~canonical-kernel/+git/kteam-tools:apw/swm-package--add-package-relations

Last commit made on 2023-09-14
Get this branch:
git clone -b apw/swm-package--add-package-relations https://git.launchpad.net/~canonical-kernel/+git/kteam-tools
Members of Canonical Kernel can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
apw/swm-package--add-package-relations
Repository:
lp:~canonical-kernel/+git/kteam-tools

Recent commits

d54161e... by Andy Whitcroft

swm: package -- replace the feeder comcept with prereq throughout

Signed-off-by: Andy Whitcroft <email address hidden>

b00492f... by Andy Whitcroft

swm: package -- switch to meaningful parameter names and document

Signed-off-by: Andy Whitcroft <email address hidden>

7ea8607... by Andy Whitcroft

swm: package -- simplify package analysis idioms

Signed-off-by: Andy Whitcroft <email address hidden>

deb2cd1... by Andy Whitcroft

swm: package -- commit to using new package-relations

We have been using the new implementations for a long time now, drop old
implementations and commit to new implementations.

Signed-off-by: Andy Whitcroft <email address hidden>

be9d9bd... by Andy Whitcroft

swm: dependent_packages_for_pocket -- add support for pairing signing packages

Signed-off-by: Andy Whitcroft <email address hidden>

2483fe1... by Andy Whitcroft

swm: package -- package-relations for packages

Signed-off-by: Andy Whitcroft <email address hidden>

b56aa34... by Andy Whitcroft

admin-lp-git-permissions: allow Gitea access to f/linux

Add rules to alloca Gitea push access to f/linux master, master-next,
and tags. This was tested on dry-run so I _think_ it works but a second set
of eyes on this would be great to ensure we're not exposing more than intended.

Signed-off-by: Cory Todd <email address hidden>
Acked-by: Andy Whitcroft <email address hidden>
Signed-off-by: Andy Whitcroft <email address hidden>

7bbc729... by Cory Todd

admin-lp-git-permissions: allow Gitea access to f/linux

Add rules to alloca Gitea push access to f/linux master, master-next,
and tags.

Signed-off-by: Cory Todd <email address hidden>

f403c3c... by Stefan Bader

stable/sru-cycle-kernel-versions: Ignore security cycle

This is called in the `gen-sru-announce` script used only for SRU cycle
annoucements at the moment to get the latest main kernels versions:
    `sru-cycle-kernel-versions --no-devel --no-esm`

It checks https://kernel.ubuntu.com/sru/kernel-sru-workflow.json for
the current cycle(s) kernels that are non esm and non development.
If there is a security cycle overlapping, 2 kernels are found and the
security version may be the one returned in case its tracker is newer.
This fixes it by checking if the cycle number starts with 's' and ignoring that
version in that case.

Note: This is a quick fix and if we need to make announcements for
security we will have to extend this script to accomodate that.

Signed-off-by: Roxana Nicolescu <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

e38ff3c... by Roxana Nicolescu

stable/sru-cycle-kernel-versions: Ignore security cycle

This is called in the `gen-sru-announce` script used only for SRU cycle
annoucements at the moment to get the latest main kernels versions:
    `sru-cycle-kernel-versions --no-devel --no-esm`

It checks https://kernel.ubuntu.com/sru/kernel-sru-workflow.json for
the current cycle(s) kernels that are non esm and non development.
If there is a security cycle overlapping, 2 kernels are found and the
security version may be the one returned in case its tracker is newer.
This fixes it by checking if the cycle number starts with 's' and ignoring that
version in that case.

Note: This is a quick fix and if we need to make announcements for
security we will have to extend this script to accomodate that.

Signed-off-by: Roxana Nicolescu <email address hidden>