summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorMaximilian Bosch <maximilian@mbosch.me>2022-04-14 11:29:19 +0200
committerMaximilian Bosch <maximilian@mbosch.me>2022-04-14 11:29:19 +0200
commite633d427477c310891553b4218648e05da1db56c (patch)
treed9d8b00b1897331dffb6d443aebca0b40e5d8305 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent7708fccf01e0cdc38ce020c30e5c84427c2bec8e (diff)
grafana: 8.4.5 -> 8.4.6
No-op release: https://github.com/grafana/grafana/releases/tag/v8.4.6 Yes, this is actually not really needed since we only provide the OSS version of Grafana and the CVE in question is only exploitable on Grafana enterprise, but I decided to perform this update to test the update script I previously implemented in 7708fccf01e0cdc38ce020c30e5c84427c2bec8e.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions