)]}'
{
  "commit": "faa9891d6c9e6eb98c2a3e748d77cf14f0e65a0e",
  "tree": "b8c9bbc8f1be2518b993a65920c2ee243de7566d",
  "parents": [
    "dbc8e82b84c2f71cb4ab5eecc135b556b449e9b7"
  ],
  "author": {
    "name": "Claudiu Belu",
    "email": "cbelu@cloudbasesolutions.com",
    "time": "Mon Sep 01 16:50:28 2014 +0300"
  },
  "committer": {
    "name": "Claudiu Belu",
    "email": "cbelu@cloudbasesolutions.com",
    "time": "Tue Oct 14 11:21:59 2014 +0300"
  },
  "message": "Adds TestSecurityGroupsBasicOps created VM\u0027s security_groups check\n\nIn nova.compute.manager.ComputeManager._build_instance, there is the\nfollowing code:\nif request_spec and self.is_neutron_security_groups:\n    security_groups \u003d request_spec.get(\u0027security_group\u0027)\nelse:\n    security_groups \u003d []\n\nWhich will verify this from\nnova.network.security_group.openstack_driver:\ndef is_neutron_security_groups():\n    return CONF.security_group_api.lower() in (\u0027neutron\u0027, \u0027quantum\u0027)\n\nThis basically means that if the Nova compute node\u0027s nova.conf\ndoes not contain security_group_api\u003dneutron, the created VMs\nsecurity_groups will be [], which later will be default.\n\nThis commit checks the created VM\u0027s security_groups, this way\nit makes sure that the created security group rules will be\napplied to the VM.\n\nCloses-Bug: #1364015\n\nChange-Id: I444c128b6be01e29dd95c8727b7fb676e3dc4eed\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "188dea84983e749f8816328eff59c93c43a1c217",
      "old_mode": 33188,
      "old_path": "tempest/scenario/test_security_groups_basic_ops.py",
      "new_id": "6c360341fd6d5cb456a1705e923470bb408efa9f",
      "new_mode": 33188,
      "new_path": "tempest/scenario/test_security_groups_basic_ops.py"
    }
  ]
}
