New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Qubes Builder: need to run 'make prepare-merge' twice to get all changes #1420

Open
adrelanos opened this Issue Nov 13, 2015 · 11 comments

Comments

Projects
None yet
3 participants
@adrelanos
Member

adrelanos commented Nov 13, 2015

Both, qubes-template-whonix and Whonix where at git tag 12.0.0.3.2-developers-only (same tag name).

In my local qubes-build AppVM, those were still at 12.0.0.3.0-developers-only. So I've run make prepare-merge. During the first run, only qubes-template-whonix was updated to tag 12.0.0.3.2-developers-only. Whonix stayed at 12.0.0.3.0-developers-only. It was set to 12.0.0.3.2-developers-only only after running make prepare-merge for a second time.

I would have expected both repositories to be at 12.0.0.3.2-developers-only with one run of make prepare-merge. Perhaps my expectation is wrong? Perhaps this is a bug that can be fixed?

Perhaps it's not that a big deal, because qubes-template-whonix having configured export BRANCH_Whonix = 12.0.0.3.2-developers-only would have checked out Whonix to 12.0.0.3.2-developers-only during the build process? (Not sure, but I think this is what happens.)

Log attached below.

user@qubes-build:~$ cd qubes-builder/
user@qubes-build:~/qubes-builder$ make prepare-merge 
+ '[' -n qubes-src/vmm-xen ']'
++ basename qubes-src/vmm-xen
+ COMPONENT=vmm-xen
+ '[' qubes-src/vmm-xen == . ']'
+ '[' -z vmm-xen ']'
+ '[' -z qubes-src/vmm-xen ']'
+ url_var=GIT_URL_vmm_xen
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-vmm-xen.git
+ '[' -n '' ']'
+ branch_var=BRANCH_vmm_xen
+ '[' -n xen-4.4 ']'
+ BRANCH=xen-4.4
+ echo '-> Updating sources for vmm-xen...'
-> Updating sources for vmm-xen...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-vmm-xen.git xen-4.4...'
--> Fetching from https://github.com/QubesOS/qubes-vmm-xen.git xen-4.4...
+ '[' qubes-src/vmm-xen == . -o -d qubes-src/vmm-xen -a '' '!=' 1 ']'
+ git -C qubes-src/vmm-xen fetch -q https://github.com/QubesOS/qubes-vmm-xen.git --tags xen-4.4
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn vmm-xen
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/vmm-xen FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/vmm-xen
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v4.4.3-9
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.8Cy3nE
+ git cat-file tag v4.4.3-9
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v4.4.3-9
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.8Cy3nE/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.8Cy3nE
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/core-vchan-xen ']'
++ basename qubes-src/core-vchan-xen
+ COMPONENT=core-vchan-xen
+ '[' qubes-src/core-vchan-xen == . ']'
+ '[' -z core-vchan-xen ']'
+ '[' -z qubes-src/core-vchan-xen ']'
+ url_var=GIT_URL_core_vchan_xen
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-core-vchan-xen.git
+ '[' -n '' ']'
+ branch_var=BRANCH_core_vchan_xen
+ '[' -n '' ']'
+ echo '-> Updating sources for core-vchan-xen...'
-> Updating sources for core-vchan-xen...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-core-vchan-xen.git master...'
--> Fetching from https://github.com/QubesOS/qubes-core-vchan-xen.git master...
+ '[' qubes-src/core-vchan-xen == . -o -d qubes-src/core-vchan-xen -a '' '!=' 1 ']'
+ git -C qubes-src/core-vchan-xen fetch -q https://github.com/QubesOS/qubes-core-vchan-xen.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn core-vchan-xen
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/core-vchan-xen FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/core-vchan-xen
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_0b146f29
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.kqO2vm
+ git cat-file tag mm_0b146f29
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_0b146f29
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.kqO2vm/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.kqO2vm
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/core-qubesdb ']'
++ basename qubes-src/core-qubesdb
+ COMPONENT=core-qubesdb
+ '[' qubes-src/core-qubesdb == . ']'
+ '[' -z core-qubesdb ']'
+ '[' -z qubes-src/core-qubesdb ']'
+ url_var=GIT_URL_core_qubesdb
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-core-qubesdb.git
+ '[' -n '' ']'
+ branch_var=BRANCH_core_qubesdb
+ '[' -n '' ']'
+ echo '-> Updating sources for core-qubesdb...'
-> Updating sources for core-qubesdb...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-core-qubesdb.git master...'
--> Fetching from https://github.com/QubesOS/qubes-core-qubesdb.git master...
+ '[' qubes-src/core-qubesdb == . -o -d qubes-src/core-qubesdb -a '' '!=' 1 ']'
+ git -C qubes-src/core-qubesdb fetch -q https://github.com/QubesOS/qubes-core-qubesdb.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn core-qubesdb
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/core-qubesdb FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/core-qubesdb
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_67b76e03
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.Kqb8M2
+ git cat-file tag mm_67b76e03
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_67b76e03
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.Kqb8M2/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.Kqb8M2
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/linux-utils ']'
++ basename qubes-src/linux-utils
+ COMPONENT=linux-utils
+ '[' qubes-src/linux-utils == . ']'
+ '[' -z linux-utils ']'
+ '[' -z qubes-src/linux-utils ']'
+ url_var=GIT_URL_linux_utils
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-linux-utils.git
+ '[' -n '' ']'
+ branch_var=BRANCH_linux_utils
+ '[' -n '' ']'
+ echo '-> Updating sources for linux-utils...'
-> Updating sources for linux-utils...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-linux-utils.git master...'
--> Fetching from https://github.com/QubesOS/qubes-linux-utils.git master...
+ '[' qubes-src/linux-utils == . -o -d qubes-src/linux-utils -a '' '!=' 1 ']'
+ git -C qubes-src/linux-utils fetch -q https://github.com/QubesOS/qubes-linux-utils.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn linux-utils
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/linux-utils FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/linux-utils
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_170d46c4
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.ITxMtF
+ git cat-file tag mm_170d46c4
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_170d46c4
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.ITxMtF/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.ITxMtF
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/core-agent-linux ']'
++ basename qubes-src/core-agent-linux
+ COMPONENT=core-agent-linux
+ '[' qubes-src/core-agent-linux == . ']'
+ '[' -z core-agent-linux ']'
+ '[' -z qubes-src/core-agent-linux ']'
+ url_var=GIT_URL_core_agent_linux
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-core-agent-linux.git
+ '[' -n '' ']'
+ branch_var=BRANCH_core_agent_linux
+ '[' -n '' ']'
+ echo '-> Updating sources for core-agent-linux...'
-> Updating sources for core-agent-linux...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-core-agent-linux.git master...'
--> Fetching from https://github.com/QubesOS/qubes-core-agent-linux.git master...
+ '[' qubes-src/core-agent-linux == . -o -d qubes-src/core-agent-linux -a '' '!=' 1 ']'
+ git -C qubes-src/core-agent-linux fetch -q https://github.com/QubesOS/qubes-core-agent-linux.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn core-agent-linux
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/core-agent-linux FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/core-agent-linux
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v3.1.3
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.myzGrP
+ git cat-file tag v3.1.3
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v3.1.3
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.myzGrP/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.myzGrP
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/gui-common ']'
++ basename qubes-src/gui-common
+ COMPONENT=gui-common
+ '[' qubes-src/gui-common == . ']'
+ '[' -z gui-common ']'
+ '[' -z qubes-src/gui-common ']'
+ url_var=GIT_URL_gui_common
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-gui-common.git
+ '[' -n '' ']'
+ branch_var=BRANCH_gui_common
+ '[' -n '' ']'
+ echo '-> Updating sources for gui-common...'
-> Updating sources for gui-common...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-gui-common.git master...'
--> Fetching from https://github.com/QubesOS/qubes-gui-common.git master...
+ '[' qubes-src/gui-common == . -o -d qubes-src/gui-common -a '' '!=' 1 ']'
+ git -C qubes-src/gui-common fetch -q https://github.com/QubesOS/qubes-gui-common.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn gui-common
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/gui-common FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/gui-common
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag R3.0
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.vsvkqC
+ git cat-file tag R3.0
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag R3.0
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.vsvkqC/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.vsvkqC
+ return 0
+ VALID_TAG_FOUND=1
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag R3.0-rc3
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.eVOYhg
+ git cat-file tag R3.0-rc3
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag R3.0-rc3
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.eVOYhg/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.eVOYhg
+ return 0
+ VALID_TAG_FOUND=1
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v3.0.3
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.d7wgj3
+ git cat-file tag v3.0.3
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v3.0.3
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.d7wgj3/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.d7wgj3
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/gui-agent-linux ']'
++ basename qubes-src/gui-agent-linux
+ COMPONENT=gui-agent-linux
+ '[' qubes-src/gui-agent-linux == . ']'
+ '[' -z gui-agent-linux ']'
+ '[' -z qubes-src/gui-agent-linux ']'
+ url_var=GIT_URL_gui_agent_linux
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-gui-agent-linux.git
+ '[' -n '' ']'
+ branch_var=BRANCH_gui_agent_linux
+ '[' -n '' ']'
+ echo '-> Updating sources for gui-agent-linux...'
-> Updating sources for gui-agent-linux...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-gui-agent-linux.git master...'
--> Fetching from https://github.com/QubesOS/qubes-gui-agent-linux.git master...
+ '[' qubes-src/gui-agent-linux == . -o -d qubes-src/gui-agent-linux -a '' '!=' 1 ']'
+ git -C qubes-src/gui-agent-linux fetch -q https://github.com/QubesOS/qubes-gui-agent-linux.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn gui-agent-linux
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/gui-agent-linux FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/gui-agent-linux
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_549a440e
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.Z0gHJ0
+ git cat-file tag mm_549a440e
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_549a440e
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.Z0gHJ0/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.Z0gHJ0
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/app-linux-split-gpg ']'
++ basename qubes-src/app-linux-split-gpg
+ COMPONENT=app-linux-split-gpg
+ '[' qubes-src/app-linux-split-gpg == . ']'
+ '[' -z app-linux-split-gpg ']'
+ '[' -z qubes-src/app-linux-split-gpg ']'
+ url_var=GIT_URL_app_linux_split_gpg
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-app-linux-split-gpg.git
+ '[' -n '' ']'
+ branch_var=BRANCH_app_linux_split_gpg
+ '[' -n '' ']'
+ echo '-> Updating sources for app-linux-split-gpg...'
-> Updating sources for app-linux-split-gpg...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-app-linux-split-gpg.git master...'
--> Fetching from https://github.com/QubesOS/qubes-app-linux-split-gpg.git master...
+ '[' qubes-src/app-linux-split-gpg == . -o -d qubes-src/app-linux-split-gpg -a '' '!=' 1 ']'
+ git -C qubes-src/app-linux-split-gpg fetch -q https://github.com/QubesOS/qubes-app-linux-split-gpg.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn app-linux-split-gpg
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/app-linux-split-gpg FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/app-linux-split-gpg
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v2.0.17
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.88fEva
+ git cat-file tag v2.0.17
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v2.0.17
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.88fEva/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.88fEva
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/app-linux-tor ']'
++ basename qubes-src/app-linux-tor
+ COMPONENT=app-linux-tor
+ '[' qubes-src/app-linux-tor == . ']'
+ '[' -z app-linux-tor ']'
+ '[' -z qubes-src/app-linux-tor ']'
+ url_var=GIT_URL_app_linux_tor
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-app-linux-tor.git
+ '[' -n '' ']'
+ branch_var=BRANCH_app_linux_tor
+ '[' -n '' ']'
+ echo '-> Updating sources for app-linux-tor...'
-> Updating sources for app-linux-tor...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-app-linux-tor.git master...'
--> Fetching from https://github.com/QubesOS/qubes-app-linux-tor.git master...
+ '[' qubes-src/app-linux-tor == . -o -d qubes-src/app-linux-tor -a '' '!=' 1 ']'
+ git -C qubes-src/app-linux-tor fetch -q https://github.com/QubesOS/qubes-app-linux-tor.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn app-linux-tor
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/app-linux-tor FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/app-linux-tor
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v0.1.12
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.sKhk88
+ git cat-file tag v0.1.12
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v0.1.12
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.sKhk88/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.sKhk88
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/app-thunderbird ']'
++ basename qubes-src/app-thunderbird
+ COMPONENT=app-thunderbird
+ '[' qubes-src/app-thunderbird == . ']'
+ '[' -z app-thunderbird ']'
+ '[' -z qubes-src/app-thunderbird ']'
+ url_var=GIT_URL_app_thunderbird
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-app-thunderbird.git
+ '[' -n '' ']'
+ branch_var=BRANCH_app_thunderbird
+ '[' -n '' ']'
+ echo '-> Updating sources for app-thunderbird...'
-> Updating sources for app-thunderbird...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-app-thunderbird.git master...'
--> Fetching from https://github.com/QubesOS/qubes-app-thunderbird.git master...
+ '[' qubes-src/app-thunderbird == . -o -d qubes-src/app-thunderbird -a '' '!=' 1 ']'
+ git -C qubes-src/app-thunderbird fetch -q https://github.com/QubesOS/qubes-app-thunderbird.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn app-thunderbird
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/app-thunderbird FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/app-thunderbird
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_21758ba3
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.vJkGs0
+ git cat-file tag mm_21758ba3
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_21758ba3
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.vJkGs0/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.vJkGs0
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/app-linux-pdf-converter ']'
++ basename qubes-src/app-linux-pdf-converter
+ COMPONENT=app-linux-pdf-converter
+ '[' qubes-src/app-linux-pdf-converter == . ']'
+ '[' -z app-linux-pdf-converter ']'
+ '[' -z qubes-src/app-linux-pdf-converter ']'
+ url_var=GIT_URL_app_linux_pdf_converter
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-app-linux-pdf-converter.git
+ '[' -n '' ']'
+ branch_var=BRANCH_app_linux_pdf_converter
+ '[' -n '' ']'
+ echo '-> Updating sources for app-linux-pdf-converter...'
-> Updating sources for app-linux-pdf-converter...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-app-linux-pdf-converter.git master...'
--> Fetching from https://github.com/QubesOS/qubes-app-linux-pdf-converter.git master...
+ '[' qubes-src/app-linux-pdf-converter == . -o -d qubes-src/app-linux-pdf-converter -a '' '!=' 1 ']'
+ git -C qubes-src/app-linux-pdf-converter fetch -q https://github.com/QubesOS/qubes-app-linux-pdf-converter.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn app-linux-pdf-converter
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/app-linux-pdf-converter FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/app-linux-pdf-converter
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_ec4422db
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.t4gARt
+ git cat-file tag mm_ec4422db
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_ec4422db
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.t4gARt/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.t4gARt
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/linux-template-builder ']'
++ basename qubes-src/linux-template-builder
+ COMPONENT=linux-template-builder
+ '[' qubes-src/linux-template-builder == . ']'
+ '[' -z linux-template-builder ']'
+ '[' -z qubes-src/linux-template-builder ']'
+ url_var=GIT_URL_linux_template_builder
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-linux-template-builder.git
+ '[' -n '' ']'
+ branch_var=BRANCH_linux_template_builder
+ '[' -n '' ']'
+ echo '-> Updating sources for linux-template-builder...'
-> Updating sources for linux-template-builder...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-linux-template-builder.git master...'
--> Fetching from https://github.com/QubesOS/qubes-linux-template-builder.git master...
+ '[' qubes-src/linux-template-builder == . -o -d qubes-src/linux-template-builder -a '' '!=' 1 ']'
+ git -C qubes-src/linux-template-builder fetch -q https://github.com/QubesOS/qubes-linux-template-builder.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn linux-template-builder
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/linux-template-builder FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/linux-template-builder
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_bdd06c77
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.8dJ8xV
+ git cat-file tag mm_bdd06c77
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_bdd06c77
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.8dJ8xV/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.8dJ8xV
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/template-whonix ']'
++ basename qubes-src/template-whonix
+ COMPONENT=template-whonix
+ '[' qubes-src/template-whonix == . ']'
+ '[' -z template-whonix ']'
+ '[' -z qubes-src/template-whonix ']'
+ url_var=GIT_URL_template_whonix
+ '[' -n '' ']'
+ '[' -n https://github.com/adrelanos/qubes-template-whonix.git ']'
+ GIT_URL=https://github.com/adrelanos/qubes-template-whonix.git
+ '[' -n '' ']'
+ branch_var=BRANCH_template_whonix
+ '[' -n master ']'
+ BRANCH=master
+ echo '-> Updating sources for template-whonix...'
-> Updating sources for template-whonix...
+ echo '--> Fetching from https://github.com/adrelanos/qubes-template-whonix.git master...'
--> Fetching from https://github.com/adrelanos/qubes-template-whonix.git master...
+ '[' qubes-src/template-whonix == . -o -d qubes-src/template-whonix -a '' '!=' 1 ']'
+ git -C qubes-src/template-whonix fetch -q https://github.com/adrelanos/qubes-template-whonix.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn template-whonix
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/template-whonix FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/template-whonix
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag 12.0.0.3.2-developers-only
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.zSHgAr
+ git cat-file tag 12.0.0.3.2-developers-only
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag 12.0.0.3.2-developers-only
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.zSHgAr/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.zSHgAr
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/Whonix ']'
++ basename qubes-src/Whonix
+ COMPONENT=Whonix
+ '[' qubes-src/Whonix == . ']'
+ '[' -z Whonix ']'
+ '[' -z qubes-src/Whonix ']'
+ url_var=GIT_URL_Whonix
+ '[' -n '' ']'
+ '[' -n https://github.com/Whonix/Whonix.git ']'
+ GIT_URL=https://github.com/Whonix/Whonix.git
+ '[' -n '' ']'
+ branch_var=BRANCH_Whonix
+ '[' -n 12.0.0.3.0-developers-only ']'
+ BRANCH=12.0.0.3.0-developers-only
+ echo '-> Updating sources for Whonix...'
-> Updating sources for Whonix...
+ echo '--> Fetching from https://github.com/Whonix/Whonix.git 12.0.0.3.0-developers-only...'
--> Fetching from https://github.com/Whonix/Whonix.git 12.0.0.3.0-developers-only...
+ '[' qubes-src/Whonix == . -o -d qubes-src/Whonix -a '' '!=' 1 ']'
+ git -C qubes-src/Whonix fetch -q https://github.com/Whonix/Whonix.git --tags 12.0.0.3.0-developers-only
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn Whonix
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/Whonix FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/Whonix
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag 12.0.0.3.0-developers-only
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.aDIDhW
+ git cat-file tag 12.0.0.3.0-developers-only
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag 12.0.0.3.0-developers-only
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.aDIDhW/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.aDIDhW
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n . ']'
++ basename .
+ COMPONENT=.
+ '[' . == . ']'
+ COMPONENT=builder
+ '[' -z builder ']'
+ '[' -z . ']'
+ url_var=GIT_URL_builder
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-builder.git
+ '[' -n '' ']'
+ branch_var=BRANCH_builder
+ '[' -n '' ']'
+ echo '-> Updating sources for builder...'
-> Updating sources for builder...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-builder.git master...'
--> Fetching from https://github.com/QubesOS/qubes-builder.git master...
+ '[' . == . -o -d . -a '' '!=' 1 ']'
+ git -C . fetch -q https://github.com/QubesOS/qubes-builder.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn builder
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag . FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd .
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_987905da
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.4Z9JZG
+ git cat-file tag mm_987905da
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_987905da
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.4Z9JZG/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.4Z9JZG
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

