Add security group rule for DHCP 85/23985/1
authorGeorge Paraskevopoulos <geopar@intracom-telecom.com>
Wed, 2 Nov 2016 15:58:24 +0000 (17:58 +0200)
committerJose Lausuch <jose.lausuch@ericsson.com>
Fri, 4 Nov 2016 15:32:30 +0000 (15:32 +0000)
Due to a new change in Boron SR1 we need to add the DHCP security group
rule explicitly.

Change-Id: I0d3d0447e7c31046bdfbb08da8752ef130830c59
Signed-off-by: George Paraskevopoulos <geopar@intracom-telecom.com>
(cherry picked from commit f3f0407d4524140cf459837de27cf6849575b769)

testcases/features/sfc/sfc.py
testcases/features/sfc/sfc_colorado1.py

index 038f165..9a73440 100755 (executable)
@@ -153,6 +153,14 @@ def main():
     secgroups = os_utils.get_security_groups(neutron_client)
 
     for sg in secgroups:
+        os_utils.create_secgroup_rule(neutron_client, sg['id'],
+                                      'ingress', 'udp',
+                                      port_range_min=67,
+                                      port_range_max=68)
+        os_utils.create_secgroup_rule(neutron_client, sg['id'],
+                                      'egress', 'udp',
+                                      port_range_min=67,
+                                      port_range_max=68)
         os_utils.create_secgroup_rule(neutron_client, sg['id'],
                                       'ingress', 'tcp',
                                       port_range_min=22,
index 4c6d717..6dd4987 100755 (executable)
@@ -164,6 +164,14 @@ def main():
     secgroups = os_utils.get_security_groups(neutron_client)
 
     for sg in secgroups:
+        os_utils.create_secgroup_rule(neutron_client, sg['id'],
+                                      'ingress', 'udp',
+                                      port_range_min=67,
+                                      port_range_max=68)
+        os_utils.create_secgroup_rule(neutron_client, sg['id'],
+                                      'egress', 'udp',
+                                      port_range_min=67,
+                                      port_range_max=68)
         os_utils.create_secgroup_rule(neutron_client, sg['id'],
                                       'ingress', 'tcp',
                                       port_range_min=22,