diff mbox series

[AUH] tiff: upgrading to 4.6.0 SUCCEEDED

Message ID 0101018a9a36c65f-e0892e42-bac8-4fa6-9a1d-7bb8e1c13a14-000000@us-west-2.amazonses.com
State New
Headers show
Series [AUH] tiff: upgrading to 4.6.0 SUCCEEDED | expand

Commit Message

auh@yoctoproject.org Sept. 15, 2023, 6:59 p.m. UTC
Hello,

this email is a notification from the Auto Upgrade Helper
that the automatic attempt to upgrade the recipe *tiff* to *4.6.0* has Succeeded.

Next steps:
    - apply the patch: git am 0001-tiff-upgrade-4.5.1-4.6.0.patch
    - check the changes to upstream patches and summarize them in the commit message,
    - compile an image that contains the package
    - perform some basic sanity tests
    - amend the patch and sign it off: git commit -s --reset-author --amend
    - send it to the appropriate mailing list

Alternatively, if you believe the recipe should not be upgraded at this time,
you can fill RECIPE_NO_UPDATE_REASON in respective recipe file so that
automatic upgrades would no longer be attempted.

Please review the attached files for further information and build/update failures.
Any problem please file a bug at https://bugzilla.yoctoproject.org/enter_bug.cgi?product=Automated%20Update%20Handler

Regards,
The Upgrade Helper

-- >8 --
From 5f772d969635d47b0d7ba4740e2d0360ed9dbbb0 Mon Sep 17 00:00:00 2001
From: Upgrade Helper <auh@yoctoproject.org>
Date: Fri, 15 Sep 2023 17:04:12 +0000
Subject: [PATCH] tiff: upgrade 4.5.1 -> 4.6.0

---
 .../recipes-multimedia/libtiff/{tiff_4.5.1.bb => tiff_4.6.0.bb} | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
 rename meta/recipes-multimedia/libtiff/{tiff_4.5.1.bb => tiff_4.6.0.bb} (96%)
diff mbox series

Patch

diff --git a/meta/recipes-multimedia/libtiff/tiff_4.5.1.bb b/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb
similarity index 96%
rename from meta/recipes-multimedia/libtiff/tiff_4.5.1.bb
rename to meta/recipes-multimedia/libtiff/tiff_4.6.0.bb
index 6171a538e5..c446479714 100644
--- a/meta/recipes-multimedia/libtiff/tiff_4.5.1.bb
+++ b/meta/recipes-multimedia/libtiff/tiff_4.6.0.bb
@@ -10,7 +10,7 @@  CVE_PRODUCT = "libtiff"
 
 SRC_URI = "http://download.osgeo.org/libtiff/tiff-${PV}.tar.gz"
 
-SRC_URI[sha256sum] = "d7f38b6788e4a8f5da7940c5ac9424f494d8a79eba53d555f4a507167dca5e2b"
+SRC_URI[sha256sum] = "88b3979e6d5c7e32b50d7ec72fb15af724f6ab2cbf7e10880c360a77e4b5d99a"
 
 # exclude betas
 UPSTREAM_CHECK_REGEX = "tiff-(?P<pver>\d+(\.\d+)+).tar"