keycloak-memoizeit

Don't require SSL in KeycloakServer

10/12/2013 6:57:59 AM

Details

diff --git a/testsuite/integration/src/main/java/org/keycloak/testutils/KeycloakServer.java b/testsuite/integration/src/main/java/org/keycloak/testutils/KeycloakServer.java
index b055d0e..66192b0 100644
--- a/testsuite/integration/src/main/java/org/keycloak/testutils/KeycloakServer.java
+++ b/testsuite/integration/src/main/java/org/keycloak/testutils/KeycloakServer.java
@@ -195,22 +195,18 @@ public class KeycloakServer {
             }
 
             RealmModel defaultRealm = manager.createRealm(RealmModel.DEFAULT_REALM, RealmModel.DEFAULT_REALM);
-            manager.generateRealmKeys(defaultRealm);
-
+            defaultRealm.setName(RealmModel.DEFAULT_REALM);
             defaultRealm.setEnabled(true);
             defaultRealm.setTokenLifespan(300);
             defaultRealm.setAccessCodeLifespan(60);
             defaultRealm.setAccessCodeLifespanUserAction(600);
-            defaultRealm.setSslNotRequired(false);
+            defaultRealm.setSslNotRequired(true);
             defaultRealm.setCookieLoginAllowed(true);
             defaultRealm.setRegistrationAllowed(true);
-            defaultRealm.setAutomaticRegistrationAfterSocialLogin(false);
-            defaultRealm.setVerifyEmail(false);
-
+            manager.generateRealmKeys(defaultRealm);
             defaultRealm.addRequiredCredential(CredentialRepresentation.PASSWORD);
-            RoleModel role = defaultRealm.addRole(SaasService.REALM_CREATOR_ROLE);
-            UserModel admin = defaultRealm.addUser("admin");
-            defaultRealm.grantRole(admin, role);
+            defaultRealm.addRole(SaasService.REALM_CREATOR_ROLE);
+            defaultRealm.addDefaultRole(SaasService.REALM_CREATOR_ROLE);
 
             session.getTransaction().commit();
         } finally {