2019-05-20 17:04:18 +00:00
|
|
|
const chai = require('chai')
|
|
|
|
const dirtyChai = require('dirty-chai')
|
|
|
|
const chaiAsPromised = require('chai-as-promised')
|
|
|
|
|
2016-03-25 20:03:49 +00:00
|
|
|
const http = require('http')
|
|
|
|
const path = require('path')
|
|
|
|
const qs = require('querystring')
|
2019-05-10 00:51:44 +00:00
|
|
|
const { promisify } = require('util')
|
|
|
|
const { emittedOnce } = require('./events-helpers')
|
2018-09-13 16:10:51 +00:00
|
|
|
const { closeWindow } = require('./window-helpers')
|
|
|
|
const { remote } = require('electron')
|
|
|
|
const { BrowserWindow, ipcMain, protocol, session, webContents } = remote
|
2017-11-10 12:35:32 +00:00
|
|
|
// The RPC API doesn't seem to support calling methods on remote objects very
|
|
|
|
// well. In order to test stream protocol, we must work around this limitation
|
|
|
|
// and use Stream instances created in the browser process.
|
|
|
|
const stream = remote.require('stream')
|
2016-03-25 20:03:49 +00:00
|
|
|
|
2019-05-20 17:04:18 +00:00
|
|
|
const { expect } = chai
|
|
|
|
chai.use(dirtyChai)
|
|
|
|
chai.use(chaiAsPromised)
|
|
|
|
|
2017-11-23 22:22:43 +00:00
|
|
|
/* The whole protocol API doesn't use standard callbacks */
|
|
|
|
/* eslint-disable standard/no-callback-literal */
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol module', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
const fixtures = path.resolve(__dirname, 'fixtures')
|
2017-10-26 20:30:07 +00:00
|
|
|
const protocolName = 'sp'
|
|
|
|
const text = 'valar morghulis'
|
|
|
|
const postData = {
|
2016-01-12 02:40:23 +00:00
|
|
|
name: 'post test',
|
|
|
|
type: 'string'
|
2016-03-25 20:03:49 +00:00
|
|
|
}
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
const registerStringProtocol = promisify(protocol.registerStringProtocol)
|
|
|
|
const registerBufferProtocol = promisify(protocol.registerBufferProtocol)
|
|
|
|
const registerStreamProtocol = promisify(protocol.registerStreamProtocol)
|
|
|
|
const registerFileProtocol = promisify(protocol.registerFileProtocol)
|
|
|
|
const registerHttpProtocol = promisify(protocol.registerHttpProtocol)
|
|
|
|
const unregisterProtocol = promisify(protocol.unregisterProtocol)
|
|
|
|
const interceptStringProtocol = promisify(protocol.interceptStringProtocol)
|
|
|
|
const interceptBufferProtocol = promisify(protocol.interceptBufferProtocol)
|
|
|
|
const interceptStreamProtocol = promisify(protocol.interceptStreamProtocol)
|
|
|
|
const interceptFileProtocol = promisify(protocol.interceptFileProtocol)
|
|
|
|
const interceptHttpProtocol = promisify(protocol.interceptHttpProtocol)
|
|
|
|
const uninterceptProtocol = promisify(protocol.uninterceptProtocol)
|
|
|
|
|
|
|
|
const contents = webContents.create({})
|
|
|
|
after(() => contents.destroy())
|
|
|
|
|
|
|
|
async function ajax (url, options = {}) {
|
|
|
|
// Note that we need to do navigation every time after a protocol is
|
|
|
|
// registered or unregistered, otherwise the new protocol won't be
|
|
|
|
// recognized by current page when NetworkService is used.
|
|
|
|
await contents.loadFile(path.join(fixtures, 'pages', 'jquery.html'))
|
|
|
|
return contents.executeJavaScript(`ajax("${url}", ${JSON.stringify(options)})`)
|
|
|
|
}
|
|
|
|
|
2017-11-10 12:35:32 +00:00
|
|
|
function delay (ms) {
|
|
|
|
return new Promise((resolve) => {
|
|
|
|
setTimeout(resolve, ms)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
function getStream (chunkSize = text.length, data = text) {
|
|
|
|
const body = stream.PassThrough()
|
|
|
|
|
|
|
|
async function sendChunks () {
|
2017-11-23 22:22:31 +00:00
|
|
|
let buf = Buffer.from(data)
|
2017-11-10 12:35:32 +00:00
|
|
|
for (;;) {
|
|
|
|
body.push(buf.slice(0, chunkSize))
|
|
|
|
buf = buf.slice(chunkSize)
|
|
|
|
if (!buf.length) {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
// emulate network delay
|
|
|
|
await delay(50)
|
|
|
|
}
|
|
|
|
body.push(null)
|
|
|
|
}
|
|
|
|
|
|
|
|
sendChunks()
|
|
|
|
return body
|
|
|
|
}
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
afterEach((done) => {
|
|
|
|
protocol.unregisterProtocol(protocolName, () => {
|
|
|
|
protocol.uninterceptProtocol('http', () => done())
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.register(Any)Protocol', () => {
|
|
|
|
const emptyHandler = (request, callback) => callback()
|
2016-03-25 20:03:49 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('throws error when scheme is already registered', async () => {
|
|
|
|
await registerStringProtocol(protocolName, emptyHandler)
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(registerBufferProtocol(protocolName, emptyHandler)).to.be.eventually.rejectedWith(Error)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('does not crash when handler is called twice', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const doubleHandler = (request, callback) => {
|
2016-01-12 02:40:23 +00:00
|
|
|
try {
|
2016-03-25 20:03:49 +00:00
|
|
|
callback(text)
|
|
|
|
callback()
|
2016-01-19 22:49:40 +00:00
|
|
|
} catch (error) {
|
2016-01-19 19:31:47 +00:00
|
|
|
// Ignore error
|
2016-01-12 02:40:23 +00:00
|
|
|
}
|
2016-03-25 20:03:49 +00:00
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(protocolName, doubleHandler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends error when callback is called with nothing', async () => {
|
|
|
|
await registerBufferProtocol(protocolName, emptyHandler)
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(ajax(protocolName + '://fake-host')).to.be.eventually.rejectedWith(404)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('does not crash when callback is called in next tick', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
|
|
|
setImmediate(() => callback(text))
|
2016-03-25 20:03:49 +00:00
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.unregisterProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
it('returns error when scheme does not exist', async () => {
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(unregisterProtocol('not-exist')).to.be.eventually.rejectedWith(Error)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.registerStringProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends string as response', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(text)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sets Access-Control-Allow-Origin', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(text)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
|
|
|
expect(r.headers).to.include('access-control-allow-origin: *')
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends object as response', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
2016-02-17 01:39:11 +00:00
|
|
|
callback({
|
2016-01-12 02:40:23 +00:00
|
|
|
data: text,
|
|
|
|
mimeType: 'text/html'
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('fails when sending object other than string', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(new Date())
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(protocolName, handler)
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(ajax(protocolName + '://fake-host')).to.be.eventually.rejectedWith(Error)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.registerBufferProtocol', () => {
|
2017-11-23 22:22:31 +00:00
|
|
|
const buffer = Buffer.from(text)
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends Buffer as response', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(buffer)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerBufferProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sets Access-Control-Allow-Origin', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(buffer)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerBufferProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
|
|
|
expect(r.headers).to.include('access-control-allow-origin: *')
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends object as response', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
