mirror of
https://github.com/koenrh/dnscontrol-action.git
synced 2025-02-24 15:04:25 +08:00
Remove tests for entrypoint script
This commit is contained in:
parent
8614c90f1d
commit
bdecc453dc
4 changed files with 0 additions and 128 deletions
5
.github/workflows/build.yml
vendored
5
.github/workflows/build.yml
vendored
|
@ -13,10 +13,5 @@ jobs:
|
|||
with:
|
||||
args: Dockerfile
|
||||
|
||||
- name: Bats
|
||||
uses: koenrh/actions/bats@master
|
||||
with:
|
||||
args: test/*.bats
|
||||
|
||||
- name: ShellCheck
|
||||
run: shellcheck entrypoint.sh
|
||||
|
|
|
@ -1,3 +0,0 @@
|
|||
#!/bin/sh
|
||||
|
||||
echo "foo"
|
|
@ -1,5 +0,0 @@
|
|||
#!/bin/sh
|
||||
|
||||
set -e
|
||||
|
||||
apt update && apt install --no-install-recommends -y jq >&2
|
|
@ -1,115 +0,0 @@
|
|||
#!/usr/bin/env bats
|
||||
|
||||
load bootstrap
|
||||
|
||||
PATH="$PATH:$BATS_TEST_DIRNAME/bin"
|
||||
|
||||
function setup() {
|
||||
export WORKSPACE="${WORKSPACE-"${BATS_TEST_DIRNAME}/.."}"
|
||||
}
|
||||
|
||||
function teardown() {
|
||||
rm creds.json
|
||||
|
||||
unset "${!CLOUDFLARE@}"
|
||||
unset "${!AWS@}"
|
||||
unset "${!DIGITALOCEAN@}"
|
||||
}
|
||||
|
||||
function assert_key_equals {
|
||||
key="$1"
|
||||
got=$(jq -r "$key" < creds.json)
|
||||
expected=$2
|
||||
|
||||
if [[ "$got" != "$expected" ]]
|
||||
then
|
||||
echo "Expected \"$got\" to equal \"$expected\""
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
function assert_key_not_exists {
|
||||
key="$1"
|
||||
path=${key%.*}
|
||||
last=${key##*.}
|
||||
got=$(jq "$path | has(\"$last\")" < creds.json)
|
||||
|
||||
if [[ "$got" == "true" ]]
|
||||
then
|
||||
echo "Expected key \"$key\" to not exist."
|
||||
return 1
|
||||
fi
|
||||
}
|
||||
|
||||
# Cloudflare
|
||||
@test "Cloudflare API token is set in credentials file" {
|
||||
export CLOUDFLARE_API_TOKEN="foo-bar-baz"
|
||||
|
||||
run "$WORKSPACE/entrypoint.sh"
|
||||
|
||||
assert_key_equals ".cloudflare.apitoken" "\$CLOUDFLARE_API_TOKEN"
|
||||
|
||||
assert_key_not_exists ".cloudflare.accountid"
|
||||
assert_key_not_exists ".cloudflare.accountname"
|
||||
}
|
||||
|
||||
@test "Cloudflare API user and key are set in credentials file" {
|
||||
export CLOUDFLARE_API_USER="info@example.com"
|
||||
export CLOUDFLARE_API_KEY="foo"
|
||||
|
||||
run "$WORKSPACE/entrypoint.sh"
|
||||
|
||||
assert_key_equals ".cloudflare.apiuser" "\$CLOUDFLARE_API_USER"
|
||||
assert_key_equals ".cloudflare.apikey" "\$CLOUDFLARE_API_KEY"
|
||||
|
||||
assert_key_not_exists ".cloudflare.accountid"
|
||||
assert_key_not_exists ".cloudflare.accountname"
|
||||
}
|
||||
|
||||
@test "Cloudflare API user and key, and optional account ID and name are set" {
|
||||
export CLOUDFLARE_API_USER="info@example.com"
|
||||
export CLOUDFLARE_API_KEY="foo"
|
||||
export CLOUDFLARE_ACCOUNT_ID="1"
|
||||
export CLOUDFLARE_ACCOUNT_NAME="Contoso"
|
||||
|
||||
run "$WORKSPACE/entrypoint.sh"
|
||||
|
||||
assert_key_equals ".cloudflare.apiuser" "\$CLOUDFLARE_API_USER"
|
||||
assert_key_equals ".cloudflare.apikey" "\$CLOUDFLARE_API_KEY"
|
||||
assert_key_equals ".cloudflare.accountid" "\$CLOUDFLARE_ACCOUNT_ID"
|
||||
assert_key_equals ".cloudflare.accountname" "\$CLOUDFLARE_ACCOUNT_NAME"
|
||||
}
|
||||
|
||||
# DigitalOcean
|
||||
@test "DigitalOcean token is set in credentials file" {
|
||||
export DIGITALOCEAN_OAUTH_TOKEN="secret"
|
||||
|
||||
run "$WORKSPACE/entrypoint.sh"
|
||||
|
||||
assert_key_equals ".digitalocean.token" "\$DIGITALOCEAN_OAUTH_TOKEN"
|
||||
}
|
||||
|
||||
# Route 53
|
||||
@test "AWS access key ID and secret access key are set in credentials file" {
|
||||
export AWS_ACCESS_KEY_ID="access_key_foo"
|
||||
export AWS_SECRET_ACCESS_KEY="very_secret"
|
||||
|
||||
run "$WORKSPACE/entrypoint.sh"
|
||||
|
||||
assert_key_equals ".r53.KeyId" "\$AWS_ACCESS_KEY_ID"
|
||||
assert_key_equals ".r53.SecretKey" "\$AWS_SECRET_ACCESS_KEY"
|
||||
|
||||
assert_key_not_exists ".r53.Token"
|
||||
}
|
||||
|
||||
@test "AWS access keys, and optional session token are set in credentials file" {
|
||||
export AWS_ACCESS_KEY_ID="access_key_foo"
|
||||
export AWS_SECRET_ACCESS_KEY="very_secret"
|
||||
export AWS_SESSION_TOKEN="session_token"
|
||||
|
||||
run "$WORKSPACE/entrypoint.sh"
|
||||
|
||||
assert_key_equals ".r53.KeyId" "\$AWS_ACCESS_KEY_ID"
|
||||
assert_key_equals ".r53.SecretKey" "\$AWS_SECRET_ACCESS_KEY"
|
||||
assert_key_equals ".r53.Token" "\$AWS_SESSION_TOKEN"
|
||||
}
|
Loading…
Reference in a new issue