Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 949530

Summary: Give C++ broker on unix ability to import a listening socket opened by parent process
Product: Red Hat Enterprise MRG Reporter: Justin Ross <jross>
Component: qpid-cppAssignee: Andrew Stitcher <astitcher>
Status: CLOSED ERRATA QA Contact: Frantisek Reznicek <freznice>
Severity: unspecified Docs Contact:
Priority: medium    
Version: 2.3CC: esammons, freznice, iboverma, jross, jwulf, lzhaldyb
Target Milestone: 3.0Keywords: FutureFeature
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: qpid-cpp-0.22-2 Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of:
: 957973 (view as bug list) Environment:
Last Closed: 2014-09-24 15:07:16 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 957973    
Attachments:
Description Flags
Semi-automated test scripts none

Description Justin Ross 2013-04-08 12:04:34 UTC
See https://issues.apache.org/jira/browse/QPID-4615

Comment 5 Frantisek Reznicek 2013-12-13 20:26:57 UTC
The functionality has been implemented and it is proved to be functional, tested on RHEL 6.5 i686/x86_64 on packages:
perl-qpid-0.22-7.el6.x86_64
perl-qpid-debuginfo-0.22-7.el6.x86_64
python-qpid-0.22-8.el6.noarch
python-qpid-qmf-0.22-24.el6.x86_64
qpid-cpp-client-0.22-29.el6.x86_64
qpid-cpp-client-devel-0.22-29.el6.x86_64
qpid-cpp-client-devel-docs-0.22-29.el6.noarch
qpid-cpp-client-rdma-0.22-29.el6.x86_64
qpid-cpp-client-ssl-0.22-29.el6.x86_64
qpid-cpp-debuginfo-0.22-29.el6.x86_64
qpid-cpp-server-0.22-29.el6.x86_64
qpid-cpp-server-devel-0.22-29.el6.x86_64
qpid-cpp-server-ha-0.22-29.el6.x86_64
qpid-cpp-server-linearstore-0.22-29.el6.x86_64
qpid-cpp-server-rdma-0.22-29.el6.x86_64
qpid-cpp-server-ssl-0.22-29.el6.x86_64
qpid-cpp-server-store-0.22-29.el6.x86_64
qpid-cpp-server-xml-0.22-29.el6.x86_64
qpid-java-client-0.22-5.el6.noarch
qpid-java-common-0.22-5.el6.noarch
qpid-java-example-0.22-5.el6.noarch
qpid-jca-0.22-1.el6.noarch
qpid-jca-xarecovery-0.22-1.el6.noarch
qpid-jca-zip-0.22-1.el6.noarch
qpid-proton-c-0.5-9.el6.x86_64
qpid-proton-c-devel-0.5-9.el6.x86_64
qpid-proton-debuginfo-0.5-9.el6.x86_64
qpid-qmf-0.22-24.el6.x86_64
qpid-qmf-debuginfo-0.22-24.el6.x86_64
qpid-qmf-devel-0.22-24.el6.x86_64
qpid-snmpd-1.0.0-14.el6.x86_64
qpid-snmpd-debuginfo-1.0.0-14.el6.x86_64
qpid-tests-0.22-11.el6.noarch
qpid-tools-0.22-7.el6.noarch
rh-qpid-cpp-tests-0.22-29.el6.x86_64
ruby-qpid-0.7.946106-2.el6.x86_64
ruby-qpid-qmf-0.22-24.el6.x86_64


-> VERIFIED

Comment 6 Frantisek Reznicek 2013-12-13 20:35:38 UTC
Created attachment 836491 [details]
Semi-automated test scripts

How to run?
  ./runtest.sh 0 5 600
  ./runtest.sh 1 5 400
  ./runtest.sh 0 1 600
  ./runtest.sh 1 1 400
  ./runtest.sh 0 0 600
  ./runtest.sh 1 0 400

Comment 7 errata-xmlrpc 2014-09-24 15:07:16 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHEA-2014-1296.html