)]}'
{
  "commit": "0565fd3eacdb2cccdf0ab12bd181d2154605f0ec",
  "tree": "5164ed9ca0147816a65a0e334d29aa5ef2f23040",
  "parents": [
    "eef838171eefe031b9c82d81a2116473e7b31fcf"
  ],
  "author": {
    "name": "Kevin Benton",
    "email": "blak111@gmail.com",
    "time": "Tue Sep 02 03:18:46 2014 -0700"
  },
  "committer": {
    "name": "Kevin Benton",
    "email": "blak111@gmail.com",
    "time": "Wed Oct 29 05:32:13 2014 -0700"
  },
  "message": "Prevent external router IPs from being sent back\n\nIn anticipation of change Iba7c606eea48181fc10e9d0d5dc667e6f48f37de\nbeing merged or at least a minimum a fix for bug #1255142, the\nrouter response will have external IP address information available\nthat is not mutable by a regular tenant. This patch removes that\ninformation from the response before replaying it back for a router\nupdate.\n\nChange-Id: Id1da9246bca2a2eee69f751856ffa7052eb18ef9\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "78ed56ffc4536dbe9da1a9051223297674ee58f8",
      "old_mode": 33188,
      "old_path": "tempest/services/network/json/network_client.py",
      "new_id": "46475f0ffde489d3b822c45a7baa86bae416d447",
      "new_mode": 33188,
      "new_path": "tempest/services/network/json/network_client.py"
    }
  ]
}
