)]}'
{
  "log": [
    {
      "commit": "9fc782edb8526cea28b2e258206e3f15b41ad636",
      "tree": "d8b149d9b7d52944e477d65487618f11862fa40d",
      "parents": [
        "35da29123dfa041ea719a17f1cea3615c198eb8b"
      ],
      "author": {
        "name": "Felipe Monteiro",
        "email": "felipe.monteiro@att.com",
        "time": "Wed Feb 01 15:38:46 2017 -0500"
      },
      "committer": {
        "name": "Felipe Monteiro",
        "email": "felipe.monteiro@att.com",
        "time": "Wed Feb 01 16:52:18 2017 -0500"
      },
      "message": "Fixes policy rules in neutron containing the keyword tenant_id.\n\nThe owner policy in neutron\u0027s policy.json is \"tenant_id:%(tenant_id)s\".\nCurrently, the rbac_role_converter does not populate the target dict,\nresponsible for providing oslo policy with as much information\nabout the target or user performing an action as possible, with\nthe key \u0027tenant_id\u0027. Consequently, the rules containing the format\noutlined above fail.\n\nThis patch adds \u0027tenant_id\u0027 as well as \u0027network:tenant_id\u0027 to the\ntarget dict, in order to work with neutron\u0027s policy.json.\n\nChange-Id: Iecf30d714ed0e9ebde2bff6013551accdf250cef\nCloses-Bug: #1661062\n"
    },
    {
      "commit": "9c97850301c2a48e903ff94178a91b2714f03fd7",
      "tree": "d7fdfa00d3e36f12eb4d5b0bd18a312e48d723fa",
      "parents": [
        "b7ce413ed8fa3abb45c311c9f10da5a7c9717a30"
      ],
      "author": {
        "name": "Felipe Monteiro",
        "email": "felipe.monteiro@att.com",
        "time": "Fri Jan 27 17:07:54 2017 -0500"
      },
      "committer": {
        "name": "Felipe Monteiro",
        "email": "felipe.monteiro@att.com",
        "time": "Mon Jan 30 21:53:08 2017 +0000"
      },
      "message": "Improve is_admin support in Patrole converter framework.\n\nRight now is_admin rules are still causing issues. Fixes those\nissues by checking for context_is_admin in the policy file under\ntest and whether the current role is_admin according to the rule\ncontext_is_admin. This ensures that is_admin is reliably\npassed to oslo policy\u0027s check.\n\nAlso adds support for services like nova, which does not\nauto-generate a policy.json file. Uses oslo_policy.generator\nin this case.\n\nChange-Id: I91b567fd13130ebd9e3a9c49c46488c76d99d7a8\n"
    },
    {
      "commit": "b0595650c3e218a323290f44457520a92abf09a6",
      "tree": "0996edf2e2efb09d494fc1a387e5603bd56d6d59",
      "parents": [
        "2006807611378a636cdfb355caeec96837b44deb"
      ],
      "author": {
        "name": "Felipe Monteiro",
        "email": "felipe.monteiro@att.com",
        "time": "Mon Jan 23 16:51:58 2017 -0500"
      },
      "committer": {
        "name": "Felipe Monteiro",
        "email": "felipe.monteiro@att.com",
        "time": "Mon Jan 23 17:47:54 2017 -0500"
      },
      "message": "Fixes converter not working for certain edge cases.\n\nCurrently, the converter framework is not robust enough to handle\nall policy cases. For example, is_admin context breaks.\n\nThis patch makes the converter more robust. The converter was changed\nto use oslo_policy\u0027s shell tool for figuring out which roles are\npermitted for a given rule. The shell tool can be found here:\nhttps://github.com/openstack/oslo.policy/blob/master/oslo_policy/shell.py\n\nBecause the shell tool is intended to be used as a CLI tool, it was\nadapted from oslo policy to better work within Patrole.\n\nimplements blueprint: oslo-policy-converter\n\nChange-Id: Ia0fe9113e2be44e609b0edbb4c6facd1425f28b5\n"
    }
  ]
}
