// e2e/validate-flow-remote-chrome.js // Connect to a remote Chrome (remote debugging port 9222) and run the Broadcast->Studio E2E flow. // Usage: // CHROME_WS (optional) = full websocketDebuggerUrl // CHROME_HOST (optional) = host:port (default port 9222) e.g. 1.2.3.4 or 1.2.3.4:9222 // BROADCAST_URL (required) - broadcast panel URL // STUDIO_URL (optional) // TOKEN (optional) - token to append when forcing studio navigation const fs = require('fs'); const path = require('path'); const fetch = require('node-fetch'); const puppeteer = require('puppeteer-core'); async function getWsEndpointFromHost(host) { // host maybe '1.2.3.4' or '1.2.3.4:9222' const url = host.includes(':') ? `http://${host}/json/version` : `http://${host}:9222/json/version`; const res = await fetch(url, { timeout: 5000 }).catch(err => { throw new Error(`Failed to fetch ${url}: ${err.message}`); }); if (!res.ok) throw new Error(`Failed to get json/version from ${url}: status=${res.status}`); const json = await res.json(); if (!json.webSocketDebuggerUrl) throw new Error(`No webSocketDebuggerUrl in ${url} response`); return json.webSocketDebuggerUrl; } (async () => { const outDir = path.resolve(__dirname); const results = { startedAt: new Date().toISOString(), console: [], navigations: [] }; const CHROME_WS = process.env.CHROME_WS || null; const CHROME_HOST = process.env.CHROME_HOST || process.env.CHROME_REMOTE || null; // host[:port] let wsEndpoint = CHROME_WS; try { if (!wsEndpoint) { if (!CHROME_HOST) throw new Error('CHROME_WS or CHROME_HOST required (host[:port] or ws url)'); wsEndpoint = await getWsEndpointFromHost(CHROME_HOST); } } catch (err) { console.error('Failed to determine Chrome websocket endpoint:', err.message || err); process.exit(2); } console.log('Using Chrome websocket endpoint:', wsEndpoint); const BROADCAST_URL = process.env.BROADCAST_URL || process.env.VITE_BROADCASTPANEL_URL || null; const STUDIO_URL = process.env.STUDIO_URL || process.env.VITE_STUDIO_URL || null; const TOKEN = process.env.TOKEN || process.env.E2E_TOKEN || ''; if (!BROADCAST_URL) { console.error('BROADCAST_URL is required'); process.exit(2); } let browser; try { browser = await puppeteer.connect({ browserWSEndpoint: wsEndpoint, ignoreHTTPSErrors: true, defaultViewport: { width: 1366, height: 768 } }); } catch (err) { console.error('Failed to connect to remote Chrome:', err && err.message ? err.message : err); process.exit(2); } const page = await browser.newPage(); page.setDefaultNavigationTimeout(30000); page.on('console', msg => { try { results.console.push({ type: msg.type(), text: msg.text() }); } catch (e) {} }); page.on('pageerror', err => { results.console.push({ type: 'pageerror', text: String(err && err.stack ? err.stack : err) }); }); try { await page.goto(BROADCAST_URL, { waitUntil: 'networkidle2' }); await page.waitForTimeout(1500); // Try to find a button/link to enter the studio const texts = ['Entrar al estudio', 'Entrar al Studio', 'Entrar al Estudio', 'Enter studio', 'Enter the studio']; let studioOpened = false; for (const t of texts) { const els = await page.$x(`//a[contains(normalize-space(.), '${t}')] | //button[contains(normalize-space(.), '${t}')] | //span[contains(normalize-space(.), '${t}')]`); if (els && els.length) { console.log('Found element for text:', t, 'count=', els.length); try { // prepare for new target const popupPromise = new Promise(resolve => { const onTarget = target => resolve(target); browser.once('targetcreated', onTarget); setTimeout(() => { try { browser.removeListener('targetcreated', onTarget); } catch(e){}; resolve(null); }, 4000); }); await els[0].click({ delay: 50 }).catch(() => null); const popupTarget = await popupPromise; let studioPage = null; if (popupTarget) { try { studioPage = await popupTarget.page(); } catch (e) { studioPage = null; } } if (!studioPage) { await page.waitForTimeout(800); const url = page.url(); if (url.includes('/studio') || url.includes('studio')) studioPage = page; } if (studioPage) { console.log('Studio page found; navigating with token...'); // Prefer STUDIO_URL if provided; otherwise use BROADCAST_URL (strip trailing slash) as entry with ?token const broadcastBase = (BROADCAST_URL || '').replace(/\/$/, ''); const targetStudioUrl = STUDIO_URL && STUDIO_URL.length ? `${STUDIO_URL}?token=${encodeURIComponent(TOKEN)}` : `${broadcastBase}?token=${encodeURIComponent(TOKEN)}`; await studioPage.goto(targetStudioUrl, { waitUntil: 'networkidle2' }); results.navigations.push({ type: 'studio_opened', url: studioPage.url() }); await studioPage.waitForTimeout(2500); // --- ASSERTIONS: check sessionStorage on broadcast page and content on studio page results.assertions = results.assertions || []; try { const storeKey = 'avanzacast_studio_session'; const stored = await page.evaluate((k) => { try { return sessionStorage.getItem(k); } catch(e) { return null; } }, storeKey); if (stored) { try { const parsed = JSON.parse(stored); // Accept any token returned by backend; if TOKEN env is set we also note if it matches // Basic presence checks if (parsed && parsed.token) { const note = (typeof TOKEN === 'string' && TOKEN.length && String(parsed.token).includes(TOKEN.slice(0,6))) ? 'sessionStorage contains token (matches provided TOKEN prefix)' : 'sessionStorage contains token (from backend)'; results.assertions.push({ name: 'sessionStorage_has_token', ok: true, detail: note }); // Token format: JWT-like (3 parts) try { const parts = String(parsed.token).split('.'); const isJwt = parts.length >= 3; results.assertions.push({ name: 'token_format_jwt', ok: isJwt, detail: isJwt ? 'looks like JWT' : 'not JWT-like' }); if (isJwt) { // decode payload safely (base64url) const payloadB64 = parts[1].replace(/-/g, '+').replace(/_/g, '/'); const pad = '='.repeat((4 - (payloadB64.length % 4)) % 4); const decoded = Buffer.from(payloadB64 + pad, 'base64').toString('utf8'); try { const payloadObj = JSON.parse(decoded); const nowSec = Math.floor(Date.now() / 1000); if (payloadObj.exp && typeof payloadObj.exp === 'number') { results.assertions.push({ name: 'token_not_expired', ok: payloadObj.exp > nowSec, detail: `exp=${payloadObj.exp} now=${nowSec}` }); } else { results.assertions.push({ name: 'token_has_exp', ok: false, detail: 'exp missing or not a number' }); } if (payloadObj.room) results.assertions.push({ name: 'token_payload_room', ok: true, detail: String(payloadObj.room) }); } catch (e) { results.assertions.push({ name: 'token_payload_parse', ok: false, detail: 'failed to parse payload: ' + String(e) }); } } } catch (e) { results.assertions.push({ name: 'token_format_check_failed', ok: false, detail: String(e) }); } } else { results.assertions.push({ name: 'sessionStorage_has_token', ok: false, detail: 'sessionStorage present but token missing or malformed' }); } // Check room and url fields if present if (parsed && parsed.room) { results.assertions.push({ name: 'session_room_present', ok: true, detail: String(parsed.room) }); } else { results.assertions.push({ name: 'session_room_present', ok: false, detail: 'room missing in session payload' }); } if (parsed && (parsed.url || parsed.serverUrl)) { const serverUrl = parsed.url || parsed.serverUrl; const okUrl = typeof serverUrl === 'string' && (serverUrl.startsWith('ws://') || serverUrl.startsWith('wss://') || serverUrl.startsWith('http://') || serverUrl.startsWith('https://')); results.assertions.push({ name: 'session_serverUrl_valid', ok: okUrl, detail: okUrl ? String(serverUrl) : 'invalid or missing serverUrl' }); } else { results.assertions.push({ name: 'session_serverUrl_valid', ok: false, detail: 'serverUrl missing' }); } // Additional optional assertions: username and TTL try { const expectedRoom = process.env.EXPECTED_ROOM || null; const expectedUsername = process.env.EXPECTED_USERNAME || null; const minTtl = Number(process.env.MIN_TTL_SECONDS || process.env.MIN_TTL || 30); if (expectedRoom) { const roomMatches = !!parsed && String(parsed.room) === String(expectedRoom); results.assertions.push({ name: 'session_room_matches_expected', ok: roomMatches, detail: roomMatches ? `room matches ${expectedRoom}` : `expected ${expectedRoom} got ${String(parsed.room)}` }); } if (expectedUsername) { const uname = parsed && (parsed.username || parsed.user || parsed.participantName || parsed.participant || parsed.participantName); const unameMatches = !!uname && String(uname) === String(expectedUsername); results.assertions.push({ name: 'session_username_matches_expected', ok: unameMatches, detail: unameMatches ? `username matches ${expectedUsername}` : `expected ${expectedUsername} got ${String(uname)}` }); } else { // still assert presence of username if not explicitly expected const uname = parsed && (parsed.username || parsed.user || parsed.participantName || parsed.participant || parsed.participantName); results.assertions.push({ name: 'session_username_present', ok: !!uname, detail: !!uname ? `username: ${String(uname)}` : 'username missing' }); } // TTL checks: looks for ttlSeconds, ttl or expiresAt let ttlSeconds = null; if (parsed && typeof parsed.ttlSeconds === 'number') ttlSeconds = parsed.ttlSeconds; else if (parsed && typeof parsed.ttl === 'number') ttlSeconds = parsed.ttl; else if (parsed && parsed.expiresAt) { // expiresAt may be timestamp or Date string const ex = typeof parsed.expiresAt === 'number' ? parsed.expiresAt : Date.parse(String(parsed.expiresAt)); if (!Number.isNaN(ex)) ttlSeconds = Math.max(0, Math.floor((ex - Date.now()) / 1000)); } if (ttlSeconds !== null) { results.assertions.push({ name: 'session_ttl_seconds', ok: true, detail: `ttlSeconds=${ttlSeconds}` }); results.assertions.push({ name: 'session_ttl_minimum', ok: ttlSeconds >= minTtl, detail: `ttl=${ttlSeconds} min=${minTtl}` }); } else { results.assertions.push({ name: 'session_ttl_seconds', ok: false, detail: 'ttl not found in session payload' }); } } catch (e) { results.assertions.push({ name: 'session_ttl_check_failed', ok: false, detail: String(e) }); } // If there's an id/sessionId available, try to query backend token endpoint for extra validation if (parsed && (parsed.id || parsed.sessionId)) { const sid = parsed.id || parsed.sessionId; try { // attempt to fetch from broadcast origin first const base = (BROADCAST_URL || '').replace(/\/$/, ''); const tokenEndpoint = `${base}/api/session/${encodeURIComponent(sid)}/token`; let fetched = null; try { const r = await (await import('node-fetch'))(tokenEndpoint); if (r && r.ok) fetched = await r.json().catch(() => null); } catch (fe) { // ignore - will try absolute later fetched = null; } if (!fetched) { // try absolute token server env if available const TOKEN_SERVER = process.env.TOKEN_SERVER_URL || process.env.VITE_TOKEN_SERVER_URL || process.env.VITE_BACKEND_TOKENS_URL || null; if (TOKEN_SERVER) { const abs = `${TOKEN_SERVER.replace(/\/$/, '')}/api/session/${encodeURIComponent(sid)}/token`; try { const r2 = await (await import('node-fetch'))(abs, { mode: 'cors' }); if (r2 && r2.ok) fetched = await r2.json().catch(() => null); } catch (fe2) { fetched = null } } } if (fetched && fetched.token) { results.assertions.push({ name: 'backend_token_fetch', ok: true, detail: 'fetched token from backend' }); // If backend returned ttlSeconds, validate against minTtl try { const minTtl = Number(process.env.MIN_TTL_SECONDS || process.env.MIN_TTL || 30); const bttl = fetched.ttlSeconds || fetched.ttl || null; if (typeof bttl === 'number') { results.assertions.push({ name: 'backend_ttl_seconds', ok: true, detail: `backend ttlSeconds=${bttl}` }); results.assertions.push({ name: 'backend_ttl_minimum', ok: bttl >= minTtl, detail: `backend ttl=${bttl} min=${minTtl}` }); } else { results.assertions.push({ name: 'backend_ttl_seconds', ok: false, detail: 'backend ttl not present or not numeric' }); } } catch (e) { results.assertions.push({ name: 'backend_ttl_check_failed', ok: false, detail: String(e) }); } } else { results.assertions.push({ name: 'backend_token_fetch', ok: false, detail: 'could not fetch token for session id' }); } } catch (e) { results.assertions.push({ name: 'backend_token_fetch', ok: false, detail: 'error: ' + String(e) }); } } } catch(e) { results.assertions.push({ name: 'sessionStorage_parse', ok: false, detail: 'sessionStorage JSON parse failed: ' + String(e) }); } } else { results.assertions.push({ name: 'sessionStorage_has_token', ok: false, detail: 'sessionStorage key not found' }); } } catch (e) { results.assertions.push({ name: 'sessionStorage_check_failed', ok: false, detail: String(e) }); } try { const bodyText = await studioPage.evaluate(() => (document.body && document.body.innerText) ? document.body.innerText : ''); if (bodyText.includes('token=') || (TOKEN && bodyText.includes(TOKEN.slice(0,8)))) { results.assertions.push({ name: 'studio_page_shows_token', ok: true, detail: 'Studio page contains token or token prefix' }); } else { results.assertions.push({ name: 'studio_page_shows_token', ok: false, detail: 'Studio page does not show token text' }); } } catch (e) { results.assertions.push({ name: 'studio_page_check_failed', ok: false, detail: String(e) }); } const shot = path.join(outDir, 'validate-remote-chrome-result.png'); await studioPage.screenshot({ path: shot, fullPage: true }); results.screenshot = shot; studioOpened = true; break; } } catch (err) { console.warn('Click attempt error', err && err.message); } } } if (!studioOpened) { // fallback: navigate directly to studio with token if (STUDIO_URL) { console.log('Fallback: navigating directly to STUDIO_URL with token'); const directUrl = `${STUDIO_URL}?token=${encodeURIComponent(TOKEN)}`; await page.goto(directUrl, { waitUntil: 'networkidle2' }); await page.waitForTimeout(1500); const shot = path.join(outDir, 'validate-remote-chrome-result.png'); await page.screenshot({ path: shot, fullPage: true }); results.screenshot = shot; results.navigations.push({ type: 'direct_studio', url: directUrl }); } else { console.error('No studio opened and no STUDIO_URL provided for fallback.'); } } results.endedAt = new Date().toISOString(); const outJson = path.join(outDir, 'validate-flow-remote-chrome-result.json'); fs.writeFileSync(outJson, JSON.stringify(results, null, 2)); console.log('Wrote results to', outJson); // append log and publish artifact try { const { publishArtifact, appendLog } = require('./logging'); const artifactUrl = publishArtifact(outJson, 'validate-flow-remote-chrome') || null; appendLog('validate-flow-remote-chrome', outJson, results, artifactUrl); } catch (e) { console.warn('Failed to write LOG.md entry', e); } try { await page.close(); } catch(e){} try { await browser.disconnect(); } catch(e) { try { await browser.close(); } catch(e){} } process.exit(0); } catch (err) { console.error('Error validating flow on remote chrome', err && err.stack ? err.stack : err); results.error = String(err && err.stack ? err.stack : err); results.endedAt = new Date().toISOString(); fs.writeFileSync(path.join(outDir, 'validate-flow-remote-chrome-result.json'), JSON.stringify(results, null, 2)); try { await page.close(); } catch(e){} try { await browser.disconnect(); } catch(e) { try { await browser.close(); } catch(e){} } process.exit(1); } })();