)]}'
{"doc/source/admin/useful-image-properties.rst":[{"author":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"change_message_id":"0f07c9e0f1128b23449059f0de47afa6b6a8c88e","unresolved":false,"context_lines":[{"line_number":340,"context_line":"     - ``hw_disk_bus``"},{"line_number":341,"context_line":"     - Specifies the type of disk controller to attach disk devices to."},{"line_number":342,"context_line":"     - Options depend on the value of `nova\u0027s virt_type config option"},{"line_number":343,"context_line":"       \u003chttps://docs.openstack.org/nova/latest/configuration/config.html#libvirt.virt_type\u003e`_:"},{"line_number":344,"context_line":""},{"line_number":345,"context_line":"       * For ``qemu`` and ``kvm``: one of ``scsi``, ``virtio``,"},{"line_number":346,"context_line":"         ``uml``, ``xen``, ``ide``, ``usb``, or ``lxc``."}],"source_content_type":"text/x-rst","patch_set":2,"id":"5faad753_8814ca45","line":343,"range":{"start_line":343,"start_character":8,"end_line":343,"end_character":46},"updated":"2019-09-12 18:41:59.000000000","message":"Can we not :nova-doc: from here?\n\n[Later] Mebbe not, no openstack_projects in https://opendev.org/openstack/glance/src/branch/master/doc/source/conf.py\n\nBe nice to set that up.","commit_id":"b529057ed129f2c5fe12fb66b23189fbffad6301"},{"author":{"_account_id":2394,"name":"Adam Spiers","email":"aspiers@suse.com","username":"adam.spiers"},"change_message_id":"2eb0345123ffe0797f839bd5e4df3d4f5baaa8f5","unresolved":false,"context_lines":[{"line_number":340,"context_line":"     - ``hw_disk_bus``"},{"line_number":341,"context_line":"     - Specifies the type of disk controller to attach disk devices to."},{"line_number":342,"context_line":"     - Options depend on the value of `nova\u0027s virt_type config option"},{"line_number":343,"context_line":"       \u003chttps://docs.openstack.org/nova/latest/configuration/config.html#libvirt.virt_type\u003e`_:"},{"line_number":344,"context_line":""},{"line_number":345,"context_line":"       * For ``qemu`` and ``kvm``: one of ``scsi``, ``virtio``,"},{"line_number":346,"context_line":"         ``uml``, ``xen``, ``ide``, ``usb``, or ``lxc``."}],"source_content_type":"text/x-rst","patch_set":2,"id":"5faad753_88612a08","line":343,"range":{"start_line":343,"start_character":8,"end_line":343,"end_character":46},"in_reply_to":"5faad753_8814ca45","updated":"2019-09-12 18:58:52.000000000","message":"I\u0027ve just asked in #openstack-glance if there\u0027s any reason not to do that.","commit_id":"b529057ed129f2c5fe12fb66b23189fbffad6301"},{"author":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"change_message_id":"be48a491b40e7f3e888368085cf8032d6a010e85","unresolved":false,"context_lines":[{"line_number":340,"context_line":"     - ``hw_disk_bus``"},{"line_number":341,"context_line":"     - Specifies the type of disk controller to attach disk devices to."},{"line_number":342,"context_line":"     - Options depend on the value of `nova\u0027s virt_type config option"},{"line_number":343,"context_line":"       \u003chttps://docs.openstack.org/nova/latest/configuration/config.html#libvirt.virt_type\u003e`_:"},{"line_number":344,"context_line":""},{"line_number":345,"context_line":"       * For ``qemu`` and ``kvm``: one of ``scsi``, ``virtio``,"},{"line_number":346,"context_line":"         ``uml``, ``xen``, ``ide``, ``usb``, or ``lxc``."}],"source_content_type":"text/x-rst","patch_set":2,"id":"5faad753_c3962494","line":343,"range":{"start_line":343,"start_character":8,"end_line":343,"end_character":46},"in_reply_to":"5faad753_88612a08","updated":"2019-09-12 19:54:00.000000000","message":"Not in this patch","commit_id":"b529057ed129f2c5fe12fb66b23189fbffad6301"},{"author":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"change_message_id":"0f07c9e0f1128b23449059f0de47afa6b6a8c88e","unresolved":false,"context_lines":[{"line_number":355,"context_line":"   * - libvirt API driver"},{"line_number":356,"context_line":"     - ``hw_mem_encryption``"},{"line_number":357,"context_line":"     - Enables encryption of guest memory at the hardware level, if there are"},{"line_number":358,"context_line":"       compute hosts available which support this. Currently only AMD"},{"line_number":359,"context_line":"       SEV hardware is supported; see `nova\u0027s documentation on configuration of"},{"line_number":360,"context_line":"       the KVM hypervisor"},{"line_number":361,"context_line":"       \u003chttps://docs.openstack.org/nova/latest/admin/configuration/hypervisor-kvm.html#amd-sev-secure-encrypted-virtualization\u003e`_ for more details."},{"line_number":362,"context_line":"     - ``true`` or ``false`` (default)."}],"source_content_type":"text/x-rst","patch_set":2,"id":"5faad753_0878da8d","line":359,"range":{"start_line":358,"start_character":51,"end_line":359,"end_character":33},"updated":"2019-09-12 18:41:59.000000000","message":"IMO we should be conservative about how many places we say this. Especially think it should be omitted from this document, which we\u0027ll surely forget to update once MKTME is a thing. It\u0027s stated in the nova doc and conf help, which should be sufficient.\n\n(Ick, just realized the anchor is SEV-specific too, but that\u0027s less easy to deal with rn.)","commit_id":"b529057ed129f2c5fe12fb66b23189fbffad6301"},{"author":{"_account_id":2394,"name":"Adam Spiers","email":"aspiers@suse.com","username":"adam.spiers"},"change_message_id":"2eb0345123ffe0797f839bd5e4df3d4f5baaa8f5","unresolved":false,"context_lines":[{"line_number":355,"context_line":"   * - libvirt API driver"},{"line_number":356,"context_line":"     - ``hw_mem_encryption``"},{"line_number":357,"context_line":"     - Enables encryption of guest memory at the hardware level, if there are"},{"line_number":358,"context_line":"       compute hosts available which support this. Currently only AMD"},{"line_number":359,"context_line":"       SEV hardware is supported; see `nova\u0027s documentation on configuration of"},{"line_number":360,"context_line":"       the KVM hypervisor"},{"line_number":361,"context_line":"       \u003chttps://docs.openstack.org/nova/latest/admin/configuration/hypervisor-kvm.html#amd-sev-secure-encrypted-virtualization\u003e`_ for more details."},{"line_number":362,"context_line":"     - ``true`` or ``false`` (default)."}],"source_content_type":"text/x-rst","patch_set":2,"id":"5faad753_08c0dae0","line":359,"range":{"start_line":358,"start_character":51,"end_line":359,"end_character":33},"in_reply_to":"5faad753_0878da8d","updated":"2019-09-12 18:58:52.000000000","message":"Done","commit_id":"b529057ed129f2c5fe12fb66b23189fbffad6301"}],"etc/metadefs/compute-libvirt.json":[{"author":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"change_message_id":"0f07c9e0f1128b23449059f0de47afa6b6a8c88e","unresolved":false,"context_lines":[{"line_number":29,"context_line":"        },"},{"line_number":30,"context_line":"        \"mem_encryption\": {"},{"line_number":31,"context_line":"            \"title\": \"Hardware Memory Encryption\","},{"line_number":32,"context_line":"            \"description\": \"Enables encryption of guest memory at the hardware level, if there are compute hosts available which support this. Currently only AMD SEV hardware is supported; see https://docs.openstack.org/nova/latest/admin/configuration/hypervisor-kvm.html#amd-sev-secure-encrypted-virtualization for details.\","},{"line_number":33,"context_line":"            \"type\": \"string\","},{"line_number":34,"context_line":"            \"enum\": [\"true\", \"false\"]"},{"line_number":35,"context_line":"        }"}],"source_content_type":"application/json","patch_set":2,"id":"5faad753_886b6ab5","line":32,"range":{"start_line":32,"start_character":143,"end_line":32,"end_character":188},"updated":"2019-09-12 18:41:59.000000000","message":"ditto","commit_id":"b529057ed129f2c5fe12fb66b23189fbffad6301"},{"author":{"_account_id":2394,"name":"Adam Spiers","email":"aspiers@suse.com","username":"adam.spiers"},"change_message_id":"2eb0345123ffe0797f839bd5e4df3d4f5baaa8f5","unresolved":false,"context_lines":[{"line_number":29,"context_line":"        },"},{"line_number":30,"context_line":"        \"mem_encryption\": {"},{"line_number":31,"context_line":"            \"title\": \"Hardware Memory Encryption\","},{"line_number":32,"context_line":"            \"description\": \"Enables encryption of guest memory at the hardware level, if there are compute hosts available which support this. Currently only AMD SEV hardware is supported; see https://docs.openstack.org/nova/latest/admin/configuration/hypervisor-kvm.html#amd-sev-secure-encrypted-virtualization for details.\","},{"line_number":33,"context_line":"            \"type\": \"string\","},{"line_number":34,"context_line":"            \"enum\": [\"true\", \"false\"]"},{"line_number":35,"context_line":"        }"}],"source_content_type":"application/json","patch_set":2,"id":"5faad753_0833fa15","line":32,"range":{"start_line":32,"start_character":143,"end_line":32,"end_character":188},"in_reply_to":"5faad753_886b6ab5","updated":"2019-09-12 18:58:52.000000000","message":"Done","commit_id":"b529057ed129f2c5fe12fb66b23189fbffad6301"}]}
