summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/push-api/subscribe-with-faulty-applicationServerKey.https.window.js
diff options
context:
space:
mode:
Diffstat (limited to 'testing/web-platform/tests/push-api/subscribe-with-faulty-applicationServerKey.https.window.js')
-rw-r--r--testing/web-platform/tests/push-api/subscribe-with-faulty-applicationServerKey.https.window.js62
1 files changed, 62 insertions, 0 deletions
diff --git a/testing/web-platform/tests/push-api/subscribe-with-faulty-applicationServerKey.https.window.js b/testing/web-platform/tests/push-api/subscribe-with-faulty-applicationServerKey.https.window.js
new file mode 100644
index 0000000000..7d600803e4
--- /dev/null
+++ b/testing/web-platform/tests/push-api/subscribe-with-faulty-applicationServerKey.https.window.js
@@ -0,0 +1,62 @@
+// META: script=/resources/testdriver.js
+// META: script=/resources/testdriver-vendor.js
+// META: script=resources/helpers.js
+
+// NOTE:
+// We are not testing success cases here as doing so will try creating external network
+// connection, which is not allowed by all browser test environments.
+// (e.g. Gecko explicitly disables push service for testing environment.)
+// Ideally we should have WPT-specific mock server in this case. See also
+// https://github.com/w3c/push-api/issues/365.
+
+promise_setup(async () => {
+ // The spec does not enforce validation order and implementations
+ // indeed check other things before checking applicationServerKey.
+
+ // Get the permission because Firefox checks it before key validation.
+ // (The permission test is done in permission.https.html.)
+ await test_driver.set_permission({ name: "notifications" }, "granted");
+ // Get the active service worker because Chrome checks it before key validation
+ registration = await registerSw("noop-sw.js");
+ await navigator.serviceWorker.ready;
+});
+
+promise_test(async (t) => {
+ await promise_rejects_dom(
+ t,
+ "InvalidAccessError",
+ registration.pushManager.subscribe({ applicationServerKey: "" }),
+ );
+}, "Reject empty string applicationServerKey");
+
+promise_test(async (t) => {
+ await promise_rejects_dom(
+ t,
+ "InvalidAccessError",
+ registration.pushManager.subscribe({ applicationServerKey: new ArrayBuffer(0) }),
+ );
+}, "Reject empty ArrayBuffer applicationServerKey");
+
+promise_test(async (t) => {
+ await promise_rejects_dom(
+ t,
+ "InvalidAccessError",
+ registration.pushManager.subscribe({ applicationServerKey: new Uint8Array(0) }),
+ );
+}, "Reject empty Uint8Array applicationServerKey");
+
+promise_test(async (t) => {
+ await promise_rejects_dom(
+ t,
+ "InvalidAccessError",
+ registration.pushManager.subscribe({ applicationServerKey: new Uint8Array([1, 2, 3]) }),
+ );
+}, "Reject a key that is not a valid point on P-256 curve");
+
+promise_test(async (t) => {
+ await promise_rejects_dom(
+ t,
+ "InvalidCharacterError",
+ registration.pushManager.subscribe({ applicationServerKey: "!@#$^&*" }),
+ );
+}, "Reject a string key that can't be decoded by base64url");