Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
| * | Add missing tenant_id arg, pass in name param correctly | Etrik Patricella | 2015-03-26 | 1 | -3/+3 | |
|/ | ||||||
* | Merge pull request #39 from etrikp/master | Lorin Hochstein | 2015-03-17 | 1 | -39/+78 | |
|\ | | | | | Add support for source groups by name | |||||
| * | Add support for source groups by name | Etrik Patricella | 2015-03-17 | 1 | -39/+78 | |
|/ | | | | test | |||||
* | Merge pull request #36 from ssssam/ssssam/allow-no-rules-update | Lorin Hochstein | 2015-03-07 | 1 | -3/+16 | |
|\ | | | | | neutron_sec_group: Fix error if 'rules' parameter isn't supplied | |||||
| * | neutron_sec_group: Fix error if 'rules' parameter isn't supplied | Sam Thursfield | 2015-03-06 | 1 | -3/+16 | |
|/ | | | | | | | | | | Previously, if 'rules' wasn't specified you'd see this error: failed: [localhost] => {"failed": true} msg: Error: 'NoneType' object is not iterable Now, if 'rules' isn't specified, no changes are made to the security group rules. | |||||
* | Merge pull request #35 from nihilifer/bugfix/admin_context | Lorin Hochstein | 2015-02-16 | 1 | -5/+6 | |
|\ | | | | | Getting tenant id from Keystone client when tenant not provided | |||||
| * | Getting tenant id from Keystone client when tenant not provided | Michał Rostecki | 2015-02-16 | 1 | -5/+6 | |
|/ | ||||||
* | Merge pull request #34 from ccollicutt/master | Lorin Hochstein | 2015-01-13 | 1 | -1/+4 | |
|\ | | | | | glance version string | |||||
| * | add try except blog for version_info | curtis | 2015-01-13 | 1 | -1/+4 | |
| | | ||||||
| * | fix for glance version | curtis | 2015-01-11 | 1 | -1/+1 | |
|/ | ||||||
* | Merge pull request #33 from cybercom-finland/neutron_sec_group_fixes | Lorin Hochstein | 2014-12-17 | 1 | -7/+20 | |
|\ | | | | | Neutron sec group fixes | |||||
| * | Add support for check mode in neutron_sec_group | Toni Ylenius | 2014-12-17 | 1 | -6/+19 | |
| | | ||||||
| * | Use _update_sg to create security groups in creation also | Toni Ylenius | 2014-12-17 | 1 | -1/+1 | |
|/ | | | | | This fixes a bug when we define { direction: egress, ethertype: IPv4 } in rules, because Neutron creates them by default. | |||||
* | Merge pull request #32 from cybercom-finland/neutron_sec_group_fix | Lorin Hochstein | 2014-12-16 | 1 | -0/+4 | |
|\ | | | | | Fix neutron_sec_group to work with str port ranges | |||||
| * | Fix neutron_sec_group to work with str port ranges | Toni Ylenius | 2014-12-16 | 1 | -0/+4 | |
|/ | ||||||
* | Merge pull request #31 from cybercom-finland/sec_groups_fix | Lorin Hochstein | 2014-12-05 | 1 | -10/+51 | |
|\ | | | | | Fix security groups _update_sg to really do update | |||||
| * | Fix security groups _update_sg to really do update | Toni Ylenius | 2014-12-05 | 1 | -10/+51 | |
|/ | | | | | | In the old implementation the function replaced the security group rules. In the new one it will not remove rules that are already in place. | |||||
* | Merge pull request #30 from cybercom-finland/master | Lorin Hochstein | 2014-12-04 | 1 | -0/+1 | |
|\ | | | | | Set 'tenant_id' for security group rules also | |||||
| * | Set 'tenant_id' for security group rules also | Toni Ylenius | 2014-12-04 | 1 | -0/+1 | |
|/ | | | | This is required so that 'tenant_name' option works in intuitive way. | |||||
* | Fix readme typo | Lorin Hochstein | 2014-11-07 | 1 | -1/+1 | |
| | ||||||
* | Merge pull request #28 from abel-navarro/reuse-fip-rebase | Lorin Hochstein | 2014-11-07 | 1 | -2/+18 | |
|\ | | | | | neutron_floating_ip to re-use FIPs | |||||
| * | neutron_floating_ip to re-use FIPs | Abel Navarro | 2014-11-07 | 1 | -2/+18 | |
|/ | | | | | | | | | This patch makes neutron_floating_ip to try to re-use previously allocated but disassociated floating IPs (FIPs) instead of always allocating and associating a new one. A FIP will only be allocated if there are no free (allocated, disassociated) ones. Signed-off-by: Abel Navarro <abel@midokura.com> | |||||
* | Merge pull request #27 from dlundquist/keystone_service-user-pass-auth | Lorin Hochstein | 2014-11-07 | 1 | -8/+15 | |
|\ | | | | | Keystone service user pass auth | |||||
| * | Fix keystone_service user/pass authentication | Dustin Lundquist | 2014-11-06 | 1 | -7/+14 | |
| | | | | | | | | | | | | | | | | keystone_service included an incomplete username and password authentication path. Since the keystone client was initialized with endpoint rather than auth_url it didn't obtain a token and did not have permissions to preform operations. Additionally some operations required the client to authenticate with a tenant_name as well. | |||||
| * | Whitespace in documentation | Dustin Lundquist | 2014-11-06 | 1 | -1/+1 | |
|/ | ||||||
* | Merge pull request #26 from abel-navarro/fip_port | Lorin Hochstein | 2014-10-22 | 1 | -6/+22 | |
|\ | | | | | Floating IP assignment to support specific port | |||||
| * | Floating IP assignment to support specific port | Abel Navarro | 2014-10-22 | 1 | -6/+22 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When creating VMs with more than one port, the floating IP assignment can randomly choose one of the created ports, potentially leading to failures. This patch aims to provide a way to specify which port to assign the floating IP to. The network where the port lives must be specified thus the assignment becomes deterministic. This patch should keep compatibility with previous versions of the neutron_floating_ip module. Signed-off-by: Abel Navarro <abel@midokura.com> | |||||
* | | Merge pull request #24 from ObjectifLibre/glance-manage-juno | Lorin Hochstein | 2014-10-11 | 1 | -33/+39 | |
|\ \ | | | | | | | glance_manage: add Juno support | |||||
| * | | glance_manage: add Juno support | Gauvain Pocentek | 2014-10-11 | 1 | -33/+39 | |
| | | | | | | | | | | | | | | | | | | Instead of nesting a lot of try/except blocks, use the glance.version module to know which glance version we're using, and import modules accordingly. | |||||
* | | | Merge pull request #23 from ObjectifLibre/heat-juno | Lorin Hochstein | 2014-10-11 | 1 | -0/+105 | |
|\ \ \ | |/ / |/| | | heat_manage: add juno support | |||||
| * | | heat_manage: add juno support | Gauvain Pocentek | 2014-10-11 | 1 | -1/+5 | |
| | | | ||||||
| * | | Use the newer import method | Gauvain Pocentek | 2014-10-11 | 1 | -2/+2 | |
| | | | ||||||
| * | | Remove Lorin from authors | Gauvain Pocentek | 2014-10-11 | 1 | -1/+1 | |
| | | | ||||||
| * | | Add the heat_manage module | Gauvain Pocentek | 2014-10-09 | 1 | -0/+101 | |
|/ / | | | | | | | Support only the dbsync command on icehouse for now. | |||||
* | | Merge pull request #20 from ObjectifLibre/glance_manage-icehouse | Lorin Hochstein | 2014-10-05 | 1 | -6/+31 | |
|\ \ | | | | | | | Add icehouse support to glance_manage | |||||
| * | | Add icehouse support to glance_manage | Gauvain Pocentek | 2014-10-05 | 1 | -6/+31 | |
| |/ | | | | | | | | | Handle the various changes done in glance for db migration during the icehouse cycle. | |||||
* | | Merge pull request #21 from ObjectifLibre/cinder_manage-icehouse | Lorin Hochstein | 2014-10-05 | 1 | -6/+9 | |
|\ \ | | | | | | | Add support for icehouse in cinder_manage | |||||
| * | | Add support for icehouse in cinder_manage | Gauvain Pocentek | 2014-10-05 | 1 | -6/+9 | |
|/ / | ||||||
* | | Merge pull request #19 from ObjectifLibre/keystone_manage-icehouse | Lorin Hochstein | 2014-10-03 | 1 | -3/+15 | |
|\ \ | |/ |/| | Support icehouse in keystone_manage | |||||
| * | Support icehouse in keystone_manage | Gauvain Pocentek | 2014-10-03 | 1 | -3/+15 | |
|/ | | | | | The database migration functions moved around in keystone during the icehouse cycle. This patch adds support for this release. | |||||
* | Merge pull request #18 from vadimkuznetsov/sg | Lorin Hochstein | 2014-09-18 | 1 | -50/+50 | |
|\ | | | | | security group name is not unique. Issue #17 | |||||
| * | security group name is not unique. | Vadim Kuznetsov | 2014-09-17 | 1 | -50/+50 | |
|/ | | | | | limit sequrity group search to tenant and pretend it is unique in tenant scope. | |||||
* | Merge pull request #15 from asamalik/master | Lorin Hochstein | 2014-09-01 | 1 | -0/+188 | |
|\ | | | | | New module: nova_flavor | |||||
| * | New module: nova_flavor | Adam Samalik | 2014-09-01 | 1 | -0/+188 | |
|/ | ||||||
* | Add LICENSE file | Lorin Hochstein | 2014-08-27 | 1 | -0/+674 | |
| | | | | Fixes #14 | |||||
* | Merge pull request #13 from jorisroovers/master | Lorin Hochstein | 2014-08-25 | 1 | -3/+2 | |
|\ | | | | | Bugfix: Updating security group rules causes rules of other security rules to be deleted | |||||
| * | Bugfix: Updating security group rules caused rules of other security rules ↵ | Joris Roovers | 2014-08-25 | 1 | -3/+2 | |
|/ | | | | | | to be deleted This bug was caused by an incorrect use of the neutron pythonclient. | |||||
* | Merge pull request #12 from jorisroovers/neutron_sec_group | Lorin Hochstein | 2014-07-25 | 1 | -0/+323 | |
|\ | | | | | Openstack security groups module | |||||
| * | Openstack security groups module | Joris Roovers | 2014-07-25 | 1 | -0/+323 | |
|/ | | | | | | | | | Allows users to easily create, update or delete security groups, as well as managing security group rules within a security group. Works for both admin users (they can add security groups to all projects), as well as regular users (they can only add security groups to their own projects). | |||||
* | Merge pull request #11 from ericwb/master | Lorin Hochstein | 2014-06-26 | 1 | -8/+20 | |
|\ | | | | | Support specifying an endpoint type to glance |