Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

core-admin v4.1.21 (r4.1) #2553

Closed
qubesos-bot opened this issue Jul 9, 2021 · 4 comments
Closed

core-admin v4.1.21 (r4.1) #2553

qubesos-bot opened this issue Jul 9, 2021 · 4 comments

Comments

@qubesos-bot
Copy link

Update of core-admin to v4.1.21 for Qubes r4.1, see comments below for details.

Built from: QubesOS/qubes-core-admin@8885f8d

Changes since previous version:
QubesOS/qubes-core-admin@8885f8d2 version 4.1.21
QubesOS/qubes-core-admin@ef9200e0 Adjust vm.icon value for DispVM-related qubes
QubesOS/qubes-core-admin@258a4499 Merge remote-tracking branch 'origin/pr/413'
QubesOS/qubes-core-admin@9639ca59 gui: set qube guivm property at creation based on features
QubesOS/qubes-core-admin@bce65531 add "events_enabled" to all other examples
QubesOS/qubes-core-admin@52985b9f add missing "events_enabled = True"
QubesOS/qubes-core-admin@ab0b6381 Merge remote-tracking branch 'origin/pr/383'
QubesOS/qubes-core-admin@af15a898 Forbid VM name ending with -dm
QubesOS/qubes-core-admin@c3f7cb2e winusb: bring back xen-hvm-stubdom-linux
QubesOS/qubes-core-admin@da5e9df0 winusb: fix requires
QubesOS/qubes-core-admin@9d1809ad Merge remote-tracking branch 'origin/pr/411'
QubesOS/qubes-core-admin@e4016a18 Use getattr() to access Qubes properties
QubesOS/qubes-core-admin@aee5ef93 Merge remote-tracking branch 'origin/pr/408'
QubesOS/qubes-core-admin@8895571d Merge remote-tracking branch 'origin/pr/410'
QubesOS/qubes-core-admin@9e39f1d2 Merge remote-tracking branch 'origin/pr/262'
QubesOS/qubes-core-admin@e258dd08 Merge remote-tracking branch 'origin/pr/398'
QubesOS/qubes-core-admin@8338f7c8 tests: change default LVM pool to qubes_dom0/vm-pool
QubesOS/qubes-core-admin@d51c1cb7 Use generic 'guivm' qvm-service to detect GUI VM
QubesOS/qubes-core-admin@d669068b Do not throw out the whole environment
QubesOS/qubes-core-admin@93b8c340 Better error for read-only properties
QubesOS/qubes-core-admin@b7b6d190 Use a bare-bones environment for LVM and blkdiscard
QubesOS/qubes-core-admin@0c943dfc Remove obsolete code no longer needed
QubesOS/qubes-core-admin@7b1b2672 Merge remote-tracking branch 'origin/pr/395'
QubesOS/qubes-core-admin@7c62e970 Merge remote-tracking branch 'origin/pr/405'
QubesOS/qubes-core-admin@3678ba07 Merge remote-tracking branch 'origin/pr/402'
QubesOS/qubes-core-admin@5db7af0c Test that quotes and ampersand are XML escaped
QubesOS/qubes-core-admin@16d06928 Update lvm.py
QubesOS/qubes-core-admin@3766413d Do not require all the autostart VMs to run before user login
QubesOS/qubes-core-admin@4d6eb898 winusb: add optional parameter to lambda function
QubesOS/qubes-core-admin@d2ab40de api: improve handling of removed VMs just before the call (try 2)
QubesOS/qubes-core-admin@aa7ab3c4 winusb: remove whitespace
QubesOS/qubes-core-admin@618ff725 Merge branch 'master' into winusb-clean
QubesOS/qubes-core-admin@f9bfcd87 tests: fix starting VMs in mime test
QubesOS/qubes-core-admin@18e8edfe tests: set whonix-gw-based VMs to provide network
QubesOS/qubes-core-admin@41e559d9 tests/api_admin: list serialized into a str property, using 'dns' property
QubesOS/qubes-core-admin@2a42b7c7 vm/net: make 'dns' property visible in Admin API
QubesOS/qubes-core-admin@a2e4dbf1 winusb: check if qrexec running for the stubdom
QubesOS/qubes-core-admin@21d67b25 winusb: fix domain name for is_paused() message
QubesOS/qubes-core-admin@77ec0cf0 winusb: add test for run_service with stubdom arg
QubesOS/qubes-core-admin@6a8bfd42 winusb: explicitly use root on starting qrexec daemon in stubdom
QubesOS/qubes-core-admin@8ebc7aa7 winusb: run qrexec agent in stubdom before the main qrexec daemon
QubesOS/qubes-core-admin@29daff12 winusb: fix naming
QubesOS/qubes-core-admin@1a695192 winusb: Replace minimal stubomain' kernel and ramdisk
QubesOS/qubes-core-admin@ee42d7a9 winusb: Redirect rpc calls to stub domain
QubesOS/qubes-core-admin@b57e2113 winusb: run qrexec daemon for stubdomain

Referenced issues:
QubesOS/qubes-issues#5050
QubesOS/qubes-issues#3149
QubesOS/qubes-issues#5105
QubesOS/qubes-issues#6709
QubesOS/qubes-issues#4186
QubesOS/qubes-issues#6685

If you're release manager, you can issue GPG-inline signed command:

  • Upload core-admin 8885f8d29e2094f58c011a8cec6777b2b7922e24 r4.1 current repo (available 7 days from now)
  • Upload core-admin 8885f8d29e2094f58c011a8cec6777b2b7922e24 r4.1 current (dists) repo, you can choose subset of distributions, like vm-fc24 vm-fc25 (available 7 days from now)
  • Upload core-admin 8885f8d29e2094f58c011a8cec6777b2b7922e24 r4.1 security-testing repo

Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).

@qubesos-bot
Copy link
Author

Package for dom0 was built (build log) and uploaded to current-testing repository

@qubesos-bot
Copy link
Author

OpenQA test summary

Complete test suite and dependencies: https://openqa.qubes-os.org/tests/20045#dependencies

Failed tests

New failures

Compared to: https://openqa.qubes-os.org/tests/17576#dependencies

Fixed failures

Compared to: https://openqa.qubes-os.org/tests/17576#dependencies

@marmarek
Copy link
Member

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Upload core-admin 8885f8d29e2094f58c011a8cec6777b2b7922e24 r4.1 current repo
-----BEGIN PGP SIGNATURE-----

iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAmEkVZkgHG1hcm1hcmVr
QGludmlzaWJsZXRoaW5nc2xhYi5jb20ACgkQhG1rcJxuLn8ISw//UN9w0bAOigcV
GNXhL9h/a99tTll2CqUfGBNjT9EwIGhDGtwHy0YVH1p9xTOFpFTkTEmyh1xTvJdY
67JcyiUc1nIyWJo4BCEEGEDy/Lc7ZbuZGg87TPpJH8ywtGdCJVSTR4weZ0oMuuo4
3W/IfVcbh2VH2JEBmVGoa9aRA33TxOcLSpAGju5tw6UYPJRrDMd/JQ8CzsALVnR/
8En60UKbv0sNgFxqNUghVp420zvs0D7J7NssDUR+OCikt/k1vvehEP9/guhZJSLp
nLKXX0tjMRPirDjr3ZMqiodR3Yj4CHjLbRVyC0uhGMfkHcR0Ka4tHGfNInhYhAEi
/UCIgpNnDt7HyLHRzhn3mMbz4/Pnx+TwLCYr8XL1H+QllyuGeWXwLzujYzgeyMfy
KAyQ+etZXif/WsXeM9qq44n+BIOYMCuY9X8fwvo6W/PJrrwbMVrzqDCEm8xpwe6J
JNwWRohssegUBsuPj2olq9gOux2g15Q3dwZeLy8zyhtWMzfxIOH2NvD0AikUBEUF
b+Oh3z8r+nroPVI3GbBECs+wad2w+u4V8eTmvit71M6ruS5sslrRRkaUW3WOq0JI
PVUALBMjxUPQyPWnrJ2ZFQeDTs737TwGKniLdheWp/tSTDJrYBfX3nu8558u/wRE
JW2/R24AgYm8YTObr0e11D+corWC6gw=
=x7e9
-----END PGP SIGNATURE-----

@qubesos-bot
Copy link
Author

Package for dom0 was uploaded to stable repository

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants