Conversation
There was a problem hiding this comment.
1 issue found across 1 file
Confidence score: 3/5
- There is a concrete medium-high risk issue (severity 7/10, confidence 9/10): in
deb-get,+codename expansion can become empty for unknown/minimum codenames, which then gets treated as unrestricted support. - This can silently bypass codename gating, creating real regression risk in support checks rather than a cosmetic or housekeeping concern.
- Given the high confidence and user-impacting behavior change, this is not fully merge-blocking but carries enough uncertainty to warrant caution before merge.
- Pay close attention to
deb-get- ensure empty codename expansion cannot be interpreted as unrestricted support.
Prompt for AI agents (unresolved issues)
Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.
<file name="deb-get">
<violation number="1" location="deb-get:492">
P1: `+` codename expansion can collapse to empty for unknown/minimum codenames, and empty is then treated as unrestricted support, silently bypassing codename gating.</violation>
</file>
Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.
There was a problem hiding this comment.
1 issue found across 1 file (changes from recent commits).
Prompt for AI agents (unresolved issues)
Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.
<file name="deb-get">
<violation number="1" location="deb-get:490">
P2: Malformed minimum-codename parse now returns success early, causing `validate_deb` to skip required validation checks.</violation>
</file>
Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.
2a707af to
bfdfae5
Compare
|
I think adding It would also allow us to altogether remove the need to manually add support for new codenames as they release. Though I'll save that for a different pull request. |
There was a problem hiding this comment.
1 issue found across 2 files
Confidence score: 3/5
- There is a concrete medium-high risk issue: in
deb-get, codename expansion can fail open, clearing codename restrictions when minimum codename lookup returns no match. - Because this is severity 7/10 with high confidence (9/10), it could cause unsupported packages to be treated as universally supported, which is user-impacting behavior rather than a minor edge-case cleanup.
- Pay close attention to
deb-get- verify codename lookup failure paths preserve restrictions instead of defaulting to unrestricted support.
Prompt for AI agents (unresolved issues)
Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.
<file name="deb-get">
<violation number="1" location="deb-get:492">
P1: `+` codename expansion fails open: if minimum codename lookup finds no match, codename restrictions are cleared and package may be treated as universally supported.</violation>
</file>
Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.
|
The new syntax should probably be documented in |
33f7025 to
fcc341b
Compare
|
Just a thought: I wonder if making the dependency on distro-info and using e.g. |
|
Yeah, I think that could work. And as a bonus, having the distro-info command available could come in handy to use in some packages. Such as when we need to fall back to a deb file or repo meant for a previous release. |
|
I've found one problem with the EDIT: I came up with a workaround. If we run |
fcc341b to
13b5628
Compare
|
@cubic-dev-ai Can you re-review this? |
@silentJET85 I have started the AI code review. It will take a few minutes to complete. |
There was a problem hiding this comment.
No issues found across 2 files
Confidence score: 5/5
- Automated review surfaced no issues in the provided summaries.
- No files require special attention.
Requires human review: This PR modifies core validation logic and package dependencies, introducing dynamic codename resolution that requires human verification to ensure it doesn't break package installations.
|
This needs one final tweak. Using EDIT: I have changed it to use The only side effect would be that some packages could potentially continue working even when running on an EOL distro. |
There was a problem hiding this comment.
1 issue found across 2 files
Confidence score: 3/5
- There is a concrete regression risk in
deb-get: the+codename fallback can clearCODENAMES_SUPPORTED, and empty codename lists are then treated as unrestricted support. - Because this is severity 7/10 with high confidence (9/10) and could allow unsupported releases, it has real user-facing impact even though the change scope appears limited.
- This PR may still be mergeable with a quick guard/fix, but it carries moderate risk until codename handling is tightened.
- Pay close attention to
deb-get- codename fallback and empty-list logic can incorrectly permit unsupported distributions.
Prompt for AI agents (unresolved issues)
Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.
<file name="deb-get">
<violation number="1" location="deb-get:494">
P1: `+` codename fallback can clear `CODENAMES_SUPPORTED`, and empty codename lists are treated as unrestricted support, potentially allowing unsupported releases.</violation>
</file>
Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.
closes #1798
This will allow you to append a
+to a codename in theCODENAMES_SUPPORTEDvariable, to specify it as the minimum supported codename. This way most packages won't need to be updated every six months when a new Ubuntu is released.For example instead of:
CODENAMES_SUPPORTED="trixie forky sid noble questing resolute"you could instead do:
CODENAMES_SUPPORTED="trixie+ noble+"