mirror of
https://github.com/keycloak/keycloak.git
synced 2026-01-10 15:32:05 -03:30
Flaky test: org.keycloak.testsuite.federation.ldap.LDAPReadOnlyTest#testReadOnlyUserGetsPermanentlyLocked
Closes #41882 Signed-off-by: Martin Kanis <mkanis@redhat.com>
This commit is contained in:
parent
b7d3c8eb8b
commit
aa5fadb863
@ -54,6 +54,8 @@ import org.keycloak.testsuite.util.LDAPRule;
|
||||
import org.keycloak.testsuite.util.LDAPTestUtils;
|
||||
import org.openqa.selenium.By;
|
||||
|
||||
import org.keycloak.testsuite.util.WaitUtils;
|
||||
|
||||
import jakarta.ws.rs.ClientErrorException;
|
||||
|
||||
import java.util.Collections;
|
||||
@ -211,6 +213,8 @@ public class LDAPReadOnlyTest extends AbstractLDAPTest {
|
||||
testRealm().update(realm);
|
||||
|
||||
UserRepresentation user = adminClient.realm("test").users().search("johnkeycloak", 0, 1).get(0);
|
||||
Map<String, Object> bruteForceStatus = testRealm().attackDetection().bruteForceUserStatus(user.getId());
|
||||
assertFalse("User should not be disabled by brute force.", (boolean) bruteForceStatus.get("disabled"));
|
||||
assertTrue(user.isEnabled());
|
||||
|
||||
// Lock user (permanently) and make sure the number of failures matches failure factor
|
||||
@ -218,7 +222,11 @@ public class LDAPReadOnlyTest extends AbstractLDAPTest {
|
||||
loginInvalidPassword("johnkeycloak");
|
||||
assertUserNumberOfFailures(user.getId(), failureFactor);
|
||||
|
||||
WaitUtils.waitForBruteForceExecutors(testingClient);
|
||||
|
||||
// Make sure user is now disabled
|
||||
bruteForceStatus = testRealm().attackDetection().bruteForceUserStatus(user.getId());
|
||||
assertTrue("User should be disabled by brute force.", (boolean) bruteForceStatus.get("disabled"));
|
||||
user = adminClient.realm("test").users().search("johnkeycloak", 0, 1).get(0);
|
||||
assertFalse(user.isEnabled());
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user