4.0.0
org.keycloak.testsuite
integration-arquillian
999.0.0-SNAPSHOT
pom
integration-arquillian-tests
Tests
base
other
undertow
true
false
false
false
false
false
false
false
false
false
auth-server-${auth.server}
${containers.home}/${auth.server.container}
${auth.server.home}
${docker.container.testdb.ip}
localhost
${auth.server.host}
100
8180
8089
8543
10090
10099
true
-Xms64m -Xmx512m
serverConfig
org.jboss.as.arquillian.container.managed.ManagedDeployableContainer
${auth.server.config.dir}/keycloak.truststore
secret
jks
${auth.server.config.dir}/keycloak.jks
secret
jks
integration-arquillian-servers-auth-server-${auth.server}
${auth.server.undertow}
true
false
300
5005
n
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.debug.suspend},address=${auth.server.host}:${auth.server.debug.port}
false
false
false
${auth.server.host}
localhost
true
integration-arquillian-servers-app-server-${app.server}
${containers.home}/app-server-${app.server}
${app.server.home}/standalone/configuration
200
8280
8643
http-remoting
10190
60
500
300
10290
400
10390
5006
n
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${app.server.debug.suspend},address=localhost:${app.server.debug.port}
7301
n
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${app.server.1.debug.suspend},address=localhost:${app.server.1.debug.port}
7302
n
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${app.server.2.debug.suspend},address=localhost:${app.server.2.debug.port}
64m
768m
-Xms${app.server.memory.Xms} -Xmx${app.server.memory.Xmx} -XX:MetaspaceSize=${surefire.memory.metaspace} -XX:MaxMetaspaceSize=${surefire.memory.metaspace.max}
false
${app.server.keystore.dir}/keycloak.truststore
secret
${app.server.keystore.dir}/adapter.jks
secret
false
${containers.home}/cache-server-${cache.server}
1010
11000
2010
12000
true
false
--add-exports=java.base/sun.security.validator=ALL-UNNAMED --add-exports=java.naming/com.sun.jndi.ldap=ALL-UNNAMED --add-exports=java.base/com.sun.crypto.provider=ALL-UNNAMED --add-exports=java.desktop/sun.awt=ALL-UNNAMED --add-opens=java.base/java.lang=ALL-UNNAMED --add-opens=java.base/java.lang.invoke=ALL-UNNAMED --add-opens=java.base/java.io=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.management/javax.management=ALL-UNNAMED --add-opens=java.naming/javax.naming=ALL-UNNAMED --add-modules=java.se
${project.build.directory}/dependency/keystore
${dependency.keystore.root}/keycloak.truststore
secret
${dependency.keystore.root}/keycloak.jks
secret
localhost
12232
13232
jdbc:h2:mem:test-dc-shared
%d{HH:mm:ss,SSS} %-5p [%c] %m%n
${user.home}/.m2/repository
${user.home}/.m2/settings.xml
-Dkie.maven.settings.custom=${settings.path}
-Dkie.maven.repo.local=${maven.repo.local}
-Drepo.url=${repo.url}
-Dkeycloak.x509cert.lookup.provider=${keycloak.x509cert.lookup.provider}
-Dapp.server.base.url=http://localhost:${app.server.http.port}
-Dauth.server.base.url=http://localhost:${auth.server.http.port}
-Dapp.server.ssl.base.url=https://localhost:${app.server.https.port}
-Dapp.server.ssl.required=${app.server.ssl.required}
-Dauth.server.ssl.base.url=https://localhost:${auth.server.https.port}
-Dauth.server.ssl.required=${auth.server.ssl.required}
-Dauth.server.host=${auth.server.host}
-Dauth.server.host2=${auth.server.host2}
-Dapp.server.host=${app.server.host}
-Dapp.server.http.port=${app.server.http.port}
-Dapp.server.https.port=${app.server.https.port}
-Dmy.host.name=localhost
-Djava.security.krb5.conf=${project.build.directory}/dependency/kerberos/test-krb5.conf
${project.build.directory}/examples
${keycloak-parent.basedir}/examples
${project.version}
false
htmlUnit
false
true
60
Win32
chrome
--headless
chrome
false
true
--headless --window-size=1920,1080 --remote-allow-origins=*
true
true
${project.build.directory}/dependency/test-constants.properties
false
true
true
${auth.server.config.dir}/ca.crt
${auth.server.config.dir}/client.crt
${auth.server.config.dir}/client.jks
secret
${auth.server.config.dir}/client.key
secret
${auth.server.config.dir}/keycloak.truststore
secret
${auth.server.config.dir}/other_client.jks
secret
${auth.server.config.dir}/test-user-obb.jks
password
false
default
local
disabled
JKS,PKCS12,BCFKS
1024,2048,4096
true
maven-dependency-plugin
unpack-undertow-server
generate-test-resources
unpack
org.keycloak.testsuite
integration-arquillian-servers-auth-server-undertow
${project.version}
jar
${containers.home}/auth-server-undertow
*.jks,*.crt,*.truststore,*.crl,*.key,certs/clients/*
${auth.server.undertow.skip.unpack}
unpack-quarkus-server
generate-test-resources
unpack
org.keycloak.testsuite
integration-arquillian-servers-auth-server-quarkus
${project.version}
zip
${containers.home}
${auth.server.quarkus.skip.unpack}
unpack-app-server
generate-test-resources
unpack
org.keycloak.testsuite
${app.server.artifactId}
${project.version}
zip
${containers.home}
${app.server.skip.unpack}
example-wars
generate-test-resources
copy
${skip.copy.example.wars}
org.keycloak.testsuite
hello-world-authz-service
${project.version}
war
org.keycloak.testsuite
servlet-authz-app
${project.version}
war
org.keycloak.testsuite
servlet-policy-enforcer
${project.version}
war
org.keycloak.testsuite
integration-arquillian-test-apps-cors-angular-product
${project.version}
war
org.keycloak.testsuite
integration-arquillian-test-apps-cors-database-service
${project.version}
war
${examples.home}
true
test-apps-realms
generate-test-resources
unpack
org.keycloak.testsuite
integration-arquillian-test-apps-dist
${project.version}
zip
**/*realm.json,**/*authz-service.json,**/testsaml.json,**/*-keycloak.json
${examples.home}
true
maven-resources-plugin
copy-admin-user-json-file
generate-resources
copy-resources
${skip.add.user.json}
${auth.server.config.dir}
src/test/resources
keycloak-add-user.json
true
copy-truststore
generate-resources
copy-resources
${project.build.directory}/dependency
src/test/resources
keystore/**
example-realms
generate-test-resources
copy-resources
${app.server.skip.unpack}
${examples.home}/example-realms
true
${examples.basedir}
true
**/*.json
maven-antrun-plugin
clean-second-cache-server-arquillian-bug-workaround
process-test-resources
run
${skip.clean.second.cache}
${cache.server.home}/standalone-dc-2
maven-surefire-plugin
${project.build.directory}
${project.build.directory}/dependency/arquillian.xml
file:${project.build.directory}/dependency/log4j.properties
${auth.server}
${auth.server.container}
${auth.server.undertow}
${auth.server.jboss}
${auth.server.memory.settings}
${auth.server.home}
${auth.server.java.home}
${auth.server.host}
${auth.server.management.host}
${auth.server.browserHost}
${auth.server.port.offset}
${auth.server.http.port}
${auth.server.events.http.port}
${auth.server.https.port}
${auth.server.management.port}
${auth.server.management.port.jmx}
${auth.server.ssl.required}
${auth.server.jboss.startup.timeout}
${auth.server.config.dir}
${auth.server.config.property.name}
${auth.server.config.property.value}
${auth.server.adapter.impl.class}
${auth.server.jboss.jvm.debug.args}
${auth.server.truststore}
${auth.server.truststore.password}
${auth.server.truststore.type}
${auth.server.keystore}
${auth.server.keystore.password}
${auth.server.keystore.type}
${auth.server.java.security.file}
${auth.server.jvm.args.extra}
${auth.server.profile}
${auth.server.feature}
${auth.server.host2}
${app.server}
${app.server.home}
${app.server.keystore.dir}
${app.server.java.home}
${app.server.memory.settings}
${app.server.port.offset}
${app.server.http.port}
${app.server.https.port}
${app.server.management.protocol}
${app.server.management.port}
${app.server.startup.timeout}
${app.server.reverse-proxy.port.offset}
${app.server.1.port.offset}
${app.server.1.management.port}
${app.server.2.port.offset}
${app.server.2.management.port}
${app.server.jboss.jvm.debug.args}
${app.server.truststore}
${app.server.truststore.password}
${app.server.keystore}
${app.server.keystore.password}
${app.server.1.jboss.jvm.debug.args}
${app.server.2.jboss.jvm.debug.args}
${app.server.jvm.args.extra}
${tomcat.javax.net.ssl.properties}
${frontend.console.output}
${backend.console.output}
${auth.server.remote}
${auth.server.quarkus}
${auth.server.quarkus.embedded}
${auth.server.config.dir}
${adapter.test.props}
${examples.home}
${examples.version.suffix}
${kie.maven.settings}
${testsuite.constants}
${cli.log.output}
${test.intermittent}
${default.modular.jvm.options}
${dependency.keystore.root}
${dependency.truststore}
${dependency.truststore.password}
${dependency.keystore}
${dependency.keystore.password}
${browser}
${browser.strict.cookies}
${js.browser}
${js.chromeArguments}
${htmlUnitBrowserVersion}
${webdriverDownloadBinaries}
${droneInstantiationTimeoutInSeconds}
${github.username}
${github.secretToken}
${ieDriverArch}
${ieDriverVersion}
${firefox_binary}
${chromeBinary}
${chromeArguments}
${chromeDriverVersion}
${firefoxLegacyDriver}
${firefoxDriverVersion}
${firefoxUserPreferences}
${firefoxHeadless}
${appium.platformName}
${appium.deviceName}
${appium.browserName}
${appium.avd}
${appium.automationName}
${appium.noReset}
${appium.fullReset}
${project.version}
${client.certificate.ca.path}
${client.certificate.file}
${client.certificate.keystore}
${client.certificate.keystore.passphrase}
${client.key.file}
${client.key.passphrase}
${client.truststore}
${client.truststore.passphrase}
${hok.client.certificate.keystore}
${hok.client.certificate.keystore.passphrase}
${obb.client.certificate.keystore}
${obb.client.certificate.keystore.passphrase}
${auth.server.ocsp.responder.enabled}
${auth.server.cluster}
${auth.server.undertow.cluster}
${auth.server.jboss.cluster}
${auth.server.jboss.legacy}
${auth.server.quarkus.cluster}
${auth.server.quarkus.cluster.config}
${auth.server.crossdc}
${auth.server.undertow.crossdc}
${auth.server.jboss.crossdc}
${cache.server.lifecycle.skip}
${cache.server}
${cache.server.legacy}
${cache.server.1.port.offset}
${cache.server.home}
${cache.server.console.output}
${cache.server.management.port}
${cache.server.2.port.offset}
${cache.server.2.management.port}
${cache.server.java.home}
${cache.server.auth}
${keycloak.connectionsInfinispan.remoteStorePort}
${keycloak.connectionsInfinispan.remoteStorePort.2}
${keycloak.connectionsInfinispan.remoteStoreServer}
${keycloak.connectionsInfinispan.sessionsOwners}
${keycloak.testsuite.logging.pattern}
${keycloak.connectionsJpa.url.crossdc}
${project.build.directory}/dependency/password-blacklists
${keycloak.storage.connections.vendor}
${keycloak.connectionsJpa.driver}
${keycloak.connectionsJpa.url}
${keycloak.connectionsJpa.database}
${keycloak.connectionsJpa.user}
${keycloak.connectionsJpa.password}
${auth.server.fips.mode}
${auth.server.fips.keystore.type}
${auth.server.supported.keystore.types}
${auth.server.supported.rsa.key.sizes}
${auth.server.kerberos.supported}
${project.build.directory}${file.separator}dependency${file.separator}wildfly-config.xml
listener
org.keycloak.testsuite.util.TestEventsLogger,org.keycloak.testsuite.util.NonIDERunListener
org.commonjava.maven.plugins
directory-maven-plugin
keycloak-parent-basedir
directory-of
initialize
keycloak-parent.basedir
org.keycloak
keycloak-parent
org.jboss.shrinkwrap.resolver
shrinkwrap-resolver-maven-plugin
${shrinkwrap-resolver.version}
propagate-execution-context
auth-server-quarkus
quarkus
true
false
false
${auth.server.home}/conf
false
true
true
auth-server-quarkus-embedded
quarkus
true
false
false
${auth.server.home}/conf
false
true
true
auth-server-cluster-quarkus
-
true
true
ha
quarkus
true
false
false
${auth.server.home}/conf
false
true
true
2
maven-surefire-plugin
20000
auth-servers-crossdc-undertow
true
true
undertow
6001
6002
${auth.server.debug.suspend}
${auth.server.debug.suspend}
maven-enforcer-plugin
enforce-profile-activation
enforce
cache.server
Profile "auth-servers-crossdc-undertow" requires activation of one of the following profiles: "cache-server-infinispan", "cache-server-datagrid", "cache-server-legacy-infinispan", "cache-server-legacy-datagrid".
maven-surefire-plugin
${node.name}
20000
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${cache.server.crossdc1.debug.suspend},address=localhost:${cache.server.crossdc1.jvm.debug.port}
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${cache.server.crossdc2.debug.suspend},address=localhost:${cache.server.crossdc2.jvm.debug.port}
${keycloak.connectionsInfinispan.hotrodProtocolVersion}
auth-servers-crossdc-jboss
true
true
jboss
${containers.home}/auth-server-${auth.server}-crossdc01
${containers.home}/auth-server-${auth.server}-crossdc02
${containers.home}/auth-server-${auth.server}-crossdc11
${containers.home}/auth-server-${auth.server}-crossdc12
${auth.server.crossdc01.home}/standalone/configuration
6001
6002
5001
5002
5011
5012
${auth.server.debug.suspend}
${auth.server.debug.suspend}
${auth.server.debug.suspend}
${auth.server.debug.suspend}
${auth.server.debug.suspend}
${auth.server.debug.suspend}
maven-antrun-plugin
copy-auth-server-crossdc-nodes
process-resources
run
${skip.copy.auth.crossdc.nodes}
maven-enforcer-plugin
enforce-profiles-activation
enforce
cache.server
Profile "auth-servers-crossdc-jboss" requires activation of one of the following profiles: "cache-server-infinispan", "cache-server-datagrid", "cache-server-legacy-infinispan", "cache-server-legacy-datagrid".
auth.server.jboss
Profile "auth-servers-crossdc-jboss" requires activation of another profile: either "auth-server-wildfly" or "auth-server-eap".
true
maven-surefire-plugin
20000
true
${node.name}
${auth.server.crossdc01.home}
${auth.server.crossdc02.home}
${auth.server.crossdc11.home}
${auth.server.crossdc12.home}
${keycloak.connectionsInfinispan.default.remoteStoreSecurityEnabled}
${keycloak.connectionsInfinispan.hotrodProtocolVersion}
21
22
31
32
10011
10012
10021
10022
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${cache.server.crossdc1.debug.suspend},address=localhost:${cache.server.crossdc1.jvm.debug.port}
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${cache.server.crossdc2.debug.suspend},address=localhost:${cache.server.crossdc2.jvm.debug.port}
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.crossdc01.debug.suspend},address=localhost:${auth.server.crossdc01.jvm.debug.port}
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.crossdc02.debug.suspend},address=localhost:${auth.server.crossdc02.jvm.debug.port}
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.crossdc11.debug.suspend},address=localhost:${auth.server.crossdc11.jvm.debug.port}
-agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.crossdc12.debug.suspend},address=localhost:${auth.server.crossdc12.jvm.debug.port}
cache-server-legacy-infinispan
legacy-infinispan
true
true
${cache.server.home}/standalone/configuration
%d{HH:mm:ss,SSS} [%t] %-5p [%c{1.}] %m%n
false
PROTOCOL_VERSION_30
org.wildfly.arquillian
wildfly-arquillian-container-managed
maven-enforcer-plugin
enforce-profile-activation
enforce
auth.servers.crossdc
Profile "cache-server-legacy-infinispan" requires activation of another profile: either "auth-servers-crossdc-undertow" or "auth-servers-crossdc-jboss".
maven-dependency-plugin
unpack-cache-server-infinispan
generate-resources
unpack
org.keycloak.testsuite
integration-arquillian-servers-cache-server-legacy-infinispan
${project.version}
zip
${containers.home}
true
cache-server-legacy-datagrid
legacy-datagrid
true
true
${cache.server.home}/standalone/configuration
%d{HH:mm:ss,SSS} [%t] %-5p [%c{1.}] %m%n
false
PROTOCOL_VERSION_30
org.wildfly.arquillian
wildfly-arquillian-container-managed
maven-enforcer-plugin
enforce-profile-activation
enforce
auth.servers.crossdc
Profile "cache-server-legacy-datagrid" requires activation of another profile: either "auth-servers-crossdc-undertow" or "auth-servers-crossdc-jboss".
maven-dependency-plugin
unpack-cache-server-jdg
generate-resources
unpack
org.keycloak.testsuite
integration-arquillian-servers-cache-server-legacy-datagrid
${project.version}
zip
${containers.home}
true
cache-server-infinispan
infinispan
true
%d{HH:mm:ss,SSS} [%t] %-5p [%c{1.}] %m%n
false
PROTOCOL_VERSION_30
true
maven-enforcer-plugin
enforce-profile-activation
enforce
auth.servers.crossdc
Profile "cache-server-infinispan" requires activation of another profile: either "auth-servers-crossdc-undertow" or "auth-servers-crossdc-jboss".
maven-dependency-plugin
unpack-cache-server-standalone-infinispan
generate-resources
unpack
org.keycloak.testsuite
integration-arquillian-servers-cache-server-infinispan-infinispan
${project.version}
zip
${containers.home}
true
maven-antrun-plugin
copy-cache-server-standalone-infinispan-nodes
process-resources
run
${skip.copy.cache.crossdc.nodes}
cache-server-datagrid
datagrid
true
%d{HH:mm:ss,SSS} [%t] %-5p [%c{1.}] %m%n
false
PROTOCOL_VERSION_30
true
maven-enforcer-plugin
enforce-profile-activation
enforce
auth.servers.crossdc
Profile "cache-server-datagrid" requires activation of another profile: either "auth-servers-crossdc-undertow" or "auth-servers-crossdc-jboss".
maven-dependency-plugin
unpack-cache-server-standalone-jdg
generate-resources
unpack
org.keycloak.testsuite
integration-arquillian-servers-cache-server-infinispan-datagrid
${project.version}
zip
${containers.home}
true
maven-antrun-plugin
copy-cache-server-standalone-infinispan-nodes
process-resources
run
${skip.copy.cache.crossdc.nodes}
auth-server-profile
keycloak.profile
-Dkeycloak.profile=${keycloak.profile}
auth-server-enable-disable-feature
-Dkeycloak.profile.feature.${feature.name}=${feature.value}
maven-enforcer-plugin
enforce
feature.name
feature.value
auth-server-cluster-undertow
-
false
true
true
true
2
maven-surefire-plugin
20000
clean-jpa
org.liquibase
liquibase-maven-plugin
META-INF/jpa-changelog-master.xml
${keycloak.connectionsJpa.url}
${keycloak.connectionsJpa.driver}
${keycloak.connectionsJpa.user}
${keycloak.connectionsJpa.password}
false
${keycloak.connectionsJpa.liquibaseDatabaseClass}
clean-jpa
clean
dropAll
auth-server-migration
target/test-classes/migration-test/migration-realm-${migrated.auth.server.version}.json
-Dkeycloak.migration.action=import
-Dkeycloak.migration.provider=singleFile
-Dkeycloak.migration.file=${migration.import.file}
-Dkeycloak.migration.strategy=OVERWRITE_EXISTING
true
maven-enforcer-plugin
enforce
migrated.auth.server.version
migration.mode
maven-dependency-plugin
unpack-migrated-auth-server
generate-resources
unpack
org.keycloak.testsuite
integration-arquillian-migration-server
${project.version}
zip
${containers.home}
true
maven-surefire-plugin
${migration.import.file.name}
${migrated.auth.server.version}
true
${containers.home}/auth-server-migration
${migration.import.props.previous}
migration-prod
migration.import.file.name
target/test-classes/migration-test/${migration.import.file.name}
auth-server-fips140-2
non-strict
PKCS12,BCFKS
false
pkcs12
${auth.server.config.dir}/keycloak-fips.keystore.${auth.server.keystore.type}
passwordpassword
${auth.server.keystore.type}
${auth.server.config.dir}/keycloak-fips.truststore.${auth.server.truststore.type}
passwordpassword
${auth.server.config.dir}/kc.java.security
common-test-dependencies
src/test
junit
junit
org.wildfly.extras.creaper
creaper-commands
${version.org.wildfly.extras.creaper}
com.google.guava
guava
org.codehaus.groovy
*
net.bytebuddy
byte-buddy
1.12.18
org.jboss.arquillian.junit
arquillian-junit-container
org.jboss.arquillian.graphene
graphene-webdriver
${arquillian-graphene.version}
pom
org.jboss.arquillian.protocol
arquillian-protocol-servlet
org.jboss.arquillian.extension
arquillian-phantom-driver
1.2.1.Final
org.jboss.arquillian.graphene
arquillian-browser-screenshooter
${arquillian-graphene.version}
org.apache.commons
commons-io
com.google.guava
guava
io.appium
java-client
${appium.client.version}
org.apache.httpcomponents
httpclient
org.apache.httpcomponents
httpcore
jfree
jfreechart
1.0.13
org.keycloak.testsuite
integration-arquillian-util
${project.version}
log4j
log4j
org.slf4j
slf4j-api
org.slf4j
slf4j-reload4j
org.apache.ant
ant
1.10.11
jar
com.h2database
h2
${h2.version}
compile
com.icegreen
greenmail
org.slf4j
slf4j-api
org.subethamail
subethasmtp
org.slf4j
slf4j-api
org.keycloak
keycloak-dependencies-server-all
pom
com.google.guava
guava
org.keycloak
keycloak-admin-client
org.keycloak
keycloak-client-registration-api
org.keycloak
keycloak-services
org.keycloak
keycloak-authz-client
org.keycloak.testsuite
integration-arquillian-servers-auth-server-undertow
${project.version}
org.jboss.resteasy
resteasy-client
org.jboss.resteasy
resteasy-undertow
compile
org.jboss.resteasy
resteasy-multipart-provider
org.jboss.resteasy
resteasy-jackson2-provider
com.fasterxml.jackson.core
jackson-core
com.fasterxml.jackson.core
jackson-databind
com.fasterxml.jackson.core
jackson-annotations
org.bouncycastle
bcprov-jdk18on
org.bouncycastle
bcpkix-jdk18on
org.hamcrest
hamcrest
test
org.infinispan
infinispan-core-jakarta
${jdbc.mvn.groupId}
${jdbc.mvn.artifactId}
${jdbc.mvn.version}
compile
org.openjdk.nashorn
nashorn-core
${nashorn.version}
org.keycloak
keycloak-client-cli-dist
org.keycloak
keycloak-crypto-fips1402
zip
org.osgi
org.osgi.enterprise
provided
org.eclipse.microprofile.metrics
microprofile-metrics-api
org.seleniumhq.selenium
htmlunit-driver
2.27
maven-surefire-plugin
maven-dependency-plugin
maven-antrun-plugin
org.codehaus.mojo
xml-maven-plugin
org.liquibase
liquibase-maven-plugin
org.codehaus.mojo
keytool-maven-plugin
no-offset
0
8080
8443
9990
9999
java11-auth-server
[11,)
${default.modular.jvm.options}
java11-app-server
[11,)
${default.modular.jvm.options}
java7-app-server
-Xms${app.server.memory.Xms} -Xmx${app.server.memory.Xmx} -XX:PermSize=${surefire.memory.metaspace} -XX:MaxPermSize=${surefire.memory.metaspace.max}
app-server-eap8
app.server
eap8
org.keycloak.testsuite
integration-arquillian-test-apps-servlets-jakarta
${project.version}
not-app-server-eap8
app.server
!eap8
org.keycloak.testsuite
integration-arquillian-test-apps-servlets
${project.version}
generate-certs-for-custom-auth-server-host
auth.server.host
org.codehaus.mojo
keytool-maven-plugin
remove-old-auth-server-key
generate-test-resources
deleteAlias
${dependency.keystore}
${dependency.keystore.password}
localhost
generate-new-auth-server-cert
generate-test-resources
generateKeyPair
${dependency.keystore}
${dependency.keystore.password}
${auth.server.host}
CN=${auth.server.host}, OU=Keycloak, O=Red Hat, L=Westword, ST=MA, C=US
SAN=dns:${auth.server.host},dns:${auth.server.host2}
RSA
2048
SHA256withRSA
export-auth-server-cert
generate-test-resources
exportCertificate
${dependency.keystore}
${dependency.keystore.password}
${auth.server.host}
${dependency.keystore.root}/${auth.server.host}.pem
import-auth-server-cert-to-truststore
generate-test-resources
importCertificate
${dependency.truststore}
${dependency.truststore.password}
${auth.server.host}
${dependency.keystore.root}/${auth.server.host}.pem
true
true
maven-resources-plugin
copy-processed-truststore-to-auth-server
process-test-resources
copy-resources
${auth.server.config.dir}
${dependency.keystore.root}
true
firefox-strict-cookies
firefox
firefox
${project.build.directory}/dependency/firefox-cookies-prefs.js
true
true
set-javax.net.ssl-properties-for-tomcat
app.server.ssl.required
-Djavax.net.ssl.trustStore=${app.server.home}/lib/keycloak.truststore -Djavax.net.ssl.trustStorePassword=secret
cache-auth
true