mirror of
				https://github.com/microsoft/playwright.git
				synced 2025-06-26 21:40:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			802 lines
		
	
	
		
			35 KiB
		
	
	
	
		
			TypeScript
		
	
	
	
	
	
			
		
		
	
	
			802 lines
		
	
	
		
			35 KiB
		
	
	
	
		
			TypeScript
		
	
	
	
	
	
/**
 | 
						|
 * Copyright (c) Microsoft Corporation. All rights reserved.
 | 
						|
 *
 | 
						|
 * Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
 * you may not use this file except in compliance with the License.
 | 
						|
 * You may obtain a copy of the License at
 | 
						|
 *
 | 
						|
 *     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 *
 | 
						|
 * Unless required by applicable law or agreed to in writing, software
 | 
						|
 * distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
 * See the License for the specific language governing permissions and
 | 
						|
 * limitations under the License.
 | 
						|
 */
 | 
						|
 | 
						|
import fs from 'fs';
 | 
						|
import tls from 'tls';
 | 
						|
import type https from 'https';
 | 
						|
import zlib from 'zlib';
 | 
						|
import type http2 from 'http2';
 | 
						|
import type http from 'http';
 | 
						|
import { expect, playwrightTest as base } from '../config/browserTest';
 | 
						|
import type net from 'net';
 | 
						|
import type { BrowserContextOptions } from 'packages/playwright-test';
 | 
						|
import { setupSocksForwardingServer } from '../config/proxy';
 | 
						|
const { createHttpsServer, createHttp2Server } = require('../../packages/playwright-core/lib/utils');
 | 
						|
 | 
						|
type TestOptions = {
 | 
						|
  startCCServer(options?: {
 | 
						|
    http2?: boolean;
 | 
						|
    enableHTTP1FallbackWhenUsingHttp2?: boolean;
 | 
						|
    useFakeLocalhost?: boolean;
 | 
						|
  }): Promise<string>,
 | 
						|
};
 | 
						|
 | 
						|
const test = base.extend<TestOptions>({
 | 
						|
  startCCServer: async ({ asset }, use) => {
 | 
						|
    process.env.PWTEST_UNSUPPORTED_CUSTOM_CA = asset('client-certificates/server/server_cert.pem');
 | 
						|
    let server: http.Server | http2.Http2SecureServer | undefined;
 | 
						|
    await use(async options => {
 | 
						|
      server = (options?.http2 ? createHttp2Server : createHttpsServer)({
 | 
						|
        key: fs.readFileSync(asset('client-certificates/server/server_key.pem')),
 | 
						|
        cert: fs.readFileSync(asset('client-certificates/server/server_cert.pem')),
 | 
						|
        ca: [
 | 
						|
          fs.readFileSync(asset('client-certificates/server/server_cert.pem')),
 | 
						|
        ],
 | 
						|
        requestCert: true,
 | 
						|
        rejectUnauthorized: false,
 | 
						|
        allowHTTP1: options?.enableHTTP1FallbackWhenUsingHttp2,
 | 
						|
      }, (req: (http2.Http2ServerRequest | http.IncomingMessage), res: http2.Http2ServerResponse | http.ServerResponse) => {
 | 
						|
        const tlsSocket = req.socket as import('tls').TLSSocket;
 | 
						|
        const parts: { key: string, value: any }[] = [];
 | 
						|
        parts.push({ key: 'alpn-protocol', value: tlsSocket.alpnProtocol });
 | 
						|
        // @ts-expect-error https://github.com/DefinitelyTyped/DefinitelyTyped/discussions/62336
 | 
						|
        parts.push({ key: 'servername', value: tlsSocket.servername });
 | 
						|
        const cert = tlsSocket.getPeerCertificate();
 | 
						|
        if (tlsSocket.authorized) {
 | 
						|
          res.writeHead(200, { 'Content-Type': 'text/html' });
 | 
						|
          parts.push({ key: 'message', value: `Hello ${cert.subject.CN}, your certificate was issued by ${cert.issuer.CN}!` });
 | 
						|
        } else if (cert.subject) {
 | 
						|
          res.writeHead(403, { 'Content-Type': 'text/html' });
 | 
						|
          parts.push({ key: 'message', value: `Sorry ${cert.subject.CN}, certificates from ${cert.issuer.CN} are not welcome here.` });
 | 
						|
        } else {
 | 
						|
          res.writeHead(401, { 'Content-Type': 'text/html' });
 | 
						|
          parts.push({ key: 'message', value: `Sorry, but you need to provide a client certificate to continue.` });
 | 
						|
        }
 | 
						|
        res.end(parts.map(({ key, value }) => `<div data-testid="${key}">${value}</div>`).join(''));
 | 
						|
      });
 | 
						|
      await new Promise<void>(f => server.listen(0, '127.0.0.1', () => f()));
 | 
						|
      const host = options?.useFakeLocalhost ? 'local.playwright' : '127.0.0.1';
 | 
						|
      return `https://${host}:${(server.address() as net.AddressInfo).port}/`;
 | 
						|
    });
 | 
						|
    if (server)
 | 
						|
      await new Promise<void>(resolve => server.close(() => resolve()));
 | 
						|
  },
 | 
						|
});
 | 
						|
 | 
						|
const kDummyFileName = __filename;
 | 
						|
const kValidationSubTests: [BrowserContextOptions, string][] = [
 | 
						|
  [{ clientCertificates: [{ origin: 'test' }] }, 'None of cert, key, passphrase or pfx is specified'],
 | 
						|
  [{
 | 
						|
    clientCertificates: [{
 | 
						|
      origin: 'test',
 | 
						|
      certPath: kDummyFileName,
 | 
						|
      keyPath: kDummyFileName,
 | 
						|
      pfxPath: kDummyFileName,
 | 
						|
      passphrase: kDummyFileName,
 | 
						|
    }]
 | 
						|
  }, 'pfx is specified together with cert, key or passphrase'],
 | 
						|
];
 | 
						|
 | 
						|
test.describe('fetch', () => {
 | 
						|
  test('validate input', async ({ playwright }) => {
 | 
						|
    for (const [contextOptions, expected] of kValidationSubTests)
 | 
						|
      await expect(playwright.request.newContext(contextOptions)).rejects.toThrow(expected);
 | 
						|
  });
 | 
						|
 | 
						|
  test('should fail with no client certificates provided', async ({ playwright, startCCServer }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const request = await playwright.request.newContext({ ignoreHTTPSErrors: true });
 | 
						|
    const response = await request.get(serverURL);
 | 
						|
    expect(response.status()).toBe(401);
 | 
						|
    expect(await response.text()).toContain('Sorry, but you need to provide a client certificate to continue.');
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should keep supporting http', async ({ playwright, server, asset }) => {
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(server.PREFIX).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    const response = await request.get(server.PREFIX + '/one-style.html');
 | 
						|
    expect(response.url()).toBe(server.PREFIX + '/one-style.html');
 | 
						|
    expect(response.status()).toBe(200);
 | 
						|
    expect(await response.text()).toContain('<div>hello, world!</div>');
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should throw with untrusted client certs', async ({ playwright, startCCServer, asset }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/self-signed/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/self-signed/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    const response = await request.get(serverURL);
 | 
						|
    expect(response.url()).toBe(serverURL);
 | 
						|
    expect(response.status()).toBe(403);
 | 
						|
    expect(await response.text()).toContain('Sorry Bob, certificates from Bob are not welcome here.');
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
 | 
						|
  test('pass with trusted client certificates', async ({ playwright, startCCServer, asset }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    const response = await request.get(serverURL);
 | 
						|
    expect(response.url()).toBe(serverURL);
 | 
						|
    expect(response.status()).toBe(200);
 | 
						|
    expect(await response.text()).toContain('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
 | 
						|
  test('pass with trusted client certificates in pfx format', async ({ playwright, startCCServer, asset }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        pfxPath: asset('client-certificates/client/trusted/cert.pfx'),
 | 
						|
        passphrase: 'secure'
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    const response = await request.get(serverURL);
 | 
						|
    expect(response.url()).toBe(serverURL);
 | 
						|
    expect(response.status()).toBe(200);
 | 
						|
    expect(await response.text()).toContain('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
 | 
						|
  test('pass with trusted client certificates and when a http proxy is used', async ({ playwright, startCCServer, proxyServer, asset }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    proxyServer.forwardTo(parseInt(new URL(serverURL).port, 10), { allowConnectRequests: true });
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
      proxy: { server: `localhost:${proxyServer.PORT}` }
 | 
						|
    });
 | 
						|
    expect(proxyServer.connectHosts).toEqual([]);
 | 
						|
    const response = await request.get(serverURL);
 | 
						|
    expect(proxyServer.connectHosts).toEqual([new URL(serverURL).host]);
 | 
						|
    expect(response.url()).toBe(serverURL);
 | 
						|
    expect(response.status()).toBe(200);
 | 
						|
    expect(await response.text()).toContain('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
 | 
						|
  test('pass with trusted client certificates and when a socks proxy is used', async ({ playwright, startCCServer, asset }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const serverPort = parseInt(new URL(serverURL).port, 10);
 | 
						|
    const { proxyServerAddr, closeProxyServer, connectHosts } = await setupSocksForwardingServer({
 | 
						|
      port: test.info().workerIndex + 2048 + 2,
 | 
						|
      forwardPort: serverPort,
 | 
						|
      allowedTargetPort: serverPort,
 | 
						|
    });
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
      proxy: { server: proxyServerAddr }
 | 
						|
    });
 | 
						|
    expect(connectHosts).toEqual([]);
 | 
						|
    const response = await request.get(serverURL);
 | 
						|
    expect(connectHosts).toEqual([new URL(serverURL).host]);
 | 
						|
    expect(response.url()).toBe(serverURL);
 | 
						|
    expect(response.status()).toBe(200);
 | 
						|
    expect(await response.text()).toContain('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await request.dispose();
 | 
						|
    await closeProxyServer();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should throw a http error if the pfx passphrase is incorect', async ({ playwright, startCCServer, asset, browserName }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        pfxPath: asset('client-certificates/client/trusted/cert.pfx'),
 | 
						|
        passphrase: 'this-password-is-incorrect'
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await expect(request.get(serverURL)).rejects.toThrow('mac verify failure');
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should fail with matching certificates in legacy pfx format', async ({ playwright, startCCServer, asset, browserName }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        pfxPath: asset('client-certificates/client/trusted/cert-legacy.pfx'),
 | 
						|
        passphrase: 'secure'
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await expect(request.get(serverURL)).rejects.toThrow('Unsupported TLS certificate');
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should work in the browser with request interception', async ({ browser, playwright, startCCServer, asset }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const request = await playwright.request.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    const page = await browser.newPage({ ignoreHTTPSErrors: true });
 | 
						|
    await page.route('**/*', async route => {
 | 
						|
      const response = await request.fetch(route.request());
 | 
						|
      await route.fulfill({ response });
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await page.close();
 | 
						|
    await request.dispose();
 | 
						|
  });
 | 
						|
});
 | 
						|
 | 
						|
 | 
						|
test.describe('browser', () => {
 | 
						|
  test('validate input', async ({ browser }) => {
 | 
						|
    for (const [contextOptions, expected] of kValidationSubTests)
 | 
						|
      await expect(browser.newContext(contextOptions)).rejects.toThrow(expected);
 | 
						|
  });
 | 
						|
 | 
						|
  test('should keep supporting http', async ({ browser, server, asset }) => {
 | 
						|
    const page = await browser.newPage({
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(server.PREFIX).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(server.PREFIX + '/one-style.html');
 | 
						|
    await expect(page.getByText('hello, world!')).toBeVisible();
 | 
						|
    await expect(page.locator('body')).toHaveCSS('background-color', 'rgb(255, 192, 203)');
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should fail with no client certificates', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: 'https://not-matching.com',
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Sorry, but you need to provide a client certificate to continue.');
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should fail with self-signed client certificates', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/self-signed/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/self-signed/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Sorry Bob, certificates from Bob are not welcome here.');
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should pass with matching certificates', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should pass with matching certificates when passing as content', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        cert: await fs.promises.readFile(asset('client-certificates/client/trusted/cert.pem')),
 | 
						|
        key: await fs.promises.readFile(asset('client-certificates/client/trusted/key.pem')),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should pass with matching certificates and when a http proxy is used', async ({ browser, startCCServer, asset, browserName, proxyServer, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    proxyServer.forwardTo(parseInt(new URL(serverURL).port, 10), { allowConnectRequests: true });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
      proxy: { server: `localhost:${proxyServer.PORT}` }
 | 
						|
    });
 | 
						|
    expect(proxyServer.connectHosts).toEqual([]);
 | 
						|
    await page.goto(serverURL);
 | 
						|
    const host = browserName === 'webkit' && isMac ? 'localhost' : '127.0.0.1';
 | 
						|
    expect([...new Set(proxyServer.connectHosts)]).toEqual([`${host}:${new URL(serverURL).port}`]);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should pass with matching certificates and when a socks proxy is used', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    const serverPort = parseInt(new URL(serverURL).port, 10);
 | 
						|
    const { proxyServerAddr, closeProxyServer, connectHosts } = await setupSocksForwardingServer({
 | 
						|
      port: test.info().workerIndex + 2048 + 2,
 | 
						|
      forwardPort: serverPort,
 | 
						|
      allowedTargetPort: serverPort,
 | 
						|
    });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
      proxy: { server: proxyServerAddr }
 | 
						|
    });
 | 
						|
    expect(connectHosts).toEqual([]);
 | 
						|
    await page.goto(serverURL);
 | 
						|
    const host = browserName === 'webkit' && isMac ? 'localhost' : '127.0.0.1';
 | 
						|
    expect(connectHosts).toEqual([`${host}:${serverPort}`]);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await page.close();
 | 
						|
    await closeProxyServer();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should not hang on tls errors during TLS 1.2 handshake', async ({ browser, asset, platform, browserName }) => {
 | 
						|
    for (const tlsVersion of ['TLSv1.3', 'TLSv1.2'] as const) {
 | 
						|
      await test.step(`TLS version: ${tlsVersion}`, async () => {
 | 
						|
        const server = tls.createServer({
 | 
						|
          key: fs.readFileSync(asset('client-certificates/server/server_key.pem')),
 | 
						|
          cert: fs.readFileSync(asset('client-certificates/server/server_cert.pem')),
 | 
						|
          ca: [
 | 
						|
            fs.readFileSync(asset('client-certificates/server/server_cert.pem')),
 | 
						|
          ],
 | 
						|
          requestCert: true,
 | 
						|
          rejectUnauthorized: true,
 | 
						|
          minVersion: tlsVersion,
 | 
						|
          maxVersion: tlsVersion,
 | 
						|
          SNICallback: (servername, cb) => {
 | 
						|
            // Always reject the connection by passing an error
 | 
						|
            cb(new Error('Connection rejected'), null);
 | 
						|
          }
 | 
						|
