{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":689561975,"defaultBranch":"master","name":"moby","ownerLogin":"rhansen","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2023-09-10T07:49:46.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1612291?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1699946248.0","currentOid":""},"activityList":{"items":[{"before":"f0c96e529221e5fd428186ea058ad79311eab6c0","after":"a43a0afabee421fbebb594ecd49891d810dda920","ref":"refs/heads/ip6tables","pushedAt":"2023-11-14T07:27:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Delete erroneous sanity check in `setupIPChains`\n\nThis function is called for both IPv4 and IPv6, so this check broke\n`dockerd --iptables=false --experimental --ip6tables=true`.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Delete erroneous sanity check in setupIPChains"}},{"before":"808120e5b84ad37c91e5030bb0e524e5ee89712f","after":null,"ref":"refs/heads/host_ipv6","pushedAt":"2023-11-14T07:17:28.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"}},{"before":"c6b88313e495bf8c8d2934a0c3ce3a99f431e07c","after":"808120e5b84ad37c91e5030bb0e524e5ee89712f","ref":"refs/heads/host_ipv6","pushedAt":"2023-10-26T00:25:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"New `host_ipv6` bridge option to SNAT IPv6 connections\n\nAdd a new `com.docker.network.host_ipv6` bridge option to compliment\nthe existing `com.docker.network.host_ipv4` option. When set to an\nIPv6 address, this causes the bridge to insert `SNAT` rules instead of\n`MASQUERADE` rules (assuming `ip6tables` is enabled). `SNAT` makes it\npossible for users to control the source IP address used for outgoing\nconnections.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"New host_ipv6 bridge option to SNAT IPv6 connections"}},{"before":"719ad7914782b7167b488ce85fed8dcb634e14a5","after":"f0c96e529221e5fd428186ea058ad79311eab6c0","ref":"refs/heads/ip6tables","pushedAt":"2023-10-26T00:25:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Delete erroneous sanity check in `setupIPChains`\n\nThis function is called for both IPv4 and IPv6, so this check broke\n`dockerd --iptables=false --experimental --ip6tables=true`.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Delete erroneous sanity check in setupIPChains"}},{"before":"0cf113e25005b74181dad1d735043acaba782de4","after":null,"ref":"refs/heads/nat-test","pushedAt":"2023-10-26T00:00:55.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"}},{"before":"686adaa51857a8bcbc25a7af008f4d3f4838ea78","after":"0cf113e25005b74181dad1d735043acaba782de4","ref":"refs/heads/nat-test","pushedAt":"2023-10-21T17:54:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Add unit tests for outgoing NAT rules\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Add unit tests for outgoing NAT rules"}},{"before":"a539dd67a407725f6c98ae527ac5e9cbd95c081d","after":"c6b88313e495bf8c8d2934a0c3ce3a99f431e07c","ref":"refs/heads/host_ipv6","pushedAt":"2023-10-21T17:54:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"New host_ipv6 bridge option to SNAT IPv6 connections\n\nAdd a new `com.docker.network.host_ipv6` bridge option to compliment\nthe existing `com.docker.network.host_ipv4` option. When set to an\nIPv6 address, this causes the bridge to insert `SNAT` rules instead of\n`MASQUERADE` rules when `ip6tables` is enabled. `SNAT` makes it\npossible for users to control the source IP address used for outgoing\nconnections.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"New host_ipv6 bridge option to SNAT IPv6 connections"}},{"before":"bef04d5ccac70ffa5e1d0807c41daaa96deba6a5","after":"719ad7914782b7167b488ce85fed8dcb634e14a5","ref":"refs/heads/ip6tables","pushedAt":"2023-10-21T07:55:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Delete erroneous sanity check in `setupIPChains`\n\nThis function is called for both IPv4 and IPv6, so this check broke\n`dockerd --iptables=false --experimental --ip6tables=true`.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Delete erroneous sanity check in setupIPChains"}},{"before":"7f6c6dbfebddd84d73d9cc4b267f9c36374b2c2e","after":"686adaa51857a8bcbc25a7af008f4d3f4838ea78","ref":"refs/heads/nat-test","pushedAt":"2023-10-21T07:52:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Add unit tests for outgoing NAT rules\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Add unit tests for outgoing NAT rules"}},{"before":"b8e9ba501bfeae5e7e2ab847a4519fd3fefcb66a","after":"a539dd67a407725f6c98ae527ac5e9cbd95c081d","ref":"refs/heads/host_ipv6","pushedAt":"2023-10-21T07:52:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"New host_ipv6 bridge option to SNAT IPv6 connections\n\nAdd a new `com.docker.network.host_ipv6` bridge option to compliment\nthe existing `com.docker.network.host_ipv4` option. When set to an\nIPv6 address, this causes the bridge to insert `SNAT` rules instead of\n`MASQUERADE` rules when `ip6tables` is enabled. `SNAT` makes it\npossible for users to control the source IP address used for outgoing\nconnections.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"New host_ipv6 bridge option to SNAT IPv6 connections"}},{"before":"518f22c796959dde87e398f5970ce7e7a3f9d8d0","after":"7f6c6dbfebddd84d73d9cc4b267f9c36374b2c2e","ref":"refs/heads/nat-test","pushedAt":"2023-10-19T01:28:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Add unit tests for outgoing NAT rules\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Add unit tests for outgoing NAT rules"}},{"before":"742ac3bcae6412a0c6aa329274ff66ab997ae50a","after":"b8e9ba501bfeae5e7e2ab847a4519fd3fefcb66a","ref":"refs/heads/host_ipv6","pushedAt":"2023-10-19T01:28:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"New host_ipv6 bridge option to SNAT IPv6 connections\n\nAdd a new `com.docker.network.host_ipv6` bridge option to compliment\nthe existing `com.docker.network.host_ipv4` option. When set to an\nIPv6 address, this causes the bridge to insert `SNAT` rules instead of\n`MASQUERADE` rules when `ip6tables` is enabled. `SNAT` makes it\npossible for users to control the source IP address used for outgoing\nconnections.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"New host_ipv6 bridge option to SNAT IPv6 connections"}},{"before":"a3440548b14190bfec536c7cddbbee5447a6913b","after":"518f22c796959dde87e398f5970ce7e7a3f9d8d0","ref":"refs/heads/nat-test","pushedAt":"2023-10-19T00:28:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Add unit tests for outgoing NAT rules\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Add unit tests for outgoing NAT rules"}},{"before":"c6a53c9d22d7772a5ff430997d7c0fbfdecb330a","after":"742ac3bcae6412a0c6aa329274ff66ab997ae50a","ref":"refs/heads/host_ipv6","pushedAt":"2023-10-19T00:28:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"New host_ipv6 bridge option to SNAT IPv6 connections\n\nAdd a new `com.docker.network.host_ipv6` bridge option to compliment\nthe existing `com.docker.network.host_ipv4` option. When set to an\nIPv6 address, this causes the bridge to insert `SNAT` rules instead of\n`MASQUERADE` rules when `ip6tables` is enabled. `SNAT` makes it\npossible for users to control the source IP address used for outgoing\nconnections.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"New host_ipv6 bridge option to SNAT IPv6 connections"}},{"before":"a8c520b86fd4cb483125b3723ceccca78b46a88e","after":"bef04d5ccac70ffa5e1d0807c41daaa96deba6a5","ref":"refs/heads/ip6tables","pushedAt":"2023-10-19T00:28:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Delete erroneous sanity check in `setupIPChains`\n\nThis function is called for both IPv4 and IPv6, so this check broke\n`dockerd --iptables=false --experimental --ip6tables=true`.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Delete erroneous sanity check in setupIPChains"}},{"before":"96f85def5beeb2111215c41ea3b443d37e188901","after":null,"ref":"refs/heads/bridge-cleanups","pushedAt":"2023-10-16T22:25:44.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"}},{"before":"4364dca10c834892e91aa41acdc08b8e3ad88b4a","after":"a3440548b14190bfec536c7cddbbee5447a6913b","ref":"refs/heads/nat-test","pushedAt":"2023-10-16T22:25:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Add unit tests for outgoing NAT rules\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Add unit tests for outgoing NAT rules"}},{"before":"3e9ce9613a98a28117333c5a44cc4b81ec81710d","after":"a8c520b86fd4cb483125b3723ceccca78b46a88e","ref":"refs/heads/ip6tables","pushedAt":"2023-10-16T22:25:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Delete erroneous sanity check in `setupIPChains`\n\nThis function is called for both IPv4 and IPv6, so this check broke\n`dockerd --iptables=false --experimental --ip6tables=true`.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Delete erroneous sanity check in setupIPChains"}},{"before":"0310e46f788608afe07790b4a88033c9b2c3c33a","after":"c6a53c9d22d7772a5ff430997d7c0fbfdecb330a","ref":"refs/heads/host_ipv6","pushedAt":"2023-10-16T22:25:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"New host_ipv6 bridge option to SNAT IPv6 connections\n\nAdd a new `com.docker.network.host_ipv6` bridge option to compliment\nthe existing `com.docker.network.host_ipv4` option. When set to an\nIPv6 address, this causes the bridge to insert `SNAT` rules instead of\n`MASQUERADE` rules when `ip6tables` is enabled. `SNAT` makes it\npossible for users to control the source IP address used for outgoing\nconnections.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"New host_ipv6 bridge option to SNAT IPv6 connections"}},{"before":"97f679cf325baf76c0039e86dc9d489635f31794","after":"0310e46f788608afe07790b4a88033c9b2c3c33a","ref":"refs/heads/host_ipv6","pushedAt":"2023-10-14T06:56:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"New host_ipv6 bridge option to SNAT IPv6 connections\n\nAdd a new `com.docker.network.host_ipv6` bridge option to compliment\nthe existing `com.docker.network.host_ipv4` option. When set to an\nIPv6 address, this causes the bridge to insert `SNAT` rules instead of\n`MASQUERADE` rules when `ip6tables` is enabled. `SNAT` makes it\npossible for users to control the source IP address used for outgoing\nconnections.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"New host_ipv6 bridge option to SNAT IPv6 connections"}},{"before":"ace339493f9ade14488c186f29931f568c3aa997","after":"3e9ce9613a98a28117333c5a44cc4b81ec81710d","ref":"refs/heads/ip6tables","pushedAt":"2023-10-14T06:56:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Delete erroneous sanity check in `setupIPChains`\n\nThis function is called for both IPv4 and IPv6, so this check broke\n`dockerd --iptables=false --experimental --ip6tables=true`.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Delete erroneous sanity check in setupIPChains"}},{"before":"51eae9ea968d5d0688adea14ec3ce50759d0cad2","after":"4364dca10c834892e91aa41acdc08b8e3ad88b4a","ref":"refs/heads/nat-test","pushedAt":"2023-10-14T06:56:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Add unit tests for outgoing NAT rules\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Add unit tests for outgoing NAT rules"}},{"before":"64b883fefd5ca5c65c535af72105af88384c7670","after":"96f85def5beeb2111215c41ea3b443d37e188901","ref":"refs/heads/bridge-cleanups","pushedAt":"2023-10-14T06:56:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"s/HostIP/HostIPv4/ for `com.docker.network.host_ipv4` setting\n\nRename all variables/fields/map keys associated with the\n`com.docker.network.host_ipv4` option from `HostIP` to `HostIPv4`.\nRationale:\n\n * This makes the variable/field name consistent with the option\n name.\n * This makes the code more readable because it is clear that the\n variable/field does not hold an IPv6 address. This will hopefully\n avoid bugs like in the\n future.\n * If IPv6 SNAT support is ever added, the names will be symmetric.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"s/HostIP/HostIPv4/ for com.docker.network.host_ipv4 setting"}},{"before":"abd100135ca7bd58a41a665f8792756288c9fc57","after":"51eae9ea968d5d0688adea14ec3ce50759d0cad2","ref":"refs/heads/nat-test","pushedAt":"2023-09-16T04:50:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Add unit tests for outgoing NAT rules\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Add unit tests for outgoing NAT rules"}},{"before":"3289b8f7cf3600ece4acdcecc04e5de09a170ef4","after":"64b883fefd5ca5c65c535af72105af88384c7670","ref":"refs/heads/bridge-cleanups","pushedAt":"2023-09-16T04:50:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"s/HostIP/HostIPv4/ for `com.docker.network.host_ipv4` setting\n\nRename all variables/fields/map keys associated with the\n`com.docker.network.host_ipv4` option from `HostIP` to `HostIPv4`.\nRationale:\n\n * This makes the variable/field name consistent with the option\n name.\n * This makes the code more readable because it is clear that the\n variable/field does not hold an IPv6 address. This will hopefully\n avoid bugs like in the\n future.\n * If IPv6 SNAT support is ever added, the names will be symmetric.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"s/HostIP/HostIPv4/ for com.docker.network.host_ipv4 setting"}},{"before":"e7290b8722615dcee60d3591716408494cb70737","after":"97f679cf325baf76c0039e86dc9d489635f31794","ref":"refs/heads/host_ipv6","pushedAt":"2023-09-16T04:50:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"New host_ipv6 bridge option to SNAT IPv6 connections\n\nAdd a new `com.docker.network.host_ipv6` bridge option to compliment\nthe existing `com.docker.network.host_ipv4` option. When set to an\nIPv6 address, this causes the bridge to insert `SNAT` rules instead of\n`MASQUERADE` rules when `ip6tables` is enabled. `SNAT` makes it\npossible for users to control the source IP address used for outgoing\nconnections.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"New host_ipv6 bridge option to SNAT IPv6 connections"}},{"before":"9b053d87c03840fb23fbb1362c92b52e6c88c403","after":"ace339493f9ade14488c186f29931f568c3aa997","ref":"refs/heads/ip6tables","pushedAt":"2023-09-16T04:50:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Delete erroneous sanity check in `setupIPChains`\n\nThis function is called for both IPv4 and IPv6, so this check broke\n`dockerd --iptables=false --experimental --ip6tables=true`.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Delete erroneous sanity check in setupIPChains"}},{"before":"3e7e5aba356f3f65b3156834339a242a8daec433","after":"3289b8f7cf3600ece4acdcecc04e5de09a170ef4","ref":"refs/heads/bridge-cleanups","pushedAt":"2023-09-14T20:14:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"s/HostIP/HostIPv4/ for `com.docker.network.host_ipv4` setting\n\nRename all variables/fields/map keys associated with the\n`com.docker.network.host_ipv4` option from `HostIP` to `HostIPv4`.\nRationale:\n\n * This makes the variable/field name consistent with the option\n name.\n * This makes the code more readable because it is clear that the\n variable/field does not hold an IPv6 address. This will hopefully\n avoid bugs like in the\n future.\n * If IPv6 SNAT support is ever added, the names will be symmetric.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"s/HostIP/HostIPv4/ for com.docker.network.host_ipv4 setting"}},{"before":"16ac28470414f4f38b7ae42f4d4d90690726c415","after":"9b053d87c03840fb23fbb1362c92b52e6c88c403","ref":"refs/heads/ip6tables","pushedAt":"2023-09-14T20:14:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Delete erroneous sanity check in `setupIPChains`\n\nThis function is called for both IPv4 and IPv6, so this check broke\n`dockerd --iptables=false --experimental --ip6tables=true`.\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Delete erroneous sanity check in setupIPChains"}},{"before":"9b41e3930b8e39323bf931220a6e31e5832f6205","after":"abd100135ca7bd58a41a665f8792756288c9fc57","ref":"refs/heads/nat-test","pushedAt":"2023-09-14T20:14:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rhansen","name":"Richard Hansen","path":"/rhansen","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1612291?s=80&v=4"},"commit":{"message":"Add unit tests for outgoing NAT rules\n\nSigned-off-by: Richard Hansen ","shortMessageHtmlLink":"Add unit tests for outgoing NAT rules"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyMy0xMS0xNFQwNzoyNzoyNC4wMDAwMDBazwAAAAOug2GT","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wOS0xNFQyMDoxNDoyNy4wMDAwMDBazwAAAAOA7ACs"}},"title":"Activity ยท rhansen/moby"}