get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/617342/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 617342,
    "url": "http://patchwork.ozlabs.org/api/patches/617342/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/openwrt/patch/owrt-patch-20160502-2@vittgam.net/",
    "project": {
        "id": 45,
        "url": "http://patchwork.ozlabs.org/api/projects/45/?format=api",
        "name": "OpenWrt development",
        "link_name": "openwrt",
        "list_id": "openwrt-devel.lists.openwrt.org",
        "list_email": "openwrt-devel@lists.openwrt.org",
        "web_url": "http://openwrt.org/",
        "scm_url": "git://git.openwrt.org/openwrt.git",
        "webscm_url": "https://dev.openwrt.org/browser",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<owrt-patch-20160502-2@vittgam.net>",
    "list_archive_url": null,
    "date": "2016-05-02T03:28:41",
    "name": "[OpenWrt-Devel] ramips: Drop hacky switch workaround for failsafe on rt3x5x and rt5350.",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "117f3cd854e3806aa483fe6cf04c8d3024bdc492",
    "submitter": {
        "id": 65409,
        "url": "http://patchwork.ozlabs.org/api/people/65409/?format=api",
        "name": "Vittorio Gambaletta",
        "email": "openwrt@vittgam.net"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/openwrt/patch/owrt-patch-20160502-2@vittgam.net/mbox/",
    "series": [],
    "comments": "http://patchwork.ozlabs.org/api/patches/617342/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/617342/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<openwrt-devel-bounces@lists.openwrt.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": [
            "patchwork-incoming@bilbo.ozlabs.org",
            "<openwrt-devel@lists.openwrt.org>"
        ],
        "Received": [
            "from arrakis.dune.hu (caladan.dune.hu [78.24.191.180])\n\t(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3qyqXK0wKZz9t6j\n\tfor <incoming@patchwork.ozlabs.org>;\n\tMon,  2 May 2016 13:28:49 +1000 (AEST)",
            "from arrakis.dune.hu (localhost [127.0.0.1])\n\tby arrakis.dune.hu (Postfix) with ESMTP id 1FF74B91BCE;\n\tMon,  2 May 2016 05:28:44 +0200 (CEST)",
            "from arrakis.dune.hu (localhost [127.0.0.1])\n\tby arrakis.dune.hu (Postfix) with ESMTP;\n\tMon,  2 May 2016 05:28:44 +0200 (CEST)",
            "from arrakis.dune.hu (localhost [127.0.0.1])\n\tby arrakis.dune.hu (Postfix) with ESMTP id 8DFD4B91BCA\n\tfor <openwrt-devel@lists.openwrt.org>;\n\tMon,  2 May 2016 05:28:42 +0200 (CEST)",
            "from mail.vittgam.net (server1.vittgam.net [213.239.197.142])\n\tby arrakis.dune.hu (Postfix) with ESMTPS\n\tfor <openwrt-devel@lists.openwrt.org>;\n\tMon,  2 May 2016 05:28:42 +0200 (CEST)",
            "from vl3 (vl3.r12.network.mietitrebbia.rocks [10.48.6.117])\n\tby mail.vittgam.net with SMTP id u423Sfn6184288\n\tfor <openwrt-devel@lists.openwrt.org>; Mon, 2 May 2016 05:28:41 +0200"
        ],
        "Authentication-Results": "ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (4096-bit key;\n\tunprotected) header.d=vittgam.net header.i=@vittgam.net\n\theader.b=Yfbzr/+n; dkim-atps=neutral",
        "X-Spam-Checker-Version": "SpamAssassin 3.4.1 (2015-04-28) on arrakis.dune.hu",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-1.5 required=5.0 tests=BAYES_00,T_DKIM_INVALID\n\tautolearn=unavailable autolearn_force=no version=3.4.1",
        "X-policyd-weight": "using cached result; rate:hard: -6.1",
        "X-DKIM": "OpenDKIM Filter v2.4.2 mail.vittgam.net u423Sfn6184288",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple; d=vittgam.net;\n\ts=20150519; t=1462159722;\n\tbh=yFulZJa7Hys1gpfKeqkFDWa2Yr4vjKRcROuYhXYFnG8=;\n\th=From:To:Subject:Content-Type:Message-ID;\n\tb=Yfbzr/+nPD6j1ZeWsYYkCvGkGwgyhpozWAyNDEtH7vkcPuTszA2M0oX2U+a6rPE3j\n\tbZG3RvRMMh5lf+Jq4wP4fj1vtdsuYYi1pGr2pwKVsg4s6Ix4IFzFmE2tuVUMvse92V\n\tx+YnHsGuJUz50RXrRS6w5m0redqxRMIa3uZgmAbakdMb91mKkRkTJDCMV5UY8Qy2i0\n\t3t6JsccB84BBeF+mNBLvkc3ZT6CxzlBYp8O38ZL/EEvAYMUvCAqTrKwuOk7bWJSfob\n\taWNWKxlnoYtoGjZFMpVrkqXYagM5gn0KU6PDIFkqqcHo12OcxTzlf54M6I1t45jif4\n\t1pk66C2JCY1Dw+/FrVSXkR4hVjyI2n+ObUU6h/CNdsfx/L5hO1Qt2h1dGFm28NNB9+\n\tuTEMlvKwkkPgtnW7BrpGCkAYGjtxEl3k/W61GLnPRca5jMHMtJaU11N/7dFNdrZFDa\n\tbJ66abfpTvVHJ1JNwnQAlHNQcDlp8L/+/Giqtmhm3txfQruRFr0kRXzZQj9WVSwMXz\n\t86kqImOl3M7aYJkK1dh5pM3A61KZ3Qecc35MVadqVfP63Wk/c83nAlO/Bl/HCbupVR\n\t4xNpLotneMj77Oqq3g9ma4jqIf66nI/nSuoyjnDtsuVMNb63Vlvkib07jTNunat7Ew\n\ttTCK6+4UxCOGWWSP7WIxNhpg=",
        "Date": "Mon, 2 May 2016 05:28:41 +0200",
        "From": "\"Vittorio Gambaletta (VittGam)\" <openwrt@vittgam.net>",
        "To": "<openwrt-devel@lists.openwrt.org>",
        "Message-ID": "<owrt-patch-20160502-2@vittgam.net>",
        "Subject": "[OpenWrt-Devel] [PATCH] ramips: Drop hacky switch workaround for\n\tfailsafe on rt3x5x and rt5350.",
        "X-BeenThere": "openwrt-devel@lists.openwrt.org",
        "X-Mailman-Version": "2.1.20",
        "Precedence": "list",
        "List-Id": "OpenWrt Development List <openwrt-devel.lists.openwrt.org>",
        "List-Unsubscribe": "<https://lists.openwrt.org/cgi-bin/mailman/options/openwrt-devel>,\n\t<mailto:openwrt-devel-request@lists.openwrt.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.openwrt.org/pipermail/openwrt-devel/>",
        "List-Post": "<mailto:openwrt-devel@lists.openwrt.org>",
        "List-Help": "<mailto:openwrt-devel-request@lists.openwrt.org?subject=help>",
        "List-Subscribe": "<https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel>,\n\t<mailto:openwrt-devel-request@lists.openwrt.org?subject=subscribe>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain; charset=\"utf-8\"",
        "Content-Transfer-Encoding": "base64",
        "Errors-To": "openwrt-devel-bounces@lists.openwrt.org",
        "Sender": "\"openwrt-devel\" <openwrt-devel-bounces@lists.openwrt.org>"
    },
    "content": "The new rt3050 switch driver doesn't have problems with TCP when not\nusing VLANs.\n\nThis piece of code also broke failsafe for all routers where the LAN\nport is not wired to port 0 of the internal switch.\n\nSigned-off-by: Vittorio Gambaletta <openwrt@vittgam.net>\n---",
    "diff": "--- a/target/linux/ramips/base-files/lib/preinit/07_set_preinit_iface_ramips\n+++ b/target/linux/ramips/base-files/lib/preinit/07_set_preinit_iface_ramips\n@@ -6,43 +6,24 @@\n . /lib/ramips.sh\n \n ramips_set_preinit_iface() {\n-\tRT3X5X=`cat /proc/cpuinfo | egrep \"(RT3.5|RT5350|MT7628|MT7688)\"`\n-\tMT762X=`cat /proc/cpuinfo | egrep \"MT7620\"`\n+\tRT3X5X=`cat /proc/cpuinfo | egrep \"(RT3.5|RT5350|MT7628|MT7688|MT7620)\"`\n \n \tif [ -n \"${RT3X5X}\" ]; then\n-\t\tswconfig dev rt305x set reset 1\n-\telif [ -n \"${MT762X}\" ]; then\n-\t\t# The mt7530 switch driver enables VLAN by default, but\n+\t\t# The ethernet switch driver enables VLAN by default, but\n \t\t# failsafe uses eth0, making the device unreachable:\n \t\t# https://dev.openwrt.org/ticket/18768\n-\t\tcase \"${MT762X}\" in\n+\t\tralink_switchdev=rt305x\n+\t\tcase \"${RT3X5X}\" in\n \t\t*MT7620*)\n-\t\t\tmt762x_switchdev=mt7620\n+\t\t\tralink_switchdev=mt7620\n \t\t\t;;\n \t\tesac\n-\t\tswconfig dev $mt762x_switchdev set reset 1\n-\t\tswconfig dev $mt762x_switchdev set enable_vlan 0\n-\t\tswconfig dev $mt762x_switchdev set apply 1\n+\t\tswconfig dev $ralink_switchdev set reset 1\n+\t\tswconfig dev $ralink_switchdev set enable_vlan 0\n+\t\tswconfig dev $ralink_switchdev set apply 1\n \tfi\n \n-\tif echo $RT3X5X | egrep -q \"(RT5350|MT7628|MT7688)\"; then\n-\t\t# This is a dirty hack to get by while the switch\n-\t\t# problem is investigated. When VLAN is disabled, ICMP\n-\t\t# pings work as expected, but TCP connections time\n-\t\t# out, so telnetting in failsafe is impossible. The\n-\t\t# likely reason is TCP checksumming hardware getting\n-\t\t# disabled:\n-\t\t# https://www.mail-archive.com/openwrt-devel@lists.openwrt.org/msg19870.html\n-\t\tswconfig dev rt305x set enable_vlan 1\n-\t\tswconfig dev rt305x vlan 1 set ports \"0 6\"\n-\t\tswconfig dev rt305x port 6 set untag 0\n-\t\tswconfig dev rt305x set apply 1\n-\t\tip link add link eth0 name eth0.1 type vlan id 1\n-\t\tip link set eth0 up\n-\t\tifname=eth0.1\n-\telse\n-\t\tifname=eth0\n-\tfi\n+\tifname=eth0\n }\n \n boot_hook_add preinit_main ramips_set_preinit_iface\n",
    "prefixes": [
        "OpenWrt-Devel"
    ]
}