Bug 864999
Summary: | pulp doesnt handle errata spanning across multiple repos case | ||
---|---|---|---|
Product: | Red Hat Satellite | Reporter: | Mike McCune <mmccune> |
Component: | Content Management | Assignee: | Og Maciel <omaciel> |
Status: | CLOSED ERRATA | QA Contact: | Og Maciel <omaciel> |
Severity: | high | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.0.0 | CC: | asettle, ckannan, dgregor, dmacpher, omaciel, pkilambi |
Target Milestone: | Unspecified | Keywords: | Triaged |
Target Release: | Unused | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
Pulp could no handle errat soanning across multiple repositories. This fix merges errata from multiple repositories if their pkglist collection does not match.
|
Story Points: | --- |
Clone Of: | 860800 | Environment: | |
Last Closed: | 2012-12-04 19:57:10 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 860800 | ||
Bug Blocks: | 860802 |
Description
Mike McCune
2012-10-10 15:16:24 UTC
this is already in pulp-1.1.13-1.el6cf: https://bugzilla.redhat.com/show_bug.cgi?id=860800#c2 forcing this into 1.1 * With only 1 channel enabled [root@qetello01 ~]# pulp-admin errata info --id RHBA-2012:1305 Id RHBA-2012:1305 Title openswan bug fix update Description Openswan is a free implementation of IPsec (Internet Protocol Security) and IKE (Internet Key Exchange) for Linux. The openswan packages contain daemons and user-space tools for setting up Openswan. It supports the NETKEY/XFRM IPsec kernel stack that exists in the default Linux kernel. Openswan 2.6 and later also supports IKEv2 (Internet Key Exchange Protocol version 2), which is defined in RFC5996. This update fixes the following bug: * When a tunnel was established between two IPsec hosts (say host1 and host2) utilizing DPD (Dead Peer Detection), and if host2 went offline while host1 continued to transmit data, host1 continually queued multiple phase 2 requests after the DPD action. When host2 came back online, the stack of pending phase 2 requests was established, leaving a new IPsec SA (Security Association), and a large group of extra SA's that consumed system resources and eventually expired. This update ensures that openswan has just a single pending phase 2 request during the time that host2 is down, and when host2 comes back up, only a single new IPsec SA is established, thus preventing this bug. (BZ#852454) All users of openswan are advised to upgrade to these updated packages, which fix this bug. Type bugfix Issued 2012-09-24 00:00:00 Updated 2012-09-24 00:00:00 Version 1 Release Status final Packages Effected openswan-2.6.32-19.el6_3.x86_64.rpm Reboot Suggested False References href : https://rhn.redhat.com/errata/RHBA-2012-1305.html type : self id : None title : RHBA-2012:1305 * With 2 channels enabled: # pulp-admin errata info --id RHBA-2012:1305 Id RHBA-2012:1305 Title openswan bug fix update Description Openswan is a free implementation of IPsec (Internet Protocol Security) and IKE (Internet Key Exchange) for Linux. The openswan packages contain daemons and user-space tools for setting up Openswan. It supports the NETKEY/XFRM IPsec kernel stack that exists in the default Linux kernel. Openswan 2.6 and later also supports IKEv2 (Internet Key Exchange Protocol version 2), which is defined in RFC5996. This update fixes the following bug: * When a tunnel was established between two IPsec hosts (say host1 and host2) utilizing DPD (Dead Peer Detection), and if host2 went offline while host1 continued to transmit data, host1 continually queued multiple phase 2 requests after the DPD action. When host2 came back online, the stack of pending phase 2 requests was established, leaving a new IPsec SA (Security Association), and a large group of extra SA's that consumed system resources and eventually expired. This update ensures that openswan has just a single pending phase 2 request during the time that host2 is down, and when host2 comes back up, only a single new IPsec SA is established, thus preventing this bug. (BZ#852454) All users of openswan are advised to upgrade to these updated packages, which fix this bug. Type bugfix Issued 2012-09-24 00:00:00 Updated 2012-09-24 00:00:00 Version 1 Release Status final Packages Effected openswan-2.6.32-19.el6_3.x86_64.rpm, openswan-doc-2.6.32-19.el6_3.x86_64.rpm Reboot Suggested False References href : https://rhn.redhat.com/errata/RHBA-2012-1305.html type : self id : None title : RHBA-2012:1305 Verified: * candlepin-0.7.8.1-1.el6cf.noarch * candlepin-selinux-0.7.8.1-1.el6cf.noarch * candlepin-tomcat6-0.7.8.1-1.el6cf.noarch * katello-1.1.12-16.el6cf.noarch * katello-all-1.1.12-16.el6cf.noarch * katello-candlepin-cert-key-pair-1.0-1.noarch * katello-certs-tools-1.1.8-1.el6cf.noarch * katello-cli-1.1.8-7.el6cf.noarch * katello-cli-common-1.1.8-7.el6cf.noarch * katello-common-1.1.12-16.el6cf.noarch * katello-configure-1.1.9-7.el6cf.noarch * katello-glue-candlepin-1.1.12-16.el6cf.noarch * katello-glue-pulp-1.1.12-16.el6cf.noarch * katello-qpid-broker-key-pair-1.0-1.noarch * katello-qpid-client-key-pair-1.0-1.noarch * katello-selinux-1.1.1-1.el6cf.noarch * pulp-1.1.13-1.el6cf.noarch * pulp-admin-1.1.13-1.el6cf.noarch * pulp-client-lib-1.1.13-1.el6cf.noarch * pulp-common-1.1.13-1.el6cf.noarch * pulp-selinux-server-1.1.13-1.el6cf.noarch Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2012-1543.html |