You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you're release manager, you can issue GPG-inline signed command:
Upload core-agent-linux 9270fc589b14e1fcab3d9e6fa256c9cbe47ff037 r4.0 current repo (available 7 days from now)
Upload core-agent-linux 9270fc589b14e1fcab3d9e6fa256c9cbe47ff037 r4.0 current (dists) repo, you can choose subset of distributions, like vm-fc24 vm-fc25 (available 7 days from now)
Update of core-agent-linux to v4.0.0 for Qubes r4.0, see comments below for details.
Built from: QubesOS/qubes-core-agent-linux@9270fc5
Changes since previous version:
QubesOS/qubes-core-agent-linux@9270fc5 version 4.0.0
QubesOS/qubes-core-agent-linux@ce63d31 Make all scripts in qubes-rpc executable
QubesOS/qubes-core-agent-linux@422f03e Add qubes.VMRootShell service
QubesOS/qubes-core-agent-linux@0bee339 Cleanup kernel modules loading configuration
QubesOS/qubes-core-agent-linux@a06b5b4 debian: drop explicit dependency on sudo
QubesOS/qubes-core-agent-linux@000a93e rpm,deb: split qrexec-agent into separate subpackage
QubesOS/qubes-core-agent-linux@2337d26 debian: update basic metadata of package
QubesOS/qubes-core-agent-linux@58d21f0 Remove old vusb scripts
QubesOS/qubes-core-agent-linux@32915fe deb,rpm: split passwordless root access configs into separate package
QubesOS/qubes-core-agent-linux@22002a3 Do not report spurious failure of qubes.WaitForSession service
QubesOS/qubes-core-agent-linux@8af88d5 rpm: drop dependency on desktop-notification-daemon
QubesOS/qubes-core-agent-linux@db06688 Adjust dependencies for clean upgrade
QubesOS/qubes-core-agent-linux@c8e2c69 rpm: integrate documentation into main package
QubesOS/qubes-core-agent-linux@7e608a8 Remove DisposableVM savefile related files
QubesOS/qubes-core-agent-linux@3e7a45b Split network-related files to -networking and -network-manager packages
QubesOS/qubes-core-agent-linux@3940918 rpm: make file list more verbose to ease splitting the package
QubesOS/qubes-core-agent-linux@72b9f38 Split dom0-updates handling into subpackage
QubesOS/qubes-core-agent-linux@f9fd7a1 Rename qubes-nautilus to qubes-core-agent-nautilus
QubesOS/qubes-core-agent-linux@029d207 rpm: rename qubes-core-vm to qubes-core-agent
QubesOS/qubes-core-agent-linux@4514500 Fix detection of PCI passthrough
QubesOS/qubes-core-agent-linux@8694931 Implement qubes.PostInstall service
QubesOS/qubes-core-agent-linux@b49ae50 Implement qrexec-based connection to updates proxy
QubesOS/qubes-core-agent-linux@f9d6ff8 Rename qvm-run to qvm-run-vm
QubesOS/qubes-core-agent-linux@34fa6e7 debian: make haveged.service patch less intrusive...
