summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/credential-management/fedcm-disconnect.sub.https.html
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /testing/web-platform/tests/credential-management/fedcm-disconnect.sub.https.html
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'testing/web-platform/tests/credential-management/fedcm-disconnect.sub.https.html')
-rw-r--r--testing/web-platform/tests/credential-management/fedcm-disconnect.sub.https.html84
1 files changed, 84 insertions, 0 deletions
diff --git a/testing/web-platform/tests/credential-management/fedcm-disconnect.sub.https.html b/testing/web-platform/tests/credential-management/fedcm-disconnect.sub.https.html
new file mode 100644
index 0000000000..300144fa72
--- /dev/null
+++ b/testing/web-platform/tests/credential-management/fedcm-disconnect.sub.https.html
@@ -0,0 +1,84 @@
+<!DOCTYPE html>
+<title>Federated Credential Management API disconnect() tests.</title>
+<link rel="help" href="https://fedidcg.github.io/FedCM">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="/resources/testdriver.js"></script>
+<script src="/resources/testdriver-vendor.js"></script>
+
+<body>
+
+<script type="module">
+import {fedcm_test,
+ mark_signed_in,
+ set_fedcm_cookie,
+ disconnect_options,
+ fedcm_get_and_select_first_account,
+ request_options_with_mediation_required,
+ alt_manifest_origin,
+ alt_request_options_with_mediation_required,
+ alt_disconnect_options,
+ set_alt_fedcm_cookie} from './support/fedcm-helper.sub.js';
+
+fedcm_test(async t => {
+ await mark_signed_in();
+ await set_fedcm_cookie();
+ // Get at least one connected account that can be disconnected.
+ const cred = await fedcm_get_and_select_first_account(t, request_options_with_mediation_required());
+ // The IDP implementation will accept any account hint, so this is really testing that the user
+ // agent eventually stops sending the requests to the IDP.
+ // This test clears the connection just created above, but it also clears any previously existing
+ // connected accounts, which helps the logic of the other tests.
+ return new Promise(async resolve => {
+ while (true) {
+ try {
+ await IdentityCredential.disconnect(disconnect_options("1234"));
+ } catch(e) {
+ resolve();
+ break;
+ }
+ }
+ });
+}, "Repeatedly calling disconnect should eventually fail");
+
+fedcm_test(async t => {
+ const disconnect = IdentityCredential.disconnect(
+ disconnect_options("nonExistent"));
+ return promise_rejects_dom(t, 'NetworkError', disconnect);
+}, 'Test that disconnect fails when there is no account to disconnect');
+
+fedcm_test(async t => {
+ const cred = await fedcm_get_and_select_first_account(t, request_options_with_mediation_required());
+
+ return IdentityCredential.disconnect(disconnect_options("1234"));
+}, 'Test that disconnect succeeds when there is an account to disconnect');
+
+fedcm_test(async t => {
+ const cred = await fedcm_get_and_select_first_account(t, request_options_with_mediation_required());
+
+ await IdentityCredential.disconnect(disconnect_options("1234"));
+
+ const disconnect = IdentityCredential.disconnect(disconnect_options("1234"));
+ return promise_rejects_dom(t, 'NetworkError', disconnect);
+}, 'Test that disconnecting the same account twice results in failure.');
+
+fedcm_test(async t => {
+ const cred = await fedcm_get_and_select_first_account(t, request_options_with_mediation_required());
+ // A connected account is guaranteed by the above, and IDP accepts any account hint, so this tests
+ // that the user agent allows the request to go through to the IDP.
+ return IdentityCredential.disconnect(disconnect_options("noMatch"));
+}, 'Disconnect passing an incorrect ID can still succeed');
+
+fedcm_test(async t => {
+ await set_alt_fedcm_cookie();
+ await mark_signed_in(alt_manifest_origin);
+ await fedcm_get_and_select_first_account(t, alt_request_options_with_mediation_required());
+ await fedcm_get_and_select_first_account(t,
+ request_options_with_mediation_required());
+
+ // Await the first disconnect since they cannot happen in parallel. Both
+ // should succeed.
+ await IdentityCredential.disconnect(disconnect_options("1"));
+ return IdentityCredential.disconnect(alt_disconnect_options("2"));
+}, 'Disconnect is bound to each IDP');
+</script>