Rename context.tenant to context.project_id
During execution of the service we get deprecation warnings like DeprecationWarning: Property 'tenant' has moved to 'project_id' in version '2.6' and will be removed in version '3.0' So, it's reasonable to rename it until it's too late. Change-Id: I6030948c64d21d4799438c4c89e8ffbd999fcb94
This commit is contained in:
parent
b9652017ed
commit
6986efbd3e
@ -314,7 +314,7 @@ class ArtifactsController(api_versioning.VersionedResource):
|
||||
:param values: dict with artifact fields
|
||||
:return: definition of created artifact
|
||||
"""
|
||||
if req.context.tenant is None or req.context.read_only:
|
||||
if req.context.project_id is None or req.context.read_only:
|
||||
msg = _("It's forbidden to anonymous users to create artifacts.")
|
||||
raise exc.Forbidden(msg)
|
||||
if not values.get('name'):
|
||||
|
@ -386,11 +386,11 @@ def _apply_query_base_filters(query, context):
|
||||
return query
|
||||
|
||||
# If anonymous user, return only public artifacts.
|
||||
# However, if context.tenant has a value, return both
|
||||
# However, if context.project_id has a value, return both
|
||||
# public and private artifacts of the owner.
|
||||
if context.tenant is not None:
|
||||
if context.project_id is not None:
|
||||
query = query.filter(
|
||||
or_(models.Artifact.owner == context.tenant,
|
||||
or_(models.Artifact.owner == context.project_id,
|
||||
models.Artifact.visibility == 'public'))
|
||||
else:
|
||||
query = query.filter(
|
||||
@ -592,7 +592,7 @@ def _do_blobs(artifact, new_blobs):
|
||||
def count_artifact_number(context, session, type_name=None):
|
||||
"""Return a number of artifacts for tenant."""
|
||||
query = session.query(func.count(models.Artifact.id)).filter(
|
||||
models.Artifact.owner == context.tenant)
|
||||
models.Artifact.owner == context.project_id)
|
||||
if type_name is not None:
|
||||
query = query.filter(models.Artifact.type_name == type_name)
|
||||
return query.order_by(None).scalar() or 0
|
||||
@ -603,7 +603,7 @@ def calculate_uploaded_data(context, session, type_name=None):
|
||||
query = session.query(
|
||||
func.sum(models.ArtifactBlob.size)).join(
|
||||
models.Artifact, aliased=True).filter(
|
||||
models.Artifact.owner == context.tenant)
|
||||
models.Artifact.owner == context.project_id)
|
||||
if type_name is not None:
|
||||
query = query.filter(models.Artifact.type_name == type_name)
|
||||
return query.order_by(None).scalar() or 0
|
||||
|
@ -232,14 +232,14 @@ class Engine(object):
|
||||
'id': uuidutils.generate_uuid(),
|
||||
'name': values.pop('name'),
|
||||
'version': version,
|
||||
'owner': context.tenant,
|
||||
'owner': context.project_id,
|
||||
'created_at': timeutils.utcnow(),
|
||||
'updated_at': timeutils.utcnow()
|
||||
}
|
||||
af = artifact_type.init_artifact(context, init_values)
|
||||
# acquire scoped lock and execute artifact create
|
||||
with self._create_scoped_lock(context, type_name, af.name,
|
||||
af.version, context.tenant):
|
||||
af.version, context.project_id):
|
||||
quota.verify_artifact_count(context, type_name)
|
||||
for field_name, value in values.items():
|
||||
if af.is_blob(field_name) or af.is_blob_dict(field_name):
|
||||
@ -735,7 +735,7 @@ class Engine(object):
|
||||
:param project_id: id of the project for which to show quotas
|
||||
:return: definition of requested quotas for the project
|
||||
"""
|
||||
project_id = project_id or context.tenant
|
||||
project_id = project_id or context.project_id
|
||||
action_name = "artifact:list_project_quotas"
|
||||
policy.authorize(action_name, {'project_id': project_id}, context)
|
||||
qs = self.config_quotas.copy()
|
||||
|
@ -32,7 +32,7 @@ def verify_artifact_count(context, type_name):
|
||||
CONF, 'artifact_type:' + type_name).max_artifact_number
|
||||
|
||||
# update limits if they were reassigned for project
|
||||
project_id = context.tenant
|
||||
project_id = context.project_id
|
||||
quotas = list_quotas(project_id).get(project_id, {})
|
||||
if 'max_artifact_number' in quotas:
|
||||
global_limit = quotas['max_artifact_number']
|
||||
@ -82,7 +82,7 @@ def verify_uploaded_data_amount(context, type_name, data_amount=None):
|
||||
type_limit = getattr(CONF, 'artifact_type:' + type_name).max_uploaded_data
|
||||
|
||||
# update limits if they were reassigned for project
|
||||
project_id = context.tenant
|
||||
project_id = context.project_id
|
||||
quotas = list_quotas(project_id).get(project_id, {})
|
||||
if 'max_uploaded_data' in quotas:
|
||||
global_limit = quotas['max_uploaded_data']
|
||||
|
@ -42,7 +42,7 @@ class TestContextMiddleware(base.BaseTestCase):
|
||||
self._build_middleware().process_request(req)
|
||||
self.assertEqual('token1', req.context.auth_token)
|
||||
self.assertEqual('user1', req.context.user)
|
||||
self.assertEqual('tenant1', req.context.tenant)
|
||||
self.assertEqual('tenant1', req.context.project_id)
|
||||
self.assertEqual(['role1', 'role2'], req.context.roles)
|
||||
|
||||
def test_is_admin_flag(self):
|
||||
@ -88,7 +88,7 @@ class TestContextMiddleware(base.BaseTestCase):
|
||||
middleware.process_request(req)
|
||||
self.assertIsNone(req.context.auth_token)
|
||||
self.assertIsNone(req.context.user)
|
||||
self.assertIsNone(req.context.tenant)
|
||||
self.assertIsNone(req.context.project_id)
|
||||
self.assertEqual([], req.context.roles)
|
||||
self.assertFalse(req.context.is_admin)
|
||||
self.assertTrue(req.context.read_only)
|
||||
|
@ -41,7 +41,7 @@ class TestTrustedAuthMiddleware(base.BaseTestCase):
|
||||
|
||||
self.assertEqual(token, req.context.auth_token)
|
||||
self.assertEqual('user1', req.context.user)
|
||||
self.assertEqual('tenant1', req.context.tenant)
|
||||
self.assertEqual('tenant1', req.context.project_id)
|
||||
self.assertEqual(['role1', 'role2'], req.context.roles)
|
||||
self.assertIn('service_catalog', req.context.to_dict())
|
||||
|
||||
@ -123,7 +123,7 @@ class TestTrustedAuthMiddleware(base.BaseTestCase):
|
||||
middleware.process_request(req)
|
||||
self.assertIsNone(req.context.auth_token)
|
||||
self.assertIsNone(req.context.user)
|
||||
self.assertIsNone(req.context.tenant)
|
||||
self.assertIsNone(req.context.project_id)
|
||||
self.assertEqual([], req.context.roles)
|
||||
self.assertFalse(req.context.is_admin)
|
||||
self.assertTrue(req.context.read_only)
|
||||
|
@ -427,13 +427,13 @@ class TestDynamicQuotas(base.BaseTestArtifactAPI):
|
||||
0, len(self.controller.list(user2_req, 'all')['artifacts']))
|
||||
|
||||
values = {
|
||||
user1_req.context.tenant: {
|
||||
user1_req.context.project_id: {
|
||||
"max_artifact_number:images": 3,
|
||||
"max_artifact_number:heat_templates": 15,
|
||||
"max_artifact_number:murano_packages": 10,
|
||||
"max_artifact_number": 10
|
||||
},
|
||||
user2_req.context.tenant: {
|
||||
user2_req.context.project_id: {
|
||||
"max_artifact_number": 10
|
||||
}
|
||||
}
|
||||
@ -475,7 +475,7 @@ class TestDynamicQuotas(base.BaseTestArtifactAPI):
|
||||
|
||||
# disable global limit for user1 and try to create 15 heat templates
|
||||
values = {
|
||||
user1_req.context.tenant: {
|
||||
user1_req.context.project_id: {
|
||||
"max_artifact_number:images": 3,
|
||||
"max_artifact_number:heat_templates": 15,
|
||||
"max_artifact_number:murano_packages": 10,
|
||||
@ -494,7 +494,7 @@ class TestDynamicQuotas(base.BaseTestArtifactAPI):
|
||||
|
||||
# disable type limit for heat templates and create 1 heat templates
|
||||
values = {
|
||||
user1_req.context.tenant: {
|
||||
user1_req.context.project_id: {
|
||||
"max_artifact_number:images": 3,
|
||||
"max_artifact_number:heat_templates": -1,
|
||||
"max_artifact_number:murano_packages": 10,
|
||||
@ -517,13 +517,13 @@ class TestDynamicQuotas(base.BaseTestArtifactAPI):
|
||||
0, len(self.controller.list(user2_req, 'all')['artifacts']))
|
||||
|
||||
values = {
|
||||
user1_req.context.tenant: {
|
||||
user1_req.context.project_id: {
|
||||
"max_uploaded_data:images": 1500,
|
||||
"max_uploaded_data:sample_artifact": 300,
|
||||
"max_uploaded_data:murano_packages": 1000,
|
||||
"max_uploaded_data": 1000
|
||||
},
|
||||
user2_req.context.tenant: {
|
||||
user2_req.context.project_id: {
|
||||
"max_uploaded_data": 1000
|
||||
}
|
||||
}
|
||||
@ -602,7 +602,7 @@ class TestDynamicQuotas(base.BaseTestArtifactAPI):
|
||||
|
||||
# disable global limit and try upload data from user1 again
|
||||
values = {
|
||||
user1_req.context.tenant: {
|
||||
user1_req.context.project_id: {
|
||||
"max_uploaded_data:images": 1500,
|
||||
"max_uploaded_data:sample_artifact": 300,
|
||||
"max_uploaded_data:murano_packages": 1000,
|
||||
@ -623,7 +623,7 @@ class TestDynamicQuotas(base.BaseTestArtifactAPI):
|
||||
|
||||
# disable type limit and try upload data from user1 again
|
||||
values = {
|
||||
user1_req.context.tenant: {
|
||||
user1_req.context.project_id: {
|
||||
"max_uploaded_data:images": -1,
|
||||
"max_uploaded_data:sample_artifact": 300,
|
||||
"max_uploaded_data:murano_packages": 1000,
|
||||
@ -641,15 +641,15 @@ class TestDynamicQuotas(base.BaseTestArtifactAPI):
|
||||
admin_req = self.get_fake_request(self.users['admin'])
|
||||
|
||||
values = {
|
||||
user1_req.context.tenant: {
|
||||
user1_req.context.project_id: {
|
||||
"max_uploaded_data:sample_artifact": 20,
|
||||
"max_uploaded_data": 5
|
||||
},
|
||||
user2_req.context.tenant: {
|
||||
user2_req.context.project_id: {
|
||||
"max_uploaded_data:sample_artifact": 7,
|
||||
"max_uploaded_data": -1
|
||||
},
|
||||
admin_req.context.tenant: {
|
||||
admin_req.context.project_id: {
|
||||
"max_uploaded_data:sample_artifact": -1,
|
||||
"max_uploaded_data": -1
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user