)]}'
{
  "commit": "7d27190e9948b1184286714ded580e4852fd830a",
  "tree": "380f3b12f48512d833abdd50e268df7004d92c4f",
  "parents": [
    "461e02d371d9b7a31ac0d91eee38a9ff7c07a8be"
  ],
  "author": {
    "name": "Michael Brown",
    "email": "mcb30@ipxe.org",
    "time": "Mon Jan 17 16:17:17 2022 +0000"
  },
  "committer": {
    "name": "Michael Brown",
    "email": "mcb30@ipxe.org",
    "time": "Mon Jan 17 16:17:17 2022 +0000"
  },
  "message": "[efi] Attempt to fetch autoexec script via TFTP\n\nAttempt to fetch the autoexec.ipxe script via TFTP using the PXE base\ncode protocol installed on the loaded image\u0027s device handle, if\npresent.\n\nThis provides a generic alternative to the use of an embedded script\nfor chainloaded binaries, which is particularly useful in a UEFI\nSecure Boot environment since it allows the script to be modified\nwithout the need to sign a new binary.\n\nAs a side effect, this also provides a third method for breaking the\nPXE chainloading loop (as an alternative to requiring an embedded\nscript or custom DHCP server configuration).\n\nSigned-off-by: Michael Brown \u003cmcb30@ipxe.org\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "881c30c7e71dbdb8dc1cf5c9c7d7a734d34d5249",
      "old_mode": 33188,
      "old_path": "src/interface/efi/efi_autoexec.c",
      "new_id": "7180fb842169beabff5f5f9227df70df07878404",
      "new_mode": 33188,
      "new_path": "src/interface/efi/efi_autoexec.c"
    }
  ]
}
