)]}'
{"/COMMIT_MSG":[{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"61f589d850037f9f2fd895a5d30d8e09b61438d2","unresolved":false,"context_lines":[{"line_number":4,"context_line":"Commit:     Vishakha Agarwal \u003cagarwalvishakha18@gmail.com\u003e"},{"line_number":5,"context_line":"CommitDate: 2019-09-04 16:39:25 +0530"},{"line_number":6,"context_line":""},{"line_number":7,"context_line":"Add Domain User coverage for domain config API"},{"line_number":8,"context_line":""},{"line_number":9,"context_line":"This change modifies the policies for domain config"},{"line_number":10,"context_line":"API to be more self-service by properly checking for"},{"line_number":11,"context_line":"system scopes. It also includes the test cases."},{"line_number":12,"context_line":""},{"line_number":13,"context_line":"Subsequent patches will -"},{"line_number":14,"context_line":""}],"source_content_type":"text/x-gerrit-commit-message","patch_set":1,"id":"5faad753_c8f2399b","line":11,"range":{"start_line":7,"start_character":0,"end_line":11,"end_character":14},"updated":"2019-09-06 20:23:10.000000000","message":"Be more specific. What this is doing is allowing users with domain-scoped tokens to access the security compliance domain config policy which was previously accessible only to project- and system-users.","commit_id":"6e39e701c69da7c01418589f995acc4bebd56b85"},{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"2aed5978c3e78ea49bfa08ad45d5ef57654839db","unresolved":false,"context_lines":[{"line_number":4,"context_line":"Commit:     Vishakha Agarwal \u003cagarwalvishakha18@gmail.com\u003e"},{"line_number":5,"context_line":"CommitDate: 2019-09-04 16:39:25 +0530"},{"line_number":6,"context_line":""},{"line_number":7,"context_line":"Add Domain User coverage for domain config API"},{"line_number":8,"context_line":""},{"line_number":9,"context_line":"This change modifies the policies for domain config"},{"line_number":10,"context_line":"API to be more self-service by properly checking for"},{"line_number":11,"context_line":"system scopes. It also includes the test cases."},{"line_number":12,"context_line":""},{"line_number":13,"context_line":"Subsequent patches will -"},{"line_number":14,"context_line":""}],"source_content_type":"text/x-gerrit-commit-message","patch_set":1,"id":"5faad753_49c6456a","line":11,"range":{"start_line":7,"start_character":0,"end_line":11,"end_character":14},"in_reply_to":"5faad753_c8f2399b","updated":"2019-09-07 17:57:48.000000000","message":"Done","commit_id":"6e39e701c69da7c01418589f995acc4bebd56b85"}],"keystone/tests/unit/protection/v3/test_domain_config.py":[{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"61f589d850037f9f2fd895a5d30d8e09b61438d2","unresolved":false,"context_lines":[{"line_number":54,"context_line":"            c.get(\u0027/v3/domains/%s/config/security_compliance/password_regex_description\u0027"},{"line_number":55,"context_line":"                  % CONF.identity.default_domain_id, headers\u003dself.headers)"},{"line_number":56,"context_line":""},{"line_number":57,"context_line":"    def test_user_can_get_security_compliance_config_with_user_from_other_domain(self):"},{"line_number":58,"context_line":"        domain \u003d unit.new_domain_ref()"},{"line_number":59,"context_line":"        PROVIDERS.resource_api.create_domain(domain[\u0027id\u0027], domain)"},{"line_number":60,"context_line":""}],"source_content_type":"text/x-python","patch_set":1,"id":"5faad753_a8e1fdd2","line":57,"updated":"2019-09-06 20:23:10.000000000","message":"See note on this test from previous patch","commit_id":"6e39e701c69da7c01418589f995acc4bebd56b85"},{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"2aed5978c3e78ea49bfa08ad45d5ef57654839db","unresolved":false,"context_lines":[{"line_number":54,"context_line":"            c.get(\u0027/v3/domains/%s/config/security_compliance/password_regex_description\u0027"},{"line_number":55,"context_line":"                  % CONF.identity.default_domain_id, headers\u003dself.headers)"},{"line_number":56,"context_line":""},{"line_number":57,"context_line":"    def test_user_can_get_security_compliance_config_with_user_from_other_domain(self):"},{"line_number":58,"context_line":"        domain \u003d unit.new_domain_ref()"},{"line_number":59,"context_line":"        PROVIDERS.resource_api.create_domain(domain[\u0027id\u0027], domain)"},{"line_number":60,"context_line":""}],"source_content_type":"text/x-python","patch_set":1,"id":"5faad753_e9a051a8","line":57,"in_reply_to":"5faad753_a8e1fdd2","updated":"2019-09-07 17:57:48.000000000","message":"Done","commit_id":"6e39e701c69da7c01418589f995acc4bebd56b85"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"aca8601fdaacee2f555417398270314928ac4d44","unresolved":false,"context_lines":[{"line_number":328,"context_line":"                  % domain[\u0027id\u0027], headers\u003dself.headers,"},{"line_number":329,"context_line":"                  expected_status_code\u003dhttp_client.FORBIDDEN)"},{"line_number":330,"context_line":""},{"line_number":331,"context_line":"    def test_user_cannot_get_non_existant_config(self):"},{"line_number":332,"context_line":"        domain \u003d PROVIDERS.resource_api.create_domain("},{"line_number":333,"context_line":"            uuid.uuid4().hex, unit.new_domain_ref()"},{"line_number":334,"context_line":"        )"}],"source_content_type":"text/x-python","patch_set":3,"id":"5faad753_ca6c480a","line":331,"range":{"start_line":331,"start_character":38,"end_line":331,"end_character":39},"updated":"2019-09-10 01:03:54.000000000","message":"existent","commit_id":"ad6c2c1b9489e04ab2d94d9336345e81fb14eaf2"}]}
