t/check_tlsa_record.t
changeset 17 a8b89fc55a30
parent 16 f5593514ab44
child 18 936efccc64e6
--- a/t/check_tlsa_record.t	Tue May 31 16:47:06 2016 +0200
+++ b/t/check_tlsa_record.t	Tue May 31 20:50:52 2016 +0200
@@ -3,27 +3,29 @@
 use strict;
 use warnings;
 use Test::More qw(no_plan);
-use Test::Exception;
+
+BEGIN { use_ok('Nagios::Check::DNS::check_tlsa_record') };
+
+require_ok('Nagios::Check::DNS::check_tlsa_record');
 
-BEGIN { use_ok 'Nagios::Check::DNS::check_tlsa_record' => qw(dig_tlsa) };
+my $domain = 'ssl.schlittermann.de';
+
+#Test main()
+my $test_main_no_port = Nagios::Check::DNS::check_tlsa_record::main(($domain));
+like($test_main_no_port, qr(OK: .* is valid), 'main() no port');
 
-dies_ok { dig_tlsa('ssl.schlittermann.de') } 'dies on missing port number';
+my $test_main_no_tlsa = Nagios::Check::DNS::check_tlsa_record::main(('hh.schlittermann.de'));
+like($test_main_no_tlsa, qr(WARNING: .*), 'main() no SSL-Cert or no tlsa to dig');
 
-foreach (['ssl.schlittermann.de' => 443], ['mx1.mailbox.org' => 25]) {
-		my ($host, $port) = @$_;
-		is dig_tlsa($host, $port), `dig tlsa _$port._tcp.$host +short` => "TLSA for _$port._tcp.$host";
-}
+my $test_main_domain_and_port = Nagios::Check::DNS::check_tlsa_record::main(('hh.schlittermann.de', 25));
+like($test_main_domain_and_port, qr(OK: .* is valid), 'main() domain and port');
+
+my $test_main_domain_protocol_port = Nagios::Check::DNS::check_tlsa_record::main(('hh.schlittermann.de', 25, 'tcp'));
+like($test_main_domain_protocol_port, qr(OK: .* is valid), 'main() domain, protocol and port');
+
+
 
 #@TODO write tests
-#my $return = Nagios::Check::DNS::check_tlsa_record::main(($domain, $port));
-#say $return;
-
-#my $return = Nagios::Check::DNS::check_tlsa_record::main();
-#say $return;
-
-#my $return5 = Nagios::Check::DNS::check_tlsa_record::main(qw(hh.schlittermann.de 25 tcp));
-#say $return5;
-
 #my $return2 = Nagios::Check::DNS::check_tlsa_record::dig_tlsa(qw(hh.schlittermann.de 25 udp));
 #say $return2;
 #