        }, () => {
 | 
						|
          // Do nothing
 | 
						|
        });
 | 
						|
        const serverURL = await new Promise<string>(resolve => {
 | 
						|
          server.listen(0, 'localhost', () => {
 | 
						|
            const host = browserName === 'webkit' && platform === 'darwin' ? 'local.playwright' : 'localhost';
 | 
						|
            resolve(`https://${host}:${(server.address() as net.AddressInfo).port}/`);
 | 
						|
          });
 | 
						|
        });
 | 
						|
        const page = await browser.newPage({
 | 
						|
          ignoreHTTPSErrors: true,
 | 
						|
          clientCertificates: [{
 | 
						|
            origin: new URL(serverURL).origin,
 | 
						|
            certPath: asset('client-certificates/client/self-signed/cert.pem'),
 | 
						|
            keyPath: asset('client-certificates/client/self-signed/key.pem'),
 | 
						|
          }],
 | 
						|
        });
 | 
						|
        await page.goto(serverURL);
 | 
						|
        await expect(page.getByText('Playwright client-certificate error: Client network socket disconnected before secure TLS connection was established')).toBeVisible();
 | 
						|
        await page.close();
 | 
						|
        await new Promise<void>(resolve => server.close(() => resolve()));
 | 
						|
      });
 | 
						|
    }
 | 
						|
  });
 | 
						|
 | 
						|
  test('should pass with matching certificates in pfx format', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        pfxPath: asset('client-certificates/client/trusted/cert.pfx'),
 | 
						|
        passphrase: 'secure'
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should handle TLS renegotiation with client certificates', async ({ browser, asset, browserName, platform }) => {
 | 
						|
    const server: https.Server = createHttpsServer({
 | 
						|
      key: fs.readFileSync(asset('client-certificates/server/server_key.pem')),
 | 
						|
      cert: fs.readFileSync(asset('client-certificates/server/server_cert.pem')),
 | 
						|
      ca: [fs.readFileSync(asset('client-certificates/server/server_cert.pem'))],
 | 
						|
      requestCert: false, // Initially don't request client cert
 | 
						|
      rejectUnauthorized: false,
 | 
						|
      // TLSv1.3 does not support renegotiation
 | 
						|
      minVersion: 'TLSv1.2',
 | 
						|
      maxVersion: 'TLSv1.2',
 | 
						|
    });
 | 
						|
 | 
						|
    server.on('request', async (req, res) => {
 | 
						|
      if (!req.socket)
 | 
						|
        return;
 | 
						|
      const renegotiate = () => new Promise<void>((resolve, reject) => {
 | 
						|
        (req.socket as tls.TLSSocket).renegotiate({
 | 
						|
          requestCert: true,
 | 
						|
          rejectUnauthorized: false
 | 
						|
        }, err => {
 | 
						|
          if (err)
 | 
						|
            reject(err);
 | 
						|
          else
 | 
						|
            resolve();
 | 
						|
        });
 | 
						|
      });
 | 
						|
      if (req.url === '/') {
 | 
						|
        res.writeHead(200, { 'Content-Type': 'text/html', 'connection': 'close' });
 | 
						|
        res.end();
 | 
						|
      } else if (req.url === '/from-fetch-api') {
 | 
						|
        res.writeHead(200, {
 | 
						|
          'Content-Type': 'text/plain',
 | 
						|
          'Transfer-Encoding': 'chunked'
 | 
						|
        });
 | 
						|
        res.flushHeaders();
 | 
						|
 | 
						|
        await new Promise<void>(resolve => req.once('data', data => {
 | 
						|
          res.write(`server received: ${data.toString()}\n`);
 | 
						|
          resolve();
 | 
						|
        }));
 | 
						|
 | 
						|
        await renegotiate();
 | 
						|
        for (let i = 0; i < 4; i++) {
 | 
						|
          res.write(`${i}-from-server\n`);
 | 
						|
          // Best-effort to trigger a new chunk
 | 
						|
          await new Promise<void>(resolve => setTimeout(resolve, 100));
 | 
						|
        }
 | 
						|
        res.end('server closed the connection');
 | 
						|
      } else if (req.url === '/style.css') {
 | 
						|
        res.writeHead(200, {
 | 
						|
          'Content-Type': 'text/css',
 | 
						|
          'Content-Encoding': 'gzip',
 | 
						|
