commit 140a1505b132328ff748b0ef279d9c2bbf76ef59
Author: Terry Wilson <email address hidden>
Date: Thu Dec 19 08:32:44 2019 -0600
Work around potential double row.delete() call
The update_acls code can potentially iterate over the same ACL
twice. This temporary workaround silently ignores an attempt to
delete the same row twice in the same transaction, since that
should be safe. Ultimately, refactoring the ACL code to use sets
and possibly handle the fact that an ACL could be referenced from
multiple rows should be done.
Change-Id: I259c92116f7d3186ae5af45f1407052eb57ac0ba
Related-bug: #1857016
(cherry-picked from Neutron I895eaf4006583fedc2657a4eb527df1ff992c5bc)
Reviewed: https:/ /review. opendev. org/700064 /git.openstack. org/cgit/ openstack/ networking- ovn/commit/ ?id=140a1505b13 2328ff748b0ef27 9d9c2bbf76ef59
Committed: https:/
Submitter: Zuul
Branch: stable/rocky
commit 140a1505b132328 ff748b0ef279d9c 2bbf76ef59
Author: Terry Wilson <email address hidden>
Date: Thu Dec 19 08:32:44 2019 -0600
Work around potential double row.delete() call
The update_acls code can potentially iterate over the same ACL
twice. This temporary workaround silently ignores an attempt to
delete the same row twice in the same transaction, since that
should be safe. Ultimately, refactoring the ACL code to use sets
and possibly handle the fact that an ACL could be referenced from
multiple rows should be done.
Change-Id: I259c92116f7d31 86ae5af45f14070 52eb57ac0ba edc2657a4eb527d f1ff992c5bc)
Related-bug: #1857016
(cherry-picked from Neutron I895eaf4006583f