Bug 806888
Summary: | qmf-tool broken | ||
---|---|---|---|
Product: | Red Hat Enterprise MRG | Reporter: | Petr Matousek <pematous> |
Component: | qpid-tools | Assignee: | Ted Ross <tross> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Frantisek Reznicek <freznice> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 2.1.2 | CC: | esammons, freznice, iboverma, jkirklan, jross |
Target Milestone: | 2.1.2 | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | qpid-tools-0.14-2 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-12-07 17:42:08 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 811469 | ||
Bug Blocks: |
Description
Petr Matousek
2012-03-26 12:47:31 UTC
By browsing the web I found a forum, where this issue was already discussed. Maybe it can be useful, please see: http://qpid.2158936.n2.nabble.com/qmf-tool-error-quot-Failed-TypeError-init-takes-at-most-2-arguments-3-given-quot-td7256924.html There is one similar issue reported against qpid-tools-0.14-1. The issue is related to qpid-printevents, please see Bug 806869. However the issue is not marked as blocker for 2.1.2, maybe it would be beneficial to solve the issue together with this defect. Fixes committed upstream at revisions 1309991 and 1309998. Retested on RHEL5.8 / 6.2 using packages: el5 python-qpid-0.14-6.el5 qpid-cpp-mrg-0.14-15.el5 qpid-java-0.14-3.el5 qpid-qmf-0.14-7.el5 qpid-tests-0.14-1.el5 qpid-tools-0.14-2.el5 saslwrapper-0.10-4.el5 sesame-1.0-3.el5 qmf-tool segfaults, tracked as bug 811469 el6 python-qpid-0.14-8.el6 qpid-cpp-0.14-14.el6_2 qpid-java-0.10-11.el6 qpid-java-0.14-3.el6 qpid-qmf-0.14-7.el6_2 qpid-tests-0.14-1.el6_2 qpid-tools-0.14-2.el6_2 saslwrapper-0.10-2.el6 sesame-1.0-5.el6 qmf-tool works as expected Summary: el5 behavior not fixed, see bug 811469 for details el6 behavior fixed Both issues have been fixed, tested on RHEL5.8 / 6.2 i386 / x86_64 on packages python-qpid-0.14-6.el5 python-qpid-qmf-0.14-9.el5 python-saslwrapper-0.10-4.el5 qpid-cpp-client-0.14-14.el5 qpid-cpp-client-devel-0.14-14.el5 qpid-cpp-client-devel-docs-0.14-14.el5 qpid-cpp-client-rdma-0.14-14.el5 qpid-cpp-client-ssl-0.14-14.el5 qpid-cpp-server-0.14-14.el5 qpid-cpp-server-cluster-0.14-14.el5 qpid-cpp-server-devel-0.14-14.el5 qpid-cpp-server-rdma-0.14-14.el5 qpid-cpp-server-ssl-0.14-14.el5 qpid-cpp-server-store-0.14-14.el5 qpid-cpp-server-xml-0.14-14.el5 qpid-java-client-0.14-3.el5 qpid-java-common-0.14-3.el5 qpid-java-example-0.14-3.el5 qpid-qmf-0.14-9.el5 qpid-qmf-devel-0.14-9.el5 qpid-tests-0.14-1.el5 qpid-tools-0.14-2.el5 rh-qpid-cpp-tests-0.14-14.el5 ruby-qpid-qmf-0.14-9.el5 ruby-saslwrapper-0.10-4.el5 saslwrapper-0.10-4.el5 saslwrapper-devel-0.10-4.el5 sesame-1.0-3.el5 python-qpid-0.14-7.el6_2.noarch python-qpid-qmf-0.14-7.el6_2.x86_64 python-saslwrapper-0.10-2.el6.x86_64 qpid-cpp-client-0.14-14.el6_2.x86_64 qpid-cpp-client-devel-0.14-14.el6_2.x86_64 qpid-cpp-client-devel-docs-0.14-14.el6_2.noarch qpid-cpp-client-rdma-0.14-14.el6_2.x86_64 qpid-cpp-client-ssl-0.14-14.el6_2.x86_64 qpid-cpp-server-0.14-14.el6_2.x86_64 qpid-cpp-server-cluster-0.14-14.el6_2.x86_64 qpid-cpp-server-devel-0.14-14.el6_2.x86_64 qpid-cpp-server-rdma-0.14-14.el6_2.x86_64 qpid-cpp-server-ssl-0.14-14.el6_2.x86_64 qpid-cpp-server-store-0.14-14.el6_2.x86_64 qpid-cpp-server-xml-0.14-14.el6_2.x86_64 qpid-java-client-0.14-3.el6.noarch qpid-java-common-0.14-3.el6.noarch qpid-java-example-0.14-3.el6.noarch qpid-qmf-0.14-7.el6_2.x86_64 qpid-qmf-devel-0.14-7.el6_2.x86_64 qpid-tests-0.14-1.el6_2.noarch qpid-tools-0.14-2.el6_2.noarch rh-qpid-cpp-tests-0.14-14.el6_2.x86_64 ruby-qpid-qmf-0.14-7.el6_2.x86_64 ruby-saslwrapper-0.10-2.el6.x86_64 saslwrapper-0.10-2.el6.x86_64 saslwrapper-devel-0.10-2.el6.x86_64 sesame-1.0-5.el6.x86_64 -> VERIFIED |