          'Transfer-Encoding': 'chunked'
 | 
						|
        });
 | 
						|
 | 
						|
        await renegotiate();
 | 
						|
 | 
						|
        const stylesheet = `
 | 
						|
          button {
 | 
						|
            background-color: red;
 | 
						|
          }
 | 
						|
        `;
 | 
						|
 | 
						|
        const stylesheetBuffer = await new Promise<Buffer>((resolve, reject) => {
 | 
						|
          zlib.gzip(stylesheet, (err, buffer) => {
 | 
						|
            if (err)
 | 
						|
              reject(err);
 | 
						|
            else
 | 
						|
              resolve(buffer);
 | 
						|
          });
 | 
						|
        });
 | 
						|
        for (let i = 0; i < stylesheetBuffer.length; i += 100) {
 | 
						|
          res.write(stylesheetBuffer.slice(i, i + 100));
 | 
						|
          // Best-effort to trigger a new chunk
 | 
						|
          await new Promise<void>(resolve => setTimeout(resolve, 20));
 | 
						|
        }
 | 
						|
        res.end();
 | 
						|
      } else {
 | 
						|
        res.writeHead(404);
 | 
						|
        res.end();
 | 
						|
      }
 | 
						|
    });
 | 
						|
 | 
						|
    await new Promise<void>(resolve => server.listen(0, 'localhost', resolve));
 | 
						|
    const port = (server.address() as net.AddressInfo).port;
 | 
						|
    const origin = 'https://' + (browserName === 'webkit' && platform === 'darwin' ? 'local.playwright' : 'localhost');
 | 
						|
    const serverUrl = `${origin}:${port}`;
 | 
						|
 | 
						|
    const context = await browser.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
 | 
						|
    const page = await context.newPage();
 | 
						|
 | 
						|
    await test.step('fetch API', async () => {
 | 
						|
      await page.goto(serverUrl);
 | 
						|
      const response = await page.evaluate(async () => {
 | 
						|
        const response = await fetch('/from-fetch-api', {
 | 
						|
          method: 'POST',
 | 
						|
          body: 'client-request-payload'
 | 
						|
        });
 | 
						|
        return await response.text();
 | 
						|
      });
 | 
						|
      expect(response).toBe([
 | 
						|
        'server received: client-request-payload',
 | 
						|
        '0-from-server',
 | 
						|
        '1-from-server',
 | 
						|
        '2-from-server',
 | 
						|
        '3-from-server',
 | 
						|
        'server closed the connection'
 | 
						|
      ].join('\n'));
 | 
						|
    });
 | 
						|
 | 
						|
    await test.step('Gzip encoded CSS Stylesheet', async () => {
 | 
						|
      await page.goto(serverUrl);
 | 
						|
      // The <link> would throw with net::ERR_INVALID_CHUNKED_ENCODING
 | 
						|
      await page.setContent(`
 | 
						|
        <button>Click me</button>
 | 
						|
        <link rel="stylesheet" href="/style.css">
 | 
						|
      `);
 | 
						|
      await expect(page.locator('button')).toHaveCSS('background-color', /* red */'rgb(255, 0, 0)');
 | 
						|
    });
 | 
						|
 | 
						|
    await context.close();
 | 
						|
    await new Promise<void>(resolve => server.close(() => resolve()));
 | 
						|
  });
 | 
						|
 | 
						|
  test('should pass with matching certificates in pfx format when passing as content', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        pfx: await fs.promises.readFile(asset('client-certificates/client/trusted/cert.pfx')),
 | 
						|
        passphrase: 'secure'
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should fail with matching certificates in legacy pfx format', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    await expect(browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        pfxPath: asset('client-certificates/client/trusted/cert-legacy.pfx'),
 | 
						|
        passphrase: 'secure'
 | 
						|
      }],
 | 
						|
    })).rejects.toThrow('Unsupported TLS certificate');
 | 
						|
  });
 | 
						|
 | 
						|
  test('should throw a http error if the pfx passphrase is incorect', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    await expect(browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        pfxPath: asset('client-certificates/client/trusted/cert.pfx'),
 | 
						|
        passphrase: 'this-password-is-incorrect'
 | 
						|
      }],
 | 
						|
    })).rejects.toThrow('Failed to load client certificate: mac verify failure');
 | 
						|
  });
 | 
						|
 | 
						|
  test('should pass with matching certificates on context APIRequestContext instance', async ({ browser, startCCServer, asset, browserName }) => {
 | 
						|
    const serverURL = await startCCServer();
 | 
						|
    const baseOptions = {
 | 
						|
      certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
      keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
    };
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        ...baseOptions,
 | 
						|
      }, {
 | 
						|
        origin: new URL(serverURL).origin.replace('localhost', '127.0.0.1'),
 | 
						|
        ...baseOptions,
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    for (const url of [serverURL, serverURL.replace('localhost', '127.0.0.1')]) {
 | 
						|
      const response = await page.request.get(url);
 | 
						|
      expect(response.status()).toBe(200);
 | 
						|
      expect(await response.text()).toContain('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    }
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should pass with matching certificates and trailing slash', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: serverURL,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByText('Hello Alice, your certificate was issued by localhost!')).toBeVisible();
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should have ignoreHTTPSErrors=false by default', async ({ browser, httpsServer, asset, browserName, platform }) => {
 | 
						|
    const page = await browser.newPage({
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: 'https://just-there-that-the-client-certificates-proxy-server-is-getting-launched.com',
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(browserName === 'webkit' && platform === 'darwin' ? httpsServer.EMPTY_PAGE.replace('localhost', 'local.playwright') : httpsServer.EMPTY_PAGE);
 | 
						|
    await expect(page.getByText('Playwright client-certificate error: self-signed certificate')).toBeVisible();
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('support http2', async ({ browser, startCCServer, asset, browserName, isMac }) => {
 | 
						|
    test.skip(browserName === 'webkit' && isMac, 'WebKit on macOS doesn\n proxy localhost');
 | 
						|
    const serverURL = await startCCServer({ http2: true });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    {
 | 
						|
      await page.goto(serverURL.replace('127.0.0.1', 'local.playwright'));
 | 
						|
      await expect(page.getByTestId('message')).toHaveText('Sorry, but you need to provide a client certificate to continue.');
 | 
						|
      await expect(page.getByTestId('alpn-protocol')).toHaveText('h2');
 | 
						|
      await expect(page.getByTestId('servername')).toHaveText('local.playwright');
 | 
						|
    }
 | 
						|
    {
 | 
						|
      await page.goto(serverURL);
 | 
						|
      await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
      await expect(page.getByTestId('alpn-protocol')).toHaveText('h2');
 | 
						|
    }
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('support http2 if the browser only supports http1.1', async ({ browserType, browserName, startCCServer, asset }) => {
 | 
						|
    test.skip(browserName !== 'chromium');
 | 
						|
    const serverURL = await startCCServer({ http2: true, enableHTTP1FallbackWhenUsingHttp2: true });
 | 
						|
    const browser = await browserType.launch({ args: ['--disable-http2'] });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: new URL(serverURL).origin,
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    {
 | 
						|
      await page.goto(serverURL.replace('127.0.0.1', 'local.playwright'));
 | 
						|
      await expect(page.getByTestId('message')).toHaveText('Sorry, but you need to provide a client certificate to continue.');
 | 
						|
      await expect(page.getByTestId('alpn-protocol')).toHaveText('http/1.1');
 | 
						|
    }
 | 
						|
    {
 | 
						|
      await page.goto(serverURL);
 | 
						|
      await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
      await expect(page.getByTestId('alpn-protocol')).toHaveText('http/1.1');
 | 
						|
    }
 | 
						|
    await browser.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should return target connection errors when using http2', async ({ browser, startCCServer, asset, browserName, isMac, nodeVersion }) => {
 | 
						|
    test.skip(browserName === 'webkit' && isMac, 'WebKit on macOS does not proxy localhost');
 | 
						|
    test.skip(nodeVersion.major < 20, 'http2.performServerHandshake is not supported in older Node.js versions');
 | 
						|
 | 
						|
    const serverURL = await startCCServer({ http2: true });
 | 
						|
    const page = await browser.newPage({
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: 'https://just-there-that-the-client-certificates-proxy-server-is-getting-launched.com',
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
    await page.goto(serverURL);
 | 
						|
    await expect(page.getByText('Playwright client-certificate error: self-signed certificate')).toBeVisible();
 | 
						|
    await page.close();
 | 
						|
  });
 | 
						|
 | 
						|
  test('should handle rejected certificate in handshake with HTTP/2', async ({ browser, asset, browserName, platform }) => {
 | 
						|
    const server: http2.Http2SecureServer = createHttp2Server({
 | 
						|
      key: fs.readFileSync(asset('client-certificates/server/server_key.pem')),
 | 
						|
      cert: fs.readFileSync(asset('client-certificates/server/server_cert.pem')),
 | 
						|
      ca: [fs.readFileSync(asset('client-certificates/server/server_cert.pem'))],
 | 
						|
      requestCert: true,
 | 
						|
    }, async (req: http2.Http2ServerRequest, res: http2.Http2ServerResponse) => {
 | 
						|
      res.writeHead(200, { 'Content-Type': 'text/html' });
 | 
						|
      res.end('Hello world');
 | 
						|
    });
 | 
						|
 | 
						|
    await new Promise<void>(resolve => server.listen(0, 'localhost', resolve));
 | 
						|
    const port = (server.address() as net.AddressInfo).port;
 | 
						|
    const serverUrl = 'https://' + (browserName === 'webkit' && platform === 'darwin' ? 'local.playwright' : 'localhost') + ':' + port;
 | 
						|
 | 
						|
    const context = await browser.newContext({
 | 
						|
      ignoreHTTPSErrors: true,
 | 
						|
      clientCertificates: [{
 | 
						|
        origin: 'https://just-there-that-the-client-certificates-proxy-server-is-getting-launched.com',
 | 
						|
        certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
        keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
      }],
 | 
						|
    });
 | 
						|
 | 
						|
    const page = await context.newPage();
 | 
						|
 | 
						|
    // This was triggering an unhandled error before.
 | 
						|
    await page.goto(serverUrl).catch(() => {});
 | 
						|
 | 
						|
    await context.close();
 | 
						|
    await new Promise<void>(resolve => server.close(() => resolve()));
 | 
						|
  });
 | 
						|
 | 
						|
  test.describe('persistentContext', () => {
 | 
						|
    test('validate input', async ({ launchPersistent }) => {
 | 
						|
      test.slow();
 | 
						|
      for (const [contextOptions, expected] of kValidationSubTests)
 | 
						|
        await expect(launchPersistent(contextOptions)).rejects.toThrow(expected);
 | 
						|
    });
 | 
						|
 | 
						|
    test('should pass with matching certificates', async ({ launchPersistent, startCCServer, asset, browserName, isMac }) => {
 | 
						|
      const serverURL = await startCCServer({ useFakeLocalhost: browserName === 'webkit' && isMac });
 | 
						|
      const { page } = await launchPersistent({
 | 
						|
        ignoreHTTPSErrors: true,
 | 
						|
        clientCertificates: [{
 | 
						|
          origin: new URL(serverURL).origin,
 | 
						|
          certPath: asset('client-certificates/client/trusted/cert.pem'),
 | 
						|
          keyPath: asset('client-certificates/client/trusted/key.pem'),
 | 
						|
        }],
 | 
						|
      });
 | 
						|
      await page.goto(serverURL);
 | 
						|
      await expect(page.getByTestId('message')).toHaveText('Hello Alice, your certificate was issued by localhost!');
 | 
						|
    });
 | 
						|
  });
 | 
						|
});
 |