| Summary: | Wrong method named in veritas.py | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Masatake YAMATO <yamato> | ||||
| Component: | sos | Assignee: | Jean-Francois Saucier <jsaucier> | ||||
| Status: | CLOSED UPSTREAM | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||
| Severity: | unspecified | Docs Contact: | |||||
| Priority: | unspecified | ||||||
| Version: | rawhide | CC: | jsaucier, prc | ||||
| Target Milestone: | --- | ||||||
| Target Release: | --- | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2011-03-21 23:33:13 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Attachments: |
|
||||||
Appeared in trunk but was never released, already removed as "/proc/sys" is included through system.py. |
Created attachment 474891 [details] A patch fix the issue. Description of problem: While reading source code of sos, I've found a strange method name. I think this will causes a bug. `addcopyspec' method is invoked to collect /proc/sys/vxvm/vxio in lib/sos/plugins/veritas.py. However, there is no such method in source files in sosreport. Instead `addCopySpec' is defined and used widly. Version-Release number of selected component (if applicable): the latest from svn repository. How reproducible: See lib/sos/plugins/veritas.py and search /proc/sys/vxvm/vxio. You will see following line: self.addCopySpec("/proc/sys/vxvm/vxinfo") self.addcopyspec("/proc/sys/vxvm/vxio") <<< # vvr/svrm specific information self.addCopySpec("/etc/vx/vras") Steps to Reproduce: 1. 2. 3. Actual results: addcopyspec. Expected results: addCopySpec. Additional info: