Bug 1282428 - [RFE] Support enabling the port security extension
Summary: [RFE] Support enabling the port security extension
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-tripleo-heat-templates
Version: 8.0 (Liberty)
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: rc
: 10.0 (Newton)
Assignee: Jiri Stransky
QA Contact: Toni Freger
URL:
Whiteboard:
: 1272167 1279613 1286409 (view as bug list)
Depends On: 1272167
Blocks: 1279613
TreeView+ depends on / blocked
 
Reported: 2015-11-16 11:35 UTC by Nir Yechiel
Modified: 2019-10-10 10:30 UTC (History)
14 users (show)

Fixed In Version: openstack-tripleo-heat-templates-5.0.0-0.20160609160634.8027ae2.el7ost
Doc Type: Enhancement
Doc Text:
Clone Of: 1272167
Environment:
Last Closed: 2016-12-14 15:17:33 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Launchpad 1531970 0 None None None 2016-01-07 19:32:02 UTC
OpenStack gerrit 287866 0 None MERGED Enable the ML2 port security extension driver by default 2020-10-27 15:44:15 UTC
Red Hat Product Errata RHEA-2016:2948 0 normal SHIPPED_LIVE Red Hat OpenStack Platform 10 enhancement update 2016-12-14 19:55:27 UTC

Description Nir Yechiel 2015-11-16 11:35:32 UTC
+++ This bug was initially created as a clone of Bug #1272167 +++

We should support configuration of the port security extension. To enable, add the following to the "extension_drivers" in the ML2 section in the ML2 plugin file (e.g. /etc/neutron/plugins/ml2/ml2_conf.ini): For example:

[ml2]
extension_drivers = port_security

Comment 2 Mike Burns 2015-11-30 14:04:28 UTC
*** Bug 1286409 has been marked as a duplicate of this bug. ***

Comment 3 Brent Eagles 2016-01-07 19:41:42 UTC
An u/s patch was submitted against master (mitaka) 

https://review.openstack.org/#/c/264940/

This will need to be merged and backport to stable/liberty to make it into OSP 8.

Comment 5 Nir Yechiel 2016-03-03 15:11:23 UTC
*** Bug 1272167 has been marked as a duplicate of this bug. ***

Comment 6 Nir Yechiel 2016-03-03 15:13:47 UTC
*** Bug 1279613 has been marked as a duplicate of this bug. ***

Comment 7 Nir Yechiel 2016-03-03 15:17:48 UTC
(In reply to Brent Eagles from comment #3)
> An u/s patch was submitted against master (mitaka) 
> 
> https://review.openstack.org/#/c/264940/
> 
> This will need to be merged and backport to stable/liberty to make it into
> OSP 8.

Liberty backport: https://review.openstack.org/#/c/287866/

Comment 9 Mike McCune 2016-03-28 22:19:01 UTC
This bug was accidentally moved from POST to MODIFIED via an error in automation, please see mmccune with any questions

Comment 10 Mike Burns 2016-04-07 20:57:01 UTC
This bug did not make the OSP 8.0 release.  It is being deferred to OSP 10.

Comment 14 Toni Freger 2016-10-13 14:56:24 UTC
The extension is enabled by default and tempest test test_port_security_macspoofing_port passed successfully.
Verified on  - openstack-tripleo-heat-templates-5.0.0-0.20160929150845.4cdc4fc.el7ost.noarch

Comment 18 errata-xmlrpc 2016-12-14 15:17:33 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHEA-2016-2948.html


Note You need to log in before you can comment on or make changes to this bug.