New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
De-duplicate NSX security groups #180
Conversation
✅ Hey EleanorRigby! The commit authors and yourself have already signed the CLA. |
24dd561
to
c1be442
Compare
@nehagjain15 : Can you review it once more? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
test refactoring
2e3919a
to
640cc24
Compare
- Add error code 311 to VM-belongs-to-NSX-Security group check - Add unit tests
Performance improvement by ignoring all computation if nsxv config is not specified in global configuration. As a result if there is no global config for nsxv , all nsxv related config in cloud config is skipped without raising any error.
640cc24
to
29b154c
Compare
Test refactoring is done to sufficient levels. NSX-V is getting obsolete amongst our user and can do with less refactoring (in favor of more important feature development).
Description
Security groups for NSX-V has multiple sources
We need to gather all
nsx-security-groups
and deduplicate before calling API to add vm to thesensx-security-groups
. It saves execution time. More robust code as we do not need to rely on some fragile logic to not raise error if return code is 203 (vm
already exists in Security group).The issue is caused when upgrading from NSX-V 6.3.x to 6.4.2.
6.4.2 NSX manager's security group API return code is different from 6.3.x
Related PR and Issues
Fixes issue
Object vm-32660 is already a member of Security5.
Impacted Areas in Application
Adding NSX-Security groups
Type of change