)]}'
{"neutron/conf/policies/security_groups_default_statefulness.py":[{"author":{"_account_id":1131,"name":"Brian Haley","email":"haleyb.dev@gmail.com","username":"brian-haley"},"change_message_id":"b1661fd8801fc58a4a562aef1476b9436c0c0ad6","unresolved":true,"context_lines":[{"line_number":27,"context_line":"        description\u003d("},{"line_number":28,"context_line":"            \u0027Create a default statefulness setting for security groups. \u0027"},{"line_number":29,"context_line":"            \u0027System-wide settings (no project_id) always require admin \u0027"},{"line_number":30,"context_line":"            \u0027privileges. Per-project settings could be relaxed via policy \u0027"},{"line_number":31,"context_line":"            \u0027override to allow project owners.\u0027),"},{"line_number":32,"context_line":"        operations\u003d["},{"line_number":33,"context_line":"            {"},{"line_number":34,"context_line":"                \u0027method\u0027: \u0027POST\u0027,"}],"source_content_type":"text/x-python","patch_set":3,"id":"90336ff1_13b5d3a5","line":31,"range":{"start_line":30,"start_character":25,"end_line":31,"end_character":45},"updated":"2026-05-08 17:23:02.000000000","message":"This (and it\u0027s copied below) seems like an incomplete sentence. If it\u0027s admin-only and we want to relax to allow project owner to create something like this would work:\n\n\"Per-project settings could be relaxed via policy override to allow creation by project owners\"\n\nIf so, below ones would change based on usage - update/delete","commit_id":"c0d670e8654c251854deb0cad798793c19044e1c"}],"neutron/tests/unit/conf/policies/test_security_groups_default_statefulness.py":[{"author":{"_account_id":1131,"name":"Brian Haley","email":"haleyb.dev@gmail.com","username":"brian-haley"},"change_message_id":"b1661fd8801fc58a4a562aef1476b9436c0c0ad6","unresolved":true,"context_lines":[{"line_number":157,"context_line":"        self.context \u003d self.project_member_ctx"},{"line_number":158,"context_line":""},{"line_number":159,"context_line":""},{"line_number":160,"context_line":"class ProjectReaderTests(SecurityGroupDefaultStatefulnessAPITestCase):"},{"line_number":161,"context_line":""},{"line_number":162,"context_line":"    def setUp(self):"},{"line_number":163,"context_line":"        super().setUp()"}],"source_content_type":"text/x-python","patch_set":3,"id":"998c7265_3b9bc93e","line":160,"range":{"start_line":160,"start_character":25,"end_line":160,"end_character":68},"updated":"2026-05-08 17:23:02.000000000","message":"s/ProjectManagerTests ?\n\nAt least it looks the same","commit_id":"c0d670e8654c251854deb0cad798793c19044e1c"}],"releasenotes/notes/security-groups-default-statefulness-a7e2e9ec4ba8490f.yaml":[{"author":{"_account_id":1131,"name":"Brian Haley","email":"haleyb.dev@gmail.com","username":"brian-haley"},"change_message_id":"b1661fd8801fc58a4a562aef1476b9436c0c0ad6","unresolved":true,"context_lines":[{"line_number":3,"context_line":"  - |"},{"line_number":4,"context_line":"    Added a new ``security-groups-default-statefulness`` API extension that"},{"line_number":5,"context_line":"    allows configuring the default value of the ``stateful`` attribute for"},{"line_number":6,"context_line":"    new security groups, on a per-project or system-wide basis. Operators"},{"line_number":7,"context_line":"    and users can create, update, show, list and delete default statefulness"},{"line_number":8,"context_line":"    settings through the new ``security_groups_default_statefulness``"},{"line_number":9,"context_line":"    resource. This is useful for deployments where stateless security groups"},{"line_number":10,"context_line":"    are preferred by default."}],"source_content_type":"text/x-yaml","patch_set":3,"id":"2c0fb1e4_d3148044","line":7,"range":{"start_line":6,"start_character":64,"end_line":7,"end_character":55},"updated":"2026-05-08 17:23:02.000000000","message":"Maybe I need to go read the spec again, but I thought this was admin-only to create/update/delete and users should only list/show","commit_id":"c0d670e8654c251854deb0cad798793c19044e1c"}]}
