)]}'
{"id":"openstack%2Fopenstack-helm-infra~649198","triplet_id":"openstack%2Fopenstack-helm-infra~master~Ia80aa9cfc837073fae0a884de5245764147d7ded","project":"openstack/openstack-helm-infra","branch":"master","topic":"elasticsearch","hashtags":[],"change_id":"Ia80aa9cfc837073fae0a884de5245764147d7ded","subject":"elasticsearch-exporter: Add security context for exporter pod/container","status":"MERGED","created":"2019-04-01 21:56:28.000000000","updated":"2019-04-15 23:05:47.000000000","submitted":"2019-04-15 23:05:47.000000000","submitter":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"total_comment_count":0,"unresolved_comment_count":0,"has_review_started":true,"submission_id":"649198-1555369547350-d465587a","meta_rev_id":"3801c892e482b8da18f49f043030a196f41c4c11","_number":649198,"virtual_id_number":649198,"owner":{"_account_id":29161,"name":"Rahul Khiyani","email":"rahul.khiyani@att.com","username":"rk0850"},"actions":{},"labels":{"Verified":{"approved":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"all":[{"value":0,"_account_id":24780,"name":"Sangeet Gupta","email":"sg774j@att.com","username":"sgupta"},{"value":2,"date":"2019-04-15 23:05:47.000000000","permitted_voting_range":{"min":2,"max":2},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},{"value":0,"_account_id":23928,"name":"Pete Birley","email":"petebirley@gmail.com","username":"portdirect"},{"value":0,"_account_id":17591,"name":"Steve Wilkerson","email":"wilkers.steve@gmail.com","username":"srwilkers"},{"value":0,"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"}],"values":{"-2":"Fails","-1":"Doesn\u0027t seem to work"," 0":"No score","+1":"Works for me","+2":"Verified"},"description":"","default_value":0,"optional":true},"Code-Review":{"approved":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"all":[{"value":0,"_account_id":24780,"name":"Sangeet Gupta","email":"sg774j@att.com","username":"sgupta"},{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":2,"date":"2019-04-15 22:16:33.000000000","_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},{"value":0,"_account_id":23928,"name":"Pete Birley","email":"petebirley@gmail.com","username":"portdirect"},{"value":0,"_account_id":17591,"name":"Steve Wilkerson","email":"wilkers.steve@gmail.com","username":"srwilkers"},{"value":2,"date":"2019-04-02 16:15:45.000000000","_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"}],"values":{"-2":"Do not merge","-1":"This patch needs further work before it can be merged"," 0":"No score","+1":"Looks good to me, but someone else must approve","+2":"Looks good to me (core reviewer)"},"description":"","default_value":0,"optional":true},"Workflow":{"approved":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"all":[{"value":0,"date":"2019-04-02 20:41:17.000000000","_account_id":24780,"name":"Sangeet Gupta","email":"sg774j@att.com","username":"sgupta"},{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":1,"date":"2019-04-15 22:16:33.000000000","_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},{"value":0,"date":"2019-04-02 20:41:10.000000000","_account_id":23928,"name":"Pete Birley","email":"petebirley@gmail.com","username":"portdirect"},{"value":0,"date":"2019-04-02 20:41:01.000000000","_account_id":17591,"name":"Steve Wilkerson","email":"wilkers.steve@gmail.com","username":"srwilkers"},{"value":0,"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"}],"values":{"-1":"Work in progress"," 0":"Ready for reviews","+1":"Approved"},"description":"","default_value":0,"optional":true}},"removable_reviewers":[],"reviewers":{"REVIEWER":[{"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"},{"_account_id":17591,"name":"Steve Wilkerson","email":"wilkers.steve@gmail.com","username":"srwilkers"},{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},{"_account_id":23928,"name":"Pete Birley","email":"petebirley@gmail.com","username":"portdirect"},{"_account_id":24780,"name":"Sangeet Gupta","email":"sg774j@att.com","username":"sgupta"}]},"pending_reviewers":{},"reviewer_updates":[{"updated":"2019-04-02 16:15:45.000000000","updated_by":{"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"},"reviewer":{"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"},"state":"REVIEWER"},{"updated":"2019-04-02 20:41:01.000000000","updated_by":{"_account_id":17591,"name":"Steve Wilkerson","email":"wilkers.steve@gmail.com","username":"srwilkers"},"reviewer":{"_account_id":17591,"name":"Steve Wilkerson","email":"wilkers.steve@gmail.com","username":"srwilkers"},"state":"REVIEWER"},{"updated":"2019-04-02 20:41:10.000000000","updated_by":{"_account_id":23928,"name":"Pete Birley","email":"petebirley@gmail.com","username":"portdirect"},"reviewer":{"_account_id":23928,"name":"Pete Birley","email":"petebirley@gmail.com","username":"portdirect"},"state":"REVIEWER"},{"updated":"2019-04-02 20:41:17.000000000","updated_by":{"_account_id":24780,"name":"Sangeet Gupta","email":"sg774j@att.com","username":"sgupta"},"reviewer":{"_account_id":24780,"name":"Sangeet Gupta","email":"sg774j@att.com","username":"sgupta"},"state":"REVIEWER"},{"updated":"2019-04-15 22:16:33.000000000","updated_by":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"reviewer":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"state":"REVIEWER"},{"updated":"2019-04-15 23:05:47.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"REVIEWER"}],"messages":[{"id":"0acd19666cd6b7943177cc97b21ab5b462f59d58","author":{"_account_id":29161,"name":"Rahul Khiyani","email":"rahul.khiyani@att.com","username":"rk0850"},"date":"2019-04-01 21:56:28.000000000","message":"Uploaded patch set 1.","accounts_in_message":[],"_revision_number":1},{"id":"1e9da6740de3fefc2385f0231204a91a75afa34e","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-04-01 22:46:46.000000000","message":"Patch Set 1: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttp://docs.openstack.org/infra/manual/developers.html#automated-testing\n\n\n- openstack-tox-docs http://logs.openstack.org/98/649198/1/check/openstack-tox-docs/04cf48b/html/ : SUCCESS in 4m 34s\n- openstack-helm-lint http://logs.openstack.org/98/649198/1/check/openstack-helm-lint/c1cf842/ : SUCCESS in 2m 46s\n- openstack-helm-infra-aio-logging http://logs.openstack.org/98/649198/1/check/openstack-helm-infra-aio-logging/62c3474/ : SUCCESS in 45m 38s\n- openstack-helm-infra-aio-monitoring http://logs.openstack.org/98/649198/1/check/openstack-helm-infra-aio-monitoring/a351b94/ : SUCCESS in 33m 53s\n- openstack-helm-infra-aio-network-policy http://logs.openstack.org/98/649198/1/check/openstack-helm-infra-aio-network-policy/7474dbe/ : SUCCESS in 36m 36s (non-voting)\n- openstack-helm-infra-openstack-support http://logs.openstack.org/98/649198/1/check/openstack-helm-infra-openstack-support/ccb44b7/ : FAILURE in 48m 40s\n- openstack-helm-infra-kubernetes-keystone-auth http://logs.openstack.org/98/649198/1/check/openstack-helm-infra-kubernetes-keystone-auth/a9f4bcf/ : FAILURE in 43m 31s\n- openstack-helm-infra-airship-divingbell http://logs.openstack.org/98/649198/1/check/openstack-helm-infra-airship-divingbell/8203071/ : SUCCESS in 21m 19s (non-voting)\n- openstack-helm-infra-aio-podsecuritypolicy http://logs.openstack.org/98/649198/1/check/openstack-helm-infra-aio-podsecuritypolicy/672a3ad/ : SUCCESS in 17m 33s (non-voting)\n- openstack-helm-infra-apparmor http://logs.openstack.org/98/649198/1/check/openstack-helm-infra-apparmor/039c0e7/ : FAILURE in 30m 31s (non-voting)","accounts_in_message":[],"_revision_number":1},{"id":"432ef8ad46c2dd4539e8a938d47f994812ac74f9","author":{"_account_id":29161,"name":"Rahul Khiyani","email":"rahul.khiyani@att.com","username":"rk0850"},"date":"2019-04-01 22:56:56.000000000","message":"Patch Set 2: Patch Set 1 was rebased","accounts_in_message":[],"_revision_number":2},{"id":"5bad08d61e423cbab625c42b13cd78e941057bae","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-04-01 23:50:52.000000000","message":"Patch Set 2: Verified+1\n\nBuild succeeded (check pipeline).\n\n- openstack-tox-docs http://logs.openstack.org/98/649198/2/check/openstack-tox-docs/fc5a2c7/html/ : SUCCESS in 4m 32s\n- openstack-helm-lint http://logs.openstack.org/98/649198/2/check/openstack-helm-lint/bb27267/ : SUCCESS in 2m 12s\n- openstack-helm-infra-aio-logging http://logs.openstack.org/98/649198/2/check/openstack-helm-infra-aio-logging/e032d6c/ : SUCCESS in 41m 33s\n- openstack-helm-infra-aio-monitoring http://logs.openstack.org/98/649198/2/check/openstack-helm-infra-aio-monitoring/669cb32/ : SUCCESS in 31m 23s\n- openstack-helm-infra-aio-network-policy http://logs.openstack.org/98/649198/2/check/openstack-helm-infra-aio-network-policy/7eac4ba/ : SUCCESS in 35m 03s (non-voting)\n- openstack-helm-infra-openstack-support http://logs.openstack.org/98/649198/2/check/openstack-helm-infra-openstack-support/2b1afca/ : SUCCESS in 39m 26s\n- openstack-helm-infra-kubernetes-keystone-auth http://logs.openstack.org/98/649198/2/check/openstack-helm-infra-kubernetes-keystone-auth/174dcae/ : SUCCESS in 36m 45s\n- openstack-helm-infra-airship-divingbell http://logs.openstack.org/98/649198/2/check/openstack-helm-infra-airship-divingbell/2e891c8/ : SUCCESS in 21m 04s (non-voting)\n- openstack-helm-infra-aio-podsecuritypolicy http://logs.openstack.org/98/649198/2/check/openstack-helm-infra-aio-podsecuritypolicy/e9e9d85/ : SUCCESS in 17m 03s (non-voting)\n- openstack-helm-infra-apparmor http://logs.openstack.org/98/649198/2/check/openstack-helm-infra-apparmor/6b1c6a3/ : FAILURE in 29m 33s (non-voting)","accounts_in_message":[],"_revision_number":2},{"id":"85c1a92d6f7e12bedf5c67acc3f44e87446b67b5","author":{"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"},"date":"2019-04-02 16:15:45.000000000","message":"Patch Set 2: Code-Review+2","accounts_in_message":[],"_revision_number":2},{"id":"92632a2eccf4419fff509fa9eda8c325edac5116","author":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"date":"2019-04-15 22:16:33.000000000","message":"Patch Set 2: Code-Review+2 Workflow+1","accounts_in_message":[],"_revision_number":2},{"id":"98188ab65229e649beb7fd008fb5e3751fc37eec","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-04-15 22:16:44.000000000","message":"Patch Set 2: -Verified\n\nStarting gate jobs.","accounts_in_message":[],"_revision_number":2},{"id":"709e1362130b9aaf23440dd66de50654dfd48a2d","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-04-15 23:05:47.000000000","message":"Patch Set 2: Verified+2\n\nBuild succeeded (gate pipeline).\n\n- openstack-tox-docs http://logs.openstack.org/98/649198/2/gate/openstack-tox-docs/5a3bf98/html/ : SUCCESS in 4m 16s\n- openstack-helm-lint http://logs.openstack.org/98/649198/2/gate/openstack-helm-lint/b765c91/ : SUCCESS in 1m 48s\n- openstack-helm-infra-aio-logging http://logs.openstack.org/98/649198/2/gate/openstack-helm-infra-aio-logging/2dd217e/ : SUCCESS in 37m 49s\n- openstack-helm-infra-aio-monitoring http://logs.openstack.org/98/649198/2/gate/openstack-helm-infra-aio-monitoring/a0d1254/ : SUCCESS in 33m 25s\n- openstack-helm-infra-openstack-support http://logs.openstack.org/98/649198/2/gate/openstack-helm-infra-openstack-support/f00d19b/ : SUCCESS in 40m 17s\n- openstack-helm-infra-kubernetes-keystone-auth http://logs.openstack.org/98/649198/2/gate/openstack-helm-infra-kubernetes-keystone-auth/bcd2756/ : SUCCESS in 46m 34s","accounts_in_message":[],"_revision_number":2},{"id":"06139367212e757cae89f56bb358da92319912f2","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-04-15 23:05:47.000000000","message":"Change has been successfully merged by Zuul","accounts_in_message":[],"_revision_number":2}],"current_revision_number":2,"current_revision":"f6678044300eb4d75fe16baff2b4bee2c6995fb6","revisions":{"9dba853cabf852c9e3ed404839db478978b2fe4c":{"kind":"REWORK","_number":1,"created":"2019-04-01 21:56:28.000000000","uploader":{"_account_id":29161,"name":"Rahul