Open qubesos-bot opened 3 days ago
Package for vm-bookworm was built (build log).
Package for vm-bookworm was uploaded to current-testing repository.
Package for vm-jammy was built (build log).
Package for vm-jammy was uploaded to current-testing repository.
Package for host was built (build log).
Package for host was uploaded to current-testing repository.
Package for vm-fc39 was built (build log).
Package for vm-fc39 was uploaded to current-testing repository.
Package for vm-fc40 was built (build log).
Package for vm-fc40 was uploaded to current-testing repository.
Package for vm-fc41 was built (build log).
Package for vm-fc41 was uploaded to current-testing repository.
Package for vm-bookworm failed to build (Timeout).
Package for vm-trixie failed to build (Timeout).
Package for vm-trixie was built (build log).
Package for vm-trixie was uploaded to current-testing repository.
Complete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024111904-4.3&flavor=update
Test run included the following:
https://github.com/QubesOS/updates-status/issues/4545
Compared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024111705-4.3&flavor=update
system_tests_audio
[unstable] TC_20_AudioVM_PipeWire_whonix-workstation-17: test_251_audio_playback_audiovm_pipewire_late_start (failure)
AssertionError: only silence detected, no useful audio data
[unstable] TC_20_AudioVM_PipeWire_whonix-workstation-17: test_260_audio_mic_enabled_switch_audiovm (failure)
AssertionError: too short audio, expected 10s, got 0.00013605442176...
system_tests_kde_gui_interactive
# Test died: command 'test "$(cd ~user;ls e1*)" = "$(qvm-run -p wor...
system_tests_basic_vm_qrexec_gui_zfs
# Test died: command 'dnf install -y ./zfs-release.rpm' failed at /...
Compared to: https://openqa.qubes-os.org/tests/119126#dependencies
Update of core-admin-client to v4.3.7 for Qubes OS r4.3, see comments below for details and build status.
From commit: https://github.com/QubesOS/qubes-core-admin-client/commit/2a576950afd00a710724f87a35dca4a3f25bedd5
Changes since previous version: QubesOS/qubes-core-admin-client@2a57695 version 4.3.7 QubesOS/qubes-core-admin-client@4b43784 rpm: adjust dependencies for new devices API QubesOS/qubes-core-admin-client@49513ca Merge remote-tracking branch 'origin/pr/304' QubesOS/qubes-core-admin-client@ff71bc2 Report XRandR display size for lodpi displays QubesOS/qubes-core-admin-client@32e977b Merge remote-tracking branch 'origin/pr/317' QubesOS/qubes-core-admin-client@1a6399b Merge remote-tracking branch 'origin/pr/315' QubesOS/qubes-core-admin-client@4a7fc26 Allow vm class to be given as positional argument to clone_vm QubesOS/qubes-core-admin-client@53f7b09 Ignore invalid GUI related features and options QubesOS/qubes-core-admin-client@177cd2e Avoid spaces in values for
admin.vm.Create
calls QubesOS/qubes-core-admin-client@250fc05 q-dev: fix tests and pylint QubesOS/qubes-core-admin-client@a627696 q-dev: less scary device category names QubesOS/qubes-core-admin-client@ca725e7 q-dev: fix default behavior of qvm-device CLASS QubesOS/qubes-core-admin-client@ecdcd5e q-dev: update docs QubesOS/qubes-core-admin-client@a6d25ab q-dev: do not suggest attaching pci devices QubesOS/qubes-core-admin-client@8faaad0 q-dev: prettier device data printing QubesOS/qubes-core-admin-client@c77ed55 q-dev: pylint + black QubesOS/qubes-core-admin-client@05115ae q-dev: add short way to create DeviceAssignment QubesOS/qubes-core-admin-client@2a6841d q-dev: introduce AnyPort QubesOS/qubes-core-admin-client@f602a3d q-dev: minor device_protocol fixes QubesOS/qubes-core-admin-client@d019190 q-dev: fix comparison of Ports QubesOS/qubes-core-admin-client@922bce8 q-dev: fix qvm-device QubesOS/qubes-core-admin-client@250afc8 q-dev: allow auto-attach of microphone QubesOS/qubes-core-admin-client@871f3f3 q-dev: ignore mode of currently attached devices QubesOS/qubes-core-admin-client@e09ab84 q-dev: add flag to device listing QubesOS/qubes-core-admin-client@469ee24 q-dev: allow mic auto-attachment QubesOS/qubes-core-admin-client@f067f22 q-dev: patching up qvm-device info QubesOS/qubes-core-admin-client@46626fb q-dev: fixes corner cases in attach/assign QubesOS/qubes-core-admin-client@7ec56ae q-dev: fixes of devices assignment fronted QubesOS/qubes-core-admin-client@fe4f02b q-dev: fix loading devices in event handling QubesOS/qubes-core-admin-client@a5da230 q-dev: filter out not allowed arguments during detach QubesOS/qubes-core-admin-client@a5086b6 q-dev: filter out not allowed arguments during attach QubesOS/qubes-core-admin-client@3454222 q-dev: fix check if device is attached after assignment QubesOS/qubes-core-admin-client@5fc60a7 q-dev: extend backward compatibility ofattach --persistent
QubesOS/qubes-core-admin-client@65f7311 q-dev: prettier info output QubesOS/qubes-core-admin-client@50fef48 q-dev: print "Error:" before error message QubesOS/qubes-core-admin-client@c5441df q-dev: Attention -> Warning QubesOS/qubes-core-admin-client@78f183d q-dev: default qubes app QubesOS/qubes-core-admin-client@c097b6f q-dev: make pci can be only assigned as required QubesOS/qubes-core-admin-client@0ccf3a5 q-dev: remove unused import QubesOS/qubes-core-admin-client@091596b q-dev: Set.assignment QubesOS/qubes-core-admin-client@2c58376 q-dev: add more tests QubesOS/qubes-core-admin-client@98f676c q-dev: move deny-list's path constant QubesOS/qubes-core-admin-client@8588153 q-dev: update device_protocol.py QubesOS/qubes-core-admin-client@082a47f q-dev: more elaborated assignment listing QubesOS/qubes-core-admin-client@5210963 q-dev: fix tests and cleanup QubesOS/qubes-core-admin-client@5f76980 q-dev: fix block auto-attach QubesOS/qubes-core-admin-client@e3b1cf8 q-dev: print warning for flags --port and --device QubesOS/qubes-core-admin-client@c7a17e4 q-dev: add tests QubesOS/qubes-core-admin-client@421935e q-dev: warn user if assign device against deny list QubesOS/qubes-core-admin-client@bb2d34b q-dev: assignment.device QubesOS/qubes-core-admin-client@3dfc8e0 q-dev: interface matches QubesOS/qubes-core-admin-client@ace4332 q-dev: fixes QubesOS/qubes-core-admin-client@ed25713 q-dev: device protocol QubesOS/qubes-core-admin-client@8e90d90 q-dev: make devclass required QubesOS/qubes-core-admin-client@ac42e08 q-dev: backend_name QubesOS/qubes-core-admin-client@405e91a q-dev: docs QubesOS/qubes-core-admin-client@5ead756 q-dev: assign only device QubesOS/qubes-core-admin-client@1ad66e5 q-dev: matches QubesOS/qubes-core-admin-client@c6ba8a4 q-dev: device -> devices QubesOS/qubes-core-admin-client@4389dd0 q-dev: virtual device QubesOS/qubes-core-admin-client@e8ad766 q-dev: unify protocol QubesOS/qubes-core-admin-client@4077b09 q-dev: fix event handling QubesOS/qubes-core-admin-client@8772108 q-dev: refactor device_protocol.py QubesOS/qubes-core-admin-client@cbf3e74 q-dev: add self_identity do device identity QubesOS/qubes-core-admin-client@182cf50 q-dev: ask docs QubesOS/qubes-core-admin-client@4ea814f q-dev: fix qvm-device QubesOS/qubes-core-admin-client@38cc1da q-dev: backward compatible device_protocol QubesOS/qubes-core-admin-client@4eb8610 q-dev: add ask option QubesOS/qubes-core-admin-client@ab8ae5f q-dev: add device_identity to device assignment QubesOS/qubes-core-admin-client@4102157 q-dev: assignment QubesOS/qubes-core-admin-client@bead910 q-dev: comparison QubesOS/qubes-core-admin-client@55dbba9 q-dev: portReferenced issues: QubesOS/qubes-issues#9574 QubesOS/qubes-issues#9578 QubesOS/qubes-issues#9325 QubesOS/qubes-issues#7730 QubesOS/qubes-issues#9558
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.3 core-admin-client 2a576950afd00a710724f87a35dca4a3f25bedd5 current all
(available 5 days from now)Upload-component r4.3 core-admin-client 2a576950afd00a710724f87a35dca4a3f25bedd5 security-testing all
You can choose subset of distributions like:
Upload-component r4.3 core-admin-client 2a576950afd00a710724f87a35dca4a3f25bedd5 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.