)]}'
{"recipes/server-apache.rb":[{"author":{"_account_id":21961,"name":"Lance Albertson","email":"lance@osuosl.org","username":"ramereth"},"change_message_id":"ddb53489621fb2045e9d85292a9d1aab6649e637","unresolved":true,"context_lines":[{"line_number":273,"context_line":""},{"line_number":274,"context_line":"      protocol_params[\u0027OIDCRedirectURI\u0027] \u003d redirect_uri"},{"line_number":275,"context_line":"      # Fill in sensitive bits from Chef Vault"},{"line_number":276,"context_line":"      openid_secrets \u003d chef_vault_item(\u0027vault_\u0027 + node[\u0027openstack\u0027][\u0027secret\u0027][\u0027secrets_data_bag\u0027], \u0027keystone_oidc_client\u0027)"},{"line_number":277,"context_line":"      protocol_params[\u0027OIDCClientID\u0027] \u003d openid_secrets[\u0027client_id\u0027]"},{"line_number":278,"context_line":"      protocol_params[\u0027OIDCClientSecret\u0027] \u003d openid_secrets[\u0027client_secret\u0027]"},{"line_number":279,"context_line":"      protocol_params[\u0027OIDCCryptoPassphrase\u0027] \u003d openid_secrets[\u0027crypto_passphrase\u0027]"}],"source_content_type":"text/x-ruby","patch_set":7,"id":"09284dfa_ec9ed6cc","line":276,"updated":"2021-07-20 22:34:26.000000000","message":"Please use the `secrets` helper method which will automatically figure out if you\u0027re using chef-vault or not. Take a a look at the `_credential_tokens.rb` recipe (and it\u0027s related unit test) to see how you make it with with ChefSpec. That should resolve the issue you\u0027re running into.","commit_id":"3844f0505e91b50ea7b23a931a11036faf087c8f"},{"author":{"_account_id":21961,"name":"Lance Albertson","email":"lance@osuosl.org","username":"ramereth"},"change_message_id":"74026cc2b4d84e9e7ce7c37056a37de935c6a927","unresolved":true,"context_lines":[{"line_number":273,"context_line":""},{"line_number":274,"context_line":"      protocol_params[\u0027OIDCRedirectURI\u0027] \u003d redirect_uri"},{"line_number":275,"context_line":"      # Fill in sensitive bits from Chef Vault"},{"line_number":276,"context_line":"      openid_secrets \u003d chef_vault_item(\u0027vault_\u0027 + node[\u0027openstack\u0027][\u0027secret\u0027][\u0027secrets_data_bag\u0027], \u0027keystone_oidc_client\u0027)"},{"line_number":277,"context_line":"      protocol_params[\u0027OIDCClientID\u0027] \u003d openid_secrets[\u0027client_id\u0027]"},{"line_number":278,"context_line":"      protocol_params[\u0027OIDCClientSecret\u0027] \u003d openid_secrets[\u0027client_secret\u0027]"},{"line_number":279,"context_line":"      protocol_params[\u0027OIDCCryptoPassphrase\u0027] \u003d openid_secrets[\u0027crypto_passphrase\u0027]"}],"source_content_type":"text/x-ruby","patch_set":9,"id":"152c672e_5e23be21","line":276,"updated":"2021-07-20 23:45:50.000000000","message":"Please use the secret helper instead of chef_vault_item.","commit_id":"736f8e81ee9190b210de0b38a51cf5681f06ed60"}],"spec/server-apache_spec.rb":[{"author":{"_account_id":21961,"name":"Lance Albertson","email":"lance@osuosl.org","username":"ramereth"},"change_message_id":"1ecabbc1865329d890c57d319c86a2f7b7f04677","unresolved":true,"context_lines":[{"line_number":496,"context_line":"            /OIDCOAuthClientID \"thisisoauthclientid\"$/,"},{"line_number":497,"context_line":"            /OIDCOAuthClientSecret \"thisisoauthclientsecret\"$/,"},{"line_number":498,"context_line":"            %r{\u003cLocation \"/v3/auth/OS-FEDERATION/websso/openid\"\u003e$},"},{"line_number":499,"context_line":"            %r{\u003cLocation \"/v3/auth/OS-FEDERATION/identity_providers/example.com/protocols/openid/auth\"\u003e$},"},{"line_number":500,"context_line":"          ].each do |line|"},{"line_number":501,"context_line":"            it do"},{"line_number":502,"context_line":"              expect(chef_run).to render_file(file).with_content(line)"}],"source_content_type":"text/x-ruby","patch_set":10,"id":"3407493d_2fe1674e","line":499,"updated":"2021-07-21 16:52:24.000000000","message":"This fails currently.","commit_id":"63c3913504c0b9af341ed219d8e7d84e11ece917"}]}