Changes to be merged:
> vmm-xen fast-forward: git merge FETCH_HEAD
78c3ba1 version 4.4.3-9
4068d20 Apply XSA 149-153
7f23fd5 Restore VM udev script fix
> core-qubesdb fast-forward: git merge FETCH_HEAD
67b76e0 rpm: disable debuginfo subpackage in qubes-kernel-vm-support
> linux-utils fast-forward: git merge FETCH_HEAD
170d46c rpm: disable debuginfo subpackage in qubes-kernel-vm-support
83c03af Merge remote-tracking branch 'qubesos/pr/1'
3826f40 Merge remote-tracking branch 'origin/pr/2'
74a1b4c Check if QubesIncoming filesystem supports O_TMPFILE
5b250eb version 3.1.3
dfe5c11 qrexec: define NOGUI_CMD_PREFIX
64331d7 dracut: add a safety check preventing qubes_cow_setup.sh running in dom0
3cd77e4 debian: introduce qubes-kernel-vm-support package
25c05a3 dracut: add dmsetup --noudevsync since we're running in pre-udev hook
aaf84ba kernel-modules: build/install u2mfn module by default
789e9c2 dracut: mount only subdirectory of /lib/modules
42469fd dracut: fix qubes-vm module dependencies
882052e dracut: split 'full' dracut module into 'full-dmroot' and 'full-modules'
ec9f128 Fix u2mfn.ko for > 16TB RAM by not truncating to 32-bit improperly
> core-agent-linux fast-forward: git merge FETCH_HEAD
5d74a8c version 3.1.3
2a589f2 updates-proxy: use separate directory for PID file
90b4398 Merge remote-tracking branch 'origin/pr/43'
1643874 Bump qubes-utils version requirement
49c7473 dom0-updates: do not use 'yum check-update -q'
3466f3d systemd: make sure that update check is started only after qrexec-agent
7cca1b2 Get rid of qubes-core-vm-kernel-placeholder
ba28c9f fedora: do not require/use yum-plugin-post-transaction-actions in F>=22
b6cfcdc Implement dnf hooks for post-update actions
f9c7394 updates-proxy-setup: use temporary file for config snippet
85793fa dom0-updates: use yum-deprecated instead of dnf in all calls
f32dccb preset disable tinyproxy by default
074309e dracut: disable hostonly mode
823954c qrexec: use #define for protocol-specified strings
b6d4f5a qrexec: add some comments, minor improvement in readability
1c41ca6 Merge remote-tracking branch 'origin/pr/42'
0c33c73 dropins: implement dropins for systemd user starting with pulseaudio systemd service and socket masking
ce47255 dropins: make current systemd dropins specific to systemd-system in order to introduce dropins for systemd-user
5102e4f fedora: Add skip_if_unavailable=False to Qubes repositories
4b53320 add DROPINS for org.cups.cupsd systemd files.
> app-linux-split-gpg fast-forward: git merge FETCH_HEAD
6bae7f1 version 2.0.17
ab4000d Merge remote-tracking branch 'qubesos/pr/1'
e7db5ee version 2.0.16
f4a47a6 Merge remote-tracking branch 'qubesos/pr/2'
3bb1f8e Use gpg2 by default
a0f85a5 Split GPG depends on zenity for user prompts
> linux-template-builder fast-forward: git merge FETCH_HEAD
bdd06c7 create_template_list.sh enhancements
> template-whonix fast-forward: git merge FETCH_HEAD
27582fe updated to 12.0.0.3.2-developers-only
> . fast-forward: git merge FETCH_HEAD
987905d Do not call update-repo-installer on qubes-builder itself during 'make iso'
b8b625c make do-merge, added --ff to prevent merge commit
a5c9b32 Merge remote-tracking branch 'qubesos/pr/2'
a7a48fd fix typo
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ make do-merge 
Merging FETCH_HEAD into qubes-src/vmm-xen
Updating 1a9f13f..78c3ba1
Fast-forward
 debian-vm/debian/changelog              |   7 ++++
 patches.security/xsa149.patch           |  20 +++++++++++
 patches.security/xsa150.patch           | 201 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 patches.security/xsa151.patch           |  28 ++++++++++++++++
 patches.security/xsa152-4.5.patch       |  41 +++++++++++++++++++++++
 patches.security/xsa153-4.4-libxl.patch |  86 +++++++++++++++++++++++++++++++++++++++++++++++
 rel                                     |   2 +-
 series.conf                             |   6 ++++
 8 files changed, 390 insertions(+), 1 deletion(-)
 create mode 100644 patches.security/xsa149.patch
 create mode 100644 patches.security/xsa150.patch
 create mode 100644 patches.security/xsa151.patch
 create mode 100644 patches.security/xsa152-4.5.patch
 create mode 100644 patches.security/xsa153-4.4-libxl.patch
Merging FETCH_HEAD into qubes-src/core-vchan-xen
Already up-to-date.
Merging FETCH_HEAD into qubes-src/core-qubesdb
Updating cc87444..67b76e0
Fast-forward
 rpm_spec/qubes-db-dom0.spec | 3 +++
 rpm_spec/qubes-db-vm.spec   | 3 +++
 2 files changed, 6 insertions(+)
Merging FETCH_HEAD into qubes-src/linux-utils
Updating d1238ce..170d46c
Fast-forward
 Makefile                                     |  8 +++++++-
 debian/changelog                             | 17 +++++++++++++++++
 debian/control                               | 14 +++++++++++++-
 debian/qubes-kernel-vm-support.dkms          |  1 +
 debian/qubes-kernel-vm-support.install       |  3 +++
 debian/qubes-utils.install                   |  6 ++++++
 debian/rules                                 |  5 +++--
 dracut/Makefile                              |  3 ++-
 dracut/{full => full-dmroot}/Makefile        |  2 +-
 dracut/{full => full-dmroot}/module-setup.sh |  8 ++++++--
 dracut/full-dmroot/qubes_cow_setup.sh        | 89 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 dracut/full-modules/Makefile                 |  4 ++++
 dracut/full-modules/module-setup.sh          |  9 +++++++++
 dracut/full-modules/mount_modules.sh         | 25 +++++++++++++++++++++++++
 dracut/full/mount_modules.sh                 | 14 --------------
 dracut/full/qubes_cow_setup.sh               | 48 ------------------------------------------------
 dracut/simple/init.sh                        | 15 +++++++++++++--
 initramfs-tools/Makefile                     |  6 ++++++
 initramfs-tools/local-top/qubes_cow_setup.sh |  1 +
 initramfs-tools/qubes_vm                     | 21 +++++++++++++++++++++
 kernel-modules/u2mfn/dkms.conf.in            |  1 +
 qrexec-lib/qrexec.h                          |  3 +++
 qrexec-lib/unpack.c                          | 10 +++++-----
 rpm_spec/qubes-kernel-vm-support.spec        |  6 +++++-
 version                                      |  2 +-
 25 files changed, 242 insertions(+), 79 deletions(-)
 create mode 100644 debian/qubes-kernel-vm-support.dkms
 create mode 100644 debian/qubes-kernel-vm-support.install
 create mode 100644 debian/qubes-utils.install
 rename dracut/{full => full-dmroot}/Makefile (65%)
 rename dracut/{full => full-dmroot}/module-setup.sh (59%)
 create mode 100644 dracut/full-dmroot/qubes_cow_setup.sh
 create mode 100644 dracut/full-modules/Makefile
 create mode 100644 dracut/full-modules/module-setup.sh
 create mode 100644 dracut/full-modules/mount_modules.sh
 delete mode 100644 dracut/full/mount_modules.sh
 delete mode 100644 dracut/full/qubes_cow_setup.sh
 create mode 100644 initramfs-tools/Makefile
 create mode 120000 initramfs-tools/local-top/qubes_cow_setup.sh
 create mode 100755 initramfs-tools/qubes_vm
Merging FETCH_HEAD into qubes-src/core-agent-linux
Updating d44c8ac..5d74a8c
Fast-forward
 Makefile                                           | 54 ++++++++++++++++++++++++++++++++++++++----------------
 Makefile.builder                                   |  3 +--
 archlinux/PKGBUILD.install                         |  3 ---
 debian/changelog                                   | 87 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 debian/control                                     |  7 ++-----
 misc/dnf-qubes-hooks.conf                          |  4 ++++
 misc/dnf-qubes-hooks.py                            | 62 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 misc/dracut-qubes.conf                             |  4 ++++
 misc/qubes-download-dom0-updates.sh                | 30 ++++++++++++++++++++----------
 misc/qubes-r3.repo                                 |  3 +++
 network/tinyproxy-updates.conf                     |  2 +-
 network/update-proxy-configs                       |  6 ++++--
 qrexec/qrexec-agent.c                              | 28 +++++++++++++++++++++++-----
 rpm_spec/core-vm-kernel-placeholder.spec           | 36 ------------------------------------
 rpm_spec/core-vm.spec                              | 26 ++++++++++++++++++++------
 version                                            |  2 +-
 vm-init.d/qubes-updates-proxy                      |  2 +-
 vm-systemd/75-qubes-vm.preset                      |  2 ++
 vm-systemd/org.cups.cupsd.path.d/30_qubes.conf     |  2 ++
 vm-systemd/org.cups.cupsd.service.d/30_qubes.conf  |  2 ++
 vm-systemd/org.cups.cupsd.socket.d/30_qubes.conf   |  2 ++
 vm-systemd/qubes-core-agent-linux.tmpfiles         |  1 +
 vm-systemd/qubes-update-check.service              |  1 +
 vm-systemd/qubes-updates-proxy.service             |  1 -
 vm-systemd/user/pulseaudio.service.d/30_qubes.conf |  4 ++++
 vm-systemd/user/pulseaudio.socket.d/30_qubes.conf  |  4 ++++
 26 files changed, 289 insertions(+), 89 deletions(-)
 create mode 100644 misc/dnf-qubes-hooks.conf
 create mode 100644 misc/dnf-qubes-hooks.py
 create mode 100644 misc/dracut-qubes.conf
 delete mode 100644 rpm_spec/core-vm-kernel-placeholder.spec
 create mode 100644 vm-systemd/org.cups.cupsd.path.d/30_qubes.conf
 create mode 100644 vm-systemd/org.cups.cupsd.service.d/30_qubes.conf
 create mode 100644 vm-systemd/org.cups.cupsd.socket.d/30_qubes.conf
 create mode 100644 vm-systemd/qubes-core-agent-linux.tmpfiles
 create mode 100644 vm-systemd/user/pulseaudio.service.d/30_qubes.conf
 create mode 100644 vm-systemd/user/pulseaudio.socket.d/30_qubes.conf
Merging FETCH_HEAD into qubes-src/gui-common
Already up-to-date.
Merging FETCH_HEAD into qubes-src/gui-agent-linux
Already up-to-date.
Merging FETCH_HEAD into qubes-src/app-linux-split-gpg
Updating 1b6cb58..6bae7f1
Fast-forward
 debian/changelog  | 14 ++++++++++++++
 qubes.Gpg.service |  2 +-
 version           |  2 +-
 3 files changed, 16 insertions(+), 2 deletions(-)
Merging FETCH_HEAD into qubes-src/app-linux-tor
Already up-to-date.
Merging FETCH_HEAD into qubes-src/app-thunderbird
Already up-to-date.
Merging FETCH_HEAD into qubes-src/app-linux-pdf-converter
Already up-to-date.
Merging FETCH_HEAD into qubes-src/linux-template-builder
Updating 24f3f78..bdd06c7
Fast-forward
 create_template_list.sh | 21 +++++++++++++++------
 1 file changed, 15 insertions(+), 6 deletions(-)
Merging FETCH_HEAD into qubes-src/template-whonix
Updating 3619307..27582fe
Fast-forward
 components.conf | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
Merging FETCH_HEAD into qubes-src/Whonix
