This makes it easier to coordinate agent-side events
with the server-side push notification state.
TrivialFix
Change-Id: Ib3a6ff27130c85a98c9d5bfe1f344e3d77d3cc12
Recently we have been seeing an error in neutron associated
with DVR routers, that says 'Binding info for DVR port not
found'.
This error is thrown when the 'get_bound_port_context' is
called when trying to notify_l2pop_port_wiring.
notify_l2pop_port_wiring is intended for router 'HA' ports, so
the get_bound_port_context should be called here only for 'HA'
ports.
This was introduced by a recent refactor in neutron
Icd4cd4e3f735e88299e86468380c5f786e7628fe
Change-Id: I1c636344068518aa26be6c96c598c61b7f0f3563
Closes-Bug: #1702769
When the security group is updated, the conntrack entries will be deleted
by conntrack-tools with each rule associated with each SG rule.
In large scale system, updating so much rules will call a large number
of subprocesses to implement the "conntrack -D" commands. That will
consume the system resource and time.
This netlink-lib will be used by netlink conntrack driver to improve
conntrack management performance.
Original solution and performance from neutron-fwaas [1]
[1] https://review.openstack.org/#/c/438445/
Co-Authored-By: Cao Xuan Hoang <hoangcx@vn.fujitsu.com>
Change-Id: I7503c87900eb0f7bc5386f915b925bb2576502cc
1)Adding 'image_is_advanced' option to tempest config, so you can
run specific tests with images that are not cirros.
2)Adding decorator to run 'subport_connectivity' test with such
image for VLAN aware VM feature.
3)Configuring gate to run trunk test with ubuntu image only
4) Updating release notes and TESTING.rst with the change
Change-Id: Ie15b0e79c6ea320322b2815fb8afbc8ec95f853a
By extending the black list to include the integer representation
for IPv6 we can succesfully block api requests to create security
group rules for IPv6 protocols with ehtertype IPv4.
Closes-Bug: #1706229
Change-Id: I5abeff178b3be18f1e93d00d9d546147b11c1a74
Added datapath_type to vif_details returned by OVS
mech driver.
Depends-On: Ie523c821995c046c7f77783a34e75053fc0abb3d
Partial-Bug: #1632372
Change-Id: Ief83150caf1a32a2c043b0245b36e5ebc3a16379
Generally, get_random_object_fields() generates random values to
update OVO objects. However, in some cases, specific values are
required, otherwise Foreign Key violation is triggered.
This patch adds a dictionary to hold all updatable fields which
require specific values.
Change-Id: I6da72c3ac43f01b5ffa21f128fb3eeaf9fd0a503
Closes-Bug: #1705187
Add (PORT, BEFORE_UPDATE) callback for port binding.
This is necessary for third party driver, In fact for networking-odl.
When port binding happens, neutron server may not know necessary
information. In such case, necessary information needs to be retrieved
from external SDN controller.
It needs to be done outside DB transaction and before actual port
binding. i.e. BEFORE_CREATE/UPDATE for PORT resource.
(PORT, BEFORE_CREATE) exits already.
Change-Id: Iab115087f619df46ea1b19289dec124d5ee394f5
Partial-bug: #1704848
Tag mechanism supports network, subnet, port, subnetpool
router resources only. This patch allow tag mechanism to support
resources with standard attribute.
Two old extenions are kept because of backward compatibility.
They will be removed in Queens release.
APIImpact: Tag is supported by resources with standard attribute
DocImpact: allow users to set tags on resources with standard attribute
Change-Id: Id7bb13b5beb58c313eea94ca03835d3daf5c94bc
Closes-Bug: #1682775
* Update the URLs affected by the doc-migration
(/developer/<project>/ to <project>/latest/)
* Follow content rearrangement
* Convert links to local documents into :doc: or :ref:
* Use https instead of http for the updated links on docs.openstack.org.
Part of the doc-migration work.
Change-Id: I62e317d9198f175a43d73bbfd419b6878de90d5a
A default security group will be assigned to a port if
and only if the security group attribute is not set on
the port being created. If the attribute is set then we
do not need all of the extra logic of ensuring that the
default security group exists.
This change save a few cycles, more specifically we do not need to
read from the DB or create a default security group if the
default will not be used.
TrivialFix
Change-Id: Ib072c2753862ce0709a67942527e9c6241130042
This adjusts the record_resource_delete method to ignore duplicate
calls to the same resource ID so we don't generate multiple
AFTER_DELETE callbacks for the same thing.
This can happen in security groups if a security group is deleted
and the local handler starts deleting SG rules and then we receive
an explicit rule deletion from the server triggered by the user.
Change-Id: I8ff58e178641328fe8fed526399e9aa9bef82a6f
Partially-Implements: blueprint push-notifications
This removes the network_id from the network_map dict when
a network is deleted on the Linux Bridge agent.
Change-Id: I0bd3be91626fd7c4e258c35041bb92130ee23182
Closes-Bug: #1705185
If network_deletes are received before port creates
are processed, the agent might not have the network in
it's map even though it has a bridge to delete.
This adjusts the logic to always try to delete the bridge
corresponding to a network_id even if it's not in the
network_map yet.
Change-Id: I5e72bff2ffd9568f272ed48187ad543ab5a3d1ec
Closes-Bug: #1698271