mirror of
https://github.com/keycloak/keycloak.git
synced 2026-02-09 16:58:58 -06:00
fix unit tests after message refactoring
This commit is contained in:
@@ -11,12 +11,12 @@ public class PasswordPolicyTest {
|
||||
@Test
|
||||
public void testLength() {
|
||||
PasswordPolicy policy = new PasswordPolicy("length");
|
||||
Assert.assertEquals("invalidPasswordMinLength", policy.validate("1234567").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinLengthMessages", policy.validate("1234567").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{8}, policy.validate("1234567").getParameters());
|
||||
Assert.assertNull(policy.validate("12345678"));
|
||||
|
||||
policy = new PasswordPolicy("length(4)");
|
||||
Assert.assertEquals("invalidPasswordMinLength", policy.validate("123").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinLengthMessages", policy.validate("123").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{4}, policy.validate("123").getParameters());
|
||||
Assert.assertNull(policy.validate("1234"));
|
||||
}
|
||||
@@ -24,12 +24,12 @@ public class PasswordPolicyTest {
|
||||
@Test
|
||||
public void testDigits() {
|
||||
PasswordPolicy policy = new PasswordPolicy("digits");
|
||||
Assert.assertEquals("invalidPasswordMinDigits", policy.validate("abcd").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinDigitsMessages", policy.validate("abcd").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{1}, policy.validate("abcd").getParameters());
|
||||
Assert.assertNull(policy.validate("abcd1"));
|
||||
|
||||
policy = new PasswordPolicy("digits(2)");
|
||||
Assert.assertEquals("invalidPasswordMinDigits", policy.validate("abcd1").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinDigitsMessages", policy.validate("abcd1").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{2}, policy.validate("abcd1").getParameters());
|
||||
Assert.assertNull(policy.validate("abcd12"));
|
||||
}
|
||||
@@ -37,12 +37,12 @@ public class PasswordPolicyTest {
|
||||
@Test
|
||||
public void testLowerCase() {
|
||||
PasswordPolicy policy = new PasswordPolicy("lowerCase");
|
||||
Assert.assertEquals("invalidPasswordMinLowerCaseChars", policy.validate("ABCD1234").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinLowerCaseCharsMessages", policy.validate("ABCD1234").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{1}, policy.validate("ABCD1234").getParameters());
|
||||
Assert.assertNull(policy.validate("ABcD1234"));
|
||||
|
||||
policy = new PasswordPolicy("lowerCase(2)");
|
||||
Assert.assertEquals("invalidPasswordMinLowerCaseChars", policy.validate("ABcD1234").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinLowerCaseCharsMessages", policy.validate("ABcD1234").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{2}, policy.validate("ABcD1234").getParameters());
|
||||
Assert.assertNull(policy.validate("aBcD1234"));
|
||||
}
|
||||
@@ -50,12 +50,12 @@ public class PasswordPolicyTest {
|
||||
@Test
|
||||
public void testUpperCase() {
|
||||
PasswordPolicy policy = new PasswordPolicy("upperCase");
|
||||
Assert.assertEquals("invalidPasswordMinUpperCaseChars", policy.validate("abcd1234").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinUpperCaseCharsMessages", policy.validate("abcd1234").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{1}, policy.validate("abcd1234").getParameters());
|
||||
Assert.assertNull(policy.validate("abCd1234"));
|
||||
|
||||
policy = new PasswordPolicy("upperCase(2)");
|
||||
Assert.assertEquals("invalidPasswordMinUpperCaseChars", policy.validate("abCd1234").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinUpperCaseCharsMessages", policy.validate("abCd1234").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{2}, policy.validate("abCd1234").getParameters());
|
||||
Assert.assertNull(policy.validate("AbCd1234"));
|
||||
}
|
||||
@@ -63,12 +63,12 @@ public class PasswordPolicyTest {
|
||||
@Test
|
||||
public void testSpecialChars() {
|
||||
PasswordPolicy policy = new PasswordPolicy("specialChars");
|
||||
Assert.assertEquals("invalidPasswordMinSpecialChars", policy.validate("abcd1234").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinSpecialCharsMessages", policy.validate("abcd1234").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{1}, policy.validate("abcd1234").getParameters());
|
||||
Assert.assertNull(policy.validate("ab&d1234"));
|
||||
|
||||
policy = new PasswordPolicy("specialChars(2)");
|
||||
Assert.assertEquals("invalidPasswordMinSpecialChars", policy.validate("ab&d1234").getMessage());
|
||||
Assert.assertEquals("invalidPasswordMinSpecialCharsMessages", policy.validate("ab&d1234").getMessage());
|
||||
Assert.assertArrayEquals(new Object[]{2}, policy.validate("ab&d1234").getParameters());
|
||||
Assert.assertNull(policy.validate("ab&d-234"));
|
||||
}
|
||||
|
||||
@@ -159,7 +159,7 @@ public class LoginActionsService {
|
||||
public boolean check(String code) {
|
||||
if (!checkSsl()) {
|
||||
event.error(Errors.SSL_REQUIRED);
|
||||
response = Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.HTTPS_REQUIRED );
|
||||
response = Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.HTTPS_REQUIRED);
|
||||
return false;
|
||||
}
|
||||
if (!realm.isEnabled()) {
|
||||
@@ -170,7 +170,7 @@ public class LoginActionsService {
|
||||
clientCode = ClientSessionCode.parse(code, session, realm);
|
||||
if (clientCode == null) {
|
||||
event.error(Errors.INVALID_CODE);
|
||||
response = Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_CODE );
|
||||
response = Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_CODE);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
@@ -219,7 +219,7 @@ public class LoginActionsService {
|
||||
event.event(EventType.REGISTER);
|
||||
if (!realm.isRegistrationAllowed()) {
|
||||
event.error(Errors.REGISTRATION_DISABLED);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.REGISTRATION_NOT_ALLOWED );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.REGISTRATION_NOT_ALLOWED);
|
||||
}
|
||||
|
||||
Checks checks = new Checks();
|
||||
@@ -253,7 +253,7 @@ public class LoginActionsService {
|
||||
event.event(EventType.LOGIN);
|
||||
if (!checkSsl()) {
|
||||
event.error(Errors.SSL_REQUIRED);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.HTTPS_REQUIRED );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.HTTPS_REQUIRED);
|
||||
}
|
||||
|
||||
if (!realm.isEnabled()) {
|
||||
@@ -263,7 +263,7 @@ public class LoginActionsService {
|
||||
ClientSessionCode clientCode = ClientSessionCode.parse(code, session, realm);
|
||||
if (clientCode == null) {
|
||||
event.error(Errors.INVALID_CODE);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_CODE );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_CODE);
|
||||
}
|
||||
ClientSessionModel clientSession = clientCode.getClientSession();
|
||||
if (!clientCode.isValid(ClientSessionModel.Action.AUTHENTICATE) || clientSession.getUserSession() != null) {
|
||||
@@ -293,11 +293,11 @@ public class LoginActionsService {
|
||||
ClientModel client = clientSession.getClient();
|
||||
if (client == null) {
|
||||
event.error(Errors.CLIENT_NOT_FOUND);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_LOGIN_REQUESTER );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_LOGIN_REQUESTER);
|
||||
}
|
||||
if (!client.isEnabled()) {
|
||||
event.error(Errors.CLIENT_NOT_FOUND);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.LOGIN_REQUESTER_NOT_ENABLED );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.LOGIN_REQUESTER_NOT_ENABLED);
|
||||
}
|
||||
|
||||
if (formData.containsKey("cancel")) {
|
||||
