Skip to content

Commit 29fdfdc

Browse files
committed
Merge branch 'wsso' into 'main'
added fix for nightly failure, caused by podman conversion See merge request weblogic-cloud/weblogic-kubernetes-operator!4632
2 parents 0cd35fb + 9252486 commit 29fdfdc

File tree

1 file changed

+19
-28
lines changed
  • integration-tests/src/test/java/oracle/weblogic/kubernetes

1 file changed

+19
-28
lines changed

integration-tests/src/test/java/oracle/weblogic/kubernetes/ItWseeSSO.java

Lines changed: 19 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -223,22 +223,19 @@ void testInvokeWsee() {
223223
"/samlSenderVouches/EchoService");
224224
senderURI = checkWSDLAccess(domain1Namespace, domain1Uid, adminSvcExtHost1,
225225
"/EchoServiceRef/Echo");
226-
assertDoesNotThrow(() -> {
227-
assertTrue(callPythonScript(domain1Uid, domain1Namespace,
228-
"addSAMLRelyingPartySenderConfig.py", receiverURI),
229-
"Failed to run python script addSAMLRelyingPartySenderConfig.py");
230-
},
226+
testUntil(() -> callPythonScript(domain1Uid, domain1Namespace,
227+
"addSAMLRelyingPartySenderConfig.py", receiverURI),
228+
logger,
231229
"Failed to run python script addSAMLRelyingPartySenderConfig.py");
230+
232231
int serviceNodePort = assertDoesNotThrow(()
233232
-> getServiceNodePort(domain2Namespace, getExternalServicePodName(adminServerPodName2),
234233
"default"),
235234
"Getting admin server node port failed");
236235
String hostPort = OKE_CLUSTER_PRIVATEIP ? ingressIP + " 80" : K8S_NODEPORT_HOST + " " + serviceNodePort;
237-
238-
assertDoesNotThrow(() -> {
239-
assertTrue(callPythonScript(domain1Uid, domain1Namespace,
240-
"setupPKI.py", hostPort), "Failed to run python script setupPKI.py");
241-
},
236+
testUntil(() -> callPythonScript(domain1Uid, domain1Namespace,
237+
"setupPKI.py", hostPort),
238+
logger,
242239
"Failed to run python script setupPKI.py");
243240

244241
buildRunClientOnPod();
@@ -456,27 +453,21 @@ private void createDomains() {
456453
if (adminSvcExtHost2 == null) {
457454
adminSvcExtHost2 = createRouteForOKD(getExternalServicePodName(adminServerPodName2), domain2Namespace);
458455
}
459-
460-
assertDoesNotThrow(() -> {
461-
assertTrue(callPythonScript(domain1Uid, domain1Namespace,
462-
"setupAdminSSL.py", "mykeysen changeit 7002 /shared/" + domain1Namespace + "/"
463-
+ domain1Uid + "/keystores Identity1KeyStore.jks"),
464-
"Failed to run python script setupAdminSSL.py");
465-
},
456+
testUntil(() -> callPythonScript(domain1Uid, domain1Namespace,
457+
"setupAdminSSL.py", "mykeysen changeit 7002 /shared/" + domain1Namespace + "/"
458+
+ domain1Uid + "/keystores Identity1KeyStore.jks"),
459+
logger,
466460
"Failed to run python script setupAdminSSL.py");
467-
assertDoesNotThrow(() -> {
468-
assertTrue(callPythonScript(domain2Uid, domain2Namespace,
469-
"setupAdminSSL.py", "mykeyrec changeit 7002 /shared/" + domain2Namespace + "/"
470-
+ domain2Uid + "/keystores Identity2KeyStore.jks"),
471-
"Failed to run python script setupAdminSSL.py");
472-
},
461+
462+
testUntil(() -> callPythonScript(domain2Uid, domain2Namespace,
463+
"setupAdminSSL.py", "mykeyrec changeit 7002 /shared/" + domain2Namespace + "/"
464+
+ domain2Uid + "/keystores Identity2KeyStore.jks"),
465+
logger,
473466
"Failed to run python script setupAdminSSL.py");
474467

475-
assertDoesNotThrow(() -> {
476-
assertTrue(callPythonScript(domain2Uid, domain2Namespace,
477-
"addSAMLAssertingPartyReceiverConfig.py", "/samlSenderVouches/EchoService"),
478-
"Failed to run python script addSAMLAssertingPartyReceiverConfig.py");
479-
},
468+
testUntil(() -> callPythonScript(domain2Uid, domain2Namespace,
469+
"addSAMLAssertingPartyReceiverConfig.py", "/samlSenderVouches/EchoService"),
470+
logger,
480471
"Failed to run python script addSAMLAssertingPartyReceiverConfig.py");
481472
}
482473

0 commit comments

Comments
 (0)