At this point the following required validation are completed and
approved:

(1) Release testing: 
https://github.com/canonical/snapd/actions/runs/13771811525/job/38543122363
    - Additional correspondence: 
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2098137/comments/3

(2) QA beta validation: https://warthogs.atlassian.net/browse/SNAPDENG-34644
    - Additional correspondence: 
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2098137/comments/8

(3) Certification testing: https://test-observer.canonical.com/#/snaps/91172 
(requires VPN)
    - Additional correspondence: 
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2098137/comments/8

(4) Deb testing: https://warthogs.atlassian.net/browse/SNAPDENG-34667
    Additional correspondance:
       - https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2098137/comments/4
       - https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2098137/comments/5
       - https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2098137/comments/6


CONCLUSION: Approved, failures are understood and justified. Snapd snap on UC22 
cannot be tested at this time due to missing kernel update that is in progress 
(it is in edge, but not yet in beta). We will delay any attempt to propose to 
jammy until after this testing also completes, risk of issue is low, but we 
want to play it safe.

NOTE TO REVIEWER: PLEASE BLOCK RELEASE TO JAMMY PROPOSED UNTIL SNAPD
TEAM SIGNALS VALIDATION OF SNAPD SNAP ON UC22 IS A PASS,

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2098137

Title:
  [SRU] 2.68.3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/2098137/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to