@@ -91,10 +91,10 @@ abstract class ValidatorPreflightIntegrationTestBase
9191 limitValidatorUsers()
9292 }
9393
94- protected def validatorClient : ValidatorAppClientReference = {
94+ protected def validatorClient ( suppressErrors : Boolean = true ) : ValidatorAppClientReference = {
9595 val env = provideEnvironment(" NotUsed" )
9696 // retry on e.g. network errors and rate limits
97- val token = eventuallySucceeds() {
97+ val token = eventuallySucceeds(suppressErrors = suppressErrors ) {
9898 Auth0Util .getAuth0ClientCredential(
9999 validatorAuth0Secret,
100100 validatorAuth0Audience,
@@ -106,8 +106,7 @@ abstract class ValidatorPreflightIntegrationTestBase
106106 }
107107
108108 protected def limitValidatorUsers () = {
109- val client : ValidatorAppClientReference = validatorClient
110- val users = eventuallySucceeds()(client.listUsers())
109+ val users = eventuallySucceeds()(validatorClient(suppressErrors = false ).listUsers())
111110 val targetNumber = 40 // TODO(tech-debt): consider de-hardcoding this
112111 val offboardThreshold = 50 // TODO(tech-debt): consider de-hardcoding this
113112 if (users.length > offboardThreshold) {
@@ -120,7 +119,7 @@ abstract class ValidatorPreflightIntegrationTestBase
120119 .foreach { user =>
121120 {
122121 logger.debug(s " Offboarding user: ${user}" )
123- eventuallySucceeds()(validatorClient.offboardUser(user))
122+ eventuallySucceeds()(validatorClient(suppressErrors = false ) .offboardUser(user))
124123 }
125124 }
126125 } else {
@@ -230,7 +229,7 @@ abstract class ValidatorPreflightIntegrationTestBase
230229 }
231230
232231 clue(" Onboard charlie manually to share a party with Bob" ) {
233- validatorClient.onboardUser(charlieUser.id, Some (PartyId .tryFromProtoPrimitive(bobPartyId)))
232+ validatorClient() .onboardUser(charlieUser.id, Some (PartyId .tryFromProtoPrimitive(bobPartyId)))
234233 }
235234
236235 withFrontEnd(" charlie-validator" ) { implicit webDriver =>
@@ -399,7 +398,7 @@ abstract class ValidatorPreflightIntegrationTestBase
399398 }
400399
401400 " can dump participant identities of validator" in { _ =>
402- validatorClient.dumpParticipantIdentities()
401+ validatorClient() .dumpParticipantIdentities()
403402 }
404403
405404 " connect to all sequencers stated in latest DsoRules contract" in { implicit env =>
@@ -421,7 +420,7 @@ abstract class ValidatorPreflightIntegrationTestBase
421420 .fromUris(NonEmpty .from(availableConnections.map(conn => new URI (conn.url))).value)
422421 .value
423422
424- val domainConnectionConfig = validatorClient.decentralizedSynchronizerConnectionConfig()
423+ val domainConnectionConfig = validatorClient() .decentralizedSynchronizerConnectionConfig()
425424 val connectedEndpointSet =
426425 domainConnectionConfig.sequencerConnections.connections.flatMap(_.endpoints).toSet
427426
@@ -536,7 +535,7 @@ class RunbookValidatorPreflightIntegrationTest extends ValidatorPreflightIntegra
536535 val (svSequencerEndpoint, _) = Endpoint
537536 .fromUris(NonEmpty .from(Seq (new URI (domainConfig.sequencer.toScala.value.url))).value)
538537 .value
539- val domainConnectionConfig = validatorClient.decentralizedSynchronizerConnectionConfig()
538+ val domainConnectionConfig = validatorClient() .decentralizedSynchronizerConnectionConfig()
540539 val connectedEndpointSet =
541540 domainConnectionConfig.sequencerConnections.connections.flatMap(_.endpoints).toSet
542541 connectedEndpointSet should contain(svSequencerEndpoint.forgetNE.loneElement.toString)
0 commit comments