mirror of
https://github.com/puppeteer/puppeteer
synced 2024-06-14 14:02:48 +00:00
cafd040bf2
With the addition of `browser.targets()` api, we now can connect to in-flight targets. For Puppeteer, it means that it can "miss" certain events happenning while it wasn't attached to the target. This patch: - fixes this problem with NetworkManager, preparing it for the missed `requestWillBeSent` event. - adds a new test to ensure that not a single unhandled promise rejection has happened during test execution. Fixes #1363.
592 lines
19 KiB
JavaScript
592 lines
19 KiB
JavaScript
/**
|
|
* Copyright 2017 Google Inc. All rights reserved.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
const EventEmitter = require('events');
|
|
const {helper, debugError} = require('./helper');
|
|
const Multimap = require('./Multimap');
|
|
|
|
class NetworkManager extends EventEmitter {
|
|
/**
|
|
* @param {Puppeteer.Session} client
|
|
*/
|
|
constructor(client) {
|
|
super();
|
|
this._client = client;
|
|
/** @type {!Map<string, !Request>} */
|
|
this._requestIdToRequest = new Map();
|
|
/** @type {!Map<string, !Request>} */
|
|
this._interceptionIdToRequest = new Map();
|
|
/** @type {!Object<string, string>} */
|
|
this._extraHTTPHeaders = {};
|
|
|
|
this._offline = false;
|
|
|
|
/** @type {?{username: string, password: string}} */
|
|
this._credentials = null;
|
|
/** @type {!Set<string>} */
|
|
this._attemptedAuthentications = new Set();
|
|
this._userRequestInterceptionEnabled = false;
|
|
this._protocolRequestInterceptionEnabled = false;
|
|
/** @type {!Multimap} */
|
|
this._requestHashToRequestIds = new Multimap();
|
|
/** @type {!Multimap} */
|
|
this._requestHashToInterceptionIds = new Multimap();
|
|
|
|
this._client.on('Network.requestWillBeSent', this._onRequestWillBeSent.bind(this));
|
|
this._client.on('Network.requestIntercepted', this._onRequestIntercepted.bind(this));
|
|
this._client.on('Network.responseReceived', this._onResponseReceived.bind(this));
|
|
this._client.on('Network.loadingFinished', this._onLoadingFinished.bind(this));
|
|
this._client.on('Network.loadingFailed', this._onLoadingFailed.bind(this));
|
|
}
|
|
|
|
/**
|
|
* @param {?{username: string, password: string}} credentials
|
|
*/
|
|
async authenticate(credentials) {
|
|
this._credentials = credentials;
|
|
await this._updateProtocolRequestInterception();
|
|
}
|
|
|
|
/**
|
|
* @param {!Object<string, string>} extraHTTPHeaders
|
|
*/
|
|
async setExtraHTTPHeaders(extraHTTPHeaders) {
|
|
this._extraHTTPHeaders = {};
|
|
for (const key of Object.keys(extraHTTPHeaders)) {
|
|
const value = extraHTTPHeaders[key];
|
|
console.assert(helper.isString(value), `Expected value of header "${key}" to be String, but "${typeof value}" is found.`);
|
|
this._extraHTTPHeaders[key.toLowerCase()] = value;
|
|
}
|
|
await this._client.send('Network.setExtraHTTPHeaders', { headers: this._extraHTTPHeaders });
|
|
}
|
|
|
|
/**
|
|
* @return {!Object<string, string>}
|
|
*/
|
|
extraHTTPHeaders() {
|
|
return Object.assign({}, this._extraHTTPHeaders);
|
|
}
|
|
|
|
/**
|
|
* @param {boolean} value
|
|
*/
|
|
async setOfflineMode(value) {
|
|
if (this._offline === value)
|
|
return;
|
|
this._offline = value;
|
|
await this._client.send('Network.emulateNetworkConditions', {
|
|
offline: this._offline,
|
|
// values of 0 remove any active throttling. crbug.com/456324#c9
|
|
latency: 0,
|
|
downloadThroughput: -1,
|
|
uploadThroughput: -1
|
|
});
|
|
}
|
|
|
|
/**
|
|
* @param {string} userAgent
|
|
*/
|
|
async setUserAgent(userAgent) {
|
|
await this._client.send('Network.setUserAgentOverride', { userAgent });
|
|
}
|
|
|
|
/**
|
|
* @param {boolean} value
|
|
*/
|
|
async setRequestInterception(value) {
|
|
this._userRequestInterceptionEnabled = value;
|
|
await this._updateProtocolRequestInterception();
|
|
}
|
|
|
|
async _updateProtocolRequestInterception() {
