Merge "[Tempest] Creating sec group rule with integer"
This commit is contained in:
commit
a34c26b916
@ -12,6 +12,7 @@
|
|||||||
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
|
from neutron_lib import constants
|
||||||
|
|
||||||
from tempest.common import waiters
|
from tempest.common import waiters
|
||||||
from tempest.lib import decorators
|
from tempest.lib import decorators
|
||||||
@ -19,7 +20,7 @@ from tempest.lib import decorators
|
|||||||
from neutron.tests.tempest.common import ssh
|
from neutron.tests.tempest.common import ssh
|
||||||
from neutron.tests.tempest import config
|
from neutron.tests.tempest import config
|
||||||
from neutron.tests.tempest.scenario import base
|
from neutron.tests.tempest.scenario import base
|
||||||
from neutron.tests.tempest.scenario import constants
|
from neutron.tests.tempest.scenario import constants as const
|
||||||
|
|
||||||
CONF = config.CONF
|
CONF = config.CONF
|
||||||
|
|
||||||
@ -49,7 +50,7 @@ class NetworkDefaultSecGroupTest(base.BaseTempestTestCase):
|
|||||||
for i, server in enumerate(servers):
|
for i, server in enumerate(servers):
|
||||||
waiters.wait_for_server_status(
|
waiters.wait_for_server_status(
|
||||||
self.os_primary.servers_client, server['server']['id'],
|
self.os_primary.servers_client, server['server']['id'],
|
||||||
constants.SERVER_STATUS_ACTIVE)
|
const.SERVER_STATUS_ACTIVE)
|
||||||
port = self.client.list_ports(
|
port = self.client.list_ports(
|
||||||
network_id=self.network['id'], device_id=server['server'][
|
network_id=self.network['id'], device_id=server['server'][
|
||||||
'id'])['ports'][0]
|
'id'])['ports'][0]
|
||||||
@ -90,3 +91,18 @@ class NetworkDefaultSecGroupTest(base.BaseTempestTestCase):
|
|||||||
break
|
break
|
||||||
self.assertTrue(ext_net_ip)
|
self.assertTrue(ext_net_ip)
|
||||||
self.check_remote_connectivity(server_ssh_clients[0], ext_net_ip)
|
self.check_remote_connectivity(server_ssh_clients[0], ext_net_ip)
|
||||||
|
|
||||||
|
@decorators.idempotent_id('3d73ec1a-2ec6-45a9-b0f8-04a283d9d864')
|
||||||
|
def test_protocol_number_rule(self):
|
||||||
|
# protocol number is added instead of str in security rule creation
|
||||||
|
server_ssh_clients, fips = self.create_vm_default_sec_grp(
|
||||||
|
num_servers=1)
|
||||||
|
self.ping_ip_address(fips[0]['floating_ip_address'],
|
||||||
|
should_succeed=False)
|
||||||
|
rule_list = [{'protocol': constants.PROTO_NUM_ICMP,
|
||||||
|
'direction': constants.INGRESS_DIRECTION,
|
||||||
|
'remote_ip_prefix': '0.0.0.0/0'}]
|
||||||
|
secgroup_id = self.os_primary.network_client.list_security_groups()[
|
||||||
|
'security_groups'][0]['id']
|
||||||
|
self.create_secgroup_rules(rule_list, secgroup_id=secgroup_id)
|
||||||
|
self.ping_ip_address(fips[0]['floating_ip_address'])
|
||||||
|
Loading…
Reference in New Issue
Block a user