dnscontrol/pkg/cloudflare-go/per_hostname_tls_settings_test.go
Tom Limoncelli 7fd6a74e0c
CLOUDFLAREAPI: CF_REDIRECT/CF_TEMP_REDIRECT should dtrt using Single Redirects (#3002)
Co-authored-by: Josh Zhang <jzhang1@stackoverflow.com>
2024-06-18 17:38:50 -04:00

273 lines
7.3 KiB
Go

package cloudflare
import (
"context"
"fmt"
"net/http"
"testing"
"time"
"github.com/stretchr/testify/assert"
)
func TestListHostnameTLSSettingsMinTLSVersion(t *testing.T) {
setup()
defer teardown()
handler := func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("content-type", "application/json")
fmt.Fprint(w, `{
"success": true,
"errors": [],
"messages": [],
"result": [
{
"hostname": "app.example.com",
"value": "1.2",
"status": "active",
"created_at": "2023-07-26T21:12:55.56942Z",
"updated_at": "2023-07-31T22:06:44.739794Z"
}
],
"result_info": {
"page": 1,
"per_page": 50,
"count": 1,
"total_count": 1,
"total_pages": 1
}
}`)
}
mux.HandleFunc("/zones/"+testZoneID+"/hostnames/settings/min_tls_version", handler)
createdAt, _ := time.Parse(time.RFC3339, "2023-07-26T21:12:55.56942Z")
updatedAt, _ := time.Parse(time.RFC3339, "2023-07-31T22:06:44.739794Z")
want := []HostnameTLSSetting{
{
Hostname: "app.example.com",
Value: "1.2",
Status: "active",
CreatedAt: &createdAt,
UpdatedAt: &updatedAt,
},
}
actual, _, err := client.ListHostnameTLSSettings(context.Background(), ZoneIdentifier(testZoneID), ListHostnameTLSSettingsParams{Setting: "min_tls_version"})
if assert.NoError(t, err) {
assert.Equal(t, want, actual)
}
}
func TestUpdateHostnameTLSSettingMinTLSVersion(t *testing.T) {
setup()
defer teardown()
handler := func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("content-type", "application/json")
fmt.Fprint(w, `{
"success": true,
"errors": [],
"messages": [],
"result": {
"hostname": "app.example.com",
"value": "1.2",
"status": "active",
"created_at": "2023-07-26T21:12:55.56942Z",
"updated_at": "2023-07-31T22:06:44.739794Z"
}
}`)
}
mux.HandleFunc("/zones/"+testZoneID+"/hostnames/settings/min_tls_version/app.example.com", handler)
createdAt, _ := time.Parse(time.RFC3339, "2023-07-26T21:12:55.56942Z")
updatedAt, _ := time.Parse(time.RFC3339, "2023-07-31T22:06:44.739794Z")
want := HostnameTLSSetting{
Hostname: "app.example.com",
Value: "1.2",
Status: "active",
CreatedAt: &createdAt,
UpdatedAt: &updatedAt,
}
params := UpdateHostnameTLSSettingParams{
Setting: "min_tls_version",
Hostname: "app.example.com",
Value: "1.2",
}
actual, err := client.UpdateHostnameTLSSetting(context.Background(), ZoneIdentifier(testZoneID), params)
if assert.NoError(t, err) {
assert.Equal(t, want, actual)
}
}
func TestDeleteHostnameTLSSettingMinTLSVersion(t *testing.T) {
setup()
defer teardown()
handler := func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("content-type", "application/json")
fmt.Fprint(w, `{
"success": true,
"errors": [],
"messages": [],
"result": {
"hostname": "app.example.com",
"value": "",
"status": "active",
"created_at": "2023-07-26T21:12:55.56942Z",
"updated_at": "2023-07-31T22:06:44.739794Z"
}
}`)
}
mux.HandleFunc("/zones/"+testZoneID+"/hostnames/settings/min_tls_version/app.example.com", handler)
createdAt, _ := time.Parse(time.RFC3339, "2023-07-26T21:12:55.56942Z")
updatedAt, _ := time.Parse(time.RFC3339, "2023-07-31T22:06:44.739794Z")
want := HostnameTLSSetting{
Hostname: "app.example.com",
Value: "",
Status: "active",
CreatedAt: &createdAt,
UpdatedAt: &updatedAt,
}
actual, err := client.DeleteHostnameTLSSetting(context.Background(), ZoneIdentifier(testZoneID), DeleteHostnameTLSSettingParams{Setting: "min_tls_version", Hostname: "app.example.com"})
