mirror of
https://github.com/cypress-io/cypress.git
synced 2026-01-21 06:30:01 -06:00
* fix: throw error if the cy.origin origin is in the same superDomainOrigin as top. * testing test tweaks * 'fix' cypress in cypress tests * Inject cross origin in google subdomains when not same-origin * style tweaks * Ensure strict same-origin check works for google. * test fixes * we don't need the location object when we just want the href. * what is in a name? * Address PR Comments
426 lines
14 KiB
TypeScript
426 lines
14 KiB
TypeScript
import Bluebird from 'bluebird'
|
|
import Debug from 'debug'
|
|
import isHtml from 'is-html'
|
|
import _ from 'lodash'
|
|
import stream from 'stream'
|
|
import url from 'url'
|
|
import httpsProxy from '@packages/https-proxy'
|
|
import { getRoutesForRequest } from '@packages/net-stubbing'
|
|
import { concatStream, cors } from '@packages/network'
|
|
import { graphqlWS } from '@packages/graphql/src/makeGraphQLServer'
|
|
|
|
import * as errors from './errors'
|
|
import fileServer from './file_server'
|
|
import { OpenServerOptions, ServerBase } from './server-base'
|
|
import type { SocketE2E } from './socket-e2e'
|
|
import appData from './util/app_data'
|
|
import * as ensureUrl from './util/ensure-url'
|
|
import headersUtil from './util/headers'
|
|
import statusCode from './util/status_code'
|
|
import type { Cfg } from './project-base'
|
|
|
|
type WarningErr = Record<string, any>
|
|
|
|
const fullyQualifiedRe = /^https?:\/\//
|
|
const htmlContentTypesRe = /^(text\/html|application\/xhtml)/i
|
|
|
|
const debug = Debug('cypress:server:server-e2e')
|
|
|
|
const isResponseHtml = function (contentType, responseBuffer) {
|
|
if (contentType) {
|
|
// want to match anything starting with 'text/html'
|
|
// including 'text/html;charset=utf-8' and 'Text/HTML'
|
|
// https://github.com/cypress-io/cypress/issues/8506
|
|
return htmlContentTypesRe.test(contentType)
|
|
}
|
|
|
|
const body = _.invoke(responseBuffer, 'toString')
|
|
|
|
if (body) {
|
|
return isHtml(body)
|
|
}
|
|
|
|
return false
|
|
}
|
|
|
|
export class ServerE2E extends ServerBase<SocketE2E> {
|
|
private _urlResolver: Bluebird<Record<string, any>> | null
|
|
|
|
constructor () {
|
|
super()
|
|
|
|
this._urlResolver = null
|
|
}
|
|
|
|
open (config: Cfg, options: OpenServerOptions) {
|
|
return super.open(config, { ...options, testingType: 'e2e' })
|
|
}
|
|
|
|
createServer (app, config, onWarning): Bluebird<[number, WarningErr?]> {
|
|
return new Bluebird((resolve, reject) => {
|
|
const { port, fileServerFolder, socketIoRoute, baseUrl } = config
|
|
|
|
this._server = this._createHttpServer(app)
|
|
|
|
const onError = (err) => {
|
|
// if the server bombs before starting
|
|
// and the err no is EADDRINUSE
|
|
// then we know to display the custom err message
|
|
if (err.code === 'EADDRINUSE') {
|
|
return reject(this.portInUseErr(port))
|
|
}
|
|
}
|
|
|
|
debug('createServer connecting to server')
|
|
|
|
this.server.on('connect', this.onConnect.bind(this))
|
|
this.server.on('upgrade', (req, socket, head) => this.onUpgrade(req, socket, head, socketIoRoute))
|
|
this.server.once('error', onError)
|
|
|
|
this._graphqlWS = graphqlWS(this.server, `${socketIoRoute}-graphql`)
|
|
|
|
return this._listen(port, (err) => {
|
|
// if the server bombs before starting
|
|
// and the err no is EADDRINUSE
|
|
// then we know to display the custom err message
|
|
if (err.code === 'EADDRINUSE') {
|
|
return reject(this.portInUseErr(port))
|
|
}
|
|
})
|
|
.then((port) => {
|
|
return Bluebird.all([
|
|
httpsProxy.create(appData.path('proxy'), port, {
|
|
onRequest: this.callListeners.bind(this),
|
|
onUpgrade: this.onSniUpgrade.bind(this),
|
|
}),
|
|
|
|
fileServer.create(fileServerFolder),
|
|
])
|
|
.spread((httpsProxy, fileServer) => {
|
|
this._httpsProxy = httpsProxy
|
|
this._fileServer = fileServer
|
|
|
|
// if we have a baseUrl let's go ahead
|
|
// and make sure the server is connectable!
