@@ -2620,7 +2620,7 @@ def test_auth_flows(admin: KeycloakAdmin, realm: str) -> None:
26202620
26212621 # Test flow executions
26222622 res = admin .get_authentication_flow_executions (flow_alias = "browser" )
2623- assert len (res ) in [8 , 12 , 14 ], res
2623+ assert len (res ) in [8 , 12 , 14 , 15 ], res
26242624
26252625 with pytest .raises (KeycloakGetError ) as err :
26262626 admin .get_authentication_flow_executions (flow_alias = "bad" )
@@ -2763,7 +2763,7 @@ def test_authentication_configs(admin: KeycloakAdmin, realm: str) -> None:
27632763
27642764 # Test list of auth providers
27652765 res = admin .get_authenticator_providers ()
2766- assert len (res ) <= 41
2766+ assert len (res ) <= 42
27672767
27682768 res = admin .get_authenticator_provider_config_description (provider_id = "auth-cookie" )
27692769 assert res == {
@@ -3326,7 +3326,7 @@ def test_get_bruteforce_status_for_user(
33263326 :param realm: Keycloak realm
33273327 :type realm: str
33283328 """
3329- oid , username , password = oid_with_credentials
3329+ oid , username , _ = oid_with_credentials
33303330 admin .change_current_realm (realm )
33313331
33323332 # Turn on bruteforce protection
@@ -3364,7 +3364,7 @@ def test_clear_bruteforce_attempts_for_user(
33643364 :param realm: Keycloak realm
33653365 :type realm: str
33663366 """
3367- oid , username , password = oid_with_credentials
3367+ oid , username , _ = oid_with_credentials
33683368 admin .change_current_realm (realm )
33693369
33703370 # Turn on bruteforce protection
@@ -3405,7 +3405,7 @@ def test_clear_bruteforce_attempts_for_all_users(
34053405 :param realm: Keycloak realm
34063406 :type realm: str
34073407 """
3408- oid , username , password = oid_with_credentials
3408+ oid , username , _ = oid_with_credentials
34093409 admin .change_current_realm (realm )
34103410
34113411 # Turn on bruteforce protection
@@ -3566,7 +3566,7 @@ def test_initial_access_token(
35663566 assert res ["count" ] == 2
35673567 assert res ["expiration" ] == 3
35683568
3569- oid , username , password = oid_with_credentials
3569+ oid , _ , _ = oid_with_credentials
35703570
35713571 client = str (uuid .uuid4 ())
35723572 secret = str (uuid .uuid4 ())
@@ -6326,7 +6326,7 @@ async def test_a_auth_flows(admin: KeycloakAdmin, realm: str) -> None:
63266326
63276327 # Test flow executions
63286328 res = await admin .a_get_authentication_flow_executions (flow_alias = "browser" )
6329- assert len (res ) in [8 , 12 , 14 ], res
6329+ assert len (res ) in [8 , 12 , 14 , 15 ], res
63306330
63316331 with pytest .raises (KeycloakGetError ) as err :
63326332 await admin .a_get_authentication_flow_executions (flow_alias = "bad" )
@@ -6474,7 +6474,7 @@ async def test_a_authentication_configs(admin: KeycloakAdmin, realm: str) -> Non
64746474
64756475 # Test list of auth providers
64766476 res = await admin .a_get_authenticator_providers ()
6477- assert len (res ) <= 41
6477+ assert len (res ) <= 42
64786478
64796479 res = await admin .a_get_authenticator_provider_config_description (provider_id = "auth-cookie" )
64806480 assert res == {
@@ -7060,7 +7060,7 @@ async def test_a_get_bruteforce_status_for_user(
70607060 :param realm: Keycloak realm
70617061 :type realm: str
70627062 """
7063- oid , username , password = oid_with_credentials
7063+ oid , username , _ = oid_with_credentials
70647064 await admin .a_change_current_realm (realm )
70657065
70667066 # Turn on bruteforce protection
@@ -7099,7 +7099,7 @@ async def test_a_clear_bruteforce_attempts_for_user(
70997099 :param realm: Keycloak realm
71007100 :type realm: str
71017101 """
7102- oid , username , password = oid_with_credentials
7102+ oid , username , _ = oid_with_credentials
71037103 await admin .a_change_current_realm (realm )
71047104
71057105 # Turn on bruteforce protection
@@ -7141,7 +7141,7 @@ async def test_a_clear_bruteforce_attempts_for_all_users(
71417141 :param realm: Keycloak realm
71427142 :type realm: str
71437143 """
7144- oid , username , password = oid_with_credentials
7144+ oid , username , _ = oid_with_credentials
71457145 await admin .a_change_current_realm (realm )
71467146
71477147 # Turn on bruteforce protection
@@ -7315,7 +7315,7 @@ async def test_a_initial_access_token(
73157315 assert res ["count" ] == 2
73167316 assert res ["expiration" ] == 3
73177317
7318- oid , username , password = oid_with_credentials
7318+ oid , _ , _ = oid_with_credentials
73197319
73207320 client = str (uuid .uuid4 ())
73217321 secret = str (uuid .uuid4 ())
0 commit comments