Bug 1183258

Summary: Review Request: perl-Bytes-Random-Secure - Perl extension to generate cryptographically-secure random bytes
Product: [Fedora] Fedora Reporter: David Dick <ddick>
Component: Package ReviewAssignee: Petr Šabata <psabata>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: medium    
Version: rawhideCC: package-review, psabata
Target Milestone: ---Keywords: Reopened
Target Release: ---Flags: psabata: fedora-review+
gwync: fedora-cvs+
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: perl-Bytes-Random-Secure-0.28-1.fc20 perl-Bytes-Random-Secure-0.28-1.el7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-11-25 16:04:35 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1183255    
Bug Blocks: 1183286    

Description David Dick 2015-01-17 20:12:24 UTC
Spec URL: https://ddick.fedorapeople.org/packages/perl-Bytes-Random-Secure.spec
SRPM URL: https://ddick.fedorapeople.org/packages/perl-Bytes-Random-Secure-0.28-1.fc20.src.rpm
Description: Perl extension to generate cryptographically-secure random bytes
Fedora Account System Username: ddick

Comment 1 Petr Šabata 2015-02-10 17:21:50 UTC
Missing BR:
- English, t/04-perlcritic.t:7

Suggested BR/R version constraint:
- MIME::QuotedPrint: 3.03, from META.*

Filter out the unversioned Scalar::Util dependency.

No other issues.

Comment 3 Petr Šabata 2015-02-11 09:51:06 UTC
Ack.  Approving.

Comment 4 David Dick 2015-02-11 10:26:18 UTC
Thanks Petr!

New Package SCM Request
=======================
Package Name: perl-Bytes-Random-Secure
Short Description: Perl extension to generate cryptographically-secure random bytes
Upstream URL: http://search.cpan.org/dist/Bytes-Random-Secure/
Owners: ddick
Branches: f20, f21, el6, epel7
InitialCC: perl-sig

Comment 5 Gwyn Ciesla 2015-02-11 12:41:47 UTC
Git done (by process-git-requests).

Comment 6 Fedora Update System 2015-02-14 07:55:34 UTC
perl-Bytes-Random-Secure-0.28-1.fc20 has been submitted as an update for Fedora 20.
https://admin.fedoraproject.org/updates/perl-Bytes-Random-Secure-0.28-1.fc20

Comment 7 Fedora Update System 2015-02-14 07:56:04 UTC
perl-Bytes-Random-Secure-0.28-1.fc21 has been submitted as an update for Fedora 21.
https://admin.fedoraproject.org/updates/perl-Bytes-Random-Secure-0.28-1.fc21

Comment 8 Fedora Update System 2015-02-15 13:57:11 UTC
perl-Bytes-Random-Secure-0.28-1.fc21 has been pushed to the Fedora 21 testing repository.

Comment 9 David Dick 2015-02-23 19:56:44 UTC
Package Change Request
======================
Package Name: perl-Bytes-Random-Secure
New Branches: f22
Owners: ddick
InitialCC: perl-sig

Comment 10 Gwyn Ciesla 2015-02-23 20:46:28 UTC
Git done (by process-git-requests).

Comment 11 Fedora Update System 2015-02-23 23:28:14 UTC
perl-Bytes-Random-Secure-0.28-1.fc21 has been pushed to the Fedora 21 stable repository.

Comment 12 Fedora Update System 2015-02-23 23:28:27 UTC
perl-Bytes-Random-Secure-0.28-1.fc20 has been pushed to the Fedora 20 stable repository.

Comment 13 Fedora Update System 2015-11-20 08:08:27 UTC
perl-Bytes-Random-Secure-0.28-1.el7 has been submitted as an update to Fedora EPEL 7. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-8389373113

Comment 14 Fedora Update System 2015-11-21 20:52:56 UTC
perl-Bytes-Random-Secure-0.28-1.el7 has been pushed to the Fedora EPEL 7 testing repository. If problems still persist, please make note of it in this bug report.
If you want to test the update, you can install it with
$ su -c 'yum --enablerepo=epel-testing update perl-Bytes-Random-Secure'
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-8389373113

Comment 15 Fedora Update System 2015-12-16 13:23:17 UTC
perl-Bytes-Random-Secure-0.28-1.el7 has been pushed to the Fedora EPEL 7 stable repository. If problems still persist, please make note of it in this bug report.