-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
core-admin v4.2.31 (r4.2) #4861
Comments
Package for host was built (build log). |
Package for host was uploaded to current-testing repository. |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2024063004-4.2&flavor=update Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2024051522-4.2&flavor=update
Failed tests7 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/99767#dependencies 3 fixed
Unstable tests
|
-----BEGIN PGP SIGNED MESSAGE----- Upload-component r4.2 core-admin 1165bc39307b43750dd97d9dec039cac5e3ca1bd current all iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAmaDTo8gHG1hcm1hcmVr |
Package for host was uploaded to stable repository. |
Update of core-admin to v4.2.31 for Qubes OS r4.2, see comments below for details and build status.
From commit: QubesOS/qubes-core-admin@1165bc3
Changes since previous version:
QubesOS/qubes-core-admin@1165bc39 version 4.2.31
QubesOS/qubes-core-admin@0a989415 tests: adjust qubes.Filecopy argument
QubesOS/qubes-core-admin@cb051e0c tests: add test for unsafe symlinks
QubesOS/qubes-core-admin@33fd2044 tests: add test for unsafe name file copy
QubesOS/qubes-core-admin@a5117f2a tests: do not exclude pipewire tests on Whonix 17
QubesOS/qubes-core-admin@97d4fdb7 tests: change qrexec policy fixture to new policy format
QubesOS/qubes-core-admin@afc5aab0 tests: handle org.mozilla.thunderbird name too
QubesOS/qubes-core-admin@c543563a Add os-release ID_LIKE to features
QubesOS/qubes-core-admin@6508f6b7 ci: move unit tests to KVM runner
QubesOS/qubes-core-admin@27eeb76a tests: move test zfs volume to /home on qubes vm
QubesOS/qubes-core-admin@11529ae8 ci: don't try to install kernel-devel on qubes
QubesOS/qubes-core-admin@da689e14 ci: ensure pip is installed too
QubesOS/qubes-core-admin@f85049bb ci: update job tags
QubesOS/qubes-core-admin@a89967b0 Use 'dmsetup remove --retry'
QubesOS/qubes-core-admin@2b93872d Refuse names that would not be accessible in /run/qubes-service anyway
QubesOS/qubes-core-admin@69dc3785 Verify if service names are not too long
QubesOS/qubes-core-admin@b5b12258 Revert "Validate service names"
Referenced issues:
QubesOS/qubes-issues#9283
QubesOS/qubes-issues#8915
QubesOS/qubes-issues#8332
QubesOS/qubes-issues#9274
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.2 core-admin 1165bc39307b43750dd97d9dec039cac5e3ca1bd current all
(available 5 days from now)Upload-component r4.2 core-admin 1165bc39307b43750dd97d9dec039cac5e3ca1bd security-testing all
You can choose subset of distributions like:
Upload-component r4.2 core-admin 1165bc39307b43750dd97d9dec039cac5e3ca1bd current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.
The text was updated successfully, but these errors were encountered: