Bug 250986 - /etc/xinetd.d/telnet should be marked as noverify in the specfile
Summary: /etc/xinetd.d/telnet should be marked as noverify in the specfile
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: rpm
Version: 5.0
Hardware: All
OS: Linux
low
low
Target Milestone: ---
: ---
Assignee: Panu Matilainen
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-08-06 11:44 UTC by David Kovalsky
Modified: 2014-03-31 23:44 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2007-09-04 07:00:27 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description David Kovalsky 2007-08-06 11:44:31 UTC
+++ This bug was initially created as a clone of Bug #250740 +++

Description of problem:
When the xinetd telnet config file is modified, RPM verify test fails. Since the
nature of config files is to be modifiable by the user, it should be marked as
no verify in the spec file. 

This affects automated TPS  test done by URT. Since we have telnet setup on
stable systems all of the TPS tests fail, so having this fixed would save us
some false positives.


Version-Release number of selected component (if applicable):
telnet-server-0.17-38.el5

How reproducible:
always

Comment 1 Adam Tkac 2007-08-31 08:44:57 UTC
reassigning to rpm because it doesn't make sence change %config directive in all
packages. Attributes like MD5, size, mtime won't be checked if %config directive
is specified by default

Comment 2 Panu Matilainen 2007-08-31 09:22:40 UTC
Um, no. Users and especially sysadmins very much want to know if a configuration
file was modified from the shipped package defaults. If you don't want to know
about config file changes, filter them out of the verification results.

Making filtering easier is something I'm willing to consider for future rpm
versions, otherwise WONTFIX.






Note You need to log in before you can comment on or make changes to this bug.