)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":10342,"name":"Jay Faulkner","display_name":"JayF","email":"jay@jvf.cc","username":"JayF","status":"youtube.com/@oss-gr / podcast.gr-oss.io"},"change_message_id":"3f1da26f4cb56a0a78ef700559953151c45c7de9","unresolved":true,"context_lines":[],"source_content_type":"","patch_set":1,"id":"9fad7734_13ebd273","updated":"2025-04-17 16:44:00.000000000","message":"Curious if you all think this is worth the risk of backporting to 2024.2 and back.","commit_id":"5cefceae45fcb966aecdde46ba3c363efce01103"},{"author":{"_account_id":10342,"name":"Jay Faulkner","display_name":"JayF","email":"jay@jvf.cc","username":"JayF","status":"youtube.com/@oss-gr / podcast.gr-oss.io"},"change_message_id":"dd37af4dba640e62cfc66f8b9b8935ed692ab893","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":1,"id":"7a3691e0_581b42a6","updated":"2025-04-17 16:43:33.000000000","message":"I might be too chicken to want to backport this change here. The logic changed enough that I\u0027m worried we\u0027ll break downstream deployers; but this also is a positive security change so maybe that\u0027s OK?","commit_id":"5cefceae45fcb966aecdde46ba3c363efce01103"}],"ironic/common/glance_service/service_utils.py":[{"author":{"_account_id":10342,"name":"Jay Faulkner","display_name":"JayF","email":"jay@jvf.cc","username":"JayF","status":"youtube.com/@oss-gr / podcast.gr-oss.io"},"change_message_id":"dd37af4dba640e62cfc66f8b9b8935ed692ab893","unresolved":true,"context_lines":[{"line_number":154,"context_line":"    # If the user is an admin and the config allows ignoring project checks for"},{"line_number":155,"context_line":"    #  admin tasks, allow access."},{"line_number":156,"context_line":"    if is_admin and CONF.ignore_project_check_for_admin_tasks:"},{"line_number":157,"context_line":"        return True"},{"line_number":158,"context_line":"    # If the image is private and the owner is the conductor project,"},{"line_number":159,"context_line":"    #  allow access."},{"line_number":160,"context_line":"    if image_visibility \u003d\u003d \u0027private\u0027 and image_owner \u003d\u003d conductor_project_id:"}],"source_content_type":"text/x-python","patch_set":1,"id":"da4a059a_c2ea5d35","line":157,"updated":"2025-04-17 16:43:33.000000000","message":"This check was not originally in 2024.2 and should not be in this backport.","commit_id":"5cefceae45fcb966aecdde46ba3c363efce01103"},{"author":{"_account_id":37707,"name":"Satoshi Shirosaka","display_name":"Satoshi S.","email":"satoss1108@gmail.com","username":"satoshi-sh"},"change_message_id":"471cfc515cb4082cff4633494139f58894cc1e42","unresolved":false,"context_lines":[{"line_number":154,"context_line":"    # If the user is an admin and the config allows ignoring project checks for"},{"line_number":155,"context_line":"    #  admin tasks, allow access."},{"line_number":156,"context_line":"    if is_admin and CONF.ignore_project_check_for_admin_tasks:"},{"line_number":157,"context_line":"        return True"},{"line_number":158,"context_line":"    # If the image is private and the owner is the conductor project,"},{"line_number":159,"context_line":"    #  allow access."},{"line_number":160,"context_line":"    if image_visibility \u003d\u003d \u0027private\u0027 and image_owner \u003d\u003d conductor_project_id:"}],"source_content_type":"text/x-python","patch_set":1,"id":"6c9b80e2_4ffc2c17","line":157,"in_reply_to":"da4a059a_c2ea5d35","updated":"2025-04-17 17:22:34.000000000","message":"Done","commit_id":"5cefceae45fcb966aecdde46ba3c363efce01103"}]}
