EPEL epel beta report: 20140706 changes
Compose started at Sun Jul 6 08:15:02 UTC 2014 Summary: Added Packages: 0 Removed Packages: 0 Modified Packages: 0 ___ epel-devel mailing list epel-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/epel-devel
Re: An update on System Tray, Plasma Next (KDE 5) and GTK+
Can someone package statusnotifier into Fedora? I want to test it. Or Kevin, any plans on the packaging? Thanks. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: fedora-release-$PRODUCT, /etc/issue, /etc/os-release, Per-Product Configs and more!
On Thu, 2014-07-03 at 10:05 -0400, Josh Boyer wrote: On Thu, Jul 3, 2014 at 9:57 AM, Stephen Gallagher sgall...@redhat.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 07/03/2014 01:42 AM, William wrote: On Wed, 2014-07-02 at 20:40 -0700, Samuel Sieb wrote: On 07/02/2014 06:55 PM, William wrote: First of all, I'd like to formally propose that each of the products will have a fedora-release-$PRODUCT (and corresponding generic-release-$PRODUCT) package. This package will meet several needs (with magical hand-waving in this initial email). How will this work with fedup from 20 to 21? Will there be multiple upgrade targets? Why would that be necessary? All packages are in one repository, so fedora-release-$PRODUCT will be upgraded to the next version and everything will be fine. My machine doesn't currently have a fedora-release-$PRODUCT package installed. So how will fedup work out what one to put on my system? Will these packages be added to 20, and the user need to preinstall before fedup? It won't put one on your system. Upgrades from a non-Productized Fedora will remain non-Productized. It's not *less* Fedora than before. The Products are basically a statement that this minimal set of packages and services are available on the system. A non-productized Fedora install is essentially just a continuation of the classic do-it-yourself approach that Fedora has been up to this point. That's misleading. Fedora hasn't been releasing do-it-yourself releases. Our previous install images were composed and tested by QA, including testing fedup upgrades from the previous release. With Fedora.next, we don't have an install image that is an equivalent of = F20. Perhaps I have missed them, but I've seen no discussion or plans around testing upgrades to F21 from F20. Unless the Products intend to test upgrading from F20, and/or QA intends to somehow test fedup from F20 to F21 in a non-product manner, we're essentially changing the semantics of upgrades. I agree it should still work, but saying it's a continuation of existing practice when it isn't is wrong. josh It's also misleading given how much focus has been given to the three new products that will be released: So why now is there a non-productised version? That's not been advertised much. I think that some attention needs to be paid to the F20 - F21 upgrade path, and it shouldn't be left to the last minute. Do you need to choose a product via fedup at upgrade time? Do you support a non-productised version? -- William will...@firstyear.id.au -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Package reviev : tayga
After some review in bugzilla, some progress from me, some time to collect dust I have once again turned to look at getting tayga into fedora. https://bugzilla.redhat.com/show_bug.cgi?id=1028206 https://copr.fedoraproject.org/coprs/firstyear/tayga/ Any help and advice is appreciated! -- William will...@firstyear.id.au signature.asc Description: This is a digitally signed message part -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)
On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Kind regards Till -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)
On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
Hi, On Sun, Jul 6, 2014 at 3:41 PM, Sandro Mani manisan...@gmail.com wrote: On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... Seems that you have NOT fixed issue. -- -Igor Gnatenko -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
Am 06.07.2014 13:41, schrieb Sandro Mani: On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... how can a rm -rf currentdir happen by accident? and that combined with make / to the current dir? line 302 is a no-go in general line 301 before that smells like intention i can't imagine that two lines together happen by mistake signature.asc Description: OpenPGP digital signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
On 06.07.2014 13:46, Igor Gnatenko wrote: Hi, On Sun, Jul 6, 2014 at 3:41 PM, Sandro Mani manisan...@gmail.com wrote: On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... Seems that you have NOT fixed issue. -- -Igor Gnatenko I pushed one second ago... -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
On 06.07.2014 13:48, Reindl Harald wrote: Am 06.07.2014 13:41, schrieb Sandro Mani: On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... how can a rm -rf currentdir happen by accident? and that combined with make / to the current dir? line 302 is a no-go in general line 301 before that smells like intention i can't imagine that two lines together happen by mistake It was a line ordering issue. The cwd before that call was the temporary directory. Please trust me, I really feel bad about this, and will never again push code which was written late at night. Again, I really apologize. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)
On Sun, Jul 6, 2014 at 7:38 PM, drago01 drag...@gmail.com wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? Why it's considered as simple? I couldn't find it behind. Yours sincerely, Christopher Meng Noob here. http://cicku.me -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code (was: Re: [Announce] Simple Patch Policy)
On Sun, Jul 6, 2014 at 1:54 PM, Christopher Meng cicku...@gmail.com wrote: On Sun, Jul 6, 2014 at 7:38 PM, drago01 drag...@gmail.com wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? Why it's considered as simple? I couldn't find it behind. I can't parse that. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
FEVer or?
Hi lazy-list, Back in the day, there was FEver for monitoring new upstream releases. Is that still what we use, or is there a new thing now? And where does it live? Cursory googling failed to locate it. Thanks, Conrad -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
Am 06.07.2014 13:51, schrieb Sandro Mani: On 06.07.2014 13:48, Reindl Harald wrote: Am 06.07.2014 13:41, schrieb Sandro Mani: On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... how can a rm -rf currentdir happen by accident? and that combined with make / to the current dir? line 302 is a no-go in general line 301 before that smells like intention i can't imagine that two lines together happen by mistake It was a line ordering issue. The cwd before that call was the temporary directory. Please trust me, I really feel bad about this, and will never again push code which was written late at night. Again, I really apologize accepted - but shutil.rmtree(os.getcwd()) is in general not a line ordering issue it's from a developers perspective because it leads *always* to unpredictable behavior if the chdir fails for whatever reason, be it a typo, wrong permissions somewhere or SELinux comes in place that's horrible dangerous in any context signature.asc Description: OpenPGP digital signature -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
2014-07-06 13:51 GMT+02:00 Sandro Mani manisan...@gmail.com: It was a line ordering issue. The cwd before that call was the temporary directory. Please trust me, I really feel bad about this, and will never again push code which was written late at night. Again, I really apologize. Sounds likely, I was more worried that your credentials were stolen. @everyone mistakes *happen*, don't be hasty http://fedoraproject.org/en/code-of-conduct This stresses the importance of code review, and not running code that has been reviewed once. best regards, H. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: FEVer or?
Put this in the bookmarks: https://fedoraproject.org/wiki/Upstream_release_monitoring -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: FEVer or?
2014-07-06 13:59 GMT+02:00 Conrad Meyer ceme...@uw.edu: Hi lazy-list, Back in the day, there was FEver for monitoring new upstream releases. Is that still what we use, or is there a new thing now? And where does it live? Cursory googling failed to locate it. It's called cnucnu All details here: http://fedoraproject.org/wiki/Upstream_release_monitoring Regards, H. Thanks, Conrad -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
On Sun, Jul 6, 2014 at 1:41 PM, Sandro Mani manisan...@gmail.com wrote: On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... OK that was indeed a bit premature I should have waited for you to respond before drawing any conclusions. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
On 06.07.2014 13:59, Reindl Harald wrote: Am 06.07.2014 13:51, schrieb Sandro Mani: On 06.07.2014 13:48, Reindl Harald wrote: Am 06.07.2014 13:41, schrieb Sandro Mani: On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: On Fri, Jul 04, 2014 at 04:26:07PM +0200, Sandro Mani wrote: * A script automating most of the process of validating and processing the request can be found at https://github.com/manisandro/fedora-process-simple-patch/blob/master/process-simple-patch.py Do not run this script, because it contains malicious code that might remove all files from your system! The code can be found in lines 301-302: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... how can a rm -rf currentdir happen by accident? and that combined with make / to the current dir? line 302 is a no-go in general line 301 before that smells like intention i can't imagine that two lines together happen by mistake It was a line ordering issue. The cwd before that call was the temporary directory. Please trust me, I really feel bad about this, and will never again push code which was written late at night. Again, I really apologize accepted - but shutil.rmtree(os.getcwd()) is in general not a line ordering issue it's from a developers perspective because it leads *always* to unpredictable behavior if the chdir fails for whatever reason, be it a typo, wrong permissions somewhere or SELinux comes in place that's horrible dangerous in any context Fully accepted, and trust me, I fully realize how utterly stupid the code was. I probably was just over-eager to get the script done and go to bed. I just really hope that I did not cause any loss of data to anyone. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: WARNING: malicious code
On Sun, Jul 06, 2014 at 01:41:08PM +0200, Sandro Mani wrote: On 06.07.2014 13:38, drago01 wrote: On Sun, Jul 6, 2014 at 1:04 PM, Till Maas opensou...@till.name wrote: | 301 os.chdir(/) | 302 shutil.rmtree(os.getcwd()) Ouch ... can we ban this guy from Fedora? This is a bit dramatic. I really sincerely apologize for this and please realize that I wrote this with the best intentions. I've fixed the issue... Thank you for taking care of it so fast. Kind regards Till -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Half-OT: Secure boot and thirdy party kernel modules
