get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2218049/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2218049,
    "url": "http://patchwork.ozlabs.org/api/patches/2218049/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20260331100047.34618-11-philippe.reynes@softathome.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260331100047.34618-11-philippe.reynes@softathome.com>",
    "list_archive_url": null,
    "date": "2026-03-31T10:00:42",
    "name": "[v3,10/15] tools: binman: pre-load: add support of ecdsa",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": false,
    "hash": "ad0e6a64a5a3865482bc93adb4ec9db05a5dd0f7",
    "submitter": {
        "id": 74351,
        "url": "http://patchwork.ozlabs.org/api/people/74351/?format=api",
        "name": "Philippe Reynes",
        "email": "philippe.reynes@softathome.com"
    },
    "delegate": {
        "id": 161313,
        "url": "http://patchwork.ozlabs.org/api/users/161313/?format=api",
        "username": "raymo200915",
        "first_name": "Raymond",
        "last_name": "Mao",
        "email": "raymondmaoca@gmail.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20260331100047.34618-11-philippe.reynes@softathome.com/mbox/",
    "series": [
        {
            "id": 498164,
            "url": "http://patchwork.ozlabs.org/api/series/498164/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=498164",
            "date": "2026-03-31T10:00:34",
            "name": "add software ecdsa support",
            "version": 3,
            "mbox": "http://patchwork.ozlabs.org/series/498164/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2218049/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2218049/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.a=rsa-sha256 header.s=selector1-softathome1-onmicrosoft-com\n header.b=hFbuxVwN;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=85.214.62.61; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=none (p=none dis=none) header.from=softathome.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=softathome1.onmicrosoft.com header.i=@softathome1.onmicrosoft.com\n header.b=\"hFbuxVwN\";\n\tdkim-atps=neutral",
            "phobos.denx.de; dmarc=none (p=none dis=none)\n header.from=softathome.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=philippe.reynes@softathome.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de [85.214.62.61])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4flNwr4z2bz1y1q\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 31 Mar 2026 21:03:24 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 320A28405B;\n\tTue, 31 Mar 2026 12:01:15 +0200 (CEST)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 529BD84068; Tue, 31 Mar 2026 12:01:06 +0200 (CEST)",
            "from PAUP264CU001.outbound.protection.outlook.com\n (mail-francecentralazlp170110002.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c20a::2])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 2625084106\n for <u-boot@lists.denx.de>; Tue, 31 Mar 2026 12:01:00 +0200 (CEST)",
            "from PR3P192CA0017.EURP192.PROD.OUTLOOK.COM (2603:10a6:102:56::22)\n by MR0P264MB5115.FRAP264.PROD.OUTLOOK.COM (2603:10a6:501:4f::16) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9745.29; Tue, 31 Mar\n 2026 10:00:53 +0000",
            "from PA2PEPF00019232.FRAP264.PROD.OUTLOOK.COM\n (2603:10a6:102:56:cafe::ca) by PR3P192CA0017.outlook.office365.com\n (2603:10a6:102:56::22) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9745.28 via Frontend Transport; Tue,\n 31 Mar 2026 10:00:48 +0000",
            "from proxy.softathome.com (149.6.166.170) by\n PA2PEPF00019232.mail.protection.outlook.com (10.167.242.38) with Microsoft\n SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9745.21\n via Frontend Transport; Tue, 31 Mar 2026 10:00:53 +0000",
            "from sah1lpt726.home (unknown [192.168.72.39])\n by proxy.softathome.com (Postfix) with ESMTPSA id 30C06202EB;\n Tue, 31 Mar 2026 12:00:53 +0200 (CEST)"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED,\n DKIM_VALID,RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=R4wstwnoE95ablrZsgk0cGB5fsSYYW4EaASHfNG0mFW4G6Ef04l+YY8OFmKhWynf4aE3/zcGZl/GN3GWcGcJk4Cw0VF77RMOFFUH1wdJNj65+XVhn1vW+FjSMn6/pn0tJkMjnd8PmxeCZE6fAQW5jPjqIuLx9FJCx/fDZE4y7wK4mIAwc2nFefGLD4ewsmkHBLOj1WeLv9ttN0p5b0aF0hnf7o+E6v7pbxATh8q4Di8mz/Jd8rUcdUATtlcERHNpGdkuGt3lgkMJvaycvn96zq0lLGTKQXKL4VZIxlvZPV1CaupN9dXqffkWVovMsiVuPmVr8JNryWsGBDCBaaBAfA==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=H5od/TcfHGLicSJnL3MyvF/m1F38Mx+Fonko9Nz6Ir0=;\n b=Kmq/gQF2WYstjYqhatlFRfh9tPwyr+02K/kGBKo48JJZVF389tGRDwJLADR/tnXc7HgWYtoqHeoC3/N/+aTlpUocDuB9auFdE9aD+aYLthcgJCMWv7MOVm+5YnuyA2XSkYxinH1CHGyX/ts0OmWa6VoqHqDfwmqzRyt7dYujQMtOva9iyaxSCtcDDaFPnDhf3BLLF4j9c3RTjbkeqRHpmUnlYMomBN0NQPHmFONbwUbh3EpvbEbWUdMvZr/PTC5QN9trIvP5Nbs3Wp640L8GCxyAKjClp/TtRt56PEz/yrkRGR/j9Uw2BO++oMDb5qnawhbYeId++/xvdjNxY3ookQ==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 149.6.166.170) smtp.rcpttodomain=canonical.com smtp.mailfrom=softathome.com;\n dmarc=bestguesspass action=none header.from=softathome.com; dkim=none\n (message not signed); arc=none (0)",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=softathome1.onmicrosoft.com; s=selector1-softathome1-onmicrosoft-com;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=H5od/TcfHGLicSJnL3MyvF/m1F38Mx+Fonko9Nz6Ir0=;\n b=hFbuxVwNOfpBYAn0v78TySBsGhK5BhPw9CekOTN9iHBy5S2vBI8QP9OFu1T/TEE7L1HdUVX2H0jeq6watESyk6nVw7EHpN7PBantG6jT6JS4OfbbUow30IeWgakK/sC6PGlyZ45XMs3KjeTz0d6VYWnZVLWx8xJ7b2qFJTg4Isqy+8/SlTzquPX0/ea4ZJLKq+8MHFQSVlbfdqUaC0PkPMlpbdCzflD+7rclqyXb8HNGDzjiyHuw6t64U/bso5ye0m4TykxiwRC/qucZBn4FmfKqpTlQ9Jd+bsPoNda7gy1cd7+xYYAG09h2Q0fhhF5Q39al66eYydqCjZFbnFI3Hg==",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 149.6.166.170)\n smtp.mailfrom=softathome.com; dkim=none (message not signed)\n header.d=none;dmarc=bestguesspass action=none header.from=softathome.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of softathome.com\n designates 149.6.166.170 as permitted sender)\n receiver=protection.outlook.com; client-ip=149.6.166.170;\n helo=proxy.softathome.com; pr=C",
        "From": "Philippe Reynes <philippe.reynes@softathome.com>",
        "To": "marko.makela@iki.fi, jonny.green@keytechinc.com, raymondmaoca@gmail.com,\n trini@konsulko.com, simon.glass@canonical.com",
        "Cc": "u-boot@lists.denx.de,\n\tPhilippe Reynes <philippe.reynes@softathome.com>",
        "Subject": "[PATCH v3 10/15] tools: binman: pre-load: add support of ecdsa",
        "Date": "Tue, 31 Mar 2026 12:00:42 +0200",
        "Message-ID": "<20260331100047.34618-11-philippe.reynes@softathome.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<20260331100047.34618-1-philippe.reynes@softathome.com>",
        "References": "<20260331100047.34618-1-philippe.reynes@softathome.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "PA2PEPF00019232:EE_|MR0P264MB5115:EE_",
        "Content-Type": "text/plain",
        "X-MS-Office365-Filtering-Correlation-Id": "0e9eeda4-3e58-4ae3-7609-08de8f0c6532",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|1800799024|376014|36860700016|82310400026|22082099003|18002099003|56012099003|17002099007;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:149.6.166.170; CTRY:FR; LANG:en; SCL:1; SRV:;\n IPV:CAL; SFV:NSPM; H:proxy.softathome.com; PTR:InfoDomainNonexistent;\n CAT:NONE;\n SFS:(13230040)(1800799024)(376014)(36860700016)(82310400026)(22082099003)(18002099003)(56012099003)(17002099007);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n Cl4XN6H5/hDI2msIHAhEbT8aMKydHMxDIXLXM20ZS8c8FitMxY9r8D/1wwmBSw9Me/+iE0qhU+ovfYsJtG/Sp6Jg8/okq+H+hs+w3mnqBEXNq/ZEgDLQilTGfLUtBVGeXylFyRtRErx+Ml+fWWCfAfqpiMtILUyuO+CymZ734ZBX+p7ek7CIidrIM08DVILCUKuxQ33+BhGF/Xj4aXKRVQMr7SOuMJ46RwatjXcqsjaM2xdfhnx3pJWYcmQivvmf9f55WVjb2T/l3bdDtKqiPzuHBqKLgIZE1P8GMaqTGGpBpfD3T8iw2tu9+Mo/kR4WaTcNStQk38K853NUvQDFfBpzRMLTLIz6nteRuEQfWfa57W8i5P7WNojAg9DZXcY4/8p4ZvuNKWR06r0xtMSiiL1IgXOcEs/oIts1duamdignrLwBkx5+n7EAVdB6X+Pv",
        "X-OriginatorOrg": "softathome.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "31 Mar 2026 10:00:53.2914 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 0e9eeda4-3e58-4ae3-7609-08de8f0c6532",
        "X-MS-Exchange-CrossTenant-Id": "aa10e044-e405-4c10-8353-36b4d0cce511",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=aa10e044-e405-4c10-8353-36b4d0cce511; Ip=[149.6.166.170];\n Helo=[proxy.softathome.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "PA2PEPF00019232.FRAP264.PROD.OUTLOOK.COM",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "MR0P264MB5115",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "Right now, binman can only create pre-load header\nusing rsa. We add the support of ecdsa.\n\nSigned-off-by: Philippe Reynes <philippe.reynes@softathome.com>\n---\nv3:\n- initial version\n\n tools/binman/etype/pre_load.py | 78 ++++++++++++++++++++++++++++++----\n tools/binman/ftest.py          | 31 ++++++++++++++\n 2 files changed, 101 insertions(+), 8 deletions(-)",
    "diff": "diff --git a/tools/binman/etype/pre_load.py b/tools/binman/etype/pre_load.py\nindex 00f1a896767..2a2636403d3 100644\n--- a/tools/binman/etype/pre_load.py\n+++ b/tools/binman/etype/pre_load.py\n@@ -16,8 +16,10 @@ from binman.entry import EntryArg\n \n from Cryptodome.Hash import SHA256, SHA384, SHA512\n from Cryptodome.PublicKey import RSA\n+from Cryptodome.PublicKey import ECC\n from Cryptodome.Signature import pkcs1_15\n from Cryptodome.Signature import pss\n+from Cryptodome.Signature import DSS\n \n PRE_LOAD_MAGIC = b'UBSH'\n \n@@ -27,6 +29,12 @@ RSAS = {\n     'rsa4096': 4096 / 8\n }\n \n+ECDSAS = {\n+    'ecdsa256': 256 / 8 * 2,\n+    'ecdsa384': 384 / 8 * 2,\n+    'ecdsa521': 132\n+}\n+\n SHAS = {\n     'sha256': SHA256,\n     'sha384': SHA384,\n@@ -86,17 +94,10 @@ class Entry_pre_load(Entry_collection):\n         if self.key_path is None:\n             self.key_path = ''\n \n-    def _CreateHeader(self):\n-        \"\"\"Create a pre load header\"\"\"\n-        hash_name, sign_name = self.algo_name.split(',')\n-        padding_name = self.padding_name\n-        key_name = os.path.join(self.key_path, self.key_name)\n-\n+    def _CreateHeaderRsa(self, hash_name, sign_name, padding_name, key_name):\n         # Check hash and signature name/type\n         if hash_name not in SHAS:\n             self.Raise(hash_name + \" is not supported\")\n-        if sign_name not in RSAS:\n-            self.Raise(sign_name + \" is not supported\")\n \n         # Read the key\n         key = RSA.import_key(tools.read_file(key_name))\n@@ -151,6 +152,67 @@ class Entry_pre_load(Entry_collection):\n \n         return data + pad\n \n+    def _CreateHeaderEcdsa(self, hash_name, sign_name, padding_name, key_name):\n+        # Check hash and signature name/type\n+        if hash_name not in SHAS:\n+            self.Raise(hash_name + \" is not supported\")\n+\n+        # Read the key\n+        key = ECC.import_key(tools.read_file(key_name))\n+\n+        # Check if the key has the expected size\n+        # if key.size_in_bytes() != ECDSAS[sign_name]:\n+        #    self.Raise(\"The key \" + self.key_name + \" don't have the expected size\")\n+\n+        # Compute the hash\n+        hash_image = SHAS[hash_name].new()\n+        hash_image.update(self.image)\n+\n+        # Compute the signature\n+        signer = DSS.new(key, 'fips-186-3')\n+        sig = signer.sign(hash_image)\n+\n+        # print(\"len = %d\\n\", len(sig))\n+\n+        hash_sig = SHA256.new()\n+        hash_sig.update(sig)\n+\n+        version = self.version\n+        header_size = self.header_size\n+        image_size = len(self.image)\n+        ofs_img_sig = 64 + len(sig)\n+        flags = 0\n+        reserved0 = 0\n+        reserved1 = 0\n+\n+        first_header = struct.pack('>4sIIIIIII32s', PRE_LOAD_MAGIC,\n+                                   version, header_size, image_size,\n+                                   ofs_img_sig, flags, reserved0,\n+                                   reserved1, hash_sig.digest())\n+\n+        hash_first_header = SHAS[hash_name].new()\n+        hash_first_header.update(first_header)\n+        sig_first_header = signer.sign(hash_first_header)\n+\n+        data = first_header + sig_first_header + sig\n+        pad  = bytearray(self.header_size - len(data))\n+\n+        return data + pad\n+\n+    def _CreateHeader(self):\n+        \"\"\"Create a pre load header\"\"\"\n+        hash_name, sign_name = self.algo_name.split(',')\n+        padding_name = self.padding_name\n+        key_name = os.path.join(self.key_path, self.key_name)\n+\n+        if sign_name in RSAS:\n+            return self._CreateHeaderRsa(hash_name, sign_name, padding_name, key_name)\n+\n+        if sign_name in ECDSAS:\n+            return self._CreateHeaderEcdsa(hash_name, sign_name, padding_name, key_name)\n+\n+        self.Raise(sign_name + \" is not supported\")\n+\n     def ObtainContents(self):\n         \"\"\"Obtain a placeholder for the header contents\"\"\"\n         # wait that the image is available\ndiff --git a/tools/binman/ftest.py b/tools/binman/ftest.py\nindex a53e37f31b3..bdb46fbf24f 100644\n--- a/tools/binman/ftest.py\n+++ b/tools/binman/ftest.py\n@@ -5894,6 +5894,37 @@ fdt         fdtmap                Extract the devicetree blob from the fdtmap\n             data = self._DoReadFileDtb('236_pre_load_invalid_key.dts',\n                                        entry_args=entry_args)\n \n+    def testPreLoadEcdsa(self):\n+        \"\"\"Test an image with a pre-load header using ecdsa key\"\"\"\n+        entry_args = {\n+            'pre-load-key-path': os.path.join(self._binman_dir, 'test'),\n+        }\n+        data = self._DoReadFileDtb(\n+            '351_pre_load_ecdsa.dts', entry_args=entry_args,\n+            extra_indirs=[os.path.join(self._binman_dir, 'test')])[0]\n+\n+        image_fname = tools.get_output_filename('image.bin')\n+        is_signed = self._CheckPreload(image_fname, self.TestFile(\"ecdsa521.pem\"), \"sha256,ecdsa521\")\n+\n+        self.assertEqual(PRE_LOAD_MAGIC, data[:len(PRE_LOAD_MAGIC)])\n+        self.assertEqual(PRE_LOAD_VERSION, data[4:4 + len(PRE_LOAD_VERSION)])\n+        self.assertEqual(PRE_LOAD_HDR_SIZE, data[8:8 + len(PRE_LOAD_HDR_SIZE)])\n+        self.assertEqual(is_signed, True)\n+\n+    def testPreLoadEcdsaInvalidSha(self):\n+        \"\"\"Test an image with a pre-load ecdsa header with an invalid hash\"\"\"\n+        entry_args = {\n+            'pre-load-key-path': os.path.join(self._binman_dir, 'test'),\n+        }\n+        with self.assertRaises(ValueError) as e:\n+            self._DoReadFileDtb('352_pre_load_ecdsa_invalid_sha.dts',\n+                                entry_args=entry_args)\n+\n+    def testPreLoadEcdsaInvalidAlgo(self):\n+        \"\"\"Test an image with a pre-load header with an invalid algo\"\"\"\n+        with self.assertRaises(ValueError) as e:\n+            data = self._DoReadFile('353_pre_load_ecdsa_invalid_algo.dts')\n+\n     def _CheckSafeUniqueNames(self, *images):\n         \"\"\"Check all entries of given images for unsafe unique names\"\"\"\n         for image in images:\n",
    "prefixes": [
        "v3",
        "10/15"
    ]
}