Open qubesos-bot opened 1 month ago
Package for vm-bookworm failed to build (Internal error: 'CalledProcessError').
Package for host was built (build log).
Package for host was uploaded to current-testing repository.
Package for vm-archlinux failed to build (build log) ((("app-linux-usb-proxy:vm-archlinux-rolling.x86_64:archlinux: Failed to build PKGs: Failed to run '/usr/bin/qvm-run-vm -- disp1416 env -- VERBOSE=1 DEBUG=1 BACKEND_VMM=xen DIST=archlinux PACKAGE_SET=vm bash -c 'sudo cp /builder/plugins/chroot_archlinux/conf/makepkg-x86_64.conf /usr/local/share/devtools/makepkg.conf.d/qubes-x86_64.conf && sudo mkdir -p /builder/cache/qubes-x86_64 && cd /builder/cache/qubes-x86_64 && sudo tar xf /builder/cache/root.tar.gz && sudo /builder/plugins/chroot_archlinux/scripts/generate-pacman /builder/plugins/chroot_archlinux/conf/pacman.conf.j2 /usr/local/share/devtools/pacman.conf.d/qubes-x86_64.conf && sudo rm -rf /etc/pacman.d/gnupg/private-keys-v1.d && sudo pacman-key --init && sudo pacman-key --populate && sudo /builder/plugins/chroot_archlinux/scripts/generate-pacman /builder/plugins/chroot_archlinux/conf/pacman.conf.j2 /usr/local/share/devtools/pacman.conf.d/qubes-x86_64.conf --enable-builder-local && sudo /builder/plugins/build_archlinux/scripts/update-local-repo.sh /builder/cache/qubes-x86_64/root /builder/repository && cd /builder/app-linux-usb-proxy && sudo qubes-x86_64-build -r /builder/cache -- -d /builder/repository:/builder/repository -- --syncdeps --noconfirm --skipinteg'' (status=1)..",),)).
Package for vm-trixie was built (build log).
Package for vm-trixie was uploaded to current-testing repository.
Package for vm-bookworm was built (build log).
Package for vm-archlinux was built (build log).
Package for vm-bookworm was uploaded to current-testing repository.
Package for vm-archlinux was uploaded to current-testing repository.
Package for vm-jammy was built (build log).
Package for vm-fc39 was built (build log).
Package for vm-jammy was uploaded to current-testing repository.
Package for vm-fc39 was uploaded to current-testing repository.
Package for vm-fc40 was built (build log).
Package for vm-fc40 was uploaded to current-testing repository.
Complete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024072004-4.3&flavor=update
Test run included the following:
Compared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024070519-4.3&flavor=update
AssertionError: too short audio, expected 10s, got 9.09077097505668...
Compared to: https://openqa.qubes-os.org/tests/105374#dependencies
Update of app-linux-usb-proxy to v1.3.0 for Qubes OS r4.3, see comments below for details and build status.
From commit: https://github.com/QubesOS/qubes-app-linux-usb-proxy/commit/9c6d6bd016486dce70a32db39781774e7a61dbc2
Changes since previous version: QubesOS/qubes-app-linux-usb-proxy@9c6d6bd version 1.3.0 QubesOS/qubes-app-linux-usb-proxy@f86dbf6 q-dev: fix loop QubesOS/qubes-app-linux-usb-proxy@29d32c5 q-dev: handle invalid values QubesOS/qubes-app-linux-usb-proxy@18abd26 q-dev: handle invalid values QubesOS/qubes-app-linux-usb-proxy@54fca94 q-dev: cleanup QubesOS/qubes-app-linux-usb-proxy@7cbbb49 q-dev: do not use unicode_escape QubesOS/qubes-app-linux-usb-proxy@227ec98 q-dev: keep partial backward compatibility in tests QubesOS/qubes-app-linux-usb-proxy@cad623a q-dev: keep partial backward compatibility for auto-attachment QubesOS/qubes-app-linux-usb-proxy@5cb2a8f q-dev: keep partial backward compatibility QubesOS/qubes-app-linux-usb-proxy@f6ad1c3 q-dev: small fix for unknown devices QubesOS/qubes-app-linux-usb-proxy@9094561 q-dev: fix attaching usb devices on domain start QubesOS/qubes-app-linux-usb-proxy@fca4777 q-dev: update integ tests QubesOS/qubes-app-linux-usb-proxy@0be9633 q-dev: minor optimization QubesOS/qubes-app-linux-usb-proxy@f9f84be q-dev: device protocol QubesOS/qubes-app-linux-usb-proxy@e7acdf4 q-dev: use ext/utils QubesOS/qubes-app-linux-usb-proxy@785bd62 q-dev: port assignment QubesOS/qubes-app-linux-usb-proxy@d261a0f q-dev: implementation of self_identity QubesOS/qubes-app-linux-usb-proxy@daac099 q-dev: frontend_device -> attachment QubesOS/qubes-app-linux-usb-proxy@ece1fd0 q-dev: usb device full identity QubesOS/qubes-app-linux-usb-proxy@1f3aa0c q-dev: fire device-attach on domain start QubesOS/qubes-app-linux-usb-proxy@b8513dc q-dev: assignments -> get_assigned_devices QubesOS/qubes-app-linux-usb-proxy@30fa006 q-dev: DeviceInterface QubesOS/qubes-app-linux-usb-proxy@ab08892 q-dev: events QubesOS/qubes-app-linux-usb-proxy@d985cf1 q-dev: implement part of new API for DeviceInfo
Referenced issues:
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.3 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 current all
(available 5 days from now)Upload-component r4.3 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 security-testing all
You can choose subset of distributions like:
Upload-component r4.3 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.