-
-
Notifications
You must be signed in to change notification settings - Fork 7
Description
Update of core-admin to v4.3.30 for Qubes OS r4.3, see comments below for details and build status.
From commit: QubesOS/qubes-core-admin@929dce2
Changes since previous version:
QubesOS/qubes-core-admin@929dce24 version 4.3.30
QubesOS/qubes-core-admin@9510ef65 Fix minor style issue
QubesOS/qubes-core-admin@4f46ce3d Merge remote-tracking branch 'origin/pr/691'
QubesOS/qubes-core-admin@5b02db60 tests: add a test for no-revisions volume
QubesOS/qubes-core-admin@f79551c5 Merge remote-tracking branch 'origin/pr/690'
QubesOS/qubes-core-admin@52df11dc Merge remote-tracking branch 'origin/pr/693'
QubesOS/qubes-core-admin@62f29360 Merge remote-tracking branch 'origin/pr/686'
QubesOS/qubes-core-admin@f0b01f65 use dirty file instead of clean file
QubesOS/qubes-core-admin@ee41bc04 storage: prune reflinks files when snapshots are disabled
QubesOS/qubes-core-admin@48d5c48f storage: prevent cloning when volumes without snapshot is running
QubesOS/qubes-core-admin@e9151eab Handle global disposable preload feature
QubesOS/qubes-core-admin@a3adbac5 lint
QubesOS/qubes-core-admin@8ef309c2 don't allow to enable or disable snapshots if dispvm base on current vm is running
QubesOS/qubes-core-admin@0c1bd5af prevent startup of vm having snapshots disabled and running DispVM
QubesOS/qubes-core-admin@dd8308c7 prevent startup if source volume snapshot disabled and is running
QubesOS/qubes-core-admin@1ad5da3f storage: add a running state file for volumes
QubesOS/qubes-core-admin@93addf10 storage: add a running state file for volumes
QubesOS/qubes-core-admin@f5787027 storage: prevent setting revisions_to_keep < -1
QubesOS/qubes-core-admin@f9c37cbe backup: prevent backup of running VM when private volume snapshots are disabled
QubesOS/qubes-core-admin@926ea323 prevent re-enabling snapshots when running VM
QubesOS/qubes-core-admin@464f0792 storage: prevent setting disable snapshots when VM is running
QubesOS/qubes-core-admin@4b10f705 storage: snapshots_disabled for zfs storage
QubesOS/qubes-core-admin@058eb920 storage: snapshots_disabled for reflink storage
QubesOS/qubes-core-admin@e872a764 storage: snapshots_disabled for lvm storage
QubesOS/qubes-core-admin@1264ab11 storage: snapshots_disabled for file storage
QubesOS/qubes-core-admin@1ae6bae5 lvm: suppress logs on stdout when expecting json output
QubesOS/qubes-core-admin@290ca713 fix: don't destroy underlying pool on admin.pool.Remove
QubesOS/qubes-core-admin@73153cd2 storage: add a new volume property snapshots_disabled
QubesOS/qubes-core-admin@3d85a729 api: update validate_size method to allow negative numbers
Referenced issues:
QubesOS/qubes-issues#1512
QubesOS/qubes-issues#10023
QubesOS/qubes-issues#8767
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.3 core-admin 929dce24c42c84b4f40d30fc983969f75b62788d current all(available 5 days from now)Upload-component r4.3 core-admin 929dce24c42c84b4f40d30fc983969f75b62788d security-testing all
You can choose subset of distributions like:
Upload-component r4.3 core-admin 929dce24c42c84b4f40d30fc983969f75b62788d current vm-bookworm,vm-fc37(available 5 days from now)
Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.