Fatal(err) } if result != expectedTestRegion { t.Fatalf("expected: %s; actual: %s", expectedTestRegion, result) } } func TestGetRegion_ConfigFilesPreferredThird(t *testing.T) { if !shouldTestFiles { // In some test environments, like a CI environment, we may not have the // permissions to write to the ~/.aws/config file. Thus, this test is off // by default but can be set to on for local development. t.SkipNow() } configuredRegion := "" cleanupEnv := setEnvRegion(t, "") defer cleanupEnv() cleanupFile := setConfigFileRegion(t, expectedTestRegion) defer cleanupFile() cleanupMetadata := setInstanceMetadata(t, unexpectedTestRegion) defer cleanupMetadata() result, err := GetRegion(configuredRegion) if err != nil { t.Fatal(err) } if result != expectedTestRegion { t.Fatalf("expected: %s; actual: %s", expectedTestRegion, result) } } func TestGetRegion_ConfigFileUnfound(t *testing.T) { if enabled := os.Getenv("VAULT_ACC"); enabled == "" { t.Skip() } configuredRegion := "" cleanupEnv := setEnvRegion(t, "") defer cleanupEnv() if err := os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "foo"); err != nil { t.Fatal(err) } defer func() { if err := os.Unsetenv("AWS_SHARED_CREDENTIALS_FILE"); err != nil { t.Fatal(err) } }() result, err := GetRegion(configuredRegion) if err != nil { t.Fatal(err) } if result != DefaultRegion { t.Fatalf("expected: %s; actual: %s", DefaultRegion, result) } } func TestGetRegion_EC2InstanceMetadataPreferredFourth(t *testing.T) { if !shouldTestFiles { // In some test environments, like a CI environment, we may not have the // permissions to write to the ~/.aws/config file. Thus, this test is off // by default but can be set to on for local development. t.SkipNow() } configuredRegion := "" cleanupEnv := setEnvRegion(t, "") defer cleanupEnv() cleanupFile := setConfigFileRegion(t, "") defer cleanupFile() cleanupMetadata := setInstanceMetadata(t, expectedTestRegion) defer cleanupMetadata() result, err := GetRegion(configuredRegion) if err != nil { t.Fatal(err) } if result != expectedTestRegion { t.Fatalf("expected: %s; actual: %s", expectedTestRegion, result) } } func TestGetRegion_DefaultsToDefaultRegionWhenRegionUnavailable(t *testing.T) { if enabled := os.Getenv("VAULT_ACC"); enabled == "" { t.Skip() } configuredRegion := "" cleanupEnv := setEnvRegion(t, "") defer cleanupEnv() cleanupFile := setConfigFileRegion(t, "") defer cleanupFile() result, err := GetRegion(configuredRegion) if err != nil { t.Fatal(err) } if result != DefaultRegion { t.Fatalf("expected: %s; actual: %s", DefaultRegion, result) } } func setEnvRegion(t *testing.T, region string) (cleanup func()) { for _, envKey := range regionEnvKeys { if err := os.Setenv(envKey, region); err != nil { t.Fatal(err) } } cleanup = func() { for _, envKey := range regionEnvKeys { if err := os.Unsetenv(envKey); err != nil { t.Fatal(err) } } } return } func setConfigFileRegion(t *testing.T, region string) (cleanup func()) { var cleanupFuncs []func() cleanup = func() { for _, f := range cleanupFuncs { f() } } if !shouldTestFiles { return } usr, err := user.Current() if err != nil { t.Fatal(err) } pathToAWSDir := usr.HomeDir + "/.aws" pathToConfig := pathToAWSDir + "/config" preExistingConfig, err := ioutil.ReadFile(pathToConfig) if err != nil { // File simply doesn't exist. if err := os.Mkdir(pathToAWSDir, os.ModeDir); err != nil { t.Fatal(err) } cleanupFuncs = append(cleanupFuncs, func() { if err := os.RemoveAll(pathToAWSDir); err != nil { t.Fatal(err) } }) } else { cleanupFuncs = append(cleanupFuncs, func() { if err := ioutil.WriteFile(pathToConfig, preExistingConfig, 0o644); err != nil { t.Fatal(err) } }) } fileBody := fmt.Sprintf(testConfigFile, region) if err := ioutil.WriteFile(pathToConfig, []byte(fileBody), 0o644); err != nil { t.Fatal(err) } if err := os.Setenv("AWS_SHARED_CREDENTIALS_FILE", pathToConfig); err != nil { t.Fatal(err) } cleanupFuncs = append(cleanupFuncs, func() { if err := os.Unsetenv("AWS_SHARED_CREDENTIALS_FILE"); err != nil { t.Fatal(err) } }) return } func setInstanceMetadata(t *testing.T, region string) (cleanup func()) { ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { reqPath := r.URL.String() switch reqPath { case "/latest/meta-data/instance-id": w.Write([]byte("i-1234567890abcdef0")) return case "/latest/meta-data/placement/availability-zone": // add a letter suffix, as a normal response is formatted like "us-east-1a" w.Write([]byte(region + "a")) return default: t.Fatalf("received unexpected request path: %s", reqPath) } })) ec2Endpoint = aws.String(ts.URL) cleanup = func() { ts.Close() ec2Endpoint = nil } return }