Bug 1744681 - [RFE] EPEL8 branch of perl-Net-IP
Summary: [RFE] EPEL8 branch of perl-Net-IP
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: perl-Net-IP
Version: epel8
Hardware: All
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Paul Howarth
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-08-22 16:53 UTC by Pat Riehecky
Modified: 2019-09-08 01:58 UTC (History)
10 users (show)

Fixed In Version: perl-Net-IP-1.26-20.el8
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-09-08 01:58:48 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Pat Riehecky 2019-08-22 16:53:50 UTC
Description of problem:
It would be helpful if this module was packaged for EPEL8

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:
There are two AppStream modules for perl in RHEL8 right now.  I'm not sure what the EPEL plan is for multi-perl....

Comment 1 Fedora Update System 2019-08-23 14:36:42 UTC
FEDORA-EPEL-2019-e5ad6f9682 has been submitted as an update to Fedora EPEL 8. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-e5ad6f9682

Comment 2 Fedora Update System 2019-08-24 01:47:38 UTC
perl-Net-IP-1.26-20.el8 has been pushed to the Fedora EPEL 8 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2019-e5ad6f9682

Comment 3 Fedora Update System 2019-09-08 01:58:48 UTC
perl-Net-IP-1.26-20.el8 has been pushed to the Fedora EPEL 8 stable repository. If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.