profile
viewpoint
Jean-Baptiste Lallement jibel Canonical

ubuntu/zsys 234

ZSys daemon and client for zfs systems

ubuntu/ubuntu-report 55

Report hardware and other collected metrics like installer or upgrade information

ubuntu/adsys 45

Active Directory bridging tool suite

ubuntu/WSL 19

Ubuntu WSL image build and launcher code.

canonical/ubuntu-wsl-integration 15

Ubuntu WSL Integrations

ubuntu/go-libzfs 12

go language link to libzfs C library

canonical/ubuntu-wsl-oobe 6

Ubuntu WSL Onboarding Experience

ubuntu/grubzfs-testsuite 6

Test for zfs (zsys/non zsys) grub menu generation

ubuntu/kstore 4

Key store

ubuntu/wsl-setup 3

WSL setup starts the setup and reconfigure GUI or TUI

push eventubuntu/adsys

Didier Roche

commit sha 9f4bbfb3f9211b8e3624a496c4e7c677d71cda29

Small refactoring and mutex fixes Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha ebd3c8e5422d7603f92090f92eba7c29a1ede761

Add strategy support for entries The strategy defines the way multiple GPOs having same entry overlay or append their values. Default is "override" which is for empty, override or unknown value strings. Add tests for this. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 11afc45b941d166b2c19054e90c88e2bdcfbc3f2

Support for appending strategy through different GPOs Keys can be overridable, non overridable. The append strategy means from a GPO standpoint that the further GPO value is listed before closest GPO (and then, enforced GPO in reverse order). This can be extended to support preprnd but it is implemented yet as there is no real world cases. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 3210c2c9dadff1efacec9490f9e73f46c62c4df5

Tests for append key type entries Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 2dd0ee50a54f5fc73ffc91713c7ab58245d145b1

Make Meta and Strategy deserialization optional Some times, those are empty, let’s not stutter empty fields when it’s common. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Jean-Baptiste Lallement

commit sha dbad6a5a1025f7d9cc121c3ef59d10b0f1b97c57

Merge pull request #254 from ubuntu/entries_strategy Entries strategy

view details

push time in 7 days

delete branch ubuntu/adsys

delete branch : entries_strategy

delete time in 7 days

PR merged ubuntu/adsys

Entries strategy
+196 -26

0 comment

16 changed files

didrocks

pr closed time in 7 days

push eventubuntu/adsys

Didier Roche

commit sha f8b330a509dc3c52a8af3159eb970dea2161d69a

Add different metaEnabled and metaDisabled keys. We will need those keys for strategy enablement. It means that disabled keys will have no empty values, but potentially a meta and strategy that we will use later on. Consequently, we now keep a disabled value in addition to the enabled one for the container / basic keys. We have 3 levels of overrides: Meta key in expanded policy is the basic value. It can be overriden by MetaEnabled or MetaDisabled to be more specific. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 5eca03eebf0611c73007444cc2235e13b569381e

Refresh definitions and golden tests for expandedCategoriesToADMX Apply changes for previous commits in general cases. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha bff7f40a16e0e50240b9527c9e8d936843d82c43

Apply to dconf generation new metaEnabled/Disabled filter We are now ensuring that dconf is generating a different enabled/disabled entry for its entries: - enabled has default "empty" + "meta" entries - disabled doesn’t need the empty entry, it will use system default which isn’t empty. Only file in "meta" then. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 3b13b4f977167e63a8849d45d14d93626deddb89

Refresh golden files for dconf entry generation. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 5b6422c6a5663f569a5f5d7b82524bc47c66addc

Refresh generateexpandedcategories defs and golden files for tests Add metaenabled/metadisabled cases. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 914d542a729b5d66d800ca28f7fb7393ac3a1cb3

Fix null/nil deserialization when inflating policies Ensure that we don’t deserialize to null keywords which can trigger issues when serializing back. Add tests for meta use cases in generateExpandedCategories. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 2e5082562162259dffc351a7c7ad33a7bce17905

Add new tests for meta in expandedCategoriesToADMX This illustrates that we always have a meta. When there is no meta, it means that it’s empty for the current release. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha bc8fb26dc91699c934cd316ae41af528239230df

Update expand and amdx integration tests with new meta behaviour Expand and add tests for metaenabled/disabled and other cases. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 0228e9d4aae83309cf33ddd7a247cf2d2fea77e3

