4.0.0 org.keycloak.testsuite integration-arquillian 999.0.0-SNAPSHOT pom integration-arquillian-tests Tests base other undertow true false false false false false false false false false auth-server-${auth.server} ${containers.home}/${auth.server.container} ${auth.server.home} ${docker.container.testdb.ip} localhost ${auth.server.host} 100 8180 8089 8543 10090 10099 true -Xms64m -Xmx512m serverConfig org.jboss.as.arquillian.container.managed.ManagedDeployableContainer ${auth.server.config.dir}/keycloak.truststore secret jks ${auth.server.config.dir}/keycloak.jks secret jks integration-arquillian-servers-auth-server-${auth.server} ${auth.server.undertow} true false 300 5005 n -agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.debug.suspend},address=${auth.server.host}:${auth.server.debug.port} false false false ${auth.server.host} localhost true integration-arquillian-servers-app-server-${app.server} ${containers.home}/app-server-${app.server} ${app.server.home}/standalone/configuration 200 8280 8643 http-remoting 10190 60 500 300 10290 400 10390 5006 n -agentlib:jdwp=transport=dt_socket,server=y,suspend=${app.server.debug.suspend},address=localhost:${app.server.debug.port} 7301 n -agentlib:jdwp=transport=dt_socket,server=y,suspend=${app.server.1.debug.suspend},address=localhost:${app.server.1.debug.port} 7302 n -agentlib:jdwp=transport=dt_socket,server=y,suspend=${app.server.2.debug.suspend},address=localhost:${app.server.2.debug.port} 64m 768m -Xms${app.server.memory.Xms} -Xmx${app.server.memory.Xmx} -XX:MetaspaceSize=${surefire.memory.metaspace} -XX:MaxMetaspaceSize=${surefire.memory.metaspace.max} false ${app.server.keystore.dir}/keycloak.truststore secret ${app.server.keystore.dir}/adapter.jks secret false ${containers.home}/cache-server-${cache.server} 1010 11000 2010 12000 true false --add-exports=java.base/sun.security.validator=ALL-UNNAMED --add-exports=java.naming/com.sun.jndi.ldap=ALL-UNNAMED --add-exports=java.base/com.sun.crypto.provider=ALL-UNNAMED --add-exports=java.desktop/sun.awt=ALL-UNNAMED --add-opens=java.base/java.lang=ALL-UNNAMED --add-opens=java.base/java.lang.invoke=ALL-UNNAMED --add-opens=java.base/java.io=ALL-UNNAMED --add-opens=java.base/java.security=ALL-UNNAMED --add-opens=java.base/java.util=ALL-UNNAMED --add-opens=java.management/javax.management=ALL-UNNAMED --add-opens=java.naming/javax.naming=ALL-UNNAMED --add-modules=java.se ${project.build.directory}/dependency/keystore ${dependency.keystore.root}/keycloak.truststore secret ${dependency.keystore.root}/keycloak.jks secret localhost 12232 13232 jdbc:h2:mem:test-dc-shared %d{HH:mm:ss,SSS} %-5p [%c] %m%n ${user.home}/.m2/repository ${user.home}/.m2/settings.xml -Dkie.maven.settings.custom=${settings.path} -Dkie.maven.repo.local=${maven.repo.local} -Drepo.url=${repo.url} -Dkeycloak.x509cert.lookup.provider=${keycloak.x509cert.lookup.provider} -Dapp.server.base.url=http://localhost:${app.server.http.port} -Dauth.server.base.url=http://localhost:${auth.server.http.port} -Dapp.server.ssl.base.url=https://localhost:${app.server.https.port} -Dapp.server.ssl.required=${app.server.ssl.required} -Dauth.server.ssl.base.url=https://localhost:${auth.server.https.port} -Dauth.server.ssl.required=${auth.server.ssl.required} -Dauth.server.host=${auth.server.host} -Dauth.server.host2=${auth.server.host2} -Dapp.server.host=${app.server.host} -Dapp.server.http.port=${app.server.http.port} -Dapp.server.https.port=${app.server.https.port} -Dmy.host.name=localhost -Djava.security.krb5.conf=${project.build.directory}/dependency/kerberos/test-krb5.conf ${project.build.directory}/examples ${keycloak-parent.basedir}/examples ${project.version} false htmlUnit false true 60 Win32 chrome --headless chrome false true --headless --window-size=1920,1080 --remote-allow-origins=* true true ${project.build.directory}/dependency/test-constants.properties false true true ${auth.server.config.dir}/ca.crt ${auth.server.config.dir}/client.crt ${auth.server.config.dir}/client.jks secret ${auth.server.config.dir}/client.key secret ${auth.server.config.dir}/keycloak.truststore secret ${auth.server.config.dir}/other_client.jks secret ${auth.server.config.dir}/test-user-obb.jks password false default local disabled JKS,PKCS12,BCFKS 1024,2048,4096 true maven-dependency-plugin unpack-undertow-server generate-test-resources unpack org.keycloak.testsuite integration-arquillian-servers-auth-server-undertow ${project.version} jar ${containers.home}/auth-server-undertow *.jks,*.crt,*.truststore,*.crl,*.key,certs/clients/* ${auth.server.undertow.skip.unpack} unpack-quarkus-server generate-test-resources unpack org.keycloak.testsuite integration-arquillian-servers-auth-server-quarkus ${project.version} zip ${containers.home} ${auth.server.quarkus.skip.unpack} unpack-app-server generate-test-resources unpack org.keycloak.testsuite ${app.server.artifactId} ${project.version} zip ${containers.home} ${app.server.skip.unpack} example-wars generate-test-resources copy ${skip.copy.example.wars} org.keycloak.testsuite hello-world-authz-service ${project.version} war org.keycloak.testsuite servlet-authz-app ${project.version} war org.keycloak.testsuite servlet-policy-enforcer ${project.version} war org.keycloak.testsuite integration-arquillian-test-apps-cors-angular-product ${project.version} war org.keycloak.testsuite integration-arquillian-test-apps-cors-database-service ${project.version} war ${examples.home} true test-apps-realms generate-test-resources unpack org.keycloak.testsuite integration-arquillian-test-apps-dist ${project.version} zip **/*realm.json,**/*authz-service.json,**/testsaml.json,**/*-keycloak.json ${examples.home} true maven-resources-plugin copy-admin-user-json-file generate-resources copy-resources ${skip.add.user.json} ${auth.server.config.dir} src/test/resources keycloak-add-user.json true copy-truststore generate-resources copy-resources ${project.build.directory}/dependency src/test/resources keystore/** example-realms generate-test-resources copy-resources ${app.server.skip.unpack} ${examples.home}/example-realms true ${examples.basedir} true **/*.json maven-antrun-plugin clean-second-cache-server-arquillian-bug-workaround process-test-resources run ${skip.clean.second.cache} ${cache.server.home}/standalone-dc-2 maven-surefire-plugin ${project.build.directory} ${project.build.directory}/dependency/arquillian.xml file:${project.build.directory}/dependency/log4j.properties ${auth.server} ${auth.server.container} ${auth.server.undertow} ${auth.server.jboss} ${auth.server.memory.settings} ${auth.server.home} ${auth.server.java.home} ${auth.server.host} ${auth.server.management.host} ${auth.server.browserHost} ${auth.server.port.offset} ${auth.server.http.port} ${auth.server.events.http.port} ${auth.server.https.port} ${auth.server.management.port} ${auth.server.management.port.jmx} ${auth.server.ssl.required} ${auth.server.jboss.startup.timeout} ${auth.server.config.dir} ${auth.server.config.property.name} ${auth.server.config.property.value} ${auth.server.adapter.impl.class} ${auth.server.jboss.jvm.debug.args} ${auth.server.truststore} ${auth.server.truststore.password} ${auth.server.truststore.type} ${auth.server.keystore} ${auth.server.keystore.password} ${auth.server.keystore.type} ${auth.server.java.security.file} ${auth.server.jvm.args.extra} ${auth.server.profile} ${auth.server.feature} ${auth.server.host2} ${app.server} ${app.server.home} ${app.server.keystore.dir} ${app.server.java.home} ${app.server.memory.settings} ${app.server.port.offset} ${app.server.http.port} ${app.server.https.port} ${app.server.management.protocol} ${app.server.management.port} ${app.server.startup.timeout} ${app.server.reverse-proxy.port.offset} ${app.server.1.port.offset} ${app.server.1.management.port} ${app.server.2.port.offset} ${app.server.2.management.port} ${app.server.jboss.jvm.debug.args} ${app.server.truststore} ${app.server.truststore.password} ${app.server.keystore} ${app.server.keystore.password} ${app.server.1.jboss.jvm.debug.args} ${app.server.2.jboss.jvm.debug.args} ${app.server.jvm.args.extra} ${tomcat.javax.net.ssl.properties} ${frontend.console.output} ${backend.console.output} ${auth.server.remote} ${auth.server.quarkus} ${auth.server.quarkus.embedded} ${auth.server.config.dir} ${adapter.test.props} ${examples.home} ${examples.version.suffix} ${kie.maven.settings} ${testsuite.constants} ${cli.log.output} ${test.intermittent} ${default.modular.jvm.options} ${dependency.keystore.root} ${dependency.truststore} ${dependency.truststore.password} ${dependency.keystore} ${dependency.keystore.password} ${browser} ${browser.strict.cookies} ${js.browser} ${js.chromeArguments} ${htmlUnitBrowserVersion} ${webdriverDownloadBinaries} ${droneInstantiationTimeoutInSeconds} ${github.username} ${github.secretToken} ${ieDriverArch} ${ieDriverVersion} ${firefox_binary} ${chromeBinary} ${chromeArguments} ${chromeDriverVersion} ${firefoxLegacyDriver} ${firefoxDriverVersion} ${firefoxUserPreferences} ${firefoxHeadless} ${appium.platformName} ${appium.deviceName} ${appium.browserName} ${appium.avd} ${appium.automationName} ${appium.noReset} ${appium.fullReset} ${project.version} ${client.certificate.ca.path} ${client.certificate.file} ${client.certificate.keystore} ${client.certificate.keystore.passphrase} ${client.key.file} ${client.key.passphrase} ${client.truststore} ${client.truststore.passphrase} ${hok.client.certificate.keystore} ${hok.client.certificate.keystore.passphrase} ${obb.client.certificate.keystore} ${obb.client.certificate.keystore.passphrase} ${auth.server.ocsp.responder.enabled} ${auth.server.cluster} ${auth.server.undertow.cluster} ${auth.server.jboss.cluster} ${auth.server.jboss.legacy} ${auth.server.quarkus.cluster} ${auth.server.quarkus.cluster.config} ${auth.server.crossdc} ${auth.server.undertow.crossdc} ${auth.server.jboss.crossdc} ${cache.server.lifecycle.skip} ${cache.server} ${cache.server.legacy} ${cache.server.1.port.offset} ${cache.server.home} ${cache.server.console.output} ${cache.server.management.port} ${cache.server.2.port.offset} ${cache.server.2.management.port} ${cache.server.java.home} ${cache.server.auth} ${keycloak.connectionsInfinispan.remoteStorePort} ${keycloak.connectionsInfinispan.remoteStorePort.2} ${keycloak.connectionsInfinispan.remoteStoreServer} ${keycloak.connectionsInfinispan.sessionsOwners} ${keycloak.testsuite.logging.pattern} ${keycloak.connectionsJpa.url.crossdc} ${project.build.directory}/dependency/password-blacklists ${keycloak.storage.connections.vendor} ${keycloak.connectionsJpa.driver} ${keycloak.connectionsJpa.url} ${keycloak.connectionsJpa.database} ${keycloak.connectionsJpa.user} ${keycloak.connectionsJpa.password} ${auth.server.fips.mode} ${auth.server.fips.keystore.type} ${auth.server.supported.keystore.types} ${auth.server.supported.rsa.key.sizes} ${auth.server.kerberos.supported} ${project.build.directory}${file.separator}dependency${file.separator}wildfly-config.xml listener org.keycloak.testsuite.util.TestEventsLogger,org.keycloak.testsuite.util.NonIDERunListener org.commonjava.maven.plugins directory-maven-plugin keycloak-parent-basedir directory-of initialize keycloak-parent.basedir org.keycloak keycloak-parent org.jboss.shrinkwrap.resolver shrinkwrap-resolver-maven-plugin ${shrinkwrap-resolver.version} propagate-execution-context auth-server-quarkus quarkus true false false ${auth.server.home}/conf false true true auth-server-quarkus-embedded quarkus true false false ${auth.server.home}/conf false true true auth-server-cluster-quarkus - true true ha quarkus true false false ${auth.server.home}/conf false true true 2 maven-surefire-plugin 20000 auth-servers-crossdc-undertow true true undertow 6001 6002 ${auth.server.debug.suspend} ${auth.server.debug.suspend} maven-enforcer-plugin enforce-profile-activation enforce cache.server Profile "auth-servers-crossdc-undertow" requires activation of one of the following profiles: "cache-server-infinispan", "cache-server-datagrid", "cache-server-legacy-infinispan", "cache-server-legacy-datagrid". maven-surefire-plugin ${node.name} 20000 -agentlib:jdwp=transport=dt_socket,server=y,suspend=${cache.server.crossdc1.debug.suspend},address=localhost:${cache.server.crossdc1.jvm.debug.port} -agentlib:jdwp=transport=dt_socket,server=y,suspend=${cache.server.crossdc2.debug.suspend},address=localhost:${cache.server.crossdc2.jvm.debug.port} ${keycloak.connectionsInfinispan.hotrodProtocolVersion} auth-servers-crossdc-jboss true true jboss ${containers.home}/auth-server-${auth.server}-crossdc01 ${containers.home}/auth-server-${auth.server}-crossdc02 ${containers.home}/auth-server-${auth.server}-crossdc11 ${containers.home}/auth-server-${auth.server}-crossdc12 ${auth.server.crossdc01.home}/standalone/configuration 6001 6002 5001 5002 5011 5012 ${auth.server.debug.suspend} ${auth.server.debug.suspend} ${auth.server.debug.suspend} ${auth.server.debug.suspend} ${auth.server.debug.suspend} ${auth.server.debug.suspend} maven-antrun-plugin copy-auth-server-crossdc-nodes process-resources run ${skip.copy.auth.crossdc.nodes} maven-enforcer-plugin enforce-profiles-activation enforce cache.server Profile "auth-servers-crossdc-jboss" requires activation of one of the following profiles: "cache-server-infinispan", "cache-server-datagrid", "cache-server-legacy-infinispan", "cache-server-legacy-datagrid". auth.server.jboss Profile "auth-servers-crossdc-jboss" requires activation of another profile: either "auth-server-wildfly" or "auth-server-eap". true maven-surefire-plugin 20000 true ${node.name} ${auth.server.crossdc01.home} ${auth.server.crossdc02.home} ${auth.server.crossdc11.home} ${auth.server.crossdc12.home} ${keycloak.connectionsInfinispan.default.remoteStoreSecurityEnabled} ${keycloak.connectionsInfinispan.hotrodProtocolVersion} 21 22 31 32 10011 10012 10021 10022 -agentlib:jdwp=transport=dt_socket,server=y,suspend=${cache.server.crossdc1.debug.suspend},address=localhost:${cache.server.crossdc1.jvm.debug.port} -agentlib:jdwp=transport=dt_socket,server=y,suspend=${cache.server.crossdc2.debug.suspend},address=localhost:${cache.server.crossdc2.jvm.debug.port} -agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.crossdc01.debug.suspend},address=localhost:${auth.server.crossdc01.jvm.debug.port} -agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.crossdc02.debug.suspend},address=localhost:${auth.server.crossdc02.jvm.debug.port} -agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.crossdc11.debug.suspend},address=localhost:${auth.server.crossdc11.jvm.debug.port} -agentlib:jdwp=transport=dt_socket,server=y,suspend=${auth.server.crossdc12.debug.suspend},address=localhost:${auth.server.crossdc12.jvm.debug.port} cache-server-legacy-infinispan legacy-infinispan true true ${cache.server.home}/standalone/configuration %d{HH:mm:ss,SSS} [%t] %-5p [%c{1.}] %m%n false PROTOCOL_VERSION_30 org.wildfly.arquillian wildfly-arquillian-container-managed maven-enforcer-plugin enforce-profile-activation enforce auth.servers.crossdc Profile "cache-server-legacy-infinispan" requires activation of another profile: either "auth-servers-crossdc-undertow" or "auth-servers-crossdc-jboss". maven-dependency-plugin unpack-cache-server-infinispan generate-resources unpack org.keycloak.testsuite integration-arquillian-servers-cache-server-legacy-infinispan ${project.version} zip ${containers.home} true cache-server-legacy-datagrid legacy-datagrid true true ${cache.server.home}/standalone/configuration %d{HH:mm:ss,SSS} [%t] %-5p [%c{1.