)]}'
{"id":"openstack%2Fnova~942501","triplet_id":"openstack%2Fnova~master~I40507397704f885e00e0bfa021a673ee2d5789a3","project":"openstack/nova","branch":"master","topic":"bp/vtpm-live-migration","attention_set":{},"removed_from_attention_set":{"7166":{"account":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"last_update":"2025-08-26 09:38:42.000000000","reason":"\u003cGERRIT_ACCOUNT_7166\u003e replied on the change","reason_account":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"}},"4393":{"account":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"last_update":"2025-09-23 06:16:39.000000000","reason":"Change was abandoned"},"8864":{"account":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"last_update":"2025-09-23 06:16:39.000000000","reason":"Change was abandoned"},"4690":{"account":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"last_update":"2025-09-23 06:16:39.000000000","reason":"Change was abandoned"}},"hashtags":[],"change_id":"I40507397704f885e00e0bfa021a673ee2d5789a3","subject":"TPM: migrate legacy instances to new security policy","status":"ABANDONED","created":"2025-02-22 02:04:05.000000000","updated":"2025-09-23 06:16:39.000000000","total_comment_count":51,"unresolved_comment_count":0,"has_review_started":true,"meta_rev_id":"6cb35d8da210ec6c81ad44d1f5cbe6f98cba774a","_number":942501,"virtual_id_number":942501,"owner":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"actions":{},"labels":{"Verified":{"recommended":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"all":[{"tag":"autogenerated:zuul:check","value":1,"date":"2025-08-09 04:16:47.000000000","permitted_voting_range":{"min":-2,"max":2},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"}],"values":{"-2":"Fails","-1":"Doesn\u0027t seem to work"," 0":"No score","+1":"Works for me","+2":"Verified"},"description":"","value":1,"default_value":0,"optional":true},"Code-Review":{"recommended":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"all":[{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":1,"date":"2025-08-26 09:38:42.000000000","permitted_voting_range":{"min":-2,"max":2},"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},{"value":0,"permitted_voting_range":{"min":-2,"max":2},"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"permitted_voting_range":{"min":-2,"max":2},"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"}],"values":{"-2":"Do not merge","-1":"This patch needs further work before it can be merged"," 0":"No score","+1":"Looks good to me, but someone else must approve","+2":"Looks good to me (core reviewer)"},"description":"","value":1,"default_value":0,"optional":true},"Workflow":{"all":[{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"permitted_voting_range":{"min":-1,"max":1},"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"}],"values":{"-1":"Work in progress"," 0":"Ready for reviews","+1":"Approved"},"description":"","default_value":0,"optional":true},"Review-Priority":{"all":[{"value":0,"permitted_voting_range":{"min":0,"max":1},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"permitted_voting_range":{"min":0,"max":2},"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},{"value":0,"permitted_voting_range":{"min":0,"max":2},"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"value":0,"permitted_voting_range":{"min":0,"max":2},"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"}],"values":{" 0":"Default Priority","+1":"Contributor Review Promise","+2":"Core Review Promise"},"description":"","default_value":0,"optional":true}},"removable_reviewers":[],"reviewers":{"CC":[{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},{"_account_id":36571,"name":"vmwareapi CI run by SAP","display_name":"vmwareapi CI run by SAP","email":"openstack-ci@sap.com","username":"sap-openstack-ci","status":"CI account for integration tests of the Nova vmwareapi driver","tags":["SERVICE_USER"]}],"REVIEWER":[{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]}]},"pending_reviewers":{},"reviewer_updates":[{"updated":"2025-02-22 04:57:39.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"CC"},{"updated":"2025-02-22 05:38:12.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"REVIEWER"},{"updated":"2025-02-22 05:43:37.000000000","updated_by":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"reviewer":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"state":"CC"},{"updated":"2025-03-06 13:26:25.000000000","updated_by":{"_account_id":36571,"name":"vmwareapi CI run by SAP","display_name":"vmwareapi CI run by SAP","email":"openstack-ci@sap.com","username":"sap-openstack-ci","status":"CI account for integration tests of the Nova vmwareapi driver","tags":["SERVICE_USER"]},"reviewer":{"_account_id":36571,"name":"vmwareapi CI run by SAP","display_name":"vmwareapi CI run by SAP","email":"openstack-ci@sap.com","username":"sap-openstack-ci","status":"CI account for integration tests of the Nova vmwareapi driver","tags":["SERVICE_USER"]},"state":"CC"},{"updated":"2025-03-27 18:23:06.000000000","updated_by":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"reviewer":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"state":"CC"},{"updated":"2025-05-01 20:53:25.000000000","updated_by":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"reviewer":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"state":"CC"},{"updated":"2025-07-25 02:13:53.000000000","updated_by":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"reviewer":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"state":"REVIEWER"},{"updated":"2025-07-29 16:51:06.000000000","updated_by":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"reviewer":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"state":"REVIEWER"},{"updated":"2025-08-01 20:19:51.000000000","updated_by":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"reviewer":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"state":"REVIEWER"}],"messages":[{"id":"fa8e32fcd59e8759b50a7f3c54922f039ec29fa4","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"date":"2025-02-22 02:04:05.000000000","message":"Uploaded patch set 1.","accounts_in_message":[],"_revision_number":1},{"id":"a415ae093f0590bcba41390e04c8d1de98276531","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-02-22 04:57:39.000000000","message":"Patch Set 1:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/5de8d5d9d0e4431ea7d94c0578f6b9f5\n\n- openstack-tox-py39-arm64 https://zuul.opendev.org/t/openstack/build/b6748c465b2c4ae0a847e157e3f7d4a0 : TIMED_OUT in 1h 01m 03s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/7063f3fb4edc466896741afbd9426689 : TIMED_OUT in 1h 01m 09s (non-voting)","accounts_in_message":[],"_revision_number":1},{"id":"3c191f52e4a8181392d4f863080ba16540e4feb1","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-02-22 05:38:12.000000000","message":"Patch Set 1: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/67c266303dbb4e0cbf2f955e5fa5e3d4\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/5e414fe648d4437a9a763f04cd798fad : SUCCESS in 1h 07m 29s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/cd6486137d87407eabb05e654f353229 : SUCCESS in 1h 59m 36s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/e4fbbe9095d042dcae3b1b817815a2d2 : SUCCESS in 1h 16m 19s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/28a130c61b70473f81a7ee2a3ad49668 : SUCCESS in 20m 42s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/690d2cf50d20479d86b921d6dcb300dc : SUCCESS in 5m 17s\n- openstack-tox-py39 https://zuul.opendev.org/t/openstack/build/a5b04cd1c8084b3ead71d380dfd73d85 : SUCCESS in 16m 32s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/208bef2aaa2a4d2ebe5c699ee7df0212 : SUCCESS in 16m 38s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/76754b86c07f41219d3f6b350c226d96 : SUCCESS in 13m 02s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/ee4dd5a932bf4ddfaac3506fc597bd4d : SUCCESS in 1h 06m 57s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/5ed172ae8eb44f6b954a9e1cd0e1766d : SUCCESS in 1h 39m 27s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/cd57401eaf2e46f78a5d103e2a00e111 : SUCCESS in 54m 03s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/9d1d9d38f2b14924bc9b36095152da45 : SUCCESS in 1h 29m 42s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/67085fc993f84b39b78c53da57a6f2af : SUCCESS in 1h 45m 05s\n- nova-next https://zuul.opendev.org/t/openstack/build/dcba1df73d5f464bb522874e91a29eee : SUCCESS in 2h 24m 43s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/5526838889a04437ba5cce8ff0fcf6da : SUCCESS in 55m 03s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/fe631a9c62794746a2755bc7efa80b0e : SUCCESS in 6m 13s (non-voting)\n- nova-tox-functional-py39 https://zuul.opendev.org/t/openstack/build/43ae148d5b684dc7a206ebb8f43c7456 : SUCCESS in 29m 15s\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/70d4acd9644d444e87f0d606886e4a0f : SUCCESS in 28m 02s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/4f36fdcaf5b044cfbc6b7932d492051f : SUCCESS in 33m 32s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/a62006f676b4440fb859817e08c37bef : SUCCESS in 1h 54m 24s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/7cff148d2df941a48ad0d4a3a50d55df : SUCCESS in 52m 49s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/39cb7948975847bf964685f1a6be1329 : SUCCESS in 39m 44s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/205205b202894d7b8a439cbeb020f0a7 : SUCCESS in 27m 11s (non-voting)","accounts_in_message":[],"_revision_number":1},{"id":"2528ce0b2192bb615561109d970e4b07af541a3a","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"date":"2025-02-22 05:43:37.000000000","message":"Patch Set 1:\n\nBuild FAILED. log path: ${LOG_PATH}\nLeave a comment with \u0027run-Lightbits CI\u0027 to trigger a recheck. \nFor more information about CI, please see https://wiki.openstack.org/wiki/ThirdPartySystems/LightbitsLabs_CI","accounts_in_message":[],"_revision_number":1},{"id":"fd81f3c7e7d0123058722ff8050fceccf43f7a7d","tag":"autogenerated:sap-openstack-ci~result","author":{"_account_id":36571,"name":"vmwareapi CI run by SAP","display_name":"vmwareapi CI run by SAP","email":"openstack-ci@sap.com","username":"sap-openstack-ci","status":"CI account for integration tests of the Nova vmwareapi driver","tags":["SERVICE_USER"]},"date":"2025-03-06 13:26:25.000000000","message":"Patch Set 1:\n\nIgnore for now: Test failed. Logs on \u003chttp://openstack-ci-logs.global.cloud.sap/openstack-nova-942501-gg4bd/index.html\u003e","accounts_in_message":[],"_revision_number":1},{"id":"9d55da296e5581f5567b3432b0f88629c76655a6","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"date":"2025-03-27 16:16:31.000000000","message":"Uploaded patch set 2: Patch Set 1 was rebased.\n\nOutdated Votes:\n* Verified+1\n","accounts_in_message":[],"_revision_number":2},{"id":"e177a0ff7b59f9636d50acc02bc426908c7ef167","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-03-27 17:21:53.000000000","message":"Patch Set 2:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/65e3194cb06a49329eb0d471a7d768a5\n\n- openstack-tox-py39-arm64 https://zuul.opendev.org/t/openstack/build/2caf208dbbd0445e9f7912b983febc63 : SUCCESS in 15m 07s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/1d9f9e1fbda74f9198b3beacaabea4bc : SUCCESS in 14m 59s (non-voting)","accounts_in_message":[],"_revision_number":2},{"id":"97e1a7f9f2a266efd3a7d60d2ff2cbb7d8b8cb13","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"date":"2025-03-27 17:31:52.000000000","message":"Uploaded patch set 3: Patch Set 2 was rebased.","accounts_in_message":[],"_revision_number":3},{"id":"e657d36fde179ead9689bafb12e4af2335fe4f13","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-03-27 18:10:20.000000000","message":"Patch Set 3:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/505c8b7c166e4f98b20fb802ddb5c66a\n\n- openstack-tox-py39-arm64 https://zuul.opendev.org/t/openstack/build/057523d5486a406fbd8200550c2d12d9 : SUCCESS in 17m 31s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/1463f148dd9d4600b0834819176e9d22 : SUCCESS in 24m 28s (non-voting)","accounts_in_message":[],"_revision_number":3},{"id":"4452e4230598f597723ce2e317f6438dd293e25b","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-03-27 18:23:06.000000000","message":"Patch Set 3:\n\n(2 comments)","accounts_in_message":[],"_revision_number":3},{"id":"8aae463bca1107b51f4880de3663fe7c2be13309","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-03-27 19:45:55.000000000","message":"Patch Set 3: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/d96901c258ef41ceb2d31125e5e64f05\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/0b9ad5479fdd46d99157bd2006f5de65 : SUCCESS in 55m 40s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/c2f5478eb52a4934886ec8311d853171 : SUCCESS in 1h 49m 32s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/10913258c4b84ceea3e80923ebe31805 : SUCCESS in 1h 09m 20s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/dfc3ad44a23f4ff59f905a0191115d11 : SUCCESS in 20m 14s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/33c973e9394d4da09e2a22c3fc9fe42c : SUCCESS in 9m 49s\n- openstack-tox-py39 https://zuul.opendev.org/t/openstack/build/cdd822927e2d4205a49b617a1ba4c9b0 : SUCCESS in 12m 18s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/180b54fd17ef42afa47cae3534bc6556 : SUCCESS in 14m 54s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/b4d6f5edda194eaa84a6cbafc481897b : SUCCESS in 13m 23s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/39e5ee61c1b9485ba444c9d819782e66 : FAILURE in 48m 11s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/a1bea356ec9d4c9abb2055fe5033c5c5 : SUCCESS in 1h 43m 21s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/446fd891814443f786a36f7ca9b5e079 : SUCCESS in 24m 34s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/00b9cedefee44443af9ad0f750090ace : SUCCESS in 56m 09s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/edddeaeee110428abf4074a16046c999 : SUCCESS in 1h 02m 02s\n- nova-next https://zuul.opendev.org/t/openstack/build/7bbff595faf04554888dccfca3986970 : SUCCESS in 2h 07m 31s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/35b8f7b12a04472a95cae05f91802e3a : SUCCESS in 25m 15s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/6e8c2111d16b40709913f7b03f0fc723 : SUCCESS in 4m 28s (non-voting)\n- nova-tox-functional-py39 https://zuul.opendev.org/t/openstack/build/8b7d22bf309449f8869f53104ee30c27 : SUCCESS in 28m 36s\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/39d06f0d773d4921bfe43aa559b349ef : SUCCESS in 25m 12s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/748c734f145c4fd9969f6a6a05b0c4a4 : SUCCESS in 29m 57s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/5969a0b5b931442296b462f36203ad9a : SUCCESS in 1h 20m 53s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/4ec0fee443d54553b7aac8f8ade3c960 : SUCCESS in 57m 36s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/599ebe8897b241b399ad13a85a295063 : SUCCESS in 25m 56s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/c5ae6f36014b4ce1bfb45a16de9086db : SUCCESS in 36m 06s (non-voting)","accounts_in_message":[],"_revision_number":3},{"id":"18cb02d24661ad963d1affd7c3e268d48b2c04b1","author":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"date":"2025-03-28 15:17:12.000000000","message":"Patch Set 3:\n\n(2 comments)","accounts_in_message":[],"_revision_number":3},{"id":"9e9cf55bed7107649d63a59ce251642f9ae620f9","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"date":"2025-03-28 17:26:14.000000000","message":"Uploaded patch set 4.\n\nOutdated Votes:\n* Verified+1\n","accounts_in_message":[],"_revision_number":4},{"id":"df01f21fdb5739669f2a5c6f8ef09ef5abf272b1","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-03-28 17:32:50.000000000","message":"Patch Set 4:\n\n(1 comment)","accounts_in_message":[],"_revision_number":4},{"id":"bd992f000584a0b9661d96c02830cd00134eb436","author":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"date":"2025-03-28 17:34:23.000000000","message":"Patch Set 4:\n\n(1 comment)","accounts_in_message":[],"_revision_number":4},{"id":"4e039ba3aa7e6bc83f084c9ebe17e2c826427a0c","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-03-28 17:36:36.000000000","message":"Patch Set 4:\n\n(2 comments)","accounts_in_message":[],"_revision_number":4},{"id":"3015947940bf2039b55151e457b1b6ba8aedd257","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"date":"2025-03-28 17:45:25.000000000","message":"Uploaded patch set 5: Commit message was updated.","accounts_in_message":[],"_revision_number":5},{"id":"fd46aa2938b208dae4780362133d68c86505ff72","author":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"date":"2025-03-28 17:45:37.000000000","message":"Patch Set 5:\n\n(1 comment)","accounts_in_message":[],"_revision_number":5},{"id":"09e809b9e3c7c2547c224b4b7e1682db9ce43683","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-03-28 18:06:13.000000000","message":"Patch Set 5:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/aaf45398e4144b73bfcd91bb4b8619c8\n\n- openstack-tox-py39-arm64 https://zuul.opendev.org/t/openstack/build/c85e3836b40c48d2a997d8434fea8ce6 : SUCCESS in 13m 40s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/7aa1e730a4af412790ef102a2d52feb2 : SUCCESS in 17m 26s (non-voting)","accounts_in_message":[],"_revision_number":5},{"id":"fb5552d7040db3f047eb8841aacfc4ca4ecec959","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-03-28 20:05:20.000000000","message":"Patch Set 5: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/393ed351f2b244fba2e5beac72ad12c0\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/c14e5309c7494557ad3dfd04761d2623 : SUCCESS in 53m 17s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/4c0c3cf9ceaa46318d66d379cbdeea9f : SUCCESS in 1h 38m 04s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/cddd56083bde457d96734f23bed41daa : SUCCESS in 57m 04s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/6401a4cbac2f4c10bfbf3cb8afed128d : SUCCESS in 21m 56s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/adcf6b5f80824371bf83e8abf883f52d : SUCCESS in 9m 16s\n- openstack-tox-py39 https://zuul.opendev.org/t/openstack/build/09a887ea2af048799a856d92fc41363b : SUCCESS in 13m 22s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/e7157c1e91694346b931b106eb5421cf : SUCCESS in 14m 14s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/34c38bbaef81410bafed4725feb6f5fc : SUCCESS in 13m 57s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/0d0b40f6bff14242809b7d44bc76fac2 : SUCCESS in 58m 40s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/f432d23bd5784e1c925ca729b168658b : SUCCESS in 1h 45m 09s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/673b3b47570248c2805e48c839083ca5 : SUCCESS in 47m 12s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/8946dbcaf45f4106bcb8227c39db30d7 : SUCCESS in 54m 01s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/c579e31e443544f7a3ad36667064c92d : SUCCESS in 55m 20s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/3a9cb4e581dd4ef3b53b351290c86432 : SUCCESS in 2h 13m 08s\n- nova-next https://zuul.opendev.org/t/openstack/build/50461cf3882a42da825dd93a653ab4b1 : SUCCESS in 1h 28m 18s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/aaf71f015c674b54af29f7db1a15b3bb : SUCCESS in 43m 31s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/4e232ed5a34b44a68bfb6bf8c74a2b69 : SUCCESS in 2m 42s (non-voting)\n- nova-tox-functional-py39 https://zuul.opendev.org/t/openstack/build/9043a93fbb28434fb28b7ffcdc46d173 : SUCCESS in 25m 42s\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/ae063221500b425f8d723a63c9e38764 : SUCCESS in 31m 18s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/dcff84e309f1466f84d30d67f7ee9e95 : SUCCESS in 26m 19s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/e7f2888387954038aaaa87b482ab49d0 : SUCCESS in 1h 11m 45s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/74f2256957f14c428f844af74269721a : SUCCESS in 46m 18s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/47147492ee334b168b4c11def0d1555b : SUCCESS in 10m 53s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/3e5383b0d9684e6e8a4f0b846acaa479 : SUCCESS in 32m 41s (non-voting)","accounts_in_message":[],"_revision_number":5},{"id":"035e18e3e27556493bf54988a04968ca596261df","tag":"autogenerated:sap-openstack-ci~result","author":{"_account_id":36571,"name":"vmwareapi CI run by SAP","display_name":"vmwareapi CI run by SAP","email":"openstack-ci@sap.com","username":"sap-openstack-ci","status":"CI account for integration tests of the Nova vmwareapi driver","tags":["SERVICE_USER"]},"date":"2025-04-03 13:21:24.000000000","message":"Patch Set 4:\n\nIgnore for now: Test failed. Logs on \u003chttp://openstack-ci-logs.global.cloud.sap/openstack-nova-942501-vmpp6/index.html\u003e","accounts_in_message":[],"_revision_number":4},{"id":"77979e54314dbb830f5dec3305900112c4a8a495","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-05-01 20:53:25.000000000","message":"Patch Set 5:\n\n(2 comments)","accounts_in_message":[],"_revision_number":5},{"id":"1ff450884b978ab31b7d796e0faea49624f38f5a","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-06-14 06:08:56.000000000","message":"Uploaded patch set 6.\n\nOutdated Votes:\n* Verified+1\n","accounts_in_message":[],"_revision_number":6},{"id":"ce6a62a108949aa1104b2d257d6a414bc8f5c704","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-06-14 06:19:12.000000000","message":"Patch Set 6:\n\n(1 comment)","accounts_in_message":[],"_revision_number":6},{"id":"1b1a02a5ac7d5ea913b9fb48c7daf2ab43ef54d3","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-06-14 06:56:31.000000000","message":"Patch Set 6:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/44d1307510284c7182b8df6f984807bc\n\n- openstack-tox-py310-arm64 https://zuul.opendev.org/t/openstack/build/dbf2a48de7d94655a6c32fd07e26b96b : SUCCESS in 41m 12s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/25c79dd72fa84d4fabc2b8388c6a2549 : SUCCESS in 39m 29s (non-voting)\n- openstack-tox-py313-arm64 https://zuul.opendev.org/t/openstack/build/7a32050a85c747b4a08aab07a3464de7 : SUCCESS in 44m 37s (non-voting)","accounts_in_message":[],"_revision_number":6},{"id":"241835539d4652a579bb7f67202d8b7af825b7db","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-06-14 08:32:15.000000000","message":"Patch Set 6: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/0f0a2ec6b9aa471dbc33e9f8735d7323\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/e54a97034b8b4623b6d5e132faa574d0 : SUCCESS in 1h 02m 59s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/fe38070f01594315a62e33869559a201 : SUCCESS in 1h 42m 22s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/0ffa1d9bdc2c481da05a89bfce67126e : SUCCESS in 58m 42s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/486999f25f924323990c7803ee8df7a4 : SUCCESS in 23m 16s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/a4fabb6a2da64b8595b44ecde7584321 : SUCCESS in 7m 44s\n- openstack-tox-py310 https://zuul.opendev.org/t/openstack/build/f02fe7088c784f51bf909e8f83e1551c : SUCCESS in 16m 07s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/879850e296ae43a188e8cd7285eac305 : SUCCESS in 18m 45s\n- openstack-tox-py313 https://zuul.opendev.org/t/openstack/build/19550b0584bc4e2fbc65c9ee36eedaa0 : SUCCESS in 18m 26s (non-voting)\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/288cbcb1b30f46188f2ece55d94be32b : SUCCESS in 13m 45s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/5471e968878b4286b18ba670131abc8d : SUCCESS in 55m 41s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/78f3d7b8dbd2428d9782d125b4692aa0 : SUCCESS in 1h 49m 11s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/65c074fafc2744dcb0624de391216065 : SUCCESS in 44m 23s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/300d5f5b50ab4e9fb833751175c85a6a : SUCCESS in 56m 25s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/b3f15549bdf440c9b4d86119087fcf6c : SUCCESS in 49m 47s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/3f6534d346cd45e0af41c76fa5a9369e : SUCCESS in 2h 04m 08s\n- nova-next https://zuul.opendev.org/t/openstack/build/8a0c9b3d74714b7a843b3f0a4e72c780 : SUCCESS in 2h 14m 30s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/4dc7787a89444191880ad2887ff71a41 : SUCCESS in 40m 31s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/1238d81ef5734d789150f5f288882406 : SUCCESS in 5m 00s (non-voting)\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/0a7f97bd30494504ba934f7bc99c3510 : SUCCESS in 30m 06s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/185d632a72d3402f92872db347afc6f1 : SUCCESS in 34m 36s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/ac960a8865a84bfb90afca2701f0beb6 : SUCCESS in 1h 22m 15s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/2be58b0f275940ee928010b24eff9303 : SUCCESS in 1h 01m 30s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/5b1541631585459aabef2e5060863195 : FAILURE in 38m 58s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/e2a17f05c7f74cd98332622dca5b985c : SUCCESS in 30m 45s (non-voting)","accounts_in_message":[],"_revision_number":6},{"id":"3f41409b133262524ba20b47c5cf5cc1aac84f97","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-25 02:13:53.000000000","message":"Uploaded patch set 7.\n\nOutdated Votes:\n* Verified+1\n","accounts_in_message":[],"_revision_number":7},{"id":"8a183818128602ad2aa145381746ec8d22576a3f","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-25 05:13:21.000000000","message":"Uploaded patch set 8: Patch Set 7 was rebased.","accounts_in_message":[],"_revision_number":8},{"id":"9b78bc6adfc1dabb74cfba5ceefdedf66f25822c","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-07-25 06:09:24.000000000","message":"Patch Set 8:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/c046ebb7ae544b22bca94340329660ba\n\n- openstack-tox-py310-arm64 https://zuul.opendev.org/t/openstack/build/0015390228c74bf4a2a54027bc8c43ab : SUCCESS in 30m 45s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/58e391149ce6481ba0704e81ca3fb130 : SUCCESS in 27m 01s (non-voting)\n- openstack-tox-py313-arm64 https://zuul.opendev.org/t/openstack/build/7dc62348c3fd48d68a876bed414e0da4 : SUCCESS in 25m 48s (non-voting)","accounts_in_message":[],"_revision_number":8},{"id":"85ed6ab9769a343018707108e9c5a8c877b6744d","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-07-25 07:28:02.000000000","message":"Patch Set 8: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/7232c7ac33f44108aaa9082e9929dbcf\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/f4fb7626205d474faaf662e81036d61b : SUCCESS in 59m 39s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/978e33d958324256bf6d65f85fa899f8 : SUCCESS in 2h 01m 36s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/29543ae8016549dea065f065300d63df : SUCCESS in 1h 00m 16s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/2f315dad74564d19a09149d9aa3bba6f : SUCCESS in 21m 52s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/bafcfe2a88b64b79b45a54eed58ded74 : SUCCESS in 7m 23s\n- openstack-tox-py310 https://zuul.opendev.org/t/openstack/build/cd6041868a6f40568d66fec867c5c50e : SUCCESS in 13m 37s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/51f0cea6e7b64f44bc0e023a99a98bda : SUCCESS in 13m 42s\n- openstack-tox-py313 https://zuul.opendev.org/t/openstack/build/6720ec201039440581b2c7fb79d6f92b : SUCCESS in 19m 43s (non-voting)\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/fb20556824a74dd6ad8a278120dfae9a : SUCCESS in 11m 10s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/7cd0c17015984219bcdf6fb2e68b227a : SUCCESS in 1h 02m 51s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/9b3627abed5a4a3d84ed15881c4323ef : SUCCESS in 1h 52m 41s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/5312c6ac07bf42aea653a1ac412e4292 : SUCCESS in 56m 14s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/18a60fc235184cc1a1599a32742f6eb9 : SUCCESS in 25m 49s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/575a920d2f3d4adc9ba27d12d8b76c6c : SUCCESS in 1h 01m 24s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/a2e7e2e1588f439582dc62dfdaa86b0f : SUCCESS in 1h 46m 34s\n- nova-next https://zuul.opendev.org/t/openstack/build/75556538d04c47ef963e8cfdd3772337 : SUCCESS in 1h 16m 53s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/3493f217528d42bca5b5da0a04123edc : SUCCESS in 49m 14s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/08fccdad3c4b4ba88e34dc68db62e738 : SUCCESS in 4m 56s (non-voting)\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/489c191a95ef4ba5968891967f5caf4d : SUCCESS in 25m 02s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/774a143dd43440caa9dc19a0790d0cd0 : SUCCESS in 28m 12s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/8ce3b5df5eb84a5b84d6b22113e91312 : SUCCESS in 57m 56s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/aeea85659aa64718a913e097809fe8ea : SUCCESS in 58m 35s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/90b24a0f5faf4788bb49c058f60fd9f1 : SUCCESS in 28m 40s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/0a765b61ab1b4b5dacb0bff2a87ab43c : SUCCESS in 27m 56s (non-voting)","accounts_in_message":[],"_revision_number":8},{"id":"6408d6ee440f72e107dce7a39cc5568dc2fd1cfd","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"date":"2025-07-25 07:34:27.000000000","message":"Patch Set 8:\n\nBuild succeeded. log path: ${LOG_PATH}\nLeave a comment with \u0027run-Lightbits CI\u0027 to trigger a recheck. \nFor more information about CI, please see https://wiki.openstack.org/wiki/ThirdPartySystems/LightbitsLabs_CI","accounts_in_message":[],"_revision_number":8},{"id":"b3b5fbc3f5154205b03216bad3da53158b759c1b","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-26 07:38:53.000000000","message":"Uploaded patch set 9: Patch Set 8 was rebased.\n\nOutdated Votes:\n* Verified+1\n","accounts_in_message":[],"_revision_number":9},{"id":"9659a8362021dfafef7aa7d2ee516c541cee73a4","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-07-26 08:18:08.000000000","message":"Patch Set 9:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/c17672bfe23c4f73b22650e512569488\n\n- openstack-tox-py310-arm64 https://zuul.opendev.org/t/openstack/build/955939f34ce84a2b84afbc1a8ccdef20 : SUCCESS in 20m 46s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/5dfc186e5f5e483690d06e43a72c02e9 : SUCCESS in 36m 29s (non-voting)\n- openstack-tox-py313-arm64 https://zuul.opendev.org/t/openstack/build/40b589bedcb7467cb5cf9ee24f2867a9 : SUCCESS in 33m 56s (non-voting)","accounts_in_message":[],"_revision_number":9},{"id":"b6494340aa5509f6721d554bb3123e716c1a4b8a","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-07-26 09:45:09.000000000","message":"Patch Set 9: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/1fbaff151a5d4169b463f4ffb4b7ef2e\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/13dda0c4b85746a082cca8dad9c1b7b0 : SUCCESS in 1h 00m 15s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/a3fd1ef3c30a44adb0abc9ca38004059 : SUCCESS in 1h 43m 07s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/35d7ba2c650e4e59af8885a83f5edf66 : SUCCESS in 1h 02m 40s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/d37ae6722fae46519d8effbe05ef29e9 : SUCCESS in 23m 34s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/e1e1a1ca61604ad1a038aa2a0e4e2e16 : SUCCESS in 9m 59s\n- openstack-tox-py310 https://zuul.opendev.org/t/openstack/build/624259144e304527ae6d0cf57641f92f : SUCCESS in 13m 34s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/823794a607a848f7980ed1f03391f0ee : SUCCESS in 11m 10s\n- openstack-tox-py313 https://zuul.opendev.org/t/openstack/build/f1cb8683ec7d4e7fb8757d65fa4c6767 : SUCCESS in 20m 17s (non-voting)\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/96b91ee3fdb643999a44e82038e9c15f : SUCCESS in 14m 31s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/6a76e417675f43f7969f941571acd99f : SUCCESS in 1h 05m 38s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/50074b142c1f4c4f97623f9dda5e124f : SUCCESS in 1h 56m 21s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/c6831554c8894205b01d5eb09e88bf89 : SUCCESS in 25m 35s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/ed70de01a4f54fe3a3f858d228bb41c2 : SUCCESS in 56m 30s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/55da4e15d87e413fb5fb0242766d8945 : SUCCESS in 1h 09m 42s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/e405afeefb80404c9605dd846f2eaacf : SUCCESS in 1h 07m 13s\n- nova-next https://zuul.opendev.org/t/openstack/build/c14c61fd173347f6808be7e88b74cc44 : SUCCESS in 1h 23m 28s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/63c3f5deab15458d932d7bc0bce0eecd : SUCCESS in 37m 43s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/9ed4fad269d248b1853b3c8ab853c73b : SUCCESS in 5m 07s (non-voting)\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/0dbad28acc484eb1b315f5a4c7498bdd : SUCCESS in 24m 34s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/ad4b284a1d8d48d8b2e320532a887600 : SUCCESS in 37m 05s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/4303e1c9d01c4db4b9609ed0b8a08378 : SUCCESS in 1h 07m 06s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/c3d41a531a8c4152bfe7a2f5fc937f9b : SUCCESS in 1h 00m 35s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/6f8692ccb4524bdb88a1aa356fcfd35a : SUCCESS in 27m 14s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/bcac8f0f7d2b4f6ab6b686b59cd8c1ee : SUCCESS in 28m 41s (non-voting)","accounts_in_message":[],"_revision_number":9},{"id":"7daf75fe4c13e925ab61f766f53669fe3a35d897","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"date":"2025-07-26 09:50:29.000000000","message":"Patch Set 9:\n\nBuild succeeded. log path: ${LOG_PATH}\nLeave a comment with \u0027run-Lightbits CI\u0027 to trigger a recheck. \nFor more information about CI, please see https://wiki.openstack.org/wiki/ThirdPartySystems/LightbitsLabs_CI","accounts_in_message":[],"_revision_number":9},{"id":"e6ca280659747e850c2d88e70080ec80eb32b0da","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-07-28 18:26:03.000000000","message":"Patch Set 9:\n\n(2 comments)","accounts_in_message":[],"_revision_number":9},{"id":"d71f1f15dc7fce09bb75e97b88803ebf80c458f3","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-28 19:05:56.000000000","message":"Patch Set 9:\n\n(1 comment)","accounts_in_message":[],"_revision_number":9},{"id":"a1063cc80ee2e27577ab3537b1b6539640a95686","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-07-28 19:46:10.000000000","message":"Patch Set 9:\n\n(2 comments)","accounts_in_message":[],"_revision_number":9},{"id":"c4d0d3e6b8b98dfd6a4f0c9b98686b8c4a32ebc3","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-28 20:05:20.000000000","message":"Patch Set 9:\n\n(2 comments)","accounts_in_message":[],"_revision_number":9},{"id":"daaed963987dde0e1c45c2a657d0e9de9275d115","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-29 03:12:28.000000000","message":"Uploaded patch set 10.\n\nOutdated Votes:\n* Verified+1\n","accounts_in_message":[],"_revision_number":10},{"id":"c262b2a9533fa475a0d6aae3c6e832acf597c322","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-29 03:13:31.000000000","message":"Patch Set 10:\n\n(1 comment)","accounts_in_message":[],"_revision_number":10},{"id":"01faa4ac2d54addfcab6204d7658b5530febea6b","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-07-29 05:13:20.000000000","message":"Patch Set 10:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/2b816e26d4d54699b813fa9230c0dfe2\n\n- openstack-tox-py310-arm64 https://zuul.opendev.org/t/openstack/build/e79a5ad195bb4d5a85f734cd54e496ab : SUCCESS in 30m 59s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/3e2081a732ca462798671b2ef9912eef : SUCCESS in 31m 41s (non-voting)\n- openstack-tox-py313-arm64 https://zuul.opendev.org/t/openstack/build/09f8875ce67a4f8485007fc97e1c0006 : SUCCESS in 33m 41s (non-voting)","accounts_in_message":[],"_revision_number":10},{"id":"7f8208635b5d05be83a6ea8dd937f1895ace087e","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-07-29 06:20:49.000000000","message":"Patch Set 10: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/cc46fb98abdb44e5a2499e73262e311f\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/299551cb1ddf4c71b014ed7e1011613d : SUCCESS in 1h 08m 26s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/18c4e9ee21cd4f9f9eff8d819d7462e6 : SUCCESS in 1h 47m 56s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/21006ffc97a24bd08a7dfccc6d178fb5 : SUCCESS in 56m 03s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/53d2ba731907463d9e65b1a7a921a337 : SUCCESS in 15m 10s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/7f3ec647915948e0990769bed5108cc9 : SUCCESS in 7m 11s\n- openstack-tox-py310 https://zuul.opendev.org/t/openstack/build/b967019976164750944417942199f334 : SUCCESS in 13m 14s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/6d5872d6cb814dfaa760b4319eff12c2 : SUCCESS in 11m 51s\n- openstack-tox-py313 https://zuul.opendev.org/t/openstack/build/ac6e507fe4624c0e98dd5be2c271ab5d : SUCCESS in 11m 31s (non-voting)\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/550be880bd264b848e002b887e39bf5e : SUCCESS in 13m 34s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/be3c8d85bf804036969aa861fe376888 : SUCCESS in 54m 34s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/a32e9162f9a348019bf8163687cafca6 : SUCCESS in 1h 40m 34s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/04656432f2b740248a16cccc61440bb6 : SUCCESS in 31m 24s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/694ae20d5239403f8f07671440f349bb : SUCCESS in 32m 49s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/a9347884d55c41c1952300c0e1ce2d7e : SUCCESS in 55m 06s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/1af16cc5d7cc4cdd83a19fde0be31468 : SUCCESS in 1h 58m 15s\n- nova-next https://zuul.opendev.org/t/openstack/build/6985d3f89e474cffb4673198322c2f6f : SUCCESS in 2h 14m 01s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/0cdf314d52ac4cef93fd508684fbfc66 : SUCCESS in 49m 43s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/a53514b8f49843e79e300c3b6a461105 : SUCCESS in 4m 51s (non-voting)\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/02a3355335c14d0b9e5bd00f68fe019a : SUCCESS in 27m 14s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/fa64e6d0d06048ad88b07a29c2c503de : SUCCESS in 32m 40s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/f72d3750bc9d488da7bd762370b63b17 : SUCCESS in 55m 58s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/cabf3406ec024785bc26827bd3ca6b29 : SUCCESS in 50m 24s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/00c3df42634a4761a502287eec706c32 : SUCCESS in 27m 54s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/f379730872ac4778b5672698b3854980 : SUCCESS in 29m 13s (non-voting)","accounts_in_message":[],"_revision_number":10},{"id":"14703da02ba1a2a06686ee56befba0858017ade6","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"date":"2025-07-29 06:26:49.000000000","message":"Patch Set 10:\n\nBuild succeeded. log path: ${LOG_PATH}\nLeave a comment with \u0027run-Lightbits CI\u0027 to trigger a recheck. \nFor more information about CI, please see https://wiki.openstack.org/wiki/ThirdPartySystems/LightbitsLabs_CI","accounts_in_message":[],"_revision_number":10},{"id":"9dad0c54ba923b354d4c7bc7489438573a2d6712","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-07-29 13:54:46.000000000","message":"Patch Set 10:\n\n(4 comments)","accounts_in_message":[],"_revision_number":10},{"id":"4bf4a259c7b43e1cf95ace84aa182bfee24101d5","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-29 16:47:22.000000000","message":"Patch Set 10:\n\n(1 comment)","accounts_in_message":[],"_revision_number":10},{"id":"c40b11527a2f93f08faa5045c9bfb6ff3d5d8f3a","author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"date":"2025-07-29 16:51:06.000000000","message":"Patch Set 10: Code-Review-1\n\n(7 comments)","accounts_in_message":[],"_revision_number":10},{"id":"aff55d755eef8c6bbdc19be3a4523f844087a17f","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-29 16:58:08.000000000","message":"Patch Set 10:\n\n(2 comments)","accounts_in_message":[],"_revision_number":10},{"id":"c3b96013d358f2d992828c326b90bcd7b79dc955","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-07-29 19:29:05.000000000","message":"Patch Set 10:\n\n(1 comment)","accounts_in_message":[],"_revision_number":10},{"id":"110c220ee72d6664345fd103a0a19b8f2b30461f","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-29 19:38:41.000000000","message":"Patch Set 10:\n\n(1 comment)","accounts_in_message":[],"_revision_number":10},{"id":"6590e0317aa2829681df88ae2b881354320028a8","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-30 00:18:37.000000000","message":"Patch Set 10:\n\n(1 comment)","accounts_in_message":[],"_revision_number":10},{"id":"c983cd56686349ef36bff3c0bea024a74b7dd84a","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-30 01:03:13.000000000","message":"Uploaded patch set 11.\n\nOutdated Votes:\n* Code-Review-1 (copy condition: \"changekind:TRIVIAL_REBASE OR is:MIN\")\n* Verified+1\n","accounts_in_message":[],"_revision_number":11},{"id":"ce0d7b1c409b35e9614bdcc9f92b87f426f49d1a","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-30 01:12:56.000000000","message":"Uploaded patch set 12.","accounts_in_message":[],"_revision_number":12},{"id":"aa391113e711073189cb80884e88ef1df0f496d7","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-30 01:15:54.000000000","message":"Patch Set 12:\n\n(2 comments)","accounts_in_message":[],"_revision_number":12},{"id":"71d9501a10a6c9a52315b89cd3cf08ac5f98952c","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-07-30 02:00:53.000000000","message":"Patch Set 12:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/19d5153da8e443b1ac8e64bfd5b7fa86\n\n- openstack-tox-py310-arm64 https://zuul.opendev.org/t/openstack/build/402133b66380451484c5b5efc2205608 : SUCCESS in 35m 39s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/404405037b3f4dd6826364d899f3fd27 : SUCCESS in 30m 59s (non-voting)\n- openstack-tox-py313-arm64 https://zuul.opendev.org/t/openstack/build/625131391c374cd08e278495c0366e5b : SUCCESS in 44m 41s (non-voting)","accounts_in_message":[],"_revision_number":12},{"id":"ff6e77970e0b296f1acdbedd58c91fe186c9e3e5","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-07-30 04:14:41.000000000","message":"Patch Set 12: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/21be1f758a514ac98e37a05311c5f5fa\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/a61f75f1b64f4fbd8f339d1ce215228f : SUCCESS in 35m 42s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/52b57c77f805400888762a87e08196f1 : SUCCESS in 1h 41m 22s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/792712e1e7034de18fbaaa3289b910c7 : SUCCESS in 33m 30s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/1162c00ffd6e484fb37602e18cfa0ffb : SUCCESS in 15m 38s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/41d7642a1bb94ec1bca50dd19c3b7442 : SUCCESS in 4m 08s\n- openstack-tox-py310 https://zuul.opendev.org/t/openstack/build/e2e6db3fceea4e8799b7eb2836204d4e : SUCCESS in 8m 22s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/a1f8164ef1a7426dba7a4de69646c284 : SUCCESS in 18m 40s\n- openstack-tox-py313 https://zuul.opendev.org/t/openstack/build/5994f203b4444aa3984068b68748cd57 : SUCCESS in 17m 31s (non-voting)\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/624570c5255447729d4c7db8eb4c39d2 : SUCCESS in 6m 37s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/98d545aa31e749e6bfc09739d13ccac3 : SUCCESS in 1h 13m 39s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/3135f49951ed47eda824768cac44be2b : SUCCESS in 1h 59m 28s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/e719f90dda4d4dc697958c1a5e5b8bd7 : SUCCESS in 58m 36s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/b704fa41ead04e16bef0f53b3b79f534 : SUCCESS in 41m 44s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/2f663b6bd7fb47fbb8a61edd5d7ff446 : SUCCESS in 58m 05s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/e2ff2756c1484c6e9f972ead70726ee0 : SUCCESS in 1h 05m 51s\n- nova-next https://zuul.opendev.org/t/openstack/build/9eacb4d095534be6a2fd0ca63cb915a6 : SUCCESS in 2h 51m 34s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/41e7cb9987e8442b9bd7ae218b40df5e : SUCCESS in 45m 31s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/7e220fc889814434a90e150b688367fe : SUCCESS in 2m 55s (non-voting)\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/2941d463a7d848cc8eae1fee6c29fc58 : SUCCESS in 23m 42s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/a14bc8e148644a3995687d2a82aed511 : SUCCESS in 34m 30s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/f2c73bf361ea4c09bd7ab5c3cb8c6a57 : SUCCESS in 1h 44m 45s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/d7befbc7f8604b9cb366c0ae0e041c68 : SUCCESS in 30m 53s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/90785200c45b4338a59edc91d6bac803 : SUCCESS in 12m 26s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/7b14d776489540aaa3c3210992ca6c0a : SUCCESS in 17m 37s (non-voting)","accounts_in_message":[],"_revision_number":12},{"id":"37b0cc93ee30f1d8cec61c1283de358370e87f38","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"date":"2025-07-30 04:20:05.000000000","message":"Patch Set 12:\n\nBuild succeeded. log path: ${LOG_PATH}\nLeave a comment with \u0027run-Lightbits CI\u0027 to trigger a recheck. \nFor more information about CI, please see https://wiki.openstack.org/wiki/ThirdPartySystems/LightbitsLabs_CI","accounts_in_message":[],"_revision_number":12},{"id":"3815e5c6a9f512fbf7b8bd7582aaaf23cad84dd8","author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"date":"2025-07-30 06:12:36.000000000","message":"Patch Set 12: Code-Review-1\n\n(4 comments)","accounts_in_message":[],"_revision_number":12},{"id":"569d1c963d9415ba7c39ca2d07113fcd4a59cd3b","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-07-30 14:20:54.000000000","message":"Patch Set 12:\n\n(1 comment)","accounts_in_message":[],"_revision_number":12},{"id":"ad2a78fc8d5bdd753f9d49c5d842685bbfa78f3e","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-07-31 03:16:10.000000000","message":"Patch Set 12:\n\n(1 comment)","accounts_in_message":[],"_revision_number":12},{"id":"2fa0b81f8b5165e4cc3ec53aa30751aba4ade55e","author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"date":"2025-08-01 20:19:51.000000000","message":"Patch Set 12: Code-Review+1\n\n(1 comment)","accounts_in_message":[],"_revision_number":12},{"id":"36a60d20ffd597afeec7cddb20d7541bf4d3d523","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-08-09 01:15:32.000000000","message":"Uploaded patch set 13.\n\nOutdated Votes:\n* Code-Review+1, Code-Review-1 (copy condition: \"changekind:TRIVIAL_REBASE OR is:MIN\")\n* Verified+1\n","accounts_in_message":[],"_revision_number":13},{"id":"d47f95b2d3957371b5ee9f964c6d651d15cee7a4","tag":"autogenerated:gerrit:newPatchSet","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-08-09 01:21:30.000000000","message":"Uploaded patch set 14: Patch Set 13 was rebased.","accounts_in_message":[],"_revision_number":14},{"id":"e07d4d366dcaa62d4fdc3cd409671401e30b1bbe","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-08-09 01:26:24.000000000","message":"Patch Set 14:\n\n(1 comment)","accounts_in_message":[],"_revision_number":14},{"id":"350e0c9e93ae15b83106114a7ec920728b05ab49","tag":"autogenerated:zuul:check-arm64","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-08-09 03:44:40.000000000","message":"Patch Set 14:\n\nBuild succeeded (ARM64 pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/60fc7cae71ec4e9293a431d0f8770065\n\n- openstack-tox-py310-arm64 https://zuul.opendev.org/t/openstack/build/9950c6b9f8694e8493634485e13cba2a : SUCCESS in 39m 08s (non-voting)\n- openstack-tox-py312-arm64 https://zuul.opendev.org/t/openstack/build/480f38d34ecf4dbab3dca2d64402610b : FAILURE in 42m 20s (non-voting)\n- openstack-tox-py313-arm64 https://zuul.opendev.org/t/openstack/build/93783d467de94bfe93767f50abe5e3a8 : FAILURE in 52m 07s (non-voting)","accounts_in_message":[],"_revision_number":14},{"id":"7a892c8f93f02f57a8cbdbb87a7ffcbb1a4017c6","tag":"autogenerated:zuul:check","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2025-08-09 04:16:47.000000000","message":"Patch Set 14: Verified+1\n\nBuild succeeded (check pipeline).