)]}'
{"id":"openstack%2Fpatrole~682467","triplet_id":"openstack%2Fpatrole~master~Ia5661e12977b26e1c16f09a074d1a805263c6c22","project":"openstack/patrole","branch":"master","topic":"debugging_trust_test","hashtags":[],"change_id":"Ia5661e12977b26e1c16f09a074d1a805263c6c22","subject":"fix: admin, member, and reader gates broken","status":"MERGED","created":"2019-09-16 19:20:41.000000000","updated":"2019-09-19 04:15:02.000000000","submitted":"2019-09-19 04:13:47.000000000","submitter":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"total_comment_count":0,"unresolved_comment_count":0,"has_review_started":true,"submission_id":"682467-1568866427376-4f1731f4","meta_rev_id":"28223b16e9035a68013347c64ee6c7d0c9a2e77c","_number":682467,"virtual_id_number":682467,"owner":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"actions":{},"labels":{"Verified":{"approved":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"all":[{"value":0,"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},{"value":0,"_account_id":5196,"name":"Matthew Treinish","email":"mtreinish@kortar.org","username":"treinish"},{"value":2,"date":"2019-09-19 04:13:47.000000000","permitted_voting_range":{"min":2,"max":2},"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"_account_id":8911,"name":"Sergey Vilgelm","email":"sergey@vilgelm.info","username":"sergey.vilgelm"},{"value":0,"_account_id":5803,"name":"Attila Fazekas","email":"afazekas@redhat.com","username":"afazekas"},{"value":0,"_account_id":1921,"name":"Andrea Frittoli","email":"andrea.frittoli@gmail.com","username":"andrea-frittoli"},{"value":0,"_account_id":20190,"name":"zhufl","email":"zhu.fanglei@zte.com.cn","username":"zhufl"},{"value":0,"_account_id":17887,"name":"Doug Schveninger","email":"ds6901@att.com","username":"Doug.Schveninger"},{"value":0,"_account_id":5689,"name":"Masayuki Igawa","email":"masayuki@igawa.io","username":"igawa"},{"value":0,"_account_id":7350,"name":"Jordan Pittier","email":"jordan.pittier@gmail.com","username":"JordanP"},{"value":0,"_account_id":6167,"name":"Ken\u0027ichi Ohmichi","email":"ken1ohmichi@gmail.com","username":"oomichi"},{"value":0,"_account_id":23185,"name":"Samantha Blanco","email":"samantha.blanco@att.com","username":"sblanco"},{"value":0,"_account_id":23186,"name":"Felipe Monteiro","email":"felipe.carneiro.monteiro@gmail.com","username":"felipe.monteiro"},{"value":0,"_account_id":16274,"name":"Mykola Yakovliev","email":"VegasQ@gmail.com","username":"vegasq"}],"values":{"-2":"Fails","-1":"Doesn\u0027t seem to work"," 0":"No score","+1":"Works for me","+2":"Verified"},"description":"","default_value":0,"optional":true},"Code-Review":{"approved":{"_account_id":5689,"name":"Masayuki Igawa","email":"masayuki@igawa.io","username":"igawa"},"recommended":{"_account_id":17887,"name":"Doug Schveninger","email":"ds6901@att.com","username":"Doug.Schveninger"},"all":[{"value":0,"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},{"value":0,"_account_id":5196,"name":"Matthew Treinish","email":"mtreinish@kortar.org","username":"treinish"},{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"_account_id":8911,"name":"Sergey Vilgelm","email":"sergey@vilgelm.info","username":"sergey.vilgelm"},{"value":0,"_account_id":5803,"name":"Attila Fazekas","email":"afazekas@redhat.com","username":"afazekas"},{"value":0,"_account_id":1921,"name":"Andrea Frittoli","email":"andrea.frittoli@gmail.com","username":"andrea-frittoli"},{"value":0,"_account_id":20190,"name":"zhufl","email":"zhu.fanglei@zte.com.cn","username":"zhufl"},{"value":1,"date":"2019-09-19 00:24:54.000000000","permitted_voting_range":{"min":1,"max":1},"_account_id":17887,"name":"Doug Schveninger","email":"ds6901@att.com","username":"Doug.Schveninger"},{"value":2,"date":"2019-09-19 00:15:38.000000000","_account_id":5689,"name":"Masayuki Igawa","email":"masayuki@igawa.io","username":"igawa"},{"value":0,"_account_id":7350,"name":"Jordan Pittier","email":"jordan.pittier@gmail.com","username":"JordanP"},{"value":0,"_account_id":6167,"name":"Ken\u0027ichi Ohmichi","email":"ken1ohmichi@gmail.com","username":"oomichi"},{"value":0,"_account_id":23185,"name":"Samantha Blanco","email":"samantha.blanco@att.com","username":"sblanco"},{"value":2,"date":"2019-09-19 02:51:18.000000000","_account_id":23186,"name":"Felipe Monteiro","email":"felipe.carneiro.monteiro@gmail.com","username":"felipe.monteiro"},{"value":0,"_account_id":16274,"name":"Mykola Yakovliev","email":"VegasQ@gmail.com","username":"vegasq"}],"values":{"-2":"Do not merge","-1":"This patch needs further work before it can be merged"," 0":"No score","+1":"Looks good to me, but someone else must approve","+2":"Looks good to me (core reviewer)"},"description":"","value":1,"default_value":0,"optional":true},"Workflow":{"approved":{"_account_id":23186,"name":"Felipe Monteiro","email":"felipe.carneiro.monteiro@gmail.com","username":"felipe.monteiro"},"all":[{"value":0,"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},{"value":0,"_account_id":5196,"name":"Matthew Treinish","email":"mtreinish@kortar.org","username":"treinish"},{"value":0,"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"value":0,"_account_id":8911,"name":"Sergey Vilgelm","email":"sergey@vilgelm.info","username":"sergey.vilgelm"},{"value":0,"_account_id":5803,"name":"Attila Fazekas","email":"afazekas@redhat.com","username":"afazekas"},{"value":0,"_account_id":1921,"name":"Andrea Frittoli","email":"andrea.frittoli@gmail.com","username":"andrea-frittoli"},{"value":0,"_account_id":20190,"name":"zhufl","email":"zhu.fanglei@zte.com.cn","username":"zhufl"},{"value":0,"_account_id":17887,"name":"Doug Schveninger","email":"ds6901@att.com","username":"Doug.Schveninger"},{"value":0,"_account_id":5689,"name":"Masayuki Igawa","email":"masayuki@igawa.io","username":"igawa"},{"value":0,"_account_id":7350,"name":"Jordan Pittier","email":"jordan.pittier@gmail.com","username":"JordanP"},{"value":0,"_account_id":6167,"name":"Ken\u0027ichi Ohmichi","email":"ken1ohmichi@gmail.com","username":"oomichi"},{"value":0,"_account_id":23185,"name":"Samantha Blanco","email":"samantha.blanco@att.com","username":"sblanco"},{"value":1,"date":"2019-09-19 02:51:18.000000000","_account_id":23186,"name":"Felipe Monteiro","email":"felipe.carneiro.monteiro@gmail.com","username":"felipe.monteiro"},{"value":0,"_account_id":16274,"name":"Mykola Yakovliev","email":"VegasQ@gmail.com","username":"vegasq"}],"values":{"-1":"Work in progress"," 0":"Ready for reviews","+1":"Approved"},"description":"","default_value":0,"optional":true}},"removable_reviewers":[],"reviewers":{"REVIEWER":[{"_account_id":1921,"name":"Andrea Frittoli","email":"andrea.frittoli@gmail.com","username":"andrea-frittoli"},{"_account_id":5196,"name":"Matthew Treinish","email":"mtreinish@kortar.org","username":"treinish"},{"_account_id":5689,"name":"Masayuki Igawa","email":"masayuki@igawa.io","username":"igawa"},{"_account_id":5803,"name":"Attila Fazekas","email":"afazekas@redhat.com","username":"afazekas"},{"_account_id":6167,"name":"Ken\u0027ichi Ohmichi","email":"ken1ohmichi@gmail.com","username":"oomichi"},{"_account_id":7350,"name":"Jordan Pittier","email":"jordan.pittier@gmail.com","username":"JordanP"},{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},{"_account_id":8911,"name":"Sergey Vilgelm","email":"sergey@vilgelm.info","username":"sergey.vilgelm"},{"_account_id":16274,"name":"Mykola Yakovliev","email":"VegasQ@gmail.com","username":"vegasq"},{"_account_id":17887,"name":"Doug Schveninger","email":"ds6901@att.com","username":"Doug.Schveninger"},{"_account_id":20190,"name":"zhufl","email":"zhu.fanglei@zte.com.cn","username":"zhufl"},{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},{"_account_id":23185,"name":"Samantha Blanco","email":"samantha.blanco@att.com","username":"sblanco"},{"_account_id":23186,"name":"Felipe Monteiro","email":"felipe.carneiro.monteiro@gmail.com","username":"felipe.monteiro"}]},"pending_reviewers":{},"reviewer_updates":[{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":1921,"name":"Andrea Frittoli","email":"andrea.frittoli@gmail.com","username":"andrea-frittoli"},"reviewer":{"_account_id":1921,"name":"Andrea Frittoli","email":"andrea.frittoli@gmail.com","username":"andrea-frittoli"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":5196,"name":"Matthew Treinish","email":"mtreinish@kortar.org","username":"treinish"},"reviewer":{"_account_id":5196,"name":"Matthew Treinish","email":"mtreinish@kortar.org","username":"treinish"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":5803,"name":"Attila Fazekas","email":"afazekas@redhat.com","username":"afazekas"},"reviewer":{"_account_id":5803,"name":"Attila Fazekas","email":"afazekas@redhat.com","username":"afazekas"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":6167,"name":"Ken\u0027ichi Ohmichi","email":"ken1ohmichi@gmail.com","username":"oomichi"},"reviewer":{"_account_id":6167,"name":"Ken\u0027ichi Ohmichi","email":"ken1ohmichi@gmail.com","username":"oomichi"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":7350,"name":"Jordan Pittier","email":"jordan.pittier@gmail.com","username":"JordanP"},"reviewer":{"_account_id":7350,"name":"Jordan Pittier","email":"jordan.pittier@gmail.com","username":"JordanP"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"reviewer":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":8911,"name":"Sergey Vilgelm","email":"sergey@vilgelm.info","username":"sergey.vilgelm"},"reviewer":{"_account_id":8911,"name":"Sergey Vilgelm","email":"sergey@vilgelm.info","username":"sergey.vilgelm"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":16274,"name":"Mykola Yakovliev","email":"VegasQ@gmail.com","username":"vegasq"},"reviewer":{"_account_id":16274,"name":"Mykola Yakovliev","email":"VegasQ@gmail.com","username":"vegasq"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":20190,"name":"zhufl","email":"zhu.fanglei@zte.com.cn","username":"zhufl"},"reviewer":{"_account_id":20190,"name":"zhufl","email":"zhu.fanglei@zte.com.cn","username":"zhufl"},"state":"REVIEWER"},{"updated":"2019-09-16 20:45:35.000000000","updated_by":{"_account_id":23185,"name":"Samantha Blanco","email":"samantha.blanco@att.com","username":"sblanco"},"reviewer":{"_account_id":23185,"name":"Samantha Blanco","email":"samantha.blanco@att.com","username":"sblanco"},"state":"REVIEWER"},{"updated":"2019-09-19 00:15:38.000000000","updated_by":{"_account_id":5689,"name":"Masayuki Igawa","email":"masayuki@igawa.io","username":"igawa"},"reviewer":{"_account_id":5689,"name":"Masayuki Igawa","email":"masayuki@igawa.io","username":"igawa"},"state":"REVIEWER"},{"updated":"2019-09-19 00:24:54.000000000","updated_by":{"_account_id":17887,"name":"Doug Schveninger","email":"ds6901@att.com","username":"Doug.Schveninger"},"reviewer":{"_account_id":17887,"name":"Doug Schveninger","email":"ds6901@att.com","username":"Doug.Schveninger"},"state":"REVIEWER"},{"updated":"2019-09-19 02:51:18.000000000","updated_by":{"_account_id":23186,"name":"Felipe Monteiro","email":"felipe.carneiro.monteiro@gmail.com","username":"felipe.monteiro"},"reviewer":{"_account_id":23186,"name":"Felipe Monteiro","email":"felipe.carneiro.monteiro@gmail.com","username":"felipe.monteiro"},"state":"REVIEWER"},{"updated":"2019-09-19 04:13:47.000000000","updated_by":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"reviewer":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"state":"REVIEWER"}],"messages":[{"id":"0bb078e1a41441fcb57fe6cbbf6d1f2fc38c2670","author":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"date":"2019-09-16 19:20:41.000000000","message":"Uploaded patch set 1.","accounts_in_message":[],"_revision_number":1},{"id":"9eda5778138bbd92005699c1fdf2acb495930aa1","author":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"date":"2019-09-16 20:37:48.000000000","message":"Uploaded patch set 2.","accounts_in_message":[],"_revision_number":2},{"id":"407f37c1f1368b55e70042d97a12908efb431f93","author":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"date":"2019-09-16 20:38:01.000000000","message":"Topic debugging_trust_test removed","accounts_in_message":[],"_revision_number":2},{"id":"ef09e08621ebb290daa7cb077faeddb3df8119e2","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-16 22:16:04.000000000","message":"Patch Set 2: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttp://docs.openstack.org/infra/manual/developers.html#automated-testing\n\n\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/459fe869db824d05845ef3db15ae7784 : SUCCESS in 5m 09s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/c306ab841886432796406f01aebb0b84 : SUCCESS in 2m 57s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/545b8907804f48e29e8a1458fbe5570c : SUCCESS in 3m 02s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/daf48e40dd6a49cdaf249bdbe6811e3c : SUCCESS in 3m 34s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/eee076145e8146b88ec7a111bc91d2f9 : SUCCESS in 4m 40s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/4e012944202442bbb64c29579830ad23 : SUCCESS in 4m 05s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/31ff9b2e30bd42e78d268736c385bc94 : SUCCESS in 4m 05s\n- patrole-admin https://zuul.opendev.org/t/openstack/build/ec6ca262f1b74e919b52a3ba5358c4cd : SUCCESS in 56m 47s\n- patrole-member https://zuul.opendev.org/t/openstack/build/12cd8f7c0c9f425c95aa5787f31135b8 : SUCCESS in 1h 11m 33s\n- patrole-reader https://zuul.opendev.org/t/openstack/build/1226cb7e45ed4cf7a6b2f76980be1799 : SUCCESS in 1h 19m 03s (non-voting)\n- patrole-member-stein https://zuul.opendev.org/t/openstack/build/c56b8ba644cb4d75b38a7eb03ff461f0 : SUCCESS in 1h 15m 01s\n- patrole-member-rocky https://zuul.opendev.org/t/openstack/build/34d51696dfec4c66b3510f930c691a8d : SUCCESS in 1h 09m 40s\n- patrole-member-queens https://zuul.opendev.org/t/openstack/build/e51dfbee513d4f17aacf6d2c9c770d1c : FAILURE in 1h 19m 46s\n- patrole-member-pike https://zuul.opendev.org/t/openstack/build/d2ecf974fa9b4201b526c5eae308f141 : FAILURE in 1h 08m 09s\n- patrole-multinode-admin https://zuul.opendev.org/t/openstack/build/9772c861f4934f99bc532172f797965d : FAILURE in 1h 22m 22s (non-voting)\n- patrole-multinode-member https://zuul.opendev.org/t/openstack/build/3027da67ef3b4dd4b48fc2a1423789a3 : SUCCESS in 1h 07m 28s (non-voting)\n- patrole-extension-admin https://zuul.opendev.org/t/openstack/build/d7e9dd4a97964259b0384e31042ae39c : SUCCESS in 34m 39s (non-voting)\n- patrole-extension-member https://zuul.opendev.org/t/openstack/build/96dd495eef474946bcb956dd97447979 : FAILURE in 38m 03s (non-voting)","accounts_in_message":[],"_revision_number":2},{"id":"2bf883a412e7ed82bb974e6263200b91400ea0c1","author":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"date":"2019-09-17 20:50:02.000000000","message":"Uploaded patch set 3.","accounts_in_message":[],"_revision_number":3},{"id":"f5b4062eb0bd0a8564af708055ab36eb55c140bb","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-17 22:11:46.000000000","message":"Patch Set 3: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttp://docs.openstack.org/infra/manual/developers.html#automated-testing\n\n\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/fa8654e9660c4868bfd379ee224b2454 : SUCCESS in 2m 41s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/fb6d744f3c6b4da3b43722694c1df402 : SUCCESS in 3m 23s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/c3064af24c6949a2a56f4ae689713405 : SUCCESS in 4m 17s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/a960de218fd8402795646c62b8fcd1b3 : SUCCESS in 3m 22s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/55757cbbdc8b4b87bfa1490d5f54706a : SUCCESS in 3m 15s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/07bee30c0f8b4689b973064a6f1b89db : SUCCESS in 4m 03s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/1fb1ade72a7b4d5c998a4f3cf590e49d : SUCCESS in 4m 27s\n- build-openstack-releasenotes https://zuul.opendev.org/t/openstack/build/302e6d2dded14b219aac1237a0578972 : SUCCESS in 3m 54s\n- patrole-admin https://zuul.opendev.org/t/openstack/build/91d14bb23a004796927e68074a9a7f76 : SUCCESS in 1h 02m 11s\n- patrole-member https://zuul.opendev.org/t/openstack/build/f901758fb0ca4864bcaf6023cc2d994b : SUCCESS in 1h 09m 00s\n- patrole-reader https://zuul.opendev.org/t/openstack/build/ce4311f919b24ba7b337da26ba8fd0a0 : SUCCESS in 1h 02m 25s (non-voting)\n- patrole-member-stein https://zuul.opendev.org/t/openstack/build/a6ba6617674849ac92549a157d2ca931 : SUCCESS in 1h 18m 08s\n- patrole-member-rocky https://zuul.opendev.org/t/openstack/build/66d69b5ab2f34fe4af145861ca044b33 : FAILURE in 1h 13m 02s\n- patrole-member-queens https://zuul.opendev.org/t/openstack/build/445fb551be9f4829b8ca6f878fb4c04e : SUCCESS in 1h 14m 31s\n- patrole-member-pike https://zuul.opendev.org/t/openstack/build/a635f8b79d8343bfbe50083efed82d2b : SUCCESS in 1h 08m 53s\n- patrole-multinode-admin https://zuul.opendev.org/t/openstack/build/3d9ef7b5725f489c817ed54227498718 : FAILURE in 1h 05m 26s (non-voting)\n- patrole-multinode-member https://zuul.opendev.org/t/openstack/build/36601d3cf6564058ad3db5c80abb8130 : SUCCESS in 1h 06m 36s (non-voting)\n- patrole-extension-admin https://zuul.opendev.org/t/openstack/build/c6569de11095442abff386bdbfd790e8 : SUCCESS in 36m 32s (non-voting)\n- patrole-extension-member https://zuul.opendev.org/t/openstack/build/38831745f5a24e2683473e41a4f563a0 : FAILURE in 41m 55s (non-voting)","accounts_in_message":[],"_revision_number":3},{"id":"cb9ce1d1996b9e8b1abc04cb4980babaadc2342c","author":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"date":"2019-09-18 02:41:35.000000000","message":"Uploaded patch set 4.","accounts_in_message":[],"_revision_number":4},{"id":"f20a8c295e015b8b868ea30a678db5de455936b8","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-18 04:05:36.000000000","message":"Patch Set 4: Verified-1\n\nBuild failed (check pipeline).  For information on how to proceed, see\nhttp://docs.openstack.org/infra/manual/developers.html#automated-testing\n\n\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/af0b6af365b64d6b89d1ff2d579826d2 : SUCCESS in 2m 49s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/b0bb7816b1cd41bab05d2ece6ef05ebf : SUCCESS in 2m 55s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/eee2c1a9a2924a7388a81b0b7653a78b : SUCCESS in 3m 10s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/215828d624cf4f6d90c60f946aa59a45 : SUCCESS in 4m 37s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/1a5f489ed1044f4886fb83bbc28a6cc0 : SUCCESS in 3m 04s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/cb78f85ec34a4b3c8542a734af3c1078 : SUCCESS in 3m 52s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/ec11b3fedb2f4b20b3e13a54c9d9c13b : SUCCESS in 3m 18s\n- build-openstack-releasenotes https://zuul.opendev.org/t/openstack/build/b7cc14af6ff94428956f84402aa7e797 : SUCCESS in 3m 27s\n- patrole-admin https://zuul.opendev.org/t/openstack/build/0e3ed879d3404c258b8323b3e2b72641 : FAILURE in 1h 01m 13s\n- patrole-member https://zuul.opendev.org/t/openstack/build/6a6c56150eb740d3ac716bd8fe8b3159 : FAILURE in 1h 12m 29s\n- patrole-reader https://zuul.opendev.org/t/openstack/build/c917b7de04f9432191981ff030ae89a4 : FAILURE in 1h 07m 01s (non-voting)\n- patrole-member-stein https://zuul.opendev.org/t/openstack/build/e1d492b3f62e4391a4b2a94d765e16db : FAILURE in 1h 14m 21s\n- patrole-member-rocky https://zuul.opendev.org/t/openstack/build/ccf4992101ef45dc8d48171d80e2a9df : FAILURE in 1h 10m 21s\n- patrole-member-queens https://zuul.opendev.org/t/openstack/build/e5a27a15c43742af8bda9182d0b539ad : FAILURE in 1h 11m 51s\n- patrole-member-pike https://zuul.opendev.org/t/openstack/build/50c3ca4821fc4b0eb45f18693bde7dc4 : FAILURE in 1h 12m 07s\n- patrole-multinode-admin https://zuul.opendev.org/t/openstack/build/46cb0bd601384e2f879f5489e61d4ef0 : FAILURE in 1h 10m 34s (non-voting)\n- patrole-multinode-member https://zuul.opendev.org/t/openstack/build/46480e855da141419ec0f4a951fdbe49 : SUCCESS in 58m 52s (non-voting)\n- patrole-extension-admin https://zuul.opendev.org/t/openstack/build/493fb2bdf24e41e9846e513b93b75ab3 : SUCCESS in 40m 39s (non-voting)\n- patrole-extension-member https://zuul.opendev.org/t/openstack/build/a8bbf79f0d92422ca284df38be272832 : FAILURE in 36m 58s (non-voting)","accounts_in_message":[],"_revision_number":4},{"id":"7fed7b53668ae3f90b3daf2be35f43d24b94bac8","author":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"date":"2019-09-18 12:53:21.000000000","message":"Uploaded patch set 5.","accounts_in_message":[],"_revision_number":5},{"id":"4078b708ae245ab1b7f481b8eb8f41b41c345adf","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-18 14:21:50.000000000","message":"Patch Set 5: Verified+1\n\nBuild succeeded (check pipeline).\n\n- openstack-tox-cover https://zuul.opendev.org/t/openstack/build/03efcd88f41f4cfcbfc152337db65316 : SUCCESS in 3m 37s\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/f238c4f5de0e4b93a742ffdb000fc0e7 : SUCCESS in 3m 15s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/63037b48d31c4d7d9391fd28b8d59720 : SUCCESS in 3m 04s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/8417f0b301c24ee8969131b163059a22 : SUCCESS in 3m 05s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/56764464dd584d42be0430eb1367b0f3 : SUCCESS in 2m 30s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/c6cf845df2da4e4787f9d1c2937c034c : SUCCESS in 3m 17s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/5aeb6dad5d014321a276f3f1996da4f4 : SUCCESS in 3m 32s\n- build-openstack-releasenotes https://zuul.opendev.org/t/openstack/build/c241f50a71a04ba693a1976db96b8d69 : SUCCESS in 3m 41s\n- patrole-admin https://zuul.opendev.org/t/openstack/build/cebc32260b4846d286b29c8dbf02dd93 : SUCCESS in 1h 00m 36s\n- patrole-member https://zuul.opendev.org/t/openstack/build/53d10da7e1324ab18778cabd040f26ee : SUCCESS in 1h 09m 57s\n- patrole-reader https://zuul.opendev.org/t/openstack/build/b5321e0b3b734109a5e8aab536fcc671 : SUCCESS in 1h 10m 53s (non-voting)\n- patrole-member-stein https://zuul.opendev.org/t/openstack/build/8c16c63a584b43b1953240e45cd56c6d : SUCCESS in 1h 06m 34s\n- patrole-member-rocky https://zuul.opendev.org/t/openstack/build/183deb3f5fa447f193329253b3ea6d45 : SUCCESS in 1h 15m 04s\n- patrole-member-queens https://zuul.opendev.org/t/openstack/build/56fea91cd1ed44deb2c74289979fd766 : SUCCESS in 1h 04m 54s\n- patrole-member-pike https://zuul.opendev.org/t/openstack/build/4aade85b8d60465fba0a19aa72f60d21 : SUCCESS in 1h 11m 09s\n- patrole-multinode-admin https://zuul.opendev.org/t/openstack/build/b436faa83b0049eaaf32fbdd487f5aa3 : FAILURE in 1h 09m 26s (non-voting)\n- patrole-multinode-member https://zuul.opendev.org/t/openstack/build/51bd84b8912745358ad1d3f7f6105405 : SUCCESS in 1h 04m 42s (non-voting)\n- patrole-extension-admin https://zuul.opendev.org/t/openstack/build/d36a774732d14e0891798fb51fe74531 : SUCCESS in 37m 22s (non-voting)\n- patrole-extension-member https://zuul.opendev.org/t/openstack/build/d2a1f1088ff24f509d29b93a014542c9 : FAILURE in 41m 05s (non-voting)","accounts_in_message":[],"_revision_number":5},{"id":"d697bf7e7685ec1ce0721fada46b1a87c14d9366","author":{"_account_id":5689,"name":"Masayuki Igawa","email":"masayuki@igawa.io","username":"igawa"},"date":"2019-09-19 00:15:38.000000000","message":"Patch Set 5: Code-Review+2\n\nLGTM since this fixes the gate definitely.","accounts_in_message":[],"_revision_number":5},{"id":"927670350f23a600329b7c03b47c216f9f0e41c2","author":{"_account_id":17887,"name":"Doug Schveninger","email":"ds6901@att.com","username":"Doug.Schveninger"},"date":"2019-09-19 00:24:54.000000000","message":"Patch Set 5: Code-Review+1","accounts_in_message":[],"_revision_number":5},{"id":"b9bec47f017e5d948083dabbf1f60e696c928447","author":{"_account_id":23186,"name":"Felipe Monteiro","email":"felipe.carneiro.monteiro@gmail.com","username":"felipe.monteiro"},"date":"2019-09-19 02:51:18.000000000","message":"Patch Set 5: Code-Review+2 Workflow+1\n\nSorry I didn\u0027t get to this earlier but was going to comment on a precedence on how to make this backwards compatible, but seems like you dug up the examples and managed to fix this regardless. Nice!","accounts_in_message":[],"_revision_number":5},{"id":"02584c8c3d547266d8d22f96d11ccab27f869b9c","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-19 02:51:30.000000000","message":"Patch Set 5: -Verified\n\nStarting gate jobs.","accounts_in_message":[],"_revision_number":5},{"id":"4bb788d50dfccb44a8d30eeeb9782a2181be3ccc","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-19 04:13:47.000000000","message":"Patch Set 5: Verified+2\n\nBuild succeeded (gate pipeline).