trisquel-icecat/icecat/testing/web-platform/tests/digital-credentials/digital-credentials.tentative.https.html

122 lines
5.3 KiB
HTML

<!DOCTYPE html>
<title>Digital Identity Credential tests.</title>
<link rel="help" href="https://wicg.github.io/digital-identities/">
<script src="/common/get-host-info.sub.js"></script>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/resources/testdriver.js"></script>
<script src="/resources/testdriver-vendor.js"></script>
<body>
<script type="module">
import { buildValidNavigatorIdentityRequest, requestIdentityWithActivation } from './support/digital-identity-helper.js';
// This regex removes the filename from the path so that we just get
// the directory.
const host = get_host_info();
const basePath = window.location.pathname.replace(/\/[^\/]*$/, '/');
const remoteBaseURL = host.HTTPS_REMOTE_ORIGIN + basePath;
async function createIframeAndWaitForMessage(test, iframeUrl) {
const messageWatcher = new EventWatcher(test, window, "message");
var iframe = document.createElement("iframe");
iframe.src = iframeUrl;
document.body.appendChild(iframe);
const message = await messageWatcher.wait_for("message");
return message.data;
}
// Builds a valid navigator.identity.get() request where IdentityRequestProvider#request is an object.
function buildValidNavigatorIdentityRequestWithRequestObject() {
return {
digital: {
providers: [{
protocol: "urn:openid.net:oid4vp",
request: {
// Based on https://github.com/openid/OpenID4VP/issues/125
client_id: "client.example.org",
client_id_scheme: "web-origin",
nonce: "n-0S6_WzA2Mj",
presentation_definition: {
// Presentation Exchange request, omitted for brevity
}
},
}],
},
};
}
// Requires browser to have mode where OS-presented digital-identity-prompt is
// bypassed in favour of returning "fake_test_token" directly.
promise_test(async t=>{
assert_false(navigator.userActivation.isActive);
let request = buildValidNavigatorIdentityRequest();
await promise_rejects_dom(t, "NetworkError", navigator.identity.get(request));
}, "navigator.identity.get() fails if the page doesn't have user activation");
promise_test(async t => {
let request = buildValidNavigatorIdentityRequest();
let credential = await requestIdentityWithActivation(test_driver, request);
assert_equals("urn:openid.net:oid4vp", credential.protocol);
assert_equals("fake_test_token", credential.data);
}, "navigator.identity.get() API works in toplevel frame.");
promise_test(async t => {
let request = buildValidNavigatorIdentityRequest();
request.digital.providers = undefined;
await promise_rejects_js(t, TypeError, requestIdentityWithActivation(test_driver, request));
}, "navigator.identity.get() API fails if DigitalCredentialRequestOptions::providers is not specified.");
promise_test(async t => {
let request = buildValidNavigatorIdentityRequest();
request.digital.providers = [];
await promise_rejects_js(t, TypeError, requestIdentityWithActivation(test_driver, request));
}, "navigator.identity.get() API fails if there are no providers.");
promise_test(async t => {
let request = buildValidNavigatorIdentityRequest();
let providerCopy = structuredClone(request.digital.providers[0]);
request.digital.providers.push(providerCopy);
await promise_rejects_js(t, TypeError, requestIdentityWithActivation(test_driver, request));
}, "navigator.identity.get() API fails if there is more than one provider.");
promise_test(async t => {
const request = buildValidNavigatorIdentityRequestWithRequestObject();
let credential = await requestIdentityWithActivation(test_driver, request);
assert_equals("urn:openid.net:oid4vp", credential.protocol);
assert_equals("fake_test_token", credential.data);
}, "navigator.identity.get() API succeeds when IdentityRequestProvider#request is an object instead of stringified JSON object");
promise_test(async t => {
const request = buildValidNavigatorIdentityRequestWithRequestObject();
const largeList = [];
for (let i = 0; i < 1000000; ++i) {
largeList.push("Value " + i);
}
request.digital.providers[0].request.random = largeList;
await promise_rejects_js(t, TypeError, requestIdentityWithActivation(test_driver, request));
}, "navigator.identity.get() API fails when IdentityRequestProvider#request object is too big");
promise_test(async t=> {
let abortController = new AbortController();
let request = buildValidNavigatorIdentityRequest();
request.signal = abortController.signal;
let requestPromise = requestIdentityWithActivation(test_driver, request);
abortController.abort();
await promise_rejects_dom(t, "AbortError", requestPromise);
}, "navigator.identity.get() promise is rejected when the page aborts the request.");
promise_test(async t=> {
const message = await createIframeAndWaitForMessage(
t, basePath + "support/digital-identity-iframe.html");
assert_equals(message.result, "Pass");
assert_equals(message.data, "fake_test_token");
}, "navigator.identity.get() succeeds in same-origin iframe");
promise_test(async t=> {
const message = await createIframeAndWaitForMessage(
t, remoteBaseURL + "support/digital-identity-iframe.html");
assert_equals(message.result, "Fail");
assert_equals(message.errorType, "NotAllowedError");
}, "navigator.identity.get() fails in cross-origin iframe");
</script>