)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"7837e6fd9cad09987bba9a95ac435c298c74957b","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":1,"id":"27d1dcb7_398eb865","updated":"2023-08-30 12:53:54.000000000","message":"Still under review","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"0afc292b782521399c9b2ac601d31421f28ac4c6","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":2,"id":"7fd47e00_e248037b","updated":"2023-09-01 15:39:02.000000000","message":"TODO:\n* remove sqlalchemy support\n* add https://bugs.launchpad.net/neutron/+bug/1983053","commit_id":"9d7882dc9f50a1c1cb2036ae8a0ae6eff3689ee2"},{"author":{"_account_id":8313,"name":"Lajos Katona","display_name":"lajoskatona","email":"katonalala@gmail.com","username":"elajkat","status":"Ericsson Software Technology"},"change_message_id":"f57e1c465963ac6415139edf7bd9d56ae3dbb237","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":2,"id":"d9d1c78d_628e3be6","updated":"2023-08-31 07:22:22.000000000","message":"\\o/","commit_id":"9d7882dc9f50a1c1cb2036ae8a0ae6eff3689ee2"},{"author":{"_account_id":17685,"name":"Elod Illes","email":"elod.illes@est.tech","username":"elod.illes"},"change_message_id":"574babbb21e1971a8a305699a9a5c20f6fec66ac","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"828482c5_ac93b498","updated":"2023-09-05 12:44:54.000000000","message":"LGTM: https://a65405c3ac385b9f4e91-da3f945bb6e5ca02e53e7fc9f3f751d2.ssl.cf2.rackcdn.com/893174/3/check/openstack-tox-docs/e4616ec/docs/bobcat/highlights.html","commit_id":"b6a54e30b53cf469cab2aa6e18e0b4a4481e3cb2"}],"deliverables/bobcat/neutron.yaml":[{"author":{"_account_id":1131,"name":"Brian Haley","email":"haleyb.dev@gmail.com","username":"brian-haley"},"change_message_id":"bcb9a0ff53a1574526c3148a6f5c0df4a7789e39","unresolved":true,"context_lines":[{"line_number":19,"context_line":"      - repo: openstack/neutron"},{"line_number":20,"context_line":"        hash: f06e6591709114c148ab806334b41ec4cff3f2f7"},{"line_number":21,"context_line":""},{"line_number":22,"context_line":"cycle-highlights:"},{"line_number":23,"context_line":"  - Limit the rate of the metadata service in order to protect the OpenStack"},{"line_number":24,"context_line":"    deployment from DoS or misbehaved instances."},{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"2aefcb68_d2560de6","line":22,"updated":"2023-08-30 13:50:27.000000000","message":"I\u0027ll just add some comments/updates based on the release notes and commit messages below.","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"09e02a0732a3645d36cdba1ca21345181c344bc9","unresolved":false,"context_lines":[{"line_number":19,"context_line":"      - repo: openstack/neutron"},{"line_number":20,"context_line":"        hash: f06e6591709114c148ab806334b41ec4cff3f2f7"},{"line_number":21,"context_line":""},{"line_number":22,"context_line":"cycle-highlights:"},{"line_number":23,"context_line":"  - Limit the rate of the metadata service in order to protect the OpenStack"},{"line_number":24,"context_line":"    deployment from DoS or misbehaved instances."},{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"003bfae5_5a556ea0","line":22,"in_reply_to":"2aefcb68_d2560de6","updated":"2023-08-30 15:07:53.000000000","message":"Done","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":1131,"name":"Brian Haley","email":"haleyb.dev@gmail.com","username":"brian-haley"},"change_message_id":"bcb9a0ff53a1574526c3148a6f5c0df4a7789e39","unresolved":true,"context_lines":[{"line_number":21,"context_line":""},{"line_number":22,"context_line":"cycle-highlights:"},{"line_number":23,"context_line":"  - Limit the rate of the metadata service in order to protect the OpenStack"},{"line_number":24,"context_line":"    deployment from DoS or misbehaved instances."},{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"},{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"cee96461_9cc79e01","line":24,"updated":"2023-08-30 13:50:27.000000000","message":"I would updated this slightly:\n\nLimit the rate at which instances can query the metadata service in order to protect the OpenStack deployment from DoS or misbehaved instances.","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"09e02a0732a3645d36cdba1ca21345181c344bc9","unresolved":false,"context_lines":[{"line_number":21,"context_line":""},{"line_number":22,"context_line":"cycle-highlights:"},{"line_number":23,"context_line":"  - Limit the rate of the metadata service in order to protect the OpenStack"},{"line_number":24,"context_line":"    deployment from DoS or misbehaved instances."},{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"},{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"e4302204_16c8ce0d","line":24,"in_reply_to":"cee96461_9cc79e01","updated":"2023-08-30 15:07:53.000000000","message":"Done","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":8313,"name":"Lajos Katona","display_name":"lajoskatona","email":"katonalala@gmail.com","username":"elajkat","status":"Ericsson Software Technology"},"change_message_id":"558e547cace465add49d513680e518ae0ac8e135","unresolved":true,"context_lines":[{"line_number":22,"context_line":"cycle-highlights:"},{"line_number":23,"context_line":"  - Limit the rate of the metadata service in order to protect the OpenStack"},{"line_number":24,"context_line":"    deployment from DoS or misbehaved instances."},{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"},{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"},{"line_number":28,"context_line":"    local Open vSwitch."},{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to beused"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"5d2ca523_d49f133f","line":26,"range":{"start_line":25,"start_character":4,"end_line":26,"end_character":21},"updated":"2023-08-30 13:13:09.000000000","message":"perhaps (I am not sure if it is really better, I hope haleyb can help us out here :P): \"The Neutron service has enabled the new default API policies (RBAC) and policies.\"","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":1131,"name":"Brian Haley","email":"haleyb.dev@gmail.com","username":"brian-haley"},"change_message_id":"bcb9a0ff53a1574526c3148a6f5c0df4a7789e39","unresolved":true,"context_lines":[{"line_number":22,"context_line":"cycle-highlights:"},{"line_number":23,"context_line":"  - Limit the rate of the metadata service in order to protect the OpenStack"},{"line_number":24,"context_line":"    deployment from DoS or misbehaved instances."},{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"},{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"},{"line_number":28,"context_line":"    local Open vSwitch."},{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to beused"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"98b30ea4_afaa0369","line":26,"range":{"start_line":25,"start_character":4,"end_line":26,"end_character":21},"in_reply_to":"5d2ca523_d49f133f","updated":"2023-08-30 13:50:27.000000000","message":"Maybe:\n\nThe Neutron service has enabled the new API policies (RBAC) with system scope and default roles by default.\n\nNot sure about using default twice there?","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"09e02a0732a3645d36cdba1ca21345181c344bc9","unresolved":false,"context_lines":[{"line_number":22,"context_line":"cycle-highlights:"},{"line_number":23,"context_line":"  - Limit the rate of the metadata service in order to protect the OpenStack"},{"line_number":24,"context_line":"    deployment from DoS or misbehaved instances."},{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"},{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"},{"line_number":28,"context_line":"    local Open vSwitch."},{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to beused"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"30eff7c4_b58fa67f","line":26,"range":{"start_line":25,"start_character":4,"end_line":26,"end_character":21},"in_reply_to":"98b30ea4_afaa0369","updated":"2023-08-30 15:07:53.000000000","message":"Done.\n\nyes, the default is for the default roles and because now are the default config","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":1131,"name":"Brian Haley","email":"haleyb.dev@gmail.com","username":"brian-haley"},"change_message_id":"bcb9a0ff53a1574526c3148a6f5c0df4a7789e39","unresolved":true,"context_lines":[{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"},{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"},{"line_number":28,"context_line":"    local Open vSwitch."},{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to beused"},{"line_number":30,"context_line":"    automatically in every new ``default`` and/or custom security group created"},{"line_number":31,"context_line":"    for any project."}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3445d72e_66738560","line":28,"updated":"2023-08-30 13:50:27.000000000","message":"Maybe:\n\nA new port hint attribute \"ovs-tx-steering\", to modify the behaviour of the local Open vSwitch Userspace transmit packet steering feature.","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"09e02a0732a3645d36cdba1ca21345181c344bc9","unresolved":false,"context_lines":[{"line_number":25,"context_line":"  - The Neutron service has enabled the API policies (RBAC) new default and"},{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"},{"line_number":28,"context_line":"    local Open vSwitch."},{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to beused"},{"line_number":30,"context_line":"    automatically in every new ``default`` and/or custom security group created"},{"line_number":31,"context_line":"    for any project."}],"source_content_type":"text/x-yaml","patch_set":1,"id":"81715e72_75f12dd4","line":28,"in_reply_to":"3445d72e_66738560","updated":"2023-08-30 15:07:53.000000000","message":"Done","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":8313,"name":"Lajos Katona","display_name":"lajoskatona","email":"katonalala@gmail.com","username":"elajkat","status":"Ericsson Software Technology"},"change_message_id":"558e547cace465add49d513680e518ae0ac8e135","unresolved":true,"context_lines":[{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"},{"line_number":28,"context_line":"    local Open vSwitch."},{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to beused"},{"line_number":30,"context_line":"    automatically in every new ``default`` and/or custom security group created"},{"line_number":31,"context_line":"    for any project."},{"line_number":32,"context_line":"  - Full support of SQLAlchemy 2.0 library version."}],"source_content_type":"text/x-yaml","patch_set":1,"id":"36fb0642_c3e78a58","line":29,"range":{"start_line":29,"start_character":68,"end_line":29,"end_character":74},"updated":"2023-08-30 13:13:09.000000000","message":"nit: be used","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"09e02a0732a3645d36cdba1ca21345181c344bc9","unresolved":false,"context_lines":[{"line_number":26,"context_line":"    scope by default."},{"line_number":27,"context_line":"  - A new port attribute \"ovs-tx-steering\", to modify the behaviour of the"},{"line_number":28,"context_line":"    local Open vSwitch."},{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to beused"},{"line_number":30,"context_line":"    automatically in every new ``default`` and/or custom security group created"},{"line_number":31,"context_line":"    for any project."},{"line_number":32,"context_line":"  - Full support of SQLAlchemy 2.0 library version."}],"source_content_type":"text/x-yaml","patch_set":1,"id":"e61615ff_515874a4","line":29,"range":{"start_line":29,"start_character":68,"end_line":29,"end_character":74},"in_reply_to":"36fb0642_c3e78a58","updated":"2023-08-30 15:07:53.000000000","message":"Done","commit_id":"7c58bca6f65d32bd921d7335892f6a8ef1c16242"},{"author":{"_account_id":11975,"name":"Slawek Kaplonski","email":"skaplons@redhat.com","username":"slaweq"},"change_message_id":"174ce6429f4f04f3986afa3ea7c09ab5f6c07a27","unresolved":true,"context_lines":[{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to be used"},{"line_number":30,"context_line":"    automatically in every new ``default`` and/or custom security group created"},{"line_number":31,"context_line":"    for any project."},{"line_number":32,"context_line":"  - Full support of SQLAlchemy 2.0 library version."}],"source_content_type":"text/x-yaml","patch_set":2,"id":"4e328c88_4ef829d0","line":32,"updated":"2023-09-01 08:55:17.000000000","message":"This cycle highlights is something what we want to highlight from the marketing PoV. I\u0027m not sure if supported version of the sqlalchemy is really important for users reading this.\n\nAnother thing, what about this RFE https://bugs.launchpad.net/neutron/+bug/1983053 which was merged last minute this week? Do we want to add it here maybe?","commit_id":"9d7882dc9f50a1c1cb2036ae8a0ae6eff3689ee2"},{"author":{"_account_id":16688,"name":"Rodolfo Alonso","email":"ralonsoh@redhat.com","username":"rodolfo-alonso-hernandez"},"change_message_id":"0afc292b782521399c9b2ac601d31421f28ac4c6","unresolved":false,"context_lines":[{"line_number":29,"context_line":"  - New API which allows to define a set of security group rules to be used"},{"line_number":30,"context_line":"    automatically in every new ``default`` and/or custom security group created"},{"line_number":31,"context_line":"    for any project."},{"line_number":32,"context_line":"  - Full support of SQLAlchemy 2.0 library version."}],"source_content_type":"text/x-yaml","patch_set":2,"id":"97d1544d_84294ca3","line":32,"in_reply_to":"4e328c88_4ef829d0","updated":"2023-09-01 15:39:02.000000000","message":"Done","commit_id":"9d7882dc9f50a1c1cb2036ae8a0ae6eff3689ee2"}]}
