Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ubuntu/focal pre-upload packaging review 24.3.1 versus released 24.2-0ubuntu1~20.04.1 #27

Closed
wants to merge 133 commits into from

Commits on Jul 3, 2024

  1. Configuration menu
    Copy the full SHA
    9357c38 View commit details
    Browse the repository at this point in the history
  2. fix(openbsd): fix mtu on newline in hostname files (canonical#5412)

    The /etc/hostname.* files should have the mtu on
    a separate line otherwise it gives error:
    
      ifconfig: mtu: bad value
    
    The lines are executed in order by ifconfig and
    mtu should be on it's own line.
    
    Fixes: canonicalGH-5413
    tobias-urdin authored Jul 3, 2024
    Configuration menu
    Copy the full SHA
    053331e View commit details
    Browse the repository at this point in the history
  3. fix(vmware): Set IPv6 to dhcp when there is no IPv6 addr (canonical#5471

    )
    
    When there is no IPv6 addr given in the customization configuration,
    we shall set IPv6 type to dhcp6, then customized Linux network will be
    set to dhcp IPv6 explicitly.
    PengpengSun authored Jul 3, 2024
    Configuration menu
    Copy the full SHA
    2b6fe64 View commit details
    Browse the repository at this point in the history

Commits on Jul 8, 2024

  1. test: pytestify and cleanup test_cc_mounts.py (canonical#5459)

    * Remove `unittest` constructs and remove base classes.
    * Replace tests that don't test things with tests that do
    * Add fstab and mounts combinations test
    TheRealFalcon authored Jul 8, 2024
    Configuration menu
    Copy the full SHA
    0af459e View commit details
    Browse the repository at this point in the history

Commits on Jul 9, 2024

  1. Configuration menu
    Copy the full SHA
    8a58270 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    7130bbb View commit details
    Browse the repository at this point in the history

Commits on Jul 10, 2024

  1. Configuration menu
    Copy the full SHA
    db828d0 View commit details
    Browse the repository at this point in the history
  2. refactor: util.get_proc_env to work with strs (canonical#5490)

    There are no call sites requesting not decoding the environment vars.
    This change decodes then always, simplifying typing and logic.
    aciba90 committed Jul 10, 2024
    Configuration menu
    Copy the full SHA
    188656b View commit details
    Browse the repository at this point in the history
  3. refactor: util.mounts to handle errors (canonical#5490)

    Instead of a broad try/except, do properly check for conditions that
    invalidate a mount location.
    aciba90 committed Jul 10, 2024
    Configuration menu
    Copy the full SHA
    0128716 View commit details
    Browse the repository at this point in the history
  4. Set MTU for bond parent interface (canonical#5495)

    Support for jumbo frames requires that the underlying physical interfaces
    and the parent bond interface all have the larger MTU configured, not just
    the physical interfaces.
    jcmoore3 authored Jul 10, 2024
    Configuration menu
    Copy the full SHA
    4c0468c View commit details
    Browse the repository at this point in the history
  5. fix: add schema rules for 'baseurl' and 'metalink' in yum repo config (

    …canonical#5501)
    
    At least one of (or both) 'baseurl' or 'metalink' should be provided for yum
    repository specification. Add schema changes to enforce it. Without this,
    with just 'metalink' property set, one would get the schema validator error
    
    \---
    Error: Cloud config schema errors: yum_repos.epel-release: 'baseurl' is a required property
    \---
    
    Signed-off-by: Ani Sinha <anisinha@redhat.com>
    ani-sinha authored Jul 10, 2024
    Configuration menu
    Copy the full SHA
    7d35664 View commit details
    Browse the repository at this point in the history
  6. feat(systemd): Warn user of unexpected run mode (canonical#5209)

    On systemd, services are started by PID 1. When this doesn't happen, cloud-init
    is in an unknown run state and should warn the user.
    
    Reorder pid log to be able to reuse Distro information.
    
    Add docstring deprecating util.is_Linux().
    holmanb authored and blackboxsw committed Jul 10, 2024
    Configuration menu
    Copy the full SHA
    4abdd5a View commit details
    Browse the repository at this point in the history
  7. test: Don't fail tests which call cloud-init as a command (canonical#…

    …5209)
    
    Implement verify_clean_boot() to ignore certain expected logs
    in a platform-specific way.
    holmanb authored and blackboxsw committed Jul 10, 2024
    Configuration menu
    Copy the full SHA
    604d80e View commit details
    Browse the repository at this point in the history
  8. test: allow verify_clean_boot to ignore all or specific tracebacks (c…

    …anonical#5209)
    
    Ensure ignore_warnings=True or ignore_errors=True is honored and
    not overridden by supplemental warning texts appended.
    blackboxsw committed Jul 10, 2024
    Configuration menu
    Copy the full SHA
    8aa1c30 View commit details
    Browse the repository at this point in the history
  9. feat(systemd): convert warning level message to deprecation (canonica…

    …l#5209)
    
    Avoid using warning level messages as there may be some
    use-cases in the wild that need to invoke cloud-init boot
    stages after boot for some reason unknown to upstream.
    
    Provide a detailed warning message informing admins to file
    issues against cloud-init to better represent those feature
    needs before dropping this feature altogether.
    blackboxsw committed Jul 10, 2024
    Configuration menu
    Copy the full SHA
    75add5c View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    a911d07 View commit details
    Browse the repository at this point in the history
  11. tests: revert expectation of exit 2 from cloud-init init --local (can…

    …onical#5504)
    
    Commit 604d80e introduced assertions expecting exit 2 from the
    CLI when calling cloud-init init --local. Revert this test assertion
    as only cloud-init status command exits (2) on deprecations/warnings.
    
