@@ -159,33 +159,18 @@ def test_create_delete(self, ec2_client, simple_security_group):
159159 # Check Security Group no longer exists in AWS
160160 ec2_validator .assert_security_group (resource_id , exists = False )
161161
162- def test_create_with_vpc_egress_dups_default_delete (self , ec2_client , security_group_with_vpc ):
162+ def test_create_with_vpc_add_egress_rule (self , ec2_client , security_group_with_vpc ):
163163 (ref , cr ) = security_group_with_vpc
164164 resource_id = cr ["status" ]["id" ]
165165
166- # Check resource is late initialized successfully (sets default egress rule)
166+ # Check resource is synced successfully
167167 assert k8s .wait_on_condition (ref , "ACK.ResourceSynced" , "True" , wait_periods = 5 )
168168
169169 # Check Security Group exists in AWS
170170 ec2_validator = EC2Validator (ec2_client )
171171 ec2_validator .assert_security_group (resource_id )
172172
173- # Hook code should update Spec rules using data from ReadOne resp
174- assert len (cr ["spec" ]["egressRules" ]) == 1
175-
176- # Check default egress rule present
177- # default egress rule will be present iff user has NOT specified their own egress rules
178- assert len (cr ["status" ]["rules" ]) == 1
179- sg_group = ec2_validator .get_security_group (resource_id )
180- egress_rules = sg_group ["IpPermissionsEgress" ]
181- assert len (egress_rules ) == 1
182- logging .debug (f"Default Egress rule: { str (egress_rules [0 ])} " )
183-
184- # Check default egress rule data
185- assert egress_rules [0 ]["IpProtocol" ] == "-1"
186- assert egress_rules [0 ]["IpRanges" ][0 ]["CidrIp" ] == "0.0.0.0/0"
187-
188- # Add a new Egress rule that "duplicates" the default via patch
173+ # Add a new Egress rule via patch
189174 new_egress_rule = {
190175 "ipProtocol" : "-1" ,
191176 "ipRanges" : [{
@@ -210,7 +195,7 @@ def test_create_with_vpc_egress_dups_default_delete(self, ec2_client, security_g
210195 assert len (sg_group ["IpPermissions" ]) == 0
211196 assert len (sg_group ["IpPermissionsEgress" ]) == 1
212197
213- # Check egress rule data (i.e. ensure default egress rule removed)
198+ # Check egress rule data
214199 assert sg_group ["IpPermissionsEgress" ][0 ]["IpProtocol" ] == "-1"
215200 assert len (sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ]) == 1
216201 ip_range = sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ][0 ]
@@ -239,7 +224,7 @@ def test_rules_create_update_delete(self, ec2_client, simple_security_group):
239224 (ref , cr ) = simple_security_group
240225 resource_id = cr ["status" ]["id" ]
241226
242- # Check resource is late initialized successfully (sets default egress rule)
227+ # Check resource is synced successfully
243228 assert k8s .wait_on_condition (ref , "ACK.ResourceSynced" , "True" , wait_periods = 5 )
244229
245230 # Check Security Group exists in AWS
@@ -248,18 +233,11 @@ def test_rules_create_update_delete(self, ec2_client, simple_security_group):
248233
249234 # Hook code should update Spec rules using data from ReadOne resp
250235 assert len (cr ["spec" ]["ingressRules" ]) == 1
251- assert len (cr ["spec" ]["egressRules" ]) == 1
252236
253- # Check ingress rule added and default egress rule present
254- # default egress rule will be present iff user has NOT specified their own egress rules
255- assert len (cr ["status" ]["rules" ]) == 2
237+ # Check ingress rule added
238+ assert len (cr ["status" ]["rules" ]) == 1
256239 sg_group = ec2_validator .get_security_group (resource_id )
257240 assert len (sg_group ["IpPermissions" ]) == 1
258- assert len (sg_group ["IpPermissionsEgress" ]) == 1
259-
260- # Check default egress rule data
261- assert sg_group ["IpPermissionsEgress" ][0 ]["IpProtocol" ] == "-1"
262- assert sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ][0 ]["CidrIp" ] == "0.0.0.0/0"
263241
264242 # Add Egress rule via patch
265243 new_egress_rule = {
@@ -269,7 +247,7 @@ def test_rules_create_update_delete(self, ec2_client, simple_security_group):
269247 "ipRanges" : [
270248 {
271249 "cidrIP" : "172.31.0.0/16" ,
272- "description" : "test egress update "
250+ "description" : "test egress"
273251 }
274252 ]
275253 }
@@ -282,16 +260,15 @@ def test_rules_create_update_delete(self, ec2_client, simple_security_group):
282260 assert k8s .wait_on_condition (ref , "ACK.ResourceSynced" , "True" , wait_periods = 5 )
283261
284262 # Check ingress and egress rules exist
285- assert len (cr ["status" ]["rules" ]) == 2
286263 sg_group = ec2_validator .get_security_group (resource_id )
287264 assert len (sg_group ["IpPermissions" ]) == 1
288265 assert len (sg_group ["IpPermissionsEgress" ]) == 1
289266
290- # Check egress rule data (i.e. ensure default egress rule removed)
267+ # Check egress rule data
291268 assert sg_group ["IpPermissionsEgress" ][0 ]["IpProtocol" ] == "tcp"
292269 assert sg_group ["IpPermissionsEgress" ][0 ]["FromPort" ] == 25
293270 assert sg_group ["IpPermissionsEgress" ][0 ]["ToPort" ] == 25
294- assert sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ][0 ]["Description" ] == "test egress update "
271+ assert sg_group ["IpPermissionsEgress" ][0 ]["IpRanges" ][0 ]["Description" ] == "test egress"
295272
296273 # Remove Ingress rule
297274 patch = {"spec" : {"ingressRules" :[]}}
0 commit comments