Luke Kanies <l...@madstop.com> writes:

> Run puppetd with --trace --no-daemonize --debug and leave it running  
> like that.  The stack trace should point you to where the problem is  
> in your iptables module.

Ah, this certainly looks like more of a stack trace, though I'm not
really sure how to interpret it. 

The first couple lines look like:

  err: Could not create 01 localhost spoofing in: undefined method `+' for 
false:FalseClass
  /var/lib/puppet/lib/puppet/type/iptables.rb:451:in `initialize'
  /usr/lib/ruby/1.8/puppet/type.rb:1129:in `new'
  /usr/lib/ruby/1.8/puppet/type.rb:1129:in `create'
  /usr/lib/ruby/1.8/puppet/transportable.rb:91:in `to_type'
  /usr/lib/ruby/1.8/puppet/transportable.rb:198:in `to_catalog'
  /usr/lib/ruby/1.8/puppet/transportable.rb:126:in `each'

And line 451 (and surrounding) of iptables.rb is:

  447    def initialize(args)
  448      super(args)
  449
  450      invalidrule = false
  451      @@total_rule_count += 1
  452
  453      table = value(:table).to_s
  454      @@rules[table] = [] unless @@rules[table]


I'm not really sure how to interpret this. I suspect it's beyond my
ability as a programmer, so I'm hoping someone has seen it before. Or
that someone has a pointer to an iptables module.

seph

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to