Red Hat Bugzilla – Bug 135659
incorrect signature on rpcServer.resetServerList
Last modified: 2007-11-30 17:10:51 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040510
Description of problem:
Traceback (most recent call last):
File "/usr/share/rhn/up2date_client/gui.py", line 1434, in
File "/usr/share/rhn/up2date_client/packageList.py", line 122, in run
File "/usr/share/rhn/up2date_client/rhnPackageInfo.py", line 315, in
package_list = availablePackageList(
File "/usr/share/rhn/up2date_client/rhnPackageInfo.py", line 137, in
repos = repoDirector.initRepoDirector()
File "/usr/share/rhn/up2date_client/repoDirector.py", line 64, in
line 335, in register
up2dateRepo = Up2dateRepo()
line 292, in __init__
serverSettings = ServerSettings()
line 268, in __init__
TypeError: resetServerList() takes exactly 1 argument (2 given)
Version-Release number of selected component (if applicable):
Steps to Reproduce:
2. forward thru login
3. forward thru channels
4. crashes ...
Created attachment 105184 [details]
another simple patch
Hi, we'd really like to see this patch applied to FC4 please!
hmm, I'm assuming the config variable "useNoSSLForPackages"
as a workaround, you could disable that, since it doesn't
really apply for fedora.
fix should be in the next build
No, we definitely connect via SSL!
We don't need a workaround - we've applied the patch :)
Thank you very much for getting this into the build.
up2date was replaced by pirut and put (package pirut) as of FC5. Only FC5 and
FC6 are currently fully supported; FC3 and FC4 are supported for security fixes
only. If this bug occurs in FC3 or FC4 and is a security bug, please change the
product to Fedora Extras and the version to match. If you can verify that the
bug exists in RHEL as well, please change the product and version appropriately.
The codebase for pirut and pup is quite different, but if a similar bug exists
in pirut and pup in FC5 or FC6, please change the product to pirut and the
version appropriately and update the bug report.
We apologize that the bug was not fixed before now. The status will be changed
to NEEDINFO, and if the bug is not updated with evidence that it is a security
bug or a bug that affects RHEL, it will be closed.
Closing per previous message.