)]}'
{"id":"openstack%2Fnova~682627","triplet_id":"openstack%2Fnova~master~Idd8b4640e3445fa2ede347d42aed895f6b0a2712","project":"openstack/nova","branch":"master","topic":"bp/allow-secure-boot-for-qemu-kvm-guests","hashtags":[],"change_id":"Idd8b4640e3445fa2ede347d42aed895f6b0a2712","subject":"libvirt: Auto-detect UEFI, secure boot support","status":"ABANDONED","created":"2019-09-17 11:58:18.000000000","updated":"2021-05-10 14:06:19.000000000","total_comment_count":0,"unresolved_comment_count":0,"has_review_started":true,"meta_rev_id":"1211fc68cb14ed1918a1a8de74188ab0eb945d8d","_number":682627,"virtual_id_number":682627,"owner":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"actions":{},"labels":{"Verified":{"recommended":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"all":[{"tag":"autogenerated:zuul:check","value":1,"date":"2021-02-16 03:19:27.000000000","permitted_voting_range":{"min":-2,"max":2},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},{"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"},{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},{"_account_id":16898,"name":"Virtuozzo CI","email":"virtuozzo6-ci@virtuozzo.com","username":"virtuozzo6-ci","tags":["SERVICE_USER"]},{"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},{"_account_id":16376,"name":"Intel NFV CI","email":"openstack-nfv-ci@intel.com","username":"intel-nfv-ci","tags":["SERVICE_USER"]},{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},{"_account_id":9008,"name":"VMware NSX CI","username":"vmwareminesweeper","tags":["SERVICE_USER"]},{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"}],"values":{"-2":"Fails","-1":"Doesn\u0027t seem to work"," 0":"No score","+1":"Works for me","+2":"Verified"},"description":"","value":1,"default_value":0,"optional":true},"Code-Review":{"all":[{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-2,"max":2},"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":16898,"name":"Virtuozzo CI","email":"virtuozzo6-ci@virtuozzo.com","username":"virtuozzo6-ci","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":16376,"name":"Intel NFV CI","email":"openstack-nfv-ci@intel.com","username":"intel-nfv-ci","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":9008,"name":"VMware NSX CI","username":"vmwareminesweeper","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"}],"values":{"-2":"Do not merge","-1":"This patch needs further work before it can be merged"," 0":"No score","+1":"Looks good to me, but someone else must approve","+2":"Looks good to me (core reviewer)"},"description":"","default_value":0,"optional":true},"Workflow":{"all":[{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},{"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"},{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},{"_account_id":16898,"name":"Virtuozzo CI","email":"virtuozzo6-ci@virtuozzo.com","username":"virtuozzo6-ci","tags":["SERVICE_USER"]},{"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},{"_account_id":16376,"name":"Intel NFV CI","email":"openstack-nfv-ci@intel.com","username":"intel-nfv-ci","tags":["SERVICE_USER"]},{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},{"_account_id":9008,"name":"VMware NSX CI","username":"vmwareminesweeper","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":0},"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"}],"values":{"-1":"Work in progress"," 0":"Ready for reviews","+1":"Approved"},"description":"","default_value":0,"optional":true},"Review-Priority":{"all":[{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":2},"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":16898,"name":"Virtuozzo CI","email":"virtuozzo6-ci@virtuozzo.com","username":"virtuozzo6-ci","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":16376,"name":"Intel NFV CI","email":"openstack-nfv-ci@intel.com","username":"intel-nfv-ci","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":9008,"name":"VMware NSX CI","username":"vmwareminesweeper","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"}],"values":{" 0":"Default Priority","+1":"Contributor Review Promise","+2":"Core Review Promise"},"description":"","default_value":0,"optional":true}},"removable_reviewers":[],"reviewers":{"CC":[{"_account_id":15941,"name":"DellEMC PowerFlex CI","email":"emc.scaleio.ci@emc.com","username":"emc-scaleio-ci","tags":["SERVICE_USER"]}],"REVIEWER":[{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},{"_account_id":9008,"name":"VMware NSX CI","username":"vmwareminesweeper","tags":["SERVICE_USER"]},{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},{"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},{"_account_id":16376,"name":"Intel NFV CI","email":"openstack-nfv-ci@intel.com","username":"intel-nfv-ci","tags":["SERVICE_USER"]},{"_account_id":16898,"name":"Virtuozzo CI","email":"virtuozzo6-ci@virtuozzo.com","username":"virtuozzo6-ci","tags":["SERVICE_USER"]},{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},{"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"}]},"pending_reviewers":{},"reviewer_updates":[{"updated":"2019-09-17 11:59:23.000000000","updated_by":{"_account_id":16376,"name":"Intel NFV CI","email":"openstack-nfv-ci@intel.com","username":"intel-nfv-ci","tags":["SERVICE_USER"]},"reviewer":{"_account_id":16376,"name":"Intel NFV CI","email":"openstack-nfv-ci@intel.com","username":"intel-nfv-ci","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2019-09-17 13:00:47.000000000","updated_by":{"_account_id":16898,"name":"Virtuozzo CI","email":"virtuozzo6-ci@virtuozzo.com","username":"virtuozzo6-ci","tags":["SERVICE_USER"]},"reviewer":{"_account_id":16898,"name":"Virtuozzo CI","email":"virtuozzo6-ci@virtuozzo.com","username":"virtuozzo6-ci","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2019-09-17 14:35:16.000000000","updated_by":{"_account_id":9008,"name":"VMware NSX CI","username":"vmwareminesweeper","tags":["SERVICE_USER"]},"reviewer":{"_account_id":9008,"name":"VMware NSX CI","username":"vmwareminesweeper","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2019-10-30 15:20:55.000000000","updated_by":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"reviewer":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"state":"REVIEWER"},{"updated":"2020-03-04 16:26:06.000000000","updated_by":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"reviewer":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"state":"REVIEWER"},{"updated":"2020-03-04 16:49:15.000000000","updated_by":{"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"},"reviewer":{"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"},"state":"REVIEWER"},{"updated":"2020-03-04 17:56:10.000000000","updated_by":{"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},"reviewer":{"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},"state":"REVIEWER"},{"updated":"2020-03-04 20:40:21.000000000","updated_by":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"reviewer":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2020-03-04 21:35:37.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2020-03-06 21:09:54.000000000","updated_by":{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},"reviewer":{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2020-04-13 07:58:14.000000000","updated_by":{"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},"reviewer":{"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2021-02-15 18:33:44.000000000","updated_by":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"reviewer":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"state":"REVIEWER"},{"updated":"2021-02-16 03:20:08.000000000","updated_by":{"_account_id":15941,"name":"DellEMC PowerFlex CI","email":"emc.scaleio.ci@emc.com","username":"emc-scaleio-ci","tags":["SERVICE_USER"]},"reviewer":{"_account_id":15941,"name":"DellEMC PowerFlex CI","email":"emc.scaleio.ci@emc.com","username":"emc-scaleio-ci","tags":["SERVICE_USER"]},"state":"CC"}],"messages":[{"id":"0584f517c3b263181b696defa7860ba86b5ea45b","author":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"date":"2019-09-17 11:58:18.000000000","message":"Uploaded patch set 1.","accounts_in_message":[],"_revision_number":1},{"id":"24bbcf3d985e59b9988595ba6351cf60281b9eab","author":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"date":"2019-09-17 11:58:52.000000000","message":"Patch Set 1: Workflow-1","accounts_in_message":[],"_revision_number":1},{"id":"cd697691c2387eb2ca862e5d6b2f29b644361575","author":{"_account_id":16376,"name":"Intel NFV CI","email":"openstack-nfv-ci@intel.com","username":"intel-nfv-ci","tags":["SERVICE_USER"]},"date":"2019-09-17 11:59:23.000000000","message":"Patch Set 1:\n\nBuild succeeded (check pipeline).\n\n- tempest-dsvm-intel-nfv-xenial tempest-dsvm-intel-nfv-xenial : SKIPPED (non-voting)\n- tempest-dsvm-multinode-ovsdpdk-nfv-networking-xenial tempest-dsvm-multinode-ovsdpdk-nfv-networking-xenial : SKIPPED (non-voting)\n- tempest-dsvm-ovsdpdk-nfv-networking-xenial tempest-dsvm-ovsdpdk-nfv-networking-xenial : SKIPPED (non-voting)","accounts_in_message":[],"_revision_number":1},{"id":"33974dbf000a2098abf32634b23b7db666a63fb4","author":{"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},"date":"2019-09-17 12:14:01.000000000","message":"Patch Set 1:\n\nTesting completed on the zVM Driver CI system check-nova pipeline and failed.  To recheck only the zVM driver plugins, submit a comment with only  zvm: recheck in the comment.. Contact information: zvmosci@us.ibm.com. For information see https://wiki.openstack.org/wiki/ZVMDriver.\n\n- check-nova-master http://extbasicopstackcilog01.podc.sl.edst.ibm.com/test_logs/jenkins-check-nova-master-37494 : FAILURE in 13m 40s","accounts_in_message":[],"_revision_number":1},{"id":"9d33d8d88d62dbf745223adc84242d61d86df447","author":{"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"},"date":"2019-09-17 12:33:55.000000000","message":"Patch Set 1:\n\nBuild failed.\n\n- pmem-tempest-plugin-filtered http://52.27.155.124/27/682627/1/check/pmem-tempest-plugin-filtered/328ef0c/ : FAILURE in 26m 35s","accounts_in_message":[],"_revision_number":1},{"id":"6ec68a5374d9e68e3665a4e165dcff4a1493a344","author":{"_account_id":16898,"name":"Virtuozzo CI","email":"virtuozzo6-ci@virtuozzo.com","username":"virtuozzo6-ci","tags":["SERVICE_USER"]},"date":"2019-09-17 13:00:47.000000000","message":"Patch Set 1:\n\nBuild failed\n\n- check-dsvm-tempest-vz7-exe-minimal http://openstack-3rd-party-virtuozzo-ci-logs.virtuozzo.com/27/682627/1/check/check-dsvm-tempest-vz7-exe-minimal/5ec27c0 : FAILURE in 17m 19s\n\nFor information, see https://wiki.openstack.org/wiki/ThirdPartySystems/Virtuozzo_CI Make the comment \u0027run-Virtuozzo CI\u0027 to recheck","accounts_in_message":[],"_revision_number":1},{"id":"58375a2d80b492565aba9953009c9f3c574c4a0f","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2019-09-17 14:10:58.000000000","message":"Patch Set 1:\n\nBuild failed. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm: recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-xenial https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/27/682627/1/check/tempest-dsvm-full-xenial/099126c/ : FAILURE in 2h 09m 10s\n- tempest-dsvm-full-xenial-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/27/682627/1/check/tempest-dsvm-full-xenial-py3/487f1d5/ : FAILURE in 1h 45m 29s (non-voting)\n- grenade-dsvm-xenial https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/27/682627/1/check/grenade-dsvm-xenial/e985088/ : FAILURE in 1h 44m 48s (non-voting)","accounts_in_message":[],"_revision_number":1},{"id":"9a053672cf2ca385d1fa1bf46ec990f590facac2","author":{"_account_id":9008,"name":"VMware NSX CI","username":"vmwareminesweeper","tags":["SERVICE_USER"]},"date":"2019-09-17 14:35:16.000000000","message":"Patch Set 1:\n\nBuild succeeded\n\n- dsvm-nova http://207.189.188.190/logs/27/682627/1/check-vote/ext-nova-zuul/f9705bd : SUCCESS in 59m 50s","accounts_in_message":[],"_revision_number":1},{"id":"e5a99d3830b2e0065dee9318340c6d759d98020e","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2019-09-17 16:12:18.000000000","message":"Patch Set 1:\n\nFor rechecking only on the Cloudbase Nova Hyper-V CI, add a review comment with run-Cloudbase Nova Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/682627/1 : FAILURE in 2h 30m 20s","accounts_in_message":[],"_revision_number":1},{"id":"2017ae4d2b4ed7123a9ee9ec90771e8e1196cacd","author":{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},"date":"2019-09-17 18:31:02.000000000","message":"Patch Set 1:\n\nBuild succeeded.\n\n- Nova-ML2-Sriov http://13.74.249.42/27/682627/1/check-nova/Nova-ML2-Sriov/2c84f6b : SUCCESS in 1h 25m 42s (non-voting)\n- Nova-MACVTAP-ML2-Sriov http://13.74.249.42/27/682627/1/check-nova/Nova-MACVTAP-ML2-Sriov/25be081 : FAILURE in 6m 24s (non-voting)\n\nTo re-run the job post \u0027recheck nova-mlnx\u0027 comment. For more information visit https://wiki.openstack.org/wiki/ThirdPartySystems/Mellanox_CI","accounts_in_message":[],"_revision_number":1},{"id":"02db378521a2675c61203a34504e6ef138277091","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-17 23:39:05.000000000","message":"Patch Set 1: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttp://docs.openstack.org/infra/manual/developers.html#automated-testing\n\n\n- grenade-py3 https://zuul.opendev.org/t/openstack/build/73ac280467a34a2cb85750d470e097ed : SUCCESS in 1h 03m 45s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/25a1c7bf48e449fd95dc50a8fea7ac49 : SUCCESS in 1h 33m 21s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/13ba5df728a04dd6ab752ff7f35db62a : SUCCESS in 17m 56s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/ed2b09a14bc44eb7838ea3abb782a655 : SUCCESS in 13m 29s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/9110940be8dc46d98ec76940a523d078 : FAILURE in 9m 10s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/be9fecbf43644aa4bb5b6f350bd01d77 : SUCCESS in 12m 45s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/b994388bfb9a4a35b8a9b112f4723319 : SUCCESS in 13m 15s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/29eade05656e43918cb71ac0a52296c4 : SUCCESS in 12m 16s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/2f9fabe104764d8392cdb5786b593f12 : SUCCESS in 10m 16s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/d1f708253696444594a1de48de854985 : SUCCESS in 56m 03s (non-voting)\n- devstack-plugin-ceph-tempest https://zuul.opendev.org/t/openstack/build/7277a6d4dcc7413e87d681ea780d2032 : SUCCESS in 1h 10m 11s (non-voting)\n- neutron-grenade-multinode https://zuul.opendev.org/t/openstack/build/2865b1ba55d74597be38ceebced0aed9 : SUCCESS in 1h 11m 07s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/5d195ed3dae542b29398374182fc542f : SUCCESS in 1h 18m 27s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/6172c2922fc84759b03298fe298fddf6 : SUCCESS in 58m 47s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/7968b78329d341ecab02fb3813e6c54e : SUCCESS in 56m 28s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/ad7991c274a9408c9f1211c705589239 : SUCCESS in 1h 37m 38s\n- nova-next https://zuul.opendev.org/t/openstack/build/3c92945ba52d4bd7b1580e331d7ae990 : SUCCESS in 1h 17m 01s\n- nova-tox-functional https://zuul.opendev.org/t/openstack/build/a2cabc52e0de4c1690aad500520fd8ea : SUCCESS in 19m 12s\n- nova-tox-functional-py36 https://zuul.opendev.org/t/openstack/build/c8ff75be702d47508df09c92a05f4add : SUCCESS in 21m 15s\n- tempest-slow-py3 https://zuul.opendev.org/t/openstack/build/570927a4d1a7446da4741f376b80e1f5 : SUCCESS in 2h 26m 55s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/df36b334206146abaa8b595d027fb589 : SUCCESS in 1h 09m 24s","accounts_in_message":[],"_revision_number":1},{"id":"b7b3d2d601f7a169b73aa217ff1c2c57ae6f817e","author":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"date":"2020-03-04 16:23:46.000000000","message":"Uploaded patch set 2: Patch Set 1 was rebased.","accounts_in_message":[],"_revision_number":2},{"id":"9b340df5d40963e45b507f8ca0ffb4840c629fa6","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2020-03-04 16:26:06.000000000","message":"Patch Set 2:\n\nFor rechecking only on the Cloudbase Nova Hyper-V CI, add a review comment with run-Cloudbase Nova Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/682627/2 : FAILURE in 46s","accounts_in_message":[],"_revision_number":2},{"id":"8cf4f0b5d229a00545092910f310b59e1b0b44f1","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},"date":"2020-03-04 16:26:20.000000000","message":"Patch Set 2:\n\nBuild Failed \n\n* SRIOV-nova-direct http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-direct : ABORTED\n\n* SRIOV-nova-macvtap http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-macvtap : ABORTED","accounts_in_message":[],"_revision_number":2},{"id":"1dd18e9f77ea59f0c5508ad40b29de3b9d9b4033","author":{"_account_id":29963,"name":"Intel_Zuul","display_name":"Intel Corporation CI","email":"intel-openstack-ci@intel.com","username":"Intel_Zuul"},"date":"2020-03-04 16:49:15.000000000","message":"Patch Set 2:\n\nBuild SUCCESSFUL (check pipeline).\n\n- pmem-tempest-plugin-filtered http://52.27.155.124/27/682627/2/check/pmem-tempest-plugin-filtered/4e8b0ab/ : SUCCESS in 23m 55s","accounts_in_message":[],"_revision_number":2},{"id":"1cd798f613e9cc454eb34b659dd14b51bbda15cc","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},"date":"2020-03-04 17:20:10.000000000","message":"Patch Set 2:\n\nBuild Successful \n\n* SRIOV-nova-direct http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-direct : SUCCESS\n\n* SRIOV-nova-macvtap http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-macvtap : SUCCESS","accounts_in_message":[],"_revision_number":2},{"id":"72c66950384b6f1b84a121ba4b61b3f82f76a931","author":{"_account_id":23498,"name":"IBM zVM CI","email":"zvmosci@us.ibm.com","username":"zvmosci"},"date":"2020-03-04 17:56:10.000000000","message":"Patch Set 2:\n\nTesting completed on the zVM Driver CI system check-nova pipeline.  To recheck only the zVM driver plugins, submit a comment with only zvm: recheck in the comment. Contact information: zvmosci@us.ibm.com. For information see https://wiki.openstack.org/wiki/ZVMDriver.\n\n- check-nova-master http://extbasicopstackcilog01.podc.sl.edst.ibm.com/test_logs/jenkins-check-nova-master-41461 : SUCCESS in 1h 30m 50s","accounts_in_message":[],"_revision_number":2},{"id":"fca5410bb398c92a1a349dad055aab9e4b962d42","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},"date":"2020-03-04 18:57:48.000000000","message":"Patch Set 2:\n\nBuild Successful \n\n* SRIOV-nova-direct http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-direct : SUCCESS\n\n* SRIOV-nova-macvtap http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-macvtap : SUCCESS","accounts_in_message":[],"_revision_number":2},{"id":"a7f8b1ccb62e54f788357762c3c347a8400044bc","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2020-03-04 20:40:21.000000000","message":"Patch Set 2:\n\nBuild succeeded. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-bionic https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/27/682627/2/check/tempest-dsvm-full-bionic/17b92ec/ : SUCCESS in 1h 35m 50s\n- tempest-dsvm-full-bionic-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/27/682627/2/check/tempest-dsvm-full-bionic-py3/f100b1f/ : SUCCESS in 1h 31m 05s\n- grenade-dsvm-bionic https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/27/682627/2/check/grenade-dsvm-bionic/a8beece/ : SUCCESS in 3h 15m 12s (non-voting)","accounts_in_message":[],"_revision_number":2},{"id":"ae2e69379f9163a4d52a96910c4e7b8cd1a0501b","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2020-03-04 21:35:37.000000000","message":"Patch Set 2: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttp://docs.openstack.org/infra/manual/developers.html#automated-testing\n\n\n- grenade-py3 https://zuul.opendev.org/t/openstack/build/42d4e09e13d64130bf99e908902ac6fd : SUCCESS in 59m 08s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/0f026ae4d1d8486da6ecd8d25a450a62 : SUCCESS in 1h 19m 44s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/888c19d9fe03422d964668d16008a761 : SUCCESS in 19m 34s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/f258c72bc0b74e5fb757555cb0abf0e4 : SUCCESS in 15m 13s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/84e6474266f44900beb6711b800aa250 : FAILURE in 10m 35s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/7a33fd2238bf4ec798f032d9a3a1e79a : SUCCESS in 11m 42s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/8af559a2ba794705bacbb7eaed500f5a : SUCCESS in 17m 26s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/db006282f1b14de0ba040fc39837a789 : FAILURE in 11m 35s (non-voting)\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/55b5c4c4e8a649c885194b4b775b842c : SUCCESS in 12m 50s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/7ab7275275fe4a15ae914aa4bee7612d : SUCCESS in 55m 38s (non-voting)\n- devstack-plugin-ceph-tempest-py3 https://zuul.opendev.org/t/openstack/build/b2daaaa14da84258b060fecf7f78f19c : SUCCESS in 1h 04m 40s (non-voting)\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/a549717ae55542e98e0b04ebe95c6d3e : SUCCESS in 1h 19m 57s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/a2166f7040024a8dabc79c9fff42b7a1 : SUCCESS in 54m 07s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/6f4e13d19fbb4dd9a33e23e2bf53829a : SUCCESS in 1h 02m 51s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/c31ea7dc97904be7bdf9c3f2f1686a88 : SUCCESS in 1h 47m 19s\n- nova-next https://zuul.opendev.org/t/openstack/build/acfdc8d8b7874d5bbc27f043290edff7 : FAILURE in 1h 36m 03s\n- nova-tox-functional-py36 https://zuul.opendev.org/t/openstack/build/d545c4c34e394659a45d7be98a3fb715 : SUCCESS in 18m 23s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/3c512c92a0e141c283c3a8fa572e0993 : SUCCESS in 1h 04m 33s","accounts_in_message":[],"_revision_number":2},{"id":"50e024dc8f7d3be8ae73da84907283450f0a18fb","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},"date":"2020-03-04 21:40:55.000000000","message":"Patch Set 2:\n\nBuild Successful \n\n* SRIOV-nova-direct http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-direct : SUCCESS\n\n* SRIOV-nova-macvtap http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-macvtap : SUCCESS","accounts_in_message":[],"_revision_number":2},{"id":"ebbb642afdcce38899bbf9e84b4c1a450a2ecfb0","author":{"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},"date":"2020-03-06 20:06:27.000000000","message":"Patch Set 2:\n\nTesting failed ubuntu-bionic-s390x. For rechecking only on the ubuntu-bionic-s390x CI, add a review comment with