commit 0589a9cf9a9fa1415bea89d266ce6ad19c0f4b74
Author: Terry Wilson <email address hidden>
Date: Thu Dec 19 08:32:44 2019 -0600
Work around potential double row.delete() call
The update_acls code can potentially iterate over the same ACL
twice. This temporary workaround silently ignores an attempt to
delete the same row twice in the same transaction, since that
should be safe. Ultimately, refactoring the ACL code to use sets
and possibly handle the fact that an ACL could be referenced from
multiple rows should be done.
Change-Id: I259c92116f7d3186ae5af45f1407052eb57ac0ba
Related-bug: #1857016
(cherry-picked from Neutron I895eaf4006583fedc2657a4eb527df1ff992c5bc)
Reviewed: https:/ /review. opendev. org/700063 /git.openstack. org/cgit/ openstack/ networking- ovn/commit/ ?id=0589a9cf9a9 fa1415bea89d266 ce6ad19c0f4b74
Committed: https:/
Submitter: Zuul
Branch: stable/stein
commit 0589a9cf9a9fa14 15bea89d266ce6a d19c0f4b74
Author: Terry Wilson <email address hidden>
Date: Thu Dec 19 08:32:44 2019 -0600
Work around potential double row.delete() call
The update_acls code can potentially iterate over the same ACL
twice. This temporary workaround silently ignores an attempt to
delete the same row twice in the same transaction, since that
should be safe. Ultimately, refactoring the ACL code to use sets
and possibly handle the fact that an ACL could be referenced from
multiple rows should be done.
Change-Id: I259c92116f7d31 86ae5af45f14070 52eb57ac0ba edc2657a4eb527d f1ff992c5bc)
Related-bug: #1857016
(cherry-picked from Neutron I895eaf4006583f