Bug 1058591 - Update RHS with openssl-1.0.1e-16.el6_5.4
Summary: Update RHS with openssl-1.0.1e-16.el6_5.4
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Gluster Storage
Classification: Red Hat Storage
Component: distribution
Version: 2.1
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
: RHGS 2.1.2
Assignee: Sayan Saha
QA Contact: amainkar
URL:
Whiteboard:
Depends On:
Blocks: 1055575
TreeView+ depends on / blocked
 
Reported: 2014-01-28 05:58 UTC by crisbud@redhat.com
Modified: 2015-08-10 07:45 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-08-10 07:45:56 UTC
Embargoed:


Attachments (Terms of Use)

Description crisbud@redhat.com 2014-01-28 05:58:27 UTC
Description of problem:
RHS needs openssl-1.0.1e-16.el6_5.4 in order to update keystoneclient & swiftclient. 


Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:
Please do all the needful to update RHS with openssl-1.0.1e-16.el6_5.4.

Comment 3 pushpesh sharma 2014-02-05 09:49:29 UTC
Latest ISO and channel are updated with the package. 

[root@flo ~]# rpm -qa|grep gluster
vdsm-gluster-4.13.0-24.el6rhs.noarch
gluster-swift-1.10.0-2.el6rhs.noarch
gluster-swift-object-1.10.0-2.el6rhs.noarch
glusterfs-3.4.0.59rhs-1.el6rhs.x86_64
glusterfs-server-3.4.0.59rhs-1.el6rhs.x86_64
glusterfs-libs-3.4.0.59rhs-1.el6rhs.x86_64
glusterfs-geo-replication-3.4.0.59rhs-1.el6rhs.x86_64
glusterfs-api-3.4.0.59rhs-1.el6rhs.x86_64
glusterfs-rdma-3.4.0.59rhs-1.el6rhs.x86_64
samba-glusterfs-3.6.9-167.10.el6rhs.x86_64
gluster-swift-proxy-1.10.0-2.el6rhs.noarch
gluster-swift-account-1.10.0-2.el6rhs.noarch
gluster-swift-plugin-1.10.0-5.el6rhs.noarch
gluster-swift-container-1.10.0-2.el6rhs.noarch
glusterfs-fuse-3.4.0.59rhs-1.el6rhs.x86_64
[root@flo ~]# rpm -qa|grep openssl
openssl-1.0.1e-16.el6_5.4.x86_64


Note You need to log in before you can comment on or make changes to this bug.