@@ -308,6 +308,20 @@ func TestClusterScope_NSGSpec(t *testing.T) {
308308 },
309309 },
310310 },
311+ {
312+ IngressSecurityRule : infrastructurev1beta1.IngressSecurityRule {
313+ Description : common .String ("Control Plane to Control Plane Kubelet Communication" ),
314+ Protocol : common .String ("6" ),
315+ TcpOptions : & infrastructurev1beta1.TcpOptions {
316+ DestinationPortRange : & infrastructurev1beta1.PortRange {
317+ Max : common .Int (10250 ),
318+ Min : common .Int (10250 ),
319+ },
320+ },
321+ SourceType : infrastructurev1beta1 .IngressSecurityRuleSourceTypeCidrBlock ,
322+ Source : common .String (ControlPlaneMachineSubnetDefaultCIDR ),
323+ },
324+ },
311325 },
312326 },
313327 {
@@ -728,6 +742,20 @@ func TestClusterScope_NSGSpec(t *testing.T) {
728742 },
729743 },
730744 },
745+ {
746+ IngressSecurityRule : infrastructurev1beta1.IngressSecurityRule {
747+ Description : common .String ("Control Plane to Control Plane Kubelet Communication" ),
748+ Protocol : common .String ("6" ),
749+ TcpOptions : & infrastructurev1beta1.TcpOptions {
750+ DestinationPortRange : & infrastructurev1beta1.PortRange {
751+ Max : common .Int (10250 ),
752+ Min : common .Int (10250 ),
753+ },
754+ },
755+ SourceType : infrastructurev1beta1 .IngressSecurityRuleSourceTypeCidrBlock ,
756+ Source : common .String (ControlPlaneMachineSubnetDefaultCIDR ),
757+ },
758+ },
731759 },
732760 },
733761 },
0 commit comments