|
|
const enabled = this._userRequestInterceptionEnabled || !!this._credentials;
|
|
if (enabled === this._protocolRequestInterceptionEnabled)
|
|
return;
|
|
this._protocolRequestInterceptionEnabled = enabled;
|
|
const patterns = enabled ? [{urlPattern: '*'}] : [];
|
|
await Promise.all([
|
|
this._client.send('Network.setCacheDisabled', {cacheDisabled: enabled}),
|
|
this._client.send('Network.setRequestInterception', {patterns})
|
|
]);
|
|
}
|
|
|
|
/**
|
|
* @param {!Object} event
|
|
*/
|
|
_onRequestIntercepted(event) {
|
|
if (event.authChallenge) {
|
|
let response = 'Default';
|
|
if (this._attemptedAuthentications.has(event.interceptionId)) {
|
|
response = 'CancelAuth';
|
|
} else if (this._credentials) {
|
|
response = 'ProvideCredentials';
|
|
this._attemptedAuthentications.add(event.interceptionId);
|
|
}
|
|
const {username, password} = this._credentials || {username: undefined, password: undefined};
|
|
this._client.send('Network.continueInterceptedRequest', {
|
|
interceptionId: event.interceptionId,
|
|
authChallengeResponse: { response, username, password }
|
|
}).catch(debugError);
|
|
return;
|
|
}
|
|
if (!this._userRequestInterceptionEnabled && this._protocolRequestInterceptionEnabled) {
|
|
this._client.send('Network.continueInterceptedRequest', {
|
|
interceptionId: event.interceptionId
|
|
}).catch(debugError);
|
|
}
|
|
|
|
if (event.redirectStatusCode) {
|
|
const request = this._interceptionIdToRequest.get(event.interceptionId);
|
|
console.assert(request, 'INTERNAL ERROR: failed to find request for interception redirect.');
|
|
this._handleRequestRedirect(request, event.redirectStatusCode, event.redirectHeaders);
|
|
this._handleRequestStart(request._requestId, event.interceptionId, event.redirectUrl, event.resourceType, event.request);
|
|
return;
|
|
}
|
|
const requestHash = generateRequestHash(event.request);
|
|
const requestId = this._requestHashToRequestIds.firstValue(requestHash);
|
|
if (requestId) {
|
|
this._requestHashToRequestIds.delete(requestHash, requestId);
|
|
this._handleRequestStart(requestId, event.interceptionId, event.request.url, event.resourceType, event.request);
|
|
} else {
|
|
this._requestHashToInterceptionIds.set(requestHash, event.interceptionId);
|
|
this._handleRequestStart(null, event.interceptionId, event.request.url, event.resourceType, event.request);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* @param {!Request} request
|
|
* @param {number} redirectStatus
|
|
* @param {!Object} redirectHeaders
|
|
*/
|
|
_handleRequestRedirect(request, redirectStatus, redirectHeaders) {
|
|
const response = new Response(this._client, request, redirectStatus, redirectHeaders);
|
|
request._response = response;
|
|
this._requestIdToRequest.delete(request._requestId);
|
|
this._interceptionIdToRequest.delete(request._interceptionId);
|
|
this._attemptedAuthentications.delete(request._interceptionId);
|
|
this.emit(NetworkManager.Events.Response, response);
|
|
this.emit(NetworkManager.Events.RequestFinished, request);
|
|
}
|
|
|
|
/**
|
|
* @param {?string} requestId
|
|
* @param {?string} interceptionId
|
|
* @param {string} url
|
|
* @param {string} resourceType
|
|
* @param {!Object} requestPayload
|
|
*/
|
|
_handleRequestStart(requestId, interceptionId, url, resourceType, requestPayload) {
|
|
const request = new Request(this._client, requestId, interceptionId, this._userRequestInterceptionEnabled, url, resourceType, requestPayload);
|
|
if (requestId)
|
|
this._requestIdToRequest.set(requestId, request);
|
|
if (interceptionId)
|
|
this._interceptionIdToRequest.set(interceptionId, request);
|
|
this.emit(NetworkManager.Events.Request, request);
|
|
}
|
|
|
|
/**
|
|
* @param {!Object} event
|
|
*/
|
|
_onRequestWillBeSent(event) {
|
|
if (this._protocolRequestInterceptionEnabled) {
|
|
// All redirects are handled in requestIntercepted.
|
|
if (event.redirectResponse)
|
|
return;
|
|
const requestHash = generateRequestHash(event.request);
|
|
const interceptionId = this._requestHashToInterceptionIds.firstValue(requestHash);
|
|
const request = interceptionId ? this._interceptionIdToRequest.get(interceptionId) : null;
|
|
if (request) {
|
|
request._requestId = event.requestId;
|
|
this._requestIdToRequest.set(event.requestId, request);
|
|
this._requestHashToInterceptionIds.delete(requestHash, interceptionId);
|
|
} else {
|
|
this._requestHashToRequestIds.set(requestHash, event.requestId);
|
|
}
|
|
return;
|
|
}
|
|
if (event.redirectResponse) {
|
|
const request = this._requestIdToRequest.get(event.requestId);
|
|
// If we connect late to the target, we could have missed the requestWillBeSent event.
|
|
if (request)
|
|
this._handleRequestRedirect(request, event.redirectResponse.status, event.redirectResponse.headers);
|
|
}
|
|
this._handleRequestStart(event.requestId, null, event.request.url, event.type, event.request);
|
|
}
|
|
|
|
/**
|
|
* @param {!Object} event
|
|
*/
|
|
_onResponseReceived(event) {
|
|
const request = this._requestIdToRequest.get(event.requestId);
|
|
// FileUpload sends a response without a matching request.
|
|
if (!request)
|
|
return;
|
|
const response = new Response(this._client, request, event.response.status, event.response.headers);
|
|
request._response = response;
|
|
this.emit(NetworkManager.Events.Response, response);
|
|
}
|
|
|
|
/**
|
|
* @param {!Object} event
|
|
*/
|
|
_onLoadingFinished(event) {
|
|
const request = this._requestIdToRequest.get(event.requestId);
|
|
// For certain requestIds we never receive requestWillBeSent event.
|
|
// @see https://crbug.com/750469
|
|
if (!request)
|
|
return;
|
|
request._completePromiseFulfill.call(null);
|
|
this._requestIdToRequest.delete(request._requestId);
|
|
this._interceptionIdToRequest.delete(request._interceptionId);
|
|
this._attemptedAuthentications.delete(request._interceptionId);
|
|
this.emit(NetworkManager.Events.RequestFinished, request);
|
|
}
|
|
|
|
/**
|
|
* @param {!Object} event
|
|
*/
|
|
_onLoadingFailed(event) {
|
|
const request = this._requestIdToRequest.get(event.requestId);
|
|
// For certain requestIds we never receive requestWillBeSent event.
|
|
// @see https://crbug.com/750469
|
|
if (!request)
|
|
return;
|
|
request._failureText = event.errorText;
|
|
request._completePromiseFulfill.call(null);
|
|
this._requestIdToRequest.delete(request._requestId);
|
|
this._interceptionIdToRequest.delete(request._interceptionId);
|
|
this._attemptedAuthentications.delete(request._interceptionId);
|
|
this.emit(NetworkManager.Events.RequestFailed, request);
|
|
}
|
|
}
|
|
|
|
class Request {
|
|
/**
|
|
* @param {!Puppeteer.Session} client
|
|
* @param {?string} requestId
|
|
* @param {string} interceptionId
|
|
* @param {boolean} allowInterception
|
|
* @param {string} url
|
|
* @param {string} resourceType
|
|
* @param {!Object} payload
|
|
*/
|
|
constructor(client, requestId, interceptionId, allowInterception, url, resourceType, payload) {
|
|
this._client = client;
|
|
this._requestId = requestId;
|
|
this._interceptionId = interceptionId;
|
|
this._allowInterception = allowInterception;
|
|
this._interceptionHandled = false;
|
|
this._response = null;
|
|
this._failureText = null;
|
|
this._completePromise = new Promise(fulfill => {
|
|
this._completePromiseFulfill = fulfill;
|
|
});
|
|
|
|
this.url = url;
|
|
this.resourceType = resourceType.toLowerCase();
|
|
this.method = payload.method;
|
|
this.postData = payload.postData;
|
|
this.headers = {};
|
|
for (const key of Object.keys(payload.headers))
|
|
this.headers[key.toLowerCase()] = payload.headers[key];
|
|
}
|
|
|
|
/**
|
|
* @return {?Response}
|
|
*/
|
|
response() {
|
|
return this._response;
|
|
}
|
|
|
|
/**
|
|
* @return {?{errorText: string}}
|
|
*/
|
|
failure() {
|
|
if (!this._failureText)
|
|
return null;
|
|
return {
|
|
errorText: this._failureText
|
|
};
|
|
}
|
|
|
|
/**
|
|
* @param {!Object=} overrides
|
|
*/
|
|
async continue(overrides = {}) {
|
|
console.assert(this._allowInterception, 'Request Interception is not enabled!');
|
|
console.assert(!this._interceptionHandled, 'Request is already handled!');
|
|
this._interceptionHandled = true;
|
|
await this._client.send('Network.continueInterceptedRequest', {
|
|
interceptionId: this._interceptionId,
|
|
url: overrides.url,
|
|
method: overrides.method,
|
|
postData: overrides.postData,
|
|
headers: overrides.headers,
|
|
}).catch(error => {
|
|
// In certain cases, protocol will return error if the request was already canceled
|
|
// or the page was closed. We should tolerate these errors.
|
|
debugError(error);
|
|
});
|
|
}
|
|
|
|
/**
|
|
* @param {!{status: number, headers: Object, contentType: string, body: (string|Buffer)}} response
|
|
*/
|
|
async respond(response) {
|
|
// Mocking responses for dataURL requests is not currently supported.
|
|
if (this.url.startsWith('data:'))
|
|
return;
|
|
console.assert(this._allowInterception, 'Request Interception is not enabled!');
|
|
console.assert(!this._interceptionHandled, 'Request is already handled!');
|
|
this._interceptionHandled = true;
|
|
|
|
const responseBody = response.body && helper.isString(response.body) ? Buffer.from(/** @type {string} */(response.body)) : /** @type {?Buffer} */(response.body || null);
|
|
|
|
const responseHeaders = {};
|
|
if (response.headers) {
|
|
for (const header of Object.keys(response.headers))
|
|
responseHeaders[header.toLowerCase()] = response.headers[header];
|
|
}
|
|
if (response.contentType)
|
|
responseHeaders['content-type'] = response.contentType;
|
|
if (responseBody && !('content-length' in responseHeaders)) {
|
|
// @ts-ignore
|
|
responseHeaders['content-length'] = Buffer.byteLength(responseBody);
|
|
}
|
|
|
|
const statusCode = response.status || 200;
|
|
const statusText = statusTexts[statusCode] || '';
|
|
const statusLine = `HTTP/1.1 ${statusCode} ${statusText}`;
|
|
|
|
const CRLF = '\r\n';
|
|
let text = statusLine + CRLF;
|
|
for (const header of Object.keys(responseHeaders))
|
|
text += header + ': ' + responseHeaders[header] + CRLF;
|
|
text += CRLF;
|
|
let responseBuffer = Buffer.from(text, 'utf8');
|
|
if (responseBody)
|
|
responseBuffer = Buffer.concat([responseBuffer, responseBody]);
|
|
|
|
await this._client.send('Network.continueInterceptedRequest', {
|
|
interceptionId: this._interceptionId,
|
|
rawResponse: responseBuffer.toString('base64')
|
|
}).catch(error => {
|
|
// In certain cases, protocol will return error if the request was already canceled
|
|
// or the page was closed. We should tolerate these errors.
|
|
debugError(error);
|
|
});
|
|
}
|
|
|
|
/**
|
|
* @param {string=} errorCode
|
|
*/
|
|
async abort(errorCode = 'failed') {
|
|
const errorReason = errorReasons[errorCode];
|
|
console.assert(errorReason, 'Unknown error code: ' + errorCode);
|
|
console.assert(this._allowInterception, 'Request Interception is not enabled!');
|
|
console.assert(!this._interceptionHandled, 'Request is already handled!');
|
|
this._interceptionHandled = true;
|
|
await this._client.send('Network.continueInterceptedRequest', {
|
|
interceptionId: this._interceptionId,
|
|
errorReason
|
|
}).catch(error => {
|
|
// In certain cases, protocol will return error if the request was already canceled
|
|
// or the page was closed. We should tolerate these errors.
|
|
debugError(error);
|
|
});
|
|
}
|
|
}
|
|
|
|
const errorReasons = {
|
|
'aborted': 'Aborted',
|
|
'accessdenied': 'AccessDenied',
|
|
'addressunreachable': 'AddressUnreachable',
|
|
'connectionaborted': 'ConnectionAborted',
|
|
'connectionclosed': 'ConnectionClosed',
|
|
'connectionfailed': 'ConnectionFailed',
|
|
'connectionrefused': 'ConnectionRefused',
|
|
'connectionreset': 'ConnectionReset',
|
|
'internetdisconnected': 'InternetDisconnected',
|
|
'namenotresolved': 'NameNotResolved',
|
|
'timedout': 'TimedOut',
|
|
'failed': 'Failed',
|
|
};
|
|
|
|
helper.tracePublicAPI(Request);
|
|
|
|
class Response {
|
|
/**
|
|
* @param {!Puppeteer.Session} client
|
|
* @param {!Request} request
|
|
* @param {number} status
|
|
* @param {!Object} headers
|
|
*/
|
|
constructor(client, request, status, headers) {
|
|
this._client = client;
|
|
this._request = request;
|
|
this._contentPromise = null;
|
|
|
|
this.status = status;
|
|
this.ok = status >= 200 && status <= 299;
|
|
this.url = request.url;
|
|
this.headers = {};
|
|
for (const key of Object.keys(headers))
|
|
this.headers[key.toLowerCase()] = headers[key];
|
|
}
|
|
|
|
/**
|
|
* @return {!Promise<!Buffer>}
|
|
*/
|
|
buffer() {
|
|
if (!this._contentPromise) {
|
|
this._contentPromise = this._request._completePromise.then(async() => {
|
|
const response = await this._client.send('Network.getResponseBody', {
|
|
requestId: this._request._requestId
|
|
});
|
|
return Buffer.from(response.body, response.base64Encoded ? 'base64' : 'utf8');
|
|
});
|
|
}
|
|
return this._contentPromise;
|
|
}
|
|
|
|
/**
|
|
* @return {!Promise<string>}
|
|
*/
|
|
async text() {
|
|
const content = await this.buffer();
|
|
return content.toString('utf8');
|
|
}
|
|
|
|
/**
|
|
* @return {!Promise<!Object>}
|
|
*/
|
|
async json() {
|
|
const content = await this.text();
|
|
return JSON.parse(content);
|
|
}
|
|
|
|
/**
|
|
* @return {!Request}
|
|
*/
|
|
request() {
|
|
return this._request;
|
|
}
|
|
}
|
|
helper.tracePublicAPI(Response);
|
|
|
|
/**
|
|
* @param {!Object} request
|
|
* @return {string}
|
|
*/
|
|
function generateRequestHash(request) {
|
|
let normalizedURL = request.url;
|
|
try {
|
|
// Decoding is necessary to normalize URLs. @see crbug.com/759388
|
|
// The method will throw if the URL is malformed. In this case,
|
|
// consider URL to be normalized as-is.
|
|
normalizedURL = decodeURI(request.url);
|
|
} catch (e) {
|
|
}
|
|
const hash = {
|
|
url: normalizedURL,
|
|
method: request.method,
|
|
postData: request.postData,
|
|
headers: {},
|
|
};
|
|
|
|
if (!normalizedURL.startsWith('data:')) {
|
|
const headers = Object.keys(request.headers);
|
|
headers.sort();
|
|
for (const header of headers) {
|
|
if (header === 'Accept' || header === 'Referer' || header === 'X-DevTools-Emulate-Network-Conditions-Client-Id')
|
|
continue;
|
|
hash.headers[header] = request.headers[header];
|
|
}
|
|
}
|
|
return JSON.stringify(hash);
|
|
}
|
|
|
|
NetworkManager.Events = {
|
|
Request: 'request',
|
|
Response: 'response',
|
|
RequestFailed: 'requestfailed',
|
|
RequestFinished: 'requestfinished',
|
|
};
|
|
|
|
const statusTexts = {
|
|
'100': 'Continue',
|
|
'101': 'Switching Protocols',
|
|
'102': 'Processing',
|
|
'200': 'OK',
|
|
'201': 'Created',
|
|
'202': 'Accepted',
|
|
'203': 'Non-Authoritative Information',
|
|
'204': 'No Content',
|
|
'206': 'Partial Content',
|
|
'207': 'Multi-Status',
|
|
'208': 'Already Reported',
|
|
'209': 'IM Used',
|
|
'300': 'Multiple Choices',
|
|
'301': 'Moved Permanently',
|
|
'302': 'Found',
|
|
'303': 'See Other',
|
|
'304': 'Not Modified',
|
|
'305': 'Use Proxy',
|
|
'306': 'Switch Proxy',
|
|
'307': 'Temporary Redirect',
|
|
'308': 'Permanent Redirect',
|
|
'400': 'Bad Request',
|
|
'401': 'Unauthorized',
|
|
'402': 'Payment Required',
|
|
'403': 'Forbidden',
|
|
'404': 'Not Found',
|
|
'405': 'Method Not Allowed',
|
|
'406': 'Not Acceptable',
|
|
'407': 'Proxy Authentication Required',
|
|
'408': 'Request Timeout',
|
|
'409': 'Conflict',
|
|
'410': 'Gone',
|
|
'411': 'Length Required',
|
|
'412': 'Precondition Failed',
|
|
'413': 'Payload Too Large',
|
|
'414': 'URI Too Long',
|
|
'415': 'Unsupported Media Type',
|
|
'416': 'Range Not Satisfiable',
|
|
'417': 'Expectation Failed',
|
|
'418': 'I\'m a teapot',
|
|
'421': 'Misdirected Request',
|
|
'422': 'Unprocessable Entity',
|
|
'423': 'Locked',
|
|
'424': 'Failed Dependency',
|
|
'426': 'Upgrade Required',
|
|
'428': 'Precondition Required',
|
|
'429': 'Too Many Requests',
|
|
'431': 'Request Header Fields Too Large',
|
|
'451': 'Unavailable For Legal Reasons',
|
|
'500': 'Internal Server Error',
|
|
'501': 'Not Implemented',
|
|
'502': 'Bad Gateway',
|
|
'503': 'Service Unavailable',
|
|
'504': 'Gateway Timeout',
|
|
'505': 'HTTP Version Not Supported',
|
|
'506': 'Variant Also Negotiates',
|
|
'507': 'Insufficient Storage',
|
|
'508': 'Loop Detected',
|
|
'510': 'Not Extended',
|
|
'511': 'Network Authentication Required',
|
|
};
|
|
|
|
module.exports = NetworkManager;
|