|
|
if (baseUrl) {
|
|
this._baseUrl = baseUrl
|
|
|
|
if (config.isTextTerminal) {
|
|
return this._retryBaseUrlCheck(baseUrl, onWarning)
|
|
.return(null)
|
|
.catch((e) => {
|
|
debug(e)
|
|
|
|
return reject(errors.get('CANNOT_CONNECT_BASE_URL'))
|
|
})
|
|
}
|
|
|
|
return ensureUrl.isListening(baseUrl)
|
|
.return(null)
|
|
.catch((err) => {
|
|
debug('ensuring baseUrl (%s) errored: %o', baseUrl, err)
|
|
|
|
return errors.get('CANNOT_CONNECT_BASE_URL_WARNING', baseUrl)
|
|
})
|
|
}
|
|
}).then((warning) => {
|
|
// once we open set the domain to root by default
|
|
// which prevents a situation where navigating
|
|
// to http sites redirects to /__/ cypress
|
|
this._remoteStates.set(baseUrl != null ? baseUrl : '<root>')
|
|
|
|
return resolve([port, warning])
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
startWebsockets (automation, config, options: Record<string, unknown> = {}) {
|
|
options.onResolveUrl = this._onResolveUrl.bind(this)
|
|
|
|
return super.startWebsockets(automation, config, options)
|
|
}
|
|
|
|
_onResolveUrl (urlStr, headers, automationRequest, options: Record<string, any> = { headers: {} }) {
|
|
let p
|
|
|
|
debug('resolving visit %o', {
|
|
url: urlStr,
|
|
headers,
|
|
options,
|
|
})
|
|
|
|
// always clear buffers - reduces the possibility of a random HTTP request
|
|
// accidentally retrieving buffered content at the wrong time
|
|
this._networkProxy?.reset()
|
|
|
|
const startTime = Date.now()
|
|
|
|
// if we have an existing url resolver
|
|
// in flight then cancel it
|
|
if (this._urlResolver) {
|
|
this._urlResolver.cancel()
|
|
}
|
|
|
|
const request = this.request
|
|
|
|
let handlingLocalFile = false
|
|
const previousRemoteState = this._remoteStates.current()
|
|
const previousRemoteStateIsPrimary = this._remoteStates.isPrimarySuperDomainOrigin(previousRemoteState.origin)
|
|
const primaryRemoteState = this._remoteStates.getPrimary()
|
|
|
|
// nuke any hashes from our url since
|
|
// those those are client only and do
|
|
// not apply to http requests
|
|
urlStr = url.parse(urlStr)
|
|
urlStr.hash = null
|
|
urlStr = urlStr.format()
|
|
|
|
const originalUrl = urlStr
|
|
|
|
let reqStream = null
|
|
let currentPromisePhase = null
|
|
|
|
const runPhase = (fn) => {
|
|
return currentPromisePhase = fn()
|
|
}
|
|
|
|
const matchesNetStubbingRoute = (requestOptions) => {
|
|
const proxiedReq = {
|
|
proxiedUrl: requestOptions.url,
|
|
..._.pick(requestOptions, ['headers', 'method']),
|
|
// TODO: add `body` here once bodies can be statically matched
|
|
}
|
|
|
|
// @ts-ignore
|
|
const iterator = getRoutesForRequest(this.netStubbingState?.routes, proxiedReq)
|
|
// If the iterator is exhausted (done) on the first try, then 0 matches were found
|
|
const zeroMatches = iterator.next().done
|
|
|
|
return !zeroMatches
|
|
}
|
|
|
|
return this._urlResolver = (p = new Bluebird<Record<string, any>>((resolve, reject, onCancel) => {
|
|
let urlFile
|
|
|
|
onCancel?.(() => {
|
|
p.currentPromisePhase = currentPromisePhase
|
|
p.reqStream = reqStream
|
|
|
|
_.invoke(reqStream, 'abort')
|
|
|
|
return _.invoke(currentPromisePhase, 'cancel')
|
|
})
|
|
|
|
const redirects: any[] = []
|
|
let newUrl: string | null = null
|
|
|
|
if (!fullyQualifiedRe.test(urlStr)) {
|
|
handlingLocalFile = true
|
|
|
|
options.headers['x-cypress-authorization'] = this._fileServer.token
|
|
|
|
const state = this._remoteStates.set(urlStr, options)
|
|
|
|
// TODO: Update url.resolve signature to not use deprecated methods
|
|
urlFile = url.resolve(state.fileServer as string, urlStr)
|
|
urlStr = url.resolve(state.origin as string, urlStr)
|
|
}
|
|
|
|
const onReqError = (err) => {
|
|
// only restore the previous state
|
|
// if our promise is still pending
|
|
if (p.isPending()) {
|
|
restorePreviousRemoteState(previousRemoteState, previousRemoteStateIsPrimary)
|
|
}
|
|
|
|
return reject(err)
|
|
}
|
|
|
|
const onReqStreamReady = (str) => {
|
|
reqStream = str
|
|
|
|
return str
|
|
.on('error', onReqError)
|
|
.on('response', (incomingRes) => {
|
|
debug(
|
|
'resolve:url headers received, buffering response %o',
|
|
_.pick(incomingRes, 'headers', 'statusCode'),
|
|
)
|
|
|
|
if (newUrl == null) {
|
|
newUrl = urlStr
|
|
}
|
|
|
|
return runPhase(() => {
|
|
// get the cookies that would be sent with this request so they can be rehydrated
|
|
return automationRequest('get:cookies', {
|
|
domain: cors.getSuperDomain(newUrl),
|
|
})
|
|
.then((cookies) => {
|
|
const statusIs2xxOrAllowedFailure = () => {
|
|
// is our status code in the 2xx range, or have we disabled failing
|
|
// on status code?
|
|
return statusCode.isOk(incomingRes.statusCode) || options.failOnStatusCode === false
|
|
}
|
|
|
|
const isOk = statusIs2xxOrAllowedFailure()
|
|
const contentType = headersUtil.getContentType(incomingRes)
|
|
|
|
const details: Record<string, unknown> = {
|
|
isOkStatusCode: isOk,
|
|
contentType,
|
|
url: newUrl,
|
|
status: incomingRes.statusCode,
|
|
cookies,
|
|
statusText: statusCode.getText(incomingRes.statusCode),
|
|
redirects,
|
|
originalUrl,
|
|
}
|
|
|
|
// does this response have this cypress header?
|
|
const fp = incomingRes.headers['x-cypress-file-path']
|
|
|
|
if (fp) {
|
|
// if so we know this is a local file request
|
|
details.filePath = fp
|
|
}
|
|
|
|
debug('setting details resolving url %o', details)
|
|
|
|
const concatStr = concatStream((responseBuffer) => {
|
|
// buffer the entire response before resolving.
|
|
// this allows us to detect & reject ETIMEDOUT errors
|
|
// where the headers have been sent but the
|
|
// connection hangs before receiving a body.
|
|
|
|
// if there is not a content-type, try to determine
|
|
// if the response content is HTML-like
|
|
// https://github.com/cypress-io/cypress/issues/1727
|
|
details.isHtml = isResponseHtml(contentType, responseBuffer)
|
|
|
|
debug('resolve:url response ended, setting buffer %o', { newUrl, details })
|
|
|
|
details.totalTime = Date.now() - startTime
|
|
|
|
// buffer the response and set the remote state if this is a successful html response
|
|
// TODO: think about moving this logic back into the frontend so that the driver can be in control
|
|
// of when to buffer and set the remote state
|
|
if (isOk && details.isHtml) {
|
|
const urlDoesNotMatchPolicyBasedOnDomain = options.hasAlreadyVisitedUrl && !cors.urlMatchesPolicyBasedOnDomain(primaryRemoteState.origin, newUrl || '') || options.isFromSpecBridge
|
|
|
|
if (!handlingLocalFile) {
|
|
this._remoteStates.set(newUrl as string, options, !urlDoesNotMatchPolicyBasedOnDomain)
|
|
}
|
|
|
|
const responseBufferStream = new stream.PassThrough({
|
|
highWaterMark: Number.MAX_SAFE_INTEGER,
|
|
})
|
|
|
|
responseBufferStream.end(responseBuffer)
|
|
|
|
this._networkProxy?.setHttpBuffer({
|
|
url: newUrl,
|
|
stream: responseBufferStream,
|
|
details,
|
|
originalUrl,
|
|
response: incomingRes,
|
|
urlDoesNotMatchPolicyBasedOnDomain,
|
|
})
|
|
} else {
|
|
// TODO: move this logic to the driver too for
|
|
// the same reasons listed above
|
|
restorePreviousRemoteState(previousRemoteState, previousRemoteStateIsPrimary)
|
|
}
|
|
|
|
details.isPrimarySuperDomainOrigin = this._remoteStates.isPrimarySuperDomainOrigin(newUrl!)
|
|
|
|
return resolve(details)
|
|
})
|
|
|
|
return str.pipe(concatStr)
|
|
}).catch(onReqError)
|
|
})
|
|
})
|
|
}
|
|
|
|
const restorePreviousRemoteState = (previousRemoteState: Cypress.RemoteState, previousRemoteStateIsPrimary: boolean) => {
|
|
this._remoteStates.set(previousRemoteState, {}, previousRemoteStateIsPrimary)
|
|
}
|
|
|
|
// if they're POSTing an object, querystringify their POST body
|
|
if ((options.method === 'POST') && _.isObject(options.body)) {
|
|
options.form = options.body
|
|
delete options.body
|
|
}
|
|
|
|
_.assign(options, {
|
|
// turn off gzip since we need to eventually
|
|
// rewrite these contents
|
|
gzip: false,
|
|
url: urlFile != null ? urlFile : urlStr,
|
|
headers: _.assign({
|
|
accept: 'text/html,*/*',
|
|
}, options.headers),
|
|
onBeforeReqInit: runPhase,
|
|
followRedirect (incomingRes) {
|
|
const status = incomingRes.statusCode
|
|
const next = incomingRes.headers.location
|
|
|
|
const curr = newUrl != null ? newUrl : urlStr
|
|
|
|
newUrl = url.resolve(curr, next)
|
|
|
|
redirects.push([status, newUrl].join(': '))
|
|
|
|
return true
|
|
},
|
|
})
|
|
|
|
if (matchesNetStubbingRoute(options)) {
|
|
// TODO: this is being used to force cy.visits to be interceptable by network stubbing
|
|
// however, network errors will be obsfucated by the proxying so this is not an ideal solution
|
|
_.merge(options, {
|
|
proxy: `http://127.0.0.1:${this._port()}`,
|
|
agent: null,
|
|
headers: {
|
|
'x-cypress-resolving-url': '1',
|
|
},
|
|
})
|
|
}
|
|
|
|
debug('sending request with options %o', options)
|
|
|
|
return runPhase(() => {
|
|
// @ts-ignore
|
|
return request.sendStream(headers, automationRequest, options)
|
|
.then((createReqStream) => {
|
|
const stream = createReqStream()
|
|
|
|
return onReqStreamReady(stream)
|
|
}).catch(onReqError)
|
|
})
|
|
}))
|
|
}
|
|
|
|
onTestFileChange (filePath) {
|
|
return this.socket.onTestFileChange(filePath)
|
|
}
|
|
|
|
_retryBaseUrlCheck (baseUrl, onWarning) {
|
|
return ensureUrl.retryIsListening(baseUrl, {
|
|
retryIntervals: [3000, 3000, 4000],
|
|
onRetry ({ attempt, delay, remaining }) {
|
|
const warning = errors.get('CANNOT_CONNECT_BASE_URL_RETRYING', {
|
|
remaining,
|
|
attempt,
|
|
delay,
|
|
baseUrl,
|
|
})
|
|
|
|
return onWarning(warning)
|
|
},
|
|
})
|
|
}
|
|
}
|