|
|
|
|
@@ -273,10 +273,6 @@ func setupBaselineMocks(deps *testDeps) {
|
|
|
|
|
"ns1.example.com.",
|
|
|
|
|
"ns2.example.com.",
|
|
|
|
|
}
|
|
|
|
|
deps.resolver.allRecords["example.com"] = map[string]map[string][]string{
|
|
|
|
|
"ns1.example.com.": {"A": {"93.184.216.34"}},
|
|
|
|
|
"ns2.example.com.": {"A": {"93.184.216.34"}},
|
|
|
|
|
}
|
|
|
|
|
deps.resolver.allRecords["www.example.com"] = map[string]map[string][]string{
|
|
|
|
|
"ns1.example.com.": {"A": {"93.184.216.34"}},
|
|
|
|
|
"ns2.example.com.": {"A": {"93.184.216.34"}},
|
|
|
|
|
@@ -294,14 +290,6 @@ func setupBaselineMocks(deps *testDeps) {
|
|
|
|
|
"www.example.com",
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
deps.tlsChecker.certs["93.184.216.34:example.com"] = &tlscheck.CertificateInfo{
|
|
|
|
|
CommonName: "example.com",
|
|
|
|
|
Issuer: "DigiCert",
|
|
|
|
|
NotAfter: time.Now().Add(90 * 24 * time.Hour),
|
|
|
|
|
SubjectAlternativeNames: []string{
|
|
|
|
|
"example.com",
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func assertNoNotifications(
|
|
|
|
|
@@ -334,74 +322,14 @@ func assertStatePopulated(
|
|
|
|
|
)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Hostnames includes both explicit hostnames and domains
|
|
|
|
|
// (domains now also get hostname state for port/TLS checks).
|
|
|
|
|
if len(snap.Hostnames) < 1 {
|
|
|
|
|
if len(snap.Hostnames) != 1 {
|
|
|
|
|
t.Errorf(
|
|
|
|
|
"expected at least 1 hostname in state, got %d",
|
|
|
|
|
"expected 1 hostname in state, got %d",
|
|
|
|
|
len(snap.Hostnames),
|
|
|
|
|
)
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestDomainPortAndTLSChecks(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
|
|
cfg := defaultTestConfig(t)
|
|
|
|
|
cfg.Domains = []string{"example.com"}
|
|
|
|
|
|
|
|
|
|
w, deps := newTestWatcher(t, cfg)
|
|
|
|
|
|
|
|
|
|
deps.resolver.nsRecords["example.com"] = []string{
|
|
|
|
|
"ns1.example.com.",
|
|
|
|
|
}
|
|
|
|
|
deps.resolver.allRecords["example.com"] = map[string]map[string][]string{
|
|
|
|
|
"ns1.example.com.": {"A": {"93.184.216.34"}},
|
|
|
|
|
}
|
|
|
|
|
deps.portChecker.results["93.184.216.34:80"] = true
|
|
|
|
|
deps.portChecker.results["93.184.216.34:443"] = true
|
|
|
|
|
deps.tlsChecker.certs["93.184.216.34:example.com"] = &tlscheck.CertificateInfo{
|
|
|
|
|
CommonName: "example.com",
|
|
|
|
|
Issuer: "DigiCert",
|
|
|
|
|
NotAfter: time.Now().Add(90 * 24 * time.Hour),
|
|
|
|
|
SubjectAlternativeNames: []string{
|
|
|
|
|
"example.com",
|
|
|
|
|
},
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
w.RunOnce(t.Context())
|
|
|
|
|
|
|
|
|
|
snap := deps.state.GetSnapshot()
|
|
|
|
|
|
|
|
|
|
// Domain should have port state populated
|
|
|
|
|
if len(snap.Ports) == 0 {
|
|
|
|
|
t.Error("expected port state for domain, got none")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Domain should have certificate state populated
|
|
|
|
|
if len(snap.Certificates) == 0 {
|
|
|
|
|
t.Error("expected certificate state for domain, got none")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Verify port checker was actually called
|
|
|
|
|
deps.portChecker.mu.Lock()
|
|
|
|
|
calls := deps.portChecker.calls
|
|
|
|
|
deps.portChecker.mu.Unlock()
|
|
|
|
|
|
|
|
|
|
if calls == 0 {
|
|
|
|
|
t.Error("expected port checker to be called for domain")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Verify TLS checker was actually called
|
|
|
|
|
deps.tlsChecker.mu.Lock()
|
|
|
|
|
tlsCalls := deps.tlsChecker.calls
|
|
|
|
|
deps.tlsChecker.mu.Unlock()
|
|
|
|
|
|
|
|
|
|
if tlsCalls == 0 {
|
|
|
|
|
t.Error("expected TLS checker to be called for domain")
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
func TestNSChangeDetection(t *testing.T) {
|
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
|
|
@@ -414,12 +342,6 @@ func TestNSChangeDetection(t *testing.T) {
|
|
|
|
|
"ns1.example.com.",
|
|
|
|
|
"ns2.example.com.",
|
|
|
|
|
}
|
|
|
|
|
deps.resolver.allRecords["example.com"] = map[string]map[string][]string{
|
|
|
|
|
"ns1.example.com.": {"A": {"1.2.3.4"}},
|
|
|
|
|
"ns2.example.com.": {"A": {"1.2.3.4"}},
|
|
|
|
|
}
|
|
|
|
|
deps.portChecker.results["1.2.3.4:80"] = false
|
|
|
|
|
deps.portChecker.results["1.2.3.4:443"] = false
|
|
|
|
|
|
|
|
|
|
ctx := t.Context()
|
|
|
|
|
w.RunOnce(ctx)
|
|
|
|
|
@@ -429,10 +351,6 @@ func TestNSChangeDetection(t *testing.T) {
|
|
|
|
|
"ns1.example.com.",
|
|
|
|
|
"ns3.example.com.",
|
|
|
|
|
}
|
|
|
|
|
deps.resolver.allRecords["example.com"] = map[string]map[string][]string{
|
|
|
|
|
"ns1.example.com.": {"A": {"1.2.3.4"}},
|
|
|
|
|
"ns3.example.com.": {"A": {"1.2.3.4"}},
|
|
|
|
|
}
|
|
|
|
|
deps.resolver.mu.Unlock()
|
|
|
|
|
|
|
|
|
|
w.RunOnce(ctx)
|
|
|
|
|
@@ -601,11 +519,6 @@ func TestGracefulShutdown(t *testing.T) {
|
|
|
|
|
deps.resolver.nsRecords["example.com"] = []string{
|
|
|
|
|
"ns1.example.com.",
|
|
|
|
|
}
|
|
|
|
|
deps.resolver.allRecords["example.com"] = map[string]map[string][]string{
|
|
|
|
|
"ns1.example.com.": {"A": {"1.2.3.4"}},
|
|
|
|
|
}
|
|
|
|
|
deps.portChecker.results["1.2.3.4:80"] = false
|
|
|
|
|
deps.portChecker.results["1.2.3.4:443"] = false
|
|
|
|
|
|
|
|
|
|
ctx, cancel := context.WithCancel(t.Context())
|
|
|
|
|
|
|
|
|
|
|