)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":8313,"name":"Lajos Katona","display_name":"lajoskatona","email":"katonalala@gmail.com","username":"elajkat","status":"Ericsson Software Technology"},"change_message_id":"315e7201a52e3b9c5a1dd8c4dbb901745c7e8ad7","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":9,"id":"826fad53_7a5fc9d2","updated":"2026-05-13 08:16:49.000000000","message":"recheck nova-alt-configuration\nThe failure for nova-alt-configuration is fixed (https://review.opendev.org/c/openstack/devstack/+/988214)","commit_id":"3d027c85b69c100528854e18b6c31ee32a280d70"}],"nova/network/neutron.py":[{"author":{"_account_id":8313,"name":"Lajos Katona","display_name":"lajoskatona","email":"katonalala@gmail.com","username":"elajkat","status":"Ericsson Software Technology"},"change_message_id":"7c7cd37c729e56ab0d4053988f1d41eb14792912","unresolved":true,"context_lines":[{"line_number":3288,"context_line":"        for net in networks:"},{"line_number":3289,"context_line":"            if port[\u0027network_id\u0027] \u003d\u003d net[\u0027id\u0027]:"},{"line_number":3290,"context_line":"                network_name \u003d net[\u0027name\u0027]"},{"line_number":3291,"context_line":"                tenant_id \u003d net[\u0027project_id\u0027]"},{"line_number":3292,"context_line":"                network_mtu \u003d net.get(\u0027mtu\u0027)"},{"line_number":3293,"context_line":"                break"},{"line_number":3294,"context_line":"        else:"}],"source_content_type":"text/x-python","patch_set":5,"id":"af6f24d8_3999f8b6","line":3291,"range":{"start_line":3291,"start_character":16,"end_line":3291,"end_character":45},"updated":"2026-04-23 13:48:48.000000000","message":"hmmm, this must go to the previous patches (and I suppose there will be many similar as tenant_id is wiped out by haleyb :D)","commit_id":"bcdb9d247aa7a5b96763e8d14475b5e92bc4da71"},{"author":{"_account_id":8313,"name":"Lajos Katona","display_name":"lajoskatona","email":"katonalala@gmail.com","username":"elajkat","status":"Ericsson Software Technology"},"change_message_id":"bd58ba7e5b691b89e5abe3c4a37766e8bff0155f","unresolved":true,"context_lines":[{"line_number":238,"context_line":"                context\u003dcontext, conf_group\u003dnova.conf.neutron.NEUTRON_GROUP"},{"line_number":239,"context_line":"            )"},{"line_number":240,"context_line":"        return SDK_CLIENT"},{"line_number":241,"context_line":"    else:"},{"line_number":242,"context_line":"        return utils.get_sdk_adapter("},{"line_number":243,"context_line":"            service_type\u003d\u0027network\u0027, admin\u003dFalse, check_service\u003dTrue,"},{"line_number":244,"context_line":"            context\u003dcontext, conf_group\u003dnova.conf.neutron.NEUTRON_GROUP)"},{"line_number":245,"context_line":""},{"line_number":246,"context_line":""},{"line_number":247,"context_line":"def get_client(context, admin\u003dFalse):"}],"source_content_type":"text/x-python","patch_set":9,"id":"38b0738d_9611c3d8","line":244,"range":{"start_line":241,"start_character":0,"end_line":244,"end_character":72},"updated":"2026-05-11 15:57:13.000000000","message":"huhh, I have to rethink this one. As the get_network_client is a singleton, the cases  are failing when for example we delete default sec-group, and Neutron checks the project who is doing it if it owns the default group and gives back 202 or 400 based on that.","commit_id":"3d027c85b69c100528854e18b6c31ee32a280d70"}],"nova/network/security_group_api.py":[{"author":{"_account_id":8313,"name":"Lajos Katona","display_name":"lajoskatona","email":"katonalala@gmail.com","username":"elajkat","status":"Ericsson Software Technology"},"change_message_id":"e81d0d1421b361a67bb64d621a31e7e4a8f7b485","unresolved":true,"context_lines":[{"line_number":218,"context_line":""},{"line_number":219,"context_line":""},{"line_number":220,"context_line":"def create_security_group(context, name, description):"},{"line_number":221,"context_line":"    neutron \u003d neutronapi.get_client(context)"},{"line_number":222,"context_line":"    body \u003d _make_neutron_security_group_dict(name, description)"},{"line_number":223,"context_line":"    try:"},{"line_number":224,"context_line":"        security_group \u003d neutron.create_security_group("},{"line_number":225,"context_line":"            body).get(\u0027security_group\u0027)"}],"source_content_type":"text/x-python","patch_set":4,"id":"5d1c34d4_70ea0232","side":"PARENT","line":222,"range":{"start_line":221,"start_character":4,"end_line":222,"end_character":63},"updated":"2026-03-30 11:12:29.000000000","message":"hmmm, here the context has (with local debugging) a project_id that is non-admin and I suppose created by tempest for test_list_security_groups_list_all_tenants_filter, but it seems that the actual s-g is owned by the service project. I suppose that is how the client is created in network/neutron.py. I have to dig into it","commit_id":"aa86eb3870b20ad4556a218776793f94f290cfa4"}]}
