Closed qubesos-bot closed 4 years ago
Package for dom0 was built (build log) and uploaded to current-testing repository
Complete test suite and dependencies: https://openqa.qubes-os.org/tests/5577#dependencies
Compared to: https://openqa.qubes-os.org/tests/5441#dependencies
Compared to: https://openqa.qubes-os.org/tests/5441#dependencies
Superseded by #1604
Update of core-admin to v4.1.7 for Qubes r4.1, see comments below for details.
Built from: https://github.com/QubesOS/qubes-core-admin/commit/686f66bb85094d60b8ef470c6d0811a8cda55e31
Changes since previous version: QubesOS/qubes-core-admin@686f66bb version 4.1.7 QubesOS/qubes-core-admin@8dda66d6 tests: fix key generation for dom0 updates tests QubesOS/qubes-core-admin@309dd11b Merge remote-tracking branch 'origin/pr/307' QubesOS/qubes-core-admin@f36c9027 Merge remote-tracking branch 'origin/pr/306' QubesOS/qubes-core-admin@161f139f Merge remote-tracking branch 'origin/pr/305' QubesOS/qubes-core-admin@0c08305f Merge remote-tracking branch 'origin/pr/303' QubesOS/qubes-core-admin@e6aa35fc Merge branch 'tests-leaks' QubesOS/qubes-core-admin@d78ef818 Merge branch 'bug5518' QubesOS/qubes-core-admin@51adb434 tests: FileVolume.resize() QubesOS/qubes-core-admin@44dc35e9 Implement missing get_cputime() in AdminVM QubesOS/qubes-core-admin@62735d96 Add admin.vm.CurrentState method QubesOS/qubes-core-admin@698bcc27 Don't pass stdin to VMs unless necessary. QubesOS/qubes-core-admin@e69bdc5e Test file copy hang when target machine qrexec is disabled QubesOS/qubes-core-admin@c805f7be travis: switch to dom0 Fedora 31 QubesOS/qubes-core-admin@74e956e1 ext/pci: handle 'qubes-close' event QubesOS/qubes-core-admin@a89d3f0c tests: allow extensions to cleanup objects references QubesOS/qubes-core-admin@70c862fe Update tests after adding /connected-ips QubesOS/qubes-core-admin@4d8fd025 Also reload /connected-ips on firewall change / domain spawn QubesOS/qubes-core-admin@40f372ee Also store /connected-ips6 for machines that have IPv6 addresses QubesOS/qubes-core-admin@6bf230cf Don't try to write to qubesdb of an offline VM QubesOS/qubes-core-admin@7597a50b Maintain a list of connected machine IPs in qubesdb QubesOS/qubes-core-admin@d181c0f3 storage/file: fix resize QubesOS/qubes-core-admin@35fa733a Fixed Exceptions inferiting from KeyError
Referenced issues: QubesOS/qubes-issues#5347 QubesOS/qubes-issues#5540 QubesOS/qubes-issues#5518 QubesOS/qubes-issues#5106 QubesOS/qubes-issues#5529 QubesOS/qubes-issues#5562
If you're release manager, you can issue GPG-inline signed command:
Upload core-admin 686f66bb85094d60b8ef470c6d0811a8cda55e31 r4.1 current repo
(available 7 days from now)Upload core-admin 686f66bb85094d60b8ef470c6d0811a8cda55e31 r4.1 current (dists) repo
, you can choose subset of distributions, likevm-fc24 vm-fc25
(available 7 days from now)Upload core-admin 686f66bb85094d60b8ef470c6d0811a8cda55e31 r4.1 security-testing repo
Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).