    Invoking cloud-init's boot stages on the commmand line will only exit
    1 if critical errors are encountered to avoid degrading overall
    systemd health as seen from cloud-init systemd units. When cloud-init
    boot stages encounter recoverable_errors of any type, there is no
    need to exit non-zero as those deprecation logs are not-critical to
    the health of the system as a whole.
    blackboxsw authored Jul 10, 2024
    Configuration menu
    Copy the full SHA
    18d76ac View commit details
    Browse the repository at this point in the history
  12. test: Unconditionally skip test_multi_nic_hotplug_vpc (canonical#5503)

    It is pretty consistently failing due to canonical#5373 with no fix in
    sight.
    TheRealFalcon authored Jul 10, 2024
    Configuration menu
    Copy the full SHA
    8dbc5c2 View commit details
    Browse the repository at this point in the history

Commits on Jul 11, 2024

  1. Fix configuration of DNS servers via OpenStack (canonical#5384)

    Ensure DNS server addresses are parsed from the proper location
    of network_data.json
    
    Fixes canonical#5386
    
    Co-authored-by: Alberto Contreras <alberto.contreras@canonical.com>
    jcmoore3 and aciba90 authored Jul 11, 2024
    Configuration menu
    Copy the full SHA
    e0e6a42 View commit details
    Browse the repository at this point in the history

Commits on Jul 18, 2024

  1. fix: Update DNS behavior for NetworkManager interfaces (canonical#5496)

    If DNS information is added to a NetworkManager managed interface where
    the given protocol family is disabled, NetworkManager will be unable to
    activate the interface.
    
    canonical#5387
    jcmoore3 authored Jul 18, 2024
    Configuration menu
    Copy the full SHA
    311f723 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    658d184 View commit details
    Browse the repository at this point in the history
  3. Support setting mirrorlist in yum repository config (canonical#5522)

    'mirrorlist' config can be specified instead or along with 'baseurl' in the yum
    repository config. Add support for specifying mirrorlist instead of 'baseurl'.
    
    Fixes canonicalGH-5520
    Signed-off-by: Ani Sinha <anisinha@redhat.com>
    ani-sinha authored Jul 18, 2024
    Configuration menu
    Copy the full SHA
    0b40843 View commit details
    Browse the repository at this point in the history
  4. fix: Clean cache if no datasource fallback (canonical#5499)

    9929a00 added the ability to used a cached datasource when none is
    found. This was supposed to be per-datasource, but the lack of cache
    cleaning got applied universally. This commit makes it so cache will be
    cleaned as it was before if fallback isn't implemented in datasource.
    
    Fixes canonicalGH-5486
    TheRealFalcon authored Jul 18, 2024
    Configuration menu
    Copy the full SHA
    550c685 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    57d130e View commit details
    Browse the repository at this point in the history
  6. feat: Add trace-level logger (canonical#5414)

    This is useful for logs we want hidden by default but can be turned
    on via configuration.
    TheRealFalcon committed Jul 18, 2024
    Configuration menu
    Copy the full SHA
    b0a673a View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    8ec2f64 View commit details
    Browse the repository at this point in the history
  8. refactor: logs.py pathlib changes (canonical#5414)

    Switch to pathlib where appropriate and call consistently
    TheRealFalcon committed Jul 18, 2024
    Configuration menu
    Copy the full SHA
    19c86ff View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    6e4153b View commit details
    Browse the repository at this point in the history

Commits on Jul 19, 2024

  1. fix(ds-identify): Detect nocloud when seedfrom url exists (canonical#…

    …5515)
    
    With this change, the following config in cloud.cfg.d/ will select NoCloud in
    network stage.
    
    ```
    datasource_list: [ GCE, NoCloud, None ]
    datasource:
      NoCloud:
        seedfrom: http://0.0.0.0:8000/
    ```
    
    Previously a two or less datasources in the datasource_list were required to
    get this behavior, which was undocumented and not intuitive.
    
    The ds-identify already allowed inline user-data and meta-data to
    trigger detection.
    
    Add ds-identify unittests for seedfrom and inline user-data.
    Add DataSourceNoCloud.ds_detect() unittests for seedfrom and inline
    user-data.
    holmanb committed Jul 19, 2024
    Configuration menu
    Copy the full SHA
    23be88d View commit details
    Browse the repository at this point in the history
  2. chore: Improve detection logging for user clarity (canonical#5515)

    The nocloud datasource logs messages that are sometimes confused by users
    for errors. Clarify them.
    
    Also, remove redundant information from the logs:
    
    - simplify log wording
    - only include seed and dsmode information in nocloud string when
      non-default values are used
    holmanb committed Jul 19, 2024
    Configuration menu
    Copy the full SHA
    7703634 View commit details
    Browse the repository at this point in the history
  3. chore: Deprecate partially supported system config (canonical#5515)

    ds-identify does not support the fs_label key. This key is only partially
    supported.
    
    Deprecate it. Users of custom labels may switch to cidata or CIDATA.
    
    Note: Tools such as cloud-localds hard-code the label.
    holmanb committed Jul 19, 2024
    Configuration menu
    Copy the full SHA
    16a3198 View commit details
    Browse the repository at this point in the history
  4. feat(wsl): Special handling Landscape client config tags (canonical#5460

    )
    
    UP4W business logic is so that its data overrides user at a key (module) 
    level.
    That means the entire Landscape config is overriden if both agent data
    and user data contains config for that module.
    Yet, for better usability, computer tags must be assignable per instance.
    That's not possible with agent.yaml, because it's meant to be global.
    Its config data affects all Ubuntu WSL instances.
    
    Thus this aims to make a special case for landscape.client.tags,
    if present in user provided data (either Landscape or local user -
      whatever is picked up before merging with agent.yaml)
    its value overwrites any tags set by agent.yaml.
    
    Only landscape.client.tags are treated specially.
    The pre-existing merge rules still apply for any other value present in
    both agent.yaml and user provided data.
    
    Fixes UDENG-2464
    CarlosNihelton authored Jul 19, 2024
    Configuration menu
    Copy the full SHA
    5532b4a View commit details
    Browse the repository at this point in the history

Commits on Jul 22, 2024

  1. add openeuler to distros in cc_spacewalk.py (canonical#5530)

    Commit 441d8f8 adds openeuler to the list of supported distros in
    cc_spacewalk.py, but there is one omission.
    xiaoge1001 authored Jul 22, 2024
    Configuration menu
    Copy the full SHA
    e1147bd View commit details
    Browse the repository at this point in the history
  2. feat: Support URI sources in write_files module (canonical#5505)

    This change adds an optional `source` key to the `write_files` module,
    allowing users to specify a URI from which to load file contents. This
    facilitates more flexible multi-part configurations, as file contents
    can be managed via external sources such as independent Git
    repositories.
    
    Fixes canonicalGH-5500
    LRitzdorf authored Jul 22, 2024
    Configuration menu
    Copy the full SHA
    7c2d4fd View commit details
    Browse the repository at this point in the history
  3. fix(azurelinux): Change default usr_lib_exec path (canonical#5526)

    Change default usr_lib_exec from /usr/libexec/ to /usr/lib
    as azurelinux installs cloud-init tool binaries under
    /usr/lib/cloud-int instead of /usr/libexec/cloud-init
    rmhsawyer authored Jul 22, 2024
    Configuration menu
    Copy the full SHA
    2534432 View commit details
    Browse the repository at this point in the history
  4. test: fix no ds cache tests (canonical#5529)

    After 7703634 log messages migrated
    from:
    
    "Detected platform DataSource..." to "Detected DataSource..."
    
    Adapt integration tests accordingly.
    aciba90 committed Jul 22, 2024
    Configuration menu
    Copy the full SHA
    2d23852 View commit details
    Browse the repository at this point in the history
  5. test: fix test_kernel_command_line_match (canonical#5529)

    Adapt to conform with 7703634
    aciba90 committed Jul 22, 2024
    Configuration menu
    Copy the full SHA
    f90f0b8 View commit details
    Browse the repository at this point in the history

Commits on Jul 23, 2024

  1. fix(wsl): Put back the "path" argument to wsl_path in ds-identify (ca…

    …nonical#5537)
    
    Got swallowed by
    https://github.com/canonical/cloud-init/pull/5116/commits/
    da6b5c4
    
    The former commit resulted in usage error from the wslpath
    command thus we never found WSL specific data,
    disabling cloud-init.
    CarlosNihelton authored Jul 23, 2024
    Configuration menu
    Copy the full SHA
    99ac819 View commit details
    Browse the repository at this point in the history

Commits on Jul 24, 2024

  1. fix: auto label doc PRs (canonical#5542)

    Create explicit file to define and pin the actions/labeler's version.
    
    Upgrade breaking changes from action/labeler@v5.
    aciba90 authored Jul 24, 2024
    Configuration menu
    Copy the full SHA
    bb4b7c0 View commit details
    Browse the repository at this point in the history
  2. docs: improve qemu command line (canonical#5540)

    The suggested qemu command line in our local execution example
    is rather old.
    
    Change the discouraged -hd* options to the new
    -device instead.
    
    Further add a chance to use KVM acceleration to speed up the
    example.
    
    Finally we had several occasions to be working on x86 only.
    We dropped arguments that can not work on cross-arch and
    furthermore added a hint at how one could again native
    performance on these platforms.
    
    Fixes canonicalGH-5050
    cpaelzer authored Jul 24, 2024
    Configuration menu
    Copy the full SHA
    02beb9a View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    8ceae8b View commit details
    Browse the repository at this point in the history

Commits on Jul 25, 2024

  1. Configuration menu
    Copy the full SHA
    5f93726 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    c176075 View commit details
    Browse the repository at this point in the history
  3. doc: Update docs on boothooks (canonical#5546)

    Improve explaination on #cloud-boothook for end-users.
    
    SC-1657
    Fixes canonicalGH-4542
    
    Co-authored-by: Calvin Mwadime <calvin.mwadime@canonical.com>
    aciba90 and CalvoM authored Jul 25, 2024
    Configuration menu
    Copy the full SHA
    e5e78c2 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    883d8e2 View commit details
    Browse the repository at this point in the history
  5. fix(doc-spelling): config spelling_word_list_filename (canonical#5547)

    Without this explicit config option, an untracked and unused
    `doc/rtd/spelling_wordlist.txt` file is created while running
    `tox -e doc-spelling`.
    aciba90 authored and blackboxsw committed Jul 25, 2024
    Configuration menu
    Copy the full SHA
    2ffd652 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    25058e1 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    779dd6b View commit details
    Browse the repository at this point in the history

Commits on Jul 26, 2024

  1. doc(NoCloud): Categorize the different configuration types (canonical…

    …#5521)
    
    Formally document providing runtime configuration in system configuration.
    Introduce names to identify previously unnamed NoCloud concepts.
    Add more structure - discrete sections for:
    - runtime configuration types
    - discovery configuration
    - configuration sources
    holmanb authored Jul 26, 2024
    Configuration menu
    Copy the full SHA
    81ef45e View commit details
    Browse the repository at this point in the history
  2. doc: improve drop-in custom modules (canonical#5548)

    Add group of pages for drop-in custom modules and
    restructure existing docs under it.
    
    Add doc for custom datasources and config modules.
        
    SC-1836
    Fixes canonicalGH-4649
    aciba90 authored Jul 26, 2024
    Configuration menu
    Copy the full SHA
    914a3a8 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    15200a0 View commit details
    Browse the repository at this point in the history

Commits on Jul 29, 2024

  1. Configuration menu
    Copy the full SHA
    f9ab856 View commit details
    Browse the repository at this point in the history
  2. fix(actions): doc labeler needs all clause instead of default any (ca…

    …nonical#5568)
    
    Unspecified base match in labeler assumes 'any' for each match
    clause. When specifying base-branch and --any-glob-to-any-file either
    one of these cases would result in a successful match which would label
    all PRs again main as documentation. We need to explicitly specify
    'all:' in our labeler match config to ensure BOTH:
    
     * matching file paths related to documentation
             -AND-
     * targeting a merge against 'main' branch
    blackboxsw authored Jul 29, 2024
    Configuration menu
    Copy the full SHA
    f8c1b51 View commit details
    Browse the repository at this point in the history
  3. chore(debian): Remove vestigial postinst and preinst code (canonical#…

    …5569)
    
    Both were version gated and do not run.
    holmanb authored Jul 29, 2024
    Configuration menu
    Copy the full SHA
    00317d1 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    f8d8a0c View commit details
    Browse the repository at this point in the history

Commits on Jul 31, 2024

  1. fix(actions): correct typo in cloudinit/config/schemas/ match (canoni…

    …cal#5570)
    
    Also drop undesirable former doc-autolabel.yml workflow
    blackboxsw authored Jul 31, 2024
    Configuration menu
    Copy the full SHA
    b5d4f3f View commit details
    Browse the repository at this point in the history
  2. feat: Eliminate redundant configuration reads (canonical#5536)

    When instance id hasn't changed and datasource hasn't changed, don't
    forcibly reload the configuration.
    holmanb authored Jul 31, 2024
    Configuration menu
    Copy the full SHA
    e6b2e0f View commit details
    Browse the repository at this point in the history
  3. fix(NoCloudNet): Add network-config support (canonical#5566)

    This enables support for network config v2 and v1 to NoCloud
    when used with http / ftp / etc. 
    
    BREAKING_CHANGE: Adds an additional network request to NoCloud.
    holmanb authored Jul 31, 2024
    Configuration menu
    Copy the full SHA
    5322dca View commit details
    Browse the repository at this point in the history

Commits on Aug 2, 2024

  1. fix: Integration tests (canonical#5576)

    String output changed in 7703634.
    Instance-id doesn't change on LXD / Focal.
    holmanb authored Aug 2, 2024
    Configuration menu
    Copy the full SHA
    ea831d6 View commit details
    Browse the repository at this point in the history
  2. refactor: update handle function of cc_mounts (canonical#5498)

    The handle function of cc_mounts was hard to grok and had one of the
    highest cyclomatic complexity scores in the codebase. Functionally,
    the code should be unchanged.
    TheRealFalcon authored Aug 2, 2024
    Configuration menu
    Copy the full SHA
    d15a770 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    ca3e6bc View commit details
    Browse the repository at this point in the history
  4. feat: Single process optimization (canonical#5489)

    Python interpreter initialization and module import time 
    contributes a significant amount of wall clock time to
    cloud-init's runtime (and therefore to total boot time).
    
    Cloud-init has four stages. Each stage starts its own Python
    interpreter and loads the same libraries. To eliminate the
    redundant work of starting an interpreter and loading libraries,
    this changes cloud-init to run as a single process. Systemd
    service ordering is retained by using the existing cloud-init
    services as shims which use a synchronization protocol to start
    each cloud-init stage and to communicate that each stage is
    complete to the init system. Since multiple cloud-init processes
    sit in the critical chain of starting the system, this reduces
    boot time (including time to ssh login and time to cloud-init
    completion).
    
    Currently only systemd is supported, but the synchronization
    protocol should be capable of supporting other init systems
    as well with minor changes.
    
    Note: This enables many additional follow-on improvements that
    eliminate redundant work. However, these potential improvements
    are temporarily ignored. This commit has been structured to
    minimize the changes required to capture the majority of primary
    performance savings while preserving correctness and the ability
    to preserve backwards compatibility.
    
    Since this changes the semantics of the existing cloud-init unit
    files, this change takes the opportunity to rename one of its
    systemd units which causes frequent user confusion. The unit named
    cloud-init.service is often mistaken by users for being the only
    cloud-init service, when it is simply one of four stages. This
    stage is documented as the "network" stage, so this service will
    be renamed to "cloud-init-network.service". A new notify service
    is added as part of this implementation which contains the
    cloud-init process. This unit is named "cloud-init-main.service".
     
    Synchronization protocol
    ========================
    
    - create one Unix socket for each systemd service stage
    - send sd_notify()
    - For each of the four stages (local, network, config, final):
       - when init system sends "start" to the Unix socket, start the
         stage
       - when running stage is complete, send "done" to Unix socket
    
    File changes
    ============
    
    socket.py (new)
    ---------------
    
    - define a systemd-notify helper function
    - define a context manager which implements a multi-socket
      synchronization protocol
    
    cloud-init.service -> cloud-init-network.service (renamed)
    ----------------------------------------------------------
    
    - renamed to cloud-network.service
    
    cloud-{init-local,init-network,config,final}.services
    -------------------------------------------
    
    - change ExecStart to use netcat to connect to Unix socket and:
      - send a start message
      - wait for completion response
    - note: a pure Python equivalent is possible for any downstreams
      which do not package openbsd's netcat
    
    cloud-init-main.service (new)
    -----------------------------
    
     - use service type to 'notify'
     - invoke cloud-init in single process mode
     - adopt systemd ordering requirements from cloud-init-local.service
     - adopt KillMode from cloud-final.service
    
    main.py
    -------
    
     - Add command line flag to indicate "all stages" mode
     - In this mode run each stage followed by an IPC
       synchronization protocol step
    
    cloud-final.services
    --------------------
    
    - drop KillMode
    
    cloud-init-local.services
    -------------------------
    
    - drop dependencies made redundant by ordering after
      cloud-init-main.service
    
    Performance Impact
    ==================
    
    On Ubuntu 24.04, Python's wall clock start up time as measured with
    `time python3 -c 'import cloudinit.cmd.main' on a few cloud types:
    
    lxc container: 0.256s
    QEMU machine:  0.300s
    gce instance:  0.367s
    ec2 instance:  0.491s
    
    This change eliminates x1 this start up time from time to ssh.
    This change eliminates x3 this start up time from cloud-init's total
    completion. Total benefit varies based on the platform that the
    instance is hosted by, but all platforms will measurably benefit from
    this change.
    
    BREAKING_CHANGE: Run all four cloud-init services as a single systemd service.
    holmanb authored Aug 2, 2024
    Configuration menu
    Copy the full SHA
    143bc9e View commit details
    Browse the repository at this point in the history

Commits on Aug 3, 2024

  1. fix: nocloud no fail when network-config absent (canonical#5580)

    Commit 5322dca introduced an assumption to read_seeded that
    network-config must always be present for NoCloud datasource.
    Since it is still considered and optional supplemental configuration
    allow the read_seeed calls to succeed in the absence of network-config.
    
