2cfc1231dcaf21ac5055ea815d45d2974f442b73
This patch set introduces a new feature called provider-security-groups. Provider security groups allow the provider to create a security group that is automatically attached to a specific tenants ports. The one important thing to note is that rules inside of a provider security group are set to DENY where as a normal security group they are set to ALLOW. Provider security groups allow the admin tenant to block specific traffic for any tenant they like by creatng a provider group. To use this feature the admin tenant must first create a provider security group on behalf of the other tenant (i.e): $ neutron security-group-create no-pokemon-go-access --provider=True \ --tenant-id=<shall remain nameless> Then, whenever the above tenant id creates a port they will see a an additional field on the port "provider-security-groups" which will contain the uuid of the provider security group. This user can then query neutron to see which rules are in it that are blocking them. NOTE: one needs to use the correct policy.json file from this repo for neutron inorder to prevent the tenant from removing the group. Co-Authored-By: Aaron Rosen <aaronorosen@gmail.com> Change-Id: I57b130437327b0bbe5cc0068695f226b76b4e2ba
VMware-NSX package
You have come across the VMware-NSX family of Neutron plugins
External Resources:
The homepage for the VMware-NSX project is on Launchpad.
Use this site for asking for help, and filing bugs. Code is available both git.openstack.org and github.
For help on usage and hacking of VMware-NSX, please send a message to the openstack-dev mailing list.
For information on how to contribute to VMware-NSX, please see the contents of the CONTRIBUTING.rst file.
Description
Languages
Python
98.5%
Shell
1.5%