public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* Re: IPFire 2.27 - Core Update 176 is available for testing
       [not found] <168803400577.813793.16129722323304756022.ipfire@ipfire.org>
@ 2023-06-29 17:18 ` Adolf Belka
  2023-07-01  9:05   ` Michael Tremer
  0 siblings, 1 reply; 4+ messages in thread
From: Adolf Belka @ 2023-06-29 17:18 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 829 bytes --]


Hi All,

So far everything I have tested has worked as expected. That includes the OpenVPN roadwarrior connection.

Looking good so far :crossed_fingers:

Regards,

Adolf.


On 29/06/2023 12:20, IPFire Project wrote:
> IPFire Logo
> 
> there is a new post from Peter Müller on the IPFire Blog:
> 
> *IPFire 2.27 - Core Update 176 is available for testing*
> 
>     The next update, IPFire 2.27 - Core Update 176, is available for testing. It features a toolchain and package updates (among the security-relevant of them are Intel microcodes), brings the latest batch of bug fixes.
> 
> Click Here To Read More <https://blog.ipfire.org/post/ipfire-2-27-core-update-176-is-available-for-testing>
> 
> The IPFire Project
> Don't like these emails? Unsubscribe <https://people.ipfire.org/unsubscribe>.
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: IPFire 2.27 - Core Update 176 is available for testing
  2023-06-29 17:18 ` IPFire 2.27 - Core Update 176 is available for testing Adolf Belka
@ 2023-07-01  9:05   ` Michael Tremer
  2023-07-08 11:28     ` Peter Müller
  0 siblings, 1 reply; 4+ messages in thread
From: Michael Tremer @ 2023-07-01  9:05 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1006 bytes --]

Thank you for your feedback.

I didn’t hear anything bad yet either.

-Michael

> On 29 Jun 2023, at 18:18, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
> 
> 
> Hi All,
> 
> So far everything I have tested has worked as expected. That includes the OpenVPN roadwarrior connection.
> 
> Looking good so far :crossed_fingers:
> 
> Regards,
> 
> Adolf.
> 
> 
> On 29/06/2023 12:20, IPFire Project wrote:
>> IPFire Logo
>> there is a new post from Peter Müller on the IPFire Blog:
>> *IPFire 2.27 - Core Update 176 is available for testing*
>>    The next update, IPFire 2.27 - Core Update 176, is available for testing. It features a toolchain and package updates (among the security-relevant of them are Intel microcodes), brings the latest batch of bug fixes.
>> Click Here To Read More <https://blog.ipfire.org/post/ipfire-2-27-core-update-176-is-available-for-testing>
>> The IPFire Project
>> Don't like these emails? Unsubscribe <https://people.ipfire.org/unsubscribe>.


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: IPFire 2.27 - Core Update 176 is available for testing
  2023-07-01  9:05   ` Michael Tremer
@ 2023-07-08 11:28     ` Peter Müller
  2023-07-11 13:58       ` Michael Tremer
  0 siblings, 1 reply; 4+ messages in thread
From: Peter Müller @ 2023-07-08 11:28 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1361 bytes --]

Hello *,

Core Update 176 is running on my testing machine for a couple of days by now,
without any issues or anomalies whatsoever. From my perspective, this Core
Update is ready to be released.

@Michael: I'll send you a draft for the release announcement in due course.

Thanks, and best regards,
Peter Müller


> Thank you for your feedback.
> 
> I didn’t hear anything bad yet either.
> 
> -Michael
> 
>> On 29 Jun 2023, at 18:18, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>
>>
>> Hi All,
>>
>> So far everything I have tested has worked as expected. That includes the OpenVPN roadwarrior connection.
>>
>> Looking good so far :crossed_fingers:
>>
>> Regards,
>>
>> Adolf.
>>
>>
>> On 29/06/2023 12:20, IPFire Project wrote:
>>> IPFire Logo
>>> there is a new post from Peter Müller on the IPFire Blog:
>>> *IPFire 2.27 - Core Update 176 is available for testing*
>>>    The next update, IPFire 2.27 - Core Update 176, is available for testing. It features a toolchain and package updates (among the security-relevant of them are Intel microcodes), brings the latest batch of bug fixes.
>>> Click Here To Read More <https://blog.ipfire.org/post/ipfire-2-27-core-update-176-is-available-for-testing>
>>> The IPFire Project
>>> Don't like these emails? Unsubscribe <https://people.ipfire.org/unsubscribe>.
> 

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: IPFire 2.27 - Core Update 176 is available for testing
  2023-07-08 11:28     ` Peter Müller
@ 2023-07-11 13:58       ` Michael Tremer
  0 siblings, 0 replies; 4+ messages in thread
From: Michael Tremer @ 2023-07-11 13:58 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1742 bytes --]

Hello,

> On 8 Jul 2023, at 12:28, Peter Müller <peter.mueller(a)ipfire.org> wrote:
> 
> Hello *,
> 
> Core Update 176 is running on my testing machine for a couple of days by now,
> without any issues or anomalies whatsoever. From my perspective, this Core
> Update is ready to be released.
> 
> @Michael: I'll send you a draft for the release announcement in due course.

Thank you.

I uploaded the update to the mirrors and published the updater.

The announcement will be sent out in about half an hour.

Thank you everyone for yet another great update! On to the next one!

-Michael

> 
> Thanks, and best regards,
> Peter Müller
> 
> 
>> Thank you for your feedback.
>> 
>> I didn’t hear anything bad yet either.
>> 
>> -Michael
>> 
>>> On 29 Jun 2023, at 18:18, Adolf Belka <adolf.belka(a)ipfire.org> wrote:
>>> 
>>> 
>>> Hi All,
>>> 
>>> So far everything I have tested has worked as expected. That includes the OpenVPN roadwarrior connection.
>>> 
>>> Looking good so far :crossed_fingers:
>>> 
>>> Regards,
>>> 
>>> Adolf.
>>> 
>>> 
>>> On 29/06/2023 12:20, IPFire Project wrote:
>>>> IPFire Logo
>>>> there is a new post from Peter Müller on the IPFire Blog:
>>>> *IPFire 2.27 - Core Update 176 is available for testing*
>>>>   The next update, IPFire 2.27 - Core Update 176, is available for testing. It features a toolchain and package updates (among the security-relevant of them are Intel microcodes), brings the latest batch of bug fixes.
>>>> Click Here To Read More <https://blog.ipfire.org/post/ipfire-2-27-core-update-176-is-available-for-testing>
>>>> The IPFire Project
>>>> Don't like these emails? Unsubscribe <https://people.ipfire.org/unsubscribe>.
>> 


^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2023-07-11 13:58 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <168803400577.813793.16129722323304756022.ipfire@ipfire.org>
2023-06-29 17:18 ` IPFire 2.27 - Core Update 176 is available for testing Adolf Belka
2023-07-01  9:05   ` Michael Tremer
2023-07-08 11:28     ` Peter Müller
2023-07-11 13:58       ` Michael Tremer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox