keycloak-uncached
Changes
testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/AbstractKeycloakIdentityProviderTest.java 58(+0 -58)
testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCBrokerUserPropertyTest.java 14(+0 -14)
Details
diff --git a/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/AbstractKeycloakIdentityProviderTest.java b/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/AbstractKeycloakIdentityProviderTest.java
index 05cd035..3d2cf07 100755
--- a/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/AbstractKeycloakIdentityProviderTest.java
+++ b/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/AbstractKeycloakIdentityProviderTest.java
@@ -98,46 +98,6 @@ public abstract class AbstractKeycloakIdentityProviderTest extends AbstractIdent
}
@Test
- public void testTemporarilyDisabledUser() {
- KeycloakSession session = brokerServerRule.startSession();
- setUpdateProfileFirstLogin(session.realms().getRealmByName("realm-with-broker"), IdentityProviderRepresentation.UPFLM_OFF);
- brokerServerRule.stopSession(session, true);
-
- driver.navigate().to("http://localhost:8081/test-app");
- loginPage.clickSocial(getProviderId());
- loginPage.login("test-user", "password");
- driver.navigate().to("http://localhost:8081/test-app/logout");
-
- try {
- session = brokerServerRule.startSession();
- RealmModel brokerRealm = session.realms().getRealmByName("realm-with-broker");
- brokerRealm.setBruteForceProtected(true);
- brokerRealm.setFailureFactor(2);
- brokerServerRule.stopSession(session, true);
-
- driver.navigate().to("http://localhost:8081/test-app");
- loginPage.login("test-user", "fail");
- loginPage.login("test-user", "fail");
-
- driver.navigate().to("http://localhost:8081/test-app");
-
- assertTrue(driver.getCurrentUrl().startsWith("http://localhost:8081/auth/realms/realm-with-broker/protocol/openid-connect/auth"));
-
- loginPage.clickSocial(getProviderId());
- loginPage.login("test-user", "password");
-
- assertTrue(errorPage.isCurrent());
- assertEquals("Account is disabled, contact admin.", errorPage.getError());
- } finally {
- session = brokerServerRule.startSession();
- RealmModel brokerRealm = session.realms().getRealmByName("realm-with-broker");
- brokerRealm.setBruteForceProtected(false);
- brokerRealm.setFailureFactor(0);
- brokerServerRule.stopSession(session, true);
- }
- }
-
- @Test
public void testSuccessfulAuthenticationUpdateProfileOnMissing_nothingMissing() {
IdentityProviderModel identityProviderModel = getIdentityProviderModel();
setUpdateProfileFirstLogin(IdentityProviderRepresentation.UPFLM_MISSING);
@@ -393,14 +353,6 @@ public abstract class AbstractKeycloakIdentityProviderTest extends AbstractIdent
}
@Test
- public void testProviderOnLoginPage() {
- // Provider button is available on login page
- this.driver.navigate().to("http://localhost:8081/test-app/");
- assertTrue(this.driver.getCurrentUrl().startsWith("http://localhost:8081/auth/realms/realm-with-broker/protocol/openid-connect/auth"));
- loginPage.findSocialButton(getProviderId());
- }
-
- @Test
public void testAccountManagementLinkIdentity() {
// Login as pedroigor to account management
accountFederatedIdentityPage.realm("realm-with-broker");
@@ -484,16 +436,6 @@ public abstract class AbstractKeycloakIdentityProviderTest extends AbstractIdent
assertEquals("Federated identity returned by " + getProviderId() + " is already linked to another user.", accountFederatedIdentityPage.getError());
}
-
- @Test(expected = NoSuchElementException.class)
- public void testIdentityProviderNotAllowed() {
- this.driver.navigate().to("http://localhost:8081/test-app/");
-
- assertTrue(this.driver.getCurrentUrl().startsWith("http://localhost:8081/auth/realms/realm-with-broker/protocol/openid-connect/auth"));
-
- driver.findElement(By.className("model-oidc-idp"));
- }
-
protected void configureClientRetrieveToken(String clientId) {
RealmModel realm = getRealm();
RoleModel readTokenRole = realm.getClientByClientId(Constants.BROKER_SERVICE_CLIENT_ID).getRole(Constants.READ_TOKEN_ROLE);
diff --git a/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCBrokerUserPropertyTest.java b/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCBrokerUserPropertyTest.java
index 9fb585e..1c5ed9b 100755
--- a/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCBrokerUserPropertyTest.java
+++ b/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCBrokerUserPropertyTest.java
@@ -185,13 +185,6 @@ public class OIDCBrokerUserPropertyTest extends AbstractKeycloakIdentityProvider
@Override
@Test
@Ignore
- public void testProviderOnLoginPage() {
- // ignore
- }
-
- @Override
- @Test
- @Ignore
public void testAccountManagementLinkIdentity() {
// ignore
}
@@ -206,13 +199,6 @@ public class OIDCBrokerUserPropertyTest extends AbstractKeycloakIdentityProvider
@Override
@Test
@Ignore
- public void testIdentityProviderNotAllowed() {
- // ignore
- }
-
- @Override
- @Test
- @Ignore
public void testTokenStorageAndRetrievalByApplication() {
// ignore
}
diff --git a/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCKeyCloakServerBrokerBasicTest.java b/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCKeyCloakServerBrokerBasicTest.java
index c12f732..3862189 100755
--- a/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCKeyCloakServerBrokerBasicTest.java
+++ b/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/OIDCKeyCloakServerBrokerBasicTest.java
@@ -111,21 +111,11 @@ public class OIDCKeyCloakServerBrokerBasicTest extends AbstractKeycloakIdentityP
}
@Test
- public void testSuccessfulAuthentication() {
- super.testSuccessfulAuthentication();
- }
-
- @Test
public void testDisabledUser() throws Exception {
super.testDisabledUser();
}
@Test
- public void testTemporarilyDisabledUser() {
- super.testTemporarilyDisabledUser();
- }
-
- @Test
public void testLogoutWorksWithTokenTimeout() {
try (Keycloak keycloak = Keycloak.getInstance("http://localhost:8081/auth", "master", "admin", "admin", org.keycloak.models.Constants.ADMIN_CLI_CLIENT_ID)) {
RealmRepresentation realm = keycloak.realm("realm-with-oidc-identity-provider").toRepresentation();
diff --git a/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/SAMLBrokerUserPropertyTest.java b/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/SAMLBrokerUserPropertyTest.java
index 8fca98d..25fd7a4 100755
--- a/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/SAMLBrokerUserPropertyTest.java
+++ b/testsuite/integration-deprecated/src/test/java/org/keycloak/testsuite/broker/SAMLBrokerUserPropertyTest.java
@@ -174,13 +174,6 @@ public class SAMLBrokerUserPropertyTest extends AbstractKeycloakIdentityProvider
@Override
@Test
@Ignore
- public void testProviderOnLoginPage() {
- // ignore
- }
-
- @Override
- @Test
- @Ignore
public void testAccountManagementLinkIdentity() {
// ignore
}
@@ -195,13 +188,6 @@ public class SAMLBrokerUserPropertyTest extends AbstractKeycloakIdentityProvider
@Override
@Test
@Ignore
- public void testIdentityProviderNotAllowed() {
- // ignore
- }
-
- @Override
- @Test
- @Ignore
public void testTokenStorageAndRetrievalByApplication() {
// ignore
}