mirror of
https://github.com/internetee/registry.git
synced 2025-06-04 11:47:30 +02:00
Merge pull request #1902 from internetee/1900-removing-registry-lock-should-not-remove-statuses-set-prior-to-setting-it
implement domain statuses restore after domain locked, added test
This commit is contained in:
commit
f6fcf15fff
14 changed files with 171 additions and 10 deletions
|
@ -2,10 +2,12 @@ module Domains
|
||||||
module CancelForceDelete
|
module CancelForceDelete
|
||||||
class RemoveForceDeleteStatuses < Base
|
class RemoveForceDeleteStatuses < Base
|
||||||
def execute
|
def execute
|
||||||
domain.statuses.delete(DomainStatus::FORCE_DELETE)
|
domain_statuses = [DomainStatus::FORCE_DELETE,
|
||||||
domain.statuses.delete(DomainStatus::SERVER_RENEW_PROHIBITED)
|
DomainStatus::SERVER_RENEW_PROHIBITED,
|
||||||
domain.statuses.delete(DomainStatus::SERVER_TRANSFER_PROHIBITED)
|
DomainStatus::SERVER_TRANSFER_PROHIBITED,
|
||||||
domain.statuses.delete(DomainStatus::CLIENT_HOLD)
|
DomainStatus::CLIENT_HOLD]
|
||||||
|
rejected_statuses = domain.statuses.reject { |a| domain_statuses.include? a }
|
||||||
|
domain.statuses = rejected_statuses
|
||||||
domain.save(validate: false)
|
domain.save(validate: false)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -2,8 +2,10 @@ module Domains
|
||||||
module CancelForceDelete
|
module CancelForceDelete
|
||||||
class RestoreStatusesBeforeForceDelete < Base
|
class RestoreStatusesBeforeForceDelete < Base
|
||||||
def execute
|
def execute
|
||||||
domain.statuses = domain.statuses_before_force_delete
|
# domain.statuses = domain.statuses_before_force_delete
|
||||||
|
domain.statuses = domain.force_delete_domain_statuses_history || []
|
||||||
domain.statuses_before_force_delete = nil
|
domain.statuses_before_force_delete = nil
|
||||||
|
domain.force_delete_domain_statuses_history = nil
|
||||||
domain.save(validate: false)
|
domain.save(validate: false)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -6,6 +6,7 @@ module Domains
|
||||||
DomainStatus::SERVER_TRANSFER_PROHIBITED].freeze
|
DomainStatus::SERVER_TRANSFER_PROHIBITED].freeze
|
||||||
|
|
||||||
def execute
|
def execute
|
||||||
|
domain.force_delete_domain_statuses_history = domain.statuses
|
||||||
domain.statuses_before_force_delete = domain.statuses
|
domain.statuses_before_force_delete = domain.statuses
|
||||||
domain.statuses |= STATUSES_TO_SET
|
domain.statuses |= STATUSES_TO_SET
|
||||||
domain.save(validate: false)
|
domain.save(validate: false)
|
||||||
|
|
|
@ -1,6 +1,10 @@
|
||||||
module Domain::ForceDelete # rubocop:disable Metrics/ModuleLength
|
module Domain::ForceDelete # rubocop:disable Metrics/ModuleLength
|
||||||
extend ActiveSupport::Concern
|
extend ActiveSupport::Concern
|
||||||
|
|
||||||
|
FORCE_DELETE_STATUSES = [DomainStatus::FORCE_DELETE,
|
||||||
|
DomainStatus::SERVER_RENEW_PROHIBITED,
|
||||||
|
DomainStatus::SERVER_TRANSFER_PROHIBITED].freeze
|
||||||
|
|
||||||
included do
|
included do
|
||||||
store_accessor :force_delete_data,
|
store_accessor :force_delete_data,
|
||||||
:force_delete_type,
|
:force_delete_type,
|
||||||
|
@ -52,6 +56,7 @@ module Domain::ForceDelete # rubocop:disable Metrics/ModuleLength
|
||||||
|
|
||||||
def cancel_force_delete
|
def cancel_force_delete
|
||||||
Domains::CancelForceDelete::CancelForceDelete.run(domain: self)
|
Domains::CancelForceDelete::CancelForceDelete.run(domain: self)
|
||||||
|
# self.statuses = force_delete_domain_statuses_history
|
||||||
end
|
end
|
||||||
|
|
||||||
def outzone_date
|
def outzone_date
|
||||||
|
|
|
@ -36,9 +36,10 @@ module Domain::RegistryLockable
|
||||||
|
|
||||||
transaction do
|
transaction do
|
||||||
LOCK_STATUSES.each do |domain_status|
|
LOCK_STATUSES.each do |domain_status|
|
||||||
statuses.delete(domain_status)
|
statuses.delete([domain_status])
|
||||||
end
|
end
|
||||||
self.locked_by_registrant_at = nil
|
self.locked_by_registrant_at = nil
|
||||||
|
self.statuses = admin_store_statuses_history || []
|
||||||
alert_registrar_lock_changes!(lock: false)
|
alert_registrar_lock_changes!(lock: false)
|
||||||
|
|
||||||
save!
|
save!
|
||||||
|
|
|
@ -12,10 +12,18 @@ class Domain < ApplicationRecord
|
||||||
include Domain::Disputable
|
include Domain::Disputable
|
||||||
include Domain::BulkUpdatable
|
include Domain::BulkUpdatable
|
||||||
|
|
||||||
|
LOCK_STATUSES = [DomainStatus::SERVER_UPDATE_PROHIBITED,
|
||||||
|
DomainStatus::SERVER_DELETE_PROHIBITED,
|
||||||
|
DomainStatus::SERVER_TRANSFER_PROHIBITED].freeze
|
||||||
|
|
||||||
attr_accessor :roles
|
attr_accessor :roles
|
||||||
|
|
||||||
attr_accessor :legal_document_id
|
attr_accessor :legal_document_id
|
||||||
|
|
||||||
|
store_accessor :json_statuses_history,
|
||||||
|
:force_delete_domain_statuses_history,
|
||||||
|
:admin_store_statuses_history
|
||||||
|
|
||||||
alias_attribute :on_hold_time, :outzone_at
|
alias_attribute :on_hold_time, :outzone_at
|
||||||
alias_attribute :outzone_time, :outzone_at
|
alias_attribute :outzone_time, :outzone_at
|
||||||
alias_attribute :auth_info, :transfer_code # Old attribute name; for PaperTrail
|
alias_attribute :auth_info, :transfer_code # Old attribute name; for PaperTrail
|
||||||
|
@ -551,8 +559,23 @@ class Domain < ApplicationRecord
|
||||||
statuses.include?(DomainStatus::FORCE_DELETE)
|
statuses.include?(DomainStatus::FORCE_DELETE)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def update_unless_locked_by_registrant(update)
|
||||||
|
update(admin_store_statuses_history: update) unless locked_by_registrant?
|
||||||
|
end
|
||||||
|
|
||||||
|
def update_not_by_locked_statuses(update)
|
||||||
|
return unless locked_by_registrant?
