diff options
author | George Paraskevopoulos <geopar@intracom-telecom.com> | 2016-11-02 17:58:24 +0200 |
---|---|---|
committer | Jose Lausuch <jose.lausuch@ericsson.com> | 2016-11-04 15:32:30 +0000 |
commit | d76462c53091dc2170835a2cd15c5217c3de6b0a (patch) | |
tree | fb08cbe8357a76081d0baaa8f5abeb1daac88d65 /testcases/features | |
parent | 5596152cc88612ad4692d5c9c61015a95f7a67b7 (diff) |
Add security group rule for DHCP
Due to a new change in Boron SR1 we need to add the DHCP security group
rule explicitly.
Change-Id: I0d3d0447e7c31046bdfbb08da8752ef130830c59
Signed-off-by: George Paraskevopoulos <geopar@intracom-telecom.com>
(cherry picked from commit f3f0407d4524140cf459837de27cf6849575b769)
Diffstat (limited to 'testcases/features')
-rwxr-xr-x | testcases/features/sfc/sfc.py | 8 | ||||
-rwxr-xr-x | testcases/features/sfc/sfc_colorado1.py | 8 |
2 files changed, 16 insertions, 0 deletions
diff --git a/testcases/features/sfc/sfc.py b/testcases/features/sfc/sfc.py index 038f165ca..9a7344073 100755 --- a/testcases/features/sfc/sfc.py +++ b/testcases/features/sfc/sfc.py @@ -154,6 +154,14 @@ def main(): for sg in secgroups: os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'ingress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'egress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], 'ingress', 'tcp', port_range_min=22, port_range_max=22) diff --git a/testcases/features/sfc/sfc_colorado1.py b/testcases/features/sfc/sfc_colorado1.py index 4c6d717a4..6dd498737 100755 --- a/testcases/features/sfc/sfc_colorado1.py +++ b/testcases/features/sfc/sfc_colorado1.py @@ -165,6 +165,14 @@ def main(): for sg in secgroups: os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'ingress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'egress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], 'ingress', 'tcp', port_range_min=22, port_range_max=22) |