Bug 470032 - ipmitool missing "Get User Payload Access Command"
Summary: ipmitool missing "Get User Payload Access Command"
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: OpenIPMI
Version: 4.7
Hardware: All
OS: Linux
medium
medium
Target Milestone: rc
: ---
Assignee: Jan Safranek
QA Contact: BaseOS QE
URL:
Whiteboard:
Depends On: 470031
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-11-05 12:02 UTC by Karel Volný
Modified: 2010-04-06 11:38 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-04-06 11:38:35 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Karel Volný 2008-11-05 12:02:27 UTC
+++ This bug was initially created as a clone of Bug #470031 +++

Description of problem:
ipmitool is missing the possibility of determining the settings that were set by the "sol payload enable/disable" command

Version-Release number of selected component (if applicable):
1.8.10

How reproducible:
always

Steps to Reproduce:
1. ipmitool sol payload enable 1 1
2. ipmitool sol payload get 1 1
  
Actual results:
[root@tornado ~]# ipmitool sol payload enable 1 1
[root@tornado ~]# ipmitool sol payload get 1 1
SOL Commands: info [<channel number>]
              set <parameter> <value> [channel]
              payload <enable|disable> [channel] [userid]
              activate [<usesolforkeepalive|nokeepalive>]
              deactivate
              looptest [<loop times>] [<loop interval(in ms)>]

Expected results:
[root@tornado ~]# ipmitool sol payload enable 1 1
Enabling SOL payload for user 1 on channel 1
[root@tornado ~]# ipmitool sol payload get 1 1
SOL payload for user 1 on channel 1 is ENABLED

Additional info:
this was an additional issue raised in bug #224142, see the end of the comment #12 to that bug, but it was not fixed as it was not a subject of that bug

see IPMI spec chapter 24.7

Comment 2 Jan Safranek 2010-04-06 11:38:35 UTC
Only important issues like performance and security are fixed in RHEL 4.9 and
later. This bug does not meet necessary criteria and is therefore closed.


Note You need to log in before you can comment on or make changes to this bug.