Merge "Document the new net-mtu-writable extension"
This commit is contained in:
@@ -50,13 +50,17 @@ a VLAN transparecy of the network. If the service does not support VLAN
|
|||||||
transparency and a user requests a VLAN transparent network,
|
transparency and a user requests a VLAN transparent network,
|
||||||
the plug-in refuses to create one and returns an appropriate error to the user.
|
the plug-in refuses to create one and returns an appropriate error to the user.
|
||||||
|
|
||||||
MTU extension
|
MTU extensions
|
||||||
=============
|
==============
|
||||||
|
|
||||||
The ``net-mtu`` extension allows plug-ins to expose the MTU that is guaranteed
|
The ``net-mtu`` extension allows plug-ins to expose the MTU that is guaranteed
|
||||||
to pass through the data path of the segments in the network. This extension
|
to pass through the data path of the segments in the network. This extension
|
||||||
introduces a read-only ``mtu`` attribute.
|
introduces a read-only ``mtu`` attribute.
|
||||||
|
|
||||||
|
A newer ``net-mtu-writable`` extension enhances ``net-mtu`` in that now the
|
||||||
|
``mtu`` attribute is available for write (both when creating as well as
|
||||||
|
updating networks).
|
||||||
|
|
||||||
DNS integration
|
DNS integration
|
||||||
===============
|
===============
|
||||||
|
|
||||||
@@ -159,6 +163,7 @@ Request
|
|||||||
- network: network
|
- network: network
|
||||||
- admin_state_up: network-admin_state_up-request
|
- admin_state_up: network-admin_state_up-request
|
||||||
- dns_domain: dns_domain-request
|
- dns_domain: dns_domain-request
|
||||||
|
- mtu: mtu-request
|
||||||
- name: network-name-request
|
- name: network-name-request
|
||||||
- port_security_enabled: network-port_security_enabled-request
|
- port_security_enabled: network-port_security_enabled-request
|
||||||
- provider:network_type: provider:network_type
|
- provider:network_type: provider:network_type
|
||||||
@@ -355,6 +360,7 @@ Request
|
|||||||
- network: network
|
- network: network
|
||||||
- admin_state_up: network-admin_state_up-request
|
- admin_state_up: network-admin_state_up-request
|
||||||
- dns_domain: dns_domain-request
|
- dns_domain: dns_domain-request
|
||||||
|
- mtu: mtu-request
|
||||||
- name: network-name-request
|
- name: network-name-request
|
||||||
- port_security_enabled: network-port_security_enabled-request
|
- port_security_enabled: network-port_security_enabled-request
|
||||||
- project_id: project_id-request
|
- project_id: project_id-request
|
||||||
@@ -458,6 +464,7 @@ Request
|
|||||||
- networks: networks
|
- networks: networks
|
||||||
- admin_state_up: network-admin_state_up-request
|
- admin_state_up: network-admin_state_up-request
|
||||||
- dns_domain: dns_domain-request
|
- dns_domain: dns_domain-request
|
||||||
|
- mtu: mtu-request
|
||||||
- name: network-name-request
|
- name: network-name-request
|
||||||
- port_security_enabled: network-port_security_enabled-request
|
- port_security_enabled: network-port_security_enabled-request
|
||||||
- project_id: project_id-request
|
- project_id: project_id-request
|
||||||
|
@@ -3,6 +3,7 @@
|
|||||||
"name": "sample_network",
|
"name": "sample_network",
|
||||||
"admin_state_up": true,
|
"admin_state_up": true,
|
||||||
"dns_domain": "my-domain.org.",
|
"dns_domain": "my-domain.org.",
|
||||||
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e"
|
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e",
|
||||||
|
"mtu": 1400
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -8,7 +8,7 @@
|
|||||||
"created_at": "2016-03-08T20:19:41",
|
"created_at": "2016-03-08T20:19:41",
|
||||||
"dns_domain": "my-domain.org.",
|
"dns_domain": "my-domain.org.",
|
||||||
"id": "4e8e5957-649f-477b-9e5b-f1f75b21c03c",
|
"id": "4e8e5957-649f-477b-9e5b-f1f75b21c03c",
|
||||||
"mtu": 1500,
|
"mtu": 1400,
|
||||||
"name": "net1",
|
"name": "net1",
|
||||||
"port_security_enabled": true,
|
"port_security_enabled": true,
|
||||||
"project_id": "9bacb3c5d39d41a79512987f338cf177",
|
"project_id": "9bacb3c5d39d41a79512987f338cf177",
|
||||||
|
@@ -5,6 +5,7 @@
|
|||||||
"name": "net1",
|
"name": "net1",
|
||||||
"admin_state_up": true,
|
"admin_state_up": true,
|
||||||
"dns_domain": "",
|
"dns_domain": "",
|
||||||
|
"mtu": 1500,
|
||||||
"project_id": "9bacb3c5d39d41a79512987f338cf177",
|
"project_id": "9bacb3c5d39d41a79512987f338cf177",
|
||||||
"tenant_id": "9bacb3c5d39d41a79512987f338cf177",
|
"tenant_id": "9bacb3c5d39d41a79512987f338cf177",
|
||||||
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e",
|
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e",
|
||||||
|
@@ -2,6 +2,7 @@
|
|||||||
"network": {
|
"network": {
|
||||||
"dns_domain": "my-domain.org.",
|
"dns_domain": "my-domain.org.",
|
||||||
"name": "sample_network_5_updated",
|
"name": "sample_network_5_updated",
|
||||||
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e"
|
"qos_policy_id": "6a8454ade84346f59e8d40665f878b2e",
|
||||||
|
"mtu": 1300
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -8,7 +8,7 @@
|
|||||||
"created_at": "2016-03-08T20:19:41",
|
"created_at": "2016-03-08T20:19:41",
|
||||||
"dns_domain": "my-domain.org.",
|
"dns_domain": "my-domain.org.",
|
||||||
"id": "1f370095-98f6-4079-be64-6d3d4a6adcc6",
|
"id": "1f370095-98f6-4079-be64-6d3d4a6adcc6",
|
||||||
"mtu": 1500,
|
"mtu": 1300,
|
||||||
"name": "sample_network_5_updated",
|
"name": "sample_network_5_updated",
|
||||||
"port_security_enabled": true,
|
"port_security_enabled": true,
|
||||||
"project_id": "4fd44f30292945e481c7b8a0c8908869",
|
"project_id": "4fd44f30292945e481c7b8a0c8908869",
|
||||||
|
Reference in New Issue
Block a user