)]}'
{"releasenotes/notes/rbac-policy-support-94f84c29da81c331.yaml":[{"author":{"_account_id":8556,"name":"Ghanshyam Maan","display_name":"Ghanshyam Maan","email":"gmaan.os14@gmail.com","username":"ghanshyam"},"change_message_id":"0eaf6bcea0b68edd1fccb394c073cdb890ccd35a","unresolved":true,"context_lines":[{"line_number":3,"context_line":"  - |"},{"line_number":4,"context_line":"    The default policies provided by placement have been updated to add support"},{"line_number":5,"context_line":"    for read-only roles. This is part of a broader community effort to support"},{"line_number":6,"context_line":"    read-only roles and implement secure, consistent default policies."},{"line_number":7,"context_line":"  - |"},{"line_number":8,"context_line":"    The default policy used for the ``/usages`` API, ``placement:usages``, has"},{"line_number":9,"context_line":"    been updated to allow project users to view information about resource"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"2f906250_6a869804","line":6,"range":{"start_line":6,"start_character":69,"end_line":6,"end_character":70},"updated":"2021-02-09 15:05:06.000000000","message":"placement already has scope_type things, not mentioning those in detail here lgtm but can we add a keystone doc link here for more ref about what is reader role or so\n\nhttps://docs.openstack.org/keystone/latest//admin/service-api-protection.html","commit_id":"a7bbc67d8f358d9a36cd7daf493e1b8affe3cf92"},{"author":{"_account_id":5046,"name":"Lance Bragstad","email":"lbragstad@redhat.com","username":"ldbragst"},"change_message_id":"618c65c27dcd7aa5883ca313e10fcf8d30de76c7","unresolved":true,"context_lines":[{"line_number":11,"context_line":"    The default policy used for the ``/usages`` API, ``placement:usages``, has"},{"line_number":12,"context_line":"    been updated to allow project users to view information about resource"},{"line_number":13,"context_line":"    usage for their project, specified using the ``project_id`` query string"},{"line_number":14,"context_line":"    parameter. Previously this API was restricted to admins."}],"source_content_type":"text/x-yaml","patch_set":2,"id":"b5971bc1_b688bfa2","line":14,"updated":"2021-02-09 19:24:21.000000000","message":"We were verbose in keystone\u0027s release notes saying what policies changed and what the new values were. It was exhausting, but we were afraid that not supplying that information would leave people wondering what to do next outside of digging through the code.\n\nWe could add a link to the policy documentation defaults for placement (they should be updated now) and inform them that they can compare any overrides to the new defaults, and assess if they actually need the overrides.","commit_id":"c8286b6cc1647cef026506adb3559c65104b6d68"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"965e825478e8c44f31de64edb07f08c80ab3e3d2","unresolved":false,"context_lines":[{"line_number":11,"context_line":"    The default policy used for the ``/usages`` API, ``placement:usages``, has"},{"line_number":12,"context_line":"    been updated to allow project users to view information about resource"},{"line_number":13,"context_line":"    usage for their project, specified using the ``project_id`` query string"},{"line_number":14,"context_line":"    parameter. Previously this API was restricted to admins."}],"source_content_type":"text/x-yaml","patch_set":2,"id":"1d6dccd8_a76c3cfb","line":14,"in_reply_to":"b5971bc1_b688bfa2","updated":"2021-02-10 11:24:37.000000000","message":"Done","commit_id":"c8286b6cc1647cef026506adb3559c65104b6d68"}]}
