Bug 1257592
Summary: | Don't exit with traceback if provided XCCDF / DS benchmark contains dangling selector | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | oscap-anaconda-addon | Assignee: | Vratislav Podzimek <vpodzime> |
Status: | CLOSED WONTFIX | QA Contact: | Release Test Team <release-test-team-automation> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.3 | CC: | jikortus, slukasik |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2016-02-05 14:26:05 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jan Lieskovsky
2015-08-27 12:16:25 UTC
I'm not able to reproduce this bug on RHEL-7.2, it seems that it has been fixed, probably with fix for bug #1247654 which is very similar to this one and presumably resulted in the same traceback. When an invalid security content is used (even the content in the upstream bug referenced in bug description), no traceback occurs and an error message is displayed. Quality Engineering Management has reviewed and declined this request. You may appeal this decision by reopening this request. |