Hi Fedora folks, I've found that Oracle VirtualBox kernel module are not signed so I have to disable secure boot. Oracle says that is not a VirtualBox bug. And Fedora cannot sign it because of license, can it? So, the question is: Is it worth signing my own kernel? Of course I can circunvent this problem simply by disabling secureboot... what do you think, is there a simple way of doing that, or should I spend a weekend doing all of it? I've found this: http://www.linuxfoundation.org/news-media/blogs/browse/2013/09/booting-self-signed-linux-kernel Can I sign only the virtualbox kernel module, or should I recompile the entire kernel and sign it? Thanks in advance! -- -- Sergio Belkin http://www.sergiobelkin.com LPIC-2 Certified - http://www.lpi.org -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Re: Half-OT: Secure boot and thirdy party kernel modules
On Sun, Jul 06, 2014 at 02:10:45PM -0300, Sergio Belkin wrote: I've found that Oracle VirtualBox kernel module are not signed so I have to disable secure boot. Oracle says that is not a VirtualBox bug. And Fedora cannot sign it because of license, can it? Correct. You can generate your own key, enroll it with mokutil and then sign the modules with that key. -- Matthew Garrett | mj...@srcf.ucam.org -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
easy review: abduco
Hi, I've just submitted[0] abduco package for review. Because program is small I think review should take minimal time. Please review it. [0]https://bugzilla.redhat.com/show_bug.cgi?id=1116653 -- -Igor Gnatenko signature.asc Description: This is a digitally signed message part -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
[Bug 1116559] New: RFE: Build perl-XMLRPC-Lite for EPEL7
https://bugzilla.redhat.com/show_bug.cgi?id=1116559 Bug ID: 1116559 Summary: RFE: Build perl-XMLRPC-Lite for EPEL7 Product: Fedora Version: rawhide Component: perl-XMLRPC-Lite Assignee: psab...@redhat.com Reporter: t.h.amund...@usit.uio.no QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, psab...@redhat.com Hi, The perl-SOAP-Lite package in EPEL7 is so new that it no longer contains XMLRPC::Lite. It would therefore be nice to have the perl-XMLRPC-Lite package branched and built for EPEL7. We're using this module in a few local scripts that communicate with xml-rpc services. I did a scratch-build using the rawhide srpm, just to confirm that there are no issues with missing dependencies: http://koji.fedoraproject.org/koji/taskinfo?taskID=7109619 Regards, -trond -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=a9Yq4oF9ZJa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116595] New: perl-CGI-4.03 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116595 Bug ID: 1116595 Summary: perl-CGI-4.03 is available Product: Fedora Version: rawhide Component: perl-CGI Keywords: FutureFeature, Triaged Assignee: jples...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: jples...@redhat.com, perl-devel@lists.fedoraproject.org Latest upstream release: 4.03 Current version/release in Fedora Rawhide: 4.02-1.fc21 URL: http://search.cpan.org/dist/CGI/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=yaTFJoMuxAa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116596] New: perl-experimental-0.008 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116596 Bug ID: 1116596 Summary: perl-experimental-0.008 is available Product: Fedora Version: rawhide Component: perl-experimental Keywords: FutureFeature, Triaged Assignee: ppi...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com Latest upstream release: 0.008 Current version/release in Fedora Rawhide: 0.007-2.fc21 URL: http://search.cpan.org/dist/experimental/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=8SNjzDMPeUa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116598] New: perl-File-pushd-1.009 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116598 Bug ID: 1116598 Summary: perl-File-pushd-1.009 is available Product: Fedora Version: rawhide Component: perl-File-pushd Keywords: FutureFeature, Triaged Assignee: psab...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, psab...@redhat.com Latest upstream release: 1.009 Current version/release in Fedora Rawhide: 1.007-2.fc21 URL: http://search.cpan.org/dist/File-pushd/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=pfKwJR8OSka=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116599] New: perl-Gtk2-1.2492 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116599 Bug ID: 1116599 Summary: perl-Gtk2-1.2492 is available Product: Fedora Version: rawhide Component: perl-Gtk2 Keywords: FutureFeature, Triaged Assignee: tcall...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, tcall...@redhat.com Latest upstream release: 1.2492 Current version/release in Fedora Rawhide: 1.2491-1.fc21 URL: http://search.cpan.org/dist/Gtk2/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=9E57OmvjERa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1100706] perl-Glib-Object-Introspection-0.024 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1100706 Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org changed: What|Removed |Added Summary|perl-Glib-Object-Introspect |perl-Glib-Object-Introspect |ion-0.023 is available |ion-0.024 is available --- Comment #1 from Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org --- Latest upstream release: 0.024 Current version/release in Fedora Rawhide: 0.022-2.fc21 URL: http://search.cpan.org/dist/Glib-Object-Introspection/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=wspxEP1a3Oa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1067394] perl-Gtk3-0.017 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1067394 Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org changed: What|Removed |Added Summary|perl-Gtk3-0.016 is |perl-Gtk3-0.017 is |available |available --- Comment #1 from Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org --- Latest upstream release: 0.017 Current version/release in Fedora Rawhide: 0.015-2.fc21 URL: http://search.cpan.org/dist/Gtk3/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=lS5lVjBHZGa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116600] New: perl-IO-Socket-IP-0.30 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116600 Bug ID: 1116600 Summary: perl-IO-Socket-IP-0.30 is available Product: Fedora Version: rawhide Component: perl-IO-Socket-IP Keywords: FutureFeature, Triaged Assignee: psab...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: mmasl...@redhat.com, perl-devel@lists.fedoraproject.org, psab...@redhat.com Latest upstream release: 0.30 Current version/release in Fedora Rawhide: 0.29-2.fc21 URL: http://search.cpan.org/dist/IO-Socket-IP/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=minTEQV7X3a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116601] New: perl-IO-Socket-Timeout-0.25 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116601 Bug ID: 1116601 Summary: perl-IO-Socket-Timeout-0.25 is available Product: Fedora Version: rawhide Component: perl-IO-Socket-Timeout Keywords: FutureFeature, Triaged Assignee: dd...@cpan.org Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: dd...@cpan.org, perl-devel@lists.fedoraproject.org Latest upstream release: 0.25 Current version/release in Fedora Rawhide: 0.24-3.fc21 URL: http://search.cpan.org/dist/IO-Socket-Timeout/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=MIjMFidfgqa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116603] New: perl-List-Compare-0.39 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116603 Bug ID: 1116603 Summary: perl-List-Compare-0.39 is available Product: Fedora Version: rawhide Component: perl-List-Compare Keywords: FutureFeature, Triaged Assignee: psab...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: mmasl...@redhat.com, perl-devel@lists.fedoraproject.org, psab...@redhat.com Latest upstream release: 0.39 Current version/release in Fedora Rawhide: 0.38-2.fc21 URL: http://search.cpan.org/dist/List-Compare/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=tBvM6ewK87a=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116602] New: perl-libwww-perl-6.07 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116602 Bug ID: 1116602 Summary: perl-libwww-perl-6.07 is available Product: Fedora Version: rawhide Component: perl-libwww-perl Keywords: FutureFeature, Triaged Assignee: ppi...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: mmasl...@redhat.com, perl-devel@lists.fedoraproject.org, ppi...@redhat.com Latest upstream release: 6.07 Current version/release in Fedora Rawhide: 6.06-2.fc21 URL: http://search.cpan.org/dist/libwww-perl/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=r4vF8nJuZHa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1039717] perl-Net-Amazon-EC2-0.25 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1039717 Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org changed: What|Removed |Added Summary|perl-Net-Amazon-EC2-0.24 is |perl-Net-Amazon-EC2-0.25 is |available |available --- Comment #1 from Upstream Release Monitoring upstream-release-monitor...@fedoraproject.org --- Latest upstream release: 0.25 Current version/release in Fedora Rawhide: 0.24-2.fc21 URL: http://search.cpan.org/dist/Net-Amazon-EC2/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=8VpuSNVlUva=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116604] New: perl-Pango-1.226 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116604 Bug ID: 1116604 Summary: perl-Pango-1.226 is available Product: Fedora Version: rawhide Component: perl-Pango Keywords: FutureFeature, Triaged Assignee: tcall...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, tcall...@redhat.com Latest upstream release: 1.226 Current version/release in Fedora Rawhide: 1.221-10.fc21 URL: http://search.cpan.org/dist/Pango/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=vyiX6OsXxAa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116605] New: perl-PDF-API2-2.022 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116605 Bug ID: 1116605 Summary: perl-PDF-API2-2.022 is available Product: Fedora Version: rawhide Component: perl-PDF-API2 Keywords: FutureFeature, Triaged Assignee: bjohn...