-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
core-qrexec v4.2.19 (r4.3) #4677
Comments
Package for vm-bookworm failed to build (Internal error: 'CalledProcessError'). |
Package for vm-archlinux failed to build (build log) ((("core-qrexec:vm-archlinux-rolling.x86_64:archlinux: Failed to build PKGs: Failed to run '/usr/bin/qvm-run-vm -- disp2482 env -- VERBOSE=1 DEBUG=1 BACKEND_VMM=xen DIST=archlinux PACKAGE_SET=vm bash -c 'sudo cp /builder/plugins/chroot_archlinux/conf/makepkg-x86_64.conf /usr/local/share/devtools/makepkg.conf.d/qubes-x86_64.conf && sudo mkdir -p /builder/cache/qubes-x86_64 && cd /builder/cache/qubes-x86_64 && sudo tar xf /builder/cache/root.tar.gz && sudo /builder/plugins/chroot_archlinux/scripts/generate-pacman /builder/plugins/chroot_archlinux/conf/pacman.conf.j2 /usr/local/share/devtools/pacman.conf.d/qubes-x86_64.conf && sudo rm -rf /etc/pacman.d/gnupg/private-keys-v1.d && sudo pacman-key --init && sudo pacman-key --populate && sudo /builder/plugins/chroot_archlinux/scripts/generate-pacman /builder/plugins/chroot_archlinux/conf/pacman.conf.j2 /usr/local/share/devtools/pacman.conf.d/qubes-x86_64.conf --enable-builder-local && sudo /builder/plugins/build_archlinux/scripts/update-local-repo.sh /builder/cache/qubes-x86_64/root /builder/repository && cd /builder/core-qrexec && sudo qubes-x86_64-build -r /builder/cache -- -d /builder/repository:/builder/repository -- --syncdeps --noconfirm --skipinteg'' (status=1)..",),)). |
Package for vm-trixie was built (build log). |
Package for vm-trixie was uploaded to current-testing repository. |
Package for vm-bookworm was built (build log). |
Package for host was built (build log). |
Package for vm-bookworm was uploaded to current-testing repository. |
Package for host was uploaded to current-testing repository. |
Package for vm-archlinux failed to build (build log) ((("core-qrexec:vm-archlinux-rolling.x86_64:archlinux: Failed to build PKGs: Failed to run '/usr/bin/qvm-run-vm -- disp5378 env -- VERBOSE=1 DEBUG=1 BACKEND_VMM=xen DIST=archlinux PACKAGE_SET=vm bash -c 'sudo cp /builder/plugins/chroot_archlinux/conf/makepkg-x86_64.conf /usr/local/share/devtools/makepkg.conf.d/qubes-x86_64.conf && sudo mkdir -p /builder/cache/qubes-x86_64 && cd /builder/cache/qubes-x86_64 && sudo tar xf /builder/cache/root.tar.gz && sudo /builder/plugins/chroot_archlinux/scripts/generate-pacman /builder/plugins/chroot_archlinux/conf/pacman.conf.j2 /usr/local/share/devtools/pacman.conf.d/qubes-x86_64.conf && sudo rm -rf /etc/pacman.d/gnupg/private-keys-v1.d && sudo pacman-key --init && sudo pacman-key --populate && sudo /builder/plugins/chroot_archlinux/scripts/generate-pacman /builder/plugins/chroot_archlinux/conf/pacman.conf.j2 /usr/local/share/devtools/pacman.conf.d/qubes-x86_64.conf --enable-builder-local && sudo /builder/plugins/build_archlinux/scripts/update-local-repo.sh /builder/cache/qubes-x86_64/root /builder/repository && cd /builder/core-qrexec && sudo qubes-x86_64-build -r /builder/cache -- -d /builder/repository:/builder/repository -- --syncdeps --noconfirm --skipinteg'' (status=1)..",),)). |
Package for vm-archlinux was built (build log). |
Package for vm-archlinux was uploaded to current-testing repository. |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024061104-4.3&flavor=update Test run included the following:
New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.3&build=2024052808-4.3&flavor=update
Failed tests18 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/101100#dependencies 36 fixed
Unstable tests
|
Superseded by #4801 |
Update of core-qrexec to v4.2.19 for Qubes OS r4.3, see comments below for details and build status.
From commit: QubesOS/qubes-core-qrexec@43f49f0
Changes since previous version:
QubesOS/qubes-core-qrexec@43f49f0 version 4.2.19
QubesOS/qubes-core-qrexec@b6b20d4 Merge remote-tracking branch 'origin/pr/153'
QubesOS/qubes-core-qrexec@7d01e17 Merge remote-tracking branch 'origin/pr/157'
QubesOS/qubes-core-qrexec@64d6e06 Test if a service config directory itself is invalid
QubesOS/qubes-core-qrexec@c6f9a2f Fail early if the service config cannot be found
QubesOS/qubes-core-qrexec@9114fb3 Avoid passing stderr_fd to handle_data_client
QubesOS/qubes-core-qrexec@8b683a8 tests: do not write to maybe-closed socket
QubesOS/qubes-core-qrexec@a60c40c Add support for exiting on client or service EOF
QubesOS/qubes-core-qrexec@129b5dd Better logging for socket services
QubesOS/qubes-core-qrexec@cdf92b7 Check at startup that standard streams are open
QubesOS/qubes-core-qrexec@19ed045 Document rpc-config until skip-service-descriptor
QubesOS/qubes-core-qrexec@9e72d82 Fix SIGUSR1 after stdin_fd closed
QubesOS/qubes-core-qrexec@adbf4a2 Fix build error on redefined FORTIFY_SOURCE
QubesOS/qubes-core-qrexec@89c450b Merge remote-tracking branch 'origin/pr/156'
QubesOS/qubes-core-qrexec@8f2539a Explain why there is no use after free vulnerability
QubesOS/qubes-core-qrexec@a2e0deb Merge remote-tracking branch 'origin/pr/155'
QubesOS/qubes-core-qrexec@6d37768 Restore correct log path
QubesOS/qubes-core-qrexec@ce92bfb Merge remote-tracking branch 'origin/pr/147'
QubesOS/qubes-core-qrexec@0fcec31 Ensure proper RPM dependency ordering
QubesOS/qubes-core-qrexec@4c24dfe Merge remote-tracking branch 'origin/pr/151'
QubesOS/qubes-core-qrexec@c2f197c Ensure that EOF is propagated to stdout
QubesOS/qubes-core-qrexec@8120940 Document the file descriptrs for struct process_io_request
QubesOS/qubes-core-qrexec@a3bbcb5 Prefer close() to shutdown()
QubesOS/qubes-core-qrexec@bc71817 do_fork_exec(): Drop status pipe
QubesOS/qubes-core-qrexec@acda549 Use close_range() instead of close loop
QubesOS/qubes-core-qrexec@d9e3a76 fix_fds(): check that input FDs are okay
QubesOS/qubes-core-qrexec@2844865 Fix memory leak in load_service_config()
QubesOS/qubes-core-qrexec@c801cf3 Refuse executable service with skip-service-descriptor=true
QubesOS/qubes-core-qrexec@b355ccc Forbide skip-service-descriptor=true with explicit username
QubesOS/qubes-core-qrexec@873e77e If skip-service-descriptor=true, do not use fork server
QubesOS/qubes-core-qrexec@76790cb Avoid leaking vchans
QubesOS/qubes-core-qrexec@e06514b Share qrexec-daemon VM -> VM call code with qrexec-client
QubesOS/qubes-core-qrexec@0f7bf45 Avoid warnings from pytest
QubesOS/qubes-core-qrexec@6fa1106 Adjust test to reflect reality
QubesOS/qubes-core-qrexec@56fdd7d Eradicate VLAs from the codebase
QubesOS/qubes-core-qrexec@82cbe71 Use calloc() instead of malloc() + memset()
QubesOS/qubes-core-qrexec@696f831 Avoid pointlessly setting argv[0]
QubesOS/qubes-core-qrexec@930b47d Add visibility attributes and use -fvisibility=hidden
QubesOS/qubes-core-qrexec@b8f0031 Avoid allocating a big buffer for each loop iteration
QubesOS/qubes-core-qrexec@57855c6 qrexec-daemon: check for valid messages from clients
QubesOS/qubes-core-qrexec@4f1e524 qrexec-daemon: Do not check service identifier for DEFAULT: keyword
QubesOS/qubes-core-qrexec@e98ed7a qrexec-agent: Take advantage of flexible array members
QubesOS/qubes-core-qrexec@3313110 qrexec-daemon: Take advantage of flexible array members
QubesOS/qubes-core-qrexec@e33f334 qrexec-daemon: partially validate messages from client
QubesOS/qubes-core-qrexec@ad72712 Check for empty source domain names
QubesOS/qubes-core-qrexec@71c1ae3 Ensure consistent treatment of "QUBESRPC" followed by non-space
QubesOS/qubes-core-qrexec@b115494 Do not skip "nogui:" prefix in agent
QubesOS/qubes-core-qrexec@163597e Report correct statuses for service execution failure
QubesOS/qubes-core-qrexec@a9f5e18 Check for dup2() errors and avoid FD leak
QubesOS/qubes-core-qrexec@a9d11c0 Do not use a timeout if QREXEC_STARTUP_NOWAIT is set
QubesOS/qubes-core-qrexec@a91949a Use exit() in child process after fork()
QubesOS/qubes-core-qrexec@652b8f5 Do not close stdin, stdout, or stderr
QubesOS/qubes-core-qrexec@a0e7438 Make more functions in agent tests idempotent
QubesOS/qubes-core-qrexec@c01e533 Implement connections to TCP-based services
QubesOS/qubes-core-qrexec@6d66051 Avoid writing to an uninitialized file descriptor
QubesOS/qubes-core-qrexec@695c3f3 find_file(): Check for symlinks to /dev/tcp/
QubesOS/qubes-core-qrexec@4342589 Use flexible array member for 'struct trigger_service_params3'
QubesOS/qubes-core-qrexec@72643d7 Use VM GitLab runner
QubesOS/qubes-core-qrexec@a5fbea7 Rip out stale comment
QubesOS/qubes-core-qrexec@10cf1e5 Test that services can be symbolic links to executables
QubesOS/qubes-core-qrexec@31e412f Treat zero timeout as infinite
QubesOS/qubes-core-qrexec@9401273 Merge remote-tracking branch 'origin/pr/143'
QubesOS/qubes-core-qrexec@a5de843 Don't close file descriptor 0
QubesOS/qubes-core-qrexec@a9aa1c5 Use libvchan_client_init_async() instead of parent process timeout
QubesOS/qubes-core-qrexec@61a8e1f Avoid using signal() to establish a signal handler
QubesOS/qubes-core-qrexec@e6695dd Use SOCK_CLOEXEC instead of setting O_CLOEXEC manually
QubesOS/qubes-core-qrexec@3d658cc Use a pipe instead of signals to notify readiness
QubesOS/qubes-core-qrexec@f3768d2 Use sigemptyset() to initialize signal sets
QubesOS/qubes-core-qrexec@c664954 Avoid using alarm(2) for timeouts
QubesOS/qubes-core-qrexec@1f13095 Add exit codes to qrexec.h
QubesOS/qubes-core-qrexec@b0c56f1 Merge remote-tracking branch 'origin/pr/142'
QubesOS/qubes-core-qrexec@dfdfb33 Support socket services with MSG_JUST_EXEC
QubesOS/qubes-core-qrexec@bb2454e Add missing include
QubesOS/qubes-core-qrexec@daee92e Merge remote-tracking branch 'origin/pr/144'
QubesOS/qubes-core-qrexec@dfd804f Fix flaky qrexec agent tests
QubesOS/qubes-core-qrexec@edc80de Check for dom0 messages in more agent tests
QubesOS/qubes-core-qrexec@f3a5784 Avoid qrexec-client for VM -> dom0 calls
QubesOS/qubes-core-qrexec@e0281de Test VM => dom0 calls with skip-service-descriptor=true
QubesOS/qubes-core-qrexec@7ce4f4e Avoid qrexec-client for VM -> VM calls
QubesOS/qubes-core-qrexec@7c63e64 Document extensions to the qrexec policy daemon protocol
QubesOS/qubes-core-qrexec@f42521d Rip out unused fork_and_flush_buffer()
QubesOS/qubes-core-qrexec@2901f00 Make all paths relative to socket directory
QubesOS/qubes-core-qrexec@cb99ff1 Use relative symlinks
QubesOS/qubes-core-qrexec@d8881ca qubes_sendmsg_all: Avoid infinite loop on empty iovec
QubesOS/qubes-core-qrexec@f8d9343 qrexec-client: Factor some duplicated code
QubesOS/qubes-core-qrexec@347a9bc qrexec-client: remove unneeded local variable
QubesOS/qubes-core-qrexec@e21c881 qrexec-client: Use bool instead of int for booleans
QubesOS/qubes-core-qrexec@a2c5829 qrexec-client: do not prepare event loop for VM -> VM calls
QubesOS/qubes-core-qrexec@5a62613 qrexec-client: remove unreachable code
QubesOS/qubes-core-qrexec@756bd39 qrexec-client: Use XID to connect to qrexec daemon when possible
QubesOS/qubes-core-qrexec@7957eea Pass the correct sockaddr len to connect()
QubesOS/qubes-core-qrexec@4f278aa Check return value of snprintf() and unlink()
QubesOS/qubes-core-qrexec@d9fca57 qrexec-client: Better validation of arguments
QubesOS/qubes-core-qrexec@2be9adc qrexec-client: fail if service configuration loading fails
QubesOS/qubes-core-qrexec@0d85560 Fail service call if config file cannot be read
QubesOS/qubes-core-qrexec@7ed4303 Test for errors reading a service config file
QubesOS/qubes-core-qrexec@ef32e6e Load service configuration files with long names
QubesOS/qubes-core-qrexec@175e5ad Test that config in a long path is loaded
QubesOS/qubes-core-qrexec@6967f3c Test that service configs are found in all places they should be
QubesOS/qubes-core-qrexec@47978ac Avoid using /tmp for qrexec return pipes
QubesOS/qubes-core-qrexec@48944be Forbid empty service names in legacy MSG_TRIGGER_SERVICE
QubesOS/qubes-core-qrexec@a8052a3 Add test for invalid service name for old protocol version
QubesOS/qubes-core-qrexec@2a302d8 Search for qubes.Service+ if call for qubes.Service is made
QubesOS/qubes-core-qrexec@b16e0a5 Add test for missing service arguments
QubesOS/qubes-core-qrexec@c0e7f6a Explicitly unset QREXEC variables
QubesOS/qubes-core-qrexec@7f78441 Add test for unsetting QREXEC* variables
QubesOS/qubes-core-qrexec@d5d7184 find_file(): Check for broken symlinks and I/O errors
QubesOS/qubes-core-qrexec@f74981f Add test for broken symbolic links as services
QubesOS/qubes-core-qrexec@2e407b4 Merge remote-tracking branch 'origin/pr/138'
QubesOS/qubes-core-qrexec@c6ec6ef Support not passing metadata to socket-based services
QubesOS/qubes-core-qrexec@07ec597 Cleanly terminate connections if command or config is invalid
QubesOS/qubes-core-qrexec@2080749 Test service configuration better
QubesOS/qubes-core-qrexec@a893050 Clean up configuration loading
QubesOS/qubes-core-qrexec@b5a3c3e Move TOML parsing function to private header
QubesOS/qubes-core-qrexec@ac3951d tests: Allow running tests under ASAN+UBSAN
QubesOS/qubes-core-qrexec@e192e3f tests: Allow altering arguments to test script
QubesOS/qubes-core-qrexec@b551075 tests: treat ECONNRESET as EOF
QubesOS/qubes-core-qrexec@14cbe65 tests: don't use sleep(1) to enforce message ordering
QubesOS/qubes-core-qrexec@241b88f tests: prevent unexpected message combining
QubesOS/qubes-core-qrexec@223361b tests: tolerate alternate orders of messages
QubesOS/qubes-core-qrexec@b318516 Switch to sequoia for codecov signature check
Referenced issues:
QubesOS/qubes-issues#9089
QubesOS/qubes-issues#9090
QubesOS/qubes-issues#9091
QubesOS/qubes-issues#9097
QubesOS/qubes-issues#9098
QubesOS/qubes-issues#9099
QubesOS/qubes-issues#9100
QubesOS/qubes-issues#9101
QubesOS/qubes-issues#9126
QubesOS/qubes-issues#9161
QubesOS/qubes-issues#9036
QubesOS/qubes-issues#9037
QubesOS/qubes-issues#9038
QubesOS/qubes-issues#9169
QubesOS/qubes-issues#9176
QubesOS/qubes-issues#9183
QubesOS/qubes-issues#9184
QubesOS/qubes-issues#9185
QubesOS/qubes-issues#9066
QubesOS/qubes-issues#9073
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.3 core-qrexec 43f49f04f43b58748cad71fe1ec96a3925d76ff1 current all
(available 5 days from now)Upload-component r4.3 core-qrexec 43f49f04f43b58748cad71fe1ec96a3925d76ff1 security-testing all
You can choose subset of distributions like:
Upload-component r4.3 core-qrexec 43f49f04f43b58748cad71fe1ec96a3925d76ff1 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.
The text was updated successfully, but these errors were encountered: