@@ -159,33 +159,18 @@ def test_create_delete(self, ec2_client, simple_security_group):
159
159
# Check Security Group no longer exists in AWS
160
160
ec2_validator .assert_security_group (resource_id , exists = False )
161
161
162
- def test_create_with_vpc_egress_dups_default_delete (self , ec2_client , security_group_with_vpc ):
162
+ def test_create_with_vpc_add_egress_rule (self , ec2_client , security_group_with_vpc ):
163
163
(ref , cr ) = security_group_with_vpc
164
164
resource_id = cr ["status" ]["id" ]
165
165
166
- # Check resource is late initialized successfully (sets default egress rule)
166
+ # Check resource is synced successfully
167
167
assert k8s .wait_on_condition (ref , "ACK.ResourceSynced" , "True" , wait_periods = 5 )
168
168
169
169
# Check Security Group exists in AWS
170
170
ec2_validator = EC2Validator (ec2_client )
171
171
ec2_validator .assert_security_group (resource_id )
172
172
173
- # Hook code should update Spec rules using data from ReadOne resp
174
- assert len (cr ["spec" ]["egressRules" ]) == 1
175
-
176
- # Check default egress rule present
177
- # default egress rule will be present iff user has NOT specified their own egress rules
178
- assert len (cr ["status" ]["rules" ]) == 1
179
- sg_group = ec2_validator .get_security_group (resource_id )
180
- egress_rules = sg_group ["IpPermissionsEgress" ]
181
- assert len (egress_rules ) == 1
182
- logging .debug (f"Default Egress rule: { str (egress_rules [0 ])} " )
183
-
184
- # Check default egress rule data
185
- assert egress_rules [0 ]["IpProtocol" ] == "-1"
186
- assert egress_rules [0 ]["IpRanges" ][0 ]["CidrIp" ] == "0.0.0.0/0"
187
-
188
- # Add a new Egress rule that "duplicates" the default via patch
173
+ # Add a new Egress rule via patch
189
174
new_egress_rule = {
190
175
"ipProtocol" : "-1" ,
191
176
"ipRanges" : [{
@@ -210,7 +195,7 @@ def test_create_with_vpc_egress_dups_default_delete(self, ec2_client, security_g
210
195
assert len (sg_group ["IpPermissions" ]) == 0
211
196
assert len (sg_group ["IpPermissionsEgress" ]) == 1
212
197
213
- # Check egress rule data (i.e. ensure default egress rule removed)
198
+ # Check egress rule data
214
199
assert sg_group ["IpPermissionsEgress" ][0 ]["IpProtocol" ] == "-1"
215
200
assert len (sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ]) == 1
216
201
ip_range = sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ][0 ]
@@ -239,7 +224,7 @@ def test_rules_create_update_delete(self, ec2_client, simple_security_group):
239
224
(ref , cr ) = simple_security_group
240
225
resource_id = cr ["status" ]["id" ]
241
226
242
- # Check resource is late initialized successfully (sets default egress rule)
227
+ # Check resource is synced successfully
243
228
assert k8s .wait_on_condition (ref , "ACK.ResourceSynced" , "True" , wait_periods = 5 )
244
229
245
230
# Check Security Group exists in AWS
@@ -248,18 +233,11 @@ def test_rules_create_update_delete(self, ec2_client, simple_security_group):
248
233
249
234
# Hook code should update Spec rules using data from ReadOne resp
250
235
assert len (cr ["spec" ]["ingressRules" ]) == 1
251
- assert len (cr ["spec" ]["egressRules" ]) == 1
252
236
253
- # Check ingress rule added and default egress rule present
254
- # default egress rule will be present iff user has NOT specified their own egress rules
255
- assert len (cr ["status" ]["rules" ]) == 2
237
+ # Check ingress rule added
238
+ assert len (cr ["status" ]["rules" ]) == 1
256
239
sg_group = ec2_validator .get_security_group (resource_id )
257
240
assert len (sg_group ["IpPermissions" ]) == 1
258
- assert len (sg_group ["IpPermissionsEgress" ]) == 1
259
-
260
- # Check default egress rule data
261
- assert sg_group ["IpPermissionsEgress" ][0 ]["IpProtocol" ] == "-1"
262
- assert sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ][0 ]["CidrIp" ] == "0.0.0.0/0"
263
241
264
242
# Add Egress rule via patch
265
243
new_egress_rule = {
@@ -269,7 +247,7 @@ def test_rules_create_update_delete(self, ec2_client, simple_security_group):
269
247
"ipRanges" : [
270
248
{
271
249
"cidrIP" : "172.31.0.0/16" ,
272
- "description" : "test egress update "
250
+ "description" : "test egress"
273
251
}
274
252
]
275
253
}
@@ -282,16 +260,15 @@ def test_rules_create_update_delete(self, ec2_client, simple_security_group):
282
260
assert k8s .wait_on_condition (ref , "ACK.ResourceSynced" , "True" , wait_periods = 5 )
283
261
284
262
# Check ingress and egress rules exist
285
- assert len (cr ["status" ]["rules" ]) == 2
286
263
sg_group = ec2_validator .get_security_group (resource_id )
287
264
assert len (sg_group ["IpPermissions" ]) == 1
288
265
assert len (sg_group ["IpPermissionsEgress" ]) == 1
289
266
290
- # Check egress rule data (i.e. ensure default egress rule removed)
267
+ # Check egress rule data
291
268
assert sg_group ["IpPermissionsEgress" ][0 ]["IpProtocol" ] == "tcp"
292
269
assert sg_group ["IpPermissionsEgress" ][0 ]["FromPort" ] == 25
293
270
assert sg_group ["IpPermissionsEgress" ][0 ]["ToPort" ] == 25
294
- assert sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ][0 ]["Description" ] == "test egress update "
271
+ assert sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ][0 ]["Description" ] == "test egress"
295
272
296
273
# Remove Ingress rule
297
274
patch = {"spec" : {"ingressRules" :[]}}
0 commit comments