@@ -32,7 +32,7 @@ import {
3232 AuthProviderConfig , CreateTenantRequest , DeleteUsersResult , PhoneMultiFactorInfo ,
3333 TenantAwareAuth , UpdatePhoneMultiFactorInfoRequest , UpdateTenantRequest , UserImportOptions ,
3434 UserImportRecord , UserRecord , getAuth , UpdateProjectConfigRequest , UserMetadata , MultiFactorConfig ,
35- PasswordPolicyConfig , SmsRegionConfig
35+ PasswordPolicyConfig , SmsRegionConfig ,
3636} from '../../lib/auth/index' ;
3737import * as sinon from 'sinon' ;
3838import * as sinonChai from 'sinon-chai' ;
@@ -2197,48 +2197,6 @@ describe('admin.auth', () => {
21972197 } ) ;
21982198 } ) ;
21992199
2200- describe ( 'Passkey config management operations' , ( ) => {
2201-
2202- // Before each test, reset the passkey config to the initial state
2203- beforeEach ( async ( ) => {
2204- // const resetRequest = { expectedOrigins: expectedPasskeyConfig.expectedOrigins };
2205- // await getAuth().passkeyConfigManager().updatePasskeyConfig(resetRequest);
2206- } ) ;
2207-
2208- it ( 'createPasskeyConfig() should create passkey config with expected passkeyConfig' , async ( ) => {
2209- const rpId = projectId + '.firebaseapp.com' ;
2210- const createRequest = { expectedOrigins : [ 'app1' , 'example.com' ] } ;
2211- const createdPasskeyConfig = await getAuth ( ) . passkeyConfigManager ( ) . createPasskeyConfig ( rpId , createRequest ) ;
2212-
2213- expect ( createdPasskeyConfig . name ) . to . deep . equal ( 'projects/' + projectId + '/passkeyConfig' ) ;
2214- expect ( createdPasskeyConfig . rpId ) . to . deep . equal ( projectId + '.firebaseapp.com' ) ;
2215- expect ( createdPasskeyConfig . expectedOrigins ) . to . deep . equal ( [ 'app1' , 'example.com' ] ) ;
2216- } ) ;
2217-
2218- // TODO: uncomment when the GET endpoint is released in prod
2219- // it('getPasskeyConfig() should resolve with expected passkeyConfig', async () => {
2220- // const actualPasskeyConfig = await getAuth().passkeyConfigManager().getPasskeyConfig();
2221-
2222- // expect(actualPasskeyConfig.name).to.deep.equal('projects/' + projectId + '/passkeyConfig');
2223- // expect(actualPasskeyConfig.rpId).to.deep.equal(projectId + '.firebaseapp.com');
2224- // expect(actualPasskeyConfig.expectedOrigins).to.deep.equal(['app1', 'example.com']);
2225- // });
2226-
2227- it ( 'updatePasskeyConfig() should resolve with updated expectedOrigins' , async ( ) => {
2228- const updateRequest = {
2229- expectedOrigins : [ 'app1' , 'example.com' , 'app2' ]
2230- } ;
2231-
2232- const updatedPasskeyConfig = await getAuth ( ) . passkeyConfigManager ( ) . updatePasskeyConfig ( updateRequest ) ;
2233-
2234- expect ( updatedPasskeyConfig . name ) . to . deep . equal ( 'projects/' + projectId + '/passkeyConfig' ) ;
2235- // TODO: backend validation needs to fixed in order for this statement to succeed.
2236- // expect(updatedPasskeyConfig.rpId).to.deep.equal(projectId + '.firebaseapp.com');
2237- expect ( updatedPasskeyConfig . expectedOrigins ) . to . deep . equal ( [ 'app1' , 'example.com' , 'app2' ] ) ;
2238- } ) ;
2239- } ) ;
2240-
2241-
22422200 describe ( 'SAML configuration operations' , ( ) => {
22432201 const authProviderConfig1 = {
22442202 providerId : randomSamlProviderId ( ) ,
0 commit comments