Use stevedore aliases for firewall_driver options
Those are public; import paths are private and are not supposed to be used by operators. Change-Id: If6e36389eb5a8e5101e060414fd5f86b0dff8e8c
This commit is contained in:
parent
cbe9fd1207
commit
b6a102f2d0
@ -56,7 +56,7 @@
|
||||
#
|
||||
# [*firewall_driver*]
|
||||
# (optional) Firewall driver for realizing neutron security group function.
|
||||
# Defaults to 'neutron.agent.linux.iptables_firewall.IptablesFirewallDriver'.
|
||||
# Defaults to 'iptables'.
|
||||
#
|
||||
# [*purge_config*]
|
||||
# (optional) Whether to set only the specified config options
|
||||
@ -75,7 +75,7 @@ class neutron::agents::ml2::linuxbridge (
|
||||
$polling_interval = $::os_service_default,
|
||||
$l2_population = $::os_service_default,
|
||||
$physical_interface_mappings = [],
|
||||
$firewall_driver = 'neutron.agent.linux.iptables_firewall.IptablesFirewallDriver',
|
||||
$firewall_driver = 'iptables',
|
||||
$purge_config = false,
|
||||
) {
|
||||
|
||||
|
@ -81,7 +81,7 @@
|
||||
#
|
||||
# [*firewall_driver*]
|
||||
# (optional) Firewall driver for realizing neutron security group function.
|
||||
# Defaults to 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver'.
|
||||
# Defaults to 'iptables_hybrid'.
|
||||
#
|
||||
# [*enable_distributed_routing*]
|
||||
# (optional) Set to True on L2 agents to enable support
|
||||
@ -165,7 +165,7 @@ class neutron::agents::ml2::ovs (
|
||||
$polling_interval = $::os_service_default,
|
||||
$l2_population = $::os_service_default,
|
||||
$arp_responder = $::os_service_default,
|
||||
$firewall_driver = 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver',
|
||||
$firewall_driver = 'iptables_hybrid',
|
||||
$enable_distributed_routing = $::os_service_default,
|
||||
$drop_flows_on_start = false,
|
||||
$manage_vswitch = true,
|
||||
|
@ -95,7 +95,7 @@ class neutron::agents::ml2::sriov (
|
||||
'agent/extensions': value => join(any2array($extensions), ',');
|
||||
# As of now security groups are not supported for SR-IOV ports.
|
||||
# It is required to disable Firewall driver in the SR-IOV agent config.
|
||||
'securitygroup/firewall_driver': value => 'neutron.agent.firewall.NoopFirewallDriver';
|
||||
'securitygroup/firewall_driver': value => 'noop';
|
||||
}
|
||||
|
||||
if !is_service_default($number_of_vfs) and !empty($number_of_vfs) {
|
||||
|
@ -13,7 +13,7 @@ describe 'neutron::agents::ml2::linuxbridge' do
|
||||
:tunnel_types => [],
|
||||
:local_ip => false,
|
||||
:physical_interface_mappings => [],
|
||||
:firewall_driver => 'neutron.agent.linux.iptables_firewall.IptablesFirewallDriver',
|
||||
:firewall_driver => 'iptables',
|
||||
:purge_config => false,}
|
||||
end
|
||||
|
||||
|
@ -15,7 +15,7 @@ describe 'neutron::agents::ml2::ovs' do
|
||||
:tunnel_types => [],
|
||||
:tunnel_bridge => 'br-tun',
|
||||
:drop_flows_on_start => false,
|
||||
:firewall_driver => 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver',
|
||||
:firewall_driver => 'iptables_hybrid',
|
||||
:manage_vswitch => true,
|
||||
:purge_config => false,
|
||||
:enable_dpdk => false,
|
||||
|
@ -44,7 +44,7 @@ describe 'neutron::agents::ml2::sriov' do
|
||||
is_expected.to contain_neutron_sriov_agent_config('sriov_nic/exclude_devices').with_value('<SERVICE DEFAULT>')
|
||||
is_expected.to contain_neutron_sriov_agent_config('sriov_nic/physical_device_mappings').with_value('<SERVICE DEFAULT>')
|
||||
is_expected.to contain_neutron_sriov_agent_config('agent/extensions').with_value(['<SERVICE DEFAULT>'])
|
||||
is_expected.to contain_neutron_sriov_agent_config('securitygroup/firewall_driver').with_value('neutron.agent.firewall.NoopFirewallDriver')
|
||||
is_expected.to contain_neutron_sriov_agent_config('securitygroup/firewall_driver').with_value('noop')
|
||||
end
|
||||
|
||||
it 'does not configure numvfs by default' do
|
||||
|
@ -106,12 +106,12 @@ describe 'neutron::plugins::ml2' do
|
||||
before :each do
|
||||
params.merge!(
|
||||
:enable_security_group => true,
|
||||
:firewall_driver => 'neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver',
|
||||
:firewall_driver => 'iptables_hybrid',
|
||||
)
|
||||
end
|
||||
it 'configures enable_security_group and firewall_driver options' do
|
||||
is_expected.to contain_neutron_plugin_ml2('securitygroup/enable_security_group').with_value('true')
|
||||
is_expected.to contain_neutron_plugin_ml2('securitygroup/firewall_driver').with_value('neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver')
|
||||
is_expected.to contain_neutron_plugin_ml2('securitygroup/firewall_driver').with_value('iptables_hybrid')
|
||||
end
|
||||
end
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user