Adding delay after creating network,subnet to wait realise on esx
- issue : 2661127 - result link : http://w3-dbc401/shubhamk/scenario_cases_after_adding_delay.html Change-Id: Iacd589933056499e0b3017476ff9edf0a3127f68
This commit is contained in:
parent
f52975b4ee
commit
45c8419c80
@ -45,6 +45,7 @@ NSX_BACKEND_TIME_INTERVAL = 40
|
|||||||
NSX_BACKEND_SMALL_TIME_INTERVAL = 15
|
NSX_BACKEND_SMALL_TIME_INTERVAL = 15
|
||||||
NSX_BACKEND_VERY_SMALL_TIME_INTERVAL = 10
|
NSX_BACKEND_VERY_SMALL_TIME_INTERVAL = 10
|
||||||
NSXP_BACKEND_SMALL_TIME_INTERVAL = 25
|
NSXP_BACKEND_SMALL_TIME_INTERVAL = 25
|
||||||
|
NSX_NETWORK_REALISE_TIMEOUT = 3
|
||||||
|
|
||||||
# DFW
|
# DFW
|
||||||
NSX_FIREWALL_REALIZED_TIMEOUT = 120
|
NSX_FIREWALL_REALIZED_TIMEOUT = 120
|
||||||
|
@ -180,6 +180,7 @@ class TestAllowedAddressPair(manager.NetworkScenarioTest):
|
|||||||
self.network = self._create_network()
|
self.network = self._create_network()
|
||||||
self.subnet = self._create_subnet(self.network,
|
self.subnet = self._create_subnet(self.network,
|
||||||
cidr='14.168.1.0/24')
|
cidr='14.168.1.0/24')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-default1'),
|
router_name=data_utils.rand_name('router-default1'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -224,6 +225,7 @@ class TestAllowedAddressPair(manager.NetworkScenarioTest):
|
|||||||
cidr='14.168.1.0/24')
|
cidr='14.168.1.0/24')
|
||||||
self.subnet_v6 = self._create_subnet_v6(self.network,
|
self.subnet_v6 = self._create_subnet_v6(self.network,
|
||||||
cidr='3010::/64')
|
cidr='3010::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-default1'),
|
router_name=data_utils.rand_name('router-default1'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
|
@ -11,11 +11,14 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
|
import time
|
||||||
|
|
||||||
from tempest import config
|
from tempest import config
|
||||||
from tempest.lib.common.utils import data_utils
|
from tempest.lib.common.utils import data_utils
|
||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
from tempest.lib import exceptions
|
from tempest.lib import exceptions
|
||||||
|
|
||||||
|
from vmware_nsx_tempest_plugin.common import constants
|
||||||
from vmware_nsx_tempest_plugin.lib import feature_manager
|
from vmware_nsx_tempest_plugin.lib import feature_manager
|
||||||
CONF = config.CONF
|
CONF = config.CONF
|
||||||
|
|
||||||
@ -55,7 +58,8 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
allocation_pools = {'allocation_pools': [{
|
allocation_pools = {'allocation_pools': [{
|
||||||
'start': str(address_cidr).split('/')[0] + '2',
|
'start': str(address_cidr).split('/')[0] + '2',
|
||||||
'end':str(address_cidr).split('/')[0] + '70'}]}
|
'end':str(address_cidr).split('/')[0] + '70'}]}
|
||||||
subnet = self.create_topology_subnet(subnet_name, network,
|
subnet = self.create_topology_subnet(
|
||||||
|
subnet_name, network,
|
||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router['id'],
|
router_id=router['id'],
|
||||||
@ -63,7 +67,8 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
ipv6_address_mode='slaac',
|
ipv6_address_mode='slaac',
|
||||||
**allocation_pools)
|
**allocation_pools)
|
||||||
else:
|
else:
|
||||||
subnet = self.create_topology_subnet(subnet_name, network,
|
subnet = self.create_topology_subnet(
|
||||||
|
subnet_name, network,
|
||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router['id'],
|
router_id=router['id'],
|
||||||
@ -79,7 +84,8 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
"""
|
"""
|
||||||
name = data_utils.rand_name("dual-network")
|
name = data_utils.rand_name("dual-network")
|
||||||
networks_client = self.cmgr_adm.networks_client
|
networks_client = self.cmgr_adm.networks_client
|
||||||
network = self.create_topology_network(name,
|
network = self.create_topology_network(
|
||||||
|
name,
|
||||||
networks_client=networks_client)
|
networks_client=networks_client)
|
||||||
sg = self._create_security_group(network)
|
sg = self._create_security_group(network)
|
||||||
rtr_name = data_utils.rand_name("dual-rtr")
|
rtr_name = data_utils.rand_name("dual-rtr")
|
||||||
@ -87,12 +93,14 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
rtr_name, routers_client=self.cmgr_adm.routers_client)
|
rtr_name, routers_client=self.cmgr_adm.routers_client)
|
||||||
subnet_client = self.cmgr_adm.subnets_client
|
subnet_client = self.cmgr_adm.subnets_client
|
||||||
subnet_name = network['name'] + 'ipv4-sub'
|
subnet_name = network['name'] + 'ipv4-sub'
|
||||||
self.create_topology_subnet(subnet_name, network,
|
self.create_topology_subnet(
|
||||||
|
subnet_name, network,
|
||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router['id'],
|
router_id=router['id'],
|
||||||
cidr='20.20.0.0/16')
|
cidr='20.20.0.0/16')
|
||||||
subnet_v6 = self._create_ipv6_subnet(network, router)
|
subnet_v6 = self._create_ipv6_subnet(network, router)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
return network, router, sg, subnet_v6
|
return network, router, sg, subnet_v6
|
||||||
|
|
||||||
def _create_single_rtr_multiple_net_topology(self):
|
def _create_single_rtr_multiple_net_topology(self):
|
||||||
@ -102,32 +110,40 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
"""
|
"""
|
||||||
name = data_utils.rand_name("dual-network-1")
|
name = data_utils.rand_name("dual-network-1")
|
||||||
networks_client = self.cmgr_adm.networks_client
|
networks_client = self.cmgr_adm.networks_client
|
||||||
network_1 = self.create_topology_network(name,
|
network_1 = self.create_topology_network(
|
||||||
|
name,
|
||||||
networks_client=networks_client)
|
networks_client=networks_client)
|
||||||
sg = self._create_security_group(network_1)
|
sg = self._create_security_group(network_1)
|
||||||
name = data_utils.rand_name("dual-network-2")
|
name = data_utils.rand_name("dual-network-2")
|
||||||
network_2 = self.create_topology_network(name,
|
network_2 = self.create_topology_network(
|
||||||
|
name,
|
||||||
networks_client=networks_client)
|
networks_client=networks_client)
|
||||||
rtr_name = data_utils.rand_name("dual-rtr")
|
rtr_name = data_utils.rand_name("dual-rtr")
|
||||||
router = self.create_topology_router(
|
router = self.create_topology_router(
|
||||||
rtr_name, routers_client=self.cmgr_adm.routers_client)
|
rtr_name, routers_client=self.cmgr_adm.routers_client)
|
||||||
subnet_client = self.cmgr_adm.subnets_client
|
subnet_client = self.cmgr_adm.subnets_client
|
||||||
subnet_name = network_1['name'] + 'ipv4-sub'
|
subnet_name = network_1['name'] + 'ipv4-sub'
|
||||||
self.create_topology_subnet(subnet_name, network_1,
|
self.create_topology_subnet(
|
||||||
|
subnet_name, network_1,
|
||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router['id'],
|
router_id=router['id'],
|
||||||
cidr='10.10.0.0/16')
|
cidr='10.10.0.0/16')
|
||||||
self._create_ipv6_subnet(network_1, router,
|
self._create_ipv6_subnet(
|
||||||
|
network_1, router,
|
||||||
cidr='2010::/64')
|
cidr='2010::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
subnet_name = network_2['name'] + 'ipv4-sub'
|
subnet_name = network_2['name'] + 'ipv4-sub'
|
||||||
self.create_topology_subnet(subnet_name, network_2,
|
self.create_topology_subnet(
|
||||||
|
subnet_name, network_2,
|
||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router['id'],
|
router_id=router['id'],
|
||||||
cidr='20.20.0.0/16')
|
cidr='20.20.0.0/16')
|
||||||
self._create_ipv6_subnet(network_2, router,
|
self._create_ipv6_subnet(
|
||||||
|
network_2, router,
|
||||||
cidr='2011::/64')
|
cidr='2011::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
networks = [network_1, network_2]
|
networks = [network_1, network_2]
|
||||||
return networks, router, sg
|
return networks, router, sg
|
||||||
|
|
||||||
@ -138,7 +154,8 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
"""
|
"""
|
||||||
name = data_utils.rand_name("dual-network-1")
|
name = data_utils.rand_name("dual-network-1")
|
||||||
networks_client = self.cmgr_adm.networks_client
|
networks_client = self.cmgr_adm.networks_client
|
||||||
network_1 = self.create_topology_network(name,
|
network_1 = self.create_topology_network(
|
||||||
|
name,
|
||||||
networks_client=networks_client)
|
networks_client=networks_client)
|
||||||
sg = self._create_security_group(network_1)
|
sg = self._create_security_group(network_1)
|
||||||
rtr_name = data_utils.rand_name("dual-rtr-1")
|
rtr_name = data_utils.rand_name("dual-rtr-1")
|
||||||
@ -146,27 +163,34 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
rtr_name, routers_client=self.cmgr_adm.routers_client)
|
rtr_name, routers_client=self.cmgr_adm.routers_client)
|
||||||
subnet_client = self.cmgr_adm.subnets_client
|
subnet_client = self.cmgr_adm.subnets_client
|
||||||
subnet_name = network_1['name'] + 'ipv4-sub'
|
subnet_name = network_1['name'] + 'ipv4-sub'
|
||||||
self.create_topology_subnet(subnet_name, network_1,
|
self.create_topology_subnet(
|
||||||
|
subnet_name, network_1,
|
||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router_1['id'],
|
router_id=router_1['id'],
|
||||||
cidr='10.10.0.0/16')
|
cidr='10.10.0.0/16')
|
||||||
self._create_ipv6_subnet(network_1, router_1,
|
self._create_ipv6_subnet(
|
||||||
|
network_1, router_1,
|
||||||
cidr='2012::/64')
|
cidr='2012::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
name = data_utils.rand_name("dual-network-2")
|
name = data_utils.rand_name("dual-network-2")
|
||||||
network_2 = self.create_topology_network(name,
|
network_2 = self.create_topology_network(
|
||||||
|
name,
|
||||||
networks_client=networks_client)
|
networks_client=networks_client)
|
||||||
rtr_name = data_utils.rand_name("dual-rtr-2")
|
rtr_name = data_utils.rand_name("dual-rtr-2")
|
||||||
router_2 = self.create_topology_router(
|
router_2 = self.create_topology_router(
|
||||||
rtr_name, routers_client=self.cmgr_adm.routers_client)
|
rtr_name, routers_client=self.cmgr_adm.routers_client)
|
||||||
subnet_name = network_2['name'] + 'ipv4-sub'
|
subnet_name = network_2['name'] + 'ipv4-sub'
|
||||||
self.create_topology_subnet(subnet_name, network_2,
|
self.create_topology_subnet(
|
||||||
|
subnet_name, network_2,
|
||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router_2['id'],
|
router_id=router_2['id'],
|
||||||
cidr='20.20.0.0/16')
|
cidr='20.20.0.0/16')
|
||||||
self._create_ipv6_subnet(network_2, router_2,
|
self._create_ipv6_subnet(
|
||||||
|
network_2, router_2,
|
||||||
cidr='2013::/64')
|
cidr='2013::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
networks = [network_1, network_2]
|
networks = [network_1, network_2]
|
||||||
routers = [router_1, router_2]
|
routers = [router_1, router_2]
|
||||||
return networks, routers, sg
|
return networks, routers, sg
|
||||||
@ -194,9 +218,9 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
"""Test IPv4 and IPv6 connectivity across
|
"""Test IPv4 and IPv6 connectivity across
|
||||||
VMs connected across same network
|
VMs connected across same network
|
||||||
"""
|
"""
|
||||||
#Create topology with single router
|
# Create topology with single router
|
||||||
network, rtr, sg, subnet_v6 = self._create_single_ipv6_rtr_topology()
|
network, rtr, sg, subnet_v6 = self._create_single_ipv6_rtr_topology()
|
||||||
#Boot two VMs on the same network
|
# Boot two VMs on the same network
|
||||||
image_id = self.get_glance_image_id(['cirros', 'esx'])
|
image_id = self.get_glance_image_id(['cirros', 'esx'])
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"vm_1", [network],
|
"vm_1", [network],
|
||||||
@ -212,18 +236,18 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
clients=self.cmgr_adm)
|
clients=self.cmgr_adm)
|
||||||
vm2_server_floatingip = self.topology_servers["vm_2"][
|
vm2_server_floatingip = self.topology_servers["vm_2"][
|
||||||
"floating_ips"][0]
|
"floating_ips"][0]
|
||||||
#Check IPv4 connectivity across the same network
|
# Check IPv4 connectivity across the same network
|
||||||
vm1_server = self.topology_servers["vm_1"]
|
vm1_server = self.topology_servers["vm_1"]
|
||||||
vm2_server = self.topology_servers["vm_2"]
|
vm2_server = self.topology_servers["vm_2"]
|
||||||
self.check_vm_internal_connectivity(network,
|
self.check_vm_internal_connectivity(
|
||||||
vm1_server_floatingip, vm1_server)
|
network, vm1_server_floatingip, vm1_server)
|
||||||
self.check_vm_internal_connectivity(network,
|
self.check_vm_internal_connectivity(
|
||||||
vm2_server_floatingip, vm2_server)
|
network, vm2_server_floatingip, vm2_server)
|
||||||
#Check IPv6 connectivity across the same network
|
# Check IPv6 connectivity across the same network
|
||||||
self.check_vm_internal_ipv6_connectivity(network,
|
self.check_vm_internal_ipv6_connectivity(
|
||||||
vm1_server_floatingip, vm1_server)
|
network, vm1_server_floatingip, vm1_server)
|
||||||
self.check_vm_internal_ipv6_connectivity(network,
|
self.check_vm_internal_ipv6_connectivity(
|
||||||
vm2_server_floatingip, vm2_server)
|
network, vm2_server_floatingip, vm2_server)
|
||||||
|
|
||||||
@decorators.attr(type=['nsxv3', 'positive'])
|
@decorators.attr(type=['nsxv3', 'positive'])
|
||||||
@decorators.idempotent_id('0074ae58-2de9-4cb2-a225-12a2b093f8d2')
|
@decorators.idempotent_id('0074ae58-2de9-4cb2-a225-12a2b093f8d2')
|
||||||
@ -232,9 +256,9 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
VMs connected across different networks
|
VMs connected across different networks
|
||||||
on the same router
|
on the same router
|
||||||
"""
|
"""
|
||||||
#Create topology with single router
|
# Create topology with single router
|
||||||
networks, rtr, sg = self._create_single_rtr_multiple_net_topology()
|
networks, rtr, sg = self._create_single_rtr_multiple_net_topology()
|
||||||
#Boot two VMs on the different network
|
# Boot two VMs on the different network
|
||||||
image_id = self.get_glance_image_id(['cirros', 'esx'])
|
image_id = self.get_glance_image_id(['cirros', 'esx'])
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"vm_1", [networks[0]],
|
"vm_1", [networks[0]],
|
||||||
@ -250,20 +274,20 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
"floating_ips"][0]
|
"floating_ips"][0]
|
||||||
vm1_server = self.topology_servers["vm_1"]
|
vm1_server = self.topology_servers["vm_1"]
|
||||||
vm2_server = self.topology_servers["vm_2"]
|
vm2_server = self.topology_servers["vm_2"]
|
||||||
#Check connectivity across differnet network
|
# Check connectivity across differnet network
|
||||||
#checking VM2 Connectivity with VM1's network
|
# checking VM2 Connectivity with VM1's network
|
||||||
self.check_cross_network_connectivity(
|
self.check_cross_network_connectivity(
|
||||||
networks[0], vm2_server_floatingip, vm2_server,
|
networks[0], vm2_server_floatingip, vm2_server,
|
||||||
should_connect=True)
|
should_connect=True)
|
||||||
#checking VM1 Connectivity with VM2's network
|
# checking VM1 Connectivity with VM2's network
|
||||||
self.check_cross_network_connectivity(
|
self.check_cross_network_connectivity(
|
||||||
networks[1], vm1_server_floatingip, vm1_server,
|
networks[1], vm1_server_floatingip, vm1_server,
|
||||||
should_connect=True)
|
should_connect=True)
|
||||||
#checking VM2 IPv6 Connectivity with VM1's network
|
# checking VM2 IPv6 Connectivity with VM1's network
|
||||||
self.check_cross_network_ipv6_connectivity(
|
self.check_cross_network_ipv6_connectivity(
|
||||||
networks[0], vm2_server_floatingip, vm2_server,
|
networks[0], vm2_server_floatingip, vm2_server,
|
||||||
should_connect=True)
|
should_connect=True)
|
||||||
#checking VM1 IPv6 Connectivity with VM2's network
|
# checking VM1 IPv6 Connectivity with VM2's network
|
||||||
self.check_cross_network_ipv6_connectivity(
|
self.check_cross_network_ipv6_connectivity(
|
||||||
networks[1], vm1_server_floatingip, vm1_server,
|
networks[1], vm1_server_floatingip, vm1_server,
|
||||||
should_connect=True)
|
should_connect=True)
|
||||||
@ -275,9 +299,9 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
VMs connected across different networks
|
VMs connected across different networks
|
||||||
on different router
|
on different router
|
||||||
"""
|
"""
|
||||||
#Create topology with two router
|
# Create topology with two router
|
||||||
networks, rtrs, sg = self._create_multiple_rtr_multiple_net_topology()
|
networks, rtrs, sg = self._create_multiple_rtr_multiple_net_topology()
|
||||||
#Boot two VMs on the different network
|
# Boot two VMs on the different network
|
||||||
image_id = self.get_glance_image_id(['cirros', 'esx'])
|
image_id = self.get_glance_image_id(['cirros', 'esx'])
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"vm_1", [networks[0]],
|
"vm_1", [networks[0]],
|
||||||
@ -293,12 +317,12 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
"floating_ips"][0]
|
"floating_ips"][0]
|
||||||
vm1_server = self.topology_servers["vm_1"]
|
vm1_server = self.topology_servers["vm_1"]
|
||||||
vm2_server = self.topology_servers["vm_2"]
|
vm2_server = self.topology_servers["vm_2"]
|
||||||
#Check connectivity across differnet network
|
# Check connectivity across differnet network
|
||||||
#checking VM2 IPv6 Connectivity with VM1's network
|
# checking VM2 IPv6 Connectivity with VM1's network
|
||||||
self.check_cross_network_ipv6_connectivity(
|
self.check_cross_network_ipv6_connectivity(
|
||||||
networks[0], vm2_server_floatingip, vm2_server,
|
networks[0], vm2_server_floatingip, vm2_server,
|
||||||
should_connect=True)
|
should_connect=True)
|
||||||
#checking VM1 IPv6 Connectivity with VM2's network
|
# checking VM1 IPv6 Connectivity with VM2's network
|
||||||
self.check_cross_network_ipv6_connectivity(
|
self.check_cross_network_ipv6_connectivity(
|
||||||
networks[1], vm1_server_floatingip, vm1_server,
|
networks[1], vm1_server_floatingip, vm1_server,
|
||||||
should_connect=True)
|
should_connect=True)
|
||||||
@ -310,9 +334,9 @@ class NetworkOpsTest(feature_manager.FeatureManager):
|
|||||||
Verify the deletion of an IPv6 subnet is not possible
|
Verify the deletion of an IPv6 subnet is not possible
|
||||||
while port is attached to the subnet
|
while port is attached to the subnet
|
||||||
"""
|
"""
|
||||||
#Create topology with single router
|
# Create topology with single router
|
||||||
network, rtr, sg, subnet_v6 = self._create_single_ipv6_rtr_topology()
|
network, rtr, sg, subnet_v6 = self._create_single_ipv6_rtr_topology()
|
||||||
#Boot two VMs on the same network
|
# Boot two VMs on the same network
|
||||||
image_id = self.get_glance_image_id(['cirros', 'esx'])
|
image_id = self.get_glance_image_id(['cirros', 'esx'])
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"vm_1", [network],
|
"vm_1", [network],
|
||||||
|
@ -13,6 +13,8 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
|
import time
|
||||||
|
|
||||||
from tempest import config
|
from tempest import config
|
||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
from tempest import test
|
from tempest import test
|
||||||
@ -161,6 +163,7 @@ class ProviderNetworks(feature_manager.FeatureManager):
|
|||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
cidr="2023::/64",
|
cidr="2023::/64",
|
||||||
router_id=router['id'])
|
router_id=router['id'])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"server1", [network],
|
"server1", [network],
|
||||||
security_groups=[{'name': self.sg['name']}],
|
security_groups=[{'name': self.sg['name']}],
|
||||||
@ -247,6 +250,7 @@ class ProviderNetworks(feature_manager.FeatureManager):
|
|||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
cidr="2024::/64",
|
cidr="2024::/64",
|
||||||
router_id=router['id'])
|
router_id=router['id'])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"server1", [network1],
|
"server1", [network1],
|
||||||
security_groups=[{'name': self.sg['name']}],
|
security_groups=[{'name': self.sg['name']}],
|
||||||
@ -357,6 +361,7 @@ class ProviderNetworks(feature_manager.FeatureManager):
|
|||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
cidr="2024::/64",
|
cidr="2024::/64",
|
||||||
router_id=router['id'])
|
router_id=router['id'])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
sec_rule_client = self.cmgr_adm.security_group_rules_client
|
sec_rule_client = self.cmgr_adm.security_group_rules_client
|
||||||
sec_client = self.cmgr_adm.security_groups_client
|
sec_client = self.cmgr_adm.security_groups_client
|
||||||
kwargs = dict(tenant_id=provider_network['tenant_id'],
|
kwargs = dict(tenant_id=provider_network['tenant_id'],
|
||||||
|
@ -10,11 +10,14 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
|
import time
|
||||||
|
|
||||||
from tempest import config
|
from tempest import config
|
||||||
from tempest.lib.common.utils import data_utils
|
from tempest.lib.common.utils import data_utils
|
||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
from tempest.lib import exceptions
|
from tempest.lib import exceptions
|
||||||
|
|
||||||
|
from vmware_nsx_tempest_plugin.common import constants
|
||||||
from vmware_nsx_tempest_plugin.lib import feature_manager
|
from vmware_nsx_tempest_plugin.lib import feature_manager
|
||||||
CONF = config.CONF
|
CONF = config.CONF
|
||||||
|
|
||||||
@ -90,6 +93,7 @@ class IPv6RoutersTest(feature_manager.FeatureManager):
|
|||||||
subnet_v6 = self._create_ipv6_subnet(network_state, cidr="5200::/64",
|
subnet_v6 = self._create_ipv6_subnet(network_state, cidr="5200::/64",
|
||||||
slaac=slaac,
|
slaac=slaac,
|
||||||
router_id=router_state["id"])
|
router_id=router_state["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
if create_instance:
|
if create_instance:
|
||||||
image_id = self.get_glance_image_id(["cirros", "esx"])
|
image_id = self.get_glance_image_id(["cirros", "esx"])
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
@ -128,6 +132,7 @@ class IPv6RoutersTest(feature_manager.FeatureManager):
|
|||||||
ipv6_address_mode=ipv6_address_mode,
|
ipv6_address_mode=ipv6_address_mode,
|
||||||
ipv6_ra_mode=ipv6_ra_mode,
|
ipv6_ra_mode=ipv6_ra_mode,
|
||||||
router_id=router_state["id"])
|
router_id=router_state["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
if create_instance:
|
if create_instance:
|
||||||
image_id = self.get_glance_image_id(["cirros", "esx"])
|
image_id = self.get_glance_image_id(["cirros", "esx"])
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
|
@ -11,6 +11,9 @@
|
|||||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
|
import time
|
||||||
|
|
||||||
from oslo_log import log as logging
|
from oslo_log import log as logging
|
||||||
|
|
||||||
from tempest.common import utils
|
from tempest.common import utils
|
||||||
@ -128,6 +131,7 @@ class TestMDProxyPolicy(feature_manager.FeatureManager):
|
|||||||
network_mdproxy = self.create_topology_network("network_mdproxy")
|
network_mdproxy = self.create_topology_network("network_mdproxy")
|
||||||
self.create_topology_subnet(
|
self.create_topology_subnet(
|
||||||
"subnet_web", network_mdproxy, router_id=router_mdproxy["id"])
|
"subnet_web", network_mdproxy, router_id=router_mdproxy["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"server_mdproxy_1", [network_mdproxy], image_id=glance_image_id)
|
"server_mdproxy_1", [network_mdproxy], image_id=glance_image_id)
|
||||||
|
|
||||||
@ -135,6 +139,7 @@ class TestMDProxyPolicy(feature_manager.FeatureManager):
|
|||||||
network_mdproxy = self.create_topology_network("network_mdproxy")
|
network_mdproxy = self.create_topology_network("network_mdproxy")
|
||||||
self.create_topology_subnet(
|
self.create_topology_subnet(
|
||||||
"subnet_web", network_mdproxy)
|
"subnet_web", network_mdproxy)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"server_mdproxy_1", [network_mdproxy], create_floating_ip=False)
|
"server_mdproxy_1", [network_mdproxy], create_floating_ip=False)
|
||||||
|
|
||||||
@ -143,11 +148,13 @@ class TestMDProxyPolicy(feature_manager.FeatureManager):
|
|||||||
network_mdproxy_1 = self.create_topology_network("network_mdproxy_1")
|
network_mdproxy_1 = self.create_topology_network("network_mdproxy_1")
|
||||||
self.create_topology_subnet(
|
self.create_topology_subnet(
|
||||||
"subnet_web_1", network_mdproxy_1, router_id=router_mdproxy["id"])
|
"subnet_web_1", network_mdproxy_1, router_id=router_mdproxy["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"server_mdproxy_1", [network_mdproxy_1])
|
"server_mdproxy_1", [network_mdproxy_1])
|
||||||
network_mdproxy_2 = self.create_topology_network("network_mdproxy_2")
|
network_mdproxy_2 = self.create_topology_network("network_mdproxy_2")
|
||||||
self.create_topology_subnet("subnet_web_2", network_mdproxy_2,
|
self.create_topology_subnet("subnet_web_2", network_mdproxy_2,
|
||||||
router_id=router_mdproxy["id"])
|
router_id=router_mdproxy["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.create_topology_instance("server_mdproxy_2", [network_mdproxy_2])
|
self.create_topology_instance("server_mdproxy_2", [network_mdproxy_2])
|
||||||
|
|
||||||
def metadata_test_on_various_glance_image(self, image_id):
|
def metadata_test_on_various_glance_image(self, image_id):
|
||||||
@ -209,9 +216,11 @@ class TestMDProxyPolicy(feature_manager.FeatureManager):
|
|||||||
network_mdproxy = self.create_topology_network("network_mdproxy")
|
network_mdproxy = self.create_topology_network("network_mdproxy")
|
||||||
self.create_topology_subnet("subnet_web", network_mdproxy,
|
self.create_topology_subnet("subnet_web", network_mdproxy,
|
||||||
router_id=router_mdproxy["id"])
|
router_id=router_mdproxy["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
network2_mdproxy = self.create_topology_network("network2_mdproxy")
|
network2_mdproxy = self.create_topology_network("network2_mdproxy")
|
||||||
self.create_topology_subnet("subnet2_web", network2_mdproxy,
|
self.create_topology_subnet("subnet2_web", network2_mdproxy,
|
||||||
router_id=router_mdproxy["id"])
|
router_id=router_mdproxy["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
# Instance has 2 network ports.
|
# Instance has 2 network ports.
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"server_mdproxy_1", [network_mdproxy, network2_mdproxy])
|
"server_mdproxy_1", [network_mdproxy, network2_mdproxy])
|
||||||
|
@ -14,6 +14,7 @@
|
|||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
import collections
|
import collections
|
||||||
|
import time
|
||||||
|
|
||||||
from oslo_log import log as logging
|
from oslo_log import log as logging
|
||||||
|
|
||||||
@ -23,6 +24,7 @@ from tempest.lib.common.utils import test_utils
|
|||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
from tempest import test
|
from tempest import test
|
||||||
|
|
||||||
|
from vmware_nsx_tempest_plugin.common import constants
|
||||||
from vmware_nsx_tempest_plugin.tests.scenario import manager
|
from vmware_nsx_tempest_plugin.tests.scenario import manager
|
||||||
|
|
||||||
CONF = config.CONF
|
CONF = config.CONF
|
||||||
@ -80,6 +82,7 @@ class TestMultiNetworksOps(manager.NetworkScenarioTest):
|
|||||||
self.security_group = self._create_security_group()
|
self.security_group = self._create_security_group()
|
||||||
self.network = self._create_network()
|
self.network = self._create_network()
|
||||||
self.subnet = self._create_subnet(self.network)
|
self.subnet = self._create_subnet(self.network)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-smoke'),
|
router_name=data_utils.rand_name('router-smoke'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -89,6 +92,7 @@ class TestMultiNetworksOps(manager.NetworkScenarioTest):
|
|||||||
self.router['id'], subnet_id=self.subnet['id'])
|
self.router['id'], subnet_id=self.subnet['id'])
|
||||||
self.network2 = self._create_network()
|
self.network2 = self._create_network()
|
||||||
self.subnet2 = self._create_subnet(self.network2)
|
self.subnet2 = self._create_subnet(self.network2)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.routers_client.add_router_interface(
|
self.routers_client.add_router_interface(
|
||||||
self.router['id'], subnet_id=self.subnet2['id'])
|
self.router['id'], subnet_id=self.subnet2['id'])
|
||||||
self.addCleanup(self.routers_client.remove_router_interface,
|
self.addCleanup(self.routers_client.remove_router_interface,
|
||||||
|
@ -259,6 +259,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
self.setup_sec_group(tenant_id)
|
self.setup_sec_group(tenant_id)
|
||||||
self.subnet = self._create_subnet(self.network,
|
self.subnet = self._create_subnet(self.network,
|
||||||
cidr='10.168.1.0/24')
|
cidr='10.168.1.0/24')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-port-sec'),
|
router_name=data_utils.rand_name('router-port-sec'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -279,6 +280,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
cidr='10.168.1.0/24')
|
cidr='10.168.1.0/24')
|
||||||
self.subnet_v6 = self._create_subnet_v6(self.network,
|
self.subnet_v6 = self._create_subnet_v6(self.network,
|
||||||
cidr='2020::/64')
|
cidr='2020::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-port-sec'),
|
router_name=data_utils.rand_name('router-port-sec'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -303,6 +305,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
self.setup_sec_group(tenant_id)
|
self.setup_sec_group(tenant_id)
|
||||||
self.subnet = self._create_subnet(self.network,
|
self.subnet = self._create_subnet(self.network,
|
||||||
cidr='10.168.1.0/24')
|
cidr='10.168.1.0/24')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-port-sec'),
|
router_name=data_utils.rand_name('router-port-sec'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -313,6 +316,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
self.network_2 = self._create_network()
|
self.network_2 = self._create_network()
|
||||||
self.subnet_2 = self._create_subnet(self.network_2,
|
self.subnet_2 = self._create_subnet(self.network_2,
|
||||||
cidr='10.168.2.0/24')
|
cidr='10.168.2.0/24')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.routers_client.add_router_interface(
|
self.routers_client.add_router_interface(
|
||||||
self.router['id'], subnet_id=self.subnet_2['id'])
|
self.router['id'], subnet_id=self.subnet_2['id'])
|
||||||
self.addCleanup(self.routers_client.remove_router_interface,
|
self.addCleanup(self.routers_client.remove_router_interface,
|
||||||
@ -331,6 +335,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
cidr='10.18.1.0/24')
|
cidr='10.18.1.0/24')
|
||||||
self.subnet_v6 = self._create_subnet_v6(self.network,
|
self.subnet_v6 = self._create_subnet_v6(self.network,
|
||||||
cidr='3020::/64')
|
cidr='3020::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-port-sec'),
|
router_name=data_utils.rand_name('router-port-sec'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -347,6 +352,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
cidr='10.18.2.0/24')
|
cidr='10.18.2.0/24')
|
||||||
self.subnet_2_v6 = self._create_subnet_v6(self.network_2,
|
self.subnet_2_v6 = self._create_subnet_v6(self.network_2,
|
||||||
cidr='3021::/64')
|
cidr='3021::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.routers_client.add_router_interface(
|
self.routers_client.add_router_interface(
|
||||||
self.router['id'], subnet_id=self.subnet_2['id'])
|
self.router['id'], subnet_id=self.subnet_2['id'])
|
||||||
self.routers_client.add_router_interface(
|
self.routers_client.add_router_interface(
|
||||||
@ -389,6 +395,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
"port_security_enabled": "false", "security_groups": []}
|
"port_security_enabled": "false", "security_groups": []}
|
||||||
port_client = self.ports_client
|
port_client = self.ports_client
|
||||||
port_id = port_client.create_port(**body)
|
port_id = port_client.create_port(**body)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
port_client.delete_port,
|
port_client.delete_port,
|
||||||
port_id['port']['id'])
|
port_id['port']['id'])
|
||||||
@ -448,6 +455,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
"port_security_enabled": "false", "security_groups": []}
|
"port_security_enabled": "false", "security_groups": []}
|
||||||
port_client = self.ports_client
|
port_client = self.ports_client
|
||||||
port_id = port_client.create_port(**body)
|
port_id = port_client.create_port(**body)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
port_client.delete_port,
|
port_client.delete_port,
|
||||||
port_id['port']['id'])
|
port_id['port']['id'])
|
||||||
@ -520,6 +528,7 @@ class TestNSXv3PortSecurityScenario(manager.NetworkScenarioTest):
|
|||||||
"port_security_enabled": "false", "security_groups": []}
|
"port_security_enabled": "false", "security_groups": []}
|
||||||
port_client = self.ports_client
|
port_client = self.ports_client
|
||||||
port_id = port_client.create_port(**body)
|
