)]}'
{
  "commit": "f6b69e23b95d5348a19774ed14f14b53b52b1452",
  "tree": "33874463560c02812dbff7396aa55b1cc7d5c00d",
  "parents": [
    "ae6d0ef3c15a2f5e86250e446031005f290a73d4"
  ],
  "author": {
    "name": "Felipe Monteiro",
    "email": "felipe.monteiro@att.com",
    "time": "Thu May 04 21:55:04 2017 +0100"
  },
  "committer": {
    "name": "Felipe Monteiro",
    "email": "felipe.monteiro@att.com",
    "time": "Thu May 04 20:59:29 2017 +0000"
  },
  "message": "Change \"admin\" literal for admin role to CONF admin_role\n\nCurrently, the Patrole framework always assumes that the admin\nrole is \"admin\". But this might not necessarily be the case.\nThe word \"admin\" is just a convention, but is nonetheless an\narbitrary designation for administration privileges.\n\nInstead, the Patrole framework should take advantage of the\nalready-existing Tempest configuration option:\n\n    cfg.StrOpt(\u0027admin_role\u0027,\n               default\u003d\u0027admin\u0027,\n               help\u003d\"Role required to administrate keystone.\"),\n\nThis patch changes instances of \u0027admin\u0027 (for identifying the\nadmin role) with ``CONF.identity.admin_role``. This patch doesn\u0027t\nmake changes to \u0027admin\u0027 in unit tests, as that\u0027s not necessary,\nbut instead uses ``CONF.set_override`` to change the ``admin_role``\nto \"admin\".\n\nCloses-Bug: #1680294\nChange-Id: Ia4431c2a16892a60fe10bb7e8495e7e384e552c1\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "e68921ff1dbabb1e26bc857575cb798a586e33fd",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/rbac_policy_parser.py",
      "new_id": "82568891ae73279d4a3c86cadbfd705df906a314",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/rbac_policy_parser.py"
    },
    {
      "type": "modify",
      "old_id": "43822599d933ebf82e9b06fc969599e4420a60f0",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/rbac_rule_validation.py",
      "new_id": "8de3d97068237e4326baf9bfbe3e7f271bd5334d",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/rbac_rule_validation.py"
    },
    {
      "type": "modify",
      "old_id": "55a559937a943269965552f4220efc3dc8bc2c86",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/rbac_utils.py",
      "new_id": "4cddb8d1634130f3f211803559961b988450d223",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/rbac_utils.py"
    },
    {
      "type": "modify",
      "old_id": "057ce20b262b9ef0bb34db09524674923a97291a",
      "old_mode": 33188,
      "old_path": "patrole_tempest_plugin/tests/unit/test_rbac_utils.py",
      "new_id": "a2917cfb34b7d98bb26c47a6b0e3081222999742",
      "new_mode": 33188,
      "new_path": "patrole_tempest_plugin/tests/unit/test_rbac_utils.py"
    }
  ]
}
