)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"change_message_id":"954670d44b11b058b307446b579c6fbf1c18c1d8","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":1,"id":"5cd4d0e4_e40d886a","updated":"2023-03-01 15:39:29.000000000","message":"FYI, since I\u0027m touching cinder things","commit_id":"bef234336f6d7f1b771976de3e05c2b2cfea6952"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"ab51c6069572367b7410e66596ded66d0ca26b1c","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":1,"id":"e5ad023a_d4ac64de","updated":"2023-03-01 15:42:50.000000000","message":"IMHO, you miss an important point.","commit_id":"bef234336f6d7f1b771976de3e05c2b2cfea6952"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"e4352998f13d143be4c6f11e262fd06999f09be2","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":2,"id":"d5cf3a7d_466b8c50","updated":"2023-03-01 17:23:36.000000000","message":"lgtm","commit_id":"c6f803042044fcb340388564185151af2d8cdc5f"},{"author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"change_message_id":"e59475207b28408a0c74ba68e80730c848cfd12c","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":2,"id":"9ef30b1d_502e163f","updated":"2023-03-01 18:17:32.000000000","message":"we already made this change in tempest so +1","commit_id":"c6f803042044fcb340388564185151af2d8cdc5f"},{"author":{"_account_id":22873,"name":"Martin Kopec","email":"mkopec@redhat.com","username":"mkopec"},"change_message_id":"e45f0dfb6371994e452d75a50bc83dabab5db015","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"a6d7f086_b74718d7","updated":"2023-03-02 19:15:32.000000000","message":"good to go","commit_id":"8fdda79453c47886bed947dc7109bf0fbf0868e2"},{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"037231940d765733fc21536240570d0c698aea53","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"8167b577_78a1ce55","updated":"2023-03-01 22:07:18.000000000","message":"lgtm","commit_id":"8fdda79453c47886bed947dc7109bf0fbf0868e2"}],"projects/70_cinder/resources.sh":[{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"ab51c6069572367b7410e66596ded66d0ca26b1c","unresolved":true,"context_lines":[{"line_number":118,"context_line":"    openstack security group rule create --proto tcp --dst-port 22 $CINDER_USER"},{"line_number":119,"context_line":""},{"line_number":120,"context_line":"    # create key pairs for access"},{"line_number":121,"context_line":"    ssh-keygen -f $CINDER_KEY_FILE -N \u0027\u0027"},{"line_number":122,"context_line":"    openstack keypair create $CINDER_KEY --public-key $CINDER_KEY_FILE"},{"line_number":123,"context_line":""},{"line_number":124,"context_line":"    # Create a bootable volume"}],"source_content_type":"text/x-sh","patch_set":1,"id":"a68f37a2_cefb4f87","line":121,"updated":"2023-03-01 15:42:50.000000000","message":"that won\u0027t fully solve the problem that is raised by :\n 2023-02-28 20:56:22.100 | sign_and_send_pubkey: no mutual signature supported https://storage.gra.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_f59/875773/3/check/grenade-skip-level-continuous/f597bdf/controller/logs/grenade.sh_log.txt\n \nYou need to specify a new key type like \n\n ssh-keygen -t ecdsa","commit_id":"bef234336f6d7f1b771976de3e05c2b2cfea6952"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"e4352998f13d143be4c6f11e262fd06999f09be2","unresolved":false,"context_lines":[{"line_number":118,"context_line":"    openstack security group rule create --proto tcp --dst-port 22 $CINDER_USER"},{"line_number":119,"context_line":""},{"line_number":120,"context_line":"    # create key pairs for access"},{"line_number":121,"context_line":"    ssh-keygen -f $CINDER_KEY_FILE -N \u0027\u0027"},{"line_number":122,"context_line":"    openstack keypair create $CINDER_KEY --public-key $CINDER_KEY_FILE"},{"line_number":123,"context_line":""},{"line_number":124,"context_line":"    # Create a bootable volume"}],"source_content_type":"text/x-sh","patch_set":1,"id":"ca1b69ff_d6228483","line":121,"in_reply_to":"2e154950_3ad51687","updated":"2023-03-01 17:23:36.000000000","message":"Ack","commit_id":"bef234336f6d7f1b771976de3e05c2b2cfea6952"},{"author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"change_message_id":"144cc4c0b4f0eaa97d77506b6291d937cd167207","unresolved":true,"context_lines":[{"line_number":118,"context_line":"    openstack security group rule create --proto tcp --dst-port 22 $CINDER_USER"},{"line_number":119,"context_line":""},{"line_number":120,"context_line":"    # create key pairs for access"},{"line_number":121,"context_line":"    ssh-keygen -f $CINDER_KEY_FILE -N \u0027\u0027"},{"line_number":122,"context_line":"    openstack keypair create $CINDER_KEY --public-key $CINDER_KEY_FILE"},{"line_number":123,"context_line":""},{"line_number":124,"context_line":"    # Create a bootable volume"}],"source_content_type":"text/x-sh","patch_set":1,"id":"2e154950_3ad51687","line":121,"in_reply_to":"a68f37a2_cefb4f87","updated":"2023-03-01 15:46:38.000000000","message":"Yeah, thanks, I thought the default changed when they changed the default to not allow RSA keys. I dunno why their defaults wouldn\u0027t match, but alas :)","commit_id":"bef234336f6d7f1b771976de3e05c2b2cfea6952"}]}
