)]}'
{"id":"openstack%2Fnova~765771","triplet_id":"openstack%2Fnova~stable%2Ftrain~Ia2007bc63ef09931ea0197cef29d6a5614ed821a","project":"openstack/nova","branch":"stable/train","topic":"bug/1905701","hashtags":[],"change_id":"Ia2007bc63ef09931ea0197cef29d6a5614ed821a","subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","status":"ABANDONED","created":"2020-12-07 09:39:11.000000000","updated":"2023-09-01 17:03:09.000000000","total_comment_count":0,"unresolved_comment_count":0,"has_review_started":true,"meta_rev_id":"ca9bc2bbb5ec195040db01d2e59fb1be88a54c71","_number":765771,"virtual_id_number":765771,"owner":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"actions":{},"labels":{"Verified":{"disliked":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"all":[{"tag":"autogenerated:zuul:check","value":-1,"date":"2021-04-09 11:46:31.000000000","permitted_voting_range":{"min":-2,"max":2},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]}],"values":{"-2":"Fails","-1":"Doesn\u0027t seem to work"," 0":"No score","+1":"Works for me","+2":"Verified"},"description":"","value":-1,"default_value":0,"optional":true},"Code-Review":{"all":[{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]}],"values":{"-2":"Do not merge","-1":"This patch needs further work before it can be merged"," 0":"No score","+1":"Looks good to me, but someone else must approve","+2":"Looks good to me (core reviewer)"},"description":"","default_value":0,"optional":true},"Workflow":{"all":[{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]}],"values":{"-1":"Work in progress"," 0":"Ready for reviews","+1":"Approved"},"description":"","default_value":0,"optional":true},"Review-Priority":{"all":[{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]}],"values":{" 0":"Default Priority","+1":"Contributor Review Promise","+2":"Core Review Promise"},"description":"","default_value":0,"optional":true}},"removable_reviewers":[],"reviewers":{"CC":[{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"}],"REVIEWER":[{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]}]},"pending_reviewers":{},"reviewer_updates":[{"updated":"2020-12-07 12:14:51.000000000","updated_by":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"reviewer":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"state":"CC"},{"updated":"2020-12-07 12:30:33.000000000","updated_by":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"reviewer":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"state":"CC"},{"updated":"2020-12-07 12:51:51.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"REVIEWER"}],"messages":[{"id":"210f16d9874edff14da495f66881b62eb0df9a20","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-07 09:39:11.000000000","message":"Uploaded patch set 1.","accounts_in_message":[],"_revision_number":1},{"id":"90aef7bb8fe6a1546bd165de8d2854ff43ecbb0a","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2020-12-07 12:14:51.000000000","message":"Patch Set 1:\n\nBuild succeeded. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-bionic-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/71/765771/1/check/tempest-dsvm-full-bionic-py3/dda8248/ : SUCCESS in 1h 48m 01s","accounts_in_message":[],"_revision_number":1},{"id":"de9816e92011602d32a73b0774812109fc4ed9a8","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2020-12-07 12:30:33.000000000","message":"Patch Set 1:\n\nFor rechecking only on the Cloudbase Nova Hyper-V CI, add a review comment with run-Cloudbase Nova Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/765771/1 : FAILURE in 2h 49m 07s","accounts_in_message":[],"_revision_number":1},{"id":"0bedb6b0febb14520e3bd3cb323cbd46e1d08e0b","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2020-12-07 12:51:51.000000000","message":"Patch Set 1: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\n\n- grenade https://zuul.opendev.org/t/openstack/build/6d4e51410c89407eb0b4fb0324eadc74 : FAILURE in 17m 44s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/d24d2676c1db4f15b763c966a0d4ac99 : SUCCESS in 1h 22m 36s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/53b9c53cfa47476ca101e1541cf35c77 : FAILURE in 14m 02s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/a17a02f430bc4790929c4d26340c0e13 : FAILURE in 31m 01s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/3e5647b89bff45ad9b63f4f665167d55 : FAILURE in 10m 19s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/391cadad6b544922b4b30e2db7bce1cc : FAILURE in 3m 58s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/be13977c98574c17a62125622d00aa4a : FAILURE in 12m 14s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/0e21589e0e0d44478ff450e76f982b76 : FAILURE in 14m 47s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/54f73d23825c4049a0e4e0f2a13b940c : SUCCESS in 9m 38s\n- build-openstack-releasenotes https://zuul.opendev.org/t/openstack/build/cba462ded34346728bc95af3b1753704 : SUCCESS in 18m 56s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/6550825d86b94269a66048ec506fc7b8 : FAILURE in 18m 51s (non-voting)\n- devstack-plugin-ceph-tempest https://zuul.opendev.org/t/openstack/build/f4e7a550e1734cc8852beefe1361bd5b : FAILURE in 18m 18s (non-voting)\n- neutron-grenade-multinode https://zuul.opendev.org/t/openstack/build/6bd219841ce240faa0fa1cb29fb7d075 : FAILURE in 54m 30s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/6054ac6b5b294c5d99ec3637225b8505 : FAILURE in 22m 38s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/543ecc4c4d0c4e45b9ebc391328c8f50 : FAILURE in 15m 23s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/4a021ecebf64413fa71aee77f5fe2182 : SUCCESS in 55m 25s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/a0091da4c48e4ddaa45536b72c1bf2e4 : SUCCESS in 1h 34m 40s\n- nova-next https://zuul.opendev.org/t/openstack/build/0abc1a9d63034a3eb8491ec14587a545 : SUCCESS in 1h 23m 31s\n- nova-tox-functional https://zuul.opendev.org/t/openstack/build/c3c3e70d49174e68bfe4c722d129c1af : FAILURE in 3m 46s\n- nova-tox-functional-py36 https://zuul.opendev.org/t/openstack/build/4959a09bd82f45ba952168c3c36ee23a : SUCCESS in 18m 01s\n- tempest-slow-py3 https://zuul.opendev.org/t/openstack/build/d85368eb338b4d11a2ff672b49df2589 : SUCCESS in 2h 06m 13s\n- grenade-py3 https://zuul.opendev.org/t/openstack/build/fd59f3cd38f64f71b292a7289e0fedd0 : FAILURE in 17m 38s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/fae4e7f63c794da281f9bb4b5188e9f1 : SUCCESS in 52m 38s","accounts_in_message":[],"_revision_number":1},{"id":"6cdc89df6407dd9c56ced18defc765a024dee5e7","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 09:57:04.000000000","message":"Patch Set 2: Commit message was updated.","accounts_in_message":[],"_revision_number":2},{"id":"e338c0f192e5a6da58ea07b0093099bb9edf8481","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 10:13:15.000000000","message":"Uploaded patch set 3.","accounts_in_message":[],"_revision_number":3},{"id":"969b8b40c87b9e507f9c5057ddb80d813d328a61","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 10:20:15.000000000","message":"Uploaded patch set 4: Patch Set 3 was rebased.","accounts_in_message":[],"_revision_number":4},{"id":"dcd2cbfada9c2430352a5edeaa12548f58e8fa5f","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 11:09:32.000000000","message":"Uploaded patch set 5: Patch Set 4 was rebased.","accounts_in_message":[],"_revision_number":5},{"id":"c531e958571273697677beaf3c24ae36d55999c3","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 11:13:33.000000000","message":"Uploaded patch set 6: Patch Set 5 was rebased.","accounts_in_message":[],"_revision_number":6},{"id":"97410ca89f5c63fc23a8cad828a92186483dce2f","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 11:16:55.000000000","message":"Uploaded patch set 7: New patch set was added with same tree, parent, and commit message as Patch Set 6.","accounts_in_message":[],"_revision_number":7},{"id":"78cc9273b418751e65e653345e8f48def6a04e67","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 11:22:55.000000000","message":"Uploaded patch set 8: Patch Set 7 was rebased.","accounts_in_message":[],"_revision_number":8},{"id":"27b8dd5f6f1623ae648e26cee8dc55c6ed006002","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 12:13:57.000000000","message":"Uploaded patch set 9: Patch Set 8 was rebased.","accounts_in_message":[],"_revision_number":9},{"id":"7e10f5e31bbf71aed7ae8c5b0e09a74ddcb5cbd8","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2020-12-09 12:40:54.000000000","message":"Uploaded patch set 10: New patch set was added with same tree, parent, and commit message as Patch Set 9.","accounts_in_message":[],"_revision_number":10},{"id":"bad092e2e219bddf461ba6eb6c4ff7461288256d","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2020-12-09 15:23:12.000000000","message":"Patch Set 10: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\n\n- grenade https://zuul.opendev.org/t/openstack/build/aae1dd6732804a84b5c77eb9ebd5890e : FAILURE in 17m 22s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/4d52f16f507d4b76bef65f1b4f0179cb : TIMED_OUT in 2h 07m 08s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/578d109a46bb4339a532421f1a55e340 : SUCCESS in 21m 54s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/5597e2e7b1d84549a6a8549b5d9e6592 : SUCCESS in 13m 41s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/d164addd8aaa420db2627cf2330b759c : FAILURE in 9m 47s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/4725ff376314475fbb55edd38daca3d8 : SUCCESS in 13m 36s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/81b7d6f2a7bf4887850462b75dc4699c : SUCCESS in 11m 25s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/1ba425c625bc4e0ba082f22ee0e32256 : SUCCESS in 14m 30s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/e27a8ebf35d54a0e8077eadf90de3a52 : SUCCESS in 8m 58s\n- build-openstack-releasenotes https://zuul.opendev.org/t/openstack/build/e304c987fe2149328d1839d9b39cbff3 : SUCCESS in 13m 22s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/10ffe320b96244efbdfcca5bd3aa0631 : SUCCESS in 1h 08m 33s (non-voting)\n- devstack-plugin-ceph-tempest https://zuul.opendev.org/t/openstack/build/dc2c404621674ee6b711460ab5221e90 : FAILURE in 22m 28s (non-voting)\n- neutron-grenade-multinode https://zuul.opendev.org/t/openstack/build/7b8bc8ae007844a187d511e0f60c7054 : FAILURE in 50m 14s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/3aedb3392ea941faa42b3a37d6182c17 : FAILURE in 16m 14s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/e45ad181ddb745f9a12ab0d411b669a5 : FAILURE in 23m 09s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/ab5c0f8a28c4455d921c6bd2ae6e5cd4 : SUCCESS in 59m 26s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/4181122f5cd6430fb5bcf018ce3b9c0f : SUCCESS in 1h 40m 06s\n- nova-next https://zuul.opendev.org/t/openstack/build/20676870960c41f29b1d138a0f2b8144 : POST_FAILURE in 1h 35m 25s\n- nova-tox-functional https://zuul.opendev.org/t/openstack/build/e3a8ee9a12f04ec29302ac7fe1791774 : SUCCESS in 20m 00s\n- nova-tox-functional-py36 https://zuul.opendev.org/t/openstack/build/db4260ce876a45eea20b5136e7505e23 : SUCCESS in 17m 12s\n- tempest-slow-py3 https://zuul.opendev.org/t/openstack/build/083527cab68e421f82293016181d77d8 : SUCCESS in 2h 26m 23s\n- grenade-py3 https://zuul.opendev.org/t/openstack/build/a8b0a8853e504faa899471bfd637b3e0 : FAILURE in 10m 33s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/962ef2e568b74c03afa36851d1526edc : SUCCESS in 59m 12s","accounts_in_message":[],"_revision_number":10},{"id":"eab96cde41322119fcd119a44ebf075a0c5acdf2","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2020-12-09 15:28:40.000000000","message":"Patch Set 10:\n\nFor rechecking only on the Cloudbase Nova Hyper-V CI, add a review comment with run-Cloudbase Nova Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/765771/10 : FAILURE in 2h 43m 23s","accounts_in_message":[],"_revision_number":10},{"id":"838d3064431a87837c8f3ce9f42edeeed960087e","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2020-12-10 17:45:30.000000000","message":"Patch Set 10:\n\nMerge Failed.\n\nThis change or one of its cross-repo dependencies was unable to be automatically merged with the current state of its repository. Please rebase the change and upload a new patchset.","accounts_in_message":[],"_revision_number":10},{"id":"c28a055c8bd8b7ce526bc39422e2116a0b0368ee","tag":"autogenerated:gerrit:setTopic","author":{"_account_id":17685,"name":"Elod Illes","email":"elod.illes@est.tech","username":"elod.illes"},"date":"2021-02-03 18:18:44.000000000","message":"Topic set to bug/1905701","accounts_in_message":[],"_revision_number":10},{"id":"f2ccc352423d690724546f1187f13347b6ec76e9","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"date":"2021-04-09 09:32:13.000000000","message":"Uploaded patch set 11: Patch Set 10 was rebased.","accounts_in_message":[],"_revision_number":11},{"id":"6785c697e29029a375ae9d5bd764e8432f05dbbc","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2021-04-09 11:46:31.000000000","message":"Patch Set 11: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/ca3c51daceb5452cb62bf8f08838bcf1 : SUCCESS in 1h 23m 00s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/732fbc076d7049e5a51fa4c3c6e91602 : SUCCESS in 19m 46s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/f680caa0100b400190b98b0dfcf83f9a : SUCCESS in 14m 52s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/1808182a48d1466e845101c330d6d63e : FAILURE in 10m 31s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/4dd69eaea10e43659c73126d9758c6f2 : SUCCESS in 19m 04s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/ad2680acb8dd48708d942bb0f67f6d09 : SUCCESS in 16m 52s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/72bf0a1e5eda405290b24b8946a5f21a : SUCCESS in 14m 04s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/dd8a95ceaf8a443a984fde7ddc8def7e : SUCCESS in 13m 06s\n- build-openstack-releasenotes https://zuul.opendev.org/t/openstack/build/75116c1069414647886802d497868927 : SUCCESS in 13m 33s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/72dcab9044f246e5af4eb44f5b0411fc : SUCCESS in 1h 12m 23s (non-voting)\n- devstack-plugin-ceph-tempest https://zuul.opendev.org/t/openstack/build/b10f56b47f1947c19013a6f17169c791 : SUCCESS in 1h 15m 21s (non-voting)\n- neutron-grenade-multinode https://zuul.opendev.org/t/openstack/build/31d872e9127c48d28de9a08f0a39a107 : SUCCESS in 1h 31m 19s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/e322790ee5184646bf2cd48958a26dcc : FAILURE in 28m 47s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/e7dc540d6fb94e42aa4da1acca463b3f : SUCCESS in 45m 28s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/950cb788bc63430ca09288adbfa86f6b : SUCCESS in 40m 44s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/44a7936b91364229bcec68720309f14a : SUCCESS in 1h 24m 14s\n- nova-next https://zuul.opendev.org/t/openstack/build/e6718e56c35f4570b26bfa49da38d63e : SUCCESS in 1h 02m 21s\n- nova-tox-functional https://zuul.opendev.org/t/openstack/build/2098f048059846e9929a6c5008cf3670 : SUCCESS in 20m 15s\n- nova-tox-functional-py36 https://zuul.opendev.org/t/openstack/build/79476b8599b64e43a650159b311de8fe : SUCCESS in 14m 31s\n- tempest-slow-py3 https://zuul.opendev.org/t/openstack/build/4448fa40d33242769c776099930103bc : FAILURE in 1h 54m 07s\n- grenade-py3 https://zuul.opendev.org/t/openstack/build/f5fb0b37c3f24690a3942badbf22dbd4 : SUCCESS in 48m 43s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/5b17086545274d549080b711c79cd431 : SUCCESS in 52m 03s","accounts_in_message":[],"_revision_number":11},{"id":"670afd0c50b5f1795bc05a95996983e4d6e67a67","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2021-04-09 12:03:53.000000000","message":"Patch Set 11:\n\nBuild succeeded. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-bionic-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/71/765771/11/check/tempest-dsvm-full-bionic-py3/ce3b387/ : SUCCESS in 1h 52m 48s","accounts_in_message":[],"_revision_number":11},{"id":"69cbaca8c4be6ecae0d673b4cb118078bbc88093","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2021-04-09 15:25:59.000000000","message":"Patch Set 11:\n\nBuild succeeded. For checking Nova with Ceph, add a comment with run-Cloudbase Nova Ceph Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/765771/11/iscsi : SUCCESS in 3h 16m 29s","accounts_in_message":[],"_revision_number":11},{"id":"ca9bc2bbb5ec195040db01d2e59fb1be88a54c71","tag":"autogenerated:gerrit:abandon","author":{"_account_id":17685,"name":"Elod Illes","email":"elod.illes@est.tech","username":"elod.illes"},"date":"2023-09-01 17:03:09.000000000","message":"Abandoned\n\nstable/train branch of nova projects\u0027 have been tagged as End of Life. All open patches have to be abandoned in order to be able to delete the branch.","accounts_in_message":[],"_revision_number":11}],"current_revision_number":11,"current_revision":"95ed4f56a9e24e2dc9b58787ca436fdd9ef0ecd7","revisions":{"d47679779189e43941881c6212d6db2052a19867":{"kind":"REWORK","_number":1,"created":"2020-12-07 09:39:11.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/1","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/1","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/1 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/1 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/1 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/1"}}},"commit":{"parents":[{"commit":"81a3f4b22b867b372b94af81872b547e7500005c","subject":"Merge \"Change default num_retries for glance to 3\" into stable/train","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/81a3f4b22b867b372b94af81872b547e7500005c"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-07 09:38:53.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d47679779189e43941881c6212d6db2052a19867"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d47679779189e43941881c6212d6db2052a19867"}]},"branch":"refs/heads/stable/train"},"adf15ef0919c58419947ee254a4acca69bff547a":{"kind":"NO_CODE_CHANGE","_number":2,"created":"2020-12-09 09:57:04.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/2","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/2","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/2 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/2 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/2 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/2"}}},"commit":{"parents":[{"commit":"81a3f4b22b867b372b94af81872b547e7500005c","subject":"Merge \"Change default num_retries for glance to 3\" into stable/train","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/81a3f4b22b867b372b94af81872b547e7500005c"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 09:56:42.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nDepends-On: https://review.opendev.org/c/openstack/requirements/+/766170\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/adf15ef0919c58419947ee254a4acca69bff547a"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/adf15ef0919c58419947ee254a4acca69bff547a"}]},"branch":"refs/heads/stable/train","description":"Edit commit message"},"108f70ad253cbcfa257550df9c0eac890fdfd8c6":{"kind":"TRIVIAL_REBASE_WITH_MESSAGE_UPDATE","_number":3,"created":"2020-12-09 10:13:15.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/3","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/3","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/3 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/3 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/3 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/3"}}},"commit":{"parents":[{"commit":"78c629bf52e4013e7b79b94ef431f58ff7e9944e","subject":"Cap bandit at 1.6.2 when using py2","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/78c629bf52e4013e7b79b94ef431f58ff7e9944e"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 10:12:35.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/108f70ad253cbcfa257550df9c0eac890fdfd8c6"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/108f70ad253cbcfa257550df9c0eac890fdfd8c6"}]},"branch":"refs/heads/stable/train"},"8361575595f6b1f96c2bce3c94665813c74be6b5":{"kind":"TRIVIAL_REBASE","_number":4,"created":"2020-12-09 10:20:15.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/4","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/4","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/4 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/4 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/4 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/4"}}},"commit":{"parents":[{"commit":"e8eab227e4d8bc5935aaf8a96993bcea89b29cc7","subject":"Cap bandit at 1.6.2 when using py2","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/e8eab227e4d8bc5935aaf8a96993bcea89b29cc7"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 10:19:55.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/8361575595f6b1f96c2bce3c94665813c74be6b5"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/8361575595f6b1f96c2bce3c94665813c74be6b5"}]},"branch":"refs/heads/stable/train"},"edaa9939976e868359322eab2822075a84e46b1c":{"kind":"TRIVIAL_REBASE","_number":5,"created":"2020-12-09 11:09:32.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/5","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/5","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/5 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/5 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/5 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/5"}}},"commit":{"parents":[{"commit":"60a1744282f1b276176f4a2749467e50fc0b4ca5","subject":"Cap bandit and raise hacking lower-constraint","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/60a1744282f1b276176f4a2749467e50fc0b4ca5"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 11:09:07.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/edaa9939976e868359322eab2822075a84e46b1c"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/edaa9939976e868359322eab2822075a84e46b1c"}]},"branch":"refs/heads/stable/train"},"d4ae00f29ad1b471ac8d8276e930734780c227a0":{"kind":"TRIVIAL_REBASE","_number":6,"created":"2020-12-09 11:13:33.