[OE-core] ✗ patchtest: failure for openssl: Upgrade from 1.0.2k to 1.0.2n
robert_joslyn at selinc.com
robert_joslyn at selinc.com
Tue Feb 13 21:31:13 UTC 2018
Patchwork <patchwork at patchwork.openembedded.org> wrote on 02/13/2018
12:04:30 PM:
> == Series Details ==
>
> Series: openssl: Upgrade from 1.0.2k to 1.0.2n
> Revision: 1
> URL : https://urldefense.proofpoint.com/v2/url?
>
u=https-3A__patchwork.openembedded.org_series_10958_&d=DwICaQ&c=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-
>
Gb60_N6TVnLk&r=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0&m=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654&s=9QNMi3VNaubjQf3y9jBZmv5TBjaNNWdE9v75bBdAzR8&e=
> State : failure
>
> == Summary ==
>
>
> Thank you for submitting this patch series to OpenEmbedded Core. This is
> an automated response. Several tests have been executed on the proposed
> series by patchtest resulting in the following failures:
>
>
>
> * Issue Series does not apply on top of target branch
> [test_series_merge_on_head]
> Suggested fix Rebase your series on top of targeted branch
> Targeted branch pyro (currently at 2c61e60cc5)
>
>
>
> If you believe any of these test results are incorrect, please reply to
the
> mailing list (openembedded-core at lists.openembedded.org) raising
yourconcerns.
> Otherwise we would appreciate you correcting the issues and submitting a
new
> version of the patchset if applicable. Please ensure you add/increment
the
> version number when sending the new version (i.e. [PATCH] -> [PATCH v2]
->
> [PATCH v3] -> ...).
>
> ---
> Guidelines: https://urldefense.proofpoint.com/v2/url?
>
u=https-3A__www.openembedded.org_wiki_Commit-5FPatch-5FMessage-5FGuidelines&d=DwICaQ&c=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-
>
Gb60_N6TVnLk&r=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0&m=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654&s=-
> jCJpJdJRPInvZ3mPBypauSGq16-k4Z4vRCcXMQ9F70&e=
> Test framework: https://urldefense.proofpoint.com/v2/url?
>
u=http-3A__git.yoctoproject.org_cgit_cgit.cgi_patchtest&d=DwICaQ&c=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-
>
Gb60_N6TVnLk&r=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0&m=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654&s=QrASQqaT3MEEj1zQgTDQ5iQO93aJ2zooq57BdIgB1cU&e=
> Test suite: https://urldefense.proofpoint.com/v2/url?
>
u=http-3A__git.yoctoproject.org_cgit_cgit.cgi_patchtest-2Doe&d=DwICaQ&c=zVFQZQ67ypsA9mYKSCqWmQHiVkCCaN-
>
Gb60_N6TVnLk&r=jKjb9x138uKtDnkEJ0l_Ks7NxaK4YpEWM1o0MkNOIx0&m=e7jg3aTWVYdmFaC21AlrNvOx1_qajpaOj2OHjsTZ654&s=fqNrlIHFwuTo2gHbIXgrogfoHFxaSl1EvqECV2p4Y-
> w&e=
>
Unfortunately, this is caused by my company's email filter replacing URLs
with redirects from proofpoint (which you can see more of above). It's an
attempt at preventing us from clicking on malicious URLs, but I had no
idea it did the replacement on outgoing email as well as incoming... I'll
try to send the patch from a personal email account later.
Thanks,
Robert
More information about the Openembedded-core
mailing list