~niedbalski/ubuntu/vivid/neutron/fixes-1447803

« back to all changes in this revision

Viewing changes to neutron/db/migration/alembic_migrations/versions/3cb5d900c5de_security_groups.py

  • Committer: Package Import Robot
  • Author(s): James Page
  • Date: 2014-10-03 18:45:23 UTC
  • mfrom: (1.1.15)
  • Revision ID: package-import@ubuntu.com-20141003184523-4mt6dy1q3j8n30c9
Tags: 1:2014.2~rc1-0ubuntu1
* New upstream release candidate:
  - d/p/*: Refreshed.
  - d/control: Add python-requests-mock to BD's.
  - d/control: Align versioned requirements with upstream.
* Transition linuxbridge and openvswitch plugin users to modular
  layer 2 plugin (LP: #1323729):
  - d/control: Mark removed plugin packages as transitional, depend
    on neutron-plugin-ml2, mark oldlibs/extra.
  - d/neutron-plugin-{linuxbridge,openvswitch}.install: Drop.
  - d/control: Depend on neutron-plugin-ml2 for linuxbridge
    agent package.
  - d/neutron-plugin-linuxbridge-agent.upstart: Use ml2 plugin
    configuration files.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
# Copyright 2013 OpenStack Foundation
2
 
#
3
 
#    Licensed under the Apache License, Version 2.0 (the "License"); you may
4
 
#    not use this file except in compliance with the License. You may obtain
5
 
#    a copy of the License at
6
 
#
7
 
#         http://www.apache.org/licenses/LICENSE-2.0
8
 
#
9
 
#    Unless required by applicable law or agreed to in writing, software
10
 
#    distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
11
 
#    WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
12
 
#    License for the specific language governing permissions and limitations
13
 
#    under the License.
14
 
#
15
 
 
16
 
"""security_groups
17
 
 
18
 
Revision ID: 3cb5d900c5de
19
 
Revises: 48b6f43f7471
20
 
Create Date: 2013-01-08 00:13:43.051078
21
 
 
22
 
"""
23
 
 
24
 
# revision identifiers, used by Alembic.
25
 
revision = '3cb5d900c5de'
26
 
down_revision = '48b6f43f7471'
27
 
 
28
 
# Change to ['*'] if this migration applies to all plugins
29
 
 
30
 
migration_for_plugins = [
31
 
    'neutron.plugins.linuxbridge.lb_neutron_plugin.LinuxBridgePluginV2',
32
 
    'neutron.plugins.nicira.NeutronPlugin.NvpPluginV2',
33
 
    'neutron.plugins.nicira.NeutronServicePlugin.NvpAdvancedPlugin',
34
 
    'neutron.plugins.openvswitch.ovs_neutron_plugin.OVSNeutronPluginV2',
35
 
    'neutron.plugins.nec.nec_plugin.NECPluginV2',
36
 
    'neutron.plugins.ryu.ryu_neutron_plugin.RyuNeutronPluginV2',
37
 
    'neutron.plugins.vmware.plugin.NsxPlugin',
38
 
    'neutron.plugins.vmware.plugin.NsxServicePlugin',
39
 
    'neutron.plugins.oneconvergence.plugin.OneConvergencePluginV2',
40
 
]
41
 
 
42
 
from alembic import op
43
 
import sqlalchemy as sa
44
 
 
45
 
from neutron.db import migration
46
 
 
47
 
securitygrouprules_direction = sa.Enum('ingress', 'egress',
48
 
                                       name='securitygrouprules_direction')
49
 
 
50
 
 
51
 
def upgrade(active_plugins=None, options=None):
52
 
    if not migration.should_run(active_plugins, migration_for_plugins):
53
 
        return
54
 
 
55
 
    ### commands auto generated by Alembic - please adjust! ###
56
 
    op.create_table(
57
 
        'securitygroups',
58
 
        sa.Column('tenant_id', sa.String(length=255), nullable=True),
59
 
        sa.Column('id', sa.String(length=36), nullable=False),
60
 
        sa.Column('name', sa.String(length=255), nullable=True),
61
 
        sa.Column('description', sa.String(length=255), nullable=True),
62
 
        sa.PrimaryKeyConstraint('id')
63
 
    )
64
 
    op.create_table(
65
 
        'securitygrouprules',
66
 
        sa.Column('tenant_id', sa.String(length=255), nullable=True),
67
 
        sa.Column('id', sa.String(length=36), nullable=False),
68
 
        sa.Column('security_group_id', sa.String(length=36), nullable=False),
69
 
        sa.Column('remote_group_id', sa.String(length=36), nullable=True),
70
 
        sa.Column('direction', securitygrouprules_direction, nullable=True),
71
 
        sa.Column('ethertype', sa.String(length=40), nullable=True),
72
 
        sa.Column('protocol', sa.String(length=40), nullable=True),
73
 
        sa.Column('port_range_min', sa.Integer(), nullable=True),
74
 
        sa.Column('port_range_max', sa.Integer(), nullable=True),
75
 
        sa.Column('remote_ip_prefix', sa.String(length=255), nullable=True),
76
 
        sa.ForeignKeyConstraint(['security_group_id'], ['securitygroups.id'],
77
 
                                ondelete='CASCADE'),
78
 
        sa.ForeignKeyConstraint(['remote_group_id'], ['securitygroups.id'],
79
 
                                ondelete='CASCADE'),
80
 
        sa.PrimaryKeyConstraint('id')
81
 
    )
82
 
    op.create_table(
83
 
        'securitygroupportbindings',
84
 
        sa.Column('port_id', sa.String(length=36), nullable=False),
85
 
        sa.Column('security_group_id', sa.String(length=36), nullable=False),
86
 
        sa.ForeignKeyConstraint(['port_id'], ['ports.id'], ondelete='CASCADE'),
87
 
        sa.ForeignKeyConstraint(['security_group_id'], ['securitygroups.id']),
88
 
        sa.PrimaryKeyConstraint('port_id', 'security_group_id')
89
 
    )
90
 
    ### end Alembic commands ###
91
 
 
92
 
 
93
 
def downgrade(active_plugins=None, options=None):
94
 
    if not migration.should_run(active_plugins, migration_for_plugins):
95
 
        return
96
 
 
97
 
    ### commands auto generated by Alembic - please adjust! ###
98
 
    op.drop_table('securitygroupportbindings')
99
 
    op.drop_table('securitygrouprules')
100
 
    securitygrouprules_direction.drop(op.get_bind(), checkfirst=False)
101
 
    op.drop_table('securitygroups')
102
 
    ### end Alembic commands ###