diff options
| author | Phil Day <philip.day@hp.com> | 2013-02-11 10:52:35 +0000 |
|---|---|---|
| committer | Phil Day <philip.day@hp.com> | 2013-02-12 13:06:52 +0000 |
| commit | a94b9b4b25cd1e7d39ebef0b60f8c4367765777f (patch) | |
| tree | e6b9b96ea2d861db7f943dd54bd855f7fce21490 /openstack/common/plugin/pluginmanager.py | |
| parent | e650657862b0d9c070f70fe078af56c55fb02e73 (diff) | |
| download | oslo-a94b9b4b25cd1e7d39ebef0b60f8c4367765777f.tar.gz oslo-a94b9b4b25cd1e7d39ebef0b60f8c4367765777f.tar.xz oslo-a94b9b4b25cd1e7d39ebef0b60f8c4367765777f.zip | |
to_primitive imposes what seems to be an arbitary data structure
depth of 3, but there is at least on case in Nova (Security
group Rules) which requires a depth beyond this.
https://bugs.launchpad.net/nova/+bug/1118608
Specifically security_group_rule_get_by_security_group
returns a set of rules which have the structure:
rule -> grantee_group -> Instance -> Instance_type
Rather than just bumping the depth limit, which might break some
other user of to_primitive we make it a specific parameter that
defaults to the current value but can be over-ridden when
required and log a warning when the depth is exceeded
Change-Id: I1eaebd484e20cb2eae09a693289709973de9943c
Diffstat (limited to 'openstack/common/plugin/pluginmanager.py')
0 files changed, 0 insertions, 0 deletions
