122 lines
5.3 KiB
HTML
122 lines
5.3 KiB
HTML
<!DOCTYPE html>
|
|
<title>Digital Identity Credential tests.</title>
|
|
<link rel="help" href="https://wicg.github.io/digital-identities/">
|
|
<script src="/common/get-host-info.sub.js"></script>
|
|
<script src="/resources/testharness.js"></script>
|
|
<script src="/resources/testharnessreport.js"></script>
|
|
<script src="/resources/testdriver.js"></script>
|
|
<script src="/resources/testdriver-vendor.js"></script>
|
|
|
|
<body>
|
|
<script type="module">
|
|
import { buildValidNavigatorIdentityRequest, requestIdentityWithActivation } from './support/digital-identity-helper.js';
|
|
|
|
// This regex removes the filename from the path so that we just get
|
|
// the directory.
|
|
const host = get_host_info();
|
|
const basePath = window.location.pathname.replace(/\/[^\/]*$/, '/');
|
|
const remoteBaseURL = host.HTTPS_REMOTE_ORIGIN + basePath;
|
|
|
|
async function createIframeAndWaitForMessage(test, iframeUrl) {
|
|
const messageWatcher = new EventWatcher(test, window, "message");
|
|
var iframe = document.createElement("iframe");
|
|
iframe.src = iframeUrl;
|
|
document.body.appendChild(iframe);
|
|
const message = await messageWatcher.wait_for("message");
|
|
return message.data;
|
|
}
|
|
|
|
// Builds a valid navigator.identity.get() request where IdentityRequestProvider#request is an object.
|
|
function buildValidNavigatorIdentityRequestWithRequestObject() {
|
|
return {
|
|
digital: {
|
|
providers: [{
|
|
protocol: "urn:openid.net:oid4vp",
|
|
request: {
|
|
// Based on https://github.com/openid/OpenID4VP/issues/125
|
|
client_id: "client.example.org",
|
|
client_id_scheme: "web-origin",
|
|
nonce: "n-0S6_WzA2Mj",
|
|
presentation_definition: {
|
|
// Presentation Exchange request, omitted for brevity
|
|
}
|
|
},
|
|
}],
|
|
},
|
|
};
|
|
}
|
|
|
|
// Requires browser to have mode where OS-presented digital-identity-prompt is
|
|
// bypassed in favour of returning "fake_test_token" directly.
|
|
promise_test(async t=>{
|
|
assert_false(navigator.userActivation.isActive);
|
|
let request = buildValidNavigatorIdentityRequest();
|
|
await promise_rejects_dom(t, "NetworkError", navigator.identity.get(request));
|
|
}, "navigator.identity.get() fails if the page doesn't have user activation");
|
|
|
|
promise_test(async t => {
|
|
let request = buildValidNavigatorIdentityRequest();
|
|
let credential = await requestIdentityWithActivation(test_driver, request);
|
|
assert_equals("urn:openid.net:oid4vp", credential.protocol);
|
|
assert_equals("fake_test_token", credential.data);
|
|
}, "navigator.identity.get() API works in toplevel frame.");
|
|
|
|
promise_test(async t => {
|
|
let request = buildValidNavigatorIdentityRequest();
|
|
request.digital.providers = undefined;
|
|
await promise_rejects_js(t, TypeError, requestIdentityWithActivation(test_driver, request));
|
|
}, "navigator.identity.get() API fails if DigitalCredentialRequestOptions::providers is not specified.");
|
|
|
|
promise_test(async t => {
|
|
let request = buildValidNavigatorIdentityRequest();
|
|
request.digital.providers = [];
|
|
await promise_rejects_js(t, TypeError, requestIdentityWithActivation(test_driver, request));
|
|
}, "navigator.identity.get() API fails if there are no providers.");
|
|
|
|
promise_test(async t => {
|
|
let request = buildValidNavigatorIdentityRequest();
|
|
let providerCopy = structuredClone(request.digital.providers[0]);
|
|
request.digital.providers.push(providerCopy);
|
|
await promise_rejects_js(t, TypeError, requestIdentityWithActivation(test_driver, request));
|
|
}, "navigator.identity.get() API fails if there is more than one provider.");
|
|
|
|
promise_test(async t => {
|
|
const request = buildValidNavigatorIdentityRequestWithRequestObject();
|
|
let credential = await requestIdentityWithActivation(test_driver, request);
|
|
assert_equals("urn:openid.net:oid4vp", credential.protocol);
|
|
assert_equals("fake_test_token", credential.data);
|
|
}, "navigator.identity.get() API succeeds when IdentityRequestProvider#request is an object instead of stringified JSON object");
|
|
|
|
promise_test(async t => {
|
|
const request = buildValidNavigatorIdentityRequestWithRequestObject();
|
|
const largeList = [];
|
|
for (let i = 0; i < 1000000; ++i) {
|
|
largeList.push("Value " + i);
|
|
}
|
|
request.digital.providers[0].request.random = largeList;
|
|
await promise_rejects_js(t, TypeError, requestIdentityWithActivation(test_driver, request));
|
|
}, "navigator.identity.get() API fails when IdentityRequestProvider#request object is too big");
|
|
|
|
promise_test(async t=> {
|
|
let abortController = new AbortController();
|
|
let request = buildValidNavigatorIdentityRequest();
|
|
request.signal = abortController.signal;
|
|
let requestPromise = requestIdentityWithActivation(test_driver, request);
|
|
abortController.abort();
|
|
await promise_rejects_dom(t, "AbortError", requestPromise);
|
|
}, "navigator.identity.get() promise is rejected when the page aborts the request.");
|
|
|
|
promise_test(async t=> {
|
|
const message = await createIframeAndWaitForMessage(
|
|
t, basePath + "support/digital-identity-iframe.html");
|
|
assert_equals(message.result, "Pass");
|
|
assert_equals(message.data, "fake_test_token");
|
|
}, "navigator.identity.get() succeeds in same-origin iframe");
|
|
|
|
promise_test(async t=> {
|
|
const message = await createIframeAndWaitForMessage(
|
|
t, remoteBaseURL + "support/digital-identity-iframe.html");
|
|
assert_equals(message.result, "Fail");
|
|
assert_equals(message.errorType, "NotAllowedError");
|
|
}, "navigator.identity.get() fails in cross-origin iframe");
|
|
</script>
|