t/check_tlsa_record.t
changeset 27 32c8d3292079
parent 26 3190e55f104b
child 39 0f95ea2ef883
--- a/t/check_tlsa_record.t	Thu Jun 16 19:52:58 2016 +0200
+++ b/t/check_tlsa_record.t	Mon Jun 20 12:26:04 2016 +0200
@@ -3,13 +3,14 @@
 use strict;
 use warnings;
 use Test::More qw(no_plan);
+
 # @TODO write tests for
 # bad-hash.dane.verisignlabs.com -> The TLSA record for this server has an incorrect hash value, although it is correctly signed with DNSSEC
 # bad-params.dane.verisignlabs.com -> The TLSA record for this server has a correct hash value, incorrect TLSA parameters, and is correctly signed with DNSSEC. NOTE: The current Firefox plugin accepts these TLSA records as valid.
 # bad-sig.dane.verisignlabs.com -> The TLSA record for this server is correct, but the DNSSEC chain-of-trust is broken and/or has a bad signature. NOTE: If you have validation enabled you won't be able to look up the hostname anyway.
 # source: http://dane.verisignlabs.com/
 
-BEGIN { use_ok('Nagios::Check::DNS::check_tlsa_record') };
+BEGIN { use_ok('Nagios::Check::DNS::check_tlsa_record') }
 
 require_ok('Nagios::Check::DNS::check_tlsa_record');
 
@@ -17,27 +18,52 @@
 my $domain  = 'ssl.schlittermann.de';
 my $domain2 = 'torproject.org';
 my $domain3 = 'freebsd.org';
-my $domain4 = 'bad-hash.dane.verisignlabs.com'; # The TLSA record for this server has an incorrect hash value, although it is correctly signed with DNSSEC
+my $domain4 = 'bad-hash.dane.verisignlabs.com'
+  ; # The TLSA record for this server has an incorrect hash value, although it is correctly signed with DNSSEC
 
 #smtpdomains
 my $sdomain = 'hh.schlittermann.de';
 
+sub test_main() {
+    my $test_main_default_port =
+      Nagios::Check::DNS::check_tlsa_record::main(($domain));
+    like(
+        $test_main_default_port,
+        qr(OK: .* is valid),
+        'main() ok with domain and default port 443'
+    );
 
-sub test_main() {
- my $test_main_default_port = Nagios::Check::DNS::check_tlsa_record::main(($domain));
- like($test_main_default_port, qr(OK: .* is valid), 'main() ok with domain and default port 443');
-
- my $test_main_domain_and_port = Nagios::Check::DNS::check_tlsa_record::main(($sdomain, 25));
- like($test_main_domain_and_port, qr(OK: .* is valid), 'main() ok with domain and port');
+    my $test_main_domain_and_port =
+      Nagios::Check::DNS::check_tlsa_record::main(($sdomain, 25));
+    like(
+        $test_main_domain_and_port,
+        qr(OK: .* is valid),
+        'main() ok with domain and port'
+    );
 
- my $test_main_domain_port_protocol = Nagios::Check::DNS::check_tlsa_record::main(($domain3, 443, 'tcp'));
- like($test_main_domain_port_protocol, qr(OK: .* is valid), 'main() ok with domain, port and protocol');
+    my $test_main_domain_port_protocol =
+      Nagios::Check::DNS::check_tlsa_record::main(($domain3, 443, 'tcp'));
+    like(
+        $test_main_domain_port_protocol,
+        qr(OK: .* is valid),
+        'main() ok with domain, port and protocol'
+    );
 
- my $test_main_no_tlsa = Nagios::Check::DNS::check_tlsa_record::main(('google.com'));
- like($test_main_no_tlsa, qr(WARNING: .*), 'main() warning when no SSL-Certificate  or no TLSA-Record/DANE is available');
+    my $test_main_no_tlsa =
+      Nagios::Check::DNS::check_tlsa_record::main(('google.com'));
+    like(
+        $test_main_no_tlsa,
+        qr(WARNING: .*),
+'main() warning when no SSL-Certificate  or no TLSA-Record/DANE is available'
+    );
 
-  my $test_main_default_port2 = Nagios::Check::DNS::check_tlsa_record::main(($domain4));
-  like($test_main_default_port2, qr(CRITICAL: .* valid), 'main() critical when DANE not valid.');
+    my $test_main_default_port2 =
+      Nagios::Check::DNS::check_tlsa_record::main(($domain4));
+    like(
+        $test_main_default_port2,
+        qr(CRITICAL: .* valid),
+        'main() critical when DANE not valid.'
+    );
 
 }
 
@@ -50,10 +76,9 @@
 #}
 
 test_main();
+
 #test_dig();
 
-
-
 #@TODO write tests
 #my $return2 = Nagios::Check::DNS::check_tlsa_record::dig_tlsa(qw(hh.schlittermann.de 25 udp));
 #say $return2;
@@ -64,6 +89,4 @@
 #my $return4 = Nagios::Check::DNS::check_tlsa_record::dig_tlsa(qw(hh.schlittermann.de));
 #say $return4;
 
-
-
 # vim: ft=perl ts=2 sw=2