Merge "Avoid duplicating tenant check when creating resources"
This commit is contained in:
commit
dcdfc8a2f9
@ -148,7 +148,6 @@ class VPNPluginDb(vpnaas.VPNPluginBase, base_db.CommonDbMixin):
|
||||
ipsec_sitecon = ipsec_site_connection['ipsec_site_connection']
|
||||
validator = self._get_validator()
|
||||
validator.assign_sensible_ipsec_sitecon_defaults(ipsec_sitecon)
|
||||
tenant_id = self._get_tenant_id_for_create(context, ipsec_sitecon)
|
||||
with context.session.begin(subtransactions=True):
|
||||
#Check permissions
|
||||
vpnservice_id = ipsec_sitecon['vpnservice_id']
|
||||
@ -166,7 +165,7 @@ class VPNPluginDb(vpnaas.VPNPluginBase, base_db.CommonDbMixin):
|
||||
|
||||
ipsec_site_conn_db = vpn_models.IPsecSiteConnection(
|
||||
id=uuidutils.generate_uuid(),
|
||||
tenant_id=tenant_id,
|
||||
tenant_id=ipsec_sitecon['tenant_id'],
|
||||
name=ipsec_sitecon['name'],
|
||||
description=ipsec_sitecon['description'],
|
||||
peer_address=ipsec_sitecon['peer_address'],
|
||||
@ -308,7 +307,6 @@ class VPNPluginDb(vpnaas.VPNPluginBase, base_db.CommonDbMixin):
|
||||
|
||||
def create_ikepolicy(self, context, ikepolicy):
|
||||
ike = ikepolicy['ikepolicy']
|
||||
tenant_id = self._get_tenant_id_for_create(context, ike)
|
||||
lifetime_info = ike['lifetime']
|
||||
lifetime_units = lifetime_info.get('units', 'seconds')
|
||||
lifetime_value = lifetime_info.get('value', 3600)
|
||||
@ -316,7 +314,7 @@ class VPNPluginDb(vpnaas.VPNPluginBase, base_db.CommonDbMixin):
|
||||
with context.session.begin(subtransactions=True):
|
||||
ike_db = vpn_models.IKEPolicy(
|
||||
id=uuidutils.generate_uuid(),
|
||||
tenant_id=tenant_id,
|
||||
tenant_id=ike['tenant_id'],
|
||||
name=ike['name'],
|
||||
description=ike['description'],
|
||||
auth_algorithm=ike['auth_algorithm'],
|
||||
@ -390,7 +388,6 @@ class VPNPluginDb(vpnaas.VPNPluginBase, base_db.CommonDbMixin):
|
||||
def create_ipsecpolicy(self, context, ipsecpolicy):
|
||||
ipsecp = ipsecpolicy['ipsecpolicy']
|
||||
validator = self._get_validator()
|
||||
tenant_id = self._get_tenant_id_for_create(context, ipsecp)
|
||||
lifetime_info = ipsecp['lifetime']
|
||||
lifetime_units = lifetime_info.get('units', 'seconds')
|
||||
lifetime_value = lifetime_info.get('value', 3600)
|
||||
@ -399,7 +396,7 @@ class VPNPluginDb(vpnaas.VPNPluginBase, base_db.CommonDbMixin):
|
||||
validator.validate_ipsec_policy(context, ipsecp)
|
||||
ipsecp_db = vpn_models.IPsecPolicy(
|
||||
id=uuidutils.generate_uuid(),
|
||||
tenant_id=tenant_id,
|
||||
tenant_id=ipsecp['tenant_id'],
|
||||
name=ipsecp['name'],
|
||||
description=ipsecp['description'],
|
||||
transform_protocol=ipsecp['transform_protocol'],
|
||||
@ -466,13 +463,12 @@ class VPNPluginDb(vpnaas.VPNPluginBase, base_db.CommonDbMixin):
|
||||
|
||||
def create_vpnservice(self, context, vpnservice):
|
||||
vpns = vpnservice['vpnservice']
|
||||
tenant_id = self._get_tenant_id_for_create(context, vpns)
|
||||
validator = self._get_validator()
|
||||
with context.session.begin(subtransactions=True):
|
||||
validator.validate_vpnservice(context, vpns)
|
||||
vpnservice_db = vpn_models.VPNService(
|
||||
id=uuidutils.generate_uuid(),
|
||||
tenant_id=tenant_id,
|
||||
tenant_id=vpns['tenant_id'],
|
||||
name=vpns['name'],
|
||||
description=vpns['description'],
|
||||
subnet_id=vpns['subnet_id'],
|
||||
@ -574,13 +570,12 @@ class VPNPluginDb(vpnaas.VPNPluginBase, base_db.CommonDbMixin):
|
||||
|
||||
def create_endpoint_group(self, context, endpoint_group):
|
||||
group = endpoint_group['endpoint_group']
|
||||
tenant_id = self._get_tenant_id_for_create(context, group)
|
||||
validator = self._get_validator()
|
||||
with context.session.begin(subtransactions=True):
|
||||
validator.validate_endpoint_group(context, group)
|
||||
endpoint_group_db = vpn_models.VPNEndpointGroup(
|
||||
id=uuidutils.generate_uuid(),
|
||||
tenant_id=tenant_id,
|
||||
tenant_id=group['tenant_id'],
|
||||
name=group['name'],
|
||||
description=group['description'],
|
||||
endpoint_type=group['type'])
|
||||
|
@ -1752,7 +1752,8 @@ class TestVpnDatabase(base.NeutronDbPluginV2TestCase, NeutronResourcesMixin):
|
||||
|
||||
def prepare_service_info(self, private_subnet, router):
|
||||
subnet_id = private_subnet['id'] if private_subnet else None
|
||||
return {'vpnservice': {'name': 'my-service',
|
||||
return {'vpnservice': {'tenant_id': self.tenant_id,
|
||||
'name': 'my-service',
|
||||
'description': 'new service',
|
||||
'subnet_id': subnet_id,
|
||||
'router_id': router['id'],
|
||||
@ -1984,7 +1985,8 @@ class TestVpnDatabase(base.NeutronDbPluginV2TestCase, NeutronResourcesMixin):
|
||||
self.context, _uuid(), group_updates)
|
||||
|
||||
def prepare_ike_policy_info(self):
|
||||
return {'ikepolicy': {'name': 'ike policy',
|
||||
return {'ikepolicy': {'tenant_id': self.tenant_id,
|
||||
'name': 'ike policy',
|
||||
'description': 'my ike policy',
|
||||
'auth_algorithm': 'sha1',
|
||||
'encryption_algorithm': 'aes-128',
|
||||
@ -2001,7 +2003,8 @@ class TestVpnDatabase(base.NeutronDbPluginV2TestCase, NeutronResourcesMixin):
|
||||
self.assertDictSupersetOf(expected, new_ike_policy)
|
||||
|
||||
def prepare_ipsec_policy_info(self):
|
||||
return {'ipsecpolicy': {'name': 'ipsec policy',
|
||||
return {'ipsecpolicy': {'tenant_id': self.tenant_id,
|
||||
'name': 'ipsec policy',
|
||||
'description': 'my ipsec policy',
|
||||
'auth_algorithm': 'sha1',
|
||||
'encryption_algorithm': 'aes-128',
|
||||
|
Loading…
x
Reference in New Issue
Block a user