Source code
Revision control
Copy as Markdown
Other Tools
Test Info:
- This WPT test may be referenced by the following Test IDs:
- /payment-request/payment-request-ctor-pmi-handling.https.sub.html - WPT Dashboard Interop Dashboard
<!DOCTYPE html>
<!-- Copyright ยฉ 2017 Mozilla and World Wide Web Consortium, (Massachusetts Institute of Technology, ERCIM, Keio University, Beihang). -->
<meta charset="utf-8">
<title>Test for validity of payment method identifiers during construction</title>
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script>
"use strict";
const validAmount = Object.freeze({
currency: "USD",
value: "1.0",
});
const validTotal = Object.freeze({
label: "Default Total",
amount: validAmount,
});
const defaultDetails = Object.freeze({
total: validTotal,
});
test(() => {
const validMethods = [
];
for (const validMethod of validMethods) {
try {
const methods = [{ supportedMethods: validMethod }];
new PaymentRequest(methods, defaultDetails);
} catch (err) {
assert_unreached(
`Unexpected exception with valid standardized PMI: ${validMethod}. ${err}`
);
}
}
}, "Must support valid standard URL PMIs");
test(() => {
const validMethods = [
"e",
"n6jzof05mk2g4lhxr-u-q-w1-c-i-pa-ty-bdvs9-ho-ae7-p-md8-s-wq3-h-qd-e-q-sa",
"a-b-q-n-s-pw0",
"m-u",
"s-l5",
"k9-f",
"m-l",
"u4-n-t",
"i488jh6-g18-fck-yb-v7-i",
"x-x-t-t-c34-o",
"secure-payment-confirmation",
// gets coerced to "secure-payment-confirmation", for compat with old version of spec
["secure-payment-confirmation"],
];
for (const validMethod of validMethods) {
try {
const methods = [{ supportedMethods: validMethod }];
new PaymentRequest(methods, defaultDetails);
} catch (err) {
assert_unreached(
`Unexpected exception with valid standardized PMI: ${validMethod}. ${err}`
);
}
}
}, "Must not throw on syntactically valid standardized payment method identifiers, even if they are not supported");
test(() => {
const invalidMethods = [
"secure-๐ณ",
"ยกsecure-*-payment-confirmation!",
"Secure-Payment-Confirmation",
"0",
"-",
"--",
"a--b",
"-a--b",
"a-b-",
"0-",
"0-a",
"a0--",
"A-",
"A-B",
"A-b",
"a-0",
"a-0b",
" a-b",
"\t\na-b",
"a-b ",
"a-b\n\t",
"secure-payment-confirmation?not-really",
"secure payment confirmation",
"/secure payment confirmation/",
"SeCuRePaYmEnTcOnFiRmAtIoN",
"SECURE-PAYMENT-CONFIRMATION",
" secure-payment-confirmation ",
"this is not supported",
" ",
"foo,var",
["visa","mastercard"], // stringifies to "visa,mastercard"
];
for (const invalidMethod of invalidMethods) {
assert_throws_js(
RangeError,
() => {
const methods = [{ supportedMethods: invalidMethod }];
new PaymentRequest(methods, defaultDetails);
},
`expected RangeError processing invalid standardized PMI "${invalidMethod}"`
);
}
}, "Must throw on syntactically invalid standardized payment method identifiers");
test(() => {
const invalidMethods = [
"../realitive/url",
"/absolute/../path?",
"https://",
];
for (const invalidMethod of invalidMethods) {
assert_throws_js(
RangeError,
() => {
const methods = [{ supportedMethods: invalidMethod }];
new PaymentRequest(methods, defaultDetails);
},
`expected RangeError processing invalid URL PMI "${invalidMethod}"`
);
}
}, "Constructor MUST throw if given an invalid URL-based payment method identifier");
</script>