Merge "Drop stateless_sg property check from base method"
diff --git a/neutron_tempest_plugin/scenario/base.py b/neutron_tempest_plugin/scenario/base.py
index 4d9165f..eb03c93 100644
--- a/neutron_tempest_plugin/scenario/base.py
+++ b/neutron_tempest_plugin/scenario/base.py
@@ -196,19 +196,18 @@
Allowing ingress traffic from metadata server, required only for
stateless security groups.
"""
- if getattr(cls, 'stateless_sg'):
- # NOTE(slaweq): in case of stateless security groups, there is no
- # "related" or "established" traffic matching at all so even if
- # egress traffic to 169.254.169.254 is allowed by default SG, we
- # need to explicitly allow ingress traffic from the metadata server
- # to be able to receive responses in the guest vm
- cls.create_security_group_rule(
- security_group_id=secgroup_id,
- direction=neutron_lib_constants.INGRESS_DIRECTION,
- protocol=neutron_lib_constants.PROTO_NAME_TCP,
- remote_ip_prefix='169.254.169.254/32',
- description='metadata out'
- )
+ # NOTE(slaweq): in case of stateless security groups, there is no
+ # "related" or "established" traffic matching at all so even if
+ # egress traffic to 169.254.169.254 is allowed by default SG, we
+ # need to explicitly allow ingress traffic from the metadata server
+ # to be able to receive responses in the guest vm
+ cls.create_security_group_rule(
+ security_group_id=secgroup_id,
+ direction=neutron_lib_constants.INGRESS_DIRECTION,
+ protocol=neutron_lib_constants.PROTO_NAME_TCP,
+ remote_ip_prefix='169.254.169.254/32',
+ description='metadata out'
+ )
@classmethod
def create_pingable_secgroup_rule(cls, secgroup_id=None,