2018-06-14 23:48:14 +00:00
|
|
|
/**
|
2024-01-03 10:11:33 +00:00
|
|
|
* @license
|
|
|
|
* Copyright 2018 Google Inc.
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
2018-06-14 23:48:14 +00:00
|
|
|
*/
|
|
|
|
|
2023-09-26 16:24:24 +00:00
|
|
|
import type {TLSSocket} from 'tls';
|
2023-02-15 23:09:31 +00:00
|
|
|
|
|
|
|
import expect from 'expect';
|
2023-09-26 16:24:24 +00:00
|
|
|
import type {HTTPResponse} from 'puppeteer-core/internal/api/HTTPResponse.js';
|
2023-02-15 23:09:31 +00:00
|
|
|
|
2023-07-03 12:01:29 +00:00
|
|
|
import {launch} from './mocha-utils.js';
|
2020-04-09 05:56:25 +00:00
|
|
|
|
2020-06-12 13:55:51 +00:00
|
|
|
describe('ignoreHTTPSErrors', function () {
|
2020-04-09 05:56:25 +00:00
|
|
|
/* Note that this test creates its own browser rather than use
|
|
|
|
* the one provided by the test set-up as we need one
|
|
|
|
* with ignoreHTTPSErrors set to true
|
|
|
|
*/
|
2023-07-03 12:01:29 +00:00
|
|
|
let state: Awaited<ReturnType<typeof launch>>;
|
2020-04-09 05:56:25 +00:00
|
|
|
|
2020-05-07 10:54:55 +00:00
|
|
|
before(async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
state = await launch(
|
2022-06-22 13:25:44 +00:00
|
|
|
{ignoreHTTPSErrors: true},
|
2023-07-03 12:01:29 +00:00
|
|
|
{
|
|
|
|
after: 'all',
|
|
|
|
}
|
2020-05-07 10:54:55 +00:00
|
|
|
);
|
2020-04-09 05:56:25 +00:00
|
|
|
});
|
|
|
|
|
2020-05-07 10:54:55 +00:00
|
|
|
after(async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
await state.close();
|
2020-04-09 05:56:25 +00:00
|
|
|
});
|
|
|
|
|
2020-05-07 10:54:55 +00:00
|
|
|
beforeEach(async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
state.context = await state.browser.createIncognitoBrowserContext();
|
|
|
|
state.page = await state.context.newPage();
|
2020-04-09 05:56:25 +00:00
|
|
|
});
|
2019-02-13 19:35:49 +00:00
|
|
|
|
2020-05-07 10:54:55 +00:00
|
|
|
afterEach(async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
await state.context.close();
|
2020-04-09 05:56:25 +00:00
|
|
|
});
|
|
|
|
|
2022-09-08 10:32:39 +00:00
|
|
|
describe('Response.securityDetails', function () {
|
2020-05-07 10:54:55 +00:00
|
|
|
it('should work', async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
const {httpsServer, page} = state;
|
2020-04-09 05:56:25 +00:00
|
|
|
|
|
|
|
const [serverRequest, response] = await Promise.all([
|
|
|
|
httpsServer.waitForRequest('/empty.html'),
|
2020-05-07 10:54:55 +00:00
|
|
|
page.goto(httpsServer.EMPTY_PAGE),
|
2020-04-09 05:56:25 +00:00
|
|
|
]);
|
2022-06-15 10:09:22 +00:00
|
|
|
const securityDetails = response!.securityDetails()!;
|
2020-04-09 05:56:25 +00:00
|
|
|
expect(securityDetails.issuer()).toBe('puppeteer-tests');
|
2022-06-15 10:05:25 +00:00
|
|
|
const protocol = (serverRequest.socket as TLSSocket)
|
2022-06-15 10:09:22 +00:00
|
|
|
.getProtocol()!
