)]}'
{"glance/tests/functional/v2/test_metadef_tag_api_policy.py":[{"author":{"_account_id":9303,"name":"Abhishek Kekane","email":"akekane@redhat.com","username":"abhishekkekane"},"change_message_id":"5d5d1e1ff566d98ed631e28841c44f1ccbdce76f","unresolved":true,"context_lines":[{"line_number":38,"context_line":"class TestMetadefTagsPolicy(functional.SynchronousAPIBase):"},{"line_number":39,"context_line":"    def setUp(self):"},{"line_number":40,"context_line":"        super(TestMetadefTagsPolicy, self).setUp()"},{"line_number":41,"context_line":"        self.policy \u003d policy.Enforcer()"},{"line_number":42,"context_line":""},{"line_number":43,"context_line":"    def load_data(self, create_tags\u003dFalse):"},{"line_number":44,"context_line":"        path \u003d \u0027/v2/metadefs/namespaces\u0027"}],"source_content_type":"text/x-python","patch_set":16,"id":"4e2e0466_2b263bd5","line":41,"range":{"start_line":41,"start_character":8,"end_line":41,"end_character":39},"updated":"2021-08-19 14:39:39.000000000","message":"self.policy \u003d policy.Enforcer(suppress_deprecation_warnings\u003dTrue)","commit_id":"fc3af486f089691e273202f0dc16c3153f4b62c7"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"3e5040c7e20826102e6cb662a9afc25314714985","unresolved":true,"context_lines":[{"line_number":188,"context_line":"        resp \u003d self.api_get(path)"},{"line_number":189,"context_line":"        self.assertEqual(403, resp.status_code)"},{"line_number":190,"context_line":""},{"line_number":191,"context_line":"        # Now disable bot permissions and make sure you will get"},{"line_number":192,"context_line":"        # 404 Not Found"},{"line_number":193,"context_line":"        self.set_policy_rules({"},{"line_number":194,"context_line":"            \u0027get_metadef_tags\u0027: \u0027!\u0027,"}],"source_content_type":"text/x-python","patch_set":17,"id":"4097f96c_f89d408b","line":191,"range":{"start_line":191,"start_character":22,"end_line":191,"end_character":25},"updated":"2021-08-19 19:34:26.000000000","message":"nit: both*","commit_id":"910be543d2013684edd86dc6705c3dfd83b2b5f1"},{"author":{"_account_id":4393,"name":"Dan Smith","email":"dms@danplanet.com","username":"danms"},"change_message_id":"e7ce201edc6ca3880ba03125e3469dd3e26bd99a","unresolved":true,"context_lines":[],"source_content_type":"","patch_set":20,"id":"f1a0de59_372e2d0f","line":393,"updated":"2021-08-25 21:47:42.000000000","message":"I think I\u0027ve been forgetting to check on these, but it\u0027s always good to put a happy-path check for the tag after all these failed deletes. Make sure that we\u0027re getting 403 _and_ the delete isn\u0027t accidentally happening anyway. This probably applies to several other recent patches, so it\u0027s too late, but maybe if someone is back in these soon, it\u0027d be worth adding.","commit_id":"f1020946a96ea7b718083d073170c45cc81b62a4"}],"glance/tests/unit/v2/test_metadef_resources.py":[{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"3e5040c7e20826102e6cb662a9afc25314714985","unresolved":true,"context_lines":[{"line_number":2142,"context_line":""},{"line_number":2143,"context_line":"    def test_tag_update_non_existing(self):"},{"line_number":2144,"context_line":"        request \u003d unit_test_utils.get_fake_request("},{"line_number":2145,"context_line":"            tenant\u003dTENANT3, roles\u003d[\u0027admin\u0027])"},{"line_number":2146,"context_line":""},{"line_number":2147,"context_line":"        tag \u003d tags.MetadefTag()"},{"line_number":2148,"context_line":"        tag.name \u003d TAG1"}],"source_content_type":"text/x-python","patch_set":17,"id":"8dfbf545_aac0ddc5","line":2145,"range":{"start_line":2145,"start_character":36,"end_line":2145,"end_character":41},"updated":"2021-08-19 19:34:26.000000000","message":"Same comment here as in the properties patch. Do we want to future proof this or at least make it accurate with what keystone is going to provide you in a token but expanding out the role implications?\n\n  roles\u003d[\u0027admin\u0027, \u0027member\u0027, \u0027reader\u0027]","commit_id":"910be543d2013684edd86dc6705c3dfd83b2b5f1"}]}
