Best JavaScript code snippet using puppeteer
ignorehttpserrors.spec.js
Source:ignorehttpserrors.spec.js
...40 const [serverRequest, response] = await Promise.all([41 httpsServer.waitForRequest('/empty.html'),42 page.goto(httpsServer.EMPTY_PAGE)43 ]);44 const securityDetails = response.securityDetails();45 expect(securityDetails.issuer()).toBe('puppeteer-tests');46 const protocol = serverRequest.socket.getProtocol().replace('v', ' ');47 expect(securityDetails.protocol()).toBe(protocol);48 expect(securityDetails.subjectName()).toBe('puppeteer-tests');49 expect(securityDetails.validFrom()).toBe(1550084863);50 expect(securityDetails.validTo()).toBe(33086084863);51 });52 it('should be |null| for non-secure requests', async({page, server}) => {53 const response = await page.goto(server.EMPTY_PAGE);54 expect(response.securityDetails()).toBe(null);55 });56 it('Network redirects should report SecurityDetails', async({page, httpsServer}) => {57 httpsServer.setRedirect('/plzredirect', '/empty.html');58 const responses = [];59 page.on('response', response => responses.push(response));60 const [serverRequest, ] = await Promise.all([61 httpsServer.waitForRequest('/plzredirect'),62 page.goto(httpsServer.PREFIX + '/plzredirect')63 ]);64 expect(responses.length).toBe(2);65 expect(responses[0].status()).toBe(302);66 const securityDetails = responses[0].securityDetails();67 const protocol = serverRequest.socket.getProtocol().replace('v', ' ');68 expect(securityDetails.protocol()).toBe(protocol);69 });70 });71 it('should work', async({page, httpsServer}) => {72 let error = null;73 const response = await page.goto(httpsServer.EMPTY_PAGE).catch(e => error = e);74 expect(error).toBe(null);75 expect(response.ok()).toBe(true);76 });77 it('should work with request interception', async({page, server, httpsServer}) => {78 await page.setRequestInterception(true);79 page.on('request', request => request.continue());80 const response = await page.goto(httpsServer.EMPTY_PAGE);...
ignorehttpserrors.js
Source:ignorehttpserrors.js
...22 'ignoreHTTPSErrors - Response.securityDetails: should work',23 async t => {24 const { page, httpsServer } = t.context25 const response = await page.goto(httpsServer.EMPTY_PAGE)26 const securityDetails = response.securityDetails()27 t.is(securityDetails.issuer(), 'puppeteer-tests')28 t.regex(securityDetails.protocol(), /TLS\s[0-9]\.[0-9]/)29 t.is(securityDetails.subjectName(), 'puppeteer-tests')30 t.is(securityDetails.validFrom(), 1550084863)31 t.is(securityDetails.validTo(), 33086084863)32 }33)34test.serial(35 'ignoreHTTPSErrors - Response.securityDetails: should be |null| for non-secure requests',36 async t => {37 const { page, server } = t.context38 const response = await page.goto(server.EMPTY_PAGE)39 t.falsy(response.securityDetails())40 }41)42test.serial(43 'ignoreHTTPSErrors - Response.securityDetails: Network redirects should report SecurityDetails',44 async t => {45 const { page, httpsServer } = t.context46 const responses = []47 page.on('response', response => responses.push(response))48 await page.goto(httpsServer.PREFIX + '/plzredirect')49 t.is(responses.length, 2)50 t.is(responses[0].status(), 302)51 const securityDetails = responses[0].securityDetails()52 t.regex(securityDetails.protocol(), /TLS\s[0-9]\.[0-9]/)53 }54)55test.serial('ignoreHTTPSErrors should work', async t => {56 const { page, httpsServer } = t.context57 let error = null58 const response = await page59 .goto(httpsServer.EMPTY_PAGE)60 .catch(e => (error = e))61 t.falsy(error)62 t.true(response.ok())63})64test.serial(65 'ignoreHTTPSErrors should work with request interception',...