|
||||||
|
|
||||||
|
result = update.reject { |status| LOCK_STATUSES.include? status }
|
||||||
|
update(admin_store_statuses_history: result)
|
||||||
|
end
|
||||||
|
|
||||||
# special handling for admin changing status
|
# special handling for admin changing status
|
||||||
def admin_status_update(update)
|
def admin_status_update(update)
|
||||||
|
update_unless_locked_by_registrant(update)
|
||||||
|
|
||||||
|
update_not_by_locked_statuses(update)
|
||||||
|
|
||||||
# check for deleted status
|
# check for deleted status
|
||||||
statuses.each do |s|
|
statuses.each do |s|
|
||||||
unless update.include? s
|
unless update.include? s
|
||||||
|
|
|
@ -0,0 +1,13 @@
|
||||||
|
class TransferDomainStatusesBeforeForceDeleteToJsonHistory < ActiveRecord::Migration[6.0]
|
||||||
|
def up
|
||||||
|
domains = Domain.where.not(statuses_before_force_delete: nil)
|
||||||
|
domains.each do |domain|
|
||||||
|
domain.force_delete_domain_statuses_history = domain.statuses_before_force_delete
|
||||||
|
domain.save
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def down
|
||||||
|
# raise ActiveRecord::IrreversibleMigration
|
||||||
|
end
|
||||||
|
end
|
|
@ -0,0 +1,13 @@
|
||||||
|
class TransferDataFromDomainStatusesToAdminStatusHistory < ActiveRecord::Migration[6.0]
|
||||||
|
def up
|
||||||
|
domains = Domain.all.select { |d| !d.locked_by_registrant?}
|
||||||
|
domains.each do |domain|
|
||||||
|
domain.admin_store_statuses_history = domain.statuses
|
||||||
|
domain.save
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def down
|
||||||
|
# raise ActiveRecord::IrreversibleMigration
|
||||||
|
end
|
||||||
|
end
|
|
@ -1,2 +1,2 @@
|
||||||
# encoding: UTF-8
|
# encoding: UTF-8
|
||||||
DataMigrate::Data.define(version: 20201007104651)
|
DataMigrate::Data.define(version: 20210407140317)
|
||||||
|
|
|
@ -0,0 +1,6 @@
|
||||||
|
class AddJsonStatusesHistoryFieldToDomain < ActiveRecord::Migration[6.0]
|
||||||
|
def change
|
||||||
|
add_column :domains, :json_statuses_history, :jsonb
|
||||||
|
add_index :domains, :json_statuses_history, using: :gin
|
||||||
|
end
|
||||||
|
end
|
|
@ -843,7 +843,8 @@ CREATE TABLE public.domains (
|
||||||
uuid uuid DEFAULT public.gen_random_uuid() NOT NULL,
|
uuid uuid DEFAULT public.gen_random_uuid() NOT NULL,
|
||||||
locked_by_registrant_at timestamp without time zone,
|
locked_by_registrant_at timestamp without time zone,
|
||||||
force_delete_start timestamp without time zone,
|
force_delete_start timestamp without time zone,
|
||||||
force_delete_data public.hstore
|
force_delete_data public.hstore,
|
||||||
|
json_statuses_history jsonb
|
||||||
);
|
);
|
||||||
|
|
||||||
|
|
||||||
|
@ -4124,6 +4125,17 @@ CREATE INDEX index_domain_transfers_on_domain_id ON public.domain_transfers USIN
|
||||||
CREATE INDEX index_domains_on_delete_date ON public.domains USING btree (delete_date);
|
CREATE INDEX index_domains_on_delete_date ON public.domains USING btree (delete_date);
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
-- Name: index_domains_on_json_statuses_history; Type: INDEX; Schema: public; Owner: -
|
||||||
|
--
|
||||||
|
|
||||||
|
CREATE INDEX index_domains_on_json_statuses_history ON public.domains USING gin (json_statuses_history);
|
||||||
|
|
||||||
|
|
||||||
|
--
|
||||||
|
-- Name: index_domains_on_name; Type: INDEX; Schema: public; Owner: -
|
||||||
|
|
||||||
|
|
||||||
--
|
--
|
||||||
-- Name: index_domains_on_name; Type: INDEX; Schema: public; Owner: -; Tablespace:
|
-- Name: index_domains_on_name; Type: INDEX; Schema: public; Owner: -; Tablespace:
|
||||||
--
|
--
|
||||||
|
@ -5301,4 +5313,5 @@ INSERT INTO "schema_migrations" (version) VALUES
|
||||||
('20200916125326'),
|
('20200916125326'),
|
||||||
('20200917104213'),
|
('20200917104213'),
|
||||||
('20210215101019'),
|
('20210215101019'),
|
||||||
('20200921084356');
|
('20200921084356'),
|
||||||
|
('20210405100631');
|
||||||
|
|
|
@ -12,6 +12,29 @@ class ForceDeleteTest < ActionMailer::TestCase
|
||||||
Truemail.configure.default_validation_type = @old_validation_type
|
Truemail.configure.default_validation_type = @old_validation_type
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def test_restore_domain_statuses_after_soft_force_delete
|
||||||
|
@domain.update(statuses: [DomainStatus::SERVER_RENEW_PROHIBITED])
|
||||||
|
@domain.schedule_force_delete(type: :soft)
|
||||||
|
|
||||||
|
assert @domain.force_delete_scheduled?
