Skip to content

Commit eb47c2d

Browse files
Merge pull request #1335 from MohamedSabthar/test-enable
Enable the disabled test cases during update 11 migration
2 parents c7625c1 + 75ff126 commit eb47c2d

File tree

3 files changed

+19
-37
lines changed

3 files changed

+19
-37
lines changed

ballerina/Dependencies.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
[ballerina]
77
dependencies-toml-version = "2"
8-
distribution-version = "2201.11.0-20241121-075100-c4c87cbc"
8+
distribution-version = "2201.11.0-20241218-101200-109f6cc7"
99

1010
[[package]]
1111
org = "ballerina"

ballerina/tests/client_oauth2_provider_test.bal

Lines changed: 12 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,7 @@ import ballerina/lang.runtime as runtime;
2323

2424
// Test the client credentials grant type with valid credentials
2525
@test:Config {
26-
groups: ["skipOnWindows"],
27-
enable: false
26+
groups: ["skipOnWindows"]
2827
}
2928
isolated function testClientCredentialsGrantType1() returns Error? {
3029
ClientCredentialsGrantConfig config = {
@@ -54,8 +53,7 @@ isolated function testClientCredentialsGrantType1() returns Error? {
5453

5554
// Test the client credentials grant type with invalid client credentials
5655
@test:Config {
57-
groups: ["skipOnWindows"],
58-
enable: false
56+
groups: ["skipOnWindows"]
5957
}
6058
isolated function testClientCredentialsGrantType2() {
6159
ClientCredentialsGrantConfig config = {
@@ -91,8 +89,7 @@ isolated function testClientCredentialsGrantType2() {
9189

9290
// Test the client credentials grant type with valid client-id and invalid client-secret
9391
@test:Config {
94-
groups: ["skipOnWindows"],
95-
enable: false
92+
groups: ["skipOnWindows"]
9693
}
9794
isolated function testClientCredentialsGrantType3() {
9895
ClientCredentialsGrantConfig config = {
@@ -204,8 +201,7 @@ isolated function testClientCredentialsGrantType5() returns Error? {
204201

205202
// Test the password grant type with valid credentials
206203
@test:Config {
207-
groups: ["skipOnWindows"],
208-
enable: false
204+
groups: ["skipOnWindows"]
209205
}
210206
isolated function testPasswordGrantType1() returns Error? {
211207
PasswordGrantConfig config = {
@@ -294,8 +290,7 @@ isolated function testPasswordGrantType2() returns Error? {
294290

295291
// Test the password grant type with an invalid username, password, and a valid refresh config
296292
@test:Config {
297-
groups: ["skipOnWindows"],
298-
enable: false
293+
groups: ["skipOnWindows"]
299294
}
300295
isolated function testPasswordGrantType3() {
301296
PasswordGrantConfig config = {
@@ -381,8 +376,7 @@ isolated function testPasswordGrantType4() {
381376

382377
// Test the password grant type with an valid username, password, and without client-id and client-secret
383378
@test:Config {
384-
groups: ["skipOnWindows"],
385-
enable: false
379+
groups: ["skipOnWindows"]
386380
}
387381
isolated function testPasswordGrantType5() {
388382
PasswordGrantConfig config = {
@@ -561,8 +555,7 @@ isolated function testPasswordGrantType9() returns Error? {
561555

562556
// Test the refresh token grant type with an invalid refresh token
563557
@test:Config {
564-
groups: ["skipOnWindows"],
565-
enable: false
558+
groups: ["skipOnWindows"]
566559
}
567560
isolated function testRefreshTokenGrantType1() {
568561
RefreshTokenGrantConfig config = {
@@ -657,8 +650,7 @@ isolated function testRefreshTokenGrantType3() {
657650

658651
// Test the refresh token grant type with invalid client-id and client-secret
659652
@test:Config {
660-
groups: ["skipOnWindows"],
661-
enable: false
653+
groups: ["skipOnWindows"]
662654
}
663655
isolated function testRefreshTokenGrantType4() {
664656
RefreshTokenGrantConfig config = {
@@ -734,8 +726,7 @@ isolated function testJwtBearerGrantType1() returns Error? {
734726

735727
// Test the JWT bearer grant type with an valid JWT (different issuer)
736728
@test:Config {
737-
groups: ["skipOnWindows"],
738-
enable: false
729+
groups: ["skipOnWindows"]
739730
}
740731
isolated function testJwtBearerGrantType2() {
741732
string jwt = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxN" +
@@ -765,8 +756,7 @@ isolated function testJwtBearerGrantType2() {
765756

766757
// Test the JWT bearer grant type with an invalid assertion
767758
@test:Config {
768-
groups: ["skipOnWindows"],
769-
enable: false
759+
groups: ["skipOnWindows"]
770760
}
771761
isolated function testJwtBearerGrantType3() {
772762
JwtBearerGrantConfig config = {
@@ -836,8 +826,7 @@ isolated function testJwtBearerGrantType4() {
836826

837827
// Test the JWT bearer grant type with an valid JWT, and without client-id and client-secret
838828
@test:Config {
839-
groups: ["skipOnWindows"],
840-
enable: false
829+
groups: ["skipOnWindows"]
841830
}
842831
isolated function testJwtBearerGrantType5() {
843832
string jwt = "eyJhbGciOiJSUzI1NiIsICJ0eXAiOiJKV1QiLCAia2lkIjoiTXpZeE1tRmtPR1l3TVdJMFpXTm1ORGN4TkdZd1ltTTRaVEEzTV" +
@@ -870,8 +859,7 @@ isolated function testJwtBearerGrantType5() {
870859

871860
// Test the JWT bearer grant type with invalid client-id and client-secret
872861
@test:Config {
873-
groups: ["skipOnWindows"],
874-
enable: false
862+
groups: ["skipOnWindows"]
875863
}
876864
isolated function testJwtBearerGrantType6() {
877865
string jwt = "eyJhbGciOiJSUzI1NiIsICJ0eXAiOiJKV1QiLCAia2lkIjoiTXpZeE1tRmtPR1l3TVdJMFpXTm1ORGN4TkdZd1ltTTRaVEEzTV" +

ballerina/tests/listener_oauth2_provider_test.bal

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,7 @@ isolated function getAccessToken() returns string|Error {
3737

3838
// Test the introspection request with successful token
3939
@test:Config {
40-
groups: ["skipOnWindows"],
41-
enable: false
40+
groups: ["skipOnWindows"]
4241
}
4342
isolated function testTokenIntrospection1() returns Error? {
4443
string accessToken = check getAccessToken();
@@ -65,8 +64,7 @@ isolated function testTokenIntrospection1() returns Error? {
6564

6665
// Test the introspection request with successful token with cache configurations
6766
@test:Config {
68-
groups: ["skipOnWindows"],
69-
enable: false
67+
groups: ["skipOnWindows"]
7068
}
7169
isolated function testTokenIntrospection2() returns Error? {
7270
string accessToken = check getAccessToken();
@@ -111,8 +109,7 @@ isolated function testTokenIntrospection2() returns Error? {
111109

112110
// Test the introspection request with invalid token
113111
@test:Config {
114-
groups: ["skipOnWindows"],
115-
enable: false
112+
groups: ["skipOnWindows"]
116113
}
117114
isolated function testTokenIntrospection3() returns Error? {
118115
string accessToken = "invalid_token";
@@ -154,8 +151,7 @@ isolated function testTokenIntrospection4() {
154151

155152
// Test the introspection request with successful token without authenticating the client
156153
@test:Config {
157-
groups: ["skipOnWindows"],
158-
enable: false
154+
groups: ["skipOnWindows"]
159155
}
160156
isolated function testTokenIntrospection5() returns Error? {
161157
string accessToken = check getAccessToken();
@@ -178,8 +174,7 @@ isolated function testTokenIntrospection5() returns Error? {
178174

179175
// Test the introspection request with successful token with invalid OAuth2 client credentials grant type
180176
@test:Config {
181-
groups: ["skipOnWindows"],
182-
enable: false
177+
groups: ["skipOnWindows"]
183178
}
184179
isolated function testTokenIntrospection6() {
185180
IntrospectionConfig config = {
@@ -210,8 +205,7 @@ isolated function testTokenIntrospection6() {
210205

211206
// Test the introspection request with successful token with invalid OAuth2 password grant type
212207
@test:Config {
213-
groups: ["skipOnWindows"],
214-
enable: false
208+
groups: ["skipOnWindows"]
215209
}
216210
isolated function testTokenIntrospection7() {
217211
IntrospectionConfig config = {

0 commit comments

Comments
 (0)