\nhttps://zuul.opendev.org/t/openstack/buildset/5d234f85a6944de782bb09f807a14117\n\n- grenade-skip-level-always https://zuul.opendev.org/t/openstack/build/de4022ab90d3436e85c60c57f2c0b981 : SUCCESS in 1h 04m 50s\n- tempest-integrated-compute https://zuul.opendev.org/t/openstack/build/01caf90ffd3e4aefa1876af5700ffc9f : SUCCESS in 1h 58m 44s\n- openstacksdk-functional-devstack https://zuul.opendev.org/t/openstack/build/6639e1527bc44a8ab76451059d4b825e : SUCCESS in 1h 01m 32s\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/43a8f797cf7a49afb234c8da818bb777 : SUCCESS in 26m 12s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/c85ebd2ce56c46bfb44e1a79540f2f70 : SUCCESS in 8m 06s\n- openstack-tox-py310 https://zuul.opendev.org/t/openstack/build/60c02ece92484d27a4aecd75b1712afa : SUCCESS in 12m 28s\n- openstack-tox-py312 https://zuul.opendev.org/t/openstack/build/9ac4d257c75f40afb02f1546762ae34d : SUCCESS in 14m 04s\n- openstack-tox-py313 https://zuul.opendev.org/t/openstack/build/1fa8c1a9482b4e52bbaaebc7dc1b6384 : SUCCESS in 18m 02s (non-voting)\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/babb70e5a8b0481485f67f1dba21de98 : SUCCESS in 12m 35s\n- ironic-tempest-ipa-wholedisk-bios-agent_ipmitool-tinyipa https://zuul.opendev.org/t/openstack/build/421efcd34c494dc0ba6d1400369d667a : SUCCESS in 59m 56s (non-voting)\n- nova-ceph-multistore https://zuul.opendev.org/t/openstack/build/b30206b2b143455c97e86f4a63894f04 : SUCCESS in 2h 00m 29s\n- nova-live-migration https://zuul.opendev.org/t/openstack/build/bf0e8cd39ee1456690e089f72893aff9 : SUCCESS in 59m 38s\n- nova-live-migration-ceph https://zuul.opendev.org/t/openstack/build/ec8e8b3a36c9461aa246324c48c05183 : SUCCESS in 58m 56s\n- nova-lvm https://zuul.opendev.org/t/openstack/build/3bb04e46542e4c63b0781fd2b6ff9c42 : SUCCESS in 1h 09m 33s\n- nova-multi-cell https://zuul.opendev.org/t/openstack/build/09fa3be607eb46498c269d7f1c3972c3 : SUCCESS in 1h 55m 06s\n- nova-next https://zuul.opendev.org/t/openstack/build/08591bf129ff4bfda67c8eafdbd1d7ae : SUCCESS in 2h 48m 25s\n- nova-ovs-hybrid-plug https://zuul.opendev.org/t/openstack/build/3e6d8add5f71475f976088a854537bfb : SUCCESS in 45m 43s\n- nova-tox-validate-backport https://zuul.opendev.org/t/openstack/build/8a8159b94534450fb11ca5b22feb86ce : SUCCESS in 4m 43s (non-voting)\n- nova-tox-functional-py310 https://zuul.opendev.org/t/openstack/build/cda890ffc208464a8f6b5a82e55cc92b : SUCCESS in 31m 50s\n- nova-tox-functional-py312 https://zuul.opendev.org/t/openstack/build/692afe9f6e4e40bebab7144e56043fcf : SUCCESS in 32m 58s\n- nova-grenade-multinode https://zuul.opendev.org/t/openstack/build/4f98641ecddd4f2a9b34746ec389bd61 : SUCCESS in 1h 19m 36s\n- tempest-ipv6-only https://zuul.opendev.org/t/openstack/build/d4b04b28c34b41bcb12feb3e12713e2f : SUCCESS in 56m 56s\n- cyborg-tempest https://zuul.opendev.org/t/openstack/build/6a2561287c8f4802809a02019700cd8c : SUCCESS in 29m 35s (non-voting)\n- barbican-tempest-plugin-simple-crypto https://zuul.opendev.org/t/openstack/build/d4a2dfda8c7444bdaa2b3a19c46e6676 : SUCCESS in 29m 54s (non-voting)","accounts_in_message":[],"_revision_number":14},{"id":"b7355877826056476b92cb12f44d92f860247303","tag":"autogenerated:jenkins-gerrit-trigger","author":{"_account_id":34420,"name":"openstack lightbits","display_name":"Lightbits CI","email":"openstack@lightbitslabs.com","username":"openstack_lightbits"},"date":"2025-08-09 04:24:05.000000000","message":"Patch Set 14:\n\nBuild succeeded. log path: ${LOG_PATH}\nLeave a comment with \u0027run-Lightbits CI\u0027 to trigger a recheck. \nFor more information about CI, please see https://wiki.openstack.org/wiki/ThirdPartySystems/LightbitsLabs_CI","accounts_in_message":[],"_revision_number":14},{"id":"42baddc538c7ff39731c3b1c21ca846f45da1021","author":{"_account_id":7166,"name":"Sylvain Bauza","email":"sbauza@redhat.com","username":"sbauza"},"date":"2025-08-26 09:38:42.000000000","message":"Patch Set 14: Code-Review+1\n\n(4 comments)","accounts_in_message":[],"_revision_number":14},{"id":"6cb35d8da210ec6c81ad44d1f5cbe6f98cba774a","tag":"autogenerated:gerrit:abandon","author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"date":"2025-09-23 06:16:39.000000000","message":"Abandoned\n\nScope changed with spec re-proposal: https://review.opendev.org/c/openstack/nova-specs/+/961564","accounts_in_message":[],"_revision_number":14}],"current_revision_number":14,"current_revision":"3f2fa4efaafe9a77422ffcbad682021652ef4114","revisions":{"1cbed7bd2c93680f4dac66955071c25598d752ae":{"kind":"REWORK","_number":1,"created":"2025-02-22 02:04:05.000000000","uploader":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"ref":"refs/changes/01/942501/1","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/1","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/1 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/1 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/1 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/1"}}},"commit":{"parents":[{"commit":"f4f8c38f2dab3dd2fee516cfd7175ad1e1809dbd","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/f4f8c38f2dab3dd2fee516cfd7175ad1e1809dbd"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:36:08.000000000","tz":-300},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe code that persists the TPM secret security is written in a\nforward-compatible way, and will be used in future patches to\nhandle new instances that are booted without specifying a secret\nsecurity policy in their impage properties or extra specs.\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nImplements: blueprint vtpm-live-migration\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/1cbed7bd2c93680f4dac66955071c25598d752ae"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/1cbed7bd2c93680f4dac66955071c25598d752ae"}]},"branch":"refs/heads/master"},"df411b46bf1d04d75631187c8792f99592588fbe":{"kind":"TRIVIAL_REBASE","_number":2,"created":"2025-03-27 16:16:31.000000000","uploader":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"ref":"refs/changes/01/942501/2","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/2","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/2 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/2 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/2 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/2"}}},"commit":{"parents":[{"commit":"336b387ffd5ce66250e893791a10cb63b8f224a2","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/336b387ffd5ce66250e893791a10cb63b8f224a2"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-03-27 16:14:32.000000000","tz":-240},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe code that persists the TPM secret security is written in a\nforward-compatible way, and will be used in future patches to\nhandle new instances that are booted without specifying a secret\nsecurity policy in their impage properties or extra specs.\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nImplements: blueprint vtpm-live-migration\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/df411b46bf1d04d75631187c8792f99592588fbe"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/df411b46bf1d04d75631187c8792f99592588fbe"}]},"branch":"refs/heads/master"},"3f27e753c008fa5329e6f9d579bdf07961c96ee8":{"kind":"TRIVIAL_REBASE","_number":3,"created":"2025-03-27 17:31:52.000000000","uploader":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"ref":"refs/changes/01/942501/3","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/3","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/3 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/3 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/3 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/3"}}},"commit":{"parents":[{"commit":"dd03751be10383b9fc8cad33280aae130b57e005","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/dd03751be10383b9fc8cad33280aae130b57e005"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-03-27 16:16:50.000000000","tz":-240},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe code that persists the TPM secret security is written in a\nforward-compatible way, and will be used in future patches to\nhandle new instances that are booted without specifying a secret\nsecurity policy in their impage properties or extra specs.\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nImplements: blueprint vtpm-live-migration\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/3f27e753c008fa5329e6f9d579bdf07961c96ee8"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/3f27e753c008fa5329e6f9d579bdf07961c96ee8"}]},"branch":"refs/heads/master"},"b29f4e3185e014f6594742d8647ee6c2416d01ef":{"kind":"REWORK","_number":4,"created":"2025-03-28 17:26:14.000000000","uploader":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"ref":"refs/changes/01/942501/4","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/4","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/4 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/4 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/4 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/4"}}},"commit":{"parents":[{"commit":"44a1868a1a2c2f05ea28f54281ca3881dc7c67ce","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/44a1868a1a2c2f05ea28f54281ca3881dc7c67ce"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-03-28 17:21:34.000000000","tz":-240},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe code that persists the TPM secret security is written in a\nforward-compatible way, and will be used in future patches to\nhandle new instances that are booted without specifying a secret\nsecurity policy in their impage properties or extra specs.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nImplements: blueprint vtpm-live-migration\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/b29f4e3185e014f6594742d8647ee6c2416d01ef"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/b29f4e3185e014f6594742d8647ee6c2416d01ef"}]},"branch":"refs/heads/master"},"fb35e7d5dae1f9c6b931c5a5eabe96b01cde0c5e":{"kind":"NO_CODE_CHANGE","_number":5,"created":"2025-03-28 17:45:25.000000000","uploader":{"_account_id":8864,"name":"Artom Lifshitz","email":"notartom@gmail.com","username":"artom"},"ref":"refs/changes/01/942501/5","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/5","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/5 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/5 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/5 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/5"}}},"commit":{"parents":[{"commit":"44a1868a1a2c2f05ea28f54281ca3881dc7c67ce","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/44a1868a1a2c2f05ea28f54281ca3881dc7c67ce"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-03-28 17:41:18.000000000","tz":-240},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe new _ensure_tpm_secret_security() method takes two arguments that\nwill be used in future patches:\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n* save tells it whether to save the instance in the database. For now\n  this is always True, but future patches will call this bit of code\n  from a code path that saves the instance anyways for its own\n  reasons, so to avoid the extra DB query, they will pass save\u003dFalse.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nImplements: blueprint vtpm-live-migration\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/fb35e7d5dae1f9c6b931c5a5eabe96b01cde0c5e"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/fb35e7d5dae1f9c6b931c5a5eabe96b01cde0c5e"}]},"branch":"refs/heads/master"},"77bc50a20f91c508b14ed6159a0b0b4f1e31d6fe":{"kind":"REWORK","_number":6,"created":"2025-06-14 06:08:56.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/6","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/6","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/6 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/6 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/6 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/6"}}},"commit":{"parents":[{"commit":"2595fba1d7f456d18921f61a6a701c6e0d6a72fe","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/2595fba1d7f456d18921f61a6a701c6e0d6a72fe"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-06-14 05:51:55.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nImplements: blueprint vtpm-live-migration\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/77bc50a20f91c508b14ed6159a0b0b4f1e31d6fe"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/77bc50a20f91c508b14ed6159a0b0b4f1e31d6fe"}]},"branch":"refs/heads/master"},"751cd7f1b6195e7643eb4cfe2841dad7731a542e":{"kind":"REWORK","_number":7,"created":"2025-07-25 02:13:53.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/7","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/7","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/7 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/7 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/7 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/7"}}},"commit":{"parents":[{"commit":"d04242e18af8fed42a3b35f925896913dcdbbba3","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/d04242e18af8fed42a3b35f925896913dcdbbba3"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-07-25 02:04:17.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nImplements: blueprint vtpm-live-migration\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nSigned-off-by: melanie witt \u003cmelwittt@gmail.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/751cd7f1b6195e7643eb4cfe2841dad7731a542e"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/751cd7f1b6195e7643eb4cfe2841dad7731a542e"}]},"branch":"refs/heads/master"},"a4e099b5ac16dd18a006d33fed0e17f0e051645d":{"kind":"TRIVIAL_REBASE","_number":8,"created":"2025-07-25 05:13:21.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/8","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/8","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/8 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/8 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/8 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/8"}}},"commit":{"parents":[{"commit":"a07469822ed59eec0d6b7731454bdd4216fdcd47","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/a07469822ed59eec0d6b7731454bdd4216fdcd47"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-07-25 05:06:13.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nImplements: blueprint vtpm-live-migration\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nSigned-off-by: melanie witt \u003cmelwittt@gmail.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/a4e099b5ac16dd18a006d33fed0e17f0e051645d"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/a4e099b5ac16dd18a006d33fed0e17f0e051645d"}]},"branch":"refs/heads/master"},"8d4624f1cad7c8d6a2462ff9f3ba335f42710484":{"kind":"TRIVIAL_REBASE","_number":9,"created":"2025-07-26 07:38:53.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/9","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/9","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/9 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/9 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/9 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/9"}}},"commit":{"parents":[{"commit":"314967a3c7b2c3d6c74d213befde428238f1ea61","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/314967a3c7b2c3d6c74d213befde428238f1ea61"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-07-26 07:37:58.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nImplements: blueprint vtpm-live-migration\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nSigned-off-by: melanie witt \u003cmelwittt@gmail.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/8d4624f1cad7c8d6a2462ff9f3ba335f42710484"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/8d4624f1cad7c8d6a2462ff9f3ba335f42710484"}]},"branch":"refs/heads/master"},"0d5aab2da36d74e7dd69133d1ca162415b2918eb":{"kind":"REWORK","_number":10,"created":"2025-07-29 03:12:28.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/10","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/10","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/10 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/10 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/10 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/10"}}},"commit":{"parents":[{"commit":"88a6cbc4a23289157fdba313ca04ec3bbaa30c3f","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/88a6cbc4a23289157fdba313ca04ec3bbaa30c3f"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-07-29 03:07:04.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If\nnothing is found in the image or flavor, use the configuration option.\nAlso record `tpm_secret_security_confirmed \u003d False` to indicate that\nthe user has not yet accepted the new security policy. The user is\nexpected to view the security policy chosen for them by the operator\nusing the new 2.98 microversion, and if they agree with the policy,\nhard reboot their instance for it to take effect. Subsequent patches\nwill actually do the work of confirming the policy upon hard reboot.\nIf the user disagrees, they can either never touch their instance\nagain, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nImplements: blueprint vtpm-live-migration\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nSigned-off-by: melanie witt \u003cmelwittt@gmail.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/0d5aab2da36d74e7dd69133d1ca162415b2918eb"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/0d5aab2da36d74e7dd69133d1ca162415b2918eb"}]},"branch":"refs/heads/master"},"25fde3e341375b25682b9a526bfa613cbc43db15":{"kind":"REWORK","_number":11,"created":"2025-07-30 01:03:13.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/11","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/11","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/11 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/11 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/11 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/11"}}},"commit":{"parents":[{"commit":"6d6ed46fbd628c443f98a425360f1dff61539532","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/6d6ed46fbd628c443f98a425360f1dff61539532"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-07-30 00:34:49.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If nothing\nis found in the image or flavor, use the configuration option. Record\n`provisional_tpm_secret_security \u003d $policy` to indicate that the user\nhas not yet accepted the new security policy. The user is expected to\nview the security policy chosen for them by the operator using the new\n2.98 microversion, and if they agree with the policy, hard reboot their\ninstance for it to take effect. Subsequent patches will actually do the\nwork of confirming the policy upon hard reboot. If the user disagrees,\nthey can either never touch their instance again, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nRelated to blueprint vtpm-live-migration\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nSigned-off-by: melanie witt \u003cmelwittt@gmail.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/25fde3e341375b25682b9a526bfa613cbc43db15"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/25fde3e341375b25682b9a526bfa613cbc43db15"}]},"branch":"refs/heads/master"},"8e88c33e519720185522ba53f04b98fb00233d9b":{"kind":"REWORK","_number":12,"created":"2025-07-30 01:12:56.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/12","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/12","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/12 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/12 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/12 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/12"}}},"commit":{"parents":[{"commit":"6d6ed46fbd628c443f98a425360f1dff61539532","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/6d6ed46fbd628c443f98a425360f1dff61539532"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-07-30 01:12:15.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If nothing\nis found in the image or flavor, use the configuration option. Record\n`provisional_tpm_secret_security \u003d $policy` to indicate that the user\nhas not yet accepted the new security policy. The user is expected to\nview the security policy chosen for them by the operator using the new\n2.98 microversion, and if they agree with the policy, hard reboot their\ninstance for it to take effect. Subsequent patches will actually do the\nwork of confirming the policy upon hard reboot. If the user disagrees,\nthey can either never touch their instance again, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nRelated to blueprint vtpm-live-migration\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nSigned-off-by: melanie witt \u003cmelwittt@gmail.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/8e88c33e519720185522ba53f04b98fb00233d9b"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/8e88c33e519720185522ba53f04b98fb00233d9b"}]},"branch":"refs/heads/master"},"f6167aac9335b2ac46854c0d81ecbd6504983a2f":{"kind":"REWORK","_number":13,"created":"2025-08-09 01:15:32.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/13","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/13","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/13 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/13 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/13 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/13"}}},"commit":{"parents":[{"commit":"6d6ed46fbd628c443f98a425360f1dff61539532","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/6d6ed46fbd628c443f98a425360f1dff61539532"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-08-08 23:41:22.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If nothing\nis found in the image or flavor, use the configuration option. Record\n`provisional_tpm_secret_security \u003d $policy` to indicate that the user\nhas not yet accepted the new security policy. The user is expected to\nview the security policy chosen for them by the operator using the new\n2.98 microversion, and if they agree with the policy, hard reboot their\ninstance for it to take effect. Subsequent patches will actually do the\nwork of confirming the policy upon hard reboot. If the user disagrees,\nthey can either never touch their instance again, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nRelated to blueprint vtpm-live-migration\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nSigned-off-by: melanie witt \u003cmelwittt@gmail.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/f6167aac9335b2ac46854c0d81ecbd6504983a2f"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/f6167aac9335b2ac46854c0d81ecbd6504983a2f"}]},"branch":"refs/heads/master"},"3f2fa4efaafe9a77422ffcbad682021652ef4114":{"kind":"TRIVIAL_REBASE","_number":14,"created":"2025-08-09 01:21:30.000000000","uploader":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"ref":"refs/changes/01/942501/14","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/nova","ref":"refs/changes/01/942501/14","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/14 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/14 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/nova refs/changes/01/942501/14 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/nova refs/changes/01/942501/14"}}},"commit":{"parents":[{"commit":"8914993e77796176e54c220f7f98e2ddb4a2c8db","subject":"Add hw:tpm_secret_security extra spec validation","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/8914993e77796176e54c220f7f98e2ddb4a2c8db"}]}],"author":{"name":"Artom Lifshitz","email":"alifshit@redhat.com","date":"2025-02-21 17:10:28.000000000","tz":-300},"committer":{"name":"melanie witt","email":"melwittt@gmail.com","date":"2025-08-09 01:17:39.000000000","tz":0},"subject":"TPM: migrate legacy instances to new security policy","message":"TPM: migrate legacy instances to new security policy\n\nFor legacy instances that don\u0027t have a TPM secret security policy in\ntheir image properties or extra specs, start using init_host() to\npersist a TPM secret security policy in the system_metadata. If nothing\nis found in the image or flavor, use the configuration option. Record\n`provisional_tpm_secret_security \u003d $policy` to indicate that the user\nhas not yet accepted the new security policy. The user is expected to\nview the security policy chosen for them by the operator using the new\n2.98 microversion, and if they agree with the policy, hard reboot their\ninstance for it to take effect. Subsequent patches will actually do the\nwork of confirming the policy upon hard reboot. If the user disagrees,\nthey can either never touch their instance again, or just delete it.\n\nThe new _set_tpm_secret_security() method takes an argument that\nwill be used in future patches:\n\n* confirmed tells it whether to persist the security policy as\n  confirmed by the user. For now this can only be False as we\u0027re only\n  migrating legacy instances and want the user to confirm in all\n  cases, but future patches that add support for booting new instances\n  where the security policy is confirmed implicitly by the user will\n  have it True.\n\nTo enable all of this, two new config options are added:\n[libvirt]default_tpm_secret_security and\n[libvirt]supported_tpm_secret_security.\n\nThe first option specifies which TPM secret security policy is applied\nif nothing is set in the instance\u0027s flavor or image properties. The\ndefault is current behavior aka `user`.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nThe second option specifies which TPM security policies the host\nsupports. The possible values are `user`, `host` and `deployment`,\nand anything from none to all three can be listed (though none would\nbe weird as it effectively disables TPM). Each value has a\ncorresponding trait reported by the libvirt driver, and will be used\nin subsequent patches by a scheduler prefilter to select based on\nimage properties or flavor extra specs.\n\nNOTE(artom) The spec put this in the compute/DEFAULT section. This\npatches changes that to [libvirt] to align with the other TPM options,\nand because libvirt is the only driver that supports vTPM.\n\nRelated to blueprint vtpm-live-migration\n\nChange-Id: I40507397704f885e00e0bfa021a673ee2d5789a3\nSigned-off-by: melanie witt \u003cmelwittt@gmail.com\u003e\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/3f2fa4efaafe9a77422ffcbad682021652ef4114"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/nova/commit/3f2fa4efaafe9a77422ffcbad682021652ef4114"}]},"branch":"refs/heads/master"}},"requirements":[],"submit_records":[],"submit_requirements":[{"name":"Verified","description":"Verified in gate by CI","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Verified\u003dMAX AND -label:Verified\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Verified\u003dMAX","label:Verified\u003dMIN"],"atom_explanations":{}}},{"name":"Code-Review","description":"Code reviewed by core reviewer","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Code-Review\u003dMAX AND -label:Code-Review\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Code-Review\u003dMAX","label:Code-Review\u003dMIN"],"atom_explanations":{}}},{"name":"Review-Priority","description":"Review Priority","status":"NOT_APPLICABLE","is_legacy":false,"applicability_expression_result":{"fulfilled":false,"status":"FAIL"},"submittability_expression_result":{"expression":"is:true","fulfilled":true,"status":"NOT_EVALUATED","passing_atoms":[],"failing_atoms":[],"atom_explanations":{}}},{"name":"Workflow","description":"Approved for gate by core reviewer","status":"UNSATISFIED","is_legacy":false,"submittability_expression_result":{"expression":"label:Workflow\u003dMAX AND -label:Workflow\u003dMIN","fulfilled":false,"status":"FAIL","passing_atoms":[],"failing_atoms":["label:Workflow\u003dMAX","label:Workflow\u003dMIN"],"atom_explanations":{}}}]}
