-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
linux-utils v4.2.17 (r4.2) #5247
Comments
Package for vm-noble was built (build log). |
Package for vm-noble was uploaded to current-testing repository. |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2024112404-4.2&flavor=update Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2024111722-4.2&flavor=update
Failed tests3 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/119203#dependencies Unstable tests
|
Superseded by #5271 |
Update of linux-utils to v4.2.17 for Qubes OS r4.2, see comments below for details and build status.
From commit: QubesOS/qubes-linux-utils@e6a80c7
Changes since previous version:
QubesOS/qubes-linux-utils@e6a80c7 version 4.2.17
QubesOS/qubes-linux-utils@59664fe Do not redefine compiler flags that are up to build env to define
QubesOS/qubes-linux-utils@5025d32 debian: bump required versions for libs
QubesOS/qubes-linux-utils@bc02ee8 ci: update tags
QubesOS/qubes-linux-utils@1bc5d7c Don't allow trailing slashes in paths being unpacked
QubesOS/qubes-linux-utils@641ba4d Allow disabling symbolic link checking
QubesOS/qubes-linux-utils@9912ad6 Add flag to allow non-canonical symbolic links
QubesOS/qubes-linux-utils@68b54f6 Use for loop instead of do-while
QubesOS/qubes-linux-utils@030ae67 Improve symlink tests
QubesOS/qubes-linux-utils@acfa2b6 Allow disabling character set filtering
QubesOS/qubes-linux-utils@ae8c2ce Better error message for forbidden symbolic links
QubesOS/qubes-linux-utils@be7940c Avoid redundantly validating symbolic link names
QubesOS/qubes-linux-utils@8db9b67 Fix -Wmissing-declarations and -Wmissing-prototypes warnings
QubesOS/qubes-linux-utils@f1e5736 Avoid casting away const when not needed
QubesOS/qubes-linux-utils@edf98b8 Document the pretty-printer in the code generator
QubesOS/qubes-linux-utils@6e7c758 Move path validation tests before charset tests
QubesOS/qubes-linux-utils@d3834f3 Test that symbolic links can end in '/'
QubesOS/qubes-linux-utils@6040f62 Allow symlinks ending in ".."
QubesOS/qubes-linux-utils@7990a9c Document algorithm used to sanitize paths
QubesOS/qubes-linux-utils@0221a90 Math and currency symbols are safe for display
QubesOS/qubes-linux-utils@654f4c2 Switch to sequoia for codecov signature check
QubesOS/qubes-linux-utils@52d6b50 Fix imgconverter tests
QubesOS/qubes-linux-utils@8950fe7 ci: collect test coverage from qrexec-lib too
Referenced issues:
QubesOS/qubes-issues#8332
QubesOS/qubes-issues#8581
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.2 linux-utils e6a80c786a2e520d9417d61c5331910d0785cf40 current all
(available 5 days from now)Upload-component r4.2 linux-utils e6a80c786a2e520d9417d61c5331910d0785cf40 security-testing all
You can choose subset of distributions like:
Upload-component r4.2 linux-utils e6a80c786a2e520d9417d61c5331910d0785cf40 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.
The text was updated successfully, but these errors were encountered: