)]}'
{"doc/source/admin/index.rst":[{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"81fec874053d7bf217cfe9b22824aaa915715ed9","unresolved":true,"context_lines":[{"line_number":115,"context_line":"   emulated-tpm"},{"line_number":116,"context_line":"   uefi"},{"line_number":117,"context_line":"   secure-boot"},{"line_number":118,"context_line":"   managing-resource-providers"},{"line_number":119,"context_line":""},{"line_number":120,"context_line":""},{"line_number":121,"context_line":"Additional guides"}],"source_content_type":"text/x-rst","patch_set":8,"id":"7bba9e48_99885458","line":118,"updated":"2021-03-11 21:09:23.000000000","message":"Unrelated random thought: when I view the rendered HTML docs, it makes me wonder if these should be sorted alphabetically or something:\n\nhttps://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_7a4/776684/8/check/openstack-tox-docs/7a426e0/docs/admin/index.html#advanced-configuration","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":115,"context_line":"   emulated-tpm"},{"line_number":116,"context_line":"   uefi"},{"line_number":117,"context_line":"   secure-boot"},{"line_number":118,"context_line":"   managing-resource-providers"},{"line_number":119,"context_line":""},{"line_number":120,"context_line":""},{"line_number":121,"context_line":"Additional guides"}],"source_content_type":"text/x-rst","patch_set":8,"id":"6faa54de_68fba75f","line":118,"in_reply_to":"7bba9e48_99885458","updated":"2021-03-12 17:36:28.000000000","message":"Yeah, quite possibly. I\u0027d like to clean this up somewhat and provide a little more granularity than just \"Advanced features\". Work for post feature freeze, for sure (I have a lot of other doc work patches in the pipeline)","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"}],"doc/source/admin/secure-boot.rst":[{"author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"change_message_id":"5427d96ff52ec6a498f4dcebdf70ce2a47a9fd57","unresolved":true,"context_lines":[{"line_number":28,"context_line":""},{"line_number":29,"context_line":".. code:: console"},{"line_number":30,"context_line":""},{"line_number":31,"context_line":"    $ openstack resource provider trait list $compute_uuid | grep COMPUTE_SECURITY_UEFI_SECURE_BOOT"},{"line_number":32,"context_line":"    | COMPUTE_SECURITY_UEFI_SECURE_BOOT |"},{"line_number":33,"context_line":""},{"line_number":34,"context_line":""}],"source_content_type":"text/x-rst","patch_set":7,"id":"e0aa3a2c_32b526ba","line":31,"range":{"start_line":31,"start_character":45,"end_line":31,"end_character":58},"updated":"2021-03-12 11:20:08.000000000","message":"nit - would be nice if this command accepted --name but regardless it would be useful to show how you get the UUID here:\n\n    $ compute_uuid\u003d$(openstack resource provider list --name $compute_hostname -f value -c uuid)","commit_id":"062dbc1bb2b324652c1abf4715d7023a2274bd10"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":28,"context_line":""},{"line_number":29,"context_line":".. code:: console"},{"line_number":30,"context_line":""},{"line_number":31,"context_line":"    $ openstack resource provider trait list $compute_uuid | grep COMPUTE_SECURITY_UEFI_SECURE_BOOT"},{"line_number":32,"context_line":"    | COMPUTE_SECURITY_UEFI_SECURE_BOOT |"},{"line_number":33,"context_line":""},{"line_number":34,"context_line":""}],"source_content_type":"text/x-rst","patch_set":7,"id":"91ec96c0_1b78e3de","line":31,"range":{"start_line":31,"start_character":45,"end_line":31,"end_character":58},"in_reply_to":"e0aa3a2c_32b526ba","updated":"2021-03-12 17:36:28.000000000","message":"I very much want osc-placement to support that, but we either have to reinvent the wheel with the \"find by name or UUID\" feature or use openstacksdk (since we don\u0027t have a python-placementclient package). Unfortunately my efforts to add the latter have foundered so far [1], but there is a student working on this now so we might see some progress here eventually.\n\nFor now updated to use your recommendation. This was copied-pasted from the vTPM doc so I updated that also.