-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
core-qrexec v4.1.14 (r4.1) #2509
Comments
Package for archlinux was built (build log) and uploaded to current-testing repository |
Package for bullseye was built (build log) and uploaded to current-testing repository |
Package for buster was built (build log) and uploaded to current-testing repository |
Package for centos-stream8 was built (build log) and uploaded to current-testing repository |
Package for dom0 was built (build log) and uploaded to current-testing repository |
Package for fc31 was built (build log) and uploaded to current-testing repository |
Package for fc32 was built (build log) and uploaded to current-testing repository |
Package for fc33 was built (build log) and uploaded to current-testing repository |
Package for fc34 was built (build log) and uploaded to current-testing repository |
Superseded by #2534 |
Update of core-qrexec to v4.1.14 for Qubes r4.1, see comments below for details.
Built from: QubesOS/qubes-core-qrexec@bf76f79
Changes since previous version:
QubesOS/qubes-core-qrexec@bf76f79 version 4.1.14
QubesOS/qubes-core-qrexec@ba0775b Merge remote-tracking branch 'origin/pr/76'
QubesOS/qubes-core-qrexec@85f67e5 Merge remote-tracking branch 'origin/pr/69'
QubesOS/qubes-core-qrexec@f7d510b Force color pytest output in gitlab
QubesOS/qubes-core-qrexec@4fc2578 Add a test for qrexec policy allowing an operation
QubesOS/qubes-core-qrexec@46f57e8 Parse the qrexec call metadata before untrusted data
QubesOS/qubes-core-qrexec@3ba64f3 Avoid calling get_system_info() twice
QubesOS/qubes-core-qrexec@4276035 Automatically install dependencies when possible
QubesOS/qubes-core-qrexec@831208f Handle partial reads from StreamReader.read
QubesOS/qubes-core-qrexec@0b2332f Set socket modes properly
QubesOS/qubes-core-qrexec@61d603c Shut up pylint
QubesOS/qubes-core-qrexec@dcff4f7 Lots of unit tests and some bug fixes
QubesOS/qubes-core-qrexec@405f5d7 Merge remote-tracking branch 'origin/pr/75'
QubesOS/qubes-core-qrexec@92d0331 Merge remote-tracking branch 'origin/pr/74'
QubesOS/qubes-core-qrexec@8086a79 Merge remote-tracking branch 'origin/pr/70'
QubesOS/qubes-core-qrexec@121aff1 Use separate sockets for different services
QubesOS/qubes-core-qrexec@c1d8dd9 Do not use the asynctest module
QubesOS/qubes-core-qrexec@93190cf Add policy.EvalGUI service
QubesOS/qubes-core-qrexec@587dac3 Create a DispVMTemplate instance when needed
QubesOS/qubes-core-qrexec@2f0d37a Use generic 'guivm' service to tell if running inside GUI VM
QubesOS/qubes-core-qrexec@0d79f74 Tell pylint not to whine about extra parentheses
QubesOS/qubes-core-qrexec@adb1301 Add unit tests for policy.EvalSimple
QubesOS/qubes-core-qrexec@e08a112 Add a policy.EvalSimple qrexec service
QubesOS/qubes-core-qrexec@cbab1fc Switch from __gcov_flush to __gcov_dump + _gcov_reset
QubesOS/qubes-core-qrexec@46dc9c1 Be stricter about command-line parsing
QubesOS/qubes-core-qrexec@c636c53 daemon: fix checking qrexec-policy-daemon response
QubesOS/qubes-core-qrexec@afea444 Adjust vchan{send,recv} error checking
QubesOS/qubes-core-qrexec@fdd306f winusb: check if pam include file exists and set appropriate flags
QubesOS/qubes-core-qrexec@2ce1a34 winsub: fix broad exception
QubesOS/qubes-core-qrexec@4c5ba18 winusb: append LDLIBS
QubesOS/qubes-core-qrexec@dbb6b51 winusb: set guivm to None on unknown source
QubesOS/qubes-core-qrexec@ef92037 winusb: allow to build without pam
QubesOS/qubes-core-qrexec@7d75d31 version 4.1.13
QubesOS/qubes-core-qrexec@41e36f7 agent: do not interrupt established connections on restart
QubesOS/qubes-core-qrexec@ed34dc7 version 4.1.12
QubesOS/qubes-core-qrexec@7e4e562 debian: update compat
QubesOS/qubes-core-qrexec@7f35ef8 debian: update control
QubesOS/qubes-core-qrexec@835ea75 Merge branch 'ci'
QubesOS/qubes-core-qrexec@463ce10 pylint: temporarily disable unsubscriptable-object - buggy with py3.9
QubesOS/qubes-core-qrexec@863242c gitlab-ci: include custom jobs
QubesOS/qubes-core-qrexec@f748160 Allow to override vchan variant selection with BACKEND_VMM variable
QubesOS/qubes-core-qrexec@031a321 Add .gitlab-ci.yml
QubesOS/qubes-core-qrexec@c86360f Use pkg-config to get BACKEND_VMM
QubesOS/qubes-core-qrexec@c69202b Set default BACKEND_VMM value to xen
Referenced issues:
QubesOS/qubes-issues#4186
QubesOS/qubes-issues#1148
QubesOS/qubes-issues#6629
If you're release manager, you can issue GPG-inline signed command:
Upload core-qrexec bf76f79f50b8aee13f902e689dd73d441e4b02c8 r4.1 current repo
(available 7 days from now)Upload core-qrexec bf76f79f50b8aee13f902e689dd73d441e4b02c8 r4.1 current (dists) repo
, you can choose subset of distributions, likevm-fc24 vm-fc25
(available 7 days from now)Upload core-qrexec bf76f79f50b8aee13f902e689dd73d441e4b02c8 r4.1 security-testing repo
Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
The text was updated successfully, but these errors were encountered: