2018-12-11 08:53:25 +11:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
describe EmailMxValidator do
|
|
|
|
describe '#validate' do
|
2023-06-22 22:55:22 +10:00
|
|
|
let(:user) { instance_double(User, email: 'foo@example.com', sign_up_ip: '1.2.3.4', errors: instance_double(ActiveModel::Errors, add: nil)) }
|
2022-02-25 03:28:23 +11:00
|
|
|
|
2023-05-04 13:49:08 +10:00
|
|
|
context 'with an e-mail domain that is explicitly allowed' do
|
2022-02-25 03:28:23 +11:00
|
|
|
around do |block|
|
|
|
|
tmp = Rails.configuration.x.email_domains_whitelist
|
|
|
|
Rails.configuration.x.email_domains_whitelist = 'example.com'
|
|
|
|
block.call
|
|
|
|
Rails.configuration.x.email_domains_whitelist = tmp
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does not add errors if there are no DNS records' do
|
2023-06-22 22:55:22 +10:00
|
|
|
resolver = instance_double(Resolv::DNS)
|
2022-02-25 03:28:23 +11:00
|
|
|
|
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::MX).and_return([])
|
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::A).and_return([])
|
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::AAAA).and_return([])
|
|
|
|
allow(resolver).to receive(:timeouts=).and_return(nil)
|
|
|
|
allow(Resolv::DNS).to receive(:open).and_yield(resolver)
|
|
|
|
|
|
|
|
subject.validate(user)
|
|
|
|
expect(user.errors).to_not have_received(:add)
|
|
|
|
end
|
2021-03-20 09:48:47 +11:00
|
|
|
end
|
|
|
|
|
2023-01-25 06:18:41 +11:00
|
|
|
it 'adds no error if there are DNS records for the e-mail domain' do
|
2023-06-22 22:55:22 +10:00
|
|
|
resolver = instance_double(Resolv::DNS)
|
2023-01-25 06:18:41 +11:00
|
|
|
|
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::MX).and_return([])
|
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::A).and_return([Resolv::DNS::Resource::IN::A.new('192.0.2.42')])
|
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::AAAA).and_return([])
|
|
|
|
allow(resolver).to receive(:timeouts=).and_return(nil)
|
|
|
|
allow(Resolv::DNS).to receive(:open).and_yield(resolver)
|
|
|
|
|
|
|
|
subject.validate(user)
|
2023-02-20 12:33:27 +11:00
|
|
|
expect(user.errors).to_not have_received(:add)
|
2023-01-25 06:18:41 +11:00
|
|
|
end
|
|
|
|
|
2023-03-05 03:00:00 +11:00
|
|
|
it 'adds an error if the TagManager fails to normalize domain' do
|
|
|
|
double = instance_double(TagManager)
|
|
|
|
allow(TagManager).to receive(:instance).and_return(double)
|
|
|
|
allow(double).to receive(:normalize_domain).with('example.com').and_raise(Addressable::URI::InvalidURIError)
|
|
|
|
|
2023-06-22 22:55:22 +10:00
|
|
|
user = instance_double(User, email: 'foo@example.com', errors: instance_double(ActiveModel::Errors, add: nil))
|
2023-03-05 03:00:00 +11:00
|
|
|
subject.validate(user)
|
|
|
|
expect(user.errors).to have_received(:add)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'adds an error if the domain email portion is blank' do
|
2023-06-22 22:55:22 +10:00
|
|
|
user = instance_double(User, email: 'foo@', errors: instance_double(ActiveModel::Errors, add: nil))
|
2023-03-05 03:00:00 +11:00
|
|
|
subject.validate(user)
|
|
|
|
expect(user.errors).to have_received(:add)
|
|
|
|
end
|
|
|
|
|
2023-01-25 06:18:41 +11:00
|
|
|
it 'adds an error if the email domain name contains empty labels' do
|
2023-06-22 22:55:22 +10:00
|
|
|
resolver = instance_double(Resolv::DNS)
|
2023-01-25 06:18:41 +11:00
|
|
|
|
|
|
|
allow(resolver).to receive(:getresources).with('example..com', Resolv::DNS::Resource::IN::MX).and_return([])
|
|
|
|
allow(resolver).to receive(:getresources).with('example..com', Resolv::DNS::Resource::IN::A).and_return([Resolv::DNS::Resource::IN::A.new('192.0.2.42')])
|
|
|
|
allow(resolver).to receive(:getresources).with('example..com', Resolv::DNS::Resource::IN::AAAA).and_return([])
|
|
|
|