|
2022-06-15 10:05:25 +00:00
|
|
|
.replace('v', ' ');
|
2020-04-09 05:56:25 +00:00
|
|
|
expect(securityDetails.protocol()).toBe(protocol);
|
|
|
|
expect(securityDetails.subjectName()).toBe('puppeteer-tests');
|
2020-05-18 10:58:46 +00:00
|
|
|
expect(securityDetails.validFrom()).toBe(1589357069);
|
|
|
|
expect(securityDetails.validTo()).toBe(1904717069);
|
|
|
|
expect(securityDetails.subjectAlternativeNames()).toEqual([
|
|
|
|
'www.puppeteer-tests.test',
|
|
|
|
'www.puppeteer-tests-1.test',
|
|
|
|
]);
|
2019-02-13 19:35:49 +00:00
|
|
|
});
|
2020-05-07 10:54:55 +00:00
|
|
|
it('should be |null| for non-secure requests', async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
const {server, page} = state;
|
2019-02-13 19:35:49 +00:00
|
|
|
|
2022-06-15 10:09:22 +00:00
|
|
|
const response = (await page.goto(server.EMPTY_PAGE))!;
|
2020-04-09 05:56:25 +00:00
|
|
|
expect(response.securityDetails()).toBe(null);
|
2018-06-14 23:48:14 +00:00
|
|
|
});
|
2020-05-07 10:54:55 +00:00
|
|
|
it('Network redirects should report SecurityDetails', async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
const {httpsServer, page} = state;
|
2020-04-09 05:56:25 +00:00
|
|
|
|
|
|
|
httpsServer.setRedirect('/plzredirect', '/empty.html');
|
2022-06-15 10:09:22 +00:00
|
|
|
const responses: HTTPResponse[] = [];
|
2022-06-22 13:25:44 +00:00
|
|
|
page.on('response', response => {
|
2022-06-15 10:09:22 +00:00
|
|
|
return responses.push(response);
|
|
|
|
});
|
2020-05-07 10:54:55 +00:00
|
|
|
const [serverRequest] = await Promise.all([
|
2020-04-09 05:56:25 +00:00
|
|
|
httpsServer.waitForRequest('/plzredirect'),
|
2020-05-07 10:54:55 +00:00
|
|
|
page.goto(httpsServer.PREFIX + '/plzredirect'),
|
2020-04-09 05:56:25 +00:00
|
|
|
]);
|
2023-04-25 13:02:25 +00:00
|
|
|
expect(responses).toHaveLength(2);
|
2022-06-15 10:09:22 +00:00
|
|
|
expect(responses[0]!.status()).toBe(302);
|
|
|
|
const securityDetails = responses[0]!.securityDetails()!;
|
2022-06-15 10:05:25 +00:00
|
|
|
const protocol = (serverRequest.socket as TLSSocket)
|
2022-06-15 10:09:22 +00:00
|
|
|
.getProtocol()!
|
2022-06-15 10:05:25 +00:00
|
|
|
.replace('v', ' ');
|
2020-04-09 05:56:25 +00:00
|
|
|
expect(securityDetails.protocol()).toBe(protocol);
|
2018-09-04 09:04:27 +00:00
|
|
|
});
|
2020-04-09 05:56:25 +00:00
|
|
|
});
|
|
|
|
|
2020-05-07 10:54:55 +00:00
|
|
|
it('should work', async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
const {httpsServer, page} = state;
|
2020-04-09 05:56:25 +00:00
|
|
|
|
2022-06-15 10:09:22 +00:00
|
|
|
let error!: Error;
|
2022-06-22 13:25:44 +00:00
|
|
|
const response = await page.goto(httpsServer.EMPTY_PAGE).catch(error_ => {
|
2022-06-15 10:09:22 +00:00
|
|
|
return (error = error_);
|
|
|
|
});
|
|
|
|
expect(error).toBeUndefined();
|
2020-04-09 05:56:25 +00:00
|
|
|
expect(response.ok()).toBe(true);
|
|
|
|
});
|
2022-09-08 10:32:39 +00:00
|
|
|
it('should work with request interception', async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
const {httpsServer, page} = state;
|
2020-04-09 05:56:25 +00:00
|
|
|
|
|
|
|
await page.setRequestInterception(true);
|
2022-06-22 13:25:44 +00:00
|
|
|
page.on('request', request => {
|
2022-06-15 10:09:22 +00:00
|
|
|
return request.continue();
|
|
|
|
});
|
|
|
|
const response = (await page.goto(httpsServer.EMPTY_PAGE))!;
|
2020-04-09 05:56:25 +00:00
|
|
|
expect(response.status()).toBe(200);
|
|
|
|
});
|
2022-09-08 10:32:39 +00:00
|
|
|
it('should work with mixed content', async () => {
|
2023-07-03 12:01:29 +00:00
|
|
|
const {server, httpsServer, page} = state;
|
2020-04-09 05:56:25 +00:00
|
|
|
|
2022-06-15 10:09:22 +00:00
|
|
|
httpsServer.setRoute('/mixedcontent.html', (_req, res) => {
|
2020-04-09 05:56:25 +00:00
|
|
|
res.end(`<iframe src=${server.EMPTY_PAGE}></iframe>`);
|
2018-06-14 23:48:14 +00:00
|
|
|
});
|
2020-05-07 10:54:55 +00:00
|
|
|
await page.goto(httpsServer.PREFIX + '/mixedcontent.html', {
|
|
|
|
waitUntil: 'load',
|
|
|
|
});
|
2023-04-25 13:02:25 +00:00
|
|
|
expect(page.frames()).toHaveLength(2);
|
2020-04-09 05:56:25 +00:00
|
|
|
// Make sure blocked iframe has functional execution context
|
|
|
|
// @see https://github.com/puppeteer/puppeteer/issues/2709
|
2022-06-15 10:09:22 +00:00
|
|
|
expect(await page.frames()[0]!.evaluate('1 + 2')).toBe(3);
|
|
|
|
expect(await page.frames()[1]!.evaluate('2 + 3')).toBe(5);
|
2018-06-14 23:48:14 +00:00
|
|
|
});
|
2020-04-09 05:56:25 +00:00
|
|
|
});
|