Optimize add security group rules for exposed ports
If user wants to expose ranges of ports for a container,
like ports from 1000 to 1100. Using docker client command:
$ docker run --net=my_kuryr_net --expose=1000-1100/udp -it ubuntu:14.04
In currently implementation, we should call Neutron client 100 times
to create Neutron security group rules.
This patch obtains min_port and max_port from libnetwork request,
then pass to Neutron client port-range-min and port-range-max in
security-group-rule-create.
Reviewed: https:/ /review. openstack. org/378485 /git.openstack. org/cgit/ openstack/ kuryr-libnetwor k/commit/ ?id=75f15770bc2 2ae6b55bb1d3543 7b5c9f8b964b67
Committed: https:/
Submitter: Jenkins
Branch: master
commit 75f15770bc22ae6 b55bb1d35437b5c 9f8b964b67
Author: Dongcan Ye <email address hidden>
Date: Wed Sep 28 17:41:44 2016 +0800
Optimize add security group rules for exposed ports
If user wants to expose ranges of ports for a container, 1000-1100/ udp -it ubuntu:14.04
like ports from 1000 to 1100. Using docker client command:
$ docker run --net=my_kuryr_net --expose=
In currently implementation, we should call Neutron client 100 times
to create Neutron security group rules.
This patch obtains min_port and max_port from libnetwork request, group-rule- create.
then pass to Neutron client port-range-min and port-range-max in
security-
Change-Id: I3a2baa71f94834 bdf3679bb05c40f 9f2ae06eca8
Closes-Bug: #1627922