2019-08-27 21:55:19 +00:00
|
|
|
import { expect } from 'chai'
|
|
|
|
import * as http from 'http'
|
|
|
|
import * as https from 'https'
|
|
|
|
import * as path from 'path'
|
|
|
|
import * as fs from 'fs'
|
|
|
|
import * as ChildProcess from 'child_process'
|
|
|
|
import { session, BrowserWindow, net, ipcMain, Session } from 'electron'
|
|
|
|
import * as send from 'send'
|
|
|
|
import * as auth from 'basic-auth'
|
2019-08-29 06:50:14 +00:00
|
|
|
import { closeAllWindows } from './window-helpers'
|
2019-08-27 21:55:19 +00:00
|
|
|
import { emittedOnce } from './events-helpers'
|
2019-11-01 20:37:02 +00:00
|
|
|
import { AddressInfo } from 'net'
|
2019-05-28 21:12:59 +00:00
|
|
|
|
|
|
|
/* The whole session API doesn't use standard callbacks */
|
|
|
|
/* eslint-disable standard/no-callback-literal */
|
|
|
|
|
|
|
|
describe('session module', () => {
|
|
|
|
const fixtures = path.resolve(__dirname, '..', 'spec', 'fixtures')
|
|
|
|
const url = 'http://127.0.0.1'
|
|
|
|
|
|
|
|
describe('session.defaultSession', () => {
|
|
|
|
it('returns the default session', () => {
|
|
|
|
expect(session.defaultSession).to.equal(session.fromPartition(''))
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('session.fromPartition(partition, options)', () => {
|
|
|
|
it('returns existing session with same partition', () => {
|
|
|
|
expect(session.fromPartition('test')).to.equal(session.fromPartition('test'))
|
|
|
|
})
|
|
|
|
|
2019-07-03 15:57:10 +00:00
|
|
|
// TODO(codebytere): remove in Electron v8.0.0
|
2019-08-02 23:56:46 +00:00
|
|
|
it.skip('created session is ref-counted (functions)', () => {
|
2019-05-28 21:12:59 +00:00
|
|
|
const partition = 'test2'
|
|
|
|
const userAgent = 'test-agent'
|
|
|
|
const ses1 = session.fromPartition(partition)
|
|
|
|
ses1.setUserAgent(userAgent)
|
|
|
|
expect(ses1.getUserAgent()).to.equal(userAgent)
|
|
|
|
ses1.destroy()
|
|
|
|
const ses2 = session.fromPartition(partition)
|
|
|
|
expect(ses2.getUserAgent()).to.not.equal(userAgent)
|
|
|
|
})
|
2019-07-03 15:57:10 +00:00
|
|
|
|
2019-08-27 21:55:19 +00:00
|
|
|
it.skip('created session is ref-counted', () => {
|
2019-07-03 15:57:10 +00:00
|
|
|
const partition = 'test2'
|
|
|
|
const userAgent = 'test-agent'
|
|
|
|
const ses1 = session.fromPartition(partition)
|
2019-08-27 21:55:19 +00:00
|
|
|
ses1.setUserAgent(userAgent)
|
|
|
|
expect(ses1.getUserAgent()).to.equal(userAgent)
|
2019-07-03 15:57:10 +00:00
|
|
|
ses1.destroy()
|
|
|
|
const ses2 = session.fromPartition(partition)
|
2019-08-27 21:55:19 +00:00
|
|
|
expect(ses2.getUserAgent()).to.not.equal(userAgent)
|
2019-07-03 15:57:10 +00:00
|
|
|
})
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
describe('ses.cookies', () => {
|
|
|
|
const name = '0'
|
|
|
|
const value = '0'
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-05-28 21:12:59 +00:00
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
it('should get cookies', async () => {
|
2019-05-28 21:12:59 +00:00
|
|
|
const server = http.createServer((req, res) => {
|
|
|
|
res.setHeader('Set-Cookie', [`${name}=${value}`])
|
|
|
|
res.end('finished')
|
|
|
|
server.close()
|
|
|
|
})
|
2019-05-30 22:05:02 +00:00
|
|
|
await new Promise(resolve => server.listen(0, '127.0.0.1', resolve))
|
2019-08-27 21:55:19 +00:00
|
|
|
const { port } = server.address() as AddressInfo
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-30 22:05:02 +00:00
|
|
|
await w.loadURL(`${url}:${port}`)
|
|
|
|
const list = await w.webContents.session.cookies.get({ url })
|
|
|
|
const cookie = list.find(cookie => cookie.name === name)
|
|
|
|
expect(cookie).to.exist.and.to.have.property('value', value)
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
it('sets cookies', async () => {
|
|
|
|
const { cookies } = session.defaultSession
|
|
|
|
const name = '1'
|
|
|
|
const value = '1'
|
|
|
|
|
2019-11-01 20:37:02 +00:00
|
|
|
await cookies.set({ url, name, value, expirationDate: (+new Date()) / 1000 + 120 })
|
2019-05-28 21:12:59 +00:00
|
|
|
const cs = await cookies.get({ url })
|
|
|
|
expect(cs.some(c => c.name === name && c.value === value)).to.equal(true)
|
|
|
|
})
|
|
|
|
|
2019-10-09 06:57:40 +00:00
|
|
|
it('gets cookies without url', async () => {
|
|
|
|
const { cookies } = session.defaultSession
|
|
|
|
const name = '1'
|
|
|
|
const value = '1'
|
|
|
|
|
2019-11-01 20:37:02 +00:00
|
|
|
await cookies.set({ url, name, value, expirationDate: (+new Date()) / 1000 + 120 })
|
2019-10-09 06:57:40 +00:00
|
|
|
const cs = await cookies.get({ domain: '127.0.0.1' })
|
|
|
|
expect(cs.some(c => c.name === name && c.value === value)).to.equal(true)
|
|
|
|
})
|
|
|
|
|
2019-05-28 21:12:59 +00:00
|
|
|
it('yields an error when setting a cookie with missing required fields', async () => {
|
2019-06-13 02:49:36 +00:00
|
|
|
const { cookies } = session.defaultSession
|
|
|
|
const name = '1'
|
|
|
|
const value = '1'
|
|
|
|
|
|
|
|
await expect(
|
|
|
|
cookies.set({ url: '', name, value })
|
|
|
|
).to.eventually.be.rejectedWith('Failed to get cookie domain')
|
|
|
|
})
|
|
|
|
|
|
|
|
it('yields an error when setting a cookie with an invalid URL', async () => {
|
|
|
|
const { cookies } = session.defaultSession
