Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

core-agent-linux v4.2.5 (r4.2) #3339

Closed
qubesos-bot opened this issue Dec 28, 2022 · 7 comments
Closed

core-agent-linux v4.2.5 (r4.2) #3339

qubesos-bot opened this issue Dec 28, 2022 · 7 comments

Comments

@qubesos-bot
Copy link

Update of core-agent-linux to v4.2.5 for Qubes r4.2, see comments below for details and build status.

From commit: QubesOS/qubes-core-agent-linux@c7a0ed9

Changes since previous version:
QubesOS/qubes-core-agent-linux@c7a0ed9d version 4.2.5
QubesOS/qubes-core-agent-linux@57862b08 Move pulseaudio drop-in to pulseaudio-qubes package
QubesOS/qubes-core-agent-linux@43e67147 debian: cleaup remaining selinux package
QubesOS/qubes-core-agent-linux@3b1f5617 Merge remote-tracking branch 'origin/pr/343'
QubesOS/qubes-core-agent-linux@289bb581 rpm: add missing dbus-tool dep
QubesOS/qubes-core-agent-linux@0b501510 Allow init_t and unconfined_service_t to transition to anything
QubesOS/qubes-core-agent-linux@bc962795 Allow 'xl devd' to get information about all block devices
QubesOS/qubes-core-agent-linux@9c0618eb Make SELinux permissive if not yet relabeled
QubesOS/qubes-core-agent-linux@861dd7f8 Fix Debian build
QubesOS/qubes-core-agent-linux@fc9e7eb9 Drop SELinux on Debian
QubesOS/qubes-core-agent-linux@18003b71 Add missing build deps
QubesOS/qubes-core-agent-linux@2019a3a6 Enable SELinux in Debian build
QubesOS/qubes-core-agent-linux@23e36241 shut up shellcheck
QubesOS/qubes-core-agent-linux@7e6d634c Try to get SELinux policy working for Debian
QubesOS/qubes-core-agent-linux@0e22478f minor cleanups
QubesOS/qubes-core-agent-linux@239bde89 Debian fix
QubesOS/qubes-core-agent-linux@0c3aea3a Fix bogus sed call
QubesOS/qubes-core-agent-linux@fdcadde5 Debug stuff
QubesOS/qubes-core-agent-linux@05d2267b Avoid unbootable system
QubesOS/qubes-core-agent-linux@da2d9b09 Try to fix autorelabel
QubesOS/qubes-core-agent-linux@27980b3d Enable SELinux when installing policy
QubesOS/qubes-core-agent-linux@de88b38d Do not install SELinux stuff with SELinux disabled
QubesOS/qubes-core-agent-linux@204c8b05 Move SELinux stuff to its package
QubesOS/qubes-core-agent-linux@fe8ea757 Mark a bunch of packages as noarch
QubesOS/qubes-core-agent-linux@77b30eab Revert "Require relabeling for boot to succeed"
QubesOS/qubes-core-agent-linux@e463b833 install missing file
QubesOS/qubes-core-agent-linux@53a4b710 Fix typo
QubesOS/qubes-core-agent-linux@fdfba65c Require relabeling for boot to succeed
QubesOS/qubes-core-agent-linux@cdc05a7b Force autorelabel after installation
QubesOS/qubes-core-agent-linux@65a934a0 Override selinux-autorelabel.target
QubesOS/qubes-core-agent-linux@91d3a109 Pass -f to rm
QubesOS/qubes-core-agent-linux@e973bb1d Only relabel a few directories in postinst
QubesOS/qubes-core-agent-linux@b55bda2a Reboot after relabeling root FS
QubesOS/qubes-core-agent-linux@09ed7455 Enable qubes-relabel-root for automatic relabeling
QubesOS/qubes-core-agent-linux@25e30134 Check SELinux is not enforcing before disabling relabeling
QubesOS/qubes-core-agent-linux@74442143 SELinux: Forcibly relabel root filesystem on install
QubesOS/qubes-core-agent-linux@49034e21 Conflict with standard SELinux autorelabeling
QubesOS/qubes-core-agent-linux@70446555 Only relabel persistent volumes
QubesOS/qubes-core-agent-linux@bb5c55f2 Relabel root filesystem as needed
QubesOS/qubes-core-agent-linux@26d2cdb1 Add marker file for VM persistence
QubesOS/qubes-core-agent-linux@82e43ce6 qubes-sysinit.sh: reject bad service names
QubesOS/qubes-core-agent-linux@eb68f88c Allow RPM commands to write to qrexec stderr fifo
QubesOS/qubes-core-agent-linux@1f235d83 Allow local_login_t to start systemd units
QubesOS/qubes-core-agent-linux@db5ed057 Allow iptables to access Xen device files
QubesOS/qubes-core-agent-linux@b21e4134 Enable qubes-relabel-rw.service
QubesOS/qubes-core-agent-linux@5e99b941 Perform SELinux relabeling when necessary
QubesOS/qubes-core-agent-linux@db8538e1 Allow systemd-modules-load to log to journal
QubesOS/qubes-core-agent-linux@cf6ba7ad Fewer calls to mkdir(1)
QubesOS/qubes-core-agent-linux@3906db41 Create directories with proper SELinux contexts
QubesOS/qubes-core-agent-linux@8d17b4b4 Fix file equivalency management
QubesOS/qubes-core-agent-linux@f028aadc Extra file contexts
QubesOS/qubes-core-agent-linux@54d1bfc3 Fix qubes-core-agent-selinux preun scriptlet
QubesOS/qubes-core-agent-linux@ca5c51a8 File context substitutions are not recursive
QubesOS/qubes-core-agent-linux@e20cb8fd Move misc policies into their own module
QubesOS/qubes-core-agent-linux@1b1711a8 Require the SELinux policies if SELinux is present
QubesOS/qubes-core-agent-linux@f955f2f1 SELinux policies for xendriverdomain.service
QubesOS/qubes-core-agent-linux@8c712b97 Set SELinux contexts of home directories
QubesOS/qubes-core-agent-linux@107a8dc7 Enable SELinux support

Referenced issues:

If you're release manager, you can issue GPG-inline signed command:

  • Upload-component r4.2 core-agent-linux c7a0ed9dc0fe81ab3dbe7417422bc4ea46512405 current all (available 5 days from now)
  • Upload-component r4.2 core-agent-linux c7a0ed9dc0fe81ab3dbe7417422bc4ea46512405 security-testing

You can choose subset of distributions like:

  • Upload-component r4.2 core-agent-linux c7a0ed9dc0fe81ab3dbe7417422bc4ea46512405 current vm-bookworm,vm-fc37 (available 5 days from now)

Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).

For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.

@qubesos-bot
Copy link
Author

Package for vm-bullseye was built (build log) and uploaded to current-testing repository.

@qubesos-bot
Copy link
Author

Package for vm-bookworm was built (build log) and uploaded to current-testing repository.

@qubesos-bot
Copy link
Author

Package for vm-fc36 was built (build log) and uploaded to current-testing repository.

@qubesos-bot
Copy link
Author

Package for vm-centos-stream8 was built (build log) and uploaded to current-testing repository.

@qubesos-bot
Copy link
Author

Package for vm-fc37 was built (build log) and uploaded to current-testing repository.

@qubesos-bot
Copy link
Author

qubesos-bot commented Jan 5, 2023

OpenQA test summary

Complete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2023010507-4.2-fedora-37&flavor=templates

New failures, excluding unstable

Compared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2022121202-4.2&flavor=update

  • system_tests_gui_interactive
    • gui_filecopy: unnamed test (unknown)
    • gui_filecopy: Failed (test died)
      # Test died: no candidate needle with tag(s) 'files-test-file' matc...

Failed tests

2 failures
  • system_tests_gui_interactive
    • gui_filecopy: unnamed test (unknown)
    • gui_filecopy: Failed (test died)
      # Test died: no candidate needle with tag(s) 'files-test-file' matc...

Fixed failures

Compared to: https://openqa.qubes-os.org/tests/55523#dependencies

26 fixed

Unstable tests

  • system_tests_update

    update/Failed (1/4 times with errors)
    • job 55329 # Test died: command '(set -o pipefail; qubesctl --show-output stat...

@marmarek
Copy link
Member

marmarek commented Feb 7, 2023

Superseded by #3503

@marmarek marmarek closed this as completed Feb 7, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants