summaryrefslogtreecommitdiffstats
path: root/remote/test/puppeteer/test/src/ignorehttpserrors.spec.ts
diff options
context:
space:
mode:
Diffstat (limited to 'remote/test/puppeteer/test/src/ignorehttpserrors.spec.ts')
-rw-r--r--remote/test/puppeteer/test/src/ignorehttpserrors.spec.ts143
1 files changed, 143 insertions, 0 deletions
diff --git a/remote/test/puppeteer/test/src/ignorehttpserrors.spec.ts b/remote/test/puppeteer/test/src/ignorehttpserrors.spec.ts
new file mode 100644
index 0000000000..8217092e22
--- /dev/null
+++ b/remote/test/puppeteer/test/src/ignorehttpserrors.spec.ts
@@ -0,0 +1,143 @@
+/**
+ * Copyright 2018 Google Inc. All rights reserved.
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+import {TLSSocket} from 'tls';
+
+import expect from 'expect';
+import {Browser} from 'puppeteer-core/internal/api/Browser.js';
+import {BrowserContext} from 'puppeteer-core/internal/api/BrowserContext.js';
+import {HTTPResponse} from 'puppeteer-core/internal/api/HTTPResponse.js';
+import {Page} from 'puppeteer-core/internal/api/Page.js';
+
+import {getTestState} from './mocha-utils.js';
+
+describe('ignoreHTTPSErrors', function () {
+ /* Note that this test creates its own browser rather than use
+ * the one provided by the test set-up as we need one
+ * with ignoreHTTPSErrors set to true
+ */
+ let browser!: Browser;
+ let context: BrowserContext;
+ let page!: Page;
+
+ before(async () => {
+ const {defaultBrowserOptions, puppeteer} = getTestState();
+ const options = Object.assign(
+ {ignoreHTTPSErrors: true},
+ defaultBrowserOptions
+ );
+ browser = await puppeteer.launch(options);
+ });
+
+ after(async () => {
+ await browser.close();
+ });
+
+ beforeEach(async () => {
+ context = await browser.createIncognitoBrowserContext();
+ page = await context.newPage();
+ });
+
+ afterEach(async () => {
+ await context.close();
+ });
+
+ describe('Response.securityDetails', function () {
+ it('should work', async () => {
+ const {httpsServer} = getTestState();
+
+ const [serverRequest, response] = await Promise.all([
+ httpsServer.waitForRequest('/empty.html'),
+ page.goto(httpsServer.EMPTY_PAGE),
+ ]);
+ const securityDetails = response!.securityDetails()!;
+ expect(securityDetails.issuer()).toBe('puppeteer-tests');
+ const protocol = (serverRequest.socket as TLSSocket)
+ .getProtocol()!
+ .replace('v', ' ');
+ expect(securityDetails.protocol()).toBe(protocol);
+ expect(securityDetails.subjectName()).toBe('puppeteer-tests');
+ expect(securityDetails.validFrom()).toBe(1589357069);
+ expect(securityDetails.validTo()).toBe(1904717069);
+ expect(securityDetails.subjectAlternativeNames()).toEqual([
+ 'www.puppeteer-tests.test',
+ 'www.puppeteer-tests-1.test',
+ ]);
+ });
+ it('should be |null| for non-secure requests', async () => {
+ const {server} = getTestState();
+
+ const response = (await page.goto(server.EMPTY_PAGE))!;
+ expect(response.securityDetails()).toBe(null);
+ });
+ it('Network redirects should report SecurityDetails', async () => {
+ const {httpsServer} = getTestState();
+
+ httpsServer.setRedirect('/plzredirect', '/empty.html');
+ const responses: HTTPResponse[] = [];
+ page.on('response', response => {
+ return responses.push(response);
+ });
+ const [serverRequest] = await Promise.all([
+ httpsServer.waitForRequest('/plzredirect'),
+ page.goto(httpsServer.PREFIX + '/plzredirect'),
+ ]);
+ expect(responses).toHaveLength(2);
+ expect(responses[0]!.status()).toBe(302);
+ const securityDetails = responses[0]!.securityDetails()!;
+ const protocol = (serverRequest.socket as TLSSocket)
+ .getProtocol()!
+ .replace('v', ' ');
+ expect(securityDetails.protocol()).toBe(protocol);
+ });
+ });
+
+ it('should work', async () => {
+ const {httpsServer} = getTestState();
+
+ let error!: Error;
+ const response = await page.goto(httpsServer.EMPTY_PAGE).catch(error_ => {
+ return (error = error_);
+ });
+ expect(error).toBeUndefined();
+ expect(response.ok()).toBe(true);
+ });
+ it('should work with request interception', async () => {
+ const {httpsServer} = getTestState();
+
+ await page.setRequestInterception(true);
+ page.on('request', request => {
+ return request.continue();
+ });
+ const response = (await page.goto(httpsServer.EMPTY_PAGE))!;
+ expect(response.status()).toBe(200);
+ });
+ it('should work with mixed content', async () => {
+ const {server, httpsServer} = getTestState();
+
+ httpsServer.setRoute('/mixedcontent.html', (_req, res) => {
+ res.end(`<iframe src=${server.EMPTY_PAGE}></iframe>`);
+ });
+ await page.goto(httpsServer.PREFIX + '/mixedcontent.html', {
+ waitUntil: 'load',
+ });
+ expect(page.frames()).toHaveLength(2);
+ // Make sure blocked iframe has functional execution context
+ // @see https://github.com/puppeteer/puppeteer/issues/2709
+ expect(await page.frames()[0]!.evaluate('1 + 2')).toBe(3);
+ expect(await page.frames()[1]!.evaluate('2 + 3')).toBe(5);
+ });
+});