Release neutron RC1 for 2023.2 Bobcat
This proposed a RC1 release for neutron to get any merged changes out prior to the RC1 deadline for 2023.2 Bobcat going into effect. If the team is ready to proceed, please leave a +1 to acknowledge this release and we will process right away. If the team is working on any final merges, leave a -1 with some detail on the status and update the patch with the new commit hash to use when ready. Patches with no response will be merged by early Friday, September 15. Change-Id: Ic493f81030f2f909a97717dc5cb1349c9ecbf3dd Signed-off-by: Elod Illes <elod.illes@est.tech>
This commit is contained in:
parent
a446036c39
commit
952ebc38b8
@ -18,14 +18,21 @@ releases:
|
||||
projects:
|
||||
- repo: openstack/neutron
|
||||
hash: f06e6591709114c148ab806334b41ec4cff3f2f7
|
||||
|
||||
- version: 23.0.0.0rc1
|
||||
projects:
|
||||
- repo: openstack/neutron
|
||||
hash: 741f504c7badb3f6799977bd1e98ca5a9b7d1f53
|
||||
cycle-highlights:
|
||||
- Limit the rate at which instances can query the metadata service in order
|
||||
to protect the OpenStack deployment from DoS or misbehaved instances.
|
||||
- The Neutron service has enabled the new API policies (RBAC) with system
|
||||
scope and default roles by default.
|
||||
- A new port hint attribute "ovs-tx-steering", to modify the behaviour of
|
||||
the local Open vSwitch Userspace transmit packet steering feature.
|
||||
- New API which allows to define a set of security group rules to be used
|
||||
automatically in every new ``default`` and/or custom security group created
|
||||
for any project.
|
||||
- Limit the rate at which instances can query the metadata service
|
||||
in order to protect the OpenStack deployment from DoS or misbehaved
|
||||
instances.
|
||||
- The Neutron service has enabled the new API policies (RBAC) with
|
||||
system scope and default roles by default.
|
||||
- A new port hint attribute "ovs-tx-steering", to modify the behaviour
|
||||
of the local Open vSwitch Userspace transmit packet steering feature.
|
||||
- New API which allows to define a set of security group rules to
|
||||
be used automatically in every new ``default`` and/or custom security
|
||||
group created for any project.
|
||||
branches:
|
||||
- name: stable/2023.2
|
||||
location: 23.0.0.0rc1
|
||||
|
Loading…
Reference in New Issue
Block a user