)]}'
{
  "log": [
    {
      "commit": "a5871a637e03847cf7d7a1afccb2905105c556ca",
      "tree": "184fa781f48e3339d03179c45224c25f2a70104a",
      "parents": [
        "a3eacc4b33b09f37205f2cb222d007b13b2412eb"
      ],
      "author": {
        "name": "Dzmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Wed Nov 07 23:04:36 2018 +0100"
      },
      "committer": {
        "name": "Dzmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Fri Nov 09 12:15:23 2018 +0100"
      },
      "message": "Adding support for bionic\n\nChange-Id: Ie113ddc14fad15d7e9e1de82f99b324ce53bae35\n"
    },
    {
      "commit": "1ca901c8b7ba9e62198a65b611a1bd3187843398",
      "tree": "5174d460b1fcf48dca541b0ceb94d1effd52210b",
      "parents": [
        "43899058c8732ec180e0b95ec1f818f4e02bb559"
      ],
      "author": {
        "name": "Dzmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Mon Nov 05 13:20:52 2018 +0100"
      },
      "committer": {
        "name": "Dzmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Mon Nov 05 13:22:59 2018 +0100"
      },
      "message": "Setting up openstack tests for iptables formula\n\nChange-Id: Ib924de131cca35052b50555c280484ef0161ebaa\n"
    },
    {
      "commit": "e353ce3c493765c0d45cb80a08026b2c1d3ed44c",
      "tree": "dd6150f8d4e18110d859945420da6735a74d8c75",
      "parents": [
        "1a1e8c7db2ceddf4707d751438057fc773e2ea45"
      ],
      "author": {
        "name": "Dzmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Thu Aug 30 17:22:32 2018 +0200"
      },
      "committer": {
        "name": "Dzmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Wed Oct 03 14:28:55 2018 +0200"
      },
      "message": "Refactor from the scratch\n\nCustomer-Found\nProd-Related: CEEMCP-19\nProd-Related: PROD-22620\n\nChange-Id: Ib14838becc409c2f735d93b5fa8a8ead6ea1a5ec\n"
    },
    {
      "commit": "1a1e8c7db2ceddf4707d751438057fc773e2ea45",
      "tree": "ff7f5322805f547b2b42372522cc4475881e8d68",
      "parents": [
        "ef400203909459ee3a4d06da8eeea7e86494df95"
      ],
      "author": {
        "name": "Dzmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Wed Mar 07 00:51:45 2018 +0100"
      },
      "committer": {
        "name": "Dzmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Tue Jul 17 13:20:53 2018 +0000"
      },
      "message": "Unhardcode tables for chains.\n\nThere is a way to manage tables in rules, but there is no way to\nmanage tables for chains when setting policy.\n\nLooks like pillar structure is bad from the beginning and to\nnot break backward compatibility, as same chain names may occur in\ndifferent tables, so it is proposed to check if \u0027chain.policy\u0027 is\nmap. And if it is, specific policies would be ensured for specific\ntables, otherwise table \u0027filter\u0027 would be used as a fallback.\n\nTo ensure chains in specific tables we iterate over all rules in\neach chain.\n\nThis hash is valid:\n\nparameters:\n  iptables:\n    service:\n      enabled: true\n      chain:\n        OUTPUT:\n          policy: ACCEPT\n        FORWARD:\n          policy:\n          - table: mangle\n            policy: DROP\n        INPUT:\n          policy:\n          - table: nat\n            policy: ACCEPT\n          rules:\n          - jump: ACCEPT\n            protocol: icmp\n        POSTROUTING:\n          rules:\n          - jump: MASQUERADE\n            protocol: icmp\n            out_interface: ens3\n            table: nat\n\nProd-Related: CEEMCP-12\nProd-Related: EME-313\n\nChange-Id: Ib5ba97dad165d3ef2dec7e053b391ea36a996103\n"
    },
    {
      "commit": "afb406c73f588aa2a58827d390ceb0581eec6d02",
      "tree": "79bb0c4ea8e2fd6bd232ae8ad4516ae8424272a7",
      "parents": [
        "df842db008780e5aeb91da3992e489ae97e95126"
      ],
      "author": {
        "name": "Dmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Tue Nov 21 12:11:50 2017 +0300"
      },
      "committer": {
        "name": "Dmitry Stremkouski",
        "email": "dstremkouski@mirantis.com",
        "time": "Tue Nov 21 12:12:03 2017 +0300"
      },
      "message": "Adding comment option to iptables rule\n\nChange-Id: I9d93052cfc197a364b42240448344d5543e8805f\n"
    },
    {
      "commit": "dd2d4cfe841199135703fc6fe19973fc2802d9c5",
      "tree": "7805d11a8329b454036e91835e582f0fcc8b525c",
      "parents": [
        "2983e19198047d49e04b44e2a3a08d75ac2cfdcb"
      ],
      "author": {
        "name": "Michel Nederlof",
        "email": "michel@nederlof.info",
        "time": "Tue Jun 27 15:12:36 2017 +0200"
      },
      "committer": {
        "name": "Filip Pytloun",
        "email": "filip@pytloun.cz",
        "time": "Tue Jun 27 15:12:36 2017 +0200"
      },
      "message": "Allow custom chains to be present (#12)\n\n* Allow custom chains to be present, other than the INPUT, FORWARD, OUTPUT default chains.\r\n\r\n* Adding missing endif\r\n\r\n* Require the packages to be installed first.\r\n\r\n* Test should use rules as key, not rule.\r\n\r\n* Making it a array list, instead of a dict.\r\n\r\n* convert rules to a list instead of a dict.\r\n\r\n* Only if policy is defined, include this statement.\r\n\r\n* Only ensure chains if not container :)\r\n\r\n* The chain is only ensured if we are not a container.\r\n\r\n* Do not run at all for containers.\r\n"
    },
    {
      "commit": "0648db7a1395ebe9af5063c346dd1f31a25cf375",
      "tree": "0a3c30c7986ff2818276d11e57e6df46a41fa236",
      "parents": [
        "cf977c62f0b7643fc67d141b537bc0d852617b2a"
      ],
      "author": {
        "name": "jan kaufman",
        "email": "jan.kaufman@tcpcloud.eu",
        "time": "Tue Jan 26 11:34:37 2016 +0100"
      },
      "committer": {
        "name": "jan kaufman",
        "email": "jan.kaufman@tcpcloud.eu",
        "time": "Tue Jan 26 11:35:28 2016 +0100"
      },
      "message": "add formula tests\n"
    }
  ]
}