|
|
|
|
const name = '1'
|
|
|
|
const value = '1'
|
|
|
|
|
|
|
|
await expect(
|
|
|
|
cookies.set({ url: 'asdf', name, value })
|
|
|
|
).to.eventually.be.rejectedWith('Failed to get cookie domain')
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
it('should overwrite previous cookies', async () => {
|
|
|
|
const { cookies } = session.defaultSession
|
|
|
|
const name = 'DidOverwrite'
|
|
|
|
for (const value of [ 'No', 'Yes' ]) {
|
|
|
|
await cookies.set({ url, name, value, expirationDate: (+new Date()) / 1000 + 120 })
|
|
|
|
const list = await cookies.get({ url })
|
|
|
|
|
|
|
|
expect(list.some(cookie => cookie.name === name && cookie.value === value)).to.equal(true)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
it('should remove cookies', async () => {
|
|
|
|
const { cookies } = session.defaultSession
|
|
|
|
const name = '2'
|
|
|
|
const value = '2'
|
|
|
|
|
|
|
|
await cookies.set({ url, name, value, expirationDate: (+new Date()) / 1000 + 120 })
|
|
|
|
await cookies.remove(url, name)
|
|
|
|
const list = await cookies.get({ url })
|
|
|
|
|
|
|
|
expect(list.some(cookie => cookie.name === name && cookie.value === value)).to.equal(false)
|
|
|
|
})
|
|
|
|
|
2019-08-02 23:56:46 +00:00
|
|
|
it.skip('should set cookie for standard scheme', async () => {
|
2019-05-28 21:12:59 +00:00
|
|
|
const { cookies } = session.defaultSession
|
|
|
|
const domain = 'fake-host'
|
|
|
|
const url = `${standardScheme}://${domain}`
|
|
|
|
const name = 'custom'
|
|
|
|
const value = '1'
|
|
|
|
|
|
|
|
await cookies.set({ url, name, value, expirationDate: (+new Date()) / 1000 + 120 })
|
|
|
|
const list = await cookies.get({ url })
|
|
|
|
|
|
|
|
expect(list).to.have.lengthOf(1)
|
|
|
|
expect(list[0]).to.have.property('name', name)
|
|
|
|
expect(list[0]).to.have.property('value', value)
|
|
|
|
expect(list[0]).to.have.property('domain', domain)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('emits a changed event when a cookie is added or removed', async () => {
|
|
|
|
const { cookies } = session.fromPartition('cookies-changed')
|
|
|
|
const name = 'foo'
|
|
|
|
const value = 'bar'
|
|
|
|
|
|
|
|
const a = emittedOnce(cookies, 'changed')
|
|
|
|
await cookies.set({ url, name, value, expirationDate: (+new Date()) / 1000 + 120 })
|
|
|
|
const [, setEventCookie, setEventCause, setEventRemoved] = await a
|
|
|
|
|
|
|
|
const b = emittedOnce(cookies, 'changed')
|
|
|
|
await cookies.remove(url, name)
|
|
|
|
const [, removeEventCookie, removeEventCause, removeEventRemoved] = await b
|
|
|
|
|
|
|
|
expect(setEventCookie.name).to.equal(name)
|
|
|
|
expect(setEventCookie.value).to.equal(value)
|
|
|
|
expect(setEventCause).to.equal('explicit')
|
|
|
|
expect(setEventRemoved).to.equal(false)
|
|
|
|
|
|
|
|
expect(removeEventCookie.name).to.equal(name)
|
|
|
|
expect(removeEventCookie.value).to.equal(value)
|
|
|
|
expect(removeEventCause).to.equal('explicit')
|
|
|
|
expect(removeEventRemoved).to.equal(true)
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('ses.cookies.flushStore()', async () => {
|
2019-05-30 22:05:02 +00:00
|
|
|
it('flushes the cookies to disk', async () => {
|
2019-05-28 21:12:59 +00:00
|
|
|
const name = 'foo'
|
|
|
|
const value = 'bar'
|
|
|
|
const { cookies } = session.defaultSession
|
|
|
|
|
|
|
|
await cookies.set({ url, name, value })
|
|
|
|
await cookies.flushStore()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('should survive an app restart for persistent partition', async () => {
|
|
|
|
const appPath = path.join(fixtures, 'api', 'cookie-app')
|
|
|
|
|
2019-08-27 21:55:19 +00:00
|
|
|
const runAppWithPhase = (phase: string) => {
|
2019-11-01 20:37:02 +00:00
|
|
|
return new Promise((resolve) => {
|
2019-05-28 21:12:59 +00:00
|
|
|
let output = ''
|
|
|
|
|
|
|
|
const appProcess = ChildProcess.spawn(
|
2019-05-30 22:05:02 +00:00
|
|
|
process.execPath,
|
2019-05-28 21:12:59 +00:00
|
|
|
[appPath],
|
|
|
|
{ env: { PHASE: phase, ...process.env } }
|
|
|
|
)
|
|
|
|
|
|
|
|
appProcess.stdout.on('data', data => { output += data })
|
|
|
|
appProcess.stdout.on('end', () => {
|
2019-05-30 22:05:02 +00:00
|
|
|
resolve(output.replace(/(\r\n|\n|\r)/gm, ''))
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
expect(await runAppWithPhase('one')).to.equal('011')
|
|
|
|
expect(await runAppWithPhase('two')).to.equal('110')
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('ses.clearStorageData(options)', () => {
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-05-28 21:12:59 +00:00
|
|
|
it('clears localstorage data', async () => {
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false, webPreferences: { nodeIntegration: true } })
|
2019-05-28 21:12:59 +00:00
|
|
|
await w.loadFile(path.join(fixtures, 'api', 'localstorage.html'))
|
|
|
|
const options = {
|
|
|
|
origin: 'file://',
|
|
|
|
storages: ['localstorage'],
|
|
|
|
quotas: ['persistent']
|
|
|
|
}
|
|
|
|
await w.webContents.session.clearStorageData(options)
|
|
|
|
while (await w.webContents.executeJavaScript('localStorage.length') !== 0) {
|
|
|
|
// The storage clear isn't instantly visible to the renderer, so keep
|
|
|
|
// trying until it is.
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('will-download event', () => {
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-05-30 22:05:02 +00:00
|
|
|
it('can cancel default download behavior', async () => {
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-28 21:12:59 +00:00
|
|
|
const mockFile = Buffer.alloc(1024)
|
|
|
|
const contentDisposition = 'inline; filename="mockFile.txt"'
|
|
|
|
const downloadServer = http.createServer((req, res) => {
|
|
|
|
res.writeHead(200, {
|
|
|
|
'Content-Length': mockFile.length,
|
|
|
|
'Content-Type': 'application/plain',
|
|
|
|
'Content-Disposition': contentDisposition
|
|
|
|
})
|
|
|
|
res.end(mockFile)
|
|
|
|
downloadServer.close()
|
|
|
|
})
|
2019-05-30 22:05:02 +00:00
|
|
|
await new Promise(resolve => downloadServer.listen(0, '127.0.0.1', resolve))
|
2019-05-28 21:12:59 +00:00
|
|
|
|
2019-08-27 21:55:19 +00:00
|
|
|
const port = (downloadServer.address() as AddressInfo).port
|
2019-05-30 22:05:02 +00:00
|
|
|
const url = `http://127.0.0.1:${port}/`
|
2019-05-28 21:12:59 +00:00
|
|
|
|
2019-09-25 21:38:50 +00:00
|
|
|
const downloadPrevented: Promise<{itemUrl: string, itemFilename: string, item: Electron.DownloadItem}> = new Promise(resolve => {
|
2019-05-28 21:12:59 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
|
|
|
e.preventDefault()
|
2019-11-01 20:37:02 +00:00
|
|
|
resolve({ itemUrl: item.getURL(), itemFilename: item.getFilename(), item })
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
})
|
2019-05-30 22:05:02 +00:00
|
|
|
w.loadURL(url)
|
2019-11-01 20:37:02 +00:00
|
|
|
const { item, itemUrl, itemFilename } = await downloadPrevented
|
2019-09-25 21:38:50 +00:00
|
|
|
expect(itemUrl).to.equal(url)
|
|
|
|
expect(itemFilename).to.equal('mockFile.txt')
|
2019-05-30 22:05:02 +00:00
|
|
|
expect(() => item.getURL()).to.throw('Object has been destroyed')
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('ses.protocol', () => {
|
|
|
|
const partitionName = 'temp'
|
|
|
|
const protocolName = 'sp'
|
2019-08-27 21:55:19 +00:00
|
|
|
let customSession: Session
|
2019-05-28 21:12:59 +00:00
|
|
|
const protocol = session.defaultSession.protocol
|
2019-08-27 21:55:19 +00:00
|
|
|
const handler = (ignoredError: any, callback: Function) => {
|
2019-06-20 16:54:33 +00:00
|
|
|
callback({ data: `<script>require('electron').ipcRenderer.send('hello')</script>`, mimeType: 'text/html' })
|
2019-05-28 21:12:59 +00:00
|
|
|
}
|
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
beforeEach(async () => {
|
2019-05-28 21:12:59 +00:00
|
|
|
customSession = session.fromPartition(partitionName)
|
2019-05-30 22:05:02 +00:00
|
|
|
await customSession.protocol.registerStringProtocol(protocolName, handler)
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
afterEach(async () => {
|
|
|
|
await customSession.protocol.unregisterProtocol(protocolName)
|
2019-08-27 21:55:19 +00:00
|
|
|
customSession = null as any
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-05-28 21:12:59 +00:00
|
|
|
|
|
|
|
it('does not affect defaultSession', async () => {
|
|
|
|
const result1 = await protocol.isProtocolHandled(protocolName)
|
|
|
|
expect(result1).to.equal(false)
|
|
|
|
|
|
|
|
const result2 = await customSession.protocol.isProtocolHandled(protocolName)
|
|
|
|
expect(result2).to.equal(true)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('handles requests from partition', async () => {
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({
|
|
|
|
show: false,
|
|
|
|
webPreferences: {
|
|
|
|
partition: partitionName,
|
2019-11-01 20:37:02 +00:00
|
|
|
nodeIntegration: true
|
2019-08-29 06:50:14 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
customSession = session.fromPartition(partitionName)
|
|
|
|
await customSession.protocol.registerStringProtocol(protocolName, handler)
|
2019-06-20 16:54:33 +00:00
|
|
|
w.loadURL(`${protocolName}://fake-host`)
|
|
|
|
await emittedOnce(ipcMain, 'hello')
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('ses.setProxy(options)', () => {
|
2019-08-27 21:55:19 +00:00
|
|
|
let server: http.Server
|
|
|
|
let customSession: Electron.Session
|
2019-05-28 21:12:59 +00:00
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
beforeEach(async () => {
|
2019-05-28 21:12:59 +00:00
|
|
|
customSession = session.fromPartition('proxyconfig')
|
|
|
|
})
|
|
|
|
|
|
|
|
afterEach(() => {
|
|
|
|
if (server) {
|
|
|
|
server.close()
|
|
|
|
}
|
|
|
|
if (customSession) {
|
|
|
|
customSession.destroy()
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
it('allows configuring proxy settings', async () => {
|
|
|
|
const config = { proxyRules: 'http=myproxy:80' }
|
|
|
|
await customSession.setProxy(config)
|
|
|
|
const proxy = await customSession.resolveProxy('http://example.com/')
|
|
|
|
expect(proxy).to.equal('PROXY myproxy:80')
|
|
|
|
})
|
|
|
|
|
|
|
|
it('allows removing the implicit bypass rules for localhost', async () => {
|
|
|
|
const config = {
|
|
|
|
proxyRules: 'http=myproxy:80',
|
|
|
|
proxyBypassRules: '<-loopback>'
|
|
|
|
}
|
|
|
|
|
|
|
|
await customSession.setProxy(config)
|
|
|
|
const proxy = await customSession.resolveProxy('http://localhost')
|
|
|
|
expect(proxy).to.equal('PROXY myproxy:80')
|
|
|
|
})
|
|
|
|
|
|
|
|
it('allows configuring proxy settings with pacScript', async () => {
|
|
|
|
server = http.createServer((req, res) => {
|
|
|
|
const pac = `
|
|
|
|
function FindProxyForURL(url, host) {
|
|
|
|
return "PROXY myproxy:8132";
|
|
|
|
}
|
|
|
|
`
|
|
|
|
res.writeHead(200, {
|
|
|
|
'Content-Type': 'application/x-ns-proxy-autoconfig'
|
|
|
|
})
|
|
|
|
res.end(pac)
|
|
|
|
})
|
2019-05-30 22:05:02 +00:00
|
|
|
await new Promise(resolve => server.listen(0, '127.0.0.1', resolve))
|
2019-08-27 21:55:19 +00:00
|
|
|
const config = { pacScript: `http://127.0.0.1:${(server.address() as AddressInfo).port}` }
|
2019-05-30 22:05:02 +00:00
|
|
|
await customSession.setProxy(config)
|
|
|
|
const proxy = await customSession.resolveProxy('https://google.com')
|
|
|
|
expect(proxy).to.equal('PROXY myproxy:8132')
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
it('allows bypassing proxy settings', async () => {
|
|
|
|
const config = {
|
|
|
|
proxyRules: 'http=myproxy:80',
|
|
|
|
proxyBypassRules: '<local>'
|
|
|
|
}
|
|
|
|
await customSession.setProxy(config)
|
|
|
|
const proxy = await customSession.resolveProxy('http://example/')
|
|
|
|
expect(proxy).to.equal('DIRECT')
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-09-03 22:54:14 +00:00
|
|
|
describe('ses.getBlobData()', () => {
|
2019-05-30 22:05:02 +00:00
|
|
|
const scheme = 'cors-blob'
|
|
|
|
const protocol = session.defaultSession.protocol
|
|
|
|
const url = `${scheme}://host`
|
|
|
|
after(async () => {
|
|
|
|
await protocol.unregisterProtocol(scheme)
|
|
|
|
})
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-05-28 21:12:59 +00:00
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
it('returns blob data for uuid', (done) => {
|
2019-05-28 21:12:59 +00:00
|
|
|
const postData = JSON.stringify({
|
|
|
|
type: 'blob',
|
|
|
|
value: 'hello'
|
|
|
|
})
|
|
|
|
const content = `<html>
|
|
|
|
<script>
|
|
|
|
let fd = new FormData();
|
|
|
|
fd.append('file', new Blob(['${postData}'], {type:'application/json'}));
|
|
|
|
fetch('${url}', {method:'POST', body: fd });
|
|
|
|
</script>
|
|
|
|
</html>`
|
|
|
|
|
|
|
|
protocol.registerStringProtocol(scheme, (request, callback) => {
|
|
|
|
if (request.method === 'GET') {
|
|
|
|
callback({ data: content, mimeType: 'text/html' })
|
|
|
|
} else if (request.method === 'POST') {
|
|
|
|
const uuid = request.uploadData[1].blobUUID
|
|
|
|
expect(uuid).to.be.a('string')
|
2019-08-27 21:55:19 +00:00
|
|
|
session.defaultSession.getBlobData(uuid!).then(result => {
|
2019-05-28 21:12:59 +00:00
|
|
|
expect(result.toString()).to.equal(postData)
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}, (error) => {
|
|
|
|
if (error) return done(error)
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-28 21:12:59 +00:00
|
|
|
w.loadURL(url)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2019-08-27 21:55:19 +00:00
|
|
|
describe('ses.setCertificateVerifyProc(callback)', () => {
|
|
|
|
let server: http.Server
|
2019-05-28 21:12:59 +00:00
|
|
|
|
|
|
|
beforeEach((done) => {
|
|
|
|
const certPath = path.join(fixtures, 'certificates')
|
|
|
|
const options = {
|
|
|
|
key: fs.readFileSync(path.join(certPath, 'server.key')),
|
|
|
|
cert: fs.readFileSync(path.join(certPath, 'server.pem')),
|
|
|
|
ca: [
|
|
|
|
fs.readFileSync(path.join(certPath, 'rootCA.pem')),
|
|
|
|
fs.readFileSync(path.join(certPath, 'intermediateCA.pem'))
|
|
|
|
],
|
|
|
|
requestCert: true,
|
|
|
|
rejectUnauthorized: false
|
|
|
|
}
|
|
|
|
|
|
|
|
server = https.createServer(options, (req, res) => {
|
|
|
|
res.writeHead(200)
|
|
|
|
res.end('<title>hello</title>')
|
|
|
|
})
|
|
|
|
server.listen(0, '127.0.0.1', done)
|
|
|
|
})
|
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
afterEach((done) => {
|
2019-05-28 21:12:59 +00:00
|
|
|
session.defaultSession.setCertificateVerifyProc(null)
|
2019-05-30 22:05:02 +00:00
|
|
|
server.close(done)
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-05-28 21:12:59 +00:00
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
it('accepts the request when the callback is called with 0', async () => {
|
2019-11-01 20:37:02 +00:00
|
|
|
session.defaultSession.setCertificateVerifyProc(({ verificationResult, errorCode }, callback) => {
|
2019-10-30 23:38:21 +00:00
|
|
|
expect(['net::ERR_CERT_AUTHORITY_INVALID', 'net::ERR_CERT_COMMON_NAME_INVALID'].includes(verificationResult)).to.be.true()
|
|
|
|
expect([-202, -200].includes(errorCode)).to.be.true()
|
2019-05-28 21:12:59 +00:00
|
|
|
callback(0)
|
|
|
|
})
|
|
|
|
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-08-27 21:55:19 +00:00
|
|
|
await w.loadURL(`https://127.0.0.1:${(server.address() as AddressInfo).port}`)
|
2019-05-30 22:05:02 +00:00
|
|
|
expect(w.webContents.getTitle()).to.equal('hello')
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
it('rejects the request when the callback is called with -2', async () => {
|
2019-05-28 21:12:59 +00:00
|
|
|
session.defaultSession.setCertificateVerifyProc(({ hostname, certificate, verificationResult }, callback) => {
|
|
|
|
expect(hostname).to.equal('127.0.0.1')
|
|
|
|
expect(certificate.issuerName).to.equal('Intermediate CA')
|
|
|
|
expect(certificate.subjectName).to.equal('localhost')
|
|
|
|
expect(certificate.issuer.commonName).to.equal('Intermediate CA')
|
|
|
|
expect(certificate.subject.commonName).to.equal('localhost')
|
|
|
|
expect(certificate.issuerCert.issuer.commonName).to.equal('Root CA')
|
|
|
|
expect(certificate.issuerCert.subject.commonName).to.equal('Intermediate CA')
