summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/html/semantics/forms/the-input-element/number-constraint-validation.html
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/tests/html/semantics/forms/the-input-element/number-constraint-validation.html')
-rw-r--r--testing/web-platform/tests/html/semantics/forms/the-input-element/number-constraint-validation.html42
1 files changed, 42 insertions, 0 deletions
diff --git a/testing/web-platform/tests/html/semantics/forms/the-input-element/number-constraint-validation.html b/testing/web-platform/tests/html/semantics/forms/the-input-element/number-constraint-validation.html
new file mode 100644
index 0000000000..959726bb50
--- /dev/null
+++ b/testing/web-platform/tests/html/semantics/forms/the-input-element/number-constraint-validation.html
@@ -0,0 +1,42 @@
+<!DOCTYPE html>
+<meta charset="utf-8">
+<title>Form input type=number constraint validation</title>
+<link rel="author" title="Adam Vandolder" href="mailto:avandolder@mozilla.com">
+<link rel=help href="https://html.spec.whatwg.org/multipage/#number-state-(type=number)">
+<script src="/resources/testharness.js"></script>
+<script src="/resources/testharnessreport.js"></script>
+<script src="/resources/testdriver.js"></script>
+<script src="/resources/testdriver-vendor.js"></script>
+<div id="log"></div>
+<input type="number">
+<script>
+ const input = document.querySelector("input");
+ const invalidInputNumber = "1.e";
+ const invalidSetNumber = "1.";
+
+ promise_test(async () => {
+ await test_driver.click(input);
+ await test_driver.send_keys(input, invalidInputNumber);
+ assert_equals(input.value.length, 0);
+ assert_true(input.validity.badInput);
+ }, "Unparsable number user input triggers sanitization and causes badInput to be set.");
+
+ promise_test(async () => {
+ input.value = invalidInputNumber;
+ assert_equals(input.value.length, 0);
+ assert_false(input.validity.badInput);
+ }, "Setting .value to an unparsable number triggers sanitization but doesn't set badInput.");
+
+ promise_test(async () => {
+ await test_driver.click(input);
+ await test_driver.send_keys(input, invalidSetNumber);
+ assert_equals(input.value, "1");
+ assert_false(input.validity.badInput);
+ }, "Users inputting a parsable but invalid floating point number doesn't trigger sanitization and doesn't set badInput.");
+
+ promise_test(async () => {
+ input.value = invalidSetNumber;
+ assert_equals(input.value.length, 0);
+ assert_false(input.validity.badInput);
+ }, "Setting .value to a parsable but invalid floating point number triggers sanitization but doesn't set badInput.");
+</script>