-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
core-agent-linux v4.3.19 (r4.3) #5478
Comments
Package for vm-bookworm was built (build log). |
Package for vm-bookworm was uploaded to current-testing repository. |
Package for vm-fc40 was built (build log). |
Package for vm-fc40 was uploaded to current-testing repository. |
Package for vm-jammy failed to build (build log) ((('core-agent-linux:vm-ubuntu-22.04.amd64:debian: Failed to build packages: Failed to run '/usr/bin/qvm-run-vm -- disp5870 env -- VERBOSE=1 DEBUG=1 BACKEND_VMM=xen bash -c 'mkdir -p /builder/cache/aptcache && /builder/plugins/build_deb/scripts/create-local-repo /builder/repository ubuntu jammy && sudo -E pbuilder update --distribution jammy --configfile /builder/pbuilder/pbuilderrc --othermirror "deb [trusted=yes] file:///tmp/qubes-deb jammy main" && sudo -E pbuilder build --override-config --distribution jammy --configfile /builder/pbuilder/pbuilderrc --othermirror "deb [trusted=yes] file:///tmp/qubes-deb jammy main" /builder/build/qubes-core-agent_4.3.19-1+jammy1.dsc && /builder/plugins/build_deb/scripts/patch-changes /builder/build/qubes-core-agent_4.3.19-1+jammy1.dsc /builder/pbuilder/results/qubes-core-agent_4.3.19-1+jammy1_amd64.buildinfo /builder/pbuilder/results/qubes-core-agent_4.3.19-1+jammy1_amd64.changes'' (status=1).',),)). |
Package for vm-trixie was built (build log). |
Package for vm-trixie was uploaded to current-testing repository. |
Package for vm-archlinux was built (build log). |
Package for vm-archlinux was uploaded to current-testing repository. |
Package for vm-fc41 was built (build log). |
Package for vm-fc41 was uploaded to current-testing repository. |
Package for vm-jammy was built (build log). |
Package for vm-jammy was uploaded to current-testing repository. |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025030404-4.3&flavor=update Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2025021804-4.3&flavor=update
Failed tests7 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/129058#dependencies 15 fixed
Unstable testsPerformance TestsPerformance degradation:32 performance degradations
Remaining performance tests:40 tests
|
Update of core-agent-linux to v4.3.19 for Qubes OS r4.3, see comments below for details and build status.
From commit: QubesOS/qubes-core-agent-linux@254075f
Changes since previous version:
QubesOS/qubes-core-agent-linux@254075fb version 4.3.19
QubesOS/qubes-core-agent-linux@b8415952 Merge remote-tracking branch 'origin/pr/557'
QubesOS/qubes-core-agent-linux@c7c79dba Merge remote-tracking branch 'origin/pr/556'
QubesOS/qubes-core-agent-linux@ff11c498 dom0-updates: do not pass --allowerasing to dnf clean
QubesOS/qubes-core-agent-linux@4aec5a05 Remove drop-ins for systemd-userdbd
QubesOS/qubes-core-agent-linux@2fc6c541 Disable systemd-userdbd
QubesOS/qubes-core-agent-linux@a682f518 rpm: fix formating of %postun selinux macro
QubesOS/qubes-core-agent-linux@01c68af8 Merge remote-tracking branch 'origin/pr/551'
QubesOS/qubes-core-agent-linux@cc84ec63 bind-dirs: fix permissions on $fso_ro
QubesOS/qubes-core-agent-linux@f18831c5 bind-dirs: add x-gvfs-hide mount option to bind dirs This allows to hide mountpoints from Thunar sidebar (happens when bind mounting a file or dir in $HOME).
QubesOS/qubes-core-agent-linux@0a8274bd custom-persist: prevent mount units from starting instead of bind mounting When disabling persistent /home or /usr/local, custom-persist was using a systemd drop-in to override the What= option and set it to the same value as the Where= one. This bind mount is unnecessary and was causing trouble when bind mounting other resources in /home or /usr/local. Instead, a ConditionPathExists= option is added to control whether this mount happens.
QubesOS/qubes-core-agent-linux@55d297b0 custom-persist: pre-create parents with correct ownership When using custom-persist to pre-create the resource before bind mounting it, we might have to create its parents too. That was done using mkdir --parents that was causing parents to be created with root:root ownership which can leads to errors if, for example, a user wants to bind mount a directory inside its home dir. With this fix, parents are created with the same ownership as the resource.
QubesOS/qubes-core-agent-linux@5e5fc527 Unify method to query available terminals
QubesOS/qubes-core-agent-linux@385f3fec bind-dirs: fix /rw/home and /rw/usrlocal initialization from template files
QubesOS/qubes-core-agent-linux@ff6742c2 custom-persist: handle mounts from /rw/home and /rw/usrlocal Custom persist disables /home and /usr/local persistence by default but a user may want to bind mount a file or a directory in one of those locations without mounting the whole directories. For example, we should be able to mount /home/user/.ssh/ but keep the rest of /home/user non-persistent. With this fix, bind dirs detects when an object is located under /home or /usr/local and will look in the associated /rw/home or /rw/usrlocal instead of /rw/bind-dirs. If needed, custom-persist will pre-create the objects in the same location.
QubesOS/qubes-core-agent-linux@4d129796 custom-persist: prefer objets pre-creation in /rw This commit changes the files and dirs pre-creation path. Instead of pre-create files and dirs directly on the RO file system and let bind_dirs() function populate /rw/bind-dirs, custom-persist creates objects in /rw/bind-dirs like a regular user would do.
QubesOS/qubes-core-agent-linux@c778254d custom-persist: files and directory auto-creation The support of metadata has been added to the custom-persist feature to allow automatic creation of files and directories declared through this feature. A type (file|dir), user, group and file mode must be specified before the path declaration.
QubesOS/qubes-core-agent-linux@e0003fc1 fix: bind-dirs should create files parent directories if they don't exist
QubesOS/qubes-core-agent-linux@bfe56a82 fix under_systemd function on debian Read command name in /proc
QubesOS/qubes-core-agent-linux@e47e2853 custom-persist: init.d compatibility if the current VM is not under systemD we need to mount /home and /usr/local explicitly
QubesOS/qubes-core-agent-linux@e5209c88 custom-persist: user suspend modules blacklist
QubesOS/qubes-core-agent-linux@8042e290 custom-persist: do not read user rc.local scripts when the feature is enabled
QubesOS/qubes-core-agent-linux@ec868854 custom-persist: disable user firewall rules when custom persist is enabled
QubesOS/qubes-core-agent-linux@91d312ae custom-persist: disable /home and /usr/local mounts If not explicitly configured, /rw/home and /rw/usrlocal must not be bind mounted to /home and /usr/local. Instead, the original /home and /usr/local is mounted. SystemD drop-ins are used to override the resource to mount (What= option in unit)
QubesOS/qubes-core-agent-linux@2ac91d7d custom-persist: mount binds configured in qubes-db Config is read from qubes database and every bind directory is mounted excepted /home and /usr/local which need to be handled differently
QubesOS/qubes-core-agent-linux@6e7bed01 custom-persist: systemd mount units for /home and /usr/local and services start dependencies The custom-persist feature should disable /home and /usr/local mounts by default. To do this, we can use SystemD drop-ins which requires to remove fstab entries and convert them to regular SystemD units as drop-ins does not seem to work with units generated by systemd-fstab-generator. Mount command in mount_dirs.sh is not required anymore and need to be deleted as it causes issues. Instead, a we can use SystemD unit options to ensure /home and /usr/local are mounted before loading user bind dirs
QubesOS/qubes-core-agent-linux@1d16aea9 custom-persist: ignore /rw/config bind-dirs if custom-persist enabled When the custom-persist feature is enabled, we no longer need to worry about the bind directories configured in /rw/config/qubes-bind-dirs.d.
Referenced issues:
QubesOS/qubes-issues#9663
QubesOS/qubes-issues#9244
QubesOS/qubes-issues#1006
QubesOS/qubes-issues#9807
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.3 core-agent-linux 254075fbd1a879fe90b94138c16c5b695cd24279 current all
(available 5 days from now)Upload-component r4.3 core-agent-linux 254075fbd1a879fe90b94138c16c5b695cd24279 security-testing all
You can choose subset of distributions like:
Upload-component r4.3 core-agent-linux 254075fbd1a879fe90b94138c16c5b695cd24279 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.
The text was updated successfully, but these errors were encountered: