mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-08 19:04:45 +00:00
Bug 1546662 - reenable webauthn wpts. r=keeler
Depends on D181300 Differential Revision: https://phabricator.services.mozilla.com/D181302
This commit is contained in:
parent
5a81fc2d12
commit
5f8b0f5223
@ -25,22 +25,37 @@ mozilla::ipc::IPCResult WebAuthnTransactionParent::RecvRequestRegister(
|
||||
::mozilla::ipc::AssertIsOnBackgroundThread();
|
||||
|
||||
#ifdef XP_WIN
|
||||
if (WinWebAuthnManager::AreWebAuthNApisAvailable()) {
|
||||
bool usingTestToken =
|
||||
StaticPrefs::security_webauth_webauthn_enable_softtoken();
|
||||
if (!usingTestToken && WinWebAuthnManager::AreWebAuthNApisAvailable()) {
|
||||
WinWebAuthnManager* mgr = WinWebAuthnManager::Get();
|
||||
mgr->Register(this, aTransactionId, aTransactionInfo);
|
||||
if (mgr) {
|
||||
mgr->Register(this, aTransactionId, aTransactionInfo);
|
||||
}
|
||||
return IPC_OK();
|
||||
}
|
||||
#endif
|
||||
|
||||
// Bug 1819414 will reroute requests on Android through WebAuthnController and
|
||||
// allow us to remove this.
|
||||
#ifdef MOZ_WIDGET_ANDROID
|
||||
bool usingTestToken =
|
||||
StaticPrefs::security_webauth_webauthn_enable_softtoken();
|
||||
bool androidFido2 =
|
||||
StaticPrefs::security_webauth_webauthn_enable_android_fido2();
|
||||
|
||||
if (!androidFido2) {
|
||||
WebAuthnController* ctrl = WebAuthnController::Get();
|
||||
ctrl->Register(this, aTransactionId, aTransactionInfo);
|
||||
} else {
|
||||
if (!usingTestToken && androidFido2) {
|
||||
U2FTokenManager* mgr = U2FTokenManager::Get();
|
||||
mgr->Register(this, aTransactionId, aTransactionInfo);
|
||||
if (mgr) {
|
||||
mgr->Register(this, aTransactionId, aTransactionInfo);
|
||||
}
|
||||
return IPC_OK();
|
||||
}
|
||||
#endif
|
||||
|
||||
WebAuthnController* ctrl = WebAuthnController::Get();
|
||||
if (ctrl) {
|
||||
ctrl->Register(this, aTransactionId, aTransactionInfo);
|
||||
}
|
||||
|
||||
return IPC_OK();
|
||||
@ -52,23 +67,36 @@ mozilla::ipc::IPCResult WebAuthnTransactionParent::RecvRequestSign(
|
||||
::mozilla::ipc::AssertIsOnBackgroundThread();
|
||||
|
||||
#ifdef XP_WIN
|
||||
if (WinWebAuthnManager::AreWebAuthNApisAvailable()) {
|
||||
bool usingTestToken =
|
||||
StaticPrefs::security_webauth_webauthn_enable_softtoken();
|
||||
if (!usingTestToken && WinWebAuthnManager::AreWebAuthNApisAvailable()) {
|
||||
WinWebAuthnManager* mgr = WinWebAuthnManager::Get();
|
||||
mgr->Sign(this, aTransactionId, aTransactionInfo);
|
||||
if (mgr) {
|
||||
mgr->Sign(this, aTransactionId, aTransactionInfo);
|
||||
}
|
||||
return IPC_OK();
|
||||
}
|
||||
#endif
|
||||
|
||||
// Bug 1819414 will reroute requests on Android through WebAuthnController and
|
||||
// allow us to remove this.
