Skip to content

Commit 2169b2b

Browse files
author
Benjamin Reichel
committed
Fix insert and remove rule from firewall policy
This change fixes the incompatability with the openstacksdk for inserting and removing rules from firewall policiese. Closes-Bug: #2057816 Change-Id: I8db7b4cc61b810887b0a675efa562f089821e8ec
1 parent 111713f commit 2169b2b

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

neutronclient/osc/v2/fwaas/firewallpolicy.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ def take_action(self, parsed_args):
235235
policy_id = client.find_firewall_policy(
236236
parsed_args.firewall_policy)['id']
237237
body = self.args2body(parsed_args)
238-
client.insert_rule_into_policy(policy_id, body)
238+
client.insert_rule_into_policy(policy_id, **body)
239239
rule_id = body['firewall_rule_id']
240240
policy = parsed_args.firewall_policy
241241
print((_('Inserted firewall rule %(rule)s in firewall policy '
@@ -264,7 +264,7 @@ def take_action(self, parsed_args):
264264
parsed_args.firewall_policy)['id']
265265
fwr_id = _get_required_firewall_rule(client, parsed_args)
266266
body = {'firewall_rule_id': fwr_id}
267-
client.remove_rule_from_policy(policy_id, body)
267+
client.remove_rule_from_policy(policy_id, **body)
268268
rule_id = body['firewall_rule_id']
269269
policy = parsed_args.firewall_policy
270270
print((_('Removed firewall rule %(rule)s from firewall policy '

neutronclient/tests/unit/osc/v2/fwaas/test_firewallpolicy.py

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -507,12 +507,12 @@ def test_insert_firewall_rule(self):
507507
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
508508
result = self.cmd.take_action(parsed_args)
509509

510-
self.mocked.assert_called_once_with(
511-
target, {
512-
'firewall_rule_id': rule,
513-
'insert_before': before,
514-
'insert_after': after
515-
})
510+
body = {
511+
'firewall_rule_id': rule,
512+
'insert_before': before,
513+
'insert_after': after
514+
}
515+
self.mocked.assert_called_once_with(target, **body)
516516
self.assertIsNone(result)
517517
self.assertEqual(1, self.networkclient.find_firewall_policy.call_count)
518518
self.assertEqual(3, self.networkclient.find_firewall_rule.call_count)
@@ -560,8 +560,8 @@ def test_remove_firewall_rule(self):
560560
]
561561
parsed_args = self.check_parser(self.cmd, arglist, verifylist)
562562
result = self.cmd.take_action(parsed_args)
563-
self.mocked.assert_called_once_with(
564-
target, {'firewall_rule_id': rule})
563+
body = {'firewall_rule_id': rule}
564+
self.mocked.assert_called_once_with(target, **body)
565565
self.assertIsNone(result)
566566
self.assertEqual(1, self.networkclient.find_firewall_policy.call_count)
567567
self.assertEqual(1, self.networkclient.find_firewall_rule.call_count)

0 commit comments

Comments
 (0)