Merge "Stabilize _create_loginable_secgroup_rule"

This commit is contained in:
Zuul 2020-12-09 18:44:19 +00:00 committed by Gerrit Code Review
commit 5364a9a789
1 changed files with 26 additions and 18 deletions

View File

@ -504,7 +504,14 @@ class ScenarioTest(tempest.test.BaseTestCase):
self.addCleanup(self._cleanup_volume_type, volume_type)
return volume_type
def _create_loginable_secgroup_rule(self, secgroup_id=None):
def _create_loginable_secgroup_rule(self, secgroup_id=None, rulesets=None):
"""Create loginable security group rule by compute clients.
This function will create by default the following rules:
1. tcp port 22 allow rule in order to allow ssh access for ipv4
2. ipv4 icmp allow rule in order to allow icmpv4
"""
_client = self.compute_security_groups_client
_client_rules = self.compute_security_group_rules_client
if secgroup_id is None:
@ -517,6 +524,7 @@ class ScenarioTest(tempest.test.BaseTestCase):
# traffic from all sources, so no group_id is provided.
# Setting a group_id would only permit traffic from ports
# belonging to the same security group.
if not rulesets:
rulesets = [
{
# ssh
@ -1414,7 +1422,7 @@ class NetworkScenarioTest(ScenarioTest):
def _create_loginable_secgroup_rule(self, security_group_rules_client=None,
secgroup=None,
security_groups_client=None):
"""Create loginable security group rule
"""Create loginable security group rule by neutron clients by default.
This function will create:
1. egress and ingress tcp port 22 allow rule in order to allow ssh