Already up-to-date.
Merging FETCH_HEAD into .
Updating 0d9d36c..987905d
Fast-forward
 Makefile                           | 4 ++--
 example-configs/qubes-os-r3.0.conf | 2 +-
 2 files changed, 3 insertions(+), 3 deletions(-)
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ make prepare-merge 
+ '[' -n qubes-src/vmm-xen ']'
++ basename qubes-src/vmm-xen
+ COMPONENT=vmm-xen
+ '[' qubes-src/vmm-xen == . ']'
+ '[' -z vmm-xen ']'
+ '[' -z qubes-src/vmm-xen ']'
+ url_var=GIT_URL_vmm_xen
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-vmm-xen.git
+ '[' -n '' ']'
+ branch_var=BRANCH_vmm_xen
+ '[' -n xen-4.4 ']'
+ BRANCH=xen-4.4
+ echo '-> Updating sources for vmm-xen...'
-> Updating sources for vmm-xen...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-vmm-xen.git xen-4.4...'
--> Fetching from https://github.com/QubesOS/qubes-vmm-xen.git xen-4.4...
+ '[' qubes-src/vmm-xen == . -o -d qubes-src/vmm-xen -a '' '!=' 1 ']'
+ git -C qubes-src/vmm-xen fetch -q https://github.com/QubesOS/qubes-vmm-xen.git --tags xen-4.4
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn vmm-xen
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/vmm-xen FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/vmm-xen
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v4.4.3-9
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.eH1G23
+ git cat-file tag v4.4.3-9
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v4.4.3-9
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.eH1G23/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.eH1G23
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/core-vchan-xen ']'
++ basename qubes-src/core-vchan-xen
+ COMPONENT=core-vchan-xen
+ '[' qubes-src/core-vchan-xen == . ']'
+ '[' -z core-vchan-xen ']'
+ '[' -z qubes-src/core-vchan-xen ']'
+ url_var=GIT_URL_core_vchan_xen
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-core-vchan-xen.git
+ '[' -n '' ']'
+ branch_var=BRANCH_core_vchan_xen
+ '[' -n '' ']'
+ echo '-> Updating sources for core-vchan-xen...'
-> Updating sources for core-vchan-xen...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-core-vchan-xen.git master...'
--> Fetching from https://github.com/QubesOS/qubes-core-vchan-xen.git master...
+ '[' qubes-src/core-vchan-xen == . -o -d qubes-src/core-vchan-xen -a '' '!=' 1 ']'
+ git -C qubes-src/core-vchan-xen fetch -q https://github.com/QubesOS/qubes-core-vchan-xen.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn core-vchan-xen
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/core-vchan-xen FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/core-vchan-xen
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_0b146f29
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.2E0JAm
+ git cat-file tag mm_0b146f29
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_0b146f29
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.2E0JAm/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.2E0JAm
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/core-qubesdb ']'
++ basename qubes-src/core-qubesdb
+ COMPONENT=core-qubesdb
+ '[' qubes-src/core-qubesdb == . ']'
+ '[' -z core-qubesdb ']'
+ '[' -z qubes-src/core-qubesdb ']'
+ url_var=GIT_URL_core_qubesdb
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-core-qubesdb.git
+ '[' -n '' ']'
+ branch_var=BRANCH_core_qubesdb
+ '[' -n '' ']'
+ echo '-> Updating sources for core-qubesdb...'
-> Updating sources for core-qubesdb...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-core-qubesdb.git master...'
--> Fetching from https://github.com/QubesOS/qubes-core-qubesdb.git master...
+ '[' qubes-src/core-qubesdb == . -o -d qubes-src/core-qubesdb -a '' '!=' 1 ']'
+ git -C qubes-src/core-qubesdb fetch -q https://github.com/QubesOS/qubes-core-qubesdb.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn core-qubesdb
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/core-qubesdb FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/core-qubesdb
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_67b76e03
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.SKsP8L
+ git cat-file tag mm_67b76e03
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_67b76e03
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.SKsP8L/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.SKsP8L
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/linux-utils ']'
++ basename qubes-src/linux-utils
+ COMPONENT=linux-utils
+ '[' qubes-src/linux-utils == . ']'
+ '[' -z linux-utils ']'
+ '[' -z qubes-src/linux-utils ']'
+ url_var=GIT_URL_linux_utils
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-linux-utils.git
+ '[' -n '' ']'
+ branch_var=BRANCH_linux_utils
+ '[' -n '' ']'
+ echo '-> Updating sources for linux-utils...'
-> Updating sources for linux-utils...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-linux-utils.git master...'
--> Fetching from https://github.com/QubesOS/qubes-linux-utils.git master...
+ '[' qubes-src/linux-utils == . -o -d qubes-src/linux-utils -a '' '!=' 1 ']'
+ git -C qubes-src/linux-utils fetch -q https://github.com/QubesOS/qubes-linux-utils.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn linux-utils
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/linux-utils FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/linux-utils
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_170d46c4
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.xzISw7
+ git cat-file tag mm_170d46c4
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_170d46c4
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.xzISw7/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.xzISw7
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/core-agent-linux ']'
++ basename qubes-src/core-agent-linux
+ COMPONENT=core-agent-linux
+ '[' qubes-src/core-agent-linux == . ']'
+ '[' -z core-agent-linux ']'
+ '[' -z qubes-src/core-agent-linux ']'
+ url_var=GIT_URL_core_agent_linux
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-core-agent-linux.git
+ '[' -n '' ']'
+ branch_var=BRANCH_core_agent_linux
+ '[' -n '' ']'
+ echo '-> Updating sources for core-agent-linux...'
-> Updating sources for core-agent-linux...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-core-agent-linux.git master...'
--> Fetching from https://github.com/QubesOS/qubes-core-agent-linux.git master...
+ '[' qubes-src/core-agent-linux == . -o -d qubes-src/core-agent-linux -a '' '!=' 1 ']'
+ git -C qubes-src/core-agent-linux fetch -q https://github.com/QubesOS/qubes-core-agent-linux.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn core-agent-linux
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/core-agent-linux FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/core-agent-linux
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v3.1.3
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.zcM1jd
+ git cat-file tag v3.1.3
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v3.1.3
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.zcM1jd/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.zcM1jd
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/gui-common ']'
++ basename qubes-src/gui-common
+ COMPONENT=gui-common
+ '[' qubes-src/gui-common == . ']'
+ '[' -z gui-common ']'
+ '[' -z qubes-src/gui-common ']'
+ url_var=GIT_URL_gui_common
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-gui-common.git
+ '[' -n '' ']'
+ branch_var=BRANCH_gui_common
+ '[' -n '' ']'
+ echo '-> Updating sources for gui-common...'
-> Updating sources for gui-common...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-gui-common.git master...'
--> Fetching from https://github.com/QubesOS/qubes-gui-common.git master...
+ '[' qubes-src/gui-common == . -o -d qubes-src/gui-common -a '' '!=' 1 ']'
+ git -C qubes-src/gui-common fetch -q https://github.com/QubesOS/qubes-gui-common.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn gui-common
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/gui-common FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/gui-common
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag R3.0
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.fjAuZ2
+ git cat-file tag R3.0
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag R3.0
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.fjAuZ2/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.fjAuZ2
+ return 0
+ VALID_TAG_FOUND=1
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag R3.0-rc3
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.ozawDw
+ git cat-file tag R3.0-rc3
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag R3.0-rc3
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.ozawDw/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.ozawDw
+ return 0
+ VALID_TAG_FOUND=1
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v3.0.3
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.4tvaaW
+ git cat-file tag v3.0.3
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v3.0.3
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.4tvaaW/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.4tvaaW
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/gui-agent-linux ']'
++ basename qubes-src/gui-agent-linux
+ COMPONENT=gui-agent-linux
+ '[' qubes-src/gui-agent-linux == . ']'
+ '[' -z gui-agent-linux ']'
+ '[' -z qubes-src/gui-agent-linux ']'
+ url_var=GIT_URL_gui_agent_linux
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-gui-agent-linux.git
+ '[' -n '' ']'
+ branch_var=BRANCH_gui_agent_linux
+ '[' -n '' ']'
+ echo '-> Updating sources for gui-agent-linux...'
-> Updating sources for gui-agent-linux...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-gui-agent-linux.git master...'
--> Fetching from https://github.com/QubesOS/qubes-gui-agent-linux.git master...
+ '[' qubes-src/gui-agent-linux == . -o -d qubes-src/gui-agent-linux -a '' '!=' 1 ']'
+ git -C qubes-src/gui-agent-linux fetch -q https://github.com/QubesOS/qubes-gui-agent-linux.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn gui-agent-linux
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/gui-agent-linux FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/gui-agent-linux
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_549a440e
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.Lmj7GM
+ git cat-file tag mm_549a440e
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_549a440e
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.Lmj7GM/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.Lmj7GM
