)]}'
{"id":"openstack%2Fglance-tempest-plugin~882363","triplet_id":"openstack%2Fglance-tempest-plugin~master~Ic6c09ced0eca03d0966154d3d7c6dfe1c38c3b13","project":"openstack/glance-tempest-plugin","branch":"master","topic":"glance-tempest-plugin-branchless","attention_set":{},"removed_from_attention_set":{"8556":{"account":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"last_update":"2023-05-08 19:37:54.000000000","reason":"Change was submitted"}},"hashtags":[],"change_id":"Ic6c09ced0eca03d0966154d3d7c6dfe1c38c3b13","subject":"Assert on system scope permission based on supported flag","status":"MERGED","created":"2023-05-04 22:34:10.000000000","updated":"2023-05-08 19:37:54.000000000","submitted":"2023-05-08 19:37:54.000000000","submitter":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"total_comment_count":1,"unresolved_comment_count":0,"has_review_started":true,"submission_id":"882363-glance-tempest-plugin-branchless","meta_rev_id":"20a40ecdc9a181b14cf8fce8954a33da7e95724c","_number":882363,"virtual_id_number":882363,"owner":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"actions":{},"labels":{"Verified":{"approved":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"all":[{"tag":"autogenerated:zuul:gate","value":2,"date":"2023-05-08 19:37:54.000000000","permitted_voting_range":{"min":2,"max":2},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"}],"values":{"-2":"Fails","-1":"Doesn\u0027t seem to work"," 0":"No score","+1":"Works for me","+2":"Verified"},"description":"","default_value":0,"optional":true},"Code-Review":{"approved":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"all":[{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":2,"date":"2023-05-08 18:55:14.000000000","permitted_voting_range":{"min":2,"max":2},"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":2,"date":"2023-05-08 18:03:39.000000000","permitted_voting_range":{"min":2,"max":2},"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"}],"values":{"-2":"Do not merge","-1":"This patch needs further work before it can be merged"," 0":"No score","+1":"Looks good to me, but someone else must approve","+2":"Looks good to me (core reviewer)"},"description":"","default_value":0,"optional":true},"Workflow":{"approved":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"all":[{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":1,"date":"2023-05-08 18:55:14.000000000","permitted_voting_range":{"min":1,"max":1},"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"}],"values":{"-1":"Work in progress"," 0":"Ready for reviews","+1":"Approved"},"description":"","default_value":0,"optional":true},"Review-Priority":{"all":[{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"}],"values":{"-1":"Branch Freeze"," 0":"No Priority","+1":"Important Change","+2":"Gate Blocker Fix / Urgent Change"},"description":"","default_value":0,"optional":true}},"removable_reviewers":[],"reviewers":{"REVIEWER":[{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"},{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]}]},"pending_reviewers":{},"reviewer_updates":[{"updated":"2023-05-04 23:13:33.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2023-05-08 18:03:39.000000000","updated_by":{"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"},"reviewer":{"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"},"state":"REVIEWER"},{"updated":"2023-05-08 18:55:14.000000000","updated_by":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"reviewer":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"state":"REVIEWER"}],"messages":[{"id":"42ee683bd1a2d5f76698023bccff91f7c5b6bf2f","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"date":"2023-05-04 22:34:10.000000000","message":"Uploaded patch set 1.","accounts_in_message":[],"_revision_number":1},{"id":"78b49295b1f09aefed6790342f5a65af9ee081d6","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"date":"2023-05-04 22:34:43.000000000","message":"Patch Set 2: Patch Set 1 was rebased","accounts_in_message":[],"_revision_number":2},{"id":"0b29f29fd76a2d859d5ec8301404e9060b05c7b3","tag":"autogenerated:gerrit:setTopic","author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"date":"2023-05-04 22:35:10.000000000","message":"Topic set to glance-tempest-plugin-branchless","accounts_in_message":[],"_revision_number":2},{"id":"b9bed2876af2c3c5526ad8c74ca221955d3e163e","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2023-05-04 23:13:33.000000000","message":"Patch Set 2: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\nhttps://zuul.opendev.org/t/openstack/buildset/e523be66a98c4ad5bf19562039bcfbc7\n\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/d26f4c9cd0904f56a3961b49e2015dcb : SUCCESS in 2m 14s\n- glance-secure-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/0914b2200b104ac596c49f1edb44b87f : FAILURE in 33m 11s\n- glance-legacy-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/a1e15bc4213c4b7a9380dcc7f2e6cc4c : FAILURE in 33m 00s","accounts_in_message":[],"_revision_number":2},{"id":"435b042ca2973dbb94a5d49a71919773d262e0fc","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"date":"2023-05-05 00:19:51.000000000","message":"Uploaded patch set 3.\n\nOutdated Votes:\n* Verified-1\n","accounts_in_message":[],"_revision_number":3},{"id":"288527bce8111b096d358b361ba6d56a16b0648c","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2023-05-05 00:59:58.000000000","message":"Patch Set 3: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\nhttps://zuul.opendev.org/t/openstack/buildset/f09b1101042d482cbfe843c4c0bfce1c\n\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/d0368ab3d43346acadbcd93ef205a6f6 : SUCCESS in 1m 58s\n- glance-secure-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/4099e46e128b4afb89d1ed8dc145cf4b : FAILURE in 32m 02s\n- glance-legacy-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/1f3e2abde4ff4a7fabc53765d0cf71eb : FAILURE in 34m 35s","accounts_in_message":[],"_revision_number":3},{"id":"c352890f32f929b579aaf69feaf33b9c7e9b940c","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"date":"2023-05-05 02:58:35.000000000","message":"Uploaded patch set 4.\n\nOutdated Votes:\n* Verified-1\n","accounts_in_message":[],"_revision_number":4},{"id":"b138f410afd5d2b1913265cbecceeda08721e8ad","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2023-05-05 03:48:04.000000000","message":"Patch Set 4: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/3fe900835bf44f4ab301d23f20fbf3da\n\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/44fcbef3a72547d882fcffd397e8ce55 : SUCCESS in 2m 27s\n- glance-secure-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/0b1daa7afb764340bae71d53214a28fa : SUCCESS in 37m 30s\n- glance-legacy-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/2dbf8b1b91204df38b0343a647a8f0a3 : SUCCESS in 41m 31s","accounts_in_message":[],"_revision_number":4},{"id":"7deb519815d57622ed6f52471af386338f48f3eb","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"date":"2023-05-06 00:54:51.000000000","message":"Uploaded patch set 5.\n\nOutdated Votes:\n* Verified+1\n","accounts_in_message":[],"_revision_number":5},{"id":"a54ddfeca5fcf76b2c60b11beb71ed036a78b692","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2023-05-06 01:21:09.000000000","message":"Patch Set 5: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/ffa5961b33f544f594f46278c7935972\n\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/e3e6b7d7023c40ec9c992aee69ebc5e0 : SUCCESS in 2m 15s\n- glance-secure-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/f8a11e5029384093ad36e97a10abdb6a : SUCCESS in 22m 50s\n- glance-legacy-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/a0793b31bda942f79ca953c621eeeabb : SUCCESS in 22m 52s","accounts_in_message":[],"_revision_number":5},{"id":"98ab196b55df66bd7da09aa7b0c33a2864124e5e","author":{"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"},"date":"2023-05-08 18:03:39.000000000","message":"Patch Set 5: Code-Review+2\n\n(1 comment)","accounts_in_message":[],"_revision_number":5},{"id":"946819b06e31c59e00ea1cf58da165b127ec49a9","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2023-05-08 18:55:14.000000000","message":"Patch Set 5: Code-Review+2 Workflow+1","accounts_in_message":[],"_revision_number":5},{"id":"388e1d2690bc648a2d62f451da685c2bb93dacb3","tag":"autogenerated:zuul:gate","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2023-05-08 18:55:41.000000000","message":"Patch Set 5: -Verified\n\nStarting gate jobs.","accounts_in_message":[],"_revision_number":5},{"id":"9ebbb970806143a25ebbf3093af9fcbce49cb9ac","tag":"autogenerated:zuul:gate","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2023-05-08 19:37:54.000000000","message":"Patch Set 5: Verified+2\n\nBuild succeeded (gate pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/6a9fdc262423401aa5d14b4c86feb82f\n\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/e5d83162912344a5ba49ebe6c15dfd20 : SUCCESS in 2m 12s\n- glance-secure-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/ae3fd4931f0d4a268ef2090ac2d5ca1b : SUCCESS in 37m 38s\n- glance-legacy-rbac-protection-functional https://zuul.opendev.org/t/openstack/build/e7c8a5d166554bb29ad5227fffab5cc8 : SUCCESS in 33m 49s","accounts_in_message":[],"_revision_number":5},{"id":"20a40ecdc9a181b14cf8fce8954a33da7e95724c","tag":"autogenerated:gerrit:merged","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2023-05-08 19:37:54.000000000","message":"Change has been successfully merged","accounts_in_message":[],"_revision_number":5}],"current_revision_number":5,"current_revision":"a7f175407580e6bf6943d567a6b663aa9bdcb670","revisions":{"dcaefbbf135e89f3e684db01cdd995a4efd11996":{"kind":"REWORK","_number":1,"created":"2023-05-04 22:34:10.000000000","uploader":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"ref":"refs/changes/63/882363/1","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/glance-tempest-plugin","ref":"refs/changes/63/882363/1","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/1 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/1 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/1 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/1"}}},"commit":{"parents":[{"commit":"6d449ce39197d4ec4a5381e75dda572858f60137","subject":"Use glance-tempest-plugin master version to test stable/yoga/xena","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/6d449ce39197d4ec4a5381e75dda572858f60137"}]}],"author":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-04 22:25:35.000000000","tz":-300},"committer":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-04 22:27:52.000000000","tz":-300},"subject":"Do not test system scope negative test if it is supported","message":"Do not test system scope negative test if it is supported\n\nsystem scope is dropped from API policy in zed release\n- https://review.opendev.org/c/openstack/glance/+/855435\n\nand so does we addded some assert in glance-tempest-plugin rbac\ntests for system scope permissions\n- https://review.opendev.org/c/openstack/glance-tempest-plugin/+/855440\n\nAs glance-tempest-plugins should work on stable/xena onwards, we need to\nmake sure those system scope not allowed testing is done only\nfor stable/zed onwards where it is dropped.\n\nThis adds the config option and based on that assert on system scope\npermissions. This config flag will be set as True for \u003c\u003dstable/yoga\nso that these asserts can be skipped.\n\nChange-Id: Ic6c09ced0eca03d0966154d3d7c6dfe1c38c3b13\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/dcaefbbf135e89f3e684db01cdd995a4efd11996"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/dcaefbbf135e89f3e684db01cdd995a4efd11996"}]},"branch":"refs/heads/master"},"ececbc34c0e23547b5bd4dcda414e2dd5727e774":{"kind":"TRIVIAL_REBASE","_number":2,"created":"2023-05-04 22:34:43.000000000","uploader":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"ref":"refs/changes/63/882363/2","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/glance-tempest-plugin","ref":"refs/changes/63/882363/2","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/2 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/2 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/2 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/2"}}},"commit":{"parents":[{"commit":"eec965627283aba555ff593645ff8551be41efd4","subject":"Make rbac functional job voting","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/eec965627283aba555ff593645ff8551be41efd4"}]}],"author":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-04 22:25:35.000000000","tz":-300},"committer":{"name":"Ghanshyam","email":"gmann@ghanshyammann.com","date":"2023-05-04 22:34:43.000000000","tz":0},"subject":"Do not test system scope negative test if it is supported","message":"Do not test system scope negative test if it is supported\n\nsystem scope is dropped from API policy in zed release\n- https://review.opendev.org/c/openstack/glance/+/855435\n\nand so does we addded some assert in glance-tempest-plugin rbac\ntests for system scope permissions\n- https://review.opendev.org/c/openstack/glance-tempest-plugin/+/855440\n\nAs glance-tempest-plugins should work on stable/xena onwards, we need to\nmake sure those system scope not allowed testing is done only\nfor stable/zed onwards where it is dropped.\n\nThis adds the config option and based on that assert on system scope\npermissions. This config flag will be set as True for \u003c\u003dstable/yoga\nso that these asserts can be skipped.\n\nChange-Id: Ic6c09ced0eca03d0966154d3d7c6dfe1c38c3b13\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/ececbc34c0e23547b5bd4dcda414e2dd5727e774"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/ececbc34c0e23547b5bd4dcda414e2dd5727e774"}]},"branch":"refs/heads/master","description":"Rebase"},"f8d460662485fb180c8ba21a069fb75dcb1f5986":{"kind":"REWORK","_number":3,"created":"2023-05-05 00:19:51.000000000","uploader":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"ref":"refs/changes/63/882363/3","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/glance-tempest-plugin","ref":"refs/changes/63/882363/3","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/3 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/3 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/3 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/3"}}},"commit":{"parents":[{"commit":"eec965627283aba555ff593645ff8551be41efd4","subject":"Make rbac functional job voting","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/eec965627283aba555ff593645ff8551be41efd4"}]}],"author":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-04 22:25:35.000000000","tz":-300},"committer":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-05 00:19:44.000000000","tz":-300},"subject":"Do not test system scope negative test if it is supported","message":"Do not test system scope negative test if it is supported\n\nsystem scope is dropped from API policy in zed release\n- https://review.opendev.org/c/openstack/glance/+/855435\n\nand so does we addded some assert in glance-tempest-plugin rbac\ntests for system scope permissions\n- https://review.opendev.org/c/openstack/glance-tempest-plugin/+/855440\n\nAs glance-tempest-plugins should work on stable/xena onwards, we need to\nmake sure those system scope not allowed testing is done only\nfor stable/zed onwards where it is dropped.\n\nThis adds the config option and based on that assert on system scope\npermissions. This config flag will be set as True for \u003c\u003dstable/yoga\nso that these asserts can be skipped.\n\nChange-Id: Ic6c09ced0eca03d0966154d3d7c6dfe1c38c3b13\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/f8d460662485fb180c8ba21a069fb75dcb1f5986"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/f8d460662485fb180c8ba21a069fb75dcb1f5986"}]},"branch":"refs/heads/master"},"bbf4061423fb0c578e0127a1cc7eccf12b1b4c79":{"kind":"REWORK","_number":4,"created":"2023-05-05 02:58:35.000000000","uploader":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"ref":"refs/changes/63/882363/4","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/glance-tempest-plugin","ref":"refs/changes/63/882363/4","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/4 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/4 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/4 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/4"}}},"commit":{"parents":[{"commit":"eec965627283aba555ff593645ff8551be41efd4","subject":"Make rbac functional job voting","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/eec965627283aba555ff593645ff8551be41efd4"}]}],"author":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-04 22:25:35.000000000","tz":-300},"committer":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-05 02:58:26.000000000","tz":-300},"subject":"Do not test system scope negative test if it is supported","message":"Do not test system scope negative test if it is supported\n\nsystem scope is dropped from API policy in zed release\n- https://review.opendev.org/c/openstack/glance/+/855435\n\nand so does we addded some assert in glance-tempest-plugin rbac\ntests for system scope permissions\n- https://review.opendev.org/c/openstack/glance-tempest-plugin/+/855440\n\nAs glance-tempest-plugins should work on stable/xena onwards, we need to\nmake sure those system scope not allowed testing is done only\nfor stable/zed onwards where it is dropped.