summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/trust-tokens/trust-token-parameter-validation-xhr.tentative.https.html
blob: 56ac7f0e4efb042d938aa85d760f0da0f8194474 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
<!DOCTYPE html>
<meta charset="utf-8">
<title>JavaScript: the Trust Token API XHR interface correctly validates its parameters</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script>
  'use strict';

  test(() => {
    assert_throws_dom("InvalidStateError", () => {
      let request = new XMLHttpRequest();
      request.setTrustToken({
        type: 'token-request'
      });
    });
  }, 'Setting XHR Trust Tokens parameters requires that the XHR request be open.');

  test(() => {
    assert_throws_dom("InvalidStateError", () => {
      let request = new XMLHttpRequest();
      request.open('GET', 'https://trusttoken.example');
      request.send();
      request.setTrustToken({
        type: 'token-request'
      });
    });
  }, 'Setting XHR Trust Tokens parameters requires that the XHR request not have been sent.');

  test(() => {
    assert_throws_js(TypeError, () => {
      let request = new XMLHttpRequest();
      request.open('GET', 'https://trusttoken.example');
      request.setTrustToken({});
    });
  }, 'Trust Tokens operations require present `type` values.');

  test(() => {
    assert_throws_js(TypeError, () => {
      let request = new XMLHttpRequest();
      request.open('GET', 'https://trusttoken.example');
      request.setTrustToken({
        type: "invalid"
      });
    });
  }, 'Trust Tokens operations require valid `type` values.');

  test(() => {
    assert_throws_js(TypeError, () => {
      let request = new XMLHttpRequest();
      request.open('GET', 'https://trusttoken.example');
      request.setTrustToken({
        type: "token-request",
        refreshPolicy: "not a member of the refreshPolicy enum",
      });
    });
  }, 'Trust Tokens operations require valid `refreshPolicy:` values, if provided.');

  test(() => {
    assert_throws_js(TypeError, () => {
      let request = new XMLHttpRequest();
      request.open('GET', 'https://trusttoken.example');
      request.setTrustToken({
        type: "send-redemption-record",
        issuers: []
      });
    });
  }, 'Trust Tokens signing operations require at least one issuer URL.');

  test(() => {
    assert_throws_js(TypeError, () => {
      let request = new XMLHttpRequest();
      request.open('GET', 'https://trusttoken.example');
      request.setTrustToken({
        type: "send-redemption-record",
        issuers: [3]
      });
    });
  }, 'Trust Tokens operations require string issuer URLs, if provided.');

  test(() => {
    assert_throws_js(TypeError, () => {
      let request = new XMLHttpRequest();
      request.open('GET', 'https://trusttoken.example');
      request.setTrustToken({
        type: "send-redemption-record",
        issuers: ["not a valid URL"]
      });
    });
  }, 'Trust Tokens operations require valid issuer URLs, if provided.');

  test(() => {
    assert_throws_js(TypeError, () => {
      let request = new XMLHttpRequest();
      request.open('GET', 'https://trusttoken.example');
      request.setTrustToken({
        type: "send-redemption-record",
        issuers: ["http://not-secure.com"]
      });
    });
  }, 'Trust Tokens operations require secure issuer URLs, if provided.');

  test(() => {
    let request = new XMLHttpRequest();
    request.open('GET', 'https://trusttoken.example');
    request.setTrustToken({
      type: "send-redemption-record",
      issuers: ["http://localhost"]
    });
  }, 'Since localhost URLs are potentially trustworthy, setting an issuer to localhost should succeed.');
</script>