Fixing ClientTokenExchangeTest to also run when TLS is disabled

Closes #11818
This commit is contained in:
Pedro Igor 2022-05-26 12:04:50 -03:00 committed by Bruno Oliveira da Silva
parent e121371401
commit ea22989d89

View file

@ -178,7 +178,7 @@ public class ClientTokenExchangeTest extends AbstractKeycloakTest {
directPublic.setEnabled(true); directPublic.setEnabled(true);
directPublic.setProtocol(OIDCLoginProtocol.LOGIN_PROTOCOL); directPublic.setProtocol(OIDCLoginProtocol.LOGIN_PROTOCOL);
directPublic.setFullScopeAllowed(false); directPublic.setFullScopeAllowed(false);
directPublic.addRedirectUri("https://localhost:8543/auth/realms/master/app/auth"); directPublic.addRedirectUri("*");
directPublic.addProtocolMapper(AudienceProtocolMapper.createClaimMapper("client-exchanger-audience", clientExchanger.getClientId(), null, true, false)); directPublic.addProtocolMapper(AudienceProtocolMapper.createClaimMapper("client-exchanger-audience", clientExchanger.getClientId(), null, true, false));
ClientModel directUntrustedPublic = realm.addClient("direct-public-untrusted"); ClientModel directUntrustedPublic = realm.addClient("direct-public-untrusted");
@ -188,7 +188,7 @@ public class ClientTokenExchangeTest extends AbstractKeycloakTest {
directUntrustedPublic.setEnabled(true); directUntrustedPublic.setEnabled(true);
directUntrustedPublic.setProtocol(OIDCLoginProtocol.LOGIN_PROTOCOL); directUntrustedPublic.setProtocol(OIDCLoginProtocol.LOGIN_PROTOCOL);
directUntrustedPublic.setFullScopeAllowed(false); directUntrustedPublic.setFullScopeAllowed(false);
directUntrustedPublic.addRedirectUri("https://localhost:8543/auth/realms/master/app/auth"); directUntrustedPublic.addRedirectUri("*");
directUntrustedPublic.addProtocolMapper(AudienceProtocolMapper.createClaimMapper("client-exchanger-audience", clientExchanger.getClientId(), null, true, false)); directUntrustedPublic.addProtocolMapper(AudienceProtocolMapper.createClaimMapper("client-exchanger-audience", clientExchanger.getClientId(), null, true, false));
ClientModel directNoSecret = realm.addClient("direct-no-secret"); ClientModel directNoSecret = realm.addClient("direct-no-secret");