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/6","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/6","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/6 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/6 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/6 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/6"}}},"commit":{"parents":[{"commit":"e224b6e8b379b9ebcc2170b138798a34fef2b35b","subject":"Cap bandit while also raising hacking and flake lower-constraints","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/e224b6e8b379b9ebcc2170b138798a34fef2b35b"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 11:13:15.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d4ae00f29ad1b471ac8d8276e930734780c227a0"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d4ae00f29ad1b471ac8d8276e930734780c227a0"}]},"branch":"refs/heads/stable/train"},"b473ec726ffb2f9445c7c0fc912f524379cdef2e":{"kind":"NO_CHANGE","_number":7,"created":"2020-12-09 11:16:55.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/7","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/7","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/7 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/7 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/7 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/7"}}},"commit":{"parents":[{"commit":"e13acef653eaf02ad2bc0763698e4c132c95b091","subject":"[stable-only] Cap bandit while also raising hacking and flake lower-constraints","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/e13acef653eaf02ad2bc0763698e4c132c95b091"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 11:16:28.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/b473ec726ffb2f9445c7c0fc912f524379cdef2e"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/b473ec726ffb2f9445c7c0fc912f524379cdef2e"}]},"branch":"refs/heads/stable/train"},"206f9397535b02befb4775973731fce9b97ba81e":{"kind":"TRIVIAL_REBASE","_number":8,"created":"2020-12-09 11:22:55.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/8","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/8","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/8 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/8 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/8 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/8"}}},"commit":{"parents":[{"commit":"8579d4a9306421c81f53eba7c6561102668a40fd","subject":"[stable-only] Cap bandit while also raising hacking, flake and stestr LCs","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/8579d4a9306421c81f53eba7c6561102668a40fd"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 11:22:40.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/206f9397535b02befb4775973731fce9b97ba81e"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/206f9397535b02befb4775973731fce9b97ba81e"}]},"branch":"refs/heads/stable/train"},"0b8cdbaa507170bef4dc39e620551bcb6d4ee495":{"kind":"TRIVIAL_REBASE","_number":9,"created":"2020-12-09 12:13:57.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/9","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/9","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/9 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/9 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/9 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/9"}}},"commit":{"parents":[{"commit":"3a996853f7a2f167f698b4e6c2ce87056d06fb23","subject":"libvirt: Remove native LUKS compat code","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/3a996853f7a2f167f698b4e6c2ce87056d06fb23"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 12:06:59.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/0b8cdbaa507170bef4dc39e620551bcb6d4ee495"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/0b8cdbaa507170bef4dc39e620551bcb6d4ee495"}]},"branch":"refs/heads/stable/train"},"eb475dd4394ff76ba79082072150085d837980c1":{"kind":"NO_CHANGE","_number":10,"created":"2020-12-09 12:40:54.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/10","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/10","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/10 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/10 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/10 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/10"}}},"commit":{"parents":[{"commit":"9adaa4ad280911bdf36cc77feb57b8167a2f797d","subject":"libvirt: Remove native LUKS compat code","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/9adaa4ad280911bdf36cc77feb57b8167a2f797d"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-12-09 12:40:27.000000000","tz":0},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/eb475dd4394ff76ba79082072150085d837980c1"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/eb475dd4394ff76ba79082072150085d837980c1"}]},"branch":"refs/heads/stable/train"},"95ed4f56a9e24e2dc9b58787ca436fdd9ef0ecd7":{"kind":"TRIVIAL_REBASE","_number":11,"created":"2021-04-09 09:32:13.000000000","uploader":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"ref":"refs/changes/71/765771/11","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/71/765771/11","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/11 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/11 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/71/765771/11 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/71/765771/11"}}},"commit":{"parents":[{"commit":"61a477e83abb6c241120759a28e9ccf10771d1a7","subject":"libvirt: Remove native LUKS compat code","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/61a477e83abb6c241120759a28e9ccf10771d1a7"}]}],"author":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2020-11-25 21:31:21.000000000","tz":0},"committer":{"name":"Lee Yarwood","email":"lyarwood@redhat.com","date":"2021-04-09 09:24:50.000000000","tz":60},"subject":"libvirt: Skip encryption metadata lookups if secret already exists on host","message":"libvirt: Skip encryption metadata lookups if secret already exists on host\n\nWhen connecting an encrypted volume to a host the _attach_encryptor\nmethod will be called in order to either call a legacy os-brick\nencryptor *or* configure a libvirt secret used by libvirt and QEMU to\nnatively decrypt LUKSv1 encrypted volumes. To create this libvirt secret\nthe configured key manager will be queried to provide and then decode\nthe associated secret before this is stashed within libvirt.\n\nThis change simply skips the above when an existing libvirt secret\nassociated with the target volume is found on the host already.\n\nWhile this obviously optimises basic instance lifecycle flows such as a\nsimple power off and on it additionally resolves a more convoluted use\ncase when the ``[DEFAULT]/resume_guests_state_on_host_boot``\nconfigurable is enabled. In this case the compute service has no request\ncontext with which to query the key manager when attempting to restart\ninstances with encrypted volumes attached. As a result any attempt by\nthe compute service to restart an instance with an attached encrypted\nvolume would previously fail.\n\nCloses-Bug: #1905701\nChange-Id: Ia2007bc63ef09931ea0197cef29d6a5614ed821a\n(cherry picked from commit a107a5099e86c3da80a6feeca6f840d5a3ad11b9)\n(cherry picked from commit af5b87874254aeb42931e3bb4faab3a2620b6894)\n(cherry picked from commit a1cb246e5d2d9ade01cc26087e361169e3aa624c)\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/95ed4f56a9e24e2dc9b58787ca436fdd9ef0ecd7"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/95ed4f56a9e24e2dc9b58787ca436fdd9ef0ecd7"}]},"branch":"refs/heads/stable/train"}},"requirements":[],"submit_records":[],"submit_requirements":[{"name":"Verified","description":"Verified in gate by CI","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Verified\u003dMAX AND -label:Verified\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Verified\u003dMAX","label:Verified\u003dMIN"],"atom_explanations":{}}},{"name":"Code-Review","description":"Code reviewed by core reviewer","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Code-Review\u003dMAX AND -label:Code-Review\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Code-Review\u003dMAX","label:Code-Review\u003dMIN"],"atom_explanations":{}}},{"name":"Review-Priority","description":"Review Priority","status":"NOT_APPLICABLE","is_legacy":false,"applicability_expression_result":{"fulfilled":false,"status":"FAIL"},"submittability_expression_result":{"expression":"is:true","fulfilled":true,"status":"NOT_EVALUATED","passing_atoms":[],"failing_atoms":[],"atom_explanations":{}}},{"name":"Workflow","description":"Approved for gate by core reviewer","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Workflow\u003dMAX AND -label:Workflow\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Workflow\u003dMAX","label:Workflow\u003dMIN"],"atom_explanations":{}}}]}