allow(resolver).to receive(:timeouts=).and_return(nil)
|
|
|
|
allow(Resolv::DNS).to receive(:open).and_yield(resolver)
|
|
|
|
|
2023-06-22 22:55:22 +10:00
|
|
|
user = instance_double(User, email: 'foo@example..com', sign_up_ip: '1.2.3.4', errors: instance_double(ActiveModel::Errors, add: nil))
|
2023-01-25 06:18:41 +11:00
|
|
|
subject.validate(user)
|
|
|
|
expect(user.errors).to have_received(:add)
|
|
|
|
end
|
|
|
|
|
2018-12-11 08:53:25 +11:00
|
|
|
it 'adds an error if there are no DNS records for the e-mail domain' do
|
2023-06-22 22:55:22 +10:00
|
|
|
resolver = instance_double(Resolv::DNS)
|
2018-12-11 08:53:25 +11:00
|
|
|
|
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::MX).and_return([])
|
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::A).and_return([])
|
2019-02-13 00:48:04 +11:00
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::AAAA).and_return([])
|
2018-12-11 08:53:25 +11:00
|
|
|
allow(resolver).to receive(:timeouts=).and_return(nil)
|
|
|
|
allow(Resolv::DNS).to receive(:open).and_yield(resolver)
|
|
|
|
|
|
|
|
subject.validate(user)
|
|
|
|
expect(user.errors).to have_received(:add)
|
|
|
|
end
|
|
|
|
|
2022-02-25 03:28:23 +11:00
|
|
|
it 'adds an error if a MX record does not lead to an IP' do
|
2023-06-22 22:55:22 +10:00
|
|
|
resolver = instance_double(Resolv::DNS)
|
2018-12-11 08:53:25 +11:00
|
|
|
|
2023-06-22 22:55:22 +10:00
|
|
|
allow(resolver).to receive(:getresources)
|
|
|
|
.with('example.com', Resolv::DNS::Resource::IN::MX)
|
|
|
|
.and_return([instance_double(Resolv::DNS::Resource::MX, exchange: 'mail.example.com')])
|
2018-12-11 08:53:25 +11:00
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::A).and_return([])
|
2019-02-13 00:48:04 +11:00
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::AAAA).and_return([])
|
2018-12-11 08:53:25 +11:00
|
|
|
allow(resolver).to receive(:getresources).with('mail.example.com', Resolv::DNS::Resource::IN::A).and_return([])
|
2019-02-13 00:48:04 +11:00
|
|
|
allow(resolver).to receive(:getresources).with('mail.example.com', Resolv::DNS::Resource::IN::AAAA).and_return([])
|
2018-12-11 08:53:25 +11:00
|
|
|
allow(resolver).to receive(:timeouts=).and_return(nil)
|
|
|
|
allow(Resolv::DNS).to receive(:open).and_yield(resolver)
|
|
|
|
|
|
|
|
subject.validate(user)
|
|
|
|
expect(user.errors).to have_received(:add)
|
|
|
|
end
|
|
|
|
|
2022-02-25 03:28:23 +11:00
|
|
|
it 'adds an error if the MX record is blacklisted' do
|
2018-12-11 08:53:25 +11:00
|
|
|
EmailDomainBlock.create!(domain: 'mail.example.com')
|
2023-06-22 22:55:22 +10:00
|
|
|
resolver = instance_double(Resolv::DNS)
|
2018-12-11 08:53:25 +11:00
|
|
|
|
2023-06-22 22:55:22 +10:00
|
|
|
allow(resolver).to receive(:getresources)
|
|
|
|
.with('example.com', Resolv::DNS::Resource::IN::MX)
|
|
|
|
.and_return([instance_double(Resolv::DNS::Resource::MX, exchange: 'mail.example.com')])
|
2018-12-11 08:53:25 +11:00
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::A).and_return([])
|
2019-02-13 00:48:04 +11:00
|
|
|
allow(resolver).to receive(:getresources).with('example.com', Resolv::DNS::Resource::IN::AAAA).and_return([])
|
2023-06-22 22:55:22 +10:00
|
|
|
allow(resolver).to receive(:getresources).with('mail.example.com', Resolv::DNS::Resource::IN::A).and_return([instance_double(Resolv::DNS::Resource::IN::A, address: '2.3.4.5')])
|
|
|
|
allow(resolver).to receive(:getresources).with('mail.example.com', Resolv::DNS::Resource::IN::AAAA).and_return([instance_double(Resolv::DNS::Resource::IN::A, address: 'fd00::2')])
|
2018-12-11 08:53:25 +11:00
|
|
|
allow(resolver).to receive(:timeouts=).and_return(nil)
|
|
|
|
allow(Resolv::DNS).to receive(:open).and_yield(resolver)
|
|
|
|
|
|
|
|
subject.validate(user)
|
|
|
|
expect(user.errors).to have_received(:add)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|