2016-02-17 01:39:11 +00:00
|
|
|
callback({
|
2016-01-12 02:40:23 +00:00
|
|
|
data: buffer,
|
|
|
|
mimeType: 'text/html'
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerBufferProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('fails when sending string', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(text)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerBufferProtocol(protocolName, handler)
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(ajax(protocolName + '://fake-host')).to.be.eventually.rejectedWith(Error)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.registerFileProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
const filePath = path.join(fixtures, 'asar', 'a.asar', 'file1')
|
2017-10-26 20:30:07 +00:00
|
|
|
const fileContent = require('fs').readFileSync(filePath)
|
2019-05-10 00:51:44 +00:00
|
|
|
const normalPath = path.join(fixtures, 'pages', 'a.html')
|
2017-10-26 20:30:07 +00:00
|
|
|
const normalContent = require('fs').readFileSync(normalPath)
|
2016-03-25 20:03:49 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends file path as response', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(filePath)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerFileProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(String(fileContent))
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sets Access-Control-Allow-Origin', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(filePath)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerFileProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(String(fileContent))
|
|
|
|
expect(r.headers).to.include('access-control-allow-origin: *')
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-05-05 18:34:16 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sets custom headers', async () => {
|
2018-12-19 06:17:02 +00:00
|
|
|
const handler = (request, callback) => callback({
|
|
|
|
path: filePath,
|
|
|
|
headers: { 'X-Great-Header': 'sogreat' }
|
|
|
|
})
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerFileProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(String(fileContent))
|
|
|
|
expect(r.headers).to.include('x-great-header: sogreat')
|
2018-12-19 06:17:02 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends object as response', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback({ path: filePath })
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerFileProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(String(fileContent))
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can send normal file', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(normalPath)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerFileProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(String(normalContent))
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('fails when sending unexist-file', async () => {
|
|
|
|
const fakeFilePath = path.join(fixtures, 'asar', 'a.asar', 'not-exist')
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(fakeFilePath)
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerFileProtocol(protocolName, handler)
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(ajax(protocolName + '://fake-host')).to.be.eventually.rejectedWith(404)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('fails when sending unsupported content', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(new Date())
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerFileProtocol(protocolName, handler)
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(ajax(protocolName + '://fake-host')).to.be.eventually.rejectedWith(404)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.registerHttpProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends url as response', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const server = http.createServer((req, res) => {
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(req.headers.accept).to.not.equal('')
|
2016-03-25 20:03:49 +00:00
|
|
|
res.end(text)
|
|
|
|
server.close()
|
|
|
|
})
|
2019-05-10 00:51:44 +00:00
|
|
|
await server.listen(0, '127.0.0.1')
|
|
|
|
|
|
|
|
const port = server.address().port
|
|
|
|
const url = 'http://127.0.0.1:' + port
|
|
|
|
const handler = (request, callback) => callback({ url })
|
|
|
|
await registerHttpProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('fails when sending invalid url', async () => {
|
2018-09-13 16:10:51 +00:00
|
|
|
const handler = (request, callback) => callback({ url: 'url' })
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerHttpProtocol(protocolName, handler)
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(ajax(protocolName + '://fake-host')).to.be.eventually.rejectedWith(404)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('fails when sending unsupported content', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(new Date())
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerHttpProtocol(protocolName, handler)
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(ajax(protocolName + '://fake-host')).to.be.eventually.rejectedWith(404)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-05-29 08:13:26 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('works when target URL redirects', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const server = http.createServer((req, res) => {
|
2016-06-29 16:37:10 +00:00
|
|
|
if (req.url === '/serverRedirect') {
|
2016-05-29 08:13:26 +00:00
|
|
|
res.statusCode = 301
|
2017-10-26 20:30:07 +00:00
|
|
|
res.setHeader('Location', `http://${req.rawHeaders[1]}`)
|
2016-05-29 08:13:26 +00:00
|
|
|
res.end()
|
|
|
|
} else {
|
|
|
|
res.end(text)
|
|
|
|
}
|
|
|
|
})
|
2019-05-10 00:51:44 +00:00
|
|
|
after(() => server.close())
|
|
|
|
await server.listen(0, '127.0.0.1')
|
|
|
|
|
|
|
|
const port = server.address().port
|
|
|
|
const url = `${protocolName}://fake-host`
|
|
|
|
const redirectURL = `http://127.0.0.1:${port}/serverRedirect`
|
|
|
|
const handler = (request, callback) => callback({ url: redirectURL })
|
|
|
|
await registerHttpProtocol(protocolName, handler)
|
|
|
|
|
|
|
|
await contents.loadURL(url)
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(contents.getURL()).to.equal(url)
|
2016-05-29 08:13:26 +00:00
|
|
|
})
|
2018-10-30 18:37:49 +00:00
|
|
|
|
|
|
|
it('can access request headers', (done) => {
|
|
|
|
const handler = (request) => {
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(request).to.have.a.property('headers')
|
2018-10-30 18:37:49 +00:00
|
|
|
done()
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
registerHttpProtocol(protocolName, handler, () => {
|
|
|
|
ajax(protocolName + '://fake-host')
|
2018-10-30 18:37:49 +00:00
|
|
|
})
|
|
|
|
})
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2017-11-10 12:35:32 +00:00
|
|
|
describe('protocol.registerStreamProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends Stream as response', async () => {
|
2017-11-10 12:35:32 +00:00
|
|
|
const handler = (request, callback) => callback(getStream())
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStreamProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends object as response', async () => {
|
2018-09-13 16:10:51 +00:00
|
|
|
const handler = (request, callback) => callback({ data: getStream() })
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStreamProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
|
|
|
expect(r.status).to.equal(200)
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends custom response headers', async () => {
|
2017-11-10 12:35:32 +00:00
|
|
|
const handler = (request, callback) => callback({
|
|
|
|
data: getStream(3),
|
|
|
|
headers: {
|
|
|
|
'x-electron': ['a', 'b']
|
|
|
|
}
|
|
|
|
})
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStreamProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
|
|
|
expect(r.status).to.equal(200)
|
|
|
|
expect(r.headers).to.include('x-electron: a, b')
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends custom status code', async () => {
|
2017-11-10 12:35:32 +00:00
|
|
|
const handler = (request, callback) => callback({
|
|
|
|
statusCode: 204,
|
|
|
|
data: null
|
|
|
|
})
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStreamProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.be.undefined()
|
|
|
|
expect(r.status).to.equal(204)
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('receives request headers', async () => {
|
2017-11-10 12:35:32 +00:00
|
|
|
const handler = (request, callback) => {
|
|
|
|
callback({
|
|
|
|
headers: {
|
|
|
|
'content-type': 'application/json'
|
|
|
|
},
|
|
|
|
data: getStream(5, JSON.stringify(Object.assign({}, request.headers)))
|
|
|
|
})
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStreamProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host', { headers: { 'x-return-headers': 'yes' } })
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data['x-return-headers']).to.equal('yes')
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
2018-10-25 00:34:20 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('returns response multiple response headers with the same name', async () => {
|
2018-10-25 00:34:20 +00:00
|
|
|
const handler = (request, callback) => {
|
|
|
|
callback({
|
|
|
|
headers: {
|
|
|
|
'header1': ['value1', 'value2'],
|
|
|
|
'header2': 'value3'
|
|
|
|
},
|
|
|
|
data: getStream()
|
|
|
|
})
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStreamProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
|
|
|
// SUBTLE: when the response headers have multiple values it
|
|
|
|
// separates values by ", ". When the response headers are incorrectly
|
|
|
|
// converting an array to a string it separates values by ",".
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.headers).to.equal('header1: value1, value2\r\nheader2: value3\r\n')
|
2018-10-25 00:34:20 +00:00
|
|
|
})
|
2019-01-25 18:57:26 +00:00
|
|
|
|
|
|
|
it('can handle large responses', async () => {
|
|
|
|
const data = Buffer.alloc(128 * 1024)
|
|
|
|
const handler = (request, callback) => {
|
|
|
|
callback(getStream(data.length, data))
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStreamProtocol(protocolName, handler)
|
|
|
|
const r = await ajax(protocolName + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.have.lengthOf(data.length)
|
2019-01-25 18:57:26 +00:00
|
|
|
})
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
|
|
|
|
2019-01-25 22:23:24 +00:00
|
|
|
describe('protocol.isProtocolHandled', () => {
|
2019-01-17 17:05:10 +00:00
|
|
|
it('returns true for about:', async () => {
|
|
|
|
const result = await protocol.isProtocolHandled('about')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(result).to.be.true()
|
2016-11-09 05:30:50 +00:00
|
|
|
})
|
|
|
|
|
2019-01-17 17:05:10 +00:00
|
|
|
it('returns true for file:', async () => {
|
|
|
|
const result = await protocol.isProtocolHandled('file')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(result).to.be.true()
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-01-17 17:05:10 +00:00
|
|
|
it('returns true for http:', async () => {
|
|
|
|
const result = await protocol.isProtocolHandled('http')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(result).to.be.true()
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-01-17 17:05:10 +00:00
|
|
|
it('returns true for https:', async () => {
|
|
|
|
const result = await protocol.isProtocolHandled('https')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(result).to.be.true()
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-01-17 17:05:10 +00:00
|
|
|
it('returns false when scheme is not registered', async () => {
|
|
|
|
const result = await protocol.isProtocolHandled('no-exist')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(result).to.be.false()
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('returns true for custom protocol', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const emptyHandler = (request, callback) => callback()
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(protocolName, emptyHandler)
|
|
|
|
const result = await protocol.isProtocolHandled(protocolName)
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(result).to.be.true()
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('returns true for intercepted protocol', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const emptyHandler = (request, callback) => callback()
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptStringProtocol('http', emptyHandler)
|
|
|
|
const result = await protocol.isProtocolHandled('http')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(result).to.be.true()
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.intercept(Any)Protocol', () => {
|
|
|
|
const emptyHandler = (request, callback) => callback()
|
|
|
|
it('throws error when scheme is already intercepted', (done) => {
|
|
|
|
protocol.interceptStringProtocol('http', emptyHandler, (error) => {
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(error).to.be.null()
|
2017-10-26 20:30:07 +00:00
|
|
|
protocol.interceptBufferProtocol('http', emptyHandler, (error) => {
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(error).to.not.be.null()
|
2016-03-25 20:03:49 +00:00
|
|
|
done()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('does not crash when handler is called twice', async () => {
|
2018-09-28 23:17:00 +00:00
|
|
|
const doubleHandler = (request, callback) => {
|
2016-01-12 02:40:23 +00:00
|
|
|
try {
|
2016-03-25 20:03:49 +00:00
|
|
|
callback(text)
|
|
|
|
callback()
|
2016-01-19 22:49:40 +00:00
|
|
|
} catch (error) {
|
2016-01-19 19:31:47 +00:00
|
|
|
// Ignore error
|
2016-01-12 02:40:23 +00:00
|
|
|
}
|
2016-03-25 20:03:49 +00:00
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptStringProtocol('http', doubleHandler)
|
|
|
|
const r = await ajax('http://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.be.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('sends error when callback is called with nothing', async () => {
|
|
|
|
await interceptStringProtocol('http', emptyHandler)
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(ajax('http://fake-host')).to.be.eventually.rejectedWith(404)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.interceptStringProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can intercept http protocol', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => callback(text)
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptStringProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can set content-type', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
2016-02-17 01:39:11 +00:00
|
|
|
callback({
|
2016-01-12 02:40:23 +00:00
|
|
|