|
|
|
|
expect(certificate.issuerCert.issuerCert.issuer.commonName).to.equal('Root CA')
|
|
|
|
expect(certificate.issuerCert.issuerCert.subject.commonName).to.equal('Root CA')
|
|
|
|
expect(certificate.issuerCert.issuerCert.issuerCert).to.equal(undefined)
|
2019-10-30 23:38:21 +00:00
|
|
|
expect(['net::ERR_CERT_AUTHORITY_INVALID', 'net::ERR_CERT_COMMON_NAME_INVALID'].includes(verificationResult)).to.be.true()
|
2019-05-28 21:12:59 +00:00
|
|
|
callback(-2)
|
|
|
|
})
|
|
|
|
|
2019-08-27 21:55:19 +00:00
|
|
|
const url = `https://127.0.0.1:${(server.address() as AddressInfo).port}`
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-30 22:05:02 +00:00
|
|
|
await expect(w.loadURL(url)).to.eventually.be.rejectedWith(/ERR_FAILED/)
|
|
|
|
expect(w.webContents.getTitle()).to.equal(url)
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
2019-06-28 22:22:23 +00:00
|
|
|
|
|
|
|
it('saves cached results', async () => {
|
|
|
|
let numVerificationRequests = 0
|
2019-11-01 20:37:02 +00:00
|
|
|
session.defaultSession.setCertificateVerifyProc((e, callback) => {
|
2019-06-28 22:22:23 +00:00
|
|
|
numVerificationRequests++
|
|
|
|
callback(-2)
|
|
|
|
})
|
|
|
|
|
2019-08-27 21:55:19 +00:00
|
|
|
const url = `https://127.0.0.1:${(server.address() as AddressInfo).port}`
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-06-28 22:22:23 +00:00
|
|
|
await expect(w.loadURL(url), 'first load').to.eventually.be.rejectedWith(/ERR_FAILED/)
|
|
|
|
await emittedOnce(w.webContents, 'did-stop-loading')
|
|
|
|
await expect(w.loadURL(url + '/test'), 'second load').to.eventually.be.rejectedWith(/ERR_FAILED/)
|
|
|
|
expect(w.webContents.getTitle()).to.equal(url + '/test')
|
2019-08-02 23:56:46 +00:00
|
|
|
expect(numVerificationRequests).to.equal(1)
|
2019-06-28 22:22:23 +00:00
|
|
|
})
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
|
2019-08-29 00:43:12 +00:00
|
|
|
describe('ses.clearAuthCache(options)', () => {
|
|
|
|
it('can clear http auth info from cache', async () => {
|
2019-05-28 21:12:59 +00:00
|
|
|
const ses = session.fromPartition('auth-cache')
|
|
|
|
const server = http.createServer((req, res) => {
|
|
|
|
const credentials = auth(req)
|
|
|
|
if (!credentials || credentials.name !== 'test' || credentials.pass !== 'test') {
|
|
|
|
res.statusCode = 401
|
|
|
|
res.setHeader('WWW-Authenticate', 'Basic realm="Restricted"')
|
|
|
|
res.end()
|
|
|
|
} else {
|
|
|
|
res.end('authenticated')
|
|
|
|
}
|
|
|
|
})
|
2019-08-29 00:43:12 +00:00
|
|
|
await new Promise(resolve => server.listen(0, '127.0.0.1', resolve))
|
|
|
|
const port = (server.address() as AddressInfo).port
|
|
|
|
const fetch = (url: string) => new Promise((resolve, reject) => {
|
|
|
|
const request = net.request({ url, session: ses })
|
|
|
|
request.on('response', (response) => {
|
|
|
|
let data = ''
|
|
|
|
response.on('data', (chunk) => {
|
|
|
|
data += chunk
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
2019-08-29 00:43:12 +00:00
|
|
|
response.on('end', () => {
|
|
|
|
resolve(data)
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
2019-08-29 00:43:12 +00:00
|
|
|
response.on('error', (error: any) => { reject(new Error(error)) })
|
2019-11-01 20:37:02 +00:00
|
|
|
})
|
2019-11-14 18:01:18 +00:00
|
|
|
request.on('error', (error: any) => { reject(new Error(error)) })
|
2019-08-29 00:43:12 +00:00
|
|
|
request.end()
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
2019-08-29 00:43:12 +00:00
|
|
|
// the first time should throw due to unauthenticated
|
|
|
|
await expect(fetch(`http://127.0.0.1:${port}`)).to.eventually.be.rejected()
|
|
|
|
// passing the password should let us in
|
|
|
|
expect(await fetch(`http://test:test@127.0.0.1:${port}`)).to.equal('authenticated')
|
|
|
|
// subsequently, the credentials are cached
|
|
|
|
expect(await fetch(`http://127.0.0.1:${port}`)).to.equal('authenticated')
|
|
|
|
await ses.clearAuthCache({ type: 'password' })
|
|
|
|
// once the cache is cleared, we should get an error again
|
|
|
|
await expect(fetch(`http://127.0.0.1:${port}`)).to.eventually.be.rejected()
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|
|
|
|
})
|
2019-05-30 22:05:02 +00:00
|
|
|
|
|
|
|
describe('DownloadItem', () => {
|
|
|
|
const mockPDF = Buffer.alloc(1024 * 1024 * 5)
|
|
|
|
const downloadFilePath = path.join(__dirname, '..', 'fixtures', 'mock.pdf')
|
|
|
|
const protocolName = 'custom-dl'
|
|
|
|
const contentDisposition = 'inline; filename="mock.pdf"'
|
2019-08-27 21:55:19 +00:00
|
|
|
let address: AddressInfo
|
|
|
|
let downloadServer: http.Server
|
2019-05-30 22:05:02 +00:00
|
|
|
before(async () => {
|
|
|
|
downloadServer = http.createServer((req, res) => {
|
|
|
|
res.writeHead(200, {
|
|
|
|
'Content-Length': mockPDF.length,
|
|
|
|
'Content-Type': 'application/pdf',
|
|
|
|
'Content-Disposition': req.url === '/?testFilename' ? 'inline' : contentDisposition
|
|
|
|
})
|
|
|
|
res.end(mockPDF)
|
|
|
|
})
|
|
|
|
await new Promise(resolve => downloadServer.listen(0, '127.0.0.1', resolve))
|
2019-08-27 21:55:19 +00:00
|
|
|
address = downloadServer.address() as AddressInfo
|
2019-05-30 22:05:02 +00:00
|
|
|
})
|
|
|
|
after(async () => {
|
|
|
|
await new Promise(resolve => downloadServer.close(resolve))
|
|
|
|
})
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-05-30 22:05:02 +00:00
|
|
|
|
2019-08-27 21:55:19 +00:00
|
|
|
const isPathEqual = (path1: string, path2: string) => {
