bf848c5b22
To enforce the network policy isolation, the network policy security group driver must be used. Thus the code needs to be there instead of in the namespace security group driver (which is used for namespace isolation) Currently, when using the correct Network Policy drivers and handlers the CRD is not updated on events applied over namespaces that matches a NP. This commit fixes the issue by moving the support of this functionality from 'NamespacePodSecurityGroupsDriver' to NetworkPolicySecurityGroupsDriver. Closes-bug: 1811995 Partially Implements: blueprint k8s-network-policies Change-Id: Idaf70ea8cb7677296d6bea59b4d551bbb87e0422 |
||
---|---|---|
.. | ||
__init__.py | ||
ingress_lbaas.py | ||
lbaas.py | ||
namespace.py | ||
pipeline.py | ||
pod_label.py | ||
policy.py | ||
vif.py |