aboutsummaryrefslogtreecommitdiffstats
path: root/testcases
diff options
context:
space:
mode:
authorGeorge Paraskevopoulos <geopar@intracom-telecom.com>2016-11-02 17:58:24 +0200
committerJose Lausuch <jose.lausuch@ericsson.com>2016-11-04 15:32:30 +0000
commitd76462c53091dc2170835a2cd15c5217c3de6b0a (patch)
treefb08cbe8357a76081d0baaa8f5abeb1daac88d65 /testcases
parent5596152cc88612ad4692d5c9c61015a95f7a67b7 (diff)
Add security group rule for DHCP
Due to a new change in Boron SR1 we need to add the DHCP security group rule explicitly. Change-Id: I0d3d0447e7c31046bdfbb08da8752ef130830c59 Signed-off-by: George Paraskevopoulos <geopar@intracom-telecom.com> (cherry picked from commit f3f0407d4524140cf459837de27cf6849575b769)
Diffstat (limited to 'testcases')
-rwxr-xr-xtestcases/features/sfc/sfc.py8
-rwxr-xr-xtestcases/features/sfc/sfc_colorado1.py8
2 files changed, 16 insertions, 0 deletions
diff --git a/testcases/features/sfc/sfc.py b/testcases/features/sfc/sfc.py
index 038f165ca..9a7344073 100755
--- a/testcases/features/sfc/sfc.py
+++ b/testcases/features/sfc/sfc.py
@@ -154,6 +154,14 @@ def main():
for sg in secgroups:
os_utils.create_secgroup_rule(neutron_client, sg['id'],
+ 'ingress', 'udp',
+ port_range_min=67,
+ port_range_max=68)
+ os_utils.create_secgroup_rule(neutron_client, sg['id'],
+ 'egress', 'udp',
+ port_range_min=67,
+ port_range_max=68)
+ os_utils.create_secgroup_rule(neutron_client, sg['id'],
'ingress', 'tcp',
port_range_min=22,
port_range_max=22)
diff --git a/testcases/features/sfc/sfc_colorado1.py b/testcases/features/sfc/sfc_colorado1.py
index 4c6d717a4..6dd498737 100755
--- a/testcases/features/sfc/sfc_colorado1.py
+++ b/testcases/features/sfc/sfc_colorado1.py
@@ -165,6 +165,14 @@ def main():
for sg in secgroups:
os_utils.create_secgroup_rule(neutron_client, sg['id'],
+ 'ingress', 'udp',
+ port_range_min=67,
+ port_range_max=68)
+ os_utils.create_secgroup_rule(neutron_client, sg['id'],
+ 'egress', 'udp',
+ port_range_min=67,
+ port_range_max=68)
+ os_utils.create_secgroup_rule(neutron_client, sg['id'],
'ingress', 'tcp',
port_range_min=22,
port_range_max=22)