)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"b5ad8148157bf374e1dc2aa5dfe2f2fdff4ce04e","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":1,"id":"3fb96b0c_045c5373","updated":"2022-10-10 09:25:29.000000000","message":"Just a nit about the link, would be better if you could the QEMU documentation for the minimum supported QEMU version we have :\n\nhttps://docs.openstack.org/nova/latest/reference/libvirt-distro-support-matrix.html#qemu-minimum-version-change-policy","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"2cdd4ea7bd36f97929db8c10e13982c3554dab68","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":1,"id":"99f175bd_7fc68939","in_reply_to":"3fb96b0c_045c5373","updated":"2022-10-10 10:18:32.000000000","message":"Thanks, Updated the version","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"3749425695a942035d0c6a4ada1d7a15754c5b90","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"e72f7219_20b09104","updated":"2022-11-14 08:17:24.000000000","message":"+2 because my comments are just some nits, we could change this later if we want.","commit_id":"7eaa3466cdac980c0f87e75722e5cd52c46ebb7a"}],"doc/source/admin/remote-console-access.rst":[{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"7ce57e3af4563081e5ffeb46cb648751676ab4fb","unresolved":true,"context_lines":[{"line_number":225,"context_line":"a Server Certificate signed by it, and the private key for the Server Certificate."},{"line_number":226,"context_line":"These must be placed in:"},{"line_number":227,"context_line":""},{"line_number":228,"context_line":"- Certificate Authority Certificate: :file:` /etc/pki/libvirt-vnc/ca-cert.pem`"},{"line_number":229,"context_line":"- Server Certificate: :file:`/etc/pki/libvirt-vnc/server-cert.pem`"},{"line_number":230,"context_line":"- Private Key for the Server Certificate: :file:`/etc/pki/libvirt-vnc/server-key.pem`"},{"line_number":231,"context_line":""}],"source_content_type":"text/x-rst","patch_set":1,"id":"a3a82d34_0d548426","line":228,"range":{"start_line":228,"start_character":44,"end_line":228,"end_character":45},"updated":"2022-10-10 09:34:01.000000000","message":"extra space, renders badly.","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"2cdd4ea7bd36f97929db8c10e13982c3554dab68","unresolved":false,"context_lines":[{"line_number":225,"context_line":"a Server Certificate signed by it, and the private key for the Server Certificate."},{"line_number":226,"context_line":"These must be placed in:"},{"line_number":227,"context_line":""},{"line_number":228,"context_line":"- Certificate Authority Certificate: :file:` /etc/pki/libvirt-vnc/ca-cert.pem`"},{"line_number":229,"context_line":"- Server Certificate: :file:`/etc/pki/libvirt-vnc/server-cert.pem`"},{"line_number":230,"context_line":"- Private Key for the Server Certificate: :file:`/etc/pki/libvirt-vnc/server-key.pem`"},{"line_number":231,"context_line":""}],"source_content_type":"text/x-rst","patch_set":1,"id":"42d5c24e_9301fa9c","line":228,"range":{"start_line":228,"start_character":44,"end_line":228,"end_character":45},"in_reply_to":"a3a82d34_0d548426","updated":"2022-10-10 10:18:32.000000000","message":"Ack","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"7ce57e3af4563081e5ffeb46cb648751676ab4fb","unresolved":true,"context_lines":[{"line_number":226,"context_line":"These must be placed in:"},{"line_number":227,"context_line":""},{"line_number":228,"context_line":"- Certificate Authority Certificate: :file:` /etc/pki/libvirt-vnc/ca-cert.pem`"},{"line_number":229,"context_line":"- Server Certificate: :file:`/etc/pki/libvirt-vnc/server-cert.pem`"},{"line_number":230,"context_line":"- Private Key for the Server Certificate: :file:`/etc/pki/libvirt-vnc/server-key.pem`"},{"line_number":231,"context_line":""},{"line_number":232,"context_line":"Soft links to the certificates and keys for the main libvirt configuration can"}],"source_content_type":"text/x-rst","patch_set":1,"id":"96a2b006_5765da40","line":229,"range":{"start_line":229,"start_character":22,"end_line":229,"end_character":28},"updated":"2022-10-10 09:34:01.000000000","message":"unnecessary","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"2cdd4ea7bd36f97929db8c10e13982c3554dab68","unresolved":true,"context_lines":[{"line_number":226,"context_line":"These must be placed in:"},{"line_number":227,"context_line":""},{"line_number":228,"context_line":"- Certificate Authority Certificate: :file:` /etc/pki/libvirt-vnc/ca-cert.pem`"},{"line_number":229,"context_line":"- Server Certificate: :file:`/etc/pki/libvirt-vnc/server-cert.pem`"},{"line_number":230,"context_line":"- Private Key for the Server Certificate: :file:`/etc/pki/libvirt-vnc/server-key.pem`"},{"line_number":231,"context_line":""},{"line_number":232,"context_line":"Soft links to the certificates and keys for the main libvirt configuration can"}],"source_content_type":"text/x-rst","patch_set":1,"id":"d3054775_db419548","line":229,"range":{"start_line":229,"start_character":22,"end_line":229,"end_character":28},"in_reply_to":"96a2b006_5765da40","updated":"2022-10-10 10:18:32.000000000","message":"This to show file path, its used in many places.","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"822c15c2734ed7a8d953d5eb653756d5cd4a42ae","unresolved":false,"context_lines":[{"line_number":226,"context_line":"These must be placed in:"},{"line_number":227,"context_line":""},{"line_number":228,"context_line":"- Certificate Authority Certificate: :file:` /etc/pki/libvirt-vnc/ca-cert.pem`"},{"line_number":229,"context_line":"- Server Certificate: :file:`/etc/pki/libvirt-vnc/server-cert.pem`"},{"line_number":230,"context_line":"- Private Key for the Server Certificate: :file:`/etc/pki/libvirt-vnc/server-key.pem`"},{"line_number":231,"context_line":""},{"line_number":232,"context_line":"Soft links to the certificates and keys for the main libvirt configuration can"}],"source_content_type":"text/x-rst","patch_set":1,"id":"4be1d1c7_f3267688","line":229,"range":{"start_line":229,"start_character":22,"end_line":229,"end_character":28},"in_reply_to":"d3054775_db419548","updated":"2022-10-28 03:21:01.000000000","message":"Done","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"b5ad8148157bf374e1dc2aa5dfe2f2fdff4ce04e","unresolved":true,"context_lines":[{"line_number":649,"context_line":"References"},{"line_number":650,"context_line":"----------"},{"line_number":651,"context_line":""},{"line_number":652,"context_line":".. [1] https://qemu.weilnetz.de/doc/2.12/qemu-doc.html#vnc_005fsec_005fcertificate_005fverify"},{"line_number":653,"context_line":".. [2] https://tools.ietf.org/html/rfc3280#section-4.2.1.10"}],"source_content_type":"text/x-rst","patch_set":1,"id":"c29012d7_95b11597","line":652,"updated":"2022-10-10 09:25:29.000000000","message":"Minimum QEMU version is 4.2, so use this version.","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"2cdd4ea7bd36f97929db8c10e13982c3554dab68","unresolved":false,"context_lines":[{"line_number":649,"context_line":"References"},{"line_number":650,"context_line":"----------"},{"line_number":651,"context_line":""},{"line_number":652,"context_line":".. [1] https://qemu.weilnetz.de/doc/2.12/qemu-doc.html#vnc_005fsec_005fcertificate_005fverify"},{"line_number":653,"context_line":".. [2] https://tools.ietf.org/html/rfc3280#section-4.2.1.10"}],"source_content_type":"text/x-rst","patch_set":1,"id":"012d91e0_1dc5df7c","line":652,"in_reply_to":"c29012d7_95b11597","updated":"2022-10-10 10:18:32.000000000","message":"Done","commit_id":"c9f9ecf2cbfe9af03c3a0a8322205d32925e1dcb"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"2cdd4ea7bd36f97929db8c10e13982c3554dab68","unresolved":true,"context_lines":[{"line_number":240,"context_line":"   $ sudo ln -s /etc/pki/libvirt/servercert.pem /etc/pki/libvirt-vnc/server-cert.pem"},{"line_number":241,"context_line":"   $ sudo ln -s /etc/pki/libvirt/private/serverkey.pem /etc/pki/libvirt-vnc/server-key.pem"},{"line_number":242,"context_line":""},{"line_number":243,"context_line":"By default on RHEL 6 and Fedora 13+ (older is untested),"},{"line_number":244,"context_line":"QEMU processes are launched using qemu:qemu ownership."},{"line_number":245,"context_line":""},{"line_number":246,"context_line":"You mush ensure it can read the TLS certificate files. If you used soft links"}],"source_content_type":"text/x-rst","patch_set":2,"id":"960f9c15_4ce5c60a","line":243,"updated":"2022-10-10 10:18:32.000000000","message":"Is RHEL 6 is OK, or shall we say RHEL 9 ?","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"822c15c2734ed7a8d953d5eb653756d5cd4a42ae","unresolved":false,"context_lines":[{"line_number":240,"context_line":"   $ sudo ln -s /etc/pki/libvirt/servercert.pem /etc/pki/libvirt-vnc/server-cert.pem"},{"line_number":241,"context_line":"   $ sudo ln -s /etc/pki/libvirt/private/serverkey.pem /etc/pki/libvirt-vnc/server-key.pem"},{"line_number":242,"context_line":""},{"line_number":243,"context_line":"By default on RHEL 6 and Fedora 13+ (older is untested),"},{"line_number":244,"context_line":"QEMU processes are launched using qemu:qemu ownership."},{"line_number":245,"context_line":""},{"line_number":246,"context_line":"You mush ensure it can read the TLS certificate files. If you used soft links"}],"source_content_type":"text/x-rst","patch_set":2,"id":"0161da38_d6328359","line":243,"in_reply_to":"3ad4e600_f43a3042","updated":"2022-10-28 03:21:01.000000000","message":"Done","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"change_message_id":"76ab25d8cb7b21ca07337a129b64b88ef7c0e845","unresolved":true,"context_lines":[{"line_number":240,"context_line":"   $ sudo ln -s /etc/pki/libvirt/servercert.pem /etc/pki/libvirt-vnc/server-cert.pem"},{"line_number":241,"context_line":"   $ sudo ln -s /etc/pki/libvirt/private/serverkey.pem /etc/pki/libvirt-vnc/server-key.pem"},{"line_number":242,"context_line":""},{"line_number":243,"context_line":"By default on RHEL 6 and Fedora 13+ (older is untested),"},{"line_number":244,"context_line":"QEMU processes are launched using qemu:qemu ownership."},{"line_number":245,"context_line":""},{"line_number":246,"context_line":"You mush ensure it can read the TLS certificate files. If you used soft links"}],"source_content_type":"text/x-rst","patch_set":2,"id":"3ad4e600_f43a3042","line":243,"in_reply_to":"960f9c15_4ce5c60a","updated":"2022-10-27 09:23:33.000000000","message":"we dont test rhel so we shoudl say centos9-stream there and we only test the latest fedora but we should just remove this entirely","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"8789dd8159b17a4386718bbd0e7ef51877c19cac","unresolved":true,"context_lines":[{"line_number":241,"context_line":"   $ sudo ln -s /etc/pki/libvirt/private/serverkey.pem /etc/pki/libvirt-vnc/server-key.pem"},{"line_number":242,"context_line":""},{"line_number":243,"context_line":"By default on RHEL 6 and Fedora 13+ (older is untested),"},{"line_number":244,"context_line":"QEMU processes are launched using qemu:qemu ownership."},{"line_number":245,"context_line":""},{"line_number":246,"context_line":"You mush ensure it can read the TLS certificate files. If you used soft links"},{"line_number":247,"context_line":"as in the example above, one way to achieve this is:"}],"source_content_type":"text/x-rst","patch_set":2,"id":"7f39f4c5_64962b6c","line":244,"updated":"2022-10-27 08:30:18.000000000","message":"No, this is wrong. By default, we launch the guests with the nova user, but documenting it would be maybe too much restrictive. Just tell that you need to ensure that the file permissions are set so the processes running the guests (default being nova:nova IIRC) are able to access those files.","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"change_message_id":"76ab25d8cb7b21ca07337a129b64b88ef7c0e845","unresolved":true,"context_lines":[{"line_number":241,"context_line":"   $ sudo ln -s /etc/pki/libvirt/private/serverkey.pem /etc/pki/libvirt-vnc/server-key.pem"},{"line_number":242,"context_line":""},{"line_number":243,"context_line":"By default on RHEL 6 and Fedora 13+ (older is untested),"},{"line_number":244,"context_line":"QEMU processes are launched using qemu:qemu ownership."},{"line_number":245,"context_line":""},{"line_number":246,"context_line":"You mush ensure it can read the TLS certificate files. If you used soft links"},{"line_number":247,"context_line":"as in the example above, one way to achieve this is:"}],"source_content_type":"text/x-rst","patch_set":2,"id":"dc00523f_7e0e3ecb","line":244,"in_reply_to":"0b7f0255_df6967a9","updated":"2022-10-27 09:23:33.000000000","message":"technially this user depend on the libvirt config not nova.\n\nqemu does not run as nova in any normal install it does run as qemu:qemu and becasue we have the dynmaic ownwershipt option set by default in libvirt to true it will actully change some file too/from nova\n\nnova does not acttuly ever start a qemu process so they should never be running as nova or stack user.","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"7da8c7912fd336dd27cde095f9fa7d83f12b42cb","unresolved":true,"context_lines":[{"line_number":241,"context_line":"   $ sudo ln -s /etc/pki/libvirt/private/serverkey.pem /etc/pki/libvirt-vnc/server-key.pem"},{"line_number":242,"context_line":""},{"line_number":243,"context_line":"By default on RHEL 6 and Fedora 13+ (older is untested),"},{"line_number":244,"context_line":"QEMU processes are launched using qemu:qemu ownership."},{"line_number":245,"context_line":""},{"line_number":246,"context_line":"You mush ensure it can read the TLS certificate files. If you used soft links"},{"line_number":247,"context_line":"as in the example above, one way to achieve this is:"}],"source_content_type":"text/x-rst","patch_set":2,"id":"0b7f0255_df6967a9","line":244,"in_reply_to":"7f39f4c5_64962b6c","updated":"2022-10-27 08:41:42.000000000","message":"I propose \"Change ownership of everything under /etc/pki/nova-novnc to be the user that runs the QEMU guests (eg. stack or nova) so the domain can read the key files.","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"822c15c2734ed7a8d953d5eb653756d5cd4a42ae","unresolved":false,"context_lines":[{"line_number":241,"context_line":"   $ sudo ln -s /etc/pki/libvirt/private/serverkey.pem /etc/pki/libvirt-vnc/server-key.pem"},{"line_number":242,"context_line":""},{"line_number":243,"context_line":"By default on RHEL 6 and Fedora 13+ (older is untested),"},{"line_number":244,"context_line":"QEMU processes are launched using qemu:qemu ownership."},{"line_number":245,"context_line":""},{"line_number":246,"context_line":"You mush ensure it can read the TLS certificate files. If you used soft links"},{"line_number":247,"context_line":"as in the example above, one way to achieve this is:"}],"source_content_type":"text/x-rst","patch_set":2,"id":"47cf63ca_8d759ae9","line":244,"in_reply_to":"dc00523f_7e0e3ecb","updated":"2022-10-28 03:21:01.000000000","message":"Done","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"8789dd8159b17a4386718bbd0e7ef51877c19cac","unresolved":true,"context_lines":[{"line_number":258,"context_line":"                  /etc/pki/libvirt-vnc \\"},{"line_number":259,"context_line":"                  /etc/pki/libvirt/private"},{"line_number":260,"context_line":"   $ sudo chmod 440 /etc/pki/libvirt/servercert.pem \\"},{"line_number":261,"context_line":"                  /etc/pki/libvirt/private/serverkey.pem"},{"line_number":262,"context_line":""},{"line_number":263,"context_line":"After editing :file:`qemu.conf`, the ``libvirtd`` service must be restarted:"},{"line_number":264,"context_line":""}],"source_content_type":"text/x-rst","patch_set":2,"id":"f7574c30_0d5b6d15","line":261,"updated":"2022-10-27 08:30:18.000000000","message":"this sounds too much detailed, just mention that those files need to be correctly accessible.","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"822c15c2734ed7a8d953d5eb653756d5cd4a42ae","unresolved":false,"context_lines":[{"line_number":258,"context_line":"                  /etc/pki/libvirt-vnc \\"},{"line_number":259,"context_line":"                  /etc/pki/libvirt/private"},{"line_number":260,"context_line":"   $ sudo chmod 440 /etc/pki/libvirt/servercert.pem \\"},{"line_number":261,"context_line":"                  /etc/pki/libvirt/private/serverkey.pem"},{"line_number":262,"context_line":""},{"line_number":263,"context_line":"After editing :file:`qemu.conf`, the ``libvirtd`` service must be restarted:"},{"line_number":264,"context_line":""}],"source_content_type":"text/x-rst","patch_set":2,"id":"df166868_7a7647ca","line":261,"in_reply_to":"05b95a3f_bdd0073c","updated":"2022-10-28 03:21:01.000000000","message":"Done","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"change_message_id":"76ab25d8cb7b21ca07337a129b64b88ef7c0e845","unresolved":true,"context_lines":[{"line_number":258,"context_line":"                  /etc/pki/libvirt-vnc \\"},{"line_number":259,"context_line":"                  /etc/pki/libvirt/private"},{"line_number":260,"context_line":"   $ sudo chmod 440 /etc/pki/libvirt/servercert.pem \\"},{"line_number":261,"context_line":"                  /etc/pki/libvirt/private/serverkey.pem"},{"line_number":262,"context_line":""},{"line_number":263,"context_line":"After editing :file:`qemu.conf`, the ``libvirtd`` service must be restarted:"},{"line_number":264,"context_line":""}],"source_content_type":"text/x-rst","patch_set":2,"id":"05b95a3f_bdd0073c","line":261,"in_reply_to":"f7574c30_0d5b6d15","updated":"2022-10-27 09:23:33.000000000","message":"ya im not reallly sure why we are adding this here. this is not really part of the install guide.\n\nthis dodcument is ment to focus on the nova confgiuration otpiosn and what they mean includign filed that nova needs.\n\nthe libvirt/qemu configuraiton is out of scope we shoudl jsut like to an external doc for that content not replicate it here.","commit_id":"2254796eb54e893b77b988a9cff79a736fc08ff1"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"3749425695a942035d0c6a4ada1d7a15754c5b90","unresolved":true,"context_lines":[{"line_number":221,"context_line":"  service, this ensures that only approved VNC proxy servers can connect to the"},{"line_number":222,"context_line":"  Compute nodes."},{"line_number":223,"context_line":""},{"line_number":224,"context_line":"Make sure to provide correct permissions to the certificate files for the process"},{"line_number":225,"context_line":"which creates instance. Please follow the libvirt wiki page [3]_ for the same."},{"line_number":226,"context_line":""},{"line_number":227,"context_line":"After editing :file:`qemu.conf`, the ``libvirtd`` service must be restarted:"}],"source_content_type":"text/x-rst","patch_set":3,"id":"5c1ae2df_e57284ad","line":224,"updated":"2022-11-14 08:17:24.000000000","message":"nit: this whole paragraph could be a note\n\n .. note::","commit_id":"7eaa3466cdac980c0f87e75722e5cd52c46ebb7a"},{"author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"change_message_id":"3749425695a942035d0c6a4ada1d7a15754c5b90","unresolved":true,"context_lines":[{"line_number":222,"context_line":"  Compute nodes."},{"line_number":223,"context_line":""},{"line_number":224,"context_line":"Make sure to provide correct permissions to the certificate files for the process"},{"line_number":225,"context_line":"which creates instance. Please follow the libvirt wiki page [3]_ for the same."},{"line_number":226,"context_line":""},{"line_number":227,"context_line":"After editing :file:`qemu.conf`, the ``libvirtd`` service must be restarted:"},{"line_number":228,"context_line":""}],"source_content_type":"text/x-rst","patch_set":3,"id":"30892e53_0ddd7f2f","line":225,"range":{"start_line":225,"start_character":65,"end_line":225,"end_character":78},"updated":"2022-11-14 08:17:24.000000000","message":"nit: say rather something like \"for example for the libvirt virt driver\"","commit_id":"7eaa3466cdac980c0f87e75722e5cd52c46ebb7a"}]}
