Bug 1315029
Summary: | perl-Digest-Bcrypt-1.204 is available | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Upstream Release Monitoring <upstream-release-monitoring> |
Component: | perl-Digest-Bcrypt | Assignee: | Jitka Plesnikova <jplesnik> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | rawhide | CC: | ddick, jplesnik, perl-devel |
Target Milestone: | --- | Keywords: | FutureFeature, Triaged |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | perl-Digest-Bcrypt-1.204-1.fc25 perl-Digest-Bcrypt-1.204-1.fc24 | Doc Type: | Enhancement |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2016-04-18 17:25:13 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Attachments: |
Description
Upstream Release Monitoring
2016-03-06 00:16:18 UTC
Created attachment 1133400 [details]
[patch] Update to 1.201 (#1315029)
Scratch build failed http://koji.fedoraproject.org/koji/taskinfo?taskID=13245476 Latest upstream release: 1.203 Current version/release in rawhide: 1.0.1-6.fc24 URL: http://search.cpan.org/dist/Digest-Bcrypt/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Created attachment 1134117 [details]
[patch] Update to 1.203 (#1315029)
Scratch build failed http://koji.fedoraproject.org/koji/taskinfo?taskID=13273299 Latest upstream release: 1.204 Current version/release in rawhide: 1.0.1-6.fc24 URL: http://search.cpan.org/dist/Digest-Bcrypt/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from anitya: https://release-monitoring.org/project/2838/ Patching or scratch build for perl-Digest-Bcrypt and version 1.0.1 FAILED. See for details Created attachment 1139020 [details] Rebase-helper rebase-helper-debug.log log file. See for details and report the eventual error to rebase-helper https://github.com/phracek/rebase-helper/issues. Patches were not touched. All were applied properly jplesnik's perl-Digest-Bcrypt-1.204-1.fc25 completed http://koji.fedoraproject.org/koji/buildinfo?buildID=754465 perl-Digest-Bcrypt-1.204-1.fc24 has been submitted as an update to Fedora 24. https://bodhi.fedoraproject.org/updates/FEDORA-2016-396d6804da perl-Digest-Bcrypt-1.204-1.fc24 has been pushed to the Fedora 24 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-396d6804da perl-Digest-Bcrypt-1.204-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report. |