\n\n- openstack-tox-lower-constraints https://zuul.opendev.org/t/openstack/build/6e91dbc1695a48528ec73ecb2506b4ac : SUCCESS in 5m 12s\n- openstack-tox-py36 https://zuul.opendev.org/t/openstack/build/fa3b04632e52413eb22831a93b583df5 : SUCCESS in 2m 51s\n- openstack-tox-py37 https://zuul.opendev.org/t/openstack/build/4b101ba2b3e34bcaa3f8cb6fec6730ad : SUCCESS in 4m 23s\n- openstack-tox-pep8 https://zuul.opendev.org/t/openstack/build/fc0ebf1c4e4945ad83fa26faf5594133 : SUCCESS in 2m 56s\n- openstack-tox-py27 https://zuul.opendev.org/t/openstack/build/d1dfdb71422841f690f5b59fa081c2bc : SUCCESS in 3m 49s\n- openstack-tox-docs https://zuul.opendev.org/t/openstack/build/346eb164e1364369b079ba06c771487e : SUCCESS in 3m 08s\n- build-openstack-releasenotes https://zuul.opendev.org/t/openstack/build/1a8fef7e272b40998a7cda7e599c9899 : SUCCESS in 5m 15s\n- patrole-admin https://zuul.opendev.org/t/openstack/build/cb97c35d76ae45a1ad95c6e0d73e24f1 : SUCCESS in 1h 08m 42s\n- patrole-member https://zuul.opendev.org/t/openstack/build/5623d3278acb409cb6ce6ba51cb81d4f : SUCCESS in 1h 20m 04s","accounts_in_message":[],"_revision_number":5},{"id":"20bdc86e718ed04eff6b858efd52fd6a7d144a7b","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-19 04:13:47.000000000","message":"Change has been successfully merged by Zuul","accounts_in_message":[],"_revision_number":5},{"id":"faca92a82708cc30234e789508ec4a68ba053efc","author":{"_account_id":22348,"name":"Zuul","username":"zuul","tags":["SERVICE_USER"]},"date":"2019-09-19 04:15:02.000000000","message":"Patch Set 5:\n\nBuild succeeded (promote pipeline).\n\n- promote-openstack-tox-docs https://zuul.opendev.org/t/openstack/build/4df957ecb0fc4645bd8a7de5a3b25caa : SUCCESS in 55s\n- promote-openstack-releasenotes https://zuul.opendev.org/t/openstack/build/728686e9962545019cc3ae8108c2aaee : SUCCESS in 43s","accounts_in_message":[],"_revision_number":5}],"current_revision_number":5,"current_revision":"97fffede9ed3037469be62961d45d5bfe474a4ac","revisions":{"82f534a67ce141cbff9041f0297a4693b551be40":{"kind":"REWORK","_number":1,"created":"2019-09-16 19:20:41.000000000","uploader":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"ref":"refs/changes/67/682467/1","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/patrole","ref":"refs/changes/67/682467/1","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/1 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/1 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/1 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/patrole refs/changes/67/682467/1"}}},"commit":{"parents":[{"commit":"fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba","subject":"Merge \"[doc] Fix docs job by adding _static folder to avoid Sphinx warning\"","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba"}]}],"author":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-12 17:35:10.000000000","tz":-240},"committer":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-12 17:35:10.000000000","tz":-240},"subject":"fix: admin, member, and reader gates broken","message":"fix: admin, member, and reader gates broken\n\nRecent changes in Keystone to move trust enforcement [0] to default\npolicies is currently breaking several voting gates in Patrole.\nThis commit updates the trusts_rbac tests to account for these changes.\n\n[0] https://review.opendev.org/#/q/topic:trust-policies+(status:open+OR+status:merged)\n\nChange-Id: Ia5661e12977b26e1c16f09a074d1a805263c6c22\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/82f534a67ce141cbff9041f0297a4693b551be40"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/82f534a67ce141cbff9041f0297a4693b551be40"}]},"branch":"refs/heads/master"},"2609348af9abb85a1f4eae016bba903d704bfce0":{"kind":"REWORK","_number":2,"created":"2019-09-16 20:37:48.000000000","uploader":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"ref":"refs/changes/67/682467/2","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/patrole","ref":"refs/changes/67/682467/2","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/2 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/2 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/2 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/patrole refs/changes/67/682467/2"}}},"commit":{"parents":[{"commit":"fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba","subject":"Merge \"[doc] Fix docs job by adding _static folder to avoid Sphinx warning\"","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba"}]}],"author":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-12 17:35:10.000000000","tz":-240},"committer":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-12 18:53:01.000000000","tz":-240},"subject":"fix: admin, member, and reader gates broken","message":"fix: admin, member, and reader gates broken\n\nRecent changes in Keystone to move trust enforcement [0] to default\npolicies is currently breaking several voting gates in Patrole.\nThis commit updates the trusts_rbac tests to account for these changes.\n\nAdditionally, \u0027test_list_trusts\u0027 is updated so that it does indeed test\n\u0027identity:list_trusts\u0027. If a \u0027trustor_user_id\u0027 or \u0027trustee_user_id\u0027 is passed\ninto list_trusts() then a different policy action will be enforced. A future\ncommit will add tests for the actions added here [1].\n\n[0] https://review.opendev.org/#/q/topic:trust-policies+(status:open+OR+status:merged)\n[1] https://review.opendev.org/#/c/675807/10/keystone/common/policies/trust.py\n\nChange-Id: Ia5661e12977b26e1c16f09a074d1a805263c6c22\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/2609348af9abb85a1f4eae016bba903d704bfce0"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/2609348af9abb85a1f4eae016bba903d704bfce0"}]},"branch":"refs/heads/master"},"da7956ebabdb8e57a94fa33456d397ce1d8abb63":{"kind":"REWORK","_number":3,"created":"2019-09-17 20:50:02.000000000","uploader":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"ref":"refs/changes/67/682467/3","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/patrole","ref":"refs/changes/67/682467/3","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/3 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/3 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/3 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/patrole refs/changes/67/682467/3"}}},"commit":{"parents":[{"commit":"fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba","subject":"Merge \"[doc] Fix docs job by adding _static folder to avoid Sphinx warning\"","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba"}]}],"author":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-12 17:35:10.000000000","tz":-240},"committer":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-13 02:23:02.000000000","tz":-240},"subject":"fix: admin, member, and reader gates broken","message":"fix: admin, member, and reader gates broken\n\nRecent changes in Keystone to move trust enforcement [0] to default\npolicies is currently breaking several voting gates in Patrole.\nThis commit updates the trusts_rbac tests to account for these changes.\n\nAdditionally, \u0027test_list_trusts\u0027 is updated so that it does indeed test\n\u0027identity:list_trusts\u0027. If a \u0027trustor_user_id\u0027 or \u0027trustee_user_id\u0027 is passed\ninto list_trusts() then a different policy action will be enforced. A future\ncommit will add tests for the actions added here [1].\n\nAdded new feature flag called ``keystone_policy_enforcement_rocky`` under\nthe configuration group ``[policy-feature-enabled]`` to make ``test_list_trusts``\ntest backwards compatible, test the current release, and test the correct policy\naction. The Keystone Trust API is enforced differently depending on passed arguments.\n\nThe new feature flag is needed so that all the voting gates pass, otherwise the\n\u0027test_list_trusts\u0027 is not backwards compatible and would not test the correct\npolicy action in the current release.\n\n[0] https://review.opendev.org/#/q/topic:trust-policies+(status:open+OR+status:merged)\n[1] https://review.opendev.org/#/c/675807/10/keystone/common/policies/trust.py\n\nChange-Id: Ia5661e12977b26e1c16f09a074d1a805263c6c22\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/da7956ebabdb8e57a94fa33456d397ce1d8abb63"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/da7956ebabdb8e57a94fa33456d397ce1d8abb63"}]},"branch":"refs/heads/master"},"4db5c164ef1855a0a563425914c690d0d0325851":{"kind":"REWORK","_number":4,"created":"2019-09-18 02:41:35.000000000","uploader":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"ref":"refs/changes/67/682467/4","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/patrole","ref":"refs/changes/67/682467/4","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/4 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/4 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/4 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/patrole refs/changes/67/682467/4"}}},"commit":{"parents":[{"commit":"fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba","subject":"Merge \"[doc] Fix docs job by adding _static folder to avoid Sphinx warning\"","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba"}]}],"author":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-12 17:35:10.000000000","tz":-240},"committer":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-13 03:32:40.000000000","tz":-240},"subject":"fix: admin, member, and reader gates broken","message":"fix: admin, member, and reader gates broken\n\nRecent changes in Keystone to move trust enforcement [0] to default\npolicies is currently breaking several voting gates in Patrole.\nThis commit updates the trusts_rbac tests to account for these changes.\n\nAdditionally, \u0027test_list_trusts\u0027 is updated so that it does indeed test\n\u0027identity:list_trusts\u0027. If a \u0027trustor_user_id\u0027 or \u0027trustee_user_id\u0027 is passed\ninto list_trusts() then a different policy action will be enforced. A future\ncommit will add tests for the actions added here [1].\n\nAdded new feature flag called ``keystone_policy_enforcement_train`` under\nthe configuration group ``[policy-feature-enabled]`` to make ``test_list_trusts``\ntest backwards compatible, test the current release, and test the correct policy\naction. The Keystone Trust API is enforced differently depending on passed arguments.\n\nThe new feature flag is needed so that all the voting gates pass, otherwise the\n\u0027test_list_trusts\u0027 is not backwards compatible and would not test the correct\npolicy action in the current release.\n\n[0] https://review.opendev.org/#/q/topic:trust-policies+(status:open+OR+status:merged)\n[1] https://review.opendev.org/#/c/675807/10/keystone/common/policies/trust.py\n\nChange-Id: Ia5661e12977b26e1c16f09a074d1a805263c6c22\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/4db5c164ef1855a0a563425914c690d0d0325851"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/4db5c164ef1855a0a563425914c690d0d0325851"}]},"branch":"refs/heads/master"},"97fffede9ed3037469be62961d45d5bfe474a4ac":{"kind":"REWORK","_number":5,"created":"2019-09-18 12:53:21.000000000","uploader":{"_account_id":17896,"name":"Rick Bartra","email":"rickbartra@microsoft.com","username":"rb560u"},"ref":"refs/changes/67/682467/5","fetch":{"anonymous http":{"url":"https://review.opendev.org/openstack/patrole","ref":"refs/changes/67/682467/5","commands":{"Checkout":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/5 \u0026\u0026 git checkout FETCH_HEAD","Cherry Pick":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/5 \u0026\u0026 git cherry-pick FETCH_HEAD","Format Patch":"git fetch https://review.opendev.org/openstack/patrole refs/changes/67/682467/5 \u0026\u0026 git format-patch -1 --stdout FETCH_HEAD","Pull":"git pull https://review.opendev.org/openstack/patrole refs/changes/67/682467/5"}}},"commit":{"parents":[{"commit":"fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba","subject":"Merge \"[doc] Fix docs job by adding _static folder to avoid Sphinx warning\"","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/fe4e5fd7b5ee9a511d95e88fd124b710dcc341ba"}]}],"author":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-12 17:35:10.000000000","tz":-240},"committer":{"name":"Rick Bartra","email":"rick.bartra@att.com","date":"2019-09-13 03:57:40.000000000","tz":-240},"subject":"fix: admin, member, and reader gates broken","message":"fix: admin, member, and reader gates broken\n\nRecent changes in Keystone to move trust enforcement [0] to default\npolicies is currently breaking several voting gates in Patrole.\nThis commit updates the trusts_rbac tests to account for these changes.\n\nAdditionally, \u0027test_list_trusts\u0027 is updated so that it does indeed test\n\u0027identity:list_trusts\u0027. If a \u0027trustor_user_id\u0027 or \u0027trustee_user_id\u0027 is passed\ninto list_trusts() then a different policy action will be enforced. A future\ncommit will add tests for the actions added here [1].\n\nAdded new feature flag called ``keystone_policy_enforcement_train`` under\nthe configuration group ``[policy-feature-enabled]`` to make ``test_list_trusts``\ntest backwards compatible, test the current release, and test the correct policy\naction. The Keystone Trust API is enforced differently depending on passed arguments.\n\nThe new feature flag is needed so that all the voting gates pass, otherwise the\n\u0027test_list_trusts\u0027 is not backwards compatible and would not test the correct\npolicy action in the current release.\n\n[0] https://review.opendev.org/#/q/topic:trust-policies+(status:open+OR+status:merged)\n[1] https://review.opendev.org/#/c/675807/10/keystone/common/policies/trust.py\n\nChange-Id: Ia5661e12977b26e1c16f09a074d1a805263c6c22\n","web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/97fffede9ed3037469be62961d45d5bfe474a4ac"}],"resolve_conflicts_web_links":[{"name":"gitea","tooltip":"Open in GitWeb","url":"https://opendev.org/openstack/patrole/commit/97fffede9ed3037469be62961d45d5bfe474a4ac"}]},"branch":"refs/heads/master"}},"requirements":[],"submit_records":[],"submit_requirements":[]}
