keycloak-uncached
Changes
testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/LoginTest.java 68(+30 -38)
testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/AccessTokenTest.java 6(+3 -3)
Details
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/LoginTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/LoginTest.java
index adc0c9b..ae84f89 100644
--- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/LoginTest.java
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/forms/LoginTest.java
@@ -337,7 +337,7 @@ public class LoginTest extends TestRealmKeycloakTest {
try {
// Setting offset to more than one day to force password update
// elapsedTime > timeToExpire
- Time.setOffset(86405);
+ setTimeOffset(86405);
loginPage.open();
@@ -347,6 +347,8 @@ public class LoginTest extends TestRealmKeycloakTest {
updatePasswordPage.changePassword("updatedPassword", "updatedPassword");
+ setTimeOffset(0);
+
events.expectRequiredAction(EventType.UPDATE_PASSWORD).user(userId).detail(Details.USERNAME, "login-test").assertEvent();
assertEquals(RequestType.AUTH_RESPONSE, appPage.getRequestType());
@@ -359,8 +361,6 @@ public class LoginTest extends TestRealmKeycloakTest {
UserBuilder userBuilder = UserBuilder.edit(userRsc.toRepresentation())
.password("password");
userRsc.update(userBuilder.build());
-
- Time.setOffset(0);
}
}
@@ -371,7 +371,7 @@ public class LoginTest extends TestRealmKeycloakTest {
try {
// Setting offset to less than one day to avoid forced password update
// elapsedTime < timeToExpire
- Time.setOffset(86205);
+ setTimeOffset(86205);
loginPage.open();
@@ -380,42 +380,38 @@ public class LoginTest extends TestRealmKeycloakTest {
Assert.assertEquals(RequestType.AUTH_RESPONSE, appPage.getRequestType());
Assert.assertNotNull(oauth.getCurrentQuery().get(OAuth2Constants.CODE));
- events.expectLogin().user(userId).detail(Details.USERNAME, "login-test").assertEvent();
+ setTimeOffset(0);
+ events.expectLogin().user(userId).detail(Details.USERNAME, "login-test").assertEvent();
} finally {
setPasswordPolicy(null);
- Time.setOffset(0);
}
}
@Test
public void loginNoTimeoutWithLongWait() {
- try {
- loginPage.open();
+ loginPage.open();
- Time.setOffset(1700);
+ setTimeOffset(1700);
- loginPage.login("login-test", "password");
+ loginPage.login("login-test", "password");
- events.expectLogin().user(userId).detail(Details.USERNAME, "login-test").assertEvent().getSessionId();
- } finally {
- Time.setOffset(0);
- }
+ setTimeOffset(0);
+
+ events.expectLogin().user(userId).detail(Details.USERNAME, "login-test").assertEvent().getSessionId();
}
@Test
public void loginTimeout() {
- try {
- loginPage.open();
+ loginPage.open();
- Time.setOffset(1850);
+ setTimeOffset(1850);
- loginPage.login("login-test", "password");
+ loginPage.login("login-test", "password");
- events.expectLogin().clearDetails().detail(Details.CODE_ID, AssertEvents.isCodeId()).user((String) null).session((String) null).error("expired_code").assertEvent().getSessionId();
- } finally {
- Time.setOffset(0);
- }
+ setTimeOffset(0);
+
+ events.expectLogin().clearDetails().detail(Details.CODE_ID, AssertEvents.isCodeId()).user((String) null).session((String) null).error("expired_code").assertEvent().getSessionId();
}
@Test
@@ -485,26 +481,22 @@ public class LoginTest extends TestRealmKeycloakTest {
// KEYCLOAK-1037
@Test
public void loginExpiredCode() {
- try {
- loginPage.open();
- Time.setOffset(5000);
- testingClient.testing().removeExpired("test");
-
- loginPage.login("login@test.com", "password");
+ loginPage.open();
+ setTimeOffset(5000);
+ testingClient.testing().removeExpired("test");
- //loginPage.assertCurrent();
- loginPage.assertCurrent();
+ loginPage.login("login@test.com", "password");
- //Assert.assertEquals("Login timeout. Please login again.", loginPage.getError());
+ //loginPage.assertCurrent();
+ loginPage.assertCurrent();
- events.expectLogin().user((String) null).session((String) null).error("expired_code").clearDetails()
- .detail(Details.RESTART_AFTER_TIMEOUT, "true")
- .client((String) null)
- .assertEvent();
+ //Assert.assertEquals("Login timeout. Please login again.", loginPage.getError());
+ setTimeOffset(0);
- } finally {
- Time.setOffset(0);
- }
+ events.expectLogin().user((String) null).session((String) null).error("expired_code").clearDetails()
+ .detail(Details.RESTART_AFTER_TIMEOUT, "true")
+ .client((String) null)
+ .assertEvent();
}
}
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/AccessTokenTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/AccessTokenTest.java
index 6e684ef..fc8c8fa 100755
--- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/AccessTokenTest.java
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/AccessTokenTest.java
@@ -280,11 +280,13 @@ public class AccessTokenTest extends AbstractKeycloakTest {
String code = oauth.getCurrentQuery().get(OAuth2Constants.CODE);
- Time.setOffset(2);
+ setTimeOffset(2);
OAuthClient.AccessTokenResponse response = oauth.doAccessTokenRequest(code, "password");
Assert.assertEquals(400, response.getStatusCode());
+ setTimeOffset(0);
+
AssertEvents.ExpectedEvent expectedEvent = events.expectCodeToToken(codeId, null);
expectedEvent.error("invalid_code")
.removeDetail(Details.TOKEN_ID)
@@ -296,8 +298,6 @@ public class AccessTokenTest extends AbstractKeycloakTest {
events.clear();
RealmManager.realm(adminClient.realm("test")).accessCodeLifeSpan(60);
-
- Time.setOffset(0);
}
@Test
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/ClientAuthSignedJWTTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/ClientAuthSignedJWTTest.java
index 0eb7c35..a65e4cc 100644
--- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/ClientAuthSignedJWTTest.java
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/ClientAuthSignedJWTTest.java
@@ -365,9 +365,9 @@ public class ClientAuthSignedJWTTest extends AbstractKeycloakTest {
@Test
public void testAssertionExpired() throws Exception {
- Time.setOffset(-1000);
String invalidJwt = getClient1SignedJWT();
- Time.setOffset(0);
+
+ setTimeOffset(1000);
List<NameValuePair> parameters = new LinkedList<NameValuePair>();
parameters.add(new BasicNameValuePair(OAuth2Constants.GRANT_TYPE, OAuth2Constants.CLIENT_CREDENTIALS));
@@ -377,14 +377,16 @@ public class ClientAuthSignedJWTTest extends AbstractKeycloakTest {
HttpResponse resp = sendRequest(oauth.getServiceAccountUrl(), parameters);
OAuthClient.AccessTokenResponse response = new OAuthClient.AccessTokenResponse(resp);
+ setTimeOffset(0);
+
assertError(response, "client1", "unauthorized_client", Errors.INVALID_CLIENT_CREDENTIALS);
}
@Test
public void testAssertionInvalidNotBefore() throws Exception {
- Time.setOffset(1000);
String invalidJwt = getClient1SignedJWT();
- Time.setOffset(0);
+
+ setTimeOffset(-1000);
List<NameValuePair> parameters = new LinkedList<NameValuePair>();
parameters.add(new BasicNameValuePair(OAuth2Constants.GRANT_TYPE, OAuth2Constants.CLIENT_CREDENTIALS));
@@ -394,6 +396,8 @@ public class ClientAuthSignedJWTTest extends AbstractKeycloakTest {
HttpResponse resp = sendRequest(oauth.getServiceAccountUrl(), parameters);
OAuthClient.AccessTokenResponse response = new OAuthClient.AccessTokenResponse(resp);
+ setTimeOffset(0);
+
assertError(response, "client1", "unauthorized_client", Errors.INVALID_CLIENT_CREDENTIALS);
}
diff --git a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/ResourceOwnerPasswordCredentialsGrantTest.java b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/ResourceOwnerPasswordCredentialsGrantTest.java
index 3633fd6..ec76062 100755
--- a/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/ResourceOwnerPasswordCredentialsGrantTest.java
+++ b/testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/oauth/ResourceOwnerPasswordCredentialsGrantTest.java
@@ -355,7 +355,7 @@ public class ResourceOwnerPasswordCredentialsGrantTest extends AbstractKeycloakT
new PasswordPolicy("forceExpiredPasswordChange(1)").toString());
try {
- Time.setOffset(60 * 60 * 48);
+ setTimeOffset(60 * 60 * 48);
oauth.clientId("resource-owner");
@@ -366,6 +366,8 @@ public class ResourceOwnerPasswordCredentialsGrantTest extends AbstractKeycloakT
assertEquals("invalid_grant", response.getError());
assertEquals("Account is not fully set up", response.getErrorDescription());
+ setTimeOffset(0);
+
events.expectLogin()
.client("resource-owner")
.session((String) null)
@@ -374,8 +376,6 @@ public class ResourceOwnerPasswordCredentialsGrantTest extends AbstractKeycloakT
.user((String) null)
.assertEvent();
} finally {
- Time.setOffset(0);
-
RealmManager.realm(realmResource).passwordPolicy(new PasswordPolicy("").toString());
UserManager.realm(realmResource).username("test-user@localhost")
.removeRequiredAction(UserModel.RequiredAction.UPDATE_PASSWORD.toString());