File: getcredential-large-blob-not-supported.https.html

package info (click to toggle)
thunderbird 1%3A143.0.1-1
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 4,703,968 kB
  • sloc: cpp: 7,770,492; javascript: 5,943,842; ansic: 3,918,754; python: 1,418,263; xml: 653,354; asm: 474,045; java: 183,079; sh: 111,238; makefile: 20,410; perl: 14,359; objc: 13,059; yacc: 4,583; pascal: 3,405; lex: 1,720; ruby: 999; exp: 762; sql: 715; awk: 580; php: 436; lisp: 430; sed: 69; csh: 10
file content (91 lines) | stat: -rw-r--r-- 3,012 bytes parent folder | download | duplicates (22)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
<!DOCTYPE html>
<meta charset="utf-8">
<title>navigator.credentials.get() largeBlob extension tests with no authenticator support</title>
<meta name="timeout" content="long">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/resources/testdriver.js"></script>
<script src="/resources/testdriver-vendor.js"></script>
<script src=helpers.js></script>
<body></body>
<script>
standardSetup(async function() {
  "use strict";

  const credential = createCredential();

  promise_test(async t => {
    return promise_rejects_dom(t, "NotSupportedError",
      navigator.credentials.get({publicKey: {
        challenge: new Uint8Array(),
        allowCredentials: [{
          id: (await credential).rawId,
          type: "public-key",
        }],
        extensions: {
          largeBlob: {
            support: "preferred",
          },
        },
      }}));
  }, "navigator.credentials.get() with largeBlob.support set");

  promise_test(async t => {
    return promise_rejects_dom(t, "NotSupportedError",
      navigator.credentials.get({publicKey: {
        challenge: new Uint8Array(),
        allowCredentials: [{
          id: (await credential).rawId,
          type: "public-key",
        }],
        extensions: {
          largeBlob: {
            read: true,
            write: new ArrayBuffer(),
          },
        },
      }}));
  }, "navigator.credentials.get() with largeBlob.read and largeBlob.write set");

  promise_test(async t => {
    const assertion = await navigator.credentials.get({publicKey: {
      challenge: new Uint8Array(),
      allowCredentials: [{
        id: (await credential).rawId,
        type: "public-key",
      }],
      extensions: {
        largeBlob: {
          read: true,
        },
      },
    }});
    assert_not_own_property(assertion.getClientExtensionResults().largeBlob, "supported");
    assert_not_own_property(assertion.getClientExtensionResults().largeBlob, "blob");
    assert_not_own_property(assertion.getClientExtensionResults().largeBlob, "written");
  }, "navigator.credentials.get() with largeBlob.read set without authenticator support");

  promise_test(async t => {
    const assertion = await navigator.credentials.get({publicKey: {
      challenge: new Uint8Array(),
      allowCredentials: [{
        id: (await credential).rawId,
        type: "public-key",
      }],
      extensions: {
        largeBlob: {
          write: new TextEncoder().encode("Don't call me Shirley"),
        },
      },
    }});
    assert_not_own_property(assertion.getClientExtensionResults().largeBlob, "supported");
    assert_not_own_property(assertion.getClientExtensionResults().largeBlob, "blob");
    assert_false(assertion.getClientExtensionResults().largeBlob.written);
  }, "navigator.credentials.get() with largeBlob.write set without authenticator support");
}, {
  protocol: "ctap2_1",
  hasResidentKey: true,
  hasUserVerification: true,
  isUserVerified: true,
});
</script>