@@ -249,7 +249,7 @@ describe('OIDC auth e2e', function () {
249249 '--browser=false' ,
250250 ] ,
251251 } ) ;
252- await shell . waitForExit ( ) ;
252+ await shell . waitForAnyExit ( ) ;
253253 shell . assertContainsOutput (
254254 'Consider specifying --oidcFlows=auth-code,device-auth if you are running mongosh in an environment without browser access'
255255 ) ;
@@ -405,7 +405,7 @@ describe('OIDC auth e2e', function () {
405405 MONGOSH_E2E_TEST_CURL_ALLOW_INVALID_TLS : '1' ,
406406 } ,
407407 } ) ;
408- await shell . waitForExit ( ) ;
408+ await shell . waitForAnyExit ( ) ;
409409 // We cannot make the mongod server accept the mock IdP's certificate,
410410 // so the best we can verify here is that auth failed *on the server*
411411 shell . assertContainsOutput ( / M o n g o S e r v e r E r r o r : A u t h e n t i c a t i o n f a i l e d / ) ;
@@ -435,7 +435,7 @@ describe('OIDC auth e2e', function () {
435435 } ,
436436 } ) ;
437437
438- await shell . waitForExit ( ) ;
438+ await shell . waitForAnyExit ( ) ;
439439 // We cannot make the mongod server accept the mock IdP's certificate,
440440 // so the best we can verify here is that auth failed *on the server*
441441 shell . assertContainsOutput ( / M o n g o S e r v e r E r r o r : A u t h e n t i c a t i o n f a i l e d / ) ;
@@ -499,7 +499,7 @@ describe('OIDC auth e2e', function () {
499499 '--eval=42' ,
500500 ] ,
501501 } ) ;
502- await shell . waitForExit ( ) ;
502+ await shell . waitForSuccessfulExit ( ) ;
503503
504504 shell . assertContainsOutput ( 'BEGIN OIDC TOKEN DUMP' ) ;
505505 shell . assertContainsOutput ( '"tokenType": "Bearer"' ) ;
@@ -519,7 +519,7 @@ describe('OIDC auth e2e', function () {
519519 '--eval=42' ,
520520 ] ,
521521 } ) ;
522- await shell . waitForExit ( ) ;
522+ await shell . waitForSuccessfulExit ( ) ;
523523
524524 shell . assertContainsOutput ( 'BEGIN OIDC TOKEN DUMP' ) ;
525525 shell . assertContainsOutput ( '"tokenType": "Bearer"' ) ;
0 commit comments