\n\nThis adds the config option and based on that assert on system scope\npermissions. This config flag will be set as True for \u003c\u003dstable/yoga\nso that these asserts can be skipped.\n\nChange-Id: Ic6c09ced0eca03d0966154d3d7c6dfe1c38c3b13\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/bbf4061423fb0c578e0127a1cc7eccf12b1b4c79"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/bbf4061423fb0c578e0127a1cc7eccf12b1b4c79"}]},"branch":"refs/heads/master"},"a7f175407580e6bf6943d567a6b663aa9bdcb670":{"kind":"REWORK","_number":5,"created":"2023-05-06 00:54:51.000000000","uploader":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"ref":"refs/changes/63/882363/5","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/glance-tempest-plugin","ref":"refs/changes/63/882363/5","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/5 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/5 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/5 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/glance-tempest-plugin refs/changes/63/882363/5"}}},"commit":{"parents":[{"commit":"eec965627283aba555ff593645ff8551be41efd4","subject":"Make rbac functional job voting","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/eec965627283aba555ff593645ff8551be41efd4"}]}],"author":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-04 22:25:35.000000000","tz":-300},"committer":{"name":"Ghanshyam Mann","email":"gmann@ghanshyammann.com","date":"2023-05-06 00:52:42.000000000","tz":-300},"subject":"Assert on system scope permission based on supported flag","message":"Assert on system scope permission based on supported flag\n\nsystem scope is dropped from API policy in zed release\n- https://review.opendev.org/c/openstack/glance/+/855435\n\nand so does we addded some assert in glance-tempest-plugin rbac\ntests for system scope permissions\n- https://review.opendev.org/c/openstack/glance-tempest-plugin/+/855440\n\nAs glance-tempest-plugins should work on stable/xena onwards, we need to\nmake sure those system scope not allowed testing is done only\nfor stable/zed onwards where it is dropped.\n\nThis adds the config option and based on that assert on system scope\npermissions. This config flag will be set as True for \u003c\u003dstable/yoga\nso that these asserts can be skipped.\n\nChange-Id: Ic6c09ced0eca03d0966154d3d7c6dfe1c38c3b13\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/a7f175407580e6bf6943d567a6b663aa9bdcb670"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/glance-tempest-plugin/commit/a7f175407580e6bf6943d567a6b663aa9bdcb670"}]},"branch":"refs/heads/master"}},"requirements":[],"submit_records":[{"rule_name":"gerrit~DefaultSubmitRule","status":"CLOSED","labels":[{"label":"Verified","status":"MAY","applied_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]}},{"label":"Code-Review","status":"MAY","applied_by":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"}},{"label":"Workflow","status":"MAY","applied_by":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"}},{"label":"Review-Priority","status":"MAY"}]}],"submit_requirements":[{"name":"Verified","description":"Verified in gate by CI","status":"SATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Verified\u003dMAX AND -label:Verified\u003dMIN","fulfilled":true,"status":"PASS","passing_atoms":["label:Verified\u003dMAX"],"failing_atoms":["label:Verified\u003dMIN"],"atom_explanations":{}}},{"name":"Code-Review","description":"Code reviewed by core reviewer","status":"SATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Code-Review\u003dMAX AND -label:Code-Review\u003dMIN","fulfilled":true,"status":"PASS","passing_atoms":["label:Code-Review\u003dMAX"],"failing_atoms":["label:Code-Review\u003dMIN"],"atom_explanations":{}}},{"name":"Review-Priority","description":"Review priority","status":"SATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"-label:Review-Priority\u003dMIN","fulfilled":true,"status":"PASS","passing_atoms":[],"failing_atoms":["label:Review-Priority\u003dMIN"],"atom_explanations":{}}},{"name":"Workflow","description":"Approved for gate by core reviewer","status":"SATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Workflow\u003dMAX AND -label:Workflow\u003dMIN","fulfilled":true,"status":"PASS","passing_atoms":["label:Workflow\u003dMAX"],"failing_atoms":["label:Workflow\u003dMIN"],"atom_explanations":{}}}]}
