Merge "Document the new net-mtu-writable extension"
This commit is contained in:
commit
4fa030a9aa
@ -50,13 +50,17 @@ a VLAN transparecy of the network. If the service does not support VLAN
|
||||
transparency and a user requests a VLAN transparent network,
|
||||
the plug-in refuses to create one and returns an appropriate error to the user.
|
||||
|
||||
MTU extension
|
||||
=============
|
||||
MTU extensions
|
||||
==============
|
||||
|
||||
The ``net-mtu`` extension allows plug-ins to expose the MTU that is guaranteed
|
||||
to pass through the data path of the segments in the network. This extension
|
||||
introduces a read-only ``mtu`` attribute.
|
||||
|
||||
A newer ``net-mtu-writable`` extension enhances ``net-mtu`` in that now the
|
||||
``mtu`` attribute is available for write (both when creating as well as
|
||||
updating networks).
|
||||
|
||||
DNS integration
|
||||
===============
|
||||
|
||||
@ -159,6 +163,7 @@ Request
|
||||
- network: network
|
||||
- admin_state_up: network-admin_state_up-request
|
||||
- dns_domain: dns_domain-request
|
||||
- mtu: mtu-request
|
||||
- name: network-name-request
|
||||
- port_security_enabled: network-port_security_enabled-request
|
||||
- provider:network_type: provider:network_type
|
||||
@ -355,6 +360,7 @@ Request
|
||||
- network: network
|
||||
- admin_state_up: network-admin_state_up-request
|
||||
- dns_domain: dns_domain-request
|
||||
- mtu: mtu-request
|
||||
- name: network-name-request
|
||||
- port_security_enabled: network-port_security_enabled-request
|
||||
- project_id: project_id-request
|
||||
@ -458,6 +464,7 @@ Request
|
||||
- networks: networks
|
||||
- admin_state_up: network-admin_state_up-request
|
||||
- dns_domain: dns_domain-request
|
||||
- mtu: mtu-request
|
||||
- name: network-name-request
|
||||
- port_security_enabled: network-port_security_enabled-request
|
||||
- project_id: project_id-request
|
||||
|
@ -3,6 +3,7 @@
|
||||
"name": "sample_network",
|
||||
"admin_state_up": true,
|
||||
"dns_domain": "my-domain.org.",
|
||||
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e"
|
||||
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e",
|
||||
"mtu": 1400
|
||||
}
|
||||
}
|
||||
|
@ -8,7 +8,7 @@
|
||||
"created_at": "2016-03-08T20:19:41",
|
||||
"dns_domain": "my-domain.org.",
|
||||
"id": "4e8e5957-649f-477b-9e5b-f1f75b21c03c",
|
||||
"mtu": 1500,
|
||||
"mtu": 1400,
|
||||
"name": "net1",
|
||||
"port_security_enabled": true,
|
||||
"project_id": "9bacb3c5d39d41a79512987f338cf177",
|
||||
|
@ -5,6 +5,7 @@
|
||||
"name": "net1",
|
||||
"admin_state_up": true,
|
||||
"dns_domain": "",
|
||||
"mtu": 1500,
|
||||
"project_id": "9bacb3c5d39d41a79512987f338cf177",
|
||||
"tenant_id": "9bacb3c5d39d41a79512987f338cf177",
|
||||
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e",
|
||||
|
@ -2,6 +2,7 @@
|
||||
"network": {
|
||||
"dns_domain": "my-domain.org.",
|
||||
"name": "sample_network_5_updated",
|
||||
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e"
|
||||
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e",
|
||||
"mtu": 1300
|
||||
}
|
||||
}
|
||||
|
@ -8,7 +8,7 @@
|
||||
"created_at": "2016-03-08T20:19:41",
|
||||
"dns_domain": "my-domain.org.",
|
||||
"id": "1f370095-98f6-4079-be64-6d3d4a6adcc6",
|
||||
"mtu": 1500,
|
||||
"mtu": 1300,
|
||||
"name": "sample_network_5_updated",
|
||||
"port_security_enabled": true,
|
||||
"project_id": "4fd44f30292945e481c7b8a0c8908869",
|
||||
|
Loading…
Reference in New Issue
Block a user