{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":536031109,"defaultBranch":"10.10.19-8.3","name":"host-installer","ownerLogin":"xcp-ng","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2022-09-13T08:30:51.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/34775376?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1727178925.0","currentOid":""},"activityList":{"items":[{"before":"5c8d6a701465b5d0370fe359236b069127801e27","after":null,"ref":"refs/heads/certificate-keysize-protection","pushedAt":"2024-09-24T11:55:25.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"}},{"before":"121e7a7829dd588a84d534a9119c85a1327582cc","after":"46df38e82005f3d6dc3d537876378c0433a30057","ref":"refs/heads/10.10.19-8.3","pushedAt":"2024-09-24T11:55:13.000Z","pushType":"pr_merge","commitsCount":3,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Merge pull request #40 from xcp-ng/certificate-keysize-protection\n\nUpgrade: forbid upgrading with a key XAPI will reject","shortMessageHtmlLink":"Merge pull request #40 from xcp-ng/certificate-keysize-protection"}},{"before":null,"after":"ecea49a2d9f593b372f35e15ba71ad39ed1b63fa","ref":"refs/heads/gtn-use-former-mgmtaddrtype","pushedAt":"2024-09-23T16:59:57.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"gthvn1","name":"9u1llØm3","path":"/gthvn1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/135217?s=80&v=4"},"commit":{"message":"Use the management address type from old install\n\nDuring an upgrade we need to keep track of the management address\ntype to update the xensource-inventory accordingly.\n\nSigned-off-by: Guillaume ","shortMessageHtmlLink":"Use the management address type from old install"}},{"before":"d54d50887ed5d97a6d1e40e29505cebe3381e4c7","after":"5c8d6a701465b5d0370fe359236b069127801e27","ref":"refs/heads/certificate-keysize-protection","pushedAt":"2024-09-23T16:52:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: send users to XCP-ng 8.3 relnotes for details.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: send users to XCP-ng 8.3 relnotes for details."}},{"before":null,"after":"cca728326385bc4856cff94024197901b4e2f757","ref":"refs/heads/mockrun","pushedAt":"2024-09-23T16:38:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"WIP mockrun-installer: new script to help in installer development","shortMessageHtmlLink":"WIP mockrun-installer: new script to help in installer development"}},{"before":"6265ada1ef57e9c07981096be39d52bc5953b4b6","after":"d54d50887ed5d97a6d1e40e29505cebe3381e4c7","ref":"refs/heads/certificate-keysize-protection","pushedAt":"2024-09-23T15:27:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: send users to XCP-ng 8.3 relontes for details.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: send users to XCP-ng 8.3 relontes for details."}},{"before":"1871e0a36ef3ad868c1227dcf4f71032a9538482","after":"8ab5b8d4ce2be24c3557020a122e20a4832c7122","ref":"refs/heads/for-xs/certificate-keysize-protection","pushedAt":"2024-09-16T16:13:51.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: forbid upgrading with a key XAPI will reject\n\nXAPI now rejects the default keysize of 7.x era, which must be\nregenerated before upgrading to 8.3. Let the installer refuse to\ninitiate a situation where a Rolling Pool Upgrade would be unable to\nproceed, with not-yet-updated slaves holding the running VMs getting\nrefused connection to the updated part of the pool.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: forbid upgrading with a key XAPI will reject"}},{"before":"3e3403737b6c1a91fec820d3d78ea13abe9b66b2","after":"6265ada1ef57e9c07981096be39d52bc5953b4b6","ref":"refs/heads/certificate-keysize-protection","pushedAt":"2024-09-16T16:11:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: forbid upgrading with a key XAPI will reject\n\nXAPI now rejects the default keysize of 7.x era, which must be\nregenerated before upgrading to 8.3. Let the installer refuse to\ninitiate a situation where a Rolling Pool Upgrade would be unable to\nproceed, with not-yet-updated slaves holding the running VMs getting\nrefused connection to the updated part of the pool.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: forbid upgrading with a key XAPI will reject"}},{"before":"56579648edfb5b7db854a31b0b321ed512b87959","after":"3e3403737b6c1a91fec820d3d78ea13abe9b66b2","ref":"refs/heads/certificate-keysize-protection","pushedAt":"2024-09-16T14:29:58.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: forbid upgrading with a key XAPI will reject\n\nXAPI now rejects the default keysize of 7.x era, which must be\nregenerated before upgrading to 8.3. Let the installer refuse to\ninitiate a situation where a Rolling Pool Upgrade would be unable to\nproceed, with not-yet-updated slaves holding the running VMs getting\nrefused connection to the updated part of the pool.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: forbid upgrading with a key XAPI will reject"}},{"before":"f330c6aa99f6ecb2353b26f4cc23eb4e45b1ce6f","after":"1871e0a36ef3ad868c1227dcf4f71032a9538482","ref":"refs/heads/for-xs/certificate-keysize-protection","pushedAt":"2024-09-16T14:29:34.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: forbid upgrading with a key XAPI will reject\n\nXAPI now rejects the default keysize of 7.x era, which must be\nregenerated before upgrading to 8.3. Let the installer refuse to\ninitiate a situation where a Rolling Pool Upgrade would be unable to\nproceed, with not-yet-updated slaves holding the running VMs getting\nrefused connection to the updated part of the pool.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: forbid upgrading with a key XAPI will reject"}},{"before":"49ac7259401a9d33e61dfc5ca8bd0f63bfc4fc15","after":"f330c6aa99f6ecb2353b26f4cc23eb4e45b1ce6f","ref":"refs/heads/for-xs/certificate-keysize-protection","pushedAt":"2024-09-16T14:29:12.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: forbid upgrading with a key XAPI will reject\n\nXAPI now rejects the default keysize of 7.x era, which must be\nregenerated before upgrading to 8.3. Let the installer refuse to\ninitiate a situation where a Rolling Pool Upgrade would be unable to\nproceed, with not-yet-updated slaves holding the running VMs getting\nrefused connection to the updated part of the pool.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: forbid upgrading with a key XAPI will reject"}},{"before":null,"after":"49ac7259401a9d33e61dfc5ca8bd0f63bfc4fc15","ref":"refs/heads/for-xs/certificate-keysize-protection","pushedAt":"2024-09-16T13:50:32.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: forbid upgrading with a key XAPI will reject\n\nXAPI now rejects the default keysize of 7.x era, which must be\nregenerated before upgrading to 8.3. Let the installer refuse to\ninitiate a situation where a Rolling Pool Upgrade would be unable to\nproceed, with not-yet-updated slaves holding the running VMs getting\nrefused connection to the updated part of the pool.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: forbid upgrading with a key XAPI will reject"}},{"before":null,"after":"56579648edfb5b7db854a31b0b321ed512b87959","ref":"refs/heads/certificate-keysize-protection","pushedAt":"2024-09-16T13:46:44.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Upgrade: forbid upgrading with a key XAPI will reject\n\nXAPI now rejects the default keysize of 7.x era, which must be\nregenerated before upgrading to 8.3. Let the installer refuse to\ninitiate a situation where a Rolling Pool Upgrade would be unable to\nproceed, with not-yet-updated slaves holding the running VMs getting\nrefused connection to the updated part of the pool.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"Upgrade: forbid upgrading with a key XAPI will reject"}},{"before":null,"after":"686ccfd8c8f25381c13f88200854949bbb8a659d","ref":"refs/heads/anwerfile-fix-vlan-doc","pushedAt":"2024-09-03T15:09:07.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"doc/answerfile: reduce admin-interface confusion\n\nMake the optional attributes description immediately follow the\nmandatory ones, instead of getting inserted between ipv4 and ipv6\nelements, where it just creates confusion.\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"doc/answerfile: reduce admin-interface confusion"}},{"before":"6b587f464d28ce9375380ec7f094ebdf40d6fedf","after":"121e7a7829dd588a84d534a9119c85a1327582cc","ref":"refs/heads/10.10.19-8.3","pushedAt":"2024-08-08T16:33:45.000Z","pushType":"pr_merge","commitsCount":4,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"Merge pull request #39 from xcp-ng/xs8/preserve-stunnel-certs\n\nPreserve even more stunnel certs on upgrade","shortMessageHtmlLink":"Merge pull request #39 from xcp-ng/xs8/preserve-stunnel-certs"}},{"before":"7b84f631897d8363e1382bd2e2911cb4b040fe1a","after":"331c4392f85fe5fdab3b86c490d72099b2b2a2a0","ref":"refs/heads/xs8/preserve-stunnel-certs","pushedAt":"2024-08-08T08:57:54.