SHA256
1
0
forked from pool/alacritty
Go to file
2024-04-26 21:26:48 +00:00
_constraints Accepting request 1041273 from home:uncomfyhalomacro:branches:X11:terminals 2022-12-14 10:03:29 +00:00
_service Accepting request 1169541 from home:VaiTon:branches:X11:terminals 2024-04-25 15:36:26 +00:00
_servicedata Accepting request 1169541 from home:VaiTon:branches:X11:terminals 2024-04-25 15:36:26 +00:00
.gitattributes Accepting request 760004 from home:luke_nukem:branches:X11:terminals 2020-01-06 05:19:53 +00:00
.gitignore Accepting request 588337 from home:avindra 2018-03-23 09:32:36 +00:00
alacritty-0.13.2.tar.zst Accepting request 1169541 from home:VaiTon:branches:X11:terminals 2024-04-25 15:36:26 +00:00
alacritty.changes Accepting request 1169541 from home:VaiTon:branches:X11:terminals 2024-04-25 15:36:26 +00:00
alacritty.obsinfo Accepting request 1169541 from home:VaiTon:branches:X11:terminals 2024-04-25 15:36:26 +00:00
alacritty.spec Accepting request 1169541 from home:VaiTon:branches:X11:terminals 2024-04-25 15:36:26 +00:00
README.suse-maint Accepting request 1160858 from home:uncomfyhalomacro:branches:X11:terminals 2024-03-26 00:18:13 +00:00
vendor.tar.zst Accepting request 1169541 from home:VaiTon:branches:X11:terminals 2024-04-25 15:36:26 +00:00

To update this package to a new upstream release, run:

$ current_version=$(ls alacritty-*.tar.xz)
$ osc service manualrun

This should be enough do make a tarball out of the GitHub source tree AND
vendor all the needed Rust crates. If the cargo-audit source service detect
some bad enough vulnerability and give you the red light go visit
https://github.com/openSUSE/obs-service-cargo_audit to further instructions,
and/or contact the Alacritty maintainers.

Otherwise you should be good to go:

$ rm ${current_version}; osc addremove

# If you have the power to build locally:
$ osc build

$ new_version=$(ls alacritty-*.tar.xz)
$ osc ci -m "Update to ${new_version} release"
$ osc sr -m "Update to ${new_version} release"