{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":753217423,"defaultBranch":"kirkstone-6.x.y","name":"meta-toradex-torizon","ownerLogin":"rborn-tx","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2024-02-05T17:37:29.000Z","ownerAvatar":"https://github.com/avatars/u/93716395?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1727198361.0","currentOid":""},"activityList":{"items":[{"before":"93dc762686b59abc0ee49674afc56771d7f5ad06","after":null,"ref":"refs/heads/revert-disable-container-generation","pushedAt":"2024-09-24T17:19:21.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"53e5fdd5913fa5e568add5cb8a033db7d62ec54f","after":null,"ref":"refs/heads/master-fix-aktualizr-deps","pushedAt":"2024-09-24T17:19:10.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"600b227c2342920e681a5b7c4b95d2aace9faa01","after":null,"ref":"refs/heads/TOR-3538-master","pushedAt":"2024-09-24T17:18:39.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"475cb46264b41955f172ad244d387738a85cb37d","after":null,"ref":"refs/heads/TOR-3538","pushedAt":"2024-09-24T17:18:32.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"424dbcb7ecdaa141ea26e862c3e8b02cd8cff767","after":null,"ref":"refs/heads/TOR-3465","pushedAt":"2024-09-24T17:18:23.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":null,"after":"7362558067c6dd90752c8c59675f26b90e340a59","ref":"refs/heads/fix-tos-kargs-master","pushedAt":"2024-09-24T16:31:24.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon.inc: use default expected kernel args on apalis-imx8\n\nUpdate expected kernel arguments to match the ones actually passed to\nthe kernel, which in case of the apalis-imx8 now means simply using the\ndefault arguments.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon.inc: use default expected kernel args on apalis-imx8"}},{"before":null,"after":"1dd61e6c7b2625717eaa748ae1a468fdf8556e6c","ref":"refs/heads/fix-tos-kargs-scarthgap","pushedAt":"2024-09-24T01:07:53.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon.inc: use default expected kernel args on apalis-imx8\n\nUpdate expected kernel arguments to match the ones actually passed to\nthe kernel, which in case of the apalis-imx8 now means simply using the\ndefault arguments.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon.inc: use default expected kernel args on apalis-imx8"}},{"before":null,"after":"05e020de1b8ede5a475c0f1173ea2854321e785e","ref":"refs/heads/fix-tos-kargs-kirkstone","pushedAt":"2024-09-24T01:07:32.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon.inc: use default expected kernel args on apalis-imx8\n\nUpdate expected kernel arguments to match the ones actually passed to\nthe kernel, which in case of the apalis-imx8 now means simply using the\ndefault arguments.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon.inc: use default expected kernel args on apalis-imx8"}},{"before":null,"after":"08c48da91a07c926a7a60400be95e8ccd8961027","ref":"refs/heads/TOR-3558-fix-tos-kargs-kirkstone","pushedAt":"2024-09-23T22:21:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon.inc: fix expected kernel arguments setting\n\nTODO: Describe.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon.inc: fix expected kernel arguments setting"}},{"before":"617033074c8778b9534adb1be6fd35e930339243","after":null,"ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-20T17:50:53.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"feba27a23f3331a0abbe02f7529a0ba6f828bcc3","after":null,"ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-20T17:50:15.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"263c309c474c12732859e7eb9db89b526202a7f7","after":"feba27a23f3331a0abbe02f7529a0ba6f828bcc3","ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-17T23:35:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot: disable amendments to boot script in torizon\n\nDisable the amendments made to the boot script (boot.cmd) when hardening\nis enabled; those amendments done by meta-toradex-security are\napplicable only to BSP images and are not needed with Torizon images.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot: disable amendments to boot script in torizon"}},{"before":"6ec176d0a3103375b099338cde9a0e5dd2dc44e9","after":"617033074c8778b9534adb1be6fd35e930339243","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T23:19:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot: disable amendments to boot script in torizon\n\nDisable the amendments made to the boot script (boot.cmd) when hardening\nis enabled; those amendments done by meta-toradex-security are\napplicable only to BSP images and are not needed with Torizon images.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot: disable amendments to boot script in torizon"}},{"before":null,"after":"263c309c474c12732859e7eb9db89b526202a7f7","ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-17T22:48:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot: disable amendments to boot script in torizon\n\nDisable the amendments made to the boot script (boot.cmd) when hardening\nis enabled; those amendments done by meta-toradex-security are\napplicable only to BSP images and are not needed with Torizon images.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot: disable amendments to boot script in torizon"}},{"before":"25e5eef9e3896b78904e23b074c556e912b524f4","after":"6ec176d0a3103375b099338cde9a0e5dd2dc44e9","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T15:27:38.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot: disable amendments to boot script in torizon\n\nDisable the amendments made to the boot script (boot.cmd) when hardening\nis enabled; those amendments done by meta-toradex-security are\napplicable only to BSP images and are not needed with Torizon images.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot: disable amendments to boot script in torizon"}},{"before":"5f4a56effee3e7fa61e2bf3b9d46f83bbf6d5f0e","after":"25e5eef9e3896b78904e23b074c556e912b524f4","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-14T03:16:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot: disable amendments to boot script with torizon\n\nDisable the amendments made to the boot script (boot.cmd) when hardening\nis enabled; those amendments done by meta-toradex-security are\napplicable only to BSP images and are not needed with Torizon images.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot: disable amendments to boot script with torizon"}},{"before":"5ace6269cabf646acf3d34ea577575d1b737691a","after":"5f4a56effee3e7fa61e2bf3b9d46f83bbf6d5f0e","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-13T22:24:54.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot: disable amendments to boot script with torizon\n\nDisable the amendments made to the boot script (boot.cmd) when hardening\nis enabled; those amendments done by meta-toradex-security are\napplicable only to BSP images and are not needed with Torizon images.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot: disable amendments to boot script with torizon"}},{"before":"7c1cb8a6a25328ed69ceeea5a5107b79a34e51f8","after":"768bba0aaa51efcc4833cfc49b343aee14327d3d","ref":"refs/heads/fix-cfs-signed-override-check-master","pushedAt":"2024-09-12T01:22:48.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"gen-cfs-keys.inc: fix check for cfs-signed override\n\nRather than looking for a substring, check the splitted OVERRIDES string\nwhich is the usual and more reliable method.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"gen-cfs-keys.inc: fix check for cfs-signed override"}},{"before":null,"after":"7c1cb8a6a25328ed69ceeea5a5107b79a34e51f8","ref":"refs/heads/fix-cfs-signed-override-check-master","pushedAt":"2024-09-12T01:17:44.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"gen-cfs-keys.inc: fix check for cfs-signed override\n\nRather than looking for a substring, check the splitted OVERRIDES string\nwhich is the usual and more reliable method.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"gen-cfs-keys.inc: fix check for cfs-signed override"}},{"before":"7fc2b56eb922dabfa282f091e698ad95dffe966d","after":"e034dbae626d78bc5054c6b685b23488516efd9f","ref":"refs/heads/fix-cfs-signed-override-check","pushedAt":"2024-09-11T18:47:31.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"EdTheBearded","name":"Eduardo Ferreira","path":"/EdTheBearded","primaryAvatarUrl":"https://github.com/avatars/u/7683256?s=80&v=4"},"commit":{"message":"gen-cfs-keys.inc: fix check for cfs-signed override\n\nRather than looking for a substring, check the splitted OVERRIDES string\nwhich is the usual and more reliable method.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"gen-cfs-keys.inc: fix check for cfs-signed override"}},{"before":null,"after":"7fc2b56eb922dabfa282f091e698ad95dffe966d","ref":"refs/heads/fix-cfs-signed-override-check","pushedAt":"2024-09-11T18:35:10.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"gen-cfs-keys.inc: fix check for cfs-signed override\n\nRather than looking for a substring, check the splitted OVERRIDES string\nwhich is the usual and more reliable method.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"gen-cfs-keys.inc: fix check for cfs-signed override"}},{"before":"65dcc3c93420a3099650ea18acca15573c4cce32","after":"5ace6269cabf646acf3d34ea577575d1b737691a","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-11T00:58:41.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon-signed: set expected bootargs\n\nSet expected bootargs whenever a torizon-based distro is in\nuse. Originally the bootargs settings were in meta-toradex-security\nwhere they did not belong.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon-signed: set expected bootargs"}},{"before":"fb7b60aafb814819b215de700f11e2e2d43b8e14","after":"65dcc3c93420a3099650ea18acca15573c4cce32","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-11T00:49:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon-signed: set expected bootargs\n\nSet expected bootargs whenever a torizon-based distro is in\nuse. Originally the bootargs settings were in meta-toradex-security\nwhere they did not belong.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon-signed: set expected bootargs"}},{"before":"3a066e5d5cc65480df6b3a6d00fa815717207c11","after":"fb7b60aafb814819b215de700f11e2e2d43b8e14","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-11T00:48:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon-signed: set expected bootargs\n\nSet expected bootargs whenever a torizon-based distro is in\nuse. Originally the bootargs settings were in meta-toradex-security\nwhere they did not belong.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon-signed: set expected bootargs"}},{"before":null,"after":"3a066e5d5cc65480df6b3a6d00fa815717207c11","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-06T15:47:47.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon-signed: set expected bootargs\n\nSet expected bootargs whenever a torizon-based distro is in\nuse. Originally the bootargs settings were in meta-toradex-security\nwhere they did not belong.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon-signed: set expected bootargs"}},{"before":"1d764210ea4bbd806785c767231b43bbea8ff72e","after":null,"ref":"refs/heads/TOR-3379","pushedAt":"2024-09-06T01:35:08.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"08dcdbe3b8fda7a6f5e764685119ed6be4d70e29","after":null,"ref":"refs/heads/TOR-3278","pushedAt":"2024-09-06T01:34:57.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"8e6d19b3d4258d1d36090a4f9ad47a0d3462edf6","after":null,"ref":"refs/heads/dispose-rootfs-protection","pushedAt":"2024-08-31T02:34:14.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"}},{"before":"7d5279270649c0bf65066051cf98920f8b85db84","after":"8e6d19b3d4258d1d36090a4f9ad47a0d3462edf6","ref":"refs/heads/dispose-rootfs-protection","pushedAt":"2024-08-30T04:17:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon-signed: inform about unavailability (kirkstone)\n\nInheriting this class will simply throw an error directing users to\nswitch to scarthgap (Torizon OS 7) or newer to enjoy the rootfs\nprotection.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon-signed: inform about unavailability (kirkstone)"}},{"before":"7328a6e7b05e4f13335af3dc56b9615a55534e91","after":"7d5279270649c0bf65066051cf98920f8b85db84","ref":"refs/heads/dispose-rootfs-protection","pushedAt":"2024-08-30T04:14:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://github.com/avatars/u/93716395?s=80&v=4"},"commit":{"message":"torizon-signed: inform about unavailability (kirkstone)\n\nInheriting this class will simply throw an error directing users to\nswitch to scarthgap (Torizon OS 7) or newer to enjoy the rootfs\nprotection.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"torizon-signed: inform about unavailability (kirkstone)"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yNFQxNzoxOToyMS4wMDAwMDBazwAAAAS_b-9Q","startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yNFQxNzoxOToyMS4wMDAwMDBazwAAAAS_b-9Q","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOC0zMFQwNDoxNDozMy4wMDAwMDBazwAAAASoRCLW"}},"title":"Activity ยท rborn-tx/meta-toradex-torizon"}