-
Notifications
You must be signed in to change notification settings - Fork 416
jq/1.8.0 package update #55012
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
jq/1.8.0 package update #55012
Conversation
octo-sts
bot
commented
Jun 1, 2025
Signed-off-by: wolfi-bot <121097084+wolfi-bot@users.noreply.github.com>
🩹 Build Failed: Patch Application Failed
Build Details
Root Cause Analysis 🔍The build is trying to apply a patch to src/jv.c, but the patch cannot be applied. The error suggests the patch may be reversed or has already been applied to the source code. All 4 hunks of the patch were ignored, and the rejects were saved to src/jv.c.rej. This indicates that the patch doesn't match the current state of the source file. 🔍 Build failure fix suggestionsFound similar build failures that have been fixed in the past and analyzed them to suggest a fix: Similar PRs with fixes
Suggested ChangesFile: jq.yaml
Replacement: File: jq.yaml
Replacement: Click to expand fix analysisAnalysisAfter analyzing the similar fixed build failures, I can see a clear pattern: all three examples involve patch application failures with the error message "Reversed (or previously applied) patch detected!". In each case, the solution was to remove the patch step completely and update the package version to a newer release where the patch was no longer needed. The common pattern in these fixes was:
This suggests that patches which fail with "Reversed (or previously applied) patch detected!" are typically addressing issues that have been fixed in newer versions of the source code. Click to expand fix explanationExplanationThe build failure is occurring because the patches Looking at the error message: "Reversed (or previously applied) patch detected! Skipping patch. 4 out of 4 hunks ignored -- saving rejects to file src/jv.c.rej", we can see that the patch tool is detecting that the patches have already been applied to the source code. This is likely because jq version 1.8.0 already includes the fixes that these patches were meant to apply. Looking at the test section, there's even a specific test for CVE-2024-53427, which is likely what one of the patches was addressing. The fix is simple - we should remove or comment out the patch step in the pipeline. Since the patches are already included in version 1.8.0 of jq, we don't need to apply them again. The test for CVE-2024-53427 in the yaml file indicates that this version of jq should already have the fix, which further confirms that the patches are redundant. Click to expand alternative approachesAlternative Approaches
Was this comment helpful? Please use 👍 or 👎 reactions on this comment. |