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/app-linux-split-gpg ']'
++ basename qubes-src/app-linux-split-gpg
+ COMPONENT=app-linux-split-gpg
+ '[' qubes-src/app-linux-split-gpg == . ']'
+ '[' -z app-linux-split-gpg ']'
+ '[' -z qubes-src/app-linux-split-gpg ']'
+ url_var=GIT_URL_app_linux_split_gpg
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-app-linux-split-gpg.git
+ '[' -n '' ']'
+ branch_var=BRANCH_app_linux_split_gpg
+ '[' -n '' ']'
+ echo '-> Updating sources for app-linux-split-gpg...'
-> Updating sources for app-linux-split-gpg...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-app-linux-split-gpg.git master...'
--> Fetching from https://github.com/QubesOS/qubes-app-linux-split-gpg.git master...
+ '[' qubes-src/app-linux-split-gpg == . -o -d qubes-src/app-linux-split-gpg -a '' '!=' 1 ']'
+ git -C qubes-src/app-linux-split-gpg fetch -q https://github.com/QubesOS/qubes-app-linux-split-gpg.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn app-linux-split-gpg
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/app-linux-split-gpg FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/app-linux-split-gpg
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v2.0.17
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.2WDnxR
+ git cat-file tag v2.0.17
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v2.0.17
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.2WDnxR/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.2WDnxR
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/app-linux-tor ']'
++ basename qubes-src/app-linux-tor
+ COMPONENT=app-linux-tor
+ '[' qubes-src/app-linux-tor == . ']'
+ '[' -z app-linux-tor ']'
+ '[' -z qubes-src/app-linux-tor ']'
+ url_var=GIT_URL_app_linux_tor
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-app-linux-tor.git
+ '[' -n '' ']'
+ branch_var=BRANCH_app_linux_tor
+ '[' -n '' ']'
+ echo '-> Updating sources for app-linux-tor...'
-> Updating sources for app-linux-tor...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-app-linux-tor.git master...'
--> Fetching from https://github.com/QubesOS/qubes-app-linux-tor.git master...
+ '[' qubes-src/app-linux-tor == . -o -d qubes-src/app-linux-tor -a '' '!=' 1 ']'
+ git -C qubes-src/app-linux-tor fetch -q https://github.com/QubesOS/qubes-app-linux-tor.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn app-linux-tor
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/app-linux-tor FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/app-linux-tor
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag v0.1.12
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.zfvMRz
+ git cat-file tag v0.1.12
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag v0.1.12
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.zfvMRz/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.zfvMRz
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/app-thunderbird ']'
++ basename qubes-src/app-thunderbird
+ COMPONENT=app-thunderbird
+ '[' qubes-src/app-thunderbird == . ']'
+ '[' -z app-thunderbird ']'
+ '[' -z qubes-src/app-thunderbird ']'
+ url_var=GIT_URL_app_thunderbird
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-app-thunderbird.git
+ '[' -n '' ']'
+ branch_var=BRANCH_app_thunderbird
+ '[' -n '' ']'
+ echo '-> Updating sources for app-thunderbird...'
-> Updating sources for app-thunderbird...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-app-thunderbird.git master...'
--> Fetching from https://github.com/QubesOS/qubes-app-thunderbird.git master...
+ '[' qubes-src/app-thunderbird == . -o -d qubes-src/app-thunderbird -a '' '!=' 1 ']'
+ git -C qubes-src/app-thunderbird fetch -q https://github.com/QubesOS/qubes-app-thunderbird.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn app-thunderbird
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/app-thunderbird FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/app-thunderbird
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_21758ba3
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.OS1NGq
+ git cat-file tag mm_21758ba3
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_21758ba3
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.OS1NGq/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.OS1NGq
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/app-linux-pdf-converter ']'
++ basename qubes-src/app-linux-pdf-converter
+ COMPONENT=app-linux-pdf-converter
+ '[' qubes-src/app-linux-pdf-converter == . ']'
+ '[' -z app-linux-pdf-converter ']'
+ '[' -z qubes-src/app-linux-pdf-converter ']'
+ url_var=GIT_URL_app_linux_pdf_converter
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-app-linux-pdf-converter.git
+ '[' -n '' ']'
+ branch_var=BRANCH_app_linux_pdf_converter
+ '[' -n '' ']'
+ echo '-> Updating sources for app-linux-pdf-converter...'
-> Updating sources for app-linux-pdf-converter...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-app-linux-pdf-converter.git master...'
--> Fetching from https://github.com/QubesOS/qubes-app-linux-pdf-converter.git master...
+ '[' qubes-src/app-linux-pdf-converter == . -o -d qubes-src/app-linux-pdf-converter -a '' '!=' 1 ']'
+ git -C qubes-src/app-linux-pdf-converter fetch -q https://github.com/QubesOS/qubes-app-linux-pdf-converter.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn app-linux-pdf-converter
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/app-linux-pdf-converter FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/app-linux-pdf-converter
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_ec4422db
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.F757zr
+ git cat-file tag mm_ec4422db
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_ec4422db
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.F757zr/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.F757zr
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/linux-template-builder ']'
++ basename qubes-src/linux-template-builder
+ COMPONENT=linux-template-builder
+ '[' qubes-src/linux-template-builder == . ']'
+ '[' -z linux-template-builder ']'
+ '[' -z qubes-src/linux-template-builder ']'
+ url_var=GIT_URL_linux_template_builder
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-linux-template-builder.git
+ '[' -n '' ']'
+ branch_var=BRANCH_linux_template_builder
+ '[' -n '' ']'
+ echo '-> Updating sources for linux-template-builder...'
-> Updating sources for linux-template-builder...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-linux-template-builder.git master...'
--> Fetching from https://github.com/QubesOS/qubes-linux-template-builder.git master...
+ '[' qubes-src/linux-template-builder == . -o -d qubes-src/linux-template-builder -a '' '!=' 1 ']'
+ git -C qubes-src/linux-template-builder fetch -q https://github.com/QubesOS/qubes-linux-template-builder.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn linux-template-builder
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/linux-template-builder FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/linux-template-builder
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_bdd06c77
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.q0lPhO
+ git cat-file tag mm_bdd06c77
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_bdd06c77
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.q0lPhO/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.q0lPhO
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/template-whonix ']'
++ basename qubes-src/template-whonix
+ COMPONENT=template-whonix
+ '[' qubes-src/template-whonix == . ']'
+ '[' -z template-whonix ']'
+ '[' -z qubes-src/template-whonix ']'
+ url_var=GIT_URL_template_whonix
+ '[' -n '' ']'
+ '[' -n https://github.com/adrelanos/qubes-template-whonix.git ']'
+ GIT_URL=https://github.com/adrelanos/qubes-template-whonix.git
+ '[' -n '' ']'
+ branch_var=BRANCH_template_whonix
+ '[' -n master ']'
+ BRANCH=master
+ echo '-> Updating sources for template-whonix...'
-> Updating sources for template-whonix...
+ echo '--> Fetching from https://github.com/adrelanos/qubes-template-whonix.git master...'
--> Fetching from https://github.com/adrelanos/qubes-template-whonix.git master...
+ '[' qubes-src/template-whonix == . -o -d qubes-src/template-whonix -a '' '!=' 1 ']'
+ git -C qubes-src/template-whonix fetch -q https://github.com/adrelanos/qubes-template-whonix.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn template-whonix
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/template-whonix FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/template-whonix
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag 12.0.0.3.2-developers-only
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.rcZj2I
+ git cat-file tag 12.0.0.3.2-developers-only
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag 12.0.0.3.2-developers-only
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.rcZj2I/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.rcZj2I
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n qubes-src/Whonix ']'
++ basename qubes-src/Whonix
+ COMPONENT=Whonix
+ '[' qubes-src/Whonix == . ']'
+ '[' -z Whonix ']'
+ '[' -z qubes-src/Whonix ']'
+ url_var=GIT_URL_Whonix
+ '[' -n '' ']'
+ '[' -n https://github.com/Whonix/Whonix.git ']'
+ GIT_URL=https://github.com/Whonix/Whonix.git
+ '[' -n '' ']'
+ branch_var=BRANCH_Whonix
+ '[' -n 12.0.0.3.2-developers-only ']'
+ BRANCH=12.0.0.3.2-developers-only
+ echo '-> Updating sources for Whonix...'
-> Updating sources for Whonix...
+ echo '--> Fetching from https://github.com/Whonix/Whonix.git 12.0.0.3.2-developers-only...'
--> Fetching from https://github.com/Whonix/Whonix.git 12.0.0.3.2-developers-only...
+ '[' qubes-src/Whonix == . -o -d qubes-src/Whonix -a '' '!=' 1 ']'
+ git -C qubes-src/Whonix fetch -q https://github.com/Whonix/Whonix.git --tags 12.0.0.3.2-developers-only
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn Whonix
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag qubes-src/Whonix FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd qubes-src/Whonix
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag 12.0.0.3.2-developers-only
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.loUeuY
+ git cat-file tag 12.0.0.3.2-developers-only
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag 12.0.0.3.2-developers-only
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.loUeuY/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.loUeuY
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

