)]}'
{
  "commit": "9c97850301c2a48e903ff94178a91b2714f03fd7",
  "tree": "d7fdfa00d3e36f12eb4d5b0bd18a312e48d723fa",
  "parents": [
    "b7ce413ed8fa3abb45c311c9f10da5a7c9717a30"
  ],
  "author": {
    "name": "Felipe Monteiro",
    "email": "felipe.monteiro@att.com",
    "time": "Fri Jan 27 17:07:54 2017 -0500"
  },
  "committer": {
    "name": "Felipe Monteiro",
    "email": "felipe.monteiro@att.com",
    "time": "Mon Jan 30 21:53:08 2017 +0000"
  },
  "message": "Improve is_admin support in Patrole converter framework.\n\nRight now is_admin rules are still causing issues. Fixes those\nissues by checking for context_is_admin in the policy file under\ntest and whether the current role is_admin according to the rule\ncontext_is_admin. This ensures that is_admin is reliably\npassed to oslo policy\u0027s check.\n\nAlso adds support for services like nova, which does not\nauto-generate a policy.json file. Uses oslo_policy.generator\nin this case.\n\nChange-Id: I91b567fd13130ebd9e3a9c49c46488c76d99d7a8\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "420de7f1a83f8105b28889c3316ca67267ec6ad4",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/rbac_role_converter.py",
      "new_id": "fb0d2feb5d56905055f7212c225bf1a1b0dbb56c",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/rbac_role_converter.py"
    },
    {
      "type": "add",
      "old_id": "0000000000000000000000000000000000000000",
      "old_mode": 0,
      "old_path": "/dev/null",
      "new_id": "bf07182c08dadfc127524af61646329af991f732",
      "new_mode": 33188,
      "new_path": "tests/resources/alt_admin_rbac_policy.json"
    },
    {
      "type": "modify",
      "old_id": "04eb626895cae64f32dc721dfd832f35bbd32d82",
      "old_mode": 33188,
      "old_path": "tests/test_rbac_role_converter.py",
      "new_id": "f3a97ab1ff290ed94f874bd7662fa47ef350463e",
      "new_mode": 33188,
      "new_path": "tests/test_rbac_role_converter.py"
    }
  ]
}
