)]}'
{"doc/source/contributor/domain-specific-configuration.rst":[{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"19e276f988ced7b18086ac8ac67b917495fa52aa","unresolved":false,"context_lines":[{"line_number":14,"context_line":"      License for the specific language governing permissions and limitations"},{"line_number":15,"context_line":"      under the License."},{"line_number":16,"context_line":""},{"line_number":17,"context_line":"Enable drivers for domain-specific configuration"},{"line_number":18,"context_line":"\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d"},{"line_number":19,"context_line":""},{"line_number":20,"context_line":"Keystone supports the option of having domain-specific backends for the"}],"source_content_type":"text/x-rst","patch_set":7,"id":"ff570b3c_cf1a3a15","line":17,"updated":"2020-05-19 20:10:03.000000000","message":"This is not what I meant. Here is what I said:\n\n \u003e Instead of replacing \"controllers\" with \"API\", could we replace\n \u003e this part with something that makes it clear what this section is\n \u003e really about - maybe \"... for domain-specific backends\"?\n\nBy \"this part\" I meant the part I highlighted, which was just \"between API and drivers\". Enabling drivers is not what the section is about. It is still about identity entity ID management.\n\nSo my suggestion was for the title to become \"Identity entity ID management for domain-specific backends\". I also would not rename the file, there is no reason to do so.","commit_id":"8be60601321ebc140c701b7b3e44fa3b3eca59ba"},{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"f4002fedad237a38c259a0ab314f5c9243b6aa0d","unresolved":false,"context_lines":[{"line_number":14,"context_line":"      License for the specific language governing permissions and limitations"},{"line_number":15,"context_line":"      under the License."},{"line_number":16,"context_line":""},{"line_number":17,"context_line":"Enable drivers for domain-specific configuration"},{"line_number":18,"context_line":"\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d"},{"line_number":19,"context_line":""},{"line_number":20,"context_line":"Keystone supports the option of having domain-specific backends for the"}],"source_content_type":"text/x-rst","patch_set":7,"id":"ff570b3c_f5442476","line":17,"in_reply_to":"ff570b3c_cf1a3a15","updated":"2020-05-20 09:24:42.000000000","message":"Done","commit_id":"8be60601321ebc140c701b7b3e44fa3b3eca59ba"},{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"19e276f988ced7b18086ac8ac67b917495fa52aa","unresolved":false,"context_lines":[{"line_number":22,"context_line":"a different LDAP server for each domain. To ensure that Keystone can determine"},{"line_number":23,"context_line":"to which backend it should route an API call, starting with Juno, the"},{"line_number":24,"context_line":"identity manager will, provided that :ref: `domain-specific backends"},{"line_number":25,"context_line":"\u003cenable_drivers_for_domain\u003e` are enabled, build on-the-fly a persistent mapping"},{"line_number":26,"context_line":"table between Keystone Public IDs that are presented to the API and the domain"},{"line_number":27,"context_line":"that holds the entity, along with whatever local ID is understood by the driver."},{"line_number":28,"context_line":"This hides, for instance, the LDAP specifics of whatever ID is being used."}],"source_content_type":"text/x-rst","patch_set":7,"id":"ff570b3c_6fc96e57","line":25,"updated":"2020-05-19 20:10:03.000000000","message":"The link isn\u0027t coming out correctly, if you check the preview site: https://b5ee1ed3653a458879e1-60fa9bbec8248937c3af4b3a8047f40b.ssl.cf2.rackcdn.com/723403/7/check/openstack-tox-docs/6e15bc8/docs/contributor/domain-specific-configuration.html","commit_id":"8be60601321ebc140c701b7b3e44fa3b3eca59ba"},{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"f4002fedad237a38c259a0ab314f5c9243b6aa0d","unresolved":false,"context_lines":[{"line_number":22,"context_line":"a different LDAP server for each domain. To ensure that Keystone can determine"},{"line_number":23,"context_line":"to which backend it should route an API call, starting with Juno, the"},{"line_number":24,"context_line":"identity manager will, provided that :ref: `domain-specific backends"},{"line_number":25,"context_line":"\u003cenable_drivers_for_domain\u003e` are enabled, build on-the-fly a persistent mapping"},{"line_number":26,"context_line":"table between Keystone Public IDs that are presented to the API and the domain"},{"line_number":27,"context_line":"that holds the entity, along with whatever local ID is understood by the driver."},{"line_number":28,"context_line":"This hides, for instance, the LDAP specifics of whatever ID is being used."}],"source_content_type":"text/x-rst","patch_set":7,"id":"ff570b3c_d5476076","line":25,"in_reply_to":"ff570b3c_6fc96e57","updated":"2020-05-20 09:24:42.000000000","message":"Done","commit_id":"8be60601321ebc140c701b7b3e44fa3b3eca59ba"}],"doc/source/contributor/id-manage.rst":[{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"077298995d27f8cd91c0eaf38c2ec14698bce0f3","unresolved":false,"context_lines":[{"line_number":14,"context_line":"      License for the specific language governing permissions and limitations"},{"line_number":15,"context_line":"      under the License."},{"line_number":16,"context_line":""},{"line_number":17,"context_line":"Identity entity ID management between API and drivers"},{"line_number":18,"context_line":"\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d"},{"line_number":19,"context_line":""},{"line_number":20,"context_line":"Keystone supports the option of having domain-specific backends for the"}],"source_content_type":"text/x-rst","patch_set":3,"id":"ff570b3c_a50cd03b","line":17,"range":{"start_line":17,"start_character":29,"end_line":17,"end_character":53},"updated":"2020-05-12 22:14:37.000000000","message":"Instead of replacing \"controllers\" with \"API\", could we replace this part with something that makes it clear what this section is really about - maybe \"... for domain-specific backends\"?","commit_id":"6fce141721db720e76f1c2c94fc58bfa0e2525e9"},{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"6bba2c6232abe208c84af33c6fb51b6bee5c588d","unresolved":false,"context_lines":[{"line_number":14,"context_line":"      License for the specific language governing permissions and limitations"},{"line_number":15,"context_line":"      under the License."},{"line_number":16,"context_line":""},{"line_number":17,"context_line":"Identity entity ID management between API and drivers"},{"line_number":18,"context_line":"\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d"},{"line_number":19,"context_line":""},{"line_number":20,"context_line":"Keystone supports the option of having domain-specific backends for the"}],"source_content_type":"text/x-rst","patch_set":3,"id":"ff570b3c_a471150f","line":17,"range":{"start_line":17,"start_character":29,"end_line":17,"end_character":53},"in_reply_to":"ff570b3c_a50cd03b","updated":"2020-05-18 08:48:59.000000000","message":"Good suggestion. Thanks","commit_id":"6fce141721db720e76f1c2c94fc58bfa0e2525e9"},{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"077298995d27f8cd91c0eaf38c2ec14698bce0f3","unresolved":false,"context_lines":[{"line_number":15,"context_line":"      under the License."},{"line_number":16,"context_line":""},{"line_number":17,"context_line":"Identity entity ID management between API and drivers"},{"line_number":18,"context_line":"\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d"},{"line_number":19,"context_line":""},{"line_number":20,"context_line":"Keystone supports the option of having domain-specific backends for the"},{"line_number":21,"context_line":"identity driver (i.e. for user and group storage), allowing, for example,"}],"source_content_type":"text/x-rst","patch_set":3,"id":"ff570b3c_42acca33","line":18,"updated":"2020-05-12 22:14:37.000000000","message":"The underline is now mismatched","commit_id":"6fce141721db720e76f1c2c94fc58bfa0e2525e9"},{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"6bba2c6232abe208c84af33c6fb51b6bee5c588d","unresolved":false,"context_lines":[{"line_number":15,"context_line":"      under the License."},{"line_number":16,"context_line":""},{"line_number":17,"context_line":"Identity entity ID management between API and drivers"},{"line_number":18,"context_line":"\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d\u003d"},{"line_number":19,"context_line":""},{"line_number":20,"context_line":"Keystone supports the option of having domain-specific backends for the"},{"line_number":21,"context_line":"identity driver (i.e. for user and group storage), allowing, for example,"}],"source_content_type":"text/x-rst","patch_set":3,"id":"ff570b3c_e4682d1e","line":18,"in_reply_to":"ff570b3c_42acca33","updated":"2020-05-18 08:48:59.000000000","message":"Done","commit_id":"6fce141721db720e76f1c2c94fc58bfa0e2525e9"},{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"077298995d27f8cd91c0eaf38c2ec14698bce0f3","unresolved":false,"context_lines":[{"line_number":35,"context_line":"the mapping for the default LDAP driver, hence hiding the LDAP specifics of the"},{"line_number":36,"context_line":"IDs being used."},{"line_number":37,"context_line":""},{"line_number":38,"context_line":".. _domain-specific backends: https://docs.openstack.org/keystone/latest/admin/configuration.html#enable-drivers-for-domain-specific-configuration-files"}],"source_content_type":"text/x-rst","patch_set":3,"id":"ff570b3c_e2507e61","line":38,"updated":"2020-05-12 22:14:37.000000000","message":"This isn\u0027t future-proof, it would be better to use a relative link rather than treating it as an external site for the reasons given here https://review.opendev.org/675667","commit_id":"6fce141721db720e76f1c2c94fc58bfa0e2525e9"},{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"6bba2c6232abe208c84af33c6fb51b6bee5c588d","unresolved":false,"context_lines":[{"line_number":35,"context_line":"the mapping for the default LDAP driver, hence hiding the LDAP specifics of the"},{"line_number":36,"context_line":"IDs being used."},{"line_number":37,"context_line":""},{"line_number":38,"context_line":".. _domain-specific backends: https://docs.openstack.org/keystone/latest/admin/configuration.html#enable-drivers-for-domain-specific-configuration-files"}],"source_content_type":"text/x-rst","patch_set":3,"id":"ff570b3c_445ab982","line":38,"in_reply_to":"ff570b3c_e2507e61","updated":"2020-05-18 08:48:59.000000000","message":"Done","commit_id":"6fce141721db720e76f1c2c94fc58bfa0e2525e9"}],"keystone/identity/backends/sql.py":[{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"19e276f988ced7b18086ac8ac67b917495fa52aa","unresolved":false,"context_lines":[{"line_number":46,"context_line":"    def _check_password(self, password, user_ref):"},{"line_number":47,"context_line":"        \"\"\"Check the specified password against the data store."},{"line_number":48,"context_line":""},{"line_number":49,"context_line":"        Note that we\u0027ll pass the entire user_ref in case the subclass"},{"line_number":50,"context_line":"        needs things like user_ref.get(\u0027name\u0027)"},{"line_number":51,"context_line":"        For further justification, please see the follow up suggestion at"},{"line_number":52,"context_line":"        https://blueprints.launchpad.net/keystone/+spec/sql-identiy-pam"}],"source_content_type":"text/x-python","patch_set":7,"id":"ff570b3c_8fd32204","line":49,"updated":"2020-05-19 20:10:03.000000000","message":"This is unrelated to the doc change","commit_id":"8be60601321ebc140c701b7b3e44fa3b3eca59ba"},{"author":{"_account_id":27621,"name":"Vishakha Agarwal","email":"agarwalvishakha18@gmail.com","username":"Vishakha"},"change_message_id":"f4002fedad237a38c259a0ab314f5c9243b6aa0d","unresolved":false,"context_lines":[{"line_number":46,"context_line":"    def _check_password(self, password, user_ref):"},{"line_number":47,"context_line":"        \"\"\"Check the specified password against the data store."},{"line_number":48,"context_line":""},{"line_number":49,"context_line":"        Note that we\u0027ll pass the entire user_ref in case the subclass"},{"line_number":50,"context_line":"        needs things like user_ref.get(\u0027name\u0027)"},{"line_number":51,"context_line":"        For further justification, please see the follow up suggestion at"},{"line_number":52,"context_line":"        https://blueprints.launchpad.net/keystone/+spec/sql-identiy-pam"}],"source_content_type":"text/x-python","patch_set":7,"id":"ff570b3c_155d5846","line":49,"in_reply_to":"ff570b3c_8fd32204","updated":"2020-05-20 09:24:42.000000000","message":"Done","commit_id":"8be60601321ebc140c701b7b3e44fa3b3eca59ba"}]}
