Bug 2101193 - Please branch and build perl-Authen-DigestMD5 for EPEL 9
Summary: Please branch and build perl-Authen-DigestMD5 for EPEL 9
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora EPEL
Classification: Fedora
Component: perl-Authen-DigestMD5
Version: epel9
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Paul Howarth
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-06-26 11:34 UTC by Arne Reiter
Modified: 2022-07-07 01:42 UTC (History)
2 users (show)

Fixed In Version: perl-Authen-DigestMD5-0.04-30.el9
Clone Of:
Environment:
Last Closed: 2022-07-07 01:42:29 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Arne Reiter 2022-06-26 11:34:44 UTC
Description of problem:
There is no build of perl-Authen-DigestMD5 for RHEL 9. Please branch and build perl-Authen-DigestMD5 for EPEL 9.

Version-Release number of selected component (if applicable):
0.04-42

Additional info:
The current rawhide branch of this package builds successfully against `epel9`. 

Build: https://copr.fedorainfracloud.org/coprs/areiter/centos-stream-9-extra/build/4564917/

Comment 2 Fedora Update System 2022-06-28 06:26:48 UTC
FEDORA-EPEL-2022-1b0c6bc22e has been submitted as an update to Fedora EPEL 9. https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-1b0c6bc22e

Comment 3 Fedora Update System 2022-06-29 02:06:13 UTC
FEDORA-EPEL-2022-1b0c6bc22e has been pushed to the Fedora EPEL 9 testing repository.

You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-1b0c6bc22e

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 4 Fedora Update System 2022-07-07 01:42:29 UTC
FEDORA-EPEL-2022-1b0c6bc22e has been pushed to the Fedora EPEL 9 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.