-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
core-admin v4.1.21 (r4.1) #2553
Comments
Package for dom0 was built (build log) and uploaded to current-testing repository |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/20045#dependencies Failed tests
New failuresCompared to: https://openqa.qubes-os.org/tests/17576#dependencies
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/17576#dependencies
|
-----BEGIN PGP SIGNED MESSAGE----- Upload core-admin 8885f8d29e2094f58c011a8cec6777b2b7922e24 r4.1 current repo iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAmEkVZkgHG1hcm1hcmVr |
Package for dom0 was uploaded to stable repository |
Update of core-admin to v4.1.21 for Qubes r4.1, see comments below for details.
Built from: QubesOS/qubes-core-admin@8885f8d
Changes since previous version:
QubesOS/qubes-core-admin@8885f8d2 version 4.1.21
QubesOS/qubes-core-admin@ef9200e0 Adjust vm.icon value for DispVM-related qubes
QubesOS/qubes-core-admin@258a4499 Merge remote-tracking branch 'origin/pr/413'
QubesOS/qubes-core-admin@9639ca59 gui: set qube guivm property at creation based on features
QubesOS/qubes-core-admin@bce65531 add "events_enabled" to all other examples
QubesOS/qubes-core-admin@52985b9f add missing "events_enabled = True"
QubesOS/qubes-core-admin@ab0b6381 Merge remote-tracking branch 'origin/pr/383'
QubesOS/qubes-core-admin@af15a898 Forbid VM name ending with -dm
QubesOS/qubes-core-admin@c3f7cb2e winusb: bring back xen-hvm-stubdom-linux
QubesOS/qubes-core-admin@da5e9df0 winusb: fix requires
QubesOS/qubes-core-admin@9d1809ad Merge remote-tracking branch 'origin/pr/411'
QubesOS/qubes-core-admin@e4016a18 Use getattr() to access Qubes properties
QubesOS/qubes-core-admin@aee5ef93 Merge remote-tracking branch 'origin/pr/408'
QubesOS/qubes-core-admin@8895571d Merge remote-tracking branch 'origin/pr/410'
QubesOS/qubes-core-admin@9e39f1d2 Merge remote-tracking branch 'origin/pr/262'
QubesOS/qubes-core-admin@e258dd08 Merge remote-tracking branch 'origin/pr/398'
QubesOS/qubes-core-admin@8338f7c8 tests: change default LVM pool to qubes_dom0/vm-pool
QubesOS/qubes-core-admin@d51c1cb7 Use generic 'guivm' qvm-service to detect GUI VM
QubesOS/qubes-core-admin@d669068b Do not throw out the whole environment
QubesOS/qubes-core-admin@93b8c340 Better error for read-only properties
QubesOS/qubes-core-admin@b7b6d190 Use a bare-bones environment for LVM and blkdiscard
QubesOS/qubes-core-admin@0c943dfc Remove obsolete code no longer needed
QubesOS/qubes-core-admin@7b1b2672 Merge remote-tracking branch 'origin/pr/395'
QubesOS/qubes-core-admin@7c62e970 Merge remote-tracking branch 'origin/pr/405'
QubesOS/qubes-core-admin@3678ba07 Merge remote-tracking branch 'origin/pr/402'
QubesOS/qubes-core-admin@5db7af0c Test that quotes and ampersand are XML escaped
QubesOS/qubes-core-admin@16d06928 Update lvm.py
QubesOS/qubes-core-admin@3766413d Do not require all the autostart VMs to run before user login
QubesOS/qubes-core-admin@4d6eb898 winusb: add optional parameter to lambda function
QubesOS/qubes-core-admin@d2ab40de api: improve handling of removed VMs just before the call (try 2)
QubesOS/qubes-core-admin@aa7ab3c4 winusb: remove whitespace
QubesOS/qubes-core-admin@618ff725 Merge branch 'master' into winusb-clean
QubesOS/qubes-core-admin@f9bfcd87 tests: fix starting VMs in mime test
QubesOS/qubes-core-admin@18e8edfe tests: set whonix-gw-based VMs to provide network
QubesOS/qubes-core-admin@41e559d9 tests/api_admin: list serialized into a str property, using 'dns' property
QubesOS/qubes-core-admin@2a42b7c7 vm/net: make 'dns' property visible in Admin API
QubesOS/qubes-core-admin@a2e4dbf1 winusb: check if qrexec running for the stubdom
QubesOS/qubes-core-admin@21d67b25 winusb: fix domain name for is_paused() message
QubesOS/qubes-core-admin@77ec0cf0 winusb: add test for run_service with stubdom arg
QubesOS/qubes-core-admin@6a8bfd42 winusb: explicitly use root on starting qrexec daemon in stubdom
QubesOS/qubes-core-admin@8ebc7aa7 winusb: run qrexec agent in stubdom before the main qrexec daemon
QubesOS/qubes-core-admin@29daff12 winusb: fix naming
QubesOS/qubes-core-admin@1a695192 winusb: Replace minimal stubomain' kernel and ramdisk
QubesOS/qubes-core-admin@ee42d7a9 winusb: Redirect rpc calls to stub domain
QubesOS/qubes-core-admin@b57e2113 winusb: run qrexec daemon for stubdomain
Referenced issues:
QubesOS/qubes-issues#5050
QubesOS/qubes-issues#3149
QubesOS/qubes-issues#5105
QubesOS/qubes-issues#6709
QubesOS/qubes-issues#4186
QubesOS/qubes-issues#6685
If you're release manager, you can issue GPG-inline signed command:
Upload core-admin 8885f8d29e2094f58c011a8cec6777b2b7922e24 r4.1 current repo
(available 7 days from now)Upload core-admin 8885f8d29e2094f58c011a8cec6777b2b7922e24 r4.1 current (dists) repo
, you can choose subset of distributions, likevm-fc24 vm-fc25
(available 7 days from now)Upload core-admin 8885f8d29e2094f58c011a8cec6777b2b7922e24 r4.1 security-testing repo
Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
The text was updated successfully, but these errors were encountered: