Bug 1974058

Summary: ddnet-15.5.3 is available
Product: [Fedora] Fedora Reporter: Upstream Release Monitoring <upstream-release-monitoring>
Component: ddnetAssignee: Michael <elxreno>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: rawhideCC: elxreno
Target Milestone: ---Keywords: FutureFeature, Triaged
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ddnet-15.5.4-1.fc33 ddnet-15.5.4-1.fc34 Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-06-29 01:19:11 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
[patch] Update to 15.5.3 (#1974058) none

Description Upstream Release Monitoring 2021-06-20 08:23:50 UTC
Latest upstream release: 15.5.3
Current version/release in rawhide: 15.5.2-1.fc35
URL: https://ddnet.tw

Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream.


Based on the information from anitya: https://release-monitoring.org/project/138153/

Comment 1 Upstream Release Monitoring 2021-06-20 08:24:00 UTC
Created attachment 1792468 [details]
[patch] Update to 15.5.3 (#1974058)

Comment 2 Upstream Release Monitoring 2021-06-20 08:33:55 UTC
the-new-hotness/release-monitoring.org's scratch build of ddnet-15.5.3-1.fc32.src.rpm for rawhide completed http://koji.fedoraproject.org/koji/taskinfo?taskID=70476840

Comment 3 Fedora Update System 2021-06-20 10:06:50 UTC
FEDORA-2021-186d46c79d has been submitted as an update to Fedora 33. https://bodhi.fedoraproject.org/updates/FEDORA-2021-186d46c79d

Comment 4 Fedora Update System 2021-06-20 18:09:58 UTC
FEDORA-2021-f750fd1e87 has been submitted as an update to Fedora 33. https://bodhi.fedoraproject.org/updates/FEDORA-2021-f750fd1e87

Comment 5 Fedora Update System 2021-06-20 18:09:59 UTC
FEDORA-2021-4462f1256e has been submitted as an update to Fedora 34. https://bodhi.fedoraproject.org/updates/FEDORA-2021-4462f1256e

Comment 6 Fedora Update System 2021-06-21 01:04:42 UTC
FEDORA-2021-4462f1256e has been pushed to the Fedora 34 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2021-4462f1256e`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2021-4462f1256e

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 7 Fedora Update System 2021-06-21 01:11:32 UTC
FEDORA-2021-f750fd1e87 has been pushed to the Fedora 33 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2021-f750fd1e87`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2021-f750fd1e87

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 8 Fedora Update System 2021-06-29 01:19:11 UTC
FEDORA-2021-f750fd1e87 has been pushed to the Fedora 33 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 9 Fedora Update System 2021-06-29 01:29:35 UTC
FEDORA-2021-4462f1256e has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.