-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
core-qrexec v4.3.2 (r4.3) #5423
Comments
Package for vm-jammy was built (build log). |
Package for vm-jammy was uploaded to current-testing repository. |
Package for vm-bookworm was built (build log). |
Package for vm-bookworm was uploaded to current-testing repository. |
Package for vm-noble was built (build log). |
Package for vm-archlinux was built (build log). |
Package for vm-noble was uploaded to current-testing repository. |
Package for vm-archlinux was uploaded to current-testing repository. |
Package for vm-trixie was built (build log). |
Package for vm-trixie was uploaded to current-testing repository. |
Package for host was built (build log). |
Package for host was uploaded to current-testing repository. |
Package for vm-fc41 was built (build log). |
Package for vm-fc41 was uploaded to current-testing repository. |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025020404-4.3&flavor=update Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024111705-4.3&flavor=update
Failed tests31 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/119126#dependencies 4 fixed
Unstable tests |
Update of core-qrexec to v4.3.2 for Qubes OS r4.3, see comments below for details and build status.
From commit: QubesOS/qubes-core-qrexec@54b35da
Changes since previous version:
QubesOS/qubes-core-qrexec@54b35da version 4.3.2
QubesOS/qubes-core-qrexec@68a427f libqrexec SONAME bump
QubesOS/qubes-core-qrexec@41bdc97 Strip "QUBESRPC " prefix from service call commands
QubesOS/qubes-core-qrexec@1adc290 Avoid qubes-rpc-multiplexer for dom0 -> dom0 calls
QubesOS/qubes-core-qrexec@8728002 Stop using qubes-rpc-multiplexer for service calls
QubesOS/qubes-core-qrexec@9ea7ea2 Test that opening /proc/self/fd/2 for writing works
QubesOS/qubes-core-qrexec@d52e8d4 Call abort() if there is a qrexec buffer problem
QubesOS/qubes-core-qrexec@20e39b1 Python: Add "--" to qrexec-client-vm call
QubesOS/qubes-core-qrexec@a450614 Python: Assert that there is no space in command arguments
QubesOS/qubes-core-qrexec@950d383 Add type annotation to Python code
QubesOS/qubes-core-qrexec@47f444a Fix spurious newline in error message
QubesOS/qubes-core-qrexec@6d65b0e Test that stderr from qrexec-agent is properly received
QubesOS/qubes-core-qrexec@2fae62f Add additional tests for running services in dom0
QubesOS/qubes-core-qrexec@b40d3da Merge remote-tracking branch 'origin/pr/185'
QubesOS/qubes-core-qrexec@24c2d37 docs: qrexec-client accepts user:command not command
QubesOS/qubes-core-qrexec@6077a10 rpm: adjust SELinux snippets for relabeling
Referenced issues:
QubesOS/qubes-issues#9062
QubesOS/qubes-issues#9663
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.3 core-qrexec 54b35da01415fa72ab790899e6dfdac8c2318623 current all
(available 5 days from now)Upload-component r4.3 core-qrexec 54b35da01415fa72ab790899e6dfdac8c2318623 security-testing all
You can choose subset of distributions like:
Upload-component r4.3 core-qrexec 54b35da01415fa72ab790899e6dfdac8c2318623 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.
The text was updated successfully, but these errors were encountered: