** Description changed:

  New Snapd release 2.74 is required for Jammy, Noble, Plucky and
  Questing.
  
  Snapd 2.74 is the latest upstream release. It follows the the previous
  Ubuntu release snapd 2.73.
  
  The Snapd package deviates from the standard SRU process. The following
  special SRU process was followed:
  https://documentation.ubuntu.com/sru/en/latest/reference/exception-
  Snapd-Updates/. We are in the process of updating to refreshed
  documentation:
  
https://docs.google.com/document/d/e/2PACX-1vTE088Am4f5SWhf3vIzA1vAIPLNrQ7JYWRO185SWmHED_e0msSahJSozArisSXezd1D8CugstKN27jx/pub
  (draft)
  
  Release preparation: https://github.com/canonical/snapd/pull/16288
  Release preparation test results: 
https://github.com/canonical/snapd/actions/runs/17822196539/job/50712254868
  Failure analysis: 
https://github.com/canonical/snapd/pull/16288#issuecomment-3583193793
  
  Release notes:
  
https://github.com/canonical/snapd/pull/16288/files#diff-51920e95310ebfbc1ae31709f3b95f89afffbf4f1a6e38e8b2b406e2fb6197eaR1
  
  Debian package source git branch: 
https://github.com/canonical/snapd/tree/release/2.74
  Debian package source git tag: 
https://github.com/canonical/snapd/releases/tag/2.74
  
  ------------------------------------------------------------------------------
  
  Launchpad bugs addressed: https://launchpad.net/snapd/+milestone/2.74
  
  Content overview:
-  - To be completed...
+  - Full disk encryption support for 26.04 installer image
+  - Keyboard and boot UX improvements for encrypted systems
+  - Preseeding support on hybrid systems
+  - Confdb feature expansion
+  - Remote device management and assertions enhancements
+  - Snap and snapctl CLI robustness and usability improvements
+  - Desktop, confinement, and interface refinements
+  - Packaging, cross-distro, and system reliability cleanups
+  
+ More on packaging: 
+  - Drop ubuntu-14.04 packaging
+  - Drop ubuntu-{14.04,16.04} transitional binary packages
+  - Remove desktop files and state lock file during snapd
  
  Areas of potential regressions: Nothing specific, relatively low risk
+ Risk: FDE, Kernel Components
  
  Source packages on `ppa:snappy-dev/image` for upload to -proposed:
- - Resolute | <url>
- - Questing | <url>
- - Plucky   | <url>
- - Noble    | <url>
- - Jammy    | <url>
+ - Resolute | 
https://launchpad.net/~snappy-dev/+archive/ubuntu/image/+sourcepub/18063084/+listing-archive-extra
+ 
+ - Questing | https://launchpad.net/~snappy-
+ dev/+archive/ubuntu/image/+sourcepub/18063083/+listing-archive-extra
+ 
+ - Noble    | https://launchpad.net/~snappy-
+ dev/+archive/ubuntu/image/+sourcepub/18063082/+listing-archive-extra
+ 
+ - Jammy    | https://launchpad.net/~snappy-
+ dev/+archive/ubuntu/image/+sourcepub/18063081/+listing-archive-extra
  
  ------------------------------------------------------------------------------
  
  Validation already completed:
  
- - Release preparation test results: <url>
+ - Release preparation test results:
  
- - Snapd Team QA beta validation: <url>
+    - Results
+ https://github.com/canonical/snapd/actions/runs/21180146215/job/60936150500
  
- - Certification team validation: <url> (requires VPN)
+    - Failure analysis:
+ https://github.com/canonical/snapd/pull/16458#issuecomment-3776559056
  
- - Release upgrades: <url>
+ - Snapd Team QA beta validation:
+ https://warthogs.atlassian.net/browse/SNAPDENG-36165
+ 
+ - Certification team validation: https://test-
+ observer.canonical.com/#/snaps/316093 (requires VPN)
+ 
+ - Release upgrades: TBC

** Tags added: verification-required-jammy verification-required-noble
verification-required-questing verification-requried verification-
requried-resolute

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2138629

Title:
  [SRU] 2.74

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2138629/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to