)]}'
{"keystone/credential/providers/fernet/core.py":[{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"f4d839421d60908bc8ebd153edf3463a4bfd0d5c","unresolved":false,"context_lines":[{"line_number":35,"context_line":"# to the new primary key. If we don\u0027t take this step, it is possible that we"},{"line_number":36,"context_line":"# could remove a key used to encrypt credentials, leaving them unrecoverable."},{"line_number":37,"context_line":"# This also means that we don\u0027t need to expose a `[credential] max_active_keys`"},{"line_number":38,"context_line":"# option through configuration. Instead we will use a global and share that"},{"line_number":39,"context_line":"# across all places that need to use FernetUtils for credential encryption."},{"line_number":40,"context_line":"MAX_ACTIVE_KEYS \u003d 3"},{"line_number":41,"context_line":""}],"source_content_type":"text/x-python","patch_set":1,"id":"9fb8cfa7_2182d8c9","line":38,"range":{"start_line":38,"start_character":54,"end_line":38,"end_character":60},"updated":"2019-06-20 15:02:27.000000000","message":"global what?","commit_id":"397bb27446a6eb6158a9e573e877f72878cbc3e0"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"891779d5755013776ce152aa65b430882184ce00","unresolved":false,"context_lines":[{"line_number":35,"context_line":"# to the new primary key. If we don\u0027t take this step, it is possible that we"},{"line_number":36,"context_line":"# could remove a key used to encrypt credentials, leaving them unrecoverable."},{"line_number":37,"context_line":"# This also means that we don\u0027t need to expose a `[credential] max_active_keys`"},{"line_number":38,"context_line":"# option through configuration. Instead we will use a global and share that"},{"line_number":39,"context_line":"# across all places that need to use FernetUtils for credential encryption."},{"line_number":40,"context_line":"MAX_ACTIVE_KEYS \u003d 3"},{"line_number":41,"context_line":""}],"source_content_type":"text/x-python","patch_set":1,"id":"9fb8cfa7_c48bca65","line":38,"range":{"start_line":38,"start_character":54,"end_line":38,"end_character":60},"in_reply_to":"9fb8cfa7_2182d8c9","updated":"2019-06-20 15:22:56.000000000","message":"Done","commit_id":"397bb27446a6eb6158a9e573e877f72878cbc3e0"},{"author":{"_account_id":21420,"name":"Gage Hugo","email":"gagehugo@gmail.com","username":"ghugo"},"change_message_id":"25583de89e785c42fda34ec53db615d61785a42b","unresolved":false,"context_lines":[{"line_number":33,"context_line":"# keys, if any credential has not been re-encrypted with the current primary"},{"line_number":34,"context_line":"# key, we can abandon the key rotation until all credentials have been migrated"},{"line_number":35,"context_line":"# to the new primary key. If we don\u0027t take this step, it is possible that we"},{"line_number":36,"context_line":"# could remove a key used to encrypt credentials, leaving them unrecoverable."},{"line_number":37,"context_line":"# This also means that we don\u0027t need to expose a `[credential] max_active_keys`"},{"line_number":38,"context_line":"# option through configuration. Instead we will use a global variable and share"},{"line_number":39,"context_line":"# that across all places that need to use FernetUtils for credential"}],"source_content_type":"text/x-python","patch_set":2,"id":"9fb8cfa7_8a5f14e4","line":36,"range":{"start_line":36,"start_character":63,"end_line":36,"end_character":76},"updated":"2019-06-20 21:14:49.000000000","message":"wow yeah good fix here","commit_id":"8817a26ee217ae9d57d53d0e47eb7bcabe007f7b"}]}
