summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
...
| * Add missing tenant_id arg, pass in name param correctlyEtrik Patricella2015-03-261-3/+3
|/
* Merge pull request #39 from etrikp/masterLorin Hochstein2015-03-171-39/+78
|\ | | | | Add support for source groups by name
| * Add support for source groups by nameEtrik Patricella2015-03-171-39/+78
|/ | | | test
* Merge pull request #36 from ssssam/ssssam/allow-no-rules-updateLorin Hochstein2015-03-071-3/+16
|\ | | | | neutron_sec_group: Fix error if 'rules' parameter isn't supplied
| * neutron_sec_group: Fix error if 'rules' parameter isn't suppliedSam Thursfield2015-03-061-3/+16
|/ | | | | | | | | | Previously, if 'rules' wasn't specified you'd see this error: failed: [localhost] => {"failed": true} msg: Error: 'NoneType' object is not iterable Now, if 'rules' isn't specified, no changes are made to the security group rules.
* Merge pull request #35 from nihilifer/bugfix/admin_contextLorin Hochstein2015-02-161-5/+6
|\ | | | | Getting tenant id from Keystone client when tenant not provided
| * Getting tenant id from Keystone client when tenant not providedMichał Rostecki2015-02-161-5/+6
|/
* Merge pull request #34 from ccollicutt/masterLorin Hochstein2015-01-131-1/+4
|\ | | | | glance version string
| * add try except blog for version_infocurtis2015-01-131-1/+4
| |
| * fix for glance versioncurtis2015-01-111-1/+1
|/
* Merge pull request #33 from cybercom-finland/neutron_sec_group_fixesLorin Hochstein2014-12-171-7/+20
|\ | | | | Neutron sec group fixes
| * Add support for check mode in neutron_sec_groupToni Ylenius2014-12-171-6/+19
| |
| * Use _update_sg to create security groups in creation alsoToni Ylenius2014-12-171-1/+1
|/ | | | | This fixes a bug when we define { direction: egress, ethertype: IPv4 } in rules, because Neutron creates them by default.
* Merge pull request #32 from cybercom-finland/neutron_sec_group_fixLorin Hochstein2014-12-161-0/+4
|\ | | | | Fix neutron_sec_group to work with str port ranges
| * Fix neutron_sec_group to work with str port rangesToni Ylenius2014-12-161-0/+4
|/
* Merge pull request #31 from cybercom-finland/sec_groups_fixLorin Hochstein2014-12-051-10/+51
|\ | | | | Fix security groups _update_sg to really do update
| * Fix security groups _update_sg to really do updateToni Ylenius2014-12-051-10/+51
|/ | | | | | In the old implementation the function replaced the security group rules. In the new one it will not remove rules that are already in place.
* Merge pull request #30 from cybercom-finland/masterLorin Hochstein2014-12-041-0/+1
|\ | | | | Set 'tenant_id' for security group rules also
| * Set 'tenant_id' for security group rules alsoToni Ylenius2014-12-041-0/+1
|/ | | | This is required so that 'tenant_name' option works in intuitive way.
* Fix readme typoLorin Hochstein2014-11-071-1/+1
|
* Merge pull request #28 from abel-navarro/reuse-fip-rebaseLorin Hochstein2014-11-071-2/+18
|\ | | | | neutron_floating_ip to re-use FIPs
| * neutron_floating_ip to re-use FIPsAbel Navarro2014-11-071-2/+18
|/ | | | | | | | | This patch makes neutron_floating_ip to try to re-use previously allocated but disassociated floating IPs (FIPs) instead of always allocating and associating a new one. A FIP will only be allocated if there are no free (allocated, disassociated) ones. Signed-off-by: Abel Navarro <abel@midokura.com>
* Merge pull request #27 from dlundquist/keystone_service-user-pass-authLorin Hochstein2014-11-071-8/+15
|\ | | | | Keystone service user pass auth
| * Fix keystone_service user/pass authenticationDustin Lundquist2014-11-061-7/+14
| | | | | | | | | | | | | | | | keystone_service included an incomplete username and password authentication path. Since the keystone client was initialized with endpoint rather than auth_url it didn't obtain a token and did not have permissions to preform operations. Additionally some operations required the client to authenticate with a tenant_name as well.
| * Whitespace in documentationDustin Lundquist2014-11-061-1/+1
|/
* Merge pull request #26 from abel-navarro/fip_portLorin Hochstein2014-10-221-6/+22
|\ | | | | Floating IP assignment to support specific port
| * Floating IP assignment to support specific portAbel Navarro2014-10-221-6/+22
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When creating VMs with more than one port, the floating IP assignment can randomly choose one of the created ports, potentially leading to failures. This patch aims to provide a way to specify which port to assign the floating IP to. The network where the port lives must be specified thus the assignment becomes deterministic. This patch should keep compatibility with previous versions of the neutron_floating_ip module. Signed-off-by: Abel Navarro <abel@midokura.com>
* | Merge pull request #24 from ObjectifLibre/glance-manage-junoLorin Hochstein2014-10-111-33/+39
|\ \ | | | | | | glance_manage: add Juno support
| * | glance_manage: add Juno supportGauvain Pocentek2014-10-111-33/+39
| | | | | | | | | | | | | | | | | | Instead of nesting a lot of try/except blocks, use the glance.version module to know which glance version we're using, and import modules accordingly.
* | | Merge pull request #23 from ObjectifLibre/heat-junoLorin Hochstein2014-10-111-0/+105
|\ \ \ | |/ / |/| | heat_manage: add juno support
| * | heat_manage: add juno supportGauvain Pocentek2014-10-111-1/+5
| | |
| * | Use the newer import methodGauvain Pocentek2014-10-111-2/+2
| | |
| * | Remove Lorin from authorsGauvain Pocentek2014-10-111-1/+1
| | |
| * | Add the heat_manage moduleGauvain Pocentek2014-10-091-0/+101
|/ / | | | | | | Support only the dbsync command on icehouse for now.
* | Merge pull request #20 from ObjectifLibre/glance_manage-icehouseLorin Hochstein2014-10-051-6/+31
|\ \ | | | | | | Add icehouse support to glance_manage
| * | Add icehouse support to glance_manageGauvain Pocentek2014-10-051-6/+31
| |/ | | | | | | | | Handle the various changes done in glance for db migration during the icehouse cycle.
* | Merge pull request #21 from ObjectifLibre/cinder_manage-icehouseLorin Hochstein2014-10-051-6/+9
|\ \ | | | | | | Add support for icehouse in cinder_manage
| * | Add support for icehouse in cinder_manageGauvain Pocentek2014-10-051-6/+9
|/ /
* | Merge pull request #19 from ObjectifLibre/keystone_manage-icehouseLorin Hochstein2014-10-031-3/+15
|\ \ | |/ |/| Support icehouse in keystone_manage
| * Support icehouse in keystone_manageGauvain Pocentek2014-10-031-3/+15
|/ | | | | The database migration functions moved around in keystone during the icehouse cycle. This patch adds support for this release.
* Merge pull request #18 from vadimkuznetsov/sgLorin Hochstein2014-09-181-50/+50
|\ | | | | security group name is not unique. Issue #17
| * security group name is not unique.Vadim Kuznetsov2014-09-171-50/+50
|/ | | | | limit sequrity group search to tenant and pretend it is unique in tenant scope.
* Merge pull request #15 from asamalik/masterLorin Hochstein2014-09-011-0/+188
|\ | | | | New module: nova_flavor
| * New module: nova_flavorAdam Samalik2014-09-011-0/+188
|/
* Add LICENSE fileLorin Hochstein2014-08-271-0/+674
| | | | Fixes #14
* Merge pull request #13 from jorisroovers/masterLorin Hochstein2014-08-251-3/+2
|\ | | | | Bugfix: Updating security group rules causes rules of other security rules to be deleted
| * Bugfix: Updating security group rules caused rules of other security rules ↵Joris Roovers2014-08-251-3/+2
|/ | | | | | to be deleted This bug was caused by an incorrect use of the neutron pythonclient.
* Merge pull request #12 from jorisroovers/neutron_sec_groupLorin Hochstein2014-07-251-0/+323
|\ | | | | Openstack security groups module
| * Openstack security groups moduleJoris Roovers2014-07-251-0/+323
|/ | | | | | | | | Allows users to easily create, update or delete security groups, as well as managing security group rules within a security group. Works for both admin users (they can add security groups to all projects), as well as regular users (they can only add security groups to their own projects).
* Merge pull request #11 from ericwb/masterLorin Hochstein2014-06-261-8/+20
|\ | | | | Support specifying an endpoint type to glance