mirror of
https://github.com/keycloak/keycloak.git
synced 2026-01-09 23:12:06 -03:30
parent
cee69e1abc
commit
aa5a4e3d84
@ -126,97 +126,6 @@ You can use value `TRACE` if you want to enable even TRACE logging.
|
||||
There is no support for more packages ATM, you need to edit the file `testsuite/integration-arquillian/servers/auth-server/jboss/common/jboss-cli/add-log-level.cli`
|
||||
and add packages manually.
|
||||
|
||||
## Run tests against remote container
|
||||
|
||||
### remote server tests
|
||||
|
||||
note: if there is a need to run server on http only testsuite providers has to be re-builded with `-Dauth.server.ssl.required=false`
|
||||
|
||||
mvn -f testsuite/integration-arquillian/pom.xml clean install -Pauth-server-wildfly -Dauth.server.ssl.required=false -DskipTests
|
||||
|
||||
unzip prepared server:
|
||||
|
||||
unzip -q testsuite/integration-arquillian/servers/auth-server/jboss/wildfly/target/integration-arquillian-servers-auth-server-wildfly-*.zip
|
||||
|
||||
create admin user:
|
||||
|
||||
sh auth-server-wildfly/bin/add-user-keycloak.sh -r master -u admin -p admin
|
||||
|
||||
start the server:
|
||||
|
||||
sh auth-server-wildfly/bin/standalone.sh \
|
||||
-Dauth.server.ssl.required=false \
|
||||
-Djboss.socket.binding.port-offset=100 \
|
||||
-Dauth.server.http.port=8180 \
|
||||
-Dauth.server.https.port=8543
|
||||
|
||||
run base testsuite:
|
||||
|
||||
mvn -f testsuite/integration-arquillian/tests/base/pom.xml clean install -Pauth-server-remote -Dauth.server.ssl.required=false
|
||||
|
||||
note: it is also possible to run tests against server running on different host and port using `-Dauth.server.host=${server.host}` and `-Dauth.server.http.port=${server.port}`. The testsuite currently doesn't work with port 80.
|
||||
|
||||
### remote adapter tests
|
||||
|
||||
note: if there is a need to run server on http only testsuite providers has to be re-builded with `-Dauth.server.ssl.required=false`
|
||||
|
||||
mvn -f keycloak/testsuite/integration-arquillian/pom.xml clean install -Pauth-server-wildfly -Papp-server-wildfly -Dauth.server.ssl.required=false -DskipTests ${MVN_DEFAULT_ARGS}
|
||||
|
||||
unzip prepared servers:
|
||||
|
||||
unzip -q keycloak/testsuite/integration-arquillian/servers/auth-server/jboss/wildfly/target/integration-arquillian-servers-auth-server-wildfly-*.zip
|
||||
unzip -q keycloak/testsuite/integration-arquillian/servers/app-server/jboss/wildfly/target/integration-arquillian-servers-app-server-wildfly-*.zip
|
||||
|
||||
create admin user:
|
||||
|
||||
sh auth-server-wildfly/bin/add-user-keycloak.sh -r master -u admin -p admin
|
||||
|
||||
start both servers:
|
||||
|
||||
sh auth-server-wildfly/bin/standalone.sh \
|
||||
-Dauth.server.ssl.required=false \
|
||||
-Djboss.socket.binding.port-offset=100 \
|
||||
-Dauth.server.http.port=8180 \
|
||||
-Dauth.server.https.port=8543
|
||||
|
||||
sh app-server-wildfly/bin/standalone.sh \
|
||||
-Djboss.socket.binding.port-offset=200 \
|
||||
-Dapp.server.ssl.required=false
|
||||
|
||||
run other/adapters/jboss/remote tests:
|
||||
|
||||
mvn -f keycloak/testsuite/integration-arquillian/tests/other/adapters/jboss/remote/pom.xml clean install \
|
||||
-Pauth-server-remote,app-server-remote \
|
||||
-Dauth.server.ssl.required=false \
|
||||
-Dapp.server.ssl.required=false
|
||||
|
||||
### Running tests against container not produced by the testsuite
|
||||
|
||||
For running the testsuite, it is necessary to install/deploy so-called testsuite-providers. The testsuite rely on
|
||||
testsuite-providers in many test scenarios for example for checking fired events, moving in time etc. When using
|
||||
keycloak from `integration-arquillian-servers-auth-server-wildfly-*.zip`, it should not be necessary to do any steps
|
||||
because testsuite-providers are already included in this archive. However, when a clean keycloak is used, e.g.
|
||||
openshift image, testsuite-providers jar file is deployed to the container in the beginning of test run.
|
||||
To be able to deploy the jar to the container, arquillian has to have an access to the management port.
|
||||
|
||||
For example, to run testsuite against image in openshift, we need to first forward 9990 port from the running pod.
|
||||
```shell script
|
||||
oc port-forward "${POD}" 9990:9990
|
||||
```
|
||||
where ${POD} is a name of the pod
|
||||
|
||||
Now just run testsuite against the image in openshift:
|
||||
```shell script
|
||||
mvn clean install -f testsuite/integration-arquillian/tests/base/pom.xml \
|
||||
-Pauth-server-remote \
|
||||
-Dauth.server.ssl.required=false \
|
||||
-Dauth.server.host="${HOST}" \
|
||||
-Dauth.server.http.port=80 \
|
||||
-Dauth.server.management.host=127.0.0.1 \
|
||||
-Dauth.server.management.port=9990
|
||||
```
|
||||
where ${HOST} is url of keycloak, for example: `keycloak-keycloak.192.168.42.91.nip.io`.
|
||||
|
||||
## Run adapter tests
|
||||
|
||||
### Undertow
|
||||
|
||||
@ -378,54 +378,6 @@
|
||||
</build>
|
||||
|
||||
<profiles>
|
||||
<profile>
|
||||
<id>auth-server-remote</id>
|
||||
<build>
|
||||
<plugins>
|
||||
<plugin>
|
||||
<artifactId>maven-resources-plugin</artifactId>
|
||||
<executions>
|
||||
<execution>
|
||||
<id>copy-keystore</id>
|
||||
<phase>process-resources</phase>
|
||||
<goals>
|
||||
<goal>copy-resources</goal>
|
||||
</goals>
|
||||
<configuration>
|
||||
<outputDirectory>${project.build.directory}/containers/auth-server-remote</outputDirectory>
|
||||
<resources>
|
||||
<resource>
|
||||
<directory>${common.resources}/keystore</directory>
|
||||
<includes>
|
||||
<include>keycloak.jks</include>
|
||||
<include>keycloak.truststore</include>
|
||||
<include>client.jks</include>
|
||||
<include>client-ca.jks</include>
|
||||
<include>test-user-cert-intermediary-ca.jks</include>
|
||||
<include>ca.crt</include>
|
||||
<include>client.crt</include>
|
||||
<include>client.key</include>
|
||||
<include>*.crl</include>
|
||||
<include>other_client.jks</include>
|
||||
<include>test-user-obb.jks</include>
|
||||
</includes>
|
||||
</resource>
|
||||
<resource>
|
||||
<directory>${common.resources}/pki/root/ca</directory>
|
||||
<includes>
|
||||
<include>certs/clients/test-user-san@localhost.cert.pem</include>
|
||||
<include>certs/clients/test-user@localhost.key.pem</include>
|
||||
</includes>
|
||||
</resource>
|
||||
</resources>
|
||||
</configuration>
|
||||
</execution>
|
||||
</executions>
|
||||
</plugin>
|
||||
</plugins>
|
||||
</build>
|
||||
</profile>
|
||||
|
||||
<profile>
|
||||
<id>jpa</id>
|
||||
<build>
|
||||
|
||||
@ -167,10 +167,6 @@ public class AuthServerTestEnricher {
|
||||
@ClassScoped
|
||||
private InstanceProducer<OAuthClient> oAuthClientProducer;
|
||||
|
||||
public static boolean isAuthServerRemote() {
|
||||
return AUTH_SERVER_CONTAINER.equals("auth-server-remote");
|
||||
}
|
||||
|
||||
public static boolean isAuthServerQuarkus() {
|
||||
return AUTH_SERVER_CONTAINER.equals("auth-server-quarkus");
|
||||
}
|
||||
@ -400,28 +396,6 @@ public class AuthServerTestEnricher {
|
||||
}
|
||||
}
|
||||
|
||||
public void deployProviders(@Observes(precedence = -1) AfterStart event) throws DeploymentException {
|
||||
if (isAuthServerRemote() && currentContainerName.contains("auth-server")) {
|
||||
this.testsuiteProvidersArchive = ShrinkWrap.create(ZipImporter.class, "testsuiteProviders.jar")
|
||||
.importFrom(Maven.configureResolverViaPlugin()
|
||||
.resolve("org.keycloak.testsuite:integration-arquillian-testsuite-providers")
|
||||
.withoutTransitivity()
|
||||
.asSingleFile()
|
||||
).as(JavaArchive.class)
|
||||
.addAsManifestResource("jboss-deployment-structure.xml");
|
||||
event.getDeployableContainer().deploy(testsuiteProvidersArchive);
|
||||
|
||||
this.testsuiteProvidersDeploymentArchive = ShrinkWrap.create(ZipImporter.class, "testsuiteProvidersDeployment.jar")
|
||||
.importFrom(Maven.configureResolverViaPlugin()
|
||||
.resolve("org.keycloak.testsuite:integration-arquillian-testsuite-providers-deployment")
|
||||
.withoutTransitivity()
|
||||
.asSingleFile()
|
||||
).as(JavaArchive.class)
|
||||
.addAsManifestResource("jboss-deployment-structure.xml");
|
||||
event.getDeployableContainer().deploy(testsuiteProvidersDeploymentArchive);
|
||||
}
|
||||
}
|
||||
|
||||
public void unDeployProviders(@Observes(precedence = 20) BeforeStop event) throws DeploymentException {
|
||||
if (testsuiteProvidersArchive != null) {
|
||||
event.getDeployableContainer().undeploy(testsuiteProvidersArchive);
|
||||
@ -553,43 +527,33 @@ public class AuthServerTestEnricher {
|
||||
}
|
||||
|
||||
public void restartAuthServer() throws Exception {
|
||||
if (isAuthServerRemote()) {
|
||||
try (OnlineManagementClient client = getManagementClient()) {
|
||||
int timeoutInSec = Integer.getInteger(System.getProperty("auth.server.jboss.startup.timeout"), 300);
|
||||
Administration administration = new Administration(client, timeoutInSec);
|
||||
administration.reload();
|
||||
}
|
||||
} else {
|
||||
stopContainerEvent.fire(new StopContainer(suiteContext.getAuthServerInfo().getArquillianContainer()));
|
||||
startContainerEvent.fire(new StartContainer(suiteContext.getAuthServerInfo().getArquillianContainer()));
|
||||
}
|
||||
stopContainerEvent.fire(new StopContainer(suiteContext.getAuthServerInfo().getArquillianContainer()));
|
||||
startContainerEvent.fire(new StartContainer(suiteContext.getAuthServerInfo().getArquillianContainer()));
|
||||
}
|
||||
|
||||
public void initializeTestContext(@Observes(precedence = 2) BeforeClass event) throws Exception {
|
||||
TestContext testContext = new TestContext(suiteContext, event.getTestClass().getJavaClass());
|
||||
testContextProducer.set(testContext);
|
||||
|
||||
if (!isAuthServerRemote()) {
|
||||
boolean wasUpdated = false;
|
||||
boolean wasUpdated = false;
|
||||
|
||||
if (event.getTestClass().isAnnotationPresent(SetDefaultProvider.class)) {
|
||||
SetDefaultProvider defaultProvider = event.getTestClass().getAnnotation(SetDefaultProvider.class);
|
||||
if (event.getTestClass().isAnnotationPresent(SetDefaultProvider.class)) {
|
||||
SetDefaultProvider defaultProvider = event.getTestClass().getAnnotation(SetDefaultProvider.class);
|
||||
|
||||
if (defaultProvider.beforeEnableFeature()) {
|
||||
SpiProvidersSwitchingUtils.addProviderDefaultValue(suiteContext, defaultProvider);
|
||||
wasUpdated = true;
|
||||
}
|
||||
}
|
||||
|
||||
if (event.getTestClass().isAnnotationPresent(EnableVault.class)) {
|
||||
VaultUtils.enableVault(suiteContext, event.getTestClass().getAnnotation(EnableVault.class).providerId());
|
||||
if (defaultProvider.beforeEnableFeature()) {
|
||||
SpiProvidersSwitchingUtils.addProviderDefaultValue(suiteContext, defaultProvider);
|
||||
wasUpdated = true;
|
||||
}
|
||||
}
|
||||
|
||||
if (wasUpdated) {
|
||||
restartAuthServer();
|
||||
testContext.reconnectAdminClient();
|
||||
}
|
||||
if (event.getTestClass().isAnnotationPresent(EnableVault.class)) {
|
||||
VaultUtils.enableVault(suiteContext, event.getTestClass().getAnnotation(EnableVault.class).providerId());
|
||||
wasUpdated = true;
|
||||
}
|
||||
|
||||
if (wasUpdated) {
|
||||
restartAuthServer();
|
||||
testContext.reconnectAdminClient();
|
||||
}
|
||||
}
|
||||
|
||||
@ -899,24 +863,21 @@ public class AuthServerTestEnricher {
|
||||
|
||||
removeTestRealms(testContext, adminClient);
|
||||
|
||||
if (!isAuthServerRemote()) {
|
||||
|
||||
boolean wasUpdated = false;
|
||||
boolean wasUpdated = false;
|
||||
|
||||
if (event.getTestClass().isAnnotationPresent(SetDefaultProvider.class)) {
|
||||
SpiProvidersSwitchingUtils.resetProvider(suiteContext, event.getTestClass().getAnnotation(SetDefaultProvider.class));
|
||||
wasUpdated = true;
|
||||
}
|
||||
if (event.getTestClass().isAnnotationPresent(SetDefaultProvider.class)) {
|
||||
SpiProvidersSwitchingUtils.resetProvider(suiteContext, event.getTestClass().getAnnotation(SetDefaultProvider.class));
|
||||
wasUpdated = true;
|
||||
}
|
||||
|
||||
if (event.getTestClass().isAnnotationPresent(EnableVault.class) && !isAuthServerQuarkus()) {
|
||||
VaultUtils.disableVault(suiteContext, event.getTestClass().getAnnotation(EnableVault.class).providerId());
|
||||
wasUpdated = true;
|
||||
}
|
||||
if (event.getTestClass().isAnnotationPresent(EnableVault.class) && !isAuthServerQuarkus()) {
|
||||
VaultUtils.disableVault(suiteContext, event.getTestClass().getAnnotation(EnableVault.class).providerId());
|
||||
wasUpdated = true;
|
||||
}
|
||||
|
||||
if (wasUpdated) {
|
||||
restartAuthServer();
|
||||
testContext.reconnectAdminClient();
|
||||
}
|
||||
if (wasUpdated) {
|
||||
restartAuthServer();
|
||||
testContext.reconnectAdminClient();
|
||||
}
|
||||
|
||||
if (adminClient != null) {
|
||||
|
||||
@ -26,8 +26,8 @@ import java.lang.annotation.Target;
|
||||
/**
|
||||
* Serves for excluding test classes or methods from running in some specific auth server container
|
||||
*
|
||||
* for example annotation @AuthServerContainerExclude(AuthServer.REMOTE) on a test class makes tests
|
||||
* in the class NOT running when -Pauth-server-remote is used
|
||||
* for example annotation @AuthServerContainerExclude(AuthServer.QUARKUS) on a test class makes tests
|
||||
* in the class NOT running when -Pauth-server-quarkus is used
|
||||
*
|
||||
* The annotation has @Inherited property this means that annotation parent class will exclude all child class
|
||||
*
|
||||
@ -41,8 +41,8 @@ public @interface AuthServerContainerExclude {
|
||||
AuthServer[] value();
|
||||
String details() default "";
|
||||
|
||||
public enum AuthServer {
|
||||
REMOTE,
|
||||
enum AuthServer {
|
||||
UNDERTOW,
|
||||
QUARKUS
|
||||
}
|
||||
}
|
||||
|
||||
@ -29,7 +29,6 @@ import org.jboss.arquillian.core.api.Event;
|
||||
import org.jboss.arquillian.core.api.Injector;
|
||||
import org.jboss.arquillian.core.api.Instance;
|
||||
import org.jboss.arquillian.core.api.annotation.Inject;
|
||||
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
|
||||
|
||||
/**
|
||||
* Overrides a condition that container cannot be in manual mode, and deploys the deployment
|
||||
@ -53,7 +52,6 @@ public class KeycloakContainerDeployController extends ContainerDeployController
|
||||
|
||||
@Override
|
||||
public void perform(Container container, Deployment deployment) throws Exception {
|
||||
if (runOnServerDeploymentOnRemote(deployment)) return;
|
||||
if (container.getState().equals(Container.State.STARTED)) {
|
||||
event.fire(new DeployDeployment(container, deployment));
|
||||
}
|
||||
@ -81,10 +79,4 @@ public class KeycloakContainerDeployController extends ContainerDeployController
|
||||
operation.perform(container, deployment);
|
||||
}
|
||||
}
|
||||
|
||||
//do not deploy run-on-server-classes.war into server in remote mode
|
||||
private boolean runOnServerDeploymentOnRemote(Deployment deployment) {
|
||||
return AuthServerTestEnricher.isAuthServerRemote() &&
|
||||
deployment.getDescription().getArchive().getName().equals("run-on-server-classes.war");
|
||||
}
|
||||
}
|
||||
|
||||
@ -55,7 +55,6 @@ import java.io.IOException;
|
||||
import java.util.Arrays;
|
||||
|
||||
import org.jboss.shrinkwrap.api.Archive;
|
||||
import org.keycloak.testsuite.util.ContainerAssume;
|
||||
|
||||
/**
|
||||
* Changes behaviour of original ContainerEventController to stop manual containers
|
||||
@ -97,10 +96,6 @@ public class KeycloakContainerEventsController extends ContainerEventController
|
||||
@Override
|
||||
public void execute(BeforeClass event) {
|
||||
if (event.getTestClass().isAnnotationPresent(RestartContainer.class)) {
|
||||
|
||||
// stop executing the test - remote container cannot be restarted
|
||||
ContainerAssume.assumeNotAuthServerRemote();
|
||||
|
||||
RestartContainer restartContainer = event.getTestClass().getAnnotation(RestartContainer.class);
|
||||
|
||||
beforeOriginalContainerStop(restartContainer);
|
||||
|
||||
@ -21,10 +21,7 @@ import org.keycloak.testsuite.arquillian.annotation.EnableFeatures;
|
||||
import org.keycloak.testsuite.arquillian.annotation.SetDefaultProvider;
|
||||
import org.keycloak.testsuite.client.KeycloakTestingClient;
|
||||
import org.keycloak.testsuite.util.SpiProvidersSwitchingUtils;
|
||||
import org.wildfly.extras.creaper.core.online.OnlineManagementClient;
|
||||
import org.wildfly.extras.creaper.core.online.operations.admin.Administration;
|
||||
|
||||
import java.lang.annotation.Annotation;
|
||||
import java.lang.reflect.AnnotatedElement;
|
||||
import java.util.Arrays;
|
||||
import java.util.HashSet;
|
||||
@ -35,8 +32,6 @@ import java.util.stream.Collectors;
|
||||
|
||||
import static org.hamcrest.CoreMatchers.is;
|
||||
import static org.junit.Assert.assertThat;
|
||||
import static org.keycloak.testsuite.arquillian.AuthServerTestEnricher.getManagementClient;
|
||||
import static org.keycloak.testsuite.arquillian.AuthServerTestEnricher.isAuthServerRemote;
|
||||
|
||||
/**
|
||||
* @author mhajas
|
||||
@ -145,17 +140,9 @@ public class KeycloakContainerFeaturesController {
|
||||
}
|
||||
}
|
||||
|
||||
public void restartAuthServer() throws Exception {
|
||||
if (isAuthServerRemote()) {
|
||||
try (OnlineManagementClient client = getManagementClient()) {
|
||||
int timeoutInSec = Integer.getInteger(System.getProperty("auth.server.jboss.startup.timeout"), 300);
|
||||
Administration administration = new Administration(client, timeoutInSec);
|
||||
administration.reload();
|
||||
}
|
||||
} else {
|
||||
stopContainerEvent.fire(new StopContainer(suiteContextInstance.get().getAuthServerInfo().getArquillianContainer()));
|
||||
startContainerEvent.fire(new StartContainer(suiteContextInstance.get().getAuthServerInfo().getArquillianContainer()));
|
||||
}
|
||||
public void restartAuthServer() {
|
||||
stopContainerEvent.fire(new StopContainer(suiteContextInstance.get().getAuthServerInfo().getArquillianContainer()));
|
||||
startContainerEvent.fire(new StartContainer(suiteContextInstance.get().getAuthServerInfo().getArquillianContainer()));
|
||||
}
|
||||
|
||||
private void updateFeatures(Set<UpdateFeature> updateFeatures) throws Exception {
|
||||
|
||||
@ -47,10 +47,6 @@ public class AuthServerExcludeExecutionDecider implements TestExecutionDecider {
|
||||
|
||||
if (method.isAnnotationPresent(AuthServerContainerExclude.class)) {
|
||||
List<AuthServer> excluded = Arrays.asList(method.getAnnotation(AuthServerContainerExclude.class).value());
|
||||
|
||||
if (AuthServerTestEnricher.isAuthServerRemote() && excluded.contains(AuthServer.REMOTE)) {
|
||||
return ExecutionDecision.dontExecute("Excluded by @AuthServerContainerExclude.");
|
||||
}
|
||||
|
||||
if (AuthServerTestEnricher.isAuthServerQuarkus() && excluded.contains(AuthServer.QUARKUS)) {
|
||||
return ExecutionDecision.dontExecute("Excluded by @AuthServerContainerExclude.");
|
||||
@ -58,10 +54,6 @@ public class AuthServerExcludeExecutionDecider implements TestExecutionDecider {
|
||||
} else { //class
|
||||
if (testContext.getTestClass().isAnnotationPresent(AuthServerContainerExclude.class)) {
|
||||
List<AuthServer> excluded = Arrays.asList(((AuthServerContainerExclude) testContext.getTestClass().getAnnotation(AuthServerContainerExclude.class)).value());
|
||||
|
||||
if (AuthServerTestEnricher.isAuthServerRemote() && excluded.contains(AuthServer.REMOTE)) {
|
||||
return ExecutionDecision.dontExecute("Excluded by @AuthServerContainerExclude.");
|
||||
}
|
||||
|
||||
if (AuthServerTestEnricher.isAuthServerQuarkus() && excluded.contains(AuthServer.QUARKUS)) {
|
||||
return ExecutionDecision.dontExecute("Excluded by @AuthServerContainerExclude.");
|
||||
|
||||
@ -36,12 +36,6 @@ public class ContainerAssume {
|
||||
Assume.assumeTrue("Only works on auth-server-undertow",
|
||||
AuthServerTestEnricher.AUTH_SERVER_CONTAINER.equals(AuthServerTestEnricher.AUTH_SERVER_CONTAINER_DEFAULT));
|
||||
}
|
||||
|
||||
|
||||
public static void assumeNotAuthServerRemote() {
|
||||
Assume.assumeFalse("Doesn't work on auth-server-remote",
|
||||
AuthServerTestEnricher.AUTH_SERVER_CONTAINER.equals("auth-server-remote"));
|
||||
}
|
||||
|
||||
public static void assumeClusteredContainer() {
|
||||
Assume.assumeTrue(
|
||||
|
||||
@ -46,7 +46,6 @@ import org.keycloak.testsuite.AbstractTestRealmKeycloakTest;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.DisableFeature;
|
||||
import org.keycloak.testsuite.drone.Different;
|
||||
import org.keycloak.testsuite.pages.AccountApplicationsPage;
|
||||
@ -101,8 +100,6 @@ import static org.junit.Assert.assertTrue;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.AUTH_SERVER_SSL_REQUIRED;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.getAuthServerContextRoot;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
* @author Stan Silvert ssilvert@redhat.com (C) 2016 Red Hat Inc.
|
||||
@ -1308,7 +1305,7 @@ public class AccountFormServiceTest extends AbstractTestRealmKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // we need to do domain name -> ip address to make this test work in remote testing
|
||||
// we need to do domain name -> ip address to make this test work in remote testing
|
||||
public void sessions() {
|
||||
loginPage.open();
|
||||
loginPage.clickRegister();
|
||||
@ -1371,7 +1368,7 @@ public class AccountFormServiceTest extends AbstractTestRealmKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void applicationsVisibilityNoScopesNoConsent() throws Exception {
|
||||
try (ClientAttributeUpdater cau = ClientAttributeUpdater.forClient(adminClient, REALM_NAME, ROOT_URL_CLIENT)
|
||||
.setConsentRequired(false)
|
||||
@ -1399,7 +1396,7 @@ public class AccountFormServiceTest extends AbstractTestRealmKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void applicationsVisibilityNoScopesAndConsent() throws Exception {
|
||||
try (ClientAttributeUpdater cau = ClientAttributeUpdater.forClient(adminClient, REALM_NAME, ROOT_URL_CLIENT)
|
||||
.setConsentRequired(true)
|
||||
@ -1419,7 +1416,7 @@ public class AccountFormServiceTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
// More tests (including revoke) are in OAuthGrantTest and OfflineTokenTest
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void applications() {
|
||||
applicationsPage.open();
|
||||
loginPage.login("test-user@localhost", "password");
|
||||
|
||||
@ -32,9 +32,6 @@ import org.openqa.selenium.JavascriptExecutor;
|
||||
|
||||
import java.io.IOException;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
import static org.hamcrest.CoreMatchers.containsString;
|
||||
import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertThat;
|
||||
@ -42,7 +39,6 @@ import static org.junit.Assert.assertThat;
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class AccountRestServiceCorsTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
private static final String VALID_CORS_URL = "http://localtest.me:8180/auth";
|
||||
|
||||
@ -31,18 +31,15 @@ import org.keycloak.representations.account.UserRepresentation;
|
||||
import org.keycloak.representations.idm.ErrorRepresentation;
|
||||
import org.keycloak.services.messages.Messages;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
|
||||
import static org.hamcrest.Matchers.contains;
|
||||
import static org.hamcrest.Matchers.not;
|
||||
import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mposolda@redhat.com">Marek Posolda</a>
|
||||
*/
|
||||
@AuthServerContainerExclude({REMOTE}) // TODO: Enable this for quarkus and hopefully for remote as well...
|
||||
public class AccountRestServiceReadOnlyAttributesTest extends AbstractRestServiceTest {
|
||||
|
||||
private static final Logger logger = Logger.getLogger(AccountRestServiceReadOnlyAttributesTest.class);
|
||||
|
||||
@ -62,8 +62,6 @@ import org.keycloak.services.util.ResolveRelative;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.admin.authentication.AbstractAuthenticationTest;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
import org.keycloak.testsuite.util.TokenUtil;
|
||||
import org.keycloak.testsuite.util.UserBuilder;
|
||||
@ -92,7 +90,6 @@ import static org.junit.Assert.assertTrue;
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class AccountRestServiceTest extends AbstractRestServiceTest {
|
||||
|
||||
@Rule
|
||||
|
||||
@ -39,7 +39,6 @@ import org.keycloak.events.EventType;
|
||||
import org.keycloak.representations.account.UserProfileAttributeMetadata;
|
||||
import org.keycloak.representations.account.UserRepresentation;
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.forms.VerifyProfileTest;
|
||||
import org.keycloak.userprofile.UserProfileContext;
|
||||
@ -50,7 +49,6 @@ import org.keycloak.userprofile.UserProfileContext;
|
||||
*
|
||||
*/
|
||||
@EnableFeature(value = Profile.Feature.DECLARATIVE_USER_PROFILE)
|
||||
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
|
||||
public class AccountRestServiceWithUserProfileTest extends AccountRestServiceTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -52,8 +52,6 @@ import org.junit.FixMethodOrder;
|
||||
import org.junit.runners.MethodSorters;
|
||||
import org.keycloak.representations.account.AccountLinkUriRepresentation;
|
||||
import org.keycloak.representations.account.LinkedAccountRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:ssilvert@redhat.com">Stan Silvert</a>
|
||||
@ -147,7 +145,7 @@ public class LinkedAccountsRestServiceTest extends AbstractTestRealmKeycloakTest
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void testBuildLinkedAccountUri() throws IOException {
|
||||
AccountLinkUriRepresentation rep = SimpleHttp.doGet(getAccountUrl("linked-accounts/github?redirectUri=phonyUri"), client)
|
||||
.auth(tokenUtil.getToken())
|
||||
|
||||
@ -38,8 +38,6 @@ import org.keycloak.representations.account.ClientRepresentation;
|
||||
import org.keycloak.representations.account.DeviceRepresentation;
|
||||
import org.keycloak.representations.account.SessionRepresentation;
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.ContainerAssume;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
@ -125,7 +123,6 @@ public class SessionRestServiceTest extends AbstractRestServiceTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testGetSessions() throws Exception {
|
||||
oauth.setDriver(secondBrowser);
|
||||
codeGrant("public-client-0");
|
||||
@ -145,7 +142,6 @@ public class SessionRestServiceTest extends AbstractRestServiceTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testGetDevicesResponse() throws Exception {
|
||||
assumeTrue("Browser must be htmlunit. Otherwise we are not able to set desired BrowserHeaders",
|
||||
System.getProperty("browser").equals("htmlUnit"));
|
||||
@ -355,7 +351,6 @@ public class SessionRestServiceTest extends AbstractRestServiceTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testNullOrEmptyUserAgent() throws Exception {
|
||||
assumeTrue("Browser must be htmlunit. Otherwise we are not able to set desired BrowserHeaders",
|
||||
System.getProperty("browser").equals("htmlUnit"));
|
||||
|
||||
@ -60,8 +60,6 @@ import static org.keycloak.authentication.authenticators.browser.ConditionalOtpF
|
||||
import static org.keycloak.models.UserModel.RequiredAction.CONFIGURE_TOTP;
|
||||
import static org.keycloak.representations.idm.CredentialRepresentation.PASSWORD;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.AUTH_SERVER_PORT;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.testsuite.util.URLAssert.assertCurrentUrlStartsWith;
|
||||
|
||||
/**
|
||||
@ -188,7 +186,7 @@ public class CustomAuthFlowOTPTest extends AbstractCustomAccountManagementTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void conditionalOTPNoDefault() {
|
||||
configureRequiredActions();
|
||||
configureOTP();
|
||||
@ -240,7 +238,7 @@ public class CustomAuthFlowOTPTest extends AbstractCustomAccountManagementTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void conditionalOTPNoDefaultWithChecks() {
|
||||
configureRequiredActions();
|
||||
configureOTP();
|
||||
@ -457,7 +455,7 @@ public class CustomAuthFlowOTPTest extends AbstractCustomAccountManagementTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void conditionalOTPRequestHeaderSkip() {
|
||||
//prepare config - request header skip, default to force
|
||||
Map<String, String> config = new HashMap<>();
|
||||
@ -474,7 +472,7 @@ public class CustomAuthFlowOTPTest extends AbstractCustomAccountManagementTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void conditionalOTPRequestHeaderForce() {
|
||||
//prepare config - equest header force, default to skip
|
||||
Map<String, String> config = new HashMap<>();
|
||||
|
||||
@ -25,8 +25,6 @@ import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.representations.idm.RequiredActionProviderRepresentation;
|
||||
import org.keycloak.testsuite.AbstractTestRealmKeycloakTest;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.pages.AppPage;
|
||||
import org.keycloak.testsuite.pages.LoginPage;
|
||||
|
||||
@ -36,7 +34,6 @@ import static org.junit.Assert.assertTrue;
|
||||
/**
|
||||
* @author <a href="mailto:wadahiro@gmail.com">Hiroyuki Wada</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class AppInitiatedActionTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -19,7 +19,6 @@ package org.keycloak.testsuite.actions;
|
||||
import org.junit.Before;
|
||||
import org.keycloak.common.Profile;
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.forms.VerifyProfileTest;
|
||||
|
||||
@ -30,7 +29,6 @@ import org.keycloak.testsuite.forms.VerifyProfileTest;
|
||||
*
|
||||
*/
|
||||
@EnableFeature(value = Profile.Feature.DECLARATIVE_USER_PROFILE)
|
||||
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
|
||||
public class AppInitiatedActionUpdateProfileWithUserProfileTest extends AppInitiatedActionUpdateProfileTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -77,13 +77,10 @@ import org.openqa.selenium.WebElement;
|
||||
import static org.hamcrest.MatcherAssert.assertThat;
|
||||
import static org.hamcrest.core.Is.is;
|
||||
import static org.junit.Assert.assertEquals;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
@DisableFeature(value = Profile.Feature.ACCOUNT2, skipRestart = true) // TODO remove this (KEYCLOAK-16228)
|
||||
public class RequiredActionEmailVerificationTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
|
||||
@ -37,8 +37,6 @@ import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.testsuite.AbstractTestRealmKeycloakTest;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.pages.AppPage;
|
||||
import org.keycloak.testsuite.pages.AppPage.RequestType;
|
||||
import org.keycloak.testsuite.pages.LoginConfigTotpPage;
|
||||
@ -51,7 +49,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:wadahiro@gmail.com">Hiroyuki Wada</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class RequiredActionPriorityTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -44,7 +44,6 @@ import org.keycloak.events.EventType;
|
||||
import org.keycloak.representations.idm.ClientRepresentation;
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.forms.RegisterWithUserProfileTest;
|
||||
import org.keycloak.testsuite.forms.VerifyProfileTest;
|
||||
@ -59,7 +58,6 @@ import org.openqa.selenium.By;
|
||||
*
|
||||
*/
|
||||
@EnableFeature(value = Profile.Feature.DECLARATIVE_USER_PROFILE)
|
||||
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
|
||||
public class RequiredActionUpdateProfileWithUserProfileTest extends RequiredActionUpdateProfileTest {
|
||||
|
||||
protected static final String PASSWORD = "password";
|
||||
|
||||
@ -30,7 +30,6 @@ import org.keycloak.testsuite.AbstractAuthTest;
|
||||
import org.keycloak.testsuite.adapter.page.AppServerContextRoot;
|
||||
import org.keycloak.testsuite.arquillian.SuiteContext;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AppServerContainer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.util.ServerURLs;
|
||||
|
||||
import java.io.IOException;
|
||||
@ -44,7 +43,6 @@ import static org.keycloak.testsuite.arquillian.AppServerTestEnricher.CURRENT_AP
|
||||
import static org.keycloak.testsuite.arquillian.AppServerTestEnricher.enableHTTPSForAppServer;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.AUTH_SERVER_PORT;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.AUTH_SERVER_SSL_REQUIRED;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* <code>@AppServerContainer</code> is needed for stopping recursion in
|
||||
@ -53,7 +51,6 @@ import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.A
|
||||
* @author tkyjovsk
|
||||
*/
|
||||
@AppServerContainer("")
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public abstract class AbstractAdapterTest extends AbstractAuthTest {
|
||||
|
||||
@Page
|
||||
|
||||
@ -23,7 +23,6 @@ import org.jboss.arquillian.test.api.ArquillianResource;
|
||||
import org.jboss.shrinkwrap.api.spec.WebArchive;
|
||||
import org.junit.Assert;
|
||||
import org.junit.Before;
|
||||
import org.junit.BeforeClass;
|
||||
import org.junit.Test;
|
||||
import org.keycloak.OAuth2Constants;
|
||||
import org.keycloak.admin.client.resource.RealmResource;
|
||||
@ -66,7 +65,6 @@ import org.keycloak.testsuite.pages.ErrorPage;
|
||||
import org.keycloak.testsuite.pages.LoginPage;
|
||||
import org.keycloak.testsuite.pages.LoginUpdateProfilePage;
|
||||
import org.keycloak.testsuite.util.AdminClientUtil;
|
||||
import org.keycloak.testsuite.util.ContainerAssume;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
import org.keycloak.testsuite.util.WaitUtils;
|
||||
import org.keycloak.testsuite.utils.arquillian.ContainerConstants;
|
||||
@ -499,8 +497,6 @@ public class BrokerLinkAndTokenExchangeTest extends AbstractServletsAdapterTest
|
||||
@Test
|
||||
@UncaughtServerErrorExpected
|
||||
public void testExportImport() throws Exception {
|
||||
ContainerAssume.assumeNotAuthServerRemote();
|
||||
|
||||
testExternalExchange();
|
||||
|
||||
try {
|
||||
|
||||
@ -33,14 +33,10 @@ import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
*
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class AttackDetectionResourceTest extends AbstractAdminTest {
|
||||
|
||||
@ArquillianResource
|
||||
|
||||
@ -33,8 +33,6 @@ import org.keycloak.representations.idm.authorization.ResourceServerRepresentati
|
||||
import org.keycloak.representations.idm.authorization.RolePolicyRepresentation;
|
||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||
import org.keycloak.testsuite.ProfileAssume;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
import org.keycloak.util.JsonSerialization;
|
||||
@ -48,7 +46,6 @@ import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||
* @version $Revision: 1 $
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class AuthzCleanupTest extends AbstractKeycloakTest {
|
||||
|
||||
@BeforeClass
|
||||
|
||||
@ -61,8 +61,6 @@ import org.keycloak.representations.idm.RoleRepresentation;
|
||||
import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.representations.idm.UserSessionRepresentation;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.AdminEventPaths;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.CredentialBuilder;
|
||||
@ -92,7 +90,6 @@ import javax.ws.rs.core.Response;
|
||||
public class ClientTest extends AbstractAdminTest {
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void getClients() {
|
||||
Assert.assertNames(realm.clients().findAll(), "account", "account-console", "realm-management", "security-admin-console", "broker", Constants.ADMIN_CLI_CLIENT_ID);
|
||||
}
|
||||
@ -138,7 +135,6 @@ public class ClientTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void createClientVerifyWithSecret() {
|
||||
String id = createClientNonPublic().getId();
|
||||
|
||||
@ -149,7 +145,6 @@ public class ClientTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void createClientVerify() {
|
||||
String id = createClient().getId();
|
||||
|
||||
@ -342,7 +337,6 @@ public class ClientTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void getAllClientsSearchAndPagination() {
|
||||
Set<String> ids = new HashSet<>();
|
||||
try {
|
||||
@ -450,7 +444,6 @@ public class ClientTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void serviceAccount() {
|
||||
Response response = realm.clients().create(ClientBuilder.create().clientId("serviceClient").serviceAccount().build());
|
||||
String id = ApiUtil.getCreatedId(response);
|
||||
@ -823,7 +816,6 @@ public class ClientTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void updateClientWithProtocolMapper() {
|
||||
ClientRepresentation rep = new ClientRepresentation();
|
||||
rep.setClientId("my-app");
|
||||
|
||||
@ -40,15 +40,12 @@ import org.apache.commons.lang3.concurrent.BasicThreadFactory;
|
||||
import org.hamcrest.Matchers;
|
||||
import static org.hamcrest.Matchers.contains;
|
||||
import static org.junit.Assert.*;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.hamcrest.Matchers.containsString;
|
||||
import static org.hamcrest.Matchers.not;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ComponentsTest extends AbstractAdminTest {
|
||||
|
||||
private ComponentsResource components;
|
||||
|
||||
@ -61,8 +61,6 @@ import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;
|
||||
import static org.keycloak.testsuite.admin.ApiUtil.createUserWithAdminClient;
|
||||
import static org.keycloak.testsuite.admin.ApiUtil.findClientByClientId;
|
||||
import static org.keycloak.testsuite.admin.ApiUtil.resetUserPassword;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
import org.keycloak.testsuite.util.OAuthClient.AccessTokenResponse;
|
||||
import org.keycloak.testsuite.util.OAuthClient.AuthorizationEndpointResponse;
|
||||
@ -269,7 +267,6 @@ public class ConsentsTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testConsents() {
|
||||
driver.navigate().to(getAccountUrl(consumerRealmName()));
|
||||
|
||||
@ -347,7 +344,6 @@ public class ConsentsTest extends AbstractKeycloakTest {
|
||||
* KEYCLOAK-18954
|
||||
*/
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testRetrieveConsentsForUserWithClientsWithGrantedOfflineAccess() throws Exception {
|
||||
|
||||
RealmResource providerRealm = adminClient.realm(providerRealmName());
|
||||
|
||||
@ -4,7 +4,6 @@ import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertFalse;
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import static org.junit.Assert.fail;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
import static org.keycloak.testsuite.forms.VerifyProfileTest.PERMISSIONS_ALL;
|
||||
import static org.keycloak.testsuite.forms.VerifyProfileTest.enableDynamicUserProfile;
|
||||
import static org.keycloak.testsuite.forms.VerifyProfileTest.setUserProfileConfiguration;
|
||||
@ -27,7 +26,6 @@ import org.keycloak.admin.client.resource.UserResource;
|
||||
import org.keycloak.common.Profile;
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.userprofile.DeclarativeUserProfileProvider;
|
||||
import org.keycloak.userprofile.UserProfileProvider;
|
||||
@ -36,7 +34,6 @@ import org.keycloak.userprofile.UserProfileProvider;
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@EnableFeature(value = Profile.Feature.DECLARATIVE_USER_PROFILE)
|
||||
@AuthServerContainerExclude(REMOTE)
|
||||
public class DeclarativeUserTest extends AbstractAdminTest {
|
||||
|
||||
@Before
|
||||
|
||||
@ -73,8 +73,6 @@ import static org.hamcrest.Matchers.hasItem;
|
||||
import static org.junit.Assert.assertThat;
|
||||
|
||||
import static org.keycloak.testsuite.admin.ImpersonationDisabledTest.IMPERSONATION_DISABLED;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.getAuthServerContextRoot;
|
||||
|
||||
@ -421,7 +419,6 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testRestEvaluation() throws Exception {
|
||||
testingClient.server().run(FineGrainAdminUnitTest::setupPolices);
|
||||
testingClient.server().run(FineGrainAdminUnitTest::setupUsers);
|
||||
@ -698,7 +695,6 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testMasterRealm() throws Exception {
|
||||
// test that master realm can still perform operations when policies are in place
|
||||
//
|
||||
@ -777,7 +773,6 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
|
||||
// KEYCLOAK-5152
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testRealmWithComposites() throws Exception {
|
||||
testingClient.server().run(FineGrainAdminUnitTest::setup5152);
|
||||
|
||||
@ -840,7 +835,6 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testRemoveCleanup() throws Exception {
|
||||
testingClient.server().run(FineGrainAdminUnitTest::setupDeleteTest);
|
||||
testingClient.server().run(FineGrainAdminUnitTest::invokeDelete);
|
||||
@ -938,7 +932,7 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
|
||||
@Test
|
||||
@UncaughtServerErrorExpected
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
public void testTokenExchangeDisabled() throws Exception {
|
||||
checkTokenExchange(false);
|
||||
}
|
||||
@ -950,7 +944,7 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
*/
|
||||
@Test
|
||||
@UncaughtServerErrorExpected
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
|
||||
@EnableFeature(value = Profile.Feature.TOKEN_EXCHANGE, skipRestart = true)
|
||||
public void testWithTokenExchange() throws Exception {
|
||||
String exchanged = checkTokenExchange(true);
|
||||
@ -962,7 +956,6 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testUserPagination() {
|
||||
testingClient.server().run(session -> {
|
||||
RealmModel realm = session.realms().getRealmByName("test");
|
||||
@ -1058,7 +1051,6 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testClientsSearch() {
|
||||
testingClient.server().run(session -> {
|
||||
RealmModel realm = session.realms().getRealmByName("test");
|
||||
@ -1238,7 +1230,6 @@ public class FineGrainAdminUnitTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testClientsSearchAfterFirstPage() {
|
||||
testingClient.server().run(session -> {
|
||||
RealmModel realm = session.realms().getRealmByName("test");
|
||||
|
||||
@ -22,7 +22,6 @@ import org.junit.Test;
|
||||
import org.keycloak.admin.client.resource.IdentityProviderResource;
|
||||
import org.keycloak.broker.saml.SAMLIdentityProviderConfig;
|
||||
import org.keycloak.common.enums.SslRequired;
|
||||
import org.keycloak.dom.saml.v2.assertion.AttributeType;
|
||||
import org.keycloak.dom.saml.v2.metadata.EndpointType;
|
||||
import org.keycloak.dom.saml.v2.metadata.EntityDescriptorType;
|
||||
import org.keycloak.dom.saml.v2.metadata.IndexedEndpointType;
|
||||
@ -93,9 +92,6 @@ import static org.junit.Assert.assertThat;
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import static org.junit.Assert.fail;
|
||||
import static org.keycloak.saml.common.constants.JBossSAMLURIConstants.XMLDSIG_NSURI;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.AUTH_SERVER_SSL_REQUIRED;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
@ -178,7 +174,6 @@ public class IdentityProviderTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(REMOTE)
|
||||
public void failCreateInvalidUrl() throws Exception {
|
||||
try (AutoCloseable c = new RealmAttributeUpdater(realmsResouce().realm("test"))
|
||||
.updateWith(r -> r.setSslRequired(SslRequired.ALL.name()))
|
||||
|
||||
@ -42,15 +42,12 @@ import java.util.List;
|
||||
|
||||
import static org.hamcrest.Matchers.equalTo;
|
||||
import static org.hamcrest.Matchers.is;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||
* @version $Revision: 1 $
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class IllegalAdminUpgradeTest extends AbstractKeycloakTest {
|
||||
|
||||
public static final String CLIENT_NAME = "application";
|
||||
|
||||
@ -54,8 +54,6 @@ import org.keycloak.representations.idm.*;
|
||||
import org.keycloak.services.managers.AuthenticationManager;
|
||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.auth.page.AuthRealm;
|
||||
import org.keycloak.testsuite.pages.AppPage;
|
||||
import org.keycloak.testsuite.pages.LoginPage;
|
||||
@ -79,7 +77,6 @@ import static org.keycloak.testsuite.util.ServerURLs.getAuthServerContextRoot;
|
||||
*
|
||||
* @author <a href="mailto:bburke@redhat.com">Bill Burke</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ImpersonationTest extends AbstractKeycloakTest {
|
||||
|
||||
static class UserSessionNotesHolder {
|
||||
|
||||
@ -27,7 +27,6 @@ import org.keycloak.events.admin.ResourceType;
|
||||
import org.keycloak.representations.idm.ClientInitialAccessCreatePresentation;
|
||||
import org.keycloak.representations.idm.ClientInitialAccessPresentation;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.util.AdminEventPaths;
|
||||
|
||||
import java.util.List;
|
||||
@ -40,7 +39,6 @@ import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertNotNull;
|
||||
import static org.junit.Assert.assertNull;
|
||||
import static org.junit.Assert.assertThat;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
@ -55,7 +53,6 @@ public class InitialAccessTokenResourceTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // Time difference is possible on remote server
|
||||
public void testInitialAccessTokens() {
|
||||
ClientInitialAccessCreatePresentation rep = new ClientInitialAccessCreatePresentation();
|
||||
rep.setCount(2);
|
||||
|
||||
@ -36,9 +36,6 @@ import java.util.Map;
|
||||
import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.fail;
|
||||
import static org.keycloak.representations.idm.ComponentRepresentation.SECRET_VALUE;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.util.JsonSerialization.writeValueAsPrettyString;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:bruno@abstractj.org">Bruno Oliveira</a>
|
||||
@ -96,7 +93,6 @@ public class SMTPConnectionTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testWithProperSettings() throws Exception {
|
||||
Response response = realm.testSMTPConnection(settings("127.0.0.1", "3025", "auto@keycloak.org", null, null, null,
|
||||
null, null));
|
||||
@ -112,7 +108,6 @@ public class SMTPConnectionTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testWithAuthEnabledValidCredentials() throws Exception {
|
||||
greenMailRule.credentials("admin@localhost", "admin");
|
||||
Response response = realm.testSMTPConnection(settings("127.0.0.1", "3025", "auto@keycloak.org", "true", null, null,
|
||||
@ -121,7 +116,6 @@ public class SMTPConnectionTest extends AbstractKeycloakTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testAuthEnabledAndSavedCredentials() throws Exception {
|
||||
RealmRepresentation realmRep = realm.toRepresentation();
|
||||
Map<String, String> oldSmtp = realmRep.getSmtpServer();
|
||||
|
||||
@ -1,14 +1,11 @@
|
||||
package org.keycloak.testsuite.admin;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableVault;
|
||||
|
||||
/**
|
||||
* @author Martin Kanis <mkanis@redhat.com>
|
||||
*/
|
||||
@EnableVault
|
||||
@AuthServerContainerExclude({AuthServer.REMOTE})
|
||||
public class SMTPConnectionVaultTest extends SMTPConnectionTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -29,13 +29,10 @@ import java.util.Map;
|
||||
|
||||
import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertNotNull;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ServerInfoTest extends AbstractKeycloakTest {
|
||||
|
||||
@Test
|
||||
|
||||
@ -33,14 +33,11 @@ import org.keycloak.testsuite.util.LDAPRule;
|
||||
|
||||
import javax.ws.rs.BadRequestException;
|
||||
import javax.ws.rs.core.Response;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mposolda@redhat.com">Marek Posolda</a>
|
||||
*/
|
||||
@EnableVault
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class UserFederationLdapConnectionTest extends AbstractAdminTest {
|
||||
|
||||
@ClassRule
|
||||
|
||||
@ -43,8 +43,6 @@ import org.keycloak.testsuite.util.AdminEventPaths;
|
||||
import javax.ws.rs.BadRequestException;
|
||||
import javax.ws.rs.core.Response;
|
||||
import java.util.List;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mposolda@redhat.com">Marek Posolda</a>
|
||||
@ -85,7 +83,6 @@ public class UserStorageRestTest extends AbstractAdminTest {
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testKerberosAuthenticatorEnabledAutomatically() {
|
||||
// Assert kerberos authenticator DISABLED
|
||||
AuthenticationExecutionInfoRepresentation kerberosExecution = findKerberosExecution();
|
||||
|
||||
@ -63,8 +63,6 @@ import org.keycloak.representations.idm.RoleRepresentation;
|
||||
import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.services.resources.RealmsResource;
|
||||
import org.keycloak.storage.UserStorageProvider;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.DisableFeature;
|
||||
import org.keycloak.testsuite.federation.DummyUserFederationProviderFactory;
|
||||
import org.keycloak.testsuite.page.LoginPasswordUpdatePage;
|
||||
@ -120,7 +118,6 @@ import static org.junit.Assert.assertNull;
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import static org.junit.Assert.fail;
|
||||
import static org.keycloak.testsuite.Assert.assertNames;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
||||
|
||||
/**
|
||||
@ -298,7 +295,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void createUserWithHashedCredentials() {
|
||||
UserRepresentation user = new UserRepresentation();
|
||||
user.setUsername("user_creds");
|
||||
@ -415,7 +411,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void createUserWithRawCredentials() {
|
||||
UserRepresentation user = new UserRepresentation();
|
||||
user.setUsername("user_rawpw");
|
||||
@ -1450,7 +1445,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude({REMOTE}) // TODO: Enable for remote
|
||||
public void updateUserWithReadOnlyAttributes() {
|
||||
// Admin is able to update "usercertificate" attribute
|
||||
UserRepresentation user1 = new UserRepresentation();
|
||||
@ -1571,7 +1565,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailSuccess() throws IOException {
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
userRep.setEnabled(true);
|
||||
@ -1619,7 +1612,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testEmailLinkBasedOnRealmFrontEndUrl() throws Exception {
|
||||
try {
|
||||
updateRealmFrontEndUrl(adminClient.realm("master"), suiteContext.getAuthServerInfo().getContextRoot().toString());
|
||||
@ -1664,7 +1656,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailWithCustomLifespan() throws IOException {
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
userRep.setEnabled(true);
|
||||
@ -1724,7 +1715,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailSuccessTwoLinks() throws IOException {
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
userRep.setEnabled(true);
|
||||
@ -1768,7 +1758,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailSuccessTwoLinksReverse() throws IOException {
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
userRep.setEnabled(true);
|
||||
@ -1814,7 +1803,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailSuccessLinkOpenDoesNotExpireWhenOpenedOnly() throws IOException {
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
userRep.setEnabled(true);
|
||||
@ -1858,7 +1846,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailSuccessTokenShortLifespan() throws IOException {
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
userRep.setEnabled(true);
|
||||
@ -1901,7 +1888,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailSuccessWithRecycledAuthSession() throws IOException {
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
userRep.setEnabled(true);
|
||||
@ -1966,7 +1952,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailWithRedirect() throws IOException {
|
||||
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
@ -2035,7 +2020,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendResetPasswordEmailWithRedirectAndCustomLifespan() throws IOException {
|
||||
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
@ -2121,7 +2105,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void sendVerifyEmail() throws IOException {
|
||||
UserRepresentation userRep = new UserRepresentation();
|
||||
userRep.setUsername("user1");
|
||||
@ -2344,7 +2327,6 @@ public class UserTest extends AbstractAdminTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void updateUserWithRawCredentials() {
|
||||
UserRepresentation user = new UserRepresentation();
|
||||
user.setUsername("user_rawpw");
|
||||
|
||||
@ -24,7 +24,6 @@ import org.keycloak.authentication.authenticators.browser.UsernameFormFactory;
|
||||
import org.keycloak.authentication.authenticators.browser.WebAuthnAuthenticatorFactory;
|
||||
import org.keycloak.authentication.authenticators.challenge.NoCookieFlowRedirectAuthenticatorFactory;
|
||||
import org.keycloak.authentication.authenticators.client.ClientIdAndSecretAuthenticator;
|
||||
import org.keycloak.common.Profile;
|
||||
import org.keycloak.events.admin.OperationType;
|
||||
import org.keycloak.events.admin.ResourceType;
|
||||
import org.keycloak.representations.idm.AuthenticationExecutionInfoRepresentation;
|
||||
@ -32,9 +31,6 @@ import org.keycloak.representations.idm.AuthenticationExecutionRepresentation;
|
||||
import org.keycloak.representations.idm.AuthenticationFlowRepresentation;
|
||||
import org.keycloak.representations.idm.AuthenticatorConfigRepresentation;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.util.AdminEventPaths;
|
||||
import org.keycloak.testsuite.util.AssertAdminEvents;
|
||||
|
||||
@ -322,7 +318,6 @@ public class ExecutionTest extends AbstractAuthenticationTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testRequirementsInExecution() {
|
||||
HashMap<String, String> params = new HashMap<>();
|
||||
String newBrowserFlow = "new-exec-flow";
|
||||
|
||||
@ -32,9 +32,6 @@ import java.util.HashMap;
|
||||
import java.util.LinkedList;
|
||||
import java.util.List;
|
||||
import java.util.Map;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
|
||||
import static org.hamcrest.Matchers.is;
|
||||
|
||||
@ -57,7 +54,6 @@ public class ProvidersTest extends AbstractAuthenticationTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testFormActionProviders() {
|
||||
List<Map<String, Object>> result = authMgmtResource.getFormActionProviders();
|
||||
|
||||
@ -77,7 +73,6 @@ public class ProvidersTest extends AbstractAuthenticationTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testClientAuthenticatorProviders() {
|
||||
List<Map<String, Object>> result = authMgmtResource.getClientAuthenticatorProviders();
|
||||
|
||||
|
||||
@ -6,13 +6,10 @@ import org.keycloak.testsuite.ProfileAssume;
|
||||
|
||||
import javax.ws.rs.BadRequestException;
|
||||
import java.util.HashMap;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author mhajas
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ScriptBasedAuthenticatorTest extends AbstractAuthenticationTest {
|
||||
|
||||
@Test
|
||||
|
||||
@ -26,7 +26,6 @@ import org.junit.Test;
|
||||
import org.keycloak.models.ClientProvider;
|
||||
import org.keycloak.representations.idm.ClientRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.containers.KeycloakQuarkusServerDeployableContainer;
|
||||
import org.wildfly.extras.creaper.core.online.OnlineManagementClient;
|
||||
import org.wildfly.extras.creaper.core.online.operations.admin.Administration;
|
||||
@ -37,14 +36,12 @@ import java.util.HashMap;
|
||||
import java.util.List;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
import static org.hamcrest.Matchers.containsInAnyOrder;
|
||||
import static org.hamcrest.MatcherAssert.assertThat;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
import static org.hamcrest.Matchers.containsInAnyOrder;
|
||||
|
||||
/**
|
||||
* @author Vaclav Muzikar <vmuzikar@redhat.com>
|
||||
*/
|
||||
@AuthServerContainerExclude(REMOTE)
|
||||
public class ClientSearchTest extends AbstractClientTest {
|
||||
@ArquillianResource
|
||||
protected ContainerController controller;
|
||||
|
||||
@ -64,14 +64,11 @@ import org.keycloak.representations.adapters.config.PolicyEnforcerConfig.PathCon
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||
import org.keycloak.testsuite.ProfileAssume;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.util.JsonSerialization;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ClaimInformationPointProviderTest extends AbstractKeycloakTest {
|
||||
|
||||
private static Undertow httpService;
|
||||
|
||||
@ -33,8 +33,6 @@ import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertNotNull;
|
||||
|
||||
import org.keycloak.testsuite.ProfileAssume;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
import static org.keycloak.common.Profile.Feature.AUTHORIZATION;
|
||||
import static org.keycloak.testsuite.utils.io.IOUtil.loadRealm;
|
||||
@ -42,7 +40,6 @@ import static org.keycloak.testsuite.utils.io.IOUtil.loadRealm;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class EnforcerConfigTest extends AbstractKeycloakTest {
|
||||
|
||||
@BeforeClass
|
||||
|
||||
@ -67,9 +67,6 @@ import org.keycloak.representations.idm.authorization.ScopePermissionRepresentat
|
||||
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||
