Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

gui-daemon v4.3.6 (r4.3) #5281

Closed
qubesos-bot opened this issue Nov 29, 2024 · 1 comment
Closed

gui-daemon v4.3.6 (r4.3) #5281

qubesos-bot opened this issue Nov 29, 2024 · 1 comment

Comments

@qubesos-bot
Copy link

Update of gui-daemon to v4.3.6 for Qubes OS r4.3, see comments below for details and build status.

From commit: QubesOS/qubes-gui-daemon@11703f4

Changes since previous version:
QubesOS/qubes-gui-daemon@11703f4 version 4.3.6
QubesOS/qubes-gui-daemon@62c9112 Leave defining _FORTIFY_SOURCE to distribution policy
QubesOS/qubes-gui-daemon@ed101ff Merge remote-tracking branch 'origin/pr/153'
QubesOS/qubes-gui-daemon@2af808a Merge remote-tracking branch 'origin/pr/157'
QubesOS/qubes-gui-daemon@2bde5bf Merge remote-tracking branch 'origin/pr/156'
QubesOS/qubes-gui-daemon@7b1e077 Merge remote-tracking branch 'origin/pr/154'
QubesOS/qubes-gui-daemon@5668522 Merge remote-tracking branch 'origin/pr/149'
QubesOS/qubes-gui-daemon@0e85ffe Add _NET_WM_PING support
QubesOS/qubes-gui-daemon@43326d1 Add _NET_WM_NAME & _NET_WM_ICON_NAME support
QubesOS/qubes-gui-daemon@debadbc Handle disable & none for secure copy/paste
QubesOS/qubes-gui-daemon@0d83229 Add event buffering for cloaking user input patterns
QubesOS/qubes-gui-daemon@3a74c63 Replace magic quotes with normal quotes in parse_vm_config
QubesOS/qubes-gui-daemon@b91c757 Typo fix, change "canot" to "cannot"
QubesOS/qubes-gui-daemon@8e3e502 change restrip to rstrip
QubesOS/qubes-gui-daemon@655d34b Move rstrip before split
QubesOS/qubes-gui-daemon@fd5274b remove trailing \x00 The trailing \x00 in the request header make the domain name as follow (domain\x00). Which cause a bug when listing domains using qubesadminapi. This bug occured when the icon-receiver is running on guivm other than dom0.
QubesOS/qubes-gui-daemon@9d3bcbc Update guivm service name

Referenced issues:
QubesOS/qubes-issues#9571
QubesOS/qubes-issues#6950
QubesOS/qubes-issues#8541
QubesOS/qubes-issues#1850
QubesOS/qubes-issues#9564
QubesOS/qubes-issues#9597

If you're release manager, you can issue GPG-inline signed command:

  • Upload-component r4.3 gui-daemon 11703f4c2c22c1157483e997a7b4511524430aa0 current all (available 5 days from now)
  • Upload-component r4.3 gui-daemon 11703f4c2c22c1157483e997a7b4511524430aa0 security-testing all

You can choose subset of distributions like:

  • Upload-component r4.3 gui-daemon 11703f4c2c22c1157483e997a7b4511524430aa0 current vm-bookworm,vm-fc37 (available 5 days from now)

Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).

For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.

@marmarek
Copy link
Member

marmarek commented Dec 3, 2024

Superseded by #5282

@marmarek marmarek closed this as completed Dec 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants