Merge pull request #2939 from mhajas/fixEAP6
KEYCLOAK-3125 Fix ssl tests on EAP6
This commit is contained in:
commit
807fc71626
3 changed files with 7 additions and 7 deletions
|
@ -17,7 +17,7 @@
|
||||||
|
|
||||||
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
|
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
|
||||||
xmlns:xalan="http://xml.apache.org/xalan"
|
xmlns:xalan="http://xml.apache.org/xalan"
|
||||||
xmlns:j="urn:jboss:domain:1.7"
|
xmlns:j="urn:jboss:domain:1.8"
|
||||||
xmlns:w="urn:jboss:domain:web:2.2"
|
xmlns:w="urn:jboss:domain:web:2.2"
|
||||||
version="2.0"
|
version="2.0"
|
||||||
exclude-result-prefixes="xalan j ds k sec">
|
exclude-result-prefixes="xalan j ds k sec">
|
||||||
|
|
|
@ -24,6 +24,7 @@ import org.jboss.arquillian.core.api.annotation.Inject;
|
||||||
import org.jboss.arquillian.test.api.ArquillianResource;
|
import org.jboss.arquillian.test.api.ArquillianResource;
|
||||||
import org.jboss.logging.Logger;
|
import org.jboss.logging.Logger;
|
||||||
import org.jboss.logging.Logger.Level;
|
import org.jboss.logging.Logger.Level;
|
||||||
|
import org.keycloak.testsuite.arquillian.SuiteContext;
|
||||||
import org.keycloak.testsuite.arquillian.TestContext;
|
import org.keycloak.testsuite.arquillian.TestContext;
|
||||||
import org.keycloak.testsuite.arquillian.annotation.AppServerContext;
|
import org.keycloak.testsuite.arquillian.annotation.AppServerContext;
|
||||||
import org.keycloak.testsuite.arquillian.annotation.AuthServerContext;
|
import org.keycloak.testsuite.arquillian.annotation.AuthServerContext;
|
||||||
|
@ -33,7 +34,6 @@ import java.net.MalformedURLException;
|
||||||
import java.net.URL;
|
import java.net.URL;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import org.keycloak.testsuite.arquillian.SuiteContext;
|
|
||||||
|
|
||||||
public class URLProvider extends URLResourceProvider {
|
public class URLProvider extends URLResourceProvider {
|
||||||
|
|
||||||
|
@ -83,7 +83,8 @@ public class URLProvider extends URLResourceProvider {
|
||||||
for (Annotation a : qualifiers) {
|
for (Annotation a : qualifiers) {
|
||||||
if (OperateOnDeployment.class.isAssignableFrom(a.annotationType())) {
|
if (OperateOnDeployment.class.isAssignableFrom(a.annotationType())) {
|
||||||
String port = appServerSslRequired ? System.getProperty("app.server.https.port", "8643"):System.getProperty("app.server.http.port", "8280");
|
String port = appServerSslRequired ? System.getProperty("app.server.https.port", "8643"):System.getProperty("app.server.http.port", "8280");
|
||||||
url = new URL(fixedUrl.toExternalForm().replace("8080", port) + "/" + ((OperateOnDeployment) a).value());
|
String protocol = appServerSslRequired ? "https" : "http";
|
||||||
|
url = new URL(fixedUrl.toExternalForm().replace("8080", port).replace("http", protocol) + ((OperateOnDeployment) a).value());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -244,7 +244,7 @@ public abstract class AbstractSAMLServletsAdapterTest extends AbstractServletsAd
|
||||||
|
|
||||||
salesPostPassiveServletPage.navigateTo();
|
salesPostPassiveServletPage.navigateTo();
|
||||||
waitUntilElement(By.xpath("//body")).text().not().contains("principal=");
|
waitUntilElement(By.xpath("//body")).text().not().contains("principal=");
|
||||||
assertTrue(driver.getPageSource().contains("Forbidden") || driver.getPageSource().contains("<body></body>") || driver.getPageSource().contains("<body><pre></pre></body>"));
|
assertTrue(driver.getPageSource().contains("Forbidden") || driver.getPageSource().contains("<body></body>") || driver.getPageSource().equals(""));
|
||||||
|
|
||||||
salesPostSigEmailServletPage.navigateTo();
|
salesPostSigEmailServletPage.navigateTo();
|
||||||
assertCurrentUrlStartsWith(testRealmSAMLPostLoginPage);
|
assertCurrentUrlStartsWith(testRealmSAMLPostLoginPage);
|
||||||
|
@ -322,7 +322,7 @@ public abstract class AbstractSAMLServletsAdapterTest extends AbstractServletsAd
|
||||||
|
|
||||||
waitUntilElement(By.xpath("//body")).text().not().contains("principal=");
|
waitUntilElement(By.xpath("//body")).text().not().contains("principal=");
|
||||||
//Different 403 status page on EAP and Wildfly
|
//Different 403 status page on EAP and Wildfly
|
||||||
assertTrue(driver.getPageSource().contains("Forbidden") || driver.getPageSource().contains("<body></body>") || driver.getPageSource().contains("<body><pre></pre></body>"));
|
assertTrue(driver.getPageSource().contains("Forbidden") || driver.getPageSource().contains("<body></body>") || driver.getPageSource().equals(""));
|
||||||
|
|
||||||
assertSuccessfulLogin(salesPostServletPage, bburkeUser, testRealmSAMLPostLoginPage);
|
assertSuccessfulLogin(salesPostServletPage, bburkeUser, testRealmSAMLPostLoginPage);
|
||||||
|
|
||||||
|
@ -333,8 +333,7 @@ public abstract class AbstractSAMLServletsAdapterTest extends AbstractServletsAd
|
||||||
|
|
||||||
waitUntilElement(By.xpath("//body")).text().not().contains("principal=");
|
waitUntilElement(By.xpath("//body")).text().not().contains("principal=");
|
||||||
//Different 403 status page on EAP and Wildfly
|
//Different 403 status page on EAP and Wildfly
|
||||||
assertTrue(driver.getPageSource().contains("Forbidden") || driver.getPageSource().contains("<body></body>") || driver.getPageSource().contains("<body><pre></pre></body>"));
|
assertTrue(driver.getPageSource().contains("Forbidden") || driver.getPageSource().contains("<body></body>") || driver.getPageSource().equals(""));
|
||||||
|
|
||||||
assertForbiddenLogin(salesPostServletPage, "unauthorized", "password", testRealmSAMLPostLoginPage);
|
assertForbiddenLogin(salesPostServletPage, "unauthorized", "password", testRealmSAMLPostLoginPage);
|
||||||
assertForbidden(salesPostPassiveServletPage);
|
assertForbidden(salesPostPassiveServletPage);
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue