Compare commits

...
Sign in to create a new pull request.

8 commits

Author SHA1 Message Date
430e661fbf qubes-vm-core: upgrade to 4.4.0 2026-04-04 18:02:42 +00:00
e5a09b3ff3 qubes-vm-gui: upgrade to 4.4.0 2026-04-04 18:02:30 +00:00
06ca1db57d qubes-vm-qrexec: upgrade to 4.4.1 2026-04-04 18:02:23 +00:00
53c9af28c6
README: update to say that it is tracking r4.4 2026-04-04 13:43:22 -04:00
5f09c230ad
ci: add check for newer version matching current qubes release 2026-04-04 13:33:58 -04:00
15da22638e
*: rebuild for r4.4
All checks were successful
/ build-edge (pull_request) Successful in 5m26s
/ build-v3.22 (pull_request) Successful in 5m25s
/ lint (pull_request) Successful in 29s
/ build-v3.23 (pull_request) Successful in 5m31s
/ deploy-v3.23 (pull_request) Successful in 1m29s
/ deploy-v3.22 (pull_request) Successful in 1m12s
/ deploy-edge (pull_request) Successful in 1m12s
2026-04-04 13:06:37 -04:00
c35b3b9be7
ci: main now means r4.4 2026-04-04 13:05:38 -04:00
32a9790375 qubes-gpg-split: upgrade to 2.0.83 2026-04-04 17:00:53 +00:00
18 changed files with 33 additions and 27 deletions

View file

@ -75,7 +75,7 @@ get_release() {
get_qubes_release() {
case $BASEBRANCH in
r*) echo $BASEBRANCH;;
main) echo r4.3;;
main) echo r4.4;;
esac
}

View file

@ -84,6 +84,9 @@ for pkg in $owned_by_you; do
else
upstream_version=$(curl --fail -X GET -s -H 'Content-Type: application/json' "https://release-monitoring.org/api/project/Alpine/$pkg" | jq -r '.versions.[]' | head -n1)
fi
# check if a newer version available for ${release/r} qubes release
stable_version=$(curl --fail -X GET -s -H 'Content-Type: application/json' "https://release-monitoring.org/api/project/Alpine/$pkg" | jq -r ".versions.[] | match(\"${release/r}.*\").string" | head -n1)
;;
esac
@ -96,6 +99,9 @@ for pkg in $owned_by_you; do
elif [ "$downstream_version" != "$(printf '%s\n' $upstream_version $downstream_version | sort -V | head -n 1)" ]; then
echo "$pkg higher downstream $upstream_version"
continue
elif [ "$stable_version" != "$downstream_version" ] && [ -n "$stable_version" ]; then
echo "$pkg newer stable version $stable_version does not match downstream version $downstream_version in $release"
echo "$pkg $downstream_version $upstream_version $release" >> out_of_date
elif [ "$upstream_version" != "$downstream_version" ]; then
echo "$pkg upstream version $upstream_version does not match downstream version $downstream_version in $release"
echo "$pkg $downstream_version $upstream_version $release" >> out_of_date

View file

@ -9,7 +9,7 @@ readonly TARGET_REPO=$CI_ALPINE_REPO
get_qubes_release() {
case $GITHUB_BASE_REF in
r*) echo $GITHUB_BASE_REF;;
main) echo r4.3;;
main) echo r4.4;;
esac
}

View file

@ -8,8 +8,8 @@ Linux template. The upstream repo uses GitLab's CI to build and deploy packages
targetting multiple Alpine Linux versions. QubesOS releases are tracked using
branches.
Note for `main` branch: This is currently tracking r4.3 packages, thus are
experimental. Use this branch at your own risk. For latest r4.2 packages,
Note for `main` branch: This is currently tracking r4.4 packages, thus are
experimental. Use this branch at your own risk. For latest r4.3 or r4.2 packages,
navigate to that branch.
#### Template builder
@ -54,7 +54,7 @@ curl -JO https://ayakael.net/api/packages/forge/alpine/key
Add repository to `/etc/apk/repositories`:
```shell
echo "https://ayakael.net/api/packages/forge/alpine/edge/qubes-r4.3" > /etc/apk/repositories
echo "https://ayakael.net/api/packages/forge/alpine/edge/qubes-r4.4" > /etc/apk/repositories
```

View file

@ -1,7 +1,7 @@
# Maintainer: Antoine Martin (ayakael) <dev@ayakael.net>
pkgname=git-remote-qubes
pkgver=0.1.1
pkgrel=3
pkgrel=4
pkgdesc="Inter-VM Git for Qubes OS"
url="https://github.com/Rudd-O/git-remote-qubes"
license="GPL-3.0-only"

View file

@ -3,7 +3,7 @@
pkgname=qubes-app-linux-druide-antidote
pkgver=0.0.1_git20240201
_gittag=c724c88aa2a20b1e422b464499015ff05753316d
pkgrel=5
pkgrel=6
arch="noarch"
pkgdesc="Qubes Druide-Antidote is a Qubes Application. It send a file to the Antidote Qube, invoke Antidote, and retrieve the file"
url=https://github.com/neowutran/qubes-app-linux-druide-antidote

View file

@ -3,7 +3,7 @@
pkgname=qubes-db-vm
subpackages="$pkgname-openrc"
pkgver=4.3.2
pkgrel=1
pkgrel=2
_gittag="v$pkgver"
pkgdesc="QubesDB libs and daemon service."
arch="x86_64"

View file

@ -2,9 +2,9 @@
# Maintainer: Antoine Martin (ayakael) <dev@ayakael.net>
pkgname=qubes-gpg-split
subpackages="$pkgname-doc"
pkgver=2.0.81
pkgver=2.0.83
_gittag="v$pkgver"
pkgrel=0
pkgrel=1
pkgdesc="Used Qubes AppVM as a “smart card”"
arch="x86_64"
url="https://github.com/QubesOS/qubes-app-linux-split-gpg"
@ -31,5 +31,5 @@ package() {
make install-vm DESTDIR="$pkgdir"
}
sha512sums="
78765694e05d2d46aeea859521dcb33b1899dfc0e49ff3d593377c47a3ff86487225f0983f7db5bdd2020463272bdfdcbe066a8dbf87c89c38da14a6fdb3e12f qubes-gpg-split-v2.0.81.tar.gz
a9224c8e57fbb7f17c3cbbfc0f975fe375e4063b96f4a9f327e9791545c356db23c55c1f37612a277615889f104cba1bd2dfb84e190f8b7c80d31a0fda5b29d3 qubes-gpg-split-v2.0.83.tar.gz
"

View file

@ -3,7 +3,7 @@
pkgname=qubes-input-proxy
pkgver=1.0.46
_gittag="v$pkgver"
pkgrel=0
pkgrel=1
pkgdesc="The Qubes service for proxying input devices"
arch="x86_64"
url="https://github.com/QubesOS/qubes-app-linux-input-proxy"

View file

@ -2,7 +2,7 @@
# Maintainer: Antoine Martin (ayakael) <dev@ayakael.net>
pkgname=qubes-libvchan-xen
pkgver=4.2.8
pkgrel=0
pkgrel=1
_gittag=v$pkgver
pkgdesc="The Qubes core libraries for installation inside a Qubes Dom0 and VM."
arch="x86_64"

View file

@ -7,7 +7,7 @@ subpackages="
"
pkgver=4.3.7
_gittag="v$pkgver"
pkgrel=0
pkgrel=1
pkgdesc="Meta packages for Qubes-specific components"
arch="noarch"
url="https://github.com/QubesOS/qubes-meta-packages"

View file

@ -3,7 +3,7 @@
pkgname=qubes-pass
pkgver=0.1.0
_gittag="v$pkgver"
pkgrel=7
pkgrel=8
pkgdesc="An inter-VM password manager for Qubes OS"
arch="noarch"
url="https://github.com/Rudd-O/qubes-pass"

View file

@ -3,7 +3,7 @@
pkgname=qubes-usb-proxy
pkgver=4.3.5
_gittag="v$pkgver"
pkgrel=0
pkgrel=1
pkgdesc="The Qubes service for proxying USB devices"
arch="noarch"
url="https://github.com/QubesOS/qubes-app-linux-usb-proxy"

View file

@ -8,8 +8,8 @@ subpackages="
$pkgname-doc
$pkgname-pyc
"
pkgver=4.3.40
pkgrel=1
pkgver=4.4.0
pkgrel=0
_gittag="v$pkgver"
pkgdesc="The Qubes core files for installation inside a Qubes VM."
arch="x86_64"
@ -167,7 +167,7 @@ root() {
make -C passwordless-root install DESTDIR="$subpkgdir" SBINDIR=/usr/sbin LIBDIR=/usr/lib SYSLIBDIR=/usr/lib
}
sha512sums="
6f65409b8e06f3f373a2c9a54d7e8a053b121e65ee5d9f0776fc9554be7948c14ce9cbbd3e22bac92066ed3791577f344de7ea1ab1ee68cd711c044c9a0b03f4 qubes-vm-core-v4.3.40.tar.gz
35664c151aab28d207b949dd368173e72a6c8a7dc3dc44d259e14a85af188c69edad6b1cbfdb9cdf994b6217abfbd64faaefab42a69f82d5c5b038a78a57e4f1 qubes-vm-core-v4.4.0.tar.gz
95c080a593ca1cd457ffafc0cdd6ee28999c72f67191a3955b6081a4a7d287cae4cd0c626139562e5e1eb55516c25402a174e3599daf7d4cb259d6b4bbdff155 qubes-core-early.openrc
61529413a16b7fa0df691c24adc41b90477c01ea70d572921ecec89df23932e5a2e60c4e73b9a84181dc30424e2e6af4ad1c7dcf6c42689c3cc346a9923d6e07 qubes-core-netvm.openrc
da8e293520f5fce29ce76d7586e8ce1a4164798a1214079fb554c690264da1d774fdad3f45825aac52c2c3a0b0cfd39df73eb33394dedd7c043fe0f2344b90ca qubes-core.openrc

View file

@ -3,7 +3,7 @@
pkgname=qubes-vm-gui-dev
pkgver=4.3.1
_gittag="v$pkgver"
pkgrel=2
pkgrel=3
pkgdesc="Common files for Qubes GUI - protocol headers."
arch="noarch"
url="https://github.com/QubesOS/qubes-gui-common"

View file

@ -5,8 +5,8 @@ subpackages="
qubes-vm-pulseaudio
qubes-vm-pipewire
$pkgname-openrc"
pkgver=4.3.15
pkgrel=1
pkgver=4.4.0
pkgrel=0
_gittag="v$pkgver"
pkgdesc="The Qubes GUI Agent for AppVMs"
arch="x86_64"
@ -118,7 +118,7 @@ pipewire() {
}
sha512sums="
d3fcd5b70ec27f637cac620d299c2bca8c14b15c86011aa364a6079c871abdde2b69f871e4329ccc6bce20d72ffa34c1f78d8bd3797f9084797e792815b92463 qubes-vm-gui-v4.3.15.tar.gz
8ddb5cc73f6bde88ed10e894bce2137b14dfde0d7b10c9eb2f1969390fa1292e8ad1ea35f57c49c47022f86c05ffd7322d03c09dc7414127cefd974c2195a750 qubes-vm-gui-v4.4.0.tar.gz
1a97b45ecb53926dcf840ea6954529002a6dfe3474cbe0a224dbb397d7fa91d8f08a819a2054be60883e02749b9904c128d0a226f66827dd3b7a29068662549a 0001-musl-build.patch
01beace4c130200dc8d42248349ea858d2bec746aca2bdfa5948b6e7240bb3b832bbb8b324293fba6fd6aafb0a3d7a2e3928c7fd39d318ef4d5a18cfeb48cde6 0001-initd-fix.patch
68d01e594296e18d54d8eaa17863451c3ac121e4fcacf98b64db14166bdcf38aa66f1c3659c5014c0a9cc25b5368df66f8c642b8e7af59da8d2a5ad97da9a194 qubes-gui-agent.openrc

View file

@ -2,9 +2,9 @@
# Maintainer: Antoine Martin (ayakael) <dev@ayakael.net>
pkgname=qubes-vm-qrexec
subpackages="$pkgname-openrc $pkgname-doc $pkgname-pyc"
pkgver=4.3.11
pkgver=4.4.1
_gittag="v$pkgver"
pkgrel=2
pkgrel=0
pkgdesc="The Qubes qrexec files (qube side)"
arch="x86_64"
url="https://github.com/QubesOS/qubes-core-qrexec"
@ -52,7 +52,7 @@ package() {
install -Dm 755 "$srcdir"/qubes-qrexec-agent.openrc "$pkgdir"/etc/init.d/qubes-qrexec-agent
}
sha512sums="
316f2608294b4e351f74962a23664f545ccf535c4b77e432335ceb5f937dc8655d82dffe37a8ce3ec7f004130a565feeb1a5ee345736cce7d059c591dc61e765 qubes-vm-qrexec-v4.3.11.tar.gz
ed146f55395e1821dafa03c269b7ba0c927e14456efc0ade90cd4e56716a94427d552242d75f87508284a5b615ec7c98000fb762d23f6bf5461aa56cba95b9f2 qubes-vm-qrexec-v4.4.1.tar.gz
e2dd5cace82e881c40d5d37c69f7327fbabde81c9d23283de23de9f1197b7b018ef07a8d90e95c61bd249426d9d8297e7cb372333245941ffa0682c90ea3461f qubes-qrexec-agent.openrc
c3009ddb97656be7d0a78910217c852f0f9b20cd37b4537d99724e629bc87f1c675ada084eba3c641c4ae54dab8aacd87514d73de72f42d6ccc976e6255212bc makefile-remove-cc-cflags.patch
69b88c8d344f0d575eac398937040ba39a0d8fb8ea0a2b160c48d84775e1da4e226a76f3c5d3be7b045f577b634bb35cd5c5536248e18117c4121a38f9f3bf13 agent-qrexec-fork-server-undef-fortify-source.patch

View file

@ -7,7 +7,7 @@ subpackages="
$pkgname-pyc
"
pkgver=4.3.16
pkgrel=0
pkgrel=1
_gittag="v$pkgver"
pkgdesc="Common Linux files for Qubes VM."
arch="x86_64"