Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

app-linux-usb-proxy v1.3.0 (r4.3) #4838

Closed
qubesos-bot opened this issue Jun 21, 2024 · 22 comments
Closed

app-linux-usb-proxy v1.3.0 (r4.3) #4838

qubesos-bot opened this issue Jun 21, 2024 · 22 comments

Comments

@qubesos-bot
Copy link

Update of app-linux-usb-proxy to v1.3.0 for Qubes OS r4.3, see comments below for details and build status.

From commit: QubesOS/qubes-app-linux-usb-proxy@9c6d6bd

Changes since previous version:
QubesOS/qubes-app-linux-usb-proxy@9c6d6bd version 1.3.0
QubesOS/qubes-app-linux-usb-proxy@f86dbf6 q-dev: fix loop
QubesOS/qubes-app-linux-usb-proxy@29d32c5 q-dev: handle invalid values
QubesOS/qubes-app-linux-usb-proxy@18abd26 q-dev: handle invalid values
QubesOS/qubes-app-linux-usb-proxy@54fca94 q-dev: cleanup
QubesOS/qubes-app-linux-usb-proxy@7cbbb49 q-dev: do not use unicode_escape
QubesOS/qubes-app-linux-usb-proxy@227ec98 q-dev: keep partial backward compatibility in tests
QubesOS/qubes-app-linux-usb-proxy@cad623a q-dev: keep partial backward compatibility for auto-attachment
QubesOS/qubes-app-linux-usb-proxy@5cb2a8f q-dev: keep partial backward compatibility
QubesOS/qubes-app-linux-usb-proxy@f6ad1c3 q-dev: small fix for unknown devices
QubesOS/qubes-app-linux-usb-proxy@9094561 q-dev: fix attaching usb devices on domain start
QubesOS/qubes-app-linux-usb-proxy@fca4777 q-dev: update integ tests
QubesOS/qubes-app-linux-usb-proxy@0be9633 q-dev: minor optimization
QubesOS/qubes-app-linux-usb-proxy@f9f84be q-dev: device protocol
QubesOS/qubes-app-linux-usb-proxy@e7acdf4 q-dev: use ext/utils
QubesOS/qubes-app-linux-usb-proxy@785bd62 q-dev: port assignment
QubesOS/qubes-app-linux-usb-proxy@d261a0f q-dev: implementation of self_identity
QubesOS/qubes-app-linux-usb-proxy@daac099 q-dev: frontend_device -> attachment
QubesOS/qubes-app-linux-usb-proxy@ece1fd0 q-dev: usb device full identity
QubesOS/qubes-app-linux-usb-proxy@1f3aa0c q-dev: fire device-attach on domain start
QubesOS/qubes-app-linux-usb-proxy@b8513dc q-dev: assignments -> get_assigned_devices
QubesOS/qubes-app-linux-usb-proxy@30fa006 q-dev: DeviceInterface
QubesOS/qubes-app-linux-usb-proxy@ab08892 q-dev: events
QubesOS/qubes-app-linux-usb-proxy@d985cf1 q-dev: implement part of new API for DeviceInfo

Referenced issues:

If you're release manager, you can issue GPG-inline signed command:

  • Upload-component r4.3 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 current all (available 5 days from now)
  • Upload-component r4.3 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 security-testing all

You can choose subset of distributions like:

  • Upload-component r4.3 app-linux-usb-proxy 9c6d6bd016486dce70a32db39781774e7a61dbc2 current vm-bookworm,vm-fc37 (available 5 days from now)

Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).

For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.

@qubesos-bot
Copy link
Author

Package for vm-bookworm failed to build (Internal error: 'CalledProcessError').

@qubesos-bot
Copy link
Author

Package for host was built (build log).

@qubesos-bot
Copy link
Author

Package for host was uploaded to current-testing repository.

@qubesos-secondary-bot
Copy link

Package for vm-archlinux failed to build (build log) ((("app-linux-usb-proxy:vm-archlinux-rolling.x86_64:archlinux: Failed to build PKGs: Failed to run '/usr/bin/qvm-run-vm -- disp1416 env -- VERBOSE=1 DEBUG=1 BACKEND_VMM=xen DIST=archlinux PACKAGE_SET=vm bash -c 'sudo cp /builder/plugins/chroot_archlinux/conf/makepkg-x86_64.conf /usr/local/share/devtools/makepkg.conf.d/qubes-x86_64.conf && sudo mkdir -p /builder/cache/qubes-x86_64 && cd /builder/cache/qubes-x86_64 && sudo tar xf /builder/cache/root.tar.gz && sudo /builder/plugins/chroot_archlinux/scripts/generate-pacman /builder/plugins/chroot_archlinux/conf/pacman.conf.j2 /usr/local/share/devtools/pacman.conf.d/qubes-x86_64.conf && sudo rm -rf /etc/pacman.d/gnupg/private-keys-v1.d && sudo pacman-key --init && sudo pacman-key --populate && sudo /builder/plugins/chroot_archlinux/scripts/generate-pacman /builder/plugins/chroot_archlinux/conf/pacman.conf.j2 /usr/local/share/devtools/pacman.conf.d/qubes-x86_64.conf --enable-builder-local && sudo /builder/plugins/build_archlinux/scripts/update-local-repo.sh /builder/cache/qubes-x86_64/root /builder/repository && cd /builder/app-linux-usb-proxy && sudo qubes-x86_64-build -r /builder/cache -- -d /builder/repository:/builder/repository -- --syncdeps --noconfirm --skipinteg'' (status=1)..",),)).

@qubesos-bot
Copy link
Author

Package for vm-trixie was built (build log).

@qubesos-bot
Copy link
Author

Package for vm-trixie was uploaded to current-testing repository.

@qubesos-bot
Copy link
Author

Package for vm-bookworm was built (build log).

@qubesos-secondary-bot
Copy link

Package for vm-archlinux was built (build log).

@qubesos-bot
Copy link
Author

Package for vm-bookworm was uploaded to current-testing repository.

@qubesos-secondary-bot
Copy link

Package for vm-archlinux was uploaded to current-testing repository.

@qubesos-bot
Copy link
Author

Package for vm-fc41 was built (build log).

@qubesos-bot
Copy link
Author

Package for vm-fc41 was uploaded to current-testing repository.

@qubesos-bot
Copy link
Author

Package for host was built (build log).

@qubesos-bot
Copy link
Author

Package for host was uploaded to current-testing repository.

@marmarek
Copy link
Member

marmarek commented Sep 3, 2024

Superseded by #5066

@marmarek marmarek closed this as completed Sep 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment