)]}'
{"id":"openstack%2Fnova~828979","triplet_id":"openstack%2Fnova~stable%2Fvictoria~Ib6e52706e1eca92fefc44d21fab9f5df8780543c","project":"openstack/nova","branch":"stable/victoria","topic":"bug/1960758-victoria-v4","attention_set":{"28621":{"account":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"last_update":"2023-09-13 13:54:09.000000000","reason":"\u003cGERRIT_ACCOUNT_11604\u003e replied on the change","reason_account":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"}}},"removed_from_attention_set":{"11805":{"account":{"_account_id":11805,"name":"Corey Bryant","email":"corey.bryant@canonical.com","username":"coreycb"},"last_update":"2023-09-13 13:41:53.000000000","reason":"Change was abandoned"},"4393":{"account":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"last_update":"2023-09-13 13:41:53.000000000","reason":"Change was abandoned"},"11604":{"account":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"last_update":"2023-09-13 13:41:53.000000000","reason":"Change was abandoned"},"33350":{"account":{"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"},"last_update":"2023-09-13 13:41:53.000000000","reason":"Change was abandoned"}},"hashtags":[],"change_id":"Ib6e52706e1eca92fefc44d21fab9f5df8780543c","subject":"[stable-only] libvirt: UEFI: pc: prefer non-secureboot loaders","status":"ABANDONED","created":"2022-02-13 22:27:18.000000000","updated":"2023-09-13 13:54:09.000000000","total_comment_count":31,"unresolved_comment_count":6,"has_review_started":true,"meta_rev_id":"ba6b7a60c0c9337ab4fa24e04f305c42ec4cbe07","_number":828979,"virtual_id_number":828979,"owner":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"actions":{},"labels":{"Verified":{"recommended":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"all":[{"tag":"autogenerated:zuul:check","value":1,"date":"2022-06-29 19:29:40.000000000","permitted_voting_range":{"min":-2,"max":2},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},{"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"}],"values":{"-2":"Fails","-1":"Doesn\u0027t seem to work"," 0":"No score","+1":"Works for me","+2":"Verified"},"description":"","value":1,"default_value":0,"optional":true},"Code-Review":{"recommended":{"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"},"all":[{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-2,"max":2},"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"permitted_voting_range":{"min":-2,"max":2},"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},{"value":1,"date":"2023-09-12 15:39:07.000000000","permitted_voting_range":{"min":-1,"max":1},"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"}],"values":{"-2":"Do not merge","-1":"This patch needs further work before it can be merged"," 0":"No score","+1":"Looks good to me, but someone else must approve","+2":"Looks good to me (core reviewer)"},"description":"","value":1,"default_value":0,"optional":true},"Workflow":{"all":[{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},{"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"}],"values":{"-1":"Work in progress"," 0":"Ready for reviews","+1":"Approved"},"description":"","default_value":0,"optional":true},"Review-Priority":{"all":[{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":2},"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"permitted_voting_range":{"min":0,"max":2},"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"}],"values":{" 0":"Default Priority","+1":"Contributor Review Promise","+2":"Core Review Promise"},"description":"","default_value":0,"optional":true}},"removable_reviewers":[],"reviewers":{"CC":[{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},{"_account_id":11805,"name":"Corey Bryant","email":"corey.bryant@canonical.com","username":"coreycb"},{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"}],"REVIEWER":[{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"}]},"pending_reviewers":{},"reviewer_updates":[{"updated":"2022-02-13 23:49:09.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2022-02-14 00:20:21.000000000","updated_by":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"reviewer":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"state":"CC"},{"updated":"2022-02-14 00:44:54.000000000","updated_by":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"reviewer":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"state":"CC"},{"updated":"2022-02-21 18:14:41.000000000","updated_by":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"reviewer":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"state":"REMOVED"},{"updated":"2022-02-21 18:14:41.000000000","updated_by":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"reviewer":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"state":"REMOVED"},{"updated":"2022-02-21 18:32:22.000000000","updated_by":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"reviewer":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"state":"CC"},{"updated":"2022-02-21 19:47:05.000000000","updated_by":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"reviewer":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"state":"REMOVED"},{"updated":"2022-02-21 19:49:52.000000000","updated_by":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"reviewer":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"state":"CC"},{"updated":"2022-02-21 19:50:35.000000000","updated_by":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"reviewer":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"state":"CC"},{"updated":"2022-04-12 10:02:33.000000000","updated_by":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"reviewer":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"state":"REVIEWER"},{"updated":"2022-04-19 18:28:20.000000000","updated_by":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"reviewer":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"state":"CC"},{"updated":"2022-05-26 12:21:34.000000000","updated_by":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"reviewer":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"state":"CC"},{"updated":"2022-05-26 12:21:43.000000000","updated_by":{"_account_id":6962,"name":"Kashyap Chamarthy","email":"kchamart@redhat.com","username":"kashyapc"},"reviewer":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"state":"CC"},{"updated":"2022-06-13 20:15:39.000000000","updated_by":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"reviewer":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"state":"CC"},{"updated":"2022-06-14 15:59:35.000000000","updated_by":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"reviewer":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"state":"REVIEWER"},{"updated":"2023-07-26 18:51:55.000000000","updated_by":{"_account_id":11805,"name":"Corey Bryant","email":"corey.bryant@canonical.com","username":"coreycb"},"reviewer":{"_account_id":11805,"name":"Corey Bryant","email":"corey.bryant@canonical.com","username":"coreycb"},"state":"CC"},{"updated":"2023-09-12 15:39:07.000000000","updated_by":{"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"},"reviewer":{"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"},"state":"REVIEWER"}],"messages":[{"id":"07b40bc541f81c92d0cfd3f1816815a1ee1a729a","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-02-13 22:27:18.000000000","message":"Uploaded patch set 1.","accounts_in_message":[],"_revision_number":1},{"id":"5165aae1586534cde32932cd3336272aaf9fdac3","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2022-02-13 23:49:09.000000000","message":"Patch Set 1: Verified-1\n\n(1 comment)\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/4bf94b1f72c746519c0dec3eedc57307 : SUCCESS in 59m 09s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/934fb03900d741b1bc2b06b78aacebf1 : SUCCESS in 56m 53s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/57ee4ddbd209422e9c2e887e2e096467 : SUCCESS in 19m 00s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/eadce7b5af68412e838c44bcdbe72216 : SUCCESS in 13m 39s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/787a4c00bbf94ce3b74f71bd6dddfe93 : FAILURE in 6m 22s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/4e423d2a31074c0ca0f89f331483e43d : SUCCESS in 33m 33s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/2f5f81f4761f47a6bc5767ef2e96c193 : SUCCESS in 12m 28s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/912c74c1303f4f4faf4971471158c115 : SUCCESS in 15m 11s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/ddb0491126414cb480b1d8080fd2b906 : SUCCESS in 1h 07m 41s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/9ca538243ebe4601ae04039e48ee7322 : SUCCESS in 1h 06m 57s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/4c4a3525f5f34717b966c7f03883b537 : SUCCESS in 39m 22s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/edcf2ecd79034e328700526ae1d25a0b : FAILURE in 44m 12s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/1b4d72b4e3e44a3e8109bbee7304cbab : SUCCESS in 1h 14m 06s\n- nova-next https://zuul.opendev.org/t/openstack/build/ad28e4aad0e1478982172c36e194c154 : SUCCESS in 1h 20m 07s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/fe52d66e84994968babc02e6f6f08e45 : FAILURE in 5m 23s (non-voting)\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/d028adad54df4ca59f0468b7daba0efb : SUCCESS in 17m 07s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/79dd945922364fe9bb682d84cf92614b : SUCCESS in 1h 06m 29s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/6d306240052d428aa108a2aca48099ec : SUCCESS in 54m 05s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/19170baa52bf46c4b6bc7ac93c4006df : SUCCESS in 24m 43s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/da7c110c8edd4739a2819fef660b4f18 : SUCCESS in 41m 22s (non-voting)","accounts_in_message":[],"_revision_number":1},{"id":"ba32a7c8346c16601dacba87ee864d7ac3ceb29d","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2022-02-14 00:20:21.000000000","message":"Patch Set 1:\n\nBuild succeeded. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-focal-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/79/828979/1/check/tempest-dsvm-full-focal-py3/47177c5/ : SUCCESS in 1h 49m 40s","accounts_in_message":[],"_revision_number":1},{"id":"cffb03529c31aba5e878c6e682fd608ef167e659","tag":"autogenerated:cloudbase-ci","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2022-02-14 00:44:54.000000000","message":"Patch Set 1:\n\nBuild succeeded. For checking Nova with Ceph, add a comment with run-Cloudbase Nova Ceph Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/828979/1/iscsi : SUCCESS in 2h 16m 30s","accounts_in_message":[],"_revision_number":1},{"id":"18c9df07f119775882b7bc601519ee550b9cb933","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-02-14 12:42:42.000000000","message":"Uploaded patch set 2.","accounts_in_message":[],"_revision_number":2},{"id":"f9d81d515038430c0e6488fbd9008ce3b36330bf","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2022-02-14 14:12:10.000000000","message":"Patch Set 2: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/75e291932db94fc9b18638ddc44c1bd8 : SUCCESS in 1h 05m 46s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/e50b54bcd9ff47dca3d8e899ae84eec3 : SUCCESS in 42m 02s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/c3a9a96f91f142a6b8705f96b672a443 : SUCCESS in 14m 45s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/bbfaaa782f2f41288e7f3052953552e7 : SUCCESS in 13m 51s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/7f60d960d99347949c820c6f161f965b : SUCCESS in 7m 02s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/0f0eb6a74b1d4fb18eac5f45cd755964 : SUCCESS in 11m 55s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/bac5fd41cbcd46b98e3ac39bd4d018f6 : SUCCESS in 12m 31s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/8b4261a1e184448caf2f25d58dbf7b55 : SUCCESS in 9m 42s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/1423ad8353cc4af78ed6c6e53f562668 : SUCCESS in 1h 10m 39s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/4c07a060a7f3447e93b55fb38e94084e : SUCCESS in 1h 04m 45s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/54259e60362149d6981635a31eccda02 : SUCCESS in 36m 40s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/d47f6b21a4a24a5c949834760512149b : FAILURE in 52m 42s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/bd06aa0ddcec4edc9f5445ef97f90b2a : FAILURE in 1h 08m 51s\n- nova-next https://zuul.opendev.org/t/openstack/build/6bea356026a54ffc95b327a4fae31c3c : SUCCESS in 1h 16m 59s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/319e479e59974468b90719226ad8fac3 : SUCCESS in 5m 19s (non-voting)\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/b33aad6c77c348d4bafed001b260ca67 : SUCCESS in 18m 57s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/4ee7c1b84c664fa197b804dcbeb1da39 : SUCCESS in 57m 19s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/b2f591860a9d45919feced8a1c2c7f9c : SUCCESS in 45m 26s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/2240604b785949758d5c6cb5abdc7988 : SUCCESS in 25m 39s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/a9b29721d9e84408b2d32eee08f98641 : FAILURE in 35m 11s (non-voting)","accounts_in_message":[],"_revision_number":2},{"id":"655d3d3c7991a0b72b7359d97e672747922e124c","tag":"autogenerated:cloudbase-ci","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2022-02-14 15:08:48.000000000","message":"Patch Set 2:\n\nBuild succeeded. For checking Nova with Ceph, add a comment with run-Cloudbase Nova Ceph Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/828979/2/iscsi : SUCCESS in 2h 24m 04s","accounts_in_message":[],"_revision_number":2},{"id":"8615eac1600189610c294b1b08b527202ebaa24d","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2022-02-14 15:22:11.000000000","message":"Patch Set 2:\n\nBuild succeeded. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-focal-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/79/828979/2/check/tempest-dsvm-full-focal-py3/f540772/ : SUCCESS in 2h 10m 18s","accounts_in_message":[],"_revision_number":2},{"id":"355cb204d4c413698922f41d85e123c395f8a956","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-02-21 18:14:04.000000000","message":"Patch Set 2:\n\n(1 comment)","accounts_in_message":[],"_revision_number":2},{"id":"368063fdb3620b2c08d37d706cae4e81edff5c63","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-02-21 18:14:40.000000000","message":"Patch Set 2:\n\n(1 comment)","accounts_in_message":[],"_revision_number":2},{"id":"d0050074f21efec94cb80457c719ab36e277502d","tag":"autogenerated:gerrit:deleteReviewer","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-02-21 18:14:41.000000000","message":"Removed cc IBM PowerKVM CI.","accounts_in_message":[],"_revision_number":2},{"id":"b3d23b4e8a29e0f2fd4ad934de7cd6e61733d3bb","tag":"autogenerated:gerrit:deleteReviewer","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-02-21 18:14:41.000000000","message":"Removed cc Cloudbase Nova Hyper-V CI.","accounts_in_message":[],"_revision_number":2},{"id":"fcc5076a8c5a666ea91e96f7d29c7aa4cabbcf7c","tag":"autogenerated:cloudbase-ci","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2022-02-21 18:32:22.000000000","message":"Patch Set 2:\n\nFor rechecking only on the Cloudbase Nova Hyper-V CI, add a review comment with run-Cloudbase Nova Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/828979/2/iscsi : FAILURE in 16m 48s","accounts_in_message":[],"_revision_number":2},{"id":"3e44bd76da817662c0434ce567f2bbcb277b5143","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2022-02-21 19:45:06.000000000","message":"Patch Set 2: Verified+1\n\nBuild succeeded (check pipeline).\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/1ca4d3a629ba42009872bfa1f71dfac9 : SUCCESS in 1h 09m 13s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/d6c8a1e986824749ad3d4e7b28b3a244 : SUCCESS in 59m 35s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/7b0bfb3b4a634a7f82f11d6df5137bea : SUCCESS in 14m 40s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/5779173ff5a64055a3ab24ebaf57b1d3 : SUCCESS in 13m 50s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/136a35e504f64425a7e742fbbf75dc52 : SUCCESS in 8m 26s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/ed3644e01f214c2c96e6f8feb5441d69 : SUCCESS in 12m 53s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/a634a4e4766e4415b4a78ad270e8ab8d : SUCCESS in 14m 03s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/af9282d84c1b44a792d90234d67a3b31 : SUCCESS in 12m 03s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/4ee3fe5902a94ed19f0b5febbbf276b8 : SUCCESS in 1h 00m 48s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/32522107e69b4e7da1e7cda9c714a00c : SUCCESS in 1h 09m 42s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/318e665c202645189abfb02fcdc9a6bd : SUCCESS in 48m 44s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/e0fcd97a4e4149cebb3c79ddbe8ea99b : SUCCESS in 54m 53s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/3c334c3bdfd4464ea7b60933a31edec2 : SUCCESS in 1h 26m 30s\n- nova-next https://zuul.opendev.org/t/openstack/build/70e97df00b0245ea86ec7a7e76766ff5 : SUCCESS in 1h 17m 30s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/2c8f8417b94345589d2a8091b10a24ec : SUCCESS in 7m 11s (non-voting)\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/19583b6b4b8143eda7b58a49f686c6e5 : SUCCESS in 18m 11s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/414e458ad3304bfeb959f691eff9ed7f : SUCCESS in 1h 17m 27s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/4453ba56ee26408da43b8c6d1ad1e3d2 : SUCCESS in 1h 10m 58s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/6fd66c00fc56410e893b5ddcb64af8fa : SUCCESS in 55m 26s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/69a8fb3c9c094015820207ac7f5e4bfe : SUCCESS in 46m 41s (non-voting)","accounts_in_message":[],"_revision_number":2},{"id":"a3ae184e0c2981164ebeeef9be039931f3cb2f59","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-02-21 19:47:04.000000000","message":"Patch Set 2:\n\n(1 comment)","accounts_in_message":[],"_revision_number":2},{"id":"b33f16c337f41cd844704df69bbcdc5d947213c5","tag":"autogenerated:gerrit:deleteReviewer","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-02-21 19:47:05.000000000","message":"Removed cc Cloudbase Nova Hyper-V CI.","accounts_in_message":[],"_revision_number":2},{"id":"86bcb488821a559ad2bdca2164bfbc75e2625b9c","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2022-02-21 20:40:32.000000000","message":"Patch Set 2:\n\nBuild succeeded. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-focal-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/79/828979/2/check/tempest-dsvm-full-focal-py3/a47cc73/ : SUCCESS in 2h 12m 31s","accounts_in_message":[],"_revision_number":2},{"id":"974f29ceab38d01d332ac36413bb55a7f35eb71d","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-03-04 23:00:39.000000000","message":"Uploaded patch set 3.","accounts_in_message":[],"_revision_number":3},{"id":"24e73ef0222ecfa7bceac1bcc2150ee162f7125c","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-03-04 23:01:17.000000000","message":"Uploaded patch set 4: Patch Set 3 was rebased.","accounts_in_message":[],"_revision_number":4},{"id":"97eeb1644fb7b45bd8fd27e53275e8f2d3dfc40a","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2022-03-04 23:43:36.000000000","message":"Patch Set 4:\n\nBuild failed. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-focal-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/79/828979/4/check/tempest-dsvm-full-focal-py3/67a5d6b/ : FAILURE in 37m 59s","accounts_in_message":[],"_revision_number":4},{"id":"02ebda6a3cb904568561d3fc8444b612ca960448","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2022-03-05 00:50:27.000000000","message":"Patch Set 4: Verified+1\n\nBuild succeeded (check pipeline).\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/a75a001a18d64f879158c0f8eaa78bb8 : SUCCESS in 1h 11m 54s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/ed9ad6bc776248cd883827724156105d : SUCCESS in 1h 04m 05s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/16609fd34f784083b9baf18f3f0deeb1 : SUCCESS in 19m 37s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/3b07bb63845f4afca5aaf6e6cb79bed0 : SUCCESS in 18m 54s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/0c65eef0c3c8431bb797539348ddb23c : SUCCESS in 9m 35s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/f76daff1a6bc411cbbee0dca919bd865 : SUCCESS in 17m 28s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/254c8b077916431b9b7ec24a7fc7ccbd : SUCCESS in 17m 33s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/c8e9c2589c3c4013a57db061c786f159 : SUCCESS in 14m 57s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/0bbbb702b4de4a85a052510a8c9b6ac1 : SUCCESS in 1h 27m 12s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/ba078c819f2f4acdafcdc5d8a3ca1190 : SUCCESS in 1h 28m 50s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/4f273248dd8b42aaac984f19d35099c6 : SUCCESS in 1h 04m 25s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/ad41f74703f945868981faf17a99982f : FAILURE in 1h 07m 19s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/96d2ec13e4564ce29f38ea3bb283305f : SUCCESS in 1h 21m 01s\n- nova-next https://zuul.opendev.org/t/openstack/build/3c1a2838134c40a18469adb19b45efa9 : SUCCESS in 1h 41m 46s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/79c6587bdb464a7fa2a603f0177ebba6 : SUCCESS in 7m 11s (non-voting)\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/a7600409cf79491fa26106e397db5c31 : SUCCESS in 19m 07s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/500b0109f9f148298400e8af746abc74 : SUCCESS in 1h 22m 21s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/2856a9c8e0a94098917f0ea33e921658 : SUCCESS in 58m 30s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/de8b5e15ca144cdea60db3d8d97272bf : SUCCESS in 40m 21s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/76b74cc5459a49048d471600582112f7 : SUCCESS in 58m 29s (non-voting)","accounts_in_message":[],"_revision_number":4},{"id":"2dd1444d622a4f6583c69390dd308b9e6084f475","tag":"autogenerated:cloudbase-ci","author":{"_account_id":26515,"name":"Cloudbase Nova Hyper-V CI","email":"nova_hyperv_ci@cloudbasesolutions.com","username":"nova_hyperv_ci"},"date":"2022-03-05 01:28:13.000000000","message":"Patch Set 4:\n\nBuild succeeded. For checking Nova with Ceph, add a comment with run-Cloudbase Nova Ceph Hyper-V CI\n\n- nova http://cloudbase-ci.com/nova/828979/4/iscsi : SUCCESS in 2h 25m 29s","accounts_in_message":[],"_revision_number":4},{"id":"87c8064c7ae9e2b0790a5961b03e84a8198d64a6","author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"date":"2022-04-12 10:02:33.000000000","message":"Patch Set 4: Code-Review+1\n\n(4 comments)","accounts_in_message":[],"_revision_number":4},{"id":"9c180f9da89fc0ab0088af555f99d76f054539ef","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-04-12 13:32:30.000000000","message":"Patch Set 4:\n\n(4 comments)","accounts_in_message":[],"_revision_number":4},{"id":"f3df1e81e5e471fa05c0b218c59c3a9cc30fe9a9","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2022-04-19 18:28:20.000000000","message":"Patch Set 4:\n\n(2 comments)","accounts_in_message":[],"_revision_number":4},{"id":"fcab835bad5486d7a74fdc7ad5193a60a24e81b3","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-04-19 18:39:35.000000000","message":"Patch Set 4:\n\n(3 comments)","accounts_in_message":[],"_revision_number":4},{"id":"540faeba9e0eda2b9977a0a6812d85fab0991598","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2022-04-19 18:50:23.000000000","message":"Patch Set 4:\n\n(1 comment)","accounts_in_message":[],"_revision_number":4},{"id":"19c2e4822b7677441385eb769dc49c57bb3e61aa","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2022-04-19 19:13:01.000000000","message":"Patch Set 4:\n\n(1 comment)","accounts_in_message":[],"_revision_number":4},{"id":"4cd213eaa43a79df572cda195932651a1fe6feff","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-06-09 21:24:12.000000000","message":"Uploaded patch set 5.","accounts_in_message":[],"_revision_number":5},{"id":"eab3eeddcbf12a73f3075f04ae63a2f8a4e399a4","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2022-06-09 23:05:55.000000000","message":"Patch Set 5: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/45c76cd4af1446e5a264694d710bfeaa : SUCCESS in 1h 24m 42s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/92003ef065ec4396a6ebd45abf69b91a : SUCCESS in 59m 35s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/cbb4a3e1c3ce4c28b99acf07c90135cd : SUCCESS in 17m 15s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/4f992217d5b5409e9f8526b55c535a94 : SUCCESS in 8m 15s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/47778f597bae42bcbef97d4fcf738533 : SUCCESS in 14m 51s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/f3546ef2fff9410692241fc602c93215 : SUCCESS in 13m 03s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/5162caeb9c0f4150a979709826594aec : SUCCESS in 10m 54s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/1ec628ac155249d48e9e6b69da864b92 : SUCCESS in 1h 08m 55s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/c80644f7001541eaba793c51d2bfc26a : SUCCESS in 1h 31m 58s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/26e104ebc9114cf6a5645c08ff483d4e : FAILURE in 58m 11s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/630a4bd47f744a43aaf0c9f6a7c10bbb : FAILURE in 56m 46s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/70fed975976e45759db870d79e0a6963 : SUCCESS in 1h 27m 38s\n- nova-next https://zuul.opendev.org/t/openstack/build/2d76a32afca14c7c91da9d9b1e05da57 : SUCCESS in 1h 35m 10s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/cb13e25ef9124c58817e2e81c02e4581 : SUCCESS in 5m 50s (non-voting)\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/d4517563aae14445b3e0794fc2660924 : SUCCESS in 18m 42s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/18035411154e472781482181cf8cf892 : FAILURE in 1h 19m 32s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/2b912bfbe54d47c196955895edcf6df7 : SUCCESS in 1h 03m 34s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/94c064149c2d428ca1c2d493e7098079 : FAILURE in 34m 15s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/bd4233784df3457fa22c37306b58dfa3 : SUCCESS in 41m 38s (non-voting)","accounts_in_message":[],"_revision_number":5},{"id":"382f29a40f41e29ed1827ce9366cc6bf50055a82","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-06-13 14:32:17.000000000","message":"Patch Set 5:\n\n(1 comment)","accounts_in_message":[],"_revision_number":5},{"id":"77b7f48532ce098a964a8251d198898ae345b318","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2022-06-13 16:31:52.000000000","message":"Patch Set 5:\n\nBuild succeeded. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-focal-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/79/828979/5/check/tempest-dsvm-full-focal-py3/140b33d/ : SUCCESS in 1h 57m 20s","accounts_in_message":[],"_revision_number":5},{"id":"128e4515505e96a054b5ccc22523853a90b3d092","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2022-06-13 16:41:08.000000000","message":"Patch Set 5:\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttps://docs.opendev.org/opendev/infra-manual/latest/developers.html#automated-testing\n\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/77f6fa83536b48639e7e5d51f7c84e67 : SUCCESS in 1h 13m 12s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/501816692fc14147acedf9b6bd90c116 : SUCCESS in 52m 58s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/c3ed30ad3d0644f6b6327eb7350d4fa2 : SUCCESS in 15m 10s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/c8c0d8b77de94c9f8b75e0a6bb94020b : SUCCESS in 7m 32s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/b1a4833231ab456e9a689a577709b469 : SUCCESS in 13m 08s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/7a3ded339084487a84ed163724fb61dc : SUCCESS in 14m 18s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/e3cc81d0c2994778a38d25e3fc9e9a47 : SUCCESS in 11m 24s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/acf199d793d64d01a16b7023c4efc952 : SUCCESS in 1h 01m 56s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/95b54edd071f4d26ad2d542cb7108f24 : FAILURE in 1h 21m 49s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/2c891d5c6f634edd96ec5647d14c6a77 : SUCCESS in 44m 50s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/3407e93b7b9149d8ad7253ae6531ec51 : SUCCESS in 57m 44s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/d0e12667fe8e4a618299fd78e4b3879d : SUCCESS in 1h 40m 21s\n- nova-next https://zuul.opendev.org/t/openstack/build/e9abdd235fd343a0be9dcadc050581d5 : SUCCESS in 1h 44m 59s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/c632227f6b6047fa9f9a103a5056aaf9 : SUCCESS in 6m 18s (non-voting)\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/0557b3204f4a46e6ae5cc9a42ce70c20 : SUCCESS in 18m 57s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/81c49c404107413488d58f11e7f8ffae : FAILURE in 1h 20m 14s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/2bd4e45ef2bf4d39a85f10db33707516 : SUCCESS in 1h 00m 52s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/d363af6578034d6e90e3903c93793a0e : FAILURE in 34m 28s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/5bd8e76d46f6425eba5e64e061709543 : SUCCESS in 39m 31s (non-voting)","accounts_in_message":[],"_revision_number":5},{"id":"7f79a3628e1726ecef3cd210c8ee29fae0eeb487","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-06-13 18:12:06.000000000","message":"Patch Set 5:\n\n(1 comment)","accounts_in_message":[],"_revision_number":5},{"id":"899bb7248d4becfe81ff1c0e633e5c7c7d47d42f","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2022-06-13 19:50:00.000000000","message":"Patch Set 5:\n\nBuild failed. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-focal-py3 finger://zuul-v3-executor.novalocal/77589dcebf274147989733a7e4d8861c : POST_FAILURE in 1h 35m 41s","accounts_in_message":[],"_revision_number":5},{"id":"e1b4a9d21b417f1b240de97f631da76ca8c0c7d6","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2022-06-13 20:15:32.000000000","message":"Patch Set 5: Verified+1\n\nBuild succeeded (check pipeline).\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/806ba870b9614e7db84587852e3b7534 : SUCCESS in 1h 43m 26s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/0f8f6faddaba487d8a9fe196ff12daa9 : SUCCESS in 42m 22s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/36d26a31dd014fcbada0c752ebce7661 : SUCCESS in 19m 17s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/f0b40a92977d41bb8f1e9998b2b97c2a : SUCCESS in 9m 01s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/0b5a7e00101e4489b483e24edf645be8 : SUCCESS in 12m 28s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/8a33cbd166a54eb2b804cdf60248b5d1 : SUCCESS in 13m 36s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/7bf5bd7cbf8249daa02dcab5e8dc3dc3 : SUCCESS in 12m 19s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/6392cbc3eed94f16a0681de452ce99e5 : SUCCESS in 57m 31s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/7d37224c35ca4e2eacbfc2532eece3ae : SUCCESS in 1h 12m 18s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/40706be455eb42f883e3844df3fe60a0 : SUCCESS in 56m 02s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/d1b430b10c3f4d18b1186871b65f64c0 : FAILURE in 50m 15s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/35efe86712744882b4d55589607f16bd : SUCCESS in 1h 37m 17s\n- nova-next https://zuul.opendev.org/t/openstack/build/edebdda6bb9b40408259f6a0e6695f45 : SUCCESS in 1h 50m 47s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/15a72637e72144999111ab967e2ca118 : SUCCESS in 7m 19s (non-voting)\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/38bb5ee88c794516ba44589ad3e1b5f4 : SUCCESS in 15m 29s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/e5b42439c6954b04bb1a9140eb3a7004 : SUCCESS in 1h 11m 52s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/152f0b0765d245e08cbe93d1cd28ee0a : SUCCESS in 42m 21s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/e52bec5ef1114d14826d6a48c6869b7c : FAILURE in 26m 49s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/4f540c01f79a4c8a820382b9d7fa94f6 : SUCCESS in 39m 03s (non-voting)","accounts_in_message":[],"_revision_number":5},{"id":"9a880560eda5e9739ed855d8df5fef5b17e72a09","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"date":"2022-06-13 20:15:39.000000000","message":"Patch Set 5:\n\nBuild FAILED. log path: ${LOG_PATH}\nLeave a comment with \u0027run-Lightbits CI\u0027 to trigger a recheck. \nFor more information about CI, please see https://wiki.openstack.org/wiki/ThirdPartySystems/LightbitsLabs_CI","accounts_in_message":[],"_revision_number":5},{"id":"1ea1661d35f1761a3986e6f9846f19f5bd5e2e67","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-06-14 15:59:35.000000000","message":"Patch Set 5:\n\n(1 comment)","accounts_in_message":[],"_revision_number":5},{"id":"9a128b12297ce108d515ec79c70fcc6255834115","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2022-06-29 18:01:24.000000000","message":"Uploaded patch set 6.","accounts_in_message":[],"_revision_number":6},{"id":"e39ee5247e19fd87765502de71f817f98b03d8dd","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2022-06-29 19:29:40.000000000","message":"Patch Set 6: Verified+1\n\nBuild succeeded (check pipeline).\n\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/8c4c53e454fe40bbb7eb3ade53fc19da : SUCCESS in 1h 20m 53s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/b5e461b8d8f449cd89d75ef88f9e2ff6 : SUCCESS in 46m 38s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/6d3af3d0969f498bb1001e5fa5570b25 : SUCCESS in 17m 46s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/5101c7685d2649089fed1163fa8f62fa : SUCCESS in 8m 04s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/0e7f46749d1f4e76adc6ae97c6eb4709 : SUCCESS in 13m 11s\n- openstack-tox-py38 https://zuul.opendev.org/t/openstack/build/f0a4a7d539914c8aa6598dfd64d96365 : SUCCESS in 11m 47s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/7d633019a9434beda636897481ad555b : SUCCESS in 10m 49s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/8c06b1d43bd04ecc8373dc2d29f36445 : SUCCESS in 55m 33s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/b33ab46b40eb4fdda6ad325746b48bdb : SUCCESS in 1h 14m 28s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/776875b1d9474babbfff11c8731de501 : SUCCESS in 40m 38s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/acdb93d490754a19bdbaa51e6f5cf72a : FAILURE in 52m 00s (non-voting)\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/222bfcc2bb8b4e2dbb9dd5496524c2c8 : SUCCESS in 1h 26m 13s\n- nova-next https://zuul.opendev.org/t/openstack/build/721ca4b015574f48b0e4003ee20bd31e : SUCCESS in 1h 10m 55s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/6522bbf64f2749229922dcd902b2679b : SUCCESS in 6m 28s (non-voting)\n- nova-tox-functional-py38 