Update empty to default and allow disabled key to have meta values - Ensure that the transition from empty to default is fully done. - Allow disabled keys to have meta values. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha d4de2e835a6db24e653029d719b92c80aff7ef97

Adapt registry tests for empty to default and new metadata rules Ensure we always load metadata, even for disabled keys, and adapt tests and source files for this. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

didrocks

commit sha 3dc048336142bd93e132ef6dbdb4c09461723912

Refresh policy definition files

view details

Didier Roche

commit sha d0088b2a577c0920a80514dba3c1236f3efc758d

Add more tests for optional metadata in registry We don’t force metadata in registry, add some tests to ensure all those use cases. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha f32a83d674b3b74de1cd531b879834fe04098637

Ignore keys in registry where types don’t match adsys expectations Ensure we don’t try to decode metadata on keys that are not of type string. Add tests for those. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 71cde5067004c36391ec56a82436dce3d2f9c354

Update integration tests policy defs to reflect real use case Disabled keys are now of type string. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha adc1f70a99047a7e4f676bce3b3d1b40153a2877

Merge pull request #251 from ubuntu/auto-update-policydefinitions-fix-meta-default-to-empty Refresh policy definition files

view details

Jean-Baptiste Lallement

commit sha edf13f5ed70de228c582f821a30d739bba7ffbd4

Merge pull request #252 from ubuntu/fix-meta-default-to-empty Fix meta default to empty

view details

push time in 7 days

delete branch ubuntu/adsys

delete branch : fix-meta-default-to-empty

delete time in 7 days

PR merged ubuntu/adsys

Fix meta default to empty
+1521 -246

1 comment

213 changed files

didrocks

pr closed time in 7 days

delete branch ubuntu/adsys

delete branch : subscription_enablement-deeng153

delete time in 13 days

push eventubuntu/adsys

Didier Roche

commit sha 439f06252c87bd9f5f4f5490c99ad1b0efafa80c

Move to system dbus testutils helper Use the same dbus helpers than the other tests and make it using the provided const. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha ac6809be98a916bc21acc282a504525f9e16f3ba

Adapt test to new policy manager API We need a dbus object now. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 64778d023b7e1b5d19517eca93f40936651383eb

Add subscription condition on other GPOS than dconf Use the ubuntu advantage service to determine under which condition other type of policies are enabled. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 0b328937732a5fce7a86fa1d3070caaab127dc76

ApplyPolicy tests for subscription management Add 2 sets of tests for it, mocking the property returned by the ubuntu advantage agent Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 9e0e04d90b62c14941832f634b0a01c79eb1a4c5

subscription support mode for docker system container We now support subscription modes for mocking enabling/disabling in integration tests. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha a059795c0b522e0ab31857c319d227333bfa21aa

Integration tests on disabling subcription case Add an integration test for this + a TODO for later. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 007566ead254a9cddb99ec5075f19fab2592e45e

Handle in golden comparison empty directories * Create an empty marker file for git to commit them when doing a golden file refresh. * Ignore them thus during tree comparison. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 6044290129cd21f3e2fd1fccbff6af5c25af4018

Don’t create privilege empty file with no rules We were creating empty file when no rules were applied to privilege policies to erase any existing configuration. This looks weird when the feature is completely disabled. Consequently, only allow creating empty directories but no files. Existing previous files if a rule was applied are removed. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 6bdc3755e8bff5baa62b2ed290f369b3346378eb

Refactor access to system daemon sockets in integration tests This prevents stuttering and copying in various places the answers and modes through env variables. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 4c908d775c532524b46a62742a200804f7437f17

Fix unecessary leading/trailing new lines Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Jean-Baptiste Lallement

commit sha 86d07e7e4365ef05fbb6b6bac980ec1914a9b156

Merge pull request #250 from ubuntu/subscription_enablement-deeng153 Subscription enablement support

view details

push time in 13 days

PR merged ubuntu/adsys

Reviewers
Subscription enablement support
+464 -74

1 comment

39 changed files

didrocks

pr closed time in 13 days

push eventubuntu/adsys

Didier Roche

commit sha f652dbb04cec168692f1859ca2dd4a67077150c8

Migrate to new grpc API for insecure credentials As we are using a local unix socket, the rights are processed at the kernel groups level. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha e6b53d947bff23789f6d6028b82e8d15229aca0f

Relax even more the time for the containers to start on tests Wait more on the container side and make logging more understandable. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Jean-Baptiste Lallement

commit sha 74c730bfc719fbaac85a7410612a5242541dfaa7

Merge pull request #247 from ubuntu/fix_grpc_deprecation Migrate to new grpc API for insecure credentials

view details

push time in 14 days

PR merged ubuntu/adsys

Migrate to new grpc API for insecure credentials

As we are using a local unix socket, the rights are processed at the kernel groups level.

