)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":34308,"name":"Alex Yefimov","display_name":"Alex Yefimov","email":"ayefimov@redhat.com","username":"ayefimov"},"change_message_id":"83884383d5c4225db0fbeeb4a95b1e918e81a5ea","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":4,"id":"0f687497_9e103a50","updated":"2022-01-13 15:29:21.000000000","message":"recheck","commit_id":"e3070590b622002f7b758d471f22fda30a88db12"},{"author":{"_account_id":34308,"name":"Alex Yefimov","display_name":"Alex Yefimov","email":"ayefimov@redhat.com","username":"ayefimov"},"change_message_id":"a6f5ac9af9a4d8a8f6a2088f70999476664af4a9","unresolved":true,"context_lines":[],"source_content_type":"","patch_set":5,"id":"2ea1ad12_c3b5a65c","updated":"2022-01-13 19:43:22.000000000","message":"Patch Set 000 recheck","commit_id":"039a75bced02e41a54764e99732648aec47f3e48"},{"author":{"_account_id":34308,"name":"Alex Yefimov","display_name":"Alex Yefimov","email":"ayefimov@redhat.com","username":"ayefimov"},"change_message_id":"26677aab49e0b9ecf20c6ca8613819bdd4f15298","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":5,"id":"481fbae2_b41768de","updated":"2022-01-13 22:25:41.000000000","message":"Patch Set 06 recheck\n\nNetwork issues again. Rerun Zuul tests","commit_id":"039a75bced02e41a54764e99732648aec47f3e48"},{"author":{"_account_id":34308,"name":"Alex Yefimov","display_name":"Alex Yefimov","email":"ayefimov@redhat.com","username":"ayefimov"},"change_message_id":"0de03b785e53687efab37d2103d029b44bf39cf9","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":8,"id":"bc492f0d_af66dca7","updated":"2022-01-17 14:54:18.000000000","message":"Please review my test automation fix. \n\nThx ","commit_id":"3dd362ba4842bac5f5b97d73ce43b0927d1d178e"},{"author":{"_account_id":22873,"name":"Martin Kopec","email":"mkopec@redhat.com","username":"mkopec"},"change_message_id":"1909010967cc118c567a642ccfb009ac6075ab09","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":8,"id":"cf69fde6_6ed86b74","updated":"2022-01-17 16:58:24.000000000","message":"test_user_update_own_password and test_password_history_check_self_service_api tests are failing only under one specific condition - keystone on the tested environment is set with a minimum password age before it can be changed again (minimum_password_age \u003d 1 within keystone.conf) - https://bugs.launchpad.net/tempest/+bug/1946459\n\nIf minimum_password_age \u003d 1, then a user\u0027s password can be changed only once per day, not more, however, those tests require 2 password changes - first one to verify that we can change the password (that\u0027s the purpose of the test) and the second one is to revert the password back so that other tests which use the same test user can proceed.\n\nThere has been an attempt to solve this by passing certain parameters to the request which creates a test user - https://review.opendev.org/c/openstack/tempest/+/806671/1/tempest/lib/services/identity/v3/users_client.py - the problem with that was that the patch modified a client which means that all tests (in tempest or in any tempest plugin) would be affected by that - that could raise unwanted effects. The idea should be to modify (by passing those params) only the test user created for those 2 specific tests. So we should find a way how to pass the params introduced in 806671 from the test scope, not globally from the client\u0027s perspective.","commit_id":"3dd362ba4842bac5f5b97d73ce43b0927d1d178e"}],"tempest/api/identity/v3/test_users.py":[{"author":{"_account_id":22873,"name":"Martin Kopec","email":"mkopec@redhat.com","username":"mkopec"},"change_message_id":"1909010967cc118c567a642ccfb009ac6075ab09","unresolved":true,"context_lines":[{"line_number":56,"context_line":"            password)"},{"line_number":57,"context_line":""},{"line_number":58,"context_line":"    def _restore_password(self, old_pass, new_pass):"},{"line_number":59,"context_line":"        if CONF.identity_feature_enabled.security_compliance:"},{"line_number":60,"context_line":"            # First we need to clear the password history"},{"line_number":61,"context_line":"            unique_count \u003d CONF.identity.user_unique_last_password_count"},{"line_number":62,"context_line":"            for _ in range(unique_count):"}],"source_content_type":"text/x-python","patch_set":8,"id":"7d5b813a_4b696ec7","side":"PARENT","line":59,"range":{"start_line":59,"start_character":8,"end_line":59,"end_character":61},"updated":"2022-01-17 16:58:24.000000000","message":"this if can\u0027t be deleted, the restore_password functionality can tested only if tempest.conf contains:\n\n[identity-feature-enabled]\nsecurity_compliance \u003d True\n\nThe same applies on test_user_update_own_password and test_password_history_check_self_service_api tests. Those will be skipped by tempest if user sets the security_compliance to False in the tempest.conf - that might be handy for some users.","commit_id":"fe0ac89a5a1c43fa908a76759cd99eea3b1f9853"},{"author":{"_account_id":22873,"name":"Martin Kopec","email":"mkopec@redhat.com","username":"mkopec"},"change_message_id":"1909010967cc118c567a642ccfb009ac6075ab09","unresolved":true,"context_lines":[{"line_number":77,"context_line":"        time.sleep(1)"},{"line_number":78,"context_line":"        self.non_admin_users_client.auth_provider.set_auth()"},{"line_number":79,"context_line":""},{"line_number":80,"context_line":"    @testtools.skipUnless(CONF.identity_feature_enabled.security_compliance,"},{"line_number":81,"context_line":"                          \u0027Security compliance not available.\u0027)"},{"line_number":82,"context_line":"    @decorators.idempotent_id(\u0027ad71bd23-12ad-426b-bb8b-195d2b635f27\u0027)"},{"line_number":83,"context_line":"    @testtools.skipIf(CONF.identity_feature_enabled.immutable_user_source,"},{"line_number":84,"context_line":"                      \u0027Skipped because environment has an \u0027"}],"source_content_type":"text/x-python","patch_set":8,"id":"40092edb_dbbc47f5","side":"PARENT","line":81,"range":{"start_line":80,"start_character":3,"end_line":81,"end_character":63},"updated":"2022-01-17 16:58:24.000000000","message":"ditto","commit_id":"fe0ac89a5a1c43fa908a76759cd99eea3b1f9853"},{"author":{"_account_id":22873,"name":"Martin Kopec","email":"mkopec@redhat.com","username":"mkopec"},"change_message_id":"1909010967cc118c567a642ccfb009ac6075ab09","unresolved":true,"context_lines":[{"line_number":108,"context_line":"                          password\u003dold_pass)"},{"line_number":109,"context_line":""},{"line_number":110,"context_line":"    @testtools.skipUnless(CONF.identity_feature_enabled.security_compliance,"},{"line_number":111,"context_line":"                          \u0027Security compliance not available.\u0027)"},{"line_number":112,"context_line":"    @decorators.idempotent_id(\u0027941784ee-5342-4571-959b-b80dd2cea516\u0027)"},{"line_number":113,"context_line":"    @testtools.skipIf(CONF.identity_feature_enabled.immutable_user_source,"},{"line_number":114,"context_line":"                      \u0027Skipped because environment has an \u0027"}],"source_content_type":"text/x-python","patch_set":8,"id":"53cf274d_7f93c3b1","side":"PARENT","line":111,"updated":"2022-01-17 16:58:24.000000000","message":"ditto","commit_id":"fe0ac89a5a1c43fa908a76759cd99eea3b1f9853"}]}
