mirror of
https://github.com/puppeteer/puppeteer
synced 2024-06-14 14:02:48 +00:00
32c0363ade
This roll includes: - https://crrev.com/588420 - DevTools: teach request interception to work with Security.setIgnoreCertificateErrors Fixes #1159.
77 lines
3.2 KiB
JavaScript
77 lines
3.2 KiB
JavaScript
/**
|
|
* Copyright 2018 Google Inc. All rights reserved.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
const utils = require('./utils');
|
|
const puppeteer = utils.requireRoot('index.js');
|
|
|
|
module.exports.addTests = function({testRunner, expect, defaultBrowserOptions}) {
|
|
const {describe, xdescribe, fdescribe} = testRunner;
|
|
const {it, fit, xit} = testRunner;
|
|
const {beforeAll, beforeEach, afterAll, afterEach} = testRunner;
|
|
describe('ignoreHTTPSErrors', function() {
|
|
beforeAll(async state => {
|
|
const options = Object.assign({ignoreHTTPSErrors: true}, defaultBrowserOptions);
|
|
state.browser = await puppeteer.launch(options);
|
|
});
|
|
afterAll(async state => {
|
|
await state.browser.close();
|
|
delete state.browser;
|
|
});
|
|
beforeEach(async state => {
|
|
state.page = await state.browser.newPage();
|
|
});
|
|
afterEach(async state => {
|
|
await state.page.close();
|
|
delete state.page;
|
|
});
|
|
it('should work', async({page, httpsServer}) => {
|
|
let error = null;
|
|
const response = await page.goto(httpsServer.EMPTY_PAGE).catch(e => error = e);
|
|
expect(error).toBe(null);
|
|
expect(response.ok()).toBe(true);
|
|
expect(response.securityDetails()).toBeTruthy();
|
|
expect(response.securityDetails().protocol()).toBe('TLS 1.2');
|
|
});
|
|
it('Network redirects should report SecurityDetails', async({page, httpsServer}) => {
|
|
httpsServer.setRedirect('/plzredirect', '/empty.html');
|
|
const responses = [];
|
|
page.on('response', response => responses.push(response));
|
|
await page.goto(httpsServer.PREFIX + '/plzredirect');
|
|
expect(responses.length).toBe(2);
|
|
expect(responses[0].status()).toBe(302);
|
|
const securityDetails = responses[0].securityDetails();
|
|
expect(securityDetails.protocol()).toBe('TLS 1.2');
|
|
});
|
|
it('should work with request interception', async({page, server, httpsServer}) => {
|
|
await page.setRequestInterception(true);
|
|
page.on('request', request => request.continue());
|
|
const response = await page.goto(httpsServer.EMPTY_PAGE);
|
|
expect(response.status()).toBe(200);
|
|
});
|
|
it('should work with mixed content', async({page, server, httpsServer}) => {
|
|
httpsServer.setRoute('/mixedcontent.html', (req, res) => {
|
|
res.end(`<iframe src=${server.EMPTY_PAGE}></iframe>`);
|
|
});
|
|
await page.goto(httpsServer.PREFIX + '/mixedcontent.html', {waitUntil: 'load'});
|
|
expect(page.frames().length).toBe(2);
|
|
// Make sure blocked iframe has functional execution context
|
|
// @see https://github.com/GoogleChrome/puppeteer/issues/2709
|
|
expect(await page.frames()[0].evaluate('1 + 2')).toBe(3);
|
|
expect(await page.frames()[1].evaluate('2 + 3')).toBe(5);
|
|
});
|
|
});
|
|
};
|