Co-authored-by: Jean-Baptiste Lallement jean-baptiste@ubuntu.com

+6 -4

0 comment

3 changed files

didrocks

pr closed time in 14 days

delete branch ubuntu/adsys

delete branch : fix_grpc_deprecation

delete time in 14 days

MemberEvent

push eventubuntu/adsys

dependabot[bot]

commit sha c68256b2ef073cef269568221f89afbf29d13d0f

Bump gopkg.in/ini.v1 from 1.66.1 to 1.66.2 Bumps [gopkg.in/ini.v1](https://github.com/go-ini/ini) from 1.66.1 to 1.66.2. - [Release notes](https://github.com/go-ini/ini/releases) - [Commits](https://github.com/go-ini/ini/compare/v1.66.1...v1.66.2) --- updated-dependencies: - dependency-name: gopkg.in/ini.v1 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>

view details

Jean-Baptiste Lallement

commit sha b1b63144bafff058eca8bf6152705921ed06c4b6

Merge pull request #240 from ubuntu/dependabot/go_modules/gopkg.in/ini.v1-1.66.2 Bump gopkg.in/ini.v1 from 1.66.1 to 1.66.2

view details

push time in a month

delete branch ubuntu/adsys

delete branch : dependabot/go_modules/gopkg.in/ini.v1-1.66.2

delete time in a month

PR merged ubuntu/adsys

Bump gopkg.in/ini.v1 from 1.66.1 to 1.66.2 dependencies

Bumps gopkg.in/ini.v1 from 1.66.1 to 1.66.2. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/go-ini/ini/releases">gopkg.in/ini.v1's releases</a>.</em></p> <blockquote> <h2>1.66.2</h2> <h2>What's Changed</h2> <ul> <li>Fix nested values can span sections by <a href="https://github.com/ravron"><code>@​ravron</code></a> in <a href="https://github-redirect.dependabot.com/go-ini/ini/pull/306">go-ini/ini#306</a></li> </ul> <h2>New Contributors</h2> <ul> <li><a href="https://github.com/ravron"><code>@​ravron</code></a> made their first contribution in <a href="https://github-redirect.dependabot.com/go-ini/ini/pull/306">go-ini/ini#306</a></li> </ul> <p><strong>Full Changelog</strong>: <a href="https://github.com/go-ini/ini/compare/v1.66.1...v1.66.2">https://github.com/go-ini/ini/compare/v1.66.1...v1.66.2</a></p> </blockquote> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/go-ini/ini/commit/c71eccd557feacd4fcd29f322a99e98870f908b7"><code>c71eccd</code></a> Fix nested values can span sections (<a href="https://github-redirect.dependabot.com/go-ini/ini/issues/306">#306</a>)</li> <li>See full diff in <a href="https://github.com/go-ini/ini/compare/v1.66.1...v1.66.2">compare view</a></li> </ul> </details> <br />

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


<details> <summary>Dependabot commands and options</summary> <br />

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

</details>

+3 -3

0 comment

2 changed files

dependabot[bot]

pr closed time in a month

push eventubuntu/adsys

Didier Roche

commit sha 3c445e67f6485593c5fc1fe49880197fbed20f1c

Privilege escalation policy module This package allows to control privilege escalation on the client. It creates sudoers and polkit configurations to: - allow or disallow local administrators - specify a list of AD admins or groups as administrator of the client. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 05c2e2e6cf1f2856dd61f53a157280ccb22c414f

Add privilege manager to policies Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 3ec18e09ac395a5206f386bcafdfaeefed00f2a6

New helper to set as Read Only destinations Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 17934af16f5683bab53d7b96021d5b2a4cc9a17e

Units test for admins and group string parsing Tests to ensure that all users and groups are compliant with machine users. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha a3d20723c39f7b3cba830b77052dd9015813f153

Package testing for privilege policy management Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 6b12e9999ae306efcb9767a6e86b2a367b97f6e3

Add more logging while applying policies Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 7faa534267040915ad375fe7298704c21414280b

Better test variable name Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha f5b25bf1bca0780ece7cd3cf07d5a9ff3b6c36a4

Add policy integration test with privilge module Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha ee4c3f26bc1a27ea2746225b86c1ddedc0348139

Only dconf disabled keys are system defaults As we are showing up that way in the output, change the rule to only display this for dconf keys. Then, write them as disabled. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha b85d26de96cfadc5aa0bd3363bfb69f688907b0b

Cover dconf and non dconf disabled key in colorize tests Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 60a151ad7abc1fabeac89554062bf2c7da84dd20

Hook up privilege manager paths to adsysservice Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 4b2435232171378e83d0a6b32cd168b4b946fa2c

Add privilege manager paths to configuration Add them to tests. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 22da8c188ef193041ee6b365be860c53daf8a0e9

Move image reference to public ghcr.io This URL is public where the old one requires to be logged in into github. This makes testing without credentials setup easier. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 5205f4e9dfb32ed20a269fc9442f451ec7922a1d

Update policy status integration tests Refresh golden files for new entries. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 618ba6cadafc9c94e62e7233151d296258fd50b3

Various typos fixes Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 948397112f66c1a1ea247364213e610a95a30341

Refresh policy applied tests Add privilege section to them. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha ac6f77d45cbcc89bd48d570cc94666a3e73cf8b4

Don’t create sudoers and polkit dirs in tests as adsys will do it Keep a note if we need to do the same for dconf Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha f1083f97c800f190cc5bd415a101b8cb1f308be4

Testutils: add safeguard for comparetree if some are empty The difference will still shows up, but we will print a correct output instead of erroring out. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 631aba8e56b9ec9893e793a1e7496bfe6962e60b

Update TestPolicyUpdate tests and golden for privilege policies Refresh golden files. Call and compare sudoers and polkit directory generation. Fix wrong assumption in old-data tests: keys should be prefixed with dconf for gdm entries. Add necessary helpers to make failing tests possible. Adjust some assumptions on previous "keep old tests offline" tests by separating users and machines tests. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha e277c94e50e87fecddfc3eeec9629bd6e0be7349

Align dconf policy application log Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

push time in a month

delete branch ubuntu/adsys

delete branch : apply-privilege-escalation-policy-deeng-146

delete time in a month

push eventubuntu/adsys

dependabot[bot]

commit sha 2898e7dcfea35320336694022209486ce8c20ad5

Bump gopkg.in/ini.v1 from 1.66.0 to 1.66.1 Bumps [gopkg.in/ini.v1](https://github.com/go-ini/ini) from 1.66.0 to 1.66.1. - [Release notes](https://github.com/go-ini/ini/releases) - [Commits](https://github.com/go-ini/ini/compare/v1.66.0...v1.66.1) --- updated-dependencies: - dependency-name: gopkg.in/ini.v1 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>

view details

Jean-Baptiste Lallement

commit sha 5a219fb345e5d425fdfeded77c3e84f7424ae0a2

Merge pull request #238 from ubuntu/dependabot/go_modules/gopkg.in/ini.v1-1.66.1 Bump gopkg.in/ini.v1 from 1.66.0 to 1.66.1

view details

push time in a month

delete branch ubuntu/adsys

delete branch : dependabot/go_modules/gopkg.in/ini.v1-1.66.1

delete time in a month

PR merged ubuntu/adsys

Bump gopkg.in/ini.v1 from 1.66.0 to 1.66.1 dependencies

Bumps gopkg.in/ini.v1 from 1.66.0 to 1.66.1. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/go-ini/ini/releases">gopkg.in/ini.v1's releases</a>.</em></p> <blockquote> <h2>1.66.1</h2> <h2>What's Changed</h2> <ul> <li>Fix python multiline EOF error by <a href="https://github.com/gandarez"><code>@​gandarez</code></a> in <a href="https://github-redirect.dependabot.com/go-ini/ini/pull/309">go-ini/ini#309</a></li> </ul> <p><strong>Full Changelog</strong>: <a href="https://github.com/go-ini/ini/compare/v1.66.0...v1.66.1">https://github.com/go-ini/ini/compare/v1.66.0...v1.66.1</a></p> </blockquote> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/go-ini/ini/commit/3ca1e6ad324e3b4b4cb107e6c5117f4ec475de08"><code>3ca1e6a</code></a> Fix python multiline EOF error (<a href="https://github-redirect.dependabot.com/go-ini/ini/issues/309">#309</a>)</li> <li>See full diff in <a href="https://github.com/go-ini/ini/compare/v1.66.0...v1.66.1">compare view</a></li> </ul> </details> <br />

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


<details> <summary>Dependabot commands and options</summary> <br />

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

</details>

+3 -3

0 comment

2 changed files

dependabot[bot]

pr closed time in a month

push eventubuntu/WSL

Didier Roche

commit sha 175024895da0a0c799aa98f3df7f0ac18dbd538b

Fix build disk space issue Build on C: instead of D:, which has more disk space for us. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha bdc5803f3f69f40d7141988b9b7970d532a3a751

Do not build non point release milestones For LTSes there are monthly milestones that are not point release and we want to ignore. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

didrocks

commit sha 2dc8eb9a03546a9fb102155893f5f44e44441644

Refreshes releases and assets

view details

Didier Roche

commit sha 563f0aec375fd731c31ff21f8709f5e015ce3806

Merge pull request #72 from ubuntu/auto-update-releases-fix-build-disk-space Refresh releases and assets

view details

Jean-Baptiste Lallement

commit sha 1fdf2196ec692085357853e1f639ae9bbffa87bf

Merge pull request #71 from ubuntu/fix-build-disk-space Fix build disk space and lp distro detection

view details

push time in a month

delete branch ubuntu/WSL

delete branch : fix-build-disk-space

delete time in a month

PR merged ubuntu/WSL

Fix build disk space and lp distro detection
+25 -33

0 comment

7 changed files

didrocks

pr closed time in a month

push eventubuntu/adsys

Didier Roche

commit sha 1e72607dc00416a52fdec1fa977391c81bfba326

admxgen: Sanity check that a release-independent key has no release attached A key without any release, if duplicated between yaml files, should always be release independent. Add a check for this. Include tests. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 22d7f3096adf295f055b8bae5e2b786dfd74420b

Add basic key type for keys without options Those keys won’t have metadata and are only keys with the top entries (enabled/disabled/not configured) and no options. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha 652e8696b44d4e121727e871b6e65d6364587509

Admxgen: basic key type tests Rename the no children test to basic key type and add one more test. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha e322ba1c770983bdd06b74c5e4630a441e2bbc72

Basic keys parsing support We support basic keys with replacing the end with "all" to be applicable to every releases. Those keys are release-independent with no options. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Didier Roche

commit sha a9b0dcd4d5be9443283b3dac13bd8041a770fa5d

Add parsing tests for basic key type Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

didrocks

commit sha 79199dd118e9d3ea2ff84e775a6cd8b3a80f5ceb

Refresh policy definition files

view details

Didier Roche

commit sha 6bee210987883fbbe8930f7bd80f8e97749fcdf8

Merge pull request #236 from ubuntu/auto-update-policydefinitions-basic-key-registry-support-deeng-150 Refresh policy definition files

view details

Jean-Baptiste Lallement

commit sha dbd7a43285afd85abae7a5365adf632032e14081

Merge pull request #235 from ubuntu/basic-key-registry-support-deeng-150 Basic key registry support

view details

push time in 2 months

delete branch ubuntu/adsys

delete branch : basic-key-registry-support-deeng-150

delete time in 2 months

PR merged ubuntu/adsys

Basic key registry support

Add generation and parsing support

+174 -23

1 comment

18 changed files

didrocks

pr closed time in 2 months

push eventubuntu/adsys

Didier Roche

commit sha a38a54b63a5198989f4c08eba2c08841d249a19a

Refresh golden test files with latest dconf changes Now that we add notes to dconf object, refresh golden files to add it. Co-authored-by: Jean-Baptiste Lallement <jean-baptiste@ubuntu.com>

view details

Jean-Baptiste Lallement

commit sha b6125a74e003aec801c9cc28e7425ed0ac4a8c9e

Merge pull request #233 from ubuntu/fix-deprecated-keys-new-tests Refresh golden test files with latest dconf changes

view details

push time in 2 months

delete branch ubuntu/adsys

delete branch : fix-deprecated-keys-new-tests

delete time in 2 months

more