Skip to content

Commit

Permalink
Enables only critical tests for PDV (#766)
Browse files Browse the repository at this point in the history
* Enables only critical tests for PDV

* Updated config.yml

* Revert config.yml
  • Loading branch information
vijetmahabaleshwar-okta authored Sep 28, 2022
1 parent 5bbf673 commit 400b6f5
Show file tree
Hide file tree
Showing 18 changed files with 115 additions and 116 deletions.
4 changes: 2 additions & 2 deletions .circleci/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,14 +17,14 @@ jobs:

jdk8:
docker:
- image: cimg/openjdk:8.0.322
- image: cimg/openjdk:8.0-node
environment:
JVM_OPTS: -Xmx3200m
steps: *build_steps

jdk11:
docker:
- image: cimg/openjdk:11.0.13
- image: cimg/openjdk:11.0-node
environment:
JVM_OPTS: -Xmx3200m
steps: *build_steps
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -160,7 +160,7 @@ class ApplicationsIT extends ITSupport {
.setTokenEndpointAuthMethod(OAuthEndpointAuthenticationMethod.CLIENT_SECRET_POST))))
}

@Test (groups = "group1")
@Test
void crudAutoLogin() {
doCrudTest(client.instantiate(AutoLoginApplication)
.setVisibility(client.instantiate(ApplicationVisibility)
Expand All @@ -174,7 +174,7 @@ class ApplicationsIT extends ITSupport {
.setLoginUrl("http://swaprimaryloginurl.okta.com"))))
}

@Test (groups = "bacon")
@Test
void crudWsFed() {
doCrudTest(client.instantiate(WsFederationApplication)
.setSettings(client.instantiate(WsFederationApplicationSettings)
Expand All @@ -193,7 +193,7 @@ class ApplicationsIT extends ITSupport {
.setUsernameAttribute("username"))))
}

@Test (groups = "group1", enabled = false) // OKTA-530437
@Test
void crudSaml20() {

String name = "java-sdk-it-" + UUID.randomUUID().toString()
Expand Down Expand Up @@ -244,7 +244,7 @@ class ApplicationsIT extends ITSupport {
.setValues(["Value"])])))))
}

@Test (groups = "group1")
@Test
void crudSecurePasswordStore() {
doCrudTest(client.instantiate(SecurePasswordStoreApplication)
.setSettings(client.instantiate(SecurePasswordStoreApplicationSettings)
Expand All @@ -260,7 +260,7 @@ class ApplicationsIT extends ITSupport {
.setOptionalField3Value("finalvalue"))))
}

@Test (groups = "group1")
@Test
void crudBrowserPlugin() {
doCrudTest(client.instantiate(SwaApplication)
.setLabel(uniqueTestName)
Expand All @@ -273,7 +273,7 @@ class ApplicationsIT extends ITSupport {
// .setLoginUrlRegex("REGEX_EXPRESSION"))
}

@Test (groups = "group1")
@Test
void crudBasicAuth() {
doCrudTest(client.instantiate(BasicAuthApplication)
.setSettings(client.instantiate(BasicApplicationSettings)
Expand All @@ -282,7 +282,7 @@ class ApplicationsIT extends ITSupport {
.setUrl("https://example.com/login.html"))))
}

@Test (groups = "group1")
@Test
void crudBasicAuth_editUsernameAndPassword() {
doCrudTest(client.instantiate(BasicAuthApplication)
.setCredentials(client.instantiate(SchemeApplicationCredentials)
Expand All @@ -293,7 +293,7 @@ class ApplicationsIT extends ITSupport {
.setUrl("https://example.com/login.html"))))
}

@Test (groups = "group1")
@Test
void crudBasicAuth_adminSetsCredentials() {
doCrudTest(client.instantiate(BasicAuthApplication)
.setCredentials(client.instantiate(SchemeApplicationCredentials)
Expand All @@ -305,7 +305,7 @@ class ApplicationsIT extends ITSupport {
.setUrl("https://example.com/login.html"))))
}

@Test (groups = "group1")
@Test
void invalidApplicationCredentialsSchemeTest() {
expect(IllegalArgumentException, {
client.instantiate(BasicAuthApplication)
Expand All @@ -319,7 +319,7 @@ class ApplicationsIT extends ITSupport {
})
}

@Test (groups = "group1")
@Test
void invalidOAuthEndpointAuthenticationMethodTest() {
expect(IllegalArgumentException ,{client.instantiate(OpenIdConnectApplication)
.setSettings(client.instantiate(OpenIdConnectApplicationSettings)
Expand All @@ -343,7 +343,7 @@ class ApplicationsIT extends ITSupport {
.setTokenEndpointAuthMethod(OAuthEndpointAuthenticationMethod.SDK_UNKNOWN)))})
}

@Test (groups = "group1")
@Test
void invalidOAuthResponseTypeTest() {
expect(IllegalArgumentException ,{client.instantiate(OpenIdConnectApplication)
.setSettings(client.instantiate(OpenIdConnectApplicationSettings)
Expand All @@ -368,7 +368,7 @@ class ApplicationsIT extends ITSupport {
.setTokenEndpointAuthMethod(OAuthEndpointAuthenticationMethod.CLIENT_SECRET_POST)))})
}

@Test (groups = "group1")
@Test
void invalidOAuthGrantTypeTest() {
expect(IllegalArgumentException, {client.instantiate(OpenIdConnectApplication)
.setSettings(client.instantiate(OpenIdConnectApplicationSettings)
Expand All @@ -394,7 +394,7 @@ class ApplicationsIT extends ITSupport {
})
}

@Test (groups = "group1")
@Test
void invalidOpenIdConnectApplicationTypeTest() {
expect(IllegalArgumentException ,{
client.instantiate(OpenIdConnectApplication)
Expand All @@ -420,7 +420,7 @@ class ApplicationsIT extends ITSupport {
})
}

@Test (groups = "group1")
@Test
void crudBookmark() {
doCrudTest(client.instantiate(BookmarkApplication)
.setSettings(client.instantiate(BookmarkApplicationSettings)
Expand Down Expand Up @@ -646,7 +646,7 @@ class ApplicationsIT extends ITSupport {
assertThat readAppUser.getCredentials().getUserName(), equalTo("updated-"+user2.getProfile().getEmail())
}

@Test (groups = "group1")
@Test
void csrTest() {
Client client = getClient()

Expand Down Expand Up @@ -807,7 +807,7 @@ class ApplicationsIT extends ITSupport {
assertThat(response.size(), is(3))
}

@Test (groups = "group1")
@Test
void testGetRawResponse() {
def app = client.instantiate(SamlApplication)
.setVisibility(client.instantiate(ApplicationVisibility))
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ class AuthorizationServerIT extends ITSupport {
assertPresent(client.listAuthorizationServers(), createdAuthorizationServer)
}

@Test (groups = "group3")
@Test
void getAuthorizationServerTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand All @@ -106,7 +106,7 @@ class AuthorizationServerIT extends ITSupport {
assertThat(retrievedAuthorizationServer.getDescription(), equalTo(createdAuthorizationServer.getDescription()))
}

@Test (groups = "group3")
@Test
void updateAuthorizationServerTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand All @@ -126,7 +126,7 @@ class AuthorizationServerIT extends ITSupport {
assertThat(updatedAuthorizationServer.getDescription(), equalTo("Updated Test Authorization Server"))
}

@Test (groups = "group3")
@Test
void deleteAuthorizationServerTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand All @@ -149,7 +149,7 @@ class AuthorizationServerIT extends ITSupport {
assertNotPresent(client.listAuthorizationServers(), createdAuthorizationServer)
}

@Test (groups = "group3")
@Test
void deactivateAuthorizationServerTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand All @@ -174,7 +174,7 @@ class AuthorizationServerIT extends ITSupport {
assertThat(retrievedAuthorizationServer.getStatus(), equalTo(AuthorizationServer.StatusEnum.INACTIVE))
}

@Test (groups = "group3")
@Test
void activateAuthorizationServerTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -210,7 +210,6 @@ class AuthorizationServerIT extends ITSupport {
}

// Policy operations

@Test (groups = "group3")
void listAuthorizationServerPoliciesTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()
Expand Down Expand Up @@ -245,7 +244,7 @@ class AuthorizationServerIT extends ITSupport {
})
}

@Test (groups = "group3")
@Test
void createAuthorizationServerPolicyTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -279,7 +278,7 @@ class AuthorizationServerIT extends ITSupport {
assertThat(retrievedPolicy.getName(), equalTo(createdPolicy.getName()))
}

@Test (groups = "group3")
@Test
void updateAuthorizationServerPolicyTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -316,7 +315,7 @@ class AuthorizationServerIT extends ITSupport {
assertThat(updatedPolicy.getDescription(), equalTo("Test Policy Updated"))
}

