)]}'
{"manifests/clients.pp":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":5,"context_line":"# \u003d\u003d\u003d Parameters:"},{"line_number":6,"context_line":"#"},{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_afeb8ea1","line":8,"range":{"start_line":8,"start_character":5,"end_line":8,"end_character":6},"updated":"2019-08-20 07:56:28.000000000","message":"uppercase O and on all below","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"},{"line_number":12,"context_line":"# [*ca_file*]"},{"line_number":13,"context_line":"#   (optional) CA cert file to use in SSL connections."}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_0f11825d","line":10,"range":{"start_line":10,"start_character":16,"end_line":10,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":23,"context_line":"#"},{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients ("},{"line_number":29,"context_line":"  $endpoint_type \u003d \u0027publicURL\u0027,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_6f1ef670","line":26,"range":{"start_line":26,"start_character":16,"end_line":26,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients ("},{"line_number":29,"context_line":"  $endpoint_type \u003d \u0027publicURL\u0027,"},{"line_number":30,"context_line":"  $ca_file       \u003d $::os_service_default,"},{"line_number":31,"context_line":"  $cert_file     \u003d $::os_service_default,"},{"line_number":32,"context_line":"  $key_file      \u003d $::os_service_default,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_cf25aac3","line":29,"range":{"start_line":29,"start_character":20,"end_line":29,"end_character":30},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":30,"context_line":"  $ca_file       \u003d $::os_service_default,"},{"line_number":31,"context_line":"  $cert_file     \u003d $::os_service_default,"},{"line_number":32,"context_line":"  $key_file      \u003d $::os_service_default,"},{"line_number":33,"context_line":"  $insecure      \u003d false"},{"line_number":34,"context_line":") {"},{"line_number":35,"context_line":"  include ::heat::deps"},{"line_number":36,"context_line":"  include ::heat::params"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_af262eca","line":33,"range":{"start_line":33,"start_character":19,"end_line":33,"end_character":24},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file     \u003d $::os_service_default,"},{"line_number":32,"context_line":"  $key_file      \u003d $::os_service_default,"},{"line_number":33,"context_line":"  $insecure      \u003d false"},{"line_number":34,"context_line":") {"},{"line_number":35,"context_line":"  include ::heat::deps"},{"line_number":36,"context_line":"  include ::heat::params"},{"line_number":37,"context_line":"  include ::heat::clients::aodh"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_0f32e25e","line":34,"updated":"2019-08-20 07:56:28.000000000","message":"add empty line before all includes","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":32,"context_line":"  $key_file      \u003d $::os_service_default,"},{"line_number":33,"context_line":"  $insecure      \u003d false"},{"line_number":34,"context_line":") {"},{"line_number":35,"context_line":"  include ::heat::deps"},{"line_number":36,"context_line":"  include ::heat::params"},{"line_number":37,"context_line":"  include ::heat::clients::aodh"},{"line_number":38,"context_line":"  include ::heat::clients::barbican"},{"line_number":39,"context_line":"  include ::heat::clients::cinder"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_2f147e4c","line":36,"range":{"start_line":35,"start_character":0,"end_line":36,"end_character":24},"updated":"2019-08-20 07:56:28.000000000","message":"not needed","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"}],"manifests/clients/aodh.pp":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":5,"context_line":"# \u003d\u003d\u003d Parameters:"},{"line_number":6,"context_line":"#"},{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_af194ed1","line":8,"range":{"start_line":8,"start_character":5,"end_line":8,"end_character":6},"updated":"2019-08-20 07:56:28.000000000","message":"uppercase O and on all below","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"},{"line_number":12,"context_line":"# [*ca_file*]"},{"line_number":13,"context_line":"#   (optional) CA cert file to use in SSL connections."}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_2fb8fe72","line":10,"range":{"start_line":10,"start_character":16,"end_line":10,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":23,"context_line":"#"},{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":""},{"line_number":29,"context_line":"class heat::clients::aodh("}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_efad0631","line":26,"range":{"start_line":26,"start_character":16,"end_line":26,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":""},{"line_number":29,"context_line":"class heat::clients::aodh("},{"line_number":30,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":31,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_8f4572b6","line":28,"updated":"2019-08-20 07:56:28.000000000","message":"remove empty line","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":""},{"line_number":29,"context_line":"class heat::clients::aodh("},{"line_number":30,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":31,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":32,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":33,"context_line":"  $key_file      \u003d $heat::clients::key_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_cf3fea22","line":30,"range":{"start_line":30,"start_character":26,"end_line":30,"end_character":33},"updated":"2019-08-20 07:56:28.000000000","message":"typo","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":35,"context_line":"){"},{"line_number":36,"context_line":""},{"line_number":37,"context_line":"  include ::heat::deps"},{"line_number":38,"context_line":"  include ::heat::params"},{"line_number":39,"context_line":""},{"line_number":40,"context_line":"  heat_config {"},{"line_number":41,"context_line":"    \u0027clients_aodh/endpoint_type\u0027: value \u003d\u003e $endpoint_type;"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_af406ea3","line":38,"updated":"2019-08-20 07:56:28.000000000","message":"dont need params","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (Optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to $::os_service_default"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients::aodh("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clients::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_dc3791af","line":28,"updated":"2019-08-21 07:49:13.000000000","message":"spacing","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure      \u003d $heat::clients::insecure"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":""}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_fc3a8d95","line":34,"updated":"2019-08-21 07:49:13.000000000","message":"spacing","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure      \u003d $heat::clients::insecure"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":""},{"line_number":38,"context_line":"  heat_config {"}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_5ca3a19e","line":35,"updated":"2019-08-21 07:49:13.000000000","message":"How about doing something like this; this would make sure we the specific client classes can be included before or after a definition of heat::clients.\n\nThe getvar would rescue any lookup of an undefined variable so it would now throw any error or warnings and just return nil (which would give puppet an undef value) and pick_default would filter that out and choose $endpoint_type value if first is undef.\n\nclass heat::clients::aodh (\n  $endpoint_type \u003d $::os_service_default,\n...\n) {\n\n  include heat::deps\n\n  $endpoint_type_real \u003d pick_default(getvar(\u0027heat::clients::endpoint_type\u0027), $endpoint_type)\n...\n\n  heat_config {\n    \u0027clients_aodh/endpoint_type\u0027: value \u003d\u003e $endpoint_type_real;\n    ...\n  }\n}\n\nLets see what others think :)","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"}],"manifests/clients/barbican.pp":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":5,"context_line":"# \u003d\u003d\u003d Parameters:"},{"line_number":6,"context_line":"#"},{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_8f1ed2b8","line":8,"range":{"start_line":8,"start_character":5,"end_line":8,"end_character":6},"updated":"2019-08-20 07:56:28.000000000","message":"uppercase O and on all below","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"},{"line_number":12,"context_line":"# [*ca_file*]"},{"line_number":13,"context_line":"#   (optional) CA cert file to use in SSL connections."}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_6fc276eb","line":10,"range":{"start_line":10,"start_character":16,"end_line":10,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":23,"context_line":"#"},{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":""},{"line_number":28,"context_line":"class heat::clients::barbican("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_0fb5027e","line":26,"range":{"start_line":26,"start_character":16,"end_line":26,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":""},{"line_number":28,"context_line":"class heat::clients::barbican("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_4f153a9b","line":27,"updated":"2019-08-20 07:56:28.000000000","message":"#","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":""},{"line_number":28,"context_line":"class heat::clients::barbican("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_0f0bc27c","line":28,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":""},{"line_number":28,"context_line":"class heat::clients::barbican("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_2f0ebe8b","line":29,"range":{"start_line":29,"start_character":26,"end_line":29,"end_character":33},"updated":"2019-08-20 07:56:28.000000000","message":"typo","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure      \u003d $heat::clients::insecure"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":"  include ::heat::params"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_6f1836d2","line":34,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":"  include ::heat::params"},{"line_number":38,"context_line":""},{"line_number":39,"context_line":"  heat_config {"},{"line_number":40,"context_line":"    \u0027clients_barbican/endpoint_type\u0027: value \u003d\u003e $endpoint_type;"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_cf284ae3","line":37,"updated":"2019-08-20 07:56:28.000000000","message":"dont need params","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (Optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to $::os_service_default"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients::barbican("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clients::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_bc409507","line":28,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure      \u003d $heat::clients::insecure"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":""}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_5c4ba129","line":34,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"}],"manifests/clients/cinder.pp":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":5,"context_line":"# \u003d\u003d\u003d Parameters:"},{"line_number":6,"context_line":"#"},{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_0f9c220c","line":8,"range":{"start_line":8,"start_character":5,"end_line":8,"end_character":6},"updated":"2019-08-20 07:56:28.000000000","message":"uppercase O on all these","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"},{"line_number":12,"context_line":"# [*ca_file*]"},{"line_number":13,"context_line":"#   (optional) CA cert file to use in SSL connections."}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_cf892aca","line":10,"range":{"start_line":10,"start_character":16,"end_line":10,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":23,"context_line":"#"},{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"# [*http_log_debug*]"},{"line_number":29,"context_line":"#   (optional) Allow client\u0027s debug log output"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_4fbf7a60","line":26,"range":{"start_line":26,"start_character":16,"end_line":26,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"# [*http_log_debug*]"},{"line_number":29,"context_line":"#   (optional) Allow client\u0027s debug log output"},{"line_number":30,"context_line":"#   Defaults to false"},{"line_number":31,"context_line":"#"},{"line_number":32,"context_line":"class heat::clients::cinder("},{"line_number":33,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_ef8426b3","line":30,"range":{"start_line":30,"start_character":16,"end_line":30,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":29,"context_line":"#   (optional) Allow client\u0027s debug log output"},{"line_number":30,"context_line":"#   Defaults to false"},{"line_number":31,"context_line":"#"},{"line_number":32,"context_line":"class heat::clients::cinder("},{"line_number":33,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"},{"line_number":34,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"},{"line_number":35,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_6f7d96e5","line":32,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":30,"context_line":"#   Defaults to false"},{"line_number":31,"context_line":"#"},{"line_number":32,"context_line":"class heat::clients::cinder("},{"line_number":33,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"},{"line_number":34,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"},{"line_number":35,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"},{"line_number":36,"context_line":"  $key_file       \u003d $heat::clients::key_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_8f733216","line":33,"range":{"start_line":33,"start_character":27,"end_line":33,"end_character":34},"updated":"2019-08-20 07:56:28.000000000","message":"typo","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":35,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"},{"line_number":36,"context_line":"  $key_file       \u003d $heat::clients::key_file,"},{"line_number":37,"context_line":"  $insecure       \u003d $heat::clients::insecure,"},{"line_number":38,"context_line":"  $http_log_debug \u003d false"},{"line_number":39,"context_line":"){"},{"line_number":40,"context_line":""},{"line_number":41,"context_line":"  include ::heat::deps"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_af6e2e29","line":38,"range":{"start_line":38,"start_character":20,"end_line":38,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":36,"context_line":"  $key_file       \u003d $heat::clients::key_file,"},{"line_number":37,"context_line":"  $insecure       \u003d $heat::clients::insecure,"},{"line_number":38,"context_line":"  $http_log_debug \u003d false"},{"line_number":39,"context_line":"){"},{"line_number":40,"context_line":""},{"line_number":41,"context_line":"  include ::heat::deps"},{"line_number":42,"context_line":"  include ::heat::params"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_0f80a2be","line":39,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":39,"context_line":"){"},{"line_number":40,"context_line":""},{"line_number":41,"context_line":"  include ::heat::deps"},{"line_number":42,"context_line":"  include ::heat::params"},{"line_number":43,"context_line":""},{"line_number":44,"context_line":"  heat_config {"},{"line_number":45,"context_line":"    \u0027clients_cinder/endpoint_type\u0027:  value \u003d\u003e $endpoint_type;"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_4f63fa42","line":42,"updated":"2019-08-20 07:56:28.000000000","message":"dont need params","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":29,"context_line":"#   (Optional) Allow client\u0027s debug log output"},{"line_number":30,"context_line":"#   Defaults to $::os_service_default"},{"line_number":31,"context_line":"#"},{"line_number":32,"context_line":"class heat::clients::cinder("},{"line_number":33,"context_line":"  $endpoint_type  \u003d $heat::clients::endpoint_type,"},{"line_number":34,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"},{"line_number":35,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_1c51a9d9","line":32,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":36,"context_line":"  $key_file       \u003d $heat::clients::key_file,"},{"line_number":37,"context_line":"  $insecure       \u003d $heat::clients::insecure,"},{"line_number":38,"context_line":"  $http_log_debug \u003d $::os_service_default"},{"line_number":39,"context_line":"){"},{"line_number":40,"context_line":""},{"line_number":41,"context_line":"  include ::heat::deps"},{"line_number":42,"context_line":""}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_3c4ca53d","line":39,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"}],"manifests/clients/glance.pp":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":5,"context_line":"# \u003d\u003d\u003d Parameters:"},{"line_number":6,"context_line":"#"},{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_2f5c7e7b","line":8,"range":{"start_line":8,"start_character":5,"end_line":8,"end_character":6},"updated":"2019-08-20 07:56:28.000000000","message":"uppercase O on all these","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"},{"line_number":12,"context_line":"# [*ca_file*]"},{"line_number":13,"context_line":"#   (optional) CA cert file to use in SSL connections."}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_4f969af2","line":10,"range":{"start_line":10,"start_character":16,"end_line":10,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":23,"context_line":"#"},{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":""},{"line_number":29,"context_line":"class heat::clients::glance("}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_aff5ce52","line":26,"range":{"start_line":26,"start_character":16,"end_line":26,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":""},{"line_number":29,"context_line":"class heat::clients::glance("},{"line_number":30,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":31,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_6f66f653","line":28,"updated":"2019-08-20 07:56:28.000000000","message":"remove empty line","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":""},{"line_number":29,"context_line":"class heat::clients::glance("},{"line_number":30,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":31,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":32,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_cf560a5d","line":29,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":""},{"line_number":29,"context_line":"class heat::clients::glance("},{"line_number":30,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":31,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":32,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":33,"context_line":"  $key_file      \u003d $heat::clients::key_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_8f4c92c8","line":30,"range":{"start_line":30,"start_character":26,"end_line":30,"end_character":33},"updated":"2019-08-20 07:56:28.000000000","message":"typo","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":32,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":33,"context_line":"  $key_file      \u003d $heat::clients::key_file,"},{"line_number":34,"context_line":"  $insecure      \u003d $heat::clients::insecure"},{"line_number":35,"context_line":"){"},{"line_number":36,"context_line":""},{"line_number":37,"context_line":"  include ::heat::deps"},{"line_number":38,"context_line":"  include ::heat::params"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_ef518663","line":35,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":35,"context_line":"){"},{"line_number":36,"context_line":""},{"line_number":37,"context_line":"  include ::heat::deps"},{"line_number":38,"context_line":"  include ::heat::params"},{"line_number":39,"context_line":""},{"line_number":40,"context_line":"  heat_config {"},{"line_number":41,"context_line":"    \u0027clients_glance/endpoint_type\u0027: value \u003d\u003e $endpoint_type;"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_af470ea3","line":38,"updated":"2019-08-20 07:56:28.000000000","message":"dont need params","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (Optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to $::os_service_default"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients::glance("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clients::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_dc60f1a7","line":28,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure      \u003d $heat::clients::insecure"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":""}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_fc636daf","line":34,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"}],"manifests/clients/magnum.pp":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":5,"context_line":"# \u003d\u003d\u003d Parameters:"},{"line_number":6,"context_line":"#"},{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_8fe1f29d","line":8,"range":{"start_line":8,"start_character":5,"end_line":8,"end_character":6},"updated":"2019-08-20 07:56:28.000000000","message":"uppercase O on all these","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"},{"line_number":12,"context_line":"# [*ca_file*]"},{"line_number":13,"context_line":"#   (optional) CA cert file to use in SSL connections."}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_4ff1ba6a","line":10,"range":{"start_line":10,"start_character":16,"end_line":10,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":23,"context_line":"#"},{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":""},{"line_number":28,"context_line":"class heat::clients::magnum("},{"line_number":29,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_6ff4b65b","line":26,"range":{"start_line":26,"start_character":16,"end_line":26,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":""},{"line_number":28,"context_line":"class heat::clients::magnum("},{"line_number":29,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_4fc8da20","line":27,"updated":"2019-08-20 07:56:28.000000000","message":"#","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":""},{"line_number":28,"context_line":"class heat::clients::magnum("},{"line_number":29,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_cf04ca4c","line":28,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":""},{"line_number":28,"context_line":"class heat::clients::magnum("},{"line_number":29,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file       \u003d $heat::clients::key_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_2fea3e73","line":29,"range":{"start_line":29,"start_character":27,"end_line":29,"end_character":34},"updated":"2019-08-20 07:56:28.000000000","message":"typo","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file       \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure       \u003d $heat::clients::insecure,"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":"  include ::heat::params"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_efff4631","line":34,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":"  include ::heat::params"},{"line_number":38,"context_line":""},{"line_number":39,"context_line":"  heat_config {"},{"line_number":40,"context_line":"    \u0027clients_magnum/endpoint_type\u0027: value \u003d\u003e $endpoint_type;"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_8ffa5240","line":37,"updated":"2019-08-20 07:56:28.000000000","message":"dont need params","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (Optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to $::os_service_default"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients::magnum("},{"line_number":29,"context_line":"  $endpoint_type  \u003d $heat::clients::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_9c56f9cd","line":28,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file       \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure       \u003d $heat::clients::insecure"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":""}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_bc5975fd","line":34,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"}],"manifests/clients/neutron.pp":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":5,"context_line":"# \u003d\u003d\u003d Parameters:"},{"line_number":6,"context_line":"#"},{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_8fa81220","line":8,"range":{"start_line":8,"start_character":5,"end_line":8,"end_character":6},"updated":"2019-08-20 07:56:28.000000000","message":"uppercase O on all these","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"},{"line_number":12,"context_line":"# [*ca_file*]"},{"line_number":13,"context_line":"#   (optional) CA cert file to use in SSL connections."}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_4f645a22","line":10,"range":{"start_line":10,"start_character":16,"end_line":10,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":23,"context_line":"#"},{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients::neutron("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_6f67d626","line":26,"range":{"start_line":26,"start_character":16,"end_line":26,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients::neutron("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_0f6ae2eb","line":28,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients::neutron("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clietns::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_2f6d5e02","line":29,"range":{"start_line":29,"start_character":26,"end_line":29,"end_character":33},"updated":"2019-08-20 07:56:28.000000000","message":"typo","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure      \u003d $heat::clients::insecure"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":"  include ::heat::params"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_cf77ead3","line":34,"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":"  include ::heat::params"},{"line_number":38,"context_line":""},{"line_number":39,"context_line":"  heat_config {"},{"line_number":40,"context_line":"    \u0027clients_neutron/endpoint_type\u0027: value \u003d\u003e $endpoint_type;"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_ef72e6e2","line":37,"updated":"2019-08-20 07:56:28.000000000","message":"dont need params","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":25,"context_line":"#   (Optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to $::os_service_default"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"class heat::clients::neutron("},{"line_number":29,"context_line":"  $endpoint_type \u003d $heat::clients::endpoint_type,"},{"line_number":30,"context_line":"  $ca_file       \u003d $heat::clients::ca_file,"},{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_5c740168","line":28,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":31,"context_line":"  $cert_file     \u003d $heat::clients::cert_file,"},{"line_number":32,"context_line":"  $key_file      \u003d $heat::clients::key_file,"},{"line_number":33,"context_line":"  $insecure      \u003d $heat::clients::insecure"},{"line_number":34,"context_line":"){"},{"line_number":35,"context_line":""},{"line_number":36,"context_line":"  include ::heat::deps"},{"line_number":37,"context_line":""}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_7c6f7d91","line":34,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"}],"manifests/clients/nova.pp":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":5,"context_line":"# \u003d\u003d\u003d Parameters:"},{"line_number":6,"context_line":"#"},{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_8f7d72b3","line":8,"range":{"start_line":8,"start_character":5,"end_line":8,"end_character":6},"updated":"2019-08-20 07:56:28.000000000","message":"uppercase O on all these","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":7,"context_line":"# [*endpoint_type*]"},{"line_number":8,"context_line":"#   (optional) Type of endpoint in Identity service catalog to use for"},{"line_number":9,"context_line":"#   communication with the OpenStack service."},{"line_number":10,"context_line":"#   Defaults to publicURL"},{"line_number":11,"context_line":"#"},{"line_number":12,"context_line":"# [*ca_file*]"},{"line_number":13,"context_line":"#   (optional) CA cert file to use in SSL connections."}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_af786ec0","line":10,"range":{"start_line":10,"start_character":16,"end_line":10,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":23,"context_line":"#"},{"line_number":24,"context_line":"# [*insecure*]"},{"line_number":25,"context_line":"#   (optional) If set, then the server\u0027s certificate will not be verified."},{"line_number":26,"context_line":"#   Defaults to false"},{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"# [*http_log_debug*]"},{"line_number":29,"context_line":"#   (optional) Allow client\u0027s debug log output"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_4f4d3a98","line":26,"range":{"start_line":26,"start_character":16,"end_line":26,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":27,"context_line":"#"},{"line_number":28,"context_line":"# [*http_log_debug*]"},{"line_number":29,"context_line":"#   (optional) Allow client\u0027s debug log output"},{"line_number":30,"context_line":"#   Defaults to false"},{"line_number":31,"context_line":"#"},{"line_number":32,"context_line":"class heat::clients::nova("},{"line_number":33,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_6f503633","line":30,"range":{"start_line":30,"start_character":16,"end_line":30,"end_character":21},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":30,"context_line":"#   Defaults to false"},{"line_number":31,"context_line":"#"},{"line_number":32,"context_line":"class heat::clients::nova("},{"line_number":33,"context_line":"  $endpoint_type  \u003d $heat::clietns::endpoint_type,"},{"line_number":34,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"},{"line_number":35,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"},{"line_number":36,"context_line":"  $key_file       \u003d $heat::clients::key_file,"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_2f46be7c","line":33,"range":{"start_line":33,"start_character":27,"end_line":33,"end_character":34},"updated":"2019-08-20 07:56:28.000000000","message":"typo","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":35,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"},{"line_number":36,"context_line":"  $key_file       \u003d $heat::clients::key_file,"},{"line_number":37,"context_line":"  $insecure       \u003d $heat::clients::insecure,"},{"line_number":38,"context_line":"  $http_log_debug \u003d false"},{"line_number":39,"context_line":"){"},{"line_number":40,"context_line":""},{"line_number":41,"context_line":"  include ::heat::deps"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_0f43c26d","line":38,"range":{"start_line":38,"start_character":20,"end_line":38,"end_character":25},"updated":"2019-08-20 07:56:28.000000000","message":"$::os_service_default","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":39,"context_line":"){"},{"line_number":40,"context_line":""},{"line_number":41,"context_line":"  include ::heat::deps"},{"line_number":42,"context_line":"  include ::heat::params"},{"line_number":43,"context_line":""},{"line_number":44,"context_line":"  heat_config {"},{"line_number":45,"context_line":"    \u0027clients_nova/endpoint_type\u0027:  value \u003d\u003e $endpoint_type;"}],"source_content_type":"text/x-puppet","patch_set":2,"id":"7faddb67_cf604a04","line":42,"updated":"2019-08-20 07:56:28.000000000","message":"dont need params","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":29,"context_line":"#   (Optional) Allow client\u0027s debug log output"},{"line_number":30,"context_line":"#   Defaults to $::os_service_default"},{"line_number":31,"context_line":"#"},{"line_number":32,"context_line":"class heat::clients::nova("},{"line_number":33,"context_line":"  $endpoint_type  \u003d $heat::clients::endpoint_type,"},{"line_number":34,"context_line":"  $ca_file        \u003d $heat::clients::ca_file,"},{"line_number":35,"context_line":"  $cert_file      \u003d $heat::clients::cert_file,"}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_1c6a0980","line":32,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"85a17e47e5a5826fa7220b740189aab7cb198fb7","unresolved":false,"context_lines":[{"line_number":36,"context_line":"  $key_file       \u003d $heat::clients::key_file,"},{"line_number":37,"context_line":"  $insecure       \u003d $heat::clients::insecure,"},{"line_number":38,"context_line":"  $http_log_debug \u003d $::os_service_default"},{"line_number":39,"context_line":"){"},{"line_number":40,"context_line":""},{"line_number":41,"context_line":"  include ::heat::deps"},{"line_number":42,"context_line":""}],"source_content_type":"text/x-puppet","patch_set":4,"id":"7faddb67_3c6585af","line":39,"updated":"2019-08-21 07:49:13.000000000","message":"same","commit_id":"f654595f08650dcbe58a3c580cbd04b6074cc116"}],"spec/classes/heat_clients_aodh_spec.rb":[{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":40,"context_line":"  end"},{"line_number":41,"context_line":""},{"line_number":42,"context_line":"  on_supported_os({"},{"line_number":43,"context_line":"    :supported_os   \u003d\u003e OSDefaults.get_supported_os"},{"line_number":44,"context_line":"  }).each do |os,facts|"},{"line_number":45,"context_line":"    context \"on #{os}\" do"},{"line_number":46,"context_line":"      let (:facts) do"}],"source_content_type":"text/x-ruby","patch_set":2,"id":"7faddb67_6f3596f6","line":43,"range":{"start_line":43,"start_character":18,"end_line":43,"end_character":20},"updated":"2019-08-20 07:56:28.000000000","message":"spacing","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"},{"author":{"_account_id":16137,"name":"Tobias Urdin","email":"tobias.urdin@binero.com","username":"tobasco"},"change_message_id":"4699e7aab3552fda1d4126c2a0ba5a456dd35c2c","unresolved":false,"context_lines":[{"line_number":47,"context_line":"        facts.merge!(OSDefaults.get_facts())"},{"line_number":48,"context_line":"      end"},{"line_number":49,"context_line":""},{"line_number":50,"context_line":"      it_configures \u0027heat::clients::aodh\u0027"},{"line_number":51,"context_line":"    end"},{"line_number":52,"context_line":"  end"},{"line_number":53,"context_line":"end"}],"source_content_type":"text/x-ruby","patch_set":2,"id":"7faddb67_0f38a2eb","line":50,"range":{"start_line":50,"start_character":6,"end_line":50,"end_character":19},"updated":"2019-08-20 07:56:28.000000000","message":"it_behaves_like","commit_id":"5d4a6123382f9fb59cc10b7bb5ce1b51ef93cafb"}]}