|
2019-05-30 22:05:02 +00:00
|
|
|
return path.relative(path1, path2) === ''
|
|
|
|
}
|
2019-08-27 21:55:19 +00:00
|
|
|
const assertDownload = (state: string, item: Electron.DownloadItem, isCustom = false) => {
|
2019-05-30 22:05:02 +00:00
|
|
|
expect(state).to.equal('completed')
|
|
|
|
expect(item.getFilename()).to.equal('mock.pdf')
|
2019-06-20 17:04:57 +00:00
|
|
|
expect(path.isAbsolute(item.savePath)).to.equal(true)
|
|
|
|
expect(isPathEqual(item.savePath, downloadFilePath)).to.equal(true)
|
2019-05-30 22:05:02 +00:00
|
|
|
if (isCustom) {
|
|
|
|
expect(item.getURL()).to.equal(`${protocolName}://item`)
|
|
|
|
} else {
|
|
|
|
expect(item.getURL()).to.be.equal(`${url}:${address.port}/`)
|
|
|
|
}
|
|
|
|
expect(item.getMimeType()).to.equal('application/pdf')
|
|
|
|
expect(item.getReceivedBytes()).to.equal(mockPDF.length)
|
|
|
|
expect(item.getTotalBytes()).to.equal(mockPDF.length)
|
|
|
|
expect(item.getContentDisposition()).to.equal(contentDisposition)
|
|
|
|
expect(fs.existsSync(downloadFilePath)).to.equal(true)
|
|
|
|
fs.unlinkSync(downloadFilePath)
|
|
|
|
}
|
|
|
|
|
2019-08-29 03:27:20 +00:00
|
|
|
it('can download using session.downloadURL', (done) => {
|
|
|
|
const port = address.port
|
|
|
|
session.defaultSession.once('will-download', function (e, item) {
|
|
|
|
item.savePath = downloadFilePath
|
|
|
|
item.on('done', function (e, state) {
|
|
|
|
assertDownload(state, item)
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
session.defaultSession.downloadURL(`${url}:${port}`)
|
|
|
|
})
|
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
it('can download using WebContents.downloadURL', (done) => {
|
2019-08-27 21:55:19 +00:00
|
|
|
const port = address.port
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
2019-06-20 17:04:57 +00:00
|
|
|
item.savePath = downloadFilePath
|
2019-05-30 22:05:02 +00:00
|
|
|
item.on('done', function (e, state) {
|
|
|
|
assertDownload(state, item)
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
w.webContents.downloadURL(`${url}:${port}`)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('can download from custom protocols using WebContents.downloadURL', (done) => {
|
|
|
|
const protocol = session.defaultSession.protocol
|
2019-08-27 21:55:19 +00:00
|
|
|
const port = address.port
|
|
|
|
const handler = (ignoredError: any, callback: Function) => {
|
2019-05-30 22:05:02 +00:00
|
|
|
callback({ url: `${url}:${port}` })
|
|
|
|
}
|
|
|
|
protocol.registerHttpProtocol(protocolName, handler, (error) => {
|
|
|
|
if (error) return done(error)
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
2019-06-20 17:04:57 +00:00
|
|
|
item.savePath = downloadFilePath
|
2019-05-30 22:05:02 +00:00
|
|
|
item.on('done', function (e, state) {
|
|
|
|
assertDownload(state, item, true)
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
w.webContents.downloadURL(`${protocolName}://item`)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
it('can download using WebView.downloadURL', async () => {
|
2019-08-27 21:55:19 +00:00
|
|
|
const port = address.port
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false, webPreferences: { webviewTag: true } })
|
2019-05-30 22:05:02 +00:00
|
|
|
await w.loadURL('about:blank')
|
2019-11-01 20:37:02 +00:00
|
|
|
function webviewDownload ({ fixtures, url, port }: {fixtures: string, url: string, port: string}) {
|
2019-08-27 21:55:19 +00:00
|
|
|
const webview = new (window as any).WebView()
|
2019-05-30 22:05:02 +00:00
|
|
|
webview.addEventListener('did-finish-load', () => {
|
|
|
|
webview.downloadURL(`${url}:${port}/`)
|
|
|
|
})
|
|
|
|
webview.src = `file://${fixtures}/api/blank.html`
|
|
|
|
document.body.appendChild(webview)
|
|
|
|
}
|
2019-08-27 21:55:19 +00:00
|
|
|
const done: Promise<[string, Electron.DownloadItem]> = new Promise(resolve => {
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
2019-06-20 17:04:57 +00:00
|
|
|
item.savePath = downloadFilePath
|
2019-05-30 22:05:02 +00:00
|
|
|
item.on('done', function (e, state) {
|
|
|
|
resolve([state, item])
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
2019-11-01 20:37:02 +00:00
|
|
|
await w.webContents.executeJavaScript(`(${webviewDownload})(${JSON.stringify({ fixtures, url, port })})`)
|
2019-05-30 22:05:02 +00:00
|
|
|
const [state, item] = await done
|
|
|
|
assertDownload(state, item)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('can cancel download', (done) => {
|
2019-08-27 21:55:19 +00:00
|
|
|
const port = address.port
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
2019-06-20 17:04:57 +00:00
|
|
|
item.savePath = downloadFilePath
|
2019-05-30 22:05:02 +00:00
|
|
|
item.on('done', function (e, state) {
|
|
|
|
expect(state).to.equal('cancelled')
|
|
|
|
expect(item.getFilename()).to.equal('mock.pdf')
|
|
|
|
expect(item.getMimeType()).to.equal('application/pdf')
|
|
|
|
expect(item.getReceivedBytes()).to.equal(0)
|
|
|
|
expect(item.getTotalBytes()).to.equal(mockPDF.length)
|
|
|
|
expect(item.getContentDisposition()).to.equal(contentDisposition)
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
item.cancel()
|
|
|
|
})
|
|
|
|
w.webContents.downloadURL(`${url}:${port}/`)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('can generate a default filename', function (done) {
|
|
|
|
if (process.env.APPVEYOR === 'True') {
|
|
|
|
// FIXME(alexeykuzmin): Skip the test.
