mirror of
https://github.com/tiennm99/is-a-dev.git
synced 2026-05-14 08:58:25 +00:00
331 lines
14 KiB
JavaScript
331 lines
14 KiB
JavaScript
const t = require("ava");
|
|
const fs = require("fs-extra");
|
|
const path = require("path");
|
|
|
|
const validRecordTypes = new Set(["A", "AAAA", "CAA", "CNAME", "DS", "MX", "NS", "SRV", "TLSA", "TXT", "URL"]);
|
|
const hostnameRegex = /^(?=.{1,253}$)(?:(?:[_a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)\.)+[a-zA-Z]{2,63}$/;
|
|
const ipv4Regex = /^(25[0-5]|2[0-4][0-9]|1[0-9]{2}|[1-9]?[0-9])(\.(25[0-5]|2[0-4][0-9]|1[0-9]{2}|[1-9]?[0-9])){3}$/;
|
|
const ipv6Regex =
|
|
/^(?:[0-9a-fA-F]{1,4}:){7}[0-9a-fA-F]{1,4}$|^::(?:[0-9a-fA-F]{1,4}:){0,6}[0-9a-fA-F]{1,4}$|^(?:[0-9a-fA-F]{1,4}:){1,7}:$|^(?:[0-9a-fA-F]{1,4}:){0,6}::(?:[0-9a-fA-F]{1,4}:){0,5}[0-9a-fA-F]{1,4}$/;
|
|
|
|
const domainsPath = path.resolve("domains");
|
|
const files = fs.readdirSync(domainsPath).filter((file) => file.endsWith(".json"));
|
|
|
|
const domainCache = {};
|
|
|
|
function getDomainData(file) {
|
|
if (domainCache[file]) {
|
|
return domainCache[file];
|
|
}
|
|
|
|
try {
|
|
const data = fs.readJsonSync(path.join(domainsPath, file));
|
|
domainCache[file] = data;
|
|
return data;
|
|
} catch (error) {
|
|
throw new Error(`Failed to read JSON for ${file}: ${error.message}`);
|
|
}
|
|
}
|
|
|
|
function expandIPv6(ip) {
|
|
let segments = ip.split(":");
|
|
const emptyIndex = segments.indexOf("");
|
|
|
|
if (emptyIndex !== -1) {
|
|
const nonEmptySegments = segments.filter((seg) => seg !== "");
|
|
const missingSegments = 8 - nonEmptySegments.length;
|
|
|
|
segments = [
|
|
...nonEmptySegments.slice(0, emptyIndex),
|
|
...Array(missingSegments).fill("0000"),
|
|
...nonEmptySegments.slice(emptyIndex)
|
|
];
|
|
}
|
|
|
|
return segments.map((segment) => segment.padStart(4, "0")).join(":");
|
|
}
|
|
|
|
function validateIPv4(ip, proxied) {
|
|
const parts = ip.split(".").map(Number);
|
|
|
|
if (parts.length !== 4 || parts.some((part) => isNaN(part) || part < 0 || part > 255)) return false;
|
|
if (ip === "192.0.2.1" && proxied) return true;
|
|
|
|
return !(
|
|
parts[0] === 10 ||
|
|
(parts[0] === 172 && parts[1] >= 16 && parts[1] <= 31) ||
|
|
(parts[0] === 192 && parts[1] === 168) ||
|
|
(parts[0] === 100 && parts[1] >= 64 && parts[1] <= 127) ||
|
|
(parts[0] === 169 && parts[1] === 254) ||
|
|
(parts[0] === 192 && parts[1] === 0 && parts[2] === 0) ||
|
|
(parts[0] === 192 && parts[1] === 0 && parts[2] === 2) ||
|
|
(parts[0] === 198 && parts[1] === 18) ||
|
|
(parts[0] === 198 && parts[1] === 51 && parts[2] === 100) ||
|
|
(parts[0] === 203 && parts[1] === 0 && parts[2] === 113) ||
|
|
parts[0] >= 224
|
|
);
|
|
}
|
|
|
|
function validateIPv6(ip) {
|
|
return !(
|
|
ip.toLowerCase().startsWith("fc") ||
|
|
ip.toLowerCase().startsWith("fd") ||
|
|
ip.toLowerCase().startsWith("fe80") ||
|
|
ip.toLowerCase().startsWith("::1") ||
|
|
ip.toLowerCase().startsWith("2001:db8")
|
|
);
|
|
}
|
|
|
|
function validateRecordType(recordType) {
|
|
return validRecordTypes.has(recordType);
|
|
}
|
|
|
|
function isValidHostname(hostname) {
|
|
return hostnameRegex.test(hostname);
|
|
}
|
|
|
|
function isValidHexadecimal(value) {
|
|
return /^[0-9a-fA-F]+$/.test(value);
|
|
}
|
|
|
|
function validateRecordValues(t, data, file) {
|
|
const subdomain = file.replace(/\.json$/, "");
|
|
|
|
Object.entries(data.records).forEach(([key, value]) => {
|
|
// General validation for arrays
|
|
if (["A", "AAAA", "MX", "NS"].includes(key)) {
|
|
t.true(Array.isArray(value), `${file}: Record value for ${key} should be an array`);
|
|
|
|
value.forEach((record, idx) => {
|
|
t.true(
|
|
typeof record === "string" || typeof record === "object",
|
|
`${file}: Record value for ${key} should be a string or an object at index ${idx}`
|
|
);
|
|
|
|
if (key === "A") {
|
|
t.true(ipv4Regex.test(record), `${file}: Invalid IPv4 address for ${key} at index ${idx}`);
|
|
t.true(
|
|
validateIPv4(record, data.proxied),
|
|
`${file}: Invalid IPv4 address for ${key} at index ${idx}`
|
|
);
|
|
} else if (key === "AAAA") {
|
|
const expandedIPv6 = expandIPv6(record);
|
|
t.true(ipv6Regex.test(expandedIPv6), `${file}: Invalid IPv6 address for ${key} at index ${idx}`);
|
|
t.true(validateIPv6(expandedIPv6), `${file}: Invalid IPv6 address for ${key} at index ${idx}`);
|
|
} else if (key === "MX") {
|
|
t.true(
|
|
typeof record === "object" || typeof record === "string",
|
|
`${file}: Record value for ${key} should be an object or a string at index ${idx}`
|
|
);
|
|
|
|
if (typeof record === "string") {
|
|
t.true(isValidHostname(record), `${file}: Invalid hostname for ${key} at index ${idx}`);
|
|
} else {
|
|
t.true(isValidHostname(record.target), `${file}: Invalid target for ${key} at index ${idx}`);
|
|
t.true(
|
|
Number.isInteger(record.priority) && record.priority >= 0 && record.priority <= 65535,
|
|
`${file}: Invalid priority for ${key} at index ${idx}`
|
|
);
|
|
}
|
|
} else if (key === "NS") {
|
|
t.true(isValidHostname(record), `${file}: Invalid hostname for ${key} at index ${idx}`);
|
|
}
|
|
});
|
|
}
|
|
|
|
// CNAME and URL validations
|
|
if (["CNAME", "URL"].includes(key)) {
|
|
t.true(typeof value === "string", `${file}: Record value for ${key} should be a string`);
|
|
|
|
if (key === "CNAME") {
|
|
t.true(isValidHostname(value), `${file}: Invalid hostname for ${key}`);
|
|
t.true(value !== `${subdomain}.is-a.dev`, `${file}: ${key} cannot point to itself`);
|
|
t.true(value !== "is-a.dev", `${file}: ${key} cannot point to is-a.dev`);
|
|
} else if (key === "URL") {
|
|
t.true(
|
|
value.startsWith("http://") || value.startsWith("https://"),
|
|
`${file}: Record value for ${key} must start with http:// or https://`
|
|
);
|
|
t.notThrows(() => new URL(value), `${file}: Invalid URL for ${key}`);
|
|
|
|
// Check for self-referencing redirects
|
|
const urlHost = new URL(value).host;
|
|
t.false(urlHost === `${subdomain}.is-a.dev`, `${file}: ${key} cannot point to itself`);
|
|
}
|
|
}
|
|
|
|
// CAA, DS, SRV, TLSA validations
|
|
if (["CAA", "DS", "SRV", "TLSA"].includes(key)) {
|
|
t.true(Array.isArray(value), `${file}: Record value for ${key} should be an array`);
|
|
|
|
value.forEach((record, idx) => {
|
|
t.true(
|
|
typeof record === "object",
|
|