recheck-zkvm. Contact info: zkvm-ci@linux.vnet.ibm.com. For more information, see https://wiki.openstack.org/wiki/ThirdPartySystems/IBM_zKVM_CI\n\n- check-tempest-dsvm-neutron-full-ubuntu-bionic-s390x http://extbasicopstackcilog01.podc.sl.edst.ibm.com/zkvm_test_logs/production/682627/2/check-tempest-dsvm-neutron-full-ubuntu-bionic-s390x/b2355d4 : FAILURE in 42m 22s","accounts_in_message":[],"_revision_number":2},{"id":"9268e6c71856aa3675e58a38f487af0e984bbca3","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":9732,"name":"Mellanox CI","email":"mlnx-openstack-ci@dev.mellanox.co.il","username":"mellanox","tags":["SERVICE_USER"]},"date":"2020-03-06 21:09:54.000000000","message":"Patch Set 2:\n\nBuild Successful \n\n* SRIOV-nova-direct http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-direct : SUCCESS\n\n* SRIOV-nova-macvtap http://13.74.249.42/refs/changes/27/682627/2/SRIOV-nova-macvtap : SUCCESS","accounts_in_message":[],"_revision_number":2},{"id":"dc518b3771eb4fd0b77733828031be13a9a14153","author":{"_account_id":14595,"name":"z Systems KVM","email":"zkvm-ci@linux.vnet.ibm.com","username":"ibm-zkvm-ci","tags":["SERVICE_USER"]},"date":"2020-04-13 07:58:14.000000000","message":"Patch Set 2:\n\nMerge Failed.\n\nThis change or one of its cross-repo dependencies was unable to be automatically merged with the current state of its repository. Please rebase the change and upload a new patchset.","accounts_in_message":[],"_revision_number":2},{"id":"70d168ad19cd250fc045ce44cc72c49894d3a0f1","author":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"date":"2021-02-11 11:24:57.000000000","message":"Patch Set 2:\n\nNote to self: now that min-required libvirt/QEMU versions are sufficiently high-enough, it\u0027s probably not required to do any firmware auto-selection checks...but double-check.","accounts_in_message":[],"_revision_number":2},{"id":"b527a41c940addd0929f9deead744598f9492925","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"date":"2021-02-15 18:33:44.000000000","message":"Uploaded patch set 3.","accounts_in_message":[],"_revision_number":3},{"id":"e81af3b1e41ed42c706bfb2a62c71412d4f12566","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2021-02-15 19:11:52.000000000","message":"Patch Set 3:\n\nBuild failed. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-focal-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/27/682627/3/check/tempest-dsvm-full-focal-py3/b5e8fa7/ : FAILURE in 29m 06s","accounts_in_message":[],"_revision_number":3},{"id":"13b10e7e830c81151c514dbea3d61e30b6c921d8","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2021-02-15 20:04:34.000000000","message":"Patch Set 3:\n\nBuild succeeded (ARM64 pipeline).\n\n- openstack-tox-py38-arm64 https://zuul.opendev.org/t/openstack/build/283e3ccd9bb54c5b96da887f36ddb674 : TIMED_OUT in 1h 01m 04s (non-voting)\n- openstack-tox-py39-arm64 https://zuul.opendev.org/t/openstack/build/e7a140845b00490994e9b87598882ac1 : TIMED_OUT in 1h 01m 25s (non-voting)","accounts_in_message":[],"_revision_number":3},{"id":"8b5030d7475353375621eada1d627a20f8ef2c5e","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2021-02-15 21:25:03.000000000","message":"Patch Set 3:\n\nFor rechecking only on the Cloudbase Nova Hyper-V CI, add a review comment with run-Cloudbase Nova Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/682627/3/iscsi : FAILURE in 2h 46m 56s","accounts_in_message":[],"_revision_number":3},{"id":"afac9fe0326d6463aa9b4ed32ae3860b9035e303","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2021-02-16 03:19:27.000000000","message":"Patch Set 3: Verified+1\n\nBuild succeeded (check pipeline).\n\n- grenade https://zuul.opendev.org/t/openstack/build/75f9f35622ff4a0081c7cbd988559f56 : SUCCESS in 1h 01m 05s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/9706319bc14c41e2af1d99f9b4e3e5b0 : SUCCESS in 1h 53m 51s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/c9ac70455cf045a583b910822512599a : SUCCESS in 16m 12s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/e28289414bb94fde92dda9933ba187d4 : SUCCESS in 11m 50s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/20d4c8687e7f402f8dca66d7fb773296 : SUCCESS in 8m 41s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/00c92b9f1774476ab9d8112ec743a531 : SUCCESS in 14m 50s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/69d51f91d250464494761648fd13d06c : SUCCESS in 12m 02s\n- openstack-tox-py39 https://zuul.opendev.org/t/openstack/build/81c90eaf1c3e40e2a129598a0c8f857d : SUCCESS in 14m 03s (non-voting)\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/a29889731fea45328948f802086fc39b : SUCCESS in 10m 00s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/e31df69d5d7e4a42a97f97a3d426acb6 : SUCCESS in 55m 02s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/6d2d9f0b4d89497c8458cf9018c50af0 : SUCCESS in 59m 19s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/f81e6e1033ad433dac114d032db1a7b6 : SUCCESS in 1h 08m 56s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/d0059e1e52d343d1956ab0d183bd50d1 : SUCCESS in 51m 35s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/beb6abd0285542c18eaaedaffab84a76 : SUCCESS in 56m 53s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/726104170cfa40eabd88ab690ba1575a : SUCCESS in 1h 51m 24s\n- nova-next https://zuul.opendev.org/t/openstack/build/a8f7cb0d2cc247719b5daa086ff82ea0 : SUCCESS in 1h 44m 35s\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/31a0e46abd564683920bc22a9cefed2c : SUCCESS in 19m 18s\n- nova-tox-functional-py39 https://zuul.opendev.org/t/openstack/build/df9c1643c6cf46acb7d0688460e1b6fb : SUCCESS in 16m 42s (non-voting)\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/bcac44de3f284bc19077c5c09846624f : SUCCESS in 1h 00m 10s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/df8024c272a64580858b04b485aefd5d : SUCCESS in 53m 21s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/d8d3b299d37d4f6db13f0e8cbf1000e7 : SUCCESS in 27m 57s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/0e56a6a8404b4c4a801f72deb404e81a : SUCCESS in 39m 11s (non-voting)","accounts_in_message":[],"_revision_number":3},{"id":"d5a18bc272e679ab395a956feac71479a404d2a7","author":{"_account_id":15941,"name":"DellEMC PowerFlex CI","email":"emc.scaleio.ci@emc.com","username":"emc-scaleio-ci","tags":["SERVICE_USER"]},"date":"2021-02-16 03:20:08.000000000","message":"Patch Set 3:\n\nBuild failed.  For information on how to proceed, see https://docs.openstack.org/infra/manual/developers.html\n\n- EMC_PowerFlex_NOVA http://publiclogs.emc.com/27/682627/3/check/EMC_PowerFlex_NOVA/f9d845a/EMC_PowerFlex_NOVA/None : NOT_REGISTERED\n\nLeave a comment with \u0027run-DellEMC PowerFlex CI\u0027 to trigger a recheck. For more information about CI, please see https://wiki.openstack.org/wiki/ThirdPartySystems/DellEMC_PowerFlex_CI","accounts_in_message":[],"_revision_number":3},{"id":"1211fc68cb14ed1918a1a8de74188ab0eb945d8d","tag":"autogenerated:gerrit:abandon","author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"date":"2021-05-10 14:06:19.000000000","message":"Abandoned","accounts_in_message":[],"_revision_number":3}],"current_revision_number":3,"current_revision":"d43f39621b3d2b9c3191c5ec3f66f29e7b6c1cf5","revisions":{"519012e7d17b56d1556f692118754219cda9062f":{"kind":"REWORK","_number":1,"created":"2019-09-17 11:58:18.000000000","uploader":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"ref":"refs/changes/27/682627/1","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/27/682627/1","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/1 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/1 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/1 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/27/682627/1"}}},"commit":{"parents":[{"commit":"ea6993a284f2ba76d4ab0d5aff33c46085886a3c","subject":"libvirt: Parse the \u0027os\u0027 element from domainCapabilities","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/ea6993a284f2ba76d4ab0d5aff33c46085886a3c"}]}],"author":{"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","date":"2019-09-02 11:19:29.000000000","tz":120},"committer":{"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","date":"2019-09-17 10:15:18.000000000","tz":120},"subject":"libvirt: Add methods to detect firmware auto-selection and SB","message":"libvirt: Add methods to detect firmware auto-selection and SB\n\nIn this change:\n\n  - Introduce a method to detect support for firmware auto-detection,\n    via checking for the presence of \u0027efi\u0027 getDomainCapabilities().\n\n    Here we take advantage of the two config classes we introduced in\n    the previous change: LibvirtConfigDomainCapsOS() and\n    LibvirtConfigDomainCapsOSLoader().\n\n  - Also introduce a method to detect the support of Secure Boot\n\nPrerequisite for firmware auto-selection and Secure Boot support\n----------------------------------------------------------------\n\nFor libvirt to be able to auto-select the firmware (and to identify an\nOVMF binary with Secure Boot support), two criteria need to be fulfilled\n-- the get_domain_capabilities(), which is a wrapper for libvirt\ngetDomainCapabilities() API:\n\n(1) Should return the value \"efi\" for the \u0027firmware\u0027 enum:\n\n      \u003cos supported\u003d\u0027yes\u0027\u003e\n        \u003cenum name\u003d\u0027firmware\u0027\u003e\n          \u003cvalue\u003ebios\u003c/value\u003e\n          \u003cvalue\u003eefi\u003c/value\u003e\n        \u003c/enum\u003e\n      ...\n      \u003c/os\u003e\n\n    This means that libvirt is new enough to use \"\u003cos firmware\u003d\u0027efi\u0027\u003e\"\n    in the guest XML.  And that UEFI boot is possible.\n\n(2) Should return the value \"yes\" for the \u0027secure\u0027 enum:\n\n      \u003cos supported\u003d\u0027yes\u0027\u003e\n         \u003cenum name\u003d\u0027firmware\u0027\u003e\n           \u003cvalue\u003ebios\u003c/value\u003e\n           \u003cvalue\u003eefi\u003c/value\u003e\n         \u003c/enum\u003e\n         \u003cloader supported\u003d\u0027yes\u0027\u003e\n           ...\n           \u003cenum name\u003d\u0027secure\u0027\u003e\n             \u003cvalue\u003eyes\u003c/value\u003e\n             \u003cvalue\u003eno\u003c/value\u003e\n           \u003c/enum\u003e\n         \u003c/loader\u003e\n      \u003c/os\u003e\n\n    The value \"yes\" for the \u0027secure\u0027 enum means that libvirt has\n    detected a \"firmware descriptor file\"[*] that has path to an OVMF\n    binary that supports Secure Boot, and lists its architecture and\n    supported machine type.\n\n[*] It is a small JSON document (shipped by your distro) that describes\n    details about a given BIOS or UEFI binary on the host, e.g. the\n    fimware binary path, its architecture, supported machine types,\n    NVRAM template, etc.\n\nFirmware auto-detection in action\n---------------------------------\n\nOnce the above two conditions are satisfied, if you provide this XML to\nthe guest (which is asking for Secure Boot):\n\n  \u003cos firmware\u003d\u0027efi\u0027\u003e\n    \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027q35\u0027\u003ehvm\u003c/type\u003e\n    \u003cloader secure\u003d\u0027yes\u0027/\u003e\n    \u003cboot dev\u003d\u0027hd\u0027/\u003e\n  \u003c/os\u003e\n\nThen, libvirt will automatically detect (a) the _correct_ OVMF binary\nthat is capable of Secure Boot; and (b) the NVRAM template associated\nwith the detected firmware image, copies it into a guest\u0027s private path\nand tells it to use it.  I.e. libvirt turns the above \"implicit\" XML to\nthe below explicit:\n\n  \u003cos\u003e\n    \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-q35-4.0\u0027\u003ehvm\u003c/type\u003e\n    \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd\u003c/loader\u003e\n    \u003cnvram template\u003d\u0027/usr/share/edk2/ovmf/OVMF_VARS.secboot.fd\u0027\u003e/var/lib/libvirt/qemu/nvram/sb-f30-b_VARS.fd\u003c/nvram\u003e\n    \u003cboot dev\u003d\u0027hd\u0027/\u003e\n  \u003c/os\u003e\n\nRefer to the documentation here:\nhttps://libvirt.org/formatdomaincaps.html#elementsOSBIOS\n\nblueprint: allow-secure-boot-for-qemu-kvm-guests\nChange-Id: Idd8b4640e3445fa2ede347d42aed895f6b0a2712\nSigned-off-by: Kashyap Chamarthy \u003ckchamart@redhat.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/519012e7d17b56d1556f692118754219cda9062f"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/519012e7d17b56d1556f692118754219cda9062f"}]},"branch":"refs/heads/master"},"de2f47b80ee68ef5b40480e9fe06ba7792475315":{"kind":"TRIVIAL_REBASE","_number":2,"created":"2020-03-04 16:23:46.000000000","uploader":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"ref":"refs/changes/27/682627/2","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/27/682627/2","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/2 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/2 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/2 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/27/682627/2"}}},"commit":{"parents":[{"commit":"2f0326ca53b17747e6a65ea1b381d6d0f71b29b3","subject":"libvirt: Parse the \u0027os\u0027 element from domainCapabilities","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/2f0326ca53b17747e6a65ea1b381d6d0f71b29b3"}]}],"author":{"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","date":"2019-09-02 11:19:29.000000000","tz":120},"committer":{"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","date":"2020-03-04 15:30:00.000000000","tz":60},"subject":"libvirt: Add methods to detect firmware auto-selection and SB","message":"libvirt: Add methods to detect firmware auto-selection and SB\n\nIn this change:\n\n  - Introduce a method to detect support for firmware auto-detection,\n    via checking for the presence of \u0027efi\u0027 getDomainCapabilities().\n\n    Here we take advantage of the two config classes we introduced in\n    the previous change: LibvirtConfigDomainCapsOS() and\n    LibvirtConfigDomainCapsOSLoader().\n\n  - Also introduce a method to detect the support of Secure Boot\n\nPrerequisite for firmware auto-selection and Secure Boot support\n----------------------------------------------------------------\n\nFor libvirt to be able to auto-select the firmware (and to identify an\nOVMF binary with Secure Boot support), two criteria need to be fulfilled\n-- the get_domain_capabilities(), which is a wrapper for libvirt\ngetDomainCapabilities() API:\n\n(1) Should return the value \"efi\" for the \u0027firmware\u0027 enum:\n\n      \u003cos supported\u003d\u0027yes\u0027\u003e\n        \u003cenum name\u003d\u0027firmware\u0027\u003e\n          \u003cvalue\u003ebios\u003c/value\u003e\n          \u003cvalue\u003eefi\u003c/value\u003e\n        \u003c/enum\u003e\n      ...\n      \u003c/os\u003e\n\n    This means that libvirt is new enough to use \"\u003cos firmware\u003d\u0027efi\u0027\u003e\"\n    in the guest XML.  And that UEFI boot is possible.\n\n(2) Should return the value \"yes\" for the \u0027secure\u0027 enum:\n\n      \u003cos supported\u003d\u0027yes\u0027\u003e\n         \u003cenum name\u003d\u0027firmware\u0027\u003e\n           \u003cvalue\u003ebios\u003c/value\u003e\n           \u003cvalue\u003eefi\u003c/value\u003e\n         \u003c/enum\u003e\n         \u003cloader supported\u003d\u0027yes\u0027\u003e\n           ...\n           \u003cenum name\u003d\u0027secure\u0027\u003e\n             \u003cvalue\u003eyes\u003c/value\u003e\n             \u003cvalue\u003eno\u003c/value\u003e\n           \u003c/enum\u003e\n         \u003c/loader\u003e\n      \u003c/os\u003e\n\n    The value \"yes\" for the \u0027secure\u0027 enum means that libvirt has\n    detected a \"firmware descriptor file\"[*] that has path to an OVMF\n    binary that supports Secure Boot, and lists its architecture and\n    supported machine type.\n\n[*] It is a small JSON document (shipped by your distro) that describes\n    details about a given BIOS or UEFI binary on the host, e.g. the\n    fimware binary path, its architecture, supported machine types,\n    NVRAM template, etc.\n\nFirmware auto-detection in action\n---------------------------------\n\nOnce the above two conditions are satisfied, if you provide this XML to\nthe guest (which is asking for Secure Boot):\n\n  \u003cos firmware\u003d\u0027efi\u0027\u003e\n    \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027q35\u0027\u003ehvm\u003c/type\u003e\n    \u003cloader secure\u003d\u0027yes\u0027/\u003e\n    \u003cboot dev\u003d\u0027hd\u0027/\u003e\n  \u003c/os\u003e\n\nThen, libvirt will automatically detect (a) the _correct_ OVMF binary\nthat is capable of Secure Boot; and (b) the NVRAM template associated\nwith the detected firmware image, copies it into a guest\u0027s private path\nand tells it to use it.  I.e. libvirt turns the above \"implicit\" XML to\nthe below explicit:\n\n  \u003cos\u003e\n    \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-q35-4.0\u0027\u003ehvm\u003c/type\u003e\n    \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd\u003c/loader\u003e\n    \u003cnvram template\u003d\u0027/usr/share/edk2/ovmf/OVMF_VARS.secboot.fd\u0027\u003e/var/lib/libvirt/qemu/nvram/sb-f30-b_VARS.fd\u003c/nvram\u003e\n    \u003cboot dev\u003d\u0027hd\u0027/\u003e\n  \u003c/os\u003e\n\nRefer to the documentation here:\nhttps://libvirt.org/formatdomaincaps.html#elementsOSBIOS\n\nblueprint: allow-secure-boot-for-qemu-kvm-guests\nChange-Id: Idd8b4640e3445fa2ede347d42aed895f6b0a2712\nSigned-off-by: Kashyap Chamarthy \u003ckchamart@redhat.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/de2f47b80ee68ef5b40480e9fe06ba7792475315"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/de2f47b80ee68ef5b40480e9fe06ba7792475315"}]},"branch":"refs/heads/master"},"d43f39621b3d2b9c3191c5ec3f66f29e7b6c1cf5":{"kind":"REWORK","_number":3,"created":"2021-02-15 18:33:44.000000000","uploader":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"ref":"refs/changes/27/682627/3","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/27/682627/3","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/3 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/3 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/27/682627/3 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/27/682627/3"}}},"commit":{"parents":[{"commit":"d12ddeee31806b83eeb6a7d3a1eaf5376f37b067","subject":"libvirt: Add secure boot loader config support","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d12ddeee31806b83eeb6a7d3a1eaf5376f37b067"}]}],"author":{"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","date":"2019-09-02 11:19:29.000000000","tz":120},"committer":{"name":"Stephen Finucane","email":"stephenfin@redhat.com","date":"2021-02-15 18:18:11.000000000","tz":0},"subject":"libvirt: Auto-detect UEFI, secure boot support","message":"libvirt: Auto-detect UEFI, secure boot support\n\nIntroduce a method to detect support for firmware auto-detection, via\nchecking for the presence of \u0027efi\u0027 in getDomainCapabilities(). Here we\ntake advantage of the two config classes we introduced in the previous\nchange: LibvirtConfigDomainCapsOS() and\nLibvirtConfigDomainCapsOSLoader().\n\nFor libvirt to be able to auto-select the firmware (and to identify an\nOVMF binary with Secure Boot support), two criteria need to be\nfulfilled. First, the get_domain_capabilities(), which is a wrapper for\nlibvirt getDomainCapabilities() API, should return the value \"efi\" for\nthe \u0027firmware\u0027 enum. This indicates that libvirt is new enough to use\n\"\u003cos firmware\u003d\u0027efi\u0027\u003e\" in the guest XML and that UEFI boot is possible.\n\n    \u003cos supported\u003d\u0027yes\u0027\u003e\n      \u003cenum name\u003d\u0027firmware\u0027\u003e\n        \u003cvalue\u003ebios\u003c/value\u003e\n        \u003cvalue\u003eefi\u003c/value\u003e\n      \u003c/enum\u003e\n    ...\n    \u003c/os\u003e\n\nIn addition, it should return the value \"yes\" for the \u0027secure\u0027 enum:\n\n    \u003cos supported\u003d\u0027yes\u0027\u003e\n       \u003cenum name\u003d\u0027firmware\u0027\u003e\n         \u003cvalue\u003ebios\u003c/value\u003e\n         \u003cvalue\u003eefi\u003c/value\u003e\n       \u003c/enum\u003e\n       \u003cloader supported\u003d\u0027yes\u0027\u003e\n         ...\n         \u003cenum name\u003d\u0027secure\u0027\u003e\n           \u003cvalue\u003eyes\u003c/value\u003e\n           \u003cvalue\u003eno\u003c/value\u003e\n         \u003c/enum\u003e\n       \u003c/loader\u003e\n    \u003c/os\u003e\n\nThe value \"yes\" for the \u0027secure\u0027 enum means that libvirt has detected a\n\"firmware descriptor file\", that has path to an OVMF binary that\nsupports Secure Boot, and lists its architecture and supported machine\ntype. These firmware descriptor files are small JSON document shipped by\nyour distro that describes details about a given BIOS or UEFI binary on\nthe host, e.g. the fimware binary path, its architecture, supported\nmachine types, NVRAM template, etc.\n\nOnce the above two conditions are satisfied, if you provide this XML to\nthe guest (which is asking for Secure Boot):\n\n  \u003cos firmware\u003d\u0027efi\u0027\u003e\n    \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027q35\u0027\u003ehvm\u003c/type\u003e\n    \u003cloader secure\u003d\u0027yes\u0027/\u003e\n    \u003cboot dev\u003d\u0027hd\u0027/\u003e\n  \u003c/os\u003e\n\nThen, libvirt will automatically detect (a) the _correct_ OVMF binary\nthat is capable of Secure Boot; and (b) the NVRAM template associated\nwith the detected firmware image, copies it into a guest\u0027s private path\nand tells it to use it.  I.e. libvirt turns the above \"implicit\" XML to\nthe below explicit:\n\n  \u003cos\u003e\n    \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-q35-4.0\u0027\u003ehvm\u003c/type\u003e\n    \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd\u003c/loader\u003e\n    \u003cnvram template\u003d\u0027/usr/share/edk2/ovmf/OVMF_VARS.secboot.fd\u0027\u003e/var/lib/libvirt/qemu/nvram/sb-f30-b_VARS.fd\u003c/nvram\u003e\n    \u003cboot dev\u003d\u0027hd\u0027/\u003e\n  \u003c/os\u003e\n\nRefer to the libvirt documentation [1] for more information.\n\n[1] https://libvirt.org/formatdomaincaps.html#elementsOSBIOS\n\nBlueprint: allow-secure-boot-for-qemu-kvm-guests\nChange-Id: Idd8b4640e3445fa2ede347d42aed895f6b0a2712\nSigned-off-by: Kashyap Chamarthy \u003ckchamart@redhat.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d43f39621b3d2b9c3191c5ec3f66f29e7b6c1cf5"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d43f39621b3d2b9c3191c5ec3f66f29e7b6c1cf5"}]},"branch":"refs/heads/master"}},"requirements":[],"submit_records":[],"submit_requirements":[]}
