Avoid using nip.io resolution in RefreshTokenTest#refreshTokenWithDifferentIssuer test
Closes #25675 Signed-off-by: rmartinc <rmartinc@redhat.com>
This commit is contained in:
parent
b2930a4799
commit
d2e19da64e
1 changed files with 12 additions and 10 deletions
|
@ -309,7 +309,7 @@ public class RefreshTokenTest extends AbstractKeycloakTest {
|
|||
|
||||
@Test
|
||||
public void refreshTokenWithDifferentIssuer() throws Exception {
|
||||
final String proxyHost = "proxy.kc.127.0.0.1.nip.io";
|
||||
final String proxyHost = "localhost";
|
||||
final int httpPort = 8666;
|
||||
final int httpsPort = 8667;
|
||||
|
||||
|
@ -330,17 +330,20 @@ public class RefreshTokenTest extends AbstractKeycloakTest {
|
|||
SimpleUndertowLoadBalancer proxy = new SimpleUndertowLoadBalancer(proxyHost, httpPort, httpsPort, "node1=" + getHttpAuthServerContextRoot() + "/auth");
|
||||
proxy.start();
|
||||
|
||||
try {
|
||||
oauth.baseUrl(String.format("http://%s:%s", proxyHost, httpPort));
|
||||
|
||||
response = oauth.doRefreshTokenRequest(refreshTokenString, "password");
|
||||
|
||||
Assert.assertEquals(400, response.getStatusCode());
|
||||
Assert.assertEquals("invalid_grant", response.getError());
|
||||
assertThat(response.getErrorDescription(), Matchers.startsWith("Invalid token issuer."));
|
||||
events.expect(EventType.REFRESH_TOKEN).error(Errors.INVALID_TOKEN).user((String) null).assertEvent();
|
||||
|
||||
} finally {
|
||||
proxy.stop();
|
||||
|
||||
oauth.baseUrl(AUTH_SERVER_ROOT);
|
||||
}
|
||||
}
|
||||
|
||||
@Test
|
||||
public void refreshTokenWithAccessToken() throws Exception {
|
||||
|
@ -352,7 +355,6 @@ public class RefreshTokenTest extends AbstractKeycloakTest {
|
|||
String accessTokenString = tokenResponse.getAccessToken();
|
||||
|
||||
OAuthClient.AccessTokenResponse response = oauth.doRefreshTokenRequest(accessTokenString, "password");
|
||||
|
||||
Assert.assertNotEquals(200, response.getStatusCode());
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in a new issue