)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":32704,"name":"Alfredo Garcia","email":"alfrgarc@redhat.com","username":"alfrgarc"},"change_message_id":"231dd48bd9eff4868c1b236e2efe9925add7d03a","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"c962a993_1ea6b505","updated":"2026-04-08 12:52:30.000000000","message":"Well commented and well structured, LGTM (although it would be appreciated to see the addressed comments resolved)","commit_id":"5fc8f9c7ee66d15974a05b05599413708a084bec"},{"author":{"_account_id":34373,"name":"Jason Paroly","email":"jparoly@redhat.com","username":"jparoly"},"change_message_id":"5129222c1922bdae815729e605227b898e7a82ff","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":7,"id":"a9a1e166_2bb1fec3","updated":"2026-03-24 18:07:43.000000000","message":"More detail in the commit message would be helpful","commit_id":"062a3f2ec508526c7e0bdcdb59318a17dba7f34e"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"1ec581e999abcd6ffc2b8ee1f5dc2bd0f08e7715","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":17,"id":"efc9694a_5f047976","updated":"2026-04-05 18:26:29.000000000","message":"recheck [instance: bb5038b5-baa4-4410-add8-3dd53d0a708a] Timeout waiting for [\u0027network-vif-plugged-195ace4e-3a87-416b-baf7-ce7a2bcfe975\u0027] for instance with vm_state building and task_state spawning. Event states are: network-vif-plugged-195ace4e-3a87-416b-baf7-ce7a2bcfe975: timed out after 300.00 seconds: nova.exception.InstanceEventTimeout","commit_id":"3674dbf3f5ac48eafa99ba515dea601d325f4a78"}],"tempest/api/compute/admin/test_live_migration.py":[{"author":{"_account_id":34373,"name":"Jason Paroly","email":"jparoly@redhat.com","username":"jparoly"},"change_message_id":"5129222c1922bdae815729e605227b898e7a82ff","unresolved":true,"context_lines":[{"line_number":636,"context_line":"        # Refer to the user_id of the non-admin user."},{"line_number":637,"context_line":"        cls.non_admin_user_id \u003d cls.os_primary.credentials.user_id"},{"line_number":638,"context_line":""},{"line_number":639,"context_line":"    def _assert_secret_found(self, secrets_client, secret_uuid):"},{"line_number":640,"context_line":"        # This will raise if the secret is not found."},{"line_number":641,"context_line":"        secrets_client.get_secret_metadata(secret_uuid)"},{"line_number":642,"context_line":""},{"line_number":643,"context_line":"    def _assert_secret_not_found(self, secrets_client, secret_uuid):"},{"line_number":644,"context_line":"        self.assertRaises(lib_exceptions.NotFound,"},{"line_number":645,"context_line":"                          secrets_client.get_secret_metadata, secret_uuid)"},{"line_number":646,"context_line":""},{"line_number":647,"context_line":"    def _secret_check(self, server, secrets_client, expected_creator_id):"},{"line_number":648,"context_line":"        \"\"\"Check that the secret status and ownership match what we expect\"\"\""}],"source_content_type":"text/x-python","patch_set":7,"id":"debc9f45_3e7704c4","line":645,"range":{"start_line":639,"start_character":4,"end_line":645,"end_character":74},"updated":"2026-03-24 18:07:43.000000000","message":"why assert both?","commit_id":"062a3f2ec508526c7e0bdcdb59318a17dba7f34e"},{"author":{"_account_id":34373,"name":"Jason Paroly","email":"jparoly@redhat.com","username":"jparoly"},"change_message_id":"69c74b32c3825851bbf1c3c387f7c4082ccb7d6a","unresolved":true,"context_lines":[{"line_number":749,"context_line":"        # The secret UUID should not have changed."},{"line_number":750,"context_line":"        self.assertEqual(before_secret_uuid, after_secret_uuid)"},{"line_number":751,"context_line":""},{"line_number":752,"context_line":"        self.delete_server(server[\u0027id\u0027])"},{"line_number":753,"context_line":""},{"line_number":754,"context_line":"    @decorators.idempotent_id(\u0027d2108f87-a8d7-4cc6-9b05-40258a28c8b4\u0027)"},{"line_number":755,"context_line":"    def test_vtpm_live_migration_opt_in_via_resize_host(self):"}],"source_content_type":"text/x-python","patch_set":7,"id":"81e9b39e_0afcc34d","line":752,"updated":"2026-03-24 18:12:01.000000000","message":"could this an the other existing and new calls to delete_server be moved to a cleanup function that will run regardless of a failure/exception in the test case?","commit_id":"062a3f2ec508526c7e0bdcdb59318a17dba7f34e"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"a641b4cf36041a68a606d937827b963d057b3821","unresolved":true,"context_lines":[{"line_number":783,"context_line":"                               self.os_admin.secrets_client)"},{"line_number":784,"context_line":"        self.assertIn(\u0027Secret payload retrieval attempt not allowed\u0027, str(ex))"},{"line_number":785,"context_line":""},{"line_number":786,"context_line":""},{"line_number":787,"context_line":"    @decorators.idempotent_id(\u002721431e90-4aa4-4d4e-8cd7-5513e7127c6d\u0027)"},{"line_number":788,"context_line":"    @testtools.skipUnless(CONF.auth.service_user_password,"},{"line_number":789,"context_line":"                          \u0027[auth]service_user_password is not configured\u0027)"}],"source_content_type":"text/x-python","patch_set":9,"id":"7e05cb29_2869b626","line":786,"updated":"2026-04-04 07:41:07.000000000","message":"pep8 error","commit_id":"38d1f3405508454c5c820d1c555f9c4091f38383"}]}
