Bug 2111408 - perl-Test-WWW-Mechanize-1.58 breaks rt
Summary: perl-Test-WWW-Mechanize-1.58 breaks rt
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: perl-Test-WWW-Mechanize
Version: 35
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Ralf Corsepius
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-07-27 09:36 UTC by Ralf Corsepius
Modified: 2022-07-27 09:53 UTC (History)
4 users (show)

Fixed In Version: perl-Test-WWW-Mechanize-1.58-4.fc37
Doc Type: ---
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-07-27 09:53:05 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Ralf Corsepius 2022-07-27 09:36:31 UTC
Description of problem:
perl-Test-WWW-Mechanize-1.58 breaks rt

It triggers ca. 250 new errors when running rt's testsuite.

Version-Release number of selected component (if applicable):
perl-Test-WWW-Mechanize-1.58

How reproducible:
Always

Steps to Reproduce:
Run rt's testsuite

Actual results:
Ca. 250 new testsuite errors


Additional info:
- Upstream rt has blacklisted Test-WWW-Mechanize-1.58 in rt-5.0.3 (and probably rt-4.4.6, too) and advises users to either downgrade Test-WWW-Mechanize or to use a newer version (ATM, no formal release available).

- Fortunately, bestpractical.com (Upstream rt) has provided a patch to Test-WWW-Mechanize, which seems to resolve this issue.

- This bug affects all active Fedora releases (and probably RHEL).

I intend to adopt bestpractical.com's patch to Test-WWW-Mechanize in all active Fedoras.

Comment 1 Fedora Update System 2022-07-27 09:49:55 UTC
FEDORA-2022-d2a4836a93 has been submitted as an update to Fedora 37. https://bodhi.fedoraproject.org/updates/FEDORA-2022-d2a4836a93

Comment 2 Fedora Update System 2022-07-27 09:53:05 UTC
FEDORA-2022-d2a4836a93 has been pushed to the Fedora 37 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.