vmware-nsx/vmware_nsx_tempest/common/constants.py
Devang Doshi 050d456704 Tempest: Fixed failed few tempest scenario test cases
- Only admin can confiugre SNAT on router. It was failing when
tenant configured SNAT and that failure was expected.
- Also added one test case to test this SNATs behavior.
- nsx_firewall_realization takes variable time based on the tests
we execute in parallel. So removed hard coded sleep and put a
adaptive sleep loop with timeout.
- Added adaptive sleep in provider security test case.
- Added parallel execution compatibility on provider security tests
- Fixed one of the provider sec test

vmware_nsx_tempest.tests.nsxv3.scenario.test_router_nonat_ops.TestRouterNoNATOps.test_router_nonat_to_nat_ops[id-a0274738-d3e7-49db-bf10-a5563610940d,nsxv3]       82.734
vmware_nsx_tempest.tests.nsxv3.scenario.test_router_nonat_ops.TestRouterNoNATOps.test_router_nat_to_nonat_ops[id-5e5bfdd4-0962-47d3-a89b-7ce64322b53e,nsxv3]       80.324
vmware_nsx_tempest.tests.nsxv3.scenario.test_router_nonat_ops.TestRouterNoNATOps.test_only_admin_canconfigure_snat[id-971e8e8b-3cf2-47a9-ac24-5b19f586731c,nsxv3]  16.793
vmware_nsx_tempest.tests.nsxv3.api.test_nsx_security_groups.NSXv3SecGroupTest.test_create_update_nsx_security_group[id-904ca2c1-a14d-448b-b723-a7366e613bf1,nsxv3]  9.986
vmware_nsx_tempest.tests.nsxv3.api.test_nsx_security_groups.NSXv3SecGroupTest.test_create_nsx_security_group_rule[id-91c298c0-fbbd-4597-b4c6-1a7ecfb8a2de,nsxv3]    9.102
vmware_nsx_tempest.tests.nsxv3.api.test_nsx_security_groups.NSXv3SecGroupTest.test_delete_nsx_security_group[id-e637cc59-c5e6-49b5-a539-e517e780656e,nsxv3]         7.607
vmware_nsx_tempest.tests.nsxv3.api.test_nsx_security_groups.NSXv3SecGroupTest.test_delete_nsx_security_group_rule[id-b6c424e5-3553-4b7d-bd95-8b1f0a860fb4,nsxv3]    6.978
vmware_nsx_tempest.tests.nsxv3.api.test_provider_sec_group.ProviderSecurityGroupTest.test_check_security_group_precedence_at_beckend [4.889487s] ... ok
vmware_nsx_tempest.tests.nsxv3.api.test_provider_sec_group.ProviderSecurityGroupTest.test_multiple_provider_security_group [3.290622s] ... ok
vmware_nsx_tempest.tests.nsxv3.api.test_provider_sec_group.ProviderSecurityGroupTest.test_provider_security_group_rule_at_beckend [4.901785s] ... ok

Change-Id: I90eac04c26808cc825d8b12773b73599d7a1c463
2017-05-31 11:37:54 -07:00

53 lines
1.5 KiB
Python

# Copyright 2016 VMware, Inc.
# All Rights Reserved
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
from oslo_log import log
LOG = log.getLogger(__name__)
# General constants.
ONE_SEC = 1
# L2GW constants.
L2GW = "l2_gateway"
L2GWS = L2GW + "s"
L2_GWS_BASE_URI = "/l2-gateways"
EXPECTED_HTTP_RESPONSE_200 = "200"
EXPECTED_HTTP_RESPONSE_201 = "201"
EXPECTED_HTTP_RESPONSE_204 = "204"
L2GWC = "l2_gateway_connection"
# MAC Learning constants
MAC_SW_PROFILE = "MacManagementSwitchingProfile"
PORT_SEC_PROFILE = "SpoofGuardSwitchingProfile"
SEC_GRPS_PROFILE = "SwitchSecuritySwitchingProfile"
# NSXV3 MDProxy constants.
MD_ERROR_CODE_WHEN_LS_BOUNDED = "10026"
INTERVAL_BETWEEN_EXEC_RETRY_ON_SSH = 5
MAX_NO_OF_TIMES_EXECUTION_OVER_SSH = 30
MD_BASE_URL = "http://169.254.169.254/"
# NSXV3 Port Security constants.
NSX_BACKEND_TIME_INTERVAL = 30
NSX_BACKEND_SMALL_TIME_INTERVAL = 10
NSX_BACKEND_VERY_SMALL_TIME_INTERVAL = 5
# DFW
NSX_FIREWALL_REALIZED_TIMEOUT = 120
# FWaaS
NO_OF_ENTRIES = 20