| Summary: | el5 plague server incompatible with el6 builder | ||
|---|---|---|---|
| Product: | [Fedora] Fedora EPEL | Reporter: | Shad L. Lords <slords> |
| Component: | plague | Assignee: | Stephen John Smoogen <smooge> |
| Status: | CLOSED EOL | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | el5 | CC: | bugs.michael, smooge |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-04-06 10:06:33 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
Upgrade to Plague 0.4.5.8 (see ChangeLog entry from 2009-06-12). Fedora EPEL 5 changed to end-of-life (EOL) status on 2017-03-31. Fedora EPEL 5 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora or Fedora EPEL, please feel free to reopen this bug against that version. If you are unable to reopen this bug, please file a new report against the current release. If you experience problems, please add a comment to this bug. Thank you for reporting this bug and we are sorry it could not be fixed. |
Description of problem: When el6 builder finishes building and tries to return results to el5 server an Unexpected EOF is encountered. Version-Release number of selected component (if applicable): el5 has 0.4.5.7-1.el5 el6 has 0.4.5.7-7.20100505cvs.el6.noarch How reproducible: Every time Steps to Reproduce: 1. Setup el5 server 2. Setup el6 builder 3. Build Additional info: It appears that the following patch (plague-0.4.5.7-cvs20081216.patch) adds some SSL checks that aren't compatible. Trackback on el5 server looks like the following: Traceback (most recent call last): File "/usr/lib64/python2.4/threading.py", line 442, in __bootstrap self.run() File "/usr/lib/python2.4/site-packages/plague/FileDownloader.py", line 103, in run result = self._opener.retrieve(self._url, target_file) File "/usr/lib64/python2.4/urllib.py", line 248, in retrieve block = fp.read(bs) File "/usr/lib64/python2.4/socket.py", line 303, in read data = self._sock.recv(recv_size) File "/usr/lib/python2.4/site-packages/plague/SSLConnection.py", line 142, in recv return con.recv(bufsize, flags) SysCallError: (-1, 'Unexpected EOF')