`${file}: Record value for ${key} should be an object at index ${idx}`
|
|
);
|
|
|
|
if (key === "CAA") {
|
|
t.true(
|
|
["issue", "issuewild", "iodef"].includes(record.tag),
|
|
`${file}: Invalid tag for ${key} at index ${idx}`
|
|
);
|
|
t.true(typeof record.value === "string", `${file}: Invalid value for ${key} at index ${idx}`);
|
|
t.true(
|
|
isValidHostname(record.value) || record.value === ";",
|
|
`${file}: Value must be a hostname or semicolon for ${key} at index ${idx}`
|
|
);
|
|
} else if (key === "DS") {
|
|
t.true(
|
|
Number.isInteger(record.key_tag) && record.key_tag >= 0 && record.key_tag <= 65535,
|
|
`${file}: Invalid key_tag for ${key} at index ${idx}`
|
|
);
|
|
t.true(
|
|
Number.isInteger(record.algorithm) && record.algorithm >= 0 && record.algorithm <= 255,
|
|
`${file}: Invalid algorithm for ${key} at index ${idx}`
|
|
);
|
|
t.true(
|
|
Number.isInteger(record.digest_type) && record.digest_type >= 0 && record.digest_type <= 255,
|
|
`${file}: Invalid digest_type for ${key} at index ${idx}`
|
|
);
|
|
t.true(isValidHexadecimal(record.digest), `${file}: Invalid digest for ${key} at index ${idx}`);
|
|
} else if (key === "SRV") {
|
|
t.true(
|
|
Number.isInteger(record.priority) && record.priority >= 0 && record.priority <= 65535,
|
|
`${file}: Invalid priority for ${key} at index ${idx}`
|
|
);
|
|
t.true(
|
|
Number.isInteger(record.weight) && record.weight >= 0 && record.weight <= 65535,
|
|
`${file}: Invalid weight for ${key} at index ${idx}`
|
|
);
|
|
t.true(
|
|
Number.isInteger(record.port) && record.port >= 0 && record.port <= 65535,
|
|
`${file}: Invalid port for ${key} at index ${idx}`
|
|
);
|
|
t.true(isValidHostname(record.target), `${file}: Invalid target for ${key} at index ${idx}`);
|
|
} else if (key === "TLSA") {
|
|
t.true(
|
|
Number.isInteger(record.usage) && record.usage >= 0 && record.usage <= 255,
|
|
`${file}: Invalid usage for ${key} at index ${idx}`
|
|
);
|
|
t.true(
|
|
Number.isInteger(record.selector) && record.selector >= 0 && record.selector <= 255,
|
|
`${file}: Invalid selector for ${key} at index ${idx}`
|
|
);
|
|
t.true(
|
|
Number.isInteger(record.matchingType) && record.matchingType >= 0 && record.matchingType <= 255,
|
|
`${file}: Invalid matchingType for ${key} at index ${idx}`
|
|
);
|
|
t.true(
|
|
isValidHexadecimal(record.certificate),
|
|
`${file}: Invalid certificate for ${key} at index ${idx}`
|
|
);
|
|
}
|
|
});
|
|
}
|
|
|
|
// TXT validation
|
|
if (key === "TXT") {
|
|
const values = Array.isArray(value) ? value : [value];
|
|
values.forEach((record, idx) => {
|
|
t.true(typeof record === "string", `${file}: TXT record value should be a string at index ${idx}`);
|
|
});
|
|
}
|
|
});
|
|
|
|
if (data.redirect_config) {
|
|
const customPaths = Object.keys(data.redirect_config.custom_paths || {});
|
|
const pathRegex = /^\/[a-zA-Z0-9\-_\.\/]+(?<!\/)$/;
|
|
|
|
customPaths.forEach((customPath, idx) => {
|
|
const customRedirectURL = data.redirect_config.custom_paths[customPath];
|
|
const urlMessage = `${file}: Custom path in redirect_config`;
|
|
|
|
// Validate the custom path
|
|
t.true(
|
|
pathRegex.test(customPath),
|
|
