def check_arp_header_match(): result = checks.arp_header_match_supported() if not result: LOG.error(_LE('Check for Open vSwitch support of ARP header matching ' 'failed. ARP spoofing suppression will not work. A ' 'newer version of OVS is required.')) return result
def check_arp_header_match(): result = checks.arp_header_match_supported() if not result: LOG.error('Check for Open vSwitch support of ARP header matching ' 'failed. ARP spoofing suppression will not work. A ' 'newer version of OVS is required.') return result
def setUp(self): if not checks.arp_header_match_supported(): self.skipTest("ARP header matching not supported") # NOTE(kevinbenton): it would be way cooler to use scapy for # these but scapy requires the python process to be running as # root to bind to the ports. super(ARPSpoofTestCase, self).setUp() self.src_addr = '192.168.0.1' self.dst_addr = '192.168.0.2' self.src_ns = self._create_namespace() self.dst_ns = self._create_namespace() self.src_p = self.useFixture( net_helpers.OVSPortFixture(self.br, self.src_ns.namespace)).port self.dst_p = self.useFixture( net_helpers.OVSPortFixture(self.br, self.dst_ns.namespace)).port
def skip_without_arp_support(self): if not checks.arp_header_match_supported(): self.skipTest("ARP header matching not supported")
def test_arp_header_match_runs(self): checks.arp_header_match_supported()