Owned by Chad Smith
Get this repository:
git clone https://git.launchpad.net/~chad.smith/ubuntu/+source/ubuntu-advantage-tools
Only Chad Smith can upload to this repository. If you are Chad Smith please log in for upload directions.


Name Last Modified Last Commit
pkg-upload-24.4 2020-09-01 17:44:13 UTC 2020-09-01
changelog: update 24.4 version for bug-fix-release

Author: Chad Smith
Author Date: 2020-09-01 17:17:56 UTC

changelog: update 24.4 version for bug-fix-release

pkg-upload-24.3 2020-08-24 18:42:18 UTC 2020-08-24
verion: update uaclient version to 24.3 for bugfix release

Author: Chad Smith
Author Date: 2020-08-24 18:40:42 UTC

verion: update uaclient version to 24.3 for bugfix release

feature/vm-support 2020-06-09 17:34:38 UTC 2020-06-09
tests: skip trusty tests for lxd.vm machine_type

Author: Chad Smith
Author Date: 2020-06-09 17:30:13 UTC

tests: skip trusty tests for lxd.vm machine_type

pkg-upload-24.2 2020-06-03 22:38:13 UTC 2020-06-03
changelog: update 24.2 version for bug-fix-release

Author: Chad Smith
Author Date: 2020-06-03 22:16:27 UTC

changelog: update 24.2 version for bug-fix-release

release-24 2020-05-22 21:16:12 UTC 2020-05-22
update changelog for 24.1 bug-fix release

Author: Chad Smith
Author Date: 2020-05-22 02:57:28 UTC

update changelog for 24.1 bug-fix release

pkg-release/devel 2020-04-06 09:29:45 UTC 2020-04-06
Import patches-unapplied version 20.3 to ubuntu/focal-proposed

Author: Chad Smith
Author Date: 2020-03-30 14:49:17 UTC

Import patches-unapplied version 20.3 to ubuntu/focal-proposed

Imported using git-ubuntu import.

Changelog parent: b1f4c5a6e6f44d1f3d819befc439ea42c908830c

New changelog entries:
  * New upstream release 20.3:
    - ubuntu-pro: automatically reattach across instance id delta
      (LP: #1867573)
    - integration testing:
      + add behave tests ua subcommands for attached vm
      + add invalid token tests
      + add reuse_container test docs
      + refactor token parameter
  * d/templates: add a debconf note on upgrade from pre-ubuntu pro package
  * d/control: create a separate ubuntu-advantage-pro package which
      delivers the tooling and scripts necessary to auto-attach pro machines
      This change breaks/replaces ubuntu-advantage-tools <= 20.1
  * d/maintscript: rm_conffile /etc/init/ua-auto-attach.conf from ua-tools pkg
  * d/postint: remove stale systemd symlinks which have migrated to ubuntu-pro
  * d/rules: only install the apt hook on trusty
  * d/rules: provide --no-start to debhelper to avoid auto-attach on pkg install
  * Release 20.2:
    - ubuntu-pro:
      + azure: fix detection of DatasourceAzureNet as azure on trusty
      + generalize identity_doc to return dict instead of string
      + auto-attach: any 4XX errors during auto-attach are the result of non-Pro
      + auto-attach: handle 403 errors raised by contract server for invalid vms
    - attach: persist any status config changes after attach failures
    - output: add messaging using a different subscription if attached
  * Release 20.1:
    - azure-pro, support for azure ubuntu pro auto-attach:
      + add azure auto-attach instance as valid cloud_instance_factory
      + add azure cloud instance module and tests
      + generalize request_aws_contract_token for multiple cloud_types
      + contract: request_auto_attach_contract_token takes an instance param
    - constraints: add constraint on pyyaml version in trusty
    - auto-attach: move duplicate invalid cloud_type check out of cli
  * d/postinst: only configure ESM on supported architectures (LP: #1851858)
      [Andreas Hasenack]
  * d/postinst: rename existing ubuntu-esm-precise.list file to trusty.
    This fixes the upgrade path from precise to trusty and to this client
    while esm is enabled (LP: #1850672)
  * Release 19.7:
    - aws: handle missing SYS_HYPERVISOR_PRODUCT_UUID
    - aws-pro: support for aws ubuntu pro auto-attach
    - pro: add cloud identity module and fix unit tests
    - pro: update systemd service and upstart boot scripts to auto-attach
    - pro: esm do not do apt pin never on disable on xenial or bionic
    - pro: esm-apps has origin UbuntuESMApps and esm-infra is UbuntuESM
    - status: dynamic status available now from refreshed machine-token
    - uaclient: update customer visible messages after UX review
    - esm-apps: allow unattended security upgrades for esm-apps
    - systemd: needs WantedBy=multi-user.target to get pulled into boot
    - cli: update docstring to describe errors raised from auto-attach
    - keyrings: update ubuntu-advantage-esm-apps.gpg with correct key
    - repo: match strict repo url in apt-policy to avoid esm substring matches
    - esm: don't disable_apt_auth_only for ESM entitlements
    - initial implementation of esm-apps
    - repo: don't raise exception in application_status if aptURL missing
    - entitlements: rely solely on contract server for repo_url
    - cli: exit 0 if already attached
    - cli: use decorators for action_attach and action_attach_premium
    - cli: add assert_not_attached decorator
    - status: custom descriptions for n/a service status
  * New upstream release. Main changes:
    - drop SSO interactive login support
    - d/control: no longer depend on pymacaroons, which was only needed for
      the SSO interactive login support
    - drop keyrings for services not supported in trusty: cc-eal, fips,
      fips-updates, cis audit
    - make sure /var/lib/ubuntu-advantage/private has 0700 perms
    - rename esm to esm-infra. Also handle upgrades
    - don't unecessarily remove config files that are already handled by dpkg
    - expand the apt related runtime dependencies
    - handle sources.list.d esm snippet when release upgrading from precise
    - ua status now reports availability of services even in unattached state
    - the "ua status" output was changed, including the json format option
    - drop "ua status" call in postinst as it now requires internet access and
      that is restricted in LP builders and test runners.
    - fix the d/t/usage DEP8 test that was also using status

16 of 6 results
This repository contains Public information 
Everyone can see this information.