Bug 2273104
Summary: | perl-Crypt-Argon2-0.022 is available | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Upstream Release Monitoring <upstream-release-monitoring> | ||||||
Component: | perl-Crypt-Argon2 | Assignee: | Charles R. Anderson <cra> | ||||||
Status: | CLOSED ERRATA | QA Contact: | |||||||
Severity: | unspecified | Docs Contact: | |||||||
Priority: | unspecified | ||||||||
Version: | rawhide | CC: | cra | ||||||
Target Milestone: | --- | Keywords: | FutureFeature, Triaged | ||||||
Target Release: | --- | ||||||||
Hardware: | Unspecified | ||||||||
OS: | Unspecified | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | perl-Crypt-Argon2-0.022-1.fc40 perl-Crypt-Argon2-0.022-1.fc39 | Doc Type: | If docs needed, set a value | ||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2024-04-30 01:04:01 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Attachments: |
|
Description
Upstream Release Monitoring
2024-04-03 22:32:06 UTC
Created attachment 2025114 [details]
Update to 0.021 (#2273104)
the-new-hotness/release-monitoring.org's scratch build of perl-Crypt-Argon2-0.021-1.fc38.src.rpm for rawhide completed http://koji.fedoraproject.org/koji/taskinfo?taskID=115843102 Releases retrieved: 0.022 Upstream release that is considered latest: 0.022 Current version/release in rawhide: 0.020-3.fc40 URL: https://metacpan.org/release/Crypt-Argon2 Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/ More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream. Based on the information from Anitya: https://release-monitoring.org/project/370095/ To change the monitoring settings for the project, please visit: https://src.fedoraproject.org/rpms/perl-Crypt-Argon2 Created attachment 2026457 [details]
Update to 0.022 (#2273104)
the-new-hotness/release-monitoring.org's scratch build of perl-Crypt-Argon2-0.022-1.fc38.src.rpm for rawhide failed http://koji.fedoraproject.org/koji/taskinfo?taskID=116246292 Built for rawhide: https://koji.fedoraproject.org/koji/buildinfo?buildID=2441712 FEDORA-2024-1bb010dd30 has been pushed to the Fedora 39 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2024-1bb010dd30` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2024-1bb010dd30 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2024-4eb39ff868 has been pushed to the Fedora 40 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2024-4eb39ff868` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2024-4eb39ff868 See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates. FEDORA-2024-4eb39ff868 (perl-Crypt-Argon2-0.022-1.fc40) has been pushed to the Fedora 40 stable repository. If problem still persists, please make note of it in this bug report. FEDORA-2024-1bb010dd30 (perl-Crypt-Argon2-0.022-1.fc39) has been pushed to the Fedora 39 stable repository. If problem still persists, please make note of it in this bug report. |