summaryrefslogtreecommitdiffstats
path: root/openstack/common
diff options
context:
space:
mode:
authorPhil Day <philip.day@hp.com>2013-02-11 10:52:35 +0000
committerPhil Day <philip.day@hp.com>2013-02-12 13:06:52 +0000
commita94b9b4b25cd1e7d39ebef0b60f8c4367765777f (patch)
treee6b9b96ea2d861db7f943dd54bd855f7fce21490 /openstack/common
parente650657862b0d9c070f70fe078af56c55fb02e73 (diff)
downloadoslo-a94b9b4b25cd1e7d39ebef0b60f8c4367765777f.tar.gz
oslo-a94b9b4b25cd1e7d39ebef0b60f8c4367765777f.tar.xz
oslo-a94b9b4b25cd1e7d39ebef0b60f8c4367765777f.zip
to_primitive imposes what seems to be an arbitary data structure
depth of 3, but there is at least on case in Nova (Security group Rules) which requires a depth beyond this. https://bugs.launchpad.net/nova/+bug/1118608 Specifically security_group_rule_get_by_security_group returns a set of rules which have the structure: rule -> grantee_group -> Instance -> Instance_type Rather than just bumping the depth limit, which might break some other user of to_primitive we make it a specific parameter that defaults to the current value but can be over-ridden when required and log a warning when the depth is exceeded Change-Id: I1eaebd484e20cb2eae09a693289709973de9943c
Diffstat (limited to 'openstack/common')
-rw-r--r--openstack/common/jsonutils.py13
1 files changed, 10 insertions, 3 deletions
diff --git a/openstack/common/jsonutils.py b/openstack/common/jsonutils.py
index b7f6bcd..1ea7755 100644
--- a/openstack/common/jsonutils.py
+++ b/openstack/common/jsonutils.py
@@ -38,13 +38,17 @@ import functools
import inspect
import itertools
import json
+import logging
import xmlrpclib
+from openstack.common.gettextutils import _
from openstack.common import timeutils
+LOG = logging.getLogger(__name__)
+
def to_primitive(value, convert_instances=False, convert_datetime=True,
- level=0):
+ level=0, max_depth=3):
"""Convert a complex object into primitives.
Handy for JSON serialization. We can optionally handle instances,
@@ -80,7 +84,9 @@ def to_primitive(value, convert_instances=False, convert_datetime=True,
if getattr(value, '__module__', None) == 'mox':
return 'mock'
- if level > 3:
+ if level > max_depth:
+ LOG.error(_('Max serialization depth exceeded on object: %d %s'),
+ level, value)
return '?'
# The try block may not be necessary after the class check above,
@@ -89,7 +95,8 @@ def to_primitive(value, convert_instances=False, convert_datetime=True,
recursive = functools.partial(to_primitive,
convert_instances=convert_instances,
convert_datetime=convert_datetime,
- level=level)
+ level=level,
+ max_depth=max_depth)
# It's not clear why xmlrpclib created their own DateTime type, but
# for our purposes, make it a datetime type which is explicitly
# handled