forked from TrueCloudLab/lego
146 lines
3.6 KiB
Go
146 lines
3.6 KiB
Go
|
package internal
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
"io"
|
||
|
"net/http"
|
||
|
"net/http/httptest"
|
||
|
"os"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/stretchr/testify/assert"
|
||
|
"github.com/stretchr/testify/require"
|
||
|
)
|
||
|
|
||
|
func TestClient_GetRecords(t *testing.T) {
|
||
|
mux := http.NewServeMux()
|
||
|
server := httptest.NewServer(mux)
|
||
|
t.Cleanup(server.Close)
|
||
|
|
||
|
mux.HandleFunc("/dns_zones/zoneID/dns_records", func(rw http.ResponseWriter, req *http.Request) {
|
||
|
if req.Method != http.MethodGet {
|
||
|
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
auth := req.Header.Get("Authorization")
|
||
|
if auth != "Bearer tokenA" {
|
||
|
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
rw.Header().Set("Content-Type", "application/json; charset=utf-8")
|
||
|
|
||
|
file, err := os.Open("./fixtures/get_records.json")
|
||
|
if err != nil {
|
||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||
|
return
|
||
|
}
|
||
|
defer func() { _ = file.Close() }()
|
||
|
|
||
|
_, err = io.Copy(rw, file)
|
||
|
if err != nil {
|
||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||
|
return
|
||
|
}
|
||
|
})
|
||
|
|
||
|
client := NewClient("tokenA")
|
||
|
client.BaseURL = server.URL
|
||
|
|
||
|
records, err := client.GetRecords("zoneID")
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
expected := []DNSRecord{
|
||
|
{ID: "u6b433c15a27a2d79c6616d6", Hostname: "example.org", TTL: 3600, Type: "A", Value: "10.10.10.10"},
|
||
|
{ID: "u6b4764216f272872ac0ff71", Hostname: "test.example.org", TTL: 300, Type: "TXT", Value: "txtxtxtxtxtxt"},
|
||
|
}
|
||
|
|
||
|
assert.Equal(t, expected, records)
|
||
|
}
|
||
|
|
||
|
func TestClient_CreateRecord(t *testing.T) {
|
||
|
mux := http.NewServeMux()
|
||
|
server := httptest.NewServer(mux)
|
||
|
t.Cleanup(server.Close)
|
||
|
|
||
|
mux.HandleFunc("/dns_zones/zoneID/dns_records", func(rw http.ResponseWriter, req *http.Request) {
|
||
|
if req.Method != http.MethodPost {
|
||
|
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
auth := req.Header.Get("Authorization")
|
||
|
if auth != "Bearer tokenB" {
|
||
|
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
rw.Header().Set("Content-Type", "application/json; charset=utf-8")
|
||
|
rw.WriteHeader(http.StatusCreated)
|
||
|
|
||
|
file, err := os.Open("./fixtures/create_record.json")
|
||
|
if err != nil {
|
||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||
|
return
|
||
|
}
|
||
|
defer func() { _ = file.Close() }()
|
||
|
|
||
|
_, err = io.Copy(rw, file)
|
||
|
if err != nil {
|
||
|
http.Error(rw, err.Error(), http.StatusInternalServerError)
|
||
|
return
|
||
|
}
|
||
|
})
|
||
|
|
||
|
client := NewClient("tokenB")
|
||
|
client.BaseURL = server.URL
|
||
|
|
||
|
record := DNSRecord{
|
||
|
Hostname: "_acme-challenge.example.com",
|
||
|
TTL: 300,
|
||
|
Type: "TXT",
|
||
|
Value: "txtxtxtxtxtxt",
|
||
|
}
|
||
|
|
||
|
result, err := client.CreateRecord("zoneID", record)
|
||
|
require.NoError(t, err)
|
||
|
|
||
|
expected := &DNSRecord{
|
||
|
ID: "u6b4764216f272872ac0ff71",
|
||
|
Hostname: "test.example.org",
|
||
|
TTL: 300,
|
||
|
Type: "TXT",
|
||
|
Value: "txtxtxtxtxtxt",
|
||
|
}
|
||
|
|
||
|
assert.Equal(t, expected, result)
|
||
|
}
|
||
|
|
||
|
func TestClient_RemoveRecord(t *testing.T) {
|
||
|
mux := http.NewServeMux()
|
||
|
server := httptest.NewServer(mux)
|
||
|
t.Cleanup(server.Close)
|
||
|
|
||
|
mux.HandleFunc("/dns_zones/zoneID/dns_records/recordID", func(rw http.ResponseWriter, req *http.Request) {
|
||
|
if req.Method != http.MethodDelete {
|
||
|
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
auth := req.Header.Get("Authorization")
|
||
|
if auth != "Bearer tokenC" {
|
||
|
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
rw.WriteHeader(http.StatusNoContent)
|
||
|
})
|
||
|
|
||
|
client := NewClient("tokenC")
|
||
|
client.BaseURL = server.URL
|
||
|
|
||
|
err := client.RemoveRecord("zoneID", "recordID")
|
||
|
require.NoError(t, err)
|
||
|
}
|