)]}'
{"octavia_tempest_plugin/services/load_balancer/v2/listener_client.py":[{"author":{"_account_id":6469,"name":"Carlos Gonçalves","display_name":"Carlos Goncalves","email":"cgoncalves@redhat.com","username":"cgoncalves"},"change_message_id":"0588682151d5a324b059c9d8a00ca200eebea52b","unresolved":false,"context_lines":[{"line_number":76,"context_line":"        :param client_authentication: The TLS client authentication mode. One"},{"line_number":77,"context_line":"                                      of the options NONE, OPTIONAL or"},{"line_number":78,"context_line":"                                      MANDATORY."},{"line_number":79,"context_line":"        :param client_ca_tls_container_ref: The ref of the key manager service"},{"line_number":80,"context_line":"                                            secret containing a PEM format"},{"line_number":81,"context_line":"                                            client CA certificate bundle for"},{"line_number":82,"context_line":"                                            TERMINATED_HTTPS listeners."}],"source_content_type":"text/x-python","patch_set":5,"id":"3fa7e38b_22bd1ed7","line":79,"range":{"start_line":79,"start_character":48,"end_line":79,"end_character":51},"updated":"2019-11-28 16:46:27.000000000","message":"nit: \"URI\" to be consistent with other _ref params?","commit_id":"637866383710d3c170e45e5c2ac4de91aedfa993"},{"author":{"_account_id":11628,"name":"Michael Johnson","email":"johnsomor@gmail.com","username":"johnsom"},"change_message_id":"02166e3ad9e80f7d9a8a7619fc693068430e93fe","unresolved":false,"context_lines":[{"line_number":76,"context_line":"        :param client_authentication: The TLS client authentication mode. One"},{"line_number":77,"context_line":"                                      of the options NONE, OPTIONAL or"},{"line_number":78,"context_line":"                                      MANDATORY."},{"line_number":79,"context_line":"        :param client_ca_tls_container_ref: The ref of the key manager service"},{"line_number":80,"context_line":"                                            secret containing a PEM format"},{"line_number":81,"context_line":"                                            client CA certificate bundle for"},{"line_number":82,"context_line":"                                            TERMINATED_HTTPS listeners."}],"source_content_type":"text/x-python","patch_set":5,"id":"3fa7e38b_0f691125","line":79,"range":{"start_line":79,"start_character":48,"end_line":79,"end_character":51},"in_reply_to":"3fa7e38b_22bd1ed7","updated":"2019-12-02 01:03:28.000000000","message":"Because they never were URI\u0027s and those are mistakes....","commit_id":"637866383710d3c170e45e5c2ac4de91aedfa993"},{"author":{"_account_id":6469,"name":"Carlos Gonçalves","display_name":"Carlos Goncalves","email":"cgoncalves@redhat.com","username":"cgoncalves"},"change_message_id":"0588682151d5a324b059c9d8a00ca200eebea52b","unresolved":false,"context_lines":[{"line_number":243,"context_line":"        :param client_authentication: The TLS client authentication mode. One"},{"line_number":244,"context_line":"                                      of the options NONE, OPTIONAL or"},{"line_number":245,"context_line":"                                      MANDATORY."},{"line_number":246,"context_line":"        :param client_ca_tls_container_ref: The ref of the key manager service"},{"line_number":247,"context_line":"                                            secret containing a PEM format"},{"line_number":248,"context_line":"                                            client CA certificate bundle for"},{"line_number":249,"context_line":"                                            TERMINATED_HTTPS listeners."}],"source_content_type":"text/x-python","patch_set":5,"id":"3fa7e38b_82cbb271","line":246,"range":{"start_line":246,"start_character":48,"end_line":246,"end_character":51},"updated":"2019-11-28 16:46:27.000000000","message":"ditto","commit_id":"637866383710d3c170e45e5c2ac4de91aedfa993"}],"octavia_tempest_plugin/tests/barbican_scenario/v2/test_tls_barbican.py":[{"author":{"_account_id":6469,"name":"Carlos Gonçalves","display_name":"Carlos Goncalves","email":"cgoncalves@redhat.com","username":"cgoncalves"},"change_message_id":"0588682151d5a324b059c9d8a00ca200eebea52b","unresolved":false,"context_lines":[{"line_number":695,"context_line":"            requests.exceptions.SSLError, \".*certificate required.*\","},{"line_number":696,"context_line":"            requests.get,"},{"line_number":697,"context_line":"            \u0027https://{0}:{1}\u0027.format(self.lb_vip_address, LISTENER1_TCP_PORT),"},{"line_number":698,"context_line":"            timeout\u003d12, verify\u003dFalse)"},{"line_number":699,"context_line":""},{"line_number":700,"context_line":"        # Test that a revoked client certificate fails to connect"},{"line_number":701,"context_line":"        with tempfile.NamedTemporaryFile(buffering\u003d0) as cert_file:"}],"source_content_type":"text/x-python","patch_set":5,"id":"3fa7e38b_3ed3f203","line":698,"range":{"start_line":698,"start_character":12,"end_line":698,"end_character":22},"updated":"2019-11-28 16:46:27.000000000","message":"Why 12? Honest question.","commit_id":"637866383710d3c170e45e5c2ac4de91aedfa993"},{"author":{"_account_id":11628,"name":"Michael Johnson","email":"johnsomor@gmail.com","username":"johnsom"},"change_message_id":"02166e3ad9e80f7d9a8a7619fc693068430e93fe","unresolved":false,"context_lines":[{"line_number":695,"context_line":"            requests.exceptions.SSLError, \".*certificate required.*\","},{"line_number":696,"context_line":"            requests.get,"},{"line_number":697,"context_line":"            \u0027https://{0}:{1}\u0027.format(self.lb_vip_address, LISTENER1_TCP_PORT),"},{"line_number":698,"context_line":"            timeout\u003d12, verify\u003dFalse)"},{"line_number":699,"context_line":""},{"line_number":700,"context_line":"        # Test that a revoked client certificate fails to connect"},{"line_number":701,"context_line":"        with tempfile.NamedTemporaryFile(buffering\u003d0) as cert_file:"}],"source_content_type":"text/x-python","patch_set":5,"id":"3fa7e38b_af78fdf6","line":698,"range":{"start_line":698,"start_character":12,"end_line":698,"end_character":22},"in_reply_to":"3fa7e38b_3ed3f203","updated":"2019-12-02 01:03:28.000000000","message":"four intervals of the 3 second TCP packet transmit window and slightly arbitrary so if a test fails in 12 seconds we can trace it back in the code.\nhttps://www.rfc-editor.org/rfc/rfc2988.txt","commit_id":"637866383710d3c170e45e5c2ac4de91aedfa993"}]}
