package internal import ( "context" "fmt" "io" "net/http" "net/http/httptest" "net/url" "os" "testing" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" ) func setupTest(t *testing.T, token string) (*Client, *http.ServeMux) { t.Helper() mux := http.NewServeMux() server := httptest.NewServer(mux) t.Cleanup(server.Close) client := NewClient(OAuthStaticAccessToken(server.Client(), token)) client.baseURL, _ = url.Parse(server.URL) return client, mux } func TestClient_GetRecords(t *testing.T) { client, mux := setupTest(t, "tokenA") mux.HandleFunc("/dns_zones/zoneID/dns_records", func(rw http.ResponseWriter, req *http.Request) { if req.Method != http.MethodGet { http.Error(rw, "unsupported method", http.StatusMethodNotAllowed) return } auth := req.Header.Get("Authorization") if auth != "Bearer tokenA" { http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized) return } rw.Header().Set("Content-Type", "application/json; charset=utf-8") file, err := os.Open("./fixtures/get_records.json") if err != nil { http.Error(rw, err.Error(), http.StatusInternalServerError) return } defer func() { _ = file.Close() }() _, err = io.Copy(rw, file) if err != nil { http.Error(rw, err.Error(), http.StatusInternalServerError) return } }) records, err := client.GetRecords(context.Background(), "zoneID") require.NoError(t, err) expected := []DNSRecord{ {ID: "u6b433c15a27a2d79c6616d6", Hostname: "example.org", TTL: 3600, Type: "A", Value: "10.10.10.10"}, {ID: "u6b4764216f272872ac0ff71", Hostname: "test.example.org", TTL: 300, Type: "TXT", Value: "txtxtxtxtxtxt"}, } assert.Equal(t, expected, records) } func TestClient_CreateRecord(t *testing.T) { client, mux := setupTest(t, "tokenB") mux.HandleFunc("/dns_zones/zoneID/dns_records", func(rw http.ResponseWriter, req *http.Request) { if req.Method != http.MethodPost { http.Error(rw, "unsupported method", http.StatusMethodNotAllowed) return } auth := req.Header.Get("Authorization") if auth != "Bearer tokenB" { http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized) return } rw.Header().Set("Content-Type", "application/json; charset=utf-8") rw.WriteHeader(http.StatusCreated) file, err := os.Open("./fixtures/create_record.json") if err != nil { http.Error(rw, err.Error(), http.StatusInternalServerError) return } defer func() { _ = file.Close() }() _, err = io.Copy(rw, file) if err != nil { http.Error(rw, err.Error(), http.StatusInternalServerError) return } }) record := DNSRecord{ Hostname: "_acme-challenge.example.com", TTL: 300, Type: "TXT", Value: "txtxtxtxtxtxt", } result, err := client.CreateRecord(context.Background(), "zoneID", record) require.NoError(t, err) expected := &DNSRecord{ ID: "u6b4764216f272872ac0ff71", Hostname: "test.example.org", TTL: 300, Type: "TXT", Value: "txtxtxtxtxtxt", } assert.Equal(t, expected, result) } func TestClient_RemoveRecord(t *testing.T) { client, mux := setupTest(t, "tokenC") mux.HandleFunc("/dns_zones/zoneID/dns_records/recordID", func(rw http.ResponseWriter, req *http.Request) { if req.Method != http.MethodDelete { http.Error(rw, "unsupported method", http.StatusMethodNotAllowed) return } auth := req.Header.Get("Authorization") if auth != "Bearer tokenC" { http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized) return } rw.WriteHeader(http.StatusNoContent) }) err := client.RemoveRecord(context.Background(), "zoneID", "recordID") require.NoError(t, err) }