-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
core-admin v4.1.26 (r4.1) #2845
Comments
Package for dom0 was built (build log) and uploaded to current-testing repository |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.1&build=2022031404-4.1-fedora-35&flavor=templates New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.1&build=2022021706-4.1&flavor=update Failed testsNo failures! Fixed failuresCompared to: https://openqa.qubes-os.org/tests/35157#dependencies 21 fixed
Unstable tests
|
-----BEGIN PGP SIGNED MESSAGE----- Upload core-admin d51061989d72ca758876666475b9819872c60ae1 r4.1 current repo iQJUBAEBCAA+FiEEF7fMGYa9PSjEFHW2hG1rcJxuLn8FAmIv+0YgHG1hcm1hcmVr |
Package for dom0 was uploaded to stable repository |
Update of core-admin to v4.1.26 for Qubes r4.1, see comments below for details.
Built from: QubesOS/qubes-core-admin@d510619
Changes since previous version:
QubesOS/qubes-core-admin@d5106198 version 4.1.26
QubesOS/qubes-core-admin@961e0e29 Merge remote-tracking branch 'origin/pr/455'
QubesOS/qubes-core-admin@d9663f81 storage: fix logging
QubesOS/qubes-core-admin@349bfbfd Make error message a bit clearer when killing VM at very early stage
QubesOS/qubes-core-admin@cac22451 Do not block vm.kill() when domain is starting
QubesOS/qubes-core-admin@b152218e tests: wait for window to close before checking clipboard
QubesOS/qubes-core-admin@0af6485f tests: do not expect GUI error message anymore
QubesOS/qubes-core-admin@a7649998 version 4.1.25
QubesOS/qubes-core-admin@cc936ace Merge remote-tracking branch 'origin/pr/452'
QubesOS/qubes-core-admin@ad65d2da Merge remote-tracking branch 'origin/pr/449'
QubesOS/qubes-core-admin@e05c3f5a tests/integ/storage: check that the snapshot is not stuck
QubesOS/qubes-core-admin@6be1b522 tests: explicitly select to open an attachment in Thunderbird
QubesOS/qubes-core-admin@312be856 Merge remote-tracking branch 'origin/pr/445'
QubesOS/qubes-core-admin@fe86e143 Merge remote-tracking branch 'origin/pr/450'
QubesOS/qubes-core-admin@fd312d12 Avoid a useless str -> str conversion
QubesOS/qubes-core-admin@ea4c9e85 Assert number of arguments to LVM ops are right
QubesOS/qubes-core-admin@3d6b8f06 Specify size in bytes when resizing
QubesOS/qubes-core-admin@6b8d115f Merge remote-tracking branch 'origin/pr/443'
QubesOS/qubes-core-admin@3d11fcb7 Merge remote-tracking branch 'origin/pr/444'
QubesOS/qubes-core-admin@bffb7f23 Merge remote-tracking branch 'origin/pr/446'
QubesOS/qubes-core-admin@80c94cd4 Merge remote-tracking branch 'origin/pr/440'
QubesOS/qubes-core-admin@4270e844 Use long options for LVM2
QubesOS/qubes-core-admin@46e355f7 storage/reflink: precache reflink before save_on_stop start()
QubesOS/qubes-core-admin@e42b1688 storage/reflink: is_outdated(): decide by inode inequality
QubesOS/qubes-core-admin@6515cae2 storage/reflink: start(): use hardlink for snap_on_start volume
QubesOS/qubes-core-admin@d9be5402 storage/reflink: _add_revision(): ctime -> mtime in filename
QubesOS/qubes-core-admin@c209f89c storage/reflink: resize(): don't mutate _path_clean file contents
QubesOS/qubes-core-admin@0714c915 storage/reflink: _copy_file(): add dst_size and copy_mtime args
QubesOS/qubes-core-admin@1fef9dcf tests/storage_reflink: test on XFS too
QubesOS/qubes-core-admin@b7390cb7 tests/storage_reflink: speed up tests
QubesOS/qubes-core-admin@476acd9d tests/storage_reflink: place test cases in numeric order
QubesOS/qubes-core-admin@dc4f5630 tests/storage_reflink: fix pylint complaints
QubesOS/qubes-core-admin@1cc84971 storage/reflink: volume usage(): omit wrong docstring
QubesOS/qubes-core-admin@24c14ae5 storage/reflink: harmonize code style
QubesOS/qubes-core-admin@6dfa1d83 storage/reflink: _is_supported(): make src_dir keyword-only
QubesOS/qubes-core-admin@62f20255 storage/reflink: revisions(): narrow the glob
QubesOS/qubes-core-admin@716a1c13 storage/reflink: move latest revision logic to _path_revision()
QubesOS/qubes-core-admin@3742ef0b storage/reflink: "(revision) number" -> "revision"
QubesOS/qubes-core-admin@2acf972d storage/reflink: _make_dir() -> _create_dir()
QubesOS/qubes-core-admin@397fd950 storage/reflink: _make_dir(): check isdir() for existing path
QubesOS/qubes-core-admin@b50bcecd storage/reflink: start(): no need to go through size() getter
QubesOS/qubes-core-admin@1a4fdc25 storage/reflink: stop(): reuse is_dirty()
QubesOS/qubes-core-admin@bc8747e9 tests: use more deterministic format for image comparison
QubesOS/qubes-core-admin@0918fc8c Better error for attaching a PCI device to dom0
QubesOS/qubes-core-admin@0933b096 Remove logrotate configuration for qmemman.log and empty parent directory.
QubesOS/qubes-core-admin@6a030997 Allow negative timezone offset
QubesOS/qubes-core-admin@fad46e0b Rip vif-route-qubes out from dom0
QubesOS/qubes-core-admin@251d8aaa tests: spurious double DispVM startup
Referenced issues:
QubesOS/qubes-issues#6322
QubesOS/qubes-issues#7031
If you're release manager, you can issue GPG-inline signed command:
Upload core-admin d51061989d72ca758876666475b9819872c60ae1 r4.1 current repo
(available 7 days from now)Upload core-admin d51061989d72ca758876666475b9819872c60ae1 r4.1 current (dists) repo
, you can choose subset of distributions, likevm-fc24 vm-fc25
(available 7 days from now)Upload core-admin d51061989d72ca758876666475b9819872c60ae1 r4.1 security-testing repo
Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
The text was updated successfully, but these errors were encountered: