get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/809798/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 809798,
    "url": "http://patchwork.ozlabs.org/api/patches/809798/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/patch/1504555874-4168-1-git-send-email-pablo@netfilter.org/",
    "project": {
        "id": 26,
        "url": "http://patchwork.ozlabs.org/api/projects/26/?format=api",
        "name": "Netfilter Development",
        "link_name": "netfilter-devel",
        "list_id": "netfilter-devel.vger.kernel.org",
        "list_email": "netfilter-devel@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<1504555874-4168-1-git-send-email-pablo@netfilter.org>",
    "list_archive_url": null,
    "date": "2017-09-04T20:11:02",
    "name": "[00/12] Netfilter updates for next-net (part 2)",
    "commit_ref": null,
    "pull_url": "git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git HEAD",
    "state": "accepted",
    "archived": false,
    "hash": null,
    "submitter": {
        "id": 1315,
        "url": "http://patchwork.ozlabs.org/api/people/1315/?format=api",
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org"
    },
    "delegate": {
        "id": 6139,
        "url": "http://patchwork.ozlabs.org/api/users/6139/?format=api",
        "username": "pablo",
        "first_name": "Pablo",
        "last_name": "Neira",
        "email": "pablo@netfilter.org"
    },
    "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/patch/1504555874-4168-1-git-send-email-pablo@netfilter.org/mbox/",
    "series": [],
    "comments": "http://patchwork.ozlabs.org/api/patches/809798/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/809798/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<netfilter-devel-owner@vger.kernel.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org",
        "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netfilter-devel-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)",
        "Received": [
            "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xmLb76qrTz9t2R\n\tfor <incoming@patchwork.ozlabs.org>;\n\tTue,  5 Sep 2017 06:11:31 +1000 (AEST)",
            "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1754656AbdIDULY (ORCPT <rfc822;incoming@patchwork.ozlabs.org>);\n\tMon, 4 Sep 2017 16:11:24 -0400",
            "from mail.us.es ([193.147.175.20]:42116 \"EHLO mail.us.es\"\n\trhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP\n\tid S1754103AbdIDULX (ORCPT <rfc822; netfilter-devel@vger.kernel.org>);\n\tMon, 4 Sep 2017 16:11:23 -0400",
            "from antivirus1-rhel7.int (unknown [192.168.2.11])\n\tby mail.us.es (Postfix) with ESMTP id 069D5532F84\n\tfor <netfilter-devel@vger.kernel.org>;\n\tMon,  4 Sep 2017 22:10:55 +0200 (CEST)",
            "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id E718EB5026\n\tfor <netfilter-devel@vger.kernel.org>;\n\tMon,  4 Sep 2017 22:10:54 +0200 (CEST)",
            "by antivirus1-rhel7.int (Postfix, from userid 99)\n\tid DCCBB35BA; Mon,  4 Sep 2017 22:10:54 +0200 (CEST)",
            "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id B91B9DA2AF;\n\tMon,  4 Sep 2017 22:10:52 +0200 (CEST)",
            "from 192.168.1.97 (192.168.1.97) by antivirus1-rhel7.int\n\t(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int); \n\tMon, 04 Sep 2017 22:10:52 +0200 (CEST)",
            "from salvia.here (129.166.216.87.static.jazztel.es\n\t[87.216.166.129]) (Authenticated sender: pneira@us.es)\n\tby entrada.int (Postfix) with ESMTPA id 6883E4265A22;\n\tMon,  4 Sep 2017 22:10:52 +0200 (CEST)"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.1 (2015-04-28) on\n\tantivirus1-rhel7.int",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-108.2 required=7.5 tests=ALL_TRUSTED,BAYES_50,\n\tSMTPAUTH_US2,USER_IN_WHITELIST autolearn=disabled version=3.4.1",
        "X-Virus-Status": "clean(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int)",
        "X-SMTPAUTHUS": "auth mail.us.es",
        "From": "Pablo Neira Ayuso <pablo@netfilter.org>",
        "To": "netfilter-devel@vger.kernel.org",
        "Cc": "davem@davemloft.net, netdev@vger.kernel.org",
        "Subject": "[PATCH 00/12] Netfilter updates for next-net (part 2)",
        "Date": "Mon,  4 Sep 2017 22:11:02 +0200",
        "Message-Id": "<1504555874-4168-1-git-send-email-pablo@netfilter.org>",
        "X-Mailer": "git-send-email 2.1.4",
        "X-Virus-Scanned": "ClamAV using ClamSMTP",
        "Sender": "netfilter-devel-owner@vger.kernel.org",
        "Precedence": "bulk",
        "List-ID": "<netfilter-devel.vger.kernel.org>",
        "X-Mailing-List": "netfilter-devel@vger.kernel.org"
    },
    "content": "Hi David,\n\nThe following patchset contains Netfilter updates for net-next. This\npatchset includes updates for nf_tables, removal of\nCONFIG_NETFILTER_DEBUG and a new mode for xt_hashlimit. More\nspecifically, they:\n\n1) Add new rate match mode for hashlimit, this introduces a new revision\n   for this match. The idea is to stop matching packets until ratelimit\n   criteria stands true. Patch from Vishwanath Pai.\n\n2) Add ->select_ops indirection to nf_tables named objects, so we can\n   choose between different flavours of the same object type, patch from\n   Pablo M. Bermudo.\n\n3) Shorter function names in nft_limit, basically:\n   s/nft_limit_pkt_bytes/nft_limit_bytes, also from Pablo M. Bermudo.\n\n4) Add new stateful limit named object type, this allows us to create\n   limit policies that you can identify via name, also from Pablo.\n\n5) Remove unused hooknum parameter in conntrack ->packet indirection.\n   From Florian Westphal.\n\n6) Patches to remove CONFIG_NETFILTER_DEBUG and macros such as\n   IP_NF_ASSERT and IP_NF_ASSERT. From Varsha Rao.\n\n7) Add nf_tables_updchain() helper function and use it from\n   nf_tables_newchain() to make it more maintainable. Similarly,\n   add nf_tables_addchain() and use it too.\n\n8) Add new netlink NLM_F_NONREC flag, this flag should only be used for\n   deletion requests, specifically, to support non-recursive deletion.\n   Based on what we discussed during NFWS'17 in Faro.\n\n9) Use NLM_F_NONREC from table and sets in nf_tables.\n\n10) Support for recursive chain deletion. Table and set deletion\n    commands come with an implicit content flush on deletion, while\n    chains do not. This patch addresses this inconsistency by adding\n    the code to perform recursive chain deletions. This also comes with\n    the bits to deal with the new NLM_F_NONREC netlink flag.\n\nYou can pull these changes from:\n\n  git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git\n\nThanks a lot!\n\n----------------------------------------------------------------\n\nThe following changes since commit 3cf2e08f5ace79d57c8edba06deb59b25bd1dd33:\n\n  Merge branch 'nfp-refactor-app-init-and-minor-flower-fixes' (2017-09-03 21:22:05 -0700)\n\nare available in the git repository at:\n\n  git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git HEAD\n\nfor you to fetch changes up to 9dee1474121550b20542321f9e0579801c6b587c:\n\n  netfilter: nf_tables: support for recursive chain deletion (2017-09-04 17:34:55 +0200)\n\n----------------------------------------------------------------\nFlorian Westphal (1):\n      netfilter: remove unused hooknum arg from packet functions\n\nPablo M. Bermudo Garay (3):\n      netfilter: nf_tables: add select_ops for stateful objects\n      netfilter: nft_limit: replace pkt_bytes with bytes\n      netfilter: nft_limit: add stateful object type\n\nPablo Neira Ayuso (5):\n      netfilter: nf_tables: add nf_tables_updchain()\n      netfilter: nf_tables: add nf_tables_addchain()\n      netlink: add NLM_F_NONREC flag for deletion requests\n      netfilter: nf_tables: use NLM_F_NONREC for deletion requests\n      netfilter: nf_tables: support for recursive chain deletion\n\nVarsha Rao (2):\n      net: Replace NF_CT_ASSERT() with WARN_ON().\n      net: Remove CONFIG_NETFILTER_DEBUG and _ASSERT() macros.\n\nVishwanath Pai (1):\n      netfilter: xt_hashlimit: add rate match mode\n\n arch/parisc/configs/c3000_defconfig            |   1 -\n arch/sh/configs/se7751_defconfig               |   1 -\n include/linux/netfilter/xt_hashlimit.h         |   3 +-\n include/net/netfilter/nf_conntrack.h           |   8 +-\n include/net/netfilter/nf_conntrack_l4proto.h   |   1 -\n include/net/netfilter/nf_tables.h              |  35 ++-\n include/uapi/linux/netfilter/nf_tables.h       |   3 +-\n include/uapi/linux/netfilter/xt_hashlimit.h    |  36 ++-\n include/uapi/linux/netlink.h                   |   3 +\n net/Kconfig                                    |   7 -\n net/bridge/netfilter/ebtables.c                |  20 +-\n net/ipv4/netfilter/ip_tables.c                 |  12 +-\n net/ipv4/netfilter/nf_conntrack_proto_icmp.c   |   3 +-\n net/ipv4/netfilter/nf_nat_l3proto_ipv4.c       |   6 +-\n net/ipv4/netfilter/nf_nat_masquerade_ipv4.c    |   8 +-\n net/ipv6/netfilter/ip6_tables.c                |  12 +-\n net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c |   8 +-\n net/ipv6/netfilter/nf_nat_l3proto_ipv6.c       |   6 +-\n net/ipv6/netfilter/nf_nat_masquerade_ipv6.c    |   4 +-\n net/netfilter/nf_conntrack_core.c              |  13 +-\n net/netfilter/nf_conntrack_expect.c            |   4 +-\n net/netfilter/nf_conntrack_extend.c            |   2 +-\n net/netfilter/nf_conntrack_proto_dccp.c        |   2 +-\n net/netfilter/nf_conntrack_proto_generic.c     |   1 -\n net/netfilter/nf_conntrack_proto_gre.c         |   1 -\n net/netfilter/nf_conntrack_proto_sctp.c        |   1 -\n net/netfilter/nf_conntrack_proto_tcp.c         |   1 -\n net/netfilter/nf_conntrack_proto_udp.c         |   1 -\n net/netfilter/nf_conntrack_standalone.c        |   6 +-\n net/netfilter/nf_nat_core.c                    |   4 +-\n net/netfilter/nf_nat_redirect.c                |   6 +-\n net/netfilter/nf_tables_api.c                  | 403 ++++++++++++++-----------\n net/netfilter/nft_counter.c                    |  20 +-\n net/netfilter/nft_ct.c                         |  18 +-\n net/netfilter/nft_limit.c                      | 148 ++++++++-\n net/netfilter/nft_objref.c                     |   7 +-\n net/netfilter/nft_quota.c                      |  20 +-\n net/netfilter/xt_NETMAP.c                      |   8 +-\n net/netfilter/xt_hashlimit.c                   | 277 +++++++++++++++--\n net/netfilter/xt_nat.c                         |  20 +-\n 40 files changed, 788 insertions(+), 352 deletions(-)\n--\nTo unsubscribe from this list: send the line \"unsubscribe netfilter-devel\" in\nthe body of a message to majordomo@vger.kernel.org\nMore majordomo info at  http://vger.kernel.org/majordomo-info.html",
    "diff": null,
    "prefixes": [
        "00/12"
    ]
}