Compare commits

..

42 commits

Author SHA1 Message Date
74982c9cf8
qubes-vm-gui: upgrade to 4.2.20
All checks were successful
/ lint (pull_request) Successful in 32s
/ deploy-v3.21 (pull_request) Successful in 57s
/ build-v3.21 (pull_request) Successful in 1m39s
/ deploy-v3.20 (pull_request) Successful in 1m54s
/ build-v3.20 (pull_request) Successful in 1m34s
/ deploy-edge (pull_request) Successful in 1m24s
/ build-edge (pull_request) Successful in 1m56s
2024-12-29 13:17:27 -05:00
7718dfe2cf qubes-vm-utils: upgrade to 4.2.19 2024-12-26 06:27:20 +00:00
0e7c0331ea
qubes-db-vm: upgrade to 4.2.7
All checks were successful
/ lint (pull_request) Successful in 29s
/ deploy-v3.20 (pull_request) Successful in 1m8s
/ build-v3.20 (pull_request) Successful in 52s
/ deploy-v3.21 (pull_request) Successful in 53s
/ build-v3.21 (pull_request) Successful in 47s
/ deploy-edge (pull_request) Successful in 1m9s
/ build-edge (pull_request) Successful in 58s
2024-12-26 00:09:30 -05:00
bc14b08bc7 qubes-usb-proxy: upgrade to 1.3.3 2024-12-13 21:10:59 +00:00
c87861aa14 qubes-input-proxy: upgrade to 1.0.40 2024-12-13 21:09:25 +00:00
fb31520493 qubes-vm-utils: upgrade to 4.2.18 2024-12-13 21:03:47 +00:00
54f2655921 qubes-vm-core: upgrade to 4.2.39 2024-12-13 21:02:53 +00:00
86fed56ee0
qubes-input-proxy: fix openrc patch
All checks were successful
/ lint (pull_request) Successful in 30s
/ build-v3.20 (pull_request) Successful in 1m7s
/ deploy-v3.20 (pull_request) Successful in 33s
/ deploy-edge (pull_request) Successful in 29s
/ build-edge (pull_request) Successful in 1m12s
/ deploy-v3.21 (pull_request) Successful in 28s
/ build-v3.21 (pull_request) Successful in 1m11s
2024-12-02 19:12:28 -05:00
d449740a08
forgejo: import build.sh in repo
All checks were successful
/ lint (pull_request) Successful in 35s
/ deploy-edge (pull_request) Successful in 2m18s
/ build-edge (pull_request) Successful in 4m52s
/ deploy-v3.21 (pull_request) Successful in 43s
/ build-v3.21 (pull_request) Successful in 5m20s
/ deploy-v3.20 (pull_request) Successful in 1m38s
/ build-v3.20 (pull_request) Successful in 4m10s
2024-11-30 21:03:05 -05:00
66bc76897a
*: rebuild for 3.21
Some checks failed
/ lint (pull_request) Successful in 38s
/ deploy-v3.21 (pull_request) Has been skipped
/ build-v3.21 (pull_request) Failing after 51s
/ deploy-v3.20 (pull_request) Successful in 1m28s
/ build-v3.20 (pull_request) Successful in 5m29s
/ deploy-edge (pull_request) Successful in 58s
/ build-edge (pull_request) Successful in 5m58s
2024-11-30 20:53:10 -05:00
04ed5387ac
forgejo-ci: drop 3.19 builder, add 3.21 2024-11-30 20:52:25 -05:00
991615a968 qubes-input-proxy: upgrade to 1.0.39 2024-11-10 19:39:04 +00:00
56720aae4a
qubes-vm-gui: upgrade to 4.2.19
All checks were successful
/ lint (pull_request) Successful in 38s
/ build-v3.20 (pull_request) Successful in 2m13s
/ deploy-v3.20 (pull_request) Successful in 1m3s
/ deploy-edge (pull_request) Successful in 48s
/ build-edge (pull_request) Successful in 2m32s
/ deploy-v3.19 (pull_request) Successful in 36s
/ build-v3.19 (pull_request) Successful in 1m52s
2024-11-10 09:29:45 -05:00
98832aa3d5
qubes-libvchan-xen: rebuild against xen 4.19
All checks were successful
/ lint (pull_request) Successful in 31s
/ build-edge (pull_request) Successful in 3m6s
/ deploy-edge (pull_request) Successful in 47s
/ build-v3.19 (pull_request) Successful in 2m36s
/ deploy-v3.19 (pull_request) Successful in 1m3s
/ deploy-v3.20 (pull_request) Successful in 38s
/ build-v3.20 (pull_request) Successful in 2m22s
2024-11-07 19:03:38 -05:00
64d2d82b7f
qubes-vm-core: upgrade to 4.2.38
Some checks failed
/ deploy-edge (pull_request) Has been skipped
/ build-edge (pull_request) Failing after 45s
/ lint (pull_request) Successful in 36s
/ deploy-v3.19 (pull_request) Successful in 42s
/ build-v3.19 (pull_request) Successful in 1m26s
/ deploy-v3.20 (pull_request) Successful in 34s
/ build-v3.20 (pull_request) Successful in 1m58s
2024-11-07 18:52:31 -05:00
65ab48938e
*: /usr merge
Some checks failed
/ deploy-v3.19 (pull_request) Has been cancelled
/ build-v3.19 (pull_request) Has been cancelled
/ deploy-v3.20 (pull_request) Has been cancelled
/ build-v3.20 (pull_request) Has been cancelled
/ deploy-edge (pull_request) Has been cancelled
/ build-edge (pull_request) Has been cancelled
/ lint (pull_request) Successful in 24s
2024-10-16 20:09:46 -04:00
d23bf80510 qubes-vm-qrexec: upgrade to 4.2.22 2024-10-10 16:21:19 +00:00
5e16e72f7d qubes-gpg-split: upgrade to 2.0.75 2024-10-10 15:57:24 +00:00
980bd2ee14 qubes-vm-gui-dev: upgrade to 4.2.5 2024-10-10 11:57:39 +00:00
ddf4edb70b qubes-vm-gui: upgrade to 4.2.18 2024-10-10 11:57:39 +00:00
62f8d1b52e qubes-vm-core: upgrade to 4.2.37 2024-10-10 11:57:18 +00:00
2795ac8a15 qubes-usb-proxy: upgrade to 1.3.2 2024-10-10 11:57:03 +00:00
6845ccf2aa qubes-meta-packages: upgrade to 4.2.14 2024-10-10 11:56:41 +00:00
77a8766080 qubes-libvchan-xen: upgrade to 4.2.4 2024-10-10 11:56:26 +00:00
5ad27b0d68 qubes-input-proxy: upgrade to 1.0.38 2024-10-10 11:56:09 +00:00
d6bc124f69
qubes-db-vm: upgrade to 4.2.6
All checks were successful
/ lint (pull_request) Successful in 31s
/ deploy-v3.20 (pull_request) Successful in 36s
/ build-v3.20 (pull_request) Successful in 1m15s
/ deploy-v3.19 (pull_request) Successful in 40s
/ build-v3.19 (pull_request) Successful in 1m18s
/ deploy-edge (pull_request) Successful in 47s
/ build-edge (pull_request) Successful in 1m21s
2024-10-10 07:36:44 -04:00
6016785ae8
README: update 2024-08-16 21:45:02 -04:00
a4d58b8d5e
forgejo-ci: add multitarget build workflows 2024-08-16 08:16:15 -04:00
c290eb5155
forgejo-ci: initial 2024-08-16 01:19:49 -04:00
6c6eba234f
gitlab-ci: drop 2024-08-16 01:19:29 -04:00
280802c725
qubes-vm-utils: bump 2024-08-10 11:41:50 -04:00
7a691c442b
gitlab-ci: use git-annex instead of git-lfs 2024-08-10 11:41:37 -04:00
3d3aa433de
qubes-input-proxy: do not use keyboardmouse event type 2024-07-28 14:01:16 -04:00
7b0c7fcf73 qubes-vm-core: add missing rsvg-convert and dbus-x11 depend
m
2024-07-27 23:02:44 +00:00
dc153517a8 qubes-usb-proxy: fix usb reset with udevadm 2024-07-27 22:54:59 +00:00
aa3e9727be
qubes-usb-proxy: add vhci-hcd module to modules-load.d 2024-07-27 17:33:00 -04:00
8aefcaf872 qubes-pass: add service subpackage 2024-07-27 21:15:21 +00:00
041b3131f3 qubes-vm-core: pull findutils depend 2024-07-27 21:15:05 +00:00
df6ab04af4 qubes-vm-utils: rebuild because of faulty openrc 2024-07-27 19:24:43 +00:00
788a3440ce
qubes-input-proxy: add openrc support 2024-07-27 14:59:43 -04:00
49eebee56f
qubes-input-proxy: new aport 2024-07-27 00:40:39 -04:00
fe647b872b
qubes-usb-proxy: fix usb import 2024-07-27 00:09:09 -04:00
15 changed files with 77 additions and 278 deletions

View file

@ -1,35 +0,0 @@
#!/bin/bash
# expects the following env variables:
# downstream: downstream repo
repo=${downstream/*\/}
curl --silent $downstream/x86_64/APKINDEX.tar.gz | tar -O -zx APKINDEX > APKINDEX
owned_by_you=$(awk -v RS= -v ORS="\n\n" '/m:Antoine Martin \(ayakael\) <dev@ayakael.net>/' APKINDEX | awk -F ':' '{if($1=="o"){print $2}}' | sort | uniq)
echo "Found $(printf '%s\n' $owned_by_you | wc -l ) packages owned by you"
rm -f out_of_date not_in_anitya
for pkg in $owned_by_you; do
if [ $CHECK_LATEST -eq 1 ]; then
upstream_version=$(curl --fail -X GET -sS -H 'Content-Type: application/json' "https://release-monitoring.org/api/v2/packages/?name=$pkg&distribution=Alpine" | jq -r '.items.[].version')
else
upstream_version=$(curl --fail -X GET -sS -H 'Content-Type: application/json' "https://release-monitoring.org/api/v2/packages/?name=$pkg&distribution=Alpine" | jq -r '.items.[].stable_version')
fi
downstream_version=$(sed -n "/^P:$pkg$/,/^$/p" APKINDEX | awk -F ':' '{if($1=="V"){print $2}}' | sort -V | tail -n 1)
downstream_version=${downstream_version/-*}
if [ -z "$upstream_version" ]; then
echo "$pkg not in anitya"
echo "$pkg" >> not_in_anitya
elif [ "$downstream_version" != "$(printf '%s\n' $upstream_version $downstream_version | sort -V | head -n 1)" ]; then
echo "$pkg higher downstream"
continue
elif [ "$upstream_version" != "$downstream_version" ]; then
echo "$pkg upstream version $upstream_version does not match downstream version $downstream_version"
echo "$pkg $downstream_version $upstream_version $repo" >> out_of_date
fi
done

View file

@ -1,165 +0,0 @@
#!/bin/bash
# expects:
# env variable FORGEJO_TOKEN
# file out_of_date
IFS='
'
repo=${downstream/*\/}
does_it_exist() {
name=$1
downstream_version=$2
upstream_version=$3
repo=$4
query="$repo/$name: upgrade to $upstream_version"
query="$(echo $query | sed 's| |%20|g' | sed 's|:|%3A|g' | sed 's|/|%2F|g' )"
result="$(curl --silent -X 'GET' \
"$GITHUB_SERVER_URL/api/v1/repos/$GITHUB_REPOSITORY/issues?state=open&q=$query&type=issues" \
-H 'accept: application/json' \
-H "authorization: Basic $FORGEJO_TOKEN"
)"
if [ "$result" == "[]" ]; then
return 1
fi
}
is_it_old() {
name=$1
downstream_version=$2
upstream_version=$3
repo=$4
query="$repo/$name: upgrade to"
query="$(echo $query | sed 's| |%20|g' | sed 's|:|%3A|g' | sed 's|/|%2F|g' )"
result="$(curl --silent -X 'GET' \
"$GITHUB_SERVER_URL/api/v1/repos/$GITHUB_REPOSITORY/issues?state=open&q=$query&type=issues" \
-H 'accept: application/json' \
-H "authorization: Basic $FORGEJO_TOKEN"
)"
result_title="$(echo $result | jq -r '.[].title' )"
result_id="$(echo $result | jq -r '.[].number' )"
result_upstream_version="$(echo $result_title | awk '{print $4}')"
if [ "$upstream_version" != "$result_upstream_version" ]; then
echo $result_id
else
echo 0
fi
}
update_title() {
name=$1
downstream_version=$2
upstream_version=$3
repo=$4
id=$5
result=$(curl --silent -X 'PATCH' \
"$GITHUB_SERVER_URL/api/v1/repos/$GITHUB_REPOSITORY/issues/$id" \
-H 'accept: application/json' \
-H "authorization: Basic $FORGEJO_TOKEN" \
-H 'Content-Type: application/json' \
-d "{
\"title\": \"$repo/$name: upgrade to $upstream_version\"
}"
)
return 0
}
create_issue() {
name=$1
downstream_version=$2
upstream_version=$3
repo=$4
result=$(curl --silent -X 'POST' \
"$GITHUB_SERVER_URL/api/v1/repos/$GITHUB_REPOSITORY/issues" \
-H 'accept: application/json' \
-H "authorization: Basic $FORGEJO_TOKEN" \
-H 'Content-Type: application/json' \
-d "{
\"title\": \"$repo/$name: upgrade to $upstream_version\",
\"labels\": [
$LABEL_NUMBER
]
}")
return 0
}
if [ -f out_of_date ]; then
out_of_date="$(cat out_of_date)"
echo "Detected $(wc -l out_of_date) out-of-date packages, creating issues"
for pkg in $out_of_date; do
name="$(echo $pkg | awk '{print $1}')"
downstream_version="$(echo $pkg | awk '{print $2}')"
upstream_version="$(echo $pkg | awk '{print $3}')"
repo="$(echo $pkg | awk '{print $4}')"
if does_it_exist $name $downstream_version $upstream_version $repo; then
echo "Issue for $repo/$name already exists"
continue
fi
id=$(is_it_old $name $downstream_version $upstream_version $repo)
if [ "$id" != "0" ] && [ -n "$id" ]; then
echo "Issue for $repo/$name needs updating"
update_title $name $downstream_version $upstream_version $repo $id
continue
fi
echo "Creating issue for $repo/$name"
create_issue $name $downstream_version $upstream_version $repo
done
fi
if [ -f not_in_anitya ]; then
query="Add missing $repo packages to anitya"
query="$(echo $query | sed 's| |%20|g')"
result="$(curl --silent -X 'GET' \
"$GITHUB_SERVER_URL/api/v1/repos/$GITHUB_REPOSITORY/issues?state=open&q=$query&type=issues" \
-H 'accept: application/json' \
-H "authorization: Basic $FORGEJO_TOKEN"
)"
if [ "$result" == "[]" ]; then
echo "Creating anitya issue"
result=$(curl --silent -X 'POST' \
"$GITHUB_SERVER_URL/api/v1/repos/$GITHUB_REPOSITORY/issues" \
-H 'accept: application/json' \
-H "authorization: Basic $FORGEJO_TOKEN" \
-H 'Content-Type: application/json' \
-d "{
\"title\": \"Add missing $repo packages to anitya\",
\"body\": \"- [ ] $(sed '{:q;N;s/\n/\\n- [ ] /g;t q}' not_in_anitya)\",
\"labels\": [
$LABEL_NUMBER
]
}")
else
echo "Updating anitya issue"
result_id="$(echo $result | jq -r '.[].number' )"
result=$(curl --silent -X 'PATCH' \
"$GITHUB_SERVER_URL/api/v1/repos/$GITHUB_REPOSITORY/issues/$result_id" \
-H 'accept: application/json' \
-H "authorization: Basic $FORGEJO_TOKEN" \
-H 'Content-Type: application/json' \
-d "{
\"body\": \"- [ ] $(sed '{:q;N;s/\n/\\n- [ ] /g;t q}' not_in_anitya)\"
}"
)
fi
fi

View file

@ -1,28 +0,0 @@
on:
workflow_dispatch:
schedule:
- cron: '0 5 * * *'
jobs:
check-r4.2:
name: Check user repo
runs-on: x86_64
container:
image: alpine:latest
env:
downstream: https://ayakael.net/api/packages/forge/alpine/edge/qubes-r4.2
FORGEJO_TOKEN: ${{ secrets.forgejo_token }}
LABEL_NUMBER: 9
CHECK_LATEST: 0
steps:
- name: Environment setup
run: apk add grep coreutils gawk curl wget bash nodejs git jq sed
- name: Get scripts
uses: actions/checkout@v4
with:
fetch-depth: 1
- name: Check out-of-date packages
run: ${{ github.workspace }}/.forgejo/bin/check_ver.sh
- name: Create issues
run: ${{ github.workspace }}/.forgejo/bin/create_issue.sh

View file

@ -1,28 +0,0 @@
on:
workflow_dispatch:
schedule:
- cron: '0 5 * * *'
jobs:
check-r4.3:
name: Check user repo
runs-on: x86_64
container:
image: alpine:latest
env:
downstream: https://ayakael.net/api/packages/forge/alpine/edge/qubes-r4.3
FORGEJO_TOKEN: ${{ secrets.forgejo_token }}
LABEL_NUMBER: 9
CHECK_LATEST: 1
steps:
- name: Environment setup
run: apk add grep coreutils gawk curl wget bash nodejs git jq sed
- name: Get scripts
uses: actions/checkout@v4
with:
fetch-depth: 1
- name: Check out-of-date packages
run: ${{ github.workspace }}/.forgejo/bin/check_ver.sh
- name: Create issues
run: ${{ github.workspace }}/.forgejo/bin/create_issue.sh

View file

@ -8,10 +8,6 @@ Linux template. The upstream repo uses GitLab's CI to build and deploy packages
targetting multiple Alpine Linux versions. QubesOS releases are tracked using
branches.
Note for `main` branch: This is currently tracking r4.3 packages, thus are
experimental. Use this branch at your own risk. For latest r4.2 packages,
navigate to that branch.
#### Template builder
The template builder is housed in its [own repo](https://ayakael.net/forge/qubes-builder-alpine)
RPMs are built in-pipeline using the build artifacts produced by this repo. These RPMs facilitate
@ -54,7 +50,7 @@ curl -JO https://ayakael.net/api/packages/forge/alpine/key
Add repository to `/etc/apk/repositories`:
```shell
echo "https://ayakael.net/api/packages/forge/alpine/edge/qubes-r4.3" > /etc/apk/repositories
echo "https://ayakael.net/api/packages/forge/alpine/edge/qubes-r4.2" > /etc/apk/repositories
```

View file

@ -3,7 +3,7 @@
pkgname=qubes-app-linux-druide-antidote
pkgver=0.0.1_git20240201
_gittag=c724c88aa2a20b1e422b464499015ff05753316d
pkgrel=3
pkgrel=2
arch="noarch"
pkgdesc="Qubes Druide-Antidote is a Qubes Application. It send a file to the Antidote Qube, invoke Antidote, and retrieve the file"
url=https://github.com/neowutran/qubes-app-linux-druide-antidote

View file

@ -2,7 +2,7 @@
# Maintainer: Antoine Martin (ayakael) <dev@ayakael.net>
pkgname=qubes-input-proxy
pkgver=1.0.40
_gittag=v$pkgver
_gittag="v$pkgver"
pkgrel=0
pkgdesc="The Qubes service for proxying input devices"
arch="x86_64"

View file

@ -0,0 +1,59 @@
From 8c4c3807119f27957e6c7f87d505d66d0ea4c3d0 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?=
<marmarek@invisiblethingslab.com>
Date: Sat, 18 Nov 2023 18:27:28 +0100
Subject: [PATCH] Support changed libxenctrl API in Xen 4.18.0
The xc_domain_getinfo() is gone, it's replaced with
xc_domain_getinfo_single. While the new API is a bit nicer, xenctrl.h
does not provide any #define to know which one is available. Check
library version in the makefile for that.
---
vchan/Makefile.linux | 4 ++++
vchan/io.c | 10 ++++++++++
2 files changed, 14 insertions(+)
diff --git a/vchan/Makefile.linux b/vchan/Makefile.linux
index 281f2b5..587cb34 100644
--- a/vchan/Makefile.linux
+++ b/vchan/Makefile.linux
@@ -27,6 +27,10 @@ CFLAGS += -g -Wall -Wextra -Werror -fPIC -O2 -D_GNU_SOURCE -MD -MP -MF $@.dep
all: libvchan-xen.so vchan-xen.pc
-include *.dep
+# xenctrl.h does not provide any #define to distinguish API versions
+XENCTRL_VERSION := $(shell pkg-config --modversion xencontrol)
+CFLAGS += $(shell if printf '%s\n' '4.18.0' '$(XENCTRL_VERSION)' | \
+ sort -CV; then echo -DHAVE_XC_DOMAIN_GETINFO_SINGLE; fi)
SO_VER = 1
libvchan-xen.so.$(SO_VER): init.o io.o
diff --git a/vchan/io.c b/vchan/io.c
index 3d0ed35..0c23223 100644
--- a/vchan/io.c
+++ b/vchan/io.c
@@ -33,14 +33,24 @@
/* check if domain is still alive */
int libvchan__check_domain_alive(xc_interface *xc_handle, int dom) {
struct evtchn_status evst;
+#ifdef HAVE_XC_DOMAIN_GETINFO_SINGLE
+ xc_domaininfo_t dominfo;
+#else
xc_dominfo_t dominfo;
+#endif
int ret;
/* first try using domctl, more reliable but available in a privileged
* domain only */
+#ifdef HAVE_XC_DOMAIN_GETINFO_SINGLE
+ ret = xc_domain_getinfo_single(xc_handle, dom, &dominfo);
+ if (ret == 0)
+ return !(dominfo.flags & XEN_DOMINF_dying);
+#else
ret = xc_domain_getinfo(xc_handle, dom, 1, &dominfo);
if (ret == 1)
return dominfo.domid == (uint32_t)dom && !dominfo.dying;
+#endif
else if (ret == -1 && errno == ESRCH)
return 0;
/* otherwise fallback to xc_evtchn_status method */

View file

@ -5,7 +5,7 @@ subpackages="
qubes-vm-dependencies
qubes-vm-recommended
"
pkgver=4.3.0
pkgver=4.2.14
_gittag="v$pkgver"
pkgrel=1
pkgdesc="Meta packages for Qubes-specific components"
@ -38,5 +38,5 @@ recommended() {
mkdir -p "$subpkgdir"
}
sha512sums="
7567bc7edd6a17315bb5a968ff512a7758ef9697d11ed5200f8ffefe7069b0ebbbb790bffdc7a8717b9707c24309bb6d83cfc6306eb1d48724480af36ba95594 qubes-meta-packages-v4.3.0
6227eb7dbbfd10d047c8f31222702a171f9134b404db7c2da6cf154a3d4856bc50c2f6bd0016860255a50d4f6e12723ea82026368ab8ee0d1aff8c316f2f77e9 qubes-meta-packages-v4.2.14
"

View file

@ -1,7 +1,7 @@
# Contributor: Antoine Martin (ayakael) <dev@ayakael.net>
# Maintainer: Antoine Martin (ayakael) <dev@ayakael.net>
pkgname=qubes-usb-proxy
pkgver=4.3.0
pkgver=1.3.3
_gittag="v$pkgver"
pkgrel=0
pkgdesc="The Qubes service for proxying USB devices"
@ -37,6 +37,6 @@ package() {
echo "vhci-hcd" > "$pkgdir"/etc/modules-load.d/qubes-usb-proxy.conf
}
sha512sums="
b193a4df3b0281b2619528ac0a6542a47bd7204a073c9f0cb7c17233d0537f742eb83a58d591fc0e2599aea1a4783f07c7c90dcccdf08fa5845d36e14adae1e3 qubes-usb-proxy-v4.3.0.tar.gz
975f851f674d7ef30bc7b4661c8725667e068da5d149244d63c4f929492eb515b5edc23a1e7b849924cf715a10b13eccbbe7de83f6dbed9a80500e57470d1221 qubes-usb-proxy-v1.3.3.tar.gz
c6519982f7eef8586ee823dc96efa7b1b90f489114edcc348bc5221837090d19a2a3533eac83e3269ba68c2cf24447c018e0ac850ed1423a1280ebae364223fa usb-import-alpine-udevadm.patch
"

View file

@ -8,7 +8,7 @@ subpackages="
$pkgname-doc
$pkgname-pyc
"
pkgver=4.3.14
pkgver=4.2.39
pkgrel=0
_gittag="v$pkgver"
pkgdesc="The Qubes core files for installation inside a Qubes VM."
@ -167,7 +167,7 @@ root() {
make -C passwordless-root install DESTDIR="$subpkgdir" SBINDIR=/usr/sbin LIBDIR=/usr/lib SYSLIBDIR=/usr/lib
}
sha512sums="
3a868dd32bbb8e8eb8e7ab519e28a3345d92a3d4d6891cf0763d3c8dc3475d0a089f1bafc1cee0adac70aad76c129d00b87e2f9833b2e6e05b3c828363e45b19 qubes-vm-core-v4.3.14.tar.gz
60f674805a3fdcdc9aa9edda30c705c5815b5ab61a66967f1bf5974c4c23175d5265b0eec5d5067e03fa87aa5c1cc90ec1eafee092a5b807c3e96c4adef2da0e qubes-vm-core-v4.2.39.tar.gz
95c080a593ca1cd457ffafc0cdd6ee28999c72f67191a3955b6081a4a7d287cae4cd0c626139562e5e1eb55516c25402a174e3599daf7d4cb259d6b4bbdff155 qubes-core-early.openrc
61529413a16b7fa0df691c24adc41b90477c01ea70d572921ecec89df23932e5a2e60c4e73b9a84181dc30424e2e6af4ad1c7dcf6c42689c3cc346a9923d6e07 qubes-core-netvm.openrc
da8e293520f5fce29ce76d7586e8ce1a4164798a1214079fb554c690264da1d774fdad3f45825aac52c2c3a0b0cfd39df73eb33394dedd7c043fe0f2344b90ca qubes-core.openrc

View file

@ -1,7 +1,7 @@
# Contributor: Antoine Martin (ayakael) <dev@ayakael.net>
# Maintainer: Antoine Martin (ayakael) <dev@ayakael.net>
pkgname=qubes-vm-gui-dev
pkgver=4.3.0
pkgver=4.2.5
_gittag="v$pkgver"
pkgrel=1
pkgdesc="Common files for Qubes GUI - protocol headers."
@ -18,5 +18,5 @@ package() {
cp include/*.h $pkgdir/usr/include/
}
sha512sums="
c1046fda6395c6c7907fa3d9c963089169e860d4e0f79c2cf7bafe8a673c93ac0aec3ca312f97510541127510dc7d2ad585949599ed1fffbb0758ff1098ea518 qubes-vm-gui-dev-v4.3.0.tar.gz
12bdf5c2dfcc594b034f5dd94a4fa398ef51a42e8bf425386ff34af63510b749fb0aaa6966f569cc16205efbb310076bd370ceefcd1d254fa5d2e8599554a64d qubes-vm-gui-dev-v4.2.5.tar.gz
"

View file

@ -5,7 +5,7 @@ subpackages="
qubes-vm-pulseaudio
qubes-vm-pipewire
$pkgname-openrc"
pkgver=4.3.4
pkgver=4.2.20
pkgrel=0
_gittag="v$pkgver"
pkgdesc="The Qubes GUI Agent for AppVMs"
@ -116,7 +116,7 @@ pipewire() {
}
sha512sums="
8d3ed290496ccb667020c53b2171f4616d8078c3e554ce32154ca32465594217d025ebd54dfc374c7e7c4a2d09c07bae445d56f23980c47424468555af584e9c qubes-vm-gui-v4.3.4.tar.gz
a44acb287ac5c67fa8a35f8f6589ebd2d4bf17781c7074d3b0b79a4e4ff535de409b9da4d8175d9712bce9bbe6eb98ceab21d5e1f0526e359090ab44efac54a7 qubes-vm-gui-v4.2.20.tar.gz
f0bbb936e14689d0cbced2f564b8911f9287c0217616f02f3bd0c3060e516d080ad538219f089f5841c2b9d18bb4ad8efb63516ddfd46c18b038218378996a7d 0001-musl-build.patch
01beace4c130200dc8d42248349ea858d2bec746aca2bdfa5948b6e7240bb3b832bbb8b324293fba6fd6aafb0a3d7a2e3928c7fd39d318ef4d5a18cfeb48cde6 0001-initd-fix.patch
68d01e594296e18d54d8eaa17863451c3ac121e4fcacf98b64db14166bdcf38aa66f1c3659c5014c0a9cc25b5368df66f8c642b8e7af59da8d2a5ad97da9a194 qubes-gui-agent.openrc

View file

@ -2,9 +2,9 @@
# Maintainer: Antoine Martin (ayakael) <dev@ayakael.net>
pkgname=qubes-vm-qrexec
subpackages="$pkgname-openrc $pkgname-doc $pkgname-pyc"
pkgver=4.3.1
pkgver=4.2.22
_gittag="v$pkgver"
pkgrel=0
pkgrel=2
pkgdesc="The Qubes qrexec files (qube side)"
arch="x86_64"
url="https://github.com/QubesOS/qubes-core-qrexec"
@ -52,7 +52,7 @@ package() {
install -Dm 755 "$srcdir"/qubes-qrexec-agent.openrc "$pkgdir"/etc/init.d/qubes-qrexec-agent
}
sha512sums="
f25d4a6ae587666bc2db6c42978779f6ea52bac10c17e399aed7cd99ecf9b6cedb48a2baa54386f8994c086a9f12b8ed6f8d911f63eee17f86c8e36c0ea7049c qubes-vm-qrexec-v4.3.1.tar.gz
df93577344af228a8fc699576155e2327164ff7d80236dad234919ad686a457e81942a7e57d50bf2e76886b64b23dd4fc3e848f003bdc15defff2621f4514d84 qubes-vm-qrexec-v4.2.22.tar.gz
e2dd5cace82e881c40d5d37c69f7327fbabde81c9d23283de23de9f1197b7b018ef07a8d90e95c61bd249426d9d8297e7cb372333245941ffa0682c90ea3461f qubes-qrexec-agent.openrc
c3009ddb97656be7d0a78910217c852f0f9b20cd37b4537d99724e629bc87f1c675ada084eba3c641c4ae54dab8aacd87514d73de72f42d6ccc976e6255212bc makefile-remove-cc-cflags.patch
69b88c8d344f0d575eac398937040ba39a0d8fb8ea0a2b160c48d84775e1da4e226a76f3c5d3be7b045f577b634bb35cd5c5536248e18117c4121a38f9f3bf13 agent-qrexec-fork-server-undef-fortify-source.patch

View file

@ -6,7 +6,7 @@ subpackages="
$pkgname-openrc
$pkgname-pyc
"
pkgver=4.3.7
pkgver=4.2.19
pkgrel=0
_gittag="v$pkgver"
pkgdesc="Common Linux files for Qubes VM."
@ -59,6 +59,6 @@ support() {
install -m 755 "$builddir"/dracut/full-dmroot/qubes_cow_setup.sh "$subpkgdir"/usr/lib/qubes/qubes_cow_setup.sh
}
sha512sums="
557a3f4d0e95f9e999367f103bfe80d4d5a9734bb841dc24cc67804641d805cfdee99ebef68b47027ae6bf255ca9e1fd15446d0f5aa21a906d10da43eb9a733a qubes-vm-utils-v4.3.7.tar.gz
6fc8dd61a1263b2ea3a578f9cf791060a1ad5f46b132c9002ecbb44a60c956b110b409a127c25f1753d5a6be0744df752f9dd8a88a164417f5c4980e2fb199fd qubes-vm-utils-v4.2.19.tar.gz
c29bac0c6b9a0c81ee42e88541d9216549276448a02c3005ea20d85c7eda483cee28bbc159098bd42badc7ed80058734311931ee4ef13e170e49f83cf3f5a9ae qubes-meminfo-writer.openrc
"