2016-02-12 10:05:17 -05:00
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
describe PagesDomain, models: true do
|
|
|
|
describe 'associations' do
|
|
|
|
it { is_expected.to belong_to(:project) }
|
|
|
|
end
|
2016-12-20 06:24:44 -05:00
|
|
|
|
2016-02-12 10:05:17 -05:00
|
|
|
describe :validate_domain do
|
|
|
|
subject { build(:pages_domain, domain: domain) }
|
|
|
|
|
|
|
|
context 'is unique' do
|
|
|
|
let(:domain) { 'my.domain.com' }
|
|
|
|
|
|
|
|
it { is_expected.to validate_uniqueness_of(:domain) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'valid domain' do
|
|
|
|
let(:domain) { 'my.domain.com' }
|
|
|
|
|
|
|
|
it { is_expected.to be_valid }
|
|
|
|
end
|
|
|
|
|
2016-12-20 06:24:44 -05:00
|
|
|
context 'valid hexadecimal-looking domain' do
|
|
|
|
let(:domain) { '0x12345.com'}
|
|
|
|
|
|
|
|
it { is_expected.to be_valid }
|
|
|
|
end
|
|
|
|
|
2016-02-12 10:05:17 -05:00
|
|
|
context 'no domain' do
|
|
|
|
let(:domain) { nil }
|
|
|
|
|
2016-05-30 04:11:46 -04:00
|
|
|
it { is_expected.not_to be_valid }
|
2016-02-12 10:05:17 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'invalid domain' do
|
|
|
|
let(:domain) { '0123123' }
|
|
|
|
|
2016-05-30 04:11:46 -04:00
|
|
|
it { is_expected.not_to be_valid }
|
2016-02-12 10:05:17 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'domain from .example.com' do
|
|
|
|
let(:domain) { 'my.domain.com' }
|
|
|
|
|
|
|
|
before { allow(Settings.pages).to receive(:host).and_return('domain.com') }
|
|
|
|
|
2016-05-30 04:11:46 -04:00
|
|
|
it { is_expected.not_to be_valid }
|
2016-02-12 10:05:17 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'validate certificate' do
|
|
|
|
subject { domain }
|
|
|
|
|
|
|
|
context 'when only certificate is specified' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_certificate) }
|
|
|
|
|
2016-05-30 04:11:46 -04:00
|
|
|
it { is_expected.not_to be_valid }
|
2016-02-12 10:05:17 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'when only key is specified' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_key) }
|
|
|
|
|
2016-05-30 04:11:46 -04:00
|
|
|
it { is_expected.not_to be_valid }
|
2016-02-12 10:05:17 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
context 'with matching key' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_certificate, :with_key) }
|
|
|
|
|
|
|
|
it { is_expected.to be_valid }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'for not matching key' do
|
2016-02-16 08:39:58 -05:00
|
|
|
let(:domain) { build(:pages_domain, :with_missing_chain, :with_key) }
|
2016-02-12 10:05:17 -05:00
|
|
|
|
2016-05-30 04:11:46 -04:00
|
|
|
it { is_expected.not_to be_valid }
|
2016-02-12 10:05:17 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe :url do
|
|
|
|
subject { domain.url }
|
|
|
|
|
|
|
|
context 'without the certificate' do
|
|
|
|
let(:domain) { build(:pages_domain) }
|
|
|
|
|
|
|
|
it { is_expected.to eq('http://my.domain.com') }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'with a certificate' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_certificate) }
|
|
|
|
|
|
|
|
it { is_expected.to eq('https://my.domain.com') }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe :has_matching_key? do
|
|
|
|
subject { domain.has_matching_key? }
|
|
|
|
|
|
|
|
context 'for matching key' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_certificate, :with_key) }
|
|
|
|
|
|
|
|
it { is_expected.to be_truthy }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'for invalid key' do
|
2016-02-16 08:39:58 -05:00
|
|
|
let(:domain) { build(:pages_domain, :with_missing_chain, :with_key) }
|
2016-02-12 10:05:17 -05:00
|
|
|
|
|
|
|
it { is_expected.to be_falsey }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe :has_intermediates? do
|
|
|
|
subject { domain.has_intermediates? }
|
|
|
|
|
|
|
|
context 'for self signed' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_certificate) }
|
|
|
|
|
|
|
|
it { is_expected.to be_truthy }
|
|
|
|
end
|
|
|
|
|
2016-02-16 08:39:58 -05:00
|
|
|
context 'for missing certificate chain' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_missing_chain) }
|
2016-02-12 10:05:17 -05:00
|
|
|
|
|
|
|
it { is_expected.to be_falsey }
|
|
|
|
end
|
2016-02-16 08:39:58 -05:00
|
|
|
|
|
|
|
context 'for trusted certificate chain' do
|
2016-02-17 04:05:26 -05:00
|
|
|
# We only validate that we can to rebuild the trust chain, for certificates
|
|
|
|
# We assume that 'AddTrustExternalCARoot' needed to validate the chain is in trusted store.
|
|
|
|
# It will be if ca-certificates is installed on Debian/Ubuntu/Alpine
|
|
|
|
|
2016-02-16 08:39:58 -05:00
|
|
|
let(:domain) { build(:pages_domain, :with_trusted_chain) }
|
|
|
|
|
|
|
|
it { is_expected.to be_truthy }
|
|
|
|
end
|
2016-02-12 10:05:17 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
describe :expired? do
|
|
|
|
subject { domain.expired? }
|
|
|
|
|
|
|
|
context 'for valid' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_certificate) }
|
|
|
|
|
|
|
|
it { is_expected.to be_falsey }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'for expired' do
|
|
|
|
let(:domain) { build(:pages_domain, :with_expired_certificate) }
|
|
|
|
|
|
|
|
it { is_expected.to be_truthy }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe :subject do
|
|
|
|
let(:domain) { build(:pages_domain, :with_certificate) }
|
|
|
|
|
|
|
|
subject { domain.subject }
|
|
|
|
|
|
|
|
it { is_expected.to eq('/CN=test-certificate') }
|
|
|
|
end
|
|
|
|
|
|
|
|
describe :certificate_text do
|
|
|
|
let(:domain) { build(:pages_domain, :with_certificate) }
|
|
|
|
|
|
|
|
subject { domain.certificate_text }
|
|
|
|
|
|
|
|
# We test only existence of output, since the output is long
|
2016-05-30 04:11:46 -04:00
|
|
|
it { is_expected.not_to be_empty }
|
2016-02-12 10:05:17 -05:00
|
|
|
end
|
|
|
|
end
|