require 'spec_helper' describe Dyndnsd::Daemon do include Rack::Test::Methods def app Dyndnsd.logger = Logger.new(STDOUT) Dyndnsd.logger.level = Logger::UNKNOWN config = { 'domain' => 'example.org', 'users' => { 'test' => { 'password' => 'secret', 'hosts' => ['foo.example.org', 'bar.example.org'] } } } db = Dyndnsd::DummyDatabase.new({}) updater = Dyndnsd::Updater::Dummy.new daemon = Dyndnsd::Daemon.new(config, db, updater) app = Rack::Auth::Basic.new(daemon, "DynDNS", &daemon.method(:is_authorized?)) app = Dyndnsd::Responder::DynDNSStyle.new(app) end it 'requires authentication' do get '/' expect(last_response.status).to eq(401) expect(last_response.body).to eq('badauth') end it 'requires configured correct credentials' do authorize 'test', 'wrongsecret' get '/' expect(last_response.status).to eq(401) expect(last_response.body).to eq('badauth') end it 'only supports GET requests' do authorize 'test', 'secret' post '/nic/update' expect(last_response.status).to eq(405) end it 'provides only the /nic/update URL' do authorize 'test', 'secret' get '/other/url' expect(last_response.status).to eq(404) end it 'requires the hostname query parameter' do authorize 'test', 'secret' get '/nic/update' expect(last_response).to be_ok expect(last_response.body).to eq('notfqdn') end it 'supports multiple hostnames in request' do authorize 'test', 'secret' get '/nic/update?hostname=foo.example.org,bar.example.org&myip=1.2.3.4' expect(last_response).to be_ok expect(last_response.body).to eq("good 1.2.3.4\ngood 1.2.3.4") get '/nic/update?hostname=foo.example.org,bar.example.org&myip=2001:db8::1' expect(last_response).to be_ok expect(last_response.body).to eq("good 2001:db8::1\ngood 2001:db8::1") end it 'rejects request if one hostname is invalid' do authorize 'test', 'secret' get '/nic/update?hostname=test' expect(last_response).to be_ok expect(last_response.body).to eq('notfqdn') get '/nic/update?hostname=test.example.com' expect(last_response).to be_ok expect(last_response.body).to eq('notfqdn') get '/nic/update?hostname=test.example.org.me' expect(last_response).to be_ok expect(last_response.body).to eq('notfqdn') get '/nic/update?hostname=foo.test.example.org' expect(last_response).to be_ok expect(last_response.body).to eq('notfqdn') get '/nic/update?hostname=in%20valid.example.org' expect(last_response).to be_ok expect(last_response.body).to eq('notfqdn') get '/nic/update?hostname=valid.example.org,in.valid.example.org' expect(last_response).to be_ok expect(last_response.body).to eq('notfqdn') end it 'rejects request if user does not own one hostname' do authorize 'test', 'secret' get '/nic/update?hostname=notmyhost.example.org' expect(last_response).to be_ok expect(last_response.body).to eq('nohost') get '/nic/update?hostname=foo.example.org,notmyhost.example.org' expect(last_response).to be_ok expect(last_response.body).to eq('nohost') end it 'updates a host on IP change' do authorize 'test', 'secret' get '/nic/update?hostname=foo.example.org&myip=1.2.3.4' expect(last_response).to be_ok get '/nic/update?hostname=foo.example.org&myip=1.2.3.40' expect(last_response).to be_ok expect(last_response.body).to eq('good 1.2.3.40') get '/nic/update?hostname=foo.example.org&myip=2001:db8::1' expect(last_response).to be_ok get '/nic/update?hostname=foo.example.org&myip=2001:db8::10' expect(last_response).to be_ok expect(last_response.body).to eq('good 2001:db8::10') end it 'returns IP no change' do authorize 'test', 'secret' get '/nic/update?hostname=foo.example.org&myip=1.2.3.4' expect(last_response).to be_ok get '/nic/update?hostname=foo.example.org&myip=1.2.3.4' expect(last_response).to be_ok expect(last_response.body).to eq('nochg 1.2.3.4') get '/nic/update?hostname=foo.example.org&myip=2001:db8::1' expect(last_response).to be_ok get '/nic/update?hostname=foo.example.org&myip=2001:db8::1' expect(last_response).to be_ok expect(last_response.body).to eq('nochg 2001:db8::1') end it 'outputs IP status per hostname' do authorize 'test', 'secret' get '/nic/update?hostname=foo.example.org&myip=1.2.3.4' expect(last_response).to be_ok expect(last_response.body).to eq('good 1.2.3.4') get '/nic/update?hostname=foo.example.org,bar.example.org&myip=1.2.3.4' expect(last_response).to be_ok expect(last_response.body).to eq("nochg 1.2.3.4\ngood 1.2.3.4") get '/nic/update?hostname=foo.example.org&myip=2001:db8::1' expect(last_response).to be_ok expect(last_response.body).to eq('good 2001:db8::1') get '/nic/update?hostname=foo.example.org,bar.example.org&myip=2001:db8::1' expect(last_response).to be_ok expect(last_response.body).to eq("nochg 2001:db8::1\ngood 2001:db8::1") end it 'uses clients remote IP address if myip not specified' do authorize 'test', 'secret' get '/nic/update?hostname=foo.example.org' expect(last_response).to be_ok expect(last_response.body).to eq('good 127.0.0.1') end it 'uses clients remote IP address from X-Real-IP header if behind proxy' do authorize 'test', 'secret' get '/nic/update?hostname=foo.example.org', '', 'HTTP_X_REAL_IP' => '10.0.0.1' expect(last_response).to be_ok expect(last_response.body).to eq('good 10.0.0.1') get '/nic/update?hostname=foo.example.org', '', 'HTTP_X_REAL_IP' => '2001:db8::1' expect(last_response).to be_ok expect(last_response.body).to eq('good 2001:db8::1') end it 'supports an IPv4 and an IPv6 address in one request' do authorize 'test', 'secret' get '/nic/update?hostname=foo.example.org&myip=1.2.3.4&myip6=2001:db8::1' expect(last_response).to be_ok expect(last_response.body).to eq("good 1.2.3.4 2001:db8::1") get '/nic/update?hostname=foo.example.org&myip=BROKENIP&myip6=2001:db8::1' expect(last_response).to be_ok expect(last_response.body).to eq('nohost') get '/nic/update?hostname=foo.example.org&myip=1.2.3.4&myip6=BROKENIP' expect(last_response).to be_ok expect(last_response.body).to eq('nohost') get '/nic/update?hostname=foo.example.org&myip6=2001:db8::10' expect(last_response).to be_ok expect(last_response.body).to eq('nohost') get '/nic/update?hostname=foo.example.org&myip=1.2.3.40' expect(last_response).to be_ok expect(last_response.body).to eq('good 1.2.3.40') end end