Test Result : (root)

130 failures (+130) , 463 skipped (+463)
946 tests (+941)
Took 1.8 sec.

All Failed Tests

Test NameDurationAge
 Scenario: Add Ldap Source Server.And I sign out1 ms1
 Scenario: Add Ldap Source Server.Scenario: Add Ldap Source Server1 ms7
 Scenario: Add and Delete new group.And I add a group with display name 'QAGroupAddedDN'4 ms1
 Scenario: Add and Delete new group.Scenario: Add and Delete new group5 ms2
 Scenario: Add new log template.Scenario: Add new log template0 ms2
 Scenario: Add new log template.Then I sign out0 ms1
 Scenario: Add new sector.And I set 'https://gluuqa/login/redirect' as login redirect4 ms1
 Scenario: Add new sector.Scenario: Add new sector5 ms2
 Scenario: Add new uma scope.And I set uma scope id to a random value2 ms1
 Scenario: Add new uma scope.Scenario: Add new uma scope3 ms21
 Scenario: Add new user.And I search for user with pattern 'QaUserDN'0 ms1
 Scenario: Add new user.Scenario: Add new user0 ms4
 Scenario: Add trust relationship.And I set the SAML support to 'true'2 ms1
 Scenario: Add trust relationship.Scenario: Add trust relationship3 ms21
 Scenario: Add/Delete custom script.Scenario: Add/Delete custom script0 ms20
 Scenario: Add/Delete custom script.Then I select the 'Person Authentication' tab0 ms1
 Scenario: Add/Delete new client.And I set preauthorization to 'true'0 ms1
 Scenario: Add/Delete new client.Scenario: Add/Delete new client1 ms20
 Scenario: Add/Delete new scope.And I set the display name 'QaAddedScopeDN'0 ms1
 Scenario: Add/Delete new scope.Scenario: Add/Delete new scope0 ms2
 Scenario: Attributes LDIF Export.Scenario: Attributes LDIF Export0 ms21
 Scenario: Attributes LDIF Export.Then I should see a file named 'attributes.ldif' in downloads folder0 ms1
 Scenario: Attributes LDIF import.And I import the file named 'attributes.ldif' from the download directory1 ms1
 Scenario: Attributes LDIF import.Scenario: Attributes LDIF import2 ms21
 Scenario: Cancel system configuration as an admin.And I set the Self-Service Password Reset to 'true'0 ms1
 Scenario: Cancel system configuration as an admin.Scenario: Cancel system configuration as an admin0 ms2
 Scenario: Change default authentication method.Scenario: Change default authentication method2 ms12
 Scenario: Change default authentication method.Then I sign out2 ms1
 Scenario: Change user password.And I search for user with pattern 'QaUserPasswordChanged'6 ms1
 Scenario: Change user password.Scenario: Change user password7 ms4
 Scenario: Change user password from profile page.And I set the User to Edit Own Profile to 'true'0 ms1
 Scenario: Change user password from profile page.Scenario: Change user password from profile page1 ms4
 Scenario: Check Cas protocol.Scenario: Check Cas protocol1 ms2
 Scenario: Check Cas protocol.Then I sign out1 ms1
 Scenario: Check Certificates.Scenario: Check Certificates1 ms2
 Scenario: Check Certificates.Then I sign out0 ms1
 Scenario: Check Manage LDAP authentication.Scenario: Check Manage LDAP authentication1 ms2
 Scenario: Check Manage LDAP authentication.Then I should see an ldap source named 'auth_ldap_server' with bindDn 'cn=directory manager,o=gluu' with maxConn '1000' with primary key 'uid' with local primary key 'uid' with servers 'localhost:1636' with basedn 'ou=people,o=gluu' and ssl 'true'0 ms1
 Scenario: Check Manage Registration.Scenario: Check Manage Registration0 ms2
 Scenario: Check Manage Registration.Then I sign out0 ms1
 Scenario: Check Server Status.Scenario: Check Server Status2 ms2
 Scenario: Check Server Status.Then I sign out1 ms1
 Scenario: Check all custom scripts.And I select the 'Consent Gathering' tab0 ms1
 Scenario: Check all custom scripts.Scenario: Check all custom scripts7 ms18
 Scenario: Check default authentication method.Scenario: Check default authentication method1 ms12
 Scenario: Check default authentication method.Then I sign out1 ms1
 Scenario: Check log viewer configuration.Scenario: Check log viewer configuration1 ms2
 Scenario: Check log viewer configuration.Then I sign out1 ms1
 Scenario: CheckPersonAuthentication custom script.And I should see a custom script named 'u2f' in 'Person Authentication' tab1 ms1
 Scenario: CheckPersonAuthentication custom script.Scenario: CheckPersonAuthentication custom script1 ms18
 Scenario: Configure new custom NameId.And I set the SAML support to 'true'0 ms1
 Scenario: Configure new custom NameId.Scenario: Configure new custom NameId0 ms2
 Scenario: Configure system as an admin.And I set the SCIM Support to 'true'0 ms1
 Scenario: Configure system as an admin.Scenario: Configure system as an admin0 ms2
 Scenario: Delete Ldap Source Server.And I sign out2 ms1
 Scenario: Delete Ldap Source Server.Scenario: Delete Ldap Source Server3 ms2
 Scenario: Delete OpenID connect clients.And I set persist authorization to 'true'1 ms1
 Scenario: Delete OpenID connect clients.Scenario: Delete OpenID connect clients5 ms21
 Scenario: Delete a log template.Scenario: Delete a log template1 ms2
 Scenario: Delete a log template.Then I sign out0 ms1
 Scenario: Delete a user.And I search for user with pattern 'QaUserDelete'1 ms1
 Scenario: Delete a user.Scenario: Delete a user2 ms4
 Scenario: Delete an existing group.And I add a group with display name 'QAGroupDeleteDN'4 ms1
 Scenario: Delete an existing group.Scenario: Delete an existing group4 ms2
 Scenario: Delete custom NameId.And I delete the nameID name 'City'1 ms1
 Scenario: Delete custom NameId.Scenario: Delete custom NameId1 ms2
 Scenario: Delete uma scope.And I set uma scope id to a random value0 ms1
 Scenario: Delete uma scope.Scenario: Delete uma scope0 ms21
 Scenario: Import users to gluu server.And I search for user with pattern 'fname'0 ms1
 Scenario: Import users to gluu server.Scenario: Import users to gluu server0 ms21
 Scenario: List OpenID connect clients.Scenario: List OpenID connect clients1 ms11
 Scenario: List OpenID connect clients.Then I should see an openid client named 'SCIM Resource Server Client'0 ms1
 Scenario: List OpenID connect scopes.Scenario: List OpenID connect scopes0 ms2
 Scenario: List OpenID connect scopes.Then I should see an openid scope named 'address'0 ms1
 Scenario: List uma resources.And I should see a uma resource named 'oxTrust api Resource' with scopes 'API Read Access'0 ms1
 Scenario: List uma resources.Scenario: List uma resources0 ms21
 Scenario: List uma scopes.And I should see a uma scope named 'API Read Access'0 ms1
 Scenario: List uma scopes.Scenario: List uma scopes0 ms2
 Scenario: OxTrust setting config.And I should that the org name is not empty0 ms1
 Scenario: OxTrust setting config.Scenario: OxTrust setting config1 ms2
 Scenario: Oxtrust import json configuration.Scenario: Oxtrust import json configuration2 ms2
 Scenario: Oxtrust import json configuration.Then I sign out2 ms1
 Scenario: Oxtrust json configuration.And I should see that the application url is present1 ms1
 Scenario: Oxtrust json configuration.Scenario: Oxtrust json configuration2 ms2
 Scenario: Oxtrust json configuration.Scenario: Oxtrust json configuration1 ms2
 Scenario: Oxtrust json configuration.Then I sign out0 ms1
 Scenario: Passport Configuration.And I set the Passport Support to 'true'0 ms1
 Scenario: Passport Configuration.Scenario: Passport Configuration2 ms2
 Scenario: Passport IDP.And I set the Passport Support to 'true'0 ms1
 Scenario: Passport IDP.Scenario: Passport IDP0 ms2
 Scenario: Passport provider.And I set the Passport Support to 'true'0 ms1
 Scenario: Passport provider.Scenario: Passport provider1 ms21
 Scenario: Password reset.And I set the Self-Service Password Reset to 'true'0 ms1
 Scenario: Password reset.Scenario: Password reset0 ms4
 Scenario: SMTP config.Scenario: SMTP config2 ms2
 Scenario: SMTP config.Then I sign out2 ms1
 Scenario: Search OpenID connect clients.Scenario: Search OpenID connect clients0 ms2
 Scenario: Search OpenID connect clients.Then I should see an openid client named 'SCIM Requesting Party Client'0 ms1
 Scenario: Search OpenID connect scopes.Scenario: Search OpenID connect scopes0 ms2
 Scenario: Search OpenID connect scopes.Then I should see an openid scope named 'openid'0 ms1
 Scenario: Search group.And I search for group with pattern 'gluu'3 ms1
 Scenario: Search group.Scenario: Search group3 ms2
 Scenario: Search uma resources.And I sign out2 ms1
 Scenario: Search uma resources.Scenario: Search uma resources2 ms2
 Scenario: Search uma scopes.And I sign out1 ms1
 Scenario: Search uma scopes.Scenario: Search uma scopes2 ms2
 Scenario: Search user.And I search for user with pattern 'admin'1 ms1
 Scenario: Search user.Scenario: Search user1 ms2
 Scenario: Set oxAuth log level.Scenario: Set oxAuth log level1 ms2
 Scenario: Set oxAuth log level.Then I sign out1 ms1
 Scenario: Set oxTrust log level.Scenario: Set oxTrust log level2 ms2
 Scenario: Set oxTrust log level.Then I sign out2 ms1
 Scenario: Setup cache refresh.And I enable cache refresh0 ms1
 Scenario: Setup cache refresh.Scenario: Setup cache refresh0 ms2
 Scenario: Sign in as admin.Scenario: Sign in as admin0 ms2
 Scenario: Sign in as admin.When I sign out0 ms2
 Scenario: Update OpenID connect clients.And I set persist authorization to 'True'0 ms1
 Scenario: Update OpenID connect clients.Scenario: Update OpenID connect clients0 ms21
 Scenario: Update a scope.And I set the display name 'QaScopeToBeEditedDN'1 ms1
 Scenario: Update a scope.Scenario: Update a scope1 ms2
 Scenario: Update an existing group.And I add a group with display name 'QAGroupToBeUpdatedDN'4 ms1
 Scenario: Update an existing group.Scenario: Update an existing group4 ms2
 Scenario: Update an existing user.And I search for user with pattern 'QaUserUpdateName'1 ms1
 Scenario: Update an existing user.Scenario: Update an existing user1 ms21
 Scenario: Update uma scope.And I set uma scope id to a random value1 ms1
 Scenario: Update uma scope.Scenario: Update uma scope1 ms21
 Scenario: View log files.Scenario: View log files1 ms2
 Scenario: View log files.Then I should see log files named 'oxtrust.log' and 'oxauth.log'1 ms1
 Scenario: oxAuth json configuration.Scenario: oxAuth json configuration2 ms2
 Scenario: oxAuth json configuration.Then I sign out2 ms1

All Tests

ClassDurationFail(diff)Skip(diff)Pass(diff)Total(diff)
Scenario: Add Ldap Source Server2 ms2+206+68+8
Scenario: Add and Delete new group74 ms2+213+133+318+18
Scenario: Add new log template0 ms2+204+46+6
Scenario: Add new sector68 ms2+27+74+413+13
Scenario: Add new uma scope80 ms2+211+113+316+16
Scenario: Add new user5 ms2+27+712+1221+21
Scenario: Add trust relationship0.14 sec2+225+253+330+30
Scenario: Add/Delete custom script8 ms2+213+133+318+18
Scenario: Add/Delete new client22 ms2+220+208+830+30
Scenario: Add/Delete new scope4 ms2+212+124+418+18
Scenario: Attributes LDIF Export1 ms2+21+15+58+8
Scenario: Attributes LDIF import7 ms2+22+22+26+6
Scenario: Cancel system configuration as an admin26 ms2+211+113+316+16
Scenario: Change default authentication method5 ms2+209+911+11
Scenario: Change user password0.12 sec2+215+1511+1128+28
Scenario: Change user password from profile page57 ms2+217+1711+1130+30
Scenario: Check Cas protocol3 ms2+208+810+10
Scenario: Check Certificates1 ms2+206+68+8
Scenario: Check Manage LDAP authentication2 ms2+21+13+36+6
Scenario: Check Manage Registration0 ms2+204+46+6
Scenario: Check Server Status3 ms2+2012+1214+14
Scenario: Check all custom scripts0.18 sec2+224+243+329+29
Scenario: Check default authentication method2 ms2+205+57+7
Scenario: Check log viewer configuration2 ms2+206+68+8
Scenario: CheckPersonAuthentication custom script69 ms2+214+143+319+19
Scenario: Configure new custom NameId5 ms2+27+73+312+12
Scenario: Configure system as an admin36 ms2+212+124+418+18
Scenario: Delete Ldap Source Server5 ms2+205+57+7
Scenario: Delete OpenID connect clients81 ms2+215+159+926+26
Scenario: Delete a log template1 ms2+204+46+6
Scenario: Delete a user21 ms2+26+612+1220+20
Scenario: Delete an existing group60 ms2+211+112+215+15
Scenario: Delete custom NameId4 ms2+22+23+37+7
Scenario: Delete uma scope10 ms2+210+103+315+15
Scenario: Import users to gluu server7 ms2+27+75+514+14
Scenario: List OpenID connect clients15 ms2+210+103+315+15
Scenario: List OpenID connect scopes11 ms2+29+93+314+14
Scenario: List uma resources1 ms2+22+24+48+8
Scenario: List uma scopes0 ms2+22+24+48+8
Scenario: OxTrust setting config9 ms2+26+62+210+10
Scenario: Oxtrust import json configuration4 ms2+204+46+6
Scenario: Oxtrust json configuration13 ms4+44+412+1220+20
Scenario: Passport Configuration12 ms2+25+53+310+10
Scenario: Passport IDP59 ms2+27+73+312+12
Scenario: Passport provider87 ms2+220+203+325+25
Scenario: Password reset58 ms2+215+1523+2340+40
Scenario: SMTP config4 ms2+2011+1113+13
Scenario: Search OpenID connect clients0 ms2+21+14+47+7
Scenario: Search OpenID connect scopes0 ms2+21+14+47+7
Scenario: Search group12 ms2+22+23+37+7
Scenario: Search uma resources4 ms2+205+57+7
Scenario: Search uma scopes3 ms2+205+57+7
Scenario: Search user5 ms2+23+33+38+8
Scenario: Set oxAuth log level2 ms2+204+46+6
Scenario: Set oxTrust log level4 ms2+204+46+6
Scenario: Setup cache refresh60 ms2+215+157+724+24
Scenario: Sign in as admin0 ms2+21+12+25+5
Scenario: Update OpenID connect clients44 ms2+223+2310+1035+35
Scenario: Update a scope75 ms2+221+214+427+27
Scenario: Update an existing group0.15 sec2+220+203+325+25
Scenario: Update an existing user40 ms2+215+1512+1229+29
Scenario: Update uma scope58 ms2+217+173+322+22
Scenario: View log files3 ms2+21+13+36+6
Scenario: oxAuth json configuration4 ms2+2011+1113+13