)]}'
{
  "log": [
    {
      "commit": "370f71e9877fad13883413225bf25051c0c9c391",
      "tree": "062ed354371e471750fab33f98d3e2b86729835b",
      "parents": [
        "7aa02077ac12c05950eac6094f330d4082cf8881"
      ],
      "author": {
        "name": "Rodolfo Alonso Hernandez",
        "email": "ralonsoh@redhat.com",
        "time": "Sat Sep 09 21:33:55 2023 +0000"
      },
      "committer": {
        "name": "Rodolfo Alonso Hernandez",
        "email": "ralonsoh@redhat.com",
        "time": "Sat Sep 09 21:36:37 2023 +0000"
      },
      "message": "Mark \"test_subport_connectivity_soft_reboot\" as unstable\n\nThis issue is related to:\n* https://bugs.launchpad.net/neutron/+bug/2033887: the patches\n  previously merged in the Neutron repository [1][2] should be\n  reverted.\n* https://bugs.launchpad.net/neutron/+bug/2024160: this issue\n  is still present.\n\n[1]https://review.opendev.org/c/openstack/neutron/+/882581\n[2]https://review.opendev.org/c/openstack/neutron/+/888776\n\nChange-Id: I9d8d76810d15913c29610464ab1b8fa34863aaf6\nRelated-Bug: #2024160\nRelated-Bug: #2033887\n"
    },
    {
      "commit": "7aa02077ac12c05950eac6094f330d4082cf8881",
      "tree": "f4de4faf0b5b0025abbc56c4afbeade30554a665",
      "parents": [
        "8f63937f01e6e662ced78a758991a0035df468b9"
      ],
      "author": {
        "name": "Fiorella Yanac",
        "email": "fyanac@redhat.com",
        "time": "Thu Sep 07 13:32:00 2023 +0100"
      },
      "committer": {
        "name": "Fiorella Yanac",
        "email": "fyanac@redhat.com",
        "time": "Thu Sep 07 13:32:00 2023 +0100"
      },
      "message": "Add username in resource_setup\n\nThere is a condition when rhel is used as default image\nin tempest, so default_image_is_advanced set as true\nand validation.image_ssh_user is set but\nadvanced_image_ssh_user is not set.\ntest_fragmented_traffic_is_accepted was failing\nbecause advanced_image_ssh_user was empty.\n\nChange-Id: I7fa5b167ba27cc78e017765eca927a1dfb24825e\n"
    },
    {
      "commit": "c1793ca2e84aa336c7a0eaa6a63861120d93758b",
      "tree": "a87a1f8c1a8222ebd63e3dea52830f5999502324",
      "parents": [
        "9cf35d26c8a03610af7119c2c15ed17d8514ed88"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Aug 01 15:51:50 2023 +0200"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed Aug 02 16:55:10 2023 +0200"
      },
      "message": "Skip stateless SG dualstack tests when openvswitch fw driver is used\n\nOpenvswitch firewall driver does not support stateless SG so tests from\nclasses:\nStatelessSecGroupDualStackDHCPv6StatelessTest\nStatelessSecGroupDualStackSlaacTest\n\nfrom the module neutron_tempest_plugin.scenario.test_security_groups\nshould be skipped in such case.\n\nCloses-bz: https://bugzilla.redhat.com/show_bug.cgi?id\u003d2227138\nChange-Id: Ice0f3573dd51851752c745c0b1d35c82bd7808fd\n"
    },
    {
      "commit": "9cf35d26c8a03610af7119c2c15ed17d8514ed88",
      "tree": "d71b2f045cc4c929bc7ae4b5d5620da537bab867",
      "parents": [
        "d5023e1b9914fe93d909ea92b38baba76f2d7869",
        "d5acee3804aec24bdfec5896825abc6b59c90d3c"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Wed Jul 19 20:07:12 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Wed Jul 19 20:07:12 2023 +0000"
      },
      "message": "Merge \"Using \"Designate API\" in addition to DNS query client check\""
    },
    {
      "commit": "d5acee3804aec24bdfec5896825abc6b59c90d3c",
      "tree": "85dadd23d27e06ddc76ba22410b643c1a6de4fe7",
      "parents": [
        "021ce916c6b72f15fa1b873b2c01c1409ca0b37d"
      ],
      "author": {
        "name": "Arkady Shtempler",
        "email": "arkadysh@gmail.com",
        "time": "Thu Sep 29 13:45:52 2022 +0300"
      },
      "committer": {
        "name": "Arkady Shtempler",
        "email": "arkadysh@gmail.com",
        "time": "Mon Jul 17 17:45:31 2023 +0300"
      },
      "message": "Using \"Designate API\" in addition to DNS query client check\n\nAs of now the only validation done in Neutron\u0026Designate E2E scenario\ntest cases is based on DNS query client only.\nAs a result, we don\u0027t really know what\u0027s happens on the Designate side,\nfor example, we wouldn\u0027t expect to see the recordset on Backend if it\nwasn\u0027t previously created on the Designate.\nThis patch improves the situation and it will definitely help on debugging.\nIt will use \"Designate APIs\" when \"query client\" throws an assertion.\nFor example, if \"A\" type recordset wasn\u0027t detected on backend (as expected\nby test), \"Designate APIs\" will be used to provide more details on failure.\n\nChange-Id: Ie2093e457e0b664f36204d61f3020ef84ef15a3e\n"
    },
    {
      "commit": "21874c703f3edc7ca0b8e5a621507b2eeea03cc2",
      "tree": "c7295cd5d72e6977616c96624162cfa42a907518",
      "parents": [
        "75ce4eb4ad1cfe6c220d77a1d8d1ca106554c318",
        "fddcd186a496b4510ca29952e1529430a2072033"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Wed Jul 05 10:30:20 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Wed Jul 05 10:30:20 2023 +0000"
      },
      "message": "Merge \"Add \"-d 1\" option to the ncat client.\""
    },
    {
      "commit": "fddcd186a496b4510ca29952e1529430a2072033",
      "tree": "ec34e115b05ff36f54172648baf869e4b293cbb4",
      "parents": [
        "da45177a2f02c4daf2663872154576e51621c97f"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Jul 04 11:28:06 2023 +0200"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Jul 04 12:15:56 2023 +0200"
      },
      "message": "Add \"-d 1\" option to the ncat client.\n\nIn nc run as client, when it is provided by the nmap (nmap-ncat package\nin Centos/RHEL for example) it could happend that client which was\nstarted with input string given through pipe (echo \"test\" | nc ... ) was\nclosed sooner than it received response from the nc server. In such case\nnc client was finished without error (exit code 0) but also without\nprinting any message from server and that causes tests failures.\n\nTo avoid that there is option \"-d 1\" (--delay) added. According to the\nnc man page [1] this option can be used to configure \"Wait between\nread/writes\".\n\n[1] https://man7.org/linux/man-pages/man1/ncat.1.html\n\nChange-Id: Id49654aa5ca59eeb0585646d3fd5aa0de22337b5\n"
    },
    {
      "commit": "75ce4eb4ad1cfe6c220d77a1d8d1ca106554c318",
      "tree": "084701262e733efd7cb274e5450df533a9be37d0",
      "parents": [
        "2d9bd7002fb6bc4ad9313d5a27438393c544867d",
        "5a9c67741274e49841091221e21365db810b81b1"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Thu Jun 29 21:56:48 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Thu Jun 29 21:56:48 2023 +0000"
      },
      "message": "Merge \"[Stateless SG] Add IPv6 and DHCP related tests\""
    },
    {
      "commit": "da45177a2f02c4daf2663872154576e51621c97f",
      "tree": "b442eb17544515ab870926a5a1b0b5fba6f96746",
      "parents": [
        "6e4d04071bbe672839c791d0f60ebab038c9a3de"
      ],
      "author": {
        "name": "Takashi Kajinami",
        "email": "tkajinam@redhat.com",
        "time": "Wed Mar 22 00:19:39 2023 +0900"
      },
      "committer": {
        "name": "Takashi Kajinami",
        "email": "tkajinam@redhat.com",
        "time": "Mon Jun 19 08:09:20 2023 +0900"
      },
      "message": "Replace deprecated tenant_id property\n\nThe tenant_id property of RestClient in tempest was deprecated in\n25.0.0. This replaces the deprecated property by the new project_id\nproperty to avoid the following warning.\n\nWARNING tempest.lib.common.rest_client [-] Deprecated: \"tenant_id\"\nproperty is deprecated for removal, use \"project_id\" instead\n\nDepends-on: https://review.opendev.org/c/openstack/tempest/+/707938\nChange-Id: Ie3c32f9f2278b78603a4214c5717df8691ba490a\n"
    },
    {
      "commit": "6e4d04071bbe672839c791d0f60ebab038c9a3de",
      "tree": "57ea64d94c24947c333f9d9c03dafad72c7d3591",
      "parents": [
        "604e5778935f928f32a142dc4875881c3605f011",
        "52582a0c1207b9463a6949ae0b0e85a0d9b62002"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Wed Jun 14 21:43:52 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Wed Jun 14 21:43:52 2023 +0000"
      },
      "message": "Merge \"Always run iptables-save as root\""
    },
    {
      "commit": "25e91da47254aabea3f59b46328b3a56fc9259cc",
      "tree": "c12bc87c30399bd00ee20994cce49b8fe4b23396",
      "parents": [
        "19424c5cf1bf6f1a46360070f0622d5a77abe87b",
        "7b1f9b11e66b81eabdc8361c89f8ccfdb3448f9a"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue Jun 06 23:34:07 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue Jun 06 23:34:07 2023 +0000"
      },
      "message": "Merge \"[fwaas]Disassociate all ports before deleting firewall group\""
    },
    {
      "commit": "19424c5cf1bf6f1a46360070f0622d5a77abe87b",
      "tree": "822e785b8b16a79847c42b55e85a5e6d60ec1db7",
      "parents": [
        "fd95bf0b8e52c9f7548b7f72ecb779b78e5da9a9",
        "03bd62ef366e65a994788d50f461000b893c576f"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue Jun 06 23:34:05 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue Jun 06 23:34:05 2023 +0000"
      },
      "message": "Merge \"Don\u0027t check exit status when nc_client is spawned\""
    },
    {
      "commit": "fd95bf0b8e52c9f7548b7f72ecb779b78e5da9a9",
      "tree": "00e2189f60d88ae8e52dbbf97fb408f0b7efa834",
      "parents": [
        "6a6d177d21bcb021c4162eb8c5775fd6b056e6ca",
        "dd5b0e6c48e4a027d1f3f1aa5fc34dc716d1d804"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon Jun 05 22:29:05 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon Jun 05 22:29:05 2023 +0000"
      },
      "message": "Merge \"Don\u0027t use \"Zero-I/O mode\" in nc client in the TCP mode\""
    },
    {
      "commit": "03bd62ef366e65a994788d50f461000b893c576f",
      "tree": "ce1a65ec1cccf8f688b8836e9dfaf7892aa1b1d7",
      "parents": [
        "6a6d177d21bcb021c4162eb8c5775fd6b056e6ca"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Fri Jun 02 10:54:05 2023 +0200"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Fri Jun 02 10:54:05 2023 +0200"
      },
      "message": "Don\u0027t check exit status when nc_client is spawned\n\nIn all cases where we are using nc_client, we rely on the messages\nreturned there in stdout and we don\u0027t really check exit_status codes.\n\nIt seems that e.g. ncat provided by RHEL 9 returns error_code\u003d1 in case\nwhen connection was refused. And that is expected thing e.g. in some\nparts of the port_forwarding related tests.\nTo avoid unexpected failures due to ShellCommandFailed error we\nshouldn\u0027t check exit_code there and always return messages from\nnc_client\u0027s stdout to assert them in the test.\n\nCloses: rhbz#2210233\nChange-Id: I17cebaa34acb0dd6c60bd106eb70656faaebbb04\n"
    },
    {
      "commit": "dd5b0e6c48e4a027d1f3f1aa5fc34dc716d1d804",
      "tree": "1dec9f45eb2dc3cfbd721b6968b3664d398578f5",
      "parents": [
        "318d629308287c199ff937c1b4923a09a56f2984"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed May 31 13:57:25 2023 +0200"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed May 31 13:59:43 2023 +0200"
      },
      "message": "Don\u0027t use \"Zero-I/O mode\" in nc client in the TCP mode\n\nIt seems that using \"Zero-I/O mode\" (\"-z\" option) in nc client is\nnecessary for the UDP tests but it is causing failures when it runs it TCP\nmode.\n\nCloses: rhbz#2211094\nChange-Id: I7d313a7afc60825885854eaa6de858b1f53e5e46\n"
    },
    {
      "commit": "7b1f9b11e66b81eabdc8361c89f8ccfdb3448f9a",
      "tree": "d97cb5f6d5e1bc7571d02c4b916814dc8423c537",
      "parents": [
        "bd7d0e8402af758a5de13ebc98dcb96ef558e61a"
      ],
      "author": {
        "name": "zhouhenglc",
        "email": "zhouhenglc@inspur.com",
        "time": "Thu May 25 08:42:36 2023 +0800"
      },
      "committer": {
        "name": "zhouhenglc",
        "email": "zhouhenglc@inspur.com",
        "time": "Mon May 29 15:56:59 2023 +0800"
      },
      "message": "[fwaas]Disassociate all ports before deleting firewall group\n\nIf the firewall group has associated ports, the firewall group may be in\nan active state. Firewall group is active, deletion is not allowed.\nThis patch cannot solve the bug[1] at the moment. Because there are\nother bugs[2] present.\nWe plan to avoid bugs[2] through patches[3] now. To solve the bug[1].\nThere are other patches[1] here to try and solve the bug[2].\n\nPartial-Bug: #2018967\n\n[1] https://bugs.launchpad.net/neutron/+bug/2018967\n[2] https://bugs.launchpad.net/neutron/+bug/2021457\n[3] https://review.opendev.org/c/openstack/neutron-fwaas/+/884333\n[4] https://review.opendev.org/c/openstack/neutron-fwaas/+/884335\n\nChange-Id: Id328446be8591fac3affe2cf8adeaeee09697085\n"
    },
    {
      "commit": "8c7c5e31f19ed70786d15091f8271ca947778c9c",
      "tree": "516f5ac4aa956023210f2b8d178839a30af7ede3",
      "parents": [
        "bd7d0e8402af758a5de13ebc98dcb96ef558e61a"
      ],
      "author": {
        "name": "elajkat",
        "email": "lajos.katona@est.tech",
        "time": "Mon May 22 15:05:36 2023 +0200"
      },
      "committer": {
        "name": "elajkat",
        "email": "lajos.katona@est.tech",
        "time": "Fri May 26 11:45:25 2023 +0200"
      },
      "message": "Adapt bgpvpn scenarios to recent sRBAC changes\n\nChange-Id: I7a9a1a7a440cf0b6be28abc877b1d895f69e30c9\nRelated-Bug: 2019097\n"
    },
    {
      "commit": "52582a0c1207b9463a6949ae0b0e85a0d9b62002",
      "tree": "16dffe8f41006e1310792bf81db98e07292b5cff",
      "parents": [
        "bd7d0e8402af758a5de13ebc98dcb96ef558e61a"
      ],
      "author": {
        "name": "Brian Haley",
        "email": "haleyb.dev@gmail.com",
        "time": "Thu May 11 11:45:13 2023 -0400"
      },
      "committer": {
        "name": "Brian Haley",
        "email": "haleyb.dev@gmail.com",
        "time": "Thu May 11 11:45:13 2023 -0400"
      },
      "message": "Always run iptables-save as root\n\nWhen there is a failure and we run commands to collect\nnetwork information, the iptables-save command always\nfails in the root namespace:\n\n  Executing command \u0027iptables-save\u0027 on local host (timeout\u003dNone)...\n  Command \u0027iptables-save\u0027 failed (exit_status\u003d4):\n  stderr:\n  iptables-save v1.8.7 (nf_tables): Could not fetch rule set\n    generation id: Permission denied (you must be root)\n\nChange list_iptables() to always use sudo fixes the issue.\n\nTrivialfix\n\nChange-Id: I656569cb333e98f5f55b51b0cfec8e99922424b3\n"
    },
    {
      "commit": "fdfb4741f60a0309939f82f7aa44a11c5f2bbd31",
      "tree": "6f2df4b872c1b168df5c8ab569af6f97ef61fc1b",
      "parents": [
        "3e247e5c769d6759aa56ba959970f3ef2688c49a"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed May 10 12:48:49 2023 +0200"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed May 10 12:52:31 2023 +0200"
      },
      "message": "[S-RBAC] Update DSCP marking rule create API test\n\nIn the test_qos_dscp_create_and_update API test, qos policy was made as\nadmin user (which is correct) but was also owned by admin project. And\nlater, to check if DSCP marking rule was created in that policy\nproperly, regular client is used instead.\nThe problem is that with new S-RBAC API policies, rules are visible to\nowners of the policy, not to all users. And due to that this test is\nfailing with new S-RBAC policies enforced.\n\nThis patch fixes it by changing owner of the qos policy to the regular\nclient\u0027s project.\n\nRelated-Bug: #2018727\nChange-Id: Iadf69c167cdda0017084e482a58116520a1ea80f\n"
    },
    {
      "commit": "5a9c67741274e49841091221e21365db810b81b1",
      "tree": "95314ca2d2e7dd386e8700241360b2a1220cc207",
      "parents": [
        "cb596489a73389b1817d32e8b478f606f3d7f1b8"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Fri Feb 10 16:17:40 2023 +0100"
      },
      "committer": {
        "name": "Ihar Hrachyshka",
        "email": "ihrachys@redhat.com",
        "time": "Tue May 09 19:52:19 2023 +0000"
      },
      "message": "[Stateless SG] Add IPv6 and DHCP related tests\n\nWhen stateless SG are used RA packets may be blocked as there is no\nstateful connections in SG so it will not be by default accepted\nas related to the outgoing RS packets.\nTo confirm that this works fine, this patch adds new, dual stack cases\nfor the test \"test_default_sec_grp_scenarios\". This test is the same as\nexisting test_default_sec_grp_scenarios for stateful and stateless IPv4\nscenarios but additionally checks at the end if IPv6 addresses were\nconfigured properly in the guest VMs.\n\nChange-Id: I1595e5c2072f43e9c8fd7cbfe6fa25815f1ffd92\nDepends-On: Id1328d7cba418fa7c227ae9db4fe83c09fd06035\n"
    },
    {
      "commit": "663bbc29e4bb5d0e4d2212380a0eea091488ae9c",
      "tree": "a7031603ae4e97a6ba0300e524d609083c582c83",
      "parents": [
        "4330ca08687772aaa50867cc48668e2a17098aaf"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed Apr 05 16:30:20 2023 +0200"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Thu Apr 20 14:53:45 2023 +0000"
      },
      "message": "Get nc client\u0027s command based on the nc on correct host\n\nAs nc client\u0027s command depends on the nc version installed\nit should be checked on the host where it is going to be run.\nBefore this patch it was always checked on the host where tempest\nwas running and that could cause some issues e.g. when tempest\nwas run on RHEL 8/Centos 8 host and Cirros was used for guest VMs.\n\nChange-Id: Ib0ce72a1b622d0f6fcda24f4b78f627092edf639\n"
    },
    {
      "commit": "271403ae7eb792f65d9af2441703e2f66300fdc6",
      "tree": "e08d015912d5b0e1c78fb122c36b4fec0b5e80f6",
      "parents": [
        "6bcc06e5593e744dffe1690decf752c11c9df1c8"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Apr 11 11:16:30 2023 +0200"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Apr 11 11:20:46 2023 +0200"
      },
      "message": "Set unlimited SG rules quota in security groups scenario tests\n\nThere is a lot of SG rules created in those tests so lets not fail\njust due to SG rules quota reached for the test project.\n\nCloses: rhbz#2184349\nChange-Id: I717452abeb708fa6007db95a810be3d628b47f39\n"
    },
    {
      "commit": "2e6ef175c809e8de3b0164661f2d63c4c6be3a7c",
      "tree": "757c572ebfc2d7ffb6d7ac55468931749a90025a",
      "parents": [
        "32b0f8b7ae8d86c9c332182a6c60f5a75b2c4622"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed Mar 15 15:01:35 2023 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Mar 28 08:15:25 2023 +0000"
      },
      "message": "[Stateless SG] Test fragmented traffic is allowed by stateless SG\n\nThis patch adds scenario test to ensure that fragmented traffic can be\nsend properly between VMs which are using stateless SG.\nThere is no need to add same test for stateful SG as this is already\ncovered by various tests in neutron_tempest_plugin.scenario.test_mtu\nmodule.\n\nChange-Id: Id07a2bee283c33aeb083e68599faecec467a9844\n"
    },
    {
      "commit": "32b0f8b7ae8d86c9c332182a6c60f5a75b2c4622",
      "tree": "936c6b91922b4e70bebbc0c0ae55219e6af01125",
      "parents": [
        "365373910cef371a79ae9bd8e905ce41c1a7cb0a"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Fri Mar 10 17:03:20 2023 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Mar 28 08:15:20 2023 +0000"
      },
      "message": "[Stateless SG] Test if TCP packets with various conn state are allowed\n\nIn stateless SG there is no connection track so TCP packet of any type\nshould be allowed by SG. This patch adds test which spawns 2 vms,\nconnected to 2 different networks and the same router. Both vms are\nusing different stateless SGs. Finally test asserts that packets of any\nof the TCP type (syn, ack, syn-ack, psh, rst, fin) sent from one of the\nvms can reach second one.\n\nChange-Id: I23a4b282c83101526af05aa309d578aecaef1fa9\n"
    },
    {
      "commit": "365373910cef371a79ae9bd8e905ce41c1a7cb0a",
      "tree": "d751d560eff743b57cd731ac141e65d7a7390140",
      "parents": [
        "b327a6342fa52d93ffd21dca3679c2e5e402f7d5"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Fri Mar 10 11:31:34 2023 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Mar 28 08:15:11 2023 +0000"
      },
      "message": "[Stateless SG] Ensure replies won\u0027t work without ingress rule\n\nThis patch extends existing\ntest_connectivity_between_vms_using_different_sec_groups\nin the way that for stateless SG rules it makes sure that replies from\nserver to client will not work without explicity add SG rule which will\nallow ingress traffic on the ephemeral ports\u0027 range.\n\nChange-Id: I940678c15b65552634096ea3e72888b5bf830912\n"
    },
    {
      "commit": "b327a6342fa52d93ffd21dca3679c2e5e402f7d5",
      "tree": "a292e84884d79f0a6e6edf67eb5ff76b85593471",
      "parents": [
        "1f7870e60ea50289d422f3446f2bdf33845c6c11"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Thu Feb 23 07:59:12 2023 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Mar 28 08:15:04 2023 +0000"
      },
      "message": "[Stateless SG] Add test to check connectivity between vms\n\nThis patch adds new test (for both stateful and stateless type of\nsecurity groups) which creates: 2 VMs connected to 2 different networks\nand using 2 different SGs. Both networks connected to the same router.\nFinally it checks TCP connectivity between VMs.\nIn case of stateless SG additional security group rule needs to be added\nto allow ingress traffic on the ephemeral ports\u0027 range.\n\nChange-Id: Icf318d8e7a76286ee2c2b8626d80e554aa5289f6\n"
    },
    {
      "commit": "1f7870e60ea50289d422f3446f2bdf33845c6c11",
      "tree": "833496446ca100be9bddfec3bedde25389671375",
      "parents": [
        "a8d67e6f3bccf9cd9946b0dcd73eb95c248783e1"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Mon Mar 20 12:18:32 2023 +0100"
      },
      "committer": {
        "name": "Rodolfo Alonso Hernandez",
        "email": "ralonsoh@redhat.com",
        "time": "Mon Mar 27 15:26:47 2023 +0200"
      },
      "message": "Skip stateless SG related tests for backends which don\u0027t support it\n\nCurrently stateless SGs are supported by ML2/OVN backend and by backends\nwhich uses iptables based firewall driver.\nIt\u0027s not supported e.g. by ML2/OVS with \u0027openvswitch\u0027 fw driver thus\nthose tests should be skipped in case of that backend driver.\n\nChange-Id: I9fa572c3b7eda96706caa2ba1a181de475357804\n"
    },
    {
      "commit": "9367ead530bcb01e7f92d7eb60328b40fcde9a23",
      "tree": "a3be3ce488b5888c7a9a84838379abe938fa529f",
      "parents": [
        "bf1b7019d252d43e27b81e19db595453c49818fb"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Fri Mar 10 10:07:38 2023 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed Mar 15 11:18:50 2023 +0000"
      },
      "message": "[Stateless SG] Add test to check change stateful to stateless SG\n\nThis scenario test applies stateful SG to the VM, ensures that\nconnectivity is working fine and then detach SG from the vm, update it\nto be stateless, attach again and ensures that connectivity is working\nstill fine.\n\nChange-Id: I99cf5edf79a77f5940d28fa760e03b66d289be20\n"
    },
    {
      "commit": "bf1b7019d252d43e27b81e19db595453c49818fb",
      "tree": "f81fd1731f12a489c274db8bae32feece8aad463",
      "parents": [
        "cc548bfc01a56f51e94a81c1ce65d498c20020b9"
      ],
      "author": {
        "name": "elajkat",
        "email": "lajos.katona@est.tech",
        "time": "Wed Jan 12 14:32:59 2022 +0100"
      },
      "committer": {
        "name": "Rodolfo Alonso",
        "email": "ralonsoh@redhat.com",
        "time": "Wed Mar 08 09:31:39 2023 +0000"
      },
      "message": "Move test_dhcp_port_status_active to tempest\n\ntest_dhcp_port_status_active is the only missing test in\ntempest.api.network.admin.test_dhcp_agent_scheduler.\nDHCPAgentSchedulersTestJSON compared to\nn_t_p.api.admin.test_dhcp_agent_scheduler.DHCPAgentSchedulersTestJSON.\nBy moving it from n-t-p we can get rid of the whole module, reducing the\ntest duplications.\n\nChange-Id: Icbe0b31b44254bc55f52b34ebc5c71ec864307ac\nDepends-On: https://review.opendev.org/c/openstack/tempest/+/824440\n"
    },
    {
      "commit": "cc548bfc01a56f51e94a81c1ce65d498c20020b9",
      "tree": "d34af512063d7ca291b018761e4a5d78138aadb0",
      "parents": [
        "23700da1d3f762906ab92019d999da06ee448126",
        "7b8fa63f41e264e6258dc77469e034bd177913be"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue Mar 07 16:58:25 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue Mar 07 16:58:25 2023 +0000"
      },
      "message": "Merge \"Fix the way how default SG for project if found in SG scenario test\""
    },
    {
      "commit": "7b8fa63f41e264e6258dc77469e034bd177913be",
      "tree": "d9a28797f44275f2398cd38efcf32f3360f016fe",
      "parents": [
        "1577dc850a6779b32c18fe28e7abc6476ba1abe7"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Thu Mar 02 10:58:04 2023 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Thu Mar 02 10:58:34 2023 +0100"
      },
      "message": "Fix the way how default SG for project if found in SG scenario test\n\nPreviously it was just getting list of SGs and assumed that first one in\nthe list is the \"default\" one. It\u0027s not always true so now there is\nhelper method which lists of SGs for project and looks for the one with\nname \"default\" as this name is hardcoded in Neutron.\n\nChange-Id: I608677547c9c8ae00af8821622cefa0955d692c6\n"
    },
    {
      "commit": "0ea053cb32fc292c643dae4c0d1518382f25f70d",
      "tree": "420e1b715cde091ea9337146a0c02a84622ce178",
      "parents": [
        "57c84781baadfbc63a353ac0d8a25b89e972f0b7"
      ],
      "author": {
        "name": "Maor Blaustein",
        "email": "blue@redhat.com",
        "time": "Thu Feb 16 17:23:53 2023 +0200"
      },
      "committer": {
        "name": "Maor Blaustein",
        "email": "blue@redhat.com",
        "time": "Thu Feb 16 17:23:53 2023 +0200"
      },
      "message": "Drop stateless_sg property check from base method\n\nThis patch is addition to patch [1], in which tests of stateless\nsecurity group feature are checking for stateless_sg property,\nand adding ingress rule accordingly.\n\nThis patch drops extra internal check inside\ncreate_ingress_metadata_secgroup_rule, so it can be used without\ndependency in stateless_sg property.\n\nFor example:\nWhen testing security group logging integration with stateless\nsecurity groups, there will be no need to add specifically that extra\nstateless_sg property.\n\n[1] https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/871397\n\nChange-Id: Ic7b021ad262549aee0e4b3ef951791a6d30580b4\n"
    },
    {
      "commit": "d270ea2d0aafc5771c0b5e44d5f4d235fb99bf4e",
      "tree": "451814a5c4b0779f2eec6acda1ee7f0809642ffb",
      "parents": [
        "481f19fb786d2f7a8420f6f061791b9c9f91482a",
        "387d1b1b1829f9da317a790212effd74492c88fe"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon Feb 13 16:26:33 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon Feb 13 16:26:33 2023 +0000"
      },
      "message": "Merge \"[Stateless SG] Fix usage of the default stateless SG\""
    },
    {
      "commit": "387d1b1b1829f9da317a790212effd74492c88fe",
      "tree": "5e258e494206c4e917ee7efda7f298768b227bdb",
      "parents": [
        "5e78bd4ca0d26f76ff58ba480c1453b062f3b7bc"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Fri Feb 10 14:58:24 2023 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Fri Feb 10 16:30:36 2023 +0100"
      },
      "message": "[Stateless SG] Fix usage of the default stateless SG\n\nIn the test test_default_sec_grp_scenarios default SG from project is\nused. In the stateless tests suite this group wasn\u0027t really stateless\nas default group is always created as stateful initiall.\nThis patch adds update of the SG to ensure that it is stateless when\nneeded.\n\nChange-Id: I6774f586b1a0a531d277cf5954737a0dfd1f2a5c\n"
    },
    {
      "commit": "f331c6f3efd79be53e27e3a35a8fd84b10a4cd66",
      "tree": "617440b8b5396a5e2bd6db36234ad357d07e8aa1",
      "parents": [
        "798bb36bf135b97da41322360ea2724384b7e5e2",
        "661d1ffc31dbb7722fcefec23af1b7eff600f893"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Thu Feb 09 17:36:31 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Thu Feb 09 17:36:31 2023 +0000"
      },
      "message": "Merge \"[Stateless SG] Add negative API tests for Stateless SG\""
    },
    {
      "commit": "661d1ffc31dbb7722fcefec23af1b7eff600f893",
      "tree": "ddc98636a5bb50cac571d302fb6f2f9827279da5",
      "parents": [
        "bb0cf73edec8f1d72826c4b092c9fc1b517c33ca"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Mon Jan 30 12:43:47 2023 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Mon Jan 30 12:45:52 2023 +0100"
      },
      "message": "[Stateless SG] Add negative API tests for Stateless SG\n\nThis patch adds negative API tests which checks that:\n- port can\u0027t be created with both stateless and stateful SG,\n- SG with different type than already used can\u0027t be added to the port,\n- toggle \u0027stateful\u0027 attribute of SG when it\u0027s used by port,\n\nChange-Id: I70089725f590c346e976bc579dd78d6cf374f0c3\n"
    },
    {
      "commit": "a20bcddf514ea2fc3ee445d8547cbf520c32bdfb",
      "tree": "8320285c05b66a44ff061e732466e871ca7db70f",
      "parents": [
        "bb0cf73edec8f1d72826c4b092c9fc1b517c33ca"
      ],
      "author": {
        "name": "Maor Blaustein",
        "email": "blue@redhat.com",
        "time": "Sun Jan 22 16:57:25 2023 +0200"
      },
      "committer": {
        "name": "Maor Blaustein",
        "email": "blue@redhat.com",
        "time": "Sun Jan 22 16:57:25 2023 +0200"
      },
      "message": "Stateful SG tests without ingress metadata rule\n\nIn case stateful security groups are tested,\nthen the security group rule that allows ingress metadata isn\u0027t needed.\n\nChange-Id: I33dce15a708dac36d20f5ef5eb006c2033bbeee8\n"
    },
    {
      "commit": "58c5d47ed8d9beb628261d589c6746e6b3059dad",
      "tree": "1a4a964487228fbf553f70894c184560f8ec3d0d",
      "parents": [
        "ad03ebf2da660ff7ab5a86ecd36d44fa99ba29d3"
      ],
      "author": {
        "name": "Eduardo Olivares",
        "email": "eolivare@redhat.com",
        "time": "Thu Jan 12 10:04:02 2023 +0100"
      },
      "committer": {
        "name": "Eduardo Olivares",
        "email": "eolivare@redhat.com",
        "time": "Thu Jan 12 09:18:11 2023 +0000"
      },
      "message": "Make dns_domain value configurable\n\nTest test_dns_domain_and_name uses a hardcoded dns_domain value, which\ncorresponds with the value configured in neutron repository.\nThis value could change and/or it can be different in other CI jobs.\nDue to that, with this patch the dns_domain value becomes configurable.\n\nChange-Id: Ib35b2ecd3a7350f5b744e5e063cfa25b1ecd4806\n"
    },
    {
      "commit": "ad03ebf2da660ff7ab5a86ecd36d44fa99ba29d3",
      "tree": "11e1f0abec00dd97b2d8d453af3f7a8ecba65ee3",
      "parents": [
        "0842e33f75f067760872128347f36736af888884",
        "83979b9205612353e8cdcdff5d4ca28c83003f24"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Wed Jan 11 17:29:27 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Wed Jan 11 17:29:27 2023 +0000"
      },
      "message": "Merge \"Run security group scenario tests against stateless security groups too\""
    },
    {
      "commit": "61e303a97e72b14ab8de6d551a7787aadb216b7b",
      "tree": "15775ace3aae5f00b0777d5ed0bf6eee5880d191",
      "parents": [
        "c22f3107a45d067fa17e7f9689c30fbbb21b5647",
        "4dee1c27271b4ad8057acecc04db9650a3420fb4"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Wed Jan 04 16:58:23 2023 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Wed Jan 04 16:58:23 2023 +0000"
      },
      "message": "Merge \"Run security group api tests against stateless security groups too\""
    },
    {
      "commit": "83979b9205612353e8cdcdff5d4ca28c83003f24",
      "tree": "69a36ea1fe7c8f0f951aa12e0f41f7b1686246c3",
      "parents": [
        "f8eda8fdacd3e2ca6a7e42262467bf974c321319"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Thu Dec 15 14:15:12 2022 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Thu Dec 22 15:44:02 2022 +0000"
      },
      "message": "Run security group scenario tests against stateless security groups too\n\nWith this patch all relevant scenario tests related to Security groups will be\nrun for the default (stateful) security groups and also for stateless\nsecurity groups by passing \"stateful\u003dFalse\" to the\ncreate_security_group() function.\n\nChange-Id: I0bca93e9eac311978ef65c15af5ea793e2164631\n"
    },
    {
      "commit": "4dee1c27271b4ad8057acecc04db9650a3420fb4",
      "tree": "544166d04683883d1b76aba264fcf016d5616fb4",
      "parents": [
        "f8eda8fdacd3e2ca6a7e42262467bf974c321319"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Mon Dec 12 14:37:07 2022 +0100"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Wed Dec 21 11:02:03 2022 +0000"
      },
      "message": "Run security group api tests against stateless security groups too\n\nWith this patch most of the API tests related to Security groups will be\nrun for the default (stateful) security groups and also for stateless\nsecurity groups by passing \"stateful\u003dFalse\" to the\ncreate_security_group() function.\n\nChange-Id: I66af24513ba126c1cd00ca896bbd56a448faf726\n"
    },
    {
      "commit": "aca1ac73ad7dda89afa8288f73fc9af8e234a66a",
      "tree": "677ffdfc16d3c69e910d3cd0635737cef8d721c5",
      "parents": [
        "ff70d53e36da761721ececace637ca7b57c2251a"
      ],
      "author": {
        "name": "Rodolfo Alonso Hernandez",
        "email": "ralonsoh@redhat.com",
        "time": "Mon Nov 07 14:12:18 2022 +0000"
      },
      "committer": {
        "name": "Rodolfo Alonso",
        "email": "ralonsoh@redhat.com",
        "time": "Fri Nov 25 14:56:05 2022 +0000"
      },
      "message": "Skip \"test_port_resource_request_no_provider_net_conflict\"\n\nSkip this test while LP#1991965 is being implemented. This new\nfeature will avoid having ports with minimum bandwidth rules on\noverlay networks. Once implemented, this test will be removed\nand new tests added to this repository.\n\nChange-Id: I275495299866310d6bd0df50fd22d7ea7116a23b\nRelated-Bug: #1991965\n"
    },
    {
      "commit": "bdacaa20efaada913832567159e0cfe3f850012c",
      "tree": "6ac9a08167971c8803daee89b3d046eb3be7d952",
      "parents": [
        "a21e2195677e237fb5485b5268ddf23c7db2d76b"
      ],
      "author": {
        "name": "zhouhenglc",
        "email": "zhouhenglc@inspur.com",
        "time": "Thu Sep 08 08:47:04 2022 +0800"
      },
      "committer": {
        "name": "zhouhenglc",
        "email": "zhouhenglc@inspur.com",
        "time": "Fri Sep 09 09:30:29 2022 +0800"
      },
      "message": "list floating ip api contains port forwarding id\n\nNeutron has added a new extension `floating-ip-port-forwarding-detail`,\nwhich defines that when listing floating ip, it returns the port\nforwardng\u0027s id and \u0027internal_port_id\u0027.\nThis patch updates the list floating ip verification content.\n\n[1] https://review.opendev.org/c/openstack/neutron/+/840565\n\nChange-Id: I5a82d745a9bd9d098ddf8902cdd58d1e81bd80ea\n"
    },
    {
      "commit": "a21e2195677e237fb5485b5268ddf23c7db2d76b",
      "tree": "006097873372bd31ed12d7809ceaa5944c08cd8a",
      "parents": [
        "02e4fbc4b4bb56070a5db8ab9f7ffe9522806fb9",
        "14d9215c9ab22e84788ce83cbc563535f2fdf1c7"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Wed Sep 07 14:48:46 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Wed Sep 07 14:48:46 2022 +0000"
      },
      "message": "Merge \"Create extra external network with address scope for `ndp proxy` tests\""
    },
    {
      "commit": "02e4fbc4b4bb56070a5db8ab9f7ffe9522806fb9",
      "tree": "ad8da60e8fa9f9a431f111a1a72c0eb9a26e6dc2",
      "parents": [
        "97af634ac3d4f02da82eecda66be66049ac2d0d8"
      ],
      "author": {
        "name": "zhouhenglc",
        "email": "zhouhenglc@inspur.com",
        "time": "Thu May 05 16:11:07 2022 +0800"
      },
      "committer": {
        "name": "zhouhenglc",
        "email": "zhouhenglc@inspur.com",
        "time": "Tue Sep 06 10:53:06 2022 +0800"
      },
      "message": "skip some port_forwarding test\n\nneutron adds port_forwarding id when list floatingip[1], because there\nis currently no method to quickly determine the extension that is\nactually loaded. updating temptest and neutron patch are interdependent.\nfirst skip some port_forwarding test, after neutron patch merged, add\n`floating-ip-port-forwarding-detail` and revalidate the test.\n\n[1] https://review.opendev.org/c/openstack/neutron/+/840565\n\nChange-Id: I8a69d8786350f80d563f98607177c015134be523\n"
    },
    {
      "commit": "14d9215c9ab22e84788ce83cbc563535f2fdf1c7",
      "tree": "36b9d32c556c37cb5d427ea0206ede26fb8ada49",
      "parents": [
        "97af634ac3d4f02da82eecda66be66049ac2d0d8"
      ],
      "author": {
        "name": "yangjianfeng",
        "email": "yjf1970231893@gmail.com",
        "time": "Tue Sep 06 10:42:29 2022 +0800"
      },
      "committer": {
        "name": "yangjianfeng",
        "email": "yjf1970231893@gmail.com",
        "time": "Tue Sep 06 10:51:59 2022 +0800"
      },
      "message": "Create extra external network with address scope for `ndp proxy` tests\n\nFor details, please refer to https://review.opendev.org/855850\n\nCloses-Bug: #1987410\nChange-Id: I9f3176a9688db8c4f4417139b712d1570c5ab7bb\n"
    },
    {
      "commit": "3de3cd9781e323e001204dae7b7fa6115907a2c8",
      "tree": "39e32789d2d0f51eba688a93a53c4f8af65ae6e5",
      "parents": [
        "5684d5e96de431a6850bd78ab8e077699b879e97"
      ],
      "author": {
        "name": "Rodolfo Alonso Hernandez",
        "email": "ralonsoh@redhat.com",
        "time": "Tue Aug 23 21:41:02 2022 +0200"
      },
      "committer": {
        "name": "Rodolfo Alonso",
        "email": "ralonsoh@redhat.com",
        "time": "Fri Aug 26 15:14:44 2022 +0000"
      },
      "message": "Retrieve the DSCP valid marks from the API\n\nInstead of relying on a constant, read the DSCP valid supported marks\nfrom the API, using the \u0027qos-rule-type-details\u0027 call [1].\n\n[1]https://docs.openstack.org/api-ref/network/v2/index.html?expanded\u003dshow-qos-rule-type-details-detail#show-qos-rule-type-details\n\nRelated-Bug: #1987378\nChange-Id: I207e32a966fb43d6f34fac4a160d69944a19217b\n"
    },
    {
      "commit": "5684d5e96de431a6850bd78ab8e077699b879e97",
      "tree": "e03a3923197abd658ec8e6e2510141958fd8afdd",
      "parents": [
        "f6d2d887bea6aca0ab86b84888ed60e2adf7392b"
      ],
      "author": {
        "name": "Alex Katz",
        "email": "akatz@redhat.com",
        "time": "Mon Aug 15 23:50:24 2022 +0300"
      },
      "committer": {
        "name": "Alex Katz",
        "email": "akatz@redhat.com",
        "time": "Tue Aug 16 17:15:01 2022 +0300"
      },
      "message": "Use StatefulConnection class to verify connectivity in SG tests\n\nThere are two security group tests that are running for more than\n20 minutes with RHEL image:\n - test_multiple_ports_portrange_remote\n - test_overlapping_sec_grp_rules\nIt happens because of the lack of privileges. I think it makes\nsense to utilize the existing StatefulConnection class as it\nhas better service handling (start/stop) with all necessary\npermissions\n\nChange-Id: Iaca6fd3e6ed3c64ab3ca22817ad461479ecfa189\n"
    },
    {
      "commit": "f6d2d887bea6aca0ab86b84888ed60e2adf7392b",
      "tree": "394ddeaebad74e30ded7ca4d5ddca3e67c36e064",
      "parents": [
        "305ea4a74811d395fbe9b59c116c67a35c341ffa",
        "111226608a396676c051da3e90cf151f38af2725"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue Aug 16 09:03:17 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue Aug 16 09:03:17 2022 +0000"
      },
      "message": "Merge \"Delete tcp rule from a security group\""
    },
    {
      "commit": "305ea4a74811d395fbe9b59c116c67a35c341ffa",
      "tree": "c4dfc34ce66c7239fb7755b95e04f02d5367020a",
      "parents": [
        "7b2f5c38a1b5483c0cb8a767e74ae12e3df6c63b"
      ],
      "author": {
        "name": "Alex Katz",
        "email": "akatz@redhat.com",
        "time": "Wed Aug 10 19:47:03 2022 +0300"
      },
      "committer": {
        "name": "Alex Katz",
        "email": "akatz@redhat.com",
        "time": "Wed Aug 10 19:47:03 2022 +0300"
      },
      "message": "Make the StatefulConnection class to work with priviliged ports\n\nRoot permissions are required to bind a listener to priviliged\nports (\u003c1024). Need to make sure that StatefulConnection class\ncan work with that\n\nChange-Id: I74581b4b15b7a857cd5845644c776175246a5293\n"
    },
    {
      "commit": "111226608a396676c051da3e90cf151f38af2725",
      "tree": "5c8f1fef2f1535d7ee05d133733cb2ba9cf799e0",
      "parents": [
        "e3230013a6bfd6410fa7edbf92bb307f9c8eb237"
      ],
      "author": {
        "name": "Ayenachew Molla",
        "email": "amolla@redhat.com",
        "time": "Thu Jun 30 15:49:01 2022 +0300"
      },
      "committer": {
        "name": "Ayenachew Molla",
        "email": "amolla@redhat.com",
        "time": "Wed Aug 10 17:42:10 2022 +0300"
      },
      "message": "Delete tcp rule from a security group\n\n1.List the tcp rule id by SG id and port-range\n2.Delete the tcp rule from the security group\n3.Verify that conections are not working\n\nChange-Id: I63ce3029bc69206671255f8a2335d88d15646ea2\n"
    },
    {
      "commit": "7b2f5c38a1b5483c0cb8a767e74ae12e3df6c63b",
      "tree": "c0a92019e5da521fa4a1bb70232569ef7f9f057a",
      "parents": [
        "802062b7fb1682b136d3208c31b71ac8744e9cab",
        "e3230013a6bfd6410fa7edbf92bb307f9c8eb237"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue Jul 05 08:40:42 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue Jul 05 08:40:42 2022 +0000"
      },
      "message": "Merge \"Add a test for removing security group from ACTIVE instance\""
    },
    {
      "commit": "e3230013a6bfd6410fa7edbf92bb307f9c8eb237",
      "tree": "078b536800c362bed0ac1498b75ab86cdad83556",
      "parents": [
        "34bd09c75880b547abee1bafb08a9e8f923c6607"
      ],
      "author": {
        "name": "Ayenachew Molla",
        "email": "amolla@redhat.com",
        "time": "Tue Jun 07 12:15:49 2022 +0300"
      },
      "committer": {
        "name": "Ayenachew Molla",
        "email": "amolla@redhat.com",
        "time": "Wed Jun 29 11:22:32 2022 +0300"
      },
      "message": "Add a test for removing security group from ACTIVE instance\n\nTest name: \"test_remove_sec_grp_from_active_vm\"\n1) Create SG associated with ICMP rule\n2) Create Port (assoiated to SG #1) and use it to create the VM\n3) Ping the VM, expected should be PASS\n4) Remove the security group from VM by Port update\n5) Ping the VM, expected should be FAIL\n\nChange-Id: I9fbcdd0f30beeb6985bab4de4d53af639f408c75\n"
    },
    {
      "commit": "318ec127c548d4f3cba1ceb9edb11c5d250b1786",
      "tree": "a1e88ca5d4138f0a57197ce5679917ff75b2e2b3",
      "parents": [
        "6d0971539edd8b6c3196f54a52e648557f5e8908",
        "2936a2952c9ea7ce3ee6f50c08e64abd2efed3e0"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Wed Jun 22 17:12:48 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Wed Jun 22 17:12:48 2022 +0000"
      },
      "message": "Merge \"Add ndp proxy API tests\""
    },
    {
      "commit": "e04c39063dc3c408ec35eb507f2917ab77741b80",
      "tree": "f127801cecd33b83ce19cb1842caf8648cd2fb16",
      "parents": [
        "724ac6f962dbcbee85c9d0d3e6f3e0e7b956af44",
        "823b1a05bf53715a9d353818c6c6987f1e20d5dd"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Wed Jun 15 11:52:40 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Wed Jun 15 11:52:40 2022 +0000"
      },
      "message": "Merge \"Set mac inside vm to the vlan interface\""
    },
    {
      "commit": "2936a2952c9ea7ce3ee6f50c08e64abd2efed3e0",
      "tree": "bdd4e81a103c76c5598ba99a94d42eff34d46bfb",
      "parents": [
        "724ac6f962dbcbee85c9d0d3e6f3e0e7b956af44"
      ],
      "author": {
        "name": "yangjianfeng",
        "email": "yjf1970231893@gmail.com",
        "time": "Fri Feb 04 11:22:11 2022 +0800"
      },
      "committer": {
        "name": "yangjianfeng",
        "email": "yjf1970231893@gmail.com",
        "time": "Tue Jun 14 12:06:28 2022 +0800"
      },
      "message": "Add ndp proxy API tests\n\nDepends-on: https://review.opendev.org/845662\nChange-Id: I7393b74b8a715de92b5aebccf11b30971ea7747a\nPartial-Bug: #1877301\n"
    },
    {
      "commit": "33a0ae48162e047d396e84a5d5b70ef8f0bdfaa1",
      "tree": "d0401f43f741dd190767d03f9af2fd84a82099c1",
      "parents": [
        "074c464f3d82b2a82e8fc12472ec5454bd6d4400",
        "13546b825e7e9aa39359d533bd41af4a13804ffc"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon Jun 06 15:04:23 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon Jun 06 15:04:23 2022 +0000"
      },
      "message": "Merge \"Remove \"distutils\" library\""
    },
    {
      "commit": "823b1a05bf53715a9d353818c6c6987f1e20d5dd",
      "tree": "aa5547957c7b43f2706c3d79327469884ec972e6",
      "parents": [
        "074c464f3d82b2a82e8fc12472ec5454bd6d4400"
      ],
      "author": {
        "name": "Miguel Angel Nieto Jimenez",
        "email": "mnietoji@redhat.com",
        "time": "Fri Jun 03 12:58:55 2022 +0000"
      },
      "committer": {
        "name": "Miguel Angel Nieto Jimenez",
        "email": "mnietoji@redhat.com",
        "time": "Fri Jun 03 12:58:55 2022 +0000"
      },
      "message": "Set mac inside vm to the vlan interface\n\nmac address should match the neutron port mac address\n\nChange-Id: I6b5b35ff92d533224ff26cbf2e64bbff62ee308c\n"
    },
    {
      "commit": "fc376047948826ac5906e8c628baf8972d449803",
      "tree": "0a3ee5307072de1ecbdb817d6ee4aabad9adc90c",
      "parents": [
        "6dcc0e81b5f3c656181091025f351eb479cdde21"
      ],
      "author": {
        "name": "elajkat",
        "email": "lajos.katona@est.tech",
        "time": "Tue May 17 15:53:40 2022 +0200"
      },
      "committer": {
        "name": "yatinkarel",
        "email": "ykarel@redhat.com",
        "time": "Thu May 19 11:03:21 2022 +0530"
      },
      "message": "taas: use ssh_key_type from config for taas scenario\n\nCloses-Bug: #1973755\nRelated-Bug: #1963907\n\nDepends-On: https://review.opendev.org/c/openstack/neutron-fwaas/+/842254\nDepends-On: https://review.opendev.org/c/openstack/tap-as-a-service/+/842134\nChange-Id: I0d3021f32e71519721723548873a66523035fddd\n"
    },
    {
      "commit": "13546b825e7e9aa39359d533bd41af4a13804ffc",
      "tree": "28c4163edcff506a27fcadb797503d0e4b28fd47",
      "parents": [
        "6dcc0e81b5f3c656181091025f351eb479cdde21"
      ],
      "author": {
        "name": "Rodolfo Alonso Hernandez",
        "email": "ralonsoh@redhat.com",
        "time": "Thu May 12 23:56:47 2022 +0000"
      },
      "committer": {
        "name": "Rodolfo Alonso Hernandez",
        "email": "ralonsoh@redhat.com",
        "time": "Fri May 13 00:00:10 2022 +0000"
      },
      "message": "Remove \"distutils\" library\n\nLibrary \"distutils\" will be marked as deprecated in Python 3.10:\nhttps://peps.python.org/pep-0386/\n\nThis patch does the following replacements, that provide the same\nfunctionality and API:\n- distutils.version.StrictVersion -\u003e packaging.version.Version\n\nChange-Id: I0fc0c2ac7a545b8250e05586f48226953f3595df\nCloses-Bug: #1973780\n"
    },
    {
      "commit": "94db003aa0241b3bee93d0b52b4fec5ab1b2a531",
      "tree": "5fcb6417249c30768c89fe66995e1c111b2f0711",
      "parents": [
        "631776b8f5127b82bca9d702d5cb780cc4d5ba3c",
        "edea483d95814204abde5cab1fee701537699ed6"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 17:01:42 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 17:01:42 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove setup_clients method\""
    },
    {
      "commit": "631776b8f5127b82bca9d702d5cb780cc4d5ba3c",
      "tree": "a6f8892b76a02d6cabb3545fe2e3707b6f5646d0",
      "parents": [
        "73acd7e134b010c2c3ebdbc918b8a50474d2b2a4",
        "12cd47abccc2d31c2c41600bdc4ad865e3e4f5e3"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 17:01:39 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 17:01:39 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove _get_server_port_id_and_ip4 \u0026 check_vm_connectivity\""
    },
    {
      "commit": "73acd7e134b010c2c3ebdbc918b8a50474d2b2a4",
      "tree": "81edd12cd69f10866eb211b94c816abe1fbcdeb1",
      "parents": [
        "59c784c150bf847f548240895070f918cca390bb",
        "97ceb4e5bf65ab4e89f3dfaf1a792b1d077f796b"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 17:01:36 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 17:01:36 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove _get_router \u0026 _create_network\""
    },
    {
      "commit": "59c784c150bf847f548240895070f918cca390bb",
      "tree": "05651c2b8908c4d93579bdd059bb710adea31e82",
      "parents": [
        "f1b5c2d7fb567324550beb4c7f7a60c1bc13474d",
        "1bf4f9380fee609d005e950b43b4964dabc4613e"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 16:48:09 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 16:48:09 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove _create_subnet \u0026 _check_tenant_network_connectivity\""
    },
    {
      "commit": "f1b5c2d7fb567324550beb4c7f7a60c1bc13474d",
      "tree": "871d298c6e43b0d4d19d5daa5a8e7da3b592d6e9",
      "parents": [
        "660312c1a5deefc39a5be48caacf685b87e3f391",
        "17587c3e1dea7dac15347e1ab31b4c41617aad00"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 16:48:07 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 16:48:07 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove create_networks \u0026 create_floating_ip\""
    },
    {
      "commit": "660312c1a5deefc39a5be48caacf685b87e3f391",
      "tree": "f2346d430386e2c13686c9356ef36b53d3789411",
      "parents": [
        "fbaf0e8af00b814bd4947636eff09988b98d70ef",
        "9aa4811fb1e16b4f3c7e18d974dfd028d90be940"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 16:35:21 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 16:35:21 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove _get_network_by_name \u0026 check_floating_ip_status\""
    },
    {
      "commit": "fbaf0e8af00b814bd4947636eff09988b98d70ef",
      "tree": "9e0bd8a41b8a4b43b3fd57a80995fdafef09cd77",
      "parents": [
        "e08839201737900fb1b5e04e19ba586598f6b2df",
        "2ef30675e524ac2a0b0b9505ac479fea89b1db4d"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 00:11:57 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 00:11:57 2022 +0000"
      },
      "message": "Merge \"[bgpvpn] Remove get_remote_client\""
    },
    {
      "commit": "e08839201737900fb1b5e04e19ba586598f6b2df",
      "tree": "a6a923e67db14627394c4893b8ae01ad071aed73",
      "parents": [
        "babacab1ad957a6cfc3e42eff1e0d68474c951a3",
        "c96f065ff1f60fef212ccf334b68ebd2e9de7c50"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 00:11:55 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 00:11:55 2022 +0000"
      },
      "message": "Merge \"[bgpvpn] Remove setup_clients method\""
    },
    {
      "commit": "babacab1ad957a6cfc3e42eff1e0d68474c951a3",
      "tree": "38b2bcd667a0dfde9c74dec7203ce05c0c39b800",
      "parents": [
        "80727c7b5c20cee70212471dbb11332239eed612",
        "46d4dda4a0c8964a6690918b14fcf17d7f70c6bd"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 00:11:53 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 00:11:53 2022 +0000"
      },
      "message": "Merge \"[bgpvpn] Replace security groups related methods\""
    },
    {
      "commit": "80727c7b5c20cee70212471dbb11332239eed612",
      "tree": "b1c8de70127a274bdb98c39b632634a43548b50a",
      "parents": [
        "8e9145cf66d5bda4be01b7d98e1cf34a0cde7165",
        "8235e3b5198c3af40cf2c7c797c8beb028814e80"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue May 03 00:11:50 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue May 03 00:11:50 2022 +0000"
      },
      "message": "Merge \"[bgpvpn] Make _create_loginable_secgroup_rule public\""
    },
    {
      "commit": "8e9145cf66d5bda4be01b7d98e1cf34a0cde7165",
      "tree": "24152d014c2f536a811d8bc9c0aacfdef3d59ade",
      "parents": [
        "d107d0efbb307be9703e9acaaf88cdd061a219de",
        "1d9e28bd2aaac8abb89708d7a3b1760daed3432b"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon May 02 23:59:03 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon May 02 23:59:03 2022 +0000"
      },
      "message": "Merge \"[bgpvpn] Remove _get_server_port_id_and_ip4 \u0026 create_floating_ip\""
    },
    {
      "commit": "d107d0efbb307be9703e9acaaf88cdd061a219de",
      "tree": "f628a471cae6108fd6f2dfb60784ebc04f52c3b4",
      "parents": [
        "123120607cd41222b038491636bac266ade09983",
        "7c09d72b7e0113e5cd8392f7c7d0c1eee672657f"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon May 02 23:59:00 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon May 02 23:59:00 2022 +0000"
      },
      "message": "Merge \"Make test test_remove_associated_ports to be compatible with L3HA\""
    },
    {
      "commit": "123120607cd41222b038491636bac266ade09983",
      "tree": "f0a102579ef17be672bbb5d29ce0b7248525cfd3",
      "parents": [
        "e9716e883191f5d83e7db6853d1ad1feaa18278f",
        "712d07cabab5f8a54741da784ac2a09eee04bf84"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon May 02 23:58:57 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon May 02 23:58:57 2022 +0000"
      },
      "message": "Merge \"[fwaas] Remove _create_subnet \u0026 setup_clients\""
    },
    {
      "commit": "e9716e883191f5d83e7db6853d1ad1feaa18278f",
      "tree": "f9f307251171f4851f3cd9692d291d22639898e2",
      "parents": [
        "1d76834050465c628c88ed293ff44ed6f6350bdd",
        "d83cfcf0cd042cdce67a1785085735ea68c97613"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon May 02 23:58:55 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon May 02 23:58:55 2022 +0000"
      },
      "message": "Merge \"[fwaas] Remove get_remote_client \u0026 check_vm_connectivity\""
    },
    {
      "commit": "1d76834050465c628c88ed293ff44ed6f6350bdd",