mimeType: 'application/json',
|
|
|
|
data: '{"value": 1}'
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptStringProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.be.an('object')
|
|
|
|
expect(r.data).to.have.a.property('value').that.is.equal(1)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-02-17 01:09:41 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can receive post data', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
|
|
|
const uploadData = request.uploadData[0].bytes.toString()
|
2018-09-13 16:10:51 +00:00
|
|
|
callback({ data: uploadData })
|
2016-03-25 20:03:49 +00:00
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptStringProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host', { type: 'POST', data: postData })
|
2019-05-20 17:04:18 +00:00
|
|
|
expect({ ...qs.parse(r.data) }).to.deep.equal(postData)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.interceptBufferProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can intercept http protocol', async () => {
|
2017-11-23 22:22:31 +00:00
|
|
|
const handler = (request, callback) => callback(Buffer.from(text))
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptBufferProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can receive post data', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
|
|
|
const uploadData = request.uploadData[0].bytes
|
2016-03-25 20:03:49 +00:00
|
|
|
callback(uploadData)
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptBufferProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host', { type: 'POST', data: postData })
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal($.param(postData))
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.interceptHttpProtocol', () => {
|
2019-05-07 02:33:05 +00:00
|
|
|
// FIXME(zcbenz): This test was passing because the test itself was wrong,
|
|
|
|
// I don't know whether it ever passed before and we should take a look at
|
|
|
|
// it in future.
|
2019-05-10 00:51:44 +00:00
|
|
|
xit('can send POST request', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const server = http.createServer((req, res) => {
|
|
|
|
let body = ''
|
|
|
|
req.on('data', (chunk) => {
|
2016-03-25 20:03:49 +00:00
|
|
|
body += chunk
|
|
|
|
})
|
2017-10-26 20:30:07 +00:00
|
|
|
req.on('end', () => {
|
2016-03-25 20:03:49 +00:00
|
|
|
res.end(body)
|
|
|
|
})
|
|
|
|
server.close()
|
|
|
|
})
|
2019-05-10 00:51:44 +00:00
|
|
|
after(() => server.close())
|
|
|
|
await server.listen(0, '127.0.0.1')
|
|
|
|
|
|
|
|
const port = server.address().port
|
|
|
|
const url = `http://127.0.0.1:${port}`
|
|
|
|
const handler = (request, callback) => {
|
|
|
|
const data = {
|
|
|
|
url: url,
|
|
|
|
method: 'POST',
|
|
|
|
uploadData: {
|
|
|
|
contentType: 'application/x-www-form-urlencoded',
|
|
|
|
data: request.uploadData[0].bytes.toString()
|
|
|
|
},
|
|
|
|
session: null
|
2016-03-25 20:03:49 +00:00
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
callback(data)
|
|
|
|
}
|
|
|
|
await interceptHttpProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host', { type: 'POST', data: postData })
|
2019-05-20 17:04:18 +00:00
|
|
|
expect({ ...qs.parse(r.data) }).to.deep.equal(postData)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
2016-11-27 19:07:50 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can use custom session', async () => {
|
2018-09-13 16:10:51 +00:00
|
|
|
const customSession = session.fromPartition('custom-ses', { cache: false })
|
2017-10-26 20:30:07 +00:00
|
|
|
customSession.webRequest.onBeforeRequest((details, callback) => {
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(details.url).to.equal('http://fake-host/')
|
2018-09-13 16:10:51 +00:00
|
|
|
callback({ cancel: true })
|
2016-11-27 19:07:50 +00:00
|
|
|
})
|
2019-05-10 00:51:44 +00:00
|
|
|
after(() => customSession.webRequest.onBeforeRequest(null))
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
2016-11-27 19:07:50 +00:00
|
|
|
callback({
|
|
|
|
url: request.url,
|
|
|
|
session: customSession
|
|
|
|
})
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptHttpProtocol('http', handler)
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(fetch('http://fake-host')).to.be.eventually.rejectedWith(Error)
|
2016-11-27 19:07:50 +00:00
|
|
|
})
|
2018-10-30 18:37:49 +00:00
|
|
|
|
|
|
|
it('can access request headers', (done) => {
|
|
|
|
const handler = (request) => {
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(request).to.have.a.property('headers')
|
2018-10-30 18:37:49 +00:00
|
|
|
done()
|
|
|
|
}
|
|
|
|
protocol.interceptHttpProtocol('http', handler, () => {
|
|
|
|
fetch('http://fake-host')
|
|
|
|
})
|
|
|
|
})
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2017-11-10 12:35:32 +00:00
|
|
|
describe('protocol.interceptStreamProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can intercept http protocol', async () => {
|
2017-11-10 12:35:32 +00:00
|
|
|
const handler = (request, callback) => callback(getStream())
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptStreamProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal(text)
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can receive post data', async () => {
|
2017-11-10 12:35:32 +00:00
|
|
|
const handler = (request, callback) => {
|
|
|
|
callback(getStream(3, request.uploadData[0].bytes.toString()))
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptStreamProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host', { type: 'POST', data: postData })
|
2019-05-20 17:04:18 +00:00
|
|
|
expect({ ...qs.parse(r.data) }).to.deep.equal(postData)
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can execute redirects', async () => {
|
2017-11-10 12:35:32 +00:00
|
|
|
const handler = (request, callback) => {
|
|
|
|
if (request.url.indexOf('http://fake-host') === 0) {
|
|
|
|
setTimeout(() => {
|
|
|
|
callback({
|
|
|
|
data: null,
|
|
|
|
statusCode: 302,
|
|
|
|
headers: {
|
|
|
|
Location: 'http://fake-redirect'
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}, 300)
|
|
|
|
} else {
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(request.url.indexOf('http://fake-redirect')).to.equal(0)
|
2017-11-10 12:35:32 +00:00
|
|
|
callback(getStream(1, 'redirect'))
|
|
|
|
}
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await interceptStreamProtocol('http', handler)
|
|
|
|
const r = await ajax('http://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(r.data).to.equal('redirect')
|
2017-11-10 12:35:32 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
describe('protocol.uninterceptProtocol', () => {
|
2019-05-10 00:51:44 +00:00
|
|
|
it('returns error when scheme does not exist', async () => {
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(uninterceptProtocol('not-exist')).to.be.eventually.rejectedWith(Error)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('returns error when scheme is not intercepted', async () => {
|
2019-05-20 17:04:18 +00:00
|
|
|
await expect(uninterceptProtocol('http')).to.be.eventually.rejectedWith(Error)
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|
|
|
|
})
|
2016-05-05 18:34:16 +00:00
|
|
|
|
2019-01-29 07:11:01 +00:00
|
|
|
describe('protocol.registerSchemesAsPrivileged standard', () => {
|
2016-05-07 18:43:23 +00:00
|
|
|
const standardScheme = remote.getGlobal('standardScheme')
|
2017-10-26 20:30:07 +00:00
|
|
|
const origin = `${standardScheme}://fake-host`
|
|
|
|
const imageURL = `${origin}/test.png`
|
2019-05-10 00:51:44 +00:00
|
|
|
const filePath = path.join(fixtures, 'pages', 'b.html')
|
2016-05-05 18:34:16 +00:00
|
|
|
const fileContent = '<img src="/test.png" />'
|
2017-10-26 20:30:07 +00:00
|
|
|
let w = null
|
|
|
|
let success = null
|
2016-05-05 18:34:16 +00:00
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
beforeEach(() => {
|
2019-01-07 19:19:27 +00:00
|
|
|
w = new BrowserWindow({
|
|
|
|
show: false,
|
|
|
|
webPreferences: {
|
|
|
|
nodeIntegration: true
|
|
|
|
}
|
|
|
|
})
|
2016-05-05 18:34:16 +00:00
|
|
|
success = false
|
|
|
|
})
|
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
afterEach((done) => {
|
|
|
|
protocol.unregisterProtocol(standardScheme, () => {
|
|
|
|
closeWindow(w).then(() => {
|
2016-08-03 19:47:53 +00:00
|
|
|
w = null
|
|
|
|
done()
|
|
|
|
})
|
2016-05-05 18:34:16 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('resolves relative resources', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
2016-05-05 18:34:16 +00:00
|
|
|
if (request.url === imageURL) {
|
|
|
|
success = true
|
|
|
|
callback()
|
|
|
|
} else {
|
|
|
|
callback(filePath)
|
|
|
|
}
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerFileProtocol(standardScheme, handler)
|
|
|
|
await w.loadURL(origin)
|
2016-05-05 18:34:16 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('resolves absolute resources', async () => {
|
2017-10-26 20:30:07 +00:00
|
|
|
const handler = (request, callback) => {
|
2016-05-05 18:34:16 +00:00
|
|
|
if (request.url === imageURL) {
|
|
|
|
success = true
|
|
|
|
callback()
|
|
|
|
} else {
|
|
|
|
callback({
|
|
|
|
data: fileContent,
|
|
|
|
mimeType: 'text/html'
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(standardScheme, handler)
|
|
|
|
await w.loadURL(origin)
|
2016-06-29 16:37:10 +00:00
|
|
|
})
|
2016-06-08 05:44:30 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('can have fetch working in it', async () => {
|
2016-06-08 05:44:30 +00:00
|
|
|
const content = '<html><script>fetch("http://github.com")</script></html>'
|
2018-09-13 16:10:51 +00:00
|
|
|
const handler = (request, callback) => callback({ data: content, mimeType: 'text/html' })
|
2019-05-10 00:51:44 +00:00
|
|
|
await registerStringProtocol(standardScheme, handler)
|
|
|
|
await w.loadURL(origin)
|
2016-05-05 18:34:16 +00:00
|
|
|
})
|
2016-08-24 01:23:14 +00:00
