Skip to content

Commit 5bb66e5

Browse files
KhafraDevcrysmags
authored andcommitted
test(wpt): include all testing files (nodejs#1954)
* test(wpt): include all testing files * lint * fix: mark flaky/failing tests by entire file path * fix: pass 16/20 tests in request-headers.any.js * fix: patch referer header never being set * fix some tests * fix: node-fetch test
1 parent fa2ce06 commit 5bb66e5

File tree

1,829 files changed

+124557
-522
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,829 files changed

+124557
-522
lines changed

CONTRIBUTING.md

+39
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,45 @@ cd <your-path-to-undici>
7777
npm run build:wasm
7878
```
7979

80+
<a id="update-wpts"></a>
81+
### Update `WPTs`
82+
83+
`undici` runs a subset of the [`web-platform-tests`](https://github.com/web-platform-tests/wpt).
84+
85+
Here are the steps to update them.
86+
87+
#### Sparse-clone the [wpt](https://github.com/web-platform-tests/wpt) repo
88+
89+
```bash
90+
git clone --depth 1 --single-branch --branch epochs/daily --filter=blob:none --sparse https://github.com/web-platform-tests/wpt.git test/wpt/tests
91+
92+
cd test/wpt/tests
93+
94+
```
95+
96+
#### Checkout the tests
97+
98+
Only run the commands for the folder(s) you want to update.
99+
100+
```bash
101+
git sparse-checkout add /fetch
102+
git sparse-checkout add /FileAPI
103+
git sparse-checkout add /xhr
104+
git sparse-checkout add /websockets
105+
git sparse-checkout add /resources
106+
git sparse-checkout add /common
107+
```
108+
109+
#### Run the tests
110+
111+
Run the tests to ensure that any new failures are marked as such.
112+
113+
You can mark tests as failing in their corresponding [status](./test/wpt/status) file.
114+
115+
```bash
116+
npm run test:wpt
117+
```
118+
80119
<a id="lint"></a>
81120

82121
### Lint

lib/fetch/request.js

+4-1
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,10 @@ class Request {
5454
// TODO
5555
this[kRealm] = {
5656
settingsObject: {
57-
baseUrl: getGlobalOrigin()
57+
baseUrl: getGlobalOrigin(),
58+
get origin () {
59+
return this.baseUrl?.origin
60+
}
5861
}
5962
}
6063

lib/fetch/util.js

+90-89
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
'use strict'
22

33
const { redirectStatus, badPorts, referrerPolicy: referrerPolicyTokens } = require('./constants')
4+
const { getGlobalOrigin } = require('./global')
45
const { performance } = require('perf_hooks')
56
const { isBlobLike, toUSVString, ReadableStreamFrom } = require('../core/util')
67
const assert = require('assert')
@@ -36,9 +37,11 @@ function responseLocationURL (response, requestFragment) {
3637
// `Location` and response’s header list.
3738
let location = response.headersList.get('location')
3839

39-
// 3. If location is a value, then set location to the result of parsing
40-
// location with response’s URL.
41-
location = location ? new URL(location, responseURL(response)) : null
40+
// 3. If location is a header value, then set location to the result of
41+
// parsing location with response’s URL.
42+
if (location !== null && isValidHeaderValue(location)) {
43+
location = new URL(location, responseURL(response))
44+
}
4245

4346
// 4. If location is a URL whose fragment is null, then set location’s
4447
// fragment to requestFragment.
@@ -267,7 +270,7 @@ function appendRequestOriginHeader (request) {
267270
// 2. If request’s response tainting is "cors" or request’s mode is "websocket", then append (`Origin`, serializedOrigin) to request’s header list.
268271
if (request.responseTainting === 'cors' || request.mode === 'websocket') {
269272
if (serializedOrigin) {
270-
request.headersList.append('Origin', serializedOrigin)
273+
request.headersList.append('origin', serializedOrigin)
271274
}
272275

273276
// 3. Otherwise, if request’s method is neither `GET` nor `HEAD`, then:
@@ -298,7 +301,7 @@ function appendRequestOriginHeader (request) {
298301

299302
if (serializedOrigin) {
300303
// 2. Append (`Origin`, serializedOrigin) to request’s header list.
301-
request.headersList.append('Origin', serializedOrigin)
304+
request.headersList.append('origin', serializedOrigin)
302305
}
303306
}
304307
}
@@ -340,106 +343,77 @@ function clonePolicyContainer () {
340343
// https://w3c.github.io/webappsec-referrer-policy/#determine-requests-referrer
341344
function determineRequestsReferrer (request) {
342345
// 1. Let policy be request's referrer policy.
343-
const policy = request.referrerPolicy
346+
// TODO(@KhafraDev): referrerPolicy is supposed to be non-null & not an empty string.
347+
// this is because we don't implement policyContainer.
348+
const policy = request.referrerPolicy ?? 'strict-origin-when-cross-origin'
344349

345-
// Return no-referrer when empty or policy says so
346-
if (policy == null || policy === '' || policy === 'no-referrer') {
347-
return 'no-referrer'
348-
}
350+
// 2. Let environment be request’s client.
349351

350-
// 2. Let environment be the request client
351-
const environment = request.client
352352
let referrerSource = null
353353

354-
/**
355-
* 3, Switch on request’s referrer:
356-
"client"
357-
If environment’s global object is a Window object, then
358-
Let document be the associated Document of environment’s global object.
359-
If document’s origin is an opaque origin, return no referrer.
360-
While document is an iframe srcdoc document,
361-
let document be document’s browsing context’s browsing context container’s node document.
362-
Let referrerSource be document’s URL.
363-
364-
Otherwise, let referrerSource be environment’s creation URL.
365-
366-
a URL
367-
Let referrerSource be request’s referrer.
368-
*/
354+
// 3. Switch on request’s referrer:
369355
if (request.referrer === 'client') {
370-
// Not defined in Node but part of the spec
371-
if (request.client?.globalObject?.constructor?.name === 'Window' ) { // eslint-disable-line
372-
const origin = environment.globalObject.self?.origin ?? environment.globalObject.location?.origin
373-
374-
// If document’s origin is an opaque origin, return no referrer.
375-
if (origin == null || origin === 'null') return 'no-referrer'
376-
377-
// Let referrerSource be document’s URL.
378-
referrerSource = new URL(environment.globalObject.location.href)
379-
} else {
380-
// 3(a)(II) If environment's global object is not Window,
381-
// Let referrerSource be environments creationURL
382-
if (environment?.globalObject?.location == null) {
383-
return 'no-referrer'
384-
}
356+
// Note: node isn't a browser and doesn't implement document/iframes,
357+
// so we bypass this step and replace it with our own.
358+
359+
const globalOrigin = getGlobalOrigin()
385360

386-
referrerSource = new URL(environment.globalObject.location.href)
361+
if (!globalOrigin || globalOrigin.origin === 'null') {
362+
return 'no-referrer'
387363
}
364+
365+
// note: we need to clone it as it's mutated
366+
referrerSource = new URL(globalOrigin)
388367
} else if (request.referrer instanceof URL) {
389-
// 3(b) If requests's referrer is a URL instance, then make
390-
// referrerSource be requests's referrer.
368+
// Let referrerSource be request’s referrer.
391369
referrerSource = request.referrer
392-
} else {
393-
// If referrerSource neither client nor instance of URL
394-
// then return "no-referrer".
395-
return 'no-referrer'
396370
}
397371

398-
const urlProtocol = referrerSource.protocol
372+
// 4. Let request’s referrerURL be the result of stripping referrerSource for
373+
// use as a referrer.
374+
let referrerURL = stripURLForReferrer(referrerSource)
399375

400-
// If url's scheme is a local scheme (i.e. one of "about", "data", "javascript", "file")
401-
// then return "no-referrer".
402-
if (
403-
urlProtocol === 'about:' || urlProtocol === 'data:' ||
404-
urlProtocol === 'blob:'
405-
) {
406-
return 'no-referrer'
376+
// 5. Let referrerOrigin be the result of stripping referrerSource for use as
377+
// a referrer, with the origin-only flag set to true.
378+
const referrerOrigin = stripURLForReferrer(referrerSource, true)
379+
380+
// 6. If the result of serializing referrerURL is a string whose length is
381+
// greater than 4096, set referrerURL to referrerOrigin.
382+
if (referrerURL.toString().length > 4096) {
383+
referrerURL = referrerOrigin
407384
}
408385

409-
let temp
410-
let referrerOrigin
411-
// 4. Let requests's referrerURL be the result of stripping referrer
412-
// source for use as referrer (using util function, without origin only)
413-
const referrerUrl = (temp = stripURLForReferrer(referrerSource)).length > 4096
414-
// 5. Let referrerOrigin be the result of stripping referrer
415-
// source for use as referrer (using util function, with originOnly true)
416-
? (referrerOrigin = stripURLForReferrer(referrerSource, true))
417-
// 6. If result of seralizing referrerUrl is a string whose length is greater than
418-
// 4096, then set referrerURL to referrerOrigin
419-
: temp
420-
const areSameOrigin = sameOrigin(request, referrerUrl)
421-
const isNonPotentiallyTrustWorthy = isURLPotentiallyTrustworthy(referrerUrl) &&
386+
const areSameOrigin = sameOrigin(request, referrerURL)
387+
const isNonPotentiallyTrustWorthy = isURLPotentiallyTrustworthy(referrerURL) &&
422388
!isURLPotentiallyTrustworthy(request.url)
423389

424-
// NOTE: How to treat step 7?
425390
// 8. Execute the switch statements corresponding to the value of policy:
426391
switch (policy) {
427392
case 'origin': return referrerOrigin != null ? referrerOrigin : stripURLForReferrer(referrerSource, true)
428-
case 'unsafe-url': return referrerUrl
393+
case 'unsafe-url': return referrerURL
429394
case 'same-origin':
430395
return areSameOrigin ? referrerOrigin : 'no-referrer'
431396
case 'origin-when-cross-origin':
432-
return areSameOrigin ? referrerUrl : referrerOrigin
433-
case 'strict-origin-when-cross-origin':
434-
/**
435-
* 1. If the origin of referrerURL and the origin of request’s current URL are the same,
436-
* then return referrerURL.
437-
* 2. If referrerURL is a potentially trustworthy URL and request’s current URL is not a
438-
* potentially trustworthy URL, then return no referrer.
439-
* 3. Return referrerOrigin
440-
*/
441-
if (areSameOrigin) return referrerOrigin
442-
// else return isNonPotentiallyTrustWorthy ? 'no-referrer' : referrerOrigin
397+
return areSameOrigin ? referrerURL : referrerOrigin
398+
case 'strict-origin-when-cross-origin': {
399+
const currentURL = requestCurrentURL(request)
400+
401+
// 1. If the origin of referrerURL and the origin of request’s current
402+
// URL are the same, then return referrerURL.
403+
if (sameOrigin(referrerURL, currentURL)) {
404+
return referrerURL
405+
}
406+
407+
// 2. If referrerURL is a potentially trustworthy URL and request’s
408+
// current URL is not a potentially trustworthy URL, then return no
409+
// referrer.
410+
if (isURLPotentiallyTrustworthy(referrerURL) && !isURLPotentiallyTrustworthy(currentURL)) {
411+
return 'no-referrer'
412+
}
413+
414+
// 3. Return referrerOrigin.
415+
return referrerOrigin
416+
}
443417
case 'strict-origin': // eslint-disable-line
444418
/**
445419
* 1. If referrerURL is a potentially trustworthy URL and
@@ -458,15 +432,42 @@ function determineRequestsReferrer (request) {
458432
default: // eslint-disable-line
459433
return isNonPotentiallyTrustWorthy ? 'no-referrer' : referrerOrigin
460434
}
435+
}
461436

462-
function stripURLForReferrer (url, originOnly = false) {
463-
const urlObject = new URL(url.href)
464-
urlObject.username = ''
465-
urlObject.password = ''
466-
urlObject.hash = ''
437+
/**
438+
* @see https://w3c.github.io/webappsec-referrer-policy/#strip-url
439+
* @param {URL} url
440+
* @param {boolean|undefined} originOnly
441+
*/
442+
function stripURLForReferrer (url, originOnly) {
443+
// 1. Assert: url is a URL.
444+
assert(url instanceof URL)
467445

468-
return originOnly ? urlObject.origin : urlObject.href
446+
// 2. If url’s scheme is a local scheme, then return no referrer.
447+
if (url.protocol === 'file:' || url.protocol === 'about:' || url.protocol === 'blank:') {
448+
return 'no-referrer'
469449
}
450+
451+
// 3. Set url’s username to the empty string.
452+
url.username = ''
453+
454+
// 4. Set url’s password to the empty string.
455+
url.password = ''
456+
457+
// 5. Set url’s fragment to null.
458+
url.hash = ''
459+
460+
// 6. If the origin-only flag is true, then:
461+
if (originOnly) {
462+
// 1. Set url’s path to « the empty string ».
463+
url.pathname = ''
464+
465+
// 2. Set url’s query to null.
466+
url.search = ''
467+
}
468+
469+
// 7. Return url.
470+
return url
470471
}
471472

472473
function isURLPotentiallyTrustworthy (url) {

0 commit comments

Comments
 (0)