      "tree": "18ce19ccfb939650dc9974b3d7874dff879b2a68",
      "parents": [
        "5c90122992f3eda43c5402e55631698956391262",
        "b7fd90e997d43e03aaf46e124ab3b777f3cf65c7"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon May 02 23:58:52 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon May 02 23:58:52 2022 +0000"
      },
      "message": "Merge \"[fwaas] Remove _get_server_port_id_and_ip4 \u0026 create_floating_ip\""
    },
    {
      "commit": "5c90122992f3eda43c5402e55631698956391262",
      "tree": "ff438caf9b2c6dd21039489cecad29c4b1457daf",
      "parents": [
        "968413de14447d4561451dc0a5d48fd28c1f6ce7",
        "c699091e4b90e6db99815ab254a94e2045e854c1"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon May 02 23:20:47 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon May 02 23:20:47 2022 +0000"
      },
      "message": "Merge \"[fwaas] Remove _log_console_output \u0026 ping_ip_address\""
    },
    {
      "commit": "968413de14447d4561451dc0a5d48fd28c1f6ce7",
      "tree": "ae6f8305c816db54e15eec73215b666cd6a7bcec",
      "parents": [
        "49aa46a9513d7c6adebfc93be16aa601d44396cc",
        "7d4300c82563df5d11218dae6b02ba6df7b4c6d2"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon May 02 23:20:45 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon May 02 23:20:45 2022 +0000"
      },
      "message": "Merge \"[fwaas] Remove create_server \u0026 _create_network\""
    },
    {
      "commit": "49aa46a9513d7c6adebfc93be16aa601d44396cc",
      "tree": "9f802c517ecd143aa0c70cac0c8ba58f931cb5ce",
      "parents": [
        "1a263ccccb23316f5744957e1b868dab11a8432c",
        "763567e3b4ca4ce29f7c42eace1e6815b4c59b83"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon May 02 13:52:30 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon May 02 13:52:30 2022 +0000"
      },
      "message": "Merge \"[bgpvpn] Remove _create_network \u0026 _log_console_output\""
    },
    {
      "commit": "7c09d72b7e0113e5cd8392f7c7d0c1eee672657f",
      "tree": "6d7a07a1d90f2afcd1e41df71fb6343612cb31e6",
      "parents": [
        "1a263ccccb23316f5744957e1b868dab11a8432c"
      ],
      "author": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Tue Apr 19 11:30:39 2022 +0200"
      },
      "committer": {
        "name": "Slawek Kaplonski",
        "email": "skaplons@redhat.com",
        "time": "Mon May 02 13:19:41 2022 +0000"
      },
      "message": "Make test test_remove_associated_ports to be compatible with L3HA\n\nNegative API test\nneutron_tempest_plugin.api.test_routers_negative.RoutersNegativePolicyTest.\\\ntest_remove_associated_ports\n\nwas trying to remove all ports which belongs to the specic device\n(router) and expected Conflict response for each of them.\nIn L3HA environment that\u0027s not true and router ha interfaces can be\nremoved without any problems. That caused failure of the test when L3_ha\nwas enabled.\nThis patch fixes it by trying to delete different types of port than ha\ninterfaces.\n\nChange-Id: Iea2655a4dae2c8e260fb1dff9fdd9f426fe3c1b3\n"
    },
    {
      "commit": "f10618eac3a12d35a35044443b63d144b71e0c6b",
      "tree": "307ba89f11d2222ae9ac26030cb2682772839c71",
      "parents": [
        "b02a11f3f7b7eb126eb57ab6d3260d650ef24211"
      ],
      "author": {
        "name": "Eduardo Olivares",
        "email": "eolivare@redhat.com",
        "time": "Mon Apr 25 13:06:28 2022 +0200"
      },
      "committer": {
        "name": "Eduardo Olivares",
        "email": "eolivare@redhat.com",
        "time": "Thu Apr 28 16:23:59 2022 +0000"
      },
      "message": "Fix wrong exceptions import from test_metadata\n\nSSHExecCommandFailed should be imported from tempest.lib.exceptions, not\nfrom neutron_tempest_plugin.exceptions\n\nChange-Id: I74e3e69d9e7ca866840f7a9f1e1990d88a138da0\n"
    },
    {
      "commit": "b02a11f3f7b7eb126eb57ab6d3260d650ef24211",
      "tree": "67b199a16a3971120243778124109a0e7fad51a8",
      "parents": [
        "da4b63efdb9acc152c512d3df3e0f0f9c840be42",
        "6203126271bebc7797e0fb0b5bffc77c5ed7e9df"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue Apr 26 14:38:28 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue Apr 26 14:38:28 2022 +0000"
      },
      "message": "Merge \"[fwaas] Remove secgroup creation related methods\""
    },
    {
      "commit": "da4b63efdb9acc152c512d3df3e0f0f9c840be42",
      "tree": "6cffb708b26103312d8ac200eb0320e57069a9e9",
      "parents": [
        "82653703711b203affc398000fb000df043bdfae",
        "784f819baf80770008812d0c6bdc9b46511a3d31"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Tue Apr 26 14:33:55 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Tue Apr 26 14:33:55 2022 +0000"
      },
      "message": "Merge \"[fwaas] Remove _create_port \u0026 create_keypair\""
    },
    {
      "commit": "82653703711b203affc398000fb000df043bdfae",
      "tree": "0d0904158c31a01f6d0637261a6f44064641e1a4",
      "parents": [
        "be4c178274805f911a4df478fca295de881773e9",
        "fd509ebcd8a8b7b41bd7b274447a4e5d5f6f1363"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon Apr 25 17:53:55 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon Apr 25 17:53:55 2022 +0000"
      },
      "message": "Merge \"[bgpvpn] Remove _create_port \u0026 create_keypair\""
    },
    {
      "commit": "be4c178274805f911a4df478fca295de881773e9",
      "tree": "3a8490ecabc4c600390554e11f45db51543c7180",
      "parents": [
        "291c45c27d5152c69f0e056bbfcbd05612820737",
        "f70acd1650568ba8f5c48491b99135fd4f5f605c"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon Apr 25 12:52:48 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon Apr 25 12:52:48 2022 +0000"
      },
      "message": "Merge \"Test dns_assignment with external dns integration\""
    },
    {
      "commit": "291c45c27d5152c69f0e056bbfcbd05612820737",
      "tree": "4656a0c80174a570c208adc70f1e8023ac4a9b39",
      "parents": [
        "a81f4093a82f677f2c9ac5301243122f2b63a061",
        "46fa42463cc43aada54c4861d7f6dafb387948f5"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Mon Apr 25 12:52:46 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Mon Apr 25 12:52:46 2022 +0000"
      },
      "message": "Merge \"Print VM console output upon different exceptions\""
    },
    {
      "commit": "a81f4093a82f677f2c9ac5301243122f2b63a061",
      "tree": "f938fe968c0f2a466c0c6523e15a87ec2c00533d",
      "parents": [
        "be1d40d6c9c8fe0184a5f5018b83818d27a03bec",
        "96e90907b6a019574bc1714b776dee5acc2f38cf"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Fri Apr 22 12:37:10 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Fri Apr 22 12:37:10 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove _log_console_output \u0026 ping_ip_address\""
    },
    {
      "commit": "be1d40d6c9c8fe0184a5f5018b83818d27a03bec",
      "tree": "eed97360b6dcebbe6672a1f39995763f05f378d0",
      "parents": [
        "20ff3bb302b68341b0b1a73ffde48efaaf9aca15",
        "fb61ddbacb067fe3aef7831fa58b34ba6993e370"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Fri Apr 22 12:37:07 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Fri Apr 22 12:37:07 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove create_server \u0026 get_remote_client\""
    },
    {
      "commit": "20ff3bb302b68341b0b1a73ffde48efaaf9aca15",
      "tree": "11b187e62612547bd4ae8b0bee1eb3c9df8e534a",
      "parents": [
        "1079ff3db2bdf4e37412bf10205883b5466940b8",
        "9198d0204b1f3c2f1944aa14da844642a9f287fc"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Fri Apr 22 11:09:49 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Fri Apr 22 11:09:49 2022 +0000"
      },
      "message": "Merge \"[bgpvpn] Remove unused scenario.manager methods\""
    },
    {
      "commit": "1079ff3db2bdf4e37412bf10205883b5466940b8",
      "tree": "c6a2a18367f7453fc07215e263c54eadad6841e3",
      "parents": [
        "2e77baa5adc44e01fcee484370ebd503a229c25b",
        "3a1406a8c28e1fff1410b2867352b1288d86918b"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Fri Apr 22 11:09:46 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Fri Apr 22 11:09:46 2022 +0000"
      },
      "message": "Merge \"[fwaas] Remove unused methods\""
    },
    {
      "commit": "2e77baa5adc44e01fcee484370ebd503a229c25b",
      "tree": "8fcfef26b8f7433ec06af063f5f3fd3f8b09703c",
      "parents": [
        "813c40d958900ff5e3fa11127040ce17f8bfc6fa",
        "e3c390835af2a097e4d6f5113387cee4f1a402d4"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Fri Apr 22 11:09:43 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Fri Apr 22 11:09:43 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove _create_port \u0026 create_keypair\""
    },
    {
      "commit": "813c40d958900ff5e3fa11127040ce17f8bfc6fa",
      "tree": "cee0530a5cfd7ca12e950648933674fb5e9927c3",
      "parents": [
        "36a231e229a0d178403d6aadf37567868bedf4d3",
        "e800f7be3f204a98f2ac7adc51b2f750faa3c661"
      ],
      "author": {
        "name": "Zuul",
        "email": "zuul@review.opendev.org",
        "time": "Fri Apr 22 11:09:40 2022 +0000"
      },
      "committer": {
        "name": "Gerrit Code Review",
        "email": "review@openstack.org",
        "time": "Fri Apr 22 11:09:40 2022 +0000"
      },
      "message": "Merge \"[sfc] Remove unused router related methods\""
    },
    {
      "commit": "46fa42463cc43aada54c4861d7f6dafb387948f5",
      "tree": "f3dfe49fa6dcd04f50cb40cf4c0652a2e6a28c0a",
      "parents": [
        "36a231e229a0d178403d6aadf37567868bedf4d3"
      ],
      "author": {
        "name": "Eduardo Olivares",
        "email": "eolivare@redhat.com",
        "time": "Mon Apr 18 12:47:43 2022 +0200"
      },
      "committer": {
        "name": "Eduardo Olivares",
        "email": "eolivare@redhat.com",
        "time": "Thu Apr 21 08:22:09 2022 +0000"
      },
      "message": "Print VM console output upon different exceptions\n\nVM console ouput is printed when tests fail due to some exceptions\nThis patch extends the list of caught exceptions for which it will be\nprinted - The added exceptions were recently reproduced\n\nThe complete list of expected exceptions follows:\ntempest.lib.exceptions.SSHTimeout\nparamiko.ssh_exception.AuthenticationException\nparamiko.ssh_exception.NoValidConnectionsError\nConnectionResetError\n\nChange-Id: Ie5f58209739aed1a0dd7f4fb3a9b1fb06b27061c\n"
    },
    {
      "commit": "712d07cabab5f8a54741da784ac2a09eee04bf84",
      "tree": "20b3184ef306f343ff4f39c4781f4bb28cbc668b",
      "parents": [
        "d83cfcf0cd042cdce67a1785085735ea68c97613"
      ],
      "author": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Wed Apr 13 10:12:26 2022 +0200"
      },
      "committer": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Wed Apr 13 10:14:13 2022 +0200"
      },
      "message": "[fwaas] Remove _create_subnet \u0026 setup_clients\n\nAs tempest.scenario.manager was announced stable interface in Tempest\n27.0.0[1] it can be now reused in plugins.\n\nReplaced methods:\n    * _create_subnet\n    * setup_clients\n\nEtherpad concerning this effort:\nhttps://etherpad.opendev.org/p/tempest-scenario-manager-cleanup\n\n[1] https://docs.openstack.org/releasenotes/tempest/v27.0.0.html#release-notes-27-0-0\n\nChange-Id: I7ee881e8031a2198f3b307667bfd3e676459758d\n"
    },
    {
      "commit": "d83cfcf0cd042cdce67a1785085735ea68c97613",
      "tree": "464f536e6828e13c895081fa215af0f2567c3ec0",
      "parents": [
        "b7fd90e997d43e03aaf46e124ab3b777f3cf65c7"
      ],
      "author": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Wed Apr 13 09:29:21 2022 +0200"
      },
      "committer": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Wed Apr 13 10:06:19 2022 +0200"
      },
      "message": "[fwaas] Remove get_remote_client \u0026 check_vm_connectivity\n\nAs tempest.scenario.manager was announced stable interface in Tempest\n27.0.0[1] it can be now reused in plugins.\n\nReplaced methods:\n    * get_remote_client\n    * check_vm_connectivity\n\nEtherpad concerning this effort:\nhttps://etherpad.opendev.org/p/tempest-scenario-manager-cleanup\n\n[1] https://docs.openstack.org/releasenotes/tempest/v27.0.0.html#release-notes-27-0-0\n\nChange-Id: Iaf7f0ae7e2bd26ac98667fae3e86b86602c19f6f\n"
    },
    {
      "commit": "2ef30675e524ac2a0b0b9505ac479fea89b1db4d",
      "tree": "8b2df834a70d391cdeb6822536673ea27feb5a47",
      "parents": [
        "c96f065ff1f60fef212ccf334b68ebd2e9de7c50"
      ],
      "author": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Wed Apr 13 08:33:41 2022 +0200"
      },
      "committer": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Wed Apr 13 07:04:23 2022 +0000"
      },
      "message": "[bgpvpn] Remove get_remote_client\n\nAs tempest.scenario.manager was announced stable interface in Tempest\n27.0.0[1] it can be now reused in plugins.\n\nReplaced methods:\n    * get_remote_client\n\nThere is a slight difference between tempest\u0027s\nget_remote_client and the deleted one. See related\npatch[2].\n\nEtherpad concerning this effort:\nhttps://etherpad.opendev.org/p/tempest-scenario-manager-cleanup\n\n[1] https://docs.openstack.org/releasenotes/tempest/v27.0.0.html#release-notes-27-0-0\n[2] https://opendev.org/openstack/tempest/commit/f52c759e5cc6da962ad63831c55dc140d05a2373\n\nChange-Id: If2df2a0a3c6f8209a2e2d8d59a152bf3d685b0f1\n"
    },
    {
      "commit": "c96f065ff1f60fef212ccf334b68ebd2e9de7c50",
      "tree": "e6ad29caa4694b4b9e2c3cfec3c9be597a410597",
      "parents": [
        "46d4dda4a0c8964a6690918b14fcf17d7f70c6bd"
      ],
      "author": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Tue Apr 12 11:45:59 2022 +0200"
      },
      "committer": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Wed Apr 13 07:03:54 2022 +0000"
      },
      "message": "[bgpvpn] Remove setup_clients method\n\nAs tempest.scenario.manager was announced stable interface in Tempest\n27.0.0[1] it can be now reused in plugins.\n\nReplaced methods:\n    * setup_clients\n\nEtherpad concerning this effort:\nhttps://etherpad.opendev.org/p/tempest-scenario-manager-cleanup\n\n[1] https://docs.openstack.org/releasenotes/tempest/v27.0.0.html#release-notes-27-0-0\n\nChange-Id: I190f637db14555d5a4d2d579a53b625e446470db\n"
    },
    {
      "commit": "46d4dda4a0c8964a6690918b14fcf17d7f70c6bd",
      "tree": "95dc78d9b095459189ed4ae10be141a30f1aef28",
      "parents": [
        "8235e3b5198c3af40cf2c7c797c8beb028814e80"
      ],
      "author": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Tue Apr 12 11:36:39 2022 +0200"
      },
      "committer": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Tue Apr 12 11:33:31 2022 +0000"
      },
      "message": "[bgpvpn] Replace security groups related methods\n\nAs tempest.scenario.manager was announced stable interface in Tempest\n27.0.0[1] it can be now reused in plugins.\n\nReplaced methods:\n    * _create_empty_security_group\n    * _default_security_group (doesn\u0027t exist in tempest anymore)\n    * _create_security_group_rule\n\ncreate_loginable_secgroup_rule can\u0027t be replaced just yet[2].\n\nEtherpad concerning this effort:\nhttps://etherpad.opendev.org/p/tempest-scenario-manager-cleanup\n\n[1] https://docs.openstack.org/releasenotes/tempest/v27.0.0.html#release-notes-27-0-0\n[2] https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/837511\n\nChange-Id: I6015457971858737e861f5fccc56dfe6ec2b9c77\n"
    },
    {
      "commit": "b7fd90e997d43e03aaf46e124ab3b777f3cf65c7",
      "tree": "52fa8dadafe5eb40a74004c3d8e5ff9b0d214e36",
      "parents": [
        "c699091e4b90e6db99815ab254a94e2045e854c1"
      ],
      "author": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Tue Apr 12 12:18:23 2022 +0200"
      },
      "committer": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Tue Apr 12 12:18:23 2022 +0200"
      },
      "message": "[fwaas] Remove _get_server_port_id_and_ip4 \u0026 create_floating_ip\n\nAs tempest.scenario.manager was announced stable interface in Tempest\n27.0.0[1] it can be now reused in plugins.\n\nRemoved methods:\n    * _get_server_port_id_and_ip4\n    * create_floating_ip\n\nThere is a slight difference between tempest\u0027s\n_get_server_port_id_and_ip4 and this one.\nMost changes are just fixes, without bigger logical interference.\nSee some of the related patches below.[2][3]\n\nEtherpad concerning this effort:\nhttps://etherpad.opendev.org/p/tempest-scenario-manager-cleanup\n\n[1] https://docs.openstack.org/releasenotes/tempest/v27.0.0.html#release-notes-27-0-0\n[2] https://opendev.org/openstack/tempest/commit/5c191faae78f52f876edba72484ea644d3df04fd\n[3] https://opendev.org/openstack/tempest/commit/95a3169e1782f31c794e56cb836c1d9476a0adf8\n\nChange-Id: Idd1977253c42f0605a0eb88b693197793c2c07d9\n"
    },
    {
      "commit": "8235e3b5198c3af40cf2c7c797c8beb028814e80",
      "tree": "e37222b68e87920ed635b9277e7d21a0a34fdddb",
      "parents": [
        "1d9e28bd2aaac8abb89708d7a3b1760daed3432b"
      ],
      "author": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Tue Apr 12 11:29:17 2022 +0200"
      },
      "committer": {
        "name": "Roman Popelka",
        "email": "rpopelka@redhat.com",
        "time": "Tue Apr 12 10:17:41 2022 +0000"
      },
      "message": "[bgpvpn] Make _create_loginable_secgroup_rule public\n\nAs tempest.scenario.manager was announced stable interface in Tempest\n27.0.0[1] it can be now reused in plugins.\n\n_create_loginable_secgroup method isn\u0027t ready to be deleted yet, because its rulesets differs from tempest\u0027s.\nThis method will be public now, so replaced methods will use this method over the tempest\u0027s one.\nTempest didn\u0027t allow to modify rulesets, but patch that allows this is already merged[2].\nIn some time, this plugin\u0027s implementation will be replaced\n\nEtherpad concerning this effort:\nhttps://etherpad.opendev.org/p/tempest-scenario-manager-cleanup\n\n[1] https://docs.openstack.org/releasenotes/tempest/v27.0.0.html#release-notes-27-0-0\n[2] https://review.opendev.org/c/openstack/tempest/+/835018\n\nChange-Id: Ia2f8eed6da612bc88c9b9eb48873dcc11b309f42\n"
    }
  ],
  "next": "1d9e28bd2aaac8abb89708d7a3b1760daed3432b"
}