}] %m%n false PROTOCOL_VERSION_30 org.wildfly.arquillian wildfly-arquillian-container-managed maven-enforcer-plugin enforce-profile-activation enforce auth.servers.crossdc Profile "cache-server-legacy-datagrid" requires activation of another profile: either "auth-servers-crossdc-undertow" or "auth-servers-crossdc-jboss". maven-dependency-plugin unpack-cache-server-jdg generate-resources unpack org.keycloak.testsuite integration-arquillian-servers-cache-server-legacy-datagrid ${project.version} zip ${containers.home} true cache-server-infinispan infinispan true %d{HH:mm:ss,SSS} [%t] %-5p [%c{1.}] %m%n false PROTOCOL_VERSION_30 true maven-enforcer-plugin enforce-profile-activation enforce auth.servers.crossdc Profile "cache-server-infinispan" requires activation of another profile: either "auth-servers-crossdc-undertow" or "auth-servers-crossdc-jboss". maven-dependency-plugin unpack-cache-server-standalone-infinispan generate-resources unpack org.keycloak.testsuite integration-arquillian-servers-cache-server-infinispan-infinispan ${project.version} zip ${containers.home} true maven-antrun-plugin copy-cache-server-standalone-infinispan-nodes process-resources run ${skip.copy.cache.crossdc.nodes} cache-server-datagrid datagrid true %d{HH:mm:ss,SSS} [%t] %-5p [%c{1.}] %m%n false PROTOCOL_VERSION_30 true maven-enforcer-plugin enforce-profile-activation enforce auth.servers.crossdc Profile "cache-server-datagrid" requires activation of another profile: either "auth-servers-crossdc-undertow" or "auth-servers-crossdc-jboss". maven-dependency-plugin unpack-cache-server-standalone-jdg generate-resources unpack org.keycloak.testsuite integration-arquillian-servers-cache-server-infinispan-datagrid ${project.version} zip ${containers.home} true maven-antrun-plugin copy-cache-server-standalone-infinispan-nodes process-resources run ${skip.copy.cache.crossdc.nodes} auth-server-profile keycloak.profile -Dkeycloak.profile=${keycloak.profile} auth-server-enable-disable-feature -Dkeycloak.profile.feature.${feature.name}=${feature.value} maven-enforcer-plugin enforce feature.name feature.value auth-server-cluster-undertow - false true true true 2 maven-surefire-plugin 20000 clean-jpa org.liquibase liquibase-maven-plugin META-INF/jpa-changelog-master.xml ${keycloak.connectionsJpa.url} ${keycloak.connectionsJpa.driver} ${keycloak.connectionsJpa.user} ${keycloak.connectionsJpa.password} false ${keycloak.connectionsJpa.liquibaseDatabaseClass} clean-jpa clean dropAll auth-server-migration target/test-classes/migration-test/migration-realm-${migrated.auth.server.version}.json -Dkeycloak.migration.action=import -Dkeycloak.migration.provider=singleFile -Dkeycloak.migration.file=${migration.import.file} -Dkeycloak.migration.strategy=OVERWRITE_EXISTING true maven-enforcer-plugin enforce migrated.auth.server.version migration.mode maven-dependency-plugin unpack-migrated-auth-server generate-resources unpack org.keycloak.testsuite integration-arquillian-migration-server ${project.version} zip ${containers.home} true maven-surefire-plugin ${migration.import.file.name} ${migrated.auth.server.version} true ${containers.home}/auth-server-migration ${migration.import.props.previous} migration-prod migration.import.file.name target/test-classes/migration-test/${migration.import.file.name} auth-server-fips140-2 non-strict PKCS12,BCFKS false pkcs12 ${auth.server.config.dir}/keycloak-fips.keystore.${auth.server.keystore.type} passwordpassword ${auth.server.keystore.type} ${auth.server.config.dir}/keycloak-fips.truststore.${auth.server.truststore.type} passwordpassword ${auth.server.config.dir}/kc.java.security common-test-dependencies src/test junit junit org.wildfly.extras.creaper creaper-commands ${version.org.wildfly.extras.creaper} com.google.guava guava org.codehaus.groovy * net.bytebuddy byte-buddy 1.12.18 org.jboss.arquillian.junit arquillian-junit-container org.jboss.arquillian.graphene graphene-webdriver ${arquillian-graphene.version} pom org.jboss.arquillian.protocol arquillian-protocol-servlet org.jboss.arquillian.extension arquillian-phantom-driver 1.2.1.Final org.jboss.arquillian.graphene arquillian-browser-screenshooter ${arquillian-graphene.version} org.apache.commons commons-io com.google.guava guava io.appium java-client ${appium.client.version} org.apache.httpcomponents httpclient org.apache.httpcomponents httpcore jfree jfreechart 1.0.13 org.keycloak.testsuite integration-arquillian-util ${project.version} log4j log4j org.slf4j slf4j-api org.slf4j slf4j-reload4j org.apache.ant ant 1.10.11 jar com.h2database h2 ${h2.version} compile com.icegreen greenmail org.slf4j slf4j-api org.subethamail subethasmtp org.slf4j slf4j-api org.keycloak keycloak-dependencies-server-all pom com.google.guava guava org.keycloak keycloak-admin-client org.keycloak keycloak-client-registration-api org.keycloak keycloak-services org.keycloak keycloak-authz-client org.keycloak.testsuite integration-arquillian-servers-auth-server-undertow ${project.version} org.jboss.resteasy resteasy-client org.jboss.resteasy resteasy-undertow compile org.jboss.resteasy resteasy-multipart-provider org.jboss.resteasy resteasy-jackson2-provider com.fasterxml.jackson.core jackson-core com.fasterxml.jackson.core jackson-databind com.fasterxml.jackson.core jackson-annotations org.bouncycastle bcprov-jdk18on org.bouncycastle bcpkix-jdk18on org.hamcrest hamcrest test org.infinispan infinispan-core-jakarta ${jdbc.mvn.groupId} ${jdbc.mvn.artifactId} ${jdbc.mvn.version} compile org.openjdk.nashorn nashorn-core ${nashorn.version} org.keycloak keycloak-client-cli-dist org.keycloak keycloak-crypto-fips1402 zip org.osgi org.osgi.enterprise provided org.eclipse.microprofile.metrics microprofile-metrics-api org.seleniumhq.selenium htmlunit-driver 2.27 maven-surefire-plugin maven-dependency-plugin maven-antrun-plugin org.codehaus.mojo xml-maven-plugin org.liquibase liquibase-maven-plugin org.codehaus.mojo keytool-maven-plugin no-offset 0 8080 8443 9990 9999 java11-auth-server [11,) ${default.modular.jvm.options} java11-app-server [11,) ${default.modular.jvm.options} java7-app-server -Xms${app.server.memory.Xms} -Xmx${app.server.memory.Xmx} -XX:PermSize=${surefire.memory.metaspace} -XX:MaxPermSize=${surefire.memory.metaspace.max} app-server-eap8 app.server eap8 org.keycloak.testsuite integration-arquillian-test-apps-servlets-jakarta ${project.version} not-app-server-eap8 app.server !eap8 org.keycloak.testsuite integration-arquillian-test-apps-servlets ${project.version} generate-certs-for-custom-auth-server-host auth.server.host org.codehaus.mojo keytool-maven-plugin remove-old-auth-server-key generate-test-resources deleteAlias ${dependency.keystore} ${dependency.keystore.password} localhost generate-new-auth-server-cert generate-test-resources generateKeyPair ${dependency.keystore} ${dependency.keystore.password} ${auth.server.host} CN=${auth.server.host}, OU=Keycloak, O=Red Hat, L=Westword, ST=MA, C=US SAN=dns:${auth.server.host},dns:${auth.server.host2} RSA 2048 SHA256withRSA export-auth-server-cert generate-test-resources exportCertificate ${dependency.keystore} ${dependency.keystore.password} ${auth.server.host} ${dependency.keystore.root}/${auth.server.host}.pem import-auth-server-cert-to-truststore generate-test-resources importCertificate ${dependency.truststore} ${dependency.truststore.password} ${auth.server.host} ${dependency.keystore.root}/${auth.server.host}.pem true true maven-resources-plugin copy-processed-truststore-to-auth-server process-test-resources copy-resources ${auth.server.config.dir} ${dependency.keystore.root} true firefox-strict-cookies firefox firefox ${project.build.directory}/dependency/firefox-cookies-prefs.js true true set-javax.net.ssl-properties-for-tomcat app.server.ssl.required -Djavax.net.ssl.trustStore=${app.server.home}/lib/keycloak.truststore -Djavax.net.ssl.trustStorePassword=secret cache-auth true