Remove sql.Base

With the change to use oslo's db.sqlalchemy.sessions, the
sql.Base class isn't doing enough to justify its continued
existence.

This change removes sql.Base.

Part of bp use-common-oslo-db-code

Change-Id: I2fec97187bdca920757585994810f6a8065be4c4
This commit is contained in:
Brant Knudson 2014-02-13 19:42:43 -06:00
parent 9fbb60dbe0
commit e9bd8e8c76
14 changed files with 14 additions and 21 deletions

View File

@ -34,7 +34,7 @@ class AssignmentType:
GROUP_DOMAIN = 'GroupDomain'
class Assignment(sql.Base, assignment.Driver):
class Assignment(assignment.Driver):
# Internal interface to manage the database
def db_sync(self, version=None):

View File

@ -77,7 +77,7 @@ class Endpoint(sql.ModelBase, sql.DictBase):
extra = sql.Column(sql.JsonBlob())
class Catalog(sql.Base, catalog.Driver):
class Catalog(catalog.Driver):
def db_sync(self, version=None):
migration.db_sync(
migration_helpers.find_migrate_repo(), version=version)

View File

@ -209,12 +209,6 @@ def truncated(f):
return wrapper
# Backends
class Base(object):
# TODO(blk-u): remove this class since doesn't do anything.
pass
def _filter(model, query, hints):
"""Applies filtering to a query.

View File

@ -32,7 +32,7 @@ class ProjectEndpoint(sql.ModelBase, sql.DictBase):
nullable=False)
class EndpointFilter(sql.Base):
class EndpointFilter(object):
# Internal interface to manage the database
def db_sync(self, version=None):

View File

@ -88,7 +88,7 @@ class MappingModel(sql.ModelBase, sql.DictBase):
return d
class Federation(sql.Base, core.Driver):
class Federation(core.Driver):
def db_sync(self):
abs_path = migration_helpers.find_migrate_repo(federation)

View File

@ -84,7 +84,7 @@ class AccessToken(sql.ModelBase, sql.DictBase):
return dict(six.iteritems(self))
class OAuth1(sql.Base):
class OAuth1(object):
def db_sync(self):
migration.db_sync(migration_helpers.find_migrate_repo(oauth1))

View File

@ -32,7 +32,7 @@ class CredentialModel(sql.ModelBase, sql.DictBase):
extra = sql.Column(sql.JsonBlob())
class Credential(sql.Base, credential.Driver):
class Credential(credential.Driver):
# Internal interface to manage the database
def db_sync(self, version=None):
migration.db_sync(

View File

@ -75,7 +75,7 @@ class UserGroupMembership(sql.ModelBase, sql.DictBase):
@dependency.requires('assignment_api')
class Identity(sql.Base, identity.Driver):
class Identity(identity.Driver):
def default_assignment_driver(self):
return "keystone.assignment.backends.sql.Assignment"

View File

@ -29,7 +29,7 @@ class PolicyModel(sql.ModelBase, sql.DictBase):
extra = sql.Column(sql.JsonBlob())
class Policy(sql.Base, rules.Policy):
class Policy(rules.Policy):
# Internal interface to manage the database
def db_sync(self, version=None):
migration.db_sync(

View File

@ -1179,7 +1179,7 @@ class LDAPIdentityEnabledEmulation(LDAPIdentity):
"Enabled emulation conflicts with enabled mask")
class LdapIdentitySqlAssignment(sql.Base, tests.TestCase, BaseLDAPIdentity):
class LdapIdentitySqlAssignment(tests.TestCase, BaseLDAPIdentity):
def _set_config(self):
self.config([tests.dirs.etc('keystone.conf.sample'),
@ -1242,7 +1242,7 @@ class LdapIdentitySqlAssignment(sql.Base, tests.TestCase, BaseLDAPIdentity):
self.skipTest('Blocked by bug 1221805')
class MultiLDAPandSQLIdentity(sql.Base, tests.TestCase, BaseLDAPIdentity):
class MultiLDAPandSQLIdentity(tests.TestCase, BaseLDAPIdentity):
"""Class to test common SQL plus individual LDAP backends.
We define a set of domains and domain-specific backends:

View File

@ -32,7 +32,7 @@ CONF = config.CONF
DEFAULT_DOMAIN_ID = CONF.identity.default_domain_id
class SqlTests(tests.TestCase, sql.Base):
class SqlTests(tests.TestCase):
def setUp(self):
super(SqlTests, self).setUp()

View File

@ -17,7 +17,6 @@ import uuid
from keystoneclient.contrib.ec2 import utils as ec2_utils
from keystone.common import sql
from keystone import config
from keystone import tests
from keystone.tests import test_keystoneclient
@ -26,7 +25,7 @@ from keystone.tests import test_keystoneclient
CONF = config.CONF
class KcMasterSqlTestCase(test_keystoneclient.KcMasterTestCase, sql.Base):
class KcMasterSqlTestCase(test_keystoneclient.KcMasterTestCase):
def config(self, config_files):
super(KcMasterSqlTestCase, self).config([
tests.dirs.etc('keystone.conf.sample'),

View File

@ -36,7 +36,7 @@ class TokenModel(sql.ModelBase, sql.DictBase):
)
class Token(sql.Base, token.Driver):
class Token(token.Driver):
# Public interface
def get_token(self, token_id):
if token_id is None:

View File

@ -42,7 +42,7 @@ class TrustRole(sql.ModelBase):
role_id = sql.Column(sql.String(64), primary_key=True, nullable=False)
class Trust(sql.Base, trust.Driver):
class Trust(trust.Driver):
@sql.handle_conflicts(conflict_type='trust')
def create_trust(self, trust_id, trust, roles):
session = db_session.get_session()