@@ -308,6 +308,20 @@ func TestClusterScope_NSGSpec(t *testing.T) {
308
308
},
309
309
},
310
310
},
311
+ {
312
+ IngressSecurityRule : infrastructurev1beta1.IngressSecurityRule {
313
+ Description : common .String ("Control Plane to Control Plane Kubelet Communication" ),
314
+ Protocol : common .String ("6" ),
315
+ TcpOptions : & infrastructurev1beta1.TcpOptions {
316
+ DestinationPortRange : & infrastructurev1beta1.PortRange {
317
+ Max : common .Int (10250 ),
318
+ Min : common .Int (10250 ),
319
+ },
320
+ },
321
+ SourceType : infrastructurev1beta1 .IngressSecurityRuleSourceTypeCidrBlock ,
322
+ Source : common .String (ControlPlaneMachineSubnetDefaultCIDR ),
323
+ },
324
+ },
311
325
},
312
326
},
313
327
{
@@ -728,6 +742,20 @@ func TestClusterScope_NSGSpec(t *testing.T) {
728
742
},
729
743
},
730
744
},
745
+ {
746
+ IngressSecurityRule : infrastructurev1beta1.IngressSecurityRule {
747
+ Description : common .String ("Control Plane to Control Plane Kubelet Communication" ),
748
+ Protocol : common .String ("6" ),
749
+ TcpOptions : & infrastructurev1beta1.TcpOptions {
750
+ DestinationPortRange : & infrastructurev1beta1.PortRange {
751
+ Max : common .Int (10250 ),
752
+ Min : common .Int (10250 ),
753
+ },
754
+ },
755
+ SourceType : infrastructurev1beta1 .IngressSecurityRuleSourceTypeCidrBlock ,
756
+ Source : common .String (ControlPlaneMachineSubnetDefaultCIDR ),
757
+ },
758
+ },
731
759
},
732
760
},
733
761
},
0 commit comments