Bug 2232870 - xpra-5.0.1 is available
Summary: xpra-5.0.1 is available
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: xpra
Version: rawhide
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Antonio T. sagitter
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-08-19 18:19 UTC by Upstream Release Monitoring
Modified: 2023-09-18 02:26 UTC (History)
3 users (show)

Fixed In Version: xpra-5.0.1-2.fc39 xpra-5.0.1-2.fc38 xpra-5.0.1-2.el9
Doc Type: ---
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-09-18 00:16:29 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
Update to 5.0 (#2232870) (647 bytes, patch)
2023-08-19 18:19 UTC, Upstream Release Monitoring
no flags Details | Diff
Update to 5.0.1 (#2232870) (648 bytes, patch)
2023-09-01 17:16 UTC, Upstream Release Monitoring
no flags Details | Diff

Description Upstream Release Monitoring 2023-08-19 18:19:32 UTC
Releases retrieved: 5.0
Upstream release that is considered latest: 5.0
Current version/release in rawhide: 4.4.6-3.fc39
URL: https://xpra.org

Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream.


Based on the information from Anitya: https://release-monitoring.org/project/5445/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/xpra

Comment 1 Upstream Release Monitoring 2023-08-19 18:19:48 UTC
Created attachment 1984080 [details]
Update to 5.0 (#2232870)

Comment 2 Upstream Release Monitoring 2023-08-19 18:32:27 UTC
the-new-hotness/release-monitoring.org's scratch build of xpra-5.0-1.fc38.src.rpm for rawhide failed http://koji.fedoraproject.org/koji/taskinfo?taskID=105015959

Comment 3 Upstream Release Monitoring 2023-09-01 17:16:49 UTC
Releases retrieved: 5.0.1
Upstream release that is considered latest: 5.0.1
Current version/release in rawhide: 5.0-1.fc40
URL: https://xpra.org

Please consult the package updates policy before you issue an update to a stable branch: https://docs.fedoraproject.org/en-US/fesco/Updates_Policy/


More information about the service that created this bug can be found at: https://docs.fedoraproject.org/en-US/package-maintainers/Upstream_Release_Monitoring


Please keep in mind that with any upstream change, there may also be packaging changes that need to be made. Specifically, please remember that it is your responsibility to review the new version to ensure that the licensing is still correct and that no non-free or legally problematic items have been added upstream.


Based on the information from Anitya: https://release-monitoring.org/project/5445/


To change the monitoring settings for the project, please visit:
https://src.fedoraproject.org/rpms/xpra

Comment 4 Upstream Release Monitoring 2023-09-01 17:16:55 UTC
Created attachment 1986617 [details]
Update to 5.0.1 (#2232870)

Comment 5 Upstream Release Monitoring 2023-09-01 17:30:47 UTC
the-new-hotness/release-monitoring.org's scratch build of xpra-5.0.1-1.fc38.src.rpm for rawhide failed http://koji.fedoraproject.org/koji/taskinfo?taskID=105622439

Comment 6 Fedora Update System 2023-09-09 09:12:02 UTC
FEDORA-2023-d0ce3972d8 has been submitted as an update to Fedora 38. https://bodhi.fedoraproject.org/updates/FEDORA-2023-d0ce3972d8

Comment 7 Fedora Update System 2023-09-09 09:12:02 UTC
FEDORA-2023-256bdb0389 has been submitted as an update to Fedora 39. https://bodhi.fedoraproject.org/updates/FEDORA-2023-256bdb0389

Comment 8 Fedora Update System 2023-09-10 01:45:20 UTC
FEDORA-EPEL-2023-4b68da6938 has been pushed to the Fedora EPEL 9 testing repository.

You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-4b68da6938

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 9 Fedora Update System 2023-09-10 01:51:16 UTC
FEDORA-2023-256bdb0389 has been pushed to the Fedora 39 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-256bdb0389`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-256bdb0389

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 10 Fedora Update System 2023-09-10 02:16:12 UTC
FEDORA-2023-d0ce3972d8 has been pushed to the Fedora 38 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-d0ce3972d8`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-d0ce3972d8

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 11 Fedora Update System 2023-09-18 00:16:29 UTC
FEDORA-2023-256bdb0389 has been pushed to the Fedora 39 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 12 Fedora Update System 2023-09-18 01:24:35 UTC
FEDORA-2023-d0ce3972d8 has been pushed to the Fedora 38 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 13 Fedora Update System 2023-09-18 02:26:39 UTC
FEDORA-EPEL-2023-4b68da6938 has been pushed to the Fedora EPEL 9 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.