)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"80b93632e595da050830816b76c634c1ad76e8ce","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":1,"id":"9555c6ab_8c7e4495","updated":"2025-11-19 16:53:17.000000000","message":"I agree to update these policy as admin should be able to continue accessing these API. without OR_ADMIN, admin is not allowed because PROJECT_READER has the project_id checks.\n\nAs this was released, please add a releasenotes in upgrade to highlight this change","commit_id":"42631956e79aadbff34c26f87ea754cb5a989a4c"},{"author":{"_account_id":4690,"name":"melanie witt","display_name":"melwitt","email":"melwittt@gmail.com","username":"melwitt"},"change_message_id":"f28879c86c7f1bca5621275112f96021d97e6ca7","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"ed576944_12a337ad","updated":"2026-01-23 02:28:53.000000000","message":"Looks OK to me","commit_id":"f017e23b81a8a3c02473148bff3e91898249953d"},{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"d830bff7c7f051f065ebebb61d3abb08e0f38a26","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"eef0c5e1_608304d3","updated":"2025-11-20 18:17:11.000000000","message":"lgtm, thanks for updates\n\nhttps://storage.gra.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_afb/openstack/afb66896d2cd4a1e81373ef7135dc630/docs/unreleased.html","commit_id":"f017e23b81a8a3c02473148bff3e91898249953d"}],"releasenotes/notes/fix_server_shares_policies-3eb7b22330f886fc.yaml":[{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"948847b4957e06b9dc5755369a49f89f1fb0081e","unresolved":true,"context_lines":[{"line_number":1,"context_line":"---"},{"line_number":2,"context_line":"upgrade:"},{"line_number":3,"context_line":"  - |"},{"line_number":4,"context_line":"    The server-shares API policies have been updated to align with the"},{"line_number":5,"context_line":"    ``*_OR_ADMIN`` pattern used across other Nova APIs. The following"},{"line_number":6,"context_line":"    policies now default to allowing either the corresponding project role"},{"line_number":7,"context_line":"    **or** an administrator:"},{"line_number":8,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":2,"id":"7178bd32_5a2051f4","line":5,"range":{"start_line":4,"start_character":4,"end_line":5,"end_character":53},"updated":"2025-11-19 18:07:00.000000000","message":"this might be less understandable for users/operators as it talks more about code details. how about something like:\n\n\n\nThe server-shares API policies have been updated to allow admin users (those with the role ``admin``) to access them. There are no changes to the permissions for project users with the role ``reader``. The following API policies have been updated from ``PROJECT_READER`` to ``PROJECT_READER_OR_ADMIN`` to facilitate this change.\n\n    * ``os_compute_api:os-server-shares:index``\n    * ``os_compute_api:os-server-shares:create``\n    * ``os_compute_api:os-server-shares:show``\n    * ``os_compute_api:os-server-shares:delete``","commit_id":"65caa4697f0c56704836ef7a2e37a5c5ce9ef200"},{"author":{"_account_id":16207,"name":"ribaudr","display_name":"uggla","email":"rene.ribaud@gmail.com","username":"uggla","status":"Red Hat"},"change_message_id":"fef5552aa84aa9892c11572a17781e8f90365b66","unresolved":false,"context_lines":[{"line_number":1,"context_line":"---"},{"line_number":2,"context_line":"upgrade:"},{"line_number":3,"context_line":"  - |"},{"line_number":4,"context_line":"    The server-shares API policies have been updated to align with the"},{"line_number":5,"context_line":"    ``*_OR_ADMIN`` pattern used across other Nova APIs. The following"},{"line_number":6,"context_line":"    policies now default to allowing either the corresponding project role"},{"line_number":7,"context_line":"    **or** an administrator:"},{"line_number":8,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":2,"id":"1278a926_5d5eaa19","line":5,"range":{"start_line":4,"start_character":4,"end_line":5,"end_character":53},"in_reply_to":"7178bd32_5a2051f4","updated":"2025-11-20 14:15:38.000000000","message":"Done","commit_id":"65caa4697f0c56704836ef7a2e37a5c5ce9ef200"}]}
