Add security group rule for DHCP
authorGeorge Paraskevopoulos <geopar@intracom-telecom.com>
Wed, 2 Nov 2016 15:58:24 +0000 (17:58 +0200)
committerMorgan Richomme <morgan.richomme@orange.com>
Fri, 4 Nov 2016 12:22:24 +0000 (12:22 +0000)
Due to a new change in Boron SR1 we need to add the DHCP security group
rule explicitly.

Change-Id: I0d3d0447e7c31046bdfbb08da8752ef130830c59
Signed-off-by: George Paraskevopoulos <geopar@intracom-telecom.com>
testcases/features/sfc/sfc.py
testcases/features/sfc/sfc_colorado1.py

index 96ea3ab..92d7d84 100755 (executable)
@@ -174,6 +174,14 @@ def main():
     secgroups = os_utils.get_security_groups(neutron_client)
 
     for sg in secgroups:
+        os_utils.create_secgroup_rule(neutron_client, sg['id'],
+                                      'ingress', 'udp',
+                                      port_range_min=67,
+                                      port_range_max=68)
+        os_utils.create_secgroup_rule(neutron_client, sg['id'],
+                                      'egress', 'udp',
+                                      port_range_min=67,
+                                      port_range_max=68)
         os_utils.create_secgroup_rule(neutron_client, sg['id'],
                                       'ingress', 'tcp',
                                       port_range_min=22,
index 8dd6c80..d99c713 100755 (executable)
@@ -174,6 +174,14 @@ def main():
     secgroups = os_utils.get_security_groups(neutron_client)
 
     for sg in secgroups:
+        os_utils.create_secgroup_rule(neutron_client, sg['id'],
+                                      'ingress', 'udp',
+                                      port_range_min=67,
+                                      port_range_max=68)
+        os_utils.create_secgroup_rule(neutron_client, sg['id'],
+                                      'egress', 'udp',
+                                      port_range_min=67,
+                                      port_range_max=68)
         os_utils.create_secgroup_rule(neutron_client, sg['id'],
                                       'ingress', 'tcp',
                                       port_range_min=22,