)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":7973,"name":"Douglas Mendizábal","email":"dmendiza@redhat.com","username":"dougmendizabal"},"change_message_id":"136a600cac1c67c05b5c2fb72a9927ba06c66545","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":4,"id":"e77b6f08_19751156","updated":"2022-08-23 20:38:44.000000000","message":"recheck - depends-on updated","commit_id":"0faaefc272a49b24e01bf8c35744f90b855c43d6"},{"author":{"_account_id":7973,"name":"Douglas Mendizábal","email":"dmendiza@redhat.com","username":"dougmendizabal"},"change_message_id":"e2e5e7732fa74070c5f6e4fd903fb02c381d39cd","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":4,"id":"d3e088cb_ce6bf896","updated":"2022-08-23 21:33:08.000000000","message":"recheck - depends-on updated again","commit_id":"0faaefc272a49b24e01bf8c35744f90b855c43d6"}],"barbican/common/policies/secrets.py":[{"author":{"_account_id":9914,"name":"Ade Lee","email":"alee@redhat.com","username":"alee"},"change_message_id":"79c8fab45b51958373c1ab0b29eb330f6f732262","unresolved":true,"context_lines":[{"line_number":68,"context_line":"        name\u003d\u0027secret:decrypt\u0027,"},{"line_number":69,"context_line":"        check_str\u003d\"True:%(enforce_scope)s and (rule:secret_project_admin or \" +"},{"line_number":70,"context_line":"                  \"rule:secret_owner or \" +"},{"line_number":71,"context_line":"                  \"rule:secret_project_member_access or rule:secret_acl_read)\","},{"line_number":72,"context_line":"        scope_types\u003d[\u0027project\u0027],"},{"line_number":73,"context_line":"        description\u003d\u0027Retrieve a secrets payload.\u0027,"},{"line_number":74,"context_line":"        operations\u003d["}],"source_content_type":"text/x-python","patch_set":4,"id":"59545304_36d1c82e","line":71,"updated":"2022-08-24 13:31:51.000000000","message":"I\u0027m not excited about the new simplifications of the policy.  IMHO, it makes things much less clear.  \n\nTo me,\n\nrule:secret_project_admin or rule:secret_project_member and (secret_not_private or secret_owner)  is clearer\n\nOr if you like:\n\nrule:secret_project_admin or (rule:secret_project_member and secret_not_private) or (secret_project_member and secret_owner) \n\nmore verbose, but clearer","commit_id":"0faaefc272a49b24e01bf8c35744f90b855c43d6"},{"author":{"_account_id":7973,"name":"Douglas Mendizábal","email":"dmendiza@redhat.com","username":"dougmendizabal"},"change_message_id":"d7951728996e0e4766f5dda7c57ff3c7baca8e2c","unresolved":false,"context_lines":[{"line_number":68,"context_line":"        name\u003d\u0027secret:decrypt\u0027,"},{"line_number":69,"context_line":"        check_str\u003d\"True:%(enforce_scope)s and (rule:secret_project_admin or \" +"},{"line_number":70,"context_line":"                  \"rule:secret_owner or \" +"},{"line_number":71,"context_line":"                  \"rule:secret_project_member_access or rule:secret_acl_read)\","},{"line_number":72,"context_line":"        scope_types\u003d[\u0027project\u0027],"},{"line_number":73,"context_line":"        description\u003d\u0027Retrieve a secrets payload.\u0027,"},{"line_number":74,"context_line":"        operations\u003d["}],"source_content_type":"text/x-python","patch_set":4,"id":"ea4fd4aa_50f30d4b","line":71,"in_reply_to":"59545304_36d1c82e","updated":"2022-08-24 16:37:18.000000000","message":"Done.  Rules have been re-written to be more verbose and hopefully more readable.","commit_id":"0faaefc272a49b24e01bf8c35744f90b855c43d6"}]}