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
it('can access files through the FileSystem API', (done) => {
|
2019-05-10 00:51:44 +00:00
|
|
|
const filePath = path.join(fixtures, 'pages', 'filesystem.html')
|
2018-09-13 16:10:51 +00:00
|
|
|
const handler = (request, callback) => callback({ path: filePath })
|
2017-10-26 20:30:07 +00:00
|
|
|
protocol.registerFileProtocol(standardScheme, handler, (error) => {
|
2016-08-24 01:23:14 +00:00
|
|
|
if (error) return done(error)
|
|
|
|
w.loadURL(origin)
|
|
|
|
})
|
|
|
|
ipcMain.once('file-system-error', (event, err) => done(err))
|
|
|
|
ipcMain.once('file-system-write-end', () => done())
|
|
|
|
})
|
2016-11-14 16:20:04 +00:00
|
|
|
|
2017-10-26 20:30:07 +00:00
|
|
|
it('registers secure, when {secure: true}', (done) => {
|
2019-05-10 00:51:44 +00:00
|
|
|
const filePath = path.join(fixtures, 'pages', 'cache-storage.html')
|
2018-09-13 16:10:51 +00:00
|
|
|
const handler = (request, callback) => callback({ path: filePath })
|
2016-11-14 16:20:04 +00:00
|
|
|
ipcMain.once('success', () => done())
|
|
|
|
ipcMain.once('failure', (event, err) => done(err))
|
2017-10-26 20:30:07 +00:00
|
|
|
protocol.registerFileProtocol(standardScheme, handler, (error) => {
|
2016-11-14 16:20:04 +00:00
|
|
|
if (error) return done(error)
|
|
|
|
w.loadURL(origin)
|
|
|
|
})
|
|
|
|
})
|
2016-05-05 18:34:16 +00:00
|
|
|
})
|
2019-01-29 07:11:01 +00:00
|
|
|
|
|
|
|
describe('protocol.registerSchemesAsPrivileged cors-fetch', function () {
|
|
|
|
const standardScheme = remote.getGlobal('standardScheme')
|
|
|
|
let w = null
|
|
|
|
|
|
|
|
beforeEach((done) => {
|
|
|
|
protocol.unregisterProtocol(standardScheme, () => done())
|
|
|
|
})
|
|
|
|
|
|
|
|
afterEach((done) => {
|
|
|
|
closeWindow(w).then(() => {
|
|
|
|
w = null
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('supports fetch api by default', async () => {
|
2019-01-29 07:11:01 +00:00
|
|
|
const url = 'file://' + fixtures + '/assets/logo.png'
|
2019-05-10 00:51:44 +00:00
|
|
|
const response = await window.fetch(url)
|
2019-05-20 17:04:18 +00:00
|
|
|
expect(response.ok).to.be.true()
|
2019-01-29 07:11:01 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('allows CORS requests by default', async () => {
|
|
|
|
await allowsCORSRequests('cors', 200, `<html>
|
2019-01-29 07:11:01 +00:00
|
|
|
<script>
|
|
|
|
const {ipcRenderer} = require('electron')
|
|
|
|
fetch('cors://myhost').then(function (response) {
|
|
|
|
ipcRenderer.send('response', response.status)
|
|
|
|
}).catch(function (response) {
|
|
|
|
ipcRenderer.send('response', 'failed')
|
|
|
|
})
|
|
|
|
</script>
|
2019-05-10 00:51:44 +00:00
|
|
|
</html>`)
|
2019-01-29 07:11:01 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('disallows CORS, but allows fetch requests, when specified', async () => {
|
|
|
|
await allowsCORSRequests('no-cors', 'failed', `<html>
|
2019-01-29 07:11:01 +00:00
|
|
|
<script>
|
|
|
|
const {ipcRenderer} = require('electron')
|
|
|
|
fetch('no-cors://myhost').then(function (response) {
|
|
|
|
ipcRenderer.send('response', response.status)
|
|
|
|
}).catch(function (response) {
|
|
|
|
ipcRenderer.send('response', 'failed')
|
|
|
|
})
|
|
|
|
</script>
|
2019-05-10 00:51:44 +00:00
|
|
|
</html>`)
|
2019-01-29 07:11:01 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
it('allows CORS, but disallows fetch requests, when specified', async () => {
|
|
|
|
await allowsCORSRequests('no-fetch', 'failed', `<html>
|
2019-01-29 07:11:01 +00:00
|
|
|
<script>
|
|
|
|
const {ipcRenderer} = require('electron')
|
|
|
|
fetch('no-fetch://myhost').then(function
|
|
|
|
(response) {
|
|
|
|
ipcRenderer.send('response', response.status)
|
|
|
|
}).catch(function (response) {
|
|
|
|
ipcRenderer.send('response', 'failed')
|
|
|
|
})
|
|
|
|
</script>
|
2019-05-10 00:51:44 +00:00
|
|
|
</html>`)
|
2019-01-29 07:11:01 +00:00
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
async function allowsCORSRequests (corsScheme, expected, content) {
|
|
|
|
await registerStringProtocol(standardScheme, (request, callback) => {
|
|
|
|
callback({ data: content, mimeType: 'text/html' })
|
|
|
|
})
|
|
|
|
await registerStringProtocol(corsScheme, (request, callback) => {
|
|
|
|
callback('')
|
|
|
|
})
|
|
|
|
after(async () => {
|
|
|
|
try {
|
|
|
|
await unregisterProtocol(corsScheme)
|
|
|
|
} catch {
|
|
|
|
// Ignore error.
|
2019-01-29 07:11:01 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
const newContents = webContents.create({ nodeIntegration: true })
|
|
|
|
after(() => newContents.destroy())
|
2019-01-29 07:11:01 +00:00
|
|
|
|
2019-05-10 00:51:44 +00:00
|
|
|
const event = emittedOnce(ipcMain, 'response')
|
|
|
|
newContents.loadURL(standardScheme + '://fake-host')
|
2019-05-20 17:04:18 +00:00
|
|
|
const [, response] = await event
|
|
|
|
expect(response).to.equal(expected)
|
2019-01-29 07:11:01 +00:00
|
|
|
}
|
|
|
|
})
|
2016-03-25 20:03:49 +00:00
|
|
|
})
|