Fix LDAP test for case-insensitive databases like MySQL
This commit is contained in:
parent
98852e2f3f
commit
9ae8d6aee1
1 changed files with 40 additions and 40 deletions
|
@ -124,40 +124,19 @@ public class FederationProvidersIntegrationTest {
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void loginClassic() {
|
public void caseSensitiveSearch() {
|
||||||
loginPage.open();
|
loginPage.open();
|
||||||
loginPage.login("mary", "password-app");
|
|
||||||
|
|
||||||
Assert.assertEquals(AppPage.RequestType.AUTH_RESPONSE, appPage.getRequestType());
|
// This should fail for now due to case-sensitivity
|
||||||
Assert.assertNotNull(oauth.getCurrentQuery().get(OAuth2Constants.CODE));
|
loginPage.login("johnKeycloak", "Password1");
|
||||||
|
Assert.assertEquals("Invalid username or password.", loginPage.getError());
|
||||||
|
|
||||||
|
loginPage.login("John@email.org", "Password1");
|
||||||
|
Assert.assertEquals("Invalid username or password.", loginPage.getError());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void loginLdap() {
|
public void deleteFederationLink() {
|
||||||
loginPage.open();
|
|
||||||
loginPage.login("johnkeycloak", "Password1");
|
|
||||||
|
|
||||||
Assert.assertEquals(AppPage.RequestType.AUTH_RESPONSE, appPage.getRequestType());
|
|
||||||
Assert.assertNotNull(oauth.getCurrentQuery().get(OAuth2Constants.CODE));
|
|
||||||
|
|
||||||
profilePage.open();
|
|
||||||
Assert.assertEquals("John", profilePage.getFirstName());
|
|
||||||
Assert.assertEquals("Doe", profilePage.getLastName());
|
|
||||||
Assert.assertEquals("john@email.org", profilePage.getEmail());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void loginLdapWithEmail() {
|
|
||||||
loginPage.open();
|
|
||||||
loginPage.login("john@email.org", "Password1");
|
|
||||||
|
|
||||||
Assert.assertEquals(AppPage.RequestType.AUTH_RESPONSE, appPage.getRequestType());
|
|
||||||
Assert.assertNotNull(oauth.getCurrentQuery().get(OAuth2Constants.CODE));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void XdeleteLink() {
|
|
||||||
loginLdap();
|
loginLdap();
|
||||||
{
|
{
|
||||||
KeycloakSession session = keycloakRule.startSession();
|
KeycloakSession session = keycloakRule.startSession();
|
||||||
|
@ -192,6 +171,39 @@ public class FederationProvidersIntegrationTest {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void loginClassic() {
|
||||||
|
loginPage.open();
|
||||||
|
loginPage.login("mary", "password-app");
|
||||||
|
|
||||||
|
Assert.assertEquals(AppPage.RequestType.AUTH_RESPONSE, appPage.getRequestType());
|
||||||
|
Assert.assertNotNull(oauth.getCurrentQuery().get(OAuth2Constants.CODE));
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void loginLdap() {
|
||||||
|
loginPage.open();
|
||||||
|
loginPage.login("johnkeycloak", "Password1");
|
||||||
|
|
||||||
|
Assert.assertEquals(AppPage.RequestType.AUTH_RESPONSE, appPage.getRequestType());
|
||||||
|
Assert.assertNotNull(oauth.getCurrentQuery().get(OAuth2Constants.CODE));
|
||||||
|
|
||||||
|
profilePage.open();
|
||||||
|
Assert.assertEquals("John", profilePage.getFirstName());
|
||||||
|
Assert.assertEquals("Doe", profilePage.getLastName());
|
||||||
|
Assert.assertEquals("john@email.org", profilePage.getEmail());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void loginLdapWithEmail() {
|
||||||
|
loginPage.open();
|
||||||
|
loginPage.login("john@email.org", "Password1");
|
||||||
|
|
||||||
|
Assert.assertEquals(AppPage.RequestType.AUTH_RESPONSE, appPage.getRequestType());
|
||||||
|
Assert.assertNotNull(oauth.getCurrentQuery().get(OAuth2Constants.CODE));
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void passwordChangeLdap() throws Exception {
|
public void passwordChangeLdap() throws Exception {
|
||||||
changePasswordPage.open();
|
changePasswordPage.open();
|
||||||
|
@ -401,18 +413,6 @@ public class FederationProvidersIntegrationTest {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testCaseSensitiveSearch() {
|
|
||||||
loginPage.open();
|
|
||||||
|
|
||||||
// This should fail for now due to case-sensitivity
|
|
||||||
loginPage.login("johnKeycloak", "Password1");
|
|
||||||
Assert.assertEquals("Invalid username or password.", loginPage.getError());
|
|
||||||
|
|
||||||
loginPage.login("John@email.org", "Password1");
|
|
||||||
Assert.assertEquals("Invalid username or password.", loginPage.getError());
|
|
||||||
}
|
|
||||||
|
|
||||||
static PartitionManager getPartitionManager(KeycloakSession keycloakSession, UserFederationProviderModel ldapFedModel) {
|
static PartitionManager getPartitionManager(KeycloakSession keycloakSession, UserFederationProviderModel ldapFedModel) {
|
||||||
PartitionManagerProvider partitionManagerProvider = keycloakSession.getProvider(PartitionManagerProvider.class);
|
PartitionManagerProvider partitionManagerProvider = keycloakSession.getProvider(PartitionManagerProvider.class);
|
||||||
return partitionManagerProvider.getPartitionManager(ldapFedModel);
|
return partitionManagerProvider.getPartitionManager(ldapFedModel);
|
||||||
|
|
Loading…
Reference in a new issue