\n\n[1] https://review.opendev.org/c/openstack/openstacksdk/+/745375","commit_id":"062dbc1bb2b324652c1abf4715d7023a2274bd10"},{"author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"change_message_id":"5427d96ff52ec6a498f4dcebdf70ce2a47a9fd57","unresolved":true,"context_lines":[{"line_number":44,"context_line":""},{"line_number":45,"context_line":"As the name would suggest, UEFI Secure Boot requires that a UEFI bootloader be"},{"line_number":46,"context_line":"configured for guests. When this is done, UEFI Secure Boot support can be"},{"line_number":47,"context_line":"configured using the :nova:extra-spec:`os:secure_boot` extra spec or equivalent"},{"line_number":48,"context_line":"image metadata property. For example, to configure an image that meets both of"},{"line_number":49,"context_line":"these requirements:"},{"line_number":50,"context_line":""}],"source_content_type":"text/x-rst","patch_set":7,"id":"9a74c49a_4bd58717","line":47,"range":{"start_line":47,"start_character":21,"end_line":47,"end_character":54},"updated":"2021-03-12 11:20:08.000000000","message":"OOOoOOOoOOO fancy","commit_id":"062dbc1bb2b324652c1abf4715d7023a2274bd10"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":44,"context_line":""},{"line_number":45,"context_line":"As the name would suggest, UEFI Secure Boot requires that a UEFI bootloader be"},{"line_number":46,"context_line":"configured for guests. When this is done, UEFI Secure Boot support can be"},{"line_number":47,"context_line":"configured using the :nova:extra-spec:`os:secure_boot` extra spec or equivalent"},{"line_number":48,"context_line":"image metadata property. For example, to configure an image that meets both of"},{"line_number":49,"context_line":"these requirements:"},{"line_number":50,"context_line":""}],"source_content_type":"text/x-rst","patch_set":7,"id":"59b28ff2_b5df4a7d","line":47,"range":{"start_line":47,"start_character":21,"end_line":47,"end_character":54},"in_reply_to":"9a74c49a_4bd58717","updated":"2021-03-12 17:36:28.000000000","message":"I know, right? Got a similar thing lined up for image metadata too.","commit_id":"062dbc1bb2b324652c1abf4715d7023a2274bd10"},{"author":{"_account_id":10135,"name":"Lee Yarwood","display_name":"Lee Yarwood","email":"lyarwood@redhat.com","username":"lyarwood"},"change_message_id":"5427d96ff52ec6a498f4dcebdf70ce2a47a9fd57","unresolved":false,"context_lines":[{"line_number":85,"context_line":""},{"line_number":86,"context_line":".. note::"},{"line_number":87,"context_line":""},{"line_number":88,"context_line":"    If both the image metadata property and flavor extra spec are provided,"},{"line_number":89,"context_line":"    they must match. If they do not, an error will be raised."},{"line_number":90,"context_line":""},{"line_number":91,"context_line":".. rubric:: Hyper-V"},{"line_number":92,"context_line":""}],"source_content_type":"text/x-rst","patch_set":7,"id":"f9ce45b2_20e85ef6","line":89,"range":{"start_line":88,"start_character":0,"end_line":89,"end_character":61},"updated":"2021-03-12 11:20:08.000000000","message":"ACK I was about to suggest making this clear.","commit_id":"062dbc1bb2b324652c1abf4715d7023a2274bd10"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"81fec874053d7bf217cfe9b22824aaa915715ed9","unresolved":true,"context_lines":[{"line_number":53,"context_line":"    $ openstack image set \\"},{"line_number":54,"context_line":"        --property hw_firmware_type\u003duefi \\"},{"line_number":55,"context_line":"        --property os_secure_boot\u003drequired \\"},{"line_number":56,"context_line":"        $IMAGE"},{"line_number":57,"context_line":""},{"line_number":58,"context_line":".. note::"},{"line_number":59,"context_line":""}],"source_content_type":"text/x-rst","patch_set":8,"id":"d4ee0d54_d89d7e68","line":56,"range":{"start_line":56,"start_character":8,"end_line":56,"end_character":14},"updated":"2021-03-11 21:09:23.000000000","message":"Not too important but I notice in the rendered docs this is not light blue colored like the $variables in the other console renderings. Dunno why.","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"5ae5d1db82e10c4d1879e99af4388ec2964578cf","unresolved":false,"context_lines":[{"line_number":53,"context_line":"    $ openstack image set \\"},{"line_number":54,"context_line":"        --property hw_firmware_type\u003duefi \\"},{"line_number":55,"context_line":"        --property os_secure_boot\u003drequired \\"},{"line_number":56,"context_line":"        $IMAGE"},{"line_number":57,"context_line":""},{"line_number":58,"context_line":".. note::"},{"line_number":59,"context_line":""}],"source_content_type":"text/x-rst","patch_set":8,"id":"11b11d7f_4af41206","line":56,"range":{"start_line":56,"start_character":8,"end_line":56,"end_character":14},"in_reply_to":"d4ee0d54_d89d7e68","updated":"2021-03-12 17:43:33.000000000","message":"Good spot. I fixed this by switching to the \u0027bash\u0027 syntax, which is more accurate anyway","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"81fec874053d7bf217cfe9b22824aaa915715ed9","unresolved":true,"context_lines":[{"line_number":81,"context_line":""},{"line_number":82,"context_line":".. code-block:: console"},{"line_number":83,"context_line":""},{"line_number":84,"context_line":"    $ openstack image set --property os_secure_boot\u003doptional $IMAGE"},{"line_number":85,"context_line":""},{"line_number":86,"context_line":".. note::"},{"line_number":87,"context_line":""}],"source_content_type":"text/x-rst","patch_set":8,"id":"db0c1a4c_46d58299","line":84,"updated":"2021-03-11 21:09:23.000000000","message":"Note to self: flavor extra_spec is os:secure_boot and image meta prop is os_secure_boot (: vs _)","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":81,"context_line":""},{"line_number":82,"context_line":".. code-block:: console"},{"line_number":83,"context_line":""},{"line_number":84,"context_line":"    $ openstack image set --property os_secure_boot\u003doptional $IMAGE"},{"line_number":85,"context_line":""},{"line_number":86,"context_line":".. note::"},{"line_number":87,"context_line":""}],"source_content_type":"text/x-rst","patch_set":8,"id":"9e343a35_43705425","line":84,"in_reply_to":"db0c1a4c_46d58299","updated":"2021-03-12 17:36:28.000000000","message":"Ack","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"change_message_id":"31e2252d866402efe3439de50cc99909324b00e6","unresolved":true,"context_lines":[{"line_number":86,"context_line":".. note::"},{"line_number":87,"context_line":""},{"line_number":88,"context_line":"    If both the image metadata property and flavor extra spec are provided,"},{"line_number":89,"context_line":"    they must match. If they do not, an error will be raised."},{"line_number":90,"context_line":""},{"line_number":91,"context_line":".. rubric:: Hyper-V"},{"line_number":92,"context_line":""}],"source_content_type":"text/x-rst","patch_set":8,"id":"d2da8033_c504a470","line":89,"updated":"2021-03-11 15:46:30.000000000","message":"Useful note.","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":86,"context_line":".. note::"},{"line_number":87,"context_line":""},{"line_number":88,"context_line":"    If both the image metadata property and flavor extra spec are provided,"},{"line_number":89,"context_line":"    they must match. If they do not, an error will be raised."},{"line_number":90,"context_line":""},{"line_number":91,"context_line":".. rubric:: Hyper-V"},{"line_number":92,"context_line":""}],"source_content_type":"text/x-rst","patch_set":8,"id":"5f06d1eb_f964046d","line":89,"in_reply_to":"d2da8033_c504a470","updated":"2021-03-12 17:36:28.000000000","message":"Ack","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"change_message_id":"31e2252d866402efe3439de50cc99909324b00e6","unresolved":true,"context_lines":[{"line_number":88,"context_line":"    If both the image metadata property and flavor extra spec are provided,"},{"line_number":89,"context_line":"    they must match. If they do not, an error will be raised."},{"line_number":90,"context_line":""},{"line_number":91,"context_line":".. rubric:: Hyper-V"},{"line_number":92,"context_line":""},{"line_number":93,"context_line":"Like libvirt, configuring a guest for UEFI Secure Boot support also requires"},{"line_number":94,"context_line":"that it be configured with a UEFI bootloader: As noted in :doc:`uefi`, it is"}],"source_content_type":"text/x-rst","patch_set":8,"id":"b1186251_5d6554c9","line":91,"range":{"start_line":91,"start_character":12,"end_line":91,"end_character":19},"updated":"2021-03-11 15:46:30.000000000","message":"Thanks for taking care of Hyper-V docs too!  Completeness...","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":88,"context_line":"    If both the image metadata property and flavor extra spec are provided,"},{"line_number":89,"context_line":"    they must match. If they do not, an error will be raised."},{"line_number":90,"context_line":""},{"line_number":91,"context_line":".. rubric:: Hyper-V"},{"line_number":92,"context_line":""},{"line_number":93,"context_line":"Like libvirt, configuring a guest for UEFI Secure Boot support also requires"},{"line_number":94,"context_line":"that it be configured with a UEFI bootloader: As noted in :doc:`uefi`, it is"}],"source_content_type":"text/x-rst","patch_set":8,"id":"f1ef28cc_af167bad","line":91,"range":{"start_line":91,"start_character":12,"end_line":91,"end_character":19},"in_reply_to":"b1186251_5d6554c9","updated":"2021-03-12 17:36:28.000000000","message":"Ack","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"81fec874053d7bf217cfe9b22824aaa915715ed9","unresolved":true,"context_lines":[{"line_number":94,"context_line":"that it be configured with a UEFI bootloader: As noted in :doc:`uefi`, it is"},{"line_number":95,"context_line":"not possible to do this explicitly in Hyper-V. Rather, you should configure the"},{"line_number":96,"context_line":"guest to use the *Generation 2* machine type. In addition to this, the Hyper-V"},{"line_number":97,"context_line":"compute driver also required that the OS type be configured."},{"line_number":98,"context_line":""},{"line_number":99,"context_line":"When both of these constraints are met, you can configure UEFI Secure Boot"},{"line_number":100,"context_line":"support using the :nova:extra-spec:`os:secure_boot` extra spec or equivalent"}],"source_content_type":"text/x-rst","patch_set":8,"id":"c236241d_20ad18dc","line":97,"range":{"start_line":97,"start_character":20,"end_line":97,"end_character":28},"updated":"2021-03-11 21:09:23.000000000","message":"requires?","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":94,"context_line":"that it be configured with a UEFI bootloader: As noted in :doc:`uefi`, it is"},{"line_number":95,"context_line":"not possible to do this explicitly in Hyper-V. Rather, you should configure the"},{"line_number":96,"context_line":"guest to use the *Generation 2* machine type. In addition to this, the Hyper-V"},{"line_number":97,"context_line":"compute driver also required that the OS type be configured."},{"line_number":98,"context_line":""},{"line_number":99,"context_line":"When both of these constraints are met, you can configure UEFI Secure Boot"},{"line_number":100,"context_line":"support using the :nova:extra-spec:`os:secure_boot` extra spec or equivalent"}],"source_content_type":"text/x-rst","patch_set":8,"id":"cc0bc553_af45ec74","line":97,"range":{"start_line":97,"start_character":20,"end_line":97,"end_character":28},"in_reply_to":"c236241d_20ad18dc","updated":"2021-03-12 17:36:28.000000000","message":"Done","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"change_message_id":"31e2252d866402efe3439de50cc99909324b00e6","unresolved":true,"context_lines":[{"line_number":120,"context_line":""},{"line_number":121,"context_line":"However, unlike the libvirt driver, the Hyper-V driver does not respect the"},{"line_number":122,"context_line":"``optional`` value for the image metadata property. If this is configured, it"},{"line_number":123,"context_line":"will be silently ignored."},{"line_number":124,"context_line":""},{"line_number":125,"context_line":""},{"line_number":126,"context_line":"References"}],"source_content_type":"text/x-rst","patch_set":8,"id":"e3d541d2_1f95b2f4","line":123,"updated":"2021-03-11 15:46:30.000000000","message":"Yeah; that\u0027s acceptable","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":120,"context_line":""},{"line_number":121,"context_line":"However, unlike the libvirt driver, the Hyper-V driver does not respect the"},{"line_number":122,"context_line":"``optional`` value for the image metadata property. If this is configured, it"},{"line_number":123,"context_line":"will be silently ignored."},{"line_number":124,"context_line":""},{"line_number":125,"context_line":""},{"line_number":126,"context_line":"References"}],"source_content_type":"text/x-rst","patch_set":8,"id":"406a2c9b_06f9337c","line":123,"in_reply_to":"e3d541d2_1f95b2f4","updated":"2021-03-12 17:36:28.000000000","message":"Ack","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"}],"doc/source/user/flavors.rst":[{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"81fec874053d7bf217cfe9b22824aaa915715ed9","unresolved":true,"context_lines":[{"line_number":802,"context_line":"  .. versionchanged:: 23.0.0 (Wallaby)"},{"line_number":803,"context_line":""},{"line_number":804,"context_line":"     Added support for secure boot to the libvirt driver."},{"line_number":805,"context_line":""},{"line_number":806,"context_line":".. _extra-specs-required-resources:"},{"line_number":807,"context_line":""},{"line_number":808,"context_line":"Custom resource classes and standard resource classes to override"}],"source_content_type":"text/x-rst","patch_set":8,"id":"914dd66c_038929c2","line":805,"updated":"2021-03-11 21:09:23.000000000","message":"Do you think we should add a link to the new Secure Boot doc page somewhere in this section?","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"e22ffe644a43e4d3fd4c9dbf971517d3978647d3","unresolved":false,"context_lines":[{"line_number":802,"context_line":"  .. versionchanged:: 23.0.0 (Wallaby)"},{"line_number":803,"context_line":""},{"line_number":804,"context_line":"     Added support for secure boot to the libvirt driver."},{"line_number":805,"context_line":""},{"line_number":806,"context_line":".. _extra-specs-required-resources:"},{"line_number":807,"context_line":""},{"line_number":808,"context_line":"Custom resource classes and standard resource classes to override"}],"source_content_type":"text/x-rst","patch_set":8,"id":"fac4b399_dead06fe","line":805,"in_reply_to":"914dd66c_038929c2","updated":"2021-03-12 17:36:28.000000000","message":"Good idea. Done.","commit_id":"47b38f7e374002aa2ab1e75de208ba452d9d0978"}]}
