summaryrefslogtreecommitdiff
path: root/functional/tests/network
diff options
context:
space:
mode:
authorRichard Theis <rtheis@us.ibm.com>2016-04-15 07:36:43 -0500
committerRichard Theis <rtheis@us.ibm.com>2016-05-14 07:54:41 -0500
commitfd5fd924d152338204fcf69673fedd31a3904977 (patch)
tree0bbe478925603d8503109499ff3c339b11966d5b /functional/tests/network
parente1c53250bcf430517d254ada998e78b057a56a49 (diff)
downloadpython-openstackclient-fd5fd924d152338204fcf69673fedd31a3904977.tar.gz
Additional network protocol support
Add the following network protocol support to the "os security group rule create" command: - Add "--icmp-type" and "--icmp-code" options for Network v2 only. These options can be used to set the ICMP type and code for ICMP IP protocols. - Change the "--proto" option to "--protocol". Using the "--proto" option is still supported, but is no longer documented and may be deprecated in a future release. - Add the following Network v2 IP protocols to the "--protocol" option: "ah", "dccp", "egp", "esp", "gre", "igmp", "ipv6-encap", "ipv6-frag", "ipv6-icmp", "ipv6-nonxt", "ipv6-opts", "ipv6-route", "ospf", "pgm", "rsvp", "sctp", "udplite", "vrrp" and integer representations [0-255]. The "os security group rule list" command now supports displaying the ICMP type and code for security group rules with the ICMP IP protocols. Change-Id: Ic84bc92bc7aa5ac08f6ef91660eb6c125a200eb3 Closes-Bug: #1519512 Implements: blueprint neutron-client
Diffstat (limited to 'functional/tests/network')
-rw-r--r--functional/tests/network/v2/test_security_group_rule.py2
1 files changed, 1 insertions, 1 deletions
diff --git a/functional/tests/network/v2/test_security_group_rule.py b/functional/tests/network/v2/test_security_group_rule.py
index 26e6e0e4..64e1fcdf 100644
--- a/functional/tests/network/v2/test_security_group_rule.py
+++ b/functional/tests/network/v2/test_security_group_rule.py
@@ -37,7 +37,7 @@ class SecurityGroupRuleTests(test.TestCase):
opts = cls.get_show_opts(cls.ID_FIELD)
raw_output = cls.openstack('security group rule create ' +
cls.SECURITY_GROUP_NAME +
- ' --proto tcp --dst-port 80:80' +
+ ' --protocol tcp --dst-port 80:80' +
' --ingress --ethertype IPv4' +
opts)
cls.SECURITY_GROUP_RULE_ID = raw_output.strip('\n')