Skip to content

rhash/1.4.6 package update #53275

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

octo-sts[bot]
Copy link
Contributor

@octo-sts octo-sts bot commented May 13, 2025

@octo-sts octo-sts bot added request-version-update request for a newer version of a package automated pr labels May 13, 2025
Copy link
Contributor Author

octo-sts bot commented May 14, 2025

🔍 Build Failed: Checksum Verification Failed

Expected sha256 does not match found: 9f6019cfeeae8ace7067ad22da4e4f857bb2cfa6c2deaa2258f55b2227ec937a

Build Details

Category Details
Build System Melange
Failure Point Checksum verification during fetch step

Root Cause Analysis 🔍

The downloaded source archive (rhash-1.4.6-src.tar.gz) has a SHA256 checksum of 9f6019cfeeae8ace7067ad22da4e4f857bb2cfa6c2deaa2258f55b2227ec937a, but the build expected f489738899e24c781d35cce9d11ca94b348d3e693c922248e4cfb76432c91346. This indicates either the source archive has changed at the remote location or the expected checksum in the package definition is incorrect.


🔍 Build failure fix suggestions

Found similar build failures that have been fixed in the past and analyzed them to suggest a fix:

Suggested Changes

File: rhash.yaml

  • replace at line pipeline[0].with.expected-sha256 (expected-sha256 value in fetch step)
    Original:
expected-sha256: f489738899e24c781d35cce9d11ca94b348d3e693c922248e4cfb76432c91346

Replacement:

expected-sha256: 9f6019cfeeae8ace7067ad22da4e4f857bb2cfa6c2deaa2258f55b2227ec937a

Content:

Update the expected SHA256 hash to match the actual hash of the current source archive
Click to expand fix analysis

Analysis

The build failure is a checksum mismatch during the fetch step. The downloaded rhash-1.4.6-src.tar.gz file has a SHA256 checksum of 9f6019cfeeae8ace7067ad22da4e4f857bb2cfa6c2deaa2258f55b2227ec937a, but the expected checksum in the Melange YAML is f489738899e24c781d35cce9d11ca94b348d3e693c922248e4cfb76432c91346. This indicates that either the source archive has been updated at the remote location without a version change, or the expected checksum in the package definition is incorrect. Since there are no similar fixed failures provided, I'll focus on the specific issue at hand.

Click to expand fix explanation

Explanation

The build failure occurs because the SHA256 checksum of the downloaded rhash-1.4.6-src.tar.gz file (9f6019cfeeae8ace7067ad22da4e4f857bb2cfa6c2deaa2258f55b2227ec937a) doesn't match the expected checksum defined in the Melange YAML (f489738899e24c781d35cce9d11ca94b348d3e693c922248e4cfb76432c91346).

This type of mismatch typically happens when:

  1. The upstream project has silently updated their release archive without changing the version number
  2. The source has been moved to a mirror that has a different file
  3. The original checksum was incorrect

Since the error clearly indicates the actual checksum of the downloaded file, and the package has an update mechanism enabled (via release-monitor), the simplest solution is to update the expected checksum in the Melange YAML to match the actual file being downloaded.

The fix involves updating the expected-sha256 value in the fetch step of the pipeline to use the new checksum that was reported in the error message. This will allow the build to proceed with the current version of the source archive.

Before implementing this fix, it would be prudent to verify that:

  1. The source archive is legitimate and from the official project
  2. There are no security concerns with using the updated archive
Click to expand alternative approaches

Alternative Approaches

  • Instead of updating the checksum, we could investigate if there's a specific tagged release or commit hash of rhash 1.4.6 that should be used, and modify the URI to point to that specific archive.
  • We could contact the upstream maintainers to understand why the archive changed and ensure there are no security implications before updating the checksum.
  • We could modify the fetch step to use a different source for the rhash tarball, such as GitHub releases if available, which might provide more stable archives.

Was this comment helpful? Please use 👍 or 👎 reactions on this comment.

@octo-sts octo-sts bot added the ai/skip-comment Stop AI from commenting on PR label May 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ai/skip-comment Stop AI from commenting on PR automated pr request-version-update request for a newer version of a package
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant