From 30d4fce8a8e481ac7907fc2a02dca36b3cd82395 Mon Sep 17 00:00:00 2001 From: Bartosz Slawianowski Date: Tue, 16 Jul 2024 18:26:23 +0200 Subject: [PATCH] Add test case Signed-off-by: Bartosz Slawianowski --- pkg/issuer/acme/dns/azuredns/azuredns_test.go | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/pkg/issuer/acme/dns/azuredns/azuredns_test.go b/pkg/issuer/acme/dns/azuredns/azuredns_test.go index 5823bab98..7dcf94ed7 100644 --- a/pkg/issuer/acme/dns/azuredns/azuredns_test.go +++ b/pkg/issuer/acme/dns/azuredns/azuredns_test.go @@ -128,6 +128,17 @@ func TestInvalidAzureDns(t *testing.T) { assert.Error(t, err) } +func TestAuthenticationError(t *testing.T) { + provider, err := NewDNSProviderCredentials("", "invalid-client-id", "invalid-client-secret", "subid", "tenid", "rg", "example.com", util.RecursiveNameservers, false, &v1.AzureManagedIdentity{}) + assert.NoError(t, err) + + err = provider.Present(context.TODO(), "example.com", "_acme-challenge.example.com.", "123d==") + assert.Error(t, err) + + err = provider.CleanUp(context.TODO(), "example.com", "_acme-challenge.example.com.", "123d==") + assert.Error(t, err) +} + func populateFederatedToken(t *testing.T, filename string, content string) { t.Helper()