From f3f0407d4524140cf459837de27cf6849575b769 Mon Sep 17 00:00:00 2001 From: George Paraskevopoulos Date: Wed, 2 Nov 2016 17:58:24 +0200 Subject: Add security group rule for DHCP Due to a new change in Boron SR1 we need to add the DHCP security group rule explicitly. Change-Id: I0d3d0447e7c31046bdfbb08da8752ef130830c59 Signed-off-by: George Paraskevopoulos --- testcases/features/sfc/sfc.py | 8 ++++++++ testcases/features/sfc/sfc_colorado1.py | 8 ++++++++ 2 files changed, 16 insertions(+) (limited to 'testcases/features/sfc') diff --git a/testcases/features/sfc/sfc.py b/testcases/features/sfc/sfc.py index 96ea3ab39..92d7d8495 100755 --- a/testcases/features/sfc/sfc.py +++ b/testcases/features/sfc/sfc.py @@ -174,6 +174,14 @@ def main(): secgroups = os_utils.get_security_groups(neutron_client) for sg in secgroups: + os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'ingress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'egress', 'udp', + port_range_min=67, + port_range_max=68) os_utils.create_secgroup_rule(neutron_client, sg['id'], 'ingress', 'tcp', port_range_min=22, diff --git a/testcases/features/sfc/sfc_colorado1.py b/testcases/features/sfc/sfc_colorado1.py index 8dd6c808e..d99c7135c 100755 --- a/testcases/features/sfc/sfc_colorado1.py +++ b/testcases/features/sfc/sfc_colorado1.py @@ -174,6 +174,14 @@ def main(): secgroups = os_utils.get_security_groups(neutron_client) for sg in secgroups: + os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'ingress', 'udp', + port_range_min=67, + port_range_max=68) + os_utils.create_secgroup_rule(neutron_client, sg['id'], + 'egress', 'udp', + port_range_min=67, + port_range_max=68) os_utils.create_secgroup_rule(neutron_client, sg['id'], 'ingress', 'tcp', port_range_min=22, -- cgit 1.2.3-korg