|
||||||
|
|
||||||
|
assert @domain.force_delete_domain_statuses_history.include? DomainStatus::SERVER_RENEW_PROHIBITED
|
||||||
|
|
||||||
|
@domain.cancel_force_delete
|
||||||
|
assert @domain.statuses.include? DomainStatus::SERVER_RENEW_PROHIBITED
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_clear_force_delete_domain_statuses_history
|
||||||
|
@domain.update(statuses: [DomainStatus::SERVER_RENEW_PROHIBITED])
|
||||||
|
@domain.schedule_force_delete(type: :soft)
|
||||||
|
|
||||||
|
assert @domain.force_delete_scheduled?
|
||||||
|
assert @domain.force_delete_domain_statuses_history.include? DomainStatus::SERVER_RENEW_PROHIBITED
|
||||||
|
@domain.cancel_force_delete
|
||||||
|
|
||||||
|
assert_nil @domain.force_delete_domain_statuses_history
|
||||||
|
end
|
||||||
|
|
||||||
def test_schedules_force_delete_fast_track
|
def test_schedules_force_delete_fast_track
|
||||||
assert_not @domain.force_delete_scheduled?
|
assert_not @domain.force_delete_scheduled?
|
||||||
travel_to Time.zone.parse('2010-07-05')
|
travel_to Time.zone.parse('2010-07-05')
|
||||||
|
|
|
@ -3,7 +3,6 @@ require 'test_helper'
|
||||||
class DomainRegistryLockableTest < ActiveSupport::TestCase
|
class DomainRegistryLockableTest < ActiveSupport::TestCase
|
||||||
def setup
|
def setup
|
||||||
super
|
super
|
||||||
|
|
||||||
@domain = domains(:airport)
|
@domain = domains(:airport)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -33,6 +32,56 @@ class DomainRegistryLockableTest < ActiveSupport::TestCase
|
||||||
assert_not(@domain.locked_by_registrant?)
|
assert_not(@domain.locked_by_registrant?)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def test_remove_lockalable_statuses_after_admin_intervention
|
||||||
|
@domain.apply_registry_lock
|
||||||
|
assert @domain.locked_by_registrant?
|
||||||
|
assert_equal @domain.statuses.sort, Domain::RegistryLockable::LOCK_STATUSES.sort
|
||||||
|
|
||||||
|
deleted_status = @domain.statuses - [DomainStatus::SERVER_DELETE_PROHIBITED]
|
||||||
|
@domain.update(statuses: deleted_status)
|
||||||
|
assert_not @domain.locked_by_registrant?
|
||||||
|
|
||||||
|
@domain.apply_registry_lock
|
||||||
|
assert @domain.locked_by_registrant?
|
||||||
|
@domain.remove_registry_lock
|
||||||
|
|
||||||
|
assert_not @domain.statuses.include? DomainStatus::SERVER_UPDATE_PROHIBITED
|
||||||
|
assert_not @domain.statuses.include? DomainStatus::SERVER_TRANSFER_PROHIBITED
|
||||||
|
assert_not @domain.statuses.include? DomainStatus::SERVER_DELETE_PROHIBITED
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_restore_domain_statuses_after_unlock
|
||||||
|
@domain.statuses = [DomainStatus::SERVER_UPDATE_PROHIBITED]
|
||||||
|
@domain.admin_store_statuses_history = [DomainStatus::SERVER_UPDATE_PROHIBITED]
|
||||||
|
@domain.save
|
||||||
|
assert @domain.admin_store_statuses_history.include? DomainStatus::SERVER_UPDATE_PROHIBITED
|
||||||
|
|
||||||
|
@domain.apply_registry_lock
|
||||||
|
assert @domain.locked_by_registrant?
