Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

gui-daemon v4.0.11 (r4.0) #1803

Closed
qubesos-bot opened this issue May 17, 2020 · 3 comments
Closed

gui-daemon v4.0.11 (r4.0) #1803

qubesos-bot opened this issue May 17, 2020 · 3 comments

Comments

@qubesos-bot
Copy link

Update of gui-daemon to v4.0.11 for Qubes r4.0, see comments below for details.

Built from: QubesOS/qubes-gui-daemon@eabfcc6

Changes since previous version:
QubesOS/qubes-gui-daemon@eabfcc6 version 4.0.11
QubesOS/qubes-gui-daemon@f94cc24 set override redirect attribute on window creating
QubesOS/qubes-gui-daemon@d5ced8c rpm: use rpm-build provided CFLAGS for pacat-simple-vchan
QubesOS/qubes-gui-daemon@e656b50 pulse: periodically check if vchan connection is alive
QubesOS/qubes-gui-daemon@f40a8fc xside: Introduce override_redirect protection
QubesOS/qubes-gui-daemon@b885b8d shmoverride: handle Xorg crash leaving shm.id file
QubesOS/qubes-gui-daemon@512ca76 Fix tray icon coloring code - do not crop/dislocate icon fragments
QubesOS/qubes-gui-daemon@6db5575 Make qubes.WindowIconUpdater a proper script
QubesOS/qubes-gui-daemon@a14b921 Make files in qubes-rpc executable
QubesOS/qubes-gui-daemon@e211741 allow domid 0 as target
QubesOS/qubes-gui-daemon@35dd26f Fix file permissions - drop executable bit where not needed
QubesOS/qubes-gui-daemon@415bb29 makefile: remove obsolete rpm building rules
QubesOS/qubes-gui-daemon@3012c3e rpm: fix building with mock
QubesOS/qubes-gui-daemon@6c1d571 rpm: move installation commands to Makefile
QubesOS/qubes-gui-daemon@84f32f3 Fix a bunch of compiler warnings

Referenced issues:
QubesOS/qubes-issues#5760
QubesOS/qubes-issues#4705
QubesOS/qubes-issues#5704
QubesOS/qubes-issues#5686
QubesOS/qubes-issues#5273

If you're release manager, you can issue GPG-inline signed command:

  • Upload gui-daemon eabfcc6a8350d16db7023da6063b420b117bd00b r4.0 current repo (available 7 days from now)
  • Upload gui-daemon eabfcc6a8350d16db7023da6063b420b117bd00b r4.0 current (dists) repo, you can choose subset of distributions, like vm-fc24 vm-fc25 (available 7 days from now)
  • Upload gui-daemon eabfcc6a8350d16db7023da6063b420b117bd00b r4.0 security-testing repo

Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).

@qubesos-bot
Copy link
Author

Package for dom0 was built (build log) and uploaded to current-testing repository

@marmarek
Copy link
Member

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Upload gui-daemon eabfcc6a8350d16db7023da6063b420b117bd00b r4.0 current repo
-----BEGIN PGP SIGNATURE-----
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=YpEH
-----END PGP SIGNATURE-----

@qubesos-bot
Copy link
Author

Package for dom0 was uploaded to stable repository

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants