Description of problem: [root@ykaul-os-horizon packstack(keystone_admin)]$ pwd /usr/lib/python2.6/site-packages/packstack [root@ykaul-os-horizon packstack(keystone_admin)]$ grep -R incomming * puppet/templates/swift_proxy.pp:firewall { '001 swift proxy incomming': puppet/templates/mysql.pp:firewall { '001 mysql incomming': puppet/templates/horizon.pp:firewall { '001 horizon incomming': puppet/templates/nova_api.pp:firewall { '001 novaapi incomming': puppet/templates/nova_vncproxy.pp:firewall { '001 novncproxy incomming': puppet/templates/swift_builder.pp:firewall { '001 rsync incomming': puppet/templates/nova_compute.pp:firewall { '001 nove compute incomming': puppet/templates/swift_storage.pp:firewall { '001 swift storage incomming': puppet/templates/cinder.pp:firewall { '001 cinder incomming': puppet/templates/keystone.pp:firewall { '001 keystone incomming': puppet/templates/glance.pp:firewall { '001 glance incomming': puppet/templates/qpid.pp:firewall { '001 qpid incomming': Version-Release number of selected component (if applicable): openstack-packstack-2012.2.2-0.1.dev218.el6.noarch How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
Now fixed upstream https://github.com/fedora-openstack/packstack/commit/10ce2b269e0af91ae564ebaf627dcf15933bc8a2
Verified with: openstack-packstack-2012.2.2-0.3.dev281.el6ost.noarch # pwd /usr/lib/python2.6/site-packages/packstack # grep -R incomming * Didn't get any output. # grep -R incoming * puppet/modules/rsync/manifests/server/module.pp:# $incoming_chmod - incoming file mode, defaults to 0644 puppet/modules/rsync/manifests/server/module.pp: $incoming_chmod = '0644', puppet/modules/rsync/templates/module.erb:incoming chmod = <%= incoming_chmod %> puppet/modules/rsync/README.markdown: $incoming_chmod - incoming file mode, defaults to 644 puppet/modules/rsync/spec/defines/server_module_spec.rb: it { should contain_file(fragment_file).with_content(/^incoming chmod\s*=\s*0644$/) } puppet/modules/rsync/spec/defines/server_module_spec.rb: :incoming_chmod => '0777', puppet/modules/memcached/templates/memcached.conf.erb:# Limit the number of simultaneous incoming connections. puppet/modules/memcached/templates/memcached.conf.erb:# Number of threads to use to process incoming requests. puppet/templates/qpid.pp:firewall { '001 qpid incoming': puppet/templates/horizon.pp:firewall { '001 horizon incoming': puppet/templates/cinder.pp:firewall { '001 cinder incoming': puppet/templates/glance.pp:firewall { '001 glance incoming': puppet/templates/mysql.pp:firewall { '001 mysql incoming': puppet/templates/nova_compute.pp:firewall { '001 nove compute incoming': puppet/templates/keystone.pp:firewall { '001 keystone incoming': puppet/templates/nova_api.pp:firewall { '001 novaapi incoming': puppet/templates/swift_storage.pp:firewall { '001 swift storage incoming': puppet/templates/nova_vncproxy.pp:firewall { '001 novncproxy incoming': puppet/templates/swift_builder.pp:firewall { '001 rsync incoming': puppet/templates/swift_proxy.pp:firewall { '001 swift proxy incoming':
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHEA-2013-0204.html