From 51106a8ed794f423729171f05e071b2c6c08dca1 Mon Sep 17 00:00:00 2001 From: Puneet Arora Date: Thu, 17 May 2018 15:48:23 +0000 Subject: [PATCH] [Tempest]: Changes done to add timer for backend operations SOme of the provider security group cases are failing due to operation doesn't get reflected at the backend and we check check traffic in between. This patch will overcome above problem. Change-Id: Idd7b53a78a9a54641f911d867154fac2cafb177b --- .../tests/nsxv3/scenario/test_provider_security_group.py | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/vmware_nsx_tempest/tests/nsxv3/scenario/test_provider_security_group.py b/vmware_nsx_tempest/tests/nsxv3/scenario/test_provider_security_group.py index b31a244..8ca0b0e 100644 --- a/vmware_nsx_tempest/tests/nsxv3/scenario/test_provider_security_group.py +++ b/vmware_nsx_tempest/tests/nsxv3/scenario/test_provider_security_group.py @@ -14,6 +14,7 @@ # under the License. import collections +import time from oslo_log import log as logging @@ -23,6 +24,7 @@ from tempest.lib.common.utils import test_utils from tempest.lib import decorators from tempest import test +from vmware_nsx_tempest.common import constants from vmware_nsx_tempest.services import nsxv3_client from vmware_nsx_tempest.tests.scenario import manager @@ -270,6 +272,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest): sg_id = sg.get('id') self.create_security_group_rule(sg_id, cmgr=self.cmgr_adm, protocol='icmp') + time.sleep(constants.NSX_BACKEND_TIME_INTERVAL) p_client = self.ports_client kwargs = {"provider_security_groups": ["%s" % sg_id]} port_id_psg = self.get_port_id(network_topo['network']['id'], @@ -279,7 +282,9 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest): network_topo['subnet']['id'], servers['server_default']) p_client.update_port(port_id_psg, **kwargs) + time.sleep(constants.NSX_BACKEND_TIME_INTERVAL) p_client.update_port(port_id_default, **kwargs) + time.sleep(constants.NSX_BACKEND_TIME_INTERVAL) self._check_server_connectivity(public_ip_address_default_vm, private_ip_address_psg_vm, private_key_default_vm, @@ -313,6 +318,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest): private_key_default_vm) self.create_security_group_rule(sg_id, cmgr=self.cmgr_adm, protocol='icmp') + time.sleep(constants.NSX_BACKEND_TIME_INTERVAL) self._check_server_connectivity(ip_address_default_vm, private_ip_address_psg_vm, private_key_default_vm, @@ -338,6 +344,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest): private_key_default_vm) self.create_security_group_rule(sg_id, cmgr=self.cmgr_adm, protocol='icmp') + time.sleep(constants.NSX_BACKEND_TIME_INTERVAL) self._check_server_connectivity(ip_address_default_vm, private_ip_address_psg_vm, private_key_default_vm, @@ -346,6 +353,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest): port_id = self.get_port_id(network['id'], network_topo['subnet']['id'], server_psg) self.cmgr_adm.ports_client.update_port(port_id, **kwargs) + time.sleep(constants.NSX_BACKEND_TIME_INTERVAL) self._check_server_connectivity(ip_address_default_vm, private_ip_address_psg_vm, private_key_default_vm) @@ -393,6 +401,7 @@ class TestProviderSecurityGroup(manager.NetworkScenarioTest): private_key_default_vm_1) self.create_security_group_rule(sg_id, cmgr=self.cmgr_adm, protocol='icmp') + time.sleep(constants.NSX_BACKEND_TIME_INTERVAL) self._check_server_connectivity(ip_address_default_vm_1, private_ip_address_psg_vm_1, private_key_default_vm_1,