Closed qubesos-bot closed 1 year ago
Package for vm-fc38 was built (build log) and uploaded to current-testing repository.
Complete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2023051702-4.2&flavor=update
Compared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2023021823-4.2&flavor=update
system_tests_whonix
whonix_torbrowser: unnamed test (unknown)
whonix_torbrowser: Failed (test died)
# Test died: no candidate needle with tag(s) 'tor-browser-ipcheck-o...
whonix_torbrowser: unnamed test (unknown)
system_tests_update@hw1
# Test died: command '(set -o pipefail; qubesctl --max-concurrency=...
system_tests_gui_interactive
# Test died: no candidate needle with tag(s) 'disp-text-editor' mat...
system_tests_guivm_gui_interactive
# Test died: no candidate needle with tag(s) 'menu-vm-personal' mat...
system_tests_network_ipv6
VmIPv6Networking_fedora-37: test_040_inter_vm (error)
qubes.exc.QubesVMError: Cannot connect to qrexec agent for 90 secon...
VmIPv6Networking_fedora-37: test_540_ipv6_inter_vm (error)
qubes.exc.QubesVMError: Cannot connect to qrexec agent for 90 secon...
system_tests_qrexec
TC_00_Qrexec_debian-11: test_080_qrexec_service_argument_allow_default (error)
qubes.exc.QubesVMError: Cannot connect to qrexec agent for 90 secon...
TC_00_Qrexec_whonix-gw-16: test_053_qrexec_vm_service_eof_reverse (error)
qubes.exc.QubesVMError: Cannot connect to qrexec agent for 90 secon...
TC_00_Qrexec_whonix-gw-16: test_093_qrexec_service_socket_dom0_eof (failure)
AssertionError: service timeout, probably EOF wasn't transferred fr...
TC_00_Qrexec_whonix-gw-16: test_095_qrexec_service_socket_vm (failure + timed out)
AssertionError: waiting for /etc/qubes-rpc/test.Socket in VM timed out
TC_00_Qrexec_whonix-ws-16: test_065_qrexec_exit_code_vm (error)
qubes.exc.QubesVMError: Cannot connect to qrexec agent for 90 secon...
system_tests_splitgpg
gi.repository.GLib.GError: atspi_error: timeout from dbind (1)
system_tests_basic_vm_qrexec_gui@hw1
qubes.exc.QubesVMError: Cannot connect to qrexec agent for 60 secon...
Compared to: https://openqa.qubes-os.org/tests/60652#dependencies
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Upload-component r4.2 linux-scrypt 086bb5be9eb35cb4bb6d9df885ea7699185d4bc9 current all -----BEGIN PGP SIGNATURE-----
iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAmRqtswgHG1hcm1hcmVr QGludmlzaWJsZXRoaW5nc2xhYi5jb20ACgkQhG1rcJxuLn+dhQ//WpccAoH0hUq3 h+0Z0DJlegXSixy7BmbwIkXjomLwI6krCDOsiTit7wz3PFUao1Z2is/KcPSCD9Q6 ZqQnkK1QbULMd5r8A8BGbt22AcUSM9zGp9vNochJuzElXJuk2bfaWcXsPjWYVFsN qQCcLqUVPYMMl6leT8GJAn6y4zu/YvF+ZRzPeKze2lAcv3mK9r8g2clR023oK34I aCYqshrOOVF8Wuta5vWmWM2hKDgr3XyZ9Xs+hziHWQdjXem/DgYCpiDdsgcGqcTq i1Z6/ey6qAkTHvmMu+C28seVvBhVPCP0/1PnILzm29lXAhCB2gOemhsUEqV8oG13 g5Y990zdq6ifdU/fllUSR9XTDPPxFGkcQj/E5+NFarJIi+52oRm0glRArW8TVcS+ BKkVsAjz69Ms/48HFWYU2fJmI5yL2L6BeqITbHJ5Or8YTmzFIx1DLuaI/U5IeJ8F DdhwBuaNT5buBmZNbfZ5kNRcYWHMgJPQ+6cviB9U+wVBF1X2VPadSZeXMvnCslf3 SQ82cfdVwdfGCairzVtDEFv5as0B/x2TdFb7jDx8GApXRbkCnrg5z2+fVEM+ciNj 5jjrFSvfyN+Rnz5CTCNug3pFFPB2+KxtNd5xsIpaGDkDzHEfYYCl4TwMka0S6lEX 3sToyB8u+/K77X3lt8mlgN78MBOnlAo= =DTGm -----END PGP SIGNATURE-----
Package for vm-centos-stream8 was built (build log) and uploaded to stable repository.
Package for host was built (build log) and uploaded to stable repository.
Package for vm-fc36 was built (build log) and uploaded to stable repository.
Package for vm-fc37 was built (build log) and uploaded to stable repository.
Package for vm-fc38 was built (build log) and uploaded to stable repository.
Update of linux-scrypt to v1.3.1-1 for Qubes r4.2, see comments below for details and build status.
From commit: https://github.com/QubesOS/qubes-linux-scrypt/commit/086bb5be9eb35cb4bb6d9df885ea7699185d4bc9
Changes since previous version: QubesOS/qubes-linux-scrypt@086bb5b version 1.3.1-1 QubesOS/qubes-linux-scrypt@86f99b1 Makefile: make version determination more robust QubesOS/qubes-linux-scrypt@7f4fab5 Switch to .spec.in QubesOS/qubes-linux-scrypt@bcf75fa Update spec and Makefile QubesOS/qubes-linux-scrypt@15cfd82 Add Qubes Builder v2 integration QubesOS/qubes-linux-scrypt@36089d5 Refactor Makefile and add default FETCH_CMD QubesOS/qubes-linux-scrypt@e36ffbc Drop Travis CI QubesOS/qubes-linux-scrypt@2565b48 Switch from wget to curl QubesOS/qubes-linux-scrypt@92f8310 Add .gitlab-ci.yml QubesOS/qubes-linux-scrypt@4da692e Update travis
Referenced issues:
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.2 linux-scrypt 086bb5be9eb35cb4bb6d9df885ea7699185d4bc9 current all
(available 5 days from now)Upload-component r4.2 linux-scrypt 086bb5be9eb35cb4bb6d9df885ea7699185d4bc9 security-testing
You can choose subset of distributions like:
Upload-component r4.2 linux-scrypt 086bb5be9eb35cb4bb6d9df885ea7699185d4bc9 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.