mirror of
https://github.com/joohoi/acme-dns.git
synced 2024-12-22 16:23:43 +07:00
Migrate to GitHub actions for coverage & unit test automation (#251)
This commit is contained in:
parent
9c6ca258e1
commit
835fbb9ef6
33
.github/workflows/go_cov.yml
vendored
Normal file
33
.github/workflows/go_cov.yml
vendored
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
name: Go
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
pull_request:
|
||||||
|
schedule:
|
||||||
|
# Run every 12 hours, at the 15 minute mark. E.g.
|
||||||
|
# 2020-11-29 00:15:00 UTC, 2020-11-29 12:15:00 UTC, 2020-11-30 00:15:00 UTC
|
||||||
|
- cron: '15 */12 * * *'
|
||||||
|
jobs:
|
||||||
|
|
||||||
|
build:
|
||||||
|
name: Build and Unit Test
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
|
||||||
|
- name: Set up Go
|
||||||
|
uses: actions/setup-go@v2
|
||||||
|
with:
|
||||||
|
go-version: ^1.13
|
||||||
|
|
||||||
|
- name: Check out code
|
||||||
|
uses: actions/checkout@v2
|
||||||
|
|
||||||
|
- name: Build
|
||||||
|
run: go build -v ./...
|
||||||
|
|
||||||
|
- name: Test
|
||||||
|
run: go test -v -race -covermode=atomic -coverprofile=coverage.out ./...
|
||||||
|
|
||||||
|
- name: Upload Coverage
|
||||||
|
uses: shogo82148/actions-goveralls@v1
|
||||||
|
with:
|
||||||
|
path-to-profile: coverage.out
|
25
.github/workflows/golangci-lint.yml
vendored
Normal file
25
.github/workflows/golangci-lint.yml
vendored
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
name: golangci-lint
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
tags:
|
||||||
|
- v*
|
||||||
|
branches:
|
||||||
|
- master
|
||||||
|
pull_request:
|
||||||
|
schedule:
|
||||||
|
# Run every 12 hours, at the 15 minute mark. E.g.
|
||||||
|
# 2020-11-29 00:15:00 UTC, 2020-11-29 12:15:00 UTC, 2020-11-30 00:15:00 UTC
|
||||||
|
- cron: '15 */12 * * *'
|
||||||
|
jobs:
|
||||||
|
golangci:
|
||||||
|
name: Lint Sourcecode
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
|
||||||
|
- name: Check out code
|
||||||
|
uses: actions/checkout@v2
|
||||||
|
|
||||||
|
- name: Run golangci-lint
|
||||||
|
uses: golangci/golangci-lint-action@v2
|
||||||
|
with:
|
||||||
|
version: v1.35
|
13
.travis.yml
13
.travis.yml
@ -1,13 +0,0 @@
|
|||||||
language: go
|
|
||||||
go:
|
|
||||||
- 1.13
|
|
||||||
env:
|
|
||||||
- "PATH=/home/travis/gopath/bin:$PATH"
|
|
||||||
before_install:
|
|
||||||
- go get golang.org/x/lint/golint
|
|
||||||
- go get github.com/mattn/goveralls
|
|
||||||
script:
|
|
||||||
- go vet
|
|
||||||
- golint -set_exit_status
|
|
||||||
- go test -race -v
|
|
||||||
- $HOME/gopath/bin/goveralls -ignore main.go -v -service=travis-ci
|
|
10
api.go
10
api.go
@ -25,14 +25,14 @@ func webRegisterPost(w http.ResponseWriter, r *http.Request, _ httprouter.Params
|
|||||||
var err error
|
var err error
|
||||||
aTXT := ACMETxt{}
|
aTXT := ACMETxt{}
|
||||||
bdata, _ := ioutil.ReadAll(r.Body)
|
bdata, _ := ioutil.ReadAll(r.Body)
|
||||||
if bdata != nil && len(bdata) > 0 {
|
if len(bdata) > 0 {
|
||||||
err = json.Unmarshal(bdata, &aTXT)
|
err = json.Unmarshal(bdata, &aTXT)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
regStatus = http.StatusBadRequest
|
regStatus = http.StatusBadRequest
|
||||||
reg = jsonError("malformed_json_payload")
|
reg = jsonError("malformed_json_payload")
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
w.WriteHeader(regStatus)
|
w.WriteHeader(regStatus)
|
||||||
w.Write(reg)
|
_, _ = w.Write(reg)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -44,7 +44,7 @@ func webRegisterPost(w http.ResponseWriter, r *http.Request, _ httprouter.Params
|
|||||||
reg = jsonError("invalid_allowfrom_cidr")
|
reg = jsonError("invalid_allowfrom_cidr")
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
w.WriteHeader(regStatus)
|
w.WriteHeader(regStatus)
|
||||||
w.Write(reg)
|
_, _ = w.Write(reg)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -68,7 +68,7 @@ func webRegisterPost(w http.ResponseWriter, r *http.Request, _ httprouter.Params
|
|||||||
}
|
}
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
w.WriteHeader(regStatus)
|
w.WriteHeader(regStatus)
|
||||||
w.Write(reg)
|
_, _ = w.Write(reg)
|
||||||
}
|
}
|
||||||
|
|
||||||
func webUpdatePost(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
|
func webUpdatePost(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {
|
||||||
@ -104,7 +104,7 @@ func webUpdatePost(w http.ResponseWriter, r *http.Request, _ httprouter.Params)
|
|||||||
}
|
}
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
w.WriteHeader(updStatus)
|
w.WriteHeader(updStatus)
|
||||||
w.Write(upd)
|
_, _ = w.Write(upd)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Endpoint used to check the readiness and/or liveness (health) of the server.
|
// Endpoint used to check the readiness and/or liveness (health) of the server.
|
||||||
|
12
api_test.go
12
api_test.go
@ -325,10 +325,6 @@ func TestApiUpdateWithCredentialsMockDB(t *testing.T) {
|
|||||||
func TestApiManyUpdateWithCredentials(t *testing.T) {
|
func TestApiManyUpdateWithCredentials(t *testing.T) {
|
||||||
validTxtData := "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
validTxtData := "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"
|
||||||
|
|
||||||
updateJSON := map[string]interface{}{
|
|
||||||
"subdomain": "",
|
|
||||||
"txt": ""}
|
|
||||||
|
|
||||||
router := setupRouter(true, false)
|
router := setupRouter(true, false)
|
||||||
server := httptest.NewServer(router)
|
server := httptest.NewServer(router)
|
||||||
defer server.Close()
|
defer server.Close()
|
||||||
@ -370,7 +366,7 @@ func TestApiManyUpdateWithCredentials(t *testing.T) {
|
|||||||
{newUserWithValidCIDR.Username.String(), newUserWithValidCIDR.Password, newUserWithValidCIDR.Subdomain, validTxtData, 200},
|
{newUserWithValidCIDR.Username.String(), newUserWithValidCIDR.Password, newUserWithValidCIDR.Subdomain, validTxtData, 200},
|
||||||
{newUser.Username.String(), "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", newUser.Subdomain, validTxtData, 401},
|
{newUser.Username.String(), "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx", newUser.Subdomain, validTxtData, 401},
|
||||||
} {
|
} {
|
||||||
updateJSON = map[string]interface{}{
|
updateJSON := map[string]interface{}{
|
||||||
"subdomain": test.subdomain,
|
"subdomain": test.subdomain,
|
||||||
"txt": test.txt}
|
"txt": test.txt}
|
||||||
e.POST("/update").
|
e.POST("/update").
|
||||||
@ -385,10 +381,6 @@ func TestApiManyUpdateWithCredentials(t *testing.T) {
|
|||||||
|
|
||||||
func TestApiManyUpdateWithIpCheckHeaders(t *testing.T) {
|
func TestApiManyUpdateWithIpCheckHeaders(t *testing.T) {
|
||||||
|
|
||||||
updateJSON := map[string]interface{}{
|
|
||||||
"subdomain": "",
|
|
||||||
"txt": ""}
|
|
||||||
|
|
||||||
router := setupRouter(false, false)
|
router := setupRouter(false, false)
|
||||||
server := httptest.NewServer(router)
|
server := httptest.NewServer(router)
|
||||||
defer server.Close()
|
defer server.Close()
|
||||||
@ -425,7 +417,7 @@ func TestApiManyUpdateWithIpCheckHeaders(t *testing.T) {
|
|||||||
{newUserWithIP6CIDR, "2002:c0a7:0ff::0", 401},
|
{newUserWithIP6CIDR, "2002:c0a7:0ff::0", 401},
|
||||||
{newUserWithIP6CIDR, "2002:c0a8:d3ad:b33f:c0ff:33b4:dc0d:3b4d", 200},
|
{newUserWithIP6CIDR, "2002:c0a8:d3ad:b33f:c0ff:33b4:dc0d:3b4d", 200},
|
||||||
} {
|
} {
|
||||||
updateJSON = map[string]interface{}{
|
updateJSON := map[string]interface{}{
|
||||||
"subdomain": test.user.Subdomain,
|
"subdomain": test.user.Subdomain,
|
||||||
"txt": "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"}
|
"txt": "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"}
|
||||||
e.POST("/update").
|
e.POST("/update").
|
||||||
|
2
auth.go
2
auth.go
@ -50,7 +50,7 @@ func Auth(update httprouter.Handle) httprouter.Handle {
|
|||||||
} else {
|
} else {
|
||||||
w.Header().Set("Content-Type", "application/json")
|
w.Header().Set("Content-Type", "application/json")
|
||||||
w.WriteHeader(http.StatusUnauthorized)
|
w.WriteHeader(http.StatusUnauthorized)
|
||||||
w.Write(jsonError("forbidden"))
|
_, _ = w.Write(jsonError("forbidden"))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
22
db.go
22
db.go
@ -50,7 +50,7 @@ var txtTablePG = `
|
|||||||
|
|
||||||
// getSQLiteStmt replaces all PostgreSQL prepared statement placeholders (eg. $1, $2) with SQLite variant "?"
|
// getSQLiteStmt replaces all PostgreSQL prepared statement placeholders (eg. $1, $2) with SQLite variant "?"
|
||||||
func getSQLiteStmt(s string) string {
|
func getSQLiteStmt(s string) string {
|
||||||
re, _ := regexp.Compile("\\$[0-9]")
|
re, _ := regexp.Compile(`\$[0-9]`)
|
||||||
return re.ReplaceAllString(s, "?")
|
return re.ReplaceAllString(s, "?")
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -68,12 +68,12 @@ func (d *acmedb) Init(engine string, connection string) error {
|
|||||||
if versionString == "" {
|
if versionString == "" {
|
||||||
versionString = "0"
|
versionString = "0"
|
||||||
}
|
}
|
||||||
_, err = d.DB.Exec(acmeTable)
|
_, _ = d.DB.Exec(acmeTable)
|
||||||
_, err = d.DB.Exec(userTable)
|
_, _ = d.DB.Exec(userTable)
|
||||||
if Config.Database.Engine == "sqlite3" {
|
if Config.Database.Engine == "sqlite3" {
|
||||||
_, err = d.DB.Exec(txtTable)
|
_, _ = d.DB.Exec(txtTable)
|
||||||
} else {
|
} else {
|
||||||
_, err = d.DB.Exec(txtTablePG)
|
_, _ = d.DB.Exec(txtTablePG)
|
||||||
}
|
}
|
||||||
// If everything is fine, handle db upgrade tasks
|
// If everything is fine, handle db upgrade tasks
|
||||||
if err == nil {
|
if err == nil {
|
||||||
@ -136,10 +136,10 @@ func (d *acmedb) handleDBUpgradeTo1() error {
|
|||||||
// Rollback if errored, commit if not
|
// Rollback if errored, commit if not
|
||||||
defer func() {
|
defer func() {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
tx.Rollback()
|
_ = tx.Rollback()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
tx.Commit()
|
_ = tx.Commit()
|
||||||
}()
|
}()
|
||||||
_, _ = tx.Exec("DELETE FROM txt")
|
_, _ = tx.Exec("DELETE FROM txt")
|
||||||
for _, subdomain := range subdomains {
|
for _, subdomain := range subdomains {
|
||||||
@ -165,8 +165,8 @@ func (d *acmedb) handleDBUpgradeTo1() error {
|
|||||||
func (d *acmedb) NewTXTValuesInTransaction(tx *sql.Tx, subdomain string) error {
|
func (d *acmedb) NewTXTValuesInTransaction(tx *sql.Tx, subdomain string) error {
|
||||||
var err error
|
var err error
|
||||||
instr := fmt.Sprintf("INSERT INTO txt (Subdomain, LastUpdate) values('%s', 0)", subdomain)
|
instr := fmt.Sprintf("INSERT INTO txt (Subdomain, LastUpdate) values('%s', 0)", subdomain)
|
||||||
_, err = tx.Exec(instr)
|
_, _ = tx.Exec(instr)
|
||||||
_, err = tx.Exec(instr)
|
_, _ = tx.Exec(instr)
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -178,10 +178,10 @@ func (d *acmedb) Register(afrom cidrslice) (ACMETxt, error) {
|
|||||||
// Rollback if errored, commit if not
|
// Rollback if errored, commit if not
|
||||||
defer func() {
|
defer func() {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
tx.Rollback()
|
_ = tx.Rollback()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
tx.Commit()
|
_ = tx.Commit()
|
||||||
}()
|
}()
|
||||||
a := newACMETxt()
|
a := newACMETxt()
|
||||||
a.AllowFrom = cidrslice(afrom.ValidEntries())
|
a.AllowFrom = cidrslice(afrom.ValidEntries())
|
||||||
|
10
dns.go
10
dns.go
@ -108,7 +108,7 @@ func (d *DNSServer) handleRequest(w dns.ResponseWriter, r *dns.Msg) {
|
|||||||
d.readQuery(m)
|
d.readQuery(m)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
w.WriteMsg(m)
|
_ = w.WriteMsg(m)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *DNSServer) readQuery(m *dns.Msg) {
|
func (d *DNSServer) readQuery(m *dns.Msg) {
|
||||||
@ -119,9 +119,7 @@ func (d *DNSServer) readQuery(m *dns.Msg) {
|
|||||||
authoritative = auth
|
authoritative = auth
|
||||||
}
|
}
|
||||||
m.MsgHdr.Rcode = rc
|
m.MsgHdr.Rcode = rc
|
||||||
for _, r := range rr {
|
m.Answer = append(m.Answer, rr...)
|
||||||
m.Answer = append(m.Answer, r)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
m.MsgHdr.Authoritative = authoritative
|
m.MsgHdr.Authoritative = authoritative
|
||||||
@ -208,9 +206,7 @@ func (d *DNSServer) answer(q dns.Question) ([]dns.RR, int, bool, error) {
|
|||||||
txtRRs, err = d.answerTXT(q)
|
txtRRs, err = d.answerTXT(q)
|
||||||
}
|
}
|
||||||
if err == nil {
|
if err == nil {
|
||||||
for _, txtRR := range txtRRs {
|
r = append(r, txtRRs...)
|
||||||
r = append(r, txtRR)
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if len(r) > 0 {
|
if len(r) > 0 {
|
||||||
|
@ -11,9 +11,6 @@ import (
|
|||||||
"github.com/miekg/dns"
|
"github.com/miekg/dns"
|
||||||
)
|
)
|
||||||
|
|
||||||
var resolv resolver
|
|
||||||
var server *dns.Server
|
|
||||||
|
|
||||||
type resolver struct {
|
type resolver struct {
|
||||||
server string
|
server string
|
||||||
}
|
}
|
||||||
|
5
main.go
5
main.go
@ -92,13 +92,12 @@ func main() {
|
|||||||
go startHTTPAPI(errChan, Config, dnsservers)
|
go startHTTPAPI(errChan, Config, dnsservers)
|
||||||
|
|
||||||
// block waiting for error
|
// block waiting for error
|
||||||
select {
|
for {
|
||||||
case err = <-errChan:
|
err = <-errChan
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Fatal(err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
log.Debugf("Shutting down...")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func startHTTPAPI(errChan chan error, config DNSConfig, dnsservers []*DNSServer) {
|
func startHTTPAPI(errChan chan error, config DNSConfig, dnsservers []*DNSServer) {
