)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":32666,"name":"Damian Dąbrowski","email":"damian@dabrowski.cloud","username":"ddabrowski"},"change_message_id":"da8fd0733c44476a607233190b9919fe35b876b9","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":4,"id":"4d54f249_9e62b2b9","updated":"2023-04-05 10:10:23.000000000","message":"recheck - openstack-ansible-deploy-aio_metal-centos-9-stream - Failed to validate GPG signature for ovn22.12-22.12.0-34.el9s.x86_64: Public key for ovn22.12-22.12.0-34.el9s.x86_64.rpm is not installed\"","commit_id":"ff6a8d90bc93adf5592c045af3221ad902921f92"},{"author":{"_account_id":32666,"name":"Damian Dąbrowski","email":"damian@dabrowski.cloud","username":"ddabrowski"},"change_message_id":"b2487e8f35bdc7daf70fa16bf9343d58f212f3a7","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":8,"id":"a9920fdd_5059cf18","updated":"2023-04-08 12:24:20.000000000","message":"recheck - openstack-ansible-deploy-aio_lxc-debian-bullseye timeout","commit_id":"898d3fa6fce2cfea6b6435ba11f5a35a7976d7ae"},{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"23d6698f02f30d8e993d7a1ffd275b6285899370","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":17,"id":"ca8aa7fc_9d0715f7","updated":"2023-04-24 14:34:34.000000000","message":"lgtm","commit_id":"4b4487e76e98a57239afa2ae656faabc49cc80cf"},{"author":{"_account_id":32666,"name":"Damian Dąbrowski","email":"damian@dabrowski.cloud","username":"ddabrowski"},"change_message_id":"0ddaa669b776a97dd91dbe4976f079eb06fe7d23","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":18,"id":"b0d5f617_2a61433d","updated":"2023-04-27 15:52:19.000000000","message":"recheck - gates should be fixed now","commit_id":"e9445504f4de572d994d636782cbc6097563e2c4"},{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"a09a424ccbaab2aafaecce0117833ed4cbe62bdc","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":18,"id":"e402b133_54186807","updated":"2023-04-27 15:49:25.000000000","message":"recheck - ovs bug workarounded for jammy","commit_id":"e9445504f4de572d994d636782cbc6097563e2c4"},{"author":{"_account_id":32666,"name":"Damian Dąbrowski","email":"damian@dabrowski.cloud","username":"ddabrowski"},"change_message_id":"22e721a88af2c47593c6fd133dabd8c1518c1083","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":18,"id":"74154d06_24c9b1c5","updated":"2023-04-26 11:16:26.000000000","message":"recheck - ubuntu jammy tempest failed","commit_id":"e9445504f4de572d994d636782cbc6097563e2c4"},{"author":{"_account_id":32666,"name":"Damian Dąbrowski","email":"damian@dabrowski.cloud","username":"ddabrowski"},"change_message_id":"2a90d0a236baa9e7ca2a9f743d6902b38194c484","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":18,"id":"fdf810c7_b87991ee","in_reply_to":"e402b133_54186807","updated":"2023-04-27 15:52:46.000000000","message":"awww sorry, i didn\u0027t notice you were first :D","commit_id":"e9445504f4de572d994d636782cbc6097563e2c4"}],"inventory/group_vars/adjutant_all.yml":[{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"b8b4563ed680dede4cab1c72143fa3f082cc1911","unresolved":true,"context_lines":[{"line_number":23,"context_line":"  haproxy_balance_alg: source"},{"line_number":24,"context_line":"  haproxy_backend_options:"},{"line_number":25,"context_line":"    - \"httpchk GET / HTTP/1.0\\\\r\\\\nUser-agent:\\\\ osa-haproxy-healthcheck\""},{"line_number":26,"context_line":"  haproxy_backend_ssl: \"{{ adjutant_backend_https | default(False) }}\""},{"line_number":27,"context_line":"  haproxy_backend_ca: \"{{ openstack_haproxy_backend_ca | default(True) }}\""},{"line_number":28,"context_line":"  haproxy_service_enabled: \"{{ groups[\u0027adjutant_api\u0027] is defined and groups[\u0027adjutant_api\u0027] | length \u003e 0 }}\""},{"line_number":29,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":5,"id":"7ea87d54_710e0201","line":26,"range":{"start_line":26,"start_character":2,"end_line":26,"end_character":49},"updated":"2023-04-06 08:21:32.000000000","message":"why do we have `haproxy_backend_ssl` but `adjutant_backend_https` (`_ssl` vs `_https`), can we have same prefix if it\u0027s serving same purpose?","commit_id":"0c027051bbdbc10fadd17e454472cd1d1a45e16b"},{"author":{"_account_id":32666,"name":"Damian Dąbrowski","email":"damian@dabrowski.cloud","username":"ddabrowski"},"change_message_id":"1b27615dffb8b842c35b974c1ea8aba68b5bcbef","unresolved":false,"context_lines":[{"line_number":23,"context_line":"  haproxy_balance_alg: source"},{"line_number":24,"context_line":"  haproxy_backend_options:"},{"line_number":25,"context_line":"    - \"httpchk GET / HTTP/1.0\\\\r\\\\nUser-agent:\\\\ osa-haproxy-healthcheck\""},{"line_number":26,"context_line":"  haproxy_backend_ssl: \"{{ adjutant_backend_https | default(False) }}\""},{"line_number":27,"context_line":"  haproxy_backend_ca: \"{{ openstack_haproxy_backend_ca | default(True) }}\""},{"line_number":28,"context_line":"  haproxy_service_enabled: \"{{ groups[\u0027adjutant_api\u0027] is defined and groups[\u0027adjutant_api\u0027] | length \u003e 0 }}\""},{"line_number":29,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":5,"id":"01bc9318_3a0f1caa","line":26,"range":{"start_line":26,"start_character":2,"end_line":26,"end_character":49},"in_reply_to":"7ea87d54_710e0201","updated":"2023-04-06 23:05:37.000000000","message":"fixed","commit_id":"0c027051bbdbc10fadd17e454472cd1d1a45e16b"},{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"b8b4563ed680dede4cab1c72143fa3f082cc1911","unresolved":true,"context_lines":[{"line_number":24,"context_line":"  haproxy_backend_options:"},{"line_number":25,"context_line":"    - \"httpchk GET / HTTP/1.0\\\\r\\\\nUser-agent:\\\\ osa-haproxy-healthcheck\""},{"line_number":26,"context_line":"  haproxy_backend_ssl: \"{{ adjutant_backend_https | default(False) }}\""},{"line_number":27,"context_line":"  haproxy_backend_ca: \"{{ openstack_haproxy_backend_ca | default(True) }}\""},{"line_number":28,"context_line":"  haproxy_service_enabled: \"{{ groups[\u0027adjutant_api\u0027] is defined and groups[\u0027adjutant_api\u0027] | length \u003e 0 }}\""},{"line_number":29,"context_line":""},{"line_number":30,"context_line":"adjutant_haproxy_services:"}],"source_content_type":"text/x-yaml","patch_set":5,"id":"4281d252_054242b1","line":27,"range":{"start_line":27,"start_character":26,"end_line":27,"end_character":54},"updated":"2023-04-06 08:21:32.000000000","message":"why we\u0027re not using adjutant_backend_ca here but a global one? As we\u0027re allowing to have custom intermediate at least, which means that it can be also unique per service? Or you don\u0027t need to have correct intermediate in chain to verify CA?","commit_id":"0c027051bbdbc10fadd17e454472cd1d1a45e16b"},{"author":{"_account_id":32666,"name":"Damian Dąbrowski","email":"damian@dabrowski.cloud","username":"ddabrowski"},"change_message_id":"1b27615dffb8b842c35b974c1ea8aba68b5bcbef","unresolved":false,"context_lines":[{"line_number":24,"context_line":"  haproxy_backend_options:"},{"line_number":25,"context_line":"    - \"httpchk GET / HTTP/1.0\\\\r\\\\nUser-agent:\\\\ osa-haproxy-healthcheck\""},{"line_number":26,"context_line":"  haproxy_backend_ssl: \"{{ adjutant_backend_https | default(False) }}\""},{"line_number":27,"context_line":"  haproxy_backend_ca: \"{{ openstack_haproxy_backend_ca | default(True) }}\""},{"line_number":28,"context_line":"  haproxy_service_enabled: \"{{ groups[\u0027adjutant_api\u0027] is defined and groups[\u0027adjutant_api\u0027] | length \u003e 0 }}\""},{"line_number":29,"context_line":""},{"line_number":30,"context_line":"adjutant_haproxy_services:"}],"source_content_type":"text/x-yaml","patch_set":5,"id":"96c7a3b4_8a6de2f9","line":27,"range":{"start_line":27,"start_character":26,"end_line":27,"end_character":54},"in_reply_to":"4281d252_054242b1","updated":"2023-04-06 23:05:37.000000000","message":"you\u0027re right, in some cases it may be needed to set custom CA for a service.\n\nfixed.","commit_id":"0c027051bbdbc10fadd17e454472cd1d1a45e16b"}],"inventory/group_vars/glance_all.yml":[{"author":{"_account_id":28619,"name":"Dmitriy Rabotyagov","email":"noonedeadpunk@gmail.com","username":"noonedeadpunk"},"change_message_id":"16a462ed7a4c0baff71ddc83e5c0234e83d6ffac","unresolved":true,"context_lines":[{"line_number":33,"context_line":"  haproxy_balance_alg: source"},{"line_number":34,"context_line":"  haproxy_backend_options:"},{"line_number":35,"context_line":"    - \"httpchk GET /healthcheck HTTP/1.0\\\\r\\\\nUser-agent:\\\\ osa-haproxy-healthcheck\""},{"line_number":36,"context_line":"  haproxy_backend_ssl: \"{{ (glance_use_uwsgi | default(True)) | ternary((glance_backend_ssl | default(openstack_service_backend_ssl)), False) }}\""},{"line_number":37,"context_line":"  haproxy_backend_ca: \"{{ glance_haproxy_backend_ca | default(openstack_haproxy_backend_ca) }}\""},{"line_number":38,"context_line":"  haproxy_service_enabled: \"{{ groups[\u0027glance_api\u0027] is defined and groups[\u0027glance_api\u0027] | length \u003e 0 }}\""},{"line_number":39,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":15,"id":"aea508b3_55e24d9b","line":36,"range":{"start_line":36,"start_character":47,"end_line":36,"end_character":60},"updated":"2023-04-19 14:13:35.000000000","message":"this becomes more complex now, since we don\u0027t know if glance is using uwsgi with current context:\nhttps://opendev.org/openstack/openstack-ansible-os_glance/src/branch/master/defaults/main.yml#L277","commit_id":"4006b87604c22aa2812188bab8aa5624fc28213d"},{"author":{"_account_id":32666,"name":"Damian Dąbrowski","email":"damian@dabrowski.cloud","username":"ddabrowski"},"change_message_id":"47978f1b94c8204e18e10db84074541769c59084","unresolved":false,"context_lines":[{"line_number":33,"context_line":"  haproxy_balance_alg: source"},{"line_number":34,"context_line":"  haproxy_backend_options:"},{"line_number":35,"context_line":"    - \"httpchk GET /healthcheck HTTP/1.0\\\\r\\\\nUser-agent:\\\\ osa-haproxy-healthcheck\""},{"line_number":36,"context_line":"  haproxy_backend_ssl: \"{{ (glance_use_uwsgi | default(True)) | ternary((glance_backend_ssl | default(openstack_service_backend_ssl)), False) }}\""},{"line_number":37,"context_line":"  haproxy_backend_ca: \"{{ glance_haproxy_backend_ca | default(openstack_haproxy_backend_ca) }}\""},{"line_number":38,"context_line":"  haproxy_service_enabled: \"{{ groups[\u0027glance_api\u0027] is defined and groups[\u0027glance_api\u0027] | length \u003e 0 }}\""},{"line_number":39,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":15,"id":"260371de_d7d459af","line":36,"range":{"start_line":36,"start_character":47,"end_line":36,"end_character":60},"in_reply_to":"aea508b3_55e24d9b","updated":"2023-04-20 08:16:49.000000000","message":"fixed.","commit_id":"4006b87604c22aa2812188bab8aa5624fc28213d"}]}
