)]}'
{"/COMMIT_MSG":[{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"0fb4ec7fe0677d97577af042b745a832e030465f","unresolved":false,"context_lines":[{"line_number":13,"context_line":"the policy.DocumentedRuleDefault and fills the"},{"line_number":14,"context_line":"required policy parameters as needed."},{"line_number":15,"context_line":""},{"line_number":16,"context_line":"[0] I2b59f92545c5ead2a883d358f72f3ad3b3dfe1a6"},{"line_number":17,"context_line":""},{"line_number":18,"context_line":"Change-Id: Ie4e353149a3827f9e9beede920c8db5eb62aa003"},{"line_number":19,"context_line":"Partially-Implements: bp policy-docs"}],"source_content_type":"text/x-gerrit-commit-message","patch_set":4,"id":"dfeb2761_b02481b0","line":16,"updated":"2017-04-04 15:33:50.000000000","message":"This is already automatically linked on line 19 using the bp policy-docs syntax.","commit_id":"68eacec96ce5fd4f13fa72667b93271a7c43a973"}],"keystone/common/policies/auth.py":[{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"69eab49b15b20296acfb5a129486928db864dfab","unresolved":false,"context_lines":[{"line_number":24,"context_line":"    policy.DocumentedRuleDefault("},{"line_number":25,"context_line":"        name\u003dbase.IDENTITY % \u0027get_auth_projects\u0027,"},{"line_number":26,"context_line":"        check_str\u003d\u0027\u0027,"},{"line_number":27,"context_line":"        description\u003d\u0027Get available project scopes\u0027,"},{"line_number":28,"context_line":"        operations\u003d[{\u0027path\u0027: \u0027/v3/auth/projects\u0027,"},{"line_number":29,"context_line":"                     \u0027method\u0027: \u0027GET\u0027}]),"},{"line_number":30,"context_line":"    policy.DocumentedRuleDefault("}],"source_content_type":"text/x-python","patch_set":1,"id":"ffe62b97_461a226f","line":27,"updated":"2017-03-27 21:19:02.000000000","message":"nit: Instead of using the term scopes we could do:\n\n  List all projects a user has access to via role assignments. This\n  includes direct role assignments given to the user on a project as well\n  as any role assignments given to a group the user is a member of.","commit_id":"a85c0e6aa6bf2ccd310299f63d5aa914472c165c"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"69eab49b15b20296acfb5a129486928db864dfab","unresolved":false,"context_lines":[{"line_number":30,"context_line":"    policy.DocumentedRuleDefault("},{"line_number":31,"context_line":"        name\u003dbase.IDENTITY % \u0027get_auth_domains\u0027,"},{"line_number":32,"context_line":"        check_str\u003d\u0027\u0027,"},{"line_number":33,"context_line":"        description\u003d\u0027Get available domain scopes\u0027,"},{"line_number":34,"context_line":"        operations\u003d[{\u0027path\u0027: \u0027/v3/auth/domains\u0027,"},{"line_number":35,"context_line":"                     \u0027method\u0027: \u0027GET\u0027}]),"},{"line_number":36,"context_line":"]"}],"source_content_type":"text/x-python","patch_set":1,"id":"ffe62b97_863dcac5","line":33,"updated":"2017-03-27 21:19:02.000000000","message":"nit: Same comment here as above.","commit_id":"a85c0e6aa6bf2ccd310299f63d5aa914472c165c"}]}
