diff --git a/adapters/oidc/tomcat/tomcat-core/src/main/java/org/keycloak/adapters/tomcat/AbstractKeycloakAuthenticatorValve.java b/adapters/oidc/tomcat/tomcat-core/src/main/java/org/keycloak/adapters/tomcat/AbstractKeycloakAuthenticatorValve.java index 7356fe5de1..6a46e33d93 100755 --- a/adapters/oidc/tomcat/tomcat-core/src/main/java/org/keycloak/adapters/tomcat/AbstractKeycloakAuthenticatorValve.java +++ b/adapters/oidc/tomcat/tomcat-core/src/main/java/org/keycloak/adapters/tomcat/AbstractKeycloakAuthenticatorValve.java @@ -101,7 +101,7 @@ public abstract class AbstractKeycloakAuthenticatorValve extends FormAuthenticat // Possible scenarios: // 1) The deployment has a keycloak.config.resolver specified and it exists: // Outcome: adapter uses the resolver - // 2) The deployment has a keycloak.config.resolver and isn't valid (doesn't exists, isn't a resolver, ...) : + // 2) The deployment has a keycloak.config.resolver and isn't valid (doesn't exist, isn't a resolver, ...) : // Outcome: adapter is left unconfigured // 3) The deployment doesn't have a keycloak.config.resolver , but has a keycloak.json (or equivalent) // Outcome: adapter uses it diff --git a/adapters/oidc/undertow/src/main/java/org/keycloak/adapters/undertow/KeycloakServletExtension.java b/adapters/oidc/undertow/src/main/java/org/keycloak/adapters/undertow/KeycloakServletExtension.java index db9eb7d3f0..b73832192a 100755 --- a/adapters/oidc/undertow/src/main/java/org/keycloak/adapters/undertow/KeycloakServletExtension.java +++ b/adapters/oidc/undertow/src/main/java/org/keycloak/adapters/undertow/KeycloakServletExtension.java @@ -115,7 +115,7 @@ public class KeycloakServletExtension implements ServletExtension { // Possible scenarios: // 1) The deployment has a keycloak.config.resolver specified and it exists: // Outcome: adapter uses the resolver - // 2) The deployment has a keycloak.config.resolver and isn't valid (doesn't exists, isn't a resolver, ...) : + // 2) The deployment has a keycloak.config.resolver and isn't valid (doesn't exist, isn't a resolver, ...) : // Outcome: adapter is left unconfigured // 3) The deployment doesn't have a keycloak.config.resolver , but has a keycloak.json (or equivalent) // Outcome: adapter uses it diff --git a/adapters/saml/tomcat/tomcat-core/src/main/java/org/keycloak/adapters/saml/AbstractSamlAuthenticatorValve.java b/adapters/saml/tomcat/tomcat-core/src/main/java/org/keycloak/adapters/saml/AbstractSamlAuthenticatorValve.java index 3f57bff2d9..f8968c8070 100755 --- a/adapters/saml/tomcat/tomcat-core/src/main/java/org/keycloak/adapters/saml/AbstractSamlAuthenticatorValve.java +++ b/adapters/saml/tomcat/tomcat-core/src/main/java/org/keycloak/adapters/saml/AbstractSamlAuthenticatorValve.java @@ -87,7 +87,7 @@ public abstract class AbstractSamlAuthenticatorValve extends FormAuthenticator i // Possible scenarios: // 1) The deployment has a keycloak.config.resolver specified and it exists: // Outcome: adapter uses the resolver - // 2) The deployment has a keycloak.config.resolver and isn't valid (doesn't exists, isn't a resolver, ...) : + // 2) The deployment has a keycloak.config.resolver and isn't valid (doesn't exist, isn't a resolver, ...) : // Outcome: adapter is left unconfigured // 3) The deployment doesn't have a keycloak.config.resolver , but has a keycloak.json (or equivalent) // Outcome: adapter uses it diff --git a/adapters/saml/undertow/src/main/java/org/keycloak/adapters/saml/undertow/SamlServletExtension.java b/adapters/saml/undertow/src/main/java/org/keycloak/adapters/saml/undertow/SamlServletExtension.java index 1ffa287cfe..931ecd7169 100755 --- a/adapters/saml/undertow/src/main/java/org/keycloak/adapters/saml/undertow/SamlServletExtension.java +++ b/adapters/saml/undertow/src/main/java/org/keycloak/adapters/saml/undertow/SamlServletExtension.java @@ -108,7 +108,7 @@ public class SamlServletExtension implements ServletExtension { // Possible scenarios: // 1) The deployment has a keycloak.config.resolver specified and it exists: // Outcome: adapter uses the resolver - // 2) The deployment has a keycloak.config.resolver and isn't valid (doesn't exists, isn't a resolver, ...) : + // 2) The deployment has a keycloak.config.resolver and isn't valid (doesn't exist, isn't a resolver, ...) : // Outcome: adapter is left unconfigured // 3) The deployment doesn't have a keycloak.config.resolver , but has a keycloak.json (or equivalent) // Outcome: adapter uses it diff --git a/federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/membership/group/GroupLDAPStorageMapper.java b/federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/membership/group/GroupLDAPStorageMapper.java index 4a5004f478..66328fcbec 100644 --- a/federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/membership/group/GroupLDAPStorageMapper.java +++ b/federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/membership/group/GroupLDAPStorageMapper.java @@ -287,7 +287,7 @@ public class GroupLDAPStorageMapper extends AbstractLDAPStorageMapper implements }); } - // Possibly remove keycloak groups, which doesn't exists in LDAP + // Possibly remove keycloak groups, which don't exist in LDAP if (config.isDropNonExistingGroupsDuringSync()) { dropNonExistingKcGroups(realm, syncResult, visitedGroupIds); } @@ -300,7 +300,7 @@ public class GroupLDAPStorageMapper extends AbstractLDAPStorageMapper implements updateKeycloakGroupTreeEntry(realm, groupEntry, ldapGroups, null, syncResult, visitedGroupIds); } - // Possibly remove keycloak groups, which doesn't exists in LDAP + // Possibly remove keycloak groups, which don't exist in LDAP if (config.isDropNonExistingGroupsDuringSync()) { dropNonExistingKcGroups(realm, syncResult, visitedGroupIds); } @@ -337,7 +337,7 @@ public class GroupLDAPStorageMapper extends AbstractLDAPStorageMapper implements } private void dropNonExistingKcGroups(RealmModel realm, SynchronizationResult syncResult, Set visitedGroupIds) { - // Remove keycloak groups, which doesn't exists in LDAP + // Remove keycloak groups, which don't exist in LDAP getAllKcGroups(realm) .filter(kcGroup -> !visitedGroupIds.contains(kcGroup.getId())) .forEach(kcGroup -> { @@ -398,7 +398,7 @@ public class GroupLDAPStorageMapper extends AbstractLDAPStorageMapper implements // Could theoretically happen on some LDAP servers if 'memberof' style is used and 'memberof' attribute of user references non-existing group if (kcGroup == null) { String groupName = ldapGroup.getAttributeAsString(config.getGroupNameLdapAttribute()); - logger.warnf("User '%s' is member of group '%s', which doesn't exists in LDAP", user.getUsername(), groupName); + logger.warnf("User '%s' is member of group '%s', which doesn't exist in LDAP", user.getUsername(), groupName); } } @@ -445,7 +445,7 @@ public class GroupLDAPStorageMapper extends AbstractLDAPStorageMapper implements } - // Map to track all LDAP groups also exists in Keycloak + // Map to track all LDAP groups also exist in Keycloak Set ldapGroupNames = new HashSet<>(); // Create or update KC groups to LDAP including their attributes @@ -538,7 +538,7 @@ public class GroupLDAPStorageMapper extends AbstractLDAPStorageMapper implements } // Recursively check if parent group exists in LDAP. If yes, then return current group. If not, then recursively call this method - // for the predecessor. Result is the highest group, which doesn't yet exists in LDAP (and hence requires sync to LDAP) + // for the predecessor. Result is the highest group, which doesn't yet exist in LDAP (and hence requires sync to LDAP) private GroupModel getHighestPredecessorNotExistentInLdap(GroupModel groupsPathGroup, GroupModel group) { GroupModel parentGroup = group.getParent(); if (parentGroup == groupsPathGroup) { @@ -550,7 +550,7 @@ public class GroupLDAPStorageMapper extends AbstractLDAPStorageMapper implements // Parent exists in LDAP. Let's return current group return group; } else { - // Parent doesn't exists in LDAP. Let's recursively go up. + // Parent doesn't exist in LDAP. Let's recursively go up. return getHighestPredecessorNotExistentInLdap(groupsPathGroup, parentGroup); } } @@ -737,7 +737,7 @@ public class GroupLDAPStorageMapper extends AbstractLDAPStorageMapper implements super.leaveGroup(group); } } else { - // Group mappings exists in LDAP. For LDAP_ONLY mode, we can just delete it in LDAP. For READ_ONLY we can't delete it -> throw error + // Group mapping exists in LDAP. For LDAP_ONLY mode, we can just delete it in LDAP. For READ_ONLY we can't delete it -> throw error if (config.getMode() == LDAPGroupMapperMode.READ_ONLY) { throw new ModelException("Not possible to delete LDAP group mappings as mapper mode is READ_ONLY"); } else { diff --git a/federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/membership/group/GroupTreeResolver.java b/federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/membership/group/GroupTreeResolver.java index cbca5e72be..90e451ec44 100644 --- a/federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/membership/group/GroupTreeResolver.java +++ b/federation/ldap/src/main/java/org/keycloak/storage/ldap/mappers/membership/group/GroupTreeResolver.java @@ -119,9 +119,9 @@ public class GroupTreeResolver { } else if (ignoreMissingGroups) { // Need to remove the missing group iterator.remove(); - logger.debug("Group '" + child + "' referenced as member of group '" + group.getGroupName() + "' doesn't exists. Ignoring."); + logger.debug("Group '" + child + "' referenced as member of group '" + group.getGroupName() + "' doesn't exist. Ignoring."); } else { - throw new GroupTreeResolveException("Group '" + child + "' referenced as member of group '" + group.getGroupName() + "' doesn't exists"); + throw new GroupTreeResolveException("Group '" + child + "' referenced as member of group '" + group.getGroupName() + "' doesn't exist"); } } } diff --git a/federation/ldap/src/test/java/org/keycloak/storage/ldap/idm/model/GroupTreeResolverTest.java b/federation/ldap/src/test/java/org/keycloak/storage/ldap/idm/model/GroupTreeResolverTest.java index 7b8f2031c2..c67536362f 100644 --- a/federation/ldap/src/test/java/org/keycloak/storage/ldap/idm/model/GroupTreeResolverTest.java +++ b/federation/ldap/src/test/java/org/keycloak/storage/ldap/idm/model/GroupTreeResolverTest.java @@ -119,7 +119,7 @@ public class GroupTreeResolverTest { resolver.resolveGroupTree(groups, false); Assert.fail("Exception expected because of missing referenced group"); } catch (GroupTreeResolver.GroupTreeResolveException gre) { - Assert.assertEquals("Group 'group3' referenced as member of group 'group2' doesn't exists", gre.getMessage()); + Assert.assertEquals("Group 'group3' referenced as member of group 'group2' doesn't exist", gre.getMessage()); } List groupTree = resolver.resolveGroupTree(groups, true); diff --git a/server-spi-private/src/main/java/org/keycloak/models/utils/RepresentationToModel.java b/server-spi-private/src/main/java/org/keycloak/models/utils/RepresentationToModel.java index 05c833f00b..bb0f3e8f5e 100755 --- a/server-spi-private/src/main/java/org/keycloak/models/utils/RepresentationToModel.java +++ b/server-spi-private/src/main/java/org/keycloak/models/utils/RepresentationToModel.java @@ -320,7 +320,7 @@ public class RepresentationToModel { if (clientScope != null) { newRealm.addDefaultClientScope(clientScope, true); } else { - logger.warnf("Referenced client scope '%s' doesn't exists", clientScopeName); + logger.warnf("Referenced client scope '%s' doesn't exist", clientScopeName); } } } @@ -330,7 +330,7 @@ public class RepresentationToModel { if (clientScope != null) { newRealm.addDefaultClientScope(clientScope, false); } else { - logger.warnf("Referenced client scope '%s' doesn't exists", clientScopeName); + logger.warnf("Referenced client scope '%s' doesn't exist", clientScopeName); } } } @@ -1500,7 +1500,7 @@ public class RepresentationToModel { if (clientScope != null) { client.addClientScope(clientScope, defaultScope); } else { - logger.warnf("Referenced client scope '%s' doesn't exists. Ignoring", clientScopeName); + logger.warnf("Referenced client scope '%s' doesn't exist. Ignoring", clientScopeName); } } diff --git a/services/src/main/java/org/keycloak/exportimport/dir/DirImportProvider.java b/services/src/main/java/org/keycloak/exportimport/dir/DirImportProvider.java index 6f9390669f..353e230b50 100755 --- a/services/src/main/java/org/keycloak/exportimport/dir/DirImportProvider.java +++ b/services/src/main/java/org/keycloak/exportimport/dir/DirImportProvider.java @@ -54,7 +54,7 @@ public class DirImportProvider implements ImportProvider { // Delete and recreate directory inside tmp this.rootDirectory = new File(tempDir + "/keycloak-export"); if (!this.rootDirectory .exists()) { - throw new IllegalStateException("Directory " + this.rootDirectory + " doesn't exists"); + throw new IllegalStateException("Directory " + this.rootDirectory + " doesn't exist"); } logger.infof("Importing from directory %s", this.rootDirectory.getAbsolutePath()); @@ -64,7 +64,7 @@ public class DirImportProvider implements ImportProvider { this.rootDirectory = rootDirectory; if (!this.rootDirectory.exists()) { - throw new IllegalStateException("Directory " + this.rootDirectory + " doesn't exists"); + throw new IllegalStateException("Directory " + this.rootDirectory + " doesn't exist"); } logger.infof("Importing from directory %s", this.rootDirectory.getAbsolutePath()); diff --git a/services/src/main/java/org/keycloak/forms/login/freemarker/model/AuthenticationContextBean.java b/services/src/main/java/org/keycloak/forms/login/freemarker/model/AuthenticationContextBean.java index dde0aa7db4..cec110afc7 100644 --- a/services/src/main/java/org/keycloak/forms/login/freemarker/model/AuthenticationContextBean.java +++ b/services/src/main/java/org/keycloak/forms/login/freemarker/model/AuthenticationContextBean.java @@ -62,7 +62,7 @@ public class AuthenticationContextBean { public String getAttemptedUsername() { String username = context.getAuthenticationSession().getAuthNote(AbstractUsernameFormAuthenticator.ATTEMPTED_USERNAME); - // Fallback to real username of the user just if attemptedUsername doesn't exists + // Fallback to real username of the user just if attemptedUsername doesn't exist if (username == null) { username = context.getUser().getUsername(); } diff --git a/services/src/main/java/org/keycloak/services/managers/AuthenticationManager.java b/services/src/main/java/org/keycloak/services/managers/AuthenticationManager.java index f11f177969..9460805699 100755 --- a/services/src/main/java/org/keycloak/services/managers/AuthenticationManager.java +++ b/services/src/main/java/org/keycloak/services/managers/AuthenticationManager.java @@ -301,7 +301,7 @@ public class AuthenticationManager { RootAuthenticationSessionModel rootLogoutSession = null; boolean browserCookiePresent = false; - // Try to lookup current authSessionId from browser cookie. If doesn't exists, use the same as current userSession + // Try to lookup current authSessionId from browser cookie. If doesn't exist, use the same as current userSession if (browserCookie) { rootLogoutSession = asm.getCurrentRootAuthenticationSession(realm); } diff --git a/services/src/main/java/org/keycloak/services/managers/UserSessionCrossDCManager.java b/services/src/main/java/org/keycloak/services/managers/UserSessionCrossDCManager.java index e8736b3418..a2f448807d 100644 --- a/services/src/main/java/org/keycloak/services/managers/UserSessionCrossDCManager.java +++ b/services/src/main/java/org/keycloak/services/managers/UserSessionCrossDCManager.java @@ -68,7 +68,7 @@ public class UserSessionCrossDCManager { AuthSessionId authSessionId = asm.decodeAuthSessionId(oldEncodedId); String sessionId = authSessionId.getDecodedId(); - // This will remove userSession "locally" if it doesn't exists on remoteCache + // This will remove userSession "locally" if it doesn't exist on remoteCache kcSession.sessions().getUserSessionWithPredicate(realm, sessionId, false, (UserSessionModel userSession2) -> userSession2 == null); UserSessionModel userSession = kcSession.sessions().getUserSession(realm, sessionId); diff --git a/services/src/main/java/org/keycloak/services/resources/admin/AuthenticationManagementResource.java b/services/src/main/java/org/keycloak/services/resources/admin/AuthenticationManagementResource.java index b3e36761be..3f0592b176 100755 --- a/services/src/main/java/org/keycloak/services/resources/admin/AuthenticationManagementResource.java +++ b/services/src/main/java/org/keycloak/services/resources/admin/AuthenticationManagementResource.java @@ -406,7 +406,7 @@ public class AuthenticationManagementResource { AuthenticationFlowModel parentFlow = realm.getFlowByAlias(flowAlias); if (parentFlow == null) { - return ErrorResponse.error("Parent flow doesn't exists", Response.Status.BAD_REQUEST); + return ErrorResponse.error("Parent flow doesn't exist", Response.Status.BAD_REQUEST); } String alias = data.get("alias"); String type = data.get("type"); @@ -462,7 +462,7 @@ public class AuthenticationManagementResource { AuthenticationFlowModel parentFlow = realm.getFlowByAlias(flowAlias); if (parentFlow == null) { - throw new BadRequestException("Parent flow doesn't exists"); + throw new BadRequestException("Parent flow doesn't exist"); } if (parentFlow.isBuiltIn()) { throw new BadRequestException("It is illegal to add execution to a built in flow"); diff --git a/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/TestingResourceProvider.java b/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/TestingResourceProvider.java index a2eb0d26c2..94a735a464 100644 --- a/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/TestingResourceProvider.java +++ b/testsuite/integration-arquillian/servers/auth-server/services/testsuite-providers/src/main/java/org/keycloak/testsuite/rest/TestingResourceProvider.java @@ -761,7 +761,7 @@ public class TestingResourceProvider implements RealmResourceProvider { RealmModel realm = getRealmByName(realmName); ClientModel serviceClient = realm.getClientByClientId(clientId); if (serviceClient == null) { - throw new NotFoundException("Referenced service client doesn't exists"); + throw new NotFoundException("Referenced service client doesn't exist"); } ClientScopeModel clientScopeModel = realm.addClientScope(clientId); diff --git a/testsuite/integration-arquillian/test-apps/servlets/src/main/java/org/keycloak/testsuite/adapter/servlet/SendUsernameServlet.java b/testsuite/integration-arquillian/test-apps/servlets/src/main/java/org/keycloak/testsuite/adapter/servlet/SendUsernameServlet.java index db67b186f5..b533cd1a82 100755 --- a/testsuite/integration-arquillian/test-apps/servlets/src/main/java/org/keycloak/testsuite/adapter/servlet/SendUsernameServlet.java +++ b/testsuite/integration-arquillian/test-apps/servlets/src/main/java/org/keycloak/testsuite/adapter/servlet/SendUsernameServlet.java @@ -226,10 +226,10 @@ public class SendUsernameServlet { return output; } - return "SamlSession doesn't exists"; + return "SamlSession doesn't exist"; } - return "Session doesn't exists"; + return "Session doesn't exist"; } private String getRoles() { diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/FlowTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/FlowTest.java index 239db37f5b..0dbfda5ea3 100644 --- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/FlowTest.java +++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/authentication/FlowTest.java @@ -211,7 +211,7 @@ public class FlowTest extends AbstractAuthenticationTest { // Check deleting flow second time will fail try { authMgmtResource.deleteFlow("id-123-notExistent"); - Assert.fail("Not expected to delete flow, which doesn't exists"); + Assert.fail("Not expected to delete flow, which doesn't exist"); } catch (NotFoundException nfe) { // Expected } diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/BrowserFlowTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/BrowserFlowTest.java index c71dff96d6..9a8892df18 100644 --- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/BrowserFlowTest.java +++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/BrowserFlowTest.java @@ -1316,10 +1316,10 @@ public class BrowserFlowTest extends AbstractTestRealmKeycloakTest { AuthenticationFlowRepresentation flowRepresentation = AbstractAuthenticationTest.findFlowByAlias(flowToDeleteAlias, flows); - // Throw error if flow doesn't exists to ensure we did not accidentally use different alias of non-existing flow when + // Throw error if flow doesn't exist to ensure we did not accidentally use different alias of non-existing flow when // calling this method if (flowRepresentation == null) { - throw new IllegalArgumentException("The flow with alias " + flowToDeleteAlias + " did not exists"); + throw new IllegalArgumentException("The flow with alias " + flowToDeleteAlias + " did not exist"); } realmResource.flows().deleteFlow(flowRepresentation.getId()); diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/ResetPasswordTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/ResetPasswordTest.java index 80b2baaa1e..4d97dbd8ed 100644 --- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/ResetPasswordTest.java +++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/ResetPasswordTest.java @@ -215,7 +215,7 @@ public class ResetPasswordTest extends AbstractTestRealmKeycloakTest { String changePasswordUrl = resetPassword("login-test"); events.clear(); - assertSecondPasswordResetFails(changePasswordUrl, oauth.getClientId()); // KC_RESTART doesn't exists, it was deleted after first successful reset-password flow was finished + assertSecondPasswordResetFails(changePasswordUrl, oauth.getClientId()); // KC_RESTART doesn't exist, it was deleted after first successful reset-password flow was finished } @Test diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/x509/X509BrowserCRLTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/x509/X509BrowserCRLTest.java index ab35aaa6d5..a059b6f56f 100644 --- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/x509/X509BrowserCRLTest.java +++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/x509/X509BrowserCRLTest.java @@ -58,7 +58,7 @@ public class X509BrowserCRLTest extends AbstractX509AuthenticationTest { @Test public void loginSuccessWithEmptyRevocationListFromFile() { - // Not possible to test file CRL on undertow at this moment - jboss config dir doesn't exists + // Not possible to test file CRL on undertow at this moment - jboss config dir doesn't exist ContainerAssume.assumeNotAuthServerUndertow(); X509AuthenticatorConfigModel config = @@ -74,7 +74,7 @@ public class X509BrowserCRLTest extends AbstractX509AuthenticationTest { @Test public void loginFailedWithIntermediateRevocationListFromFile() { - // Not possible to test file CRL on undertow at this moment - jboss config dir doesn't exists + // Not possible to test file CRL on undertow at this moment - jboss config dir doesn't exist ContainerAssume.assumeNotAuthServerUndertow(); X509AuthenticatorConfigModel config = diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/x509/X509DirectGrantTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/x509/X509DirectGrantTest.java index 1622232df0..b657a8a220 100644 --- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/x509/X509DirectGrantTest.java +++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/x509/X509DirectGrantTest.java @@ -221,7 +221,7 @@ public class X509DirectGrantTest extends AbstractX509AuthenticationTest { @Test public void loginCertificateRevoked() throws Exception { - // Not possible to test file CRL on undertow at this moment - jboss config dir doesn't exists + // Not possible to test file CRL on undertow at this moment - jboss config dir doesn't exist ContainerAssume.assumeNotAuthServerUndertow(); X509AuthenticatorConfigModel config =