Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 709359

Summary: wrong error handling of satpasswd command
Product: Red Hat Satellite 5 Reporter: Tomas Lestach <tlestach>
Component: UsabilityAssignee: Tomas Lestach <tlestach>
Status: CLOSED DEFERRED QA Contact: Red Hat Satellite QA List <satqe-list>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 540   
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-07-04 13:26:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 462714    

Description Tomas Lestach 2011-05-31 13:43:58 UTC
Description of problem:
This bug is was discovered, when verifying Bug 684354.
satpasswd prints out information, that isn't correct and that shall not be printed for unprivileged user at all.

Version-Release number of selected component (if applicable):
sat541

How reproducible:
always

Steps to Reproduce:
1. useradd user
2. su - user
3. satpasswd admin
  
Actual results:
Permission denied traceback ending with:

user "admin" is not a valid satellite user

what definitely isn't correct.

Expected results:
Information, that non-privileged user isn't allowed to run the satpasswd command, ideally no traceback.
Definitely not telling information, that isn't correct or wasn't verified at all.
The message points on wrong error handling.