)]}'
{"keystone/common/policies/role_assignment.py":[{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"564197babe0855a30ebadea8103e54e886be68da","unresolved":false,"context_lines":[{"line_number":35,"context_line":")"},{"line_number":36,"context_line":""},{"line_number":37,"context_line":"DEPRECATED_REASON \u003d \"\"\""},{"line_number":38,"context_line":"As of the Stein release, the role assignment API now understands how to"},{"line_number":39,"context_line":"handle system-scoped tokens in addition to project-scoped tokens, making"},{"line_number":40,"context_line":"the API more accessible to users without compromising security or"},{"line_number":41,"context_line":"manageability for administrators. The new default policies for this API"}],"source_content_type":"text/x-python","patch_set":3,"id":"3fa7e38b_b145de72","line":38,"range":{"start_line":38,"start_character":0,"end_line":38,"end_character":44},"updated":"2019-09-18 07:45:07.000000000","message":"Should we add detail about list role assignments for tree deprecating in train release ?","commit_id":"a2e7994b96c0b3372c26057a24c4e5be809fbf8c"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"518984db7945bd3dad8841a27e82746a1acdfd30","unresolved":false,"context_lines":[{"line_number":35,"context_line":")"},{"line_number":36,"context_line":""},{"line_number":37,"context_line":"DEPRECATED_REASON \u003d \"\"\""},{"line_number":38,"context_line":"As of the Stein release, the role assignment API now understands how to"},{"line_number":39,"context_line":"handle system-scoped tokens in addition to project-scoped tokens, making"},{"line_number":40,"context_line":"the API more accessible to users without compromising security or"},{"line_number":41,"context_line":"manageability for administrators. The new default policies for this API"}],"source_content_type":"text/x-python","patch_set":3,"id":"3fa7e38b_b282b94e","line":38,"range":{"start_line":38,"start_character":0,"end_line":38,"end_character":44},"in_reply_to":"3fa7e38b_b145de72","updated":"2019-09-18 12:42:43.000000000","message":"In cases that I\u0027ve worked on, I\u0027ve made this an entirely new release note that is specific to Train.","commit_id":"a2e7994b96c0b3372c26057a24c4e5be809fbf8c"},{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"054ff2b891800277cc6d0f99393a6b9b9dc440e2","unresolved":false,"context_lines":[{"line_number":35,"context_line":")"},{"line_number":36,"context_line":""},{"line_number":37,"context_line":"DEPRECATED_REASON \u003d \"\"\""},{"line_number":38,"context_line":"As of the Stein release, the role assignment API now understands how to"},{"line_number":39,"context_line":"handle system-scoped tokens in addition to project-scoped tokens, making"},{"line_number":40,"context_line":"the API more accessible to users without compromising security or"},{"line_number":41,"context_line":"manageability for administrators. The new default policies for this API"}],"source_content_type":"text/x-python","patch_set":3,"id":"3fa7e38b_4512a15a","line":38,"range":{"start_line":38,"start_character":0,"end_line":38,"end_character":44},"in_reply_to":"3fa7e38b_b282b94e","updated":"2019-09-18 13:13:33.000000000","message":"I did create a new release note but I should use a different deprecation reason here to indicate the right release.","commit_id":"a2e7994b96c0b3372c26057a24c4e5be809fbf8c"}],"releasenotes/notes/bug-1844461-08a8bdc5f613b88d.yaml":[{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"564197babe0855a30ebadea8103e54e886be68da","unresolved":false,"context_lines":[{"line_number":17,"context_line":"    [`bug 1844461 \u003chttps://bugs.launchpad.net/keystone/+bug/1844461\u003e`_]"},{"line_number":18,"context_line":"    The role assignment ``identity:list_role_assignments_for_subtree`` policy"},{"line_number":19,"context_line":"    now uses ``(role:reader and system_scope:all) or (role:reader and"},{"line_number":20,"context_line":"    domain_id:%(target.project_domain_id)s) or (role:admin and"},{"line_number":21,"context_line":"    project_id:%(target.project.id)s)`` instead of ``rule:admin_required``."},{"line_number":22,"context_line":"    This new default automatically includes support for a read-only role"},{"line_number":23,"context_line":"    and allows for more granular access to the role assignment API. Please"}],"source_content_type":"text/x-yaml","patch_set":3,"id":"3fa7e38b_fc27adb5","line":20,"range":{"start_line":20,"start_character":23,"end_line":20,"end_character":40},"updated":"2019-09-18 07:45:07.000000000","message":"target.project.domain_id","commit_id":"a2e7994b96c0b3372c26057a24c4e5be809fbf8c"}]}