import org.keycloak.testsuite.ProfileAssume;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -80,7 +77,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class PolicyEnforcerClaimsTest extends AbstractKeycloakTest {
|
||||
|
||||
protected static final String REALM_NAME = "authz-test";
|
||||
|
||||
@ -82,8 +82,6 @@ import org.keycloak.representations.idm.authorization.ScopePermissionRepresentat
|
||||
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||
import org.keycloak.testsuite.ProfileAssume;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -95,7 +93,6 @@ import org.keycloak.testsuite.util.WaitUtils;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class PolicyEnforcerTest extends AbstractKeycloakTest {
|
||||
|
||||
private static final String RESOURCE_SERVER_CLIENT_ID = "resource-server-test";
|
||||
|
||||
@ -34,14 +34,11 @@ import org.junit.Test;
|
||||
import org.keycloak.authorization.client.AuthzClient;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
*
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ResourceManagementWithAuthzClientTest extends ResourceManagementTest {
|
||||
|
||||
private AuthzClient authzClient;
|
||||
|
||||
@ -20,7 +20,6 @@ package org.keycloak.testsuite.admin.group;
|
||||
import com.google.common.collect.Comparators;
|
||||
import org.hamcrest.Matchers;
|
||||
import org.junit.Assert;
|
||||
import org.junit.Assume;
|
||||
import org.junit.Test;
|
||||
import org.keycloak.admin.client.resource.GroupResource;
|
||||
import org.keycloak.admin.client.resource.GroupsResource;
|
||||
@ -28,7 +27,6 @@ import org.keycloak.admin.client.resource.RealmResource;
|
||||
import org.keycloak.admin.client.resource.RoleMappingResource;
|
||||
import org.keycloak.admin.client.resource.UserResource;
|
||||
import org.keycloak.admin.client.resource.UsersResource;
|
||||
import org.keycloak.common.Profile;
|
||||
import org.keycloak.events.admin.OperationType;
|
||||
import org.keycloak.events.admin.ResourceType;
|
||||
import org.keycloak.models.Constants;
|
||||
@ -78,7 +76,6 @@ import org.keycloak.models.ModelDuplicateException;
|
||||
import org.keycloak.models.RealmModel;
|
||||
import org.keycloak.models.utils.KeycloakModelUtils;
|
||||
import static org.keycloak.testsuite.Assert.assertNames;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.getAuthServerContextRoot;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.UncaughtServerErrorExpected;
|
||||
@ -296,7 +293,6 @@ public class GroupTest extends AbstractGroupTest {
|
||||
|
||||
@Test
|
||||
@UncaughtServerErrorExpected
|
||||
@AuthServerContainerExclude(REMOTE)
|
||||
public void doNotAllowSameGroupNameAtTopLevelInDatabase() throws Exception {
|
||||
final String id = KeycloakModelUtils.generateId();
|
||||
testingClient.server().run(session -> {
|
||||
|
||||
@ -57,8 +57,6 @@ import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.ProfileAssume;
|
||||
import org.keycloak.testsuite.admin.AbstractAdminTest;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.auth.page.AuthRealm;
|
||||
import org.keycloak.testsuite.client.KeycloakTestingClient;
|
||||
import org.keycloak.testsuite.events.TestEventsListenerProviderFactory;
|
||||
@ -89,7 +87,6 @@ import java.util.Set;
|
||||
import java.util.stream.Collectors;
|
||||
|
||||
import static org.hamcrest.MatcherAssert.assertThat;
|
||||
import static org.hamcrest.Matchers.contains;
|
||||
import static org.hamcrest.Matchers.containsInAnyOrder;
|
||||
import static org.hamcrest.Matchers.notNullValue;
|
||||
import static org.junit.Assert.assertEquals;
|
||||
@ -103,7 +100,6 @@ import static org.keycloak.testsuite.util.ServerURLs.getAuthServerContextRoot;
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class RealmTest extends AbstractAdminTest {
|
||||
|
||||
@Rule
|
||||
|
||||
@ -31,16 +31,12 @@ import org.keycloak.admin.client.resource.UserProfileResource;
|
||||
import org.keycloak.common.Profile;
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.admin.AbstractAdminTest;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.arquillian.annotation.SetDefaultProvider;
|
||||
import org.keycloak.userprofile.UserProfileSpi;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@EnableFeature(value = Profile.Feature.DECLARATIVE_USER_PROFILE)
|
||||
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
|
||||
public class UserProfileAdminTest extends AbstractAdminTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -47,8 +47,6 @@ import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.client.resources.TestApplicationResourceUrls;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
@ -61,7 +59,6 @@ import org.keycloak.util.JsonSerialization;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class AuthorizationAPITest extends AbstractAuthzTest {
|
||||
|
||||
private static final String RESOURCE_SERVER_TEST = "resource-server-test";
|
||||
|
||||
@ -48,8 +48,6 @@ import org.keycloak.representations.idm.authorization.Permission;
|
||||
import org.keycloak.representations.idm.authorization.ResourceOwnerRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
import org.keycloak.testsuite.util.RoleBuilder;
|
||||
@ -59,7 +57,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class AuthorizationTest extends AbstractAuthzTest {
|
||||
|
||||
private AuthzClient authzClient;
|
||||
|
||||
@ -64,8 +64,6 @@ import org.keycloak.representations.idm.authorization.PermissionResponse;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceServerRepresentation;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
import org.keycloak.testsuite.util.RolesBuilder;
|
||||
@ -75,7 +73,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||
* @version $Revision: 1 $
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class AuthzClientCredentialsTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -40,8 +40,6 @@ import org.keycloak.representations.idm.authorization.ClientScopePolicyRepresent
|
||||
import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.ClientScopeBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -50,7 +48,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:yoshiyuki.tabata.jy@hitachi.com">Yoshiyuki Tabata</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ClientScopePolicyTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -54,8 +54,6 @@ import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceServerRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
import org.keycloak.testsuite.util.UserBuilder;
|
||||
@ -65,7 +63,6 @@ import org.keycloak.util.JsonSerialization;
|
||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||
* @version $Revision: 1 $
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ConflictingScopePermissionTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -92,8 +92,6 @@ import org.keycloak.representations.idm.authorization.ScopePermissionRepresentat
|
||||
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.UserPolicyRepresentation;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.client.resources.TestApplicationResourceUrls;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
@ -107,7 +105,6 @@ import org.keycloak.util.JsonSerialization;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class EntitlementAPITest extends AbstractAuthzTest {
|
||||
|
||||
private static final String RESOURCE_SERVER_TEST = "resource-server-test";
|
||||
|
||||
@ -48,8 +48,6 @@ import org.keycloak.representations.idm.authorization.GroupPolicyRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.GroupBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -60,7 +58,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class GroupNamePolicyTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -48,8 +48,6 @@ import org.keycloak.representations.idm.authorization.GroupPolicyRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.GroupBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -60,7 +58,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class GroupPathPolicyTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -29,8 +29,6 @@ import org.keycloak.protocol.oidc.mappers.OIDCAttributeMapperHelper;
|
||||
import org.keycloak.representations.idm.GroupRepresentation;
|
||||
import org.keycloak.representations.idm.ProtocolMapperRepresentation;
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.GroupBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -41,7 +39,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class GroupPathWithoutGroupClaimPolicyTest extends GroupPathPolicyTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -55,8 +55,6 @@ import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -67,7 +65,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class PermissionClaimTest extends AbstractAuthzTest {
|
||||
|
||||
private JSPolicyRepresentation claimAPolicy;
|
||||
|
||||
@ -51,13 +51,10 @@ import org.keycloak.representations.idm.authorization.PermissionTicketRepresenta
|
||||
import org.keycloak.representations.idm.authorization.PermissionTicketToken;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopeRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class PermissionManagementTest extends AbstractResourceServerTest {
|
||||
|
||||
@Test
|
||||
|
||||
@ -43,8 +43,6 @@ import org.keycloak.representations.idm.authorization.ScopePermissionRepresentat
|
||||
import java.util.HashMap;
|
||||
import java.util.List;
|
||||
import java.util.Map;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
||||
|
||||
@ -52,7 +50,6 @@ import static org.keycloak.testsuite.auth.page.AuthRealm.TEST;
|
||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||
* @version $Revision: 1 $
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class PolicyEvaluationCompositeRoleTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -50,8 +50,6 @@ import org.keycloak.representations.idm.authorization.Permission;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.TimePolicyRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.GroupBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -74,7 +72,6 @@ import java.util.stream.Collectors;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class PolicyEvaluationTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -42,8 +42,6 @@ import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.RegexPolicyRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
import org.keycloak.testsuite.util.UserBuilder;
|
||||
@ -51,7 +49,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:yoshiyuki.tabata.jy@hitachi.com">Yoshiyuki Tabata</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class RegexPolicyTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -40,8 +40,6 @@ import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.RolePolicyRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
import org.keycloak.testsuite.util.GroupBuilder;
|
||||
import org.keycloak.testsuite.util.RealmBuilder;
|
||||
@ -52,7 +50,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class RolePolicyTest extends AbstractAuthzTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -36,12 +36,9 @@ import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.services.resources.RealmsResource;
|
||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||
import org.keycloak.testsuite.admin.AbstractAdminTest;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.AdminClientUtil;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class UmaDiscoveryDocumentTest extends AbstractKeycloakTest {
|
||||
|
||||
@ArquillianResource
|
||||
|
||||
@ -69,8 +69,6 @@ import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.ResourcePermissionRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.util.AdminClientUtil;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
import org.keycloak.testsuite.util.UserBuilder;
|
||||
@ -80,7 +78,6 @@ import org.keycloak.util.JsonSerialization;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class UmaGrantTypeTest extends AbstractResourceServerTest {
|
||||
|
||||
private ResourceRepresentation resourceA;
|
||||
|
||||
@ -38,13 +38,10 @@ import org.keycloak.representations.idm.authorization.PermissionRequest;
|
||||