|
|
|
|
// this.skip()
|
|
|
|
return done()
|
|
|
|
}
|
|
|
|
|
2019-08-27 21:55:19 +00:00
|
|
|
const port = address.port
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
2019-06-20 17:04:57 +00:00
|
|
|
item.savePath = downloadFilePath
|
2019-11-01 20:37:02 +00:00
|
|
|
item.on('done', function () {
|
2019-05-30 22:05:02 +00:00
|
|
|
expect(item.getFilename()).to.equal('download.pdf')
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
item.cancel()
|
|
|
|
})
|
|
|
|
w.webContents.downloadURL(`${url}:${port}/?testFilename`)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('can set options for the save dialog', (done) => {
|
|
|
|
const filePath = path.join(__dirname, 'fixtures', 'mock.pdf')
|
2019-08-27 21:55:19 +00:00
|
|
|
const port = address.port
|
2019-05-30 22:05:02 +00:00
|
|
|
const options = {
|
|
|
|
window: null,
|
|
|
|
title: 'title',
|
|
|
|
message: 'message',
|
|
|
|
buttonLabel: 'buttonLabel',
|
|
|
|
nameFieldLabel: 'nameFieldLabel',
|
|
|
|
defaultPath: '/',
|
|
|
|
filters: [{
|
|
|
|
name: '1', extensions: ['.1', '.2']
|
|
|
|
}, {
|
|
|
|
name: '2', extensions: ['.3', '.4', '.5']
|
|
|
|
}],
|
|
|
|
showsTagField: true,
|
|
|
|
securityScopedBookmarks: true
|
|
|
|
}
|
|
|
|
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
|
|
|
item.setSavePath(filePath)
|
|
|
|
item.setSaveDialogOptions(options)
|
2019-11-01 20:37:02 +00:00
|
|
|
item.on('done', function () {
|
2019-05-30 22:05:02 +00:00
|
|
|
expect(item.getSaveDialogOptions()).to.deep.equal(options)
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
item.cancel()
|
|
|
|
})
|
|
|
|
w.webContents.downloadURL(`${url}:${port}`)
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('when a save path is specified and the URL is unavailable', () => {
|
|
|
|
it('does not display a save dialog and reports the done state as interrupted', (done) => {
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
2019-06-20 17:04:57 +00:00
|
|
|
item.savePath = downloadFilePath
|
2019-05-30 22:05:02 +00:00
|
|
|
if (item.getState() === 'interrupted') {
|
|
|
|
item.resume()
|
|
|
|
}
|
|
|
|
item.on('done', function (e, state) {
|
|
|
|
expect(state).to.equal('interrupted')
|
|
|
|
done()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
w.webContents.downloadURL(`file://${path.join(__dirname, 'does-not-exist.txt')}`)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('ses.createInterruptedDownload(options)', () => {
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-09-21 14:51:28 +00:00
|
|
|
it('can create an interrupted download item', async () => {
|
2019-05-30 22:05:02 +00:00
|
|
|
const downloadFilePath = path.join(__dirname, '..', 'fixtures', 'mock.pdf')
|
|
|
|
const options = {
|
|
|
|
path: downloadFilePath,
|
|
|
|
urlChain: ['http://127.0.0.1/'],
|
|
|
|
mimeType: 'application/pdf',
|
|
|
|
offset: 0,
|
|
|
|
length: 5242880
|
|
|
|
}
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-09-21 14:51:28 +00:00
|
|
|
const p = emittedOnce(w.webContents.session, 'will-download')
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.createInterruptedDownload(options)
|
2019-09-21 14:51:28 +00:00
|
|
|
const [, item] = await p
|
|
|
|
expect(item.getState()).to.equal('interrupted')
|
|
|
|
item.cancel()
|
|
|
|
expect(item.getURLChain()).to.deep.equal(options.urlChain)
|
|
|
|
expect(item.getMimeType()).to.equal(options.mimeType)
|
|
|
|
expect(item.getReceivedBytes()).to.equal(options.offset)
|
|
|
|
expect(item.getTotalBytes()).to.equal(options.length)
|
|
|
|
expect(item.savePath).to.equal(downloadFilePath)
|
2019-05-30 22:05:02 +00:00
|
|
|
})
|
|
|
|
|
|
|
|
it('can be resumed', async () => {
|
|
|
|
const downloadFilePath = path.join(fixtures, 'logo.png')
|
|
|
|
const rangeServer = http.createServer((req, res) => {
|
|
|
|
const options = { root: fixtures }
|
2019-08-27 21:55:19 +00:00
|
|
|
send(req, req.url!, options)
|
|
|
|
.on('error', (error: any) => { throw error }).pipe(res)
|
2019-05-30 22:05:02 +00:00
|
|
|
})
|
|
|
|
try {
|
|
|
|
await new Promise(resolve => rangeServer.listen(0, '127.0.0.1', resolve))
|
2019-08-27 21:55:19 +00:00
|
|
|
const port = (rangeServer.address() as AddressInfo).port
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({ show: false })
|
2019-08-27 21:55:19 +00:00
|
|
|
const downloadCancelled: Promise<Electron.DownloadItem> = new Promise((resolve) => {
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
|
|
|
item.setSavePath(downloadFilePath)
|
2019-11-01 20:37:02 +00:00
|
|
|
item.on('done', function () {
|
2019-05-30 22:05:02 +00:00
|
|
|
resolve(item)
|
|
|
|
})
|
|
|
|
item.cancel()
|
|
|
|
})
|
|
|
|
})
|
|
|
|
const downloadUrl = `http://127.0.0.1:${port}/assets/logo.png`