+ '[' -n . ']'
++ basename .
+ COMPONENT=.
+ '[' . == . ']'
+ COMPONENT=builder
+ '[' -z builder ']'
+ '[' -z . ']'
+ url_var=GIT_URL_builder
+ '[' -n '' ']'
+ '[' -n '' ']'
+ GIT_URL=https://github.com/QubesOS/qubes-builder.git
+ '[' -n '' ']'
+ branch_var=BRANCH_builder
+ '[' -n '' ']'
+ echo '-> Updating sources for builder...'
-> Updating sources for builder...
+ echo '--> Fetching from https://github.com/QubesOS/qubes-builder.git master...'
--> Fetching from https://github.com/QubesOS/qubes-builder.git master...
+ '[' . == . -o -d . -a '' '!=' 1 ']'
+ git -C . fetch -q https://github.com/QubesOS/qubes-builder.git --tags master
+ VERIFY_REF=FETCH_HEAD
+ verify=true
+ '[' '' == 1 ']'
+ elementIn builder
+ local element
+ return 1
+ '[' true == true ']'
+ echo '--> Verifying tags...'
--> Verifying tags...
+ /home/user/qubes-builder/scripts/verify-git-tag . FETCH_HEAD
+ set -o pipefail
+ '[' '' == 1 ']'
+ '[' -n /home/user/qubes-builder/keyrings/git ']'
++ readlink -m /home/user/qubes-builder/keyrings/git
+ export GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ GNUPGHOME=/home/user/qubes-builder/keyrings/git
+ '[' '!' -d /home/user/qubes-builder/keyrings/git ']'
+ '[' qubes-developers-keys.asc -nt /home/user/qubes-builder/keyrings/git/pubring.gpg ']'
+ pushd .
+ '[' -n FETCH_HEAD ']'
+ REF=FETCH_HEAD
+ VALID_TAG_FOUND=0
++ git tag --points-at=FETCH_HEAD
+ for tag in '$(git tag --points-at="$REF")'
+ verify_tag mm_987905da
+ sig_header='-----BEGIN PGP SIGNATURE-----'
++ mktemp -d sig-verify.XXXXXX
+ temp_name=sig-verify.yy0WpL
+ git cat-file tag mm_987905da
+ sed '/-----BEGIN PGP SIGNATURE-----/,//d'
+ git cat-file tag mm_987905da
+ sed -n '/-----BEGIN PGP SIGNATURE-----/,//p'
+ gpg --verify --status-fd=1 sig-verify.yy0WpL/content.asc
+ grep -q '^\[GNUPG:\] TRUST_\(FULLY\|ULTIMATE\)$'
+ ret=0
+ rm -r sig-verify.yy0WpL
+ return 0
+ VALID_TAG_FOUND=1
+ '[' 1 -eq 0 ']'
+ exit 0
+ '[' 1 '!=' 1 ']'
+ echo

Changes to be merged:
> Whonix merge: git merge FETCH_HEAD
ec26388 .
5a31f2f .
user@qubes-build:~/qubes-builder$ 
user@qubes-build:~/qubes-builder$ make do-merge 
Merging FETCH_HEAD into qubes-src/vmm-xen
Already up-to-date.
Merging FETCH_HEAD into qubes-src/core-vchan-xen
Already up-to-date.
Merging FETCH_HEAD into qubes-src/core-qubesdb
Already up-to-date.
Merging FETCH_HEAD into qubes-src/linux-utils
Already up-to-date.
Merging FETCH_HEAD into qubes-src/core-agent-linux
Already up-to-date.
Merging FETCH_HEAD into qubes-src/gui-common
Already up-to-date.
Merging FETCH_HEAD into qubes-src/gui-agent-linux
Already up-to-date.
Merging FETCH_HEAD into qubes-src/app-linux-split-gpg
Already up-to-date.
Merging FETCH_HEAD into qubes-src/app-linux-tor
Already up-to-date.
Merging FETCH_HEAD into qubes-src/app-thunderbird
Already up-to-date.
Merging FETCH_HEAD into qubes-src/app-linux-pdf-converter
Already up-to-date.
Merging FETCH_HEAD into qubes-src/linux-template-builder
Already up-to-date.
Merging FETCH_HEAD into qubes-src/template-whonix
Already up-to-date.
Merging FETCH_HEAD into qubes-src/Whonix
Merge made by the 'recursive' strategy.
 packages/anon-meta-packages          | 2 +-
 packages/apparmor-profile-icedove    | 2 +-
 packages/apparmor-profile-torbrowser | 2 +-
 packages/qubes-whonix                | 2 +-
 packages/whonix-developer-meta-files | 2 +-
 packages/whonix-legacy               | 2 +-
 packages/whonixcheck                 | 2 +-
 7 files changed, 7 insertions(+), 7 deletions(-)
Merging FETCH_HEAD into .
Already up-to-date.
user@qubes-build:~/qubes-builder$ 
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 13, 2015