|
||||
#ifdef MOZ_WIDGET_ANDROID
|
||||
bool usingTestToken =
|
||||
StaticPrefs::security_webauth_webauthn_enable_softtoken();
|
||||
bool androidFido2 =
|
||||
StaticPrefs::security_webauth_webauthn_enable_android_fido2();
|
||||
|
||||
if (!androidFido2) {
|
||||
WebAuthnController* ctrl = WebAuthnController::Get();
|
||||
ctrl->Sign(this, aTransactionId, aTransactionInfo);
|
||||
} else {
|
||||
if (!usingTestToken && androidFido2) {
|
||||
U2FTokenManager* mgr = U2FTokenManager::Get();
|
||||
mgr->Sign(this, aTransactionId, aTransactionInfo);
|
||||
if (mgr) {
|
||||
mgr->Sign(this, aTransactionId, aTransactionInfo);
|
||||
}
|
||||
return IPC_OK();
|
||||
}
|
||||
#endif
|
||||
|
||||
WebAuthnController* ctrl = WebAuthnController::Get();
|
||||
ctrl->Sign(this, aTransactionId, aTransactionInfo);
|
||||
|
||||
return IPC_OK();
|
||||
}
|
||||
@ -80,22 +108,27 @@ mozilla::ipc::IPCResult WebAuthnTransactionParent::RecvRequestCancel(
|
||||
#ifdef XP_WIN
|
||||
if (WinWebAuthnManager::AreWebAuthNApisAvailable()) {
|
||||
WinWebAuthnManager* mgr = WinWebAuthnManager::Get();
|
||||
mgr->Cancel(this, aTransactionId);
|
||||
return IPC_OK();
|
||||
if (mgr) {
|
||||
mgr->Cancel(this, aTransactionId);
|
||||
}
|
||||
}
|
||||
// fall through in case WebAuthnController was used.
|
||||
#endif
|
||||
|
||||
// We don't know whether WebAuthnController or U2FTokenManager was used, so
|
||||
// try cancelling both.
|
||||
WebAuthnController* ctrl = WebAuthnController::Get();
|
||||
if (ctrl) {
|
||||
ctrl->Cancel(this, aTransactionId);
|
||||
}
|
||||
|
||||
// Bug 1819414 will reroute requests on Android through WebAuthnController and
|
||||
// allow us to remove this.
|
||||
#ifdef MOZ_WIDGET_ANDROID
|
||||
U2FTokenManager* mgr = U2FTokenManager::Get();
|
||||
if (mgr) {
|
||||
mgr->Cancel(this, aTransactionId);
|
||||
}
|
||||
// fall through in case WebAuthnController was used.
|
||||
#endif
|
||||
|
||||
WebAuthnController* ctrl = WebAuthnController::Get();
|
||||
if (ctrl) {
|
||||
ctrl->Cancel(this, aTransactionId);
|
||||
}
|
||||
|
||||
return IPC_OK();
|
||||
}
|
||||
@ -130,19 +163,24 @@ void WebAuthnTransactionParent::ActorDestroy(ActorDestroyReason aWhy) {
|
||||
if (mgr) {
|
||||
mgr->MaybeClearTransaction(this);
|
||||
}
|
||||
return;
|
||||
}
|
||||
// fall through in case WebAuthnController was used.
|
||||
#endif
|
||||
|
||||
// Bug 1819414 will reroute requests on Android through WebAuthnController and
|
||||
// allow us to remove this.
|
||||
#ifdef MOZ_WIDGET_ANDROID
|
||||
U2FTokenManager* mgr = U2FTokenManager::Get();
|
||||
if (mgr) {
|
||||
mgr->MaybeClearTransaction(this);
|
||||
}
|
||||
// fall through in case WebAuthnController was used.
|
||||
#endif
|
||||
|
||||
WebAuthnController* ctrl = WebAuthnController::Get();
|
||||
if (ctrl) {
|
||||
ctrl->MaybeClearTransaction(this);
|
||||
}
|
||||
|
||||
U2FTokenManager* mgr = U2FTokenManager::Get();
|
||||
if (mgr) {
|
||||
mgr->MaybeClearTransaction(this);
|
||||
}
|
||||
}
|
||||
|
||||
} // namespace mozilla::dom
|
||||
|
@ -1,2 +1 @@
|
||||
prefs: [security.webauth.webauthn:true, security.webauth.webauthn_enable_softtoken:true, security.webauth.webauthn_enable_android_fido2:false]
|
||||
disabled: true
|
||||
prefs: [security.webauth.webauthn:true, security.webauth.webauthn_testing_allow_direct_attestation:true, security.webauth.webauthn_enable_softtoken:true, security.webauth.webauthn_enable_usbtoken:false, security.webauth.webauthn_enable_android_fido2:false]
|
||||
|
@ -0,0 +1,6 @@
|
||||
[conditional-mediation.https.html]
|
||||
[Conditional mediation supported]
|
||||
expected: FAIL
|
||||
|
||||
[Conditional mediation not supported]
|
||||
expected: FAIL
|
@ -0,0 +1,12 @@
|
||||
[createcredential-abort.https.html]
|
||||
[navigator.credentials.create() after abort reason]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() before abort reason]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() after abort reason with Error]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() before abort reason with Error]
|
||||
expected: FAIL
|
@ -0,0 +1,12 @@
|
||||
[createcredential-attachment.https.html]
|
||||
[navigator.credentials.create() with usb authenticator, attachment as cross-platform]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with ble authenticator, attachment as cross-platform]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with nfc authenticator, attachment as cross-platform]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with internal authenticator, attachment as platform]
|
||||
expected: FAIL
|
@ -1,7 +1,4 @@
|
||||
[createcredential-badargs-authnrselection.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
TIMEOUT
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection is empty array]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
@ -12,16 +9,6 @@
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection is empty string]
|
||||
expected:
|
||||
if debug and (os == "win"): PASS
|
||||
NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection is string]
|
||||
expected:
|
||||
if debug and (os == "win"): PASS
|
||||
NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment is empty string]
|
||||
expected:
|
||||
if debug and (os == "win"): PASS
|
||||
@ -37,36 +24,23 @@
|
||||
if debug and (os == "win"): PASS
|
||||
NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection attachment platform]
|
||||
expected:
|
||||
if debug and (os == "win"): PASS
|
||||
NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection residentKey true]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection residentKey is string]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification empty string]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification empty object]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification bad value]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification null]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection residentKey true]
|
||||
expected: FAIL
|
||||
|
||||
[Bad AuthenticatorSelectionCriteria: authenticatorSelection userVerification required]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
expected: FAIL
|
||||
|
@ -1,7 +1,4 @@
|
||||
[createcredential-badargs-rp.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
TIMEOUT
|
||||
[Bad rp: id is object]
|
||||
expected: FAIL
|
||||
|
||||
@ -21,21 +18,13 @@
|
||||
NOTRUN
|
||||
|
||||
[Bad rp: icon is object]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad rp: icon is null]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad rp: icon is empty String]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad rp: icon is insecure]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Bad rp: rp null]
|
||||
expected: FAIL
|
||||
|
||||
expected: NOTRUN
|
||||
|
@ -1,23 +0,0 @@
|
||||
[createcredential-excludecredentials.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
TIMEOUT
|
||||
[excludeCredentials missing]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
TIMEOUT
|
||||
|
||||
[excludeCredentials empty array]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[exclude existing credential]
|
||||
expected:
|
||||
if debug and (os == "win"): TIMEOUT
|
||||
NOTRUN
|
||||
|
||||
[exclude random (non-existing) credential]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
@ -1,7 +1,4 @@
|
||||
[createcredential-extensions.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
TIMEOUT
|
||||
[Bad extensions: extensions is null]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
@ -18,30 +15,13 @@
|
||||
NOTRUN
|
||||
|
||||
[Bad extensions: malformatted JSON]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad extensions: JavaScript object]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad extensions: extension ID too long]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[extensions is a nonsensical JSON string]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[empty appid in create request]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[null appid in create request]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[appid in create request]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[navigator.credentials.create() with prf requested but no support in authenticator]
