)]}'
{
  "commit": "61b90493ffb0f13b8159e6d8757608927c927e5e",
  "tree": "865ac89f7a49139ccb7abebd4b2e0e38298e64fb",
  "parents": [
    "470c8b01521f2956378b5aa3417b4fbbdfc79105"
  ],
  "author": {
    "name": "Felipe Monteiro",
    "email": "felipe.monteiro@att.com",
    "time": "Tue Mar 14 11:52:22 2017 -0400"
  },
  "committer": {
    "name": "Felipe Monteiro",
    "email": "felipe.monteiro@att.com",
    "time": "Tue Mar 14 11:56:40 2017 -0400"
  },
  "message": "Switch to admin role during client set up to fix some gate bugs.\n\nThe current framework only adds the admin role to\nthe cls.os.\u003cclient-name\u003e namespace when switchToRbacRole\u003dFalse\nis executed; meaning that the first test that is executed\nin a test run will not have the admin role during set up.\n\nThus, it is necessary to add a switch_role with\nswitchToRbacRole\u003dFalse to setup_clients (after rbac_utils\nis instantiated), so that class-level resources are set\nup with admin credentials. This is why\ntest_flavor_extra_specs_rbac is currently failing [0].\n(setup_clients is called before resource_setup.)\n\nThis patch:\n  * Performs switchToRbacRole\u003dFalse in the setup_clients\n    of every base Patrole test class.\n\n[0] http://logs.openstack.org/94/444994/2/check/gate-tempest-dsvm-patrole-admin-ubuntu-xenial-nv/a00e22a/console.html\n\nChange-Id: I8027938daa4fdfff0ac5336324aa6d647322237b\nPartial-Bug: #1670553\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "de544bb832ba49ff954c604fdfde61ec5efc5853",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/tests/api/compute/rbac_base.py",
      "new_id": "625b5cfafeae6128e8b8d5b4311f77d3a7a53c23",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/tests/api/compute/rbac_base.py"
    },
    {
      "type": "modify",
      "old_id": "e7cca4a2f5a7739868cabb66caaef7dc6475ede7",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/tests/api/identity/v2/rbac_base.py",
      "new_id": "ffee5c0f3e64cb448897afc3ef4a9fe095e2e383",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/tests/api/identity/v2/rbac_base.py"
    },
    {
      "type": "modify",
      "old_id": "3f045f2d88e7acc439911dc9c6f1d47b80384a7a",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/tests/api/identity/v3/rbac_base.py",
      "new_id": "7a67459c17fdb1236039ba59e725be73727d5dd3",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/tests/api/identity/v3/rbac_base.py"
    },
    {
      "type": "modify",
      "old_id": "daea89cc56946d6175396d5d7b43c92acda4ae1a",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/tests/api/image/rbac_base.py",
      "new_id": "b4fed7d2742b1b22ad33eebf0d25a27021e20aa3",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/tests/api/image/rbac_base.py"
    },
    {
      "type": "modify",
      "old_id": "af5d11076a019049d34fb0ecedb90411d1e120c4",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/tests/api/network/rbac_base.py",
      "new_id": "de5ed88994ae504c08bca26bab6038fc4d75ae93",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/tests/api/network/rbac_base.py"
    },
    {
      "type": "modify",
      "old_id": "562c66eb4aac72446e2c9bfd35d027d578e43a7c",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/tests/api/orchestration/rbac_base.py",
      "new_id": "f90decc4424907c0ee65a3160605cb6398a8fcb8",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/tests/api/orchestration/rbac_base.py"
    },
    {
      "type": "modify",
      "old_id": "005986d07c7f942a020adf591c8ef541aa439471",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/tests/api/volume/rbac_base.py",
      "new_id": "c76247351e579757f11843e7f5cfa001c66c5786",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/tests/api/volume/rbac_base.py"
    }
  ]
}