security-details-updated-with-security-state.js
Source:security-details-updated-with-security-state.js
1// Copyright 2017 The Chromium Authors. All rights reserved.2// Use of this source code is governed by a BSD-style license that can be3// found in the LICENSE file.4(async function() {5 TestRunner.addResult(`Tests that the security details for an origin are updated if its security state changes.\n`);6 await TestRunner.loadModule('security_test_runner');7 await TestRunner.showPanel('security');8 // Add a request without security details.9 const request1 = new SDK.NetworkRequest(0, 'https://foo.test/foo.jpg', 'https://foo.test', 0, 0, null);10 request1.setSecurityState(Protocol.Security.SecurityState.Unknown);11 SecurityTestRunner.dispatchRequestFinished(request1);12 // Add an unrelated request.13 const request2 = new SDK.NetworkRequest(0, 'https://bar.test/bar.jpg', 'https://bar.test', 0, 0, null);14 request2.setSecurityState(Protocol.Security.SecurityState.Unknown);15 SecurityTestRunner.dispatchRequestFinished(request2);16 // Add a request to the first origin, this time including security details.17 const request3 = new SDK.NetworkRequest(0, 'https://foo.test/foo2.jpg', 'https://foo.test', 0, 0, null);18 request3.setSecurityState(Protocol.Security.SecurityState.Secure);19 let securityDetails = {};20 securityDetails.protocol = 'TLS 1.2';21 securityDetails.keyExchange = 'Key_Exchange';22 securityDetails.keyExchangeGroup = '';23 securityDetails.cipher = 'Cypher';24 securityDetails.mac = 'Mac';25 securityDetails.subjectName = 'foo.test';26 securityDetails.sanList = ['foo.test', '*.test'];27 securityDetails.issuer = 'Super CA';28 securityDetails.validFrom = 1490000000;29 securityDetails.validTo = 2000000000;30 securityDetails.CertificateId = 0;31 securityDetails.signedCertificateTimestampList = [];32 securityDetails.certificateTransparencyCompliance = Protocol.Network.CertificateTransparencyCompliance.Unknown;33 request3.setSecurityDetails(securityDetails);34 SecurityTestRunner.dispatchRequestFinished(request3);35 TestRunner.addResult('Sidebar Origins --------------------------------');36 SecurityTestRunner.dumpSecurityPanelSidebarOrigins();37 Security.SecurityPanel._instance()._sidebarTree._elementsByOrigin.get('https://foo.test').select();38 TestRunner.addResult('Origin view ------------------------------------');39 TestRunner.dumpDeepInnerHTML(Security.SecurityPanel._instance()._visibleView.contentElement);40 TestRunner.completeTest();...
origin-view-ct-compliance.js
Source:origin-view-ct-compliance.js
1// Copyright 2018 The Chromium Authors. All rights reserved.2// Use of this source code is governed by a BSD-style license that can be3// found in the LICENSE file.4(async function() {5 TestRunner.addResult(6 `Tests that the panel includes Certificate Transparency compliance status\n`);7 await TestRunner.loadModule('security_test_runner');8 await TestRunner.showPanel('security');9 var request1 = new SDK.NetworkRequest(0, 'https://foo.test/', 'https://foo.test', 0, 0, null);10 request1.setSecurityState(Protocol.Security.SecurityState.Secure);11 let securityDetails = {};12 securityDetails.protocol = 'TLS 1.2';13 securityDetails.keyExchange = 'Key_Exchange';14 securityDetails.keyExchangeGroup = '';15 securityDetails.cipher = 'Cypher';16 securityDetails.mac = 'Mac';17 securityDetails.subjectName = 'foo.test';18 securityDetails.sanList = ['foo.test', '*.test'];19 securityDetails.issuer = 'Super CA';20 securityDetails.validFrom = 1490000000;21 securityDetails.validTo = 2000000000;22 securityDetails.CertificateId = 0;23 securityDetails.signedCertificateTimestampList = [];24 securityDetails.certificateTransparencyCompliance = Protocol.Network.CertificateTransparencyCompliance.Compliant;25 request1.setSecurityDetails(securityDetails);26 SecurityTestRunner.dispatchRequestFinished(request1);27 Security.SecurityPanel._instance()._sidebarTree._elementsByOrigin.get('https://foo.test').select();28 TestRunner.addResult('Panel on origin view:');29 TestRunner.dumpDeepInnerHTML(Security.SecurityPanel._instance()._visibleView.contentElement);30 TestRunner.completeTest();...
Using AI Code Generation
1const puppeteer = require('puppeteer');2(async () => {3 const browser = await puppeteer.launch();4 const page = await browser.newPage();5 const securityDetails = await page.securityDetails();6 console.log(securityDetails);7 await browser.close();8})();9const puppeteer = require('puppeteer');10(async () => {11 const browser = await puppeteer.launch();12 const page = await browser.newPage();13 const securityDetails = await page.securityDetails();14 console.log(securityDetails);15 await browser.close();16})();17const puppeteer = require('puppeteer');18(async () => {19 const browser = await puppeteer.launch();20 const page = await browser.newPage();21 const securityDetails = await page.securityDetails();22 console.log(securityDetails);23 await browser.close();24})();25const puppeteer = require('puppeteer');26(async () => {27 const browser = await puppeteer.launch();28 const page = await browser.newPage();29 const securityDetails = await page.securityDetails();30 console.log(securityDetails);31 await browser.close();32})();
Learn to execute automation testing from scratch with LambdaTest Learning Hub. Right from setting up the prerequisites to run your first automation test, to following best practices and diving deeper into advanced test scenarios. LambdaTest Learning Hubs compile a list of step-by-step guides to help you be proficient with different test automation frameworks i.e. Selenium, Cypress, TestNG etc.
You could also refer to video tutorials over LambdaTest YouTube channel to get step by step demonstration from industry experts.
Get 100 minutes of automation test minutes FREE!!