2019-07-31 22:56:46 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe VerifyPagesDomainService do
|
|
|
|
using RSpec::Parameterized::TableSyntax
|
|
|
|
include EmailHelpers
|
|
|
|
|
|
|
|
let(:error_status) { { status: :error, message: "Couldn't verify #{domain.domain}" } }
|
|
|
|
|
|
|
|
subject(:service) { described_class.new(domain) }
|
|
|
|
|
|
|
|
describe '#execute' do
|
2019-07-07 11:18:12 +05:30
|
|
|
where(:domain_sym, :code_sym) do
|
|
|
|
:domain | :verification_code
|
|
|
|
:domain | :keyed_verification_code
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
:verification_domain | :verification_code
|
|
|
|
:verification_domain | :keyed_verification_code
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
with_them do
|
|
|
|
let(:domain_name) { domain.send(domain_sym) }
|
|
|
|
let(:verification_code) { domain.send(code_sym) }
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
shared_examples 'verifies and enables the domain' do
|
2018-03-17 18:26:18 +05:30
|
|
|
it 'verifies and enables the domain' do
|
2019-05-30 16:15:17 +05:30
|
|
|
expect(service.execute).to eq(status: :success)
|
2019-07-07 11:18:12 +05:30
|
|
|
|
2018-03-17 18:26:18 +05:30
|
|
|
expect(domain).to be_verified
|
|
|
|
expect(domain).to be_enabled
|
2019-07-31 22:56:46 +05:30
|
|
|
expect(domain.remove_at).to be_nil
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
2019-07-07 11:18:12 +05:30
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
shared_examples 'successful enablement and verification' do
|
|
|
|
context 'when txt record contains verification code' do
|
|
|
|
before do
|
|
|
|
stub_resolver(domain_name => ['something else', verification_code])
|
|
|
|
end
|
2019-05-18 00:54:41 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
include_examples 'verifies and enables the domain'
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'when txt record contains verification code with other text' do
|
|
|
|
before do
|
|
|
|
stub_resolver(domain_name => "something #{verification_code} else")
|
|
|
|
end
|
2019-05-18 00:54:41 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
include_examples 'verifies and enables the domain'
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
shared_examples 'unverifies and disables domain' do
|
|
|
|
it 'unverifies domain' do
|
|
|
|
expect(service.execute).to eq(error_status)
|
|
|
|
expect(domain).not_to be_verified
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'disables domain and shedules it for removal in 1 week' do
|
|
|
|
service.execute
|
|
|
|
|
|
|
|
expect(domain).not_to be_enabled
|
|
|
|
|
|
|
|
expect(domain.remove_at).to be_like_time(7.days.from_now)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'when domain is disabled(or new)' do
|
|
|
|
let(:domain) { create(:pages_domain, :disabled) }
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
include_examples 'successful enablement and verification'
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
context 'when txt record does not contain verification code' do
|
|
|
|
before do
|
|
|
|
stub_resolver(domain_name => 'something else')
|
2019-07-07 11:18:12 +05:30
|
|
|
end
|
2019-07-31 22:56:46 +05:30
|
|
|
|
|
|
|
include_examples 'unverifies and disables domain'
|
2019-05-18 00:54:41 +05:30
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'when txt record does not contain verification code' do
|
|
|
|
before do
|
|
|
|
stub_resolver(domain_name => 'something else')
|
|
|
|
end
|
2019-05-18 00:54:41 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
include_examples 'unverifies and disables domain'
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when no txt records are present' do
|
|
|
|
before do
|
|
|
|
stub_resolver
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'unverifies and disables domain'
|
2019-05-18 00:54:41 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'when domain is verified' do
|
|
|
|
let(:domain) { create(:pages_domain) }
|
2019-05-30 16:15:17 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
include_examples 'successful enablement and verification'
|
2019-05-18 00:54:41 +05:30
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
shared_examples 'unverifing domain' do
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'unverifies but does not disable domain' do
|
|
|
|
expect(service.execute).to eq(error_status)
|
|
|
|
expect(domain).not_to be_verified
|
|
|
|
expect(domain).to be_enabled
|
|
|
|
end
|
2019-07-31 22:56:46 +05:30
|
|
|
|
|
|
|
it 'does not schedule domain for removal' do
|
|
|
|
service.execute
|
|
|
|
expect(domain.remove_at).to be_nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when txt record does not contain verification code' do
|
|
|
|
before do
|
|
|
|
stub_resolver(domain_name => 'something else')
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'unverifing domain'
|
2019-07-07 11:18:12 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'when no txt records are present' do
|
|
|
|
before do
|
|
|
|
stub_resolver
|
|
|
|
end
|
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
include_examples 'unverifing domain'
|
2019-07-07 11:18:12 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when domain is expired' do
|
|
|
|
let(:domain) { create(:pages_domain, :expired) }
|
|
|
|
|
|
|
|
context 'when the right code is present' do
|
|
|
|
before do
|
|
|
|
stub_resolver(domain_name => domain.keyed_verification_code)
|
|
|
|
end
|
|
|
|
|
|
|
|
include_examples 'verifies and enables the domain'
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'when the right code is not present' do
|
|
|
|
before do
|
|
|
|
stub_resolver
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
let(:error_status) { { status: :error, message: "Couldn't verify #{domain.domain}. It is now disabled." } }
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
include_examples 'unverifies and disables domain'
|
|
|
|
end
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
context 'when domain is disabled and scheduled for removal' do
|
|
|
|
let(:domain) { create(:pages_domain, :disabled, :scheduled_for_removal) }
|
|
|
|
|
|
|
|
context 'when the right code is present' do
|
|
|
|
before do
|
|
|
|
stub_resolver(domain.domain => domain.keyed_verification_code)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'verifies and enables domain' do
|
|
|
|
expect(service.execute).to eq(status: :success)
|
|
|
|
|
|
|
|
expect(domain).to be_verified
|
|
|
|
expect(domain).to be_enabled
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'prevent domain from being removed' do
|
|
|
|
expect { service.execute }.to change { domain.remove_at }.to(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the right code is not present' do
|
|
|
|
before do
|
|
|
|
stub_resolver
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'keeps domain scheduled for removal but does not change removal time' do
|
|
|
|
expect { service.execute }.not_to change { domain.remove_at }
|
|
|
|
expect(domain.remove_at).to be_present
|
2019-07-07 11:18:12 +05:30
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
end
|
2018-05-01 15:08:00 +05:30
|
|
|
|
|
|
|
context 'invalid domain' do
|
|
|
|
let(:domain) { build(:pages_domain, :expired, :with_missing_chain) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
domain.save(validate: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'can be disabled' do
|
|
|
|
error_status[:message] += '. It is now disabled.'
|
|
|
|
|
|
|
|
stub_resolver
|
|
|
|
|
|
|
|
expect(service.execute).to eq(error_status)
|
|
|
|
|
|
|
|
expect(domain).not_to be_verified
|
|
|
|
expect(domain).not_to be_enabled
|
|
|
|
end
|
|
|
|
end
|
2018-03-17 18:26:18 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'timeout behaviour' do
|
|
|
|
let(:domain) { create(:pages_domain) }
|
|
|
|
|
|
|
|
it 'sets a timeout on the DNS query' do
|
|
|
|
expect(stub_resolver).to receive(:timeouts=).with(described_class::RESOLVER_TIMEOUT_SECONDS)
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'email notifications' do
|
|
|
|
let(:notification_service) { instance_double('NotificationService') }
|
|
|
|
|
|
|
|
where(:factory, :verification_succeeds, :expected_notification) do
|
|
|
|
nil | true | nil
|
|
|
|
nil | false | :verification_failed
|
|
|
|
:reverify | true | nil
|
|
|
|
:reverify | false | :verification_failed
|
|
|
|
:unverified | true | :verification_succeeded
|
|
|
|
:unverified | false | nil
|
|
|
|
:expired | true | nil
|
|
|
|
:expired | false | :disabled
|
|
|
|
:disabled | true | :enabled
|
|
|
|
:disabled | false | nil
|
|
|
|
end
|
|
|
|
|
|
|
|
with_them do
|
|
|
|
let(:domain) { create(:pages_domain, *[factory].compact) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(service).to receive(:notification_service) { notification_service }
|
|
|
|
|
|
|
|
if verification_succeeds
|
|
|
|
stub_resolver(domain.domain => domain.verification_code)
|
|
|
|
else
|
|
|
|
stub_resolver
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'sends a notification if appropriate' do
|
|
|
|
if expected_notification
|
|
|
|
expect(notification_service).to receive(:"pages_domain_#{expected_notification}").with(domain)
|
|
|
|
end
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'pages verification disabled' do
|
|
|
|
let(:domain) { create(:pages_domain, :disabled) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_application_setting(pages_domain_verification_enabled: false)
|
|
|
|
allow(service).to receive(:notification_service) { notification_service }
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'skips email notifications' do
|
|
|
|
expect(notification_service).not_to receive(:pages_domain_enabled)
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'pages configuration updates' do
|
|
|
|
context 'enabling a disabled domain' do
|
|
|
|
let(:domain) { create(:pages_domain, :disabled) }
|
|
|
|
|
|
|
|
it 'schedules an update' do
|
|
|
|
stub_resolver(domain.domain => domain.verification_code)
|
|
|
|
|
|
|
|
expect(domain).to receive(:update_daemon)
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'verifying an enabled domain' do
|
|
|
|
let(:domain) { create(:pages_domain) }
|
|
|
|
|
|
|
|
it 'schedules an update' do
|
|
|
|
stub_resolver(domain.domain => domain.verification_code)
|
|
|
|
|
|
|
|
expect(domain).not_to receive(:update_daemon)
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'disabling an expired domain' do
|
|
|
|
let(:domain) { create(:pages_domain, :expired) }
|
|
|
|
|
|
|
|
it 'schedules an update' do
|
|
|
|
stub_resolver
|
|
|
|
|
|
|
|
expect(domain).to receive(:update_daemon)
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'failing to verify a disabled domain' do
|
|
|
|
let(:domain) { create(:pages_domain, :disabled) }
|
|
|
|
|
|
|
|
it 'does not schedule an update' do
|
|
|
|
stub_resolver
|
|
|
|
|
|
|
|
expect(domain).not_to receive(:update_daemon)
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'no verification code' do
|
|
|
|
let(:domain) { create(:pages_domain) }
|
|
|
|
|
|
|
|
it 'returns an error' do
|
|
|
|
domain.verification_code = ''
|
|
|
|
|
|
|
|
disallow_resolver!
|
|
|
|
|
|
|
|
expect(service.execute).to eq(status: :error, message: "No verification code set for #{domain.domain}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'pages domain verification is disabled' do
|
|
|
|
let(:domain) { create(:pages_domain, :disabled) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_application_setting(pages_domain_verification_enabled: false)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'extends domain validity by unconditionally reverifying' do
|
|
|
|
disallow_resolver!
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
|
|
|
|
expect(domain).to be_verified
|
|
|
|
expect(domain).to be_enabled
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not shorten any grace period' do
|
2020-05-24 23:13:21 +05:30
|
|
|
grace = Time.current + 1.year
|
2018-03-17 18:26:18 +05:30
|
|
|
domain.update!(enabled_until: grace)
|
|
|
|
disallow_resolver!
|
|
|
|
|
|
|
|
service.execute
|
|
|
|
|
|
|
|
expect(domain.enabled_until).to be_like_time(grace)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def disallow_resolver!
|
|
|
|
expect(Resolv::DNS).not_to receive(:open)
|
|
|
|
end
|
|
|
|
|
|
|
|
def stub_resolver(stubbed_lookups = {})
|
|
|
|
resolver = instance_double('Resolv::DNS')
|
|
|
|
allow(resolver).to receive(:timeouts=)
|
|
|
|
|
|
|
|
expect(Resolv::DNS).to receive(:open).and_yield(resolver)
|
|
|
|
|
|
|
|
allow(resolver).to receive(:getresources) { [] }
|
|
|
|
stubbed_lookups.each do |domain, records|
|
|
|
|
records = Array(records).map { |txt| Resolv::DNS::Resource::IN::TXT.new(txt) }
|
|
|
|
allow(resolver).to receive(:getresources).with(domain, Resolv::DNS::Resource::IN::TXT) { records }
|
|
|
|
end
|
|
|
|
|
|
|
|
resolver
|
|
|
|
end
|
|
|
|
end
|