`${urlMessage} must start with a slash, contain only alphanumeric characters, hyphens, underscores, periods, and slashes, and cannot end with a slash at index ${idx}`
|
|
);
|
|
t.true(
|
|
customPath.length >= 2 && customPath.length <= 255,
|
|
`${urlMessage} should be 2-255 characters long at index ${idx}`
|
|
);
|
|
|
|
// Validate the redirect URL
|
|
t.true(
|
|
data.records.URL !== customRedirectURL,
|
|
`${urlMessage} should be different from the URL record at index ${idx}`
|
|
);
|
|
t.true(
|
|
customRedirectURL.startsWith("http://") || customRedirectURL.startsWith("https://"),
|
|
`${urlMessage} must start with http:// or https:// at index ${idx}`
|
|
);
|
|
t.notThrows(() => new URL(customRedirectURL), `${urlMessage} contains an invalid URL at index ${idx}`);
|
|
|
|
// Check for self-referencing redirects
|
|
const urlHost = new URL(customRedirectURL).host;
|
|
t.false(urlHost === `${subdomain}.is-a.dev`, `${urlMessage} cannot point to itself at index ${idx}`);
|
|
});
|
|
}
|
|
}
|
|
|
|
t("All files should have valid record types", (t) => {
|
|
files.forEach((file) => {
|
|
const data = getDomainData(file);
|
|
const recordKeys = Object.keys(data.records);
|
|
|
|
recordKeys.forEach((key) => {
|
|
t.true(validateRecordType(key), `${file}: Invalid record type: ${key}`);
|
|
});
|
|
|
|
// Record type combinations validation
|
|
if (recordKeys.includes("CNAME") && !data.proxied) {
|
|
t.is(recordKeys.length, 1, `${file}: CNAME records cannot be combined with other records unless proxied`);
|
|
}
|
|
if (recordKeys.includes("NS")) {
|
|
t.true(
|
|
recordKeys.length === 1 || (recordKeys.length === 2 && recordKeys.includes("DS")),
|
|
`${file}: NS records cannot be combined with other records, except for DS records`
|
|
);
|
|
}
|
|
if (recordKeys.includes("DS")) {
|
|
t.true(recordKeys.includes("NS"), `${file}: DS records must be combined with NS records`);
|
|
}
|
|
if (recordKeys.includes("URL")) {
|
|
t.true(
|
|
!recordKeys.includes("A") && !recordKeys.includes("AAAA") && !recordKeys.includes("CNAME"),
|
|
`${file}: URL records cannot be combined with A, AAAA, or CNAME records`
|
|
);
|
|
}
|
|
if (data.redirect_config) {
|
|
t.true(
|
|
recordKeys.includes("URL") || data.proxied,
|
|
`${file}: Redirect config must be combined with a URL record or the domain must be proxied`
|
|
);
|
|
if (data.redirect_config.redirect_paths) {
|
|
t.true(recordKeys.includes("URL"), `${file}: redirect_config.redirect_paths requires a URL record`);
|
|
}
|
|
}
|
|
|
|
validateRecordValues(t, data, file);
|
|
});
|
|
|
|
t.pass();
|
|
});
|
|
|
|
t("Root subdomains should have at least one usable record", (t) => {
|
|
const usableRecordTypes = ["A", "AAAA", "CNAME", "MX", "NS", "URL"];
|
|
|
|
files.forEach((file) => {
|
|
const subdomain = file.replace(/\.json$/, "");
|
|
if (subdomain.includes(".") || subdomain.startsWith("_")) return;
|
|
|
|
const data = getDomainData(file);
|
|
const recordKeys = Object.keys(data.records);
|
|
|
|
t.true(
|
|
usableRecordTypes.some((record) => recordKeys.includes(record)),
|
|
`${file}: Root subdomains must have at least one A, AAAA, CNAME, MX, NS, or URL record`
|
|
);
|
|
});
|
|
});
|