)]}'
{"cinder/policies/backups.py":[{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"ed5fd69ea365bc8d0425940fa488a175d9e09418","unresolved":true,"context_lines":[{"line_number":144,"context_line":"    ),"},{"line_number":145,"context_line":"    policy.DocumentedRuleDefault("},{"line_number":146,"context_line":"        name\u003dIMPORT_POLICY,"},{"line_number":147,"context_line":"        check_str\u003dbase.SYSTEM_ADMIN_ONLY,"},{"line_number":148,"context_line":"        description\u003d\"Import backup.\","},{"line_number":149,"context_line":"        operations\u003d["},{"line_number":150,"context_line":"            {"}],"source_content_type":"text/x-python","patch_set":1,"id":"e5ebd01a_db6c0c9d","line":147,"updated":"2021-08-12 21:08:46.000000000","message":"This is pretty much a noop as far as the policy is concerned, but this is what it looks like generated in a sample:\n\n  # DEPRECATED\n  # \"backup:backup-import\":\"rule:admin_api\" has been deprecated since X\n  # in favor of \"backup:backup-import\":\"(role:admin)\".\n  # Default policies now support the three Keystone default roles,\n  # namely \u0027admin\u0027, \u0027member\u0027, and \u0027reader\u0027 to implement three Cinder\n  # \"personas\". See \"Policy Personas and Permissions\" in the \"Cinder\n  # Service Configuration\" documentation (Xena release) for details.","commit_id":"481ac10ff85fcd14267c6ed05ea1b62bc40343fc"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"facdd578a5ae03367fe189f9cb04246e86516fb8","unresolved":true,"context_lines":[{"line_number":144,"context_line":"    ),"},{"line_number":145,"context_line":"    policy.DocumentedRuleDefault("},{"line_number":146,"context_line":"        name\u003dIMPORT_POLICY,"},{"line_number":147,"context_line":"        check_str\u003dbase.SYSTEM_ADMIN_ONLY,"},{"line_number":148,"context_line":"        description\u003d\"Import backup.\","},{"line_number":149,"context_line":"        operations\u003d["},{"line_number":150,"context_line":"            {"}],"source_content_type":"text/x-python","patch_set":3,"id":"3c3651dc_c96b1025","line":147,"updated":"2021-08-12 21:14:34.000000000","message":"This is pretty much a noop as far as the policy is concerned, but this is what it looks like generated in a sample:\n\n  # DEPRECATED\n  # \"backup:backup-import\":\"rule:admin_api\" has been deprecated since X\n  # in favor of \"backup:backup-import\":\"(role:admin)\".\n  # Default policies now support the three Keystone default roles,\n  # namely \u0027admin\u0027, \u0027member\u0027, and \u0027reader\u0027 to implement three Cinder\n  # \"personas\". See \"Policy Personas and Permissions\" in the \"Cinder\n  # Service Configuration\" documentation (Xena release) for details.","commit_id":"042cf5c019344860799684b2a6c10897095f46f4"},{"author":{"_account_id":27615,"name":"Rajat Dhasmana","email":"rajatdhasmana@gmail.com","username":"whoami-rajat"},"change_message_id":"56dfd0f342047057755be955f74bf5b73f1be365","unresolved":true,"context_lines":[{"line_number":31,"context_line":"backups_policies \u003d ["},{"line_number":32,"context_line":"    policy.DocumentedRuleDefault("},{"line_number":33,"context_line":"        name\u003dGET_ALL_POLICY,"},{"line_number":34,"context_line":"        check_str\u003dbase.XENA_SYSTEM_READER_OR_PROJECT_READER,"},{"line_number":35,"context_line":"        description\u003d\"List backups.\","},{"line_number":36,"context_line":"        operations\u003d["},{"line_number":37,"context_line":"            {"}],"source_content_type":"text/x-python","patch_set":4,"id":"a44560bb_8a0990ab","line":34,"range":{"start_line":34,"start_character":23,"end_line":34,"end_character":59},"updated":"2021-08-30 13:46:30.000000000","message":"This should be SYSTEM_READER_OR_PROJECT_READER\nsame for other occurrences","commit_id":"b16771a37b43c475d849adb272fb6e320fb07ac6"},{"author":{"_account_id":27615,"name":"Rajat Dhasmana","email":"rajatdhasmana@gmail.com","username":"whoami-rajat"},"change_message_id":"56dfd0f342047057755be955f74bf5b73f1be365","unresolved":true,"context_lines":[{"line_number":64,"context_line":"        ]),"},{"line_number":65,"context_line":"    policy.DocumentedRuleDefault("},{"line_number":66,"context_line":"        name\u003dCREATE_POLICY,"},{"line_number":67,"context_line":"        check_str\u003dbase.XENA_SYSTEM_ADMIN_OR_PROJECT_MEMBER,"},{"line_number":68,"context_line":"        description\u003d\"Create backup.\","},{"line_number":69,"context_line":"        operations\u003d["},{"line_number":70,"context_line":"            {"}],"source_content_type":"text/x-python","patch_set":4,"id":"5f189d04_4535af91","line":67,"range":{"start_line":67,"start_character":23,"end_line":67,"end_character":58},"updated":"2021-08-30 13:46:30.000000000","message":"this should be SYSTEM_ADMIN_OR_PROJECT_MEMBER\nsame for other occurrences","commit_id":"b16771a37b43c475d849adb272fb6e320fb07ac6"}]}
