[Bug 1971453] New: perl-Crypt-RandPasswd-0.06-17.fc35 FTBFS
randomly: t/01-word.t: Use of uninitialized value $last_unit in hash element
at Crypt-RandPasswd-0.06/blib/lib/Crypt/RandPasswd.pm line 2205
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1971453
Bug ID: 1971453
Summary: perl-Crypt-RandPasswd-0.06-17.fc35 FTBFS randomly:
t/01-word.t: Use of uninitialized value $last_unit in
hash element at
Crypt-RandPasswd-0.06/blib/lib/Crypt/RandPasswd.pm
line 2205
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Crypt-RandPasswd
Assignee: emmanuel(a)seyman.fr
Reporter: ppisar(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: emmanuel(a)seyman.fr, perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
perl-Crypt-RandPasswd-0.06-17.fc35 fails to build randomly because t/01-word.t
fails with 0.07 chance:
$ I=0; while prove -b -v t/01-word.t; do I=$((I+1)); echo $I; done
[...]
45
t/01-word.t ..
1..20
ok 1 - create random word of length 10
ok 2 - create random word of length 11
ok 3 - create random word of length 12
ok 4 - create random word of length 13
ok 5 - create random word of length 14
ok 6 - create random word of length 15
ok 7 - create random word of length 16
ok 8 - create random word of length 17
ok 9 - create random word of length 18
ok 10 - create random word of length 19
ok 11 - create random word of length 5 .. 10
ok 12 - create random word of length 6 .. 11
ok 13 - create random word of length 7 .. 12
ok 14 - create random word of length 8 .. 13
ok 15 - create random word of length 9 .. 14
ok 16 - create random word of length 10 .. 15
ok 17 - create random word of length 11 .. 16
ok 18 - create random word of length 12 .. 17
ok 19 - create random word of length 13 .. 18
Use of uninitialized value $last_unit in hash element at
/home/test/fedora/perl-Crypt-RandPasswd/Crypt-RandPasswd-0.06/blib/lib/Crypt/RandPasswd.pm
line 2205.
Failed 1/20 subtests
--
You are receiving this mail because:
You are on the CC list for the bug.
1 year, 3 months
[Bug 1990904] New: Requesting EPEL 8 branch
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1990904
Bug ID: 1990904
Summary: Requesting EPEL 8 branch
Product: Fedora
Version: rawhide
Hardware: x86_64
OS: Linux
Status: NEW
Component: slic3r
Assignee: mhroncok(a)redhat.com
Reporter: jeffclay(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: mhroncok(a)redhat.com,
perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Requesting build for EPEL 8.
--
You are receiving this mail because:
You are on the CC list for the bug.
1 year, 3 months
[Bug 1872724] New: All information erased after changing component
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1872724
Bug ID: 1872724
Summary: All information erased after changing component
Product: Fedora
Version: rawhide
Hardware: x86_64
OS: Linux
Status: NEW
Component: bugzilla
Severity: high
Assignee: itamar(a)ispbrasil.com.br
Reporter: grgoffe(a)yahoo.com
QA Contact: extras-qa(a)fedoraproject.org
CC: emmanuel(a)seyman.fr, itamar(a)ispbrasil.com.br,
perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Description of problem: Created bug report for emacs-common and filled out all
the fields below then changed component to emacs. All data lost
Version-Release number of selected component (if applicable):
How reproducible:
Steps to Reproduce:
1.
2.
3.
Actual results:
Expected results:
Additional info:
--
You are receiving this mail because:
You are on the CC list for the bug.
1 year, 4 months
[Bug 1970378] New: Upgrade perl-Crypt-Random to 1.54
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1970378
Bug ID: 1970378
Summary: Upgrade perl-Crypt-Random to 1.54
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-Crypt-Random
Assignee: paul(a)city-fan.org
Reporter: jplesnik(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: paul(a)city-fan.org, perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Latest Fedora delivers 1.52 version. Upstream released 1.54. When you have free
time, please upgrade it.
--
You are receiving this mail because:
You are on the CC list for the bug.
1 year, 6 months
[Bug 1934532] New: EPEL8 Request: perl-Astro-FITS-CFITSIO
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1934532
Bug ID: 1934532
Summary: EPEL8 Request: perl-Astro-FITS-CFITSIO
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: perl-Astro-FITS-CFITSIO
Assignee: orion(a)nwra.com
Reporter: jakub.jedelsky(a)gmail.com
QA Contact: extras-qa(a)fedoraproject.org
CC: orion(a)nwra.com, perl-devel(a)lists.fedoraproject.org,
scitech-bugs(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Hello, I would appreciate if you could build perl-Astro-FITS-CFITSIO for EPEL8.
Feel free to add me (kubo) as co-maintainer. Thanks.
--
You are receiving this mail because:
You are on the CC list for the bug.
1 year, 6 months
[Bug 1661251] New: Fails due to uninitialised value
by bugzilla@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1661251
Bug ID: 1661251
Summary: Fails due to uninitialised value
Product: Fedora EPEL
Version: epel7
OS: Linux
Status: NEW
Component: perl-Parse-DMIDecode
Assignee: ddick(a)cpan.org
Reporter: squinney(a)inf.ed.ac.uk
QA Contact: extras-qa(a)fedoraproject.org
CC: ddick(a)cpan.org, perl-devel(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Created attachment 1515903
--> https://bugzilla.redhat.com/attachment.cgi?id=1515903&action=edit
Initialise structures to zero to avoid potential problem with numeric
comparison
Description of problem:
We use the Parse::DMIDecode perl module on all our EL7 machines as part of our
inventory system. Mostly it works fine but on a small number of machines it
fails with this error about an uninitialized value:
perl -MParse::DMIDecode -wE 'my $decoder = new Parse::DMIDecode;
$decoder->probe'
Use of uninitialized value $data{"structures"} in numeric lt (<) at
/usr/share/perl5/vendor_perl/Parse/DMIDecode.pm line 160.
Version-Release number of selected component (if applicable):
0.03-5
How reproducible:
About 1% of our machines, I've not checked but probably all similar hardware.
Additional info:
This seems to be similar to a bug reported in CPAN many years ago:
https://rt.cpan.org/Public/Bug/Display.html?id=54956
except that the supplied patch in that report does NOT work. I have attached a
patch which fixes the problem when applied to the 0.03-5 SRPM.
Regards,
Stephen Quinney
--
You are receiving this mail because:
You are on the CC list for the bug.
1 year, 9 months