@@ -223,22 +223,19 @@ void testInvokeWsee() {
223
223
"/samlSenderVouches/EchoService" );
224
224
senderURI = checkWSDLAccess (domain1Namespace , domain1Uid , adminSvcExtHost1 ,
225
225
"/EchoServiceRef/Echo" );
226
- assertDoesNotThrow (() -> {
227
- assertTrue (callPythonScript (domain1Uid , domain1Namespace ,
228
- "addSAMLRelyingPartySenderConfig.py" , receiverURI ),
229
- "Failed to run python script addSAMLRelyingPartySenderConfig.py" );
230
- },
226
+ testUntil (() -> callPythonScript (domain1Uid , domain1Namespace ,
227
+ "addSAMLRelyingPartySenderConfig.py" , receiverURI ),
228
+ logger ,
231
229
"Failed to run python script addSAMLRelyingPartySenderConfig.py" );
230
+
232
231
int serviceNodePort = assertDoesNotThrow (()
233
232
-> getServiceNodePort (domain2Namespace , getExternalServicePodName (adminServerPodName2 ),
234
233
"default" ),
235
234
"Getting admin server node port failed" );
236
235
String hostPort = OKE_CLUSTER_PRIVATEIP ? ingressIP + " 80" : K8S_NODEPORT_HOST + " " + serviceNodePort ;
237
-
238
- assertDoesNotThrow (() -> {
239
- assertTrue (callPythonScript (domain1Uid , domain1Namespace ,
240
- "setupPKI.py" , hostPort ), "Failed to run python script setupPKI.py" );
241
- },
236
+ testUntil (() -> callPythonScript (domain1Uid , domain1Namespace ,
237
+ "setupPKI.py" , hostPort ),
238
+ logger ,
242
239
"Failed to run python script setupPKI.py" );
243
240
244
241
buildRunClientOnPod ();
@@ -456,27 +453,21 @@ private void createDomains() {
456
453
if (adminSvcExtHost2 == null ) {
457
454
adminSvcExtHost2 = createRouteForOKD (getExternalServicePodName (adminServerPodName2 ), domain2Namespace );
458
455
}
459
-
460
- assertDoesNotThrow (() -> {
461
- assertTrue (callPythonScript (domain1Uid , domain1Namespace ,
462
- "setupAdminSSL.py" , "mykeysen changeit 7002 /shared/" + domain1Namespace + "/"
463
- + domain1Uid + "/keystores Identity1KeyStore.jks" ),
464
- "Failed to run python script setupAdminSSL.py" );
465
- },
456
+ testUntil (() -> callPythonScript (domain1Uid , domain1Namespace ,
457
+ "setupAdminSSL.py" , "mykeysen changeit 7002 /shared/" + domain1Namespace + "/"
458
+ + domain1Uid + "/keystores Identity1KeyStore.jks" ),
459
+ logger ,
466
460
"Failed to run python script setupAdminSSL.py" );
467
- assertDoesNotThrow (() -> {
468
- assertTrue (callPythonScript (domain2Uid , domain2Namespace ,
469
- "setupAdminSSL.py" , "mykeyrec changeit 7002 /shared/" + domain2Namespace + "/"
470
- + domain2Uid + "/keystores Identity2KeyStore.jks" ),
471
- "Failed to run python script setupAdminSSL.py" );
472
- },
461
+
462
+ testUntil (() -> callPythonScript (domain2Uid , domain2Namespace ,
463
+ "setupAdminSSL.py" , "mykeyrec changeit 7002 /shared/" + domain2Namespace + "/"
464
+ + domain2Uid + "/keystores Identity2KeyStore.jks" ),
465
+ logger ,
473
466
"Failed to run python script setupAdminSSL.py" );
474
467
475
- assertDoesNotThrow (() -> {
476
- assertTrue (callPythonScript (domain2Uid , domain2Namespace ,
477
- "addSAMLAssertingPartyReceiverConfig.py" , "/samlSenderVouches/EchoService" ),
478
- "Failed to run python script addSAMLAssertingPartyReceiverConfig.py" );
479
- },
468
+ testUntil (() -> callPythonScript (domain2Uid , domain2Namespace ,
469
+ "addSAMLAssertingPartyReceiverConfig.py" , "/samlSenderVouches/EchoService" ),
470
+ logger ,
480
471
"Failed to run python script addSAMLAssertingPartyReceiverConfig.py" );
481
472
}
482
473
0 commit comments