Bug 1944352 - perl-Net-Netmask-2.0001 is available
Summary: perl-Net-Netmask-2.0001 is available
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: perl-Net-Netmask
Version: rawhide
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Jitka Plesnikova
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-03-29 18:54 UTC by Upstream Release Monitoring
Modified: 2021-04-15 14:09 UTC (History)
1 user (show)

Fixed In Version: perl-Net-Netmask-2.0001-1.fc35 perl-Net-Netmask-2.0001-1.fc34 perl-Net-Netmask-2.0001-1.fc32 perl-Net-Netmask-2.0001-1.fc33 perl-Net-Netmask-2.0001-1.el8
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-04-06 14:01:27 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Upstream Release Monitoring 2021-03-29 18:54:12 UTC
Latest upstream release: 2.0000
Current version/release in rawhide: 1.9104-9.fc34
URL: http://search.cpan.org/dist/Net-Netmask/

Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream.


Based on the information from anitya: https://release-monitoring.org/project/5979/

Comment 1 Upstream Release Monitoring 2021-03-29 20:08:32 UTC
Latest upstream release: 2.0001
Current version/release in rawhide: 1.9104-9.fc34
URL: http://search.cpan.org/dist/Net-Netmask/

Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring


Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream.


Based on the information from anitya: https://release-monitoring.org/project/5979/

Comment 2 Fedora Update System 2021-03-31 06:36:01 UTC
FEDORA-2021-be62be8c7c has been submitted as an update to Fedora 33. https://bodhi.fedoraproject.org/updates/FEDORA-2021-be62be8c7c

Comment 3 Fedora Update System 2021-03-31 06:36:03 UTC
FEDORA-2021-c314017fcc has been submitted as an update to Fedora 32. https://bodhi.fedoraproject.org/updates/FEDORA-2021-c314017fcc

Comment 4 Fedora Update System 2021-03-31 06:36:05 UTC
FEDORA-EPEL-2021-58127424cd has been submitted as an update to Fedora EPEL 8. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-58127424cd

Comment 5 Fedora Update System 2021-03-31 06:36:07 UTC
FEDORA-2021-3d96cfe6a3 has been submitted as an update to Fedora 34. https://bodhi.fedoraproject.org/updates/FEDORA-2021-3d96cfe6a3

Comment 6 Fedora Update System 2021-04-01 02:03:50 UTC
FEDORA-2021-3d96cfe6a3 has been pushed to the Fedora 34 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2021-3d96cfe6a3`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2021-3d96cfe6a3

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 7 Fedora Update System 2021-04-01 02:14:16 UTC
FEDORA-EPEL-2021-58127424cd has been pushed to the Fedora EPEL 8 testing repository.

You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2021-58127424cd

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 8 Fedora Update System 2021-04-01 02:35:43 UTC
FEDORA-2021-be62be8c7c has been pushed to the Fedora 33 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2021-be62be8c7c`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2021-be62be8c7c

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 9 Fedora Update System 2021-04-01 02:36:01 UTC
FEDORA-2021-c314017fcc has been pushed to the Fedora 32 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --advisory=FEDORA-2021-c314017fcc`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2021-c314017fcc

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 10 Fedora Update System 2021-04-06 14:01:27 UTC
FEDORA-2021-3d96cfe6a3 has been pushed to the Fedora 34 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 11 Fedora Update System 2021-04-08 20:42:27 UTC
FEDORA-2021-c314017fcc has been pushed to the Fedora 32 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 12 Fedora Update System 2021-04-08 20:56:48 UTC
FEDORA-2021-be62be8c7c has been pushed to the Fedora 33 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 13 Fedora Update System 2021-04-15 14:09:31 UTC
FEDORA-EPEL-2021-58127424cd has been pushed to the Fedora EPEL 8 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.