if assert.NoError(t, err) {
assert.Equal(t, want, actual)
}
}
func TestListHostnameTLSSettingsCiphers(t *testing.T) {
setup()
defer teardown()
handler := func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("content-type", "application/json")
fmt.Fprint(w, `{
"success": true,
"errors": [],
"messages": [],
"result": [
{
"hostname": "app.example.com",
"value": [
"AES128-GCM-SHA256",
"ECDHE-RSA-AES128-GCM-SHA256"
],
"status": "active",
"created_at": "2023-07-26T21:12:55.56942Z",
"updated_at": "2023-07-31T22:06:44.739794Z"
}
],
"result_info": {
"page": 1,
"per_page": 50,
"count": 1,
"total_count": 1,
"total_pages": 1
}
}`)
}
mux.HandleFunc("/zones/"+testZoneID+"/hostnames/settings/ciphers", handler)
createdAt, _ := time.Parse(time.RFC3339, "2023-07-26T21:12:55.56942Z")
updatedAt, _ := time.Parse(time.RFC3339, "2023-07-31T22:06:44.739794Z")
want := []HostnameTLSSettingCiphers{
{
Hostname: "app.example.com",
Value: []string{"AES128-GCM-SHA256", "ECDHE-RSA-AES128-GCM-SHA256"},
Status: "active",
CreatedAt: &createdAt,
UpdatedAt: &updatedAt,
},
}
actual, _, err := client.ListHostnameTLSSettingsCiphers(context.Background(), ZoneIdentifier(testZoneID), ListHostnameTLSSettingsCiphersParams{})
if assert.NoError(t, err) {
assert.Equal(t, want, actual)
}
}
func TestUpdateHostnameTLSSettingCiphers(t *testing.T) {
setup()
defer teardown()
handler := func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("content-type", "application/json")
fmt.Fprint(w, `{
"success": true,
"errors": [],
"messages": [],
"result": {
"hostname": "app.example.com",
"value": [
"AES128-GCM-SHA256",
"ECDHE-RSA-AES128-GCM-SHA256"
],
"status": "active",
"created_at": "2023-07-26T21:12:55.56942Z",
"updated_at": "2023-07-31T22:06:44.739794Z"
}
}`)
}
mux.HandleFunc("/zones/"+testZoneID+"/hostnames/settings/ciphers/app.example.com", handler)
createdAt, _ := time.Parse(time.RFC3339, "2023-07-26T21:12:55.56942Z")
updatedAt, _ := time.Parse(time.RFC3339, "2023-07-31T22:06:44.739794Z")
want := HostnameTLSSettingCiphers{
Hostname: "app.example.com",
Value: []string{"AES128-GCM-SHA256", "ECDHE-RSA-AES128-GCM-SHA256"},
Status: "active",
CreatedAt: &createdAt,
UpdatedAt: &updatedAt,
}
params := UpdateHostnameTLSSettingCiphersParams{
Hostname: "app.example.com",
Value: []string{"AES128-GCM-SHA256", "ECDHE-RSA-AES128-GCM-SHA256"},
}
actual, err := client.UpdateHostnameTLSSettingCiphers(context.Background(), ZoneIdentifier(testZoneID), params)
if assert.NoError(t, err) {
assert.Equal(t, want, actual)
}
}
func TestDeleteHostnameTLSSettingCiphers(t *testing.T) {
setup()
defer teardown()
handler := func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("content-type", "application/json")
fmt.Fprint(w, `{
"success": true,
"errors": [],
"messages": [],
"result": {
"hostname": "app.example.com",
"value": "",
"status": "active",
"created_at": "2023-07-26T21:12:55.56942Z",
"updated_at": "2023-07-31T22:06:44.739794Z"
}
}`)
}
mux.HandleFunc("/zones/"+testZoneID+"/hostnames/settings/ciphers/app.example.com", handler)
createdAt, _ := time.Parse(time.RFC3339, "2023-07-26T21:12:55.56942Z")
updatedAt, _ := time.Parse(time.RFC3339, "2023-07-31T22:06:44.739794Z")
want := HostnameTLSSettingCiphers{
Hostname: "app.example.com",
Value: []string{},
Status: "active",
CreatedAt: &createdAt,
UpdatedAt: &updatedAt,
}
actual, err := client.DeleteHostnameTLSSettingCiphers(context.Background(), ZoneIdentifier(testZoneID), DeleteHostnameTLSSettingCiphersParams{Hostname: "app.example.com"})
if assert.NoError(t, err) {
assert.Equal(t, want, actual)
}
}