This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch test-catalog
in repository https://gitbox.apache.org/repos/asf/kafka.git


The following commit(s) were added to refs/heads/test-catalog by this push:
     new 681e0ebe656 Update test catalog data for GHA workflow run 13069046427
681e0ebe656 is described below

commit 681e0ebe656a048f2ccc34eb09602fc1dcf3b017
Author: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
AuthorDate: Fri Jan 31 10:51:02 2025 +0000

    Update test catalog data for GHA workflow run 13069046427
    
    Commit: 
https://github.com/apache/kafka/commit/15c5c075c17f1fa8a8b958bf299e80a1b1f2ae11
    GitHub Run: https://github.com/apache/kafka/actions/runs/13069046427
---
 test-catalog/clients/tests.yaml | 7 +++++++
 1 file changed, 7 insertions(+)

diff --git a/test-catalog/clients/tests.yaml b/test-catalog/clients/tests.yaml
index 514ceee0bbf..972913f999f 100644
--- a/test-catalog/clients/tests.yaml
+++ b/test-catalog/clients/tests.yaml
@@ -4272,6 +4272,7 @@ 
org.apache.kafka.common.security.oauthbearer.internals.secured.AccessTokenRetrie
 - testConfigureRefreshingFileAccessTokenRetriever
 - testConfigureRefreshingFileAccessTokenRetrieverWithInvalidDirectory
 - testConfigureRefreshingFileAccessTokenRetrieverWithInvalidFile
+- testSaslOauthbearerTokenEndpointUrlIsNotAllowed
 - testUrlencodeHeader
 
org.apache.kafka.common.security.oauthbearer.internals.secured.AccessTokenValidatorFactoryTest:
 - testConfigureThrowsExceptionOnAccessTokenValidatorClose
@@ -4306,6 +4307,7 @@ 
org.apache.kafka.common.security.oauthbearer.internals.secured.ConfigurationUtil
 - testFileUnreadable
 - testFileWhitespace
 - testFileWithSuperfluousWhitespace
+- testThrowIfURLIsNotAllowed
 - testUrl
 - testUrlCaseInsensitivity
 - testUrlEmptyString
@@ -4370,6 +4372,11 @@ 
org.apache.kafka.common.security.oauthbearer.internals.secured.ValidatorAccessTo
 - testNull
 - testRsaEncryptionAlgorithm
 - testWhitespace
+org.apache.kafka.common.security.oauthbearer.internals.secured.VerificationKeyResolverFactoryTest:
+- testConfigureRefreshingFileVerificationKeyResolver
+- testConfigureRefreshingFileVerificationKeyResolverWithInvalidDirectory
+- testConfigureRefreshingFileVerificationKeyResolverWithInvalidFile
+- testSaslOauthbearerTokenEndpointUrlIsNotAllowed
 
org.apache.kafka.common.security.oauthbearer.internals.unsecured.OAuthBearerScopeUtilsTest:
 - invalidScope
 - validScope

Reply via email to