|
||||||
|
assert_equal @domain.statuses.sort, Domain::RegistryLockable::LOCK_STATUSES.sort
|
||||||
|
|
||||||
|
@domain.remove_registry_lock
|
||||||
|
assert @domain.statuses.include? DomainStatus::SERVER_UPDATE_PROHIBITED
|
||||||
|
assert_not @domain.statuses.include? DomainStatus::SERVER_TRANSFER_PROHIBITED
|
||||||
|
assert_not @domain.statuses.include? DomainStatus::SERVER_DELETE_PROHIBITED
|
||||||
|
end
|
||||||
|
|
||||||
|
def test_add_additinal_status_for_locked_domain
|
||||||
|
@domain.apply_registry_lock
|
||||||
|
assert @domain.locked_by_registrant?
|
||||||
|
assert_equal @domain.statuses.sort, Domain::RegistryLockable::LOCK_STATUSES.sort
|
||||||
|
|
||||||
|
@domain.statuses += [DomainStatus::SERVER_RENEW_PROHIBITED]
|
||||||
|
@domain.admin_store_statuses_history = [DomainStatus::SERVER_RENEW_PROHIBITED]
|
||||||
|
@domain.save
|
||||||
|
|
||||||
|
@domain.remove_registry_lock
|
||||||
|
assert @domain.statuses.include? DomainStatus::SERVER_RENEW_PROHIBITED
|
||||||
|
assert_not @domain.statuses.include? DomainStatus::SERVER_UPDATE_PROHIBITED
|
||||||
|
assert_not @domain.statuses.include? DomainStatus::SERVER_TRANSFER_PROHIBITED
|
||||||
|
assert_not @domain.statuses.include? DomainStatus::SERVER_DELETE_PROHIBITED
|
||||||
|
end
|
||||||
|
|
||||||
def test_registry_lock_on_lockable_domain
|
def test_registry_lock_on_lockable_domain
|
||||||
refute(@domain.locked_by_registrant?)
|
refute(@domain.locked_by_registrant?)
|
||||||
@domain.apply_registry_lock
|
@domain.apply_registry_lock
|
||||||
|
|
|
@ -27,6 +27,16 @@ class DomainTest < ActiveSupport::TestCase
|
||||||
assert domains(:invalid).invalid?
|
assert domains(:invalid).invalid?
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def test_valid_domain_statuses_history
|
||||||
|
@domain.force_delete_domain_statuses_history = [DomainStatus::SERVER_UPDATE_PROHIBITED, DomainStatus::SERVER_TRANSFER_PROHIBITED]
|
||||||
|
@domain.admin_store_statuses_history = [DomainStatus::SERVER_UPDATE_PROHIBITED]
|
||||||
|
assert @domain.valid?
|
||||||
|
|
||||||
|
assert @domain.json_statuses_history['force_delete_domain_statuses_history'].include? 'serverUpdateProhibited'
|
||||||
|
assert @domain.json_statuses_history['force_delete_domain_statuses_history'].include? 'serverTransferProhibited'
|
||||||
|
assert_equal @domain.json_statuses_history['admin_store_statuses_history'], ['serverUpdateProhibited']
|
||||||
|
end
|
||||||
|
|
||||||
# https://www.internet.ee/domeenid/ee-domeenireeglid#domeeninimede-registreerimine
|
# https://www.internet.ee/domeenid/ee-domeenireeglid#domeeninimede-registreerimine
|
||||||
def test_validates_name_format
|
def test_validates_name_format
|
||||||
assert_equal dns_zones(:one).origin, 'test'
|
assert_equal dns_zones(:one).origin, 'test'
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue