050d456704
- Only admin can confiugre SNAT on router. It was failing when tenant configured SNAT and that failure was expected. - Also added one test case to test this SNATs behavior. - nsx_firewall_realization takes variable time based on the tests we execute in parallel. So removed hard coded sleep and put a adaptive sleep loop with timeout. - Added adaptive sleep in provider security test case. - Added parallel execution compatibility on provider security tests - Fixed one of the provider sec test vmware_nsx_tempest.tests.nsxv3.scenario.test_router_nonat_ops.TestRouterNoNATOps.test_router_nonat_to_nat_ops[id-a0274738-d3e7-49db-bf10-a5563610940d,nsxv3] 82.734 vmware_nsx_tempest.tests.nsxv3.scenario.test_router_nonat_ops.TestRouterNoNATOps.test_router_nat_to_nonat_ops[id-5e5bfdd4-0962-47d3-a89b-7ce64322b53e,nsxv3] 80.324 vmware_nsx_tempest.tests.nsxv3.scenario.test_router_nonat_ops.TestRouterNoNATOps.test_only_admin_canconfigure_snat[id-971e8e8b-3cf2-47a9-ac24-5b19f586731c,nsxv3] 16.793 vmware_nsx_tempest.tests.nsxv3.api.test_nsx_security_groups.NSXv3SecGroupTest.test_create_update_nsx_security_group[id-904ca2c1-a14d-448b-b723-a7366e613bf1,nsxv3] 9.986 vmware_nsx_tempest.tests.nsxv3.api.test_nsx_security_groups.NSXv3SecGroupTest.test_create_nsx_security_group_rule[id-91c298c0-fbbd-4597-b4c6-1a7ecfb8a2de,nsxv3] 9.102 vmware_nsx_tempest.tests.nsxv3.api.test_nsx_security_groups.NSXv3SecGroupTest.test_delete_nsx_security_group[id-e637cc59-c5e6-49b5-a539-e517e780656e,nsxv3] 7.607 vmware_nsx_tempest.tests.nsxv3.api.test_nsx_security_groups.NSXv3SecGroupTest.test_delete_nsx_security_group_rule[id-b6c424e5-3553-4b7d-bd95-8b1f0a860fb4,nsxv3] 6.978 vmware_nsx_tempest.tests.nsxv3.api.test_provider_sec_group.ProviderSecurityGroupTest.test_check_security_group_precedence_at_beckend [4.889487s] ... ok vmware_nsx_tempest.tests.nsxv3.api.test_provider_sec_group.ProviderSecurityGroupTest.test_multiple_provider_security_group [3.290622s] ... ok vmware_nsx_tempest.tests.nsxv3.api.test_provider_sec_group.ProviderSecurityGroupTest.test_provider_security_group_rule_at_beckend [4.901785s] ... ok Change-Id: I90eac04c26808cc825d8b12773b73599d7a1c463
53 lines
1.5 KiB
Python
53 lines
1.5 KiB
Python
# Copyright 2016 VMware, Inc.
|
|
# All Rights Reserved
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from oslo_log import log
|
|
|
|
LOG = log.getLogger(__name__)
|
|
|
|
# General constants.
|
|
ONE_SEC = 1
|
|
|
|
# L2GW constants.
|
|
L2GW = "l2_gateway"
|
|
L2GWS = L2GW + "s"
|
|
L2_GWS_BASE_URI = "/l2-gateways"
|
|
EXPECTED_HTTP_RESPONSE_200 = "200"
|
|
EXPECTED_HTTP_RESPONSE_201 = "201"
|
|
EXPECTED_HTTP_RESPONSE_204 = "204"
|
|
L2GWC = "l2_gateway_connection"
|
|
|
|
# MAC Learning constants
|
|
MAC_SW_PROFILE = "MacManagementSwitchingProfile"
|
|
PORT_SEC_PROFILE = "SpoofGuardSwitchingProfile"
|
|
SEC_GRPS_PROFILE = "SwitchSecuritySwitchingProfile"
|
|
|
|
# NSXV3 MDProxy constants.
|
|
MD_ERROR_CODE_WHEN_LS_BOUNDED = "10026"
|
|
INTERVAL_BETWEEN_EXEC_RETRY_ON_SSH = 5
|
|
MAX_NO_OF_TIMES_EXECUTION_OVER_SSH = 30
|
|
MD_BASE_URL = "http://169.254.169.254/"
|
|
|
|
# NSXV3 Port Security constants.
|
|
NSX_BACKEND_TIME_INTERVAL = 30
|
|
NSX_BACKEND_SMALL_TIME_INTERVAL = 10
|
|
NSX_BACKEND_VERY_SMALL_TIME_INTERVAL = 5
|
|
|
|
# DFW
|
|
NSX_FIREWALL_REALIZED_TIMEOUT = 120
|
|
|
|
# FWaaS
|
|
NO_OF_ENTRIES = 20
|