)]}'
{"oslo_policy/shell.py":[{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"639f476adcace5c1e7e2c02308db12dcc7f21662","unresolved":false,"context_lines":[{"line_number":78,"context_line":"    if access_data.get(\u0027project\u0027):"},{"line_number":79,"context_line":"        access_data[\u0027project_id\u0027] \u003d access_data[\u0027project\u0027][\u0027id\u0027]"},{"line_number":80,"context_line":"    if access_data.get(\u0027system\u0027):"},{"line_number":81,"context_line":"        access_data[\u0027system_scope\u0027] \u003d \u0027all\u0027"},{"line_number":82,"context_line":"    access_data[\u0027is_admin\u0027] \u003d is_admin"},{"line_number":83,"context_line":""},{"line_number":84,"context_line":"    with open(policy_file, \"rb\", 0) as p:"}],"source_content_type":"text/x-python","patch_set":3,"id":"3fa7e38b_e3f6b78f","line":81,"updated":"2019-10-28 16:44:42.000000000","message":"Will this eventually need to understand domain-scope, too?","commit_id":"99daead510eac0e2ca1a07b13e421987541efc36"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"8922504435a0a9410a0630a30a9d95a0368ff8e7","unresolved":false,"context_lines":[{"line_number":78,"context_line":"    if access_data.get(\u0027project\u0027):"},{"line_number":79,"context_line":"        access_data[\u0027project_id\u0027] \u003d access_data[\u0027project\u0027][\u0027id\u0027]"},{"line_number":80,"context_line":"    if access_data.get(\u0027system\u0027):"},{"line_number":81,"context_line":"        access_data[\u0027system_scope\u0027] \u003d \u0027all\u0027"},{"line_number":82,"context_line":"    access_data[\u0027is_admin\u0027] \u003d is_admin"},{"line_number":83,"context_line":""},{"line_number":84,"context_line":"    with open(policy_file, \"rb\", 0) as p:"}],"source_content_type":"text/x-python","patch_set":3,"id":"3fa7e38b_e666c5ed","line":81,"in_reply_to":"3fa7e38b_c3037b41","updated":"2019-10-28 17:08:47.000000000","message":"Done.\n\nhttps://bugs.launchpad.net/oslo.policy/+bug/1850186","commit_id":"99daead510eac0e2ca1a07b13e421987541efc36"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"3bc99ad73a2f242201c95a7da9bfb3b32325d6c6","unresolved":false,"context_lines":[{"line_number":78,"context_line":"    if access_data.get(\u0027project\u0027):"},{"line_number":79,"context_line":"        access_data[\u0027project_id\u0027] \u003d access_data[\u0027project\u0027][\u0027id\u0027]"},{"line_number":80,"context_line":"    if access_data.get(\u0027system\u0027):"},{"line_number":81,"context_line":"        access_data[\u0027system_scope\u0027] \u003d \u0027all\u0027"},{"line_number":82,"context_line":"    access_data[\u0027is_admin\u0027] \u003d is_admin"},{"line_number":83,"context_line":""},{"line_number":84,"context_line":"    with open(policy_file, \"rb\", 0) as p:"}],"source_content_type":"text/x-python","patch_set":3,"id":"3fa7e38b_c3037b41","line":81,"in_reply_to":"3fa7e38b_e369d724","updated":"2019-10-28 16:59:05.000000000","message":"That makes sense. Maybe we can just track domain-support in oslopolicy-checker as a wishlist bug for now?","commit_id":"99daead510eac0e2ca1a07b13e421987541efc36"},{"author":{"_account_id":8482,"name":"Colleen Murphy","email":"colleen@gazlene.net","username":"krinkle"},"change_message_id":"982f8138d11e0efa21caea89ef74c4cf96dbe2d4","unresolved":false,"context_lines":[{"line_number":78,"context_line":"    if access_data.get(\u0027project\u0027):"},{"line_number":79,"context_line":"        access_data[\u0027project_id\u0027] \u003d access_data[\u0027project\u0027][\u0027id\u0027]"},{"line_number":80,"context_line":"    if access_data.get(\u0027system\u0027):"},{"line_number":81,"context_line":"        access_data[\u0027system_scope\u0027] \u003d \u0027all\u0027"},{"line_number":82,"context_line":"    access_data[\u0027is_admin\u0027] \u003d is_admin"},{"line_number":83,"context_line":""},{"line_number":84,"context_line":"    with open(policy_file, \"rb\", 0) as p:"}],"source_content_type":"text/x-python","patch_set":3,"id":"3fa7e38b_e369d724","line":81,"in_reply_to":"3fa7e38b_e3f6b78f","updated":"2019-10-28 16:53:17.000000000","message":"That would be a useful feature, but for the purpose of getting the checker to pass on most of keystone\u0027s default policies only system scope was needed.","commit_id":"99daead510eac0e2ca1a07b13e421987541efc36"}]}