|
|
|
|
w.webContents.downloadURL(downloadUrl)
|
|
|
|
const item = await downloadCancelled
|
|
|
|
expect(item.getState()).to.equal('cancelled')
|
|
|
|
|
|
|
|
const options = {
|
2019-06-20 17:04:57 +00:00
|
|
|
path: item.savePath,
|
2019-05-30 22:05:02 +00:00
|
|
|
urlChain: item.getURLChain(),
|
|
|
|
mimeType: item.getMimeType(),
|
|
|
|
offset: item.getReceivedBytes(),
|
|
|
|
length: item.getTotalBytes(),
|
|
|
|
lastModified: item.getLastModifiedTime(),
|
2019-11-01 20:37:02 +00:00
|
|
|
eTag: item.getETag()
|
2019-05-30 22:05:02 +00:00
|
|
|
}
|
2019-08-27 21:55:19 +00:00
|
|
|
const downloadResumed: Promise<Electron.DownloadItem> = new Promise((resolve) => {
|
2019-05-30 22:05:02 +00:00
|
|
|
w.webContents.session.once('will-download', function (e, item) {
|
|
|
|
expect(item.getState()).to.equal('interrupted')
|
|
|
|
item.setSavePath(downloadFilePath)
|
|
|
|
item.resume()
|
2019-11-01 20:37:02 +00:00
|
|
|
item.on('done', function () {
|
2019-05-30 22:05:02 +00:00
|
|
|
resolve(item)
|
|
|
|
})
|
|
|
|
})
|
|
|
|
})
|
|
|
|
w.webContents.session.createInterruptedDownload(options)
|
|
|
|
const completedItem = await downloadResumed
|
|
|
|
expect(completedItem.getState()).to.equal('completed')
|
|
|
|
expect(completedItem.getFilename()).to.equal('logo.png')
|
2019-06-20 17:04:57 +00:00
|
|
|
expect(completedItem.savePath).to.equal(downloadFilePath)
|
2019-05-30 22:05:02 +00:00
|
|
|
expect(completedItem.getURL()).to.equal(downloadUrl)
|
|
|
|
expect(completedItem.getMimeType()).to.equal('image/png')
|
|
|
|
expect(completedItem.getReceivedBytes()).to.equal(14022)
|
|
|
|
expect(completedItem.getTotalBytes()).to.equal(14022)
|
|
|
|
expect(fs.existsSync(downloadFilePath)).to.equal(true)
|
|
|
|
} finally {
|
|
|
|
rangeServer.close()
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
|
|
|
|
describe('ses.setPermissionRequestHandler(handler)', () => {
|
2019-08-29 06:50:14 +00:00
|
|
|
afterEach(closeAllWindows)
|
2019-05-30 22:05:02 +00:00
|
|
|
it('cancels any pending requests when cleared', async () => {
|
2019-08-29 06:50:14 +00:00
|
|
|
const w = new BrowserWindow({
|
2019-07-03 01:22:09 +00:00
|
|
|
show: false,
|
|
|
|
webPreferences: {
|
|
|
|
partition: `very-temp-permision-handler`,
|
2019-11-01 20:37:02 +00:00
|
|
|
nodeIntegration: true
|
2019-07-03 01:22:09 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
const ses = w.webContents.session
|
|
|
|
ses.setPermissionRequestHandler(() => {
|
|
|
|
ses.setPermissionRequestHandler(null)
|
|
|
|
})
|
|
|
|
|
2019-07-03 01:22:09 +00:00
|
|
|
ses.protocol.interceptStringProtocol('https', (req, cb) => {
|
|
|
|
cb(`<html><script>(${remote})()</script></html>`)
|
|
|
|
})
|
|
|
|
|
2019-05-30 22:05:02 +00:00
|
|
|
const result = emittedOnce(require('electron').ipcMain, 'message')
|
|
|
|
|
2019-11-01 20:37:02 +00:00
|
|
|
function remote () {
|
|
|
|
(navigator as any).requestMIDIAccess({ sysex: true }).then(() => {}, (err: any) => {
|
|
|
|
require('electron').ipcRenderer.send('message', err.name)
|
|
|
|
})
|
2019-05-30 22:05:02 +00:00
|
|
|
}
|
|
|
|
|
2019-07-03 01:22:09 +00:00
|
|
|
await w.loadURL('https://myfakesite')
|
2019-05-30 22:05:02 +00:00
|
|
|
|
2019-11-01 20:37:02 +00:00
|
|
|
const [, name] = await result
|
2019-05-30 22:05:02 +00:00
|
|
|
expect(name).to.deep.equal('SecurityError')
|
|
|
|
})
|
|
|
|
})
|
2019-08-29 06:50:14 +00:00
|
|
|
|
|
|
|
describe('ses.setUserAgent()', () => {
|
|
|
|
afterEach(closeAllWindows)
|
|
|
|
|
|
|
|
it('can be retrieved with getUserAgent()', () => {
|
|
|
|
const userAgent = 'test-agent'
|
2019-11-01 20:37:02 +00:00
|
|
|
const ses = session.fromPartition('' + Math.random())
|
2019-08-29 06:50:14 +00:00
|
|
|
ses.setUserAgent(userAgent)
|
|
|
|
expect(ses.getUserAgent()).to.equal(userAgent)
|
|
|
|
})
|
|
|
|
|
|
|
|
it('sets the User-Agent header for web requests made from renderers', async () => {
|
|
|
|
const userAgent = 'test-agent'
|
2019-11-01 20:37:02 +00:00
|
|
|
const ses = session.fromPartition('' + Math.random())
|
2019-08-29 06:50:14 +00:00
|
|
|
ses.setUserAgent(userAgent)
|
|
|
|
const w = new BrowserWindow({ show: false, webPreferences: { session: ses } })
|
|
|
|
let headers: http.IncomingHttpHeaders | null = null
|
|
|
|
const server = http.createServer((req, res) => {
|
|
|
|
headers = req.headers
|
|
|
|
res.end()
|
|
|
|
server.close()
|
|
|
|
})
|
|
|
|
await new Promise(resolve => server.listen(0, '127.0.0.1', resolve))
|
|
|
|
await w.loadURL(`http://127.0.0.1:${(server.address() as AddressInfo).port}`)
|
|
|
|
expect(headers!['user-agent']).to.equal(userAgent)
|
|
|
|
})
|
|
|
|
})
|
2019-05-28 21:12:59 +00:00
|
|
|
})
|