KEYCLOAK-13758 Exclude some tests for remote runs

This commit is contained in:
mhajas 2020-04-03 15:03:06 +02:00 committed by Hynek Mlnařík
parent b60b85ab65
commit 845195780e
5 changed files with 10 additions and 2 deletions

View file

@ -38,6 +38,7 @@ import org.keycloak.representations.idm.RealmRepresentation;
import org.keycloak.representations.idm.RoleRepresentation;
import org.keycloak.representations.idm.UserRepresentation;
import org.keycloak.testsuite.admin.ApiUtil;
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
import org.keycloak.testsuite.util.AdminEventPaths;
import org.keycloak.testsuite.util.ClientBuilder;
import org.keycloak.testsuite.util.RoleBuilder;
@ -72,6 +73,8 @@ import org.keycloak.models.ModelDuplicateException;
import org.keycloak.models.RealmModel;
import org.keycloak.models.utils.KeycloakModelUtils;
import static org.keycloak.testsuite.Assert.assertNames;
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
import org.keycloak.testsuite.arquillian.annotation.UncaughtServerErrorExpected;
import org.keycloak.testsuite.auth.page.AuthRealm;
@ -280,6 +283,7 @@ public class GroupTest extends AbstractGroupTest {
@Test
@UncaughtServerErrorExpected
@AuthServerContainerExclude(REMOTE)
public void doNotAllowSameGroupNameAtTopLevelInDatabase() throws Exception {
final String id = KeycloakModelUtils.generateId();
testingClient.server().run(session -> {

View file

@ -424,6 +424,7 @@ public class BrowserFlowTest extends AbstractTestRealmKeycloakTest {
// Configure a conditional authenticator with a condition which change while the flow evaluation
// In such case, all the required authenticator inside the subflow should be evaluated even if the condition has changed
@Test
@AuthServerContainerExclude(REMOTE)
public void testConditionalAuthenticatorWithConditionalSubFlowWithChangingConditionWhileFlowEvaluation() {
try {
configureBrowserFlowWithConditionalSubFlowWithChangingConditionWhileFlowEvaluation();

View file

@ -82,6 +82,7 @@ import static org.junit.Assert.assertNotEquals;
import static org.junit.Assert.assertTrue;
import static org.keycloak.testsuite.admin.ApiUtil.findClientByClientId;
import static org.keycloak.testsuite.util.OAuthClient.AUTH_SERVER_ROOT;
import static org.keycloak.testsuite.util.OAuthClient.SERVER_ROOT;
import static org.keycloak.testsuite.util.URLAssert.assertCurrentUrlStartsWithLoginUrlOf;
/**
@ -802,7 +803,7 @@ public class LoginTest extends AbstractTestRealmKeycloakTest {
@Test
public void openLoginFormWithDifferentApplication() throws Exception {
oauth.clientId("root-url-client");
oauth.redirectUri("http://localhost:8180/foo/bar/");
oauth.redirectUri(SERVER_ROOT + "/foo/bar/");
oauth.openLoginForm();
// Login form shown after redirect from app

View file

@ -54,7 +54,7 @@ import java.util.Map;
*
* @author <a href="mailto:thomas.darimont@gmail.com">Thomas Darimont</a>
*/
@EnableFeature(Profile.Feature.UPLOAD_SCRIPTS)
@EnableFeature(value = Profile.Feature.UPLOAD_SCRIPTS, skipRestart = true)
public class ScriptAuthenticatorTest extends AbstractFlowTest {
@Page

View file

@ -35,6 +35,7 @@ import org.keycloak.representations.idm.RealmRepresentation;
import org.keycloak.saml.SAML2LogoutRequestBuilder;
import org.keycloak.saml.processing.api.saml.v2.request.SAML2Request;
import org.keycloak.services.resources.RealmsResource;
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
import org.keycloak.testsuite.util.ReverseProxy;
import org.keycloak.testsuite.util.SamlClient;
import org.w3c.dom.Document;
@ -49,6 +50,7 @@ import static org.keycloak.testsuite.util.Matchers.statusCodeIsHC;
*
* @author <a href="mailto:sguilhen@redhat.com">Stefan Guilhen</a>
*/
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
public class SamlReverseProxyTest extends AbstractSamlTest {
@ClassRule