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"restore_file: when no re is given for a dir, preserve whole dir in one go\n\nIf the specified dir exists but is empty (as can happen for\n/etc/stunnel/certs), the current code would not restore it, as in fact\nit restores not the dir, but its immediate children matching the pattern.\n\nWhen no pattern is given, avoid complications by using the fact that\nrestore_file perfectly works with directories too.\n\nNote this makes it prominent that the 're' handling is only ever applied\nto immediate children of the dir; we may simplify further by moving the\npattern-matching code down to restore_file, but then do we want to keep\nthe current behavior?\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"restore_file: when no re is given for a dir, preserve whole dir in on…"}},{"before":"1dffce5691e6888daf5373e5f8b26a7b8d650202","after":"c595dbe5dfd8a1c1da1237e5606c983c47d718e6","ref":"refs/heads/preserve-stunnel-certs","pushedAt":"2024-08-08T08:48:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"ydirson","name":"Yann Dirson","path":"/ydirson","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1190950?s=80&v=4"},"commit":{"message":"restore_file: when no re is given for a dir, preserve whole dir in one go\n\nIf the specified dir exists but is empty (as can happen for\n/etc/stunnel/certs), the current code would not restore it, as in fact\nit restores not the dir, but its immediate children matching the pattern.\n\nWhen no pattern is given, avoid complications by using the fact that\nrestore_file perfectly works with directories too.\n\nNote this makes it prominent that the 're' handling is only ever applied\nto immediate children of the dir; we may simplify further by moving the\npattern-matching code down to restore_file, but then do we want to keep\nthe current behavior?\n\nSigned-off-by: Yann Dirson ","shortMessageHtmlLink":"restore_file: when no re is given for a dir, preserve whole dir in on…"}},{"before":null,"after":"8b47e8f97e22b81acd2fb170c6d61145712e76b8","ref":"refs/heads/for-xs/boot-mode-checks","pushedAt":"2024-08-07T13:57:24.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes don't match\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one. This uses\nthe helper function is_rootfs_uefi().\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes don't match"}},{"before":"d8e6612068d0e31f223bfb5ece5cc4d69a195109","after":"6b587f464d28ce9375380ec7f094ebdf40d6fedf","ref":"refs/heads/10.10.19-8.3","pushedAt":"2024-08-06T15:08:02.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Merge branch 'boot-mode-checks' into 10.10.19-8.3","shortMessageHtmlLink":"Merge branch 'boot-mode-checks' into 10.10.19-8.3"}},{"before":"99e5565e5dc036463d559fdedf082447707b7690","after":"bfd5d1fc04d49ac6209373ecde19e780db34f63f","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-06T15:05:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes don't match\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one. This uses\nthe helper function is_rootfs_uefi().\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes don't match"}},{"before":"bfd5d1fc04d49ac6209373ecde19e780db34f63f","after":"99e5565e5dc036463d559fdedf082447707b7690","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-06T15:04:15.000Z","pushType":"push","commitsCount":67,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Merge pull request #38 from boot-mode-checks","shortMessageHtmlLink":"Merge pull request #38 from boot-mode-checks"}},{"before":"c10d246ae2bb6b6b24b85556163f43c3e9a20715","after":"bfd5d1fc04d49ac6209373ecde19e780db34f63f","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-06T14:12:41.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes don't match\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one. This uses\nthe helper function is_rootfs_uefi().\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes don't match"}},{"before":"3a169a203456e39cc2c56c8f0ee262f2e1ee1f70","after":"c10d246ae2bb6b6b24b85556163f43c3e9a20715","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-06T13:59:19.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes don't match\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one. This uses\nthe helper function is_rootfs_uefi().\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes don't match"}},{"before":"7543171a8c5e26836b654000d0f08a5a975f129e","after":"3a169a203456e39cc2c56c8f0ee262f2e1ee1f70","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-05T15:52:54.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes don't match\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one. This uses\nthe helper function is_rootfs_uefi().\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes don't match"}},{"before":"9f388e66d8ca15a3ddb26f4b4255c898c0a55cfb","after":"7543171a8c5e26836b654000d0f08a5a975f129e","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-05T12:35:32.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes don't match\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one.\n\nFor the existing installation, the boot mode is obtained by reading the\nboot partition ID. The constant TARGET_BOOT_MODE_UEFI gives it for the\ninstaller.\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes don't match"}},{"before":"88e21bef14677497f4a6d487c53ad50ca1339a0d","after":"9f388e66d8ca15a3ddb26f4b4255c898c0a55cfb","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-05T09:33:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes don't match\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one.\n\nFor the existing installation, the boot mode is obtained by reading the\nboot partition ID. The constant TARGET_BOOT_MODE_UEFI gives it for the\ninstaller.\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes don't match"}},{"before":"9be7c997dce32d22105fff0657939ba5ae7afaba","after":"88e21bef14677497f4a6d487c53ad50ca1339a0d","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-05T08:46:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes mismatch\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one.\n\nFor the existing installation, the boot mode is obtained by reading the\nboot partition ID. The constant TARGET_BOOT_MODE_UEFI gives it for the\ninstaller.\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes mismatch"}},{"before":"6f0ae27672cd19d33811f2da72fbfd0f3a9ff4c0","after":"9be7c997dce32d22105fff0657939ba5ae7afaba","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-05T08:18:11.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Ignore existing installation for upgrade if boot modes mismatch\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one.\n\nFor the existing installation, the boot mode is obtained by reading the\nboot partition ID. The constant TARGET_BOOT_MODE_UEFI gives it for the\ninstaller.\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Ignore existing installation for upgrade if boot modes mismatch"}},{"before":"6e8fba9b8165a02d2fa269edc4d7a8ee71409b86","after":"6f0ae27672cd19d33811f2da72fbfd0f3a9ff4c0","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-05T07:53:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Check existing installation boot mode\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one.\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Check existing installation boot mode"}},{"before":"97ebfd6b2e28ea28b0476f16030b9d532d9ec7f3","after":"6e8fba9b8165a02d2fa269edc4d7a8ee71409b86","ref":"refs/heads/boot-mode-checks","pushedAt":"2024-08-02T16:22:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"tescande","name":"Thierry Escande","path":"/tescande","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1049711?s=80&v=4"},"commit":{"message":"Check existing installation boot mode\n\nThis patch checks that the current installation is not proposed as\nupgradeable if its boot mode differs from the installer one.\n\nSigned-off-by: Thierry Escande ","shortMessageHtmlLink":"Check existing installation boot mode"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yNFQxMTo1NToyNS4wMDAwMDBazwAAAAS_Fmu5","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yNFQxMTo1NToyNS4wMDAwMDBazwAAAAS_Fmu5","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0wMlQxNjoyMjoyOC4wMDAwMDBazwAAAASQWi2x"}},"title":"Activity · xcp-ng/host-installer"}