)]}'
{"id":"openstack%2Fopenstack-helm~664964","triplet_id":"openstack%2Fopenstack-helm~master~I2dad0a50b23f2d202d6cd89b96d308321001fbe9","project":"openstack/openstack-helm","branch":"master","topic":"barbican","hashtags":[],"change_id":"I2dad0a50b23f2d202d6cd89b96d308321001fbe9","subject":"Barbican: Add security context to chart and read-only-fs","status":"MERGED","created":"2019-06-12 15:50:26.000000000","updated":"2019-06-14 22:49:41.000000000","submitted":"2019-06-14 22:49:41.000000000","submitter":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"total_comment_count":0,"unresolved_comment_count":0,"has_review_started":true,"submission_id":"664964-1560552581390-9caa71b0","meta_rev_id":"5f2320dfaaf564609b4bdc106ef4fb4d64e44fa4","_number":664964,"virtual_id_number":664964,"owner":{"_account_id":29161,"name":"Rahul Khiyani","email":"rahul.khiyani@att.com","username":"rk0850"},"actions":{},"labels":{"Verified":{"approved":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"all":[{"value":2,"date":"2019-06-14 22:49:41.000000000","post_submit":true,"permitted_voting_range":{"min":2,"max":2},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},{"value":0,"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"}],"values":{"-2":"Fails","-1":"Doesn\u0027t seem to work"," 0":"No score","+1":"Works for me","+2":"Verified"},"description":"","default_value":0,"optional":true},"Code-Review":{"approved":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"all":[{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":2,"date":"2019-06-14 22:06:21.000000000","permitted_voting_range":{"min":2,"max":2},"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},{"value":2,"date":"2019-06-14 17:49:18.000000000","permitted_voting_range":{"min":2,"max":2},"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"}],"values":{"-2":"Do not merge","-1":"This patch needs further work before it can be merged"," 0":"No score","+1":"Looks good to me, but someone else must approve","+2":"Looks good to me (core reviewer)"},"description":"","default_value":0,"optional":true},"Workflow":{"approved":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"all":[{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":1,"date":"2019-06-14 22:06:21.000000000","permitted_voting_range":{"min":1,"max":1},"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},{"value":0,"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"}],"values":{"-1":"Work in progress"," 0":"Ready for reviews","+1":"Approved"},"description":"","default_value":0,"optional":true}},"removable_reviewers":[],"reviewers":{"REVIEWER":[{"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"},{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"}]},"pending_reviewers":{},"reviewer_updates":[{"updated":"2019-06-14 17:49:18.000000000","updated_by":{"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"},"reviewer":{"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"},"state":"REVIEWER"},{"updated":"2019-06-14 22:06:21.000000000","updated_by":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"reviewer":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"state":"REVIEWER"},{"updated":"2019-06-14 22:49:41.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"REVIEWER"}],"messages":[{"id":"2c8983f5d45f81da904e22bf0353afc2fe4d91b7","author":{"_account_id":29161,"name":"Rahul Khiyani","email":"rahul.khiyani@att.com","username":"rk0850"},"date":"2019-06-12 15:50:26.000000000","message":"Uploaded patch set 1.","accounts_in_message":[],"_revision_number":1},{"id":"726814c2a07633ed02d1609514312389fda4b058","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-06-12 16:38:32.000000000","message":"Patch Set 1: Verified+1\n\nBuild succeeded (check pipeline).\n\n- openstack-tox-docs http://logs.openstack.org/64/664964/1/check/openstack-tox-docs/411cdd8/html/ : SUCCESS in 7m 00s\n- openstack-helm-lint http://logs.openstack.org/64/664964/1/check/openstack-helm-lint/465f4d4/ : SUCCESS in 1m 48s\n- openstack-helm-keystone http://logs.openstack.org/64/664964/1/check/openstack-helm-keystone/1ec065b/ : SUCCESS in 18m 25s\n- openstack-helm-keystone-rocky-opensuse_15 http://logs.openstack.org/64/664964/1/check/openstack-helm-keystone-rocky-opensuse_15/47a9849/ : SUCCESS in 19m 58s (non-voting)\n- openstack-helm-keystone-ldap http://logs.openstack.org/64/664964/1/check/openstack-helm-keystone-ldap/39f7fd5/ : SUCCESS in 20m 17s\n- openstack-helm-glance http://logs.openstack.org/64/664964/1/check/openstack-helm-glance/725dcbc/ : SUCCESS in 22m 30s\n- openstack-helm-glance-rocky-opensuse_15 http://logs.openstack.org/64/664964/1/check/openstack-helm-glance-rocky-opensuse_15/bdc4104/ : SUCCESS in 23m 14s (non-voting)\n- openstack-helm-heat http://logs.openstack.org/64/664964/1/check/openstack-helm-heat/90977ac/ : SUCCESS in 21m 01s\n- openstack-helm-heat-rocky-opensuse_15 http://logs.openstack.org/64/664964/1/check/openstack-helm-heat-rocky-opensuse_15/7d3b11c/ : SUCCESS in 24m 54s (non-voting)\n- openstack-helm-cinder http://logs.openstack.org/64/664964/1/check/openstack-helm-cinder/d88c5df/ : SUCCESS in 35m 40s\n- openstack-helm-cinder-rocky-opensuse_15 http://logs.openstack.org/64/664964/1/check/openstack-helm-cinder-rocky-opensuse_15/a6fc195/ : SUCCESS in 35m 50s (non-voting)\n- openstack-helm-compute-kit http://logs.openstack.org/64/664964/1/check/openstack-helm-compute-kit/fd8d60a/ : SUCCESS in 35m 56s\n- openstack-helm-compute-kit-rocky-opensuse_15 http://logs.openstack.org/64/664964/1/check/openstack-helm-compute-kit-rocky-opensuse_15/80d5950/ : FAILURE in 31m 40s (non-voting)\n- openstack-helm-horizon http://logs.openstack.org/64/664964/1/check/openstack-helm-horizon/a085eec/ : SUCCESS in 22m 31s\n- openstack-helm-apparmor http://logs.openstack.org/64/664964/1/check/openstack-helm-apparmor/efbf874/ : SUCCESS in 40m 43s (non-voting)","accounts_in_message":[],"_revision_number":1},{"id":"966a9f4e1a8f5277e1f180acef72f8b48c721f45","author":{"_account_id":8898,"name":"Chris Wedgwood","email":"cw@f00f.org","username":"anticw"},"date":"2019-06-14 17:49:18.000000000","message":"Patch Set 1: Code-Review+2","accounts_in_message":[],"_revision_number":1},{"id":"f87b115a4fbb75725580ee9f43c7b8622fc1f092","author":{"_account_id":22477,"name":"Matt McEuen","email":"matt.mceuen@att.com","username":"mattmceuen"},"date":"2019-06-14 22:06:21.000000000","message":"Patch Set 1: Code-Review+2 Workflow+1","accounts_in_message":[],"_revision_number":1},{"id":"21c79058490d07f44b1611a22e60959b0038ae12","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-06-14 22:06:33.000000000","message":"Patch Set 1: -Verified\n\nStarting gate jobs.","accounts_in_message":[],"_revision_number":1},{"id":"258900620d47269c5115a3a55d81401df1b1af9c","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-06-14 22:49:41.000000000","message":"Change has been successfully merged by Zuul","accounts_in_message":[],"_revision_number":1},{"id":"dc887550476aedbe206a119675134b8a22419b87","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-06-14 22:49:41.000000000","message":"Patch Set 1: Verified+2\n\nBuild succeeded (gate pipeline).\n\n- openstack-tox-docs http://logs.openstack.org/64/664964/1/gate/openstack-tox-docs/15d3dda/html/ : SUCCESS in 7m 13s\n- openstack-helm-lint http://logs.openstack.org/64/664964/1/gate/openstack-helm-lint/a955630/ : SUCCESS in 1m 30s\n- openstack-helm-keystone http://logs.openstack.org/64/664964/1/gate/openstack-helm-keystone/ad28681/ : SUCCESS in 19m 08s\n- openstack-helm-keystone-ldap http://logs.openstack.org/64/664964/1/gate/openstack-helm-keystone-ldap/c8d02fe/ : SUCCESS in 20m 14s\n- openstack-helm-glance http://logs.openstack.org/64/664964/1/gate/openstack-helm-glance/00b161e/ : SUCCESS in 24m 02s\n- openstack-helm-heat http://logs.openstack.org/64/664964/1/gate/openstack-helm-heat/7405f48/ : SUCCESS in 21m 26s\n- openstack-helm-cinder http://logs.openstack.org/64/664964/1/gate/openstack-helm-cinder/7df3216/ : SUCCESS in 32m 08s\n- openstack-helm-compute-kit http://logs.openstack.org/64/664964/1/gate/openstack-helm-compute-kit/42081de/ : SUCCESS in 35m 41s","accounts_in_message":[],"_revision_number":1}],"current_revision_number":1,"current_revision":"5ad45700f4a3287d7f55a6f5d75777b3ae744030","revisions":{"5ad45700f4a3287d7f55a6f5d75777b3ae744030":{"kind":"REWORK","_number":1,"created":"2019-06-12 15:50:26.000000000","uploader":{"_account_id":29161,"name":"Rahul Khiyani","email":"rahul.khiyani@att.com","username":"rk0850"},"ref":"refs/changes/64/664964/1","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/openstack-helm","ref":"refs/changes/64/664964/1","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/openstack-helm refs/changes/64/664964/1 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/openstack-helm refs/changes/64/664964/1 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/openstack-helm refs/changes/64/664964/1 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/openstack-helm refs/changes/64/664964/1"}}},"commit":{"parents":[{"commit":"d0b135cd7721239c2a75a357d078ffd54c8bdae8","subject":"AMPQ: update ha policy regex","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm/commit/d0b135cd7721239c2a75a357d078ffd54c8bdae8"}]}],"author":{"name":"RAHUL KHIYANI","email":"rk0850@att.com","date":"2019-06-12 15:38:01.000000000","tz":-300},"committer":{"name":"RAHUL KHIYANI","email":"rk0850@att.com","date":"2019-06-12 15:38:01.000000000","tz":-300},"subject":"Barbican: Add security context to chart and read-only-fs","message":"Barbican: Add security context to chart and read-only-fs\n\nThis PS adds the security context macros to the barbican chart,\nand sets the default to read-only-rootfs\n\nChange-Id: I2dad0a50b23f2d202d6cd89b96d308321001fbe9\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm/commit/5ad45700f4a3287d7f55a6f5d75777b3ae744030"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/openstack-helm/commit/5ad45700f4a3287d7f55a6f5d75777b3ae744030"}]},"branch":"refs/heads/master"}},"requirements":[],"submit_records":[],"submit_requirements":[]}
