|
40 | 40 | import oracle.kubernetes.operator.KubernetesConstants;
|
41 | 41 | import oracle.kubernetes.operator.LabelConstants;
|
42 | 42 | import oracle.kubernetes.operator.VersionConstants;
|
| 43 | +import oracle.kubernetes.operator.wlsconfig.NetworkAccessPoint; |
43 | 44 | import oracle.kubernetes.operator.wlsconfig.WlsClusterConfig;
|
44 | 45 | import oracle.kubernetes.operator.wlsconfig.WlsDomainConfig;
|
45 | 46 | import oracle.kubernetes.operator.wlsconfig.WlsDynamicServersConfig;
|
@@ -493,6 +494,22 @@ public void parseDomainTopologyYaml() {
|
493 | 494 | assertEquals(3, serverConfigMap.size());
|
494 | 495 |
|
495 | 496 | assertTrue(serverConfigMap.containsKey("admin-server"));
|
| 497 | + assertTrue(serverConfigMap.containsKey("server1")); |
| 498 | + assertTrue(serverConfigMap.containsKey("server2")); |
| 499 | + |
| 500 | + WlsServerConfig server2Config = serverConfigMap.get("server2"); |
| 501 | + assertEquals("domain1-managed-server2", server2Config.getListenAddress()); |
| 502 | + assertEquals(9004, server2Config.getListenPort().intValue()); |
| 503 | + assertEquals(8004, server2Config.getSslListenPort().intValue()); |
| 504 | + assertFalse(server2Config.isSslPortEnabled()); |
| 505 | + List<NetworkAccessPoint> server2ConfigNAPs = server2Config.getNetworkAccessPoints(); |
| 506 | + assertEquals(1, server2ConfigNAPs.size()); |
| 507 | + |
| 508 | + NetworkAccessPoint server2ConfigNAP = server2ConfigNAPs.get(0); |
| 509 | + assertEquals("nap2", server2ConfigNAP.getName()); |
| 510 | + assertEquals("t3", server2ConfigNAP.getProtocol()); |
| 511 | + assertEquals(8005, server2ConfigNAP.getListenPort().intValue()); |
| 512 | + assertEquals(8005, server2ConfigNAP.getPublicPort().intValue()); |
496 | 513 | }
|
497 | 514 |
|
498 | 515 | @Test
|
|
0 commit comments