Member

On Fri, Nov 13, 2015 at 12:21:32PM -0800, Patrick Schleizer wrote:

Both, qubes-template-whonix and Whonix where at git tag 12.0.0.3.2-developers-only (same tag name).

In my local qubes-build AppVM, those were still at 12.0.0.3.0-developers-only. So I've run make prepare-merge. During the first run, only qubes-template-whonix was updated to tag ``12.0.0.3.2-developers-only.Whonix` stayed at `12.0.0.3.0-developers-only`. It was set to `12.0.0.3.2-developers-only` only after running `make prepare-merge` for a second time.

Actually Whonix was set to 12.0.0.3.2-developers-only only after
getting new qubes-template-whonix, because that branch name is set in
this component. And config is loaded at make call time, not reloaded
later.

I would have expected both repositories to be at 12.0.0.3.2-developers-only with one run of make prepare-merge. Perhaps my expectation is wrong? Perhaps this is a bug that can be fixed?

I'm afraid your expectation is wrong...

You can avoid that by setting BRANCH_Whonix = 12.0.0.3.2-developers-only
in builder.conf directly, but not so convenient solution.

Perhaps it's not that a big deal, because qubes-template-whonix having configured export BRANCH_Whonix = 12.0.0.3.2-developers-only would have checked out Whonix to 12.0.0.3.2-developers-only during the build process? (Not sure, but I think this is what happens.)

No, it will not checkout sources again.

Log attached below.

user@qubes-build:~$ cd qubes-builder/
user@qubes-build:~/qubes-builder$ make prepare-merge 

(...)

  • '[' -n qubes-src/Whonix ']'
    ++ basename qubes-src/Whonix
  • COMPONENT=Whonix
  • '[' qubes-src/Whonix == . ']'
  • '[' -z Whonix ']'
  • '[' -z qubes-src/Whonix ']'
  • url_var=GIT_URL_Whonix
  • '[' -n '' ']'
  • '[' -n https://github.com/Whonix/Whonix.git ']'
  • GIT_URL=https://github.com/Whonix/Whonix.git
  • '[' -n '' ']'
  • branch_var=BRANCH_Whonix
  • '[' -n 12.0.0.3.0-developers-only ']'
  • BRANCH=12.0.0.3.0-developers-only
  • echo '-> Updating sources for Whonix...'
    -> Updating sources for Whonix...
  • echo '--> Fetching from https://github.com/Whonix/Whonix.git 12.0.0.3.0-developers-only...'
    --> Fetching from https://github.com/Whonix/Whonix.git 12.0.0.3.0-developers-only...
  • '[' qubes-src/Whonix == . -o -d qubes-src/Whonix -a '' '!=' 1 ']'
  • git -C qubes-src/Whonix fetch -q https://github.com/Whonix/Whonix.git --tags 12.0.0.3.0-developers-only

So, as you can see, it is still set to 12.0.0.3.0-developers-only.
Because that was set in template-whonix/components.conf at make prepare-merge call time.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented Nov 13, 2015

On Fri, Nov 13, 2015 at 12:21:32PM -0800, Patrick Schleizer wrote:

Both, qubes-template-whonix and Whonix where at git tag 12.0.0.3.2-developers-only (same tag name).

In my local qubes-build AppVM, those were still at 12.0.0.3.0-developers-only. So I've run make prepare-merge. During the first run, only qubes-template-whonix was updated to tag ``12.0.0.3.2-developers-only.Whonix` stayed at `12.0.0.3.0-developers-only`. It was set to `12.0.0.3.2-developers-only` only after running `make prepare-merge` for a second time.

Actually Whonix was set to 12.0.0.3.2-developers-only only after
getting new qubes-template-whonix, because that branch name is set in
this component. And config is loaded at make call time, not reloaded
later.

I would have expected both repositories to be at 12.0.0.3.2-developers-only with one run of make prepare-merge. Perhaps my expectation is wrong? Perhaps this is a bug that can be fixed?

I'm afraid your expectation is wrong...

You can avoid that by setting BRANCH_Whonix = 12.0.0.3.2-developers-only
in builder.conf directly, but not so convenient solution.

Perhaps it's not that a big deal, because qubes-template-whonix having configured export BRANCH_Whonix = 12.0.0.3.2-developers-only would have checked out Whonix to 12.0.0.3.2-developers-only during the build process? (Not sure, but I think this is what happens.)

No, it will not checkout sources again.

Log attached below.

user@qubes-build:~$ cd qubes-builder/
user@qubes-build:~/qubes-builder$ make prepare-merge 

(...)

  • '[' -n qubes-src/Whonix ']'
    ++ basename qubes-src/Whonix
  • COMPONENT=Whonix
  • '[' qubes-src/Whonix == . ']'
  • '[' -z Whonix ']'
  • '[' -z qubes-src/Whonix ']'
  • url_var=GIT_URL_Whonix
  • '[' -n '' ']'
  • '[' -n https://github.com/Whonix/Whonix.git ']'
  • GIT_URL=https://github.com/Whonix/Whonix.git
  • '[' -n '' ']'
  • branch_var=BRANCH_Whonix
  • '[' -n 12.0.0.3.0-developers-only ']'
  • BRANCH=12.0.0.3.0-developers-only
  • echo '-> Updating sources for Whonix...'
    -> Updating sources for Whonix...
  • echo '--> Fetching from https://github.com/Whonix/Whonix.git 12.0.0.3.0-developers-only...'
    --> Fetching from https://github.com/Whonix/Whonix.git 12.0.0.3.0-developers-only...
  • '[' qubes-src/Whonix == . -o -d qubes-src/Whonix -a '' '!=' 1 ']'
  • git -C qubes-src/Whonix fetch -q https://github.com/Whonix/Whonix.git --tags 12.0.0.3.0-developers-only

So, as you can see, it is still set to 12.0.0.3.0-developers-only.
Because that was set in template-whonix/components.conf at make prepare-merge call time.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Nov 13, 2015

Member

I've run make prepare-merge, make do-merge, make prepare-merge, make do-merge.

The second time it fetched 12.0.0.3.2-developers-only.

+ git -C qubes-src/Whonix fetch -q https://github.com/Whonix/Whonix.git --tags 12.0.0.3.2-developers-only

Member

adrelanos commented Nov 13, 2015

I've run make prepare-merge, make do-merge, make prepare-merge, make do-merge.

The second time it fetched 12.0.0.3.2-developers-only.

+ git -C qubes-src/Whonix fetch -q https://github.com/Whonix/Whonix.git --tags 12.0.0.3.2-developers-only

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Nov 13, 2015

Member

It's okay for me personally, but I think this is quite confusing generally. I wonder, if

  • a) this can be improved in Qubes-Builder?
  • b) Or should the Qubes-Whonix build instructions recommend to always run twice, i.e.:
    make prepare-merge, make do-merge, make prepare-merge, make do-merge?
  • c) Or Qubes-Whonix build instructions should recommend to explicitly add for example BRANCH_Whonix = 12.0.0.3.2-developers-only to override.conf?
Member

adrelanos commented Nov 13, 2015

It's okay for me personally, but I think this is quite confusing generally. I wonder, if

  • a) this can be improved in Qubes-Builder?
  • b) Or should the Qubes-Whonix build instructions recommend to always run twice, i.e.:
    make prepare-merge, make do-merge, make prepare-merge, make do-merge?
  • c) Or Qubes-Whonix build instructions should recommend to explicitly add for example BRANCH_Whonix = 12.0.0.3.2-developers-only to override.conf?
@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 13, 2015

Member

Or maybe really use some branch (not tag) in BRANCH_Whonix? It would
avoid this problem, since the same setting will work with any future tag.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented Nov 13, 2015

Or maybe really use some branch (not tag) in BRANCH_Whonix? It would
avoid this problem, since the same setting will work with any future tag.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Nov 13, 2015

Member

Marek Marczykowski-Górecki:

Or maybe really use some branch (not tag) in BRANCH_Whonix? It would
avoid this problem, since the same setting will work with any future tag.

Hm. Then it would always use the latest tag of that branch? Sounds not
too bad.

Member

adrelanos commented Nov 13, 2015

Marek Marczykowski-Górecki:

Or maybe really use some branch (not tag) in BRANCH_Whonix? It would
avoid this problem, since the same setting will work with any future tag.

Hm. Then it would always use the latest tag of that branch? Sounds not
too bad.

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 13, 2015

Member

On Fri, Nov 13, 2015 at 02:07:34PM -0800, Patrick Schleizer wrote:

Marek Marczykowski-Górecki:

Or maybe really use some branch (not tag) in BRANCH_Whonix? It would
avoid this problem, since the same setting will work with any future tag.

Hm. Then it would always use the latest tag of that branch? Sounds not
too bad.

That's the idea of branches ;)

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented Nov 13, 2015

On Fri, Nov 13, 2015 at 02:07:34PM -0800, Patrick Schleizer wrote:

Marek Marczykowski-Górecki:

Or maybe really use some branch (not tag) in BRANCH_Whonix? It would
avoid this problem, since the same setting will work with any future tag.

Hm. Then it would always use the latest tag of that branch? Sounds not
too bad.

That's the idea of branches ;)

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Nov 13, 2015

Member

Or I must somehow merge qubes-template-whonix into Whonix. Do you think qubes-template-whonix could become a subfolder of Whonix? I would like to avoid "mv ./qubes-template-whonix/* ./Whonix/" (that would be a lot new folders and files, kinda looking confusing).

Member

adrelanos commented Nov 13, 2015

Or I must somehow merge qubes-template-whonix into Whonix. Do you think qubes-template-whonix could become a subfolder of Whonix? I would like to avoid "mv ./qubes-template-whonix/* ./Whonix/" (that would be a lot new folders and files, kinda looking confusing).

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 13, 2015

Member

I don't think that merging all of that makes sense. But maybe recommend
(in build instruction) configuring components-related settings directly
in qubes-builder - so components.conf and last few lines of
builder.conf from there. Somehow less convenient than just enabling
template-whonix builder plugin, but gives much more control over the
whole process.

But still - having branch name in BRANCH_Whonix setting would also
avoid that problems.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented Nov 13, 2015

I don't think that merging all of that makes sense. But maybe recommend
(in build instruction) configuring components-related settings directly
in qubes-builder - so components.conf and last few lines of
builder.conf from there. Somehow less convenient than just enabling
template-whonix builder plugin, but gives much more control over the
whole process.

But still - having branch name in BRANCH_Whonix setting would also
avoid that problems.

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@adrelanos

This comment has been minimized.

Show comment
Hide comment
@adrelanos

adrelanos Nov 15, 2015

Member

But still - having branch name in BRANCH_Whonix setting would also avoid that problems.

But only until let's say branch Whonix12 would be replaced by branch Whonix13? Then one need to run 'make prepare-merge' twice to get all changes?

Member

adrelanos commented Nov 15, 2015

But still - having branch name in BRANCH_Whonix setting would also avoid that problems.

But only until let's say branch Whonix12 would be replaced by branch Whonix13? Then one need to run 'make prepare-merge' twice to get all changes?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 15, 2015

Member

On Sun, Nov 15, 2015 at 07:59:15AM -0800, Patrick Schleizer wrote:

But still - having branch name in BRANCH_Whonix setting would also avoid that problems.

But only until let's say branch Whonix12 would be replaced by branch Whonix13? Then one need to run 'make prepare-merge' twice to get all changes?

Yes...

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

Member

marmarek commented Nov 15, 2015

On Sun, Nov 15, 2015 at 07:59:15AM -0800, Patrick Schleizer wrote:

But still - having branch name in BRANCH_Whonix setting would also avoid that problems.

But only until let's say branch Whonix12 would be replaced by branch Whonix13? Then one need to run 'make prepare-merge' twice to get all changes?

Yes...

Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Nov 21, 2015

Member

There is a code to workaround similar problem:
https://github.com/marmarek/qubes-template-whonix/blob/master/Makefile#L51-L64
It is enabled only for initial make get-sources (if [ ! -d $$REPO ]). Otherwise would download all components regardless of COMPONENTS setting in builder.conf/command line, at every subsequent make get-sources calls. And I consider this rather a hack than a proper solution...

Member

marmarek commented Nov 21, 2015

There is a code to workaround similar problem:
https://github.com/marmarek/qubes-template-whonix/blob/master/Makefile#L51-L64
It is enabled only for initial make get-sources (if [ ! -d $$REPO ]). Otherwise would download all components regardless of COMPONENTS setting in builder.conf/command line, at every subsequent make get-sources calls. And I consider this rather a hack than a proper solution...

marmarek referenced this issue in jgriffiths/qubes-builder Mar 9, 2016

get-sources: Use canonical make facilities to simplify
As part of this change, remove the undocumented dependency on $SCRIPT_DIR
in get-sources as well as the special casing for fetching builder plugins
first - it serves no purpose.

The most obvious benefit is that parallel building of this target now
works, i.e. 'make get-sources -jN' will fetch the sources in parallel,
and is much faster here.

@jgriffiths jgriffiths referenced this issue in QubesOS/qubes-builder Mar 9, 2016

Merged

General improvements #4

@marmarek marmarek modified the milestone: Far in the future Jun 21, 2016

@andrewdavidwong andrewdavidwong added the bug label Apr 3, 2018

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment