Re: [OE-core] ✗ patchtest: failure for "[v2] openssl10: Upgrade 1.0.2l..." and 3 more

2017-11-21 Thread Leonardo Sandoval
On Mon, 20 Nov 2017 14:36:16 +0200
Alexander Kanavin  wrote:

> On 11/18/2017 11:03 AM, Stefan Agner wrote:
> 
> >> * Patch[v2,1/4] openssl10: Upgrade 1.0.2l -> 1.0.2m
> >>   Issue Missing or incorrectly formatted CVE tag in
> >> included patch file [test_cve_tag_format]
> >>Suggested fixCorrect or include the CVE tag on cve patch with
> >> format: "CVE: CVE--"  
> > 
> > I did not add any new patches which address CVE, hence I think this is a
> > false positive/not applicable.  
> 
> You mentioned CVEs in the commit message, I think it wants you to format 
> them in a standard way there.

Right. Currently test is kind of simple, in the sense that it parse the 
subject/description for a CVE and if found it, it then looks for the standard 
tag (CVE: ...). CC Daniela who is working on making this test a bit smarter.


> 
> Alex
> -- 
> ___
> Openembedded-core mailing list
> Openembedded-core@lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] ✗ patchtest: failure for "[v2] openssl10: Upgrade 1.0.2l..." and 3 more

2017-11-20 Thread Alexander Kanavin

On 11/18/2017 11:03 AM, Stefan Agner wrote:


* Patch[v2,1/4] openssl10: Upgrade 1.0.2l -> 1.0.2m
  Issue Missing or incorrectly formatted CVE tag in
included patch file [test_cve_tag_format]
   Suggested fixCorrect or include the CVE tag on cve patch with
format: "CVE: CVE--"


I did not add any new patches which address CVE, hence I think this is a
false positive/not applicable.


You mentioned CVEs in the commit message, I think it wants you to format 
them in a standard way there.


Alex
--
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] ✗ patchtest: failure for "[v2] openssl10: Upgrade 1.0.2l..." and 3 more

2017-11-18 Thread Stefan Agner
On 2017-11-18 10:03, Patchwork wrote:
> == Series Details ==
> 
> Series: "[v2] openssl10: Upgrade 1.0.2l..." and 3 more
> Revision: 1
> URL   : https://patchwork.openembedded.org/series/9868/
> State : failure
> 
> == Summary ==
> 
> 
> Thank you for submitting this patch series to OpenEmbedded Core. This is
> an automated response. Several tests have been executed on the proposed
> series by patchtest resulting in the following failures:
> 
> 
> 
> * Patch[v2,1/4] openssl10: Upgrade 1.0.2l -> 1.0.2m
>  Issue Missing or incorrectly formatted CVE tag in
> included patch file [test_cve_tag_format]
>   Suggested fixCorrect or include the CVE tag on cve patch with
> format: "CVE: CVE--"

I did not add any new patches which address CVE, hence I think this is a
false positive/not applicable.

--
Stefan

> 
> 
> 
> If you believe any of these test results are incorrect, please reply to the
> mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
> Otherwise we would appreciate you correcting the issues and submitting a new
> version of the patchset if applicable. Please ensure you add/increment the
> version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
> [PATCH v3] -> ...).
> 
> ---
> Guidelines:
> https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
> Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
> Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for "[v2] openssl10: Upgrade 1.0.2l..." and 3 more

2017-11-18 Thread Patchwork
== Series Details ==

Series: "[v2] openssl10: Upgrade 1.0.2l..." and 3 more
Revision: 1
URL   : https://patchwork.openembedded.org/series/9868/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Patch[v2,1/4] openssl10: Upgrade 1.0.2l -> 1.0.2m
 Issue Missing or incorrectly formatted CVE tag in included patch 
file [test_cve_tag_format] 
  Suggested fixCorrect or include the CVE tag on cve patch with format: 
"CVE: CVE--"



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core