open-vault/helper/awsutil/region_test.go

251 lines
6.1 KiB
Go

package awsutil
import (
"fmt"
"io/ioutil"
"net/http"
"net/http/httptest"
"os"
"os/user"
"testing"
hclog "github.com/hashicorp/go-hclog"
)
const testConfigFile = `[default]
region=%s
output=json`
var (
shouldTestFiles = os.Getenv("VAULT_ACC_AWS_FILES") == "1"
logger = hclog.NewNullLogger()
expectedTestRegion = "us-west-2"
unexpectedTestRegion = "us-east-2"
regionEnvKeys = []string{"AWS_REGION", "AWS_DEFAULT_REGION"}
)
func TestGetOrDefaultRegion_UserConfigPreferredFirst(t *testing.T) {
configuredRegion := expectedTestRegion
cleanupEnv := setEnvRegion(t, unexpectedTestRegion)
defer cleanupEnv()
cleanupFile := setConfigFileRegion(t, unexpectedTestRegion)
defer cleanupFile()
cleanupMetadata := setInstanceMetadata(t, unexpectedTestRegion)
defer cleanupMetadata()
result := GetOrDefaultRegion(logger, configuredRegion)
if result != expectedTestRegion {
t.Fatalf("expected: %s; actual: %s", expectedTestRegion, result)
}
}
func TestGetOrDefaultRegion_EnvVarsPreferredSecond(t *testing.T) {
configuredRegion := ""
cleanupEnv := setEnvRegion(t, expectedTestRegion)
defer cleanupEnv()
cleanupFile := setConfigFileRegion(t, unexpectedTestRegion)
defer cleanupFile()
cleanupMetadata := setInstanceMetadata(t, unexpectedTestRegion)
defer cleanupMetadata()
result := GetOrDefaultRegion(logger, configuredRegion)
if result != expectedTestRegion {
t.Fatalf("expected: %s; actual: %s", expectedTestRegion, result)
}
}
func TestGetOrDefaultRegion_ConfigFilesPreferredThird(t *testing.T) {
if !shouldTestFiles {
// In some test environments, like a CI environment, we may not have the
// permissions to write to the ~/.aws/config file. Thus, this test is off
// by default but can be set to on for local development.
t.SkipNow()
}
configuredRegion := ""
cleanupEnv := setEnvRegion(t, "")
defer cleanupEnv()
cleanupFile := setConfigFileRegion(t, expectedTestRegion)
defer cleanupFile()
cleanupMetadata := setInstanceMetadata(t, unexpectedTestRegion)
defer cleanupMetadata()
result := GetOrDefaultRegion(logger, configuredRegion)
if result != expectedTestRegion {
t.Fatalf("expected: %s; actual: %s", expectedTestRegion, result)
}
}
func TestGetOrDefaultRegion_ConfigFileUnfound(t *testing.T) {
if enabled := os.Getenv("VAULT_ACC"); enabled == "" {
t.Skip()
}
configuredRegion := ""
cleanupEnv := setEnvRegion(t, "")
defer cleanupEnv()
if err := os.Setenv("AWS_SHARED_CREDENTIALS_FILE", "foo"); err != nil {
t.Fatal(err)
}
defer func() {
if err := os.Unsetenv("AWS_SHARED_CREDENTIALS_FILE"); err != nil {
t.Fatal(err)
}
}()
result := GetOrDefaultRegion(logger, configuredRegion)
if result != DefaultRegion {
t.Fatalf("expected: %s; actual: %s", DefaultRegion, result)
}
}
func TestGetOrDefaultRegion_EC2InstanceMetadataPreferredFourth(t *testing.T) {
if !shouldTestFiles {
// In some test environments, like a CI environment, we may not have the
// permissions to write to the ~/.aws/config file. Thus, this test is off
// by default but can be set to on for local development.
t.SkipNow()
}
configuredRegion := ""
cleanupEnv := setEnvRegion(t, "")
defer cleanupEnv()
cleanupFile := setConfigFileRegion(t, "")
defer cleanupFile()
cleanupMetadata := setInstanceMetadata(t, expectedTestRegion)
defer cleanupMetadata()
result := GetOrDefaultRegion(logger, configuredRegion)
if result != expectedTestRegion {
t.Fatalf("expected: %s; actual: %s", expectedTestRegion, result)
}
}
func TestGetOrDefaultRegion_DefaultsToDefaultRegionWhenRegionUnavailable(t *testing.T) {
if enabled := os.Getenv("VAULT_ACC"); enabled == "" {
t.Skip()
}
configuredRegion := ""
cleanupEnv := setEnvRegion(t, "")
defer cleanupEnv()
cleanupFile := setConfigFileRegion(t, "")
defer cleanupFile()
result := GetOrDefaultRegion(logger, configuredRegion)
if result != DefaultRegion {
t.Fatalf("expected: %s; actual: %s", DefaultRegion, result)
}
}
func setEnvRegion(t *testing.T, region string) (cleanup func()) {
for _, envKey := range regionEnvKeys {
if err := os.Setenv(envKey, region); err != nil {
t.Fatal(err)
}
}
cleanup = func() {
for _, envKey := range regionEnvKeys {
if err := os.Unsetenv(envKey); err != nil {
t.Fatal(err)
}
}
}
return
}
func setConfigFileRegion(t *testing.T, region string) (cleanup func()) {
var cleanupFuncs []func()
cleanup = func() {
for _, f := range cleanupFuncs {
f()
}
}
if !shouldTestFiles {
return
}
usr, err := user.Current()
if err != nil {
t.Fatal(err)
}
pathToAWSDir := usr.HomeDir + "/.aws"
pathToConfig := pathToAWSDir + "/config"
preExistingConfig, err := ioutil.ReadFile(pathToConfig)
if err != nil {
// File simply doesn't exist.
if err := os.Mkdir(pathToAWSDir, os.ModeDir); err != nil {
t.Fatal(err)
}
cleanupFuncs = append(cleanupFuncs, func() {
if err := os.RemoveAll(pathToAWSDir); err != nil {
t.Fatal(err)
}
})
} else {
cleanupFuncs = append(cleanupFuncs, func() {
if err := ioutil.WriteFile(pathToConfig, preExistingConfig, 0644); err != nil {
t.Fatal(err)
}
})
}
fileBody := fmt.Sprintf(testConfigFile, region)
if err := ioutil.WriteFile(pathToConfig, []byte(fileBody), 0644); err != nil {
t.Fatal(err)
}
if err := os.Setenv("AWS_SHARED_CREDENTIALS_FILE", pathToConfig); err != nil {
t.Fatal(err)
}
cleanupFuncs = append(cleanupFuncs, func() {
if err := os.Unsetenv("AWS_SHARED_CREDENTIALS_FILE"); err != nil {
t.Fatal(err)
}
})
return
}
func setInstanceMetadata(t *testing.T, region string) (cleanup func()) {
ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
reqPath := r.URL.String()
switch reqPath {
case "/latest/meta-data/instance-id":
w.Write([]byte("i-1234567890abcdef0"))
return
case "/latest/meta-data/placement/availability-zone":
// add a letter suffix, as a normal response is formatted like "us-east-1a"
w.Write([]byte(region + "a"))
return
default:
t.Fatalf("received unexpected request path: %s", reqPath)
}
}))
originalMetadataBaseURL := ec2MetadataBaseURL
ec2MetadataBaseURL = ts.URL
cleanup = func() {
ts.Close()
ec2MetadataBaseURL = originalMetadataBaseURL
}
return
}