Bug 2068872
| Summary: | gcovr-5.2 is available | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Upstream Release Monitoring <upstream-release-monitoring> |
| Component: | gcovr | Assignee: | Neal Gompa <ngompa13> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | rawhide | CC: | dan.cermak, jadahl, ngompa13 |
| Target Milestone: | --- | Keywords: | FutureFeature, Triaged |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | gcovr-5.2-1.fc38 gcovr-5.2-1.fc37 gcovr-5.2-1.fc36 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-01-21 16:18:56 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Upstream Release Monitoring
2022-03-27 06:16:18 UTC
Releases retrieved: 5.2 Upstream release that is considered latest: 5.2 Current version/release in rawhide: 5.0-5.fc37 URL: http://gcovr.com/ Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from Anitya: https://release-monitoring.org/project/13822/ To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/gcovr FEDORA-2023-6d411037c6 has been submitted as an update to Fedora 38. https://bodhi.fedoraproject.org/updates/FEDORA-2023-6d411037c6 FEDORA-2023-35b384f765 has been submitted as an update to Fedora 36. https://bodhi.fedoraproject.org/updates/FEDORA-2023-35b384f765 FEDORA-2023-61ede93863 has been submitted as an update to Fedora 37. https://bodhi.fedoraproject.org/updates/FEDORA-2023-61ede93863 FEDORA-2023-6d411037c6 has been pushed to the Fedora 38 stable repository. If problem still persists, please make note of it in this bug report. FEDORA-2023-35b384f765 has been pushed to the Fedora 36 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-35b384f765` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-35b384f765 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2023-61ede93863 has been pushed to the Fedora 37 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-61ede93863` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-61ede93863 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2023-61ede93863 has been pushed to the Fedora 37 stable repository. If problem still persists, please make note of it in this bug report. FEDORA-2023-35b384f765 has been pushed to the Fedora 36 stable repository. If problem still persists, please make note of it in this bug report. FWIW, this introduced breaking changes in F36 and F37 as 5.1 brings with it breaking changes. For example using a Fedora 37 container image before this update to gather coverage data, combining it with coverage data with this update will not be possible as gcovr-5.0-6 is incompatible with gcovr-5.2-1. |