2020-05-08 10:26:44 +00:00
|
|
|
package internal
|
|
|
|
|
|
|
|
import (
|
2023-05-05 07:49:38 +00:00
|
|
|
"context"
|
2020-05-08 10:26:44 +00:00
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
2023-05-05 07:49:38 +00:00
|
|
|
"net/url"
|
2020-05-08 10:26:44 +00:00
|
|
|
"os"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
)
|
|
|
|
|
2023-05-05 07:49:38 +00:00
|
|
|
func setupTest(t *testing.T, token string) (*Client, *http.ServeMux) {
|
|
|
|
t.Helper()
|
|
|
|
|
2020-05-08 10:26:44 +00:00
|
|
|
mux := http.NewServeMux()
|
|
|
|
server := httptest.NewServer(mux)
|
|
|
|
t.Cleanup(server.Close)
|
|
|
|
|
2023-05-05 07:49:38 +00:00
|
|
|
client := NewClient(OAuthStaticAccessToken(server.Client(), token))
|
|
|
|
client.baseURL, _ = url.Parse(server.URL)
|
|
|
|
|
|
|
|
return client, mux
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestClient_GetRecords(t *testing.T) {
|
|
|
|
client, mux := setupTest(t, "tokenA")
|
|
|
|
|
2020-05-08 10:26:44 +00:00
|
|
|
mux.HandleFunc("/dns_zones/zoneID/dns_records", func(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
if req.Method != http.MethodGet {
|
|
|
|
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
auth := req.Header.Get("Authorization")
|
|
|
|
if auth != "Bearer tokenA" {
|
|
|
|
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rw.Header().Set("Content-Type", "application/json; charset=utf-8")
|
|
|
|
|
|
|
|
file, err := os.Open("./fixtures/get_records.json")
|
|
|
|
if err != nil {
|
|
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() { _ = file.Close() }()
|
|
|
|
|
|
|
|
_, err = io.Copy(rw, file)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2023-05-05 07:49:38 +00:00
|
|
|
records, err := client.GetRecords(context.Background(), "zoneID")
|
2020-05-08 10:26:44 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
expected := []DNSRecord{
|
|
|
|
{ID: "u6b433c15a27a2d79c6616d6", Hostname: "example.org", TTL: 3600, Type: "A", Value: "10.10.10.10"},
|
|
|
|
{ID: "u6b4764216f272872ac0ff71", Hostname: "test.example.org", TTL: 300, Type: "TXT", Value: "txtxtxtxtxtxt"},
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.Equal(t, expected, records)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestClient_CreateRecord(t *testing.T) {
|
2023-05-05 07:49:38 +00:00
|
|
|
client, mux := setupTest(t, "tokenB")
|
2020-05-08 10:26:44 +00:00
|
|
|
|
|
|
|
mux.HandleFunc("/dns_zones/zoneID/dns_records", func(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
if req.Method != http.MethodPost {
|
|
|
|
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
auth := req.Header.Get("Authorization")
|
|
|
|
if auth != "Bearer tokenB" {
|
|
|
|
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rw.Header().Set("Content-Type", "application/json; charset=utf-8")
|
|
|
|
rw.WriteHeader(http.StatusCreated)
|
|
|
|
|
|
|
|
file, err := os.Open("./fixtures/create_record.json")
|
|
|
|
if err != nil {
|
|
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() { _ = file.Close() }()
|
|
|
|
|
|
|
|
_, err = io.Copy(rw, file)
|
|
|
|
if err != nil {
|
|
|
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
record := DNSRecord{
|
|
|
|
Hostname: "_acme-challenge.example.com",
|
|
|
|
TTL: 300,
|
|
|
|
Type: "TXT",
|
|
|
|
Value: "txtxtxtxtxtxt",
|
|
|
|
}
|
|
|
|
|
2023-05-05 07:49:38 +00:00
|
|
|
result, err := client.CreateRecord(context.Background(), "zoneID", record)
|
2020-05-08 10:26:44 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
expected := &DNSRecord{
|
|
|
|
ID: "u6b4764216f272872ac0ff71",
|
|
|
|
Hostname: "test.example.org",
|
|
|
|
TTL: 300,
|
|
|
|
Type: "TXT",
|
|
|
|
Value: "txtxtxtxtxtxt",
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.Equal(t, expected, result)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestClient_RemoveRecord(t *testing.T) {
|
2023-05-05 07:49:38 +00:00
|
|
|
client, mux := setupTest(t, "tokenC")
|
2020-05-08 10:26:44 +00:00
|
|
|
|
|
|
|
mux.HandleFunc("/dns_zones/zoneID/dns_records/recordID", func(rw http.ResponseWriter, req *http.Request) {
|
|
|
|
if req.Method != http.MethodDelete {
|
|
|
|
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
auth := req.Header.Get("Authorization")
|
|
|
|
if auth != "Bearer tokenC" {
|
|
|
|
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
rw.WriteHeader(http.StatusNoContent)
|
|
|
|
})
|
|
|
|
|
2023-05-05 07:49:38 +00:00
|
|
|
err := client.RemoveRecord(context.Background(), "zoneID", "recordID")
|
2020-05-08 10:26:44 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
}
|