|
||||||
|
@ -56,7 +56,7 @@ func TestMain(m *testing.M) {
|
|||||||
go dnsserver.Start(make(chan error, 1))
|
go dnsserver.Start(make(chan error, 1))
|
||||||
wg.Wait()
|
wg.Wait()
|
||||||
exitval := m.Run()
|
exitval := m.Run()
|
||||||
dnsserver.Server.Shutdown()
|
_ = dnsserver.Server.Shutdown()
|
||||||
DB.Close()
|
DB.Close()
|
||||||
os.Exit(exitval)
|
os.Exit(exitval)
|
||||||
}
|
}
|
||||||
|
3
types.go
3
types.go
@ -21,9 +21,6 @@ type DNSConfig struct {
|
|||||||
Logconfig logconfig
|
Logconfig logconfig
|
||||||
}
|
}
|
||||||
|
|
||||||
// Auth middleware
|
|
||||||
type authMiddleware struct{}
|
|
||||||
|
|
||||||
// Config file general section
|
// Config file general section
|
||||||
type general struct {
|
type general struct {
|
||||||
Listen string
|
Listen string
|
||||||
|
4
util.go
4
util.go
@ -59,13 +59,13 @@ func prepareConfig(conf DNSConfig) (DNSConfig, error) {
|
|||||||
|
|
||||||
func sanitizeString(s string) string {
|
func sanitizeString(s string) string {
|
||||||
// URL safe base64 alphabet without padding as defined in ACME
|
// URL safe base64 alphabet without padding as defined in ACME
|
||||||
re, _ := regexp.Compile("[^A-Za-z\\-\\_0-9]+")
|
re, _ := regexp.Compile(`[^A-Za-z\-\_0-9]+`)
|
||||||
return re.ReplaceAllString(s, "")
|
return re.ReplaceAllString(s, "")
|
||||||
}
|
}
|
||||||
|
|
||||||
func sanitizeIPv6addr(s string) string {
|
func sanitizeIPv6addr(s string) string {
|
||||||
// Remove brackets from IPv6 addresses, net.ParseCIDR needs this
|
// Remove brackets from IPv6 addresses, net.ParseCIDR needs this
|
||||||
re, _ := regexp.Compile("[\\[\\]]+")
|
re, _ := regexp.Compile(`[\[\]]+`)
|
||||||
return re.ReplaceAllString(s, "")
|
return re.ReplaceAllString(s, "")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -104,11 +104,11 @@ func TestFileCheckPermissionDenied(t *testing.T) {
|
|||||||
t.Error("Could not create temporary file")
|
t.Error("Could not create temporary file")
|
||||||
}
|
}
|
||||||
defer os.Remove(tmpfile.Name())
|
defer os.Remove(tmpfile.Name())
|
||||||
syscall.Chmod(tmpfile.Name(), 0000)
|
_ = syscall.Chmod(tmpfile.Name(), 0000)
|
||||||
if fileIsAccessible(tmpfile.Name()) {
|
if fileIsAccessible(tmpfile.Name()) {
|
||||||
t.Errorf("File should not be accessible")
|
t.Errorf("File should not be accessible")
|
||||||
}
|
}
|
||||||
syscall.Chmod(tmpfile.Name(), 0644)
|
_ = syscall.Chmod(tmpfile.Name(), 0644)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFileCheckNotExists(t *testing.T) {
|
func TestFileCheckNotExists(t *testing.T) {
|
||||||
|
@ -2,11 +2,10 @@ package main
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"unicode/utf8"
|
"unicode/utf8"
|
||||||
|
"regexp"
|
||||||
|
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"golang.org/x/crypto/bcrypt"
|
"golang.org/x/crypto/bcrypt"
|
||||||
|
|
||||||
"regexp"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func getValidUsername(u string) (uuid.UUID, error) {
|
func getValidUsername(u string) (uuid.UUID, error) {
|
||||||
@ -32,7 +31,6 @@ func validSubdomain(s string) bool {
|
|||||||
return RegExp.MatchString(s)
|
return RegExp.MatchString(s)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
func validTXT(s string) bool {
|
func validTXT(s string) bool {
|
||||||
sn := sanitizeString(s)
|
sn := sanitizeString(s)
|
||||||
if utf8.RuneCountInString(s) == 43 && utf8.RuneCountInString(sn) == 43 {
|
if utf8.RuneCountInString(s) == 43 && utf8.RuneCountInString(sn) == 43 {
|
||||||
|
Loading…
Reference in New Issue
Block a user