)]}'
[{"id":"openstack%2Fkeystone~969992","triplet_id":"openstack%2Fkeystone~stable%2F2025.2~If5b83feabc670ced54ef12fe7826267af7e3419d","project":"openstack/keystone","branch":"stable/2025.2","attention_set":{},"removed_from_attention_set":{"1004":{"account":{"_account_id":1004},"last_update":"2025-12-12 17:38:01.000000000","reason":"Change was submitted"},"27900":{"account":{"_account_id":27900},"last_update":"2025-12-10 08:21:55.000000000","reason":"removed on reply"},"7414":{"account":{"_account_id":7414},"last_update":"2025-12-12 17:38:01.000000000","reason":"Change was submitted"}},"hashtags":[],"change_id":"If5b83feabc670ced54ef12fe7826267af7e3419d","subject":"Invalidate token of user disabled in readonly backend","status":"MERGED","created":"2025-12-05 19:04:50.000000000","updated":"2025-12-12 17:38:01.000000000","submitted":"2025-12-12 17:38:01.000000000","submitter":{"_account_id":22348},"insertions":50,"deletions":6,"total_comment_count":0,"unresolved_comment_count":0,"has_review_started":true,"submission_id":"969992","cherry_pick_of_change":966583,"cherry_pick_of_patch_set":7,"meta_rev_id":"d526e6d038a75628bafa304fb2d7bf0703db62a7","_number":969992,"virtual_id_number":969992,"owner":{"_account_id":1004},"current_revision_number":1,"requirements":[],"submit_records":[{"rule_name":"gerrit~DefaultSubmitRule","status":"CLOSED","labels":[{"label":"Verified","status":"MAY","applied_by":{"_account_id":22348}},{"label":"Code-Review","status":"MAY","applied_by":{"_account_id":27900}},{"label":"Workflow","status":"MAY","applied_by":{"_account_id":14250}}]}]}]
