diff --git a/modules/integration/tests-integration/tests-backend/src/test/java/org/wso2/identity/integration/test/rest/api/server/authenticator/management/v1/AuthenticatorFailureTest.java b/modules/integration/tests-integration/tests-backend/src/test/java/org/wso2/identity/integration/test/rest/api/server/authenticator/management/v1/AuthenticatorFailureTest.java index 66ea21f7905..6feab80a297 100644 --- a/modules/integration/tests-integration/tests-backend/src/test/java/org/wso2/identity/integration/test/rest/api/server/authenticator/management/v1/AuthenticatorFailureTest.java +++ b/modules/integration/tests-integration/tests-backend/src/test/java/org/wso2/identity/integration/test/rest/api/server/authenticator/management/v1/AuthenticatorFailureTest.java @@ -114,7 +114,7 @@ public void createUserDefinedLocalAuthenticatorInvalidName() throws JsonProcessi .log().ifValidationFails() .assertThat() .statusCode(HttpStatus.SC_BAD_REQUEST) - .body("code", equalTo("AUT-60004")) + .body("code", equalTo("AUT-60014")) .body("message", equalTo("Authenticator name is invalid.")) .body("description", equalTo("The provided authenticator name invalid@name is not in the " + "expected format ^[a-zA-Z0-9][a-zA-Z0-9-_]*$.")); @@ -130,7 +130,7 @@ public void createUserDefinedLocalAuthenticatorMissingEndpointProperty() throws .log().ifValidationFails() .assertThat() .statusCode(HttpStatus.SC_BAD_REQUEST) - .body("code", equalTo("AUT-60003")) + .body("code", equalTo("AUT-60011")) .body("message", equalTo("Invalid endpoint configuration provided.")) .body("description", equalTo("The property username must be provided as an authentication " + "property for the BASIC authentication type.")); @@ -146,7 +146,7 @@ public void createUserDefinedLocalAuthenticatorEmptyDisplayName() throws JsonPro .log().ifValidationFails() .assertThat() .statusCode(HttpStatus.SC_BAD_REQUEST) - .body("code", equalTo("AUT-60004")) + .body("code", equalTo("AUT-60015")) .body("message", equalTo("Invalid empty or blank value.")) .body("description", equalTo("Value for displayName should not be empty or blank.")); } @@ -176,7 +176,7 @@ public void createUserDefinedLocalAuthenticatorEmptyEndpointProperty() throws Js .log().ifValidationFails() .assertThat() .statusCode(HttpStatus.SC_BAD_REQUEST) - .body("code", equalTo("AUT-60003")) + .body("code", equalTo("AUT-60011")) .body("message", equalTo("Invalid endpoint configuration provided.")) .body("description", equalTo("The Property username cannot be blank.")); } @@ -240,7 +240,7 @@ public void createUserDefinedLocalAuthenticatorWithExistingAuthenticatorName() t .log().ifValidationFails() .assertThat() .statusCode(HttpStatus.SC_BAD_REQUEST) - .body("code", equalTo("AUT-60003")) + .body("code", equalTo("AUT-60013")) .body("message", equalTo("The authenticator already exists.")) .body("description", equalTo("The authenticator already exists for the given name:" + " customAuthenticator.")); @@ -257,7 +257,7 @@ public void updateUserDefinedLocalAuthenticatorMissingEndpointProperty() throws .log().ifValidationFails() .assertThat() .statusCode(HttpStatus.SC_BAD_REQUEST) - .body("code", equalTo("AUT-60003")) + .body("code", equalTo("AUT-60011")) .body("message", equalTo("Invalid endpoint configuration provided.")) .body("description", equalTo("The property username must be provided as an authentication " + "property for the BASIC authentication type.")); @@ -274,7 +274,7 @@ public void updateUserDefinedLocalAuthenticatorEmptyDisplayName() throws JsonPro .log().ifValidationFails() .assertThat() .statusCode(HttpStatus.SC_BAD_REQUEST) - .body("code", equalTo("AUT-60004")) + .body("code", equalTo("AUT-60015")) .body("message", equalTo("Invalid empty or blank value.")) .body("description", equalTo("Value for displayName should not be empty or blank.")); } diff --git a/pom.xml b/pom.xml index febd4217d12..30349e85003 100755 --- a/pom.xml +++ b/pom.xml @@ -2356,7 +2356,7 @@ - 7.7.60 + 7.7.66 [5.14.67, 8.0.0) @@ -2468,7 +2468,7 @@ 2.0.17 - 1.3.15 + 1.3.16 1.3.47 5.5.9