QubesOS/qubes-core-agent-linux@8e505c5 debian: add missing Build-Depends: python-setuptools
QubesOS/qubes-core-agent-linux@42bc93d Revert "fedora,debian: update python3-daemon dependency"
QubesOS/qubes-core-agent-linux@33da315 Revert "firewall: switch to python 3"
QubesOS/qubes-core-agent-linux@5047fd9 debian,fedora: split nautilus integration into separate package
QubesOS/qubes-core-agent-linux@36fa978 debian: fix qubes-firewall python packaging, make it more verbose
QubesOS/qubes-core-agent-linux@6de6a3d travis: update to Qubes 4.0 repositories
QubesOS/qubes-core-agent-linux@89183e9 Ask for target VM for file-copy in dom0
QubesOS/qubes-core-agent-linux@2b76373 Remove duplicated 'close' button from titlebar of gnome applications
QubesOS/qubes-core-agent-linux@7d8218a fedora,debian: update python3-daemon dependency
QubesOS/qubes-core-agent-linux@ce70887 Merge branch 'core3-devel'
QubesOS/qubes-core-agent-linux@abf9a5a Apply gschema overrides also to debian, rename according to guidelines
QubesOS/qubes-core-agent-linux@07be216 tests: add run-tests script, plug it into travis
QubesOS/qubes-core-agent-linux@5dfcf06 firewall: switch to python 3
QubesOS/qubes-core-agent-linux@87efe51 tests: make firewall tests working regardless of python version
QubesOS/qubes-core-agent-linux@dc8047c dom0-updates: restructure the script to not update metadata twice
QubesOS/qubes-core-agent-linux@22e261f Add qubes.StartApp service
QubesOS/qubes-core-agent-linux@eef6bbe qvm-copy-to-vm: fix handling empty target VM
QubesOS/qubes-core-agent-linux@41cd218 travis: drop debootstrap workaround
QubesOS/qubes-core-agent-linux@24b726a network: use /32 netmask on internal IPs in NAT providing namespace
QubesOS/qubes-core-agent-linux@c8213ea network: properly handle DNS addresses in vif-qubes-nat.sh
QubesOS/qubes-core-agent-linux@c75b651 network: keep the same MAC on vif interfaces
QubesOS/qubes-core-agent-linux@1c42a06 network: integrate vif-route-qubes-nat into vif-route-qubes
QubesOS/qubes-core-agent-linux@938af2c network: change vif-route-qubes-nat parameters
QubesOS/qubes-core-agent-linux@be86c7d network: reformat vif-route-qubes-nat
QubesOS/qubes-core-agent-linux@3131bb6 Merge remote-tracking branch 'origin/pr/24' into core3-devel
QubesOS/qubes-core-agent-linux@2c8fe64 network: remove qubes-netwatcher
QubesOS/qubes-core-agent-linux@ee0a292 network: rewrite qubes-firewall daemon
QubesOS/qubes-core-agent-linux@b50cba3 Add qubes.ResizeDisk service to adjust filesystem size
QubesOS/qubes-core-agent-linux@779414d Merge remote-tracking branch 'woju/master' into core3-devel
QubesOS/qubes-core-agent-linux@c3d630f Disable meminfo-writer if there is any PCI device attached
QubesOS/qubes-core-agent-linux@76e12ca Rename qubes.xdg python module to qubesxdg
QubesOS/qubes-core-agent-linux@5261f93 misc: add qvm-features-request
QubesOS/qubes-core-agent-linux@2a15863 network: add vif-route-qubes-nat for IP address anonymization
Referenced issues:
QubesOS/qubes-issues#2816
QubesOS/qubes-issues#1637
QubesOS/qubes-issues#1813
QubesOS/qubes-issues#2695
QubesOS/qubes-issues#1815
QubesOS/qubes-issues#2572
QubesOS/qubes-issues#2829
QubesOS/qubes-issues#910
QubesOS/qubes-issues#2161
QubesOS/qubes-issues#2771
QubesOS/qubes-issues#1108
QubesOS/qubes-issues#718
QubesOS/qubes-issues#1143
QubesOS/qubes-issues#2813
QubesOS/qubes-issues#1854
QubesOS/qubes-issues#2101
If you're release manager, you can issue GPG-inline signed command:
Upload core-agent-linux 9270fc589b14e1fcab3d9e6fa256c9cbe47ff037 r4.0 current repo
(available 7 days from now)Upload core-agent-linux 9270fc589b14e1fcab3d9e6fa256c9cbe47ff037 r4.0 current (dists) repo
, you can choose subset of distributions, likevm-fc24 vm-fc25
(available 7 days from now)Upload core-agent-linux 9270fc589b14e1fcab3d9e6fa256c9cbe47ff037 r4.0 security-testing repo
Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
The text was updated successfully, but these errors were encountered: