3d56a9e76f
* chore: remove "Extracting..." log message Fixes #5741. * test: support extra Launcher options and skips The extra Launcher options and skipping conditions enable unit tests to be run more easily by third-parties, e.g. browser vendors that are interested in Puppeteer support. Extra Launcher options were previously removed as part of switching away from the custom test harness. * test: enable more tests for Firefox
132 lines
4.5 KiB
JavaScript
132 lines
4.5 KiB
JavaScript
/**
|
|
* Copyright 2018 Google Inc. All rights reserved.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
const expect = require('expect');
|
|
const { getTestState } = require('./mocha-utils');
|
|
|
|
describe('ignoreHTTPSErrors', function () {
|
|
/* Note that this test creates its own browser rather than use
|
|
* the one provided by the test set-up as we need one
|
|
* with ignoreHTTPSErrors set to true
|
|
*/
|
|
let browser;
|
|
let context;
|
|
let page;
|
|
|
|
before(async () => {
|
|
const { defaultBrowserOptions, puppeteer } = getTestState();
|
|
const options = Object.assign(
|
|
{ ignoreHTTPSErrors: true },
|
|
defaultBrowserOptions
|
|
);
|
|
browser = await puppeteer.launch(options);
|
|
});
|
|
|
|
after(async () => {
|
|
await browser.close();
|
|
browser = null;
|
|
});
|
|
|
|
beforeEach(async () => {
|
|
context = await browser.createIncognitoBrowserContext();
|
|
page = await context.newPage();
|
|
});
|
|
|
|
afterEach(async () => {
|
|
await context.close();
|
|
context = null;
|
|
page = null;
|
|
});
|
|
|
|
describeFailsFirefox('Response.securityDetails', function () {
|
|
it('should work', async () => {
|
|
const { httpsServer } = getTestState();
|
|
|
|
const [serverRequest, response] = await Promise.all([
|
|
httpsServer.waitForRequest('/empty.html'),
|
|
page.goto(httpsServer.EMPTY_PAGE),
|
|
]);
|
|
const securityDetails = response.securityDetails();
|
|
expect(securityDetails.issuer()).toBe('puppeteer-tests');
|
|
const protocol = serverRequest.socket.getProtocol().replace('v', ' ');
|
|
expect(securityDetails.protocol()).toBe(protocol);
|
|
expect(securityDetails.subjectName()).toBe('puppeteer-tests');
|
|
expect(securityDetails.validFrom()).toBe(1589357069);
|
|
expect(securityDetails.validTo()).toBe(1904717069);
|
|
expect(securityDetails.subjectAlternativeNames()).toEqual([
|
|
'www.puppeteer-tests.test',
|
|
'www.puppeteer-tests-1.test',
|
|
]);
|
|
});
|
|
it('should be |null| for non-secure requests', async () => {
|
|
const { server } = getTestState();
|
|
|
|
const response = await page.goto(server.EMPTY_PAGE);
|
|
expect(response.securityDetails()).toBe(null);
|
|
});
|
|
it('Network redirects should report SecurityDetails', async () => {
|
|
const { httpsServer } = getTestState();
|
|
|
|
httpsServer.setRedirect('/plzredirect', '/empty.html');
|
|
const responses = [];
|
|
page.on('response', (response) => responses.push(response));
|
|
const [serverRequest] = await Promise.all([
|
|
httpsServer.waitForRequest('/plzredirect'),
|
|
page.goto(httpsServer.PREFIX + '/plzredirect'),
|
|
]);
|
|
expect(responses.length).toBe(2);
|
|
expect(responses[0].status()).toBe(302);
|
|
const securityDetails = responses[0].securityDetails();
|
|
const protocol = serverRequest.socket.getProtocol().replace('v', ' ');
|
|
expect(securityDetails.protocol()).toBe(protocol);
|
|
});
|
|
});
|
|
|
|
it('should work', async () => {
|
|
const { httpsServer } = getTestState();
|
|
|
|
let error = null;
|
|
const response = await page
|
|
.goto(httpsServer.EMPTY_PAGE)
|
|
.catch((error_) => (error = error_));
|
|
expect(error).toBe(null);
|
|
expect(response.ok()).toBe(true);
|
|
});
|
|
itFailsFirefox('should work with request interception', async () => {
|
|
const { httpsServer } = getTestState();
|
|
|
|
await page.setRequestInterception(true);
|
|
page.on('request', (request) => request.continue());
|
|
const response = await page.goto(httpsServer.EMPTY_PAGE);
|
|
expect(response.status()).toBe(200);
|
|
});
|
|
itFailsFirefox('should work with mixed content', async () => {
|
|
const { server, httpsServer } = getTestState();
|
|
|
|
httpsServer.setRoute('/mixedcontent.html', (req, res) => {
|
|
res.end(`<iframe src=${server.EMPTY_PAGE}></iframe>`);
|
|
});
|
|
await page.goto(httpsServer.PREFIX + '/mixedcontent.html', {
|
|
waitUntil: 'load',
|
|
});
|
|
expect(page.frames().length).toBe(2);
|
|
// Make sure blocked iframe has functional execution context
|
|
// @see https://github.com/puppeteer/puppeteer/issues/2709
|
|
expect(await page.frames()[0].evaluate('1 + 2')).toBe(3);
|
|
expect(await page.frames()[1].evaluate('2 + 3')).toBe(5);
|
|
});
|
|
});
|