port_id = port_client.create_port(**body)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
port_client.delete_port,
|
port_client.delete_port,
|
||||||
port_id['port']['id'])
|
port_id['port']['id'])
|
||||||
|
@ -159,6 +159,7 @@ class OctaviaRoundRobin(feature_manager.FeatureManager):
|
|||||||
create_floating_ip = True
|
create_floating_ip = True
|
||||||
subnet_client = self.cmgr_adm.subnets_client
|
subnet_client = self.cmgr_adm.subnets_client
|
||||||
subnet_lbaas = subnet_client.create_subnet(**body)
|
subnet_lbaas = subnet_client.create_subnet(**body)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
subnet_client.delete_subnet,
|
subnet_client.delete_subnet,
|
||||||
subnet_lbaas['subnet']['id'])
|
subnet_lbaas['subnet']['id'])
|
||||||
|
@ -210,6 +210,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest):
|
|||||||
self.network = self._create_network()
|
self.network = self._create_network()
|
||||||
self.subnet = self._create_subnet(self.network,
|
self.subnet = self._create_subnet(self.network,
|
||||||
cidr='10.168.1.0/24')
|
cidr='10.168.1.0/24')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-psg'),
|
router_name=data_utils.rand_name('router-psg'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -254,6 +255,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest):
|
|||||||
cidr='10.168.1.0/24')
|
cidr='10.168.1.0/24')
|
||||||
self.subnet_v6 = self._create_subnet_v6(self.network,
|
self.subnet_v6 = self._create_subnet_v6(self.network,
|
||||||
cidr='2020::/64')
|
cidr='2020::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-psg'),
|
router_name=data_utils.rand_name('router-psg'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -279,11 +281,13 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest):
|
|||||||
cidr='10.168.1.0/24')
|
cidr='10.168.1.0/24')
|
||||||
self.subnet_v6 = self._create_subnet_v6(self.network,
|
self.subnet_v6 = self._create_subnet_v6(self.network,
|
||||||
cidr='2020::/64')
|
cidr='2020::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.network_2 = self._create_network()
|
self.network_2 = self._create_network()
|
||||||
self.subnet_2 = self._create_subnet(self.network_2,
|
self.subnet_2 = self._create_subnet(self.network_2,
|
||||||
cidr='10.168.2.0/24')
|
cidr='10.168.2.0/24')
|
||||||
self.subnet_2_v6 = self._create_subnet_v6(self.network_2,
|
self.subnet_2_v6 = self._create_subnet_v6(self.network_2,
|
||||||
cidr='2021::/64')
|
cidr='2021::/64')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-psg'),
|
router_name=data_utils.rand_name('router-psg'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -316,6 +320,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest):
|
|||||||
self.network = self._create_network(namestart="net-psg")
|
self.network = self._create_network(namestart="net-psg")
|
||||||
self.subnet = self._create_subnet(self.network,
|
self.subnet = self._create_subnet(self.network,
|
||||||
cidr='10.168.1.0/24')
|
cidr='10.168.1.0/24')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-psg'),
|
router_name=data_utils.rand_name('router-psg'),
|
||||||
external_network_id=CONF.network.public_network_id)
|
external_network_id=CONF.network.public_network_id)
|
||||||
@ -326,6 +331,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest):
|
|||||||
self.network_2 = self._create_network()
|
self.network_2 = self._create_network()
|
||||||
self.subnet_2 = self._create_subnet(self.network_2,
|
self.subnet_2 = self._create_subnet(self.network_2,
|
||||||
cidr='10.168.2.0/24')
|
cidr='10.168.2.0/24')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.routers_client.add_router_interface(
|
self.routers_client.add_router_interface(
|
||||||
self.router['id'], subnet_id=self.subnet_2['id'])
|
self.router['id'], subnet_id=self.subnet_2['id'])
|
||||||
self.addCleanup(self.routers_client.remove_router_interface,
|
self.addCleanup(self.routers_client.remove_router_interface,
|
||||||
|
@ -88,6 +88,7 @@ class TestRouterNoNATOps(manager.NetworkScenarioTest):
|
|||||||
self.security_group = self._create_security_group()
|
self.security_group = self._create_security_group()
|
||||||
self.network = self._create_network()
|
self.network = self._create_network()
|
||||||
self.subnet = self._create_subnet(self.network)
|
self.subnet = self._create_subnet(self.network)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.router = self._create_router(
|
self.router = self._create_router(
|
||||||
router_name=data_utils.rand_name('router-smoke'),
|
router_name=data_utils.rand_name('router-smoke'),
|
||||||
external_network_id=CONF.network.public_network_id,
|
external_network_id=CONF.network.public_network_id,
|
||||||
|
@ -87,8 +87,9 @@ class TestZonesV2Ops(feature_manager.FeatureManager):
|
|||||||
port_range_min=53, port_range_max=53, )]
|
port_range_min=53, port_range_max=53, )]
|
||||||
for rule in common_ruleset:
|
for rule in common_ruleset:
|
||||||
self.add_security_group_rule(self.designate_sg, rule,
|
self.add_security_group_rule(self.designate_sg, rule,
|
||||||
ruleclient=sec_rule_client, secclient=sec_client,
|
ruleclient=sec_rule_client,
|
||||||
tenant_id=tenant_id)
|
secclient=sec_client,
|
||||||
|
tenant_id=tenant_id)
|
||||||
|
|
||||||
def create_zone_provider_vlan_vxlan_topology(self, network_type,
|
def create_zone_provider_vlan_vxlan_topology(self, network_type,
|
||||||
zone_name):
|
zone_name):
|
||||||
@ -106,11 +107,14 @@ class TestZonesV2Ops(feature_manager.FeatureManager):
|
|||||||
self.define_security_groups(tenant_id)
|
self.define_security_groups(tenant_id)
|
||||||
subnet_client = self.os_adm.subnets_client
|
subnet_client = self.os_adm.subnets_client
|
||||||
routers_client = self.os_adm.routers_client
|
routers_client = self.os_adm.routers_client
|
||||||
router_designate = self.create_topology_router("router_designate",
|
router_designate = self.create_topology_router(
|
||||||
|
"router_designate",
|
||||||
routers_client=routers_client)
|
routers_client=routers_client)
|
||||||
self.create_topology_subnet("subnet_designate",
|
self.create_topology_subnet(
|
||||||
|
"subnet_designate",
|
||||||
network_designate, subnets_client=subnet_client,
|
network_designate, subnets_client=subnet_client,
|
||||||
routers_client=routers_client, router_id=router_designate['id'])
|
routers_client=routers_client, router_id=router_designate['id'])
|
||||||
|
time.sleep(const.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
return network_designate
|
return network_designate
|
||||||
|
|
||||||
def create_zone_topology(self, zone_name):
|
def create_zone_topology(self, zone_name):
|
||||||
@ -122,11 +126,14 @@ class TestZonesV2Ops(feature_manager.FeatureManager):
|
|||||||
self.define_security_groups(tenant_id)
|
self.define_security_groups(tenant_id)
|
||||||
subnet_client = self.os_adm.subnets_client
|
subnet_client = self.os_adm.subnets_client
|
||||||
routers_client = self.os_adm.routers_client
|
routers_client = self.os_adm.routers_client
|
||||||
router_designate = self.create_topology_router("router_designate",
|
router_designate = self.create_topology_router(
|
||||||
|
"router_designate",
|
||||||
routers_client=routers_client)
|
routers_client=routers_client)
|
||||||
self.create_topology_subnet("subnet_designate",
|
self.create_topology_subnet(
|
||||||
|
"subnet_designate",
|
||||||
network_designate, subnets_client=subnet_client,
|
network_designate, subnets_client=subnet_client,
|
||||||
routers_client=routers_client, router_id=router_designate['id'])
|
routers_client=routers_client, router_id=router_designate['id'])
|
||||||
|
time.sleep(const.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
return network_designate
|
return network_designate
|
||||||
|
|
||||||
def verify_recordset(self, record_set, count):
|
def verify_recordset(self, record_set, count):
|
||||||
|
@ -1438,6 +1438,7 @@ class TestNewCase(feature_manager.FeatureManager):
|
|||||||
self.create_topology_subnet(
|
self.create_topology_subnet(
|
||||||
subnet_name, network_state, cidr='100.70.0.0/16',
|
subnet_name, network_state, cidr='100.70.0.0/16',
|
||||||
router_id=router_state["id"])
|
router_id=router_state["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
sec_rule_client = self.sec_rule_client
|
sec_rule_client = self.sec_rule_client
|
||||||
sec_client = self.sec_client
|
sec_client = self.sec_client
|
||||||
kwargs = dict(tenant_id=network_state['tenant_id'],
|
kwargs = dict(tenant_id=network_state['tenant_id'],
|
||||||
|
@ -13,6 +13,8 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
|
import time
|
||||||
|
|
||||||
from tempest import config
|
from tempest import config
|
||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
from tempest.lib import exceptions
|
from tempest.lib import exceptions
|
||||||
@ -117,6 +119,7 @@ class ProviderNetworks(feature_manager.FeatureManager):
|
|||||||
routers_client=routers_client,
|
routers_client=routers_client,
|
||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
router_id=router['id'])
|
router_id=router['id'])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"server1", [network],
|
"server1", [network],
|
||||||
security_groups=[{'name': self.sg['name']}],
|
security_groups=[{'name': self.sg['name']}],
|
||||||
@ -156,6 +159,7 @@ class ProviderNetworks(feature_manager.FeatureManager):
|
|||||||
subnets_client=subnet_client,
|
subnets_client=subnet_client,
|
||||||
router_id=router['id'],
|
router_id=router['id'],
|
||||||
cidr='24.0.0.0/24')
|
cidr='24.0.0.0/24')
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
"server1", [network1],
|
"server1", [network1],
|
||||||
security_groups=[{'name': self.sg['name']}],
|
security_groups=[{'name': self.sg['name']}],
|
||||||
@ -212,6 +216,7 @@ class ProviderNetworks(feature_manager.FeatureManager):
|
|||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router['id'],
|
router_id=router['id'],
|
||||||
**kwargs)
|
**kwargs)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
provider_network1 = self.provider_networks_topoloy(
|
provider_network1 = self.provider_networks_topoloy(
|
||||||
constants.VLAN_TYPE,
|
constants.VLAN_TYPE,
|
||||||
tz_id=self.vlan_id,
|
tz_id=self.vlan_id,
|
||||||
@ -226,6 +231,7 @@ class ProviderNetworks(feature_manager.FeatureManager):
|
|||||||
router_id=router['id'],
|
router_id=router['id'],
|
||||||
cidr="19.0.0.0/24",
|
cidr="19.0.0.0/24",
|
||||||
**kwargs)
|
**kwargs)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
sec_rule_client = self.cmgr_adm.security_group_rules_client
|
sec_rule_client = self.cmgr_adm.security_group_rules_client
|
||||||
sec_client = self.cmgr_adm.security_groups_client
|
sec_client = self.cmgr_adm.security_groups_client
|
||||||
kwargs = dict(tenant_id=provider_network['tenant_id'],
|
kwargs = dict(tenant_id=provider_network['tenant_id'],
|
||||||
|
@ -90,6 +90,7 @@ class TestTier1DRComponentDeployment(feature_manager.FeatureManager):
|
|||||||
subnet_state = self.create_topology_subnet(subnet_name, network_state,
|
subnet_state = self.create_topology_subnet(subnet_name, network_state,
|
||||||
router_id=router_state["id"]
|
router_id=router_state["id"]
|
||||||
)
|
)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
if create_instance:
|
if create_instance:
|
||||||
image_id = self.get_glance_image_id(["cirros", "esx"])
|
image_id = self.get_glance_image_id(["cirros", "esx"])
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
@ -216,6 +217,7 @@ class TestTier1DRComponentDeployment(feature_manager.FeatureManager):
|
|||||||
subnets_client=self.cmgr_adm.subnets_client,
|
subnets_client=self.cmgr_adm.subnets_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router_state_1["id"])
|
router_id=router_state_1["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
no_of_servers = 2
|
no_of_servers = 2
|
||||||
image_id = self.get_glance_image_id(["cirros", "esx"])
|
image_id = self.get_glance_image_id(["cirros", "esx"])
|
||||||
for instance in range(0, no_of_servers):
|
for instance in range(0, no_of_servers):
|
||||||
@ -283,6 +285,7 @@ class TestTier1DRComponentDeployment(feature_manager.FeatureManager):
|
|||||||
subnets_client=self.cmgr_adm.subnets_client,
|
subnets_client=self.cmgr_adm.subnets_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router_state_1["id"])
|
router_id=router_state_1["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
no_of_servers = 2
|
no_of_servers = 2
|
||||||
image_id = self.get_glance_image_id(["cirros", "esx"])
|
image_id = self.get_glance_image_id(["cirros", "esx"])
|
||||||
for instance in range(0, no_of_servers):
|
for instance in range(0, no_of_servers):
|
||||||
@ -346,6 +349,7 @@ class TestTier1DRComponentDeployment(feature_manager.FeatureManager):
|
|||||||
subnets_client=self.cmgr_adm.subnets_client,
|
subnets_client=self.cmgr_adm.subnets_client,
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
router_id=router_state_1["id"])
|
router_id=router_state_1["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
no_of_servers = 2
|
no_of_servers = 2
|
||||||
image_id = self.get_glance_image_id(["cirros", "esx"])
|
image_id = self.get_glance_image_id(["cirros", "esx"])
|
||||||
for instance in range(0, no_of_servers):
|
for instance in range(0, no_of_servers):
|
||||||
|
@ -209,6 +209,7 @@ class TestSRAntiAffinity(feature_manager.FeatureManager):
|
|||||||
subnet_lbaas = self.create_topology_subnet(
|
subnet_lbaas = self.create_topology_subnet(
|
||||||
"subnet_lbaas", network_lbaas_1,
|
"subnet_lbaas", network_lbaas_1,
|
||||||
router_id=router_state_1["id"])
|
router_id=router_state_1["id"])
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
if i == 10:
|
if i == 10:
|
||||||
self.assertRaises(exceptions.ServerFault,
|
self.assertRaises(exceptions.ServerFault,
|
||||||
self.load_balancers_admin_client.
|
self.load_balancers_admin_client.
|
||||||
@ -287,6 +288,7 @@ class TestSRAntiAffinity(feature_manager.FeatureManager):
|
|||||||
subnet_name, network_state, router_id=router_state["id"],
|
subnet_name, network_state, router_id=router_state["id"],
|
||||||
routers_client=self.cmgr_adm.routers_client,
|
routers_client=self.cmgr_adm.routers_client,
|
||||||
subnets_client=self.cmgr_adm.subnets_client)
|
subnets_client=self.cmgr_adm.subnets_client)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
security_group = self._create_security_group(
|
security_group = self._create_security_group(
|
||||||
security_group_rules_client=self.cmgr_adm.
|
security_group_rules_client=self.cmgr_adm.
|
||||||
security_group_rules_client,
|
security_group_rules_client,
|
||||||
|
@ -11,12 +11,16 @@
|
|||||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
|
||||||
|
import time
|
||||||
|
|
||||||
from oslo_log import log as logging
|
from oslo_log import log as logging
|
||||||
from tempest import config
|
from tempest import config
|
||||||
from tempest.lib.common.utils import data_utils
|
from tempest.lib.common.utils import data_utils
|
||||||
|
|
||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
|
|
||||||
|
from vmware_nsx_tempest_plugin.common import constants
|
||||||
from vmware_nsx_tempest_plugin.lib import feature_manager
|
from vmware_nsx_tempest_plugin.lib import feature_manager
|
||||||
from vmware_nsx_tempest_plugin.services import nsxp_client
|
from vmware_nsx_tempest_plugin.services import nsxp_client
|
||||||
from vmware_nsx_tempest_plugin.services import nsxv3_client
|
from vmware_nsx_tempest_plugin.services import nsxv3_client
|
||||||
@ -68,6 +72,7 @@ class TestTier1DeploymentEdgeCluster(feature_manager.FeatureManager):
|
|||||||
subnet_state = self.create_topology_subnet(subnet_name, network_state,
|
subnet_state = self.create_topology_subnet(subnet_name, network_state,
|
||||||
router_id=router_state["id"]
|
router_id=router_state["id"]
|
||||||
)
|
)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
if create_instance:
|
if create_instance:
|
||||||
image_id = self.get_glance_image_id(["cirros", "esx"])
|
image_id = self.get_glance_image_id(["cirros", "esx"])
|
||||||
self.create_topology_instance(
|
self.create_topology_instance(
|
||||||
|
@ -93,6 +93,7 @@ class TestVerifyFwNatOrder(feature_manager.FeatureManager):
|
|||||||
subnet_state = self.create_topology_subnet(
|
subnet_state = self.create_topology_subnet(
|
||||||
subnet_name, network_state,
|
subnet_name, network_state,
|
||||||
subnets_client=self.cmgr_adm.subnets_client)
|
subnets_client=self.cmgr_adm.subnets_client)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
interface = self.cmgr_adm.routers_client.add_router_interface(
|
interface = self.cmgr_adm.routers_client.add_router_interface(
|
||||||
router_state['id'], subnet_id=subnet_state["id"])
|
router_state['id'], subnet_id=subnet_state["id"])
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
@ -215,6 +216,7 @@ class TestVerifyFwNatOrder(feature_manager.FeatureManager):
|
|||||||
subnet_state = self.create_topology_subnet(
|
subnet_state = self.create_topology_subnet(
|
||||||
subnet_name, network_state,
|
subnet_name, network_state,
|
||||||
subnets_client=self.cmgr_adm.subnets_client)
|
subnets_client=self.cmgr_adm.subnets_client)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
interface = self.cmgr_adm.routers_client.add_router_interface(
|
interface = self.cmgr_adm.routers_client.add_router_interface(
|
||||||
router_state['id'], subnet_id=subnet_state["id"])
|
router_state['id'], subnet_id=subnet_state["id"])
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
@ -338,6 +340,7 @@ class TestVerifyFwNatOrder(feature_manager.FeatureManager):
|
|||||||
subnet_state = self.create_topology_subnet(
|
subnet_state = self.create_topology_subnet(
|
||||||
subnet_name, network_state,
|
subnet_name, network_state,
|
||||||
subnets_client=self.cmgr_adm.subnets_client)
|
subnets_client=self.cmgr_adm.subnets_client)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
interface = self.cmgr_adm.routers_client.add_router_interface(
|
interface = self.cmgr_adm.routers_client.add_router_interface(
|
||||||
router_state['id'], subnet_id=subnet_state["id"])
|
router_state['id'], subnet_id=subnet_state["id"])
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
@ -489,6 +492,7 @@ class TestVerifyFwNatOrder(feature_manager.FeatureManager):
|
|||||||
subnet_state = self.create_topology_subnet(
|
subnet_state = self.create_topology_subnet(
|
||||||
subnet_name, network_state,
|
subnet_name, network_state,
|
||||||
subnets_client=self.cmgr_adm.subnets_client)
|
subnets_client=self.cmgr_adm.subnets_client)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
interface = self.cmgr_adm.routers_client.add_router_interface(
|
interface = self.cmgr_adm.routers_client.add_router_interface(
|
||||||
router_state['id'], subnet_id=subnet_state["id"])
|
router_state['id'], subnet_id=subnet_state["id"])
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
@ -640,6 +644,7 @@ class TestVerifyFwNatOrder(feature_manager.FeatureManager):
|
|||||||
subnet_state = self.create_topology_subnet(
|
subnet_state = self.create_topology_subnet(
|
||||||
subnet_name, network_state,
|
subnet_name, network_state,
|
||||||
subnets_client=self.cmgr_adm.subnets_client)
|
subnets_client=self.cmgr_adm.subnets_client)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
interface = self.cmgr_adm.routers_client.add_router_interface(
|
interface = self.cmgr_adm.routers_client.add_router_interface(
|
||||||
router_state['id'], subnet_id=subnet_state["id"])
|
router_state['id'], subnet_id=subnet_state["id"])
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
@ -776,6 +781,7 @@ class TestVerifyFwNatOrder(feature_manager.FeatureManager):
|
|||||||
subnet_state = self.create_topology_subnet(
|
subnet_state = self.create_topology_subnet(
|
||||||
subnet_name, network_state,
|
subnet_name, network_state,
|
||||||
subnets_client=self.cmgr_adm.subnets_client)
|
subnets_client=self.cmgr_adm.subnets_client)
|
||||||
|
time.sleep(constants.NSX_NETWORK_REALISE_TIMEOUT)
|
||||||
interface = self.cmgr_adm.routers_client.add_router_interface(
|
interface = self.cmgr_adm.routers_client.add_router_interface(
|
||||||
router_state['id'], subnet_id=subnet_state["id"])
|
router_state['id'], subnet_id=subnet_state["id"])
|
||||||
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
self.addCleanup(test_utils.call_and_ignore_notfound_exc,
|
||||||
|
Loading…
Reference in New Issue
Block a user