X-Git-Url: https://git.opendaylight.org/gerrit/gitweb?a=blobdiff_plain;f=csit%2Fsuites%2Fnetvirt%2FNetvirt_Vpnservice%2FARP_Learning.robot;h=c836101c69dc2cc996f593a7eb1b19ad02f8df47;hb=02eb3418af8de2831ad8a5aa1d119746fffd1bac;hp=01071fd2b2e89d40dae78eb1562fb4365e5efa0b;hpb=53529a3b27333cdcbce597983f74c07510f4ada5;p=integration%2Ftest.git diff --git a/csit/suites/netvirt/Netvirt_Vpnservice/ARP_Learning.robot b/csit/suites/netvirt/Netvirt_Vpnservice/ARP_Learning.robot index 01071fd2b2..c836101c69 100644 --- a/csit/suites/netvirt/Netvirt_Vpnservice/ARP_Learning.robot +++ b/csit/suites/netvirt/Netvirt_Vpnservice/ARP_Learning.robot @@ -149,19 +149,18 @@ Create Setup : FOR ${subnet} IN @{SUBNETS} \ Should Contain ${SUB_LIST} ${subnet} Neutron Security Group Create ${SECURITY_GROUP} - Neutron Security Group Rule Create ${SECURITY_GROUP} direction=ingress port_range_max=65535 port_range_min=1 protocol=tcp remote_ip_prefix=0.0.0.0/0 - Neutron Security Group Rule Create ${SECURITY_GROUP} direction=egress port_range_max=65535 port_range_min=1 protocol=tcp remote_ip_prefix=0.0.0.0/0 - Neutron Security Group Rule Create ${SECURITY_GROUP} direction=ingress protocol=icmp remote_ip_prefix=0.0.0.0/0 - Neutron Security Group Rule Create ${SECURITY_GROUP} direction=egress protocol=icmp remote_ip_prefix=0.0.0.0/0 - Neutron Security Group Rule Create ${SECURITY_GROUP} direction=ingress port_range_max=65535 port_range_min=1 protocol=udp remote_ip_prefix=0.0.0.0/0 - Neutron Security Group Rule Create ${SECURITY_GROUP} direction=egress port_range_max=65535 port_range_min=1 protocol=udp remote_ip_prefix=0.0.0.0/0 - ${allowed_address_pairs_args}= Set Variable --allowed-address-pairs type=dict list=true ip_address=@{EXTRA_NW_IP}[0] ip_address=@{EXTRA_NW_IP}[1] - Create Port ${NETWORKS[0]} ${PORT_LIST[0]} sg=${SECURITY_GROUP} additional_args=${allowed_address_pairs_args} - Create Port ${NETWORKS[0]} ${PORT_LIST[1]} sg=${SECURITY_GROUP} additional_args=${allowed_address_pairs_args} - Create Port ${NETWORKS[1]} ${PORT_LIST[2]} sg=${SECURITY_GROUP} additional_args=${allowed_address_pairs_args} - Create Port ${NETWORKS[1]} ${PORT_LIST[3]} sg=${SECURITY_GROUP} additional_args=${allowed_address_pairs_args} - Create Port ${NETWORKS[2]} ${PORT_LIST[4]} sg=${SECURITY_GROUP} additional_args=${allowed_address_pairs_args} - Create Port ${NETWORKS[2]} ${PORT_LIST[5]} sg=${SECURITY_GROUP} additional_args=${allowed_address_pairs_args} + Neutron Security Group Rule Create ${SECURITY_GROUP} direction=ingress port_range_max=65535 port_range_min=1 protocol=tcp + Neutron Security Group Rule Create ${SECURITY_GROUP} direction=egress port_range_max=65535 port_range_min=1 protocol=tcp + Neutron Security Group Rule Create ${SECURITY_GROUP} direction=ingress protocol=icmp + Neutron Security Group Rule Create ${SECURITY_GROUP} direction=egress protocol=icmp + Neutron Security Group Rule Create ${SECURITY_GROUP} direction=ingress port_range_max=65535 port_range_min=1 protocol=udp + Neutron Security Group Rule Create ${SECURITY_GROUP} direction=egress port_range_max=65535 port_range_min=1 protocol=udp + Create Port ${NETWORKS[0]} ${PORT_LIST[0]} sg=${SECURITY_GROUP} allowed_address_pairs=@{EXTRA_NW_IP} + Create Port ${NETWORKS[0]} ${PORT_LIST[1]} sg=${SECURITY_GROUP} allowed_address_pairs=@{EXTRA_NW_IP} + Create Port ${NETWORKS[1]} ${PORT_LIST[2]} sg=${SECURITY_GROUP} allowed_address_pairs=@{EXTRA_NW_IP} + Create Port ${NETWORKS[1]} ${PORT_LIST[3]} sg=${SECURITY_GROUP} allowed_address_pairs=@{EXTRA_NW_IP} + Create Port ${NETWORKS[1]} ${PORT_LIST[4]} sg=${SECURITY_GROUP} allowed_address_pairs=@{EXTRA_NW_IP} + Create Port ${NETWORKS[1]} ${PORT_LIST[5]} sg=${SECURITY_GROUP} allowed_address_pairs=@{EXTRA_NW_IP} Create Vm Instance With Port On Compute Node ${PORT_LIST[0]} ${VM_INSTANCES_NET1[0]} ${OS_COMPUTE_1_IP} sg=${SECURITY_GROUP} Create Vm Instance With Port On Compute Node ${PORT_LIST[1]} ${VM_INSTANCES_NET1[1]} ${OS_COMPUTE_2_IP} sg=${SECURITY_GROUP} Create Vm Instance With Port On Compute Node ${PORT_LIST[2]} ${VM_INSTANCES_NET2[0]} ${OS_COMPUTE_1_IP} sg=${SECURITY_GROUP}