update/sw-patch/cgcs-patch
Al Bailey 0cada3c8ba Fix zuul fail due to sysinv method signature change
The sysinv method is no longer valid.
The code needs to be updated to accomodate the new
signature.

Test Plan:
 PASS: upload/apply a patch
 PASS: Apply a patch using NFV

Closes-Bug: #1983504
Signed-off-by: Al Bailey <al.bailey@windriver.com>
Change-Id: I12a8defabc64155dd085f028b12c2d67bb52d99d
2022-08-03 22:15:57 +00:00
..
cgcs_make_patch Fix debian patch tool permissions 2022-08-01 14:57:06 -07:00
cgcs_patch Fix zuul fail due to sysinv method signature change 2022-08-03 22:15:57 +00:00
cgcs_patch_id Cleanup tox targets for debian patching 2022-04-28 21:35:30 +00:00
.coveragerc Fork cgcs-patch package as sw-patch for Debian 2022-03-29 20:35:14 +00:00
.stestr.conf Fork cgcs-patch package as sw-patch for Debian 2022-03-29 20:35:14 +00:00
LICENSE Fork cgcs-patch package as sw-patch for Debian 2022-03-29 20:35:14 +00:00
pylint.rc Debian: In-service patch implementation 2022-07-12 20:28:07 +00:00
requirements.txt Debian: Minor sw-patch cleanup 2022-07-13 17:54:33 +00:00
setup.cfg Fork cgcs-patch package as sw-patch for Debian 2022-03-29 20:35:14 +00:00
setup.py Fork cgcs-patch package as sw-patch for Debian 2022-03-29 20:35:14 +00:00
test-requirements.txt Fork cgcs-patch package as sw-patch for Debian 2022-03-29 20:35:14 +00:00
tox.ini Debian: Minor sw-patch cleanup 2022-07-13 17:54:33 +00:00