diff options
author | George Paraskevopoulos <geopar@intracom-telecom.com> | 2016-11-02 17:58:24 +0200 |
---|---|---|
committer | Morgan Richomme <morgan.richomme@orange.com> | 2016-11-04 12:22:24 +0000 |
commit | f3f0407d4524140cf459837de27cf6849575b769 (patch) | |
tree | 47fef438796b3ae8e2196d928c74882874741bfb | |
parent | 82f18a401cee8c6f4a2395c6185052c2fcd0ba16 (diff) |
Add security group rule for DHCP
Due to a new change in Boron SR1 we need to add the DHCP security group
rule explicitly.
Change-Id: I0d3d0447e7c31046bdfbb08da8752ef130830c59
Signed-off-by: George Paraskevopoulos <geopar@intracom-telecom.com>
-rwxr-xr-x | testcases/features/sfc/sfc.py | 8 | ||||
-rwxr-xr-x | testcases/features/sfc/sfc_colorado1.py | 8 |
2 files changed, 16 insertions, 0 deletions
diff --git a/testcases/features/sfc/sfc.py b/testcases/features/sfc/sfc.py index 96ea3ab39..92d7d8495 100755 --- a/testcases/features/sfc/sfc.py +++ b/testcases/features/sfc/sfc.py @@ -175,6 +175,14 @@ def main(): for sg in secgroups: os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'ingress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'egress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], 'ingress', 'tcp', port_range_min=22, port_range_max=22) diff --git a/testcases/features/sfc/sfc_colorado1.py b/testcases/features/sfc/sfc_colorado1.py index 8dd6c808e..d99c7135c 100755 --- a/testcases/features/sfc/sfc_colorado1.py +++ b/testcases/features/sfc/sfc_colorado1.py @@ -175,6 +175,14 @@ def main(): for sg in secgroups: os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'ingress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'egress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], 'ingress', 'tcp', port_range_min=22, port_range_max=22) |