1
0
mirror of https://github.com/go-acme/lego.git synced 2024-12-23 09:15:11 +02:00
lego/providers/dns/netlify/internal/client_test.go
2023-05-05 09:49:38 +02:00

146 lines
3.6 KiB
Go

package internal
import (
"context"
"fmt"
"io"
"net/http"
"net/http/httptest"
"net/url"
"os"
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
func setupTest(t *testing.T, token string) (*Client, *http.ServeMux) {
t.Helper()
mux := http.NewServeMux()
server := httptest.NewServer(mux)
t.Cleanup(server.Close)
client := NewClient(OAuthStaticAccessToken(server.Client(), token))
client.baseURL, _ = url.Parse(server.URL)
return client, mux
}
func TestClient_GetRecords(t *testing.T) {
client, mux := setupTest(t, "tokenA")
mux.HandleFunc("/dns_zones/zoneID/dns_records", func(rw http.ResponseWriter, req *http.Request) {
if req.Method != http.MethodGet {
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
return
}
auth := req.Header.Get("Authorization")
if auth != "Bearer tokenA" {
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
return
}
rw.Header().Set("Content-Type", "application/json; charset=utf-8")
file, err := os.Open("./fixtures/get_records.json")
if err != nil {
http.Error(rw, err.Error(), http.StatusInternalServerError)
return
}
defer func() { _ = file.Close() }()
_, err = io.Copy(rw, file)
if err != nil {
http.Error(rw, err.Error(), http.StatusInternalServerError)
return
}
})
records, err := client.GetRecords(context.Background(), "zoneID")
require.NoError(t, err)
expected := []DNSRecord{
{ID: "u6b433c15a27a2d79c6616d6", Hostname: "example.org", TTL: 3600, Type: "A", Value: "10.10.10.10"},
{ID: "u6b4764216f272872ac0ff71", Hostname: "test.example.org", TTL: 300, Type: "TXT", Value: "txtxtxtxtxtxt"},
}
assert.Equal(t, expected, records)
}
func TestClient_CreateRecord(t *testing.T) {
client, mux := setupTest(t, "tokenB")
mux.HandleFunc("/dns_zones/zoneID/dns_records", func(rw http.ResponseWriter, req *http.Request) {
if req.Method != http.MethodPost {
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
return
}
auth := req.Header.Get("Authorization")
if auth != "Bearer tokenB" {
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
return
}
rw.Header().Set("Content-Type", "application/json; charset=utf-8")
rw.WriteHeader(http.StatusCreated)
file, err := os.Open("./fixtures/create_record.json")
if err != nil {
http.Error(rw, err.Error(), http.StatusInternalServerError)
return
}
defer func() { _ = file.Close() }()
_, err = io.Copy(rw, file)
if err != nil {
http.Error(rw, err.Error(), http.StatusInternalServerError)
return
}
})
record := DNSRecord{
Hostname: "_acme-challenge.example.com",
TTL: 300,
Type: "TXT",
Value: "txtxtxtxtxtxt",
}
result, err := client.CreateRecord(context.Background(), "zoneID", record)
require.NoError(t, err)
expected := &DNSRecord{
ID: "u6b4764216f272872ac0ff71",
Hostname: "test.example.org",
TTL: 300,
Type: "TXT",
Value: "txtxtxtxtxtxt",
}
assert.Equal(t, expected, result)
}
func TestClient_RemoveRecord(t *testing.T) {
client, mux := setupTest(t, "tokenC")
mux.HandleFunc("/dns_zones/zoneID/dns_records/recordID", func(rw http.ResponseWriter, req *http.Request) {
if req.Method != http.MethodDelete {
http.Error(rw, "unsupported method", http.StatusMethodNotAllowed)
return
}
auth := req.Header.Get("Authorization")
if auth != "Bearer tokenC" {
http.Error(rw, fmt.Sprintf("invali token: %s", auth), http.StatusUnauthorized)
return
}
rw.WriteHeader(http.StatusNoContent)
})
err := client.RemoveRecord(context.Background(), "zoneID", "recordID")
require.NoError(t, err)
}