)]}'
{
  "commit": "25e16b8a0f36fbfee8fcccd6926682f0958bcc8d",
  "tree": "1d7c7d0e87b390285883bcabf23052896dda695f",
  "parents": [
    "2b2b95ac1550db8af6b8f2da8880381a13c23ca8"
  ],
  "author": {
    "name": "Douglas Mendizábal",
    "email": "dmendiza@redhat.com",
    "time": "Tue Jun 08 15:39:22 2021 -0500"
  },
  "committer": {
    "name": "Douglas Mendizábal",
    "email": "dmendiza@redhat.com",
    "time": "Tue Jun 08 15:39:22 2021 -0500"
  },
  "message": "Don\u0027t use legacy exponent for RSA\n\nAs stated in the cryptography.io documentation, \"Almost everyone should\nuse 65537\" for the public_exponent in an RSA key. [1]\n\nThis patch also uses a larger RSA key length for FIPS compatibility.\n\n[1] https://cryptography.io/en/latest/hazmat/primitives/asymmetric/rsa/#cryptography.hazmat.primitives.asymmetric.rsa.generate_private_key\n\nChange-Id: I9f0c030b172a544821aa42924e4401cd7ccc9956\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "a39bb0f59e00aef122b6776f2943ac2df8ceed48",
      "old_mode": 33188,
      "old_path": "barbican_tempest_plugin/tests/scenario/barbican_manager.py",
      "new_id": "f60c47c20307a2e6b7f2364d788ed26027c64bf7",
      "new_mode": 33188,
      "new_path": "barbican_tempest_plugin/tests/scenario/barbican_manager.py"
    }
  ]
}
