)]}'
{".zuul.yaml":[{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"4f26a82b90e0916aea615c374ea2e0860f565ae0","unresolved":false,"context_lines":[{"line_number":87,"context_line":"          $BARBICAN_CONF:"},{"line_number":88,"context_line":"            oslo_policy:"},{"line_number":89,"context_line":"              # Needed to avoid \u0027creator\u0027 role requirement for Barbican"},{"line_number":90,"context_line":"              enforce_new_defaults: True"},{"line_number":91,"context_line":"              enforce_scope: True"},{"line_number":92,"context_line":"          $NOVA_CONF:"},{"line_number":93,"context_line":"            key_manager:"},{"line_number":94,"context_line":"              backend: barbican"}],"source_content_type":"text/x-yaml","patch_set":17,"id":"8eac8a77_3b6346dc","line":91,"range":{"start_line":90,"start_character":0,"end_line":91,"end_character":33},"updated":"2026-03-04 19:29:59.000000000","message":"ah, by now, we should enable them by default (I disabled it for barbican to give more time for old default). I will check if barbican is ready and we can enable new defaults.","commit_id":"1020099875512cdbe2605b1c83c8ba586abbb317"}],"/PATCHSET_LEVEL":[{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"5c3fad235a1fe1ca39fd951dce3b06c059180356","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":6,"id":"635e9efd_4d77f74b","updated":"2025-07-26 07:39:38.000000000","message":"recheck dep updated","commit_id":"ef9f5f0797745ab3ff9dd5f31e383c7bd68d6ddd"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"02ef31462c3ed1f3596f28eb5769da7751d00ab8","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":7,"id":"1683831c_d05585c8","updated":"2025-07-26 07:55:06.000000000","message":"recheck","commit_id":"98ae49fc4533f334788f4837a68202b885694724"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"d3fbbfa62b5d7fc6403ed50b2c0751bfd1035001","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":8,"id":"73e79009_a59d7ac0","updated":"2025-07-29 03:15:23.000000000","message":"recheck","commit_id":"87491a52b7ea1b0d8cc6ec6c761336882366afdf"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"1d5ba4d4545410f06ea65dd4f8beac66ca42b7c3","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":8,"id":"cafbf2db_c9ba5965","updated":"2025-07-30 01:13:41.000000000","message":"recheck","commit_id":"87491a52b7ea1b0d8cc6ec6c761336882366afdf"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"bddf893dad113c51fe4827a50151c141ee36316f","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":10,"id":"77ad1afe_68e73236","updated":"2025-08-09 01:22:54.000000000","message":"recheck dep updated","commit_id":"b20be5c57a54e18eb51fddd980d3ee31b32a77fe"},{"author":{"_account_id":31033,"name":"James Parker","email":"jparker@redhat.com","username":"jparker"},"change_message_id":"9e9bd1476a6dc26d533e4c0b694cd880f0bd3f9c","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":13,"id":"8e16de43_25e966a2","updated":"2025-08-21 13:47:23.000000000","message":"I\u0027ll reach out to Gmaan and Ashish to see if they have any input, otherwise this LGTM.","commit_id":"42b4bc7c66b90ddc84d72679b65c803d708ed592"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"240760c9a7c62ac2dc63ae5b1a7cf85fbb7bd716","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":13,"id":"8d51006d_23d343d1","updated":"2025-08-21 15:48:34.000000000","message":"lgtm,  few unrelated nits. \nthis will be merged after nova depends-on patch I think which itself has relate (underlying) patches to merge.","commit_id":"42b4bc7c66b90ddc84d72679b65c803d708ed592"},{"author":{"_account_id":31033,"name":"James Parker","email":"jparker@redhat.com","username":"jparker"},"change_message_id":"bfabaf3373730c8c9aa4dfc0effd2b4d5b8ad913","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":15,"id":"e4ad8515_62b133d0","updated":"2026-02-19 15:32:45.000000000","message":"The cpu pinning failures are a known issue being addressed here [1], depending-on this has allowed me to verify my current Commits in the gate without the failures related.\n\n\n[1] https://review.opendev.org/c/openstack/nova/+/975934","commit_id":"46321256c2d6a8d080058365a0e2e00f8c0f4dd7"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"5acebdcc17a14c7f2b176e1bd01ae8c40f406fe7","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":15,"id":"6fbec592_a1c693f7","updated":"2026-02-19 02:55:13.000000000","message":"recheck dep updated","commit_id":"46321256c2d6a8d080058365a0e2e00f8c0f4dd7"},{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"4f26a82b90e0916aea615c374ea2e0860f565ae0","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":17,"id":"3fb4a599_b002b8b7","updated":"2026-03-04 19:29:59.000000000","message":"lgtm, test running fine -https://zuul.opendev.org/t/openstack/build/afd4cfc4bfce4ec6b71f7cc4f6836ae3/log/job-output.txt#36344-36349","commit_id":"1020099875512cdbe2605b1c83c8ba586abbb317"},{"author":{"_account_id":31033,"name":"James Parker","email":"jparker@redhat.com","username":"jparker"},"change_message_id":"0a9a54f45ed998886635f5e1fae49bf5af4e29c0","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":18,"id":"bbe37a5c_3d8e5e2e","updated":"2026-03-13 19:44:12.000000000","message":"Overall looks good could you just add a skip check for vtpm_live_migration support, it just helps with booking keeping across different jobs that will and will not be running this alongside standard vTPM operations.","commit_id":"b6f19709a9412390aa65311aba411b0ffa2797f7"},{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"fe9c60df18313f7a14c0e745f46570e9026ea72e","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":18,"id":"a287e619_efed46f3","updated":"2026-03-05 20:51:08.000000000","message":"thanks, lgtm","commit_id":"b6f19709a9412390aa65311aba411b0ffa2797f7"},{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"28c48e9badf520689b3950bcf2d8865234d3baf1","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":19,"id":"84cadc24_ba0e4b01","updated":"2026-03-18 21:06:55.000000000","message":"+W as tempest change is in gate too","commit_id":"0aca27ebfc8f341b142d574c9884bbb3ad3ed81e"},{"author":{"_account_id":31033,"name":"James Parker","email":"jparker@redhat.com","username":"jparker"},"change_message_id":"1851b31db9aa06ea5a8fdc8fc93ddb2eae8b7d3b","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":19,"id":"e9e83390_e5fe5f72","updated":"2026-03-16 14:08:48.000000000","message":"LGTM, I know @gmaan.os14@gmail.com gave a +2 earlier, if he or @auniyal@redhat.com don\u0027t have anything else they want to add I\u0027ll workflow it by EOD.","commit_id":"0aca27ebfc8f341b142d574c9884bbb3ad3ed81e"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"737bd688614c1371a8ddc87671418df7921623af","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":19,"id":"68296b0b_5ab216cd","updated":"2026-03-16 15:10:56.000000000","message":"lgtm","commit_id":"0aca27ebfc8f341b142d574c9884bbb3ad3ed81e"},{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"27e35fd6e98d2fa645bb90ff3dc539bfcc9aa2ac","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":19,"id":"2eece738_afa0e921","updated":"2026-03-17 19:09:37.000000000","message":"lgtm, holding +w until depends-on tempest change is +w","commit_id":"0aca27ebfc8f341b142d574c9884bbb3ad3ed81e"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"c23d9ec9c59021b03c80baab5f0a292044ea7778","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":19,"id":"3dc7914e_76f145f0","updated":"2026-03-17 20:46:37.000000000","message":"recheck dep updated","commit_id":"0aca27ebfc8f341b142d574c9884bbb3ad3ed81e"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"93b1e87b03bb44370e78ed349beef38ba9819f98","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":19,"id":"b2e94ad2_4e689343","updated":"2026-03-17 21:35:45.000000000","message":"recheck dep updated","commit_id":"0aca27ebfc8f341b142d574c9884bbb3ad3ed81e"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"4dc650ded1c9edd3e34aa83eca885dadf105b4d0","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":19,"id":"647a2f2b_ce49580f","updated":"2026-03-18 21:37:37.000000000","message":"recheck depended change is in the gate change queue","commit_id":"0aca27ebfc8f341b142d574c9884bbb3ad3ed81e"}],"whitebox_tempest_plugin/api/compute/test_vtpm.py":[{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"8b305b2109fe8c82e7dc3b410b13d5b068ab140e","unresolved":true,"context_lines":[{"line_number":200,"context_line":"        # Check the vtpm before live migration"},{"line_number":201,"context_line":"        self._vtpm_check(server, vtpm_model, vtpm_version,"},{"line_number":202,"context_line":"                         secrets_client\u003dsecrets_client)"},{"line_number":203,"context_line":""},{"line_number":204,"context_line":"        self.live_migrate(self.os_admin, server[\u0027id\u0027], \u0027ACTIVE\u0027)"},{"line_number":205,"context_line":""},{"line_number":206,"context_line":"        # And again after live migration"}],"source_content_type":"text/x-python","patch_set":8,"id":"cbae013b_73b4230a","line":203,"updated":"2025-07-30 01:55:25.000000000","message":"TODO: add check for values of ephemeral and private on the libvirt secret.","commit_id":"87491a52b7ea1b0d8cc6ec6c761336882366afdf"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"45bdfdfc6816ea16be409203d00644c1ce300220","unresolved":false,"context_lines":[{"line_number":200,"context_line":"        # Check the vtpm before live migration"},{"line_number":201,"context_line":"        self._vtpm_check(server, vtpm_model, vtpm_version,"},{"line_number":202,"context_line":"                         secrets_client\u003dsecrets_client)"},{"line_number":203,"context_line":""},{"line_number":204,"context_line":"        self.live_migrate(self.os_admin, server[\u0027id\u0027], \u0027ACTIVE\u0027)"},{"line_number":205,"context_line":""},{"line_number":206,"context_line":"        # And again after live migration"}],"source_content_type":"text/x-python","patch_set":8,"id":"3d1684f6_616b1c49","line":203,"in_reply_to":"cbae013b_73b4230a","updated":"2025-07-31 04:03:39.000000000","message":"Done","commit_id":"87491a52b7ea1b0d8cc6ec6c761336882366afdf"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"240760c9a7c62ac2dc63ae5b1a7cf85fbb7bd716","unresolved":true,"context_lines":[{"line_number":99,"context_line":"            \u0027element\u0027)"},{"line_number":100,"context_line":""},{"line_number":101,"context_line":"        # Get the secret uuid and get secret details from barbican"},{"line_number":102,"context_line":"        secret_uuid \u003d secret_uuid \u003d vtpm_secret_element.get(\u0027secret\u0027)"},{"line_number":103,"context_line":"        secret_info \u003d secrets_client.get_secret_metadata(secret_uuid)"},{"line_number":104,"context_line":""},{"line_number":105,"context_line":"        # Confirm the secret is ACTIVE and its description mentions the"}],"source_content_type":"text/x-python","patch_set":13,"id":"bfcac195_926f3a4c","line":102,"range":{"start_line":102,"start_character":8,"end_line":102,"end_character":19},"updated":"2025-08-21 15:48:34.000000000","message":"not related to this patch change, \n\nnit: secret_uuid - same varname twice (not really declared just mentioned), can be removed.\nnot imp, but in case respin required , this can be removed,","commit_id":"42b4bc7c66b90ddc84d72679b65c803d708ed592"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"807eb2dd41ac4390cf1e584b2524c32ebc5f04c9","unresolved":false,"context_lines":[{"line_number":99,"context_line":"            \u0027element\u0027)"},{"line_number":100,"context_line":""},{"line_number":101,"context_line":"        # Get the secret uuid and get secret details from barbican"},{"line_number":102,"context_line":"        secret_uuid \u003d secret_uuid \u003d vtpm_secret_element.get(\u0027secret\u0027)"},{"line_number":103,"context_line":"        secret_info \u003d secrets_client.get_secret_metadata(secret_uuid)"},{"line_number":104,"context_line":""},{"line_number":105,"context_line":"        # Confirm the secret is ACTIVE and its description mentions the"}],"source_content_type":"text/x-python","patch_set":13,"id":"0cbd4d46_d909136a","line":102,"range":{"start_line":102,"start_character":8,"end_line":102,"end_character":19},"in_reply_to":"a35ed9e9_030ed8a8","updated":"2025-08-21 18:33:24.000000000","message":"Done","commit_id":"42b4bc7c66b90ddc84d72679b65c803d708ed592"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"e8ff1effa96b63493cc440d106dc3840e7f9387c","unresolved":true,"context_lines":[{"line_number":99,"context_line":"            \u0027element\u0027)"},{"line_number":100,"context_line":""},{"line_number":101,"context_line":"        # Get the secret uuid and get secret details from barbican"},{"line_number":102,"context_line":"        secret_uuid \u003d secret_uuid \u003d vtpm_secret_element.get(\u0027secret\u0027)"},{"line_number":103,"context_line":"        secret_info \u003d secrets_client.get_secret_metadata(secret_uuid)"},{"line_number":104,"context_line":""},{"line_number":105,"context_line":"        # Confirm the secret is ACTIVE and its description mentions the"}],"source_content_type":"text/x-python","patch_set":13,"id":"a35ed9e9_030ed8a8","line":102,"range":{"start_line":102,"start_character":8,"end_line":102,"end_character":19},"in_reply_to":"bfcac195_926f3a4c","updated":"2025-08-21 18:20:14.000000000","message":"Oh, ugh, this was a copy-paste mistake or something 😩 I will fix it.","commit_id":"42b4bc7c66b90ddc84d72679b65c803d708ed592"},{"author":{"_account_id":34860,"name":"Amit Uniyal","email":"auniyal@redhat.com","username":"auniyal"},"change_message_id":"240760c9a7c62ac2dc63ae5b1a7cf85fbb7bd716","unresolved":true,"context_lines":[{"line_number":102,"context_line":"        secret_uuid \u003d secret_uuid \u003d vtpm_secret_element.get(\u0027secret\u0027)"},{"line_number":103,"context_line":"        secret_info \u003d secrets_client.get_secret_metadata(secret_uuid)"},{"line_number":104,"context_line":""},{"line_number":105,"context_line":"        # Confirm the secret is ACTIVE and its description mentions the"},{"line_number":106,"context_line":"        # respective server uuid and it is used for vTPM"},{"line_number":107,"context_line":"        self.assertEqual("},{"line_number":108,"context_line":"            \u0027ACTIVE\u0027, secret_info.get(\u0027status\u0027), \u0027Secret is not ACTIVE, \u0027"}],"source_content_type":"text/x-python","patch_set":13,"id":"05acb3de_1ddcc7d6","line":105,"range":{"start_line":105,"start_character":47,"end_line":105,"end_character":67},"updated":"2025-08-21 15:48:34.000000000","message":"nit: should it say it \"name mentions\" \nas server-uuid checked in secret_info.get(\u0027name\u0027))","commit_id":"42b4bc7c66b90ddc84d72679b65c803d708ed592"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"e8ff1effa96b63493cc440d106dc3840e7f9387c","unresolved":true,"context_lines":[{"line_number":102,"context_line":"        secret_uuid \u003d secret_uuid \u003d vtpm_secret_element.get(\u0027secret\u0027)"},{"line_number":103,"context_line":"        secret_info \u003d secrets_client.get_secret_metadata(secret_uuid)"},{"line_number":104,"context_line":""},{"line_number":105,"context_line":"        # Confirm the secret is ACTIVE and its description mentions the"},{"line_number":106,"context_line":"        # respective server uuid and it is used for vTPM"},{"line_number":107,"context_line":"        self.assertEqual("},{"line_number":108,"context_line":"            \u0027ACTIVE\u0027, secret_info.get(\u0027status\u0027), \u0027Secret is not ACTIVE, \u0027"}],"source_content_type":"text/x-python","patch_set":13,"id":"1461079e_8dbb01c8","line":105,"range":{"start_line":105,"start_character":47,"end_line":105,"end_character":67},"in_reply_to":"05acb3de_1ddcc7d6","updated":"2025-08-21 18:20:14.000000000","message":"Sure, will update that also.","commit_id":"42b4bc7c66b90ddc84d72679b65c803d708ed592"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"807eb2dd41ac4390cf1e584b2524c32ebc5f04c9","unresolved":false,"context_lines":[{"line_number":102,"context_line":"        secret_uuid \u003d secret_uuid \u003d vtpm_secret_element.get(\u0027secret\u0027)"},{"line_number":103,"context_line":"        secret_info \u003d secrets_client.get_secret_metadata(secret_uuid)"},{"line_number":104,"context_line":""},{"line_number":105,"context_line":"        # Confirm the secret is ACTIVE and its description mentions the"},{"line_number":106,"context_line":"        # respective server uuid and it is used for vTPM"},{"line_number":107,"context_line":"        self.assertEqual("},{"line_number":108,"context_line":"            \u0027ACTIVE\u0027, secret_info.get(\u0027status\u0027), \u0027Secret is not ACTIVE, \u0027"}],"source_content_type":"text/x-python","patch_set":13,"id":"f8217c2a_2de78ac2","line":105,"range":{"start_line":105,"start_character":47,"end_line":105,"end_character":67},"in_reply_to":"1461079e_8dbb01c8","updated":"2025-08-21 18:33:24.000000000","message":"Done","commit_id":"42b4bc7c66b90ddc84d72679b65c803d708ed592"},{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"4f26a82b90e0916aea615c374ea2e0860f565ae0","unresolved":true,"context_lines":[{"line_number":128,"context_line":"        self.assertEqual(\u0027no\u0027, secret_xml.get(\u0027ephemeral\u0027))"},{"line_number":129,"context_line":"        self.assertEqual(\u0027no\u0027, secret_xml.get(\u0027private\u0027))"},{"line_number":130,"context_line":""},{"line_number":131,"context_line":"    def _secret_check_negative(self, secret_uuid, host):"},{"line_number":132,"context_line":"        ex \u003d self.assertRaises("},{"line_number":133,"context_line":"            tempest.lib.exceptions.SSHExecCommandFailed, self.get_secret_xml,"},{"line_number":134,"context_line":"            secret_uuid, host)"},{"line_number":135,"context_line":"        self.assertIn(\u0027Secret not found\u0027, str(ex))"},{"line_number":136,"context_line":""},{"line_number":137,"context_line":"    def test_create_server_with_vtpm_tis(self):"},{"line_number":138,"context_line":"        # Test creating server with tpm-tis model and versions supported"}],"source_content_type":"text/x-python","patch_set":17,"id":"0b3646b3_3553093b","line":135,"range":{"start_line":131,"start_character":0,"end_line":135,"end_character":50},"updated":"2026-03-04 19:29:59.000000000","message":"this is not used. maybe you left this due to split deployment mode tests. As i can see it is used in the following change, I am fine if you remove it in this change or keep it. https://review.opendev.org/c/openstack/whitebox-tempest-plugin/+/977904","commit_id":"1020099875512cdbe2605b1c83c8ba586abbb317"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"f998e5467c4744faa1e1ec7202f167732654f173","unresolved":false,"context_lines":[{"line_number":128,"context_line":"        self.assertEqual(\u0027no\u0027, secret_xml.get(\u0027ephemeral\u0027))"},{"line_number":129,"context_line":"        self.assertEqual(\u0027no\u0027, secret_xml.get(\u0027private\u0027))"},{"line_number":130,"context_line":""},{"line_number":131,"context_line":"    def _secret_check_negative(self, secret_uuid, host):"},{"line_number":132,"context_line":"        ex \u003d self.assertRaises("},{"line_number":133,"context_line":"            tempest.lib.exceptions.SSHExecCommandFailed, self.get_secret_xml,"},{"line_number":134,"context_line":"            secret_uuid, host)"},{"line_number":135,"context_line":"        self.assertIn(\u0027Secret not found\u0027, str(ex))"},{"line_number":136,"context_line":""},{"line_number":137,"context_line":"    def test_create_server_with_vtpm_tis(self):"},{"line_number":138,"context_line":"        # Test creating server with tpm-tis model and versions supported"}],"source_content_type":"text/x-python","patch_set":17,"id":"e7684407_539bcf6c","line":135,"range":{"start_line":131,"start_character":0,"end_line":135,"end_character":50},"in_reply_to":"0b3646b3_3553093b","updated":"2026-03-04 21:13:57.000000000","message":"Thanks for catching that. I moved it.","commit_id":"1020099875512cdbe2605b1c83c8ba586abbb317"},{"author":{"_account_id":31033,"name":"James Parker","email":"jparker@redhat.com","username":"jparker"},"change_message_id":"0a9a54f45ed998886635f5e1fae49bf5af4e29c0","unresolved":true,"context_lines":[{"line_number":168,"context_line":"            host_svc.restart()"},{"line_number":169,"context_line":"        self._vtpm_server_creation_check(\u0027tpm-crb\u0027, \u00272.0\u0027)"},{"line_number":170,"context_line":""},{"line_number":171,"context_line":"    def test_vtpm_live_migration_secret_security_user(self):"},{"line_number":172,"context_line":"        \"\"\"Test vTPM live migration with secret security \u0027user\u0027"},{"line_number":173,"context_line":""},{"line_number":174,"context_line":"        The \u0027user\u0027 secret security policy is the same as legacy vTPM secret"}],"source_content_type":"text/x-python","patch_set":18,"id":"2ad394c0_ca1122b3","line":171,"updated":"2026-03-13 19:44:12.000000000","message":"Talking with Dan downstream this should throw a badrequest in 17/18 so I do not think we need a skipcheck here.","commit_id":"b6f19709a9412390aa65311aba411b0ffa2797f7"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"a56a8b82feae71ff5c510fe6552971a5d9fd0c73","unresolved":false,"context_lines":[{"line_number":168,"context_line":"            host_svc.restart()"},{"line_number":169,"context_line":"        self._vtpm_server_creation_check(\u0027tpm-crb\u0027, \u00272.0\u0027)"},{"line_number":170,"context_line":""},{"line_number":171,"context_line":"    def test_vtpm_live_migration_secret_security_user(self):"},{"line_number":172,"context_line":"        \"\"\"Test vTPM live migration with secret security \u0027user\u0027"},{"line_number":173,"context_line":""},{"line_number":174,"context_line":"        The \u0027user\u0027 secret security policy is the same as legacy vTPM secret"}],"source_content_type":"text/x-python","patch_set":18,"id":"1d6ecd1d_f4e58a64","line":171,"in_reply_to":"2ad394c0_ca1122b3","updated":"2026-03-14 05:53:16.000000000","message":"Done","commit_id":"b6f19709a9412390aa65311aba411b0ffa2797f7"},{"author":{"_account_id":31033,"name":"James Parker","email":"jparker@redhat.com","username":"jparker"},"change_message_id":"0a9a54f45ed998886635f5e1fae49bf5af4e29c0","unresolved":true,"context_lines":[{"line_number":199,"context_line":""},{"line_number":200,"context_line":"        self.delete_server(server[\u0027id\u0027])"},{"line_number":201,"context_line":""},{"line_number":202,"context_line":"    def test_vtpm_live_migration_secret_security_host(self):"},{"line_number":203,"context_line":"        \"\"\"Test vTPM live migration with secret security \u0027host\u0027"},{"line_number":204,"context_line":""},{"line_number":205,"context_line":"        The \u0027host\u0027 secret security policy has the Barbican secret owned by the"}],"source_content_type":"text/x-python","patch_set":18,"id":"d6683e70_b213864a","line":202,"updated":"2026-03-13 19:44:12.000000000","message":"Do you mind adding something like [compute-feature-enabled]vtpm_live_migration_supported here? This just helps downstream since we can\u0027t run this in 17/18 but we will still track this test in all our tooling as skipped versus using an exclude regex which hides the test records in any capacity.","commit_id":"b6f19709a9412390aa65311aba411b0ffa2797f7"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"a56a8b82feae71ff5c510fe6552971a5d9fd0c73","unresolved":false,"context_lines":[{"line_number":199,"context_line":""},{"line_number":200,"context_line":"        self.delete_server(server[\u0027id\u0027])"},{"line_number":201,"context_line":""},{"line_number":202,"context_line":"    def test_vtpm_live_migration_secret_security_host(self):"},{"line_number":203,"context_line":"        \"\"\"Test vTPM live migration with secret security \u0027host\u0027"},{"line_number":204,"context_line":""},{"line_number":205,"context_line":"        The \u0027host\u0027 secret security policy has the Barbican secret owned by the"}],"source_content_type":"text/x-python","patch_set":18,"id":"2d117526_546456cd","line":202,"in_reply_to":"d6683e70_b213864a","updated":"2026-03-14 05:53:16.000000000","message":"Done","commit_id":"b6f19709a9412390aa65311aba411b0ffa2797f7"}]}
