Closed qubesos-bot closed 1 month ago
Package for vm-fc41 was built (build log).
Package for vm-fc41 was uploaded to current-testing repository.
Complete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2024081804-4.2&flavor=update
Test run included the following:
Compared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2024051522-4.2&flavor=update
system_tests_pvgrub_salt_storage
TC_41_HVMGrub_fedora-40-xfce: test_000_standalone_vm (error)
qubes.exc.QubesVMError: Cannot connect to qrexec agent for 120 seco...
TC_41_HVMGrub_fedora-40-xfce: test_010_template_based_vm (error)
qubes.exc.QubesVMError: Cannot connect to qrexec agent for 120 seco...
Compared to: https://openqa.qubes-os.org/tests/99767#dependencies
Superseded by #5062
Update of app-linux-usb-proxy to v1.3.0 for Qubes OS r4.2, see comments below for details and build status.
From commit: https://github.com/QubesOS/qubes-app-linux-usb-proxy/commit/9c6d6bd016486dce70a32db39781774e7a61dbc2
Changes since previous version: QubesOS/qubes-app-linux-usb-proxy@9c6d6bd version 1.3.0 QubesOS/qubes-app-linux-usb-proxy@f86dbf6 q-dev: fix loop QubesOS/qubes-app-linux-usb-proxy@29d32c5 q-dev: handle invalid values QubesOS/qubes-app-linux-usb-proxy@18abd26 q-dev: handle invalid values QubesOS/qubes-app-linux-usb-proxy@54fca94 q-dev: cleanup QubesOS/qubes-app-linux-usb-proxy@7cbbb49 q-dev: do not use unicode_escape QubesOS/qubes-app-linux-usb-proxy@227ec98 q-dev: keep partial backward compatibility in tests QubesOS/qubes-app-linux-usb-proxy@cad623a q-dev: keep partial backward compatibility for auto-attachment QubesOS/qubes-app-linux-usb-proxy@5cb2a8f q-dev: keep partial backward compatibility QubesOS/qubes-app-linux-usb-proxy@f6ad1c3 q-dev: small fix for unknown devices QubesOS/qubes-app-linux-usb-proxy@9094561 q-dev: fix attaching usb devices on domain start QubesOS/qubes-app-linux-usb-proxy@fca4777 q-dev: update integ tests QubesOS/qubes-app-linux-usb-proxy@0be9633 q-dev: minor optimization QubesOS/qubes-app-linux-usb-proxy@f9f84be q-dev: device protocol QubesOS/qubes-app-linux-usb-proxy@e7acdf4 q-dev: use ext/utils QubesOS/qubes-app-linux-usb-proxy@785bd62 q-dev: port assignment QubesOS/qubes-app-linux-usb-proxy@d261a0f q-dev: implementation of self_identity QubesOS/qubes-app-linux-usb-proxy@daac099 q-dev: frontend_device -> attachment QubesOS/qubes-app-linux-usb-proxy@ece1fd0 q-dev: usb device full identity QubesOS/qubes-app-linux-usb-proxy@1f3aa0c q-dev: fire device-attach on domain start QubesOS/qubes-app-linux-usb-proxy@b8513dc q-dev: assignments -> get_assigned_devices QubesOS/qubes-app-linux-usb-proxy@30fa006 q-dev: DeviceInterface QubesOS/qubes-app-linux-usb-proxy@ab08892 q-dev: events QubesOS/qubes-app-linux-usb-proxy@d985cf1 q-dev: implement part of new API for DeviceInfo
Referenced issues:
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.2 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 current all
(available 5 days from now)Upload-component r4.2 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 security-testing all
You can choose subset of distributions like:
Upload-component r4.2 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.