Khiyani","email":"rahul.khiyani@att.com","username":"rk0850"},"ref":"refs/changes/98/649198/1","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/openstack-helm-infra","ref":"refs/changes/98/649198/1","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/openstack-helm-infra refs/changes/98/649198/1 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/openstack-helm-infra refs/changes/98/649198/1 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/openstack-helm-infra refs/changes/98/649198/1 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/openstack-helm-infra refs/changes/98/649198/1"}}},"commit":{"parents":[{"commit":"3075f12ad74ee74333794cadcc25776de93a0015","subject":"rabbitmq securityContext","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm-infra/commit/3075f12ad74ee74333794cadcc25776de93a0015"}]}],"author":{"name":"RAHUL KHIYANI","email":"rk0850@att.com","date":"2019-04-01 21:51:34.000000000","tz":-300},"committer":{"name":"RAHUL KHIYANI","email":"rk0850@att.com","date":"2019-04-01 21:51:34.000000000","tz":-300},"subject":"elasticsearch-exporter: Add security context for exporter pod/container","message":"elasticsearch-exporter: Add security context for exporter pod/container\n\nThis adds the security context snippet for the elasticsearch\nprometheus exporter container to set allowPrivilegeEscalation to false\nand readOnlyRootFilesystem to true\n\nChange-Id: Ia80aa9cfc837073fae0a884de5245764147d7ded\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm-infra/commit/9dba853cabf852c9e3ed404839db478978b2fe4c"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm-infra/commit/9dba853cabf852c9e3ed404839db478978b2fe4c"}]},"parents_data":[{"branch_name":"refs/heads/master","commit_id":"3075f12ad74ee74333794cadcc25776de93a0015","is_merged_in_target_branch":false,"change_id":"I91499757bd7af95132d0aee33a16d642e26439bb","change_number":642918,"patch_set_number":13,"change_status":"MERGED"}],"branch":"refs/heads/master"},"f6678044300eb4d75fe16baff2b4bee2c6995fb6":{"kind":"TRIVIAL_REBASE","_number":2,"created":"2019-04-01 22:56:56.000000000","uploader":{"_account_id":29161,"name":"Rahul Khiyani","email":"rahul.khiyani@att.com","username":"rk0850"},"ref":"refs/changes/98/649198/2","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/openstack-helm-infra","ref":"refs/changes/98/649198/2","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/openstack-helm-infra refs/changes/98/649198/2 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/openstack-helm-infra refs/changes/98/649198/2 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/openstack-helm-infra refs/changes/98/649198/2 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/openstack-helm-infra refs/changes/98/649198/2"}}},"commit":{"parents":[{"commit":"73dadd8899b83dca0743e38556cc5cdc866d96a9","subject":"Merge \"Elasticsearch: Add job to wait for Elasticsearch cluster formation\"","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm-infra/commit/73dadd8899b83dca0743e38556cc5cdc866d96a9"}]}],"author":{"name":"RAHUL KHIYANI","email":"rk0850@att.com","date":"2019-04-01 21:51:34.000000000","tz":-300},"committer":{"name":"Rahul Khiyani","email":"rk0850@att.com","date":"2019-04-01 22:56:56.000000000","tz":0},"subject":"elasticsearch-exporter: Add security context for exporter pod/container","message":"elasticsearch-exporter: Add security context for exporter pod/container\n\nThis adds the security context snippet for the elasticsearch\nprometheus exporter container to set allowPrivilegeEscalation to false\nand readOnlyRootFilesystem to true\n\nChange-Id: Ia80aa9cfc837073fae0a884de5245764147d7ded\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm-infra/commit/f6678044300eb4d75fe16baff2b4bee2c6995fb6"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm-infra/commit/f6678044300eb4d75fe16baff2b4bee2c6995fb6"}]},"parents_data":[{"branch_name":"refs/heads/master","commit_id":"73dadd8899b83dca0743e38556cc5cdc866d96a9","is_merged_in_target_branch":true}],"branch":"refs/heads/master"}},"requirements":[],"submit_records":[],"submit_requirements":[]}
