)]}'
{"doc/source/user/config.rst":[{"author":{"_account_id":4146,"name":"Clark Boylan","email":"cboylan@sapwetik.org","username":"cboylan"},"change_message_id":"529f75ed84efaa200ebec19a1be27fa14834f393","unresolved":false,"context_lines":[{"line_number":1125,"context_line":"      :term:`untrusted-project`, `allowed-projects` is automatically"},{"line_number":1126,"context_line":"      set to the current project only, and can not be overridden."},{"line_number":1127,"context_line":"      However, a :term:`config-project` may still add such a job to"},{"line_number":1128,"context_line":"      any project\u0027s pipeline."},{"line_number":1129,"context_line":""},{"line_number":1130,"context_line":"      .. warning::"},{"line_number":1131,"context_line":""}],"source_content_type":"text/x-rst","patch_set":3,"id":"9fb8cfa7_b1e340d8","line":1128,"updated":"2019-06-24 22:05:22.000000000","message":"I think that maybe we should add a warning or note here that circumventing this protection could allow a destination project to expose a source project\u0027s secret.","commit_id":"9021fdf8bba7728d77472b5a21b7b3a540f4a7f4"}],"tests/fixtures/config/allowed-projects-trusted/git/common-config/zuul.yaml":[{"author":{"_account_id":16068,"name":"Tobias Henkel","email":"tobias.henkel@bmw.de","username":"tobias.henkel"},"change_message_id":"bd01f10c6ce79c25b75ff07c1ba2d4204f201586","unresolved":false,"context_lines":[{"line_number":16,"context_line":"    name: base"},{"line_number":17,"context_line":"    run: playbooks/base.yaml"},{"line_number":18,"context_line":"    parent: null"},{"line_number":19,"context_line":"    "},{"line_number":20,"context_line":"- project:"},{"line_number":21,"context_line":"    name: common-config"},{"line_number":22,"context_line":"    check:"}],"source_content_type":"text/x-yaml","patch_set":2,"id":"9fb8cfa7_77f620da","line":19,"updated":"2019-06-24 16:30:08.000000000","message":"trailing whitespace","commit_id":"1afe64ce0634067e559a1c4c6c4d5a68a2535fb4"}]}
