]> review.fuel-infra Code Review - openstack-build/neutron-build.git/commitdiff
Optimize querying for security groups
authorSudheendra Murthy <sumurthy@ebay.com>
Fri, 2 May 2014 22:25:28 +0000 (15:25 -0700)
committerSudheendra Murthy <sumurthy@ebay.com>
Fri, 2 May 2014 22:30:29 +0000 (15:30 -0700)
In the check for all security groups on port belong to tenant,
add a filter to get security groups for the tenant which are in
common with the security groups of the port.

Change-Id: I66f31755525fca37f9dbce6fb43e475791f82495
Closes-Bug: #1315097

neutron/db/securitygroups_db.py

index 3ea6d9663c2e663f06ab2545434a8b0517113069..f620d26fbd533c700ac66bfa4bfdcff5b27ca19e 100644 (file)
@@ -517,13 +517,17 @@ class SecurityGroupDbMixin(ext_sg.SecurityGroupPluginBase):
         if p.get('device_owner') and p['device_owner'].startswith('network:'):
             return
 
-        valid_groups = self.get_security_groups(context, fields=['id'])
-        valid_group_map = dict((g['id'], g['id']) for g in valid_groups)
-        try:
-            return set([valid_group_map[sg_id]
-                        for sg_id in p.get(ext_sg.SECURITYGROUPS, [])])
-        except KeyError as e:
-            raise ext_sg.SecurityGroupNotFound(id=str(e))
+        port_sg = p.get(ext_sg.SECURITYGROUPS, [])
+        valid_groups = set(g['id'] for g in
+                           self.get_security_groups(context, fields=['id'],
+                                                    filters={'id': port_sg}))
+
+        requested_groups = set(port_sg)
+        port_sg_missing = requested_groups - valid_groups
+        if port_sg_missing:
+            raise ext_sg.SecurityGroupNotFound(id=str(port_sg_missing[0]))
+
+        return requested_groups
 
     def _ensure_default_security_group_on_port(self, context, port):
         # we don't apply security groups for dhcp, router