Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

core-admin v4.1.17 (r4.1) #2218

Closed
qubesos-bot opened this issue Dec 4, 2020 · 3 comments
Closed

core-admin v4.1.17 (r4.1) #2218

qubesos-bot opened this issue Dec 4, 2020 · 3 comments

Comments

@qubesos-bot
Copy link

Update of core-admin to v4.1.17 for Qubes r4.1, see comments below for details.

Built from: QubesOS/qubes-core-admin@e160fc6

Changes since previous version:
QubesOS/qubes-core-admin@e160fc61 version 4.1.17
QubesOS/qubes-core-admin@39d9a619 Merge remote-tracking branch 'origin/pr/379'
QubesOS/qubes-core-admin@4417f252 Merge remote-tracking branch 'origin/pr/378'
QubesOS/qubes-core-admin@e015165c qubes-hcl-report: run lspci as root
QubesOS/qubes-core-admin@cb1cdd8f Only install needed packages and ignore failure
QubesOS/qubes-core-admin@afbba5e5 Check for RPM and DNF before using them
QubesOS/qubes-core-admin@5daa964b Only install dependencies if needed
QubesOS/qubes-core-admin@27c70bff make pylint happy
QubesOS/qubes-core-admin@8b8c17f8 Avoid permission problems
QubesOS/qubes-core-admin@88cb57ca Fix tests for DispVMs
QubesOS/qubes-core-admin@13cd47ec Try to get the tests to work
QubesOS/qubes-core-admin@76cd08af Fix test suite
QubesOS/qubes-core-admin@f4d93fd6 Test that a DispVM’s template can be changed
QubesOS/qubes-core-admin@9b3a598e DispVM has no “default_volume_config” property
QubesOS/qubes-core-admin@d46657a2 Changing AppVM template breaks running DispVMs
QubesOS/qubes-core-admin@e11f94b4 Implement changing the template of a DispVM
QubesOS/qubes-core-admin@ca9a496e Enhance qvm-console-dispvm and admin.vm.Console
QubesOS/qubes-core-admin@39ef189a Merge remote-tracking branch 'origin/pr/354'
QubesOS/qubes-core-admin@7ab1703a Merge remote-tracking branch 'origin/pr/375'
QubesOS/qubes-core-admin@b3bb65d3 Merge branch 'tests20201030'
QubesOS/qubes-core-admin@542fee17 Fix line lengths
QubesOS/qubes-core-admin@09785449 Return better error messages from file pool
QubesOS/qubes-core-admin@86ccbcc2 tests: fix test_550_ipv6_spoof_ip
QubesOS/qubes-core-admin@7d8d0c10 tests: wait for full VM startup before testing network and few other
QubesOS/qubes-core-admin@12bc523b Make run-tests script try to find qrexec
QubesOS/qubes-core-admin@77323cd3 Start using 'async def' syntax
QubesOS/qubes-core-admin@8b321e8f gitlab-ci: install dependencies via dnf
QubesOS/qubes-core-admin@72759390 Fix bugs found by Rusty Bird
QubesOS/qubes-core-admin@ec51673f Fix export locking
QubesOS/qubes-core-admin@e53d0400 Re-add dirty check in case qubesd is restarted
QubesOS/qubes-core-admin@e4854df4 File volumes are started NAND exported
QubesOS/qubes-core-admin@14e9154e file pool: snapshotting dirty volume not supported
QubesOS/qubes-core-admin@5e4b4956 gitlab-ci: install pip before using it, adjust pylint call
QubesOS/qubes-core-admin@cee82019 Always snapshot in the FILE pool
QubesOS/qubes-core-admin@2c8057c4 gitlab-ci: add tests job
QubesOS/qubes-core-admin@a4034425 rpm: fix %if syntax
QubesOS/qubes-core-admin@c717dacd tests/lvm: re-introduce POOL_CONF
QubesOS/qubes-core-admin@a21783e5 Add .gitlab-ci.yml
QubesOS/qubes-core-admin@8233009e tests: fix logging network info on failed test
QubesOS/qubes-core-admin@79fb0cad tests: use dup-ed stdin in wait_on_fail
QubesOS/qubes-core-admin@6db24d3e tests: add PVH grub2 tests
QubesOS/qubes-core-admin@8f38753b Re-enable SMAP for VMs
QubesOS/qubes-core-admin@73e55eb9 tests: adjust for applications list stored in features dict
QubesOS/qubes-core-admin@2b49979c tests: remove test_030_clone
QubesOS/qubes-core-admin@8b4a4a72 drop old workaround kernelopts
QubesOS/qubes-core-admin@14c63646 tests: make sure dnsmasq is stopped before starting it again
QubesOS/qubes-core-admin@79d4b716 tests: fail the test early if VM fails to start
QubesOS/qubes-core-admin@9e26bfd4 tests/lvm & callback: remove explicit class references
QubesOS/qubes-core-admin@b95339ea storage/callback: remove the "word of caution"
QubesOS/qubes-core-admin@b9b86976 storage/callback: comment fixes
QubesOS/qubes-core-admin@2487d86c storage/callback: add the config ID as callback argument
QubesOS/qubes-core-admin@536e12d8 storage/callback: some callbacks added & removed
QubesOS/qubes-core-admin@fd3a56e0 tests/lvm & callback: Refactoring
QubesOS/qubes-core-admin@3db5e9f8 Revert "storage/callback: do not run sync code async"
QubesOS/qubes-core-admin@fdceb064 tests/callback: ensure missing conf causes errors
QubesOS/qubes-core-admin@287a4a04 storage/callback: do not run sync code async
QubesOS/qubes-core-admin@a53781b1 tests/callback: added callback-specific tests
QubesOS/qubes-core-admin@56c8d9d0 storage/callback: async Volume.export() & added Volume.export_end()
QubesOS/qubes-core-admin@42d62bb4 storage/lvm: make the "hack" work with CallbackPool instances
QubesOS/qubes-core-admin@409ea88a storage/callback: add the backend_class property
QubesOS/qubes-core-admin@527fa1ec tests/callback: add them to the rpm build
QubesOS/qubes-core-admin@e5838dbd storage/callback: various fixes
QubesOS/qubes-core-admin@d9f1bced tests/callback: add rudimentary tests for the callback driver
QubesOS/qubes-core-admin@fe27b2a1 tests/lvm: make the tests re-usable for other drivers
QubesOS/qubes-core-admin@43fca80a storage/callback: fix issues detected by pylint
QubesOS/qubes-core-admin@529e4bfb storage/callback: volume callbacks now also rceive the source volume as argument (if there's any)
QubesOS/qubes-core-admin@57e7a029 storage/callback: add a post_volume_start callback
QubesOS/qubes-core-admin@bf8ece8a storage/callback: more succinct callback names
QubesOS/qubes-core-admin@9de54ab2 storage/callback: make CallbackVolume a Volume
QubesOS/qubes-core-admin@178d4dd9 storage/callback: enforce CallbackPool as the pool attribute of delegated volumes
QubesOS/qubes-core-admin@caddc1c4 storage/callback: pylint: disable line-too-long
QubesOS/qubes-core-admin@889c9238 storage/callback: asyncio implementation
QubesOS/qubes-core-admin@170e5f5d storage/callback: fix the rpm build
QubesOS/qubes-core-admin@eee80036 storage/tests: expect the callback pool driver
QubesOS/qubes-core-admin@dab41ddc storage/callback: comments
QubesOS/qubes-core-admin@a00b2d56 storage/callback: use Qubes exceptions
QubesOS/qubes-core-admin@49dd8250 storage/callback: added sphinx attribute comments
QubesOS/qubes-core-admin@bbb596e3 storage/callback: initialize logger in init
QubesOS/qubes-core-admin@5530265b storage/callback: make pylint happy
QubesOS/qubes-core-admin@efa0d7c2 storage/callback: more readable bash invocation
QubesOS/qubes-core-admin@746697ad storage: added the callback pool driver

Referenced issues:
QubesOS/qubes-issues#2881
QubesOS/qubes-issues#4324
QubesOS/qubes-issues#5935

If you're release manager, you can issue GPG-inline signed command:

  • Upload core-admin e160fc61b3b0e2e7aa6c40ca520578f25a64af8f r4.1 current repo (available 7 days from now)
  • Upload core-admin e160fc61b3b0e2e7aa6c40ca520578f25a64af8f r4.1 current (dists) repo, you can choose subset of distributions, like vm-fc24 vm-fc25 (available 7 days from now)
  • Upload core-admin e160fc61b3b0e2e7aa6c40ca520578f25a64af8f r4.1 security-testing repo

Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).

@qubesos-bot
Copy link
Author

Package for dom0 was built (build log) and uploaded to current-testing repository

@marmarek
Copy link
Member

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Upload core-admin e160fc61b3b0e2e7aa6c40ca520578f25a64af8f r4.1 current repo
-----BEGIN PGP SIGNATURE-----
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=L7lv
-----END PGP SIGNATURE-----

@qubesos-bot
Copy link
Author

Package for dom0 was uploaded to stable repository

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants