From 9b23617111706ef6a89e8ba45457238acaea26e2 Mon Sep 17 00:00:00 2001 From: Kevin Benton Date: Mon, 29 Jun 2015 22:24:22 -0700 Subject: [PATCH] Increase ping count on ARP spoof test The other IPv4 tests all have a count of 2 to tolerate ping failures due to slow ARP response/interface setup/etc. This patch increases test_arp_spoof_allowed_address_pairs_0cidr to 2 to match. Closes-Bug: #1470234 Change-Id: I82bd8397672194f6162eef5392d4f19d57450552 --- neutron/tests/functional/agent/test_ovs_flows.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/neutron/tests/functional/agent/test_ovs_flows.py b/neutron/tests/functional/agent/test_ovs_flows.py index 0a1a932a7..5d73ea1a5 100644 --- a/neutron/tests/functional/agent/test_ovs_flows.py +++ b/neutron/tests/functional/agent/test_ovs_flows.py @@ -166,7 +166,7 @@ class _ARPSpoofTestCase(object): '1.2.3.4']) self.src_p.addr.add('%s/24' % self.src_addr) self.dst_p.addr.add('%s/24' % self.dst_addr) - net_helpers.assert_ping(self.src_namespace, self.dst_addr) + net_helpers.assert_ping(self.src_namespace, self.dst_addr, count=2) def test_arp_spoof_disable_port_security(self): # block first and then disable port security to make sure old rules -- 2.45.2