KEYCLOAK-13758 Exclude some tests for remote runs

This commit is contained in:
mhajas 2020-04-03 15:03:06 +02:00 committed by Hynek Mlnařík
parent b60b85ab65
commit 845195780e
5 changed files with 10 additions and 2 deletions

View file

@ -38,6 +38,7 @@ import org.keycloak.representations.idm.RealmRepresentation;
import org.keycloak.representations.idm.RoleRepresentation; import org.keycloak.representations.idm.RoleRepresentation;
import org.keycloak.representations.idm.UserRepresentation; import org.keycloak.representations.idm.UserRepresentation;
import org.keycloak.testsuite.admin.ApiUtil; import org.keycloak.testsuite.admin.ApiUtil;
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
import org.keycloak.testsuite.util.AdminEventPaths; import org.keycloak.testsuite.util.AdminEventPaths;
import org.keycloak.testsuite.util.ClientBuilder; import org.keycloak.testsuite.util.ClientBuilder;
import org.keycloak.testsuite.util.RoleBuilder; import org.keycloak.testsuite.util.RoleBuilder;
@ -72,6 +73,8 @@ import org.keycloak.models.ModelDuplicateException;
import org.keycloak.models.RealmModel; import org.keycloak.models.RealmModel;
import org.keycloak.models.utils.KeycloakModelUtils; import org.keycloak.models.utils.KeycloakModelUtils;
import static org.keycloak.testsuite.Assert.assertNames; import static org.keycloak.testsuite.Assert.assertNames;
import static org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude.AuthServer.REMOTE;
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher; import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
import org.keycloak.testsuite.arquillian.annotation.UncaughtServerErrorExpected; import org.keycloak.testsuite.arquillian.annotation.UncaughtServerErrorExpected;
import org.keycloak.testsuite.auth.page.AuthRealm; import org.keycloak.testsuite.auth.page.AuthRealm;
@ -280,6 +283,7 @@ public class GroupTest extends AbstractGroupTest {
@Test @Test
@UncaughtServerErrorExpected @UncaughtServerErrorExpected
@AuthServerContainerExclude(REMOTE)
public void doNotAllowSameGroupNameAtTopLevelInDatabase() throws Exception { public void doNotAllowSameGroupNameAtTopLevelInDatabase() throws Exception {
final String id = KeycloakModelUtils.generateId(); final String id = KeycloakModelUtils.generateId();
testingClient.server().run(session -> { testingClient.server().run(session -> {

View file

@ -424,6 +424,7 @@ public class BrowserFlowTest extends AbstractTestRealmKeycloakTest {
// Configure a conditional authenticator with a condition which change while the flow evaluation // Configure a conditional authenticator with a condition which change while the flow evaluation
// In such case, all the required authenticator inside the subflow should be evaluated even if the condition has changed // In such case, all the required authenticator inside the subflow should be evaluated even if the condition has changed
@Test @Test
@AuthServerContainerExclude(REMOTE)
public void testConditionalAuthenticatorWithConditionalSubFlowWithChangingConditionWhileFlowEvaluation() { public void testConditionalAuthenticatorWithConditionalSubFlowWithChangingConditionWhileFlowEvaluation() {
try { try {
configureBrowserFlowWithConditionalSubFlowWithChangingConditionWhileFlowEvaluation(); configureBrowserFlowWithConditionalSubFlowWithChangingConditionWhileFlowEvaluation();

View file

@ -82,6 +82,7 @@ import static org.junit.Assert.assertNotEquals;
import static org.junit.Assert.assertTrue; import static org.junit.Assert.assertTrue;
import static org.keycloak.testsuite.admin.ApiUtil.findClientByClientId; import static org.keycloak.testsuite.admin.ApiUtil.findClientByClientId;
import static org.keycloak.testsuite.util.OAuthClient.AUTH_SERVER_ROOT; import static org.keycloak.testsuite.util.OAuthClient.AUTH_SERVER_ROOT;
import static org.keycloak.testsuite.util.OAuthClient.SERVER_ROOT;
import static org.keycloak.testsuite.util.URLAssert.assertCurrentUrlStartsWithLoginUrlOf; import static org.keycloak.testsuite.util.URLAssert.assertCurrentUrlStartsWithLoginUrlOf;
/** /**
@ -802,7 +803,7 @@ public class LoginTest extends AbstractTestRealmKeycloakTest {
@Test @Test
public void openLoginFormWithDifferentApplication() throws Exception { public void openLoginFormWithDifferentApplication() throws Exception {
oauth.clientId("root-url-client"); oauth.clientId("root-url-client");
oauth.redirectUri("http://localhost:8180/foo/bar/"); oauth.redirectUri(SERVER_ROOT + "/foo/bar/");
oauth.openLoginForm(); oauth.openLoginForm();
// Login form shown after redirect from app // Login form shown after redirect from app

View file

@ -54,7 +54,7 @@ import java.util.Map;
* *
* @author <a href="mailto:thomas.darimont@gmail.com">Thomas Darimont</a> * @author <a href="mailto:thomas.darimont@gmail.com">Thomas Darimont</a>
*/ */
@EnableFeature(Profile.Feature.UPLOAD_SCRIPTS) @EnableFeature(value = Profile.Feature.UPLOAD_SCRIPTS, skipRestart = true)
public class ScriptAuthenticatorTest extends AbstractFlowTest { public class ScriptAuthenticatorTest extends AbstractFlowTest {
@Page @Page

View file

@ -35,6 +35,7 @@ import org.keycloak.representations.idm.RealmRepresentation;
import org.keycloak.saml.SAML2LogoutRequestBuilder; import org.keycloak.saml.SAML2LogoutRequestBuilder;
import org.keycloak.saml.processing.api.saml.v2.request.SAML2Request; import org.keycloak.saml.processing.api.saml.v2.request.SAML2Request;
import org.keycloak.services.resources.RealmsResource; import org.keycloak.services.resources.RealmsResource;
import org.keycloak.testsuite.arquillian.annotation.AuthServerContainerExclude;
import org.keycloak.testsuite.util.ReverseProxy; import org.keycloak.testsuite.util.ReverseProxy;
import org.keycloak.testsuite.util.SamlClient; import org.keycloak.testsuite.util.SamlClient;
import org.w3c.dom.Document; import org.w3c.dom.Document;
@ -49,6 +50,7 @@ import static org.keycloak.testsuite.util.Matchers.statusCodeIsHC;
* *
* @author <a href="mailto:sguilhen@redhat.com">Stefan Guilhen</a> * @author <a href="mailto:sguilhen@redhat.com">Stefan Guilhen</a>
*/ */
@AuthServerContainerExclude(AuthServerContainerExclude.AuthServer.REMOTE)
public class SamlReverseProxyTest extends AbstractSamlTest { public class SamlReverseProxyTest extends AbstractSamlTest {
@ClassRule @ClassRule