    Avoids failures seen in tests/integration-tests/datasources/test_nocloud.py::
      test_nocloud_seedfrom_vendordata
    blackboxsw authored Aug 3, 2024
    Configuration menu
    Copy the full SHA
    b7b11bc View commit details
    Browse the repository at this point in the history

Commits on Aug 5, 2024

  1. Configuration menu
    Copy the full SHA
    0aea65c View commit details
    Browse the repository at this point in the history
  2. fix: Update default LXD meta-data with user meta-data (canonical#5584)

    This was previously unnecessary because:
    
    a. LXD automatically appends the user.meta-data key to default meta-data.
    b. In the presence of duplicate keys, PyYAML uses the last key.
    
    This change is the cloud-init part of a set of changes that will enable cloud-init
    to avoid depending on undefined behavior. In the future LXD may stop
    appending user-defined meta-data to its default meta-data. This change
    makes cloud-init forward compatible to LXD for when that change is
    implemented.
    
    canonicalGH-5575
    holmanb authored Aug 5, 2024
    Configuration menu
    Copy the full SHA
    c0ffdd4 View commit details
    Browse the repository at this point in the history

Commits on Aug 6, 2024

  1. Configuration menu
    Copy the full SHA
    dbe287a View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    5252fa3 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    d396de1 View commit details
    Browse the repository at this point in the history
  4. azure: check azure-proxy-agent status (canonical#5138)

    Azure Guest Proxy Agent is a new feature in Azure
    that offers a key exchange protocol to secure
    communication between guest and host using eBPF.
    
    Add opt-in feature which enables the Azure Guest Proxy Agent
    when ovf-env.xml has ProvisionGuestProxyAgent=True.
    Report provisioning failures if ProvisionGuestProxyAgent is enabled
    but images do not have azure-proxy-agent installed or functional.
    KsenijaS authored Aug 6, 2024
    Configuration menu
    Copy the full SHA
    b71f48f View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    f93a6b5 View commit details
    Browse the repository at this point in the history
  6. refresh patches

    TheRealFalcon committed Aug 6, 2024
    Configuration menu
    Copy the full SHA
    171926a View commit details
    Browse the repository at this point in the history
  7. update changelog

    TheRealFalcon committed Aug 6, 2024
    Configuration menu
    Copy the full SHA
    3ebfb85 View commit details
    Browse the repository at this point in the history

Commits on Aug 7, 2024

  1. fix: Fix ftp failures (canonical#5585)

    - fix exception handling when retr fails
    - test: Close connection on failure
    - test: Ensure server is running before it is queried
    holmanb authored and blackboxsw committed Aug 7, 2024
    Configuration menu
    Copy the full SHA
    7532589 View commit details
    Browse the repository at this point in the history
  2. fix: Fix tests which have outdated strings (canonical#5585)

    User output and service names recently changed.
    holmanb authored and blackboxsw committed Aug 7, 2024
    Configuration menu
    Copy the full SHA
    acf04d6 View commit details
    Browse the repository at this point in the history
  3. feat(snap): avoid refresh on package_upgrade: true and refresh.hold (c…

    …anonical#5426)
    
    When snap refresh.hold is set to forever, an admin is saying they do
    not want generic automated refreshes of snaps performed by default.
    
    This should be an indicator to cloud-init to avoid calling snap refresh
    on such systems due to a `package_upgrade: true` present in user-data.
    
    For network-limited environments with images which have the snap package
    manager but don't want to wait and timeout on snap refresh, the following
    user-data can be provided to still allow for package_upgrade: true,
    and avoid a 20-30 second wait on snaps being unable to access certain
    snap URLs.
    
       #cloud-config
       package_upgrade: true
       snap:
         commands:
           00: snap refresh --hold=forever
    
    cloud-init now interrogates the state refresh.hold value by calling
      snap get system -d
    
    If snap refresh --hold was called in that environment to set 'forever',
    cloud-init will skip calling refresh and log the reason for skipping.
    
    We cannot honor short time-based refresh.holds because the snap
    services place a short hold in early boot anyway as systemd units
    startup.
    
    Fixes: canonicalGH-5290
    blackboxsw authored Aug 7, 2024
    Configuration menu
    Copy the full SHA
    0787d62 View commit details
    Browse the repository at this point in the history
  4. Add no-single-process.patch

    holmanb committed Aug 7, 2024
    Configuration menu
    Copy the full SHA
    670cf09 View commit details
    Browse the repository at this point in the history
  5. Update changelog

    holmanb committed Aug 7, 2024
    Configuration menu
    Copy the full SHA
    80fb9ec View commit details
    Browse the repository at this point in the history
  6. Add no-nocloud-network.patch

    holmanb committed Aug 7, 2024
    Configuration menu
    Copy the full SHA
    5f9a919 View commit details
    Browse the repository at this point in the history
  7. Update changelog

    holmanb committed Aug 7, 2024
    Configuration menu
    Copy the full SHA
    4378437 View commit details
    Browse the repository at this point in the history
  8. fix: read_optional_seed to set network-config when present (canonical…

    …#5593)
    
    Commit 5322dca added network-config support to nocloud's
    read_optional_seed function. It persisted meta-data as
    network-config. Add tests and fix to track network-config value.
    blackboxsw authored Aug 7, 2024
    Configuration menu
    Copy the full SHA
    edd92b7 View commit details
    Browse the repository at this point in the history

Commits on Aug 9, 2024

  1. Revert "fix(vmware): Set IPv6 to dhcp when there is no IPv6 addr (can…

    …onical#5471)" (canonical#5596)
    
    This reverts commit 2b6fe64.
    
    When there is no IPv6 set to dhcp explicitly, NetworkManager keyfile
    defaults to method=auto, may-fail=true. When there is Ipv6 set to dhcp
    explictily, NetworkManager keyfile will be set to
    method=auto, may-fail=false. The default settings are what we want, so
    revert the previous change to keep IPv6 not set explicitly.
    PengpengSun authored Aug 9, 2024
    Configuration menu
    Copy the full SHA
    65014b9 View commit details
    Browse the repository at this point in the history
  2. chore: add comment explaining the NetworkManager may-fail setting (ca…

    …nonical#5598)
    
    chore: add comment explaining the NetworkManager may-fail setting
    
    The value of may-fail in network manager keyfile is a source of
    confusion as the default value of it is True for Network Manager and
    False for network manager renderer implementation. Add a comment to
    explain why the renderer sets may-fail to False in its implementation.
    ani-sinha authored Aug 9, 2024
    Configuration menu
    Copy the full SHA
    e3db1ad View commit details
    Browse the repository at this point in the history

Commits on Aug 12, 2024

  1. Configuration menu
    Copy the full SHA
    bd6cd1f View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    6ae8f68 View commit details
    Browse the repository at this point in the history
  3. doc(boot): Make first boot a dedicated page (canonical#5595)

    Also shift the format page higher in the explanation page list, since
    this is a high traffic page.
    holmanb committed Aug 12, 2024
    Configuration menu
    Copy the full SHA
    0014467 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    baeb35c View commit details
    Browse the repository at this point in the history
  5. fix: invalid quilt patch no-single-process.patch

    Patch diff was invalid representing a 57 line diff for cloud-init.service
    in the diff header. But, the actual diff context was only 56 lines.
    
    This broke the ability to apply all quilt patches with quilt push -a.
    
    Resulting in broken daily build recipe for focal with the following
    error message:
      patch: **** malformed patch at line 252:
    
      Patch no-single-process.patch does not apply (enforce with -f)
    blackboxsw committed Aug 12, 2024
    Configuration menu
    Copy the full SHA
    ee3c340 View commit details
    Browse the repository at this point in the history

Commits on Aug 13, 2024

  1. chore(actions): add doc label for any doc related subdir file matches (

    …canonical#5602)
    
    Recently noticed that doc file changes in nested subdirs were
    not triggering documentation auto label.
    
    Example of subdir match at
    https://github.com/actions/labeler?tab=readme-ov-file#basic-examples
    blackboxsw authored Aug 13, 2024
    Configuration menu
    Copy the full SHA
    4c96055 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    8b11d99 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    14edf67 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    07d0384 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    dfcc2b8 View commit details
    Browse the repository at this point in the history
  6. fix(systemd): Correct location of installed drop-in files(canonical#5615

    )
    
    As noted in the systemd documentation, /etc is reserved for "System
    units created by the administrator" while the lib directory should be
    used by "System units installed by the distribution package manager".
    
    Fixes canonicalGH-5613
    nmeyerhans authored Aug 13, 2024
    Configuration menu
    Copy the full SHA
    ac94539 View commit details
    Browse the repository at this point in the history

Commits on Aug 14, 2024

  1. Configuration menu
    Copy the full SHA
    19a9cca View commit details
    Browse the repository at this point in the history
  2. chore(tox.ini): Simplify configuration, fix minor bugs (canonical#5607)

    When referencing a command from another environment, it will cause
    errors when the other environment already exists. Fix it by avoiding
    indirection in environment command definitions.
    
    Additionally, simplify envoronment dependency management by defining two
    lists of dependencies: a default one with pinned versions for all
    environments, and an unpinned on for "tip" environments. Several
    dependencies have been missed in the mypy envornments, so this should
    make it easier by standardizing environment dependencies to be
    consistent across environments.
    holmanb committed Aug 14, 2024
    Configuration menu
    Copy the full SHA
    56dc23c View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    2bb49b4 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    56658ec View commit details
    Browse the repository at this point in the history
  5. ci: Drop Python 3.6 and 3.7 (canonical#5607)

    Bump Ubuntu version for better pip dependency resolution.
    holmanb committed Aug 14, 2024
    Configuration menu
    Copy the full SHA
    e1845be View commit details
    Browse the repository at this point in the history
  6. Update behavior of base bond interface with NetworkManager (canonical…

    …#5385)
    
    When using NetworkManager, if the base bond interface does not have
    subnet information configured, ensure it is disabled with respect to
    ipv4 and ipv6. Otherwise, the base bond interface defaults to 'auto'
    and will try to configure itself via DHCP. This is problematic when
    using a tagged VLAN interface on top of the bond as the base
    interface will try to configure itself via DHCP on the untagged VLAN.
    jcmoore3 authored Aug 14, 2024
    Configuration menu
    Copy the full SHA
    90a3190 View commit details
    Browse the repository at this point in the history
  7. fix(nm): Ensure bond property name formatting matches schema definiti…

    …on (canonical#5383)
    
    The cloud-init network config version 1 schema defines the bond
    properties with underscores, prepended with 'bond-'. This change
    ensures consistency with the schema for the bond property names.
    
    canonicalGH-5366
    jcmoore3 authored Aug 14, 2024
    Configuration menu
    Copy the full SHA
    d79050d View commit details
    Browse the repository at this point in the history

Commits on Aug 15, 2024

  1. tests: fix test_ca_certs.py for gcp (canonical#5621)

    Avoid exclusive expectations that cloud-init is the only agent
    registering certificates in a system to
    /etc/ssl/certs/ca-certificates.crt.
    
    On Google Cloud Platform, Google Guest Agent does setup root certs
    which makes performing a checksum of ca-certificates.crt incorrect due
    to extra certs present in ca-certificates.crt.
    
    Adapt test to assert that cloud-init's cert is contained in
    ca-certificates.crt but not exclusive content of the file.
    
    Fixes canonicalGH-5609
    blackboxsw authored Aug 15, 2024
    Configuration menu
    Copy the full SHA
    2e4c39b View commit details
    Browse the repository at this point in the history
  2. feat: collect-logs improvements (canonical#5619)

    * Collect sensitive data by default since we ask for it more often
      than not
    * Output warning that we're collecting sensitive data
    * Glob most of /run/cloud-init, /etc/cloud, and /var/lib/cloud
    * Stop creating empty directories in the tarball
    * Require running as root given that the logs are root read-only
    * Update apport accordingly
    
    Fixes canonicalGH-5297
    TheRealFalcon authored Aug 15, 2024
    Configuration menu
    Copy the full SHA
    c28092f View commit details
    Browse the repository at this point in the history

Commits on Aug 16, 2024

  1. fix(wsl): Properly assemble multipart data (canonical#5538)

    In the case of Pro, if either agent or user data is not cloud-config user-data,
    combine the parse in `self.userdata_raw` as a #include file so
    cloud-init transforms that internally into a multipart data.
    
    Avoid passing strings and lists directly, which confused the processor due the
    lack of a mime type.
    
    Being explicit about only loading text/cloud-config parts also allow other
    composition of cloud-init features to just work, like jinja templates.
    
    This error was surfaced when testing with empty Landscape
    data, but any non-text/cloud-config content type would trigger the same behavior.
    
    Add merge_agent_landscape_data to process agent.yaml or Landscape data and
    ignore any empty  files present in .ubuntupro/.cloud-init/
    CarlosNihelton authored Aug 16, 2024
    Configuration menu
    Copy the full SHA
    56aa706 View commit details
    Browse the repository at this point in the history

Commits on Aug 19, 2024

  1. Configuration menu
    Copy the full SHA
    0a8bf72 View commit details
    Browse the repository at this point in the history
  2. fix(doc): object type check if patternProperties or properties (canon…

    …ical#5562)
    
    Without this fix, rendered module documentation was not rendering the
    following text for some objects:
    
    Each object in **<key_name>** list supports the following keys:
    
    See Rsyslog Config schema tab.
    blackboxsw committed Aug 19, 2024
    Configuration menu
    Copy the full SHA
    24cdaa7 View commit details
    Browse the repository at this point in the history
  3. fix(doc): doc of nested objects under JSON schema items.oneOf (canoni…

    …cal#5562)
    
    Document any keys of objects in a list which allows for objects as one
    of the alternative types allowed as a list item.
    
    Also, when documenting properties, ensure we skip documentation of
    either 'properties' or 'patternProperties' if those properties are
    declared in the hidden key.
    
    Fixes canonicalGH-5514
    blackboxsw committed Aug 19, 2024
    Configuration menu
    Copy the full SHA
    e14ce3d View commit details
    Browse the repository at this point in the history
  4. feat(doc): add env vars to debug config module doc builds (canonical#…

    …5562)
    
    When running tox -e doc the following environment variables are
    supported:
      CLOUD_INIT_DEBUG_MODULE_DOC=cc_<module_id>
      CLOUD_INIT_DEBUG_MODULE_DOC_FILE=<file_path>
    
    The env var CLOUD_INIT_DEBUG_MODULE_DOC can be set to either
    a specific module id, such as cc_rsyslog, or 'all'.
    
    When set the rendered module documentation RST format is printed
    inline to stdout to allow for quick analysis of rendered content.
    
    Optionally, if CLOUD_INIT_DEBUG_MODULE_DOC_FILE is set to a writable
    file path, the output of the rendered content is written to that file
    instead.
    
    This supports development of docs and quick comparison of docs
    generated before and after a changeset.
    blackboxsw committed Aug 19, 2024
    Configuration menu
    Copy the full SHA
    fdccc61 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    d85be37 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    a2193da View commit details
    Browse the repository at this point in the history

Commits on Aug 20, 2024

  1. test: fix ca_certs int test (canonical#5626)

    Remove additional \n which is not present if only one ca_cert is in the
    instance.
    aciba90 authored Aug 20, 2024
    Configuration menu
    Copy the full SHA
    79e5d31 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0411057 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    ca9ffac View commit details
    Browse the repository at this point in the history

Commits on Aug 21, 2024

  1. test: fix test_honor_cloud_dir int test (canonical#5627)

    Align integration test with c28092f.
    aciba90 authored Aug 21, 2024
    Configuration menu
    Copy the full SHA
    c6ba0df View commit details
    Browse the repository at this point in the history
  2. test: fix cmd/test_schema int test (canonical#5629)

    Adapt to new annotation formating from
    a2193da.
    aciba90 authored Aug 21, 2024
    Configuration menu
    Copy the full SHA
    8f741da View commit details
    Browse the repository at this point in the history

Commits on Aug 26, 2024

  1. fix(tests): use instance.clean/restart instead of clean --reboot (can…

    …onical#5636)
    
    Directly calling execute("cloud-init clean --logs --reboot") on
    an integration instances also involves awaiting a new boot id upon
    next interaction with with instance to ensure a reboot has actually
    taken place already on this target machine.
    
    Slow responding test instances/platforms may not completed the shutdown
    restart sequence yet when trying to iteract with an immediate blocking
    call to execut("cloud-init status --wait") which may exit early if accessing
    the prior instance boot before the reboot occurred.
    
    It is preferable to use inspect /proc/sys/kernel/random/boot_id before
    issuing a reboot request and block until a delta is seen in boot_id.
    This blocking wait on reboot and new boot_id is encapsulated inside
    pycloudlib.BaseInstance.restart which will inspect
    /proc/sys/kernel/random/boot_id before restart and block until a delta
    in boot_id across the requested restart.
    
    Fix test_status_block_through_all_boot_status to call instance.clean()
    and restart() to ensure we do not beat the instance reboot race with
    our post-boot assertions.
    blackboxsw authored Aug 26, 2024
    Configuration menu
    Copy the full SHA
    6e4343e View commit details
    Browse the repository at this point in the history

Commits on Aug 27, 2024

  1. feat(azure): add PPS support for azure-proxy-agent (canonical#5601)

    Add PPS support for azure-proxy agent and improve error logging.
    KsenijaS authored Aug 27, 2024
    Configuration menu
    Copy the full SHA
    a38d6da View commit details
    Browse the repository at this point in the history
  2. fix(sources/wsl): no error with empty .cloud-init dir (SC-1862) (cano…

    …nical#5633)
    
    Do not treat the emptiness of .cloud-init/ as an error in the logs
    if agent.yaml is present.
    
    Fixes canonicalGH-5632
    aciba90 authored Aug 27, 2024
    Configuration menu
    Copy the full SHA
    bbdfe36 View commit details
    Browse the repository at this point in the history
  3. feat: add automation for ubuntu/* branches asserting quilt patches ap…

    …ply (canonical#5622)
    
    Perform the same steps that cloud-init daily recipe builds performs
    to assert any packaging branch updates will not break daily builds
    due to quilt patch apply issues.
    
    Steps of daily build recipe reflected in this workflow:
    - checkout main
    - merge packaging branch topmost commit
    - quilt push -a
    - run unittests (via tox -e py3)
    - quilt pop -a
    blackboxsw authored Aug 27, 2024
    Configuration menu
    Copy the full SHA
    8bc3e42 View commit details
    Browse the repository at this point in the history

Commits on Aug 29, 2024

  1. tests: assert cloud-init user-data cert is the only root cert (canoni…

    …cal#5641)
    
    Reintroduce strict assert that cloud-init's cert in userdata is the
    only root cert defined on the platform. Google guest agent was
    installed a secondary root cert in ca_certifications.crt for a period of
    time and this was determined to be less than ideal practice.
    
    Allow cloud-init's integration tests to remain strict validation of
    cert checksum to provide a signal if other platforms or agents
    attempt to extend or alter the system-wide CA.
    blackboxsw authored Aug 29, 2024
    Configuration menu
    Copy the full SHA
    fa042b8 View commit details
    Browse the repository at this point in the history
  2. fix: cc_user_groups incorrectly assumes "useradd" never locks passwor…

    …d field (canonical#5355)
    
    Currently cc_user_groups assumes that "useradd" never locks the password
    field of newly created users. This is an incorrect assumption.
    
    Change add_user (in both __init__.py and alpine.py) to
    explicitly call either lock_passwd or unlock_passwd at all times to
    achieve the desired final result.
    
    For existing users with empty or empty locked passwords, no
    password unlock will be performed and warnings will be issued.
    To support empty password validation, provide functionality to
    parse /etc/shadow and /var/lib/extrausers/shadow to assert
    existing users do not have empty passwords before unlocking.
    
    Additionally in this commit: 
    - add NetworkBSD.ifs property to avoid subp side-effect in ___init__
      which calls ifconfig -a at every instance initialization
    
    Useradd background:
    
    From the useradd manpage:
    
    '-p, --password PASSWORD
    The encrypted password, as returned by crypt(3). The default is to
    disable the password.'
    
    That is, if cloud-init runs 'useradd' but does not pass it the "-p"
    option (with an encrypted password) then the new user's password field
    will be locked by "useradd".
    
    cloud-init only passes the "-p" option when calling "useradd" when
    user-data specifies the "passwd" option for a new user. For user-data
    that specifies either the "hashed_passwd" or "plain_text_passwd"
    options instead then cloud-init calls "useradd" without the "-p" option
    and so the password field of such a user will be locked by "useradd".
    
    For user-data that specifies "hashed_passwd" for a new user then
    "useradd" is called with no "-p" option, so causing "useradd" to lock the
    password field, however then cloud-init calls "chpasswd -e" to set the
    encrypted password which also results in the password field being
    unlocked.
    
    For user-data that specifies either "plain_text_passwd" for a new user
    then "useradd" is called with no "-p" option, so causing "useradd" to
    lock the password. cloud-init then calls "chpasswd" to set the password
    which also results in the password field being unlocked.
    
    For user-data that specifies no password at all for a new user then
    "useradd" is called with no "-p" option, so causing "useradd" to lock
    the password. The password field is left locked.
    
    In all the above scenarios "passwd -l" may be called later by
    cloud-init to enforce "lock_passwd: true").
    
    Conversely where "lock_passwd: false" applies the above "usermod"
    situation (for "hash_passwd", "plain_text_passwd" or no
    password) means that newly created users may have password
    fields locked when they should be unlocked.
    
    For Alpine, "adduser" does not support any form of password being
    passed and it always locks the password field (the same point
    applies about password field being unlocked when/if "chpasswd" is
    called). Therefore in some situations (i.e. no password specified
    in user-data) the password needs to be unlocked if
    "lock_passwd: false".
    dermotbradley authored Aug 29, 2024
    Configuration menu
    Copy the full SHA
    6d644e6 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    93f30bb View commit details
    Browse the repository at this point in the history

Commits on Aug 30, 2024

  1. Configuration menu
    Copy the full SHA
    5ff1a4a View commit details
    Browse the repository at this point in the history
  2. Release 24.3

    Bump the version in cloudinit/version.py to 24.3 and
    update ChangeLog.
    blackboxsw committed Aug 30, 2024
    Configuration menu
    Copy the full SHA
    10449cb View commit details
    Browse the repository at this point in the history

Commits on Sep 4, 2024

  1. fix(netops): fix ip addr flush command (canonical#5651)

    Drop unnecessary environment variable.
    
    Fixes canonicalGH-5648
    holmanb authored and blackboxsw committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    6963dcc View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    92e380e View commit details
    Browse the repository at this point in the history
  3. Release 24.3.1 (canonical#5375)

    Bump the version in cloudinit/version.py to 24.3.1 and
    update ChangeLog.
    blackboxsw committed Sep 4, 2024
    Configuration menu
    Copy the full SHA
    337c651 View commit details
    Browse the repository at this point in the history

Commits on Sep 6, 2024

  1. Configuration menu
    Copy the full SHA
    b000125 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    52f8bee View commit details
    Browse the repository at this point in the history
  3. refresh patches against 24.3.1

    patches:
    debian/patches/cli-retain-file-argument-as-main-cmd-arg.patch
    debian/patches/drop-unsupported-systemd-condition-environment.patch
    debian/patches/netplan99-cannot-use-default.patch
    debian/patches/no-nocloud-network.patch
    debian/patches/no-single-process.patch
    debian/patches/revert-551f560d-cloud-config-after-snap-seeding.patch
    blackboxsw committed Sep 6, 2024
    Configuration menu
    Copy the full SHA
    6915279 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    8fccf14 View commit details
    Browse the repository at this point in the history
  5. fix(no-single-process.patch): revert references to cloud-init-network

    Revert remaning functional references to cloud-init-network service
    which will not exist on stable releases.
    blackboxsw committed Sep 6, 2024
    Configuration menu
    Copy the full SHA
    18a645e View commit details
    Browse the repository at this point in the history

Commits on Sep 9, 2024

  1. Configuration menu
    Copy the full SHA
    bd7f0ee View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    29ed383 View commit details
    Browse the repository at this point in the history