@@ -391,16 +391,16 @@ public class LoginActionsService {
|
||||
}
|
||||
if (!realm.isRegistrationAllowed()) {
|
||||
event.error(Errors.REGISTRATION_DISABLED);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.REGISTRATION_NOT_ALLOWED );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.REGISTRATION_NOT_ALLOWED);
|
||||
}
|
||||
ClientSessionCode clientCode = ClientSessionCode.parse(code, session, realm);
|
||||
if (clientCode == null) {
|
||||
event.error(Errors.INVALID_CODE);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_CODE );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_CODE);
|
||||
}
|
||||
if (!clientCode.isValid(ClientSessionModel.Action.AUTHENTICATE)) {
|
||||
event.error(Errors.INVALID_CODE);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.INVALID_CODE );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.INVALID_CODE);
|
||||
}
|
||||
|
||||
String username = formData.getFirst("username");
|
||||
@@ -420,12 +420,12 @@ public class LoginActionsService {
|
||||
ClientModel client = clientSession.getClient();
|
||||
if (client == null) {
|
||||
event.error(Errors.CLIENT_NOT_FOUND);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_LOGIN_REQUESTER );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_LOGIN_REQUESTER);
|
||||
}
|
||||
|
||||
if (!client.isEnabled()) {
|
||||
event.error(Errors.CLIENT_DISABLED);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.LOGIN_REQUESTER_NOT_ENABLED );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.LOGIN_REQUESTER_NOT_ENABLED);
|
||||
}
|
||||
|
||||
|
||||
@@ -539,7 +539,7 @@ public class LoginActionsService {
|
||||
ClientSessionCode accessCode = ClientSessionCode.parse(code, session, realm);
|
||||
if (accessCode == null || !accessCode.isValid(ClientSessionModel.Action.OAUTH_GRANT)) {
|
||||
event.error(Errors.INVALID_CODE);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.INVALID_ACCESS_CODE );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.INVALID_ACCESS_CODE);
|
||||
}
|
||||
ClientSessionModel clientSession = accessCode.getClientSession();
|
||||
event.detail(Details.CODE_ID, clientSession.getId());
|
||||
@@ -563,7 +563,7 @@ public class LoginActionsService {
|
||||
if (!AuthenticationManager.isSessionValid(realm, userSession)) {
|
||||
AuthenticationManager.logout(session, realm, userSession, uriInfo, clientConnection, headers);
|
||||
event.error(Errors.INVALID_CODE);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.SESSION_NOT_ACTIVE );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.SESSION_NOT_ACTIVE);
|
||||
}
|
||||
event.session(userSession);
|
||||
|
||||
@@ -810,7 +810,7 @@ public class LoginActionsService {
|
||||
ClientSessionCode accessCode = ClientSessionCode.parse(code, session, realm);
|
||||
if (accessCode == null) {
|
||||
event.error(Errors.INVALID_CODE);
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_CODE );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_CODE);
|
||||
}
|
||||
ClientSessionModel clientSession = accessCode.getClientSession();
|
||||
|
||||
@@ -818,10 +818,10 @@ public class LoginActionsService {
|
||||
|
||||
ClientModel client = clientSession.getClient();
|
||||
if (client == null) {
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_LOGIN_REQUESTER );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.UNKNOWN_LOGIN_REQUESTER);
|
||||
}
|
||||
if (!client.isEnabled()) {
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.LOGIN_REQUESTER_NOT_ENABLED );
|
||||
return Flows.forwardToSecurityFailurePage(session, realm, uriInfo, headers, Messages.LOGIN_REQUESTER_NOT_ENABLED);
|
||||
}
|
||||
|
||||
event.client(client.getClientId())
|
||||
|
||||
@@ -283,7 +283,7 @@ public class AccountTest {
|
||||
// All fields are required, so there should be an error when something is missing.
|
||||
profilePage.updateProfile("", "New last", "new@email.com");
|
||||
|
||||
Assert.assertEquals("Please specify first name", profilePage.getError());
|
||||
Assert.assertEquals("Please specify first name.", profilePage.getError());
|
||||
Assert.assertEquals("", profilePage.getFirstName());
|
||||
Assert.assertEquals("New last", profilePage.getLastName());
|
||||
Assert.assertEquals("new@email.com", profilePage.getEmail());
|
||||
|
||||
@@ -108,7 +108,7 @@ public class RequiredActionUpdateProfileTest {
|
||||
|
||||
updateProfilePage.assertCurrent();
|
||||
|
||||
Assert.assertEquals("Please specify first name", updateProfilePage.getError());
|
||||
Assert.assertEquals("Please specify first name.", updateProfilePage.getError());
|
||||
|
||||
events.assertEmpty();
|
||||
}
|
||||
@@ -125,7 +125,7 @@ public class RequiredActionUpdateProfileTest {
|
||||
|
||||
updateProfilePage.assertCurrent();
|
||||
|
||||
Assert.assertEquals("Please specify last name", updateProfilePage.getError());
|
||||
Assert.assertEquals("Please specify last name.", updateProfilePage.getError());
|
||||
|
||||
events.assertEmpty();
|
||||
}
|
||||
@@ -142,7 +142,7 @@ public class RequiredActionUpdateProfileTest {
|
||||
|
||||
updateProfilePage.assertCurrent();
|
||||
|
||||
Assert.assertEquals("Please specify email", updateProfilePage.getError());
|
||||
Assert.assertEquals("Please specify email.", updateProfilePage.getError());
|
||||
|
||||
events.assertEmpty();
|
||||
}
|
||||
@@ -159,7 +159,7 @@ public class RequiredActionUpdateProfileTest {
|
||||
|
||||
updateProfilePage.assertCurrent();
|
||||
|
||||
Assert.assertEquals("Email already exists", updateProfilePage.getError());
|
||||
Assert.assertEquals("Email already exists.", updateProfilePage.getError());
|
||||
|
||||
events.assertEmpty();
|
||||
}
|
||||
|
||||
@@ -214,7 +214,7 @@ public abstract class AbstractIdentityProviderTest {
|
||||
|
||||
assertNotNull(element);
|
||||
|
||||
assertEquals("Email already exists", element.getText());
|
||||
assertEquals("Email already exists.", element.getText());
|
||||
|
||||
this.updateProfilePage.assertCurrent();
|
||||
this.updateProfilePage.update("Test", "User", "test-user@redhat.com");
|
||||
|
||||
@@ -236,7 +236,7 @@ public class FederationProvidersIntegrationTest {
|
||||
// check existing username
|
||||
registerPage.register("firstName", "lastName", "email@mail.cz", "existing", "Password1", "Password1");
|
||||
registerPage.assertCurrent();
|
||||
Assert.assertEquals("Username already exists", registerPage.getError());
|
||||
Assert.assertEquals("Username already exists.", registerPage.getError());
|
||||
|
||||
// Check existing email
|
||||
registerPage.register("firstName", "lastName", "existing@email.org", "nonExisting", "Password1", "Password1");
|
||||
|
||||
@@ -162,7 +162,7 @@ public class LoginTest {
|
||||
|
||||
loginPage.assertCurrent();
|
||||
|
||||
Assert.assertEquals("Account is disabled, contact admin", loginPage.getError());
|
||||
Assert.assertEquals("Account is disabled, contact admin.", loginPage.getError());
|
||||
|
||||
events.expectLogin().user(userId).session((String) null).error("user_disabled").detail(Details.USERNAME, "login-test").removeDetail(Details.CODE_ID).assertEvent();
|
||||
} finally {
|
||||
@@ -286,7 +286,7 @@ public class LoginTest {
|
||||
loginPage.login("login@test.com", "password");
|
||||
|
||||
loginPage.assertCurrent();
|
||||
Assert.assertEquals("Login timeout. Please login again", loginPage.getError());
|
||||
Assert.assertEquals("Login timeout. Please login again.", loginPage.getError());
|
||||
|
||||
events.expectLogin().user((String) null).session((String) null).error("expired_code").clearDetails().assertEvent();
|
||||
|
||||
|
||||
@@ -164,7 +164,7 @@ public class LoginTotpTest {
|
||||
loginTotpPage.login(totp.generate("totpSecret"));
|
||||
|
||||
loginPage.assertCurrent();
|
||||
Assert.assertEquals("Login timeout. Please login again", loginPage.getError());
|
||||
Assert.assertEquals("Login timeout. Please login again.", loginPage.getError());
|
||||
|
||||
AssertEvents.ExpectedEvent expectedEvent = events.expectLogin().error("expired_code")
|
||||
.user((String)null)
|
||||
|
||||
@@ -78,7 +78,7 @@ public class RegisterTest {
|
||||
registerPage.register("firstName", "lastName", "registerExistingUser@email", "test-user@localhost", "password", "password");
|
||||
|
||||
registerPage.assertCurrent();
|
||||
Assert.assertEquals("Username already exists", registerPage.getError());
|
||||
Assert.assertEquals("Username already exists.", registerPage.getError());
|
||||
|
||||
events.expectRegister("test-user@localhost", "registerExistingUser@email").user((String) null).error("username_in_use").assertEvent();
|
||||
}
|
||||
@@ -92,7 +92,7 @@ public class RegisterTest {
|
||||
registerPage.register("firstName", "lastName", "registerUserInvalidPasswordConfirm@email", "registerUserInvalidPasswordConfirm", "password", "invalid");
|
||||
|
||||
registerPage.assertCurrent();
|
||||
Assert.assertEquals("Password confirmation doesn't match", registerPage.getError());
|
||||
Assert.assertEquals("Password confirmation doesn't match.", registerPage.getError());
|
||||
|
||||
events.expectRegister("registerUserInvalidPasswordConfirm", "registerUserInvalidPasswordConfirm@email").user((String) null).error("invalid_registration").assertEvent();
|
||||
}
|
||||
@@ -157,7 +157,7 @@ public class RegisterTest {
|
||||
registerPage.register("firstName", "lastName", "registerUserMissingUsername@email", null, "password", "password");
|
||||
|
||||
registerPage.assertCurrent();
|
||||
Assert.assertEquals("Please specify username", registerPage.getError());
|
||||
Assert.assertEquals("Please specify username.", registerPage.getError());
|
||||
|
||||
events.expectRegister(null, "registerUserMissingUsername@email").removeDetail("username").error("invalid_registration").assertEvent();
|
||||
}
|
||||
@@ -170,7 +170,7 @@ public class RegisterTest {
|
||||
|
||||
registerPage.register("firstName", "lastName", null, "registerUserMissingEmail", "password", "password");
|
||||
registerPage.assertCurrent();
|
||||
Assert.assertEquals("Please specify email", registerPage.getError());
|
||||
Assert.assertEquals("Please specify email.", registerPage.getError());
|
||||
events.expectRegister("registerUserMissingEmail", null).removeDetail("email").error("invalid_registration").assertEvent();
|
||||
|
||||
registerPage.register("firstName", "lastName", "registerUserInvalidEmailemail", "registerUserInvalidEmail", "password", "password");
|
||||
|
||||
@@ -56,7 +56,7 @@ public class LoginPage extends AbstractPage {
|
||||
@FindBy(linkText = "Register")
|
||||
private WebElement registerLink;
|
||||
|
||||
@FindBy(linkText = "Password")
|
||||
@FindBy(linkText = "Forgot Password?")
|
||||
private WebElement resetPasswordLink;
|
||||
|
||||
@FindBy(linkText = "Username")
|
||||
|
||||
Reference in New Issue
Block a user