import org.keycloak.representations.idm.authorization.PermissionResponse;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class UmaPermissionTicketPushedClaimsTest extends AbstractResourceServerTest {
|
||||
|
||||
@Test
|
||||
|
||||
@ -30,13 +30,9 @@ import org.keycloak.models.RealmModel;
|
||||
import org.keycloak.models.UserModel;
|
||||
import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.*;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
import java.util.List;
|
||||
import org.keycloak.authorization.model.ResourceServer;
|
||||
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class UmaRepresentationTest extends AbstractResourceServerTest {
|
||||
private ResourceRepresentation resource;
|
||||
private PermissionResource permission;
|
||||
|
||||
@ -48,13 +48,10 @@ import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceServerRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ScopePermissionRepresentation;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class UserManagedAccessTest extends AbstractResourceServerTest {
|
||||
|
||||
private ResourceRepresentation resource;
|
||||
|
||||
@ -62,9 +62,6 @@ import org.keycloak.representations.idm.authorization.PermissionTicketRepresenta
|
||||
import org.keycloak.representations.idm.authorization.PolicyRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.ResourceRepresentation;
|
||||
import org.keycloak.representations.idm.authorization.UmaPermissionRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.DisableFeature;
|
||||
import org.keycloak.testsuite.arquillian.annotation.UncaughtServerErrorExpected;
|
||||
import org.keycloak.testsuite.runonserver.RunOnServer;
|
||||
import org.keycloak.testsuite.util.ClientBuilder;
|
||||
@ -77,7 +74,6 @@ import org.keycloak.testsuite.util.UserBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:psilva@redhat.com">Pedro Igor</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class UserManagedPermissionServiceTest extends AbstractResourceServerTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -32,8 +32,6 @@ import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.services.resources.RealmsResource;
|
||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.DisableFeature;
|
||||
import org.keycloak.testsuite.pages.AccountApplicationsPage;
|
||||
import org.keycloak.testsuite.pages.AccountFederatedIdentityPage;
|
||||
@ -82,7 +80,6 @@ import static org.keycloak.testsuite.util.ServerURLs.removeDefaultPorts;
|
||||
/**
|
||||
* No test methods there. Just some useful common functionality
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
@DisableFeature(value = Profile.Feature.ACCOUNT2, skipRestart = true) // TODO remove this (KEYCLOAK-16228)
|
||||
public abstract class AbstractBaseBrokerTest extends AbstractKeycloakTest {
|
||||
|
||||
|
||||
@ -59,8 +59,6 @@ import static org.keycloak.storage.UserStorageProviderModel.IMPORT_ENABLED;
|
||||
import static org.keycloak.testsuite.admin.ApiUtil.createUserAndResetPasswordWithAdminClient;
|
||||
import static org.keycloak.testsuite.admin.ApiUtil.createUserWithAdminClient;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.runonserver.RunOnServer;
|
||||
import org.keycloak.testsuite.util.FederatedIdentityBuilder;
|
||||
|
||||
@ -68,7 +66,6 @@ import org.keycloak.testsuite.util.FederatedIdentityBuilder;
|
||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
||||
* @version $Revision: 1 $
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
@DisableFeature(value = Profile.Feature.ACCOUNT2, skipRestart = true) // TODO remove this (KEYCLOAK-16228)
|
||||
public class AccountLinkTest extends AbstractKeycloakTest {
|
||||
public static final String CHILD_IDP = "child";
|
||||
|
||||
@ -1,15 +1,11 @@
|
||||
package org.keycloak.testsuite.broker;
|
||||
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableVault;
|
||||
|
||||
/**
|
||||
* @author Martin Kanis <mkanis@redhat.com>
|
||||
*/
|
||||
@EnableVault
|
||||
@AuthServerContainerExclude(REMOTE)
|
||||
public class KcOidcBrokerVaultTest extends AbstractBrokerTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -32,7 +32,6 @@ import org.junit.Test;
|
||||
import org.keycloak.admin.client.resource.RealmResource;
|
||||
import org.keycloak.common.Profile;
|
||||
import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.forms.RegisterWithUserProfileTest;
|
||||
import org.keycloak.testsuite.forms.VerifyProfileTest;
|
||||
@ -45,7 +44,6 @@ import org.openqa.selenium.By;
|
||||
*
|
||||
*/
|
||||
@EnableFeature(value = Profile.Feature.DECLARATIVE_USER_PROFILE)
|
||||
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
|
||||
public class KcOidcFirstBrokerLoginWithUserProfileTest extends KcOidcFirstBrokerLoginTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -18,7 +18,6 @@ package org.keycloak.testsuite.broker;
|
||||
|
||||
import org.junit.Before;
|
||||
import org.keycloak.common.Profile;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
|
||||
/**
|
||||
@ -27,7 +26,6 @@ import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
*
|
||||
*/
|
||||
@EnableFeature(value = Profile.Feature.DECLARATIVE_USER_PROFILE)
|
||||
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
|
||||
public class KcSamlFirstBrokerLoginWithUserProfileTest extends KcSamlFirstBrokerLoginTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -66,14 +66,10 @@ import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertThat;
|
||||
import static org.junit.Assert.assertTrue;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
*
|
||||
* @author hmlnarik
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class KcSamlIdPInitiatedSsoTest extends AbstractKeycloakTest {
|
||||
|
||||
private static final String PROVIDER_REALM_USER_NAME = "test";
|
||||
|
||||
@ -70,8 +70,6 @@ import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import static org.junit.Assert.assertNotNull;
|
||||
import static org.junit.Assume.assumeTrue;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
import org.keycloak.testsuite.util.AdminClientUtil;
|
||||
import static org.keycloak.testsuite.broker.SocialLoginTest.Provider.BITBUCKET;
|
||||
@ -99,7 +97,6 @@ import com.google.common.collect.ImmutableMap;
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
* @author Vaclav Muzikar <vmuzikar@redhat.com>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
@DisableFeature(value = Profile.Feature.ACCOUNT2, skipRestart = true) // TODO remove this (KEYCLOAK-16228)
|
||||
public class SocialLoginTest extends AbstractKeycloakTest {
|
||||
|
||||
|
||||
@ -3,34 +3,22 @@ package org.keycloak.testsuite.cli.admin;
|
||||
import org.junit.Assert;
|
||||
import org.junit.Test;
|
||||
import org.keycloak.admin.client.resource.RealmResource;
|
||||
import org.keycloak.broker.saml.SAMLIdentityProviderConfig;
|
||||
import org.keycloak.broker.saml.SAMLIdentityProviderFactory;
|
||||
import org.keycloak.client.admin.cli.config.FileConfigHandler;
|
||||
import org.keycloak.models.IdentityProviderModel;
|
||||
import org.keycloak.representations.idm.ClientRepresentation;
|
||||
import org.keycloak.representations.idm.IdentityProviderRepresentation;
|
||||
import org.keycloak.testsuite.cli.KcAdmExec;
|
||||
import org.keycloak.testsuite.updaters.IdentityProviderCreator;
|
||||
import org.keycloak.testsuite.util.IdentityProviderBuilder;
|
||||
import org.keycloak.testsuite.util.TempFileResource;
|
||||
import org.keycloak.util.JsonSerialization;
|
||||
|
||||
import java.io.Closeable;
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.util.Arrays;
|
||||
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
import static org.hamcrest.Matchers.equalTo;
|
||||
import static org.hamcrest.Matchers.is;
|
||||
import static org.keycloak.testsuite.cli.KcAdmExec.execute;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mstrukel@redhat.com">Marko Strukelj</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class KcAdmCreateTest extends AbstractAdmCliTest {
|
||||
|
||||
@Test
|
||||
|
||||
@ -16,14 +16,11 @@ import java.util.stream.StreamSupport;
|
||||
import static org.hamcrest.Matchers.equalTo;
|
||||
|
||||
import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.testsuite.cli.KcAdmExec.execute;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mstrukel@redhat.com">Marko Strukelj</a>
|
||||
*/
|
||||
@AuthServerContainerExclude({AuthServer.REMOTE})
|
||||
public class KcAdmSessionTest extends AbstractAdmCliTest {
|
||||
|
||||
static TypeReference<List<ObjectNode>> LIST_OF_JSON = new TypeReference<List<ObjectNode>>() {};
|
||||
|
||||
@ -18,14 +18,11 @@ import java.util.UUID;
|
||||
|
||||
import static org.keycloak.client.admin.cli.util.OsUtil.CMD;
|
||||
import static org.keycloak.client.admin.cli.util.OsUtil.EOL;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.testsuite.cli.KcAdmExec.execute;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mstrukel@redhat.com">Marko Strukelj</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class KcAdmTest extends AbstractAdmCliTest {
|
||||
|
||||
@Test
|
||||
|
||||
@ -19,8 +19,6 @@ import org.keycloak.admin.client.resource.RealmResource;
|
||||
import org.keycloak.broker.saml.SAMLIdentityProviderConfig;
|
||||
import org.keycloak.broker.saml.SAMLIdentityProviderFactory;
|
||||
import org.keycloak.representations.idm.IdentityProviderRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
import static org.keycloak.testsuite.cli.KcAdmExec.CMD;
|
||||
import static org.keycloak.testsuite.cli.KcAdmExec.execute;
|
||||
@ -30,7 +28,6 @@ import org.keycloak.testsuite.util.IdentityProviderBuilder;
|
||||
/**
|
||||
* @author <a href="mailto:mstrukel@redhat.com">Marko Strukelj</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class KcAdmUpdateTest extends AbstractAdmCliTest {
|
||||
|
||||
@Test
|
||||
|
||||
@ -20,8 +20,6 @@ import java.util.UUID;
|
||||
import static org.keycloak.client.registration.cli.util.OsUtil.CMD;
|
||||
import static org.keycloak.client.registration.cli.util.OsUtil.EOL;
|
||||
import static org.keycloak.testsuite.util.ServerURLs.AUTH_SERVER_SSL_REQUIRED;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.testsuite.cli.KcRegExec.execute;
|
||||
|
||||
/**
|
||||
@ -263,7 +261,6 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testUserLoginWithDefaultConfig() {
|
||||
/*
|
||||
* Test most basic user login, using the default admin-cli as a client
|
||||
@ -364,7 +361,6 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testUserLoginWithCustomConfig() {
|
||||
/*
|
||||
* Test user login using a custom config file
|
||||
@ -402,7 +398,6 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testCustomConfigLoginCreateDelete() throws IOException {
|
||||
/*
|
||||
* Test user login, create, delete session using a custom config file
|
||||
@ -459,7 +454,6 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testCRUDWithOnTheFlyUserAuth() throws IOException {
|
||||
/*
|
||||
* Test create, get, update, and delete using on-the-fly authentication - without using any config file.
|
||||
@ -470,7 +464,6 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testCRUDWithOnTheFlyUserAuthWithClientSecret() throws IOException {
|
||||
/*
|
||||
* Test create, get, update, and delete using on-the-fly authentication - without using any config file.
|
||||
@ -509,7 +502,6 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testCRUDWithOnTheFlyUserAuthWithSignedJwtClient() throws IOException {
|
||||
/*
|
||||
* Test create, get, update, and delete using on-the-fly authentication - without using any config file.
|
||||
@ -557,7 +549,6 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testCRUDWithOnTheFlyServiceAccountWithClientSecret() throws IOException {
|
||||
/*
|
||||
* Test create, get, update, and delete using on-the-fly authentication - without using any config file.
|
||||
@ -568,7 +559,6 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testCRUDWithOnTheFlyServiceAccountWithSignedJwtClient() throws IOException {
|
||||
/*
|
||||
* Test create, get, update, and delete using on-the-fly authentication - without using any config file.
|
||||
@ -641,14 +631,12 @@ public class KcRegTest extends AbstractRegCliTest {
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testCreateWithAllowedHostsWithoutAuthenticationNoConfig() throws IOException {
|
||||
|
||||
testCreateWithAllowedHostsWithoutAuthentication("test", false);
|
||||
}
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public void testCreateWithAllowedHostsWithoutAuthentication() throws IOException {
|
||||
|
||||
testCreateWithAllowedHostsWithoutAuthentication("test", true);
|
||||
|
||||
@ -13,14 +13,11 @@ import java.io.IOException;
|
||||
import java.util.Arrays;
|
||||
|
||||
import static org.keycloak.client.registration.cli.util.OsUtil.CMD;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.testsuite.cli.KcRegExec.execute;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mstrukel@redhat.com">Marko Strukelj</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class KcRegUpdateTest extends AbstractRegCliTest {
|
||||
|
||||
|
||||
|
||||
@ -12,15 +12,12 @@ import org.keycloak.testsuite.util.TempFileResource;
|
||||
import org.keycloak.util.JsonSerialization;
|
||||
|
||||
import java.io.IOException;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
import static org.keycloak.testsuite.cli.KcRegExec.execute;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mstrukel@redhat.com">Marko Strukelj</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class KcRegUpdateTokenTest extends AbstractRegCliTest {
|
||||
|
||||
@Test
|
||||
|
||||
@ -37,7 +37,6 @@ import static org.keycloak.protocol.oidc.grants.ciba.channel.AuthenticationChann
|
||||
import static org.keycloak.protocol.oidc.grants.ciba.channel.AuthenticationChannelResponse.Status.UNAUTHORIZED;
|
||||
import static org.keycloak.testsuite.Assert.assertExpiration;
|
||||
import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
import static org.keycloak.testsuite.util.ClientPoliciesUtil.createAnyClientConditionConfig;
|
||||
import static org.keycloak.testsuite.util.ClientPoliciesUtil.createClientRolesConditionConfig;
|
||||
import static org.keycloak.testsuite.util.ClientPoliciesUtil.createClientScopesConditionConfig;
|
||||
@ -105,7 +104,6 @@ import org.keycloak.services.clientpolicy.executor.HolderOfKeyEnforcerExecutorFa
|
||||
import org.keycloak.services.clientpolicy.executor.SecureSigningAlgorithmForSignedJwtExecutorFactory;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.client.resources.TestApplicationResourceUrls;
|
||||
import org.keycloak.testsuite.client.resources.TestOIDCEndpointsApplicationResource;
|
||||
import org.keycloak.testsuite.rest.representation.TestAuthenticationChannelRequest;
|
||||
@ -135,7 +133,6 @@ import com.fasterxml.jackson.databind.ObjectMapper;
|
||||
*
|
||||
* @author <a href="mailto:takashi.norimatsu.ws@hitachi.com">Takashi Norimatsu</a>
|
||||
*/
|
||||
@AuthServerContainerExclude({REMOTE})
|
||||
public class CIBATest extends AbstractClientPoliciesTest {
|
||||
|
||||
private static final String TEST_USER_NAME = "test-user@localhost";
|
||||
|
||||
@ -27,19 +27,16 @@ import org.keycloak.representations.idm.ClientProfileRepresentation;
|
||||
import org.keycloak.representations.idm.ClientProfilesRepresentation;
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
|
||||
import java.io.File;
|
||||
import java.util.Arrays;
|
||||
import java.util.List;
|
||||
|
||||
import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:takashi.norimatsu.ws@hitachi.com">Takashi Norimatsu</a>
|
||||
*/
|
||||
@AuthServerContainerExclude({REMOTE})
|
||||
public class ClientPoliciesImportExportTest extends AbstractClientPoliciesTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -40,7 +40,6 @@ import org.keycloak.services.clientpolicy.executor.SecureClientAuthenticatorExec
|
||||
import org.keycloak.services.clientpolicy.executor.SecureClientUrisExecutorFactory;
|
||||
import org.keycloak.services.clientpolicy.executor.SecureSessionEnforceExecutorFactory;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.util.ClientPoliciesUtil.ClientPoliciesBuilder;
|
||||
import org.keycloak.testsuite.util.ClientPoliciesUtil.ClientPolicyBuilder;
|
||||
import org.keycloak.testsuite.util.ClientPoliciesUtil.ClientProfileBuilder;
|
||||
@ -54,7 +53,6 @@ import static org.hamcrest.MatcherAssert.assertThat;
|
||||
import static org.junit.Assert.assertEquals;
|
||||
import static org.junit.Assert.fail;
|
||||
import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;
|
||||
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
|
||||
import static org.keycloak.testsuite.util.ClientPoliciesUtil.createClientAccessTypeConditionConfig;
|
||||
import static org.keycloak.testsuite.util.ClientPoliciesUtil.createClientRolesConditionConfig;
|
||||
import static org.keycloak.testsuite.util.ClientPoliciesUtil.createPKCEEnforceExecutorConfig;
|
||||
@ -63,7 +61,6 @@ import static org.keycloak.testsuite.util.ClientPoliciesUtil.createSecureClientA
|
||||
/**
|
||||
* @author <a href="mailto:takashi.norimatsu.ws@hitachi.com">Takashi Norimatsu</a>
|
||||
*/
|
||||
@AuthServerContainerExclude({REMOTE})
|
||||
public class ClientPoliciesLoadUpdateTest extends AbstractClientPoliciesTest {
|
||||
|
||||
@Override
|
||||
|
||||
@ -112,8 +112,6 @@ import org.keycloak.services.clientpolicy.executor.SecureSessionEnforceExecutorF
|
||||
import org.keycloak.services.clientpolicy.executor.SecureSigningAlgorithmExecutorFactory;
|
||||
import org.keycloak.services.clientpolicy.executor.SecureSigningAlgorithmForSignedJwtExecutorFactory;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.client.resources.TestApplicationResourceUrls;
|
||||
import org.keycloak.testsuite.client.resources.TestOIDCEndpointsApplicationResource;
|
||||
@ -839,8 +837,6 @@ public class ClientPoliciesTest extends AbstractClientPoliciesTest {
|
||||
successfulLoginAndLogout(clientId, clientSecret);
|
||||
}
|
||||
|
||||
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
@Test
|
||||
public void testClientUpdateSourceHostsCondition() throws Exception {
|
||||
// register profiles
|
||||
|
||||
@ -60,13 +60,11 @@ import org.keycloak.services.clientregistration.policy.impl.ProtocolMappersClien
|
||||
import org.keycloak.services.clientregistration.policy.impl.TrustedHostClientRegistrationPolicyFactory;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.util.JsonSerialization;
|
||||
|
||||
import javax.ws.rs.core.Response;
|
||||
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mposolda@redhat.com">Marek Posolda</a>
|
||||
@ -178,7 +176,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testAnonCreateWithTrustedHost() throws Exception {
|
||||
// Failed to create client (untrusted host)
|
||||
OIDCClientRepresentation client = createRepOidc("http://root", "http://redirect");
|
||||
@ -203,7 +200,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testAnonUpdateWithTrustedHost() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
OIDCClientRepresentation client = create();
|
||||
@ -245,7 +241,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testAnonConsentRequired() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
OIDCClientRepresentation client = create();
|
||||
@ -266,7 +261,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testAnonFullScopeAllowed() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
OIDCClientRepresentation client = create();
|
||||
@ -287,7 +281,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testClientDisabledPolicy() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
|
||||
@ -328,7 +321,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testMaxClientsPolicy() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
|
||||
@ -431,7 +423,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testClientScopesPolicy() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
|
||||
@ -471,7 +462,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testClientScopesPolicyWithPermittedScope() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
|
||||
@ -506,7 +496,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
// PROTOCOL MAPPERS
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testProtocolMappersCreate() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
|
||||
@ -553,7 +542,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testProtocolMappersUpdate() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
|
||||
@ -589,7 +577,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testProtocolMappersConsentRequired() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
|
||||
@ -605,7 +592,6 @@ public class ClientRegistrationPoliciesTest extends AbstractClientRegistrationTe
|
||||
|
||||
|
||||
@Test
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE) // We would need to do domain name -> ip address to set trusted host
|
||||
public void testProtocolMappersRemoveBuiltins() throws Exception {
|
||||
setTrustedHost("localhost");
|
||||
|
||||
|
||||
@ -38,8 +38,6 @@ import org.keycloak.representations.idm.ClientRepresentation;
|
||||
import org.keycloak.representations.idm.OAuth2ErrorRepresentation;
|
||||
import org.keycloak.representations.idm.ProtocolMapperRepresentation;
|
||||
import org.keycloak.representations.idm.UserRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.UncaughtServerErrorExpected;
|
||||
import org.keycloak.util.JsonSerialization;
|
||||
|
||||
@ -73,7 +71,6 @@ import static org.keycloak.utils.MediaType.APPLICATION_JSON;
|
||||
/**
|
||||
* @author <a href="mailto:sthorger@redhat.com">Stian Thorgersen</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class ClientRegistrationTest extends AbstractClientRegistrationTest {
|
||||
|
||||
private static final String CLIENT_ID = "test-client";
|
||||
|
||||
@ -47,8 +47,6 @@ import org.keycloak.services.clientpolicy.executor.ClientSecretRotationExecutorF
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.account.AbstractRestServiceTest;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.EnableFeature;
|
||||
import org.keycloak.testsuite.util.ClientPoliciesUtil.ClientPoliciesBuilder;
|
||||
import org.keycloak.testsuite.util.ClientPoliciesUtil.ClientPolicyBuilder;
|
||||
@ -76,7 +74,6 @@ import static org.keycloak.testsuite.admin.AbstractAdminTest.loadJson;
|
||||
/**
|
||||
* @author <a href="mailto:masales@redhat.com">Marcelo Sales</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
@EnableFeature(value = Feature.CLIENT_SECRET_ROTATION)
|
||||
public class ClientSecretRotationTest extends AbstractRestServiceTest {
|
||||
|
||||
|
||||
@ -63,7 +63,6 @@ import org.keycloak.services.clientpolicy.condition.AnyClientConditionFactory;
|
||||
import org.keycloak.services.clientpolicy.condition.ClientUpdaterContextConditionFactory;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.client.resources.TestApplicationResourceUrls;
|
||||
import org.keycloak.testsuite.client.resources.TestOIDCEndpointsApplicationResource;
|
||||
import org.keycloak.testsuite.pages.AppPage;
|
||||
@ -104,7 +103,6 @@ import static org.keycloak.testsuite.util.ClientPoliciesUtil.createClientUpdateC
|
||||
*
|
||||
* @author <a href="mailto:mposolda@redhat.com">Marek Posolda</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
|
||||
public class FAPI1Test extends AbstractClientPoliciesTest {
|
||||
|
||||
@Page
|
||||
|
||||
@ -88,7 +88,6 @@ import org.keycloak.services.clientpolicy.condition.AnyClientConditionFactory;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.AssertEvents;
|
||||
import org.keycloak.testsuite.admin.ApiUtil;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.client.resources.TestApplicationResourceUrls;
|
||||
import org.keycloak.testsuite.client.resources.TestOIDCEndpointsApplicationResource;
|
||||
import org.keycloak.testsuite.rest.representation.TestAuthenticationChannelRequest;
|
||||
@ -110,7 +109,6 @@ import org.keycloak.util.JsonSerialization;
|
||||
*
|
||||
* @author <a href="mailto:takashi.norimatsu.ws@hitachi.com">Takashi Norimatsu</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
|
||||
public class FAPICIBATest extends AbstractClientPoliciesTest {
|
||||
|
||||
private final String clientId = "foo";
|
||||
|
||||
@ -60,18 +60,14 @@ import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.representations.oidc.OIDCClientRepresentation;
|
||||
import org.keycloak.testsuite.Assert;
|
||||
import org.keycloak.testsuite.ProfileAssume;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.client.resources.TestApplicationResourceUrls;
|
||||
import org.keycloak.testsuite.client.resources.TestOIDCEndpointsApplicationResource;
|
||||
import org.keycloak.testsuite.rest.resource.TestingOIDCEndpointsApplicationResource;
|
||||
import org.keycloak.testsuite.util.OAuthClient;
|
||||
|
||||
|
||||
/**
|
||||
* @author <a href="mailto:mposolda@redhat.com">Marek Posolda</a>
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public class OIDCJwksClientRegistrationTest extends AbstractClientRegistrationTest {
|
||||
|
||||
private static final String PRIVATE_KEY = "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";
|
||||
|
||||
@ -11,7 +11,6 @@ import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.AbstractKeycloakTest;
|
||||
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
|
||||
import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.client.KeycloakTestingClient;
|
||||
import org.keycloak.testsuite.util.ContainerAssume;
|
||||
import org.keycloak.testsuite.utils.tls.TLSUtils;
|
||||
@ -23,7 +22,6 @@ import java.util.Map;
|
||||
import java.util.Set;
|
||||
|
||||
import static org.junit.Assert.assertTrue;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import static org.keycloak.testsuite.auth.page.AuthRealm.ADMIN;
|
||||
import static org.keycloak.testsuite.auth.page.AuthRealm.MASTER;
|
||||
import static org.keycloak.testsuite.util.WaitUtils.pause;
|
||||
@ -32,7 +30,6 @@ import static org.keycloak.testsuite.util.WaitUtils.pause;
|
||||
*
|
||||
* @author tkyjovsk
|
||||
*/
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public abstract class AbstractClusterTest extends AbstractKeycloakTest {
|
||||
|
||||
// Keep the following constants in sync with arquillian
|
||||
|
||||
@ -21,7 +21,6 @@ import org.keycloak.testsuite.AbstractTestRealmKeycloakTest;
|
||||
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
|
||||
import org.keycloak.testsuite.arquillian.ContainerInfo;
|
||||
import org.keycloak.testsuite.arquillian.LoadBalancerController;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
|
||||
import org.keycloak.testsuite.arquillian.annotation.LoadBalancer;
|
||||
|
||||
import java.util.ArrayList;
|
||||
@ -34,7 +33,6 @@ import org.keycloak.testsuite.client.KeycloakTestingClient;
|
||||
|
||||
import org.keycloak.representations.idm.RealmRepresentation;
|
||||
import org.keycloak.testsuite.arquillian.CrossDCTestEnricher;
|
||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer;
|
||||
import org.keycloak.testsuite.arquillian.annotation.InitialDcState;
|
||||
|
||||
import static org.keycloak.testsuite.arquillian.CrossDCTestEnricher.forAllBackendNodesStream;
|
||||
@ -45,7 +43,6 @@ import static org.keycloak.testsuite.arquillian.CrossDCTestEnricher.forAllBacken
|
||||
* @author hmlnarik
|
||||
*/
|
||||
@InitialDcState
|
||||
@AuthServerContainerExclude(AuthServer.REMOTE)
|
||||
public abstract class AbstractCrossDCTest extends AbstractTestRealmKeycloakTest {
|
||||
|
||||
// Keep the following constants in sync with arquillian
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user