)]}'
{"/COMMIT_MSG":[{"author":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"change_message_id":"fc8404fb08bd73f64aa0056340d07e18e0855570","unresolved":false,"context_lines":[{"line_number":12,"context_line":"implementations."},{"line_number":13,"context_line":""},{"line_number":14,"context_line":"This part focuses on removing the firewall drivers themselves, which are"},{"line_number":15,"context_line":"now unused. It also updates the release note."},{"line_number":16,"context_line":""},{"line_number":17,"context_line":"Change-Id: I2dccf1610d6cbbb076fda393f1ef695d0be84b13"},{"line_number":18,"context_line":"Signed-off-by: Stephen Finucane \u003csfinucan@redhat.com\u003e"}],"source_content_type":"text/x-gerrit-commit-message","patch_set":2,"id":"3fa7e38b_31294af1","line":15,"updated":"2020-01-07 22:32:54.000000000","message":"This commit message should mention the conf options it\u0027s removing.","commit_id":"0210cf17593a543a78bfd47e0f9f25d45313c716"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"2e2c44d253d3be20fc69a04ab7f139a069d6abef","unresolved":false,"context_lines":[{"line_number":12,"context_line":"implementations."},{"line_number":13,"context_line":""},{"line_number":14,"context_line":"This part focuses on removing the firewall drivers themselves, which are"},{"line_number":15,"context_line":"now unused. It also updates the release note."},{"line_number":16,"context_line":""},{"line_number":17,"context_line":"Change-Id: I2dccf1610d6cbbb076fda393f1ef695d0be84b13"},{"line_number":18,"context_line":"Signed-off-by: Stephen Finucane \u003csfinucan@redhat.com\u003e"}],"source_content_type":"text/x-gerrit-commit-message","patch_set":2,"id":"3fa7e38b_8edfb536","line":15,"in_reply_to":"3fa7e38b_31294af1","updated":"2020-01-08 13:57:14.000000000","message":"Done","commit_id":"0210cf17593a543a78bfd47e0f9f25d45313c716"}],"nova/conf/network.py":[{"author":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"change_message_id":"fc8404fb08bd73f64aa0056340d07e18e0855570","unresolved":false,"context_lines":[{"line_number":859,"context_line":"    # NOTE(sfinucan): While this is predominantly used by nova-network, there"},{"line_number":860,"context_line":"    # appears to be a very limited use case where iptables rules are also used"},{"line_number":861,"context_line":"    # with neutron. Namely, when neutron\u0027s port filtering is disabled, security"},{"line_number":862,"context_line":"    # groups are disabled, and the \u0027firewall_driver\u0027 has been set to the"},{"line_number":863,"context_line":"    # libvirt IPTables driver. We may wish to remove this functionality in"},{"line_number":864,"context_line":"    # favour of neutron in the future."},{"line_number":865,"context_line":"    cfg.StrOpt(\"iptables_drop_action\","}],"source_content_type":"text/x-python","patch_set":2,"id":"3fa7e38b_3104ea7d","line":862,"range":{"start_line":862,"start_character":36,"end_line":862,"end_character":51},"updated":"2020-01-07 22:32:54.000000000","message":"This should be removed/reworded. Is this comment still applicable?","commit_id":"0210cf17593a543a78bfd47e0f9f25d45313c716"},{"author":{"_account_id":15334,"name":"Stephen Finucane","display_name":"stephenfin","email":"stephenfin@redhat.com","username":"sfinucan"},"change_message_id":"2e2c44d253d3be20fc69a04ab7f139a069d6abef","unresolved":false,"context_lines":[{"line_number":859,"context_line":"    # NOTE(sfinucan): While this is predominantly used by nova-network, there"},{"line_number":860,"context_line":"    # appears to be a very limited use case where iptables rules are also used"},{"line_number":861,"context_line":"    # with neutron. Namely, when neutron\u0027s port filtering is disabled, security"},{"line_number":862,"context_line":"    # groups are disabled, and the \u0027firewall_driver\u0027 has been set to the"},{"line_number":863,"context_line":"    # libvirt IPTables driver. We may wish to remove this functionality in"},{"line_number":864,"context_line":"    # favour of neutron in the future."},{"line_number":865,"context_line":"    cfg.StrOpt(\"iptables_drop_action\","}],"source_content_type":"text/x-python","patch_set":2,"id":"3fa7e38b_4e10ddf4","line":862,"range":{"start_line":862,"start_character":36,"end_line":862,"end_character":51},"in_reply_to":"3fa7e38b_3104ea7d","updated":"2020-01-08 13:57:14.000000000","message":"Done","commit_id":"0210cf17593a543a78bfd47e0f9f25d45313c716"},{"author":{"_account_id":14070,"name":"Eric Fried","email":"openstack@fried.cc","username":"efried"},"change_message_id":"fc8404fb08bd73f64aa0056340d07e18e0855570","unresolved":false,"context_lines":[{"line_number":882,"context_line":"    # NOTE(sfinucan): While this is predominantly used by nova-network, there"},{"line_number":883,"context_line":"    # appears to be a very limited use case where iptables rules are also used"},{"line_number":884,"context_line":"    # with neutron. Namely, when neutron\u0027s port filtering is disabled, security"},{"line_number":885,"context_line":"    # groups are disabled, and the \u0027firewall_driver\u0027 has been set to the"},{"line_number":886,"context_line":"    # libvirt IPTables driver. We may wish to remove this functionality in"},{"line_number":887,"context_line":"    # favour of neutron in the future."},{"line_number":888,"context_line":"    cfg.BoolOpt(\u0027defer_iptables_apply\u0027,"}],"source_content_type":"text/x-python","patch_set":2,"id":"3fa7e38b_51072682","line":885,"range":{"start_line":885,"start_character":36,"end_line":885,"end_character":51},"updated":"2020-01-07 22:32:54.000000000","message":"ditto","commit_id":"0210cf17593a543a78bfd47e0f9f25d45313c716"}]}
