The spec networking_general_api_information.html was moved
to api-ref in [0] but some of the links pointing to it
were not updated. This change makes all the refs consistent
and adds links where missing.
Also moved sync/async and bulk create sections lower to
group all the filtering, pagination and sorting sections
together since they are inter-related.
[0] https://review.opendev.org/c/openstack/neutron-lib/+/362877
Change-Id: I895cc9aaee2546b95e93150c134f350a50346447
With new default API policies binding:profile attribute of the port can
be only set or updated by the SERVICE user. This patch adds small note
about this to the Neutron API-REF document.
Related-Bug: #2052937
Change-Id: I0b2f2225e29537c9fd2de53b0945a451b9bcdde3
This extension adds a new field to the "subnet" resource:
"router:external". This boolean field, that is False by default,
represents if the subnet belongs to an external network.
Related-Bug: #2051831
Change-Id: I75a9c30f1e8031d40a548df345b02fbe0bc47706
Neutron support bulk create of security group rules, but that's
undocumented in the api-ref. This commit fixes that by adding the docs
and examples of these calls.
Change-Id: I32ce8b3501a01552fed67ba24602e891c3c01cd4
The Neutron patch linked below changes behavior of API update requests
to vnic_type port binding attribute on bound ports. It's no longer
allowed to update the vnic_type if the port is already bound.
Depends-On: https://review.opendev.org/c/openstack/neutron/+/892815
Related-bug: #2033090
Change-Id: Ic5c6d54a1e5e57e977623ac6a4e2e6278f7237b7
Signed-off-by: Jakub Libosvar <libosvar@redhat.com>
SG rule template API accepts any string (any uuid) as remote group id or
remote address group id. It may be something what's not existing in the
time of the creation of template and that's fine. But if it will be not
existing when regular SG will be created for project it will fail making
SG for that project.
This patch adds small warning about this to the default SG rules
template api-ref.
Additionally this patch updated some small issues in the "create
default security group rule" section.
Related-Bug: #1983053
Change-Id: I9bad07d8ed11796047883f87b45a7da0799cdcb1
Added a new API extension
``security-groups-rules-belongs-to-default-sg`` that adds a new
read only field ``belongs_to_default_sg`` in the security group
rules. This flag determines if this security group rule belongs
to the project's default security group.
Related-Bug: #2019960
Change-Id: Ibd8f57d82b28f5cdb8874f1ae22cb35adcd8e880
This new network API field, that can be used during the network
creation, will trigger the creation of a ``ha_router_networks``
database register. This register binds the project with the
created network and defines it as the high availability network
of the project, that is unique per project.
The default value is "False".
Related-Bug: #2016198
Change-Id: Id6e434060a7559026f9083904a91213b39361336
API additions for [1].
* Added a new router attribute: external_gateways;
* Added new API definitions for:
PUT add_external_gateways
PUT update_external_gateways
PUT remove_external_gateways
* Added extensions for each of the new router-level attributes:
* enable_default_route_ecmp
* enable_default_route_bfd
* Combined the validation logic for the external_gateway_info type
across extensions (l3_ext_gw_mode, qos_gateway_ip and the new
extension called l3_ext_gw_multihoming).
[1] https://review.opendev.org/c/openstack/neutron-specs/+/870030/
Change-Id: I2618475636b2bb9bfd743a62f5d4859d4f68a547
Related-Bug: #2002687
This behavior matches what ML2/OVS implementation does and what we
intend to implement for ML2/OVN. More than that, a decision was made
during vPTG to make the behavior part of api-ref to facilitate
cross-backend consistency.
Related-Bug: #2006949
Related-Bug: #2009053
Change-Id: Ic633eedd9f0d320d9ad0c27a72f07b1b016d7ba3
The port hints extension (``port-hints``) introduces the ``hints``
port attribute. Hints are backend specific pieces of information,
mainly to allow backend specific performance tuning. In itself this
extension defines no particular hint, and therefore no valid values of
the ``hints`` attribute. It just serves as the base for other extensions
introducing concrete hints and signals the presence of the ``hints``
port attribute to the API user. By default policy, use of the ``hints``
attribute is restricted to admininstrative users.
Change-Id: I5cb21b25fcda62eae3743b2f96177dcc1fda4afb
Partially-Implements: #1990842
Related-Change (spec): https://review.opendev.org/c/openstack/neutron-specs/+/862133
Added a new DSCP mark value: 44. This new mark value was included
recently in the RFC5865 [1].
[1]https://www.rfc-editor.org/rfc/rfc5865.html
Change-Id: Ieba8835cbb5a71e83791324ed1fcbb983afe19fa
Closes-Bug: #1987378