Skip to content

Commit ac9a82f

Browse files
committed
remove integration tests
1 parent f0b0ea6 commit ac9a82f

File tree

1 file changed

+1
-43
lines changed

1 file changed

+1
-43
lines changed

test/integration/auth.spec.ts

Lines changed: 1 addition & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ import {
3232
AuthProviderConfig, CreateTenantRequest, DeleteUsersResult, PhoneMultiFactorInfo,
3333
TenantAwareAuth, UpdatePhoneMultiFactorInfoRequest, UpdateTenantRequest, UserImportOptions,
3434
UserImportRecord, UserRecord, getAuth, UpdateProjectConfigRequest, UserMetadata, MultiFactorConfig,
35-
PasswordPolicyConfig, SmsRegionConfig
35+
PasswordPolicyConfig, SmsRegionConfig,
3636
} from '../../lib/auth/index';
3737
import * as sinon from 'sinon';
3838
import * as sinonChai from 'sinon-chai';
@@ -2197,48 +2197,6 @@ describe('admin.auth', () => {
21972197
});
21982198
});
21992199

2200-
describe('Passkey config management operations', () => {
2201-
2202-
// Before each test, reset the passkey config to the initial state
2203-
beforeEach(async () => {
2204-
// const resetRequest = { expectedOrigins: expectedPasskeyConfig.expectedOrigins };
2205-
// await getAuth().passkeyConfigManager().updatePasskeyConfig(resetRequest);
2206-
});
2207-
2208-
it('createPasskeyConfig() should create passkey config with expected passkeyConfig', async () => {
2209-
const rpId = projectId + '.firebaseapp.com';
2210-
const createRequest = { expectedOrigins: ['app1', 'example.com'] };
2211-
const createdPasskeyConfig = await getAuth().passkeyConfigManager().createPasskeyConfig(rpId, createRequest);
2212-
2213-
expect(createdPasskeyConfig.name).to.deep.equal('projects/' + projectId + '/passkeyConfig');
2214-
expect(createdPasskeyConfig.rpId).to.deep.equal(projectId + '.firebaseapp.com');
2215-
expect(createdPasskeyConfig.expectedOrigins).to.deep.equal(['app1', 'example.com']);
2216-
});
2217-
2218-
// TODO: uncomment when the GET endpoint is released in prod
2219-
// it('getPasskeyConfig() should resolve with expected passkeyConfig', async () => {
2220-
// const actualPasskeyConfig = await getAuth().passkeyConfigManager().getPasskeyConfig();
2221-
2222-
// expect(actualPasskeyConfig.name).to.deep.equal('projects/' + projectId + '/passkeyConfig');
2223-
// expect(actualPasskeyConfig.rpId).to.deep.equal(projectId + '.firebaseapp.com');
2224-
// expect(actualPasskeyConfig.expectedOrigins).to.deep.equal(['app1', 'example.com']);
2225-
// });
2226-
2227-
it('updatePasskeyConfig() should resolve with updated expectedOrigins', async () => {
2228-
const updateRequest = {
2229-
expectedOrigins: ['app1', 'example.com', 'app2']
2230-
};
2231-
2232-
const updatedPasskeyConfig = await getAuth().passkeyConfigManager().updatePasskeyConfig(updateRequest);
2233-
2234-
expect(updatedPasskeyConfig.name).to.deep.equal('projects/' + projectId + '/passkeyConfig');
2235-
// TODO: backend validation needs to fixed in order for this statement to succeed.
2236-
// expect(updatedPasskeyConfig.rpId).to.deep.equal(projectId + '.firebaseapp.com');
2237-
expect(updatedPasskeyConfig.expectedOrigins).to.deep.equal(['app1', 'example.com', 'app2']);
2238-
});
2239-
});
2240-
2241-
22422200
describe('SAML configuration operations', () => {
22432201
const authProviderConfig1 = {
22442202
providerId: randomSamlProviderId(),

0 commit comments

Comments
 (0)