Index: third_party/WebKit/LayoutTests/webauth/idl.html |
diff --git a/third_party/WebKit/LayoutTests/webauth/idl.html b/third_party/WebKit/LayoutTests/webauth/idl.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..88128c5e52553f87cce0c0d3e6db27a7b79f2944 |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/webauth/idl.html |
@@ -0,0 +1,108 @@ |
+<!DOCTYPE html> |
+<script src=../resources/testharness.js></script> |
+<script src=../resources/testharnessreport.js></script> |
+<script src=../resources/WebIDLParser.js></script> |
+<script src=../resources/idlharness.js></script> |
+<script type="text/plain" id="untested"> |
foolip
2017/01/30 15:19:30
Why are these bits left untested?
kpaulhamus
2017/01/30 19:08:35
No real reason, apparently. Moved everything from
|
+[SecureContext] |
+interface ScopedCredentialInfo { |
+ readonly attribute ArrayBuffer clientData; |
+ readonly attribute ArrayBuffer attestation; |
+}; |
+ |
+dictionary RelyingPartyAccount { |
+ required DOMString rpDisplayName; |
+ required DOMString displayName; |
+ required DOMString id; |
+ DOMString name; |
+ DOMString imageURL; |
+}; |
+ |
+dictionary ScopedCredentialParameters { |
+ required ScopedCredentialType type; |
+ required AlgorithmIdentifier algorithm; |
+}; |
+ |
+dictionary ScopedCredentialOptions { |
+ unsigned long timeoutSeconds; |
+ USVString rpId; |
+ sequence < ScopedCredentialDescriptor > excludeList; |
+ AuthenticationExtension extensions; |
+}; |
+ |
+[SecureContext] |
+interface AuthenticationAssertion { |
+ readonly attribute ScopedCredential credential; |
+ readonly attribute ArrayBuffer clientData; |
+ readonly attribute ArrayBuffer authenticatorData; |
+ readonly attribute ArrayBuffer signature; |
+}; |
+ |
+dictionary AssertionOptions { |
+ unsigned long timeoutSeconds; |
+ USVString rpId; |
+ sequence < ScopedCredentialDescriptor > allowList; |
+ AuthenticationExtension extensions; |
+}; |
+ |
+dictionary AuthenticationExtension { |
+}; |
+ |
+dictionary AuthenticationClientData { |
+ required DOMString challenge; |
+ required DOMString origin; |
+ required AlgorithmIdentifier hashAlg; |
+ DOMString tokenBinding; |
+ AuthenticationExtension extensions; |
+}; |
+ |
+enum ScopedCredentialType { |
+ "ScopedCred" |
+}; |
+ |
+[SecureContext] |
+interface ScopedCredential { |
+ readonly attribute ScopedCredentialType type; |
+ readonly attribute ArrayBuffer id; |
+}; |
+ |
+dictionary ScopedCredentialDescriptor { |
+ required ScopedCredentialType type; |
+ required BufferSource id; |
+ sequence < Transport > transports; |
+}; |
+ |
+enum Transport { |
+ "usb", |
+ "nfc", |
+ "ble" |
+}; |
+</script> |
+<script type="text/plain" id="tested"> |
+[SecureContext] |
+interface WebAuthentication { |
+ Promise < ScopedCredentialInfo > makeCredential ( |
foolip
2017/01/30 15:19:30
Filed https://github.com/w3c/webauthn/issues/335 b
kpaulhamus
2017/01/30 19:08:35
Ack. I'll update the code when the issue is resolv
|
+ Account accountInformation, |
+ sequence < ScopedCredentialParameters > cryptoParameters, |
+ BufferSource attestationChallenge, |
+ optional ScopedCredentialOptions options |
+ ); |
+ |
+ Promise < AuthenticationAssertion > getAssertion ( |
+ BufferSource assertionChallenge, |
+ optional AssertionOptions options |
+ ); |
+}; |
+</script> |
+<script> |
+(function() { |
+ "use strict"; |
+ var idl_array = new IdlArray(); |
+ idl_array.add_untested_idls(document.querySelector('#untested').textContent); |
+ idl_array.add_idls(document.querySelector('#tested').textContent); |
+ idl_array.add_objects({ |
+ WebAuthentication: ['navigator.authentication'] |
+ }); |
+ idl_array.test(); |
+})(); |
+</script> |