Bug 888332

Summary: packstack: typo in iptables rules description (incomming -> incoming) [TEXT]
Product: Red Hat OpenStack Reporter: Yaniv Kaul <ykaul>
Component: openstack-packstackAssignee: Derek Higgins <derekh>
Status: CLOSED ERRATA QA Contact: Nir Magnezi <nmagnezi>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 2.0 (Folsom)CC: aortega, derekh, jkt, ykaul
Target Milestone: rcKeywords: Triaged
Target Release: 2.1   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-01-29 11:10:11 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Yaniv Kaul 2012-12-18 14:08:43 UTC
Description of problem:
[root@ykaul-os-horizon packstack(keystone_admin)]$ pwd
/usr/lib/python2.6/site-packages/packstack
[root@ykaul-os-horizon packstack(keystone_admin)]$ grep -R incomming *
puppet/templates/swift_proxy.pp:firewall { '001 swift proxy incomming':
puppet/templates/mysql.pp:firewall { '001 mysql incomming':
puppet/templates/horizon.pp:firewall { '001 horizon incomming':
puppet/templates/nova_api.pp:firewall { '001 novaapi incomming':
puppet/templates/nova_vncproxy.pp:firewall { '001 novncproxy incomming':
puppet/templates/swift_builder.pp:firewall { '001 rsync incomming':
puppet/templates/nova_compute.pp:firewall { '001 nove compute incomming':
puppet/templates/swift_storage.pp:firewall { '001 swift storage incomming':
puppet/templates/cinder.pp:firewall { '001 cinder incomming':
puppet/templates/keystone.pp:firewall { '001 keystone incomming':
puppet/templates/glance.pp:firewall { '001 glance incomming':
puppet/templates/qpid.pp:firewall { '001 qpid incomming':


Version-Release number of selected component (if applicable):
openstack-packstack-2012.2.2-0.1.dev218.el6.noarch

How reproducible:


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:

Comment 3 Nir Magnezi 2013-01-16 14:20:38 UTC
Verified with: openstack-packstack-2012.2.2-0.3.dev281.el6ost.noarch


# pwd
/usr/lib/python2.6/site-packages/packstack
# grep -R incomming *

Didn't get any output.

# grep -R incoming *
puppet/modules/rsync/manifests/server/module.pp:#   $incoming_chmod  - incoming file mode, defaults to 0644
puppet/modules/rsync/manifests/server/module.pp:  $incoming_chmod  = '0644',
puppet/modules/rsync/templates/module.erb:incoming chmod  = <%= incoming_chmod %>
puppet/modules/rsync/README.markdown:    $incoming_chmod - incoming file mode, defaults to 644
puppet/modules/rsync/spec/defines/server_module_spec.rb:    it { should contain_file(fragment_file).with_content(/^incoming chmod\s*=\s*0644$/) }
puppet/modules/rsync/spec/defines/server_module_spec.rb:    :incoming_chmod => '0777',
puppet/modules/memcached/templates/memcached.conf.erb:# Limit the number of simultaneous incoming connections.
puppet/modules/memcached/templates/memcached.conf.erb:# Number of threads to use to process incoming requests.
puppet/templates/qpid.pp:firewall { '001 qpid incoming':
puppet/templates/horizon.pp:firewall { '001 horizon incoming':
puppet/templates/cinder.pp:firewall { '001 cinder incoming':
puppet/templates/glance.pp:firewall { '001 glance incoming':
puppet/templates/mysql.pp:firewall { '001 mysql incoming':
puppet/templates/nova_compute.pp:firewall { '001 nove compute incoming':
puppet/templates/keystone.pp:firewall { '001 keystone incoming':
puppet/templates/nova_api.pp:firewall { '001 novaapi incoming':
puppet/templates/swift_storage.pp:firewall { '001 swift storage incoming':
puppet/templates/nova_vncproxy.pp:firewall { '001 novncproxy incoming':
puppet/templates/swift_builder.pp:firewall { '001 rsync incoming':
puppet/templates/swift_proxy.pp:firewall { '001 swift proxy incoming':

Comment 5 errata-xmlrpc 2013-01-29 11:10:11 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHEA-2013-0204.html