commit dce03899e3da2b87aec256d0d68cc1e58ca38e70
Author: Terry Wilson <email address hidden>
Date: Thu Dec 19 08:32:44 2019 -0600
Work around potential double row.delete() call
The update_acls code can potentially iterate over the same ACL
twice. This temporary workaround silently ignores an attempt to
delete the same row twice in the same transaction, since that
should be safe. Ultimately, refactoring the ACL code to use sets
and possibly handle the fact that an ACL could be referenced from
multiple rows should be done.
Change-Id: I259c92116f7d3186ae5af45f1407052eb57ac0ba
Related-bug: #1857016
(cherry-picked from Neutron I895eaf4006583fedc2657a4eb527df1ff992c5bc)
Reviewed: https:/ /review. opendev. org/700065 /git.openstack. org/cgit/ openstack/ networking- ovn/commit/ ?id=dce03899e3d a2b87aec256d0d6 8cc1e58ca38e70
Committed: https:/
Submitter: Zuul
Branch: stable/queens
commit dce03899e3da2b8 7aec256d0d68cc1 e58ca38e70
Author: Terry Wilson <email address hidden>
Date: Thu Dec 19 08:32:44 2019 -0600
Work around potential double row.delete() call
The update_acls code can potentially iterate over the same ACL
twice. This temporary workaround silently ignores an attempt to
delete the same row twice in the same transaction, since that
should be safe. Ultimately, refactoring the ACL code to use sets
and possibly handle the fact that an ACL could be referenced from
multiple rows should be done.
Change-Id: I259c92116f7d31 86ae5af45f14070 52eb57ac0ba edc2657a4eb527d f1ff992c5bc)
Related-bug: #1857016
(cherry-picked from Neutron I895eaf4006583f