|
||||
expected: FAIL
|
||||
|
@ -0,0 +1,3 @@
|
||||
[createcredential-getpublickey.https.html]
|
||||
[WebAuthn getPublicKey]
|
||||
expected: FAIL
|
@ -0,0 +1,15 @@
|
||||
[createcredential-large-blob-not-supported.https.html]
|
||||
[navigator.credentials.create() with largeBlob.write set]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with largeBlob.read set]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with largeBlob.support set to preferred and not supported by authenticator]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with largeBlob.support not set and not supported by authenticator]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with largeBlob.support set to required and not supported by authenticator]
|
||||
expected: FAIL
|
@ -0,0 +1,9 @@
|
||||
[createcredential-large-blob-supported.https.html]
|
||||
[navigator.credentials.create() with largeBlob.support set to preferred and supported by authenticator]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with largeBlob.support not set and supported by authenticator]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with largeBlob.support set to required and supported by authenticator]
|
||||
expected: FAIL
|
@ -0,0 +1,3 @@
|
||||
[createcredential-minpinlength.https.html]
|
||||
[navigator.credentials.create() with minPinLength requested]
|
||||
expected: FAIL
|
@ -1,158 +1,19 @@
|
||||
[createcredential-passing.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected: TIMEOUT
|
||||
[WebAuthn credential.create() Passing Tests]
|
||||
expected: TIMEOUT
|
||||
|
||||
[passing credentials.create() with default arguments]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
TIMEOUT
|
||||
|
||||
[passing credentials.create() with rpId (host and port)]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[passing credentials.create() with rpId (hostname)]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[passing credentials.create() without rp.icon]
|
||||
expected:
|
||||
if debug and (os == "win"): TIMEOUT
|
||||
NOTRUN
|
||||
|
||||
[very short user id]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[max length user id]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Uint8Array user id]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Int8Array user id]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Int16Array user id]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Int32Array user id]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Float32Array user id]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[DataView user id]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[passing credentials.create() without user.icon]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Int16Array challenge]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Int32Array challenge]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Float32Array challenge]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Float64Array challenge]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[DataView challenge]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[Absurdly large challenge]
|
||||
expected:
|
||||
NOTRUN
|
||||
expected: NOTRUN
|
||||
|
||||
[Bad pubKeyCredParams: pubKeyCredParams is empty Array]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[EC256 pubKeyCredParams]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[SelectEC256 pubKeyCredParams from a list]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[passing credentials.create() with no timeout]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection is undefined]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection is empty object]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection default values]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection attachment undefined]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection residentKey undefined]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection residentKey false]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection userVerification undefined]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection userVerification discouraged]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[attestation parameter: attestation is "none"]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[attestation parameter: attestation is "indirect"]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[attestation parameter: attestation is "direct"]
|
||||
expected:
|
||||
NOTRUN
|
||||
|
||||
[attestation parameter: attestation is undefined]
|
||||
expected: NOTRUN
|
||||
|
||||
[extensions undefined]
|
||||
expected: NOTRUN
|
||||
|
||||
[extensions are empty object]
|
||||
expected: NOTRUN
|
||||
|
||||
[extensions are dict of empty strings]
|
||||
expected: NOTRUN
|
||||
|
||||
|
@ -0,0 +1,6 @@
|
||||
[createcredential-prf.https.html]
|
||||
[navigator.credentials.create() with prf requested]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.create() with nonsensical evalByCredential]
|
||||
expected: FAIL
|
@ -1,9 +1,12 @@
|
||||
[createcredential-pubkeycredparams.https.html]
|
||||
[Bad pubKeyCredParams: first param has bad alg (0)]
|
||||
expected:
|
||||
FAIL
|
||||
[Bad pubKeyCredParams: first param has bad type ("something-else")]