https://zuul.opendev.org/t/openstack/build/cdf9ed134dfd4712923362315e07c5f0 : SUCCESS in 17m 54s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/a09f5a2588624abc8cc45a992c567a69 : SUCCESS in 1h 07m 32s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/e7fe4716b4b542438c93d90b62381cd6 : SUCCESS in 47m 03s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/46bfd85d9197420e85ce641969be0804 : FAILURE in 26m 07s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/bc7de0bd9db34da59f619a0c375098c4 : SUCCESS in 39m 18s (non-voting)","accounts_in_message":[],"_revision_number":6},{"id":"279ed9195e81c41701b6c8e5e898aef0e0c4fd18","author":{"_account_id":10118,"name":"IBM PowerKVM CI","email":"kvmpower@linux.vnet.ibm.com","username":"powerkvm","tags":["SERVICE_USER"]},"date":"2022-06-29 20:06:05.000000000","message":"Patch Set 6:\n\nBuild succeeded. Test completed on IBM PowerKVM platform. For rechecking only on the IBM PowerKVM CI, add a review comment with pkvm- recheck. For contact and more information, see https://wiki.openstack.org/wiki/PowerKVM\n\n- tempest-dsvm-full-focal-py3 https://oplab9.parqtec.unicamp.br/pub/ppc64el/openstack/nova/79/828979/6/check/tempest-dsvm-full-focal-py3/abef129/ : SUCCESS in 1h 44m 15s","accounts_in_message":[],"_revision_number":6},{"id":"99457769c40e459fa3a32f966c4451903140d134","author":{"_account_id":11805,"name":"Corey Bryant","email":"corey.bryant@canonical.com","username":"coreycb"},"date":"2023-07-26 18:51:55.000000000","message":"Patch Set 6:\n\n(1 comment)","accounts_in_message":[],"_revision_number":6},{"id":"1fa16878fc2e0cd60cbd28f170378abf87989c6e","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2023-07-26 18:59:47.000000000","message":"Patch Set 6:\n\n(1 comment)","accounts_in_message":[],"_revision_number":6},{"id":"684fa79f7a11415105cc98aeee54055f425be214","author":{"_account_id":33350,"name":"Silvano Nogueira Buback","email":"silvano.buback@workday.com","username":"snbuback"},"date":"2023-09-12 15:39:07.000000000","message":"Patch Set 6: Code-Review+1\n\n(1 comment)","accounts_in_message":[],"_revision_number":6},{"id":"fd1431447ed800456945cfbefdf8cecfa88bea4f","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2023-09-13 13:41:27.000000000","message":"Patch Set 6:\n\n(1 comment)","accounts_in_message":[],"_revision_number":6},{"id":"090dc83bc77014a3824a5a0b24fd1ac24f47c9f9","tag":"autogenerated:gerrit:abandon","author":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"date":"2023-09-13 13:41:53.000000000","message":"Abandoned\n\nDifferent/downstream patch used in bug 1960758.","accounts_in_message":[],"_revision_number":6},{"id":"ba6b7a60c0c9337ab4fa24e04f305c42ec4cbe07","author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"date":"2023-09-13 13:54:09.000000000","message":"Patch Set 6:\n\n(5 comments)","accounts_in_message":[],"_revision_number":6}],"current_revision_number":6,"current_revision":"75e30a5a8cdd5343e65c14dbdc306ec3efee74bd","revisions":{"fea1fc6e2d266638d27b6b58ff28a5d08dbe44ce":{"kind":"REWORK","_number":1,"created":"2022-02-13 22:27:18.000000000","uploader":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"ref":"refs/changes/79/828979/1","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/79/828979/1","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/1 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/1 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/1 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/79/828979/1"}}},"commit":{"parents":[{"commit":"9b3d69c18525c4308ffd3dbb619c6ed8789eb9f0","subject":"Merge \"Add a WA flag waiting for vif-plugged event during reboot\" into stable/victoria","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/9b3d69c18525c4308ffd3dbb619c6ed8789eb9f0"}]}],"author":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-01-20 14:37:19.000000000","tz":-180},"committer":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-02-13 22:27:01.000000000","tz":-180},"subject":"libvirt: disable secure boot on non-q35 or with os secure_boot options","message":"libvirt: disable secure boot on non-q35 or with os secure_boot options\n\nImpact:\n\u003d\u003d\u003d\n\nCurrently, setting hw_firwmare_type\u003duefi on Ubuntu 20.04\nmight create _unbootable_ servers on Ussuri and Victoria.\n\nWallaby and later are fixed with refactoring, as part of\nthe Secure Boot implementation, but that\u0027s risky; see\ncommit 9fff6893ce2e (\"libvirt: Use firmware metadata files\nto configure instance\") and others.\n\nIssue:\n\u003d\u003d\u003d\n\nThe issue is that if UEFI is enabled, SB can be enabled\nif loader OVMF_CODE.secboot.fd exists (eg, Ubuntu 20.04);\nsee commit 363710b65543 (\"libvirt: Handle alternative\nUEFI firmware binary paths\").\n\nThis is unintended and might prevent guest from booting\nbecause SB requires an q35 machine type, SMM feature in\nlibvirt XML, SB-ready image etc. (Neither is enabled by\ndefault nor guaranteed to be available or functional.)\n\nApproach:\n\u003d\u003d\u003d\n\nWell, SB support _isn\u0027t_ implemented in Ussuri/Victoria,\nonly later in Wallaby. The first commit above fixes the\nissue because it removes hardcoded firmware/loader path\nfrom second commit above.\n\nAs SB isn\u0027t supported, could we just ignore .secboot.fd?\n\nBut let\u0027s not change default behavior ~2 years into LTS.\n\nFix:\n\u003d\u003d\u003d\n\nSo, ignore .secboot.fd loader IF not q35. And since q35\nmay be set for AMD SEV, check `os.secure_boot` property/\nextra spec for `disabled` to ignore .secboot.fd as well\n(as listed in future `doc/source/admin/secure-boot.rst`),\nand users can explicitly disable it to boot UEFI on q35.\n\n(And as SB is not supported, do not check for both must\nmatch [`disabled`/`required`] as `required` isn\u0027t valid;\nthus if either image/flavor sets `disabled`, disable it).\n\nInfo:\n\u003d\u003d\u003d\n\n    [0] https://docs.openstack.org/nova/wallaby/admin/uefi.html\n    [1] https://docs.openstack.org/nova/wallaby/admin/secure-boot.html\n    [2] https://docs.openstack.org/nova/wallaby/user/flavors.html\n    [3] https://specs.openstack.org/openstack/nova-specs/specs/wallaby/implemented/allow-secure-boot-for-qemu-kvm-guests.html\n\nTests:\n\u003d\u003d\u003d\n\n    Original:\n\n    - Boots: BIOS / pc\n    - Boots: BIOS / q35\n\n    - Fails: UEFI / pc  / OVMF_CODE.secboot.fd\n    - Fails: UEFI / q35 / OVMF_CODE.secboot.fd\n\n    Patched:\n\n    - Boots: BIOS / pc\n    - Boots: BIOS / q35\n\n    - Boots: UEFI / pc  / OVMF_CODE.fd          # FIXED!\n    - Fails: UEFI / q35 / OVMF_CODE.secboot.fd  # No change by default.\n\n    - Boots: UEFI / q35 / OVMF_CODE.fd / os_secure_boot\u003ddisabled (image)\n    - Boots: UEFI / q35 / OVMF_CODE.fd / os:secure_boot\u003ddisabled (flavor)\n\nLogs: (included for PC with UEFI only; broken/fixed case)\n\u003d\u003d\u003d\n\n    $ openstack image set --property hw_firmware_type\u003duefi bionic\n    $ openstack server create --image bionic --flavor m1.small --network private srv\n\nBefore:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.secboot.fd\u003c/loader\u003e\n\n    Guest doesn\u0027t boot; nothing in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    $ openstack console log show srv | wc -l\n    0\n\n    QEMU looping / 100% CPU:\n\n    $ juju run --app nova-compute \u0027top -b -d1 -n5 | grep qemu\u0027\n      67205 libvirt+  ... 100.0   1.4   1:18.35\tqemu-sy+\n      67205 libvirt+  ... 100.0   1.4   1:19.36\tqemu-sy+\n      67205 libvirt+  ...  99.0   1.4   1:20.36\tqemu-sy+\n      67205 libvirt+  ... 101.0   1.4   1:21.37\tqemu-sy+\n      67205 libvirt+  ... 100.0   1.4   1:22.38\tqemu-sy+\n\nAfter:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\n    Guest booted; details in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    ...\n    Creating boot entry \"Boot0003\" with label \"ubuntu\" for file \"\\EFI\\ubuntu\\shimx64.efi\"\n    ...\n    [    0.000000] efi: EFI v2.70 by EDK II\n    [    0.000000] efi:  SMBIOS\u003d0x7fbcd000  ACPI\u003d0x7fbfa000  ACPI\n    2.0\u003d0x7fbfa014  MEMATTR\u003d0x7eb30018\n    [    0.000000] SMBIOS 2.8 present.\n    [    0.000000] DMI: OpenStack Foundation OpenStack Nova, BIOS 0.0.0 02/06/2015\n    ...\n\nNote that the XML snippet for the loader is aligned with Wallaby,\nin which just setting hw_firmware_type\u003duefi works out of the box:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n        \u003cnova:name\u003esrv\u003c/nova:name\u003e\n      \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n      \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027no\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\nCloses-Bug: #1960758\nSigned-off-by: Mauricio Faria de Oliveira \u003cmfo@canonical.com\u003e\nChange-Id: Ib6e52706e1eca92fefc44d21fab9f5df8780543c\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/fea1fc6e2d266638d27b6b58ff28a5d08dbe44ce"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/fea1fc6e2d266638d27b6b58ff28a5d08dbe44ce"}]},"branch":"refs/heads/stable/victoria"},"84383af704acda4f94a21fec065d5e6c6c5f80c9":{"kind":"REWORK","_number":2,"created":"2022-02-14 12:42:42.000000000","uploader":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"ref":"refs/changes/79/828979/2","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/79/828979/2","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/2 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/2 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/2 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/79/828979/2"}}},"commit":{"parents":[{"commit":"9b3d69c18525c4308ffd3dbb619c6ed8789eb9f0","subject":"Merge \"Add a WA flag waiting for vif-plugged event during reboot\" into stable/victoria","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/9b3d69c18525c4308ffd3dbb619c6ed8789eb9f0"}]}],"author":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-01-20 14:37:19.000000000","tz":-180},"committer":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-02-14 12:25:57.000000000","tz":-180},"subject":"[stable-only] libvirt: disable secure boot on non-q35 or with os secure_boot options","message":"[stable-only] libvirt: disable secure boot on non-q35 or with os secure_boot options\n\nImpact:\n\u003d\u003d\u003d\n\nCurrently, setting hw_firwmare_type\u003duefi on Ubuntu 20.04\nmight create _unbootable_ servers on Ussuri and Victoria.\n\nWallaby and later are fixed with refactoring, as part of\nthe Secure Boot implementation, but that\u0027s risky; see\ncommit 9fff6893ce2e (\"libvirt: Use firmware metadata files\nto configure instance\") and others.\n\nIssue:\n\u003d\u003d\u003d\n\nThe issue is that if UEFI is enabled, SB can be enabled\nif loader OVMF_CODE.secboot.fd exists (eg, Ubuntu 20.04);\nsee commit 363710b65543 (\"libvirt: Handle alternative\nUEFI firmware binary paths\").\n\nThis is unintended and might prevent guest from booting\nbecause SB requires an q35 machine type, SMM feature in\nlibvirt XML, SB-ready image etc. (Neither is enabled by\ndefault nor guaranteed to be available or functional.)\n\nApproach:\n\u003d\u003d\u003d\n\nWell, SB support _isn\u0027t_ implemented in Ussuri/Victoria,\nonly later in Wallaby. The first commit above fixes the\nissue because it removes hardcoded firmware/loader path\nfrom second commit above.\n\nAs SB isn\u0027t supported should we just ignore .secboot.fd?\nMaybe not completely? Let\u0027s ignore it if not q35 (which\nit _needs_; note the behavior change but it\u0027s otherwise\nbroken anyway), and if q35 is used (for something else)\nand still broken with .secboot.fd, provide users with a\nway out of the latter using documented (future) options.\n\n[Or should we opinionatedly just ignore .secboot.fd, as\nSecure Boot is not yet supported anyway, and options to\nget it back are provided? (e.g. os secure_boot\u003drequired).\n\nFix:\n\u003d\u003d\u003d\n\nSo, ignore .secboot.fd loader IF not q35. And since q35\nmay be set for AMD SEV, check `os.secure_boot` property/\nextra spec for `disabled` to ignore .secboot.fd as well\n(as listed in future `doc/source/admin/secure-boot.rst`),\nand users can explicitly disable it to boot UEFI on q35.\n\n(And as SB is not supported, do not check for both must\nmatch [`disabled`/`required`] as `required` isn\u0027t valid;\nthus if either image/flavor sets `disabled`, disable it).\n\nInfo:\n\u003d\u003d\u003d\n\n    [0] https://docs.openstack.org/nova/wallaby/admin/uefi.html\n    [1] https://docs.openstack.org/nova/wallaby/admin/secure-boot.html\n    [2] https://docs.openstack.org/nova/wallaby/user/flavors.html\n    [3] https://specs.openstack.org/openstack/nova-specs/specs/wallaby/implemented/allow-secure-boot-for-qemu-kvm-guests.html\n\nTests:\n\u003d\u003d\u003d\n\n    Original:\n\n    - Boots: BIOS / pc\n    - Boots: BIOS / q35\n\n    - Fails: UEFI / pc  / OVMF_CODE.secboot.fd\n    - Fails: UEFI / q35 / OVMF_CODE.secboot.fd\n\n    Patched:\n\n    - Boots: BIOS / pc\n    - Boots: BIOS / q35\n\n    - Boots: UEFI / pc  / OVMF_CODE.fd          # FIXED!\n    - Fails: UEFI / q35 / OVMF_CODE.secboot.fd  # No change by default.\n\n    - Boots: UEFI / q35 / OVMF_CODE.fd / os_secure_boot\u003ddisabled (image)\n    - Boots: UEFI / q35 / OVMF_CODE.fd / os:secure_boot\u003ddisabled (flavor)\n\nLogs: (included for PC with UEFI only; broken/fixed case)\n\u003d\u003d\u003d\n\n    $ openstack image set --property hw_firmware_type\u003duefi bionic\n    $ openstack server create --image bionic --flavor m1.small --network private srv\n\nBefore:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.secboot.fd\u003c/loader\u003e\n\n    Guest doesn\u0027t boot; nothing in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    $ openstack console log show srv | wc -l\n    0\n\n    QEMU looping / 100% CPU:\n\n    $ juju run --app nova-compute \u0027top -b -d1 -n5 | grep qemu\u0027\n      67205 libvirt+  ... 100.0   1.4   1:18.35\tqemu-sy+\n      67205 libvirt+  ... 100.0   1.4   1:19.36\tqemu-sy+\n      67205 libvirt+  ...  99.0   1.4   1:20.36\tqemu-sy+\n      67205 libvirt+  ... 101.0   1.4   1:21.37\tqemu-sy+\n      67205 libvirt+  ... 100.0   1.4   1:22.38\tqemu-sy+\n\nAfter:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\n    Guest booted; details in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    ...\n    Creating boot entry \"Boot0003\" with label \"ubuntu\" for file \"\\EFI\\ubuntu\\shimx64.efi\"\n    ...\n    [    0.000000] efi: EFI v2.70 by EDK II\n    [    0.000000] efi:  SMBIOS\u003d0x7fbcd000  ACPI\u003d0x7fbfa000  ACPI\n    2.0\u003d0x7fbfa014  MEMATTR\u003d0x7eb30018\n    [    0.000000] SMBIOS 2.8 present.\n    [    0.000000] DMI: OpenStack Foundation OpenStack Nova, BIOS 0.0.0 02/06/2015\n    ...\n\nNote that the XML snippet for the loader is aligned with Wallaby,\nin which just setting hw_firmware_type\u003duefi works out of the box:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n        \u003cnova:name\u003esrv\u003c/nova:name\u003e\n      \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n      \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027no\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\nCloses-Bug: #1960758\nSigned-off-by: Mauricio Faria de Oliveira \u003cmfo@canonical.com\u003e\nChange-Id: Ib6e52706e1eca92fefc44d21fab9f5df8780543c\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/84383af704acda4f94a21fec065d5e6c6c5f80c9"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/84383af704acda4f94a21fec065d5e6c6c5f80c9"}]},"branch":"refs/heads/stable/victoria"},"5d44443777664109b4fcccf520ee59e160603d22":{"kind":"REWORK","_number":3,"created":"2022-03-04 23:00:39.000000000","uploader":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"ref":"refs/changes/79/828979/3","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/79/828979/3","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/3 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/3 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/3 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/79/828979/3"}}},"commit":{"parents":[{"commit":"9b3d69c18525c4308ffd3dbb619c6ed8789eb9f0","subject":"Merge \"Add a WA flag waiting for vif-plugged event during reboot\" into stable/victoria","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/9b3d69c18525c4308ffd3dbb619c6ed8789eb9f0"}]}],"author":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-01-20 14:37:19.000000000","tz":-180},"committer":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-03-04 23:00:03.000000000","tz":-180},"subject":"[stable-only] libvirt: UEFI: skip OVMF_CODE.secboot.fd on pc if possible","message":"[stable-only] libvirt: UEFI: skip OVMF_CODE.secboot.fd on pc if possible\n\nCurrently, setting hw_firwmare_type\u003duefi on Ubuntu 20.04\nmight create _unbootable_ servers on Ussuri and Victoria,\nas OVMF_CODE.secboot.fd has SB+SMM features; SMM requires\nthe q35 machine type, thus fails to boot on pc (default).\n\nFix that by checking for q35 machine type, and other file\nis available. (We can\u0027t check files for SMM to confirm.)\n\nIf it\u0027s not q35 (ie, it\u0027s pc):\n- If other firmware is available, use that.\n- Else, well, let\u0027s at least try; log that, and good luck!\n  (Maybe we should error out? but this is stable-only..)\n\n[stable-only]:\n\nWallaby and later are fixed with refactoring, as part of\nthe Secure Boot implementation, but that\u0027s big/risky; see\ncommit 9fff6893ce2e (\"libvirt: Use firmware metadata files\nto configure instance\").\n\nThat removed the hardcoded paths from commit 363710b65543\n(\"libvirt: Handle alternative UEFI firmware binary paths\").\n\nInfo:\n\n    [0] https://docs.openstack.org/nova/wallaby/admin/uefi.html\n    [1] https://docs.openstack.org/nova/wallaby/admin/secure-boot.html\n    [2] https://docs.openstack.org/nova/wallaby/user/flavors.html\n    [3] https://specs.openstack.org/openstack/nova-specs/specs/wallaby/implemented/allow-secure-boot-for-qemu-kvm-guests.html\n\nTest:\n\n    $ openstack image set --property hw_firmware_type\u003duefi bionic\n    $ openstack server create --image bionic --flavor m1.small --network private srv\n\nBefore:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.secboot.fd\u003c/loader\u003e\n\n    Guest doesn\u0027t boot; nothing in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    $ openstack console log show srv | wc -l\n    0\n\n    QEMU looping / 100% CPU:\n\n    $ juju run --app nova-compute \u0027top -b -d1 -n5 | grep qemu\u0027\n      67205 libvirt+  ... 100.0   1.4   1:18.35\tqemu-sy+\n      67205 libvirt+  ... 100.0   1.4   1:19.36\tqemu-sy+\n      67205 libvirt+  ...  99.0   1.4   1:20.36\tqemu-sy+\n      67205 libvirt+  ... 101.0   1.4   1:21.37\tqemu-sy+\n      67205 libvirt+  ... 100.0   1.4   1:22.38\tqemu-sy+\n\nAfter:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\n    Guest booted; details in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    ...\n    Creating boot entry \"Boot0003\" with label \"ubuntu\" for file \"\\EFI\\ubuntu\\shimx64.efi\"\n    ...\n    [    0.000000] efi: EFI v2.70 by EDK II\n    [    0.000000] efi:  SMBIOS\u003d0x7fbcd000  ACPI\u003d0x7fbfa000  ACPI\n    2.0\u003d0x7fbfa014  MEMATTR\u003d0x7eb30018\n    [    0.000000] SMBIOS 2.8 present.\n    [    0.000000] DMI: OpenStack Foundation OpenStack Nova, BIOS 0.0.0 02/06/2015\n    ...\n\nNote that the XML snippet for the loader is aligned with Wallaby,\nin which just setting hw_firmware_type\u003duefi works out of the box:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n        \u003cnova:name\u003esrv\u003c/nova:name\u003e\n      \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n      \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027no\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\nCloses-Bug: #1960758\nSigned-off-by: Mauricio Faria de Oliveira \u003cmfo@canonical.com\u003e\nChange-Id: Ib6e52706e1eca92fefc44d21fab9f5df8780543c\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/5d44443777664109b4fcccf520ee59e160603d22"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/5d44443777664109b4fcccf520ee59e160603d22"}]},"branch":"refs/heads/stable/victoria"},"ebed454cd75db5fe20250e2029854977062c0f0f":{"kind":"TRIVIAL_REBASE","_number":4,"created":"2022-03-04 23:01:17.000000000","uploader":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"ref":"refs/changes/79/828979/4","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/79/828979/4","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/4 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/4 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/4 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/79/828979/4"}}},"commit":{"parents":[{"commit":"b5b57c4669da07c3ee4c53d290e6ac4819bf4e15","subject":"Merge \"[rt] Apply migration context for incoming migrations\" into stable/victoria","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/b5b57c4669da07c3ee4c53d290e6ac4819bf4e15"}]}],"author":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-01-20 14:37:19.000000000","tz":-180},"committer":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-03-04 23:01:07.000000000","tz":-180},"subject":"[stable-only] libvirt: UEFI: skip OVMF_CODE.secboot.fd on pc if possible","message":"[stable-only] libvirt: UEFI: skip OVMF_CODE.secboot.fd on pc if possible\n\nCurrently, setting hw_firwmare_type\u003duefi on Ubuntu 20.04\nmight create _unbootable_ servers on Ussuri and Victoria,\nas OVMF_CODE.secboot.fd has SB+SMM features; SMM requires\nthe q35 machine type, thus fails to boot on pc (default).\n\nFix that by checking for q35 machine type, and other file\nis available. (We can\u0027t check files for SMM to confirm.)\n\nIf it\u0027s not q35 (ie, it\u0027s pc):\n- If other firmware is available, use that.\n- Else, well, let\u0027s at least try; log that, and good luck!\n  (Maybe we should error out? but this is stable-only..)\n\n[stable-only]:\n\nWallaby and later are fixed with refactoring, as part of\nthe Secure Boot implementation, but that\u0027s big/risky; see\ncommit 9fff6893ce2e (\"libvirt: Use firmware metadata files\nto configure instance\").\n\nThat removed the hardcoded paths from commit 363710b65543\n(\"libvirt: Handle alternative UEFI firmware binary paths\").\n\nInfo:\n\n    [0] https://docs.openstack.org/nova/wallaby/admin/uefi.html\n    [1] https://docs.openstack.org/nova/wallaby/admin/secure-boot.html\n    [2] https://docs.openstack.org/nova/wallaby/user/flavors.html\n    [3] https://specs.openstack.org/openstack/nova-specs/specs/wallaby/implemented/allow-secure-boot-for-qemu-kvm-guests.html\n\nTest:\n\n    $ openstack image set --property hw_firmware_type\u003duefi bionic\n    $ openstack server create --image bionic --flavor m1.small --network private srv\n\nBefore:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.secboot.fd\u003c/loader\u003e\n\n    Guest doesn\u0027t boot; nothing in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    $ openstack console log show srv | wc -l\n    0\n\n    QEMU looping / 100% CPU:\n\n    $ juju run --app nova-compute \u0027top -b -d1 -n5 | grep qemu\u0027\n      67205 libvirt+  ... 100.0   1.4   1:18.35\tqemu-sy+\n      67205 libvirt+  ... 100.0   1.4   1:19.36\tqemu-sy+\n      67205 libvirt+  ...  99.0   1.4   1:20.36\tqemu-sy+\n      67205 libvirt+  ... 101.0   1.4   1:21.37\tqemu-sy+\n      67205 libvirt+  ... 100.0   1.4   1:22.38\tqemu-sy+\n\nAfter:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\n    Guest booted; details in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    ...\n    Creating boot entry \"Boot0003\" with label \"ubuntu\" for file \"\\EFI\\ubuntu\\shimx64.efi\"\n    ...\n    [    0.000000] efi: EFI v2.70 by EDK II\n    [    0.000000] efi:  SMBIOS\u003d0x7fbcd000  ACPI\u003d0x7fbfa000  ACPI\n    2.0\u003d0x7fbfa014  MEMATTR\u003d0x7eb30018\n    [    0.000000] SMBIOS 2.8 present.\n    [    0.000000] DMI: OpenStack Foundation OpenStack Nova, BIOS 0.0.0 02/06/2015\n    ...\n\nNote that the XML snippet for the loader is aligned with Wallaby,\nin which just setting hw_firmware_type\u003duefi works out of the box:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n        \u003cnova:name\u003esrv\u003c/nova:name\u003e\n      \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n      \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027no\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\nCloses-Bug: #1960758\nSigned-off-by: Mauricio Faria de Oliveira \u003cmfo@canonical.com\u003e\nChange-Id: Ib6e52706e1eca92fefc44d21fab9f5df8780543c\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/ebed454cd75db5fe20250e2029854977062c0f0f"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/ebed454cd75db5fe20250e2029854977062c0f0f"}]},"branch":"refs/heads/stable/victoria"},"6d487369125166e96bd514593d6933d5ae1dbfb6":{"kind":"REWORK","_number":5,"created":"2022-06-09 21:24:12.000000000","uploader":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"ref":"refs/changes/79/828979/5","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/79/828979/5","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/5 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/5 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/5 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/79/828979/5"}}},"commit":{"parents":[{"commit":"d218250eb53791012f49825140e2592dab89e69c","subject":"Define new functional test tox env for placement gate to run","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d218250eb53791012f49825140e2592dab89e69c"}]}],"author":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-01-20 14:37:19.000000000","tz":-180},"committer":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-06-09 21:21:42.000000000","tz":-180},"subject":"[stable-only] libvirt: UEFI: pc: skip OVMF_CODE.secboot.fd if possible","message":"[stable-only] libvirt: UEFI: pc: skip OVMF_CODE.secboot.fd if possible\n\nOption `hw_firwmare_type\u003duefi` might create _unbootable_\nservers on Ussuri and Victoria if OVMF_CODE.secboot.fd\nis found and has SB+SMM features (both are usually true),\nbecause SMM requires `q35`, thus fails to boot on `pc`.\n\nSo, check for non-`q35` machine type and try another file.\nIf there\u0027s none, log that. (We know it might fail to boot.\nMaybe it should error out? but this is stable-only..)\n\nAdd unit tests for the 6 possible scenarios (`pc/q35` with\nboth files present and either file present).\n\nWhy stable-only and not cherry-picks?\n\nWallaby and later are fixed with refactoring, as part of\nthe Secure Boot implementation, but that\u0027s big/risky; see\ncommit 9fff6893ce2e (\"libvirt: Use firmware metadata files\nto configure instance\").\n\nThat removed the hardcoded paths from commit 363710b65543\n(\"libvirt: Handle alternative UEFI firmware binary paths\").\n\nDocs:\n\n    [0] https://docs.openstack.org/nova/wallaby/admin/uefi.html\n    [1] https://docs.openstack.org/nova/wallaby/admin/secure-boot.html\n    [2] https://docs.openstack.org/nova/wallaby/user/flavors.html\n    [3] https://specs.openstack.org/openstack/nova-specs/specs/wallaby/implemented/allow-secure-boot-for-qemu-kvm-guests.html\n\nTest:\n\n    $ openstack image set --property hw_firmware_type\u003duefi bionic\n    $ openstack server create --image bionic --flavor m1.small --network private srv\n\nBefore:\n\n    $ virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.secboot.fd\u003c/loader\u003e\n\n    Guest doesn\u0027t boot; nothing in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    $\n\nAfter:\n\n    $ virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n          \u003cnova:name\u003esrv\u003c/nova:name\u003e\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\n    Guest booted; details in the console log:\n\n    $ openstack console log show srv | grep -i -e efi -e bios\n    ...\n    Creating boot entry \"Boot0003\" with label \"ubuntu\" for file \"\\EFI\\ubuntu\\shimx64.efi\"\n    ...\n    [    0.000000] efi: EFI v2.70 by EDK II\n    [    0.000000] efi:  SMBIOS\u003d0x7fbcd000  ACPI\u003d0x7fbfa000  ACPI\n    2.0\u003d0x7fbfa014  MEMATTR\u003d0x7eb30018\n    [    0.000000] SMBIOS 2.8 present.\n    [    0.000000] DMI: OpenStack Foundation OpenStack Nova, BIOS 0.0.0 02/06/2015\n    ...\n\nNote that the XML snippet for the loader is aligned with Wallaby,\nin which just setting hw_firmware_type\u003duefi works out of the box:\n\n    $ juju run --app nova-compute \u0027for guest in $(virsh list --name); do \\\n      virsh dumpxml $guest; done | grep -e nova:name -e machine\u003d -e loader\u0027\n        \u003cnova:name\u003esrv\u003c/nova:name\u003e\n      \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n      \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027no\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\nCloses-Bug: #1960758\nSigned-off-by: Mauricio Faria de Oliveira \u003cmfo@canonical.com\u003e\nChange-Id: Ib6e52706e1eca92fefc44d21fab9f5df8780543c\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/6d487369125166e96bd514593d6933d5ae1dbfb6"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/6d487369125166e96bd514593d6933d5ae1dbfb6"}]},"branch":"refs/heads/stable/victoria"},"75e30a5a8cdd5343e65c14dbdc306ec3efee74bd":{"kind":"REWORK","_number":6,"created":"2022-06-29 18:01:24.000000000","uploader":{"_account_id":28621,"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","username":"mfo"},"ref":"refs/changes/79/828979/6","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/79/828979/6","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/6 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/6 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/79/828979/6 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/79/828979/6"}}},"commit":{"parents":[{"commit":"d218250eb53791012f49825140e2592dab89e69c","subject":"Define new functional test tox env for placement gate to run","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d218250eb53791012f49825140e2592dab89e69c"}]}],"author":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-01-20 14:37:19.000000000","tz":-180},"committer":{"name":"Mauricio Faria de Oliveira","email":"mfo@canonical.com","date":"2022-06-29 17:57:32.000000000","tz":-180},"subject":"[stable-only] libvirt: UEFI: pc: prefer non-secureboot loaders","message":"[stable-only] libvirt: UEFI: pc: prefer non-secureboot loaders\n\nOption `hw_firwmare_type\u003duefi` might create _unbootable_\nservers on Ussuri and Victoria if OVMF_CODE.secboot.fd\nis found and has SB+SMM features (both are usually true),\nbecause SMM requires `q35`, thus fails to boot on `pc`.\n\nSo, check for non-`q35` machine, and prefer other loaders.\n\nIf it\u0027s the only loader available, well, log that and try.\n(We know it might fail to boot. Maybe it should error out?\nBut this is stable-only.. so, don\u0027t change _that_ behavior.)\n\nAlso, add unit tests for the 6 possible scenarios (that is,\n`pc/q35` with both/either loader(s) present).\n\n    $ . .tox/py38/bin/activate\n    $ stestr run nova.tests.unit.virt.libvirt.test_driver.LibvirtConnTestCase.test_get_guest_config_with_uefi_\n    ...\n    ...test_get_guest_config_with_uefi_pc_both_loaders [2.882679s] ... ok\n    ...test_get_guest_config_with_uefi_pc_only_regular [3.012471s] ... ok\n    ...test_get_guest_config_with_uefi_pc_only_secboot [3.099102s] ... ok\n    ...test_get_guest_config_with_uefi_q35_both_loaders [0.075068s] ... ok\n    ...test_get_guest_config_with_uefi_q35_only_regular [2.681666s] ... ok\n    ...test_get_guest_config_with_uefi_q35_only_secboot [0.121101s] ... ok\n    ...\n\nWhy stable-only and not cherry-picks?\n\nWallaby and later are fixed with refactoring, as part of\nthe Secure Boot implementation, but that\u0027s big/risky; see\ncommit 9fff6893ce2e (\"libvirt: Use firmware metadata files\nto configure instance\").\n\nThat removed the hardcoded paths from commit 363710b65543\n(\"libvirt: Handle alternative UEFI firmware binary paths\").\n\nDocs:\n\n    [0] https://docs.openstack.org/nova/wallaby/admin/uefi.html\n    [1] https://docs.openstack.org/nova/wallaby/admin/secure-boot.html\n    [2] https://docs.openstack.org/nova/wallaby/user/flavors.html\n    [3] https://specs.openstack.org/openstack/nova-specs/specs/wallaby/implemented/allow-secure-boot-for-qemu-kvm-guests.html\n\nTest Steps:\n\n    $ openstack image set --property hw_firmware_type\u003duefi $image\n    $ openstack server create --image $image --flavor $flavor --network $network $server\n\nBefore:\n\n    $ virsh dumpxml $guest | grep -e machine\u003d -e loader\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.secboot.fd\u003c/loader\u003e\n\n    $ openstack console log show $server # empty; it doesn\u0027t boot!\n    $\n\nAfter:\n\n    $ virsh dumpxml $guest | grep -e machine\u003d -e loader\n        \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n        \u003cloader readonly\u003d\u0027yes\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\n    $ openstack console log show $server # yay, it boots!\n    ...\n    [    0.000000] efi: EFI v2.70 by EDK II\n    ...\n\nNote that the XML snippet for the loader is aligned with Wallaby,\nin which just setting hw_firmware_type\u003duefi works out of the box:\n\n    $ virsh dumpxml $guest | grep -e machine\u003d -e loader\n      \u003ctype arch\u003d\u0027x86_64\u0027 machine\u003d\u0027pc-i440fx-4.2\u0027\u003ehvm\u003c/type\u003e\n      \u003cloader readonly\u003d\u0027yes\u0027 secure\u003d\u0027no\u0027 type\u003d\u0027pflash\u0027\u003e/usr/share/OVMF/OVMF_CODE.fd\u003c/loader\u003e\n\nCloses-Bug: #1960758\nSigned-off-by: Mauricio Faria de Oliveira \u003cmfo@canonical.com\u003e\nChange-Id: Ib6e52706e1eca92fefc44d21fab9f5df8780543c\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/75e30a5a8cdd5343e65c14dbdc306ec3efee74bd"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/75e30a5a8cdd5343e65c14dbdc306ec3efee74bd"}]},"branch":"refs/heads/stable/victoria"}},"requirements":[],"submit_records":[],"submit_requirements":[{"name":"Verified","description":"Verified in gate by CI","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Verified\u003dMAX AND -label:Verified\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Verified\u003dMAX","label:Verified\u003dMIN"],"atom_explanations":{}}},{"name":"Code-Review","description":"Code reviewed by core reviewer","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Code-Review\u003dMAX AND -label:Code-Review\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Code-Review\u003dMAX","label:Code-Review\u003dMIN"],"atom_explanations":{}}},{"name":"Review-Priority","description":"Review Priority","status":"NOT_APPLICABLE","is_legacy":false,"applicability_expression_result":{"fulfilled":false,"status":"FAIL"},"submittability_expression_result":{"expression":"is:true","fulfilled":true,"status":"NOT_EVALUATED","passing_atoms":[],"failing_atoms":[],"atom_explanations":{}}},{"name":"Workflow","description":"Approved for gate by core reviewer","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Workflow\u003dMAX AND -label:Workflow\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Workflow\u003dMAX","label:Workflow\u003dMIN"],"atom_explanations":{}}}]}
