Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 690131 - Traceback messages seen while interrupting sss_obfuscate using ctrl+d.
Traceback messages seen while interrupting sss_obfuscate using ctrl+d.
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: sssd (Show other bugs)
6.1
Unspecified Linux
unspecified Severity unspecified
: rc
: ---
Assigned To: Stephen Gallagher
Chandrasekar Kannan
:
Depends On:
Blocks: 690287
  Show dependency treegraph
 
Reported: 2011-03-23 08:11 EDT by Kaushik Banerjee
Modified: 2015-01-04 18:47 EST (History)
5 users (show)

See Also:
Fixed In Version: sssd-1.5.1-20.el6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 690287 (view as bug list)
Environment:
Last Closed: 2011-05-19 07:39:14 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0560 normal SHIPPED_LIVE Low: sssd security, bug fix, and enhancement update 2011-05-19 07:38:17 EDT

  None (edit)
Description Kaushik Banerjee 2011-03-23 08:11:14 EDT
Description of problem:
On terminating sss_obfuscate with ctrl+d, traceback messages are produced.

Version-Release number of selected component (if applicable):
sssd-tools-1.5.1-15.el6.x86_64

How reproducible:
Always

Steps to Reproduce:
1. Run the command "sss_obfuscate -d AD".
2. Try to interrupt with ctrl+d
3.
  
Actual results:
ctrl+d interrupts sss_obfuscate with traceback messages.
# sss_obfuscate -d AD
Enter password: Traceback (most recent call last):
  File "/usr/sbin/sss_obfuscate", line 101, in <module>
    ret = main()
  File "/usr/sbin/sss_obfuscate", line 45, in main
    p1, p2 = pprompt()
  File "/usr/sbin/sss_obfuscate", line 44, in <lambda>
    pprompt = lambda: (getpass.getpass("Enter password: "),
getpass.getpass("Re-enter password: "))
  File "/usr/lib64/python2.6/getpass.py", line 71, in unix_getpass
    passwd = _raw_input(prompt, stream, input=input)
  File "/usr/lib64/python2.6/getpass.py", line 135, in _raw_input
    raise EOFError
EOFError


Expected results:
ctrl+d should terminate sss_obfuscate without any traceback messages.
We should catch the exception with the message "Password change aborted".

Additional info:
Comment 3 Kaushik Banerjee 2011-03-25 15:45:20 EDT
ctrl+d interrupt is handled without traceback messages now.

# sss_obfuscate -d AD
Enter password: 
Re-enter password: 
Passwords do not match. Try again
Enter password: 
Unexpected end-of-file. Password change aborted


Verified in version:
# rpm -qi sssd-tools | head
Name        : sssd-tools                   Relocations: (not relocatable)
Version     : 1.5.1                             Vendor: Red Hat, Inc.
Release     : 20.el6                        Build Date: Fri 25 Mar 2011 06:50:14 PM IST
Install Date: Sat 26 Mar 2011 01:03:30 AM IST      Build Host: x86-006.build.bos.redhat.com
Group       : Applications/System           Source RPM: sssd-1.5.1-20.el6.src.rpm
Size        : 1728472                          License: GPLv3+
Signature   : (none)
Packager    : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla>
URL         : http://fedorahosted.org/sssd/
Summary     : Userspace tools for use with the SSSD
Comment 4 errata-xmlrpc 2011-05-19 07:39:14 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0560.html
Comment 5 errata-xmlrpc 2011-05-19 09:10:09 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0560.html

Note You need to log in before you can comment on or make changes to this bug.