|
||||
expected: FAIL
|
||||
|
||||
[Bad pubKeyCredParams: first param has bad alg (42)]
|
||||
expected:
|
||||
FAIL
|
||||
[Bad pubKeyCredParams: first param has bad type ("")]
|
||||
expected: FAIL
|
||||
|
||||
[Bad pubKeyCredParams: first param has bad type (null)]
|
||||
expected: FAIL
|
||||
|
||||
[Bad pubKeyCredParams: first param has bad type (empty object)]
|
||||
expected: FAIL
|
||||
|
@ -0,0 +1,45 @@
|
||||
[createcredential-resident-key.https.html]
|
||||
[U2F: navigator.credentials.create() with credProps extension, rk=discouraged]
|
||||
expected: FAIL
|
||||
|
||||
[U2F: navigator.credentials.create() with credProps extension, rk=preferred]
|
||||
expected: FAIL
|
||||
|
||||
[U2F: navigator.credentials.create() with credProps extension, rk=required]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.0 without resident key support: navigator.credentials.create() with credProps extension, rk=discouraged]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.0 without resident key support: navigator.credentials.create() with credProps extension, rk=preferred]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.0 without resident key support: navigator.credentials.create() with credProps extension, rk=required]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.0 with resident key support: navigator.credentials.create() with credProps extension, rk=discouraged]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.0 with resident key support: navigator.credentials.create() with credProps extension, rk=preferred]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.0 with resident key support: navigator.credentials.create() with credProps extension, rk=required]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.1 without resident key support: navigator.credentials.create() with credProps extension, rk=discouraged]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.1 without resident key support: navigator.credentials.create() with credProps extension, rk=preferred]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.1 without resident key support: navigator.credentials.create() with credProps extension, rk=required]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.1 with resident key support: navigator.credentials.create() with credProps extension, rk=discouraged]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.1 with resident key support: navigator.credentials.create() with credProps extension, rk=preferred]
|
||||
expected: FAIL
|
||||
|
||||
[CTAP 2.1 with resident key support: navigator.credentials.create() with credProps extension, rk=required]
|
||||
expected: FAIL
|
@ -1,5 +1,3 @@
|
||||
[createcredential-timeout.https.html]
|
||||
[ensure create credential times out]
|
||||
expected:
|
||||
if os == "android": FAIL
|
||||
|
||||
expected: FAIL
|
||||
|
@ -0,0 +1,3 @@
|
||||
[credblob-not-supported.https.html]
|
||||
[creation requesting credBlob without authenticator support]
|
||||
expected: FAIL
|
@ -0,0 +1,6 @@
|
||||
[credblob-supported.https.html]
|
||||
[assertion without credBlob]
|
||||
expected: FAIL
|
||||
|
||||
[assertion with credBlob]
|
||||
expected: FAIL
|
@ -0,0 +1,12 @@
|
||||
[getcredential-abort.https.html]
|
||||
[navigator.credentials.get() after abort reason]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() before abort reason]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() after abort reason with Error]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() before abort reason with Error]
|
||||
expected: FAIL
|
@ -0,0 +1,12 @@
|
||||
[getcredential-attachment.https.html]
|
||||
[navigator.credentials.get() with usb authenticator, attachment as cross-platform]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with ble authenticator, attachment as cross-platform]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with nfc authenticator, attachment as cross-platform]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with internal authenticator, attachment as platform]
|
||||
expected: FAIL
|
@ -1,30 +0,0 @@
|
||||
[getcredential-badargs-rpid.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
if debug and (os == "win"): OK
|
||||
TIMEOUT
|
||||
[Bad rpId: empty string]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
TIMEOUT
|
||||
|
||||
[Bad rpId: null]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[Bad rpId: invalid domain (has space)]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[Bad rpId: invalid domain (starts with dash)]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[Bad rpId: invalid domain (starts with number)]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
@ -1,8 +1,4 @@
|
||||
[getcredential-badargs-userverification.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
if debug and (os == "win"): OK
|
||||
TIMEOUT
|
||||
[Bad userVerification: empty string]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
@ -24,7 +20,4 @@
|
||||
NOTRUN
|
||||
|
||||
[Bad userVerification: "required"]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
expected: FAIL
|
||||
|
@ -1,13 +1,4 @@
|
||||
[getcredential-extensions.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
if debug and (os == "win"): OK
|
||||
TIMEOUT
|
||||
[Bad extensions: extensions is string]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
TIMEOUT
|
||||
|
||||
[Bad extensions: extensions is null]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
@ -43,3 +34,11 @@
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[credProps is only supported at registration]
|
||||
expected: FAIL
|
||||
|
||||
[Payment extension is only supported at registration]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with prf requested but no support in authenticator]
|
||||
expected: FAIL
|
||||
|
@ -0,0 +1,12 @@
|
||||
[getcredential-large-blob-not-supported.https.html]
|
||||
[navigator.credentials.get() with largeBlob.support set]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with largeBlob.read and largeBlob.write set]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with largeBlob.read set without authenticator support]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with largeBlob.write set without authenticator support]
|
||||
expected: FAIL
|
@ -0,0 +1,6 @@
|
||||
[getcredential-large-blob-supported.https.html]
|
||||
[navigator.credentials.get() with largeBlob.read set with no blob on authenticator]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() read and write blob]
|
||||
expected: FAIL
|
@ -1,65 +1,10 @@
|
||||
[getcredential-passing.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
if debug and (os == "win"): OK
|
||||
TIMEOUT
|
||||
[passing credentials.get() with default args]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
TIMEOUT
|
||||
|
||||
[passing credentials.create() with no timeout]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[rpId undefined]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[passing credentials.get() with rpId (host and port)]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[passing credentials.get() with rpId (hostname)]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[no credential specified]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection userVerification undefined]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection userVerification preferred]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[authenticatorSelection userVerification discouraged]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[extensions undefined]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[extensions are empty object]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
[extensions are dict of empty strings]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
NOTRUN
|
||||
|
||||
|
@ -0,0 +1,27 @@
|
||||
[getcredential-prf.https.html]
|
||||
[navigator.credentials.get() with single evaluation point]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with two equal evaluation points]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with two distinct evaluation points]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() using credential ID with one evaluation point]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() using credential ID with two evaluation points]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with credential ID not in allowedCredentials]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with Uint8Array credential ID not in allowedCredentials]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() using invalid base64url credential ID]
|
||||
expected: FAIL
|
||||
|
||||
[navigator.credentials.get() with an empty allow list but also using evalByCredential]
|
||||
expected: FAIL
|
@ -1,19 +1,7 @@
|
||||
[getcredential-rk-passing.https.html]
|
||||
expected:
|
||||
if not debug and (os == "linux"): TIMEOUT
|
||||
if not debug and (os == "win"): TIMEOUT
|
||||
[empty allowCredentials]
|
||||
expected:
|
||||
if ccov and (os == "win"): FAIL
|
||||
if not debug and (os == "linux"): TIMEOUT
|
||||
if not debug and (os == "win"): TIMEOUT
|
||||
FAIL
|
||||
|
||||
[undefined allowCredentials]
|
||||
expected:
|
||||
if ccov and (os == "win"): FAIL
|
||||
if not debug and (os == "linux"): NOTRUN
|
||||
if not debug and (os == "win"): NOTRUN
|
||||
if not debug and (os == "mac"): ["NOTRUN", "FAIL"]
|
||||
FAIL
|
||||
|
||||
if not debug and (os == "linux"): FAIL
|
||||
if not debug and (os == "win"): FAIL
|
||||
if not debug and (os == "mac"): [NOTRUN, FAIL]
|
||||
|
@ -1,10 +1,8 @@
|
||||
[getcredential-timeout.https.html]
|
||||
disabled: https://bugzilla.mozilla.org/show_bug.cgi?id=1546662
|
||||
expected:
|
||||
if debug and (os == "win"): OK
|
||||
TIMEOUT
|
||||
[ensure create credential times out]
|
||||
expected:
|
||||
if debug and (os == "win"): FAIL
|
||||
TIMEOUT
|
||||
|
||||
[WebAuthn navigator.credentials.get() timeout Tests]
|
||||
expected: FAIL
|
||||
|
@ -0,0 +1,2 @@
|
||||
[public-key-credential-to-json.https.window.html]
|
||||
expected: ERROR
|
@ -0,0 +1,6 @@
|
||||
[remote-desktop-client-override.tentative.https.html]
|
||||
[create() with remoteDesktopClientOverride]
|
||||
expected: FAIL
|
||||
|
||||
[get() with remoteDesktopClientOverride on an unauthorized site]
|
||||
expected: FAIL
|
@ -1,22 +1,16 @@
|
||||
[webauthn-testdriver-basic.https.html]
|
||||
expected:
|
||||
if os == "android": OK
|
||||
TIMEOUT
|
||||
[Get an assertion]
|
||||
expected:
|
||||
if os == "android": PASS
|
||||
NOTRUN
|
||||
FAIL
|
||||
|
||||
[Create a credential]
|
||||
expected:
|
||||
if os == "android": PASS
|
||||
TIMEOUT
|
||||
FAIL
|
||||
|
||||
[Set up the test environment]
|
||||
expected: FAIL
|
||||
|
||||
[Clean up the test environment]
|
||||
expected:
|
||||
if os == "android": FAIL
|
||||
NOTRUN
|
||||
|
||||
expected: FAIL
|
||||
|
Loading…
Reference in New Issue
Block a user