![ZhouHeng](/assets/img/avatar_default.png)
This reverts commit caae7b6a6f5e8944dbe359b6472be2507bbf5e12. Reason for revert: Many users still need L3 firewalls and Inspur team wants to maintain this project. Neutron drivers team discussed the topic of the maintenance of neutron-fwaas, and agreed to include neutron-fwaas again to Neutron stadium[1]. Some updates have been made: Remove use "autonested_transaction" method, see more [2] Replace "neutron_lib.callbacks.registry.notify" with "registry.publish" Replace rootwrap execution with privsep context execution. Ensure db Models and migration scripts are sync, set table firewall_group_port_associations_v2's two columns nullable=False [1] https://meetings.opendev.org/meetings/neutron_drivers/2022/neutron_drivers.2022-01-28-14.00.log.html#l-14 [2] https://review.opendev.org/c/openstack/neutron-lib/+/761728 Change-Id: I14f551c199d9badcf25b9e65c954c012326d27cd
30 lines
1.2 KiB
Python
30 lines
1.2 KiB
Python
# Copyright (c) 2017 Thales Services SAS
|
|
# All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
from oslo_privsep import capabilities as c
|
|
from oslo_privsep import priv_context
|
|
|
|
# It is expected that most (if not all) neutron-fwaas operations can be
|
|
# executed with these privileges.
|
|
default = priv_context.PrivContext(
|
|
__name__,
|
|
cfg_section='privsep',
|
|
pypath=__name__ + '.default',
|
|
# TODO(gus): CAP_SYS_ADMIN is required (only?) for manipulating
|
|
# network namespaces. SYS_ADMIN is a lot of scary powers, so
|
|
# consider breaking this out into a separate minimal context.
|
|
capabilities=[c.CAP_SYS_ADMIN, c.CAP_NET_ADMIN],
|
|
)
|