[OE-core] ✗ patchtest: failure for openssl: Upgrade from 1.0.2k to 1.0.2n (rev2)

2018-02-13 Thread Patchwork
== Series Details ==

Series: openssl: Upgrade from 1.0.2k to 1.0.2n (rev2)
Revision: 2
URL   : https://patchwork.openembedded.org/series/10958/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Issue LIC_FILES_CHKSUM changed on target openssl but there is no 
"License-Update" tag in commit message 
[test_lic_files_chksum_modified_not_mentioned] 
  Suggested fixInclude "License-Update: " into the commit 
message with a brief description
  Current checksum file://LICENSE;md5=27ffa5d74bb5a337056c14b2ef93fbf6
  New checksum file://LICENSE;md5=057d9218c6180e1d9ee407572b2dd225



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


Re: [OE-core] ✗ patchtest: failure for openssl: Upgrade from 1.0.2k to 1.0.2n

2018-02-13 Thread robert_joslyn
Patchwork  wrote on 02/13/2018 
12:04:30 PM:

> == Series Details ==
> 
> Series: openssl: Upgrade from 1.0.2k to 1.0.2n
> Revision: 1
> URL   : https://urldefense.proofpoint.com/v2/url?
> 
u=https-3A__patchwork.openembedded.org_series_10958_&d=DwICaQ&c=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-
> 
Gb60_N6TVnLk&r=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0&m=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654&s=9QNMi3VNaubjQf3y9jBZmv5TBjaNNWdE9v75bBdAzR8&e=
> State : failure
> 
> == Summary ==
> 
> 
> Thank you for submitting this patch series to OpenEmbedded Core. This is
> an automated response. Several tests have been executed on the proposed
> series by patchtest resulting in the following failures:
> 
> 
> 
> * Issue Series does not apply on top of target branch 
> [test_series_merge_on_head] 
>   Suggested fixRebase your series on top of targeted branch
>   Targeted branch  pyro (currently at 2c61e60cc5)
> 
> 
> 
> If you believe any of these test results are incorrect, please reply to 
the
> mailing list (openembedded-core@lists.openembedded.org) raising 
yourconcerns.
> Otherwise we would appreciate you correcting the issues and submitting a 
new
> version of the patchset if applicable. Please ensure you add/increment 
the
> version number when sending the new version (i.e. [PATCH] -> [PATCH v2] 
->
> [PATCH v3] -> ...).
> 
> ---
> Guidelines: https://urldefense.proofpoint.com/v2/url?
> 
u=https-3A__www.openembedded.org_wiki_Commit-5FPatch-5FMessage-5FGuidelines&d=DwICaQ&c=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-
> 
Gb60_N6TVnLk&r=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0&m=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654&s=-
> jCJpJdJRPInvZ3mPBypauSGq16-k4Z4vRCcXMQ9F70&e=
> Test framework: https://urldefense.proofpoint.com/v2/url?
> 
u=http-3A__git.yoctoproject.org_cgit_cgit.cgi_patchtest&d=DwICaQ&c=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-
> 
Gb60_N6TVnLk&r=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0&m=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654&s=QrASQqaT3MEEj1zQgTDQ5iQO93aJ2zooq57BdIgB1cU&e=
> Test suite: https://urldefense.proofpoint.com/v2/url?
> 
u=http-3A__git.yoctoproject.org_cgit_cgit.cgi_patchtest-2Doe&d=DwICaQ&c=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-
> 
Gb60_N6TVnLk&r=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0&m=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654&s=fqNrlIHFwuTo2gHbIXgrogfoHFxaSl1EvqECV2p4Y-
> w&e=
> 

Unfortunately, this is caused by my company's email filter replacing URLs 
with redirects from proofpoint (which you can see more of above). It's an 
attempt at preventing us from clicking on malicious URLs, but I had no 
idea it did the replacement on outgoing email as well as incoming... I'll 
try to send the patch from a personal email account later.

Thanks,
Robert
-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core


[OE-core] ✗ patchtest: failure for openssl: Upgrade from 1.0.2k to 1.0.2n

2018-02-13 Thread Patchwork
== Series Details ==

Series: openssl: Upgrade from 1.0.2k to 1.0.2n
Revision: 1
URL   : https://patchwork.openembedded.org/series/10958/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Issue Series does not apply on top of target branch 
[test_series_merge_on_head] 
  Suggested fixRebase your series on top of targeted branch
  Targeted branch  pyro (currently at 2c61e60cc5)



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines: 
https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe

-- 
___
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core