@Test (groups = "group3")
@Test
void deleteAuthorizationServerPolicyTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -351,7 +350,7 @@ class AuthorizationServerIT extends ITSupport {
assertNotPresent(createdAuthorizationServer.listPolicies(), createdPolicy)
}

@Test (groups = "group3")
@Test
void activateDeactivateAuthorizationServerPolicyTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -396,7 +395,7 @@ class AuthorizationServerIT extends ITSupport {
assertNotPresent(createdAuthorizationServer.listPolicies(), activatedPolicy)
}

@Test (groups = "group3")
@Test
void listAuthorizationServerPolicyRulesTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -428,7 +427,7 @@ class AuthorizationServerIT extends ITSupport {
})
}

@Test (groups = "group3")
@Test
void createAuthorizationServerPolicyRuleTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -595,7 +594,7 @@ class AuthorizationServerIT extends ITSupport {
assertThat(retrievedPolicyRule.getActions().getToken().getRefreshTokenWindowMinutes(), equalTo(55))
}

@Test (groups = "group3")
@Test
void deleteAuthorizationServerPolicyRuleTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -652,7 +651,7 @@ class AuthorizationServerIT extends ITSupport {
assertNotPresent(createdPolicy.listPolicyRules(createdAuthorizationServer.getId()), createdPolicyRule)
}

@Test (groups = "group3")
@Test
void activateDeactivateAuthorizationServerPolicyRuleTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -715,7 +714,7 @@ class AuthorizationServerIT extends ITSupport {

// Scope operations

@Test (groups = "group3")
@Test
void listOAuth2ScopesTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -795,7 +794,7 @@ class AuthorizationServerIT extends ITSupport {
assertThat(updatedOAuth2Scope.getName(), equalTo(tobeUpdatedOAuth2Scope.getName()))
}

@Test (groups = "group3")
@Test
void deleteOAuth2ScopesTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -825,7 +824,7 @@ class AuthorizationServerIT extends ITSupport {

// Claim operations

@Test (groups = "group3")
@Test
void listOAuth2ClaimsTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand All @@ -851,7 +850,7 @@ class AuthorizationServerIT extends ITSupport {
assertPresent(createdAuthorizationServer.listOAuth2Claims(), createdOAuth2Claim)
}

@Test (groups = "group3")
@Test
void getOAuth2ClaimTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down Expand Up @@ -879,7 +878,7 @@ class AuthorizationServerIT extends ITSupport {
assertThat(retrievedOAuth2Claim.getId(), equalTo(createdOAuth2Claim.getId()))
}

@Test (groups = "group3")
@Test
void updateOAuth2ClaimTest() {
String name = "java-sdk-it-" + UUID.randomUUID().toString()

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ import static com.okta.sdk.tests.it.util.Util.assertPresent
*/
class EventHooksIT extends ITSupport {

@Test (groups = "group3")
@Test (groups = "group1")
void createEventHookTest() {
String name = "java-sdk-it-${UUID.randomUUID().toString()}"

Expand All @@ -59,7 +59,7 @@ class EventHooksIT extends ITSupport {
createdEventHook.deactivate()
}

@Test (groups = "group3")
@Test
void getEventHookTest() {
String name = "java-sdk-it-${UUID.randomUUID().toString()}"

Expand All @@ -84,7 +84,7 @@ class EventHooksIT extends ITSupport {
createdEventHook.deactivate()
}

@Test (groups = "group3")
@Test
void updateEventHookTest() {
String name = "java-sdk-it-${UUID.randomUUID().toString()}"

Expand Down Expand Up @@ -118,7 +118,7 @@ class EventHooksIT extends ITSupport {
createdEventHook.deactivate()
}

@Test (groups = "group3")
@Test
void deleteEventHookTest() {
String name = "java-sdk-it-${UUID.randomUUID().toString()}"

Expand Down Expand Up @@ -147,7 +147,7 @@ class EventHooksIT extends ITSupport {
}
}

@Test (groups = "group3")
@Test (groups = "group1")
void listAllEventHooksTest() {
String name = "java-sdk-it-${UUID.randomUUID().toString()}"

Expand All @@ -166,7 +166,7 @@ class EventHooksIT extends ITSupport {
createdEventHook.deactivate()
}

@Test (groups = "group3")
@Test
void activateDeactivateEventHookTest() {
String name = "java-sdk-it-${UUID.randomUUID().toString()}"

Expand Down
Loading

0 comments on commit 400b6f5

Please sign in to comment.