@@ -32,7 +32,7 @@ import {
32
32
AuthProviderConfig , CreateTenantRequest , DeleteUsersResult , PhoneMultiFactorInfo ,
33
33
TenantAwareAuth , UpdatePhoneMultiFactorInfoRequest , UpdateTenantRequest , UserImportOptions ,
34
34
UserImportRecord , UserRecord , getAuth , UpdateProjectConfigRequest , UserMetadata , MultiFactorConfig ,
35
- PasswordPolicyConfig , SmsRegionConfig
35
+ PasswordPolicyConfig , SmsRegionConfig ,
36
36
} from '../../lib/auth/index' ;
37
37
import * as sinon from 'sinon' ;
38
38
import * as sinonChai from 'sinon-chai' ;
@@ -2197,48 +2197,6 @@ describe('admin.auth', () => {
2197
2197
} ) ;
2198
2198
} ) ;
2199
2199
2200
- describe ( 'Passkey config management operations' , ( ) => {
2201
-
2202
- // Before each test, reset the passkey config to the initial state
2203
- beforeEach ( async ( ) => {
2204
- // const resetRequest = { expectedOrigins: expectedPasskeyConfig.expectedOrigins };
2205
- // await getAuth().passkeyConfigManager().updatePasskeyConfig(resetRequest);
2206
- } ) ;
2207
-
2208
- it ( 'createPasskeyConfig() should create passkey config with expected passkeyConfig' , async ( ) => {
2209
- const rpId = projectId + '.firebaseapp.com' ;
2210
- const createRequest = { expectedOrigins : [ 'app1' , 'example.com' ] } ;
2211
- const createdPasskeyConfig = await getAuth ( ) . passkeyConfigManager ( ) . createPasskeyConfig ( rpId , createRequest ) ;
2212
-
2213
- expect ( createdPasskeyConfig . name ) . to . deep . equal ( 'projects/' + projectId + '/passkeyConfig' ) ;
2214
- expect ( createdPasskeyConfig . rpId ) . to . deep . equal ( projectId + '.firebaseapp.com' ) ;
2215
- expect ( createdPasskeyConfig . expectedOrigins ) . to . deep . equal ( [ 'app1' , 'example.com' ] ) ;
2216
- } ) ;
2217
-
2218
- // TODO: uncomment when the GET endpoint is released in prod
2219
- // it('getPasskeyConfig() should resolve with expected passkeyConfig', async () => {
2220
- // const actualPasskeyConfig = await getAuth().passkeyConfigManager().getPasskeyConfig();
2221
-
2222
- // expect(actualPasskeyConfig.name).to.deep.equal('projects/' + projectId + '/passkeyConfig');
2223
- // expect(actualPasskeyConfig.rpId).to.deep.equal(projectId + '.firebaseapp.com');
2224
- // expect(actualPasskeyConfig.expectedOrigins).to.deep.equal(['app1', 'example.com']);
2225
- // });
2226
-
2227
- it ( 'updatePasskeyConfig() should resolve with updated expectedOrigins' , async ( ) => {
2228
- const updateRequest = {
2229
- expectedOrigins : [ 'app1' , 'example.com' , 'app2' ]
2230
- } ;
2231
-
2232
- const updatedPasskeyConfig = await getAuth ( ) . passkeyConfigManager ( ) . updatePasskeyConfig ( updateRequest ) ;
2233
-
2234
- expect ( updatedPasskeyConfig . name ) . to . deep . equal ( 'projects/' + projectId + '/passkeyConfig' ) ;
2235
- // TODO: backend validation needs to fixed in order for this statement to succeed.
2236
- // expect(updatedPasskeyConfig.rpId).to.deep.equal(projectId + '.firebaseapp.com');
2237
- expect ( updatedPasskeyConfig . expectedOrigins ) . to . deep . equal ( [ 'app1' , 'example.com' , 'app2' ] ) ;
2238
- } ) ;
2239
- } ) ;
2240
-
2241
-
2242
2200
describe ( 'SAML configuration operations' , ( ) => {
2243
2201
const authProviderConfig1 = {
2244
2202
providerId : randomSamlProviderId ( ) ,
0 commit comments