@symetrix.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: bjohn...@symetrix.com, perl-devel@lists.fedoraproject.org Latest upstream release: 2.022 Current version/release in Fedora Rawhide: 2.021-2.fc21 URL: http://search.cpan.org/dist/PDF-API2/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=wr2XMfT12Na=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116606] New: perl-Pod-Markdown-2.002 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116606 Bug ID: 1116606 Summary: perl-Pod-Markdown-2.002 is available Product: Fedora Version: rawhide Component: perl-Pod-Markdown Keywords: FutureFeature, Triaged Assignee: jples...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: jples...@redhat.com, mmasl...@redhat.com, perl-devel@lists.fedoraproject.org Latest upstream release: 2.002 Current version/release in Fedora Rawhide: 2.001-2.fc21 URL: http://search.cpan.org/dist/Pod-Markdown/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=hgcYzrEUgAa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116608] New: perl-Storable-2.51 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116608 Bug ID: 1116608 Summary: perl-Storable-2.51 is available Product: Fedora Version: rawhide Component: perl-Storable Keywords: FutureFeature, Triaged Assignee: ppi...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, ppi...@redhat.com Latest upstream release: 2.51 Current version/release in Fedora Rawhide: 2.45-3.fc21 URL: http://search.cpan.org/dist/Storable/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=kZrjIMisLGa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116609] New: perl-Test-Class-0.45 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116609 Bug ID: 1116609 Summary: perl-Test-Class-0.45 is available Product: Fedora Version: rawhide Component: perl-Test-Class Keywords: FutureFeature, Triaged Assignee: st...@silug.org Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: perl-devel@lists.fedoraproject.org, psab...@redhat.com, st...@silug.org Latest upstream release: 0.45 Current version/release in Fedora Rawhide: 0.43-1.fc21 URL: http://search.cpan.org/dist/Test-Class/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=hxFh5aC2uya=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116611] New: perl-Text-TabularDisplay-1.37 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116611 Bug ID: 1116611 Summary: perl-Text-TabularDisplay-1.37 is available Product: Fedora Version: rawhide Component: perl-Text-TabularDisplay Keywords: FutureFeature, Triaged Assignee: psab...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: mmasl...@redhat.com, perl-devel@lists.fedoraproject.org, psab...@redhat.com Latest upstream release: 1.37 Current version/release in Fedora Rawhide: 1.35-4.fc21 URL: http://search.cpan.org/dist/Text-TabularDisplay/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=4g2EYfUpwaa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116612] New: perl-URI-1.61 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116612 Bug ID: 1116612 Summary: perl-URI-1.61 is available Product: Fedora Version: rawhide Component: perl-URI Keywords: FutureFeature, Triaged Assignee: psab...@redhat.com Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: mmasl...@redhat.com, p...@city-fan.org, perl-devel@lists.fedoraproject.org, psab...@redhat.com Latest upstream release: 1.61 Current version/release in Fedora Rawhide: 1.60-12.fc21 URL: http://search.cpan.org/dist/URI/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=kWTJtpfBuCa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116613] New: perl-WebService-Linode-0.21 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116613 Bug ID: 1116613 Summary: perl-WebService-Linode-0.21 is available Product: Fedora Version: rawhide Component: perl-WebService-Linode Keywords: FutureFeature, Triaged Assignee: i...@cicku.me Reporter: upstream-release-monitor...@fedoraproject.org QA Contact: extras...@fedoraproject.org CC: i...@cicku.me, perl-devel@lists.fedoraproject.org Latest upstream release: 0.21 Current version/release in Fedora Rawhide: 0.20-1.fc21 URL: http://search.cpan.org/dist/WebService-Linode/ Please consult the package updates policy before you issue an update to a stable branch: https://fedoraproject.org/wiki/Updates_Policy More information about the service that created this bug can be found at: https://fedoraproject.org/wiki/Upstream_release_monitoring -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=00mL2i08NDa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel
[Bug 1116613] perl-WebService-Linode-0.21 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1116613 Christopher Meng i...@cicku.me changed: What|Removed |Added Status|NEW |CLOSED Fixed In Version||perl-WebService-Linode-0.21 ||-1.fc21 Resolution|--- |RAWHIDE Last Closed||2014-07-06 10:51:56 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=QeIOFT21eRa=cc_unsubscribe -- Fedora Extras Perl SIG http://www.fedoraproject.org/wiki/Extras/SIGs/Perl perl-devel mailing list perl-devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/perl-devel